Fundamentals of ICT by Eru & Ayegba, 2020
Fundamentals of ICT by Eru & Ayegba, 2020
Fundamentals of Information
and Communication
Technology
ISBN: 978-978-989-198-6
2
CHAPTER ONE
Introduction
The acronym ‘ICT’ stands for Information and Communications
Technology and ICTs stands for Information and Communication
Technologies. ICTs are the device set of technological tools and
resources used to communicate, create, disseminate, store, and
manage information. These technologies include computers, the
internet, broadcasting technologies (radio and television), and
telephony. ICT has been of immense contribution to advancement
and sustenance of several disciplinary areas and concepts. ICTs
have been touted as potentially enabling tools for educational and
economic change as well as for sustainable development. When
used appropriately, different ICTs are said to help expand access
to sustainable development.
What is ICT?
Many scholars have viewed the concept of ICT from different
perspectives. The term, Information and Communications
Technology (ICT) have been introduced in the early 1990s to
replace Information Technology (IT) in recognition of the
communicating abilities and facilities offered by the computer.
However, while most people adopted the term ICT, people in
higher education used the term Communication and Information
Technology (C & IT) to refer to the same concept.
ICT refers to a broad field encompassing computers,
communication equipment and the services associated with them.
This means that ICT is not just considered as applications and
systems but also as skill for life. In this sense, it is viewed in line
3
with literacy and numeracy as a fundamental skill that every
individual needs so as to live confidently, effectively and
independently in a modern or contemporary society.ICT is also
viewed as a broad subject concerned with technology and other
aspects of managing and processing information and that it deals
with the use of electronic computers and computer software to
convert, store, protect, process, transmit, and retrieve information
(Hameed, 2006). The term ICT was coined to reflect the seamless
convergence of digital processing and telecommunications.
As commonly perceived, it is not limited to the modern
sophisticated, high technology gadgets or networks; In fact, ICTs
have been in use for many decades. For instance, i n postal
services and radio as communication mediums to transmit
information even to very remote places. For ease of use, these can
be divided into old and new ICTs wherein the former one includes
Radio, Television, Telephone, Fax, Telegram, etc. while the later
comprises of data networks, e-mail, World Wide Web (or
internet) and cutting-edge wireless and wire line technologies.
The term “ICT” describes the use of computer-based technology
and the internet to make information and communication services
available to a wide range of users. The term is used broadly to
address a range of technologies, including telephones. Eru,
Ayegba and Ayangeaor (2019) added that, central to these is the
internet, which provides the mechanism for transporting data in a
number of formats including text, images, sound, and video.
Additionally, ICT deals with the application layer, the systems
that enable information to be collected and distributed, analyzed,
and processed. ICT is an integration of the technologies and the
process to distribute and communicate the desired information to
the target audience and making the target audience more
participative in nature.
The term ICT also refers to: information channels such as the
World Wide Web, online database, electronic documents, intranet,
4
etc; communication channels such as e-mail, electronic discussion
groups, electronic conferences, the use of cell phones, etc; and
hardware and software used to generate, prepare, transmit, and
store data, such as computers, radio, TV, computer
programmes/tools, etc.
Importance of ICT
The significance of ICT cannot be overemphasized in today’s
workplace, as its relevance spans wider than one could have
imagined decades ago. This is why Eru (2017) stressed that
information and communication technologies have become very
vital gizmos in almost every sphere of life; ranging from the home
to the office; in business and in education, in health and in
governance, in banking and the economy.
Generally, ICTs are used in various forms depending on the needs
of organizations. The benefits of ICT the following:
i. It provides dependable means for communication;
ii. It enhances work efficiency – ICT is used in creating
new collaborative models to increase the efficiency of
workers;
iii. It reduces cost of production – reduces information and
transaction costs;
iv. It increases output/service delivery;
v. It enables resource sharing;
vi. It enhances teaching/learning process;
vii. It helps in proper security management;
viii. It is used in governance/administration;
ix. It improves access to basic services;
x. It can be used for election purposes – a term referred to
as e-election;
xi. It devices are used for financial recordkeeping and
management;
xii. It gadgets are used for medical diagnosis;
5
xiii. It is used as training aid;
xiv. It offers immediate connectivity–voice, data, visual–
improving efficiency, transparency and accuracy;
xv. It substitutes for other more expensive means of
communication and transaction, such as physical travel;
xvi. It increases choice in the marketplace and provide access
to other available goods and services;
xvii. It widens the geographic scope of potential markets; and
xviii. It channels knowledge and information of all kinds.
Problems Associated with ICT
There are many problems associated with the use of ICT, some of
which include:
i. Data stealing: User’s privacy can be intruded.
ii. Virus attacks: In computer-based ICT, users could loss
data and/or information through the invasion of computer
viruses.
iii. Lack of human resources: Many staff including the
administrators could not use the ICT tools for better
office management, and this is due to lack of training.
This was why Idowu and Esere (2013) stated that, an
average Nigerian worker is not computer literate, which
is disappointing in this modern digital era.
iv. Cybercrime: This is a crime where a computer is the
object of the crime or is used as a tool to commit an
offense. A cybercrime is the kind of crime committed
with the aid of a computer/ICT device. A cybercriminal
may use a device to access a user’s personal information,
confidential business information, government
information, or disable a device. This is usually done
through diverse hacking and cracking methods. It is also
a cybercrime to sell or elicit the above information
online.
6
v. Unemployment: The ICT advancement has increased
job displacement, thereby encouraging unemployment.
vi. Software problems: Software is meant to run under
certain conditions and appropriately compatible computer
programs with specified requirements. Once these conditions
are not met, there is bound to be issues in the operation.
vii. Hardware problems: ICT services are not available to
some people due to hardware promiscuity. Most hardware
devices (like printers, scanners, etc) may also develop
installation faults, etc.
viii. Cost of internet data and electronic services: One of
the challenges of deploying ICT in Nigerian schools and
workplace is the high cost of internet data and electronic
services, which is basically the determinant of ICT usage
and value. Hence, the services are inaccessible as most
organizations cannot afford it.
ix. Inconsistency in electricity supply: In Nigeria, the
major challenge to the growth and development of most
industries is poor electricity supply. This is a huge
setback to the progress of Nigeria’s economy, as it is
difficult to boast of one full day without electricity
interruption, not to talk of a week or one month.
7
EXERCISE I
8
CHAPTER TWO
Definition of Computer
9
in these sophisticated areas, but also in our daily lives, computers
have become indispensable. They are present everywhere, in all
the devices that we use daily like cars, games, washing machines,
microwaves, etc. and in day-to-day computations like banking,
reservations, electronic mails, internet and many more.
Speakers
10
The computer can be used to type documents, send and receive
electronic mails (e-mails), and surf the Internet. You can also use
it to manipulate data on spreadsheets and accounting packages,
handle automated databases, make presentations, play games, and
many more.
Whether realized or not, computers play an important role in our
lives today. When we deposit and withdraw cash from an ATM
(Automatic Teller Machine), scan groceries at the store, or use a
calculator, we are said to be using a type of computer. When
Medical personnel (radiographers, laboratory scientists, etc.)
engage the use of machinery to perform their job such as medical
diagnosis, they are said to be using some type of computers.
Reservation of tickets in air lines and railways, payment of
telephone and electricity bills, business data processing, weather
forecasting, etc. are some of the areas where computer has
become extremely useful. But as you will observe later, it does
much more than that. It can be compared to a magic box, which
serves different purpose to different people.
Computer Nomenclature
The word computer is coined from the word compute meaning to
calculate, analyze, evaluate, determine, manipulate, process, and
work out figures. This nomenclature is based on its fundamental
functions. Computer is also simply called PC (meaning Personal
Computer), laptop, processor, notebook, or machine.
The word computer is interchangeably used with the term
computer system or simply system. The computer system refers to
the collective name for a PC and its associated accessories; hence
it is sometimes simply referred to as a system.
12
5150, which was introduced in 1981, also used all four functions
(Claerr, 2018).
Input devices on a modern computer include the keyboard, mouse,
etc. The central processing unit (CPU) processes the data. Devices
such as Read-Only Memory (ROM), the hard drive, Compact
Disks (CDs) and Digital Versatile Disks (DVDs) can store the
data. Output devices include the monitor, speakers and printer.
When you input information into your computer with the mouse
or keyboard, you are sending a signal to the CPU. The CPU has a
logic unit that can do basic arithmetic. The control unit directs the
computer to execute programs that have been stored in the
memory. The speed by which a computer executes programs is
measured in millions of instructions per second (MIPS); the
processor’s speed is measured in gigahertz (GHz). When the data
has been processed, it is output in a human-readable form through
the monitor and speakers. It can also be stored again for later
processing. Storage media can be used to both input and output
data.
The four basic functions of a computer make it possible for us to
perform many tasks that were previously impossible. Using a
computer, you can balance your checkbook, purchase
merchandise, send and receive messages, do research, process
your photographs, create music and store crucial data, among
other things. Computers are easily networked, they can help
people from remote parts of the world communicate more quickly
and easily than with traditional methods.
Characteristics of Computers
The following are the aspects/attributes of the computer:
1. Speed (of Processing): Today's computer processes data
with a very high-level speed as it uses the very large-scale
integrated circuit (VLSIC) or microprocessor instead of the
13
earliest vacuum tubes/amniotic valves. In general, no
human being can compete to solving the complex
computation, faster than today’s computer.
2. Accuracy: Since Computer is programmed, whatever input
we give, it gives result with accuracy. In other words, the
computer system delivers job without error. Most errors
discovered with the computer could be attributed to human
fault.
3. Reliability: The output generated by the computer is very
reliable, but it is reliable only when the data, which is
passing as input to the computer and the program, which
gives instructions are correct and reliable.
4. Timeliness: As the computer of nowadays works with
needed speed and accuracy, it also delivers job in time. In
other words, the computer system gives result of
processing at the appropriate time.
5. Efficiency: The computer has certain degree of robustness
with effectiveness and high reliability.
6. Versatility: Computers are very versatile machines. In
other words, we can use computer to perform completely
different type of work at the same time. Computers are
capable of performing almost any task, provided the task
can be reduced to a series of logical steps.
7. Storage/Volume: Computer can store mass storage of data
with appropriate format. It has a provision to store large
volumes of data in the small storage devices, which have
capacity to store huge amounts of data and makes retrieval
of data an easy task.
8. Automation: Once the instructions are fed into the
computer, it works automatically without any human
intervention until the completion of execution of program
or meets logical instructions to terminate the job. This is
possible with the aid of the software.
14
9. No Intelligent Quotient: The computers of today do not
have natural intelligence. It rather depends on human
intelligence and instructions; in other words, it uses
Artificial Intelligence (AI). That is to also say that, the
computer does not work without instruction(s).
10. Power of Remembering: It can remember data for us.
This is, in some way, different from storage as the
computer does not necessarily store what it remembers.
11. No Emotions/feelings: Computer does not have emotions,
or feeling for its user.
The fact that the computer user may have erroneously
entered certain value(s) for processing does not mean that
the computer system will certainly go ahead to process the
supposed right values, because the computers do not have
feelings that the user had made such mistakes. The
computer has no such human sensation, as it cannot act on
data that has not been inputted. This is the reason for
Garbage-In Garbage-Out (GIGO) functionality of the
computer. GIGO, in its real essence implies that computer
would always produce the result based on the data input.
That is to say that, if a user enters a wrong value of 232
instead of 323 for instance, the computer system processes
the result based on the data value it receives and not the
other way round. However, the computer could warn/alert
the user on commonly discovered syntax/semantic errors
during inputting or processing (as the case may be).
12. Diligence: Computer can work for hours without any break
and/or error and is free from tiredness, lack of
concentration, fatigue, etc. It can work for hours without
creating any error. If millions of calculations are to be
performed, a computer will perform every calculation with
the same accuracy. Due to this capability, it overpowers
human being in routine type of work.
15
EXERCISE II
16
CHAPTER THREE
CLASSIFICATION OF COMPUTERS
Amplifier Speedometer
20
Computers are classified according to their data processing speed,
amount of data that they can hold and price. Generally, a
computer with high processing speed and large internal storage is
called a big computer. Due to rapidly improving technology,
we are always confused among the categories of computers.
However, when classified according to size and capacity,
depending upon their speed and memory size, the following
types of computers can be identified: microcomputers,
minicomputers, mainframe computers, and supercomputers.
1. Microcomputer/Personal Computer: Microcomputers are
the smallest, least expensive and the most used types of
computers. They have a small memory, less processing power, are
physically smaller, and permit fewer peripherals compared to
super and mainframe computers. They are more commonly
known as personal computers (PCs). The term was initially used
to refer to IBM compatible computers. They became popular in
the 70s and 80s, at the dawn of the microprocessor chips. These
chips meant that a machine used by one individual was now
feasible. The advent of PCs meant cheaper alternatives to more
expensive and centralized systems. They were more affordable for
office use and created cheaper networking environments. By the
mid-1990s, they became the de facto computer of choice for
offices and homes. The last 2 decades have witnessed the
proliferation of even smaller systems.
This signaled the start of the mobile age, which continued to go
with the trend of smaller devices as the new century progressed.
This ultimately gave birth to wearable computers and gadgets.The
operating system used in personal computers varies, but the
common ones include:
i. Windows
ii. Mac OS X
iii. Linux
21
iv. IOS
v. Android
vi. Macintosh
Categories of Personal Computers: The categories of personal
computers include:
i. Desktop Computers
ii. Mobile Computers
iii. Wearable Computers
i. Desktop Computers
Many people use desktop computers or desktops as they are often
referred to, at work, home, school, or the library. They can be
small, medium, or large in style, and usually sit on a desk. The
term desktop actually refers to the casing, or the tower. Once you
add a monitor, mouse, and a keyboard, you have what is typically
known as a desktop computer.
Most desktop computers are easy to upgrade and expand, or add
new parts. In addition to expandability, another benefit of desktop
computers is the cost. If you compare a desktop computer with
128MB of RAM and a 2GB hard drive to a laptop with the same
features, you will most likely find that the desktop computer is
priced lower. A reason for this may be simply due to the
portability and flexibility of use of the laptop.
The term desktop computer originated when the computer case
was wide and flat, and was designed specifically to fit on your
desktop with the monitor on top. Desktop computers are made up
of separate components such as:
The System Unit; a rectangular case that contains important
parts like the motherboard, microprocessor, memory
modules, disk drive, and optical drive.
22
The monitor.
A mouse.
A keyboard.
23
Nettop Systems: Nettop, which are sometimes called mini PCs,
are small and cheap system units. They use less power and
perform less processing.
24
An SBC can easily be confused with an embedded system
because of its size but is not, because it permits general purpose
functionalities synonymous with microcomputers.
Raspberry Pi3, Arduino and BeagleBone Blue are popular
examples of SBC.
25
the monitor, PS/2 or USB ports for keyboard and mouse, and
audio input/output ports.
26
A quick glance at the size of a laptop and you might guess that it
would be difficult to expand or upgrade. While the desktop
computer case is relatively easy to open and access internal
components, the small laptop case makes this more difficult in
comparison; however, the primary benefit of a laptop computer is
its small size and easy portability.
Laptops are lightweight mobile PCs with a thin screen. They were
initially called notebook computers because of their small size.
They operate on batteries. Unlike desktops, these systems
combine the microprocessor, screen, and keyboard in a single
case. The screen folds down onto the keyboard when not in use.
Two popular types of personal computers are the IBM compatible
and Macintosh computers. The first personal computer was
produced by IBM in 1981 and was called the IBM PC. In 1984,
Apple Computer introduced the Macintosh, or Mac, and it became
the first widely sold personal computer. Although both IBM and
Apple computers are personal computers, the term PC came to
refer to IBM or IBM-compatible personal computers.
Fig.3.11: An iPad
29
Fig.3.12:An iPhone 6
Most smartphones today use an operating system such as IOS and
Android. They often have the ability to add applications. This is in
contrast to regular cellular phones which only support sandboxed
applications like Java games. In terms of features, smartphones
support full email capabilities as well as multiple functions to
serve as a complete personal organizer.
Depending on the manufacturer, other functions might include
additional interfaces such as miniature QWERTY keyboards,
touch screens, built-in cameras, contact management, built-in
navigation software, ability to read office documents in PDF and
Word file formats, media software for playing music, browsing
photos, and viewing video clips.
Personal Digital Assistants (PDAs): Personal digital assistants
(PDAs), also called handheld computers, pocket PCs, or palm top
computers, are battery-powered devices that are small enough to
carry almost anywhere.
While weaker to larger systems, these are useful for scheduling
appointments, storing addresses and phone numbers, and playing
games. Some have more advanced capabilities, such as making
telephone calls or accessing the Internet.
PDAs seem to have been overtaken by tablets and smartphones,
almost rendering them obsolete.
30
iii. Wearable Gadgets
Like the term suggests, wearable computers, or simply wearables,
are miniature devices that are designed to be worn or attached
onto your body. Wearables are designed to function as smart
devices similar to smartphones. They typically provide specific
functions like health monitoring.
Whereas general purpose wearables offer a fuller computing
experience that includes reading emails, the lesser systems fit as
embedded devices capable of minimal functions. Examples of
these devices include smartwatches, smartglasses, smartclothes,
smartshoes.
Smartwatches: These became popular around 2013, when
Samsung launched Gear, a wristwatch fitted with sensors to
communicate directly with a smartphone.
Dubbed the smartphone and phablet companion, a smartwatch
gives features like internet connectivity and text messaging
among others.It also provides communication between the user
and other devices.
The leading tech companies in the world are all scrambling for
opportunities in manufacturing smartwatches. Samsung launched
Gear in 2013 and Apple has the Apple Watch.
Head Mounted Displays: Another wearable being developed is
the heads up display unit (HUD) or head mounted display unit
(HMD).This device is meant to be worn or attached to the head
and uses a transparent glass display that interfaces with the human
eye. It does not interfere with the user’s sight.
Earlier HUDs were used for military purposes. They went from
using a cathode ray tube to a liquid crystal display. The
technology eventually embraced laser-based projection for images
and motion pictures.
31
A notableexample isthe Google Glass, which permits a number of
functions like voice communication and reading tweets.
Smartware: Smartshoes and smartclothes are intended for health-
related functions like heart rate and waveform measurement.
These devices are intended to encourage the wearer to have an
active lifestyle.
2. Minicomputer
Minicomputers are general-purpose devices without the
monumental expenses associated with a larger system. Their
processing power is below that of mainframe systems but above
the capabilities of personal computers.
32
Fig.3.14: MicroVAX II Clone Minicomputer
Minicomputers are also known as mid-sized or mid-range
computers.These became popular in the late 1960s but have
become almost extinct because of the popularity of personal
computers. The latter can now perform most of the tasks reserved
for minis. The first minicomputer was unveiled in 1967 by Digital
Equipment Corporation.
They became popular for control related functions as opposed to
computing prowess. Over the years, their usage was limited to
dedicated control assignments in mid-range organizations.
Minicomputers were intended for a number of activities listed
below:
Switchboard control.
Dedicated applications for graphics and computer design.
Time-sharing, to allow multiple users to interact concurrently
on a single system.
Control and monitoring of manufacturing activities.
Monitoring and control of laboratory equipment.
Texas Instrument TI-990, K-202 and MicroVAX II are examples
of minicomputers.
33
3. Mainframe
Mainframe computers are large sized computer types. They are
equally powerful but fall short in terms of the computation ability
in supercomputers. They are like big file servers, enabling
multiple users from nearby and remote locations to access
resources at the same time. Also known as big iron, these systems
can handle massive amounts of data going in and out
simultaneously. This makes them popular with businesses.
They are also resilient as they are capable of operating for over 10
years without failing. Users access the mainframe using terminals
or personal computers. This can happen within the same building
or via wide area network (WAN).
Most of these systems run the z/OS (operating system) on 64bit
architecture. IBM System z9 mainframe is a large size computer
type.
34
Uses of Mainframes
They are used in large organizations where thousands of clients
have to access data simultaneously. For examples:
Performing ATM cash withdrawals and deposits. During the
process, communication between the mainframe and remote
computer will help accomplish the financial transactions at
hand.
Business transactions that use credit cards or pre-paid cards.
Online electronic transactions.
Cloud storage.
Handling of patient records in major hospitals.
Making reservations and travel schedules for airline
companies.
Manipulation and tallying of data for census and electoral
purposes.
System z9, Fujitsu-ICL VME and Hitachi’s Z800 are examples of
Mainframes.
4. Supercomputer
According to Amuno (2018), supercomputers are arguably the
most powerful in terms of speed and accuracy. They are types of
computers used in solving complex mathematical computations.
They are capable of executing trillions of instructions per second,
which is calculated in floating point operations per second
(FLOPS).
The typical personal computer used at home and the office is only
capable of calculating millions of instructions per second (MIPS).
Supercomputers can go even faster with the rate of petaFLOPS
(or PFLOPS). This could bring up their processing numbers up to
the quadrillion.
Supercomputers were made popular in the 1960s by Seymore
Cray. They soon became the choice for complex projects. They
35
have evolved from the grid to cluster systems of massively
parallel computing. Cluster system computing means that
machines use multiple processors in one system, rather than
arrays of separate computers in a grid.
The operating systems that run in supercomputers vary depending
on the manufacturer but are generally based on the Linux Kernel.
A few popular ones include;
CNK OS used in Blue Gene from IBM
Cray Linux Environment used in Titan
Sunway Raise OS in Sunway TaihuLight
These computers are the largest in terms of size. They can occupy
anything from a few feet to hundreds of feet. They are the most
expensive type of computer.
Table 3.1 shows the list of top supercomputers since the year
2008, as in Amuno (2018).
36
Table 3.1: Top Supercomputers between 2008 and 2017
Name of Speed in
Year Supercomputer Manufacturer
PFLOPS
2008 Roadrunner IBM - USA 1.105
2009 Jaguar Cray - USA 1.759
2010 Tianhe - 1A NUDT - China 2.566
2011 K Computer Fugitsu - Japan 10.51
2012 Titan Cray - USA 17.59
2013 Tianhe - 2 NUDT - China 33.86
2014 Tianhe - 2 NUDT - China 33.86
2015 Tianhe - 2 NUDT - China 33.86
2016 Sunway TaihuLight NSC -China 93.01
2017 Sunway TaihuLight NSC -China 93.01
Uses of Supercomputers
Because of their superiority, supercomputers are not intended for
your everyday tasks. They handle exhaustive scientific
applications that require complex and real-time processing.
In the field of science, researchers use these machines to
compute and model properties of biological compounds like
protein and human blood. They are also used to interpret new
diseases and strains, and predict illness behavior and
treatment.
37
The military use supercomputers to test new aircraft, tanks,
and a host of weaponry and camouflage. They also use them
to understand the effects they will have on soldiers and wars.
These machines are also used to help encrypt and decrypt
sensitive data.
In entertainment, supercomputers are used to help make a
flawless online gaming experience. Games like World
of Warcraft demand intense processing. When thousands of
gamers around the world are playing, supercomputers help
stabilize the game performance.
Meteorologists use them to simulate weather behavior. They
can also be used to predict earthquakes.
Scientists use them to simulate and test the effects of nuclear
weapon detonation.
Scientists also use them to simulate the events of the Big
Bang and other space related projects.
Hollywood uses supercomputers to create realistic
animations.
The famous supercomputers Deep Blue and Watson defeated
chess Grandmaster Gary Kasparov and quiz expert Ken
Jennings respectively.
38
COMPUTER
39
2. Special Purpose Computers
Special purpose computers are designed, made and used for a
specific purpose or application. They are also called dedicated
system. These are usually used for those purposes which are
critical and need great accuracy and response like Satellite
launching, weather forecasting etc. Examples of special purpose
computer are; the server, such as the radar system used in airport
towers, which is designed for tracking and mapping the paths of
aircrafts and other flying devices, and the embedded system.
Other examples include; computer game devices used in playing
games only, dedicated word processor, traffic control system,
computerized electronic devices such as calculators, pager and fax
machine.
Servers: These are computers designed to provide services to
client machines in a computer network. They have larger storage
capacities and powerful processors. Running on them are
programs that serve client requests and allocate resources like
memory and time to client machines. Usually, they are very large
in size, as they have large processors and many hard drives. They
are designed to be fail-safe and resistant to crash.
These are types of computers used to provide resources, services,
and functionality to client computers in a server-client network
model. Resources provided are based on the functions of a
particular server, which may fall under these categories:
File server
Database server
Print server
FTP servers
Application server
Web server
Server sizes depend on purpose and tasks in the network. Of
course, bigger and more multitasking installations will require
multiple system and storage installation. Servers are optimized to
40
run 24 hours and are capable of hot swapping of storage and other
hardware without having to shut down the system.
42
Fig.3.18: The first generation computer
Features of first generation computers: The main features of
first generation computers are:
i. Vacuum tube technology
ii. Supported Machine language only
iii. Very costly
iv. Generate lot of heat
v. Slow Input/Output device
vi. Huge size
vii. Need of A.C.
viii. Non portable
ix. Consumed lot of electricity
Examples of first generation computers: Some computers of
this generation were:
i. ENIAC
ii. EDVAC
iii. UNIVAC
iv. IBM-701
v. IBM-650
43
2. Second Generation Computers (1950s – 1960s;
Transistors)
Around 1955 a device called Transistor replaced the bulky electric
tubes (vacuum tubes) in the first generation computer. Transistors
are smaller than the electric tubes and have higher operating
speed. They have no filament and require no heating.
Manufacturing cost was also very low. Thus the size of the
computer got reduced considerably. One transistor replaced the
equivalent of 40 vacuum tubes. Allowing computers to become
smaller, faster, cheaper, energy-efficient and more reliable, but it
still generated a great deal of heat that can damage the computer;
thus, required much ventilation.
Second-generation computers moved from cryptic binary machine
language to symbolic, or assembly, languages, which allowed
programmers to specify instructions in words and mnemonics.
Second-generation computers still relied on punched cards for
input and printouts for output. These were also the first computers
that stored their instructions in their memory, which moved from
a magnetic drum to magnetic core technology.
This generation using transistor was cheaper, consumed less
power, more compact in size, more reliable and faster than the
first generation machines made of vacuum tubes. In this
generation, magnetic cores were used as primary memory and
magnetic tape and magnetic disks as secondary storage devices. In
this generation, assembly language and high level programming
language like FORTRAN, COBOL were used. There were batch
processing and multiprogramming operating systems used.
44
Fig.3.19: The second generation computer
46
Features of third generation computers: The main features of
third generation are:
i. IC used
ii. More reliable
iii. Smaller
iv. Generate less heat
v. Faster
vi. Lesser maintenance
vii. Still costly
viii. A.C needed
ix. Consumed lesser electricity
x. Support high level language
Examples of third generation computers: Computers of this
generation include:
i. IBM-360 series,
ii. Honeywell-6000 series,
iii. PDP (Personal Data Processor),
iv. IBM-370/168, and
v. TDC-316.
48
Examples of fourth generation computers: Some computers of
this generation were:
i. DEC 10
ii. STAR 1000
iii. PDP 11
iv. CRAY-1(Super Computer)
v. CRAY-X-MP(Super Computer)
49
Fig.3.22: The fifth generation computer
50
EXERCISE III
51
CHAPTER FOUR
53
Fig 4.3: Computer processing unit
The Output Units/Devices
The computer output devices are the components responsible for
producing or displaying the result of processed data (information).
There are softcopy and hardcopy outputs. The softcopy output is
displayed through the display device (computer screen or
monitor/visual display unit), and the hardcopy output is printed
through the printing device (the printer).
54
Fig 4.5: Computer input vs. output devices
The Storage Units/Devices
Data are said to be raw facts. The singular form of data is referred
to as datum. Information refers to the processed or refined data.
Proper collection of the data is called information. Data and
information can be stored and retrieved, and are transferrable.
Hence, storage devices are used to store/save data or information
for later reference. They also enable data to be taken out of the
main computer and to be used in another. There are internal and
external storage units. The internal storage units include the RAM
(Random Access Memory) and the ROM (Read-Only Memory).
Information stored in the RAM could be updated unlike those
stored in the ROM. This is simply because the ROM is an
unalterable storage component in the computer. The external
storage devices include the floppy disk, compact disk (CD), flash
disk drive, external hard disk drive, magnetic disk, magnetic tape,
etc.
55
Fig 4.6: Computer storage devices
Factors to be Considered when Storing Data
1. Type of data to be stored: Different types of data can be
store in several ways.
2. Type of storage to be used: The type of data to be stored
determines the type of storage to be used.
3. Size/volume: The size of data to be store as well as the
volume of the storage device need to be considered. The size
of data to be stored must not be greater than that of the
intended storage unit. Data size is measured in bits (b), byte
(B), Kilobyte (KB), Megabyte (MB), Gigabyte (GB),
Terabyte (TB), etc.
4. Data integrity: Stored/archived data need to exhibit
reasonable level of reliability.
5. Regular update of data: Stored data need to be up-to-date;
thus should be updated from time to time, in order to avoid
data loss and insecurity.
56
6. Validation of data: Data authentication or verification is
required.
7. Data encryption/security of data: The user needs to
consider security of the data to be saved. Insecurity of the data
could cause data loss. Data encryption is a strategy for
protecting data from getting loss.
8. Access control: There should be data access control on the
saved data. Not everyone should be able to access every data.
Data should be protected from unauthorized users.
9. Regular anti-virus update: It is expected that updated
antivirus software is installed in every computer system for
protection. Overtime, the software could be outdated; there is
therefore the need to perform regular update on them.
10. Data backup: Most times, the essence of external storage of
data is data-backup.
11. Data recoverability: The ability to recover the saved data is a
point of consideration when saving data.
12. Login/password: Method of access to the stored data should
be considered as such data could be protected.
13. Timing: Record of date and time of storage and updates is
essential.
The Computer Software Component
Software is any set of instructions (codes) that tells the hardware
what to do. It is what guides the hardware and tells it how to
accomplish each task. Software refers to encoded computer
instructions or commands (usually modifiable, unless stored on
some form of unalterable memory such as the ROM earlier
discussed), that make the computer behave the way it does.
Types of Software
The computer software component is categorized into two,
namely; System software and Application software.
1. System Software: Certain software are required for the
correct operation of the computer system. The software
57
responsible for sequential and orderly execution of tasks is called
the system software. They include the operating system, system
utilities and libraries. They usually carryout operation, control and
utility services and functions in the entire computer system. The
operating system is simply that which drives the computer system
(this is explicated in a later chapter).
2. Application Software: This type of software is installed in the
computer simply for the purpose for which the user wishes to use
a particular computer system. If the user wishes to use a PC for
internet services, for instance, there is need for installation of
certain software applications (such as the web browsers, network
configuration software, etc) in the computer, which enables the
user to operate it for his choice service(s). Perhaps, the user
chooses to use a PC for graphics design, he needs to install
graphics design applications (such as CorelDraw and/or other
graphics design software) or for word processing, he could install
applications like MS Word, etc. For spreadsheet, he could install
MS Excel and so on.
For more details on the different categories of application
software (particularly, the MS Word and Excel), see relevant
chapters of this book.
58
There are two main categories of peopleware; computer
professionals and the non-professionals (computer end-users).
1. Computer Professionals: Computer professionals are people
who have education and experience in technical aspect of making
and using computer system. The computer professionals build the
computer hardware and software. They include:
i. Computer Systems Analyst
ii. The System Architect
iii. Programmer/Software Engineer
iv. Testing Engineer
v. Computer Design Engineer
vi. Database Designer and Administrator
vii. Website Designer
viii. Hardware Engineer
ix. Production Engineer
x. Quality Control Engineer
59
Fig.4.7: Relationship among computer components
The software alone cannot perform any function like calculation
or logical comparison. Software cannot function alone without the
hardware; it needs the hardware as its host to function. Hence,
both are dependent on each other. In other words, it is the
hardware component that hosts the software component.
Hardware and software cannot function very well without the
intervention of the user. Fig.4.7 shows the inter-relationship
among the computer components.
60
EXERCISE IV
61
CHAPTER FIVE
Fig.5.1: A Desktop PC
The basic components (parts) of a desktop computer or things
required for a user to interact with the computer include:
62
Computer case: The computer case is the metal and plastic box
that contains the main components of the computer. It houses the
motherboard, central processing unit (CPU), the power supply,
and more. Computer cases come in different shapes and sizes. A
desktop case lies flat on a desk, and the monitor usually sits on
top of it. A tower case is tall and sits next to the monitor or on the
floor. The front of the case usually has an on/off switch and two
or more drives.
Most of the personal computers you can purchase today include
tower cases, rather than desktop cases; however, some computers
are being made with all of the internal components built into the
monitor, which completely eliminates the tower.
Monitor: The monitor works with a video card, located inside the
computer case, to display images and text on the screen. The two
main types are Cathode Ray Tube (CRT) and Liquid Crystal
Display (LCD) monitors. The CRT monitor is big, like a tube
television, and takes up a lot of desk space; however, it is the least
expensive monitor, while the LCD monitor is thin and saves
energy, but costs more. Over the years, fewer CRT monitors are
seen as LCD monitors become the standard.
Monitor has an ON/OFF button and control buttons that allow a
user to change the monitor’s display. Control buttons are either
visible or located behind a small panel. Additionally, some
monitors have built-in speakers.
Power Cord: The power cord is the link between the power outlet
and the power supply unit in the computer casing. If the power
cord is not plugged in, the computer will not power on. It is a
good idea to keep the power cord plugged into an Uninterruptable
Power Supply (UPS), which serves as a surge protector with its
own temporary power conservative capability.
Keyboard: The keyboard is a piece of hardware that resembles a
typewriter keyboard. It is one of the primary ways we
63
communicate with the computer by inputting data. There are
many different types of computer keyboard such as wired,
wireless, ergonomic, multimedia, and more. Although, there may
be differences in the location of some keys or features, keyboards
are very similar and allow you to accomplish basically the same
tasks.
64
complete a specific task within certain programs. For example,
F1 opens Help and F3 opens Search in Microsoft Office.
The Print Screen, Scroll Lock and Pause/Break keys are at
the far right end of the keyboard. The Print Screen key takes a
“picture” of your screen that you can edit or save using a
graphics program while the Scroll Lock key is used together
with Ctrl key to stop a program temporarily and the
Pause/Break keys are also used to halt a program temporarily.
The Enter key carries out commands. For example, while on
the Internet, you can type in a website address, called a URL,
and press Enter to go to the site. It also acts like a carriage
return on a typewriter, moving the cursor to the start of a new
line.
The Control (Ctrl), Alternate (Alt), and Shift keys are
designed to work with other keys. For example, if you press
Ctrl + S at the same time, you can save a file, while Alt + F
pulls down the file menu and the Shift + any alphabetic key
cause the uppercase symbol on each key pressed on the
keyboard to be printed on the screen.
The Backspace key erases a character to the left of
the cursor each time it is pressed.
To the right of the regular keys is the cursor control pad. At
the bottom are four arrow keys. Pressing any one of these
keys moves the cursor in the direction of the arrow.
Depending on the keyboard you are using, there are five to six
keys above the arrows including:
o The Delete key erases the character to the right the cursor.
o The Insert key switches between the insert mode and
overtype mode. The insert mode is the normal mode for
word processing.
65
o The Home key moves the cursor to the left or beginning of
the current line.
o End moves the cursor to the right end of the current line.
o Page Up and Page down take you to the top or bottom of
the screen.
The Number pad, at the far right end of the keyboard,
resembles a calculator keypad. It produces numbers from 0 – 9
and basic arithmetic symbols. It is used to enter numeric data
into the computer for manipulation (calculation).
Mouse: The mouse is a peripheral that is known as a pointing
device. The mouse has two top buttons; that is, the left (primary)
and the right (secondary) buttons, and a light or ball beneath. It
lets the user point to objects on the screen, click on them, and
move them. Previously, it was considered an optional device, but
now all desktop computers will come with a mouse.
There are two main types of mouse– optical and mechanical. The
optical mouse uses an electronic eye (Laser) to detect movement.
The mechanical mouse uses a rolling ball to detect movement; it
is less expensive, so many computers come with a mechanical
mouse.
66
Left-handed computer users sometimes use their right hand to
maneuver the mouse. However, if you’re left-handed and want to
use your left hand, the mouse buttons can be switched by setting.
68
(Compact Disk ReWritable) and CD-R (Compact Disk-
Recordable) discs.
3. DVD-ROM (Digital Versatile Disc Read-Only Memory)
Drive: A DVD-ROM drive, also known as an optical drive,
reads DVD discs, all types of CDs, and can display movies from
digital video discs. DVDs can hold more data than a CD, so they
are a good storage option. A DVD burner is a device that can be
used in conjunction with a DVD-ROM and allows you to copy
information onto DVD discs. It is considered a type of storage. In
many of the computers you can purchase today, the CD and
DVD-ROM and/or burners are combined.
4. USB Port: The Universal Serial Port typically appears on
the back of the computer case, but can sometimes be found on the
front of the case, or hidden under a panel on the front of the case.
5. Audio in/Audio out: Every computer has a bank of audio
ports where you can connect various devices, including speakers,
microphones, headsets, and more.
Back of Computer Case
At the back of the computer case are connection ports that are
made to fit specific devices. The arrangement of these varies from
computer to computer. Some of the ports are color coded to
match a color on the device, which will help you determine which
port is used with a particular device.
69
Fig.5.4: Back of a computer case
1. PS/2 Port: These ports are called PS/2 ports and are used
for the mouse and keyboard. Many people refer to them as the
mouse port or the keyboard port.
2. Ethernet Port: This port looks a lot like the modem or
telephone port but it is actually wider. You can use this port for
networking and also connecting to the Internet. Ethernet
3. Audio in/Audio out: Every computer has a bank of audio
ports where you can connect various devices, including speakers,
microphones, headsets, and more audio.
4. VGA port: Your monitor can be connected to this port.
5. USB Port: The Universal Serial Bus port is one of the
newest ports, but is also one of the most useful. These USB ports
let you attach a variety of devices such as mice, printers,
keyboards, web cameras, USB/flash drives, and digital cameras to
your computer quickly. Almost every peripheral made comes in a
USB version, and installing the devices using USB ports is much
easier than connecting devices using parallel and serial ports.
70
This is primarily because USB ports do not require you to reboot
your computer before you can use the new device.
6. Parallel Port: The parallel port is one of the two original
ports on the first personal computer. It is commonly known as the
printer port since this port is used to connect your printer to your
computer; however, with the rise in use of the USB ports, you can
expect to see a decrease in the use of this port. Currently, a large
number of parallel port printers are still manufactured and used on
older computers that don’t have USB support.
7. Serial Port: Serial ports can be used to plug in devices
such as dial-up modems and other devices. On recent computers,
the serial port has been replaced by the USB port. This is due to
the fact that most peripherals use the USB drive.
8. Expansion Slots: These empty slots are where expansion
cards are added to computers. For example, if your computer did
not come with a video card, you could purchase one and insert it
here.
9. FireWire Port: FireWire is actually the Apple brand name
for the IEEE 1394 port, and it is commonly referred to as the
FireWire port. It is the standard port used with digital video
cameras and high-resolution scanners. FireWire replaced the
parallel small computer system interface (SCSI), but it is not on
every computer; however, you can buy an adapter card to add
FireWire ports to your computer. The labeled image does not
include a FireWire port.
71
increasing in popularity. This peripheral is connected to the
computer via USB port or parallel port.
Scanners: A scanner allows you to copy an image or
document and save it in electronic form onto your computer. A
scanner can be handheld, flatbed or an all-in-one scanner
which combines a scanner, printer and copier into one product.
A scanner is connected to the computer via a parallel port, a
USB port, or a SCSI connection. No matter which connection
is used, the images are stored on your PC’s hard drive in a
digital format.
Speakers/Headphones: Speakers and headphones are output
devices; which means that they are devices that communicate
information from the computer to the user. They allow you to
hear sound and music. Both speakers and headphones connect
to a computer via audio in/out. However, some computers are
designed with speakers built into the monitor.
Microphones: A microphone is a type of input device, or a
device that receives information from a user. You connect the
microphone to the computer and use the computer to record
sound or to communicate with another computer user via the
Internet. Many computers come with built-in microphones.
Web Cameras: Web cameras, or web cams, are devices that
connect to a computer via USB port and display a video image
of whatever it is recording. This video image can be
transmitted over the Internet, allowing a user in another
location the ability to see the video in real-time. Web cameras
are used often in business for video conferences, and are also a
great tool for families to use to stay connected from different
parts of the world.
Joystick or Game Controller: A joystick is a lever used
while playing a computer game. It could be connected to the
computer through PS/2 port or USB port.
72
Digital Cameras: A digital camera lets you capture a picture
in digital (computer-readable) form. You can transfer that
image directly from the camera to the computer. When you
use a digital camera, you can also preview your pictures before
printing them. If you do not like what you see, you can edit or
delete them. Today’s digital camera can be connected to the
computer via USB port.
Personal Digital Assistant (PDA): A PDA is a handheld
computer that can have a variety of features including a
calendar, Internet access, video recording, word processing,
email access, phone, media player, and more. Most PDAs can
be synchronized with a PC to allow up-to-date contact
information stored on software such as Microsoft Outlook,
RSS feeds, or other web updates. This device can also be
connected to the computer via USB port.
MP3 Players: An MP3 player is a portable device that
stores, organizes, and plays audio files. The player can read
files that are recorded from a CD using a computer, or
downloaded from various sites via the Internet. It can also be
connected to the computer via USB port.
73
EXERCISE V
74
CHAPTER SIX
75
Types of Storage
There are basically two main types of storage. They are:
1. Primary storage: this is also referred to as;
i. Primary memory/storage;
ii. Main storage;
iii. Main memory;
iv. Internal storage;
v. Internal memory; and
vi. Memory.
2. Secondary storage: this is also referred to as;
i. Secondary memory/storage;
ii. Auxiliary storage;
iii. Auxiliary memory;
iv. External storage;
v. External memory; and
vi. Mass storage.
76
The Primary Storage
The primary storage also known as the main memory is directly
connected to the central processing unit via a memory bus. It is
the only memory directly accessible to the CPU. The CPU
continuously reads instructions stored there and executes them as
required.
Types of Primary Storage
The different types of primary storage are;
i. Random Access Memory (RAM)
ii. Read-Only Memory
iii. Register
iv. Cache Memory
77
Read-Only Memory (ROM): The ROM is a special type of
memory which can only be read, that is, it cannot be modified.
The ROM is non-volatile meaning that its contents (software and
information) are not lost when computer power is switched off.
ROM is used for storing program instructions or software that are
not subjected to change. It typically contains manufacturer’s
instructions which cannot be overwritten. Among other things,
ROM also stores an initial program called the “bootstrap loader”
whose function is to start the computer software operating, once
the power is turned on. The software governing efficient computer
system functioning is located here; therefore, ROM does not lose
data when the system is turned off because this memory is not
volatile.
The ROM chip that contains permanently written data information
and software is called a firmware.
However, there are some special types of ROM chips that are
programmable, meaning that they can be written onto. These
Read-Only Memories can be manufacturer-programmed or user-
programmed. They include the following:
(i) PROM (Programmable Read-Only Memory): A PROM is a
memory chip on which you can store a program. But once the
program has been used, you cannot wipe it clean and use it to
store something else. Like ROMs, PROMs are non-volatile.
(ii) EPROM (Erasable Programmable Read-Only Memory): An
EPROM is a special type of PROM that can be erased by
exposing it to ultraviolet light.
(iii) EEPROM (Electrically Erasable Programmable Read-Only
Memory): An EEPROM is a special type of PROM that can
be erased by exposing it to electrical charge. This can also be
referred to as EAROM (Electrically Alterable Read-Only
Memory).
78
Registers: These are special-purpose high-speed temporary
storage located inside CPU. They are used for the quick storage
and retrieval of data and instructions. There are two major types
of register:
(i) Special-purpose registers; and
(ii) General-purpose registers.
The special purpose registers include; Program Counter (PC) or
Sequence Control Register, Instruction Register (IR) or Current
Instruction Register (CIR), Accumulator, Memory Address
Register (MAR), Memory Buffer Register (MBR) or Memory
Data Register (MDR).
Cache Memory: Cache memory is a special high-speed storage
mechanism that stores data so that future requests for that data can
be served faster. A cache is meant to improve access time and
enhance the overall performance of the computer. There are
different types of caches associated with the computer system.
There are caches for the CD-ROM, memory cache, hard drive
cache, and CPU cache; the CPU cache is its internal cache and is
often called level 1 (L1) cache. Some internet browsers keep a
cache on hard drive, of the most recent websites visited. If the site
hasn’t changed, it can load quicker from the hard drive than it can
over the phone lines.
Memory caching is effective because most programs access the
same data or instructions over and over, by keeping as much of
this information as possible on cache (built with SRAM), the CPU
avoids accessing the slower RAM (built with DRAM). Most
modern PCs also come with external cache memory called level 2
(L2) cache. These caches sit between the CPU and the RAM. Like
L1 caches, L2 caches are composed of SRAM.
The Secondary Storage
The secondary storage is a storage medium that holds data or
information permanently whether the computer is switched on or
79
off. That is, it is non volatile. The data or information remains on
this storage medium until the computer user decides to delete it
when it is no longer needed. The hard disk is a good example of
secondary storage device.
Many of the secondary storage devices are used as offline storage.
Offline storage is the computer data storage or a medium or a
device that is not under the direct control of the CPU. After
recording on this secondary storage device, it is then physically
removed or disconnected from the computer. It must be inserted
or connected by the user before the computer can access it again;
e.g. floppy disk, flash drive, external hard disk, CD’s, DVD’s,
Blu-ray discs, memory cards, etc.
Off-line storage is used to transfer information from one computer
to another, since the detached medium can be physically
transported. There are different types of secondary memory
(external) memory. They are:
i. Magnetic disk
ii. Magnetic tape
iii. Optical discs
iv. Flash drive
v. Memory card
vi. Smart card
Magnetic Disk: Magnetic storage uses different pattern of
magnetization on a magnetically coated surface to store
information. Magnetic storage is non-volatile. The information is
accessed using one or more read/write heads which may contain
one or more recording transducers. A read/write head only covers
a part of the surface so that the head or medium or both must be
moved relative to another in other to access data.
The magnetic disk storage is still the most preferred medium for
most secondary or back up storage today. This is because any
record on the disk can be retrieved or accessed without having to
80
pass through all of the preceding records in the file. For this
reason, the disk is known as Direct Access Storage Device
(DASD). The major types of magnetic disk storage devices
include:
(i) Floppy disks (diskettes)
(ii) Zip disks
(iii) Hard disk (fixed disk and external hard disk)
82
used in traditional DVD formats. The blu-ray was first announced
and introduced in 2006 and is capable of storing up to 25GB on a
single-layer disc and 50GB on a double-layer disc, each disc
being the size as a standard CD. The categories of Blu-ray discs
are as follows;
BD-ROM (read only) – for pre-recorded content
BD-R(recordable, only once) – for PC data storage
BD-RW (rewritable) – for PC data storage
BD-RE (rewritable) – for HDTV recording
84
(ii) Telephoning: The smart card issued by the telephone
company as prepaid telephone calling card. Using this card
provides convenience for the caller, and also eliminates the
company’s need to collect coins from the telephone.
(iii) Storing patient’s record: The smart card issued by the
hospital for storing patient records, vaccination data and other
healthcare information.
(iv) Storing workers’ record: The smart card issued by a
workplace (such as a corporate company) for recording
employee’s attendance in other to prepare his wages or salary
later.
(v) Information/transaction tracking: The smart card issued
by a company for tracking information such as customer
purchases.
85
Table 6.1: Differences between Primary and Secondary Storage
S/N Primary Storage Secondary Storage
1 Most primary storage is All secondary storage is
volatile and therefore used non-volatile and therefore
for temporary data storage used for permanent data
storage
2 Primary storage is more Secondary storage is usually
expensive cheaper
3 Primary storage is smaller Secondary storage is bigger
in capacity in capacity e.g. Hard disk of
500GB
4 Primary memory is Secondary memory is
usually faster to access usually slower to access,
because its closer to the this is because secondary
CPU and/or is integrated memory connects to the
onto it and therefore is CPU via cables and
directly accessed by the therefore indirectly accessed
CPU quickly by the CPU slowly.
5 Primary storage is built Secondary storage is built
with semiconductor chips. with magnetic and optical
material.
6 Primary storage are External and portable
internal and fixed on the
motherboard
7 Examples of primary Examples of secondary
memory: RAM and ROM storage: Hard disk and
Compact disk.
Units of Storage
Currently, with Geopbyte as the highest unit of memory
measurement, the capacity of a storage device is measured in the
following units:
1. Bit (b)
2. Nibble (n)
86
3. Byte (B)
4. Kilobyte (KB)
5. Megabyte (MB)
6. Gigabyte (GB)
7. Terabyte (TB)
8. Pentabyte (PB)
9. Exabyte (EB)
10. Zettabyte (ZB)
11. Yottabyte (YB)
12. Brontobyte
13. Geopbyte
Values of the Storage Units
1 bit = 1 binary digit = 0 or 1.
1 Nibble= 4 bits.
1 Byte = 8 bits = 2 Nibbles.
1024 bytes= 1 kilobyte (KB) = 210 Bytes.
1024 KB = 1 Megabyte (MB) = 1,048,576 Bytes = 2 20 Bytes.
1024 MB= 1 Gigabyte (GB)=1,073,741,824 Bytes = 2 30 Bytes.
1024 GB = 1 Terabyte (TB)=1,099,511,627,776 Bytes = 240Bytes.
1024 TB =1 Pentabyte (PB) = 1,125,899,906,842,624 Bytes = 2 50Bytes.
1024 PB = 1Exabyte (EB) = 1,152,921,504,606,846,976Bytes=2 60 Bytes.
1024 EB =1 Zettabyte (ZB) = 1,180,591,620,717,411,303,424, Bytes = 2 70 Bytes.
10124 ZB = 1Yottabyte (YB) = 1,208,925,819,614,629,174,706,176Bytes = 2 80Bytes.
1024 YB = 1 Brontobyte = 290 Bytes.
1024 Brontobytes = 1 Geopbyte = 2100 Bytes.
87
EXERCISE VI
88
CHAPTER SEVEN
89
Files can be opened, saved, deleted, and moved to
different folders. They can also be transferred across network
connections or downloaded from the Internet. A file’s type can be
determined by viewing the file's icon or by reading the file
extension. If the file type is associated with a specific application,
double-clicking the file will typically open the file within the
program.
Files are the most important mechanism for storing data
permanently on mass-storage devices. Permanently means that the
data is not lost when the machine is switched off. Files can
contain:
Data in a format that can be interpreted by programs, but not
easily by humans (binary files);
Alphanumeric characters, codified in a standard way (e.g.,
using ASCII or Unicode), and directly readable by a human
user (text files). Text files are normally organized in a sequence
of lines, each containing a sequence of characters and ending
with a special character (usually the newline character).
Consider, for example, a Java program stored in a file on the
hard-disk. In this unit we will deal only with text files.
Each file is characterized by a name and a directory in which the
file is placed (one may consider the whole path that allows one to
find the file on the hard-disk as part of the name of the file).
The most important operations on files are: creation, reading
from, writing to, renaming, and deleting. All these operations can
be performed through the operating system (or other application
programs).
Elements of a Computer File
Bit: This is a basic unit of information in computing and digital
communications. Bit is a binary digit which contains one of two
values, either 0 or 1. It is the smallest unit of data.
90
Character: This is the smallest element in a file and can be a
letter, a number or special character. A character is equal to a byte
and a byte is made up of 8 bits. For example, letter B is a
character which is equal to a byte.
Field: A field (or data field) is a collection of characters (or bytes)
that make up a single fact, or unit of information called data item.
For instance, a data field containing “February 22, 2019” as a
data-item; this can be treated as a single field (birthdate) or 3
fields (month, day, and year). The number of fields created is
based on the type of processing to be carried out on them.
Record: Record is the collection of related fields or data items. A
record is composed of data items or information about a particular
person or entity. For instance, an employee record may contain a
Name field, Address field, Birthdate field, Sex field, and so on.
Computer File: This is a collection of related records in the
computer. If there are 120 employees, then each employee would
have a record perhaps called Employee Personal Details Record,
and the collection of 120 such records would constitute a file (in
this case, referred to as Employee Personal Details File).
Database: This is the collection of related files. Files are often
integrated into a database using a Database Management System
(DBMS). Examples of DBMS software include; Microsoft
Access, MySQL, Oracle, SQL Server, FileMaker, InterBase, et
cetera.
A database is created when there is the need to create more than
one file/folder. For the Employee example mentioned above, the
organization in which they work may create other files to hold
facets of the employee data. In that situation, other files such as,
Employee Training History File, Employee Work History File,
and Employee Performance Evaluation File, could be additionally
created. Then these four files can be stored in a directory, referred
to as a database. During processing, the computer program can
91
retrieve any of the files and access the data items stored in them, a
term referred to as database query.
File Organization: File organization refers to the grouping of
data into records, blocks and access structures. Access structures
link one element of a record with another and also one record with
another. They include address pointers, primary keys, hashing
functions, and indexes. File Organization is the logical
relationships among various records that constitute the file,
particularly with respect to the means of identification and access
to any specific record. In simple terms, storing the files in certain
order is called file Organization.
File Structure: This refers to the format of the label and data
blocks and any logical control record.
File Manager or File Browser: is a computer program that
provides a user interface to manage files and folders. The most
common operations performed on files or groups of files include
creating, opening (e.g. viewing, playing, editing or printing),
renaming, moving or copying, deleting and searching for files, as
well as modifying file attributes, properties and file
permissions. Folders and files may be displayed in a hierarchical
tree based on their directory structure. Some file managers contain
features inspired by web browsers, including forward and back
navigational buttons.
Some file managers provide network connectivity via protocols,
such as FTP, HTTP, NFS, SMB or WebDAV. This is achieved by
allowing the user to browse for a file server (connecting and
accessing the server's file system like a local file system) or by
providing its own full client implementations for file server
protocols.
92
Folders
Folders on a computer provide a storage system similar to folders
in a filing cabinet. Folders can contain files and other subfolders.
Windows XP provides a number of default (personal) folders to
start your computer filing system. A folder is typically
represented by a folder icon. The folder name is under the icon:
Using My Computer
The My Computer folder displays all hard disk drives and
removable storage devices connected to your computer:
Fig.7.2: My Computer
Double-clicking on a drive or removable storage device
displays its contents.
To open the “My Computer” folder
Click Start > My Computer.
93
Using My Documents
The My Documents folder provides a place to store all of your
files. When you save a document, the default save location is the
My Documents folder:
Using My Music
By default, the My Music folder is situated in the My Documents
folder. When you use Windows Media Player to copy music
from a CD or download music from the Internet, the default save
94
location is the My Music folder:
95
jargon, files created within Word are “associated” with Microsoft
Word and all Word document files have a file extension of .doc.
In some cases, Windows does not have detailed information about
certain file types. In the example illustrated (see Fig.7.8), there are
two files and the icons used to display them are the generic
Windows default icons. This means that if you were to double
click on these files they would not run or be displayed within a
program, for the simple reason that Windows does not know what
to do with these files. There is no “file association” for these
particular files.
99
Fig.7.12: Creating shortcut from program/folder/file
100
Type a new name:
Fig.7.14: Renaming file/folder
Press the Enter key on your keyboard.
Deleting Files and Folders
To delete a file or folder located on the desktop:
Right-click on the file or folder you want to delete.
From the pop-up menu, select Delete.
OR
Select the file or folder you want to delete.
Press the Delete key on your keyboard.
To delete a file or folder located in a folder:
Select the file or folder you want to delete.
From the main menu, select File> Delete:
Fig.7.15:Deletinga file/folder
101
OR
Select the file or folder you want to delete.
Press the Delete key on your keyboard.
Changing File and Folder Views
When viewing files and folders within a folder, files and folders
can be viewed as:
Details:
A List:
104
Modifying Folder Options
Modifying folder options allows you to customize how folders
appear and function. Options include opening folders with a
single- or double-click, choosing the default folder view (details,
tiles, etc.), specifying a program to open certain file types, and
working with offline files and programs when not connected to a
network.
To modify folder options:
Open the folder for which you want to modify options.
From the main menu, select Tools > Folder Options:
108
Using Windows Explorer or My Computer
Windows Explorer and My Computer offer ways to
manually locate and manage files and folders within the
hierarchical structure of files, folders, and drives on your
computer.
To open Windows Explorer:
Click Start > All Programs > Accessories > Windows
Explorer.
Creating Files
There are various ways files can be created depending on the type
of file intended to be created. A file is created using
a software program on the computer. For example, to create a text
file you would use a text editor, to create an image file you would
use an image editor, and to create a document you would use
a word processor, and so on. This section highlights the creation
of text file and document file only.
Creation of Text File
You can create a text file on your computer with a text editor. An
example of a text editor is Notepad, which is included
with Microsoft Windows.
Note: When we refer to a “text file” we are talking about a plain
text file without any text formatting (e.g., bold), images, different
fonts, font sizes, etc. If you need to create a richer document with
any of these features, below is a tip on how to create the
document.
Tip: The below recommendations are for programs included with
an operating system. You can also download and install a more
powerful and free text editor such as Notepad++ to create, view,
and edit text files.
Open and use Notepad.
109
Save the file as a text file.
Create a new text file from the Desktop.
Create a text file from the Windows command line.
Create a text file from within a Linux shell.
Open and use Notepad
The easiest way to create a text file in Windows is to open up
the Notepad software program on your computer. The Notepad is
a text editor included with Microsoft Windows.
Tip: A text file is considered a plaintext file and Notepad is only
capable of creating and editing plaintext files. Notepad saves any
text file with a .txt file extension, which means no special
formatting or fonts can be used.
The Windows Notepad program can be found by following either
of the steps below.
1. Click Start
2. In the Run or Search box, type Notepad and press enter.
OR
1. Click Start
2. Open All Programs > Accessories, then click on the Notepad
shortcut.
Save the file as a text file
You can also create a text file using any other word processing
software program, like Microsoft Word or WordPad. When
saving the file, change the file name or file type to Plain Text to
save it as a text file. In many of these programs, you'll also have
the option to save the file as a Rich Text Format.
110
Fig.7.30: Saving the file as a text file
After the file has been created and saved, it can also be edited
using Notepad or another word processing software program.
Create a new text file from the Desktop
Another way to create a text file is to right-click on your Desktop
screen and in the menu that appears, click New and then
click Text Document. Creating a text file this way opens your
default text editor with a blank text file on your Desktop. You can
change the name of the file to anything you want. You can edit
the file in the Notepad program or any other word processing
software program, like Microsoft Word.
Tip: These same steps can be used in any other location on your
computer, for example, you could do this in another folder on
your computer.
111
Types of Computer Files
There are numerous types of files used for storing data needed for
processing, reference or back up. The main common types of
processing files include:
i. Logical Files
ii. Physical files
iii. Master files
iv. Reference files
v. Backup files
Logical Files: Logical files do not contain data. They contain a
description of records found in one or more physical files. A
logical file is a view or representation of one or more physical
files. Logical files that contain more than one format are referred
to as multi-format logical files. If your program processes a
logical file which contains more than one record format, you can
use a read by record format to set the format you wish to use.
Physical Files: Physical files contain the actual data that is stored
on the system, and a description of how data is to be presented to
or received from a program. They contain only one record format,
and one or more members. A physical file can have a keyed
sequence access path. This means that data is presented to a
program in a sequence based on one or more key fields in the file.
Each base relation in the database design becomes a physical file.
The physical file is made up of a set of physical records which are
in turn made up of a set of fields. The fields can be of fixed
length or variable length, and the record can consist of fixed
length fields, variable length fields or a mixture of both fixed and
variable length fields. The physical file can be then defined as a
named portion of secondary memory allocated for the purpose of
storing physical records.
Master Files: A collection of records pertaining to one of the
main subjects of an information system, such as customers,
112
employees, products and vendors. Master files contain descriptive
data, such as name and address, as well as summary information,
such as amount due and year-to-date sales. A master file is the
main that contains relatively permanent records about particular
items or entries. For example, a customer file will contain details
of a customer such as customer ID, name and contact address.
Reference Files: A reference file is mainly used for reference or
look-up purposes. Look-up information is that information that is
stored in a separate file but is required during processing. For
example, in a point of sale terminal, the item code entered either
manually or using a barcode reader looks up the item description
and price from a reference file stored on a storage device.
Backup Files: A backup file is used to hold copies (backups) of
data or information from the computer’s fixed storage (hard disk).
Since a file held on the hard disk may be corrupted, lost or
changed accidentally, it is necessary to keep copies of the recently
updated files. In case of the hard disk failure, a backup file can be
used to reconstruct the original file.
File Formats and Filename Extensions
A file format is a standard way that information is encoded for
storage in a computer file. It specifies how bits are used to encode
information in a digital storage medium. File formats may be
either proprietary or free and may be either unpublished or open.
A Computer filename is a name used to uniquely identify a
computer file stored in a file system. Different file systems
impose different restrictions on filename lengths and the allowed
characters within filenames.
The Document File Format: In computing, DOC or doc is a
filename extension for word processing documents, most
commonly in the proprietary Microsoft Word Binary File Format.
Historically, the extension was used for documentation in plain
text, particularly of programs or computer hardware on a wide
113
range of operating systems. Developed by Microsoft Corporation,
its type of format is document file format, extended to Microsoft
Office XML formats and Office Open XML. It is also a Container
for text, image and table.
Rich Text File format
The Rich Text Format is a proprietary document file format with
published specification developed by Microsoft Corporation from
1987 until 2008 for cross-platform document interchange with
Microsoft products. Developed by Microsoft Corporation (initial
release in 1987), type of format is Document file format.
PowerPoint Presentation File Formats
Developer by Microsoft Corporation, PPT is of data file category
and a binary format. A PPT file is an editable slide show.
PowerPoint or another presentation program, such as OpenOffice
Impress or Apple Keynote. It may include formatted text, bullet
points, images, movies, sound effects, and music. PPT files are
commonly built from one of many templates included with the
PowerPoint software, but may also be created from scratch.
PPT files are used for creating presentations in the home and
business environments. The PPT file was introduced in 1987 with
the release of PowerPoint. It was saved in a binary file format and
was the primary file type used to save PowerPoint presentations
until it was replaced in PowerPoint 2007 with the .PPTX file
extension, which is saved in the OpenXML format. Although the
PPT file was replaced by the PPTX file it is still supported by
PowerPoint.
XLS File Formats
XLS or xls may refer to:
Microsoft Excel file format, a spreadsheet file format
Cadillac XLS, a prototype Cadillac concept car
114
Exelis Inc. (NYSE symbol), a global aerospace, defense,
information and services company
Lusitanian language (ISO 639-3 code), an Indo-European
Paleohispanic language
Midwest Questar XLS, an American ultra-light aircraft design
Saint-Louis Airport (IATA airport code), near Saint-Louis,
Senegal
115
generally rectangular grid of pixels, viewable via a monitor,
paper, or other display medium. Raster images are stored in image
files with varying formats. Raster images can be constructed by a
series of pixels, or individual blocks, to form an
image. JPEG, GIF, and PNG are all raster image extensions.
Every photo you find online or in print is a raster image. Pixels
have a defined proportion based on their resolution (high or low),
and when the pixels are stretched to fill space they were not
originally intended to fit, they become distorted, resulting in
blurry or unclear images.
In order to retain pixel quality, you cannot resize raster images
without compromising their resolution. As a result, it is important
to remember to save raster files at the exact dimensions needed
for the application.
Vector Image Files: Vector images are far more flexible. They
are constructed using proportional formulas rather than
pixels. EPS, AI and PDF are perfect for creating graphics that
require frequent resizing. Your logo and brand graphics should
have been created as a vector, and you should always have a
master file on hand. The real beauty of vectors lies in their ability
to be sized as small as a postage stamp, or large enough to fit on
an 18-wheeler!
If you’re not sure whether you have a vector version of your logo,
here is a little trick for you: Call the company that printed your
business cards or the vendor that embroidered your logo on a
shirt. Often they will have a vector file of your logo that they can
send to you for your records.
High Resolution vs. Low Resolution
Have you heard your designer talk about DPI or PPI? DPI stands
for “dots per inch” and PPI translates to “pixels per inch.” These
units of measure are essential for determining if the density of
pixels in an image is appropriate for the application you are using.
116
The biggest thing to note when determining what DPI or PPI you
require is whether you are to use the image for print or web.
Websites display images at 72dpi, which is low resolution;
however, images at this resolution look really crisp on the web.
This is not the case for print. Best practices for printing an image
will require it to be no less than 300dpi.
Don’t try to trick the system. A lot of magic can happen in
Photoshop, but creating pixels out of thin air isn’t one of them.
Pulling an image off of the web and trying to get it to fit the
dimensions of your print project just won’t work. You will end up
with a pixelated image that appears stretched and distorted.
1. JPEG (or JPG) - Joint Photographic Experts Group
2. PNG - Portable Network Graphics
3. GIF - Graphics Interchange Format
4. TIFF - Tagged Image File
5. PSD - Photoshop Document
6. PDF - Portable Document Format
7. EPS - Encapsulated Postscript
8. AI - Adobe Illustrator Document
9. INDD - Adobe Indesign Document
10. RAW - Raw Image Formats
11. BMP - BMP format
117
Fig.7.32: JPEG file icon
You can use JPEGs for projects on the web, in Microsoft Office
documents, or for projects that require printing at a high
resolution. Paying attention to the resolution and file size with
JPEGs is essential in order to produce a nice looking project.
PNG - Portable Network Graphics: Portable Network Graphics
is a raster-graphics file-format that supports lossless data
compression. PNG was developed as an improved, non-patented
replacement for Graphics Interchange Format. PNG supports
palette-based images, grayscale images, and full-color non-
palette-based RGB/RGBA images. Developed by PNG
Development Group (donated to W3C),initial release was on 1
October, 1996. This format is extended
to: APNG, JNG and MNG. PNGs are amazing for interactive
documents such as web pages, but are not suitable for print. While
PNGs are "lossless," meaning you can edit them and not lose
quality, they are still low resolution.
118
Fig.7.33: PNG file icon
The reason PNGs are used in most web projects is that you can
save your image with more colors on a transparent background.
This makes for a much sharper, web-quality image.
GIF - Graphics Interchange Format: GIFs are most common in
their animated form, which are all the rage on Tumblr pages and
in banner ads. It seems like every other day we have a
new Grumpy Cat or Honey Boo Boo animated GIF. In their more
basic form, GIFs are formed from up to 256 colors in the RGB
colors pace. Due to the limited number of colors, the file size is
drastically reduced.
119
This is a common file type for web projects where an image needs
to load very quickly, as opposed to one that needs to retain a
higher level of quality. These files have the .gif file extension.
TIFF - Tagged Image File: Tagged Image File Format,
abbreviated TIFF or TIF, is a computer file format for storing
raster graphics images, popular among graphic artists, the
publishing industry, and photographers. A TIF is a large raster file
that doesn't lose quality. This file type is known for using
“lossless compression,” meaning the original image data is
maintained regardless of how often you might copy, re-save, or
compress the original file.
120
Fig.7.36: PSD file icon
The largest disadvantage to PSDs is that Photoshop works with
raster images as opposed to vector images. These files have the
.psd file extension.
PDF - Portable Document Format: The Portable Document
Format (PDF) is a file format developed by Adobe in the 1990s to
present documents, including text formatting and images, in a
manner independent of application software, hardware,
and operating systems. Adobe invented PDF with the goal of
capturing and reviewing rich information from any application, on
any computer, with anyone, anywhere. We would say they have
been pretty successful so far.
Based on the PostScript language, each PDF file encapsulates a
complete description of a fixed-layout flat document, including
the text, fonts, vector graphics, raster images and other
information needed to display it. PDF was standardized as
an open format, ISO 32000, in 2008, and no longer requires any
royalties for its implementation.
Today, PDF files may contain a variety of content besides flat text
and graphics including logical structuring elements, interactive
elements such as annotations and form-fields, layers, rich
media (including video content) and three dimensional objects
using U3D or PRC, and various other data formats. The PDF
specification also provides for encryption and digital signatures,
file attachments and metadata to enable workflows requiring these
features.
121
Fig.7.37: PDF file icon
If a designer saves your vector logo in PDF format, you can view
it without any design editing software (as long as you have
downloaded the free Acrobat Reader software), and they have the
ability to use this file to make further manipulations. This is by far
the best universal tool for sharing graphics. These files have the
.pdf file extension.
EPS - Encapsulated Postscript: EPS is a file in vector format
that has been designed to produce high-resolution graphics for
print. Almost any kind of design software can create an EPS.
122
AI - Adobe Illustrator Document: AI is, by far, the image
format most preferred by designers and the most reliable type of
file format for using images in all types of projects from web to
print, etc.
125
MP3 File format: MP3 is a coding format for digital audio.
Originally defined as the third audio format of the MPEG-1
standard, it was retained and further extended – defining
additional bit-rates and support for more audio channels – as the
third audio format of the subsequent MPEG-2 standard.
Developed by Moving Picture Experts Group (MPEG), the Type
of format is Audio file format and its filename extension is .mp3.
MPEG-4 Part 14 File format: Developed by International
Organization for Standardization, MPEG-4 Part 14 or MP4 is a
digital multimedia container format most commonly used to store
video and audio, but it can also be used to store other data such as
subtitles and still images. Like most modern container formats, it
allows streaming over the Internet. It is a container for audio,
video and text data. It has the Digital container type of format.
Extended from: QuickTime File Format and MPEG-4 Part 12, its
filename extension is .mp4.
Windows Media Video File format: Windows Media Video is a
series of video codecs and their corresponding video coding
formats developed by Microsoft. It is part of the Windows Media
framework.
Audio Video Interleave File format: Audio Video Interleave,
known by its initials AVI, is a multimedia container format
introduced by Microsoft Corporation in November 1992 as part of
its Video for Windows software. AVI files can contain both audio
and video data in a file container that allows synchronous audio-
with-video playback. Initial release was in November 1992; type
of format: Video file format. Filename extension is .avi.
Other File Formats
Zip File format: Developed by Phil Katz, PKWARE, Inc., ZIP is
an archive file format that supports lossless data compression. A
ZIP file may contain one or more files or directories that may
have been compressed. The ZIP file format permits a number of
126
compression algorithms, though DEFLATE is the most common.
Its Type of format is Data compression and its filename extension
is .zip (and newer compression algorithms).
Comma-Separated Values (CSV) File Format: In computing,
a comma-separated values (CSV) file is a delimited text file that
uses a comma to separate values. A CSV file stores tabular data
(numbers and text) in plain text. Each line of the file is a
data record. Each record consists of one or more fields, separated
by commas. The use of the comma as a field separator is the
source of the name for this file format.
The CSV file format is not fully standardized. The basic idea of
separating fields with a comma is clear, but that idea gets
complicated when the field data may also contain commas or even
embedded line-breaks. CSV implementations may not handle
such field data, or they may use quotation marks to surround the
field. Quotation does not solve everything: some fields may need
embedded quotation marks, so a CSV implementation may
include escape characters or escape sequences.
In addition, the term “CSV” also denotes some closely
related delimiter-separated formats that use different field
delimiters, for example, semicolons. These include tab-separated
values and space-separated values. A delimiter that is not present
in the field data (such as tab) keeps the format parsing simple.
These alternate delimiter-separated files are often even given a
.csv extension despite the use of a non-comma field separator.
This loose terminology can cause problems in data exchange.
Many applications that accept CSV files have options to select the
delimiter character and the quotation character. Semicolons are
often used in some European countries, such as Italy, instead of
commas.
Binary File format: A binary file is a computer file that is not a
text file. The term “binary file” is often used as a term meaning
“non-text file”.A binary file is a computer file that is not a text file
127
(LINFO, 2017). The term “binary file” is often used as a term
meaning “non-text file”. Many binary file formats contain parts
that can be interpreted as text; for example, some computer
document files containing formatted text, such as older Microsoft
Word document files, contain the text of the document but also
contain formatting information in binary form.
File Management/Organization
File organization refers to physical arrangement of data on storage
devices, such as magnetic tapes, magnetic disks, optical disks, etc.
There are basically four methods of organizing or accessing files
on storage media.
1. Sequential File Organization: In sequential organization,
record occurrences are referenced in the order that they are stored
physically. Data stored on cards and tapes are necessarily stored
sequentially. Direct access devices such as disks may be, but are
not necessarily referenced sequentially. Sometimes the processing
is best done through sequential access, even when direct access
devices are used. Such is the case when many records of a file
must be accessed to satisfy a request for data.
In a sequential file, records are maintained in the logical sequence
of their primary key values. The processing of a sequential file is
conceptually simple but inefficient for random access. However,
if access to the file is strictly sequential, a sequential file is
suitable. A sequential file could be stored on a sequential storage
device such as a magnetic tape.
In a sequential file update, transaction records are in the same
sequence as in the master file. Records from both files are
matched on the basis of one record at a time, resulting in an
updated master file as shown in the figures below.
128
Fig .7.42: Sequential file organization
Advantages:
1. Errors in files remain localized.
2. Loading a record requires only the record key.
3. Simple to understand approach.
4. Easy to organize, maintain and understand.
5. Relatively inexpensive input/output (I/O) media and device
may be used.
6. Files may be relatively easy to reconstruct since a good
measure of built in back up is usually available.
7. Efficient and economical if the activity rate, i.e. the
proportion of file records to be processed is high.
Disadvantages:
1. Transactions must be sorted and placed in sequence prior to
processing.
2. ‘Data’ redundancy is typically high since the same data may
be stored in several files sequenced in different keys.
3. Random enquiries are virtually impossible to handle.
4. Timeliness of data in file deteriorates while batches are
being accumulated.
5. Entire file must be processed even when the activity rate is
very low.
6. This method is suitable for the small records. If the record is
very big, so much time is consumed in arranging the file.
129
2. Random File Organization: Records are arranged in any
particular order but could be scattered using the record key as an
address on the disc for its location or access. That is, a random file
has a predictable relationship between the record key and the
record location on disk. This is called direct addressing where the
key value of the record is also used as the physical address of the
record on disk. The storage media used in random file includes;
magnetic disc and optical disc.
3. Serial File Organization: Records are arranged one after the
other no particular order. That is, records are placed unto the
storage medium one after the other without following any
particular sequence. The common storage device used in the serial
file organization is the magnetic tape. Serial organization
maximizes the utilization of space on the storage medium because
records are placed in turn, from the beginning to the end of the
file, without leaving any gap.
4. Index Sequential File Organization: Records are first stored
in this file sequentially according to a primary key (or key field),
and the file management system creates an address for each
record. These addresses are now used as index to create or access
individual records at random. The primary key field allows the
records to be accessed sequentially, and the index allows the
records to be accessed at random. In other words, the retrieval of a
record from a sequential file, on average, requires access to half
the records in the file, making such enquiries not only inefficient
but very time-consuming for large files. To improve the query
response time of a sequential file, a type of indexing technique
can be added. The type of storage media used in indexed
sequential file organization includes the magnetic disks and
optical disk. This type of file organization cannot make use of the
magnetic tape.
An index is a set of <key, address> pairs. Indexing associates a set
of orderable quantities, which are usually smaller in number or
130
their properties, provide a mechanism for faster search. The
purpose of indexing is to expedite the search process. Indexes
created from a sequential (or sorted) set of primary keys are
referred to as index sequential.
Although the indices and the Data blocks are held together
physically, we distinguish between them logically. We shall use
the term index file to describe the indexes and data file to refer to
the data records. The index is usually small enough to be read into
the processor memory.
A sequential (for sorted on primary keys) file that is indexed is
called an index sequential size. The index provides for random
access to records, while the sequential nature of the file provides
easy access to the subsequent records as well as sequential
processing. An additional feature of this file system is the
overflow area. This feature provides additional space for record
addition without necessitating the creation of a new file.
Advantages:
1. Permits Quick access to records in a relatively efficient way
when this activity is a small fraction of the work load.
2. Permits the efficient and economical use of sequential
processing techniques when the activity rate is high.
Disadvantage:
1. Less efficient in the use of storage space than some other
alternatives.
2. Relatively expensive hardware and software resources are
required.
3. Slow retrieval compared to random access as searching of
index requires time.
Methods of Accessing Files
There are various methods by which information stored on a file
can be accessed or located. The method of accessing a file will
largely depend on how the file is organized.
131
1. Accessing Sequential Files: The method of access is serial
but of course the file is in sequence, and for this reason the term
sequence access is often used in describing this form of serial
access. It is a method of recalling records from the magnetic tape
following the sequence in which the records were stored in that
tape.
2. Accessing Random Files: This is the method of searching for
a record from a group of records and accessing it directly at its
location on disk through direct addressing based on the physical
address of the record. In random access, one can access a record
number 12 directly without having to pass through records 1 to
11.
The figure below shows the operation of sequential access in
comparison with the random access.
EXERCISE VII
Data Processing
Data refers to the raw facts that do not have much meaning to the
user and may include numbers, letters, symbols, sound or images.
Information refers to the meaningful output obtained after
processing the data.
Data processing therefore refers to the process of transforming
raw data into meaningful output, that is, information. Data
processing can be done manually using pen and paper;
mechanically, using simple devices like typewriters or
electronically using modern data processing tools such as
computers.
Data processing cycle
It refers to the sequence of activities involved in data
transformation from its row form to information. It is often
referred to as cycle because the output obtained can be stored after
processing and may be used in future as input. The four main
stages of data processing cycle are:
Data collection
Data input
Data processing
Data output
134
Fig.8.1: Data processing cycle.
1. Data collection: Also referred to as data gathering or fact
finding, it involves looking for crucial facts needed for
processing.
Methods of Data Collection: They include; interviews, use of
questionnaires and observation. In most cases, the data is
collected after sampling.
Sampling is the process of selecting representative elements (e.g.
people, organizations) from an entire group (population) of
interest. Some of the tools that help in the data collection include
source documents such as forms, data capture devices such as
digital camera etc.
Stages of Data Collection: The process of data collection may
involve a number of stages depending on the method used. These
include:
Data creation: This is the process of identification and
putting together facts in an organized format. This may be in
the form of manually prepared document or captured from the
source using a data capture device such as a barcode reader
and be inputted easily in a computer.
135
Data preparation: This is the transcription (conversion) of
data from source document to machine readable form. This
may not be the case for all input devices. Data collected using
devices that directly capture data in digital form do not
require transcription.
Data transmission: This will depend on whether data need to
be transmitted via communication media to the central office.
2. Data input: This refers to the process where the collected
data is converted from human readable from to machine readable
form (binary form). The conversion takes place in the input
device.
Media conversion: Data may need to be transmitted from
one medium to another e.g. from a floppy disk to a
computer’s hard disk for faster input.
Input validation: Data entered into the computer is subjected
to validity checks by a computer program before being
processed to reduce errors as the input.
Sorting: in case the data needs to be arranged in a predefined
order, it is first sorted before processing.
3. Processing: This is the transformation of the input data by
the CPU to a more meaningful output (information).Some of the
operations performed on the data include calculations, comparing
values and sorting.
4. Output: The final activity in the data processing cycle is
producing the desired output also referred to as information. This
information can be distributed to the target group or stored for
future use. Distribution is making information available to those
who need it and is sometimes called information dissemination.
This process of dissemination may involve electronic presentation
over the radio or television, distribution of hard copies,
broadcasting messages over the internet or mobile phones, etc.
136
Description of errors in data processing
1. Computational errors: Occurs when an arithmetic operation
does not produce the expected results. The most common
computation errors include overflow, truncation and
rounding.
2. Overflow errors: Occurs if the result from a calculation is
too large to be stored in the allocated memory space. For
example, if a byte is represented using 8 bits, an overflow will
occur if the result of a calculation gives a 9-bit number.
3. Truncation errors: Result from having real numbers that
have a long fractional part which cannot fit in the allocated
memory space. The computer would truncate or cut off the
extra characters from the fractional part. For example, a
number like 0.784969 can be truncated to four digits to
become 0.784.
The accuracy of the computer output is critical. As the saying
goes garbage in garbage out (GIGO), the accuracy of the data
entered in the computer directly determines the accuracy of
the information given out. Some of the errors that influence
the accuracy of data input and information output include:
Transcription,
Computation and
Algorithm or logical errors.
4. Transcription errors: Occurs during data entry. Such errors
include misreading and transposition errors.
5. Misreading errors: Are brought about by the incorrect
reading of the source by the user and hence entering wrong
values. For example, a user may misread a handwritten figure
such as 589 and type S89 instead, that is, confusing 5 for S.
137
6. Transposition errors: This occurs as a result of incorrect
arrangement of characters i.e. putting characters in the wrong
order. For example, the user might enter 396 instead of 369.
These errors may be avoided by using modern capture devices
such as bar code readers, digital cameras etc which enter data
with the minimum user intervention.
7. Rounding errors: Results from raising or lowering a digit in
a real number to the required rounded number. for example, to
round off 30.666 to one decimal place we raise the first digit
after the decimal point if its successor is more than or equal to
five. In this case the successor is 6 therefore 30.666 rounded
up to one decimal place is 30.7. If the successor is below five,
e.g. 30.635, we round down the number to 30.6.
8. Algorithm or logical errors: An algorithm is a set of
procedural steps followed to solve a given problem.
Algorithms are used as design tools when writing programs.
Wrongly designed programs would result in a program that
runs but gives erroneous output. Such errors that result from
wrong algorithm design are referred to as algorithm or logical
errors.
Data Integrity
Data integrity refers to the accuracy and completeness of data
entered in a computer or received from the information system.
Integrity is measured in terms of accuracy, timeliness and
relevance of data.
Accuracy: It refers to how close an approximation is to an actual
value. As long as the correct instructions and data are entered,
computers produce accurate results efficiently. In numbers, the
accuracy of a real number depends on the number. For example,
72.1264 is more accurate than 72.13.
138
Timeliness: This is the relative accuracy of data in respect to the
current state of affairs for which it is needed. This is important
because data and information have a time value attached to them.
If received late, the information may have become useless to the
user. For example, information in the newspaper that is meant to
invite people for a meeting or occasion must be printed prior to
the event and not later.
Relevance: Data entered into the computer must be relevant so as
to get the expected output. In this case, relevance means that the
data entered must be pertinent to the processing needs at hand and
must meet the requirements of the processing cycle. The user also
needs relevant information for daily operations or decision
making.
Threat to data integrity
Threats to data integrity can be minimized through the following
ways:
Backup data preferably on external storage media.
Control access to data by enforcing security measures.
Design user interfaces that minimize chances of invalid data
entry.
Using error detection and correction software when
transmitting data
Using devices that directly capture data from the source such
as bar code readers, digital cameras, and optical scanners.
Data Processing Methods
As mentioned earlier, data can be processed manually,
mechanically and electronically.
1. Manual data processing: In manual data processing, most
tasks are done manually with a pen and a paper. For example, in a
busy office, incoming tasks (input) are stacked in the “tray”
139
(output). The processing of each task involves a person using the
brain in order to respond to queries. The processed information
from the out tray is then distributed to the people who need it or
stored in a file cabinet.
2. Mechanical data processing: Manual is cumbersome and
boring especially repetitive tasks. Mechanical devices were
developed to help in automation of manual tasks. Examples of
mechanical devices include the typewriter, printing press, and
weaving looms. Initially, these devices did not have electronic
intelligence.
3. Electronic data processing: For a long time, scientists
have researched on how to develop machine or devices that would
stimulate some form of human intelligence during data and
information processing. This was made possible to some extent
with the development of electronic programmable devices such as
computers.
The advent of microprocessor technology has greatly enhanced
data processing efficiency and capability. Some of the micro
processor controlled devices include computers, cellular (mobile)
phones, calculators, fuel pumps, modern television sets, washing
machines etc.
Computer Files
A file can be defined as a collection of related records that give a
complete set of information about a certain item or entity. A file
can be stored manually in a file cabinet or electronically in
computer storage devices.
Computerized storage offers a much better way of holding
information than the manual filing system which heavily relies on
the concept of the file cabinet.
Advantages of computerized filing system include:
1. Information takes up much less space than the manual filing.
140
2. It is much easier to update or modify information.
3. It offers faster access and retrieval of data.
4. It enhances data integrity and reduces duplication.
5. It enhances security of data if proper care is taken to secure it.
Elements of Computer File
A computer file is made up of three elements: characters, fields
and records.
1. Characters: A character is the smallest element in a
computer file and refers to letter, number or symbol that can
be entered, stored and output by a computer. A character is
made up of seven or eight bits depending on the character
coding scheme used.
2. Field: A field is a single character or collection of characters
that represents a single piece of data. For example, the
student’s admission number is an example of a field.
3. Records: A record is a collection of related fields that
Represents a single entity, e.g. in a class score sheet, detail of
each student in a row such as admission number, name, total
marks and position make up a record.
Types of Computer Files
Computer files are classified as either physical or logical.
Logical files: A computer file is referred to as logical file if it
is viewed in terms of what data item it contains and details of
what processing operations may be performed on the data
items. It does not have implementation specific information
like field, data types, and size, and file type.
Physical files: As opposed to a logical file, a physical file is
viewed in terms of how data is stored on a storage media and
how the processing operations are made possible. Physical
141
files have implementation specific details such as characters
per field and data type for each field.
Types of Computer Processing Files
There are numerous types of files used for storing data needed for
processing, reference or back up. The main common types of
processing files include;
Master files,
Transaction,
Reference,
Backup, report and
Sort file.
1. Master file: A master file is the main that contains relatively
permanent records about particular items or entries. For
example, a customer file will contain details of a customer
such as customer ID, name and contact address.
2. Transaction (movement) file: A transaction file is used to
hold data during transaction processing. The file is later used
to update the master file and audit daily, weekly or monthly
transactions. For example, in a busy supermarket, daily sales
are recorded on a transaction file and later used to update the
stock file. The file is also used by the management to check
on the daily or periodic transactions.
3. Reference file: A reference file is mainly used for reference
or look-up purposes. Look-up information is that information
that is stored in a separate file but is required during
processing. For example, in a point of sale terminal, the item
code entered either manually or using a barcode reader looks
up the item description and price from a reference file stored
on a storage device.
4. Backup file: A backup file is used to hold copies (backups)
of data or information from the computers fixed storage (hard
142
disk). Since a file held on the hard disk may be corrupted, lost
or changed accidentally, it is necessary to keep copies of the
recently updated files. In case of the hard disk failure, a
backup file can be used to reconstruct the original file.
5. Report file: Used to store relatively permanent records
extracted from the master file or generated after processing.
For example, you may obtain a stock levels report generated
from an inventory system while a copy of the report will be
stored in the report file.
6. Sort file: It stores data which is arranged in a particular order.
Used mainly where data is to be processed sequentially. In
sequential processing, data or records are first sorted and held
on a magnetic tape before updating the master file.
144
3. Serial file organization: Records in a file are stored and
accessed one after another. The records are not stored in any
way on the storage medium this type of organization is mainly
used on magnetic tapes.
Advantages of serial file organization
It is simple
It is cheap
Disadvantages of serial file organization
It is cumbersome to access because you have to access all
proceeding records before retrieving the one being
searched.
Wastage of space on medium in form of inter-record gap.
It cannot support modern high speed requirements for
quick record access.
4. Indexed-sequential file organization method: Almost
similar to sequential method only that, an index is used to
enable the computer to locate individual records on the
storage media. For example, on a magnetic drum, records are
stored sequential on the tracks. However, each record is
assigned an index that can be used to access it directly.
Electronic Data Processing Methods
There are several ways in which a computer, under the influences
of an operating system is designed to process data.
Examples of processing modes are:
1. Online processing
2. Real-time processing
3. Distributed processing
4. Multiprogramming
5. Time sharing
145
6. Batch processing
7. Multiprocessing
8. Multitasking
9. Interactive processing
Online processing: In online data processing, data is processed
immediately it is received. The computer is connected directly to
the data input unit via a communication link. The data input may
be a network terminal or online input devices attached to the
computer.
Real-time processing: Computer processes the incoming data as
soon as it occurs, updates the transaction file and gives an
immediate response that would affect the events as they happen.
This is different from online in that for the latter an immediate
response may not be required.
The main purpose of a real-time processing is to provide accurate,
up-to-date information hence better services based on a true (real)
situation. An example of a real time processing is making a
reservation for airline seats. A customer may request for an airline
booking information through a remote terminal and the requested
information will be given out within no time by the reservation
system. If a booking is made, the system immediately updates the
reservation file to avoid double booking and sends the response
back to the customer immediately.
Distributed data processing: Multiprogramming, also referred to
as multitasking refers to a type of processing where more than one
program are executed apparently at the same time by a single
central processing unit. Distributed data processing refers to
dividing (distributing) processing tasks to two or more computer
that are located on physically separate sites but connected by data
transmission media.
146
Multiprogramming: This is a rudimentary form of parallel
processing in which several programs are run at the same time on
a uniprocessor. Since there is only one processor, there can be no
true simultaneous execution of different programs. For example, a
distributed database will have different tables of the same
database residing on separate computers and processed there as
need arises.
This distribution of processing power increases efficiency and
speed of processing. An example is in the banking industry where
customers’ accounts are operated on servers in the branches but
all the branch accounts can be administered centrally from the
main server as if they resided on it. In this case, we say that the
distributed database is transparent to the user because the
distribution is hidden from the user’s point of view.
Time sharing: In a time sharing processing, many terminals
connected to a central computer are given access to the central
processing unit apparently at the same time. However in actual
sense, each user is allocated a time slice of the CPU in sequence.
The amount of time allocated to each user is controlled by a
multi-user operating system. If a user’s task is not completed
during the allocated time slice, he/she is allocated another time
slice later in a round-robin.
Batch processing: Data is accumulated as a group (batch) over a
specified period of time e.g. daily, weekly or monthly. The batch
is then processed at once. For example in payroll processing
system, employees details concerning the number of hours
worked, rate of pay, and other details are collected for a period of
time say, one month. These details are then used to process the
payment for the duration worked. Most printing systems use the
batch processing to print documents.
Multiprocessing: This refers to the processing of more than one
task at the same time on different processors of the same
147
computer. This is possible in computers such as mainframes and
network servers.
In such systems a computer may contain more than one
independent central processing unit which works together in a
coordinated way. At a given time, the processors may execute
instructions from two or more different programs or from
different parts of one program simultaneously.
This coordination is made possible by a multiprocessing operating
system that enables different processors to operate together and
share the same memory. The users of the distributed database will
be completely unaware of the distribution and will interact with
the database as if all of it was in their computer.
153
EXERCISE VIII
154
CHAPTER NINE
156
Fig.9.1: Automatic watering and irrigation
Other practical examples of smart farming practices include:
Seeding and planting: Non-smart seeding machines exist.
They however use scatter method. This is inaccurate and
wasteful when seeds fall outside optimal location. Hence, smart
seeding and planting equipment have been designed. They use
geo-mapping and sensor data to track soil quality, moisture,
density, nutrient levels, etc. This eliminates guesswork in the
planting process. It can plant seeds with precision in depths and
appropriate distance between seeds. Ensure optimal growth of
plants.
Weeding and crop maintenance: The Bonirob robot (Fig.9.2)
can navigate autonomously through a farm. It is equipped with
video, LiDAR and satellite GPS. It uses advanced machine
learning to identify weeds before removing them and replaces
the need for humans to manually weed crops.
157
Fig.9.2: The Bonirob farming robot
158
Real-time monitoring and analysis: Drones perform remote
monitoring and analysis of fields, crops and animals. Imaging
technology and cameras enable drones to survey fields for
optimal land use and monitoring of crops/animals health. The
data generated by drones is reviewed by the farmer; then the
farmers could visit the farm only when there is need.
Hence, this is a good concept for monitoring farms from
adversaries, invasion by herds on crop farms, etc.
159
Fig.9.5: A drone for tree planting
Crop spraying: Drones can spray liquid fertilizers, herbicides,
and pesticides from air. A combination of GPS, laser
measurements and ultrasound positioning helps crop-spraying
drones adjust to variations in wind speed, topology, geography.
DJI developed a drone called Agras MG-1 with a tank capacity
of 2.6 gallons (10 litres) and a flight range of seven to ten acres
per hour.
161
However, the health sector is not exactly like the other business
sectors, as it has peculiar attributes and goals. For example, while
the goal of an industrial or business venture is mainly to operate
efficiently in order to be economically viable, that of a medical
institution involves providing services which society cannot do
without and which cannot be easily quantified in economic terms;
and that is, caring for life.
Therefore, computers in addition to performing the administrative
functions of a hospital like patient billing, health care statistics,
patient histories, etc, are beginning to cater for the more advanced
medical services. Applications of computers are scheduling,
monitoring laboratory test, and preliminary diagnosis, among
other things. The Computed Axial Tomography or Computerized
Axial Tomography (CAT) scanner that x-rays patients for
tumours is an example of an advanced use of computer aided
diagnosis. Computed Tomography or Computer Tomography
(CT) is the recent up-to-date term for CAT; hence, the terms
(CAT and CT) are synonymously used to mean the same type of
diagnostic examination.
162
Fig.9.7: CAT scanners for tumour
The Computer Tomography (CT) scans can detect bone and joint
problems, like complex bone fractures and tumours. If you have a
condition like cancer, heart disease, emphysema, or liver masses,
CT scans can spot it or help doctors see any changes. They show
internal injuries and bleeding, such as those caused by a car
accident.
Application of Computers in Aerospace/Aviation
Computers have been gradually integrated into an aviation
curriculum in both pilot and maintenance training. Applications
cover a wide range from Computer-Managed Instruction (CMI)
through simulation, particularly in the area of maintenance,
troubleshooting and instrument flying. In aviation industry, ICT
163
simulates airflow around an aircraft at different speeds and
altitude. This helps in producing an effective aerodynamic design
for superior performance.
The role of ICT in airline industry cannot be undermined. Every
layer of airline industry is heavily filled with Information
Technology. Airlines were early adopters of ICT and have a
history of technological innovation. This industry has fostered a
dependency on technology for their operational and strategic
management.
In aviation, airlines have realised the need of efficient, quick,
inexpensive and accurate handling of their list and records and
being one of the most independent organisations in travel
industry, they need internet, intranet and extranets to facilitate all
of this as these three features facilitates their operational,
administrative and competitive roles in the market thereby
bringing innovative support.
With the growing technology and demand and with the increase in
fleet and routes, it was realised that reservations could no longer
be on manual display boards, where passengers were listed. Up to
1970, airlines had to locate the best routes and fares for the
customer and publish it in a manual. They had to phone for
availability, reservation and conformation before booking the
tickets manually. Internet allows airlines to demonstrate their
competitiveness widely as well as directly communicate with their
customers.
Today, every airline has a website for the convenience of
passengers and it has all the information necessary for a
convenient travel booking. From checking tickets to booking them
to planning a multi-city travel and many more options. With the
help of a web portal, customers can plan or cancel with just a
click and in a very secure manner ensuring that data is not being
misused and neither is there any loss of money. Web check-in,
additional baggage, seat preference, car – rentals and hotel
164
bookings are few more additional benefits that make travel more
comfortable. Computer Reservation System (CRS) was described
as a technical marvel when it was first launched. CRS allows
airlines to improve their internal organisation and also provide a
powerful tool to manage their inventory. A reservation system
like this also enabled airlines to communicate with travel agencies
and distributors. Availability of seats and fare updates were also
easy to check with the help of this.
Intranets are used to provide user-friendly access to employees of
the organization. Airlines aim at maximising their profitability, by
optimising their total yield and by minimising costs. This process
is facilitated by a number of integrated systems that operate in
parallel to coordinate a number of critical airline functions, such
as accounting, financial management, human resources, etc. In
addition, specialised software facilitates scheduling in order to
optimise crew, aircraft, and other resources and to maximise the
operational efficiency whilst keeping costs under control.
Airlines also have to co-ordinate various other organisations that
provide handling services at airport like maintenance, refuelling,
security, baggage handling, load and dispatch, lounge provision,
cabin crew and pilots, catering and cleaner services. All these
things to function at the same time when one aircraft lands and to
function with co-operation and co- ordination and to do all this in
a prescribed time is in itself a well functioned machine. All these
are facilitated with the help of extranet which assists them
develop reliable and direct connections and enhance efficiency.
Suitable extranets and inter-organisational systems are required to
facilitate airline interaction with their regular suppliers. Airlines
are customers of airports, air control systems, and other
authorities such as immigration and customs.
Airlines therefore, regularly exchange information with airport
authorities and air traffic control systems. These flows include
requests for landing slots and docking gates, informing about
165
arrivals and departures, altering slots, declaring flight paths, and
coordinating operations. Handling a large amount of baggage on a
daily basis between a number of airlines and airports is also very
complex and all this is facilitated by extranet. This role of extranet
of interaction with customs, immigration, airport, Air Traffic
Control (ATC) and Civil Aviation Authorities (CAA) is very vital
and makes ICT a very important part of aviation commercial
activities.
Application of Computers in Other Transportation
Computers are very useful in transportation today. It is useful in
both land and air transportation. Following are the main uses of
computers in transportation.
Car navigation: One important use of computer in
transportation is Global Positing System, or GPS. This
features a screen that shows a map which tracks your
vehicle’s movement through satellite’s signals. These
pinpoint your location between 100 feet. Some mobiles also
have this system.
Positive train control: Positive Train Control (PTC) by
Federal Railroad Administration is the computer system that
tracks the movement of trains on various railways around the
country.PTC technology is capable of preventing train to
train collisions, derailments caused by excessive speed and
the associated death or injuries.
166
Mapping: Mapping system through computers is very useful
now. We can find the route of any location through this. We
input our address and destination address then computer will
give us visual map, distance, total driving time, traffic jams
etc.
Online booking: Tickets for bus, train and airplanes could
be booked online. This saves our time. Websites give us all
information regarding tickets in few seconds.
Application of Computers in Manufacturing Industries
The use of ICT could have several impacts on productivity. For
example, it might help more productive firms gain market share.
In addition, the use of ICT may help firms expand their product
range, customise the services offered, or respond better to client
demand; in short, to innovate. Moreover, ICT may help reduce
inefficiency in the use of capital and labour, e.g. by reducing
inventories. All these effects might lead to higher productivity
growth.
Investment in ICT might also have benefits going beyond those
accruing to investors in ICT. For instance, the diffusion of ICT
may help establish networks, which produce greater benefits (the
so-called spillover effects) the more customers or firms are
connected to the network. Moreover, the spread of ICT may
reduce transaction costs, which could lead to a more efficient
matching of supply and demand, and enable the growth of new
markets. Increased use of ICT may also lead to greater efficiency
in the creation of knowledge for quality production (Bartelsman &
Hinloopen, 2002).
Application of Computers in Administration/Management
ICT plays an important role for enhancing administration in every
respect.ICT facilitates three vital areas of administration, namely;
internal administration, planning and decision-making as well as
service delivery.ICT enables administration to be efficient and
167
effective by facilitating the three core areas of its functioning. It
helps administration perform its public functions by simplifying
the work processes and internal functioning via internal
computerisation and automation, thus fostering transparency and
accountability. Further, ICT facilitates policy formulation through
multi-stakeholders’ participation enabling administration to
incorporate the ideas and suggestions of professionals,
academicians, private sector, civil society organisations, media,
community and individuals in policy making. In addition, it
renders public goods and services to the people by making the
service delivery much more convenient, customer oriented and
cost-effective.
ICT Use in Government
There are data on the technologies available in the government
departments, but there are not many data on the electronic
services offered by the governments and on the uses of these
services by the public. According to (Robyn, 2001), in Australia it
was found that, by mid-1998, 89% of the federal departments had
a website; that 12% received and 33% placed orders via Internet.
The Survey of Electronic Commerce and Technology of Canada,
however, came up with data suggesting that in Canada the
government plays a lead role in Internet use. By 2000, 96% of the
federal and provincial government departments had a website and
these websites were reported to be more likely than their private
sector counterparts to offer interactivity with the public, digital
products, and online payments (Robyn, 2001).
According to Eru (2017), in Nigeria, it is observable that most of
the federal ministries, departments and agencies (MDAs) had a
website, as well as some states government. But the local
government areas rarely used one perhaps being mainly
dependent on their respective states. Even the existing ones for the
federal government, its agencies and commissions are seldom, not
168
fully explored. ICT is yet to be maximally utilised in
governments, especially in Nigeria.
ICT and the Economy
The rapid rise of electronic computing in the 20th century
changed the course of modern civilization. Although, many of the
effects have been positive, PCs have also affected lives in
undesirable ways. As computer technology continues to advance
and new generations of machines grow faster and have greater
capabilities, the machines become more deeply fixed in daily life,
magnifying both the benefits and the downside risks. Computer is
playing a very important role in the economy of any nation.
Nowadays, computers are mostly used in school, college, banks,
etc. In all fields, computer works very easily because today’s
computer technology is excellent as compared to old computers,
like in speed and size due to which it reduces cost of labour and
extra expenses.
This day’s business hugely depends upon the computer and all the
transactions made in the business nowadays directly or indirectly
relate to the computer for their completion. Computer possesses
an edge over manual working due to its speed and reliable results.
Now days, computer has become very much important in each
field which include economy as well. Most transactions these
days are computerized in order to get the maximum output.
Computers are used as control systems for a wide variety of
industrial and consumer devices. This includes simple special-
purpose devices like microwave, ovens and remote controls,
factory devices such as industrial robots, computer-aided design,
and general-purpose devices like personal computers and mobile
devices such as smartphones.
ICT is found to have a significant role in the process of
reallocation. Firms with high levels of ICT are more likely to
grow (in terms of employment) and less likely to exit.
169
William, Jenkins and Katz (2007) conformed that, firms in the top
two quintiles of ICT intensity grow around 25–30% faster than
other firms and are 4% less likely to exit. Labour and product
market regulation are also found to have a role in blunting these
forces of selection. That is, low-tech firms in highly regulated
economies are more likely to grow and survive than firms in less
regulated countries.
The Social Media and other Communications
New technologies are changing the postal world. The ICT
revolution has had a considerable impact on the postal sector.
These include e-mail, voice and video calls, etc.
Social media: Social computing is the use of computers and
digital vices such as smart phones to allow two or more people
to interact and collaborate via the internet. These are variously
referred to as ‘Web 2.0, online communication, etc’. Elements
of social computing include blog, wikis, Twitter, peer-to-peer
networks, photo and video networking, online business
networks, social networking, etc. Blogs are the most visible of
the social computing initiatives. They may be in the form of
online journals, which may regularly be published by an
individual or a small group through the web interface, and
focused either on a single topic or a variety of topics reflecting
interest of the authors. Entries are commonly displayed in
reverse chronological order. Many blogs provide commentary
or news on a particular subject; others function as more
personal online diaries. A typical blog combines text, images,
and links to other blogs, web pages and other media related to
its topic. The ability of readers to leave comments in an
interactive format is an important part of many blogs. Most
blogs are primarily textual, although some focus on art,
photograph, videos, music and audio. The activity of uploading
a blog is called ‘blogging’ and someone who keeps a blog is
referred to as a ‘blogger’.
170
Important blogs are blogger.com offered by Google, TypePad,
journalhub.com, wordpress.com, etc. The features that make
blogs different from other websites are as follows:
i. Content is published in chronological fashion, newest on
top. Often the articles are organized into categories.
ii. Content is updated more regularly.
iii. Readers have the possibility to leave comments as
feedback messages.
iv. Other authors can interact via trackbacks and pingbacks.
v. One or more ‘feeds’ like, Rich Site Summary (RSS) files
(which allows people to follow updates on the websites
such as news, music, blogs, etc), Atom or (Resource
Description Framework (RDF) files (used for conceptual
modeling of information on the web).
Benefits of social networking sites
1. Social networking sites help the people to interact with one
another.
2. They make good opportunities to find a job.
3. They are the perfect spot to meet new people who have the
same interests and passions.
4. They help to promote the business. E.g. Twitter.
5. They help to stay in touch with contacts.
6. These sites act as a platform to meet long lost friends and
classmates, etc.
Potential hazards of social networking sites
1. Security: The social networking sites display personal
information such as name, location and email address. But
there are some people who reveal their fake identity and use
the information for illegal activities. Therefore, it is always
advisable to avoid providing security threatening (sensitive)
information online.
171
2. Scams: There are a number of scammers on social networks
who may try to steal or use personal information of others.
3. Breach: It is possible for hackers to intrude into profile
through client interface and to steal the information to use for
illegal purposes.
4. Fraud: Social networking is based in relationships of trust.
Unfortunately, about 25% of the users accept friend requests
from total strangers and it may be a fraud.
Other Areas of Application of Computer
Petroleum industry: To analyze volumes of seismic data which
are gathered during oil seeking explorations to identify areas
where there is possibility of getting petroleum products inside the
earth.
Weather forecast: Weather forecast information can be made
available through computers which is very useful for
transportation especially air transportation. We can travel
according to the weather forecast given by computers.
Automobile industry: To do crash simulation of the design of an
automobile before it is released for manufacturing – for better
automobile design.
Structural mechanics: To solve complex structural engineering
problems to ensure safety, reliability and cost effectiveness. E.g.
Design of a large bridge has to ensure that the bridge must be
proper in various atmospheric conditions and pressures from
wind, velocity etc and under load conditions.
Meteorological centers: They use super computers for weather
forecasting.
Biomedical research: Atomic nuclear and plasma analysis – to
study the structure of viruses such as that causing AIDS, human
corona virus, etc.
172
For weapons research and development, sending rockets to
space, etc.
EXERCISE IX
173
CHAPTER TEN
INTRODUCTION TO INTERNET
AND ELECTRONIC MAIL
174
the speed is normally 100 or 1000mbps. Propagation delay is very
short in a LAN.
176
Independent computers connected to a server are called clients.
Most likely, your home or office computer does not provide
services to other computers. Therefore, it is a client.
Clients run multiple client software applications that perform
specific functions.
For example;
An email application such as Microsoft Outlook is client
software.
Your web browser (such as Internet Explorer or Netscape) is
client software.
Relationship between servers and clients
Your computer (client hardware) is running a web browser
such as Internet Explorer (client software).
When you want to surf the web, your browser connects to a
remote server and requests a web page.
The remote server (server hardware) runs web server software
(server software).
The web server sends the web page to your computer's web
browser.
Your web browser displays the page.
177
The World Wide Web (WWW)
WWW is a system of interlinked hypertext documents accessed
via the Internet. It is also called the Web. The Internet is the
physical computer network (computer, monitor, modem, cables,
phone lines, etc). Tim Berners-Lee, a software engineer, invented
the World Wide Web in 1991.The Web is a system of Internet
servers that support specially-formatted documents. These
specially formatted documents are text documents created in
HyperText Markup Language (HTML), a formatting language. In
conjunction with the World Wide Web, your web browser
interprets these text documents so they become web pages. Web
pages contain formatted text, graphics, sound, animation, and
video, allowing point and click navigation.
Before the Web, the Internet was mostly text-based. To use it, you
had to know lots of keyboard command prompts, making it
largely unusable to the average person. The World Wide Web
changed all that. These days, graphical user interface (GUI) has
taken over the day in the world of ICT, such that one can relate
with the computer (even on the web) interactively. Certain
terminologies related to the operations of the internet other than
the ones earlier discussed require explanation.
Basic Internet Vocabulary
Browser: Along with a computer equipped with a modem, you
need a piece of software called a web browser to navigate the
Web. A browser is a software program that allows you to view
and navigate through Internet pages. Internet Explorer, Mozilla
Firefox and Google Chrome are popular examples.
E-mail: E-mail means Electronic mail. Through the e-mail, one
can send and receive messages in various formats (letters, forms,
pictures, audios, videos, etc) once there is connection to the
Internet. Chatting is as well possible through email links.
178
Internet Service Provider (ISP): If you want to access the
Internet from anywhere you must have an ISP. An ISP is an
Internet Service Provider, a company that you pay to provide you
with a connection to the Internet. ISPs are in categories. Nextech,
AT&T and Cox are all examples of ISPs. In Nigeria, some of the
ISPs with high speed include; Cyberspace Limited, iPNX Nigeria
Ltd, Netcom Africa Ltd, Spectranet, MTN Group, and Glo.
To access the Internet, a user needs a computer equipped with a
modem and web browser, but the user also needs an ISP. For a
monthly fee (and an initial activation fee), one can purchase a
software package from an ISP. These packages feature different
levels of Internet access. Flat-rate service could buy one unlimited
hours, whereas a less-expensive hourly package buys limited
Internet access. In either case, the speed with which you access
the Internet factors into how much you pay per month.
The ISP software package usually includes:
Username: A unique name used to gain access to a computer
system.
Password: A combination of keyboard characters, used in
combination with a username, passwords allow access to
restricted computer information. It is important to keep
passwords secret.
Access phone number: For example, (+234) 902-210-1910.
If you connect to the Internet at work, you may be part of a LAN
(local area network) that shares network resources. To gain
Internet access, your employer contracted with an ISP.
DSL: A Digital Service Loop/Line connects your computer to the
Internet via a faster method of dial up.
Cable: Cable companies often offer high-speed access along with
cable TV. Cable Internet is a shared connection to the Internet
with the rest of your neighborhood. The more people have Cable
Internet, the more potential for slower access.
179
Wireless Fidelity (WiFi): This uses a receiver to connect your
computer to the Internet without any wires. Among other places,
libraries, some hotels and coffee shops offer wireless access to
people who bring their laptops.
Link or Hyperlink, which is a reference or navigation element
within a document or web page that leads you to another
document (visualize links on a chain connecting each other).
Search engine: A program that indexes millions of websites to
help users find relevant information by searching with keywords
and phrases. Popular search engines include Google, Ask, Yahoo,
Bing and Dogpile.
Web page: A single page/document found within a website. Just
like a book with pages, a website has web pages. Each webpage
serves a specific purpose.
Web address: Each web page has its own address on the Internet,
which is called a URL. You may type in a web address to search
the Internet. Like your home address, a web address is unique. For
example, just as there is only one 1409 Williams Great Bend, KS
67530, or 15, Katsina Ala Street, High Level, Makurdi, there is
only one www.google.com or www.gcflearnfree.org.
To recognize one another over the Internet, computers convert
human-friendly addresses like www.gcflearnfree.org to numerical
Internet Protocol (IP) addresses. You may type in either
216.119.102.26 (which is the GCFLearnFree.org’s IP address) or
www.gcflearnfree.org (a human-friendly domain name) to get to a
free learning website homepage.
Website: A website is the holistic web pages linked together to
form a single entity, which could be connected to the internet. It is
simply the collection of a website’s homepage and all other pages
of the site. It is also called web or site.
180
Graphical User Interface (GUI): A GUI (mostly pronounced
GOO-ee) takes advantage of your computer’s graphics (picture)
capabilities to increase ease of use. For example, the buttons you
point and click to surf the web is part of your web browser’s GUI.
Most operating systems include a GUI, such as Windows and Mac
OS. In the past, there was no pointing and clicking; rather, the
user had to know a command language to operate the computer.
As such, not everyone could use the computer as it is these days.
HTML (Hypertext Markup Language): The formatting
language used to create web documents.
Hypertext: The system of electronically linking words or pictures
to other words or pictures.
HTTP (Hypertext Transfer Protocol): You may have noticed
the http:// preceding URLs. For example:
http://www.gcflearnfree.org. The first part of the URL, usually
http, indicates the file type. HTTP, the system for transferring web
documents, defines how messages are formatted and transmitted
over the Internet.
Today, many people use the terms Internet and World Wide
Web interchangeably. For example, “I need to get on the Web.”
Or, “I need to get on the Internet.”
Connecting to the Internet
You start the browser (program for connecting to the Internet) by
clicking or double-clicking an icon on the desktop or taskbar, or
by opening the Start Menu and choosing Programs and then
choosing Mozilla Firefox (or other browser). The World Wide
Web can be thought of as a form of publishing. Instead of
publishing documents in a book, magazine, or newspaper, the web
publishes documents on a computer screen.
Anatomy of a URL (web address): Looking at the URL can give
you many clues as to the type of website you might be visiting.
181
For example, www.greatbendpl.info is a website for
GreatBendPublic Library majorly responsible for information
dissemination.
Domain name and extensions: Every website URL (or domain
name) has an extension. The extension indicates the type of the
website and perhaps the primary domicile of the website. For
instance, http://mimtech.edu.ng is the URL for Marvel Institute of
Management and Technology, an educational institution located
in Nigeria. www.inec.gov.ng is the web address for Independent
National Electoral Commission, Nigeria’s highest electoral body,
a government parastatal. Most popular website extensions are
highlighted below.
Examples of domain name extensions
The .com extension: Used for a commercial website.
The .net Extension: used for a network website (can also be a
commercial or personal site).
The .gov Extension: Used for a website belonging to government
ministry, agency or parastatal.
The .org Extension: Usually used for a non-profit organization
website.
The .mil Extension: Used for US military website.
The .edu Extension: Used for registered/recognized educational
institution’s website (e.g., college or university).
The .info Extension: Used for informative Internet sources.
The .int Extension: Used for internet.
The .biz Extension: Used for business.
The http:// part of a website URL indicates that you are dealing
with web pages instead of other Internet services (usually you
don’t have to type it). The http stands for Hypertext Transfer
Protocol. The www indicates World Wide Web. Taking the
example of the Great Bend Plc above, the greatbendpl is the
organization operating the server (publishes the information), and
182
the info indicates an informative source. Each web document is
known as a web page. Often you can’t see the whole page at one
time on your screen. That is why we have different web pages
linked together. One can open and navigate a page of a particular
website by scrolling. Scrolling lets you move up and down to see
the rest of your page. You can also get to another web page by
clicking a link (pointer will become a hand or link will change
color). For example, under Services, then click on Adults (notice
it becomes a hand when it can be clicked). The title bar appears at
the top of the browser, displaying the name of the program and
the name of the current web page. Below the title bar, you will
find the Menus.
Title Bar
From the above figure, the name of the program in this case is
Mozilla Firefox and the name of the current web page is Free
183
Downloads Encyclopedia - Softpedia). The website address is
http://softpedia.com.
Each menu provides a list of commands to modify the browser’s
operation. Below the menu bar, you will find the address box.
This is where the URL can be typed. Just left click once inside the
long box and press backspace to delete the current address. When
you see the flashing cursor you can type there (or you can just
type over the current URL once it is completely highlighted).
Once the address is entered, click the search or Go icon to the
right-hand side of the address bar, or simply hit the Enter key on
the keyboard.
Tool buttons appear in various places. Some buttons are dim or
freeze, indicating the buttons are not available because the
conditions are not right for them to operate. Once the user is in the
environment where the condition is appropriate for their
operations, such buttons will automatically become activated. On
your screen it is possible that the Forward button is dim. If so,
why do you think it’s not available for clicking? Sometimes you
get as far as you want by clicking links and want to return to
where you started. Click the Back button as many times as it takes
to get back to a particular website's home page (you will notice
that now your Forward button is no longer dim, but your Back
button is).
To find out what a tool button does, you can place your mouse
cursor (without clicking any buttons) and let it hover over a
particular button. In a matter of seconds, a small text box will
appear telling you the function of the button.
Typing in a New URL: You can visit a website by typing the
address. For example, you can read many newspapers online. For
example, the Topeka Capital-Journal is available online. To view
the paper, begin by clicking the address line near the top of the
screen. The address turns dark to indicate it has been selected,
once the current address is selected (or highlighted), you can type
184
over it. Now, type www.cjonline.com and then press Enter (on
the keyboard). If you don’t know an address, you can use a
search engine like Google or Yahoo to confirm the correct URL.
Click on the View menu. Slide the pointer down over the words
Text Size. A blue bar leads to a submenu displaying a choice of
text sizes. Think of the blue bar as a bridge. Slide your mouse
along the blue bar to choose a new size.
Be careful to keep your mouse steady on the blue bar. (You don’t
want to fall off the bridge!) Adjust the size until you find the size
most comfortable for you to read (this may not help for every
website). Once you have reached the Topeka Capital-Journal
website, note the subjects near the top (e.g., News, Sports, Life,
and Opinion). Many newspapers have a similar setup. Find the
Mars pages by clicking News.
Performing a Search with Yahoo: Search engines like Yahoo
and Google can help you find websites when you don’t know the
address. Click on the address box so that it is selected and type
www.yahoo.com then press enter. To search for Benue State
University Makurdi, type Benue State University Makurdi in the
search box, and press enter or click Search. The results in blue
are links that you can click, but you may notice that the first of the
results are “sponsor results.” Skip those and try to find the official
website for Benue State University Makurdi.
Using Google
Google, much like Yahoo, is another search engine that is used as
a tool for finding resources online. Google scans web pages to
find instances of the keywords you have entered in the search box.
It is also the most popular search engine and indexes the most
web pages, which means you will get more results when you
search.
Searching for Newspapers: Go to www.google.com and try to
find other online newspapers (e.g. New York Times, Nigeria’s
185
Daily Times, Sun, or Wall Street Journal). Once you have entered
a keyword or words click enter. Google also offers the I’m
Feeling Lucky option that automatically takes you to the website
it thinks you want (based on the keyword you entered) without
returning a list of results.
Maps: There are many different map services available online,
including MapQuest, Yahoo maps, and Google Maps. Click on
the Maps links at the top and click Get Directions.
188
under only perfect conditions. Again, service can be somewhat
unreliable (busy signals, spontaneously terminated sessions, etc).
2. ISDN (Integrated Services Digital Network): This is faster
than 56K dial-up, but every ISP does not support ISDN. Other
advantages include:
i. Can provide 2-4 times the speed of a 56K modem.
ii. Uses digital rather than analog signals to transmit data.
Disadvantages:
i. Requires special equipment that can drive up your cost.
ii. Data is not compressed so transmission rates can be
comparable to 56k-at more cost.
iii. May be replaced by other technologies.
3. DSL (Digital Subscriber Line): Newer technologies such as
DSL use an ISP to connect to the Internet and allow faster
connections.
Advantages:
i. Can fall back to slower speeds if the line cannot handle the
modem’s fastest speed.
ii. Uses the existing phone line in most cases.
iii. Does not tie up existing phone line, leading to “always on”
access.
iv. More bandwidth results in improved streaming
audio/video, online games, application programs, telephone
calling, video conferencing and other high-bandwidth
services.
v. Can connect multiple computers on a single line.
vi. Faster than a 56K dial-up modem.
Disadvantages:
i. Availability - limited to homes/businesses with a dedicated
copper wire running between it and the phone company's
nearest central office.
ii. Cost - includes installation fees and monthly charges.
189
iii. Need a firewall to ensure home network security
(additional cost).
iv. Service is not infallible.
4. Cable Modem: Cable modems, another newer technology
that uses an ISP to connect to the Internet, allows faster
connections.
Advantages:
i. Uses coaxial and/or fiber-optic cable rather than phone
lines for data transmission, so performance doesn't depend
on your distance from a central cable office.
ii. Can fall back to slower speeds if the line cannot handle the
modem’s fastest speed.
iii. Convenient for homes already wired with cable access.
iv. Does not tie up existing phone line, leading to “always on”
access.
v. More bandwidth results in improved streaming
audio/video, online games, application programs, telephone
calling, video conferencing and other high-bandwidth
services.
vi. Can connect multiple computers on a single line.
vii. Faster than a 56K dial-up modem.
Disadvantages:
i. Availability - limited to homes/businesses with cable
access.
ii. Cost - includes installation fees and monthly charges.
iii. Often requires commitment to a cable TV package.
iv. A firewall is necessary to ensure home network security
(additional cost).
v. Service is not infallible.
Browser Basics
Every Internet user is supposed to be familiar with basic tools
such as the Back button, Forward button and Address bar among
others.
190
Quick review of web browser basics:
To return to the last page you viewed, click your Back
button.
To return to the page you visited before you clicked the
Back button, click the Forward button.
Click the drop down menu to the right of the back and
forward buttons to view and select from a list of recently
visited sites.
To visit a web page, type the URL in the address bar and
click the Go button or simply hit the Enter (Return) key on
your keyboard.
Cache
Have you ever started typing your favorite website’s address,
and the entire address displays? Or, have you tried clicking the
address bar’s dropdown menu to display a list of sites you have
recently visited?
191
Fig.10.7: Back and forward button’s dropdown lists of recently
visited websites
If you have used any of the methods listed above to surf the Web,
you are using your web browser’s cache.
Your web browser stores recently visited sites (as temporary
Internet files) on your computer's hard disk. When you revisit
your favorite sites, the browser displays the pages from the cache
instead of requesting them from the web server. This makes
surfing the web faster and easier.
Refreshing and Stopping Web Pages
While using your browser’s cache may increase ease of use, you
may not be getting the most up-to-date information a site has to
offer. To do so, you need to refresh, or reload, a web page.
Refreshing requests fresh pages from the web server rather than
from the cache stored on your machine’s disk.
194
Fig.10.8: The Standard buttons bar
The Address bar displays the address, or URL, of the web page
you are currently visiting. Type new URLs or search terms into
the Address bar.
195
The Status bar, located at the bottom of the IE window, indicates
when a website is found, loading, waiting for reply, or if you have
a secure connection. It is always a good idea to display the Status
bar, particularly for security reasons.
198
Customizing the Standard Button Bar:
You can further customize the Standard button toolbar by
adding or removing Standard buttons. You can even change
the appearance of your buttons.
Add or remove a button from the Standard button bar:
Choose View Toolbars Customize from the IE menu
bar.
OR
Right-click the toolbar and click Customize.
The Customize Toolbar dialog box opens.
In the left-hand scroll box, there is a list of Available
toolbar buttons.
In the right-hand scroll box, there is a list of Current
toolbar buttons.
In either scroll box, click to select a button you would like
to add or remove.
Click the Add or Remove button.
The button is now added or removed from the toolbar.
Click Close to display new options.
199
Fig.10.16: Options for customizing Toolbar
To change the text options featured on your buttons:
With the Customize Toolbar dialog box open, click the
Text Options drop down box to select No text labels,
Show text labels, and Selective text on right.
Click Close to display new options.
To change the size of your button icons:
With the Customize Toolbar dialog box open, click the
Icon Options drop down box to select Small icons or
large icons.
Click Close to display new options.
Setting a Home page
Your home page is the first page you see when you start Internet
Explorer (IE). Change your home page to make surfing the Web
easier and more convenient.
For example, if you want to start each Internet session with
GCFLearnFree.org, http://www.gcflearnfree.org should be your
200
home page. If you like to check the weather every time you log
on, you might prefer http://www.weather.com as your home page.
To change the Home Page:
Choose Tools Internet Options from the IE menu bar.
The Internet Options dialog box opens.
201
Fig.10.16(b): Changing the IE Home page
Access Favorites
When surfing the Web, you have probably found a number of
sites you'd like to return to in the future. You can keep track of
your favorite sites without having to remember long URLs using
the Favorites feature.
This feature comes with some pre-existing Favorites you may or
may not find useful. You can access, add to, find, and organize
your Favorites.
To access Favorites from the IE menu bar:
Choose Favorites from the IE menu bar. (Ctrl + I)
A Favorites list appears. You may need to click the double
arrow at the bottom of the list to expand your choices.
Click a Favorite to go to that web page.
202
Fig.10.17: Accessing Favorites from the IE menu bar
To access Favorites from the IE Explorer bar:
Choose View Explorer bar Favorites or click the
Favorites button on the toolbar.
The Explorer bar opens and the Favorites list appears.
Click a Favorite to go to that web page.
To hide the Explorer bar’s Favorites list:
Click the Favorites button again to hide the Explorer
bar. (Ctrl + I)
OR
Click the X in the upper right of the Explorer bar.
203
Fig.10.18: Hiding the Favorites list of Explorer bar
Add to Favorites
To add to Favorites using the IE menu bar:
Go to the page you want to add to your Favorites. For
example: http://www.gcflearnfree.org.
Choose Favorites Add to Favorites from the IE menu
bar.
The Add Favorite dialog box opens.
The page title appears in the Name text box. For example:
"Welcome to GCFLearnFree.org Community Center."
Change the page title if you wish. For example, "GCF"
may be adequate.
Click OK to add it to your Favorites list.
204
Fig.10.19: Add to Favorites
To add to Favorites using the IE Explorer bar:
Click the Favorites button on the toolbar.
The Explorer bar opens and the Favorites list appears.
205
To Organize Favorites:
Click the Favorites button.
The Explorer bar opens and the Favorites list displays.
Click a Favorite you want to organize.
Drag and drop any Favorite into a pre-existing folder.
206
Fig.10.20(b): Organizing Favorites
Creating New Folders
You may need to create new folders in order to keep your
Favorites organized.
To Create a New Folder:
Click the Favorites button. The Explorer bar opens and
the Favorites list displays.
207
Fig.10.21: Adding Favorite
Click the New Folder button.
The Create New Folder dialog box opens.
Name the folder and click OK.
208
OR
Click the Favorites button on the toolbar and click the
Organize button.
The Organize Favorites dialog box opens.
Click the Create Folder button.
A new folder is created, ready to be renamed.
209
Fig.10.23: Renaming a Favorite
OR
Use the Organize Favorites dialog box.
OR
To Delete a Favorite:
In the Explorer bar’s Favorites list, right-click a
Favorite. Choose delete from the shortcut menu.
A confirmation message appears. Choose Yes.
OR
Use the Organize Favorites dialog box.
210
History
Using the History feature, you can find pages you have recently
visited in the last few days.
To see a list of pages you’ve recently visited:
Click the down arrow at the end of the Address bar.
To view, click any site from the list.
211
Fig.10.25: Hiding the History list of Explorer’s bar
Customizing your History List
You can specify how many pages are saved in your History list.
To specify how many pages are saved in the History list:
Choose Tools Internet Options from the IE menu bar.
Click the General tab
In the History area, change the number of days that the
History list keeps track of your pages.
Click the Clear History button to clear your history and
temporarily free up disk space on your computer.
212
Fig.10.26: Clearing History and specifying its duration
Search
You can also look for web pages using the Search function.
For ease of use, IE offers a couple of ways to search.
215
Fig.10.29: Saving a picture from Internet
To save pictures:
Go to the web page that features a picture you want to
save.
Right-click the item you want to save. The shortcut menu
opens.
Choose Save Picture As from the shortcut menu.
The Save Picture dialog box opens.
The default save location is My Pictures. Click the Save
in drop down box arrow to navigate to a new save location.
Rename the image in the File name text box if needed.
Click Save.
216
Fig.10.30: Saving a picture to a My Picture folder
To set a web page image as desktop wallpaper:
Go to the web page.
Right-click the image, choose Set as Wallpaper from the
shortcut menu.
It will be saved in the list as Internet Explorer wallpaper.
Minimize the window. Your new wallpaper should display.
Each new graphic you set as wallpaper will replace the
old one.
To edit wallpaper:
Choose Start Settings Control Panel.
Double-click the Display icon to open the Display
Properties window.
Click the Background tab and adjust image settings.
217
Copying and Pasting Text
You can save specific text from web pages for later reference. For
example, if you want to save content from a site that features
regularly changing content, (an online newspaper, for example);
you might want to copy and paste text.
To copy and paste text from a web page:
Go to the web page.
Select the text you want to copy.
Choose Edit Copy from your web browser's menu bar or
right-click the text and choose Copy from the shortcut
menu.
Open another application, such as Word, for example.
Choose Edit Paste from the menu bar or right-click and
choose Paste from the shortcut menu to paste the text into
the document of choice (for example, a Word document).
Emailing Links
While surfing the Internet, you may come across an interesting
site you want to share with friends or family. There are several
different methods of sending a web page via email.
To cut and paste a link:
Go to the web page.
218
In the Address box, select the URL. For example:
http://www.gcflearnfree.org.
Right-click and choose Copy from the shortcut menu.
Open your email program.
Compose your email message.
Right-click the body of the email message, and choose
Paste from the shortcut menu.
Send the message.
219
Fig.10.33: Sending a link in e-mail
You need to specially configure your e-mail program for the send
a link in email method to work.
Print a Web Page
Let’s say you need to print a web page, such as a map, for offline
reference.
To print a web page:
Choose File Print. The Print dialog box opens.
Set printing options as you normally would.
To print a frame or item in a web page:
Right-click the frame or item. The shortcut menu opens.
Choose Print, Print Frame, or Print Target.
The Print dialog box opens.
Set printing options as you normally would.
220
Fig.10.34: Printing a web page
For a full explanation of printing and the Print dialog box, see our
self-paced Office 2000 course.
Work Offline
You can revisit useful web sites whether or not you have an
Internet connection available. Using the Work Offline feature,
you can view web pages without connecting to the Internet.
To View Web Pages Offline:
Go to the site you want to visit later.
Add it to Favorites.
Before you disconnect from the Internet, choose Tools
Synchronize from the menu bar.
The Items to Synchronize dialog box appears.
Click Synchronize.
221
When you want to work offline:
Choose File Work Offline.
Open Favorites.
View the pre-set page offline.
222
Mouse Pointer: Displays when you roll your mouse over
images that are not linked.
Finger: Displays when you roll your mouse over text and
images that are linked.
When your mouse pointer becomes the insertion point, you can
double-click any text or image to highlight it. You can highlight
text if you have difficulty seeing the insertion point.
223
Fig.10.36: Increase text size
Changing Font
Sometimes, changing the font can increase readability.
To display text in a different font:
Choose Tools Internet Options from the menu bar.
Click the General tab.
Click the Fonts button.
In the Web page font and Plain text font lists, click the
fonts you want.
Note: Graphics cannot be resized or changed in any way using a
web browser. For example, the GCFLearnFree.org logo is a
graphical image. It cannot be changed using the browser.
224
Changing Color
While changing text size and font can increase readability, so can
the use of color. Those with low vision and/or color blindness
may have difficulty viewing certain colors. However, web
designers don't always take this into account when determining
font colors, sizes, and background colors.
To change how page colors are displayed:
On the Tools menu in Internet Explorer, click Internet
Options.
On the General tab, click Colors.
The Colors dialog box appears.
Change the color settings as needed.
226
beside your computer, this is a blatant security risk. Don't
keep an electronic list of passwords on your computer,
particularly if you use a laptop.
Password Don’ts
Don't let anyone look over your shoulder while you type
in your password. Think the woman standing behind you
while you use the ATM is too close for comfort? She may
be. Also, don't knowingly give your password to anyone.
The purpose of a password is that no one but you can log in
and start using your account.
Don’t use a “one size fits all” password. Don’t use the
same password for your separate accounts. For example,
use different passwords for your employer’s computer
network, voicemail, ISP, web mail, etc, for security
reasons.
Don’t choose a password that can be easily traced to
you. For example, using your birth date, social security
number, phone number, the name of your spouse, child,
relative, pet, etc is a bad idea.
Don’t use well-known abbreviations. For example,
ASAP (as soon as possible) or NATO (North Atlantic
Treaty Organization) is far too familiar (and short, for that
matter) to make a solid password.
Don’t use words that can be found in the dictionary.
Hackers use dictionaries as a tool to discover passwords.
That goes for foreign dictionaries as well.
Never use your username as your password. Or your
name, for that matter. This is the easiest password to crack.
227
Creating a Good Password
By now, you already know a lot about creating a password, but
you may be at a loss for what password you will use next. Using
the following steps, create a good password.
First, create a sentence or phrase.
For example: In Tallahassee Playing Piano for Grandpa
March 4.
Next, base your password on that phrase.
Your password would look like this:itpp4gpa34
It is easy to remember, ten characters, a combination of
letters and numbers based on a phrase, cannot be found in
the dictionary, is not a common acronym, and the
information is not personal. (I do not live in Tallahassee,
and cannot play piano for anyone including my grandpa, in
March or any other time).
Do not use the example just given as your password.
Remember, it is on public display, available to anyone.
E-Commerce
These days, you can buy books, clothing, toys, tickets, and more
on the Internet. Online shopping is called e-commerce. You
usually buy goods and services online using a personal credit card
or debit card. An electronic purchase form may look something
like what is shown on Table 10.1.
228
Table 10.1: Sample of an Electronic Purchase Form
First Name
Last Name
Password
Confirm Password
Street Address
City
State
Zip
Shipping Address
City
State
Zip
Expiration Date
229
Have you ever wondered what happened to that information once
you click “send” after completely filling it? Is the information
secure as it travels over the Internet?
Secure Sockets Layer (SSL)
Most security measures involve passwords and data encryption.
Data that is “encrypted” is just a fancy way of saying that data is
turned into secret code. To read an encrypted file, you have to
have access to a secret key or password.
What is SSL Technology?
Many e-commerce websites use SSL technology, an encryption
method and industry standard, to protect the security of your
credit card.SSL transfers information securely across the Internet.
Once your browser connects to the web server, sensitive
information is “scrambled,” or “encrypted”, while being
exchanged. This way, a third party can’t intercept the data.
How can you be sure SSL is in effect?
First, check your browser window. Depending on your
browser, if you see an unbroken key or lock symbol , SSL is
active, or in effect. If you are using a Netscape browser, look at
the lower left corner after accessing the server. For Internet
Explorer, look at the lower right corner after accessing the
server.
You can also make sure SSL is in effect by looking at your
browser’s URL address box. When accessing a secure web server,
the first part of the URL will change from http:// to https//:.
Next, check the Certificate. Double-click on the lock symbol
to view the security certificate. Make sure the certificate is
“Issued to” the Website and the “Valid from” dates are current.
230
Fig.10.39: Viewing security certificate
128-bit and 40-bit Encryption
What is the difference between 128-bit and 40-bit encryption?
Without getting technical, the main difference is that 128-bit
encryption provides a significantly greater amount of protection
than 40-bit encryption. Roughly speaking, 128-bit encryption is
millions of times stronger than 40-bit encryption. Your web
browser should have at least “128-bit encryption.”
231
Verify your security level
For Netscape, choose View Page Info from the menu
bar.
For Internet Explorer, choose File Properties from the
menu bar.
For Mozilla Firefox, choose Menu Privacy
Protections.
With the increasing computing power of potential criminals,
greater level of security is becoming more necessary. 128-bit
encryption remains a very strong method of security for the
foreseeable future. If you have any doubt about a website’s
security level, consider placing your order by phone.
Privacy Tips
While you shouldn’t be afraid to make an online purchase, you
should be informed on how the online retailer will use your
personal information.
When filling out an online order form, don't blindly fill in
every blank field. Instead, look for the fields that are required to
make the purchase. (Sometimes marked by an *asterisk* or
different color.)
Read the order form. Watch out for areas that are “pre-
selected” for your convenience (such as checkboxes); you may
end up with a lot of unwanted email. Ever wondered how those
“spammers” got your email address?
Create a free web mail account and use it as for “junk
mail.”(Yahoo and Hotmail are just two examples of sites that
offer free web mail.) When retailers require an email address, use
your junk mail account rather than your personal ISP email
account. That way, if you receive a lot of spam, you can simply
create another junk mail account.
232
Look for links such as Help, FAQ, About Us, Customer
Service, Privacy Policy, or Privacy and Security.
Ensure that the site has the prefix “https://” and not the usual
“http”//”. The letter “s” in the earlier implies security. Not all
websites are secure for supply of your account credentials.
When you arrive at that page, look for answers to questions
such as:
What kind of information do they collect?
How do they use my information?
Do they share my information with third parties?
How do I access my information? How do I update or
delete my information?
How do I remove my information from email, phone, and
postal mailing lists?
Do they use cookies? (Learn more about cookies in the
next lesson.)
Cookies
Many e-commerce websites use cookies. A cookie is a small file
that a web site puts on your hard drive so it can remember
something about you at a later time. For example, a cookie may
contain information (such as a unique user ID) that is used to
track the pages of the sites you have visited.
While cookies may seem like an invasion of privacy, they can
improve your online experience. Cookies allow you to
“personalize” web sites, such as a personalized MSN or Apple
start page. They may also save you some time. You don't have to
type the same information into a frequently used site over and
over again. Cookies help keep track of your order, and certain ads
or products display because of what you've purchased in the past,
etc.
233
Controlling Your Cookies using Netscape or IE
Depending on your web browser, you may turn cookies on or off,
or alerted when a cookie is placed on your hard drive. See your
browser’s Help menu for more information.
To turn cookies on:
Netscape Navigator/Communicator 4.7:
Choose Edit Preferences from the menu bar.
Select Advanced from the left-hand menu.
Select Accept All Cookies.
Click OK.
For Netscape 6.2:
Choose Edit Preferences Privacy & Security
Cookies Enable all cookies.
Internet Explorer 5.0 for PC:
Choose Tools Internet Options from the menu bar.
Click the Security tab.
Click Custom Level at the bottom of the window.
Scroll down to Cookies.
Two options display: “Allow cookies that are stored on
your computer” and “Allow per-session cookies (not
stored)”
Select Enable for both.
Click OK.
234
Electronic Mail (E-Mail)
Most people use the Internet primarily to email and surf the Web.
Simply put, e-mail is the process of sending and receiving
messages over the Internet. While email is similar to a traditional
mail system, or “snail mail,” it is also very different.
Table 10.2: Snail Mail vs. E-mail
Packet:
In what is it
Envelope, etc A piece of text delivered over the
delivered?
Internet
Sender: Sender:
Who is it from?
Simon Ayegba Simon Ayegba
Recipient: Recipient:
Who is it for?
Nathaniel Eru Nathaniel Eru
235
After reading your email, you can save it, forward it to others, or
delete it. If you want paper copies, you can print your email
messages.
Anatomy of an Email Address
An email address is required to send and receive email. Email
addresses are different from “snail mail” addresses. They usually
consist of three parts: a user name, an “at” symbol (@), and a
domain name. Using the e-mail address, [email protected], for
example;
1. User name: erunatty located to the left of the @ symbol, a
user name identifies your account on the email server that
handles the email. For example, Eru Nathaniel might
choose “erunatty” as his username. However, someone
may have already chosen erunatty, so have some other
choices ready. Choose a username that sounds professional
and is easy to remember.
2. He symbol “@” means “at” and separates your account
name and the name of the mail server. For example,
erunatty “is located at”gmail.com.
3. Domain Name: gmail.com. The domain name usually
consists of two pieces of identifying information. The first
piece is the name of the email server and is located to the
right of the @ symbol. For example, gmail is the name of
the email server (Google mail server). The second piece,
usually a three-letter extension, indicates the top-level
domain (.com). They are separated by periods, called
“dots.”
Consider choosing a username that protects your identity instead
of your first and/or last name.
236
Top Level Domain
Top-level domains may help you figure out the type of
organization the recipient is associated with. If there is a two-
letter extension, it is usually a country code. For example, Nigeria
uses “ng”, Malaysia uses “my”, Canada uses “ca”, Australia uses
“au”, and so on.
Table 10.3: Examples of Domain Names and Extensions
A company or www.microsoft.com,
.com
business www.yahoo.com
Nigerian www.nitda.gov.ng,
.gov
Governmental agency www.statehouse.gov.ng
Educational www.uam.edu.ng,
.edu
institution www.bsum.edu.ng,
ISP or Network
.net www.earthlink.net
Provider
Since not everyone uses top-level domains correctly, they are not
always a reliable way to determine an organization’s association.
237
Email Clients
To send and receive email, both the sender and recipient must
have the right tools: an Internet connection, an email client, and
an email address.
An email client (sometimes referred to as a composer) is
software that runs on a personal computer, and relies on an
Internet connection to perform some of its operations.
Email clients work with any ISP (Internet Service Provider) that
uses standard Internet email protocols. These protocols make it
possible for people using different email client software to
communicate with one another. For example, if one uses
Microsoft OutlookTM, he/she can send and receive email with
someone who uses QUALCOMM EudoraTM.
To set up your email client correctly, you need:
POP3 (Post Office Protocol, version 3) server address
SMTP (Standard Mail Transfer Protocol) server address
Your Internet service provider gives you this information.
Free web mail accounts, such as Hotmail or Yahoo, rely on an
Internet connection and use an email client that appears in a web
page. Additional email client software is not required.
Difference in Email Clients
Most email client software allows you to:
Display a list of received messages. Each message header
shows you who sent the mail, the subject line, the time and
date it was sent, and at times, the size of the message.
Select the message header and read the message.
Create new messages.
Reply to, forward, and delete messages.
238
“Attach” files (called attachments) to messages you send.
Save the attachments you receive.
Some email clients offer:
Address book/Contacts: Use the electronic address book
to track personal information such as name, title, email
addresses, home and work addresses, phone numbers, and
much more.
Newsgroup functionality: You can use your email client
to access Usenet, an online public bulletin board system
(BBS). Usenet features a broad range of discussion topics
called newsgroups.
Calendaring: Schedule important dates, appointments,
tasks, and electronic reminders.
The E-mail Client Window
Today’s powerful email clients feature a user-friendly interface.
The colorful icons and drag-and-drop capability can help manage
email and improve your experience.
The first time you open your email client, many items you see will
look familiar. A few things are specific to your email client, so be
sure to read the Help file. Pictured below is the Microsoft
OutlookTM window.
239
Fig.10.40: Outlook Express Inbox
Main features of an e-mail client window
The e-mail client window is endowed with so many bars and other
functions.
Menu Bar
The menu bar contains a list of options to manage and customize
email. Using the View menu, you can change the display of the
email client window. For example, you can sort email messages
(most recent messages, by sender, by unread messages, and more)
and show/hide toolbars.
Toolbar
Toolbars may be customized to display most commonly used
tools.
Inbox
The INBOX displays a list of received messages. Each message
header shows you who sent the mail, the subject line, the time
and date it was sent, and at times, the size of the message.
240
Preview Pane
Click a message header once to preview a message without
opening it. Many email clients let you show, hide, or resize the
folder list and panes.
The Email Message Window – Sending a New Message
We use the email message window to compose and send email
messages.
To send a new message:
Once you have opened your email client's window, click
the New Mail or Compose button.
243
Fig.10.45: Sending a New Message with e-mail body
Send and Receive
Now that you can compose a new email message, you may want
to send your message. That is easy; just click the Send button.
244
Click on “Attach” on the Toolbar.
Specify the location of the file and select it; this process can
be repeated for multiple attachments.
Wait until the file(s) are successfully attached on the new e-
mail window.
The select “Send” to send the message to the recipient(s)
after entering recipients’ details correctly.
Usually, sent e-mails are delivered to the recipients’ Inbox folder.
The messages are normally arranged in chronological order of
arrival (the last message is the first and on top of the list – This is
called the Last-In First-Out (LIFO) procedure).
Replying to an e-mail message
Now that you can check your email, you will need to know how
to reply to a message.
To reply to an email message:
Check your email.
Open the (new) message.
Read the message.
Click the Reply button. (Or, click Reply All to send a copy
to everyone who received the original message).
247
Fig.10.47: Forwarding an e-mail message
When to Forward E-mail Message
Email is reliable, immediate, and often informal. However, there
are some email “do’s and don’ts” you should be aware of.
When forwarding, you have a few options:
1. Include all text: Include all quoted text from the previous
message, type your response, and click Send.
2. Quote the text (delete some text): Delete additional text
that is not relevant to your response. Add new information
at the top of the message as needed. This way, you don't
have to needlessly retype information, and the recipient
knows you understood their initial message.
3. Copy and Paste text into a new email message window:
Instead of forwarding, you can copy and paste a message
(or its part) into a new email message window.
248
Newsgroups
Besides the WWW, there are other sources of information on the
Internet. USENET is an international bulletin board system
(BBS) that features discussions on any topic imaginable. These
discussion topics are called newsgroups.
A newsgroup is an online “place” where people chat about
anything and everything. There are over 14,000 newsgroups used
by millions of people each day. Want to meet others who have
hiked the Appalachian Trail? Are you a fan of a particular
television program? Chances are, you will find a newsgroup that
suits your interests.
Newsgroups can be a great resource. Anyone can read and post
questions/answers, thoughts, and opinions. In many cases, no one
moderates the discussions. Be forewarned, anyone can say
anything. That does not mean you should, though. Professionals
often use newsgroups to network electronically.
Accessing Newsgroups
To view and post messages to a newsgroup, you need a
newsreader. A newsreader is a program that connects you to a
news server on the Internet.
Your email client may be a newsreader.
Some web browsers, such as Internet Explorer and
Netscape, come with newsreaders.
There are freeware, shareware, or commercial software
newsreaders available.
You can configure your system to handle USENET newsgroups.
Follow the instructions appropriate to your system and software.
Unlike e-mail, which is usually “one-to-one”, the Usenet is
“many-to-many”. Usenet is the international meeting place, where
people gather to meet their friends, discuss the day’s events, keep
249
up with computer trends or talk about whatever maybe on their
minds.
Mailing Lists
Much like bulletin boards, mailing lists are a great way to share
knowledge and information with a group. However, mailing list
messages are accessed using an email client. Professionals often
use mailing lists to network electronically with other professionals
in their field.
For instance, you are the head of a committee and oversee 15
volunteers. You need to communicate with your volunteers once
or more times a week, but only meet once a month. Volunteers
often need to contact one another.
You decide to set up a mailing list to help your group
communicate more efficiently. A mailing list is a list of email
addresses identified by a single email address called a mailing
list name.
For example, [email protected] (the mailing list name)
consists of members’ email addresses (your email address and
each volunteer’s email address). To receive mailing list email,
members subscribe to the list.
Mailing list members include:
1. Moderators “own” the mailing list. They often start the
mailing list. A good moderator not only reads and regulates
messages, but also prompts members with discussion
topics and questions when needed.
2. List members subscribe to the mailing list. They can read
and post messages to the mailing list, and unsubscribe at
any time.
When email is sent to that mailing list name, the message is sent
to a server that handles the mailing list. The server sends copies
250
of a message to all the members. They check their email, read
new messages, and post replies to the mailing list.
Mailing List Advantages and Disadvantages
There are many advantages and disadvantages associated with
mailing lists.
Advantages:
There are mailing lists available on almost any topic.
Learn and share information.
Read about tips, tricks, opinions, and events that interest
you.
Meet others who share your interests, are in your same line
of work, etc.
Some lists are moderated, meaning there is someone
appointed as moderator to keep the discussion on topic.
Some lists are sent in a “digest” format. Periodically, you'll
receive an email message containing several messages.
Disadvantages:
If a mailing list has even 100 members, it can generate a lot
of email. Do you have time to read it all?
Some lists are not moderated, and discussion can quickly
get off-topic.
251
EXERCISE X
252
7. Write short note on the “impact 0f social media on
young people of today”
8. Juxtapose the following with relevant examples in
each case:
(a) Website and Internet
(b) Webpage and Home page
(c) Intranet and Extranet
(d) Web browser and Search engine
(e) Online and Real-time processing.
253
CHAPTER ELEVEN
254
3. Adaptability – should be malleable and flexible, as well as
accommodating. Can adjust (adaptable) to variety of work
environments.
4. Analytical Skills – Computer professionals are scientists
and must possess logical ability; methodical and meticulous.
5. Attention to details/Accuracy – should have precision
ability, paying attention to details (even when requirements
seem unnecessary).
6. Commitment to learning/Abreast with current trends –
should always be ready to, and follow developmental trends
in the profession and perhaps, other disciplines.
7. Communication Skills – should be able to communicate
and relate concepts well with people/audience.
8. Problem-solving/Troubleshooting capabilities – must be
able to diagnose system faults, errors and failures, then
analyse and troubleshoot them.
9. Competence – must be proficient and effective in his chosen
area of the professional.
10. Technical Writing Skills – should have practical industrial
and technological abilities in proposal designs, project plans,
contracts and scripts writing.
11. Aptitude for Mathematics – a major prerequisite for
candidates admitted to study any course in the profession is a
minimum of credit pass in Mathematics amidst other criteria;
thus, mathematics is a fundamental criterion for the
profession. The mathematical skills enable critical analytic
and ease programming ability among others.
12. Ability to memorise – should not have memory failures;
should have retentive memory, not volatile.
255
13. Trustworthy – should show reasonable level of
dependability and uprightness. Veracity is the key here.
14. Reliability – should acquire the attributes of trustworthiness,
thus should be relied upon.
15. Disciplined – must be principled/ethical, not irrelevant but
follow standards in executing tasks
The Computer Professionals
Computer professionals are individuals who have acquired
necessary mental and charactertraining. The entry level for all
computer professionals is a bachelor’s degree (B.Sc., B.Sc.(Ed.),
B.Tech., B.Eng., or a Higher National Diploma (HND). Suitable
fields of study for this career include:
(i) Computer Science;
(ii) Computer Engineering;
(iii) Software Engineering;
(iv) Computer Information Systems;
(v) Information Technology;
(vi) Management Information Systems (MIS);
(vii) Hardware Engineering;
(viii) Web Design;
(ix) Multimedia Technology;
(x) Networking;
(xi) System Security; and other allied specializations.
Additional IT certification may be required for some positions.
It is however, unfortunate that quackery has taken over the IT
profession, nowadays. This was why Eru (2020a) in a piece
reported the NCS Benue State Chapter’s call for a renewed
collaboration among IT firms to eliminate quackery in the
profession in the Benue state. Collaboration between all the IT
firms, which ensures that only registered members of the
profession are allowed to practice, discourages quackery.
256
Hence, to avoid quackery and demarcate boundaries within the
profession and among other professions, the following are
computer professionals and their basic responsibilities:
1. Computer Systems Analyst: The computer systems analyst,
also known as business technology analyst, is an IT professional
who specializes in analyzing, designing and implementing
information systems. He is a person who uses analysis and design
techniques to solve business problems using IT. As such, he
assumes the position of the system project manager. Although, he
may be familiar with a variety of programming languages,
operating systems, and computer hardware platforms, he may not
normally involve himself in the actual hardware or software
development.
The systems analyst works in collaboration with the business
analyst, as they share some overlapping responsibilities. While a
business analyst will evaluate the business need and identify the
appropriate solution and, to some extent, design a solution without
delving too deep into its technical components, relying instead on
a systems analyst to do so. Some dedicated professionals possess
practical knowledge in both areas (business and systems analyses)
and manage to successfully combine the tasks of both
occupations, effectively blurring the line between business
analysis and systems analysis.
Other functions of a Systems Analyst include:
(i) Assessment of suitability of information systems in terms
of their intended outcomes;
(ii) Liaison with end-users, software vendors and
programmers in order to achieve the outcomes;
(iii) Systems analysts may serve as change agents who
identify the organizational improvements needed, design
systems to implement those changes;
(iv) Developing cost analysis, design considerations, staff
impact amelioration and implementation timelines.
257
(v) Involvement in the modification of codes and review of
scripts;
(vi) Preparation and coordination of the stages of system
development life cycle (SDLC);
(vii) Training of others to use the new system.
2. The System Architect: Computer systems analysts research
the hardware and software that are part of an organization’s
computer systems in addition to the ways in which the systems are
being used. They need to as well analyze the work been done by
an organization to identify the ways in which it can best be served
by a computer system.
3. Programmer: Also referred to as the software developer,
software engineer, systems programmer, or computer
programmer, this is a computer professional tasked with designing
and creating software programs, integrating systems and software,
training end-users, analyzing algorithms, modifying source-code,
writing system instructions, debugging, and maintaining operating
systems. In addition to his degree certification, a Programmer
should have the following skills:
(i) End user-oriented.
(ii) Expert IT skills.
(iii) Strong aptitude for mathematics.
(iv) Advanced knowledge of operating systems.
(v) Analytical and problem-solving skills.
(vi) Java, C++, SQL, C#, and HTML experience.
(vii) Aptitude for learning new technology.
(viii) Deadline driven.
(ix) Superior communication skills.
The basic responsibilities of a Computer Programmer include:
(i) Coding and debugging;
(ii) Designing and testing computer structures;
(iii) Troubleshooting system errors;
258
(iv) Writing computer instructions;
(v) Managing database systems;
(vi) Maintaining operating systems;
(vii) Editing source-code;
(viii) Profiling and analyzing algorithms.
4. Testing Engineer: He is also called the software tester,
system tester or simply tester. The role of a software test engineer
is to coordinate the process for analyzing software programs. This
process will involve creating and implementing testing methods,
recording the test results, and providing recommendations to
improve software programs based on the results. As a software
test engineer, you can work for a variety of companies. If you
work for a government agency or contractor, you may need to
obtain a security clearance level.
The basic skills required of a Testing Engineer include:
(i) Thorough understanding of creating, implementing, and
maintaining software programs.
(ii) As a technical position, he will also need a sense of
creativity.
(i) When faced with a programming issue, he must be able
to develop an alternate solution.
(ii) He should have strong communication skills in order to
serve as part of a technology team.
The duties of a Software Test Engineer include:
(i) Excellent technical skills in areas such as programming
languages;
(ii) Collaborating with organizational management to
streamline operations;
(iii) Utilizing programming languages to create testing
scripts;
(iv) Documenting software testing procedures;
259
(v) He is tasked with evaluating the organization’s technical
infrastructure for security issues;
(vi) He could also be tasked with working with team
members to develop software programs that meet
business needs;
(vii) He is responsible for interfacing with end users to
ascertain areas of improvement, such as cost reduction
solutions and automation solutions.
5. Computer Design Engineer: This is also called the graphic
designer (not graphics artiste).His competencies include; technical
knowledge, hardware design, software design. The specialties of a
computer design engineer are; hardware engineering, software
engineering and software programming. Usual tasks involving
Computer Engineers include:
(i) Writing software and firmware for embedded
microcontrollers;
(ii) Designing very large scale integrated circuit (VLSIC)or
chips;
(iii) Designing analog sensors, designing mixed signal circuit
boards;
(iv) Designing operating systems.
6. Database Designer and Administrator: Though, the
position of a Database Designer could be combined with the
Database Administrator (DBA), this is a computer professional
basically responsible for the design, management and
maintenance of databases. While the system administrator works
collaboratively with them, the database designer creates databases
and the DBA manages the databases.
The key responsibilities of a Database Designer include:
(i) Creation of databases, as a primary responsibility;
(ii) In-depth understanding of the organization or system for
which a database is to be designed;
260
(iii) Training of support staff in the areas of design
language/tools.
Key responsibilities of a Database Administrator include:
(i) To ensure that data is available, protected from loss and
corruption, and easily accessible as needed;
(ii) Software installation and maintenance: DBA usually
collaborates on the initial installation and configuration
of a new database server (Oracle, SQL Server, etc);
(iii) The DBA installs the database software and configures
it for use, after the system administrator sets up
hardware and deploys the operating system for the
database server;
(iv) As updates and patches are required, the DBA handles
this on-going maintenance;
(v) If a new server is needed, the DBA handles the transfer
of data from the existing system to the new platform;
(vi) Data extraction, transformation, and loading
(ETL):This refers to efficiently importing large
volumes of data that have been extracted from multiple
systems into a data warehouse environment;
(vii) Cleaning up and transformation of the external data to
fit the desired format so that it can be imported into a
central repository;
(viii) Specialized data handling: Handling of unstructured
data types such as images, documents, or sound and
video files, additional monitoring and tuning to
maintain efficiency;
(ix) Database backup and recovery: DBAs create backup
and recovery plans and procedures based on industry
best practices, then make sure that the necessary steps
are followed;
(x) He may persuade management to take necessary
precautions to preserve data, since data backups cost
time and money;
261
(xi) In the case of a server failure or other form of data loss,
the DBA will use existing backups to restore lost
information to the system. With recent changes in
technology, it is becoming more typical for a DBA to
backup databases to the cloud; Oracle Cloud for Oracle
databases and MS Azure for SQL Server;
(xii) Data security: A DBA needs to know potential
weaknesses of the database software and the company’s
overall system and work to minimize risks. In the case
of a security breach or irregularity, the DBA can
consult audit logs to see who has done what to the data.
Audit trails are also important when working with
regulated data;
(xiii) Authentication: DBA controls who has access and what
type of access they are allowed, as well as what data
each user can have accessed to. For instance, a user
may have permission to see only certain pieces of
information, or they may be denied the ability to make
changes to the system;
(xiv) Capacity planning: The DBA needs to know how large
the database currently is and how fast it is growing in
order to make predictions about future needs. Storage
refers to how much room the database takes up in
server and backup space. Capacity refers to its usage
level. If the company, for instance, is growing quickly
and adding many new users, the DBA will have to
create the capacity to handle the extra workload;
(xv) Performance monitoring: Monitoring databases for
performance issues is part of the on-going system
maintenance a DBA performs. If some part of the
system is slowing down processing, the DBA may need
to make configuration changes to the software or add
additional hardware capacity. Many types of
monitoring tools are available, and part of the DBA’s
262
job is to understand what they need to track to improve
the system. Third-party organizations can be ideal for
outsourcing this aspect, but make sure they offer
modern DBA support;
(xvi) Database tuning: Performance monitoring shows where
the database should be tweaked to operate as efficiently
as possible. The physical configuration, the way the
database is indexed, and how queries are handled can
all have a dramatic effect on database performance.
With effective monitoring by DBA, it is possible to
proactively tune a system based on application and
usage instead of waiting until a problem develops;
(xvii) Troubleshooting: DBAs are on call for troubleshooting
in case of any problems. Whether they need to quickly
restore lost data or correct an issue to minimize
damage, a DBA needs to quickly understand and
respond to problems when they occur.
7. Website Designer: Web designer is an IT professional
primarily saddled with the responsibility of designing websites
and perhaps, hosting of same. The position requires strong
proficiency in graphic design and computer programming.
The duties of a Web Designer include:
(i) Writing and editing web contents, designing layout,
understanding technical requirements, updating sites,
backing up information and troubleshooting or fixing
problems;
(ii) He develops and creates the look, layout and features of
websites and associated applications;
(iii) Web designers work closely with development managers to
keep sites up-to-date and relevant to their audience;
(iv) He should have knowledge of web design software, such as
Dreamweaver, Photoshop, Adobe Illustrator, and Paint
263
Shop Pro, JavaScript, and basically, hypertext markup
language (HTML);
8. Hardware Engineer: Computer hardware engineers
research, design, develop, and test computer systems and
components such as processors, circuit boards, memory devices,
networks and routers. In addition, a Computer Hardware
Engineers typically do the following:
(i) They design and oversee the production of computer
hardware equipment;
(ii) They design and develop the software systems that control
computers;
(iii) They design and test circuits and other electronic
components, test work and refine processes, test and re-test
parts to ensure they work properly;
(iv) They identify and isolate defects;
(v) Designing new computer hardware, creating schematics of
computer equipment to be built;
(vi) Analysis of the test results and modification of the design
as needed;
(vii) Updating existing computer equipment so that it will work
with new software;
(viii) Many hardware engineers design devices used in
manufactured products that incorporate processors and
other computer components and that connect to the
Internet. For example, many new cars, home appliances,
and medical devices have Internet-ready computer systems
built into them;
(ix) Computer hardware engineers ensure that computer
hardware components work together with the latest
software. Therefore, hardware engineers often work with
software developers. For example, the hardware and
software for mobile phones and other devices frequently
are developed at the same time.
264
9. Quality Control Engineer: Also called Quality Assurance
(QA) Engineer, the system quality control engineer is an IT
professional with the following proven skills:
(i) Work experience in software development, software
quality assurance, and strong knowledge of software QA
methodologies, tools and processes;
(ii) Experience in writing clear, concise and comprehensive
test plans and test cases;
(iii) Hands-on experience with both white box and black box
testing as well as with automated testing tools;
(iv) Solid knowledge of SQL and scripting;
(v) Experience working in an Agile/Scrum development
process;
(vi) Experience with performance and/or security testing is a
plus.
The QA Engineer is tasked with the following responsibilities:
(i) Reviewing quality specifications and technical design
documents to provide timely and meaningful feedback;
(ii) Creating detailed, comprehensive and well-structured test
plans and test cases;
(iii) Estimating, prioritizing, planning and coordinating quality
testing activities;
(iv) Design, develop and execute automation scripts using open
source tools;
(v) Identify, record, document thoroughly and track bugs;
(vi) Perform thorough regression testing when bugs are
resolved;
(vii) Develop and apply testing processes for new and existing
products to meet client’s needs;
(viii) Liaise with internal teams (e.g. developers and product
managers) to identify system requirements;
(ix) Monitor debugging process results;
(x) Investigate the causes of non-conforming software and
train users to implement solutions;
265
(xi) Track quality assurance metrics, like defect densities and
open defect counts;
(xii) Stay up-to-date with new testing tools and test strategies.
10. Production Engineer: Also called manufacturing or
industrial engineers, production engineers focus on improving
how companies manufacture their products with the use of
technology. The production engineers’ role serves to help the
company produce its products at an affordable cost without
negatively impacting quality. They work closely with
manufacturing personnel and may focus on a particular area, such
as repairs. This work requires a technical degree and the ability to
use design software and work with various production systems.
The duties of Production Engineer include:
(i) To investigate the company’s current manufacturing
processes to make things faster;
(ii) Determining how many people to put on an assembly line,
configuring and adjusting the software that runs plant
equipment and assisting with training production workers;
(iii) Production engineer’s implement automation and quality
control measures;
(iv) Deciding how to produce new products.
267
7. Ensuring high computing professional ethics and
professionalism - standards, discipline etc;
8. Determining academic standards in computing – computer
science, computer engineering, information science, etc;
9. Accreditation of institutions, courses and programmes and
the evaluation of certificates in computing;
10. Conducting professional examinations in computing by
liaising with associations/bodies external to the Council;
11. Publicizing activities of the Council;
12. Publication of the register of Computer Professionals and
other computing professional works – journals, books,
magazines, newsletters, etc.
Computer Professionals [Registration Council] of Nigeria (CPN)
works in partnership with the Nigerian Computer Society (NCS),
Federal Ministry of Education (FME), Nigerian Information
Technology Practitioners in America (NITPA) in order to bring
about an International dimension to the nation’s quest for IT
development. Additionally, CPN is in partnership with the
Nigerian Information Technology Development Agency (NITDA)
for the realization of the comprehensive implementation of the
Nigerian Information Technology policy as well as several other
bodies, ministries, departments and agencies (MDAs).
Functions of the CPN
1. To determine standards of knowledge and skills: As a
professional body, it is expected from the CPN to determine
the standards of knowledge and standards of skills that is
needed to be possessed by all the persons, who are willing to
go into the profession of computing. The standards are being
reviewed and improved upon as the need arises.
2. To maintain register of registered professionals: The
establishment of a register that contained the names of all the
registered professionals in computing is a function of the
CPN. Only those Professionals registered under Degree No.
268
49 are permitted to practice computing profession in the
country. The Computer Professionals Registration Council
of Nigeria is also mandated to make sure that every name of
every registered computing professional is published
regularly.
3. To carry out other functions assigned to the council: Apart
from the statutory functions of the Council, it is expected of
CPN to carry out other functions granted to it, provided, such
functions will assist the Council in actualizing its mandate.
4. To organize and control practice of computing: Every
professional organization has its sole responsibility of
monitoring the activities of the professional body, as well as,
regulating the conducts of its members. The CPN is not
exempted. The Council organizes, as well as, controls the
computer practice in Nigeria.CPN must make sure that every
practising member complies with the ethics of the
profession.
5. To supervise computing profession in the country: Apart
from controlling the activities of the professional body, CPN
was also saddled with the responsibility of supervising the
profession of computing in the country. The reason why this
supervision is necessary is obvious. It is to handle issue
regarding computing professionals derailing from the actual
ethics of practising the computing profession in Nigeria.
6. To screen persons who intend to register as professionals in
computing profession: As a professional body, the CPN also
sees to it that every person who intends to register as
professional in computing profession with the professional
body are qualified to practice the profession in Nigeria, by
way of proper screening. Such individuals must get the
needed credentials to qualify them for the registration.
7. To screens and registers every corporate organization: CPN
is to also screen all the corporate organizations. These
organizations screened by the CPN must be those corporate
269
organizations that may want to take part or involved in the
selling of computing facilities or want to even use these
facilities. In screening these corporate organizations, the
CPN must also make sure that these corporate organizations
screened are registered too. It is also expected of the CPN to
offer these corporate organizations computing professional
services within the country.
The Nigeria Computer Society
The Nigeria Computer Society (NCS), simply called the ‘Society’
is the umbrella organization of all information technology
professionals, interest groups and stakeholders in Nigeria. Formed
in 1978 as Computer Association of Nigeria (COAN), and
transformed into NCS in 2002 as a result of harmonization with
other stakeholder and interest groups, NCS is the national
platform for the advancement of information technology science
and practice in Nigeria.
Functions of the NCS
While establishing the NCS, the Society was assigned with a
number of functions as follows:
1. To promote education and training of computer: Although
the NCS promotes education and training of computer, it
also promotes information scientists, computer engineering,
and information architects. NCS also promotes IT as well as
IT system professionals.
2. To encourage research in order to advance computer and
information sciences: NCS functions in the area of
encouraging research work for the purpose of advancing
computer and information sciences, information technology
and system, as well as, practices. NCS also encourages the
dissemination of results of scientific works that are carried
out within Nigerian industries, and the Nigerian military and
education sector in the country.
270
3. To promote interchange of information about sciences and
information processing: This is another area by which, the
NCS takes responsibility. NCS must make sure that there is
the promotion of the interchanging of information, provided
it has to do with sciences and also the arts of information
processing and information management among members of
the public, as well as specialists in the field.
4. To develop competent members and encourage integrity:
Competence and integrity on the part of staff members of an
organization are the strength of such an organization. It is
also the duty of the NCS to ensure that, members uphold the
very ethics of the profession, just as it is contained in the
Code of Conduct of the Nigeria Computer Society and the
Code of Practice of the Nigeria Computer Society.
5. To promotion and protection of professional interest: It is
incumbent on the part of every profession to promote its
professional interest, as well as, protection of the interest of
its members. This, however, has been one of the functions of
the NCS. It always makes sure that it promotes the
professional interest of the profession, and also protects its
members’ interest.
6. To advise governments and members and other competent
authorities: The NCS also undertakes advisory services. The
NCS will have to advise its professional members, the
government, other competent authorities within its
jurisdiction of power, as well as, the general public. The
NCS’s advice must relate to computing. Therefore, the
Society advice is always on the local and international policy
matters, which have to do with computing, and information,
as well as, system technology industry. This was why Eru
(2020b)quoted the Chairman, NCS Benue State Chapter as
advising the Benue State government, saying; “For
sustenance of the project, you need to ensure that everyone
271
working with you on the BenGIS project and other IT
projects in your ministry is licensed”
7. To build global affiliation to corporate with professional
organizations: Building global affiliation is another area of
function. The purpose of building this affiliation is to
cooperate with other professional bodies with similar
professions across the globe. The NCS also receives and
renders services, and as well, reciprocate these services,
provided these services are beneficial to it and are being
consistent with the aims of the NCS.
8. To position itself to represent members of the Society: NCs
is meant to serve as representative of its members. In most
cases, however, the NCS positions itself to represent the
members of the public. This is true for the NCS because they
always served as a representative of the members of the
public, while in every negotiation and every consultation
with the federal government of Nigeria or the state
government, even the local government, including their own
agencies on some matters or policies that have to do or that
affect the conduct of computing and the practice of
computing. Other areas that such policies may affect are
information technology and also system profession as well
as, industry.
9. To contribute to the formulation of policies related to
computing: Every policy that relates to computing and
information technology and also relates to system profession,
calls for the NCS to make some inputs. Therefore, the NCS
will make a contribution any time there is a need for policy
formulation relating to computing. The other area of
contributions made by the NCS is that it contributes when
there is a need to develop and assess educational, as well as,
training curricula, provided they relate to the profession of
computing.
272
NCS Interest Groups
Interest groups are recognized bodies registered under the NCS to
deliver services on behalf of the Society, following its mandate, as
applied in diverse areas that IT professionals are represented.
According to NCS (2020), the following are the NCS interest
groups:
1. Information Technology Industry Association of Nigeria
2. Internet Service Providers Association of Nigeria
3. The Institute of Software Practitioners of Nigeria
4. Nigeria Women In Information Technology
5. Nigerian Information Technology Professionals in the Civil
Service
6. Information Technology Systems and Security Professionals
7. Academia Information Technology Profession
273
which Internet service providers can address issues of common
interest and interface with industry stakeholders so that end-users
receive world-class service and industry participants earn a fair
return on their investments.
The Institute of Software Practitioners of Nigeria
Institute of Software Practitioners Of Nigeria (ISPON) is the apex
body of computer software and related services industry
inNigeriagrowthofthesoftware-
drivenITindustryinNigeria.Although, the ISPON is non-profit
making organization, the organization was established in the year,
1999. ISPON is the industry professional body for indigenous
software developers and practitioners in Nigeria. Established in
1999 with the aim of creating an enabling environment for local
content developers,she has been in the forefront of championing
the advocacy for the application and utilization of locally
developed software in order to boost the country’s economy and
gross domestic product (GDP).The ISPON was formed with a
particular purpose in the hearts of those who founded the
organization. That is why some specific functions were assigned
to the organization.
Membership of the association cuts across different categories
tailored to fit a diverse range of software developers, software
testers and software users.Among the numerous functions of
ISPON are:
(i) Engendering and promoting trade in software in
Nigeria.Benefits of professional associations go both ways,
what members can come together to do for the profession
and what the association can offer to members. What
ISPON offers to its members include but are not limited to:
information (access to cutting edge information on the
local and international software industry),certification
(opportunity for certification to be a preferred vendor or
technology contractor with MDAs or organizations in the
274
private sector), career placement (providing information on
jobs in top information systems companies and corporate
recruiters as well as allow members to post their resumes),
education discounts (information on select programmes
with our partner tertiary institutions and professional
certification bodies), networking (opportunity to deepen
existing business relationships and make new contacts with
others who have common interests and similar business
concerns), speaking/presentation (ISPON members have
opportunity to speak at various ISPON events, and serve
on the board of various government policy bodies).
(ii) ISPON promotes software technology and research.Every
organization that that intends to fly and make headway in
its business and must promote its business, and advertises
its business within the jurisdiction of its influence, and that
is exactly what ISPON stands for.The major aim and object
of the ISPON is to make sure that it works, whichever way
it can to promote technology, and also promotes research.
The research work promoted by the ISPON must have
direct relations to software development, and other aspects
of technology, provided it helps in driving the mandate of
ISPON.
(iii) Promotes and supports Nigeriantrade interest and
exportation. ISPON does this by way of promoting
exportation business in Nigeria; that is, where the Nigerian
made products are being exported to other countries of the
world.In this case, we are talking about the promotion of
exportation of software products that are made in Nigeria
and other services to the international markets.
(iv) Collaborates with relevant agencies and NGOs.The ISPON
is involved in the process of making sure that it sought for
supports and collaboration from renowned agencies such as
United Nations (UN) and other related agencies. This is for
the purpose of attracting software researchin software and
275
for the purpose of bringing in some level of developmental
projects into the country.
(v) Encourages educators in developing innovative techniques
in training programmes. It is the primary function of the
ISPON to encourageeducators in the area of developing
innovative techniques in education and training
programmes.This actually ties to another major aim of the
ISPON, which of course, is for the purpose of ensuring
that, the Nigerian software, including technology education
allows students in this area to acquire quality training, such
that will help them or make them compete favourably, with
equal footing at a world class level.
Nigeria Women In Information Technology
Nigerian Women In Information Technology (NiWIIT) is a
special interest group of the Nigeria Computer Society
(NCS).NiWIIT is positioned to be a premier organisation known
to successfully cultivate mutually beneficial networks between
industry, academic and government with a focus on women
working in the information technology across the nation, Nigeria.
NiWIIT is evolutionary, visionary and acknowledged as an
industry peak body that delivers a high standard of value to all its
members.
Nigerian Information Technology Professionals in the Civil
Service
Nigerian Information Technology Professionals in the Civil
Service (NITPCS)is an NCS interest group that promotes
professionalism, provides conducive environment for continuous
career development and progression, as well asprotection of
member’s interest and condition of their practice. Its mission isto
enable the government to drive the IT, components of IT polices
and professionalize “IT” practice in Nigerian civil/public service.
276
Information Technology Systems and Security Professionals
Information Technology Systems and Security Professionals
(ITSSP)is an interest group of the NCS that works as an advocacy
group on information security. By focusing on security awareness,
company education and training, crime and faults tracking,
structure development, capacity building, collaboration and
affiliation, man power compliance and enforcement.
Academia Information Technology Profession
Academician in Information Technology Profession (AITP) is a
coordinating group for all those who are involve in teaching and
research in the field of Information Technology (IT) working in
tertiary intuitions within and outside Nigeria who are ready to
associate with the group.AITP is an association of academia with
the common goal of fostering research and development in
addition to promoting interest of members. It is an interest group
of the NCS. The National Executive of NCS approved the
creation of the interest group on June 3, 2015.
Nigeria Internet Group
The Nigeria Internet Group (NIG) was established in the year
1995 with the sole aim of promoting online transactions; that is,
the Internet in Nigeria. The NIG is as a non-governmental
organization (NGO), and as such, it is non-profit organization.The
mandate of the NIGwas to promote internet in Nigeria.To achieve
this mandate, the NIG has to engage itself in numerous activities,
and some of these activities were the policy advocacy, and
awareness creation, including education awareness creation.The
NIG carried out its activities through seminars and conferences
and exhibitions, other ways of carrying out its education programs
include, workshops as well as publication of newsletters.
277
Functions of the Nigeria Internet Group
Based on then above mandate, the Nigeria Internet Group (NIG)is
saddled with numerous responsibilities as highlighted thus:
1. The NIG carries out education awareness programmes about
internet in Nigeria.
2. The NIG contributes to government’s policies related to
internet. Some of the government policies and legislation
that NIG has made contributions to include; the NITDA Act,
the EFCC amended Act, the Cyber-security bill, and the
National policy on Telecom, as well as, the Telecom Acts.
3. Promotion of Internet as a tool for development: The NIG is
also saddled with the responsibility of promoting Internet as
a medium for development. The NIG has reasoned that,
Internet could serves as a tool for development, and such
development include, personal development and national
development. Hence, it is poised to promote Internet in the
country, given the import of Internet or information and
communication technology to individual or a nation
development. The truth however, remained that, for any
nation to advance in this technology era, Internet or ICT
must be embraced by such nation and its citizenry.
4. Makes provision or all Nigerians to access internet. Internet
has remained a veritable tool for development in every
country of the world, and so, for Nigerian citizens to
embrace such tool for their personal development and the
development of Nigeria. It becomes incumbent on the part of
the NIG to promote and as well, make provision for every
Nigerian citizen to access Internet and understand the
working of the ICT to the development of the Nigerian state.
5. Sensitization of government about the numerous potentials
of internet to development. It has been one of the functions
of the NIG to ensure that the government of the Federal
278
Republic of Nigeria is well sensitized about those potentials
Internet can offer for the development of Nigeria.
6. Promotes and champions the development of local internet
content and the promotion of same in the country. The NIG
achieved this objective by adopting services, such as,
Internet services. The services include; e-Entertainment, and
e-Government and e-Commerce, e-Health, and e-Learning
among others.
7. Promotes formulation of appropriate legislation and policies
for the growth of internet in Nigeria. It has been the function
of the NIG to ensure that, formulation of appropriate policies
are promoted, and that include appropriate legislation too for
the purpose of developing internet in the country. The NIG’s
aim behind this function is to help drive the growth of
Internet in Nigeria.
8. Creates and adopts appropriate standards and enforces
compliance. Besides the NIG’s function of promoting the
creation and adoption of best standards in the operation of
Internet in the country, it is its duty to ensure that, these set
out standards are adhered to; in other words, it is the
responsibility of the NIG to enforce compliance to these set
out standards.
Code of Ethics and Professional Conduct
Every profession has ethical codes of practice, which herein is
referred to as code of ethics and professionalconduct.Eru (2020a)
quotedDr. Simon Yange to have said that the only way to
eliminate quackery in the IT Profession was to adhere strictly to
the code of ethics and practice of the profession.
The scope of the term “computer ethics” varies considerably. It
can include such social andpolitical issues as the impact of
computers on employment, the environmental impact
ofcomputers, whether or not to sell computers to totalitarian
governments, use of computersby the military, and the
279
consequences of the technological and thus economic
divisionsbetween developed countries and poor countries. It can
include personal dilemmas aboutwhat to post on the Internet and
what to download.
In a presentationon “Ethics andcode of conduct for IT
professionals”, Dr. Onyeukwu Charles Chijiokecharged members
of the profession to uphold the ethical behaviors as published by
both the NCS and theCPN.Dr. Chijiokefurther stressed the
importanceof work ethics in any given profession;
saidorganizations can only excel when thegiven ethical principles
regulating theconduct of members are adhered (Eru, 2020a).
The Computer Professionals (Registration Council of Nigeria)
sets and enforces the standards of competences, conduct and
ethical practice for the Information Technology Profession in the
Federal Republic of Nigeria. The Council so established by
Decree 1993, promulgated as Decree No. 49 on June 10, 1993,
promulgated and circulated the code of ethics and professional
conduct.
Furtherance to the above, CPN (n.d.) stated that,the impact of the
use of computational machinery and techniques related thereto on
the public, employees and clients, and the professionals in the use
of such machinery themselves is well known and need no further
expatiation.It is such that there are now expectations, and
justifiably so, of standards of competence and conduct from the
Profession as exist in the older professions of law, medicine,
architecture and pharmacy. This is exemplified by this except
from the address of the Honorable Minister of Science and
Technology at the 7th Annual General Meeting of persons, who
have been registered to practice the Profession in the country, by
the Computer Professionals (Registration Council of Nigeria),
held on September 27, 2001.
“…knowing how to drive a car is not enough for one to
call himself a driver. In order not to constitute a risk to
280
himself, as well as other road users, a driver should be
appropriately licensed before he could be allowed to
drive.”
The message here is clear, that it should be ensured that those
who intend to live by the use of computational machinery and
techniques related thereto meet some set standards of
competence and conduct.
The Computer Professionals (Registration Council of
Nigeria) as well as members of the Profession recognize this
as well as the effect it could have on the advancement of the
knowledge of Computer Science and the use of
computationalmachinery and techniques related thereto. This
is why they have adopted a two pronged approach, usual in a
situation of this nature; set standards of technical capability
(knowledge and skills) which members much satisfy, and
prescribe standards of conduct to which members must
conform or be held accountable for any lapse.
The Computer Professionals (Registration Council of
Nigeria) in the course of its duty as contained in the Decree
establishing it, Computer Professionals (Registration Council
of Nigeria) Decree 1993 section 2 (1) (a), has set standards of
competence that must be met by members, reviewing these
from time to time as circumstances permit. This takes care of
the first aspect of the approach. As to the second, the
members of the Profession, like their counterparts in other
professions, have formulated rules to define the behaviour
expected of each and every member in everyday professional
life. These they have put together as a Code of Ethics and
Professional Conduct, and adopted at the 7th Annual General
Meeting of members, held on September 27, 2001.
The Code of Ethics and Professional conduct is a product of
hard work, consultation, and reference to works and similar
codes from several bodies, local and international, relating to
281
the computing and other professions. These include the
following:
1. British Computer Society Code of Conduct;
2. British Computer Society Code of Practice;
3. Association of Computer Machinery Code of Ethics and
Professional Conduct;
4. Association of Information Technology Professional
Code of Ethics of Engineers (USA);
5. National Society of Professional Engineers Code of
Ethics of Engineers (USA);
6. Institute of Electric and Electronic Engineers Code of
Ethics of Engineers;
7. Australian Computer Society Code of Ethics;
8. Computer Association Of Nigeria (COAN), now Nigeria
Computer Society (NCS) Code of Ethics, Conduct and
Practice for Computer Professional (Draft);
9. Proposed International Federation of Information
Processing International Code of Ethics;
10. Harmonization of Professional Standards;
(http://www.ifip.or.at/minutes/C99/C99_harmonization.
htm);
11. Code of Conduct for the Nigeria Institute of Architects;
12. The Art of Computer Programming I: Fundamental
Algorithms; D. Knuth.
It therefore deserves recognition not only on its own merit but
also on the basis of the fact that it is now, by its endorsement by
the Council, the Code of Conduct that every member of the
Profession is under obligation to observe.
As provided in the Decree, the Code of Ethics and Professional
Conduct is enforceable in that continued membership of the
Profession depends on strict adherence to it, and not being a
member of the Profession implies forbiddance from practicing the
Profession in the country.
282
The Code of Ethics of Computing Profession
The Profession that uses computerized machinery and other
techniques related thereto is a learned one, of which members are
expected to exhibit the highest standards of competence, honesty
and integrity. The tremendous impact of the use of computational
machinery and techniques related thereto on the quality of life is
now common knowledge, to the extent that it has become difficult
to imagine a contemporary would without these means. It is
imperative, therefore, that services provided by members of the
Profession be carried out under a criterion of excellence in
professional behaviour requiring the adherence to the highest
standards of ethical conduct, and that they be dedicated to the
safety, health and well-being of the public.
Every IT professional is expected to recite this; In recognition of
this state of affairs, and having being registered and licenced to
practice the Profession, in the country, I acknowledged that I have
an obligation to:
1. The public, therefore I shall have utmost regard for its safety,
health, and well-being.
2. My employer or client whose trust I hold, therefore, I shall
serve him faithfully and loyally, endeavouring to discharge
this obligation to the best of my ability, guarding his interest
and advising him wisely and honestly.
3. Fellow members of the Profession, therefore I shall uphold the
ideals of the Profession cooperating with fellow members and
treating them with honesty and respect at all times.
4. The Profession, therefore I shall acquire, maintain and
improve professional competence, promote the advancement
of Computer Science as well as the understanding, effective
and efficacious deployment of computational machinery,
computerized machinery and techniques related thereto, and
enhance the prestige of the Profession.
5. My country, therefore, in my personal, business and social
contacts, I shall at all times uphold my nation, respect and
283
honour the chosen way of life of fellow citizens, be law
abiding, transparently honest, of unquestionable integrity, and
utmost responsibility and reliability.
CPN Code of Professional Conduct
Following the code of ethics as highlighted,an IT professional is
obligated to the public, the employer, fellow members, the
Profession, and the country.
Obligation tothe public: In recognition of his obligation to the
public, theprofessional shall:
(i) To the best of his ability ensure that the products of his
efforts will be used in socially responsible ways, will meet
social needs and will avoid harmful effect on life and
property;
(ii) Be alert to and make others aware of any potential damage
to the local or global environment by developments in his
area of expertise;
(iii) Ensure that within his area of expertise he has knowledge
and understanding and conform to, relevant standards and
recognized good practice, and encourage his subordinates
to do likewise. He shall approve only those professional
documents that are in conformity with applicable standards
and shall not complete forms, sign or seal plans, designs or
specifications that do not conform. Should his employer or
client insist on such unprofessional conduct, he shall notify
the proper authorities and withdraw from further
participation in the endeavour;
(iv) Give comprehensive and thorough professional
evaluations, stating where relevant impacts of related
endeavour, products, systems or services including analysis
of possible risks. He shall strive to be perceptive, thorough,
and objective when evaluating recommending and
presenting product descriptions and alternatives, and hence
provide objective, credible evaluations to employers,
284
clients, users, and the public and not take advantage of the
lack of knowledge and experience of others;
(v) If his judgement, after thorough assessment of the issue
under consideration including seeking second opinion
where necessary, is overruled under circumstances that the
alternative course of actionendangers life or property, he
shall notify his employer or client. Should such employer
or client not act to mitigate the danger,he shall notify such
other authority as may be appropriate, to help correct the
problem and eliminate or at worst reduce the risk;
(vi) Not reveal data or information entrusted to him without the
prior consent of the client or employer except as authorized
or require by law or this Code;
(vii) Not permit the use of his name or associate in business
ventures with any person or firm that he believes is
engaged in fraudulent or dishonest enterprise;
(viii) Be objective and truthful in professional reports,
statements, or testimony and shall include all relevant and
pertinent information in such reports statements or
testimony which should bear the date indicating when it
was current;
(ix) Subject to (4) (ii) of CPN (n.d.), issue public statements
only in an objective and truthful manner, and express
publicly only technical opinions that are founded upon
knowledge of the facts and competence in the subject
matter, and where appropriate after being duly authorized
to do so, and shall have due regard to the likely
consequences of any such statements on others;
(x) Issues to statements, criticism or arguments on technical
matters that are inspired or paid for by interested parties,
unless he has prefaced such statements, criticisms, or
arguments by explicitly identifying the interest parties on
whose behalf heis speaking, and by revealing the existence
of any interest he may have in the matters;
285
(xi) At all times strive to serve the public interest seek
opportunities to participate in civic affairs and career
guidance for youths, work for the advancement of safety,
health and well-being of my community;
(xii) Avoid all conduct or practice that deceives the public. He
shall not misrepresent or withhold information that is
germane to a problem, an issue or a situation of public
concern nor will he allow any such known information to
remain unchallenged. He shall ensure that should he
prepares articles for the lay or technical press, such articles
shall not imply credit to him for work performed by others;
(xiii) Articulate and support policies that protect the dignity of
users and others affected by computational or
computerized machinery.
Obligation to employer or client
In recognition of the professional’sobligation to the employer or
client; he shall act for each employer or client as faithful agent or
trustee. Therefore, he shall:
(i) Carry out work with due care and diligence in accordance
with the requirements of the employer or client, endeavour
to complete work on time and to budget and advice his
employer or client as soon as practicable of any overrun
foreseen;
(ii) Seek to avoid being out in a position where he may become
privy to or party to activities or information concerning
activities which would conflict with his responsibilities,
and to not be influenced in the course of his professional
duties by conflicting interests; disclose all known or
potential conflicts of interest that could influence or appear
to influence my judgement or the quality of his service;
(iii) Not accept compensation, financial or otherwise, from
more than one party for services on the same project or
endeavour, or for services pertaining to the same project or
286
endeavour, unless the circumstances are fully disclosed and
agreed to by all interest parties;
(iv) Not offer or provide, or receive in return, any inducement
for the introduction of business from a client unless there is
full prior disclosure of the facts to that client, and not
solicit or accept financial or other valuable consideration,
directly or indirectly, from outside agents in connections
with the work for which they are responsible;
(v) Not accept financial or other consideration, including free
professional designs from materials or equipment suppliers
for specifying their product;
(vi) Not accept commissions or allowances, directly or
indirectly, from contractors or other parties dealing with
his clients or employers in connections with work for
which he is responsible;
(vii) Not, if heis in public service as member, advisor or
employers of a government or quasi-governmental body or
department, participate in decisions with respect to services
solicited or provided by him or any organization in private
or public professional practice in which he has interest;
(viii) Not, except where specifically so instructed, handle client’s
monies or place contracts or orders in connection with
work on which he is engaged when acting as an
independent consultant and shall not purport to exercise
independent judgement on behalf of a client on any product
or service in which he knowingly has any interest, financial
or otherwise;
(ix) Not solicit or accept a contract from a governmental body
on which a principal or officer of my organization serves as
a member;
(x) Not accept outside employment to the detriment of his
regular work or interest. Before accepting any outside
employment, he will notify his employers and obtain their
consent;
287
(xi) Not attempt to attract a fellow member of the Profession
from another employer by false or misleading pretenses;
(xii) Not actively participate in strikes, picket lines or other
collective coercive action;
(xiii) Not disclose, authorize to be disclosed, use of personal
gain, or benefit to a third party, confidential information
acquired during the course of professional practice,
including those concerning the business affairs or technical
processes of any present or former client or employers or
public body on which he serves, unless with the consent of
the employer or client or at the directive of a court of law;
(xiv) Not, without the consent of all interested parties, promote,
or arrange for new employment or practice in connection
with a specific project or endeavour for which hehas
gained particular and specialized knowledge;
(xv) Not, without the consent of interested parties, participate in
or represent an adversary interest in connection with a
specified project or proceeding in which he has gained
particular specialized knowledge on behalf of a former
client or employer;
(xvi) Not, without consent of his employer or client, use
equipment supplies laboratory, or office facilities or his
employer or client to carry out outside private practice;
(xvii) If in a salaried position, accept part-time professional work
only to the extent consistent with policies of my employer
and in accordance with ethical consideration;
(xviii) If using designs supplied by a client, recognize that the
designs remain the property of the client and may not
duplicate them for others without express permission of the
client;
(xix) Treat designs, data, records, and notes referring exclusively
to work of an employer as the property of the employer and
shall obtain an indemnity of the employer for use of the
288
information for any purpose other than the original
purpose;
(xx) Articulate social responsibility of members of an
organizational unit and encourage full acceptance of those
responsibility;
(xxi) Create opportunities for members of his organization to
learn the principle and limitations of the use of
computational or computerized machinery and techniques
related thereto.
Obligation to fellow members or professionals
In recognition of his obligation to fellow members of the
Profession, the professional shall:
(i) Not injure or attempt to injure maliciously or falsely,
directly or indirectly, the professional reputation,
prospects, practice, or employment of other members of the
Profession.Ifhe believes others are guilty of unethical or
illegal practice,he shall present such information to the
proper authority for action. In particular if he knows of any
allege violation of this Code, he shall report thereon to
appropriate professional bodies and, when relevant, also to
public authorities and cooperate with the proper authorities
in furnishing such, information or assistance as may be
required;
(ii) If in private practice, not review the work of another
member of the Profession for the same client, except with
the knowledge of such member of the Profession, or unless
the connection of such member of the Profession with the
work has been terminated;
(iii) If in governmental, industrial or educational employ,
review and evaluate the work of other members of the
Profession when so required by his employment duties, and
if in sales or industrial employ, make professional or
technical comparisons of represented product with products
of other suppliers;
289
(iv) Accept personal responsibility of his professional
activities, provided, however that he may seek
indemnification for services arising out of his practice for
other than gross negligence, where his interests cannot
otherwise be protected;
(v) Give proper credit for intellectual property, protect the
integrity of intellectual property; that is, give credit for
professional work to those to whom credit is due, and
recognize the propriety interest of others. Specifically, he
shall not take credit for other’s idea or work, even in cases
where the work has not been explicitly protected, for
example by copyright or patent;
(vi) Whenever possible, name the person or persons who may
be individually responsible for designs, inventions,
writings or other accomplishment;
(vii) Before undertaking work for others in connection with
which he may make improvements, plans, designs,
inventions or others records that may justify copyrights or
patents, enter into a positive agreement regarding
ownership;
(viii) Not attempt to obtain employment or advancement or
professional engagements by untruthful criticizing other
members of the Profession, or by other improper or
questionable methods;
(ix) Encourage and support fellow members in their
professional development and, where possible, provide
opportunities for the professional development of new
entrants to the Profession.
Obligation to the Profession
In recognition of his obligation to the Profession,the professional
shall:
(i) Uphold the reputation of the Profession and not promote
his own interest at the expense of the dignity and integrity
290
of the Profession or do anything that will adversely affect
the good standing of the Profession.
(ii) Exercise care to not misrepresent the Profession or the
Council, or positions and policies of the Profession or the
Council or any of its units;
(iii) Strive for excellence, to achieve the highest quality,
effectiveness and dignity in both the process and products
of his professional work, at all times be cognizant of the
serious negative consequences that may result from poor
quality work;
(iv) Acquire and maintain professional competence, seek to
improve professional standards through participation in
their development, use and enforcement, he shall maintain
awareness of technological developments, procedures and
standards relevant to his field and encourage subordinates
to do likewise;
(v) Advance public knowledge and understanding of the use of
computational machinery and techniques related thereto
and their achievement and counter false or misleading
statements thereon that are detrimental to the Profession;
(vi) Subject to (3) (ii) of CPN (n.d.), accept and provide
appropriate professional or critique of the work of others;
and whenever appropriate, seek and utilize peer review or
critique of his work as well;
(vii) Uphold and promote the principles of this Code of Ethnic
and Professional Conduct and treat violations thereof, as
inconsistent with membership of the Profession;
(viii) Act with integrity towards fellow members and to members
of other professions with whom he is concerned in a
professional capacity and shall avoid engaging in any
activity, which is incompatible with professional status.
291
Obligation to the country
In recognition of the obligation to the country, he shall:
(i) Be guided in all my relations by the highest standards of
honesty and integrity.
(ii) Ensure that he has knowledge and understanding of
existing local, state, national and international laws and
regulations relating to the practice of the Profession, and
that he obeys, unless there is a compelling ethical basis not
to do so if he decides to violate law or rule because he
views it as unethical, of for any other reasons, he shall fully
accept responsibility for his actions and for the
consequences;
(iii) Acknowledged his errors, not distort or alter the facts, and
not make deliberately false or deceptive claims about a
product or service but shall instead provide full disclosure
of all pertinent product or service limitations and problems;
(iv) Not use association with a non-member of the Profession, a
corporation, or partnership as a “cloak” for unethical acts;
(v) Notify the appropriate organ of Government through
appropriate channels when in his judgement a policy,
project or an endeavour especially in his area of expertise
may be detrimental to the country, harmful to the citizenry
– individual or corporate – or lead to personal or social
damage. Should the organ of government not act to curtail
or mitigate the danger, he shall notify the supervisory
authority to the organ of Government or any other
appropriate authority to help correct the problem or at
worst reduce the risk;
(vi) Perform services only in the areas of his competence,
undertaking assignments only when qualified by education
or experience in the specific technical fields involved;
(vii) Not affix his signature to any plans, designs, specification
or documents dealing with subject matter in which he
292
lackscompetence, nor to any play, design, specification or
document not prepared under my direction and control;
(viii) If he accepts assignments and assumes responsibility for
coordination of an entire project, signs and seals the
professional or technical documents for the entire project,
provided that each technical segment is signed and sealed
only by the qualified professional who prepared the
segments;
(ix) Avoid deceptive acts and shall not falsely or misrepresent
his qualification or permit misrepresentations of his
qualifications or those of his associates. He shall not
misrepresent or exaggerate his responsibility in or for the
subject matter of prior assignment. He shall ensure that
brochures or other presentations incident to the solicitation
or employments shall not misrepresent pertinent facts
concerning present or previous employers, employees,
associates joint ventures, or past accomplishments;
(x) Not offer, give, solicit or receive, either directly or
indirectly, contribution to influence the award of a contract
by public authority, or which may be reasonably construed
by the public as having the effect of intent to influence the
awarding of a contract; he shall not offer any gift or other
valuable consideration in order to secure work, and shall
not pay a commission, percentage or brokerage fee in order
to secure work, except to a bona fide employee of bona
fide established commercial or marketing agencies retained
by him;
(xi) Not request, propose or accept a commission on a
contingent basis under circumstances in which his
judgement may be compromised;
(xii) Strive to maintain the values of equality, tolerance, respect
for others, and the principles of equal justice. He shall have
regard to legitimate rights of third parties and to human
rights, and shall avoid any actions that adversely affect
293
such rights. He shall not practice the professionally
intolerance act of discrimination on the basis of race, sex,
religion, age, disability, national origin, or other such
factors;
(xiii) Honour property rights including copyrights and patents,
and not violate copyrights patents, trade secrets and the
terms of license agreements;
(xiv) Respect the privacy of others and maintain the integrity
and privacy of data describing individuals, treating such
data of which he happens to have knowledge with strictest
confidentially, except in cases where it is evidence for the
violation of law organizational regulations, or this code, in
which cases, he shall disclose the nature or contents of that
information only to proper authorities;
(xv) Honour contracts, agreements and assigned responsibility.
294
1. Technology in Education;
2. Application Support;
3. Systems Support; and
4. Information Dissemination.
Fig.11.1 shows the hierarchical arrangement of the Department as
indicated in the organogram.
295
11. Looks into the future for change opportunities related to the
Organization’s mission.
12. Implements the strategic goals and objectives of the
department.
13. Gives direction and leadership towards the achievements of
the Organization’s philosophy, mission and goals.
14. Makes recommendations to Management on critical matters.
15. Oversees the design, marketing, promotion and delivery of
quality programmes and services.
16. Recommends yearly departmental budget for Management’s
approval and prudently manages the department’s resources
within the approved budget guidelines.
17. Ensures that the Institute, its mission, programmes and
services are consistently presented in strong and positive
image to relevant stakeholders.
18. Assists the DG/CE and Management to fulfill its governance
function.
296
EXERCISE XI
297
CHAPTER TWELVE
300
Table 12.1:Computer keyboard shortcuts
Annotation Alt+Ctrl+ M
Auto Text F3
Bold Ctrl+ B
Bold Ctrl+Shift+ B
Bookmark Ctrl+Shift+ F5
Cancel Esc
Clear Del
Copy Ctrl+ C
302
Command Name Modifiers Key
Cut Ctrl+ X
303
Command Name Modifiers Key
Extend Selection F8
304
Command Name Modifiers Key
Find Ctrl+ F
Font Ctrl+ D
Font Ctrl+Shift+ F
Go Back Shift+ F5
Go Back Alt+Ctrl+ Z
Go To Ctrl+ G
Go To F5
Help F1
HHC Alt+Ctrl+ F7
305
Command Name Modifiers Key
Hidden Ctrl+Shift+ H
Highlight Alt+Ctrl+ H
Hyperlink Ctrl+ K
Indent Ctrl+ M
Italic Ctrl+ I
Italic Ctrl+Shift+ I
Line Up Up
Macro Alt+ F8
306
Command Name Modifiers Key
Move Text F2
Next Pane F6
307
Command Name Modifiers Key
Normal Alt+Ctrl+ N
Open Ctrl+ O
Open Alt+Ctrl+ F2
Outline Alt+Ctrl+ O
308
Command Name Modifiers Key
Page Alt+Ctrl+ P
Page Up Page Up
Para Up Ctrl+ Up
Paste Ctrl+ V
309
Command Name Modifiers Key
Print Ctrl+ P
Proofing F7
Redo or Repeat F4
Replace Ctrl+ H
310
Command Name Modifiers Key
Save Ctrl+ S
Save Alt+Shift+ F2
Save As F12
311
Command Name Modifiers Key
Spike Ctrl+Shift+ F3
312
Command Name Modifiers Key
Spike Ctrl+ F3
Subscript Ctrl+ =
Superscript Ctrl+Shift+ =
Thesaurus RR Shift+ F7
313
Command Name Modifiers Key
Un Hang Ctrl+Shift+ T
Un Indent Ctrl+Shift+ M
Underline Ctrl+ U
Underline Ctrl+Shift+ U
Undo Ctrl+ Z
314
Command Name Modifiers Key
Update Fields F9
315
EXERCISE XII
316
BIBLIOGRAPHY
318
Himma, K. (2004). There’s something about Mary: The moral
value of things qua information objects. Ethics
Information Technology, 6(3), 145–159.
319
Morgan, I. (2013). Uses of computers in land transportation.
Retrieved July 21, 2019 from
http://www.ehow.com/info_7807359_uses-computers-la
Pilat, D., Lee, F., & van Ark, B. (2002). Production and use of
ICT: A sectoral perspective on productivity growth in the
OECD area. OECD Economic Studies, 35(2). 5–15.
320
https://www.cs.cmu.edu/~rtongia/ICT4SD_Ch_2--
ICT.pdf
321
WEBSITES VISITED
https://commons.wikimedia.org/wiki/File%3AInside_Back_Z9_2
094.jpg
https://en.wikipedia.org/wiki/PDF
https://peda.net/kenya/css/subjects/computer-studies/form-
three/driac2/data-processing
https://sielearning.tafensw.edu.au/toolboxes/Database_Administra
tion/content/physical/file_organisation.htm
https://upload.wikimedia.org/wikipedia/commons/0/0a/Tianhe-
2.jpg
https://www.collinsdictionary.com/dictionary/english/digital-
computer
www.dreamstime.com
322
APPENDIX
-A-
ACE – ACE Archiver compression file.
AIF– Audio Interchange File used with SGI and Macintosh
applications.
ANI – Animated cursors used in Microsoft Windows.
API– Application Program Interface.
ARC – Compressed file format from an old program called ARC.
ARJ – Compressed file by the ARJ program from Robert Jung.
ART – Clipart.
ASC– ASCII text file.
ASM – Assembler code.
ASP – Microsoft Active Server Page.
AVI – Audio/Video Interleaved used for Windows based movies.
-B-
BAK – Backup Files.
BAS– BASIC programming language source code.
BAT – MS-DOS batch file.
BFC – Briefcase document used in Windows.
323
BIN – Binary File.
BIN – Mac Binary-encoded files.
BMP – Bitmap format.
BUD – Backup Disk for Quicken by Intuit.
BZ2 – Bzip2-compressedfiles.
-C-
C – C source file.
CAB – Microsoft cabinet file compressed for software (OS)
distribution
CAT - Security Catalog file.
CBL –COBOL code.
CBT – Computer Based Training.
CDA – Compact Disc Audio Track.
CDT – CorelDraw Template file.
CFML – Cold Fusion Markup Language.
CGI– Common Gateway Interface. Web-based programs and
scripts.
CHM – Compiled HTML Help files used by Windows.
CLASS – Java script Class file.
CLP – Windows Clipboard file.
CMD – DOS Command File.
CMF – Corel Meta File.
324
COM – Command File.
CPL – Control panel item. The settings in Control Panels
represent CPL files in the Windows/System folder.
CPP – C++ programming language source code.
CSS – Cascading Style Sheet. Creates a common style reference
for a set of WebPages.
CSV – Comma Separated Values format.
CTY – City Desk site from Fog Creek Software.
CWK – Claris Works/Apple Works file.
CWS – AppleWorks template file.
CUR – Cursor in Microsoft Windows.
-D-
DAO – Registry Backup file for Windows registry.
DAT – Data file, often viewable in a text editor.
DD – Compressed Archive by Macintosh Disk Doubler.
DEB – Debian packages.
DEV – Device Driver.
DIC – Dictionary file.
DIR – Macromedia Directory file.
DLL – Dynamic Linked Library, Microsoft application file.
DOC – Document format for Word Perfect and Microsoft Word.
DOT – Microsoft Word Template.
325
DRV – Device Driver.
DS– TWAIN Data source file.
DUN – Dial-up networking configuration file.
DWG – Autocad drawing.
DXF – Autocad drawing exchange format file.
-E-
EMF – Enhanced Windows Metafile.
EML – Microsoft Outlook e-mail file.
EPS – Encapsulated PostScript supported by most graphics
programs.
EPS2 – Adobe PostScript Level II Encapsulated Postscript.
EVE – TT Maker Event Scheduling File.
EXE – DOS based executable file which is also known as a
program.
-F-
FFL - Microsoft Fast Find file.
FFO - Microsoft Fast Find file.
FLA - Macromedia Flash movie format.
FNT – Font file.
FSH - EA Sports Game Graphic Editor File
326
-G-
GIF– Graphics Interchange Format that supports animation. Created
by CompuServe and used primarily for web use.
GID – Windows global index. Contains the index information
used by “Help” in Windows.
GRP – Microsoft Program Manager Group.
GZ – Unix compressed file.
-H-
HEX – Macintosh binary hex (binhex) file.
HLP – Standard helpfile.
HT – Hyper Terminal files.
HQX – Macintosh binary hex (binhex) file.
HTM – Hyper Text Markup. This markup language is used for
web design.
HTML – Hyper Text Markup Language. This markup language is
used for web design.
-I-
ICL– Icon Library File.
ICM – Image Color Matching profile.
ICO – Microsoft icon image.
INF – Information file used in Windows.
INI – Initialization file used in Windows.
327
-J-
JAR – Java Archive. A compressed java file format.
JAVA – File containing Java source code.
JPEG – Compression scheme supported by most graphics
programs and used predominantly for web use.
JPG – More common extension for JPEG described above.
JS – JavaScript
File – A text file containing JavaScript programming code.
JSP – An HTML page that contains a link to a Java servlet.
-K-
KBM – Keyboard mapping script for Reflection 4.0
KDC – Kodak Photo-Enhancer image
KIZ – Kodak digital postcard
KQP – Konica camera file
-L-
LAB – Microsoft Excel mailing labels.
LG – OOTP Developments saved games.
LGO – Windows 9x startup logo.
LHZ – Compressed archive by the LHA program from Haruyasu
Yoshizaki.
LIT – eBooks in Microsoft Reader format.
328
LNK – Windows 9x shortcut file.
LOG – Application log file.
LSP –Autocad (visual) lisp program.
-M-
MAQ – Microsoft Access Query.
MAR – Microsoft Access Report.
MDB – Microsoft Access DataBase File.
MDL – Rose model file, opens with Visual Modeler or Rational
Rose.
MFM – MF Works map file standard by Keigan Systems.
MHT – Microsoft single file web archive.
MID – MIDI music file.
MOD – Microsoft Windows 9.x kernel module.
MOV – Quick time movie.
MP3 – MPEG Audio Layer 3.
MPEG – Animation file format.
MPP – Microsoft Project File.
MSG – Microsoft Outlook message file.
MSG – Fidonet messages.
-N-
NCF – Netware command File.
329
NDX – Arc View Fonts Index File by ESRI
NFF – Haines Neutral File Format
NFF – World ToolKit Neutral File Format
NITF – National Imagery Transmission Format
NLM – Netware loadable Module.
-O-
O – Object file, used by linkers.
OBD – Microsoft Office Binder file, Ties Office docs together
without having to load separate programs
OCX – ActiveX Control: A component of the Windows
environment.
OFT – Microsoft Outlook template
OGG – OggVorb is digitally encoded music file.
OST – Microsoft Exchange/Outlook offline file.
-P-
PAK – WAD file that contains information about levels, settings,
maps, etc for Quake and Doom.
PCL – Printer Control Language file, PCL is a Page Description
Language developed by HP.
PCT – Macintosh drawing format.
330
PDF – Portable Document File by Adobe, Viewable in a web
browser or with Adobe Acrobat.
PDF – Printer Description File; provides printer support for certain
applications.
PDR–Port driver for Windows 95, it is actually a virtual device
driver (vxd).
PHP – Web page that contains a PHP script.
PHTML – Web page that contains a PHP script.
PIF – Program Information File
PIF– Vector graphics GDF file (IBM Mainframe)
PIF – Macintosh Compressed archive
PL – Perl source code file.
PM – Perl Module.
PM3 – PageMaker 3.0 document.
PM4 – PageMaker 4.0 document.
PM5 – PageMaker 5.0 document.
PM6 – PageMaker 6.0 document.
PNG – PortableNetworkGraphicfile.
POL – System Policy file for Windows NT.
POT – Microsoft PowerPoint design template.
PPD – PostScript Printer Description file used in Macintosh and
Windows operating systems to provide printer specific features to
a driver.
331
PPK – PuTTY Private Key.
PPS – Microsoft PowerPoint slide show.
PPT – Microsoft PowerPoint presentation (default extension).
PRN – A print file created as the result of "printing to file".
PS – PostScript file.
PSD – Native Adobe Photoshop format.
PSP – Paint Shop Pro-image.
PST – Personal Folder File for Microsoft Outlook.
PUB – Microsoft Publisher document.
PWL – Windows Password list file.
- Q-
QBB – Quick Books backup company file.
QBW – Quick Books working company file.
QIF – Quicken Import file.
QXD – Quark Express file.
- R-
RAM – Real Audio Meta file.
RAR – RAR compressed archive created by Eugene Roshall.
RAW – Raw File Format.
RDO – Raster Document Object. Proprietary file type used on
Xerox Digipath Scan and Make ready workstations.
332
REG – Registry file that contains registry settings.
RM – Real Audio video file.
RPM – Red Hat Package Manager.
RSC – Standard resource file.
RTF – Rich Text Format.
- S-
SCR – Screen Saver file.
SEA – Self-extracting archive for Macintosh Stuffit files.
SGML - Standard Generalized Markup Language.
SH – Unix Shell script.
SHTML – HTML file that supports Server Side Includes (SSI).
SIT – Compressed Macintosh Stuff it files.
SMD – SEGA mega drive ROM file.
SVG – Adobe scalable vector graphics file.
SWF – Shockwave Flash file by Macromedia.
SWP – DOS swap file.
SYS – Windows system file used for hardware configuration or
drivers.
- T-
TAR – Unix Tape Archive.
TCW – TurboCAD Drawing File.
333
TGA – Targa bitmap.
TIFF – Tagged Image File Format; Universal graphics format
supported by most graphics applications.
TMP – Windows temporary file.
TTF – True Type font.
TXT – Text Format.
- U-
UDF – Uniqueness Definition File; Used for Windows unattended
installations.
UUE – UU-encoded file.
- V-
VBS – Microsoft Visual Basic script file.
VBX – Microsoft Visual Basic extension.
VM – Virtual Memory file.
VXD – Windows 9x virtual device driver.
- W-
WAV – Waveform sound file.
WMF – Windows Metafile (graphics format).
WRI – Write Document; this is equivalent to RTF, Rich Text Format
that enables saving text with formatting information.
WSZ – Winamp Skin.
334
- X-
XCF – The GIMP’s native image format.
XIF – Wang imaging file; Wang Image Viewer comes with
Windows 95/2000.
XIF – Xerox Image file (same as TIFF).
XIF – Image file eXtended by Scan Soft is similar to TIFF.
XLS – Microsoft Excel Spreadsheet.
XLT – Microsoft Excel Template.
XML – Extensible markup language.
XSL – XML style sheet.
- Y-
YBK – Microsoft Encarta yearbook file
- Z-
ZIP – Compressed Zip archive.
335