Comp 101 Notes (1)
Comp 101 Notes (1)
Course Aim To enable the Learners develop knowledge and experience; mastering all
and/or Objective computer basics. Also, to lead the student in a holistic manner to ever-improve
computer skills: This enables students further develop their capacity to use
generic applications in their daily activities.
Exercises and lab sessions reinforce the learning objectives and provide students
the opportunity to gain practical hands-on experience.
Course Nature and functions of computers; Introduction to basic components of a
Description modern computer system; Hardware, Firmware and Power. Identification and
description of the functions of the basic components of a computer system:
Processor, Motherboard, RAM/ROM, Hard Drive, Input/Output Adaptors and
Removable Storage Devices. Data processing. Software; System software,
Application software, software acquisition. Introduction to information systems.
Computer networks and the Internet.
-1-
INTRODUCTION TO COMPUTER APPLICATIONS
-2-
INTRODUCTION TO COMPUTER APPLICATIONS
1.0 Introduction
1.1 Basic Terminologies
1.2 Types of computers
1.3 History computing devices
2.0 Computer Hardware
2.1 The basic operations of computing
2.2 Input Unit
2.3 Central Processing Unit
2.4 Output Unit
2.5 Storage Unit
2.6 Data Representation and Number systems
3.0 Computer Software
3.1 Common features of software
3.2 System software
3.3 Application software
3.4 Software Development Tools
4.0 System Software-Operating systems
4.1 Definition of Operating system
4.2 Functions of Operating system
4.3 Examples of Operating system
5.0 Computer Application Software
5.1 Categories of Application Software
5.2 Drawbacks of Application Software
5.3 Ethics and Intellectual Property Rights
6.0 Computer Networking
6.1 Network Terminologies
6.2 Network Hardware and functionalities
6.3 Network Topology and structure
6.4 Network Protocol and Protocol stack
6.5 Types of Network and layout
6.6 Advantages of Network
6.7 Factors affecting Data communication devices
7.0 The Internet
7.1 Internet Terminologies
7.2 Types of Connectivity
7.3 Uses of the Internet
7.4 Impacts of the Internet
8.0 Impacts of computers in the Society
9.0 Security, Integrity and Control measures
-3-
INTRODUCTION TO COMPUTER APPLICATIONS
INTRODUCTION
Basic Terminologies
Data: data is the name given to basic facts, e.g. the number of items sold by a business, the name
of a customer, a line of text, or the numerical values used in mathematical formulae.
Computer: A computer is an electronic device that works under the control of stored programs,
automatically accepting, storing and processing data to produce information that is the result of
processing.
Program: a program is a set of instructions that is written in the language of the computer. A
program is used to make the computer perform a specific task, such as calculating interest
to be paid to savings account holders or producing a payroll. (Note: spelling program not
programme). The computer is only able to obey a program’s instructions if the program
has been first stored within the computer. This implies that the computer must be able to
input and store programs in addition to data. So, the computer works under the control of
stored programs.
Information: a distinction is sometimes made between data and information. When data is
converted into a more useful or intelligible form then it is said to be processed into
information.
Hardware: is the general term used to describe all the electronic and mechanical elements of the
computer, together with those devices used with the computer.
Software: is the general term used to describe all the various programs that may be used on a
computer system together with their associated documentation.
User Interface: it is the part of the software with which you interact. It controls how data and
instructions are entered and how it is presented on the screen.
An Icon: It’s a small image that presents a program, instructions or some object.
Instructions: set of rules and regulations to be follow when solving particular problem or
execution of a command.
Computer Types
a. Digital: Digital computers are so called because they process data that is represented
in the form of discrete values (e.g. 0,1,2,3 …) by operating on it in steps. Discrete
values occur at each step in the operation. Counting on one’s fingers is
-4-
INTRODUCTION TO COMPUTER APPLICATIONS
probably the simplest digital operation we all know. Digital watches have special
tiny, digital computers within them.
b. Analog: Analog computers are similar to measuring instruments such as
thermometers and voltmeters with pointers on circular dials. They process data in the
form of electrical voltages, which are variable like the variable positions of a pointer
on a dial. The output from analog computers is often in the form of smooth graphs
from which information can be read.
c. Hybrid: Hybrid computers, as their name suggests, are computers that have the
combined features of digital and analog computers.
a. Special purpose computers: as their suggests, are designed for a particular job only;
to solve problems of a restricted nature. Examples are computers designed for use in
digital watches, in petrol pumps or in weapons guidance systems.
b. General Purpose Computers: are designed to solve a wide variety of problems.
Within the limitations imposed by their design capabilities, they can be adapted to
perform particular tasks or solve problems by means of specially written programs.
Examples of computers:
-5-
INTRODUCTION TO COMPUTER APPLICATIONS
a Supercomputers
b Mainframe Computers
c Minicomputers
d Microcomputers
e Laptops/Notebooks
Supercomputers are high capacity machines that require special air-conditioned room and are
the fastest calculating devices ever invented. Super-Computers use “non-Von Neumann designs”
multiprocessor systems with simultaneous or “parallel” processing. They are used for complex
scientific application like weather forecasting, where large amount of data need to be
manipulated within a very short time.
Mainframe computers are very large, often filling an entire room. They can store enormous of
information, can perform many tasks at the same time, can communicate with many users at the
same time, and are very expensive. . The price of a mainframe computer frequently runs into the
millions of shillings. Mainframe computers usually have many terminals connected to them.
These terminals look like small computers but they are only devices used to send and receive
information from the actual computer using wires. Terminals can be located in the same room
with the mainframe computer, but they can also be in different rooms, buildings, or cities. Large
businesses, government agencies, and universities usually use this type of computer.
Minicomputers are much smaller than mainframe computers and they are also much less
expensive. The cost of these computers can vary from a few thousand shillings to several
hundred thousand shillings. They possess most of the features found on mainframe computers,
but on a more limited scale. They can still have many terminals, but not as many as the
mainframes. They can store a tremendous amount of information, but again usually not as much
as the mainframe. Medium and small businesses typically use these computers.
Microcomputers are the types of computers we are using in our labs. They are limited in what
they can do when compared to the larger models discussed above because they can only be used
by one person at a time, they are much slower than the larger computers, and they can not store
nearly as much information, but they are excellent when used in small businesses, homes, and
schools. These computers are inexpensive & easy to use. Two main categories of
Microcomputers include:
-6-
INTRODUCTION TO COMPUTER APPLICATIONS
technology advances, more and more features are being incorporated into
the system.
ii) Handheld computers Is a small PC designed to fit in your hand e.g
personal digital assistant (PDA) which can handle personal information
e.g calendar etc
-7-
INTRODUCTION TO COMPUTER APPLICATIONS
Instead of punched cards and printouts, users interacted with third generation computers through
keyboards and monitors and interfaced with an operating system, which allowed the device to
run many different applications at one time with a central program that monitored the memory.
Computers for the first time became accessible to a mass audience because they were smaller
and cheaper than their predecessors.
-8-
INTRODUCTION TO COMPUTER APPLICATIONS
COMPUTER HARDWARE
2.1 The basic operations of computing
The basic elements that make up computer system are:
a. Input
b. Storage
c. Control
d. Processing
e. Output
2. Storage: Data and instructions enter main storage, and are held until needed to be
worked on. The instructions dictate action to be taken on the data. Results of action will
be held until they are required for output. Main storage is supplemented by auxiliary
storage, also called backing storage, e.g. hard disks for mass storage purposes. Backing
storage is servers an important role in holding ‘maintained data’, i.e. data held by the
computer so that it can provide information to the user when required to do so.
3. Control: The processor controls the operation of the computer. It fetches instructions
from main storage, interprets them and issues the necessary signals to the components
making up the system. It all directs hardware operation necessary in obeying instructions.
4. Processing: Instructions are obeyed and the necessary arithmetic operations etc. are
carried out on the data. The part of the processor that does this sometimes called the
Arithmetic-Logical Unit (ALU). Although in reality, as for the “control unit”, there is
often no physically separate component that performs this function. In addition to
arithmetic the processor also performs what is called “logical” operations. These
operations take place at incredibly high speeds, e.g. 10 million numbers may be totaled in
one second.
5. Output: Results are taken from main storage and fed onto an output device. This may be
printed text, sound, charts, and graphs displayed on a computer screen.
-9-
INTRODUCTION TO COMPUTER APPLICATIONS
- 10 -
INTRODUCTION TO COMPUTER APPLICATIONS
Pointing devices
Source data-entry
Keyboard hardware: this is a device that converts letters, numbers, and other characters into
electrical signals that are machine-readable by the computer’s processors. It looks like typewriter
keyboard, and contains alphabetical & alphanumeric characters, numbers and other function
keys.
Pointing devices: control the position of the cursor or pointer on the screen. Example are; mice,
light-pens, touchpads etc
Source data-entry devices: these refer to menu forms of data-entry devices that are not
keyboards or pointing devices. They create machine-readable data on magnetic media or paper or
feed it directly into the computer’s processor. They include: scanning devices, sensors, etc
Control Section
The control section may be compared to a telephone exchange because it uses the instructions
contained in the program in much the same manner as the telephone exchange uses telephone
numbers. When a telephone number is dialed, it causes the telephone exchange to energize
certain switches and control lines to connect the dialing phone with the phone having the number
dialed. In a similar manner, each programmed instruction, when executed, causes the control
section to energize certain control lines, enabling the computer to perform the function or
operation indicated by the instruction.
The program may be stored in the internal circuits of the computer (computer memory), or it
may be read instruction-by-instruction from external media. The internally stored program type
of computer, generally referred to only as a stored-program computer, is the most practical type
to use when speed and fully automatic operation are desired.
Computer programs may be so complex that the number of instructions plus the parameters
necessary for program execution will exceed the memory capacity of a stored-program
computer. When this occurs, the program may be sectionalized; that is, broken down into
modules. One or more modules are then stored in computer memory and the rest in an easily
accessible auxiliary memory. Then as each module is executed producing the desired results, it is
swapped out of internal memory and the next succeeding module read in.
- 11 -
INTRODUCTION TO COMPUTER APPLICATIONS
In addition to the commands that tell the computer what to do, the control unit also dictates how
and when each specific operation is to be performed. It is also active in initiating circuits that
locate any information stored within the computer or in an auxiliary storage device and in
moving this information to the point where the actual manipulation or modification is to be
accomplished.
The four major types of instructions are (1) transfer, (2) arithmetic, (3) logic, and (4) control.
Transfer instructions are those whose basic function is to transfer (move) data from one
location to another. Arithmetic instructions are those that combine two pieces of data to form a
single piece of data using one of the arithmetic operations.
Logic instructions transform the digital computer into a system that is more than a high-speed
adding machine. Using logic instructions, the programmer may construct a program with any
number of alternate sequences. For example, through the use of logic instructions, a computer
being used for maintenance inventory will have one sequence to follow if the number of a given
item on hand is greater than the order amount and another sequence if it is smaller. The choice of
which sequence to use will be made by the control section under the influence of the logic
instruction. Logic instructions, thereby, provide the computer with the ability to make decisions
based on the results of previously generated data. That is, the logic instructions permit the
computer to select the proper program sequence to be executed from among the alternatives
provided by the programmer.
Control instructions are used to send commands to devices not under direct command of the
control section, such as input/output units or devices.
Arithmetic-Logic Section
The arithmetic-logic section performs all arithmetic operations-adding, subtracting, multiplying,
and dividing. Through its logic capability, it tests various conditions encountered during
processing and takes action based on the result. Data flows between the arithmetic-logic section
and the internal storage section during processing. Specifically, data is transferred as needed
from the internal storage section to the arithmetic-logic section, processed, and returned to the
internal storage section. At no time does processing take place in the storage section. Data may
be transferred back and forth between these two sections several times before processing is
completed. The results are then transferred from internal storage to an output unit, as indicated
by the solid arrow.
- 12 -
INTRODUCTION TO COMPUTER APPLICATIONS
Softcopy output devices: these are output devices that show programming instructions and data
as they are being input and information after it is processed. Examples monitor, flat panel
display, etc.
Hard Copy output devices: These are devices that print characters, symbols, and perhaps
graphics on paper or another hard copy medium. Examples are: printer, plotters, etc.
Other output devices: These refer to output hardware for sound output, voice output, video
output, virtual reality, and simulation devices. This includes: speaker, etc.
- 13 -
INTRODUCTION TO COMPUTER APPLICATIONS
Optical Mark Readers reads pencil or pen marks made in pre-defined positions on paper forms
as responses to questions or tick list prompts.
Cache memory is a small-sized type of volatile computer memory that provides high-speed data
access to a processor and stores frequently used computer programs, applications and data.
2. Processor
The Processor is one of the most important parts of a system and can mean the difference
between a system that frequently hangs and the one that runs smoothly. Some people might
think that going for the low cost single core or Dual Core processors is a good idea but I
would not recommend either of them for anyone who requires using a system for more than
basic usage. Moreover, one might be better off buying a Corei3 system instead of a
Core2Duo as the later might be more expensive and less efficient than the former.
3. RAM
It is obvious that for more professional tasks and to run a Xeon Server there will be more
RAM required than for merely using a PC for browsing the internet. Moreover, the RAM
type may matter more than many people might consider. For example, there are not many
applications currently available that can take advantage of DDR3 RAM types, one may be
better of saving some dimes by buying a system with a DDR2 RAM.
4. Hard Disk
Hard Disk considerations might not mean much to a lay user, nonetheless, having the right
amount of disk space and disk type might be the necessary for the efficient management of
regular tasks for a professional.
5. Brand
Some brands offer better warrantees, whereas others offer software packages that come with
the system. For example, a Dell laptop with the same specifications may be cheaper than a
Sony Vio. The reason is that Sony provides many of its own softwares with their laptops
which saves the users cost for buying software, e.g. a DVD burning. However, if you already
have many such licensed or freeware software available, then it might be better to go for a
cheaper brands.
- 14 -
INTRODUCTION TO COMPUTER APPLICATIONS
6. Peripherals
Peripheral devices such as printers, scanners,etc can significantly increase or reduce your
price for buying a new PC. It might be better off buying a system with a DVD combo drive if
you do not require writing data to DVDs.
7. Size
Some people prefer buying larger laptops for a better display screen, whereas other prefer
smaller and more portable sizes. If you are setting up a server which will be placed in a
server room then size considerations will not mater much as large servers with multiple SCSI
drives are normally quite big. Whereas, for people with weak eye sights a laptop with a larger
display screen might be worth the price.
9. Price
If you don’t have the cash to pay for lets say a graphic card with 1GB memory, than you
might be better off choosing suitable alternatives.
10. Usability
It is important that you first consider the tasks that you will be performing on your PC. If you
wish to buy a computer for simply browsing the internet and using some online services than
it might be better to buy a single core computer which satisfies your minimum requirements.
On the contrary if you require using it for heavy video editing and professional work, then it
might be better to buy a system that has enhanced multimedia options.
- 15 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 16 -
INTRODUCTION TO COMPUTER APPLICATIONS
=1+0+4
= 510
Exercise
Convert binary number 10102 to decimal number Ans 1010
Convert binary number 110012 to decimal number Ans 2510
Convert binary number 11111112 to decimal number Ans 12710
Convert 111 010 1012 into base ten Ans 2510
2 13 1 L.s.b
2 6 0
2 3 1
2 1 1 m.s.b
1310 = 11012 prove this
2 41 1
2 20 0
2 10 0 l.s.b
2 5 1
2 2 0
2 1 1
m.s.b
4110 = 1001012 prove this
Exercise
Convert 7310 to base 2 solutions 10010012
Convert 11110 to base 2 solutions
Convert 22110 into base 2 solutions 110111012
Convert binary fraction to decimal fraction
a) 0.101112 = 1 x 2-1 + 0 x 2-2 + 1 x 2-3 + 1 x 2-4 + 1 x 2-5
=1/2+ 0 + 1/8 + 1/16 + 1/32 = 0.5 + 0 +0.125 + 0.0025 + 0.03125 = 0.71875
Convert binary real number to decimal real number equivalent
b) 1101.10102 to base 10
11012 = 1 x 20 + 0 x 21 + 1 x 22 +1 x 23 = 1310
0.10102 = 1 x 2-1+ 0 x2-2 + 1 x 2-3 + 0 x 2-4= 1/2+ 0 +1/8 +0 = 0.5 + 0.125 = 0.62510
1101.10102 =13.62510
- 17 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 18 -
INTRODUCTION TO COMPUTER APPLICATIONS
2 6 0
2 3 1
2 1 1
1210 = 11002
Change 0.62510 to binary
Fraction Fraction x 2 Remainder New Fraction interger
0.625 1.25 0.25 1
0.25 0.50 0.50 0
0.50 1.00 0.00 1
0.62510 = 0.1012
12.62510 = 1100.1012
Addition of Binary Numbers
In the binary system the rules of binary when adding the number are as follows:
0 +0 = 0
0+1=1
1+0=1
1+ 1 = 0 with a carry of 1
Example
a) Add 10012 + 01012
Solution
1001 9
0101 5
11102 1410
b) add 01112 + 01012
Solution
0111 7
0101 5
1 1002 1210
- 19 -
INTRODUCTION TO COMPUTER APPLICATIONS
Binary Subtraction
a) 1110 – 0101
1110 14
0101 5
1001 9
b) 1010 – 0101
1010 10
0101 5
10012 5
c) 1010 – 0011
1010 10
0011 7
0111 3
d) 0101 – 0111
0101 5
0111 7
1110 -2 which is not true
We use 2’s complement method
0101 0101
0111 complement 1000
1101 complement this 0010
0010 which is true
Advantages of the two’s complement format:
- Handles subtraction of integers as addition. Therefore computer does not requires different
circuits to handle addition and subtraction.
e) 0111 – 1000
- 20 -
INTRODUCTION TO COMPUTER APPLICATIONS
0111 7
1000 8
1111 -1 not true
Using 2’s complement
0111 0111
1000 complement 0111
1110 complement 0001
f) 0101 -1001 using 2’s complement
e) Subtract 4 from 12
4 0100 0100
12 1100 complement 0011
0111 complement 1000
Binary Coded Decimal (BCD)
In this representation a decimal number is represented by four digits. e.g 3 is represented by
0011.if the decimal number consists of two or more than two digits, each decimal digit is
individually represented by a 4 bit binary equivalent 56 is represented by 0101 0110
There is a diffrerence between a binary binary equivalent of a decimal number and the binary
code od a decimal number. e.g the binary equivalent of the decimal number 43 is 101011, but it
BCD equivalent is 0100 0011.
BCD are used where the decimal information is directly transferred into or out of a decimal
system.
It is difficult to perform complement subtraction and complement addition in BCD standard. If
the result lies between 10 and 15 or if there is a carry from the 4 th bit of any BCD digit. A
correction of + 6 has to be made to obtain the correct result.
Example 1
8 1000
5 0101
13 1101 incorrect
0110 Add 6
00010011 correct in BCD
- 21 -
INTRODUCTION TO COMPUTER APPLICATIONS
1 3
Example2
8 BCD 1000
9 1001
17 010001 Incorrect
00110 Add
00010111 Correct BCD 17
1 7
Example 3
Subtract 4 from 12
4 0100 BCD 0100
12 1100 0011
0111 complement 1000
Octal Number System
The base of the octal system is 8.An octal number system is represented by a group of three
binary bits. e.g 4 is represented by 100. 6 by 110 and 7 by 111
46 by 100 110
354 by 011 0101 100
Conversion of octal number to decimal number
Convert 568 to its decimal number base 10
568 = 6 x 80 + 5 x 81 = 6 + 40 = 4610
3648 = 4 x 80 + 6 x 81 + 3 x 82 = 4 + 48 + 192 =24410
0.5638 = 5 x 8-1 + 6 x 8-2 + 3 x 8-3 = 0.724609310
Conversion of decimal number to octal
1 Convert 6210 to base 8 or to octal
8 62 6
7 7
62 10 = 768 prove
- 22 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 23 -
INTRODUCTION TO COMPUTER APPLICATIONS
Example
3768 = (011) (111) (110)2
= 0111111102
Example
56.348 = 101 110. 011 1002
= 101110.0111002
Hexadecimal Number System
The base is 16. Its digits are fronm 0- 15 from 10 - 15 are represented by A – F respectively
Hexadecimal digit is represented by four binary bits. e.g 5 = 0101 A = 1010
If we have two or more digits we represent each digit by four binary bits
e.g 5A = 01011010
Convert Hexadecimal Number to decimal Number
4B816 = 8 x 160 + B x 161 + 4 x 162
= 8 + 11 x 16 + 4 x 256
= 120810
2B6D16 = D x 160 + 6 x 161 + B x16 2+ 2 x 163
= 13 + 96 +2816 + 8192
= 1111710
0.5A6B16 = 5 X16-1 + A x 16-2 + 6 x 16-3 + B x 16-4
= 0.3125 + 0.0390625 + 0.001468438 + 0.00016784668
= 0.353190371010
Conversion of decimal number to hexadecimal number to a hexadecimal number
Example
16 67 3
16 4 4
6710 = 4316
16 952 8
16 59 11
16 3 3
95210 = 3 11 816
= 3B816
- 24 -
INTRODUCTION TO COMPUTER APPLICATIONS
16 1000 8
16 62 14
16 3 3
1000 = 3 14 816
= 3 E 816
Assignments convert 0.6210 to equivalent hexadecimal number. Hint create a table and multiply
by 16 the fraction keeping the integer and multiply new fraction by 16.
0.6210 = 0.9EB85116
To convert hexadecimal number to its binary equivalent each digit is converted to 4 bits
Example
6B916
6 = 0110
B =11) = 1011
9 = 1001
6B916 = 0110101110012
6D.3A16 =
6= 0110
D=13 =1101
3=0011
A=1010
6D3.3A = 0110 1101. 001110102
Conversion of hexadecimal number to octal number
Example
3DE16 = 00111110111102
- 25 -
INTRODUCTION TO COMPUTER APPLICATIONS
Group 3 bits together from left to right then change to decimal number
= 001 111 011 110
= 1 7 3 68
Example
5B.3A = 0101 1011. 0011 1010
= 001 011 011. 001 110 100
= 1 3 3 . 1 6 48
Convert the octal number 5368 to hexadecimal
5368 = 101 011 1102
Group 4 binary bits to obtain hexadecimal number
= 0001 0101 1110
=1 5 E 16
46.578 = 100 110. 101 11112
Group 4 bits
= 0010 0110.1011 11002
= 2 6. BC16
Exercise
FADE16 = X8
743468 = X16
12.62510 = 1100.10012 Prove
- 26 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 27 -
INTRODUCTION TO COMPUTER APPLICATIONS
Machine language: Machine language is the lowest-level programming language (except for
computers that utilize programmable microcode). Machine languages are the only
languages understood by computers.
Assembly language: An assembly language is a low-level programming language for
microprocessors and other programmable devices. It is not just a single language, but rather a
group of languages. An assembly language implements a symbolic representation of the machine
code needed to program a given CPU architecture.
High-level languages: A high-level language (HLL) is a programming language such as C,
FORTRAN, or Pascal that enables a programmer to write programs that are more or less
independent of a particular type of computer. Such languages are c o n s i d e r e d high-level
because they are closer to human languages and further from machine languages.
4.2 Example
- 28 -
INTRODUCTION TO COMPUTER APPLICATIONS
These include: windows 9x, 2000, 2003, NT, XP, ME; Unix, Linux etc.
Entertainment Software: these are software mainly used for entertainment purposes e.g.
games, music, video, etc.
Entertainment Software: these are software on CD-ROM disks that are use for personal use
e.g. software-featuring recipes for exotic foods.
Educational/ Reference Software: these are software used to supplement learning. Examples
include: CD-ROM disks containing encyclopedia, maps, mailing lists, phone books, etc.
Productivity Software: these are software that consists of programs that assist users in
achieving a particular task. Include word processing, spreadsheet, database software, financial
software, and communication software.
1. Word processing: - allows a user to create, edit, format, print, and store text material
amongst other things. E.g. Ms Word, etc. editing, saving, retrieving, spell checking e.t.c
2. Spreadsheet: - allows a user to create table and financial schedules by entering data and
formulas into rows and columns arranged as a grid on a display screen. E.g. Ms Excel,
etc.
- 29 -
INTRODUCTION TO COMPUTER APPLICATIONS
4. Database Software: - a program that controls the structure of the database and access the
data. The principal features of database of a database include: organization of a database,
data retrieval & display, sort, and built-in mathematical formulas. E.g. Ms Access,
Oracle, etc. they consists of table. Column refers as field used to store attributes e.g
- 30 -
INTRODUCTION TO COMPUTER APPLICATIONS
student registration number, student name e.t.c and row referred as record. Store
particular elements, items e.t.c
Key terms
i) Primary key: A primary is a column or set of columns in a table that uniquely
identifies tuples (rows) in that table.
ii) Foreign Key: A foreign key is a field in a relational table that matches the
primary key column of another table
iii) A table is a collection of data represented in rows and columns. For e.g.
following table stores the information of students.
iv) Records/Tuple:
Each row of a table is known as record or it is also known as tuple. For e.g. The
below row is a record.
101 Peter 26
vi) Field:
The above table has four fields: Student_Id, Student_Name, Student_Addr &
Student_Age.
vii) Column /Attribute:
Each attribute and its values are known as attributes in a database. For e.g. Set of
values of Student_Id field is one of the four columns of the Student table.
Student_Id
101
102
103
104
vi) Attributes’ database is comprised of tables. Each table has columns and rows; the
columns in a database are called database attributes.
vii) High-cardinality refers to columns with values that are very uncommon or
unique. High-cardinality column values are typically identification numbers,
email addresses, or user names. An example of a data table column with high-
cardinality would be a USERS table with a column named STUDENT_ID. This
column would contain unique values. Each time a new user is created in the
- 31 -
INTRODUCTION TO COMPUTER APPLICATIONS
xi)
Benefits of databases
a. Data redundancy: The repetition of data e.g a field in two or more tables or if
the field is repeated within the table.
b. Data inconsistency: exists when different and conflicting versions of the same
data appear in different places.
- 32 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 33 -
INTRODUCTION TO COMPUTER APPLICATIONS
c.) Transaction processing is a way of computing that divides work into individual,
indivisible operations, called transactions. A transaction processing system (TPS) is a
software system, or software/hardware combination, that supports transaction
processing. Transaction processing relates to any real-time business transaction or
process performed by a transaction processing system (TPS) or other business
information system (BIS). The process occurs when a user requests completion or
fulfillment of any process.
d.) Interactive processing is the simplest way to work on a system. You log in, run
commands which execute immediately, and log off when you've finished. You can use
either the command line or a graphical environment. Interactive jobs run directly on the
limited number of login nodes (servers) on each cluster.
- 34 -
INTRODUCTION TO COMPUTER APPLICATIONS
System: A set of interrelated components, with a clearly defined boundary, working together to
achieve a common set of objectives.
An information system (IS) is a software system that uses the hardware, software and networks
to enhance the workflow. And facilitate communication among employees. They combine
various technologies to reduce the manual labour required to operate an efficient office
environment.
Information System: Any organized combination of people, hardware, software,
communications networks, and data resources that stores and retrieves, transforms and
disseminates information in an organization.
Information system supports a range of office business activities that include
Creating and distributing activities or documents
Sending messages
Scheduling and accounting
Types of information systems in an organization
Roles of Information Systems in Business/organization
a.) Support of the business processes and operations – Organizations use computer based
information systems to record customer purchases, keep track of inventory, pay
employees e.t.c. these has replaced manual activities.
b.) Support of decision making by its employees and managers – Decisions on what
products to add or discontinue, or on what investment to make are based on analysis
provided by Computer Based Information Systems.
c.) Support of its strategies for competitive advantage – Gaining competitive advantage
requires innovative application of information technologies.
- 35 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 36 -
INTRODUCTION TO COMPUTER APPLICATIONS
- 37 -
INTRODUCTION TO COMPUTER APPLICATIONS
Network: connection of more than one computer with the main purpose of sharing computer
resources.
Intranet: Internal corporate network that uses the infrastructure of the Internet and the www.
Extranet: an extension of internal network (internet) to connect not only internal personnel but
also selected customers, suppliers, and other strategic offices.
Node: any device that is attached to a network
Packet: fixed-length block of data for transmission. It also contains instructions about the
destination of the packet.
Kilobits per second (kbps): 1000 bits per second; an expression of data transmission speeds.
Netiquette refers to Internet etiquette. This simply means the use of good manners in online
communication such as e-mail, forums, blogs, and social networking sites to name a few. It is
important to use netiquette because communication online is non-verbal.
- 38 -
INTRODUCTION TO COMPUTER APPLICATIONS
handles transmission errors, provides physical (as opposed to logical) addressing, and
manages access to the physical medium.
- 39 -
INTRODUCTION TO COMPUTER APPLICATIONS
networks and Internet Protocol standard dictates how packets of information are sent out
over networks.
NetBEUI: - Short for NETBios Enhanced User Interface and is used by network
operating systems allowing the computer to communicate with other computers utilizing
the same protocol.
DHCP: - Short for Dynamic Host Configuration Protocol, DHCP is a protocol used to
assign an IP address to a device connected to a network automatically.
HTTP: - Short for HyperText Transfer Protocol, HTTP is a set of standards that let users
of the World Wide Web, to exchange information found on web pages.
FTP: - Short for File Transfer Protocol is a standard way to transfer files between
computers.
PPP: - Short for Point-to-Point Protocol, PPP is a communication protocol that enables a
user to utilize their dialup connection (commonly a modem) to connect to other network
protocols like TCP/IP etc.
Ethernet: - Also referred as Ethernet II or Fast Ethernet. It is a communications protocol
that enables computers on a local-area network to share information with one another at
rates of 100 million bits per second instead of the standard 10 million BPS.
- 40 -
INTRODUCTION TO COMPUTER APPLICATIONS
Local Area Network (LAN): - privately owned communication network that servers
users within a confined geographical area.
Types of LAN
LANs are of two principal types:
Client/Server LAN: - consist of requesting microcomputers, called clients, and
supplying devices that provide a service, called servers.
Peer-to-Peer: - one in which all microcomputers on the network communicate
directly with one another without relying on a server.
Disadvantages of Networks
The main disadvantage of networks is that users become dependent upon them. For
example, if a network file server develops a fault, then many users may not be able to run
application programs and get access to shared data. To overcome this, a back-up server
can be switched into action when the main server fails. A fault on a network may also
stop users from being able to access peripherals such as printers and plotters. To
minimize this, a network is normally segmented so that a failure in one part of it does not
affect other parts.
Another major problem with networks is that their efficiency is very dependent on the
skill of the systems manager. A badly managed network may operate less efficiently than
non-networked computers. Also, a badly run network may allow external users into it
with little protection against them causing damage. Damage could also be caused by
novices causing problems, such as deleting important files.
All these could be summarized as below:
1. If a network file server develops a fault, then users may not be able to run application
programs
2. A fault on the network can cause users to loose data (if the files being worked upon are
not saved)
3. If the network stops operating, then it may not be possible to access various resources
4. Users work-throughput becomes dependent upon network and the skill of the systems
manager
5. It is difficult to make the system secure from hackers, novices or industrial espionage
- 41 -
INTRODUCTION TO COMPUTER APPLICATIONS
6. Decisions on resource planning tend to become centralized, for example, what word
processor is used, what printers are bought, e.t.c.
7. Networks that have grown with little thought can be inefficient in the long term.
8. As traffic increases on a network, the performance degrades unless it is designed properly
9. Resources may be located too far away from some users
10. The larger the network becomes, the more difficult it is to manage.
6.7 Factors Affecting network communication among devices
Transmission rate i.e. frequency (the amount of data that can be transmitted on a channel)
and bandwidth (the difference between the highest and lowest frequencies).
Line configurations i.e. point to point (line directly connects the sending and receiving
devices, such as a terminal with a central computer) vs. multipoint (a single line that
interconnects several communication devices to one computer).
Serial (bits are transmitted sequentially, one after the other) vs. Parallel Transmission
(bits are transmitted through separate lines simultaneously).
Direction of transmission i.e. simplex (data can travel in only one direction), half-duplex
(data travels in both directions but only in one direction at a time), and full duplex (data is
transmitted back and forth at the same time).
Transmission mode i.e. asynchronous (data is sent one byte or character at a time) vs.
synchronous (data is sent in blocks).
Packet switching i.e. a technique for dividing electronic messages into packets for
transmission over a wide area network to their destination through the moist expedient
route.
Protocols i.e. sets of conventions governing the exchange of data between hardware and
/or software component in a communication network.
- 42 -
INTRODUCTION TO COMPUTER APPLICATIONS
Web page: -document in hypertext markup language (HTML) that is on a computer connected
to the Internet.
Home Page: - the first screen of a web site.
Web site: - Internet location of a computer or server on which a hyperlinked document (web-
page) is stored
Web Surfing: - a user’s action of moving from one web page to another by using the computer
mouse to click on the hypertext links.
Search Engines: - type of search tool that allows the use to find specific document through
keyword searches or menu choices.
Uniform Resource Locator (URL): - address those points to specific resource on the web.
Electronic Mail (E-MAIL): - system in which computer users, linked by wired or wireless
communication lines, may use their keyboard to post messages and their display screens to read
responses.
Precaution measure that need to be observe when using e-mail
1. Change your password regularly and keep it in a safe place.
2. Don’t share your password with anyone.
3. Don’t open attachments from anyone you don’t know.
4. Log out or sign off from your account when you’ve finished looking at/sending your
email.
5. Don’t reply to spam or forward chain emails.
6. Keep your personal information personal – don’t share bank or credit card information by
email.
7. Your bank will not discuss your private financial situation by email. If you receive any
correspondence that claims to come from your bank, telephone your branch to verify it
and discuss the matter over the telephone instead.
8. Make sure that you have antivirus software installed and keep it up to date.
Internet Service Provider (ISP): - local or national company that provides unlimited public
access to the Internet and the web.
- 43 -
INTRODUCTION TO COMPUTER APPLICATIONS
Positive:
Fast delivery of information
Inexpensive customer base expansion
- 44 -
INTRODUCTION TO COMPUTER APPLICATIONS
Negative:
Illicit or malicious programs are spreads easily.
Hackers, Crackers and/or Trojans breach the goodwill of data privacy and
confidentiality.
END
- 45 -
INTRODUCTION TO COMPUTER APPLICATIONS
This is the protection of data from accidental or deliberate threats, which might cause
unauthorized modification disclosure or destruction of data and the protection of the Information
System from the degradation of non-availability of services.
Data integrity in this context of security is when data are the same as in source documents and
have not been accidentally or intentionally altered, destroyed or disclosed.
Misuse of an information System can be categorized as being either intentional (malicious) or
accidental.
Objectives of IS security
• To control loss of assets
• To insure the integrity and reliability of data
• To improve the efficiency/effectiveness of Information systems
Risks:
These are various dangers to information systems, the people, hardware, software, data and other
assets with which they are associated.
The dangers include; Natural disasters, thieves, industrial spies, disgruntled employees.
There Risk means the potential loss to the firm.
Threats:
Refer to people, actions, events or other situations that could trigger losses, they are potential
causes of loss.
Vulnerabilities: Flaws, problems or other conditions that make a system open/prone to threats.
Common Controls
Controls are counter measures to threats. They are tools that are used to counter risks from the
variety of people, actions, events or situations that can threaten an IS.
Are used to identify risk, prevent risk, reduce risks and recover from actual losses.
i. Physical Controls
These are controls that use conventional physical protection measures. Might include door locks,
keyboard locks, fire doors, surp pumps. Control over access and use of computer facilities and
equipment and controls for prevention of theft.
Inclusive controls to reduce contain or eliminate the damage from natural disasters, power
outages, humidity, dust, high temperature and other conventional threats.
Are program code and controls used in IS applications to prevent, identify or recover from
errors, un-authorized access and other threats.
e.g. programming code placed in payroll application to prevent a data entry clerk from entering
hourly rate of pay that is too high.
- 46 -
INTRODUCTION TO COMPUTER APPLICATIONS
Result from setting, implementing and enforcing policies and procedures e.g. employees required
to back up or archive their data at regular interval and take backup copies of data files to secure,
off-site locations for storage.
Common Threats
Natural disasters, unauthorized access (e.g. theft, vandalism, invasion of privacy), computer
crime and computer viruses.
i. Natural disasters
E.g. five, floods, water damage, earthquakes, tornadoes, hurricanes, mud slides, wind and storm
damage
Security planning should consider
Disaster prevention
Disaster containment
Disaster recovery
e.g. Prevention: Use of backup power supplies or special building materials, locations, drainage
system or structural modifications to avoid damage during floods, storms fires and earthquakes.
Containment: Consider sprinkler systems, halon gas fire
Suppression: System or watertight ceilings to contain water damage from fire hoses.
Recovery: developing contingency plans for use of computer facilities of vendors or non-
competitors with similar computer
Ordinary carelessness or poor employee training e.g. formatting the hard disk rather than drive
A, keying incorrect data.
Computer crime: stealing data, damaging or vandalizing hard ware, software or data or using
computer software illegally or committing fraud.
v. Hacking
Also known as cracking. It’s the unauthorized entry by a person into a computer system or
network. Hackers are people who illegally gain access to the computer systems of others. They
can insert viruses onto networks, steal data and software, damage data or vandalize a system.
vi. Toll Fraud
Swindling companies and organisations e.g. through telephone bills through false pretences –
e.g. use of slugs instead of real coins.
- 47 -
INTRODUCTION TO COMPUTER APPLICATIONS
Toll hackers use maintenance ports, modem pools, voice mail systems, automated attendants or
other facilities of PBX, the private branch exchanges that are the computerized telephone
switches at customer sites.
Signs of frauds:
1. Numerous short calls
2. Simultaneous use of one telephone access mode
3. Numerous calls after business hours
4. Large increases in direct inward system access dialing or DISA
Use of a computer system by employees to forge documents or change data in records for gain.
Are procedures or code that allows a person to avoid the usual security procedures for use of or
access to a system or data.
- 48 -