ICT Book Notes All Levels
ICT Book Notes All Levels
AMINU JAMES
ICT TEACHER
INTRODUCTION TO COMPUTING electronic device because they use or need power or electricity for
Introduction to Computers (Computers Today) them to function.
Computers are necessary in today’s society. We live in a fast Reasons for studying about computers
moving world where almost everything must come to us instantly.
1. To promote creative knowledge for problem solving
Many times, we depend on the computers to help us complete tasks
2. To get jobs in future, computing offers a wide range of high
and solve problem.
rewarding jobs
The digital age has affected all of our lives and today’s society is no
3. To create awareness in a learner about developments and
longer able to function without computer technology and therefore
emerging issues concerning computing and society
computers are very vital in today’s society as they make life easier
4. To promote critical and analytical thinking, computing drives
for everyone.
innovations in the sciences e.g. vaccine research, environment
Defining a computer
protection, business, education
A computer is a programmable electronic device that accepts user
5. To acquire skills in the use of information technology to enhance
input (data) processes it according to the special instruction
productivity and development in response to modern days we are
(programs) and provides output as information and stores
today
information for future use
6. To empower a learner as a computer literate and a capable
Alternatively
citizen who can develop, communicate and handle ICT
A computer is a general purpose machine which can receive data,
challenges
processes it, output information and store information for future use
7. To facilitate communication in the society
Computers come in different shapes and sizes and are often built
Advantages of computers
into other devices.
1) Computers are fast in doing work as compared to humans
Computers are programmable devices because they do things and
2) Computers identify mistakes e.g. when using application
operate under instructions (programs). Computers are referred as an
software
3) Computers are accurate and reliable in doing things as instructed
AMINU JAMES TELL: 0787745162 Email: [email protected]
3
ICT CLASS NOTES
4) Computers are efficient in performing work Computers lead to loss of information due to breakdown of a
5) Computers also enhance scientific research in different fields e.g. system
health, entertainment, education Software piracy (stealing of softwares)
6) Computers have improved communication e.g. through use of Moral degeneration as a result of watching pornographic content
emails, Skype and social networks like Facebook, twitter like blue movies, necked pictures
7) Computers have promoted education through online learning Computers to day have become a source of unemployment in a
8) Computers have created employment opportunities e.g. society i.e. use of the computers in banks, homes and offices
secretaries, technicians, software engineering have rendered some people jobless
9) Computers have promoted innovation in various fields e.g. Computers are vulnerable to hackers who later access
education, health, military and sports unauthorized information
10) Computers have a large data storage space for keeping Computers depend on power since they are electronic devices
information Computers have led to isolation of people in the society as they
Disadvantages of computers spend more time on computers than real human beings.
Health hazards caused as a result of over use of computers e.g. UNDERSTANDING A COMPUTER
back ache, neck ache, wrist pain, fatigue, eye strain It is important to note that a computer is made up of a collection of
Promotes pornography which is an evil to society e.g. different components (parts) that are interconnected together to
pornographic materials like Blue movies, necked picture. function as a single entity.
Requires skilled man power thus pausing a challenge to the To understand well the parts of a computer, we will look at the
illiterate people desktop computer as it distinctly shows each part more than any
They are delicate machines and requires special attention and other smaller computers like laptop or palmtop which have parts
proper handling e.g. it must be kept from dust free environment integrated together.
A computer is basically made up of a system unit and other devices Computer and It’s Parts
connected to the system unit known as Peripheral devices. The Monitor
Diligence Computers have ability to perform the same task over for Information
a long time without getting tired or bored. Information is defined as processed data that has a meaning to the
Storage Computers are capable of storing or holding large amounts end user. Information helps the users to make informed decisions.
of data for a long time without losing it through there storage media Qualities of good information
like Hard Disk Drive (HDD), Compact Disks (CDS), Flash disks, Complete- information should be dug to the finest levels of
special backup systems, Digital Versatile Disk (DVDS) etc. details
Artificial intelligence (AI) Computers have artificial intelligence, Accurate- information should be error free
this means that they can receive and respond to request and Economical- information gathering process should be cheaper
commands and provide solutions. Simple- information should be easy to understand
Automation Computers receive instructions and has ability to work Reliable- information should be easy to access at a time of need
with minimal supervision. Current- information should be up to date
Versatility Modern computers perform different kinds of tasks Relevant information should be meaningful
simultaneously (same time) e.g. you can play music while typing a INFORMATION PROCCESSING CYCLE
document. Definition
Adaptability Modern computers can comply with different settings This refers to the sequence of events that take place in processing
e.g. can be used as personal computers for home use, banking, data to convert it into information. The information cycle illustrates
communicating, entertainment etc. the stages through which data is transformed into information and it
DATA AND INFORMATION includes the following.
Data 1. Input-This refers to entering (feeding) data into the computer.
Data is defined as raw facts and figures that have less meaning to the Some of the computer devices used for input include; Keyboard,
end user. These are basic facts of an event in life for instance date Mouse, Digital camera, Joystick, Trackball, Touchscreen,
and time, cost price (unorganized facts e.g. a list of patients in the Microphone, Pointing stick, Graphic tablet and scanner etc.
hospital irrespective of their age, sex, size and status).
AMINU JAMES TELL: 0787745162 Email: [email protected]
6
ICT CLASS NOTES
2. Processing-This refers to performing operation on the data. The NOTE: Information can be in form of text, sound, pictures, videos
parts of a computer for processing is Central Processing Unit or combination of all the above.
(C.P.U) also sometimes referred to as a brain of the computer EVOLUTION OF COMPUTERS
.examples of C.P.U include-Intel Pentium ii, iii, iv, The evolution of computers comes from a Latin word “evolve”
intel®core™2 Duo processor. which means to “Unroll or Unfold”
3. Storage –This refers to keeping data, instructions and Definition
information in allocation for future use. Examples of computer Evolution of computers refers to the stages or historical
parts used for storage are Random Access Memory (RAM), developments through which computers and technology have passed
Hard Disk, Flash Disk, CDs, and DVDs etc. from the time they started to exist in the ancient form to their current
4. Output-This refers to presenting (displaying) results state.
(information) using output device like projector, monitor screen, It is important to track down the origin of computers to better
printer, plotter, speakers, headsets etc. understand and compare the stages especially in terms of changes
AN ILLUSTRATION SHOWING THE INFORMATION and advances
PROCESSING CYCLE ORIGIN OF COMPUTING
Origin of computing started with the early man who used fingers,
Input stage Processing stage Output stage sticks, marks on the walls, sand etc. Over time, people have
developed amazing variety of data processing tools and techniques.
(Data) (Information)
Examples of counting devices of the ancient time include
Storage stage Abacus
NB After the computer is done with processing data to convert Napier’s Bones
into information. Then it’s ready for distribution or communication Slide rule
mechanical era. Computers since 1946 have been organized into five EDVAC- Electronic Discrete Variable Automatic Computer
WORLD OF ICTS both positive and negative impacts to our society. Computers in the
ICT -Stands for Information and Communication Technology. society can be applied and used in the following areas
It is defined as a diverse set of technological tools and resources Education
used to create, store, manage and communicate information. Research
It’s a comprehensive term that includes any communication device Business
or application encompassing. Health
Radio Communication
Television Military
Cellular phones Home
Computer and Network hardware and software Entertainment
Satellite system etc. Transport
Alternatively, ICT can be defined as the integration of computers Astronomy
and telecommunication services for purpose of communication. However, every day the list is growing and others may soon surface.
USES OF ICT (COMPUTERS) IN THE SOCIETY Uses of computers in Education
In today’s daily activities and problems, computers are being used to
In teaching we use computer assisted instructions (CAI) by use
preform different tasks and they have assisted to handle and solve
of interactive white boards and projectors in class.
daily challenges and problems in different fields.
Computer aided learning(CAL) gives access to on screen
In this part of the world, the mostly used ICT tools in the society
learning materials
include Computers, mobile phones, internet, Radio, television,
Computer aided assessments (CAA) Helps teachers to mark
satellite and the related software systems.
pupil’s books and answer scripts.
The advancement of science arouses the dilemma of development of
Computers are used to generate timetables.
technology as it affects human individuals. They have come with
Computers are used to store information.
Distance learning through computer based training has been Computers are used for communication between business and
made possible i.e. people get awards such as degrees without customers.
going to class. Computers are used for e-banking.
Preparing students report cards. Uses of computers in health
Analyzing students’ performance. Computers are used for drawing duty rosters.
Quick communication between students, teachers and parents. Making appointments with patients.
Accessing the internet. Computers are used in the hospital for research purposes
For research purposes. Laboratory tests and making reports.
Uses of computers in research Monitoring patients conditions such as cardiac arrest,
- Storage of research information hypertension.
- Research publishing-Research work can be converted to portable Identifying drugs including labels, expiry dates and harmful side
document format (PDF) and published in the World Wide Web effects.
(WWW). Performing surgery.
- A lot of statistical softwares are available for performing Uses of computers in communication
calculation and analyzing research. Sending and receiving of E-mails.
Uses of computers in business Chatting with friends, relatives and family members.
Designing company logos, headed stationery and business cards. Computers are used for video conferencing i.e. they enable to
Designing advertising and promotional material. conduct meetings in different locations as if they are in the same
Banks use computers to manage transactions. location.
Computers are used for electronic commerce i.e. sale of goods Computers enable people to send voice, image, and text through
and services over the internet. mobile phones.
Computers are used for budgeting. Accessing the internet.
Text messaging.
AMINU JAMES TELL: 0787745162 Email: [email protected]
13
ICT CLASS NOTES
Uses of computers in military and security Read a book, newspaper, magazine on line when connected to
To keep databases of the fingerprints. the internet.
Used in electronic intelligence gathering and military laser guide Uses of computers in transport
missile system. Monitoring highway traffic.
Used for base face recognition to analyze the traffic offenders Used to tell schedules of water vessels trains, buses to their
and criminals. respective stations.
Uses of computers at home Coordinate timing of street lights to traffic conditions.
Storing family photos. Provide current traffic alerts or emergency calls.
Editing family videos. Used to manage cargo at the airport.
Accessing the internet. Uses of computers in office
Conducting on line shopping. For preparing and printing documents.
Communication with others. Used for record keeping and storage of information.
Doing homework or school assignments. Facilitates communication through use of internet services like
Playing video games. emails.
Paying utility bills. Used for scheduling activities in the offices and managing
Playing and listening to music. routines.
Reading your computerized bible. Uses of computers in astronomy
Uses of computers in entertainment (leisure) Computers are responsible for rocket guiding.
Playing video games. Computers are essential tools for studying the behavior of
Listening to music using audio soft wares. computer systems in the space as regards to their movements and
Watching videos or movies. interactions etc.
Composing and editing videos using video editing software. NB: Astronomy is the study of the sun, moon, stars and the planets
Used in ceremonies for playing music. plus other objects and phenomena in the space.
AMINU JAMES TELL: 0787745162 Email: [email protected]
14
ICT CLASS NOTES
Uses of computers in sports Use of computers requires additional effort on learning how to
Computers are used to analyze and design new plays make draft use computers and their programs.
picks and day today business operations in sports. Electronic fraud-stealing money electronically through practices
Special computers are used to record important plays of a match. like credit card cloning.
Uses of computers in government Hacking refers to unauthorized access into a computer system
Vehicle registration. information and compromising privacy.
Public record keeping. Impact on environment –computer manufacturing processes and
Revenue collection. computer waste are depleting natural resources and polluting
Civil and military research. environment.
Electronic voting. Presence of computer viruses causes loss of data or information.
Financial modeling to predict expenditure requirements. Moral decay due to access to internet website with pornographic
Processing census information. content which have a bad impact on the users of computer
DISADVANTAGES, DEMERITS, IMPLICATIONS OF USING especially the young.
COMPUTERS IN THE SOCIETY Computers are delicate and must be given great care.
Addiction due to over use of computers for long hours Software piracy- stealing of softwares not paying for license
Health issues caused as a result of over use of computers like eye through cracking.
strain, back and neck ache. Computers have come with unemployment as most of the jobs
Risk of decrease in our creativity, reasoning and skills as we are are now done by the computers hence leaving out people with no
dependent to much in computers e.g. E-mail replacing hand jobs.
written letters
Computers have destroyed the culture of certain group of people
especially the youth
CATEGORIES OF COMPUTERS Digital computers are computers that represent data as discrete
(CLASSIFICATIONS OF COMPUTERS) values of 0 and 1. The binary digits simply mean presence or
Computers can be categorized according to the process they
absence of an electric pulse.
represent data. People communicate through speech by combining
Digital computers are more accurate
words into sentences. Human speech is analog because it uses
Examples
continuous signals that vary in strength and quality.
Laptop computers
Computer categories are basic three
Digital watches
1. Analogue computers
All PCs
2. Digital computers
Hybrid computers these computers combine the desirable features
3. Hybrid computers
of analog and digital computers. Hybrid computers accept analog
Analogue computers are computers in which numerical data are
signals and convert them to digital for processing.
represented by measured physical variables such as voltage,
It is mostly used for automatic operations of complicated physical
temperature
processes and machines. Now days analog to digital and digital to
It generally deals with physical variables such as temperature,
analog converters are being use for transforming data into a suitable
weight, voltage, pressure, speed. The given results by analog
form for either type of computation.
computers are approximate since they deal with quantities that vary.
Hybrid computers are mainly used in specialized tasks.
Almost all the measuring devices are analog computers
Examples
Examples
Digital petrol pumps
Thermometers
Hybrid meters that measure analog quantities like electricity
Ammeters, speedometers, barometers
usage and speed.
Traditional automatic watches
CLASSIFICATION OF COMPUTERS
Computers are classified in different ways and the three major
categories of computers i.e. analog, digital, and hybrid is computer
Pentium III includes input devices, output devices, storage devices, and
Pentium IV processing devices
Pentium Duo 2. Computer Software
Intel CORE i3 These are electronic instructions that tell a computer how to perform
Intel CORE i5 a task. The computer software is intangible and is grouped into
Intel CORE i7 etc. system software and application software
NB: the unit for measuring the processor power is the hertz 3. Computer Human Ware
COMPUTER SYSTEM This is the most important component of a computer system. It
A system is a collection of interrelated interacting components that refers to people who operate and initialize instructions to the
work together to achieve a common goal. computer system. They are the users of computers
A computer system is defined as a collection of required hardware They design and develop computers systems, operate hardware,
(input, output, storage, processing devices), software and human create softwares and establish procedures for carrying out tasks.
ware required for a computer to perform as expected. The kinds of computer users
Failure of one component in a system may imply failure for the Ordinary user- is someone without much technical knowledge of
whole system. computers but uses computers to produce information for
Elements/components of a computer system professional or personal tasks and enhance learning or have fun
The computer system basically consist of many components which Professional user - is a person in a profession involving computers
include the following who has had a formal education in the technical aspects of
1. Computer Hardware computers e.g. web master, programmers
Is a term used to describe all various physical devices of a computer, 4. Procedure
in other words they are tangible components of a computer, things These are policies, standards and methods to be followed in using,
that can be touched with bare hands and felt, computer hardware operating and maintaining an information system.
Specification for use, operation and maintenance of information 6. Thou shall not copy or use proprietary software for which you
systems are collected in help facility, user manuals, and similar have not paid
documentation and are commonly delivered in electronic form 7. Thou shall not use other people’s computer resources without
5. Computer Data authorization
Refer to raw facts and figures that are processed into information, 8. Thou shall not appropriate other people’s intellectual output
data can be numbers, text, video, audio 9. Thou shall think about social consequences of the program you
6. Computer Communication are writing or a system you are designing
Communication refers to electronic sending and receiving of data 10. Thou shall always use a computer in ways that ensure
(information) over a channel between two or more computers. It consideration and respect for your fellow humans
allows the sharing of hardware, software and transfer of data and
information stored among computers in a network like internet.
ETHICS AND INTEGRITY IN COMPUTER USE
Computer ethics refer to human values and moral conduct for a
computer user. It can also be defined as right or wrong behavior
exercised when using computers
Computer integrity refers to the loyalty or faithfulness to
principled set of laws regarding computer use
Ten Commandments for computer ethics
1. Thou shall not use a computer to harm other people
2. Thou shall not interfere with other people’s computer work
3. Thou shall not snoop around in other people’s computer files
4. Thou shall not use a computer to steal
5. Thou shall not use a computer to bear false witness
include Local hard disk drive, optical drive, floppy drive, a network The concept of a computer program
interface card and USB device. A computer program is a sequence (set) of instruction written to
Computer system start up and shut down perform a specific task with a computer. Computer programs tell a
This focuses on how to start and shut down a computer, in other computer how to do things.
words its putting on and off a computer. A computer is not complete without a program to instruct it on how
How to start up a computer to operate, therefore if you buy a computer, you will need to install
The process is as follows programs before it starts to work for example Operating system,
1) First make sure you have a stable power source micro office suite
2) Make sure all the plugs are well connected There are two major programs needed on a computer before you
3) Turn on the power from a wall socket, UPS, start using a computer and they include
4) Press a power button on the monitor, 1) System software (mainly operating system)
5) Press a power button of the system unit, 2) The application software
6) The computer should now start to boot and load windows Operating system is a program that is designed to control all other
7) If the welcome screen appears, select your username and small programs and hardware. Examples of operating systems
enter password include windows operating system, Macintosh operating system,
8) The desktop should now appear Linux, Unix, Ubuntu.
9) Give it time to load the elements and start up programs Ways of staring computer program on windows operating
How to shut down or turn off the computer system
The process is as follows To start an application program on windows operating system
1) Close all running applications/ programs 1) Using a mouse
2) Click on the start button on the desktop 1. Click on start button on the desktop
3) From the start menu displayed click turn-off or shutdown 2. Click all programs
3. Click on a program you want to use e.g. Microsoft office
AMINU JAMES TELL: 0787745162 Email: [email protected]
22
ICT CLASS NOTES
4. Select on either Microsoft word, Access, Publisher, 7) On the Run dialog box, type Publisher and press enter to
PowerPoint etc. open MS Publisher
2) Using a keyboard
FILE MANAGEMENT
1. Press the windows key on the keyboard File management is also referred as simply a file system, it refers to
2. Use arrow keys to move up and down the start menu a system that an operating system or program uses to organize and
3. Press enter key e.g. when Microsoft office is selected keep track of files.
4. Use arrow keys to move to MS word, excel, Power Point Most windows operating system use hierarchical file system and it is
etc. the one that uses directories to store files in a tree like structure
5. Press enter key when the program you want is selected inside of the folder or directories.
3) A computer program can also be opened by double clicking A file
on its icon on the desktop A file is a collection of data or information that has a unique name
4) Using command prompt called file name.
1) Click on the start button Almost all information that is stored in a computer must be in a file,
2) Click on Run… it can be anything from a word file to music files, video or photo
3) On the Run dialog box, type winword and press enter to files.
open MS word, Text file contain written text and are called word documents, other
4) On the Run dialog box, type excel and press enter to examples of text files are PDF (Portable Document Format), Web
open MS excel pages, picture files
5) On the Run dialog box, type PowrePoint and press enter All the above files have different formats for example.
to open MS PowerPoint JPEG, GIF, BMP for images
6) On the Run dialog box, type MS Access and press enter MP3, WAN, WMV, AIF for Audio
to open MS Access MPEG, WMV, MOV for Video
FILE EXTENSIONS NB: A number of file attributes exists including the read only file
File extension is a group of letters occurring after a period in a file attribute, system file attribute, hidden file attribute, compressed file
name. It indicates the type and purpose or content of a file. attribute and the achieve file attribute.
A file extension is the last part of a file name after a dot or period for TYPES OF FILES IN WINDOWS OPERATING SYSTEM
example There are mainly two types of files in windows operating system and
.ZIP for zipped files these include the following.
.db. for database files System files
.doc for Microsoft Word documents, Is an executable file (in machine language) that is part of the
.ppt for power point operating system or other control programs that contains critical files
.xls for Microsoft excel needed for smooth running of the OS for example Syste.ini,
.pub for Microsoft publisher System.dii.
.acc for MS access Application files
FILE FORMAT. Application files are also referred to as program files. These are files
Definition that hold application program data or directions e.g. Doc files are
File format refers to a standard way that information is encoded for application file for Microsoft word application.
storage in a computer file. It specifies how bits are used to encode A folder
information in a digital storage medium. File formats may either be A folder is a directory that can contain other folders or files within it
proprietary or free and may be either published or open. e.g. I have a picture called flower. JPG and I saved it on my
FILE ATTRIBUTE. computer somewhere. If I saved it at C:/Documents and
Definition settings/administrator/my pictures:
Files attribute also referred to as attribute in windows is specific My picture is in the folder that contains the file flower.JPG.
condition in which a file or directory can exists
/directory. You can create a new file in any program and give each of them a
STORAGE LOCATION unique and meaningful name that will help you organize your work.
Definition In most programs the file menu is where you open, save, and create
This is a location on the computer where you save your files or new files.
ICON 1) Click the file menu in the program you are using and then
An icon is a picture on a screen that represents specific file/ folder, click new.
hardware resource, program etc. 2) When you are finished working with the new file.
NB: You can open a program/ folder/ file by double clicking its 3) Click the file menu again.
icon. Icons are one of the fundamental features of the Graphical User 4) And then click save as.
Interface (GUI). 5) Select the location you want to save the file
Desktop is a primary user interface of a computer. It’s the screen How to create a folder on windows desktop
which you see when the windows operating system is loading its Steps
NB: In windows, the desktop includes a task bar which is located in 2. Right click on any blank portion of the desktop.
Alternatively 4. If you use right click and drag, you are offered the options of
1. Open my computer/windows explorer moving or copying the item when you place it via a smart tag
2. Open the drive/ folder you wish to create a folder on e.g. the ( little icon that appears )
C: drive. 5. And if you want to create a copy of the file/folder in another
3. If you do not wish to create a folder in the root directory, location on your computer, right-click the item and choose
browse to the location of your choice. copy.
4. Right click on blank portion of the folder then click new and 6. Use windows explorer to navigate to the location where you
click folder. want to place a copy; right- click it choose paste or press.
How to move a file or folder in windows Ctrl + V to paste.
There are several ways to do this; we will discuss one of them. Click the close button.
Steps 1. You can find the close button in the upper right corner of the
1) Choose start → all programs → accessories → windows XP. windows explorer window to close the window.
2) The start button is located at the bottom; left hand corner of NB You can create a file/ folder in another folder like said before.
your desktop screen. Steps
3) Locate the file that you want to move. 1. Open the folder.
4) Double -click folder or series of folders to locate the file. 2. Right-click on any empty space
Move the file/ folder (copying, dragging and pasting). 3. Select new folder/ file type.
You move the file one or two ways; 4. Type folder name and press enter.
1. Your first option is to click and drag the file to another folder 5. For file you will be prompted to enter file name to save.
in the folder pane on the left side of the window To delete a file/ folder
2. Second option is to right click the file and choose send to. Options
3. Then choose from the option shown in the submenu that 1) There are many ways to do that.
appears 2) Right-click on folder/ file.
AMINU JAMES TELL: 0787745162 Email: [email protected]
26
ICT CLASS NOTES
3) Select delete. To do all the above, right click on any free space on the desktop and
4) Or select or click on folder/file once and press the delete key select properties option and use the dialogue box that shows up to
on the keyboard. set all that you want to set.
THE RECYLE BIN MAJOR ICONS ON THE DESKTOP
Just like the name suggests it’s a bin like a dust bin. It holds all Mostly on most computers, on the desktop you will find icons of
temporary deleted items both folders and files. frequently visited locations and programs like web browsers.
From the recycle bin then you can choose to delete it permanently or So therefore most computers show.
restore it to the location you deleted it from. 1. My computer icon shortcut to access all files and directories
To restore a file or folder on the computer.
1. Open the recycle bin by double clicking on its icon. 2. Mozilla Firefox/internet explorer icon all these are shortcuts
2. Right click on the file/ folder to select delete/ restore. for opening the browser in order to access the way on
Customizing the desktop internet.
This refers to changing your desktop appearance to what you want it 3. Recycle-bin icon- This is where every temporary deleted
to look like. You can mainly change; files / folders are kept waiting for either to be restored or
1) The desktop background image/ theme. deleted permanently.
2) The color theme. 4. My document icon- this is a short cut to access all documents
3) Change which icons/ shortcuts to appear on desktop created on the computer.
4) Resize the taskbar TASKBAR
5) Change appearance position of the start menu It is the bar that spans the bottom of a screen and contains the start
6) Font size of desktop icon names. button on the left side and the system tray on the right. The task bar
7) Screen resolution. also includes the current time on the far right side and can hold
8) Desktop color quality shortcuts to programs directly to the right of the start button.
9) Select screen saver and screen saver wait time
AMINU JAMES TELL: 0787745162 Email: [email protected]
27
ICT CLASS NOTES
COMMON UTILITIES 5. Disk cleaner finds files that are necessary to operating system to
Definition of utility program: take up considerable amounts of space. They help the user to
Utility programs commonly referred to as just “utilities” are decide on which files to delete when their hard disks are full.
software programs that add functionality to your computer or help 6. Disk compression utility transparently compress and
your computer to perform better. uncompressing the content in the disk hence increasing the
These include but not limited to antivirus, back up, disk repair, file capacity of the disk.
management, security and networking programs. 7. Disk defragmenter detects computer files whose content are
Utilities can also be application such as screen savers, font and icon broken across the several locations on the hard disk and move
tools and desktop documents. the fragments to one location to increase efficiency.
8. Antivirus used to detect and remove viruses examples of
Some utility programs help keep your computer free from unwanted antivirus utilities include Kaspersky, Norton, Smadav, avast
software such as viruses or spyware while others add functionality antivirus.
that allows you to customize your desktop and user interface. 9. Data recovery utilities used to restore or recover files or
Examples of Utility programs information that has been deleted accidently example is the
1. File viewer is used to view files and manage files in a computer. recycle bin, Norton unerase wizard.
Example is windows explorer. 10. Merging utility involves combining data from more than one
2. File compressor is used to shrink or reduce the size of files file into a single file.
example is WinZip. 11. Sort utility used for taking in data and re-arranging it in any
3. Diagnostic utilities used to detect problems of hardware and prescribed order.
software. 12. Disk repair utility used to check your disk for defects and make
4. Disk scanner is used to detect physical and logical problems of repairs immediately for example Norton disk doctor.
disk. 13. Search utility used to search and find files in a computer e.g.
Ava find
AMINU JAMES TELL: 0787745162 Email: [email protected]
28
ICT CLASS NOTES
14. Backup utility they make duplicate copies of every file on either File compression
internal or external media as security file for reference in case File compression utility is a software program that is used to
the original file is lost or destroyed. compress and decompress files. This is the process of reducing the
15. Screen saver are designed to prevent phosphor burn on CRT size of a file by almost 40% of the original size. Examples of
and plasma computer monitors by blanking or filling the screen compression utilities include WinZip, 7Zip, PDF (Portable
with moving images or patterns when the computer is idle (not in Document Format) etc.
use). How to compress files and attach it using WinZip
Uses and functions of utility programs 1. Simply right-click on the file or folder you want to zip
i. They are used to detect and remove computer viruses e.g. 2. Choose zip and email from the submenu
Antivirus utility like Kaspersky, Smadav. 3. WinZip will compress a file items in the temporal zip file
ii. Used for merging this is combining data from more than one 4. Create new email message and attach the file to it.
file into a single file e.g. emerging utility. 5. You can then address and email the message as you normally
iii. Used for copying files e.g. copy utility would do.
iv. Used for backing up data this is moving the content of a file 6. WinZip will automatically delete the temporary zip file when it
into a backup storage device e.g. backup utility. is no longer needed.
v. Used for renaming files e.g. rename utility. How to search for the files in windows operation system
vi. Used for searching and finding files e.g. search utility. In windows you can search for the following
vii. Used for data recovery e.g. data recovery utility Pictures: music and video (multimedia files)
viii. Used for repairing damaged files. Documents: word processing files, spread sheet files, text
ix. Used for defragmenting the hard disk e.g. disk defragmenter. etc.
x. Used for sorting data e.g. sort utilities All folders and files: everything on a removable media, your
hard drive etc.
Computer or people: computers that are part of the network 3) Click accessories
group or people in your outlook address box. 4) Click system tools then click defragmenter
Information in help and support center: MS help 5) If you are prompted for an admin password or confirmation,
documentation for windows XP professional. type the password or provide confirmation
Steps: 6) Click defragment Now
1) Click on the start button
2) Click search
3) In a search companion click files or folder
4) Click the down arrow bellow to look in
5) Click on the dive, folder, or the disk you wish to search.
6) Click search button.
Disk defragmentation
Disk defragmenter is a utility in MS windows designed to increase
access speed by re-arranging files stored on a disk to occupy
contiguous storage locations, a technique called defragmentation.
NOTE: Defragmenting a disk minimizes head on travel which
reduces the time it takes to read files from and write files to the disk.
Example of disk defragmenter is Disk defrag
Disk defragmenter runs on schedule but you can also defragment
your hard disk manually
How to defragment a hard disk in Windows operating system
1) Open disk defragmenter by clicking start button
2) Click all programs
AMINU JAMES TELL: 0787745162 Email: [email protected]
30
ICT CLASS NOTES
COMPUTER LABORATORY CARE AND MAINTENANCE Being able to use a mouse to interact with elements on the
screen
Being able to use a computer keyboard
Being able to use computer softwares to perform basic tasks
Being able to shut down a computer properly after use
Advanced Computer Skills
1) Computer programming
2) Understanding the problem of data security
3) Use computer for scientific research
vi. Greater earning opportunity this is through downloading free SECURE LABORATORY ENVIRONMENT
music, softwares and later sale them to make money Computer Laboratory
vii. Greater access to resources like softwares, movies, music, A computer laboratory refers to a room set aside for teaching and
academic research etc. learning of computers and other related technology. It can also be
examples watching pornographic materials like blue movies, Basic equipment that should be found in the computer
2) Health hazards caused especially when you over use There are a number of equipments that can be found in a computer
computers for example eye strain, back ache, neck ache, laboratory and they include the following.
4) Computers today have led to isolation of people in the Others include printers, loud speakers, cameras, scanners, and
society as they spend much of their time with computers than projector
real human beings. 1. Student station these are computers that the students use
5) Wasted time on useless chats on social media like Facebook, regularly during practical classes
6) Forgery for example use of computer equipment to forge 3. Switch is a network device to which all computers are
7) Virus attack which causes loss of information 4. Management station this is a computer that the teacher uses
to guide learners during practical classes
processing computers and for comfort of the computers users in the 3) No hand bags or back bags are allowed in the computer lab
lab. 4) Students must strictly come with one book and a pen for
7. Backup System taking notes
Backup system for all softwares, information, data and setups, this 5) Student must be smart before coming to the computer lab
handles having copies of all the softwares, data and information. 6) Sit where an instructor or a teacher allocates you
General safety precautions when in the computer laboratory 7) Avoid unnecessary movements and noise in the computer lab
1. Avoid smocking and exposing computers to dust 8) Do not touch any of the computer device in-front of you
2. Avoid carrying food and beverages to the computer lab unless you are told to do so by an instructor
3. Avoid unnecessary movements in a computer lab 9) Stand up smartly and walk out of the computer lab at every
4. Follow the correct procedure for shutting down the computer end of the lesson
to avoid data loss 10) Avoid transfer of stools or seats unless you are told to do so
5. Do not open metallic covers of computers or peripheral by the instructor
devices when computers are on and without permission 11) Avoid touching or playing around with socket switches in the
6. All power cables, network cables must be properly insulated computer lab
and well laid away from busy pathways in the room to avoid 12) Avoid writing on cables and any other materials in the
danger of exposing the users to electric shock and computer lab
interrupting network communication. Servicing and maintenance of a computer system
7. Computer lab should have a well serviced fire extinguisher to Computer maintenance means the software and hardware is cleaned,
put off fire in case of out beak. fine-tuned and better prepared for the unexpected.
Computer Rules and Regulations Servicing and maintenance of the computer system involves the
1) Never enter to the computer lab unless you are told to do so following
by the teacher 1. Hardware servicing and maintenance
2) Do not bring any kinds of drinks or eats in the computer lab 2. Information system servicing and maintenance
AMINU JAMES TELL: 0787745162 Email: [email protected]
34
ICT CLASS NOTES
Maintenance of computer in a good working condition 6. It reduces operational cost of an enterprise in a long run
1) Regular servicing should be done for both hardware and 7. Encourages driver compatibility
software Terms used in computer preventive maintenance
2) Computer require special cleaning even on outside and Software update
hardware parts This provides bug fixes and minor software enhancements and is
3) Always use regularly updated antivirus softwares to protect made available by free download. Software update is sometime
computers from viruses and worms referred us software patch because it is applied over a software that
4) Carry out disk defragmentation where necessary you currently use already have installed in your computer.
5) Always use optimizer utilities to modify programs to make Hardware update
the computer to improve on the performance and increase on This is the act of bringing a computer hardware device up to date by
speed acquiring a new one or replacing a specific part of the component
Advantages of servicing and maintaining a computer system e.g. putting anew motherboard in a computer system unit.
1. It speeds up your computer Software upgrade
2. It is a preventive measure to protect your computer from Is the purchase of a newer version of the software you currently use
viruses and other malware for example keeping your of a more fully featured version that provides better performance.
antivirus updated will make it detect and remove viruses Hardware upgrade
from the computer before getting to your computer. This is to replace a hardware device with one that provides better
3. Prevents loss of information this is by hackers or intruders performance
who may get familiar with your computer system as they Software installation
monitor it over time and end up getting to unauthorized This refers to setting up for use a computer software program on the
information. computer
4. Increases productivity of both a hardware and software
5. Gives a computer a long life
AMINU JAMES TELL: 0787745162 Email: [email protected]
36
ICT CLASS NOTES
Fine tuning (piece of computer hardware equipment) used to provide data and
This means making small adjustments to a computer in order to control signals to an information processing system such as
obtain optimum performance for example adjusting display computer or other information appliance.
appearances on a monitor Each input device inputs data in specialized way. This means each
input device is designed to enter specific type of data. So the device
COMPUTER HARDWARE
Computer hardware refers to the physical parts or components of a to be used depends on the type of data to be put.
computer, objects that you can actually touch. The data to be entered into a computer may take the following
Examples forms;
Monitor, key board, computer data storage, Hard Disk Drive, mouse, Graphics
printers, CPU, graphic cards, sound cards, memory, mother board, Images/photos/pictures
NB a combination of hardware and software forms a usable Examples of input devices include
computing system. Keyboard, Mouse, Joy stick, Scanner, Digital camera, Touch
Computer hard ware is divided in to; screens, Touch pad, Game pad, Microphone, Electronic white board
computer. In general computing, an input device is any peripheral calculator. It has the following parts.
a) Typewriter area this is a part that looks like a typewriter Function of keyboard buttons
keyboard 1) Space bar (longest button) it is used to create space within
b) Function Keys these are labeled F1-F12 that have different words and characters.
functions in different programs 2) Backspace it erases data on the left of the cursor and highlighted
c) Numeric keypad this is similar to a calculator and can be data
utilized as an adding machine once the Num lock is off. it is 3) Enter key pressing enter key takes you to a new line
usually located on the right side of the keyboard. 4) Delete Erases data on the right of the cursor and any highlighted
d) Special Keys on a computer keyboard, there are keys which are data
not found on a typewriter keyboard. These keys are the once 5) Shift is held down to turn on the capital letters and some
called special keys. they include Alt (Alternate), and Ctrl symbols like ?, !, >, <
(Control) 6) Caps Lock this turns on capital letters and vice versa (Upper
e) Cursor control Keys a cursor is a blinking bar on the screen case and lower case)
which indicates where a text should be. When the cursor fails to 7) Num Lock it makes the number pad active and vice versa
come, you cannot enter data in a computer. cursor control keys 8) Tab it can be used to create space in word document. it can also
include Home, End, Pagedown, Pageup, Insert, Arrow keys be used to navigate in group of icons, short cuts, menu items
The structure of a standard keyboard 9) End takes the cursor to the end of a line or when pressed it takes
the cursor to the end of the text
10) Home takes the cursor to the beginning of a line or when pressed
it takes the cursor at the beginning of a text
11) Escape (Esc) Terminates a process i.e. cancels commands in
most situations
12) Alternate (Alt) used in a combination with other keys to Functions of a mouse
produce a certain results e.g. Alt+Ctrl+Delete restarts a Pointing this means positioning over an items
computer Clicking this means pressing and releasing a mouse button one time
13) Control (Ctrl) it is used in combination with other keys to Double-Clicking this means to press and release a mouse button
produce a result twice in a quick succession
14) Page up takes you up the page Dragging this is moving of items around the screen
15) Page down takes you down the page Steps for Dragging
16) Insert allows the insertion of characters or text between a word 1) Position the pointer over an item
or replacing of a text or word 2) Press and hold down the left mouse button
17) Print screen (PrtSc) allows you to print all content on the 3) While still holding down, move the mouse to the desired
screen place
18) Scroll Lock allows you to control the scroll bar 4) Release the button
19) Pause/Break allows you to stop recursive information being Video input devices(scanning input devices)
displayed on the screen Video input devices send image data in to a computer. Video input
20) Function Keys this perform specific functions depending on the devices include digital cameras, scanners and barcode readers.
application package e.g. most applications use F1 for help Audio input devices(voice input)
Mice(mouse)/pointing input devices Audio input devices capture sound and send it to a computer. The
This is a device that controls the movement of a pointer on the most common input device is a microphone; but there is also MIDI
screen. It is an extension of your hand since you cannot touch inside keyboards and digitals instruments.
the computer. A mouse has three buttons i.e. Left button, right Touch screens
button and a scroll wheel Touch screens are used by touching display areas by either fingers or
stylus. They can be found on PDAs, mobile phones video games and
tablet PCs
AMINU JAMES TELL: 0787745162 Email: [email protected]
39
ICT CLASS NOTES
MONITOR Disadvantages
This is a TV like device which produces screen oriented soft copies Emit higher electromagnetic radiation (EMR) than LCD
of processed or store data in a computer. There are two types of monitors
monitors Consume a lot of energy than LCD monitors
Bigger in size and not portable
The occupy a lot of space
They are heavy hence not easy to transport
Liquid Crystal Display (LCD) Monitor
Uses a liquid crystal to create images on the screen, LCD monitors
Cathode Ray Tube Monitor Liquid Crystal Display Monitor produce colour using either passive or active matrix technology
Advantages of LCD monitors
Cathode Ray Tube (CRT) Monitor Consume less energy compared to CRT monitors
Works like a standard television because it also contains a cathode They are smaller in size compared to CRT monitors
ray tube. The front of the CRT is the screen, which is coated with They are light and portable
tiny dots of phosphor material Radiations emitted by LCD monitor is negligible
Advantages of CRT Monitor Disadvantages of LCD monitors
Can provide fast and rich colour output They are more expensive than CRT monitors
They have a very wide viewing angle They have a very narrow viewing angle
Cheaper than LCD monitors They have a slow response time
They initialize very quickly
STORAGE DEVICES RAM takes the form of integrated circuits and it is used to
Storage devices are devices that are used in a computer to record and temporary store data and allows quick access to this stored data.
keep data or information and instructions. There are many types of
data storage devices some of them can be classified as removable or There are three major forms of modern RAM and they include the
There are two types of memory 1. SRAM - Static Random Access Memory
RAM and ROM 2. RAM is a volatile storage meaning the content of RAM are
lost when power is switched off
RAM (Random Access Memory)
RAM is a volatile memory, meaning the content of RAM can be lost 3. RAM is much faster than ROM due to the nature it stores
RAM holds data or programs that the CPU is currently processing 4. RAM is a temporary storage
(active programs) that is why RAM is sometimes referred as a ROM (Read Only Memory)
working memory. RAM is the only memory that is directly accessed ROM is a class of non-volatile storage device that is programmed in
by the CPU and allows data to be accessed directly in random order, creation, it cannot be reprogrammed at any later time. Data stored in
in contrast other data storage devices such as CDs, DVDs, and ROM cannot be modified therefore ROM is mainly used to store
magnetic tapes as well as early primary memory types such as drum firmware
memory read and write data only in a predetermined order A firmware is software that is closely tied to specific hardware and
consecutively because of mechanical design limitations. unlikely to need any frequent updates.
Do not apply paraffin, petrol or acid They supplement RAM and facilitate backup
Do not expose them to magnetic fields Provide more permanent data storage if compared to RAM
Do not attach chip or rubber bands Dis advantages
Do not write or label using hands or sharp objects Relatively expensive
Do not scratch them Relatively heavy
Store them bottom down They are virus prone
Advantages of floppies Can crash leading to information loss
Cheaper compared to other storage media Factors to consider when choosing the storage device to use
Protected in plastic coating i. The type of data to be stored
Facilitates data transfer ii. The price of the storage device
They are in standard sizes for example 31/2, 51/2, 81/2 iii. The amount of data to be stored
They can be easily edited iv. Portability of the storage device
Flexible and light making it portable v. The durability of the storage device
Disadvantages vi. The availability of the storage device
They are virus transfer agents PROCESSING HARDWARE DEVICES
They have a very limited storage These are devices that are used to compute or manipulate data. The
They are relatively not very durable major example of processing device is the Central Processing Unit
execute a given instruction and also tell the computer how to control 4. Directs the movements of electronic signals between CPU,
the flow of instructions. Input, memory, and output devices
The CPU is housed inside the system unit, it is mounted on a circuit Registers
board called a motherboard or system board. These are additional storage locations in the CPU which hold data
The CPU consists of three major parts or components namely and instructions temporary during processing
1) Arithmetic Logic Unit (ALU)
2) Control Unit (CU) COMPUTER SOFWARE
3) Registers The usefulness of the computer hardware depends a lot on available
Arithmetic Logic Unit (ALU) software and ability of the users to use, monitor and control the
This unit of the CPU is capable of performing arithmetic and logical utilization of the software.
operations. It gets data from the computer memory and performs Computer software is defined as a set of instructions that govern the
arithmetic and logical operations like addition, multiplication, operations of a computer. It is a series of instructions that are
subtraction, division and comparison of two numbers to see which arranged in a logical way to run a computer. They tell a computer
number is greater than the other. what to do and how to do it.
Control Unit (CU) Softwares are classified into two categories which include
This unit of the processor controls all activities of the processor and 1. System software
also controls the input and output devices of the computer. 2. Application software
The control unit performs the following functions Each of the above categories of softwares perform different tasks
1. Fetches and sends commands to system devices and Characteristics of good software
peripherals 1) Security the software should make it possible to secure data and
2. Interprets commands i.e. it is the intermediary between the hardware from external threats
user and computer 2) Efficiency the software should make effective use of the storage
3. Controls and times all tasks by CPU space and execute commands as per desired time requirements
AMINU JAMES TELL: 0787745162 Email: [email protected]
46
ICT CLASS NOTES
3) Correctness software should meet all the specifications stated c) Programming languages
by the customer Operating system
4) User friendly the amount of time or effort required to learn how Is a generalized program that manages and coordinates all activities
to use a software should be minimal taking place with in a computer system, It serves as an interface
5) Reliability the software products should have no defects and between a user and the computer as well as between application
should not fail while in execution software programs and hardware devices.
6) Integrity a good software should not have side effects Application programs usually require an operating system in order
7) Safety a good software should not be hazardous to both for them to function, in other words, an operating system is the first
environment and human life software to be installed in a computer before other softwares like
8) Maintainability software should be easy to upgrade for more application software are installed.
functionality Examples of operating systems include the following
9) Portability the ability of a software to perform the same i. Windows operating system
functions across different platforms and environment e.g. same ii. Macintosh operating system
performance on Dell, Acer, and HP iii. Linux
10) Cost software should be affordable in terms of cost iv. UNIX
SYSTEM SOFTWARE v. Ubuntu
System software is a set of programs that control and maintain the vi. Symbian and Android for mobile phones
operations of the computer and its devices such as CPU Types of an Operating system
System software serves as an interface between the user, application a) Multi user operating system allows many users to access a
software and computer hardware. System software is categorized computer all at the same time
into three major categories which include b) Single user operating system allows only one user to run a single
a) Operating system application at a time
b) Utility programs
c) Multitasking operating system allows more than one program to Disadvantages of GUI
run at the same time They need significantly more memory and processing power to
d) Single tasking operating system allows only one program to run
execute at a time and the program must finish executing It occupies more disk space to hold all files for different
completely before the next program can begin functions
User application (Human Computer Interaction) It is difficult to automate functions for expert users
An operating system can interact with users mainly in two ways They can be irritating to experienced users when simple tasks
1) Graphical User Interface (GUI) require a number of operations
2) Command Line Interface (CLI) Command Line Interface (CLI)
Graphical User Interface (GUI) This is an operating system where a user interacts with the hardware
This is an operating system that provides graphics and icons in form and software using commands that are entered in the command line
of pictures and text that guide the user when interacting with the screen displayed by the operating system to the user.
computer hardware and software. This operating system is not user friendly because it does not have
This operating system is user friendly and has WIMP (Windows WIMP features
Icon Menu Pointing device) features Advantages of CLI
Advantages of GUI It uses fewest system resources in terms of memory and
1) User friendly because it is easy to learn and work with processor power
2) There is no need to type and memorize any command language It is faster for expert users because they can quickly access
3) The interface is similar for any application commands
4) GUI has coloured screen with icons each representing a program Many commands can be grouped together as batch files so that
which is appealing to the user respective tasks can be automated
5) It has help documents
iii. They are less user friendly not very easy to learn, write and BASIC Beginners All Purpose Symbolic Instruction Code
correct FORTRAN Formula Translation
iv. They are typical of the 1st generation computers Characteristics of 3rd Generation Languages
v. They allow a programmer to pay more attention to other They are less technical
problems They are user friendly
vi. More technical if compared to others They are a bit slow since they need to be interpreted to a
2) 2nd Generation languages( assembly languages) machine language first
th
These are languages that allow programmers to use abbreviations or 4) 4 Generation languages
easily remembered words instead of binary codes. Use mnemonic These are non-procedural or Rapid Application Development
code instead of binary codes for example tools where programs are written by telling the computer what to
Mult = multiply do as opposed to a step-by-step process. For example
Div = divide SQL( Structured Query Language)
STO =store NOMAN
nd
Characteristics of 2 Generation Languages FOCAS
Less technical compared to machine language C++
More flexible 5) 5th Generation languages (Natural Languages)
User friendly compared to machine language These are programming languages which questions or commands to
Faster compared to machine languages be performed in a more conversational manner or in alternative
rd
3) 3 Generation Languages ( High level languages) forms.
These are languages that use direct English words during Language translators
programming process. They are not machine dependent and can be These are programming tools which change programs written in 2nd,
used on more than one kind of computer for example 3rd, 4th, and 5th generation languages into a machine language or
COBOL Common Business Oriented Language
AMINU JAMES TELL: 0787745162 Email: [email protected]
50
ICT CLASS NOTES
code (0 and 1) which the computer can understand. There are three 6. Object code refers to the statements of a particular computer
major types of language translators and they include program that can either be read by the computer directly or
1) Assemblers after further translation
2) Compilers
APPLICATION SOFTWARE
3) Interpreters Application softwares are softwares that are designed to accomplish
a) Assemblers is a program that translates the assembly language specific tasks for a user. Today, there are millions of commercial
program into a machine language software products that cover a variety of tasks such as
b) Compilers is a program that converts the entire program written Making personal and business activities more efficient
in high level language into a machine language Assisting with graphics and multimedia projects
c) An interpreter is a program that converts each high level Supporting house hold activities
language statement into a machine language and executes it Improving education
immediately line by line or statement by statement. Facilitating communication
Terms used in programming Application softwares can be categorized into the following
1. Linkers combines compiled programs and determine where a) General purpose
will the program be located in the memory b) Special purpose
2. Bug this is an error in a machine program c) Customized/ tailor made softwares
3. Debugging is a process of finding and removing errors from d) Off the shelf software
a computer program a) General purpose
4. Machine code is a low level programming language that can These are softwares that can be used for a variety of tasks. Word
be understood directly by a computers CPU processor is the best example here because it can be used for a
5. Source code is human readable program statement written in variety of task like writing novels, memos, create restaurant menus
high level language or assembly language or even make posters
b) Special purpose A demo version of the software may be available for free but does
These are softwares designed to execute specific tasks for example not include all key components of the original software
camera application on a phone, chess game can only allow a person Advantages of off the shelf software
to play chess Relatively cheap
c) Customized (tailor made softwares) or bespoke softwares They are easy to use and suitable for people with little computer
These are softwares that are designed for a specific user or an knowledge
industry or purpose for example military missile operations, They are usually provided with extensive documentation to help
software for hospitals and medical equipment, software being used the user
in the bank etc. They are readily available compared to tailor made softwares
Advantages of tailor made softwares They can be customized to solve other problems
Solves the specific needs of an organization Have less errors
Easy to use since the person has the knowledge of the software Disadvantages of Off the shelf software
he/she needs in an organization It is quite easy to forget the commands to use in the package
More functions can easily be added and modified May not solve some of the needs of an organization
Disadvantages of tailor made softwares Examples of application softwares
Takes a lot of time to get especially from the time of its 1. Spread sheet softwares for example MS excel
development 2. Database management software for example MS Access
The function of tailor made software are limited 3. Presentation software for example MS PowerPoint, Lotus 1-
They are expensive to buy 2-2
Off the shelf software 4. Communication software for example Chartrooms
This is software purchased from the vendor store. Installation in a 5. Web browsing software for example Mozilla fire fox, pale
number of computers is specified by the vendor or producer. A user moon, Netscape, Google chrome
only buys a license to use it, but not the software.
AMINU JAMES TELL: 0787745162 Email: [email protected]
52
ICT CLASS NOTES
6. Media players for example windows media player, VLC 4. Telecommunication – refers to the transmission of data and
player information over a long distance e.g. TV. It includes telephone
7. Desktop publishing software for example MS publisher, telegraphy and TV means communication at a distance.
Adobe page maker 5. Teleprocessing – this refers to the access and modification of
8. Word processors for example MS word, Word Pad, Note pad computer files located elsewhere.
6. Downloading – to download is to transfer a file to your
COMPUTER COMMUNICATION AND NETWORKING computer from other computer on the network.
INTRODUCTION TO COMPUTER COMMUNICATION 7. Bandwidth – the amount of signals that can travel over
Definition of Terminologies communication channel in a given amount of time. The higher
1. Computer communication – is the transmission of data and the bandwidth the more data and information the channel can
information over a channel between two computers. transmit.
NB: communication is only complete when there is a feedback 8. Data encryption – this is the process of converting data into
(reply). coded form (cypher text) to prevent it from being read or
2. Computer network – is a collection of two or more computers understood by unauthorized people. Encrypted data is difficult to
and devices connected by a channel so that they can decode without a secret key
communicate with each other and share resources e.g. 9. Communication software – this is a set of instructions
Data (software) needed by a computer before it starts sending and
Software receiving data from other computers.
Peripheral devices IMPORTANCE OF COMPUTER COMMUNICATION
Processing power It allows sharing of hard wares like printers.
3. Encoding – this is the process through which the information It allows sharing of softwares between two or more
(data, text, voice or video) from the sending device is converted computers hence reducing on the cost.
into signals which the communication media can carry.
It allows sharing and transfer of data and information stored computer is on a network, a computer hacker can get illegal
on other computers on the network. access.
Facilitate communication between people e.g. through Rapid spread of computer viruses – if any computer system on a
electronic- mail, mobile phones etc. network gets infected by a computer virus, there is a possible
It enables online learning and collaborative research. threat of other systems getting infected.
Allows many users to access programs and data Expensive to setup – the initial setup cost of a computer network
concurrently e.g. allow access to common databases in can be high depending on a number of computers to be
banks. connected.
Has enabled improved travel service through e-bookings and Dependency on the main file serve, in case the main server of a
reservation. computer network breaks down the system becomes useless.
Provides for online employment e.g. telecommuting. Exposure to external exploits, someone on a different computer
Enable central management of resources like antivirus can send data into a computer in such a way as to attack it (make
softwares can easily be deployed and managed over a it lockup/crush, slow down or even take control over it)
network i.e. security updates are installed on only one Automatic downloads if a computer is connected to a network it
machine (sever) and then the machines receive the update is easier to down load and install softwares from the network
and get protected. onto a computer without any human intervention. If new
Cost saving e.g. expensive resources can be shared over the software has not been tested it could cause unpredictable
network hence reducing the costs. behavior.
Easier backup especially in centralized database. Computer networks can fail. Computer networks can be so
Makes personal communication easier. powerful and useful that it is very vital for them to be used. All
LIMITATIONS OF COMPUTER COMMUNICATION of the computers in an office building might become completely
Data theft if the computer is a stand-alone; physical access useless if a single component network fails.
becomes necessary for any kind of data theft. However if a
4. Gateway –is any device that can be configured to provide access 8. Repeater – a repeater receives signals from one segment of a
to wide area networks and host computers network, cleans it to remove any distortion, boosts it and sends it
5. NIC (Network interface card ) – is a device that creates a to another segment until it reaches a further destination.
physical link between the computer and a transmission media 9. Routers – is a device that inter- connects different networks and
like an Ethernet cable directs transfer of data packets from source to destination.
6. MODEM (modulator demodulator) - is a device that converts 10. Switches – this forward a packet to address mode without
signals from digital to analog and from analog to digital for a broadcasting and hence solves abroad casting stoma. It can be
purpose of transmission over analog or digital media. used as a bridge to connect several hubs in order to reduce
NB: Modulation is changing data from digital to analog collision problems caused by broadcast.
Demodulation is the changing of data from analog to digital 11. Intranet – is an internet network of an organization that uses
TCP/IP protocols supports media websites and accessible via a
FUNCTIONS OF A MODEM
web browser.
Enables a computer to send and receive data over a telephone
12. Extranet – these are wide area networks (WANs) but their
line
accessibility is only limited to those authorized to do so.
Provides continuous connection to the internet
Ugandan government connected to all embassies abroad on a
It converts data into sound so that it can be sent through a phone
single network which is accessed by diplomatic staff around the
line
world.
They can receive and send fax
7. Hub – its component that connects computers on a network. It
gathers all computers together at a central location. It connects
networks that have a common architecture ( same set of
softwares )
TYPES OF NETWORKS WAN is larger than a MAN and it covers every large geographic
There are various computer networks. They can be relatively small area such as a country, a continent, or even the whole world. It
or extensively large. The most common types of computer networks consists of many LANs and MANs connected together to form one
include: larger network, the best example of WAN is internet because
1. Local area networks (LAN) internet is the world’s largest WAN.
2. Metropolitan area networks (MAN)
3. Wide area network (WAN) NETWORK MODELS
NB: our area of focus will be on the first major three types of
computer networks and they include the following Peer-to-peer network
It involves sharing of information or resources between two or more
1. Local Area Network (LAN) computers without the use of a server. In other words there is no
LAN is a network that connects computers in a small geographic computer which is dedicated to act as a server. All connected
area such as a building like computer lab or an office. computers can act both a server as well as a client
NB: a wireless LAN (WLAN) is a local area network that does not Characteristics of peer-to-peer networks
use physical wires but uses wireless media such as radio waves. Each computer store files on its own storage devices.
Each computer on a network contains both network (OS)
2. Metropolitan Area Network (MAN)
and application software.
MAN is a large computer network that is usually designed for a city
NB: Peer to peer is ideal for home and small businesses
setting or a large campus. It usually connects two or more LANs
Illustration
using a high capacity backbone technology such as fiber optical
links or other digital media. MAN covers smaller geographic area
than a WAN.
Dependence- when a server goes down, operations will stop 3. Shared peripherals e.g. network printers, scanners, fax
across the network. machines etc.
Maintenance- large networks will require administrator to ensure 4. Client computer – these are computers sharing resources and
efficient operations. capable of sending requests and receiving data signals from a
server
COMPONENTS OF A NETWORK
This focuses on things that make up a network and they include 5. Sever- is a very fast processor computer dedicated to provide
1. Network operating system (NOS ) – master control program or specific services for other computers connected on the network
instructions that manage basic operations like data and file Functions of a server
transmission etc. examples of network operating system include Administering client computers
2. Hubs and repeaters – these are devices which accept 6. Transmission (communication media) this can also be referred
transmitted signals amplify them and put them back on the to as communication line, channel or link. They include
network rejuvenation. Hubs are typical of the LANS while Coaxial cable
NB: the most common network faults necessitating hubs and Fiber optic cable
7. Bridge- is a device used to establish a connection or a Factors to consider for a network choice
communication between different networks. A bridge connects Size of an organization peer-to-peer network configuration is
network segments together. ideal for less than 10 computers
8. Gateway –is any device that can be configured to provide access Need of a network for example network administrator, hardware
to wide area networks and host computers and software
9. NIC (Network Interface Card ) – is a device that creates a Level of data security needed peer-to-peer network configuration
physical link between the computer and a transmission media is not secure
like an Ethernet cable Amount of network traffic expected (bandwidth)
10. MODEM (modulator demodulator) - is a device that converts Network budget or cost of setting up the network
signals from digital to analog and vice – versa for a purpose of Maintenance requirement and costs
transmission over analog or digital media. Nature or type of business or organization
11. Router – is a device that inter- connects different networks and Advantages of a computer network
directs transfer of data package from source to destination. Enables electronic exchange of information and sharing of files
12. Switches – this forward a packet to address mode without Allows the users to access the same application program at the
broadcasting and hence solves abroad casting stoma .it can be same time
used as a bridge to connect several hubs in order to reduce Easy sharing of expensive hardware resources like printers, hard
collision problems caused by broadcast. disk hence reducing in the cost
13. Multiplexer is device which merges several low speed Enables centralized administration, support and control
transmission into one high speed transmission Security is centralized, improved and easy
A network device that allows several client computers to share a Backup becomes easy
single line Allows many users to work on the same document at the same
time
Facilitates easy communication for example through email and 1. Bus topology
other platforms such as social networks like Facebook, twitter 2. Ring topology
Disadvantages of a computer network 3. Star topology
It is more costly, running computer on a network than a stand- 4. Mesh topology
alone computer 5. Extended star topology
Networks are more vulnerable to virus attacks Bus topology
Require skilled knowledge and expertise because very many This is sometimes referred to as linear network topology. It consists
issues arise with network usage of a single central cable that connects all computers and devices
They are vulnerable to frequent crashes together. The physical cable that the computers and other devices are
High maintenance cost in terms of software cost and hardware connected for communication is known as a bus
replacement Illustration
Entire network fails if the server crashes or fails to work hence
causing a loss to an organization like banks
A break in a communication channel can stop the entire network
Information theft and Identity theft is possible on a network Back born (Bus) Work station Terminator
There is a greater risk and exposure to hackers which put private
Advantages of bus topology
data at risk
Easy to implement and extend (quick to set up)
NETWORK TOPOLOGY Cheaper than the other topologies
Topology is defined as the physical (real) and logical (virtual) layout Computers and devices can be attached and detached at any
of computers and other network devices on a network. Topology point on the bus without disturbing the rest of the network
indicates how data is passed from one computer or device to another Failure of one device usually does not affect the rest on the
There are various network topologies used when setting up a network
network in an organization and they include the following
AMINU JAMES TELL: 0787745162 Email: [email protected]
61
ICT CLASS NOTES
Data, instruction and information in a bus network can be data is passed onto the next node in a ring until the destined node is
transmitted in both directions reached in the ring.
Cable faults are easily identified Illustration
Weight reduction due to less wires needed to set up
Node
Disadvantages
If there is a problem with the cable, the entire network goes
Advantages of Ring Topology
down
It covers a larger distance as compared to a bus topology and is
There is no central host computer to control the network
commonly used in wide area networks
Only one device can transfer item at a time
No collision occur because data takes one direction only
If many computers are attached, the amount of data flow
Very order network where every device has access to the token
increases which makes the network to slow down and also data
and the opportunity to transmit data
collision
The speed of data transmission is faster than bus topology
Limited cable length and a number of station
Disadvantages of Ring Topology
Performance degrades as additional computers are added
More difficult to establish
It is slower than the other topologies
If a cable fails the whole network goes down
Ring topology Data travel only in one direction to a device around the entire
It consist of a cable forming a closed ring with all the computers and ring
devices in a network If a node on the ring network fails, all nodes after the failed
A ring links all nodes together in a circular chain, the node nodes cannot function
examines any data that passes by to see if it is meant for it, if not the There is no central host computer to control network
Moves, additions and changes of devices can affect the network
Disadvantages of mesh topology Usually have three layers, the core layer, the distribution layer and
Generally too costly and complex for practical network access layer
Very difficult to setup
Lots of cables required so the installation cost become too high
Network size is limited by the number of interconnections that
can be made between the nodes
DATA COMMUNICATION (TRANSMISSION)
It requires that the nodes on a network possess some type of Definition
logical algorithm to determine the correct path to use at any Refers to a process of transmitting data signals from one point to
particular time another through a network or channel
It is a process through which signals are sent out through a channel
Extended star topology
between communicating computer devices.
Tree network topology is also known as hierarchical network
Elements of data transmission system
topology; this is because it contains different levels of hierarchy.
The basic elements or components of a data transmission system
The type of topology in which a central root node (the top level of
include the following
the hierarchy) is connected to one or more other nodes that are one
1. Message
level lower in the hierarchy(second level of hierarchy)
2. Sender
Each of the second level nodes will also have one or more other
3. Receiver
nodes that are one level lower in the hierarchy (third level of
4. Medium or communication channel
hierarchy) connected to it.
5. Protocol
The hierarchy of the tree is symmetrical each node in the network
6. Encoder
having a specific fixed number of nodes connected to it at the next
7. Decoder
level in the hierarchy.
Illustration wires, the cables like coaxial cables, fiber optic cables, micro wave
signals, satellite or any other medium used on a network.
Protocol
Sender medium Receiver These are set of rules that guide how communication is carried out
i.e. every device that wants to communicate with each other must
use the same protocol in order to exchange messages
Message
Encoder
The message is the actual information or data that is to be
Encoder is electronic device that receive data from a sender in a
communicated. It may consist of a text, number, picture, sound,
form of digital signals and converts them to a form that can be
video or even the combination of the above.
transmitted through a transmission medium
Sender
Decoder
This is a device that is used for sending data (message). It is
The decoder is an electronic device on a receiving end that receives
sometimes referred as a transmitter or a source. The sender can be a
data from a transmission medium and converts encoded signals i.e.
computer, a mobile phone, video camera, but usually computers are
analog signals into digital
being used as a sender in a communication system
DATA TRANSMISSION MEDIA
Receiver
The means through which data is transmitted from one device to
A receiver is a device used for receiving data or a message. It
another.
sometime referred as a sink or destination. A receiver can be a
There are two categories of transmission media used in computer
computer, a mobile phone, video camera, but usually computers are
communication.
being used as a receiver in a communication system
BOUNDED /GUIDED/ WIRED MEDIA (PHYSICAL
Medium or communication channel TRANSMISSION MEDIA)
A medium is the path through which data or a message travels from
Bounded media is the physical media through which signals are
a sender to a receiver. In data communication system, it includes
transmitted from one device to another such as a cable.
Examples of bounded/wired/guided media More resistant to radio and electromagnetic because it is heavily
Coaxial cables – this cable has a central copper core which may be insulated
made of solid or stranded wires. These cables are commonly used in Disadvantages
TV antennae. Thick coaxial is hard to work with
However, these cables are now obsolete in LAN’S. The twisted pair It’s heavy and bulky
is now the default media. However, it may also not last for long due Relatively expensive to buy and install as compared to twisted
to dynamic nature of networking. pair
Coaxial Cable Twisted pair cable
This is made up of four pairs of solid copper wire strands of
different colours twisted around each other. The twisting is meant to
reduce and protect against cross talk and to reduce the development
of an electromagnetic field around the two wires as they transmit
data. These cables are mostly used to transmit both voice and data.
Advantages
Stable even in high loads
Used for long distances e.g. (300-600 meters)
Transmits faster than twisted pair
It has a large bandwidth of up to 1GB P/S
Cross talk- is a source of background Noise from one UTP to
Can carry voice data and videos simultaneously
another twisted pair, normally running in parallel
Broken sections are difficult and expensive to repair travel in straight lines, both a sender and receiver must be aligned to
NB: Attenuation- Refers to the loss of signal strength over a given be strictly in line of sight. Microwave stations are normally located
distance as it moves along a transmission media on the top of the buildings, towers or mountains to avoid possible
Bandwidth- Refers to the maximum amount of data a transmission obstructions. Mobile phone transmitters use microwaves.
medium can carry at a particular time. Infrared waves
UNGUIDED/UNBOUNDED/WIRELESS (NON-PHYSICAL This is a wireless transmission medium that sends signals using
TRANSMISSION MEDIA) infrared light waves. Infrared transmission requires a line of sight
Unguided media is the type of media that is used to transmit data transmission i.e. the sender and receiver must be aligned so that
from one device to another without using physical connection nothing obstructs the path of infrared light wave. Communicating
between communicating devices. devices should be closed to each other (about 5 metres)
It refers to data signals that flow through the air. Wireless Satellite
communication is more convenient than installing cables but it has a This is a space station that receives microwave signals from an
slower data transfer and it is subjected to interference. Examples earth-based station, amplifies (strengthens) the signals and
include broadcasts the signals back over a wide area to any number of earth-
Radio waves based stations. Transmission from the earth to a satellite is called
Radio waves are used to transmit television and radio signals. They uplink and transmission from a satellite to an earth station is called
can penetrate through the walls and structure. The power of radio downlink
waves decreases sharply as they cover long distances. Bluetooth Communication satellites are used in applications such as air
technology also uses radio waves. navigation, television and radio broadcast, Global positioning
Microwaves System (GPS)
Microwaves are extremely high frequency radio waves. Unlike radio
waves, microwave signals must transmit in a straight line with no
obstruction between microwaves antennas. Because microwaves
AMINU JAMES TELL: 0787745162 Email: [email protected]
69
ICT CLASS NOTES
DATA TRANSMISION MODES Example of Half duplex transmission is police radio call, credit card
The way data is transmitted from one place to another. It is also verification system, automatic teller machine.
sometimes referred to as data communication or transmission
directions. Transmission modes or directions include
Simplex transmission
Half duplex transmission
Full duplex transmission Server
OR
Multiplex Transmission
Simplex transmission
Simplex transmission is a transmission mode in which data flows in
only one direction. It is used only when the sending device does not
Server
require a feedback from the receiving device.
Full duplex transmission
Example of simplex transmission is a Television broad casting
In full duplex transmission data flows in all directions at the same
time. Regular telephone for example supports full duplex
transmission and allows both parties to talk at the same time
Both directions
Server
Half duplex transmission
Half duplex transmission is a transmission mode which allows data
transmission in either directions, but only one way at a time.
Multiplex Transmission Each packet travels along the fastest individual available path to the
In multiplex transmission, several different types of signals can be recipient computer via communication devices called routers
carried out at once through the same time for example during video Packet switching is the technique of splitting data into individual
calls, text, audio and video can be multiplex over the same time packets before sending the packets to the packets along the best
routes available to the receiving end, where packets are reunited into
the original data and delivered.
Advantages of packet switching
Different types of signals
Packet switched network is more secure than of circuit switched
at the same time networks
Bandwidth of a packet switched network is used to full potential
Server
Packet switched network is not affected by line failure (it directs
Factors affecting data transmission
the signals)
Band width
With packet switching devices of different speeds can
Device connection if poorly connected
communicate
Type of transmission
Availability, No waiting for a direct connection to become
Direction of data flow
available
Communication protocols used
During disaster or crisis, when the public telephone networks
PACKET SWITCHING might stop working emails and text can still be sent through
When the computer sends data over the internet the data is divided
packet switching
into small pieces called packets, such packets contain the data as
Packet switched networks are more robust than circuit switched
well as the recipient (destination), the origin (the sender) and a
networks and more suitable for transmitting binary data
sequence information used to reassemble the data at the destination.
With the current advancement of technology it is possible to A connection between two devices is dedicated made of one or more
encode voice and send it in packet format with minimal links
problems. Advantages of circuit switching
Damaged packet can be resent, only damaged part can be resent Circuit is dedicated to the connection .no interference no sharing
and no need to resend an entire file Guaranteed the full bandwidth for the duration of the connection
Disadvantages of packet switching Guaranteed quality of service
If the packet switched network is under a heavy use there can be Simple abstraction –reliable communication between host ,no
a delay worries about loss or out of order packet
Data packet can get lost or corrupted Low pre packet overhead, forwarding is based on time slot or
Protocols are needed for a reliable transfer frequency, no IP and TCP/UDP header on each packet
Not so good for some types of data streams (e.g. real time video Simple forwarding-forwarding in circuit switching is based on
streams can lose frames due to the way packets arrive out of time slot or frequency and would not need to inspect a packet
sequence header.
Disadvantages
CIRCUIT SWITCHING
Circuit switching is the data transmission technology which requires Inefficient. The equipment may be unused for all of the
a dedicated connection between the sender and receiver before connection if no data is being sent, the dedicated time still
transmission can begin e.g. a traditional circuit switched telephone remains open
network (PSTN) use this method. Blocked connection. When resources are not sufficient,
A circuit switched network consists of a set of switches connected connection will refuse to be connected, and this circuit switching
However, each connection uses only one dedicated channel on each Connection set up delay. It takes a relatively long time to set up
Network state. The network modes in circuit switching must complicated and expensive communication devices it provides much
store pre -connection information and it is un able to store to higher speeds and greater accuracy than asynchronous transmissions.
avoid per connection storage and state fail over
DATA COMMUNICATION TOOLS
During crisis or disaster. The network may become un stable or There are a number of data communication tools and they include
un available the following;
It was primarily developed for voice traffic rather than data 1) Phones the days when people used land lines as their primary
traffic communication tools are over. Back then cell phones were
Wasted bandwidth. Since more traffic occurs in bursts in circuit thought of as a luxury. Now wireless phones are dominant form
switching this may lead to idle connection during silent period of communication in many countries. Text messaging is rampant
DATA SIGNAL TRANSMISSION METHODS and the advent of smart phones has enabled mobile phones to
When two devices exchange data, the data flows between two have PC functionality as well as functionality to send large
devices as continuous streams of bits. There are two basic data pictures and video files
transmission techniques for separating the groups of bits 2) E-mail is a function of internet and users can access it from
Asynchronous transmission transmits one bit at a time over a line devices like cell phone, PDAs and computers. It is virtually
at random intervals. Each byte is framed by controls a start but for instant.
making the beginning of the byte a stop, but for making the end of 3) Social networks e.g. twitter, Facebook, these enable instant
the byte and a parity but for error checking. Asynchronous interaction between users who can communicate directly
transmission is relatively slow and used for low speed transmission. 4) Instant messaging and Skype instant messaging is done most
Synchronous transmission transmits groups of bytes often on keyboard over the internet. Skype offers online
simultaneously at regular time intervals. The beginning and ending messaging and video calling all across the world via internet
of a block of byte is determined by the time of sending devices and Advantages of using a phone
receiving devices. Although synchronous transmission requires more You can carry a phone with you so you don’t miss important
calls
AMINU JAMES TELL: 0787745162 Email: [email protected]
73
ICT CLASS NOTES
If you are lost you can call for directions Because of their small size, they can be lost easily
If you are in the accident you can call for the police and if the Advantages of instant messaging
phone has a camera you can take the picture of the accident Ability to keep in contact with a family and friends when not in
You can listen to music, play games and text the same city or country
Most mobile phones have a calculator and phone book Ability to make new friends from around the world
You can use a mobile phone to call your customer or boss if you Sending messages to co-workers as short messages in the work
are running late for a meeting place
You can surf internet and connect with the whole world by Real time communication
mobile phone Ability to speak to multiple people online at the same time
You can chat or Facebook , twitter and video conference through inviting people to chat rooms
You can keep in touch with friends and family Files or pictures can be sent in the instant messaging
You can check your emails conversation
Customers can contact staff any time. It is free to use and quick to set up
Disadvantages of Phones Disadvantages of instant messaging
Mobile phones can be expensive Instant messaging systems are often used for gossiping and
They can damage your ears rumor spreading
Sometimes the reception is poor in some areas, limiting your Uncertainty that the person you are talking to is the person you
connectivity (you can’t talk underground or in the plane) are talking to
People use phones when they are driving and this causes Possibility of getting viruses from people you don’t know
accidents Likelihood of miscommunication because the screen separates
They can limit your face-to-face time with friends and family some individuals may not feel the need to use the appropriate
Staff can abuse their phones if they have internet connection netiquette
Can be hard for older people to use Potential for misuse
AMINU JAMES TELL: 0787745162 Email: [email protected]
74
ICT CLASS NOTES
Distraction as you work Increases risk of people falling prey to online scams that seem
Security for personal details is not guaranteed genuine, resulting to data or identity theft
Children tend to spend more time chatting to friends on their Potentially results in lost productivity especially if employees
mobile phones instead of bonding with their family who at a are busy updating their profiles instead of working
time will be sitting next to them Time consuming as people take time looking for movies,
Advantages of social networking pictures, reading clever posts
Opportunity to connect with family and friends Skype
Create new friendships with people around the globe and learn Skype is an internet service that uses voice over the internet protocol
more about the life in other countries (VOIP) technology to allow people from all over the world to
Facilitates open communication leading to enhanced information communicate.
discovery and delivery Advantages of Skype
An alternative source of entertainment as well Free communication tool
Allows employees to discuss ideas, post news, ask questions and Call across the world
share links Cheap to use (if you are subscriber)
Provides an opportunity to widen business contact Brings societies together
It is a recruitment tool as it target wider audience Video chat with friends and family
Low cost of advertising Business can use it to save other costs like advertisement costs
Eases communication with the customers Disadvantages of Skype
Expands market research Needs internet access for it to work
Disadvantages No language translators
Compromise to privacy International calls are costly
Opens up the possibility for hackers to commit fraud and launch Requires WIFI or 3G service to run
spam and virus attacks It can be another tool used for cyber bulling
AMINU JAMES TELL: 0787745162 Email: [email protected]
75
ICT CLASS NOTES
INTERNET AND WORLD WIDE WEB (WWW) of a text or image that takes you to another web page or
Internet is a global connection of computer networks. Internet somewhere else within the current page.
interlinks together millions of computers to exchange and share 3. Web page is defined as a document on the World Wide Web
information all over the world. that includes a text, picture, sound and video.
Internet is the best example of WAN. Internet sometimes is referred 4. Website is defined as a collection of related web pages.
as a network of network because it brings together different types of 5. Home page refers to a first page that is displayed on a website
networks. 6. Web browser is a software application used to access and
Internet is not a physical thing (wires, cables, and computers) but it display content from the World Wide Web. It enables a user to
is a set of standards that allow computers of any brand to connect view web pages. Examples of web browsers include Mozilla fire
with each other with any kind of connection. fox, internet explorer, Google chrome, safari, opera and
Internet is just a technology for getting all kinds of computers to Netscape
communicate with each other and exchange data. 7. Web address each computer on the internet has a unique
The standards or rules which control the transfer of data and address which identifies it on the network. This address is
information (communication) between computers are called Internet contained in the hyper link text of a document. A web browser
Protocols (IP) uses this address to connect to a server over a network
TCP/IP (Transmission Control Protocol/Internet Protocol) is the 8. Client is a computer that requests for information from a server
set of rules that govern computer communication on a network machine.
including the internet. 9. Server is a computer that receives requests from a client
TERMS USED IN INTERNET computer and responds to those requests
1. WWW (World Wide Web) refers to a system of interlinked
10. Connection is the actual process by which a browser contacts
hypertext documents that are accessed via the internet.
the server computer on the network
2. Link refers to a connection from one web page to another using
11. Directory a collection of files in a given storage medium or
a hypertext. A link is also called hyper link which means piece
drive
AMINU JAMES TELL: 0787745162 Email: [email protected]
76
ICT CLASS NOTES
12. Browsing refers to search for a particular item on the World Send to and receive emails from other connected users
Wide Web. Social networking online with friends, relatives and family
13. Surfing is defined as moving from point to point on the internet through the use of e-mails and social networks such as
searching for topics on the internet Facebook, twitter, instagram, viber etc.
14. URL (Uniform Resource Locator) refers to an address which is Access to entertainment and leisure through online games,
typed in address box to get a web page or a web site. It contains magazines, listen to music and watch online movies
a protocol for accessing a server. E-library (e-books) allows access to current reading material like
Advantages of getting connected to the internet e-books
Access to wealth of information such as news, weather forecast Online chat you can access many chat rooms that can be used to
reports, and airline schedules meet new people and make new friends
Online services, internet has made life very easy and convenient Disadvantages of internet
with online services such as online shopping, booking tickets, Computer viruses these can be downloaded and spread across
pay taxes, transfer of funds and pay utility bills right from your machines and have destructive effects.
home. Internet provides access to unsuitable material like pornography
Internet is important for online banking services and managing Privacy violation internet can expose your personal information
investments such as name, address to wrong people like hackers who may
Internet is good for online research and taking online courses use it to cause a problem to you
Downloading resources like music, movies, e-books and Spamming this is sending unwanted e-mail in bulk such as email
softwares adverts
Internet is used for online advertisement for example through the Online fraud there are many thieves on the internet who can use
use of e-mails and websites their skills to cheat people or access their credit card numbers
Making cheap internet calls for example through Google talk and and make illegal electronic money transfers
Skype software
AMINU JAMES TELL: 0787745162 Email: [email protected]
77
ICT CLASS NOTES
Some people are getting addicted to the internet causing Internet software (protocols)
problems to their physical social interactions with friends Factors affecting internet connection speed
Initial costs of connecting to the internet are high for example Computer processor speed a person using a Computer with dual
purchasing computers and bundles Pentium iv processor is most likely to get faster connection to
Many people are computer illiterate and so they cannot use the internet as compared to the one with Pentium ii and Pentium iii
internet hence being left out Distance data travel actual internet speed may vary depending on
Internet has led to moral degeneration among the youth as a the distance the data travels
result of watching pornographic materials like blue movies and Heavy traffic on the internet may also affect the internet speed
necked pictures i.e. the greater the number of computers on a network, the more
Theft of personal information, if you are using the internet for internet speed reduces
online banking, social networking and other online services, you Malware, viruses and spyware hinders the operation of programs
may risk your personal information such as name, address, credit on the computer regardless of the processor strength hence
card numbers etc. slowing down the speed of connectivity
There is a lot of wrong information on the internet i.e. any MODEM speed if the MODEM is substandard with low rating
person can post anything on the internet or not compatible with the service provider, this will slow down
Health problems due to continuous usage of computers on the the speed at which data is transmitted
internet for surfing like wrist pain, eye strain Natural conditions such as rain, stormy weather and thunder may
Requirements for connecting to the internet interfere with transmission of data signals which may in turn
Computer affect the speed of connection
Network Interface card Hardware problem may also affect the connection speed for
Modem example a poor network card, video card or signal receiver may
Physical connection like phone line seriously reduce the speed of data being processed by your
Internet service provider to supply internet
AMINU JAMES TELL: 0787745162 Email: [email protected]
78
ICT CLASS NOTES
Examples of internet service providers include Security levels ISP should have a security system to ensure that
3. Africel Price cheap packages for home or personal use and expensive
ISP takes care of technical aspects of connecting your computer to Support services (customer care) clarify how support is offered
internet. ISP offer internet in three distinct ways for example is it 24 hours a day, 7 days a week?
Protocols
AMINU JAMES TELL: 0787745162 Email: [email protected]
79
ICT CLASS NOTES
Length of contract many ISPs ask you to sign up for a specific 5. Internet relay chat (IRC) a live interactive discussions in
period of time like a year, eighteen month which parties on the network exchange ideas and observation
Compatibility that is to say the speed of the MODEMs and their electronically
software should match the speed of yours 6. News groups worldwide discussion areas where notices can be
Reliability consider how long the ISP has been in the business posted for anyone to view. They are equivalent of discussion
and how dependable and stable the services offered group or electronic bulletin boards
Email address check whether the ISP has email and World Wide 7. WWW (World Wide Web) refer to the system of interlinked
Web services hypertext documents that can be accessed via the internet
8. Instant messaging a combination of real time mailing by which
INTERNET SERVICES
After connecting to the internet, the following are services that a short text messages are rapidly exchanged over the internet with
another part of the world. This is done by remotely logging to a 9. Users network a system of WWW discussion groups not an
2. Email services it allows the sending and receiving of messages 10. Internet telephone (voice over the internet or voice over IP)
and files over the internet real time voice conversation transmitted between computers on
3. Mailing list it is very convenient when someone wants to send a the internet
message or newsletters for example to many people at ago 11. Web directory a list of websites and their URLs categorizing by
transferring files whether downloading or uploading to and from 12. Ecommerce conducting commercial activities on the internet
your computer with another computer on the network. 13. Social network Face book, twitter
14. Cloud computing a service in which a computer software 3. Protocols refers to a set of rules that allow computers to
hardware and data are accessed from anywhere and used on a exchange information
local computer
TYPES OF WEBSITES
15. Search engines software programs that look through the web to 1) Web portal is an internet based website that can perform much
locate sites matching to a keyword entered by the user. electronic functions and provides the user with quick access to a
WORLD WIDE WEB (WWW) variety of information and services. A central website that offers
1. World Wide Web (WWW) refers to a system of interlinked a host of internet resources or link to other site for examples
hypertext documents that are accessed via the internet. yahoo
2. URL (Uniform Resource Locator) refers to an address which is 2) Content aggregators an organization that combines information
typed in address box to get a web page or a web site. It contains such as news and entertainment sports scores, weather forecasts,
a protocol for accessing a server. photo graphs and video from a variety of sources and makes the
Example of a URL combined content available to its customers
http://www.newvision.co.ug.new/sport.topstory.html 3) A wiki website that allows collaborative editing of its content
http: (Hypertext Transfer protocol) protocol used for this and structure by its users for example Wikipedia
website 4) A blog is a discussion or informational site published on the
www: (host domain name) mean that the resource is in the www and consisting of discrete entries (post) typically displayed
www category in a reverse chronological order (the recent posts appear first)
co.ug (top level domain) gives the domain type company most are interactive allowing visitors to leave comments
new: a folder 5) Media sharing web sites these are websites that allow users to
sports: a subfolder upload photos, videos and audio to the website that can be
topstory.html: name of the web page (document) on a server accessed from anywhere in the world. For examples you
and file extension tube.com, daily motion.com, blip.TV
6) Online social networking platform for sites that focus on How to search for information from the web using a search
building and reflecting social relation among people who share engine
interests by posting information, comments, messages, images. Most search engine work the same basic way you type into the
Examples of these social networks include Facebook, twitter, search box the information you are looking for and click search
Google+ or Go
Web Browser Search engine list websites that contain the information, the
Web browser is a software application used to access and display results are known as “hits” the words you type into search box
content from the World Wide Web. It enables a user to view web are called “keywords”
pages. The keywords you use will greatly affect your results
Examples of web browsers include Other search engines like ask.jeave for kids lets you type in
Internet explorer, Mozilla Fire Fox, Opera, Safari, Google Chrome, questions without having to choose keywords
Netscape, Planet Web Then you can follow the website that has given you exactly what
Search engine you want.
Search engine is a website that collect, organizes and displays Search engine syntax
content from all over the internet. Tips to help make the most searches
Examples of search engines include Make your keyword as precise as possible
Google (http://www.google.com Use two or more keywords in your search but put the most
Bing (http://wwww.bing.com important keyword first
Yahoo (http://www.yahoo.com Makes sure you spell the keyword correctly
Ask (http://www.search.ask.com Always try more than one search engine, each search engine
does not look through every site on the web
Use AND if you want to get results with all the keywords you Be nice to others, no one wants to interact with people who are
type and to let the search engine know, make sure you use mean, being mean is anti-social and being nice is social
capital letters when typing “AND” Respect other people’s privacy
Use OR this will let the search engine know you want website Share your expert knowledge by giving positive advice politely.
that contain any of the keywords you type in. For the best result When everybody shares, you also benefit and this will make the
you should always enclose OR searches in parentheses world a better place.
Use “NOT” e.g. Program NOT programme Be forgiving of other peoples mistakes like spelling errors,
stupid questions.
NETIQUETTE Be ethical and aim acting within the laws of a society and cyber
Etiquette means the acceptable code of polite behavior in a society space
or among members of a particular profession or group. Respect other people’s time and bandwidth. Ensure that the time
Netiquette refers to the correct or acceptable way of communicating and bandwidth people spend reading your post is not wasted,
on the internet. It is a short form of Network etiquette or Internet post well prepared message and ensure that it is sent to right
etiquette. recipients.
It spells out the proper manner on the internet especially during Understand the group of people you are interacting with
chatting. It requires never forgetting that the other end of the especially when you join a new group understand peoples dislike
connection there is a person and that inconsiderate comments are and likes before fully contributing
offending via a computer screen as in a face-to-face encounter. Do not send emails at night
It is important to note that without rules there is no order and Do not spam
without order there is no organization. The following are the internet Do not flame
etiquette Tell the truth
Treat others the way you want to be treated Be your self
CYBER LAW Ways in which data protection laws protect personal data stored
Cyber law is a term used to describe the legal issues related to use of in computer systems.
information and communication technology, particularly Data should be processed fairly and lawfully
"cyberspace", that is the Internet. Data should be used only for the purpose for which it was
In essence, cyber law is an attempt to integrate the challenges collected
presented by human activity on the Internet with legacy system of Data should be kept for no longer than needed
laws applicable to the physical world. Data must be kept secure
Advantages of Cyber Laws Data must be relevant
Cyber law allows email to be a valid and legal form of Providing a right to view and change data
communication. No transfer of data to other countries without protection
Companies are able to carry out electronic commerce using the
legal ICT infrastructure. E-MAIL (ELECTRONIC MAIL)
Cyber law gives digital signatures legal validity and permission. E-mail refers to electronic sending and receiving of letters,
Corporate companies can engage in the business of being messages and documents over the internet. It is a service that enables
Certifying Authorities. the exchange of electronic messages over ICT devices like phones,
Cyber law allows Government to issue notification on the web computers. It is also transmission of messages to one or more
The Act enables the companies to file any document with any Each individual connected to internet has a unique email address that
organisation in electronic form. acts as a post office box which handles physical mails. One can
The IT Act also addresses the important issues of security, which receive and send mails to and from all over the world.
are so critical to the success of electronic transactions. How to use an email to communicate
IT Act allows corporate companies to have a legal solution in Two main things you need to communicate using email include
1. To communicate using email, first you need internet Parts of an email address
connectivity Example of email is [email protected]
2. You also need email account on any email provider sites Username e.g. jamesaminu31 it defines the owner of the address, it
Examples of these sites include Gmail, Yahoo mail, Zoho mail, is created by the user during account creation (Sign Up)
Lycos mail @ is a symbol which is read as “at” it separates the user name from
How to create an email account the other part of the address
1. Open your browser Sever name for example Gmail indicates that the server computer
2. Type in the address spaces http://www..gmail.com that host the email address is Gmail others include Yahoo, Hotmail
3. Click Go Period (.) it is read as “dot” is used to separate different parts of an
4. Click on sign Up or create a new account to fill in the sign email address
Up form Domain name for example .com identifies the type of institution
5. Enter the details required and click create new account offering a particular service for example .com, .co, .uk, .ac, .ug
6. Go to the inbox of alternative email account you have used to Some common domain names include
verify your account .educ for educational institutions
7. You are ready to go .gov for government institutions
How to send an email .org for non-governmental organizations
1. Open your Gmail account .mil for military institution
2. On the main Gmail page click compose button .com for commercial organization
3. Enter in the address you want to send to e.g. .co for a company
[email protected] .sc for school
4. You can enter more than one email address separating them .ac for academic institution
with commas to send to many people at once. .net for internet service provider
In some instances another two letter extensions is added after the 3. Cc: stands for Carbon Copy.it enables copies of the same
domain name to show the country where the website is hosted, for mail to be sent to the third party while acknowledging other
example recipients
.ug for Uganda 4. BCC: stands for the Blind Carbon Copy and enables copies
.au Australia of the same mail to be sent to the third party without
.br for Brazil acknowledging other recipients
.ca for Canada 5. Send: is a button clicked for the mail to be sent forward
.cn for China 6. Forward: enables one to send the received mail to another or
.eg for Egypt other persons
.de Germany 7. Delete: enables one to delete the email
.fr for France 8. Subject: carries the reason for the mail
.in for India 9. Compose allows one to create a new mail
.it for Italy 10. Date and time received (on): the time message was
.jp for Japan received
.tz for Tanzania 11. Body: the body contains a text that is the actual content
.ke for Kenya 12. Attachments: attachments are optional and includes any
.mx for Mexico separate files that may be part of the message
.za for South Africa 13. Signature: personalized information about the sender
.uk for Britain Advantages of using emails
Parts of an e-mail message Easy to use, e-mail applications have user friendly tools that help
An email address consist of the following parts during composing messages
1. To: this part carries the address of the recipient E-mails supports sending of attachments like documents, zipped
2. From: carries the senders e-mail address files etc.
AMINU JAMES TELL: 0787745162 Email: [email protected]
86
ICT CLASS NOTES
It is very fast in terms of speed .it is delivered instantly anywhere Disadvantages or limitations
across the globe E-mails carry viruses, recipients need to scan the e-mail
Easy to prioritize since the emails have subject lines, it is easy to Spam and junk, e-mails when used to send unsolicited messages
priorities them and ignore unwanted mails and unwanted advertisements create nuisance
Email messages can be sent to many recipients at the same time E-mail spoofing involves deceiving the recipients by altering the
Can also carry hyperlinks that connect to other web pages with addresses from which the email is sent
just a click Hacking and email interception, act of unauthorized attempts to
One can subscribe on the news and other online service through bypass the security mechanisms of an information system or
e-mail network
E-mail softwares have management features that help users to Misinterpretation, one has to be careful when posting any kind of
organize their messages in folders like inbox sent and draft content. If typed on a harry a matter could be misinterpreted
Easier for reference when one wants to reply to email there is a Crowded inbox , the email box may get over crowded with email
provision in the mailing system to attach the previous mails as which becomes difficult for the user to manage such huge chunk
reference of mail
No transport and stamp cost. Need to check inbox regularly, in order to be updated one has to
Email softwares has a good degree of security features such as check the email regularly which may be expensive in a long run
user name and password In case one loses his or her password, signing in may not be
Has in built dictionary which safeguards the sender from in possible and this may lead to loss of information
correct spelling and grammar E-mail may violate privacy in case one gets to know your user
Messages remain permanent for future and frequent accesses password
from any where
E-mail is an advertising tool. many individuals and companies
are using e-mails to advertise their products and services
AMINU JAMES TELL: 0787745162 Email: [email protected]
87
ICT CLASS NOTES
computing, there also exist disadvantages of cloud computing. computing platforms making cloud computing flexible, reliable, and
1. Security and privacy since data and infrastructure usable. These technologies include Virtualization, Service-Oriented
management is provided by the third-party. Architecture (SOA), Grid Computing, and Utility Computing.
2. It is very difficult for the customers to shift from one Cloud Virtualization is a technique, which allows to share single physical
Service Provider (CSP) to another. instance of an application or resource among multiple organizations
routing between the different clients. Grid Computing refers to distributed computing in which a group
4. In case of public cloud providers, the customer management of computers from multiple locations are connected with each other
5. Insecure or incomplete data deletion Utility computing offers computational resources on demand as a
Data Security and Training requirements Service-Oriented Architecture helps to use applications as a
Privacy Dashboard and reporting service for other applications regardless of the type of vendor,
Disadvantages of Cloud computing that data stored in a computer cannot be read or compromised by an
Service outage the fact that cloud services are internet based, no individual without authorization as well as protecting physical
one is free from service outage since access depends on the computer that stores data from physical theft.
internet connection The purpose of computer security is to protect an organization’s
Security and privacy in cloud computing is difficult to monitor valuable resources such as information, hardware and software.
customers have no control to the back end infrastructure of the Therefore computer system security is divided into;
cloud services Physical security
cloud applications may be expensive Data security
System design Taking advantage of basic hardware and software Protect your passwords. do not share passwords and change
security characteristics e.g. using system architecture that is able your passwords regularly
to design memory thus isolating privileged processes from the no Preform regular maintenance- learn how to use utilities that
privileged processes. diagnose your system for problems
Some of these measures that fall in four aspects include
COMPUTER SYSTEM PHYSICAL SECIRITY
Unauthorized users know your users and authenticate them Computer physical system security means keeping computers in a
before giving them access secure physical environment physically inaccessible to unauthorized
Encrypt sensitive data. users.
If there are too many accounts [users] centralize management Physical security describes security measures that are designed to
Monitor user’s actions. deny unauthorized personnel (including attackers or accidental
Limit number of passwords long in. intruders) from physically accessing a building facility resource or
Protect the network using firewalls. stored information and guidance on how to design structures to resist
Network encryption potentially hostile acts
Privilege management
Always save your work as you do and learn how to use the Physical data security can be handled by looking at these five
Never open e-mail attachments any how; always run any Access control
first Identification
Never trust disks from other people- scan them first Human response
Update your data protection utilities e.g. antiviruses Physical measures to protect computers and data
Make sure the room in which computers and equipments are INTERNET AND NETWORK ATTACKS
stored is well aerated with modern doors and windows In computer and computer network, an attack is any attempt to
Hire trusted personnel to physically keep data storage or destroy, alter, disable, or gain unauthorized access to or make
These attacks can deny access to information application system, Before attacking a network, attacker would like to know IP
or communication address of machines on a network, the operating systems they
Snooping use and the services they offer.
This is when someone looks through your files with the hopes of Social engineering
finding something interesting whether it is electronic or on Social engineering is the use of persuasion or deception to gain
paper access to information system. The medium is usually a telephone or
In the case of physical snooping people may inspect your e-mail message. The attacker pretends to be a director or a manager
dumpster, recycling bin or even your files cabinet , they can hold of the company.
look under your keyboard for post it notes , or looks for scraps of Examples of social engineering
papers tracked to your bulletin board 1. Faked e-mail
Computer snooping on the other hand involves searching 2. Fictitious competition-The social engineer manipulates a group
through your electronic file trying to find something interesting of users to participate in some fake competition for a jackpot
Sniffing prize, with the alternate purpose of eventually extracting
Packet sniffing is the interception of data packets traversing confidential information about the network and passwords.
network, the best counter measure against sniffing is end to end or 3. The helpful help desk-The help desk gets a call from a social
user to user encryption engineer impersonating a user reporting a forgotten password.
Eaves dropping (mapping) Viruses
When an attacker is eaves dropping on your communication, this Viruses are small software programs that are designed to spread
is referred to as sniffing or snooping. the ability of an eaves from one computer to another and to interfere or disrupt with normal
dropper to monitor the network is generally the biggest security computer operation.
problem that administrators face in an enterprise Virus is an umbrella term used to describe malicious programs
Counter measures are strong encryption services that are based that unwantedly install themselves onto your computer. It causes
on cryptography only.
AMINU JAMES TELL: 0787745162 Email: [email protected]
94
ICT CLASS NOTES
a range of damage. The good way to describe viruses is to call COMPUTER CRIME
them “malware” a software program that has malicious intent. Computer Crime refers to any criminal activities which involve the
viruses (malware) are commonly broken down into classic use of information technology to gain illegal or unauthorized access
viruses, worms ,adware and spyware to computer system with intent e.g. damaging, deleting or altering
Worm is the type of viruses that can spread without human computer data
observe your internet habit and then send you advertisements or Hacking –act of breaking into a computer system to gain
Ways through which viruses are spread Phishing-is the act of attempting to acquire sensitive
Email attachments information like user name, passwords and credit card details by
Infected boot discs e.g. CDs, flash disks, DVDs leaving a user to enter personal information through website
Instant messaging sites the internet to torture other individuals i.e. false accusations,
Fake antivirus software transmission of threats and damage of data and equipment
From mobile devices Identity theft –it involves stealing money and obtaining other
Friends and relatives often times we are sent viruses through benefits through the use of a false identity. identity cloning is the
our emails from people that we know and trust use of another users information to pose as a false user, illegal
migration, terrorism and black mail are often made possible by Privacy what information about one’s self or ones associations must
means of identity theft a person reveal to others, under what conditions and with what
Fraud –achieved by manipulating of computer records safeguards? , what things can people keep to themselves and cannot
spamming sending unsolicited e-mails be forced to reveal to others?
Deliberate circumvention of computer security system Accuracy who is responsible for the authenticity, fidelity and
Industrial espionage by means of access to or theft of computer accuracy of information and who is to be held accountable for errors
materials in information and how is the injured party be made whole?
Writing or spreading computer viruses or worms Property who owns information? , where are just and fair prices for
Salami slicing stealing money repeatedly in extremely small its exchange? Who owns the channels especially all always through
quantities which information is transmitted? How should access to these scarce
D.O.S attack resources to be allocated?
Making and digitally distributing child pornography Accessibility What information does a person or an organization has
Intellectual property theft , including software piracy a right or privilege to obtain under what conditions and with what
PRIVACY AND ICT ETHICAL ISSUES safeguards
Ethics in ICT focuses on ethical dilemmas that exists where human ETHICAL STANDARDS
beings, information objects and social computing technologies Information privacy or data privacy is the relationship between
interact collection dissertation of data, technology, the public expectation
Definition of computer ethics of privacy and the illegal and political issues surrounding them
Refers to human value and moral conducts for a computer user or Privacy concerns exist wherever personally identifiable
right or wrong behavior exercised when using a computer information is collected and stored in digital or otherwise.
Privacy and computer ethical issues involved are many and varied improper or non-existent disclosure control can be a root cause
however it is helpful to focus on just four. These may be for privacy issues
summarized by use acronym PAPA.
Data privacy issues arise in response to information from a wide Financial- information about a person’s financial
range of sources such as- transactions including the amount of assets, positions held in
Health care records. stocks or funds, outstanding debts and purchases can be
Criminal justice investigations and proceedings sensitive especially if criminal gains access to it
Financial and transactions Political- political privacy has been a concern since voting
Biological traits such as genetic material system emerged in ancient times. the secret ballot is the
Residence and geographic records simplest and the most wide spread measure to ensure that
Ethnicity political views are not known to anyone other than voter
Privacy breach themselves
So the challenge in data privacy is to share while protecting Educational- people may not like to have their school life
personally identifiable information including exams results, attendance, teacher assessments and
Different aspects of information privacy and violation concerns even characteristics to be disclosed.
may be on INTELLECTUAL PROPERTY
Internet- ability to control the information one reveals about Refers to creations of the mind inventions literary and artistic works
one self over the internet and who can access that and symbols names, images and design used in commerce
information has become a growing concern. Intellectual property is divided onto two categories
Cable TV- the ability to control what information one Industrial property which include inventions (patents) trademarks,
reveals about oneself over a cable television and who can industrial designs and geographic indications of the source
access the information Copy right which include literary and artistic works such as novel,
Medical- a person may not wish for their medical records to poems and plays, films musical works artistic works such as
be revealed to others, it may be because they would not wish drawings, paintings photographs and sculptures and architectural
Rights related to copy right include those performing artists in their Using flat panel monitors rather than cathode-ray-tube (CRT)
performances, producers of phonograms in their recordings and monitors.
those of broad casters in their radios or TVs programs. Purchasing equipment with Energy Star logo.
Two principal approaches have emerged Using notebook computers rather than desktop computers
a) Involving internet intermediaries in enforcement whenever possible.
b) Using internet technical measures to prevent access to Turning off the power strip when nothing is in use.
unauthorized content Employ alternative energy sources for computing workstations,
THE CONCEPT OF GREEN COMPUTING servers, networks and data centres.
Green computing is environmentally responsible use of computers Blank screensavers reduce power consumption as compared to
and related resources such practices include the implementation of moving ones.
energy efficient central processing unit, servers and peripheral Using peripheral devices that automatically turn on and off.
devices as well as reduced resource consumption and proper Disposing e-waste according to regulations.
disposal of electronic waste (e-waste) BENEFITS OF GREEN COMPUTING
E-waste is any refuse created by discarded electronic devices and Being energy-conscious and buying energy-efficient computers and
components as well as substances involved in their manufacture or
peripherals will help:
use.
Ways and means to conserve energy, thereby reducing the ill-
• Saves natural resources • Improves air quality
effects of ICT on environment include:
• Saves and protects water • Reduces mercury
Enabling energy management settings on the computer
resources emissions
Turning off the monitor when the user is away from the
• Makes home/work space
computer.
more affordable
Turn off a computer and peripherals when left unused for an
extended period of time
Planning for all computer-related activities to be done at once.
EMERGING TECHNOLOGIES Robotics programming a computer to see, hear and react to other
These are technologies that are new and currently developing or will sensory stimuli
be developed over the next five or twenty years plus and which will Natural language processing offers a greatest potential rewards
substantially alter the business and social environment. because it would allow people to interact with computers without
Examples include advanced robotics, artificial intelligence, digital need of any specialized knowledge. You could simply walk up to
forensic, a computer and talk to it. Unfortunately, programming
Examples of emerging technologies computers to understand natural languages has proved to be
Digital forensic more difficult than originally thought
Digital forensic is also referred as computer forensics is a process of Advantages of artificial intelligence
uncovering and interpreting electronic data for use in courts of law. Easier copying once artificial mind is trained in a task, that mind
It involves application of computer investigations and analysis can then be copied very easily compared to the training of
techniques to gather evidence suitable for presentation in the courts multiple people for the same task.
of law. AI would not need any sleep this would be an advantage because
Artificial intelligence (AI) it would not be interrupted from its task for sleep, lunch
Is the branch of computer science concerned with making computers Unemotional consideration of problems, while an artificial
behave like humans, the capability of machines to imitate intelligent minds could theatrically have emotion, it would be better for
human behavior, performance if it were programmed for unemotional reasoning,
Artificial intelligence includes when people make decisions sometimes those decisions are
Game playing programming a computer to play games such as based on emotions rather than logic this is not always the best
chess and checkers way to make decisions
Natural language programing a computer to understand natural Disadvantages
human language Limited sensory input compared to biological mind, an artificial
mind is only capable of taking in small amount of information
AMINU JAMES TELL: 0787745162 Email: [email protected]
99
ICT CLASS NOTES
The inability to heal, biological systems can heal with time and b) A serious long term project to create a machine capable of
treatment for minor conditions most biological systems can general intelligent actions or artificial general intelligence.
continue normally with only a small drop in performance. Most
Mobile collaboration
computer systems on the other hand often need to be shut down
Is a technology based process of communication using electronic
for maintenance
assets and accompanying software designed for use in remote
4G Cellular communication
locations, newest generation hand held electronic device feature
The fourth generation cellular communication system generally
video audio and on-screen drawing capabilities broad cast over
known as a 4G, it is the emerging technology of the current wireless
secure networks, enabling multiparty conferencing in real time
networks.
different from traditional video conferencing, mobile collaboration
In telecommunication, 4G is fourth generation of mobile phone
utilizes wires cellular and broad band technologies enabling
communication technology standards which is a successor of 3G
effective collaboration dependent of location.
standard.
Machine translation
Artificial Brain (Mind)
Is sometimes referred to as by abbreviation (MT) not confused with
This is the term commonly used in the media to describe research
human aided translation (MAHT) is a subfield of computational
that aims to develop software and hardware with cognitive abilities
linguistics that investigates the use of the software to translate text or
similar to those of an animal or human brain
speech from one natural language to another.
Research investigating artificial brains plays three important roles in
Machine Vision (MV) is the technology and method used to
science
provide imaging based automatic inspection and analysis for such
a) Ongoing attempt by neuron scientists to understand how human
applications as automatic inspection process control and robot
brain works known as cognitive neuron science. Although
guidance in an industry.
experiment in philosophy of artificial intelligence demonstrating
that it is possible in theory to create a machine that has all the
capabilities of human being.
AMINU JAMES TELL: 0787745162 Email: [email protected]
100
ICT CLASS NOTES
Question answering (QA) Expertise employee will require training in programming and
QA Is a computer science within the field of information retrieval interacting with new robotic equipment this normally take time
and natural language processing (NLP) which is concerned with and financial implications.
building system that automatically answer questions posed by Safety robots may protect workers from some hazards but in the
humans in natural language meantime their presence can create other safety problems
QA implementation usually a computer program may construct a
NB
database of knowledge or information usually a knowledge base
Digital divide and Digital migration
more commonly QA systems can pull answers from an unstructured
Digital divide is a term which refers to inequality between one or
collection of natural language documents.
more groups in terms of access to, use of, or knowledge about
Application areas of some of the emerging technologies
information and communication technologies.
Advantages of industrial robots
Digital migration refers to the transition or switch from analog data
Quality robots have a capacity to drastically improve product
transmission to digital data transmission.
quality
Production with robots, throughput speed increases which
impacts production because they have the ability to work at a
constant speed without pausing for breaks, sleep, vacations
Safety robots increases safety in a work place, workers are
moved to supervisory roles so they no longer have to perform
dangerous applications in hazardous settings
Saving greater worker safety leads to financial savings, there are
health care and insurance concerns for employees
Disadvantages of using robotics systems
Expensive initial investments of robots are high
AMINU JAMES TELL: 0787745162 Email: [email protected]
101
ICT CLASS NOTES
CAREERS IN THE ICT INDUSTRY (COMPUTER IT Support Specialist provides help and advice to people and
PROFESSIONALS) organizations using computer software or equipment. They assist
Web developers design, and create website. They are responsible
computer users who are having computer problems.
for the look of the site, the site’s technical aspects like performance
and capacity Programmers write and test code that allows computer application
Software Developers are creative minds behind computer programs, and software programs to function properly
some develop the application that allow people to do specific tasks Network Architects design and build data communication
on the computer or another device networks, including Local Area Networks, WAN and the internet
Network Administrator is responsible for the day-to-day Computer and Information Research Scientist invent and design
operations of the organizations network new approaches to computing technology and find innovative uses
System Administrator is responsible for well management and for existing technology. They study and solve complex problems in
configuration of systems and making sure that they work properly computing for business, medicine, science and other fields.
Information Security Analyst plan and carry out security measures Computer Technician is a person who repairs and maintains
to protect an organization’s computer networks and systems. They computers and servers. Technician’s responsibility may extend to
are important in averting cyber attacks include building and configuring a new hardware, installing and
Database Administrator use specialized softwares to store and updating software packages
organize data. They make sure that data is available to users and is Data Analyst inspects, cleans, transforms and models data with aim
secure from unauthorized access of discovering useful information, suggesting conclusions and
System Analyst study an organizations current computer system supporting decision making.
and procedures and design information system solution to help the
organization operate more efficiently and effectively. They bring
business and information technology together by understanding the
needs and limitations of both.
WORD PROCESSING SOFTWARE Production of Payroll where tables can be used for simple
Word processing is the process of creating a word document and calculations.
involves typing, editing, formatting and printing of text document Use of in built templates for creating curriculum vitae.
using a word processor. Limitations of using word processors
Word processor is a tool or program that can be used to create, edit, Word processors can lead to unemployment of secretaries since
format, store and print a document that contains text and graphics work which could need many people using typewriters to do can
Examples of word processors include: Microsoft Word, Corel be quickly accomplished by only one person.
WordPerfect, Lotus WordPro, Apple Pages, OpenOffice.org Writer, Word processors require computer literacy and IT skills which
etc. many secretaries don’t have.
Text editors are simple word processors that are generally used to Word processors can lead to eye disorders caused by continuous
type without any special formatting. looking at a light emitting monitor screen.
Text editors are mainly used to create small notes, memos and No work can be done with word processors when electricity is
programs. off.
Examples of common text editors are: Notepad, Notepad++, Gedit Word processors operate in an environment full of viruses and
etc. meltdowns which can lead to deletions and loss of data.
Uses of word processors in business and other jobs Word processors require purchase of expensive machines such as
Production of reports and business proposals. computers, and printers.
Making adverts and posters (a case for word and clip art WORD PROCESSING SOFTWARE FEATURES
application). Text formatting: A variety of quick text formatting options
Production of business cards. such as bold, underline, italic, change case, font color and font
Creating form letters and mailing labels size which gives documents a professional look.
Creating Publications Spelling and grammar checker: For checking and eliminating
errors in a document before printing. Spell checker checks and
corrects the spelling of individual words while a grammar Templates: Presence of preformatted elements such as designs
checker reports grammatical errors and suggests ways to correct and document templates e.g. cover pages which can be modified
them. and used.
Save: This feature helps the user to copy a document from the Printing: A variety of printing options are available for a user to
memory to a storage medium such as the hard disk in softcopy choose from e.g. single or multiple copies, full or part of the
for future use. document can be printed.
Word wrap: Word wrap feature automatically moves text to the Find and replace: For locating occurrences of a particular
new line at the end of page margin settings without pressing the character, word or phrase and replacing text.
Enter key. Tables: Information can be organized into rows and columns.
Mail merge: Mail merge feature creates multiple large numbers Thesaurus and synonyms: This is a feature that suggests
of documents from a single template and a single data source. It alternative words with the same meaning.
is used when several documents like initiation letters have to be BASIC TERMINOLOGY
sent to several people. Typeface is the shape of the characters. Some common
Clip art: Allows a user to easily create good drawings, charts, typefaces are Times New Roman, Arial, and Tahoma.
insert pictures and art. Line spacing refers to the amount of vertical white space
Page numbering, Headers and footers Ability to work on between two lines of text, from baseline to baseline. Line
many pages at a time such as through inserting page numbers, spacing is measured in points.
watermarks, headers and footers. Footer is a text that appears at Text alignment refers to the way lines of text are arranged
the bottom margin of each page of a document while header is a relative to the edges of a block of text. There are four types of
text that appears at the top margin of each page of a document. alignment: left, centre, right, and justify.
Symbols: A wider range of symbols such as Greek, Arabic, Justification is the process of aligning text in a document to
Latin, and Hebrew alphabet characters can be used when both the left and right margins at the same time.
creating a document.
AMINU JAMES TELL: 0787745162 Email: [email protected]
104
ICT CLASS NOTES
Indent is the amount of white space set in between the margin Footer - The footer refers to text that appears in the bottom
and the beginning of text. Examples of indents include the first margin of all pages in a document.
line indent, hanging indent and right indent. Ruler - You can use the ruler to set the indent, margin and tab
Formatting text is the process of changing the appearance of markers. Avoid using the space bar to align text!
text in a document. Formatting text involves using commands Tabs Stops– tab stops are places where text can be made to line
like bold, italics, underlining, changing font colour, etc. up. You can set a tab stop by clicking on the ruler bar at the
Editing text refers to the process of making changes to the desired position.
content of an existing document. Editing text involves Hard Copy– A copy of a document printed out on physical
commands like cut, paste, overtype, undo, insert, and delete. paper.
Copy – To place selected text on the clipboard, without Soft Copy– A copy of a document that is stored on a disk or
removing it from its current location. other computer storage device.
Cut – To remove selected text from its current position and Overtype Mode– Also called overwrite mode, causes any
place it on the clipboard. Copy and paste duplicated text, while characters you type to replace ("overtype") the characters at the
Cut and paste moves text to a new location. cursor. You can switch between overtype mode and insert mode
The clipboard is an area of memory in which you can store by pressing the insert key.
copied or cut text, graphics or any other items temporarily before Paragraph – The text between one paragraph break and the
being pasted into other locations. next. A paragraph break is inserted by pressing Enter key.
The paste special feature helps to avoid pasting text with all its Save – To write the document's current state from RAM to a
formatting. The paste special feature provides more control over storage device.
what to paste. Proofreading is the process of reviewing a document to ensure
Header- The header refers to text that appears in the top margin the accuracy of its content. Proof reading tools include spelling
of all pages in a document. and grammar check (F7), thesaurus, etc.
Bold: this feature makes text clear and thick in its appearance.
AMINU JAMES TELL: 0787745162 Email: [email protected]
105
ICT CLASS NOTES
Bulleting: inserting symbols at the beginning of each line to Page margin: white space between the edges of the document
create a bulleted list. from the top, bottom, left and right and where the text starts in
Change case: change text to various capitalizations such as the document.
upper case, lower case and toggle case. Page number: inserts numeric numbers, roman numbers and
Clip art: predesigned images that are inserted into the document alphabet letters at the margins of the document to create
to illustrate a specific content. numbered pages.
Drop cap: formats the first letter in the paragraph to be dropped Page orientation: switches the pages between landscape and
across a number of lines. portrait layouts
End note: endnotes are inserted under a separate heading, at the Save As: this feature allows the user to resave the document
end of the page. using different filename, file format or storage location.
Font color: this features changes the color of the text Underline: a feature that inserts a line at the base of the text.
Font size: this feature increases the size of the text that is to say Common editing features of a word processor
the height and width of the text Editing means removing mistakes and making a document error free,
Font type/type face/font face: this is the style and shape of Copy: Allows a user to duplicate a section of text.
characters Cut: Allows a user to remove (cut) a section of text from one
Footnote: footnotes are notes or citations at the bottom foot of place in a workspace of the word processor.
the page. Paste: Allows a user to insert a section of text somewhere else.
Italic: a feature makes text to slant at an angle to the right Delete: Allows a user to erase characters, words, or pictures as
Numbering: inserting numeric numbers, roman numerals and easily as they can cross them out on an ordinary paper.
alphabet letters at the beginning of each line to create a Insert: Allows a user to insert text anywhere in the document.
numbered list Find and replace.
Page break: starting next page at the current position of the Grammar and spelling.
cursor Setting language options.
AMINU JAMES TELL: 0787745162 Email: [email protected]
106
ICT CLASS NOTES
whereas the user needs to advance the lever of a typewriter Computers have Viruses, which lead to loss of data in soft
manually, at the end of every line. copies.
It is very simple to align text in a document to Left, Centre, Using word processors on light emitting computer monitors for
Right or Justified whereas with a type writer, one has to long leads to eye disorders, which isn’t the case with type writers
manually align the text, which is very difficult. Word processors require purchase of hard ware like printers in
A word processor has edit features such as Copy and Paste in order to obtain hard copies yet with typewriters, whatever is
which repeatedly occurring text in a document can be copied to typed is permanent and instantly available as a hard copy: there
and pasted from the clipboard whereas a type writer has no is no delay for printing or risk of unintended file deletion.
clipboard.
A word processor can work on many pages at a go by inserting
pages numbers, footers, headers, watermarks, etc. whereas a
type writer works on one page at a time.
A type writer makes a lot of noise during its operation as
compared to a word processor which is relatively quiet.
DISADVANTAGES OF USING ELECTRONIC WORD
PROCESSORS
SPREADSHEETS No skills are needed, hence, even a computer illiterate can use
A spreadsheet is a grid of rows and columns that accepts entry of manual spreadsheets
data, allows editing, formatting and manipulation of numeric data. Disadvantages of Manual Spreadsheets
Spreadsheets can also display data graphically with the help of They require a lot of manual effort and time
charts and graphs. Many errors are bound to be made
TYPES OF SPREADSHEETS Rubbing out to correct errors makes the work untidy
1) Manual spreadsheets. The manual spreadsheet is the most They do not have pre-existing tables as opposed to electronic
commonly used type by book keepers as a ledger book with spreadsheets
many sheets of papers divided into rows and columns on which They are very small in size
various amounts of money are entered manually using a pen or a They are not durable. They can easily wear and tear out
pencil and manipulated manually with the help of a calculator. They do not have automatic formulas that would otherwise
2) Electronic spreadsheets. An electronic spreadsheet is a quicken the work
spreadsheet prepared using a computer program that enables the You cannot easily insert or delete extra columns and rows
user to enter values in rows and columns and to manipulate them Advantages of Electronic Spreadsheets
mathematically using formulae and functions automatically. They have pre-existing tables, thus, no need to draw gridlines
Examples of electronic spreadsheet programs include; They have in-built formulas and functions, enabling automation
ViscCalc, Lotus 1-2-3, Microsoft Office Excel, Quattro Pro, in calculations and work manipulations
Microsoft Works, Multiplan, View sheet, Lucid 3D, etc. There are minimal errors and in case of any, they are easily
They are easy and cheap to acquire They have very large worksheets that can store a lot of work
They are suitable for draft or rough work Extra columns and rows can be inserted and deleted without any
They are not electronic, thus, can be used without electric power bad effect
AMINU JAMES TELL: 0787745162 Email: [email protected]
109
ICT CLASS NOTES
The work can be protected with passwords thus ensuring security however, these can be increased in the user’s interest and
Work can be enhanced to look very attractive with various renamed
formats to suit the user’s needs 3) Columns. These are vertical lines which run through the
The records can be sorted and filtered to get only those that you worksheet. Worksheet columns are labeled by letters; A, B, C,
want D, E… which are displayed in grey buttons across the top of the
They allow printing of multiple copies without re-creation worksheet
4) Rows. Are horizontal lines across a worksheet. Worksheet rows
Disadvantages of Electronic Spreadsheets
are labeled by numbers; 1, 2, 3, 4, 5… which are displayed in
They are expensive to buy and maintain
grey buttons across the left of the worksheet
They are electronic, thus cannot be used without electricity
5) A cell. This is an intersection of a column and a row. Each cell
They require computer skills and continuous training
on the spreadsheet has a cell address. A cell address is a unique
There is data loss due to virus attacks and system failure
name of a cell. It is given by the column letter and row number,
There are privacy problems like unauthorized access over
e.g. A1, B5, G6, D12, C1, A4, B3, etc. Cells can contain; text,
networks
numbers, formulas, etc.
Health related hazards as they are associated with use of
6) Range. It is a group of adjacent cells defined as a single unit. A
computers
range address is a reference to a particular range. It has a format
FEATURES OF ELECTRONIC SPREADSHEET SOFTWARE
1) Workbook. This is a collection of multiple worksheets in a
of top left cell address: bottom right cell address. e.g. D5:G10
single file 7) Value. This is a numerical entry in a cell. All values are right
equivalent of a work area in Microsoft Word. A worksheet is 8) Labels. This is a text entry in a cell. All labels are left aligned in
made up of rows and columns which intersect to form cells. a cell by default
Worksheets are labeled sheet1, sheet2, sheet3 by default, but 9) Name box. This displays the address of the selected cell or cells.
they can be renamed. A workbook by default has 3 worksheets, Also you can rename a selected cell or cells using the name box
AMINU JAMES TELL: 0787745162 Email: [email protected]
110
ICT CLASS NOTES
10) Formula bar. Is a bar at the top of the Excel window that you 16) What-if analysis. Is a process of changing the values in cells to
use to enter or edit values or formulas in cells or charts. see how those changes affect the outcome of formulas on the
11) Autofill. This is the feature that allows you to quickly fill cells worksheet. For example, varying the interest rate that is used in
with repetitive or sequential data such as chronological dates or the paying-back table to determine the amount of the payments.
numbers, and repeated text. To use this feature, you type one or 17) Freezing panes. This is where rows and columns are frozen
two initial values or text entries, and then Autofill does the such that they remain visible as you scroll through the data
restusing the fill handle, which is the small black square in the especially if the database is too big to fit on one screen.
lower-right corner of the selection. When you point to the fill Uses/Applications of Spreadsheets
handle, the pointer changes to a black cross. Autofill recognizes Preparation of budgets
series of numbers, dates, months, times and certain labels. Preparation of cash flow analysis
12) Sorting data is to arrange records in either ascending or Preparations of financial statements
descending order. Processing basic business information, like, job costing, payment
13) Filtering data is the displaying of records that satisfy the set schedules, stock control, tax records
condition from the parent list. Analysis of data from questionnaires
14) Database. These are data values that can be entered in the cells Presentation of information in tabular form, graphical or charts
of the spreadsheet and managed by special spreadsheet features forms
found on the data menu. The special spreadsheet features Mathematical techniques and computation like trigonometry
include; cell referencing, data replication, automatic Statistical computations like standard deviations.
recalculation, formulas and functions, data filtering, copy, cut
and paste, clip art.
15) Graphs. A graph is a pictorial representation of the base data on
a worksheet. Most spreadsheets refer to graphs as charts.A chart
is a graphical representation of data. A chart may be 2-D or 3-D
AMINU JAMES TELL: 0787745162 Email: [email protected]
111
ICT CLASS NOTES
B$14, D$2, $E2. 1) ##### Column is not wide enough, or a negative date
or time is used.
FORMULAS 2) #DIV/0! A number is divided by zero
Formulas are equations that perform calculations on values in your
3) #N/A! A value is not available to a function or formula
worksheet and return a value in a chosen cell, e.g. =A2+B2,
4) #NAME? Microsoft Office Excel does not recognize text in a
=(A3+B3+C3+D3)/4, =A6*B4, =C4-D4, =E10/G10
formula.
PRESENTATION SOFTWARE more effective and enjoyable and in the long run saves you time and
This is application software used to create presentations, which can effort.
communicate ideas and other information to a group of audience.
Simplicity of the presentation. The best slide is usually simple,
The presentation can be viewed as a slide show, which usually
easy and to the point. The audience may need more time to
displays on a large monitor or projected screen. Some presentation
understand complicated slides while time is always limited
software can convert an existing slide show into a format that can be
during presentations.
accessed on the web.
Know the audience and their expectations in order to give the
Examples of popular electronic presentation software include; right message to the right people. e.g. are they children, matures
Microsoft PowerPoint, Corel Presentations, Lotus Freelance or a mixture. Are they clients or seniors of the organisation
Graphics, Microsoft Producer, Open Office Presentation, etc. Relevance of the content. Ensure that the content of your slides
is relevant to the topic of discussion in order to capture the
Applications of Presentation Software
attention of the audience
1. Presenting learning materials to students in schools (CAL)
Use of images, graphics and diagrams. Slides are visual aid to
2. Presenting speeches and minutes in meeting
help you explain complex ideas in an easy way. Therefore, use
3. Used in training sessions
the right and relevant images, graphics and charts to represent
4. Used in presenting campaign manifestos
your ideas visually.
5. Used in conferences and seminars
Make the right choice of colours, font styles, font sizes,
6. Used in sales promotions to market products
transitions, animations, links which suit the viewers
7. Used in business shows, mobile kiosks and clinics
Advantages of Presentation Software
PRINCIPLES OF A GOOD PRESENTATION
When preparing a presentation, you must consider the following Presentation software usually provides a wide variety of
principles. This improves the quality of your presentation, makes it presentation formats and layouts for the slides
Multimedia components such as clip art images, video clips and 6) Placeholder. Placeholders are the containers in layouts that hold
audio clips can be incorporated into slides such content as text (including body text, bulleted lists, and
The timing of the slides can be set so that the presentation titles), tables, charts, SmartArt graphics, movies, sounds,
automatically displays the next slide after a predetermined period pictures, and clip art.
of time. 7) Transition effects. This refers to different styles in which slides
Special transition effects can be applied between each slide come and leave the screen during a presentation. Slide
The presentation can normally be viewed and printed in different transition is a special effect for introducing an entire slide
formats during a slide show
8) Graphics. A general term used to mean pictures, images, charts,
FEATURES OF ELECTRONIC PRESENTATION
SOFTWARE photo, tables, etc., that you can add to a presentation
1) Presentation. This is a PowerPoint file made up of a series of 9) ClipArt. A general term for a library of pictures in the computer.
slides, audience hand-outs, speaker’s notes and outline among Presenter’s notes, these contain ideas you want to discuss for
others. each slide in your presentation.
2) Slide. Is an individual page of a presentation 10) Action buttons. Are ready-made buttons that can be inserted
3) A slide master. Is the top slide in a hierarchy of slides that into your presentation. These enable you to perform actions upon
stores information about the theme and slide layouts of a clicking or moving mouse over them
presentation, including the background colour, fonts, effects, 11) Auto content wizard. This is a presentation wizard that contains
placeholder sizes, and positioning. data from which one can select and edit to create a personalized
4) A PowerPoint template. This contains layouts, theme colours, or customized presentation.
theme fonts, theme effects, background styles, and even content. 12) Slide layout. Slide layouts contain formatting, positioning, and
5) Animation. Refers to special effects for introducing text in a placeholders for all the content that appears on a slide. Layout
slide during a slide show. contains the theme (colours, fonts, effects, and the background)
PowerPoint Views
a) Normal view. Is a Tri-pane window that provides the text
outline of the entire presentation on the left, the current slide on
the upper-right, and speaker’s notes on the lower-right. This is
the default PowerPoint view
b) Outline view. This enables one to edit and display all
presentation text in one location instead of one slide at a time. It
appears without the objects or images in the slide.
c) Slide view. Shows a graphic view of the current slide for editing
and viewing
d) Slide sorter view. This displays the entire presentation so that
one can add, delete and move slide.
e) Notes page. Provides a large area to view or type speaker’s notes
on a slide
6. Data integrity. Refers to both correctness and consistency of 4. They are difficult to thoroughly test and audit errors
data. Correctness is being free from errors while consistence is 5. Initial expense. Because of their complexity and efficiency, they
having no conflicts among related data items include sophisticated database systems which can be expensive
7. Large data storage. It is capable of storing enormous data to setup
amounts for personal and organizational use 6. Requires special skills to handle. Being complex and
8. Non-redundancy. Eliminates or decreases duplication of data in enormous, databases require skilled personnel to develop,
the same container. No two data items in a database should establish and maintain
represent the same real-world entity. 7. Vulnerability. Data in the database may be exposed to software
9. Data independence. Both the data and the user program can be and hardware failures, sabotage, theft, destruction, virus attacks,
altered independently of each other. etc.
8. Routine back-up. Requires back-up systems, which are
DISADVANTAGES OF DATABASE MANAGEMENT
inconveniencing, complex, tedious and expensive
SYSTEMS
DISADVANTAGES OF PAPER/MANUAL/FILE-
1. Complexity. The systems are complex, costly, and take much
BASED/FLAT DATABASES
time to develop, e.g. they include sophisticated software
Before computerized databases management systems and even
programs that may require special hardware.
now data may be kept and managed manually on paper files and
2. Need for substantial conversion effort. Changing from a
filing cabinets. This system has the following drawbacks or
traditional file oriented system to a computerized database
deficiencies
system can involve large-scale reorganization of data and
programs. This can create user resistance 1. Data redundancy. Data are often repeated in more than one file.
3. Organization security may be compromised since a database is 2. Updating difficulties. Keeping all files up-to-date can be
used by many people, departments or personnel who may cause problematic
havoc by leaking out vital secrets
3. Data dispersion. Scattered data are difficult for programs and 4. Field type. This refers to how particular data items are stored in
people to share a table
4. Under-utilization of data. Dispersed data cannot usually be used 5. Field properties. This refers to specific characteristics of
to full advantage particular fields
5. Not durable. Data on manual papers does not last for long 6. Record. This refers to particulars within a file, or a set of entire
6. Exposed to risks. Data can be easily lost due to fire, rot, termites, data items in a row
rats, etc. 7. Macro. This is an automated procedure of action in a computer
7. Data dependence. Programs may be dependent on the data 8. Attribute. This refers to a group of fields or columns in a table
formats and file organization. 9. Primary key. This is a unique record identifier in the table. It is
DATABASE OBJECTS used to ensure that there are no duplicate fields in the table. It is
1) Table. Is a collection of data arranged and stored in rows and also used to create relationships among tables.
columns. It is the basic/primary object where all other objects 10. A foreign key, is a copy of the primary key in another table
derive data from. 11. A view. Is a virtual table that does not necessarily exist in its
2) Query. Is used to ask questions on table data and find qualifying own right but may be dynamically derived from one or more
answers. base tables
3) Form. Is a tool for displaying data from data tables easily and 12. Relationships. This refers to how two or more entities/tables
for entering & editing data in the data tables. share information in the database structure. That is, how data in
4) Report. Is a summarized and good-looking display of data from one table are related to data in another table. Relationships are of
tables and queries. It is for output only. three types; one-to-one (1:1), one-to-many (1:M) and many-to-
DEFINITION OF TERMINOLOGIES many (M:M)
1. File. Refers to the entire collection of data in the database.
13. Datasheet view. This is a table view which allows you to
2. Field. This is the entire column that contains similar data items
update, edit, format and delete information from the table.
3. Field name. This is the name/title of a particular field
14. Design view is a table view which provides tools for creating 3) Data manipulation language. This is used to manipulate data in
fields in a table, i.e. specify field names, data types, field the database. That is, it helps one to; add, change, select, and
properties and descriptions (a view for creating the table) delete data in the database and mine it for valuable information
CHARACTERISTICS OF DATABASE APPLICATIONS DATA TYPES, FIELD PROPERTIES, VALIDATION
1) Data is organized in rows and columns CHECKS AND ERRORS
2) Each column has a distinct name and represents an attribute of
DATA TYPES
table entities
Data type specifies and determines the kind/category of values or
3) All values in a column must conform to the same data format or
information entered in the field containers. There are various data
data type.
types applied in Microsoft Access and these include;
4) Each row represents a single entity occurrence (entity instance)
1) Text. Are alphabetic letters or numbers that cannot be
5) It contains tools known as database objects such as; forms,
calculated. Examples of such fields are; names, addresses,
queries and reports
subject names, course names, telephone numbers, etc. it can
COMPONENTS OF A DATABASE MANAGEMENT SYSTEM
contain up to 255 characters.
1) Data dictionary. This is an automated or manual tool used to
2) Number. Refers to numerical data you can calculate but not
store and organize the data in the database and defines each data
relating to money, e.g. age, height, weight, course duration,
field that will be contained in the database file including
score, number of items in stock. It can be whole number or
characteristics of each item
fraction.
2) Data definition language (DDL). It helps one to create and
3) Currency. Are numerical monetary values that can be calculated
maintain the data dictionary and define the structure of files in a
and may have a currency symbol or not such as £56000.05,
database. It defines each term as it appears in a database, e.g.
59000.89, $5362, €4563, etc. It is suitable for field like; salary,
delete, create, browse, zap, index, sort, etc.
gross pay, net pay, PAYE, school fees, amount paid, etc.
4) Memo. It is for lengthy descriptive text and numbers usually
several sentences or paragraphs. It can contain a maximum of
AMINU JAMES TELL: 0787745162 Email: [email protected]
121
ICT CLASS NOTES
32,000 characters. It is suitable for fields like; remarks, open other pages or documents, e.g. e-mail address, website,
comments, particulars, descriptions. bookmarks, etc.
5) Date/Time. For months, date and time values that are in the 10) Lookup wizard. Refers to a list of items in form of a list-box
form; dd/mm/yy or dd-mm-yy, i.e. date/month/year for dates from which you can choose the desired item during data entry,
and Hr:Min:sec, i.e. Hour:Minutes:Seconds for time values. It is especially if that data exists in another table or form. It is
suitable for fields like; date of birth, date of joining, on/off set suitable for repetitive data such as marital status; single, married,
date/time, date/time of departure/arrival, etc. separated, divorced, widowed, etc
6) AutoNumber. A number that automatically increments for each 11) Calculated data type. This new data type lets you create a field
record you enter. It stores sequential numbers entered that is based on a calculation of other fields in the same table.
automatically by Microsoft Access starting with one. They are For example, you might create a Line Total field that contains
unique and can make a good primary key. It is suitable for fields the product of a Quantity field and a Unit Price field. Then, if
like; registration number, ID number, membership number, etc you update the Quantity or Unit Price field, the Line Total is
7) Yes/No. Here you can enter and store only one value or answer updated automatically
out of the available two options but not both. It is suitable for 12) Attachment. This is the preferred data type for storing digital
fields like; true/false, on/off, smoker/non-smoker, Ugandan/Non- images and any type of binary file, like; Pictures, Images, Office
Ugandan, in/out, etc. files
8) Object linking and embedding (OLE object). For object data FIELD PROPERTIES
and other binary information such as; sounds, symbols, These are traits or characteristics defining data entered in particular
graphics/pictures such as; signatures, thumbprints, company fields. Common properties include
logos, one’s photo, etc. 1) Field size. This specifies the maximum length of a field. That is,
9) Hyperlink. Stores data in form of hyperlinks, which are the the maximum number of characters to be stored in the field. e.g.
blue-coloured hotspots or connections that can be clicked to if you specify field size as 5, only 5 or less characters will be
allowed in the column.
2) Format. Specifies the way that the field appears by default when unknown. To enter a null, leave the required property as no and
displayed or printed. leave the field blank, e.g. a company without a fax number
3) Decimal Places. It is used to specify the number of decimal 11) Indexed. It specifies whether or not duplicates in the field
places to use when displaying numbers should be allowed in order to speed up the data search, sort,
4) Input Mask. Specifies the pattern or format for data to be filter, etc.
entered in that field, e.g. (--/--/--) for date. 12) Text Align. Specifies the default alignment of text within a
5) Caption. Used to set the text displayed by default in labels for control.
forms, reports, and queries. 13) New Values. Specifies whether an AutoNumber field is
6) Default Value. A value that appears in the field automatically incremented or assigned a random value when a new record is
even before you enter there anything. added
7) Validation Rule. An expression that must be true whenever you 14) Unicode Compression. Compresses text stored in this field
add or change the value in a given field. e.g. >=10 for age, when a small amount of text is stored (< 4,096 characters).
“married” or “single” for marital status, etc. 15) IME Mode. Controls conversion of characters in an East Asian
8) Validation Text. A message displayed when a value violates the version of Windows.
expression in the Validation Rule property. e.g. “please, marital 16) IME Sentence Mode. Controls conversion of sentences in an
status is either single or married” East Asian version of Windows.
9) Required. Specifies whether or not an entry must be entered in 17) Smart Tags. Attaches a smart tag to this field.
that field. That is, if yes, you must type an entry, but if no, you 18) Append Only. Tracks the history of field values (by setting the
may proceed without entering anything. property's value to Yes).
10) Allow Zero Length. A provision for a field to be left blank in 19) Text Format. Choose the property's Rich Text value to store
case of unavailable data to be entered later even if the setting for text as HTML and allow rich formatting. Choose the property's
required is yes. Nulls indicate that data may exist but it is Plain Text value to store only unformatted text.
DATA VALIDATION
WEB DESIGN Web hosts- are companies that provide space (web hosting) on a
WEBSITE PUBLISHING server they own for use by their clients. A web site can also be
Is the process involved in making information available on the hosted on a home or private server in a home or local area network.
World Wide Web. Which includes designing, organizing and Website - Collection of related hyperlinked web pages hosted on a
uploading of web pages onto web servers? particular webserver on the World Wide Web. Each Web site may
IMPORTANT TERMS contain one or more web pages. Each site has a home page,
Content management: The activity of acquiring, collecting,
Webpage - Is a document, typically written in HTML that is
editing, tracking, accessing digital content to include in a web site.
accessible via HTTP (hypertext transfer Protocol), a protocol that
A content management system (CMS) - System with predesigned
transfers information from the Web server to display in the user's
templates used to manage the content of a Web site. It allows the
Web browser.
content manager or author, who may not know Hypertext Markup
Hyperlink - is the reference or navigation element in a document to
Language (HTML), to manage the creation, modification or
another section of the same document or to another document that
removal of content from a Website without needing the expertise of
may be on a different website.
a Webmaster
HTML- (Hypertext Markup Language) HTML uses blocks of text
Examples of CMS include WordPress, Joomla, MS front page,
enclosed within angled brackets which are referred to as HTML
Macromedia Dreamweaver.
tags. These tags are codes which describe the structure and
Webmaster - is a person who Creates and manages the information
formatting of the document (how the web page is displayed by the
content (words and pictures) and organization of a Web site or
browser). The tags describe normal text paragraphs, headings, bullet
Manages the computer server and technical programming aspects of
lists, etc. A user's Web browser reads and displays the HTML
a Web site Or does both.
document, according to the tags that were used to design the web
Website Hosting - Service that allows individuals and organizations
page.
to have their own websites accommodated on a particular web server
Home page - A home page is the first or introductory page of a
from which they are accessed by others on the World Wide Web.
website; it contains the introductory information about the site. By
AMINU JAMES TELL: 0787745162 Email: [email protected]
125
ICT CLASS NOTES
default, it is names as the index page or index.htm to indicate to the All pages in the web site should have a uniform layout.
browser that this is the first page to open in the site. Consistent colors, layouts and type enhance the image of the
CHARACTERISTICS OF A GOOD WEB SITE owners.
It should be easy to navigate with well arranged, easy to see USES OF A WEB PAGE OR WEB SITE
navigation buttons. A web site is a Publicity tool or exposure to the public of
It should have a Simple and clear layout of sections and content organizations such as a business or school.
which makes it user friendly, that is, the visitors should be able It is a Communication tool for information exchange between an
to the find content easily. organization and the public or a group of people.
It must be pleasing to the eye to encourage visitors to the site. A website provides a convenient and cheap base of operation for
It should load quickly to avoid disappointing potential visitors to individuals and businesses. For example, owners of websites can
the site. easily advertise on their websites.
It should have readable font, web safe eye pleasing colours so A website is Useful in Marketing of products.
that visitors can read the content easily. Web sites can be a source of income to advertisers and web site
It should be interactive with contact information, possibility of e- developers. Space can also be hired for advertisements.
mail, online communication forum and chats. Message boards
RELEVANCE OF SCHOOL WEBSITES
etc. School academic work can be posted on a school website for
It should have active links which enable visitors to access other students to access.
references. Dead link can frustrate visitors. Homework assignments may be included along with web-based
It should be frequently updated and must have a dated of last activities that students can complete after school.
update. The visitors to the site expect to find up to date useful Web Quests and research activities may be posted on to a school
information. web site, with relevant links for the students to access. Then
The web pages must have web page titles and brief summaries students can post the work they have completed based on their
about the page or site. research.
AMINU JAMES TELL: 0787745162 Email: [email protected]
126
ICT CLASS NOTES
A Web Quest is an inquiry-based approach to learning involving PTA meetings and fundraising activities-enabling parents find
students in a wide range of activities that make good use of the activities that fit their time and schedule constraints as well
Internet-based resources. During this activity, questions or as their interests.
problems are often researched, and learners work cooperatively It helps to develop school spirit by allowing Students to submit
to find solutions. Each learner within a group can be given a articles, reports on class trips, and special school events in form
"role," or specific area to research. of newsletters.
Teachers can share ideas with other teachers and make them Involving students gives them a chance to share their thoughts in
available to everyone else on the Website. writing and build school spirit.
It is possible to Communication to parents and the general
public.
Parents can have private access to their child’s class work and
keep abreast of homework/prep assignments, field trips and other
events.
The school website is used to show school information and
policy. Such information as school History, Mission, plans,
alumni, anthem and address. School policy information might
include use of the Internet in school, promotion requirements,
dress code, absences, and behavior expectations.
The site can be used to encourage parent involvement in school
activities by keeping them informed of opportunities such as
volunteering,
even a simple task like adding two numbers i.e. program written in Structured programming
this language look like this This is a programming in which the code is broken down into
11100011 00000011 10000001 specific purpose procedures or modules. Examples include COBOL,
0001111 10001101 FORTRAN, Pascal, dBase and C
10001111 11111111 1000011 Object oriented programming (OOP)
Assembler language is close to machine vocabulary rather than the This is a programming language model organized around “object”
human beings vocabulary. It was developed in order to overcome the rather than “actions” and data rather than logic. Examples include
difficulties of understanding and using machine language. This Python, C++, Java, VB.net and PHP
language helps the programmers to write programs as a set of Note that the designed program by OOP can be encapsulated i.e. its
symbolic operation codes called mnemonics. Mnemonics are program works can be hidden from the end user.
basically shortened two or three letter words.
Web scripting languages The compilation environment where your source program will
These are languages used to develop functionalities of the web page. be converted into a machine code
Examples include Java script, HTML (Hypertext Markup language), The execution environment where your program will be run
VRML (Virtual Reality Modeling Language) a specification for
THE PROGRAMMING PROCESS
displaying a 3D object on the WWW Developing a program involves steps similar to any problem solving
Factors to consider before choosing a programming language to task.
a computer program code There are five main stages in the programming process
Popularity because you are most likely to find people to 1. Define the problem
work with 2. Planning a solution
Language domain match choose the one that matches your 3. Coding the program
problem domain 4. Testing the program
Availability of libraries 5. Documenting the program
Efficiency 1) Define the problem it involves identifying a problem, breaking
Expressiveness it in small pieces
Project size 2) Planning a solution there are two common ways to plan for a
Tool support solution to a problem i.e. you can draw a flow chart or a pseudo
code or both, to help you in a step-by-step process of problem
Developing a program solving.
To create, develop and execute a program you need to invoke three 3) Coding the program this is the actual stage of writing or
environments i.e. editing, compiling, and running (executing) express your solution in a programming language e.g. using java,
The editor environment where you will create the program Pascal, C, C++ etc.
source code 4) Testing the program after writing your program, you must
prepare to test it, this involves desk checking, debugging.
AMINU JAMES TELL: 0787745162 Email: [email protected]
131
ICT CLASS NOTES
Pseudo code refers to a set of statements written in a readable Handling the planning of a solution in a diagrammatic form and
language (English like) but expressing the processing logic of a provides a plan which the computer program can be written. The
program. flow of algorithm can be seen by tracing through the flow chart
Guidelines for designing a good pseudo code Understanding the symbols used in the formation of flow charts are
Pseudo code lines should be clearly outlined and indented clearly An oval is used to indicate the beginning or
It should show clearly the start and stop of the executable the end of an algorithm
Write a pseudo code that can be used to prompt a user to enter two A rectangle indicates a computation, with the
numbers, calculate the sum and average of the two numbers and then result of the computation assigned to a
Laser Printer
Plotter
THANK YOU
I WISH YOU GOODLUCK
Touch Pad
Mouse
…………………………………………..