0% found this document useful (0 votes)
2 views

ICT Modified Module.

The document is a study material on Information and Communications Technology (ICT) designed for technical and vocational teachers. It consists of five modules covering topics such as computer hardware, software, networks, and the role of ICT in education and business. The material emphasizes the transformative impact of ICT on communication, education, and daily life.

Uploaded by

benson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

ICT Modified Module.

The document is a study material on Information and Communications Technology (ICT) designed for technical and vocational teachers. It consists of five modules covering topics such as computer hardware, software, networks, and the role of ICT in education and business. The material emphasizes the transformative impact of ICT on communication, education, and daily life.

Uploaded by

benson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 218

2015

INFORMATION AND COMMUNICATIONS


TECHNOLOGY

✓ Introduction to ICT
✓ Computer Hardware
✓ Computer Software
✓ Computer Networks
✓ IT Security and Social Issues

Technical and vocational teachers’ college


10/2/2015

Designed by Sakala Mabvuto MPH 01


ICT INTRODUCTION TO ICT

TECHNICAL AND VOCATIONAL TEACHERS’ COLLEGE


TVTC STUDY MATERIALS
_____________________________________________________________________________________

INFORMATION AND COMMUNICATIONS


TECHNOLOGY

COMBINATION OF FIVE MODULES


Module 1: INTRODUCTION TO COMPUTERS

Module 2: COMPUTER HARDWARE

Module 3: COMPUTER SOFTWARE

Module 4: COMPUTER NETWORKS

MODULE 5: IT SECURITY AND SOCIAL ISSUES


2
ICT INTRODUCTION TO ICT

Date of publication: <date>

This material is the property of the Technical and Vocational Teacher’s College.

Address: Private Bag 7, Luanshya, Zambia

Website: www.tvtc.edu.zm

e-mail: <mail address>

3
ICT INTRODUCTION TO ICT

Foreword to module 1

Dear student,

Welcome to ICT and to this ICT introductory module in particular. This


module will take you on a brief tour of ICT.

Here we go!

Not long ago we used to buy envelopes and stamps if we wanted to


communicate with our relatives, friends and other people. The telephone
system was there but was very unreliable and expensive. Perhaps your
grandfather didn’t own one. Again not long ago, studying was mainly paper-
based. Telephone, radio and TV were there but, alas, they were for the
privileged few. We particularly remember how difficult it was to learn our
geography when we were required to describe physical features or economic
activities of places far away.

All this has now changed because we live in the world of ICT. ICT is a
subject or a technology which has, more than anything else, changed
completely the way we live. ICT will continue to influence our lives in more
ways than we can imagine now. ICT has revolutionized the way we generate,
store and process information, and the way we communicate that
information. No one is left behind. An individual on the street or at home, a
worker in a factory or office, a teacher, an accountant, an engineer, and
even a pastor, all find this one thing – ICT- irresistible.

So, what is it really? What are the benefits or potential benefits, how is it
changing? Where is it taking us? As you study ICT, reflect on these issues.

TVTC

4
ICT INTRODUCTION TO ICT

Table of contents
Foreword ......................................................................................................................................................4
Introduction..................................................................................................................................................7
Objectives .....................................................................................................................................................8
Chapter 1: THE ROLE OF ICT .......................................................................................................9
1.1 The role of ICT to an individual ........................................................................................9
1.2 The role of ICT in education...............................................................................................9
1.3 The role of ICT to students ................................................................................................9
1.4 The role of ICT to a teacher.............................................................................................10
1.5 The role of ICT to a school manager ............................................................................11
1.6 The role of ICT in business...............................................................................................11
1.7 E-learning and M-learning ................................................................................................12
1.8 Some of the disadvantages of ICTs in education.....................................................13
1.9 Examples of ICTs that can be used in education .....................................................14
Chapter 2: COMPUTERS ...............................................................................................................18
2.1 Advantages of computers .................................................................................................18
2.2 Disadvantages of a computerised systems ................................................................19
2.2.1 What are the limitations of computers, and how do they come about? .....19
EXERCISE 2.1 ................................................................................................................................20
2.4 What is a computer?...........................................................................................................20
EXERCISE 2.2 ................................................................................................................................20
EXERCISE 2.3 ................................................................................................................................22
Chapter 3: CLASSIFICATION OF COMPUTERS.....................................................................23
3.1 Microcomputers ....................................................................................................................24
Exercise 3.1....................................................................................................................................24
3.2 Servers ...............................................................................................................................25
3.3 Minicomputers .................................................................................................................27
3.4 Mainframe computers ...................................................................................................27
3.5 Supercomputers..............................................................................................................28
EXERCISE 3.2 ................................................................................................................................28
Chapter 4: PARTS OF A COMPUTER .......................................................................................29

5
ICT INTRODUCTION TO ICT

EXERCISE 4.1 ................................................................................................................................30


Summary ................................................................................................................................................31
SELF-ASSESSMENT QUESTIONS................................................................................................32
REFERENCES..........................................................................................................................................36
Further reading.....................................................................................................................................37
ANSWERS TO SELF-ASSESSMENT QUESTIONS............................................................................................38

6
ICT INTRODUCTION TO ICT

Introduction

To begin with, let us ask these questions:

1. What is ICT?
2. In what way is ICT important to you as an individual?
3. In what way is ICT important in your profession?
4. In what way is ICT changing or dictating the way we live?
5. What makes up ICT?

This module will focus on these questions. Although questions 2, 3 and 4 are
obviously subjective, as ICT is not affecting all people in the same way due
to their different circumstances, ICT has a more profound influence on
individuals and organizations in the modern age. This module highlights
some of the ways in which ICT is impacting on our activities and civilization.
In discuses the many uses of ICT for example in education and in business.
It shows, for example, that with appropriate use of ICT there is greater
potential to provide education to as many people as possible and to also
greatly improve the quality of learning at the same time.

Now let’s turn to the first question so that we begin to clear the way for
more understanding of what this module is all about.

We will begin by defining what ICT is. The letters ICT stand for Information
and Communications Technology. ICT is made up two technologies that
have somehow merged. These technologies are Computer Technology and
Telecommunications Technology. Therefore, ICT is a combination of
systems for capturing, storing, retrieving, processing, transmitting and
receiving information. Throughout your ICT course you will be learning
details about these various ways in which ICT is used. This module sets the
stage for the subsequent modules in which you will learn details about the
two technologies which make up ICT.

7
ICT INTRODUCTION TO ICT

Objectives

So, do you really want to study ICT seriously? If you do, then after studying
this module you should be able to:

1. State what is meant by information and communications technology


(ICT).
2. State and explain the role of ICT to an individual.
3. State and explain the role of ICT to a student.
4. State and explain the role of ICT to a teacher.
5. State and explain the role of ICT to a school manager.
6. State and explain the role of ICT in a business.
7. State examples of ICTs that can be of use in education.
8. State what is meant by Elearning and Mlearning.
9. State and explain advantages and disadvantages of ICTs in
education.
10. State and explain the purpose of information systems and the roles
of computers in business.
11. State the various categories of computers.
12. State the differences among the various categories of computers.
13. Describe a computer as a system.
14. Explain why a computer has hardware and software.

8
ICT INTRODUCTION TO ICT THE ROLE OF ICT

Chapter 1: THE ROLE OF ICT

1.1 The role of ICT to an individual

First and foremost you are an individual. ICT can be used in many ways to
improve your life, for example in the following daily activities:

• Collecting data
• Storing data
• Retrieving data
• Processing data
• Sending information
• Receiving information

1.2 The role of ICT in education

As you can guess correctly, ICT is useful in education in so many ways. Go


through the list below to see some of these.

• ICT is important for enhancing education management, teaching and


learning.
• It is important to education authorities, e.g. educational planners and
education administrators.
• It is important to teachers and students.

There are five different hierarchical levels of education where ICTs can be
used:

• presentation
• demonstration
• drill and practice
• interaction
• collaboration
If you cannot figure out what these things mean, don’t worry because the
meaning of each one of them will be explained in due course.

1.3 The role of ICT to students

If you are studying this module you probably must be a student. Students
can use ICT in many ways, .e.g.

9
ICT INTRODUCTION TO ICT THE ROLE OF ICT

• Researching for study materials, e.g. use of electronic encyclopedias and


the Internet.
• Communication with teachers, sponsors, parents and friends.
• Production of learning resources, e.g. notes and assignments.
• Collaboration on tasks with colleagues is easier. In fact, learners can
participate on internationally presented instruction. This makes it possible
for learners to understand that learning support is not always from
teachers but also from peers and other people with similar interests.
• As a tool for self-paced learning, e.g. use of audio, video and virtual
classrooms. Learners can also be made to interact with their learning
materials for more effective learning. This is the concept of learning by
doing.
• The saying “practice makes perfect” becomes a reality with use of ICT
because learners are able to practice a skill, or listen or watch a
presentation many times at their own pace, place and time.

1.4 The role of ICT to a teacher

Do you think ICT has benefits for teachers? Of course you do. As we said
earlier, it has enough stocks for everyone. Teachers can use ICT in many
ways, e.g.

• Processing and storage of assignments, tests and examinations.


• Processing and storage of students’ records.
• Research and development of teaching resources.
• Presentation of learning materials to learners. Instead of meeting
learners in a face to face environment, teachers can prepare all the
learning materials on multimedia resources to be issued to all the
learners in a particular study programme.
• Demonstration and simulation of principles/skills/operations to
learners. One other problem of face to face learning is that
demonstrations are often time consuming especially where there are
many learners. This problem can easily be solved by videotaping all
the demonstrations so that learners would be playing them on their
own multimedia resources.
• Communication and interaction with students, colleagues and school
managers.
• Collaboration with colleagues on tasks. Teachers are able to consult
their colleagues on many issues ranging from knowledge based to
technical skills in order to improve and increase their productivity. For
example, a teacher would be able to collaborate with colleagues when
producing an instruction manual or a report.

10
ICT INTRODUCTION TO ICT THE ROLE OF ICT

1.5 The role of ICT to a school manager

Is ICT suitable to students and teachers only in a school? No! ICT is


extremely useful in management or administration. School managers can
use ICTs for various purposes, e.g.

• Processing of information
• Efficient communication with schools, partners, sponsors and parents.
• Assisting in learner administration, e.g.
o Admission procedures
o Induction
o Storage of learners’ progress records and personal data
• Assisting in staff administration, e.g.
o Storage of personal data and professional development planning
records
• Assisting in library administration
• Assisting in resource management
• Assisting in establishing and maintaining contacts with labour market /
future employers
• Assisting in programme planning and development

1.6 The role of ICT in business

ICT plays a vital role in modern business. Some of the benefits of ICT in
business are as follows:

• Large storage for data and information.


• Fast retrieval of data or information.
• Fast and accurate processing of data.
• Fast communication of information.
• Reduction in the cost of storage facilities.
• Reduction in the number of staff employed to do routine tasks.
• Complex calculations can greatly be simplified.
• Routine and repetitive tasks can easily be performed.
• Work in places inaccessible to humans can easily be done and
monitored

ICTs have revolutionized business processes and organizations and have


created a worldwide network of e-commerce.

11
ICT INTRODUCTION TO ICT THE ROLE OF ICT

1.7 E-learning and M-learning

If you want to understand and appreciate what Elearning and Mlearning are,
first reflect on traditional learning. Traditional learning involves face to face
contact. This is a type of learning in which the learner and the teacher are
physically in the same place at the same time. Some of the disadvantages of
face to face learning are as follows:

1. Most learners do not take control of their own learning.


2. Learning is more teacher-centred instead of being learner-centred. As a
result, learners tend to concentrate on rote learning which involves
merely memorizing facts from teachers.
3. Most learners tend to think that learning only takes place in a classroom.
As a result, learning appears to come to an end when both the learner
and the teacher leave the classroom.
4. Many potential learners cannot have access to education due to limited
learning opportunities offered by schools.
5. Schools tend to mix learners of different abilities in classrooms. As a
result, the learners cannot learn at their own pace.

Solutions to these problems lie in e-learning and m-learning. E-learning


stands for electronic learning, and m-learning stands for mobile-
learning. E-learning and m-learning are part of what is called flexible and
blended learning, abbreviated FaB. According to Wikipedia, “Flexible
Learning is a set of educational practices, concerned with providing learners
with increased choice, convenience, and personalisation to suit the learner.
In particular, flexible learning provides learners with choices about where,
when, and how learning occurs”. Wikipedia also defines blended learning as
a mixing of different learning environments that combines traditional face to
face classroom methods with more modern computer-mediated activities
aimed at creating a more integrated approach for both instructors and
learners.

E-learning is the type of learning that employs electronic equipment to


support learning. ICT is part of e-learning. “E-learning includes Web-based
learning, computer-based learning, virtual education opportunities and
digital collaboration. Content is delivered via the Internet, intranet/extranet,
audio or video tape, satellite TV, and CD-ROM. It can be self-paced or
instructor-led and includes media in the form of text, image, animation,
streaming video and audio”. (Wikipedia)

M-learning, is the type of learning in which the learner is not at a fixed or


predetermined location. It is also defined as the type of learning offered in

12
ICT INTRODUCTION TO ICT THE ROLE OF ICT

such a way that the learner uses mobile technologies to support his/her
learning.

The advantage of e-learning and m-learning is that many Zambians already


possess some of the basic technologies that can be used for their learning.
For example, many Zambians already have VCRs, DVD players, cassette
players, TV sets, radio sets and cell phones. Most of these devices are
mostly used for entertainment instead of for learning. With e-learning and
m-learning, learning can be done at any time, place and by everyone
without restrictions.

1.8 Some of the disadvantages of ICTs in education

Although ICTs have many potential benefits in education, they also have
some disadvantages such as the following:

1. Some people place so much dependency on ICTs at the expense of their


human skills.
2. ICTs have been known to disrupt social fabrics in society or communities.
For example, some learners and teachers rarely interact with their
colleagues, preferring to interact with cell phones, TVs, computers and
the Internet.
3. The quality of work goes down because of “too much information
available”, especially on the web.
4. Cases of plagiarism (i.e. intellectual theft) and piracy (i.e. illegal copying
of media) become on the increase.
5. Some social vices like pornography become more popular at the expense
of study materials.

13
ICT INTRODUCTION TO ICT THE ROLE OF ICT

1.9 Examples of ICTs that can be used in education

Many ICTs can be used in education. Some of them are as follows:

Telephone

Cell phone

14
ICT INTRODUCTION TO ICT THE ROLE OF ICT

Television

Radio

15
ICT INTRODUCTION TO ICT THE ROLE OF ICT

Cameras

Computer

Audio tape

16
ICT INTRODUCTION TO ICT THE ROLE OF ICT

Video tape

CDs/DVDs

Internet resources

17
ICT INTRODUCTION TO ICT COMPUTERS

Chapter 2: COMPUTERS

Computers play a very important role in our modern lives. There is no day
that passes without computers affecting our lives directly or indirectly.
Without doubt, you must be agreeable that computers are extremely useful.
These machines have brought about a number of advantages, perhaps more
than any other machine has in the past.

2.1 Advantages of computers

In what way are computers useful in our modern lives?

Individuals and organisations need information systems. An information


system must provide management with information so that they are able to:
a) Solve organisational problems, and
b) Respond to changes in the environment

For these activities to be performed, information is required. A computer can


be employed where the system has been computerised so that the
management of information can be as efficient as possible. As an
information management tool, a computer can be used in various ways such
as:

1) As storage for data


2) For processing data
3) For communication of data
4) For retrieving data from storage
5) For controlling the quality of information to be produced

Because computers can work mostly without human intervention, they can
be used to automate many operations and many systems. For example,
computers can lead to office automation. Office automation means that a
computer is used to do most of the operations. (What are some of the office
operations or activities which you would perform with the help or
computers?)

Computers are the best machines to use for the activities listed above
because of their characteristics which include the following:
i.) They work very fast
ii.) They work very accurately
iii.) They are very consistent

18
ICT INTRODUCTION TO ICT COMPUTERS

iv.) They can store and access large volumes of data

Hence the use of computers has many economic benefits. By economic


benefits we mean the financial savings which we can attribute directly to the
use of computers. Some of these benefits are:
i.) The number of staff employed on routine tasks is greatly reduced
ii.) There is improved control of operations and use of resources
iii.) There is improvement in speed with which management reacts to
situations
iv.) There is improved customer service

Therefore, the use of computers greatly improves efficiency.

2.2 Disadvantages of a computerised systems

Even though computers have numerous advantages, they also have


limitations or disadvantages if you like.

2.2.1 What are the limitations of computers, and how do they


come about?

By limitations of computers, we mean that they cannot be expected to do


everything. This is an important point. While computers can be used to do
many things, they cannot be used to do everything! Our current computers
cannot substitute human beings entirely. This is their limitation. This
limitation arises due to the fact that computers are programmed
machines. As programmed machines, they can only manage to do work
which is specified in their programs. Computers cannot be used to perform
new tasks whose programs have not been made and installed.

19
ICT INTRODUCTION TO ICT COMPUTERS

EXERCISE 2.1

a) List down at least ten routine tasks that you perform in your school or at
home. Which of these tasks would require the use of computers? Why do
you think so?
b) State the main disadvantages of a computer.
c) Explain why the use of computers greatly improves on efficiency.
d) What is meant by saying that the use of computers has economic
benefits?
e) Why are computers capable of being used to automate many human
operations?
f) List four beneficial characteristics of computers.
g) Suggest one way in which a computer can be used to reduce the risks of
danger.
h) Someone suggests that a modern teacher must be computer literate. To
what extent do you agree with this suggestion?
i) What is meant when we say that computers are programmed machines?

2.4 What is a computer?

I know you are saying that a computer is a machine. But what type of
machine is it? Are you saying that it is an electronic machine? If you are,
then you are correct. However, is a computer the only machine which is
electronic? Or is every electronic machine a computer?

EXERCISE 2.2

Name at least five electronic machines.

Did you include radio, TV, calculator and VCR? You probably did. Are these
machines computers? Of course they are not. Perhaps you are thinking that
your scientific calculator is a computer. Is it a computer? It is not. Is it
surprising because all these are electronic machines? Please note. Not every
electronic machine is a computer!

So, what is a computer?

20
ICT INTRODUCTION TO ICT COMPUTERS

A computer is an electronic machine that receives data and instructions


from a user, stores the data and instructions, processes the data using the
instructions and gives feedback to the user in any desired format with very
little human intervention. A computer is said to be electronic because, like all
other electronic systems, it consists of digital circuits or components such as
transistors and integrated circuits (ICs). Digital circuits give signals that do
not vary continuously with time. Signals that vary continuously with time are
called analog signals. If you cannot comprehend the difference easily, look
at the drawings below.

Digital signal Analog signal

For example, the current which flows in your TV to give the pictures is digital
in nature, and the current which flows in your electric bulb to produce light is
analog in nature.

Let’s continue. Looking at the definition of computer given above, you might
be wondering why a scientific calculator is not a computer since it can also
do most of the tasks stated for a computer. Note that the difference is that a
scientific calculator can perform only some of the tasks and not all of them.
For example, a scientific calculator cannot present results to you in any
desired format, and requires that for it to operate you must constantly
interact with it by pressing the buttons. If you stop pressing the buttons, it
also stops doing the operations. On the other hand, a computer does not
stop operating when the user stops his/her actions.

What makes the computer to work with less human intervention?

In every modern computer there is a special component called a


microprocessor which makes a computer to be an automatic machine. A
microprocessor is a special electronic circuit or chip with instructions for
directing the operations of the computer. Because the microprocessor
already has instructions imbedded in it, it is called a programmed circuit.

21
ICT INTRODUCTION TO ICT COMPUTERS

EXERCISE 2.3

1. Why is a microprocessor called a programmed chip?


2. Why is a scientific calculator not a computer?
3. A computer is defined in terms of what it does. State the different
functions a computer performs.
4. What is an electronic machine?
5. Suggest ways in which electronic machines are better than manual or
mechanical machines.
6. What is an integrated circuit (IC)?

Computers play a key role in how individuals work and how they live. Even
the smallest organizations have computers to help them operate more
efficiently, and many individuals use computers at home for educational,
entertainment, and business purposes. In this module, you will learn the
basics about computers; the different categories of computers, and what
makes up a computer.

22
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

Chapter 3: CLASSIFICATION OF COMPUTERS

In computerising operations, we need to be able to understand the types of


computers that can be used because computers come in a variety of forms.
Generally, there are five classes of computers whose differences can be
attributed to a number of factors such as:

1. Their physical size


2. Their speed of processing data
3. Their memory capacity
4. Their storage capacity
5. Their cost of acquisition
6. Their hardware and software requirements
7. Their environmental requirements
8. Their ease of use

The five categories of computers are:

• Microcomputers
• Servers
• Minicomputers
• Mainframe computers
• Supercomputers

The supercomputers are the largest in physical size, have the fastest
processing speed, have the largest memory and storage, are the most
costly, have the most sophisticated or complex hardware and software,
require the most controlled environment, and are the most complicated to
use.

The mainframe computers rank second, the minicomputers third and the
microcomputers last in these qualities or specifications. Each category of
computers will be described in various sections below, starting with
microcomputers.

23
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

3.1 Microcomputers

What are microcomputer, and what are they used for?

Do you have your own computer? If you have, then it is a microcomputer.


All single user computers are classified as microcomputers. Microcomputers
are also often called personal computers (PCs) because of being single
user. They run programs designed to help individuals accomplish their work
more productively.

Microcomputers are the most widespread and popular because of a variety


of reasons. They have several advantages over the other classes. The
following are some of the advantages of microcomputers:

a) They are small in size, and therefore do not occupy large space. Some
of them, e.g. laptops, are portable.
b) They are not as costly as the other computers.
c) They do not require sophisticated hardware and software.
d) They are easier to operate and maintain.
e) They can operate in ordinary environments, i.e. they do not
necessarily require highly controlled environments.
f) They can be connected in a network in order to increase their
efficiency and effectiveness.
g) Their capability can be increased to equal the capability of higher
computers.

What are the examples of microcomputers?

Examples of microcomputers are:

• Desktop computers
• Laptop computers
• Notebook computers
• Netbook computers
• Palmtop computers
• Wearable computers

Exercise 3.1
1. Computers can also be classified as special purpose, general purpose, analog or
digital. What differences are there among these types?
2. What factors would you consider before buying your own computer or one for
your organisation?

24
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

Look at the pictures of these various microcomputers shown below.

Laptop Notebook Netbook Palmtop


Desktop

Wearable computer

3.2 Servers

What are servers, and what are they used for?

Servers are not designed to be used directly. They make programs and data
available for people hooked up to a computer network, a collection of
computers connected together so that they can exchange data. See
illustration below.

25
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

Server computer connected to many client computers

26
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

3.3 Minicomputers

What are minicomputers, and what are they used for?

Minicomputers are multi-user systems that can handle the computing needs
of a smaller corporation or organization. Many people use them
simultaneously by means of remote terminals or personal computers.
Minicomputers were the second type of computers to be introduced.

3.4 Mainframe computers

What are mainframe computers, and what are they used for?

Mainframes are huge, multi-user systems designed to handle gigantic


processing jobs in large corporations or government ministries or
departments. These were the earliest computers to be introduced. The first
mainframe computers were very large; about the size of a classroom.

27
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS

3.5 Supercomputers

What are supercomputers, and what are they used for?

Supercomputers are ultra fast computers designed to process huge amounts


of scientific data then display the underlying patterns that have been
discovered. They are mainly used in research centres to help with the most
advanced processing operations.

EXERCISE 3.2
1. What is the difference between a server and a minicomputer?
2. Why would you not recommend the purchase of a supercomputer for
your school?
3. What is meant by ‘Computer Network’?
4. What is a ‘remote terminal’?
5. What are the advantages of using a server?
6. What would you use a minicomputer, a mainframe computer and a
supercomputer for?
7. Which type of computer was made first?

28
ICT INTRODUCTION TO ICT PARTS OF A COMPUTER

Chapter 4: PARTS OF A COMPUTER

What does a computer consist of? Is it important to know what a


computer is made up of?

Yes, you need to know what makes up a computer. First of all you have to
know what your computer must have and how you can tell that it has a
problem. If you do not know what makes up a computer, or what your
computer has, it is difficult to know what you can include or exclude from
your computer. It is also possible for someone, for example, to try to sell to
you a computer that cannot work, or one that has very limited use. It also
becomes difficult to fix even some minor problems. In addition, you cannot
understand easily some of the messages that a computer gives during use.

It is not easy to state exactly what a computer is made up of because it


consists of so many things. In fact, a computer is not one thing. A computer
is a collection of many different things. These things work together to
perform the general function of the computer. (Do you know one word that
refers to a collection of things that work together in order to achieve a
common goal? It is the word system.) A computer is a system because it
consists of many parts that work together.

In general, a computer is made up of two main parts: the hardware and


the software. (Notice the correct spellings for the two words. Don’t write
them as hard ware and soft ware.) The hardware is everything that you can
see, feel or touch on or in a computer. The software is what tells the
hardware what to do and how to do it, i.e. the set of instructions in the
computer. It is the software which causes a computer to work mostly with
less constant human intervention. Note that the last part of the previous
sentence (i.e. the part in bold) is very important. As human beings, we often
want to do less work. This is why we always either employ other people or
use machines to do things for us. Whereas hardware is tangible, software is
intangible, i.e. it cannot be touched, but it is capable of working. Software is
a set of instructions. If someone asks you to sit down, you may sit down.
This instruction, ‘sit down’, although you cannot see or touch it, causes
you to do something. That’s exactly the relationship that exists between
software and hardware.

29
ICT INTRODUCTION TO ICT PARTS OF A COMPUTER

Therefore,

COMPUTER HARDWARE SOFTWARE


= +

So for you to understand a computer very well, you have to understand


these two parts, i.e. hardware and software that make up the computer.

EXERCISE 4.1
1. What does a computer consist of?
2. What is hardware?
3. What is software?
4. Why does a computer have hardware?
5. Why does a computer have software?

30
ICT INTRODUCTION TO ICT Summary

Summary

In this introductory module you have learnt about what ICT is. It has been
shown that ICT is very useful to a wide range of operations by different
categories of people: individuals, students, teachers, school managers, office
and other workers. Generally ICTs are used to capture, store, retrieve,
process, send and receive information.

The module also indicated that there are various types of ICTs such as
telephones, cell phones, radios, TVs, VCRs, computers, etc. and that all
these can be used to increase or improve one’s productivity.

The module further introduced you to the various categories of computers:


microcomputers, servers, minicomputers, mainframe computers and
supercomputers. Microcomputers have been described as the most popular
due to a number of advantages which they have over other types of
computers. It was pointed out that a computer consists mainly of two parts
namely, hardware and software. The hardware is the physical part, and the
software is a set of instructions for directing the performance of the
computer.

31
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS

SELF-ASSESSMENT QUESTIONS

From Question 1 to Question 17, indicate your answer by selecting the letter
for the best alternative. For Questions 18 to 20, write your answer. Answers
to the questions are given after the References. You should avoid the
temptation of trying to look at the answers before attempting ALL the
questions first.

1. The letters ICT stand for

A Information and Computer Technology.


B Information and Communication Technology.
C International Communications Technology.
D Information and Communications Technology.

2. Which of the following statements is correct about ICT?


A It provides the safest means to store data.
B Data can be stored in a very large space.
C ICT resources are cheaper than manual.
D Processing costs are greatly reduced.

3. Which of the following statements is incorrect about ICT?


A ICT means the same thing as computers
B Learning is greatly improved with use of ICT
C ICT often provides employment opportunities
D ICT cannot completely substitute teachers

4. Jane, Benson and Dorothy live in different towns. The three agree to
work as a team on a report about the extent of ICT use in the Zambian
education system. Using remote means, they are able to discuss and
show one another their research results. This teamwork can best be
described as:

A Demonstration
B Interaction
C Discussion
D Collaboration

32
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS

5. Which of the following would not be the role of ICT to a school


manager?
A Assisting in learner administration
B Assisting in library administration
C Presentation of learning materials
D Assisting in resource management
6. The most important reason why we need information is that
A We must be able to use resources
B We must make good decisions
C Information is processed data
D We must eradicate poverty

7. Which of the following statements in not correct about ICT?


A There is reduction in the time of processing data.
B There is reduction in the cost of storage facilities.
C There is reduction in number of all employees.
D There is improvement in quality of services.

8. Suppose that you work at a school which is intending to establish a


computer laboratory to be used for computer literacy lessons. The best
computers for this school are ones with the
A Lowest cost
B Largest storage
C Fastest processors
D Best software

9. All of the following are ICTs except


A Projector
B Photocopier
C Electric fan
D Book binder

10. Which of the following would not be the best use of ICT by a student?
A Communicating with friends
B Collaborating with colleagues
C Communicating with lecturers
D Researching for study materials

33
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS

11. Computers have limitations because


A They cause unemployment
B They are expensive machines
C They are programmed machines
D They can break down at any time

12. Suppose that you own a stand-alone computer which assists you to
perform a number of activities. Which of the following computer-
related crimes would impact on you the most?
A Virus attacks
B Pornography
C Software piracy
D Harassment

13. A computer system which you would recommend for storing all the
school records and assisting in the sharing of computer resources
among the various employees is
A Mainframe
B Server
C Minicomputer
D Microcomputer

14. Which of the following characteristics would you use to distinguish a


server computer from a microcomputer easily?
A Servers are faster than microcomputers
B Servers have larger storage capacity
C Servers have very large memory
D Servers are larger than microcomputers

15. It is important to understand the various classes of computers for a


number of reasons except
A Different computers are used for different purposes
B Different computers have different processing power
C Different computers have different shapes and colour
D Different computers may require different conditions

34
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS

16. A computer is an automatic machine because


A It has hardware
B It has software
C It uses electricity
D It is extremely fast

17.

The picture above shows one variety of microcomputers. From this we can
conclude that microcomputers are popular because
A They are portable
B They use less sophisticated software and hardware
C They can be upgraded easily
D They do not require air-conditioned rooms

18. Many people agree that computers are very useful tools. State five
advantages which they have.
19. List five ways in which ICTs can be useful to a school manager.

20. Suppose that you wanted to buy your own computer. Outline the
procedure you would follow.

35
ICT INTRODUCTION TO ICT References

REFERENCES

1. French, C. S (2002) COMPUTER SCIENCE, 5th Edition, Book Power,


London

2. Williams, B. K. , Sawyer, S. (2007) USING INFORMATION


TECHNOLOGY, 11th Edition, McGraw-Hill, Boston

3. Lauden, T., INFORMATION TECHNOLOGY, Concepts and Issues


Beekman

4. Laudon, K. C., Laudon, J. P. (2010) MANAGEMENT INFORMATION


SYSTEMS, 11th Edition, Pearson, London

36
ICT INTRODUCTION TO ICT Further Reading

Further reading

http://www.google.co.za/search?q=Images+of+cds&hl=en&prmd=imvns&tb
m=isch&tbo=u&source=univ&sa=X&ei=mLFxT-
SZOKn04QSqranqDg&ved=0CDEQsAQ&biw=1680&bih=880

http://www.google.co.za/#hl=en&sclient=psy-
ab&q=Images+of+radios&oq=Images+of+radios&aq=f&aqi=&aql=&gs_l=se
rp.3...5551l10384l0l10655l9l9l0l0l0l0l0l0ll0l0.frgbld.&pbx=1&bav=on.2,or.r_
gc.r_pw.r_qf.,cf.osb&fp=636f784017134044&biw=1680&bih=880

http://www.google.co.za/#hl=en&sclient=psy-
ab&q=Images+of+television&oq=Images+of+television&aq=f&aqi=&aql=&g
s_l=serp.3...34791l40777l1l41383l10l10l0l0l0l0l0l0ll0l0.frgbld.&pbx=1&bav
=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=636f784017134044&biw=1680&bih=88
0

http://www.google.co.za/search?q=Images+of+microcomputers&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=orRxT7WIC8LGmQWG
-8TGDw&ved=0CCYQsAQ&biw=1680&bih=880

http://www.google.co.za/search?q=Images+of+minicomputers&hl=en&prm
d=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=jrVxT4D4OMfDmQWciLS
0Dw&ved=0CCsQsAQ&biw=1680&bih=880

http://www.google.co.za/search?q=Images+of+mainframe+computers&hl=
en&prmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=37VxT6qAOafJm
AX50qnTDw&ved=0CCIQsAQ&biw=1680&bih=880

http://www.google.co.za/search?q=Images+of+server+computers&hl=en&p
rmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=SrZxT82qMc3LmAX1v
YzQDw&ved=0CCIQsAQ&biw=1680&bih=880

http://www.google.co.za/search?q=Images+of+supercomputers&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=ubdxT9LIGeHmmAXkq
bXRDw&ved=0CCwQsAQ&biw=1680&bih=880

37
ICT INTRODUCTION TO ICT Further Reading

ANSWERS TO SELF-ASSESSMENT QUESTIONS

1. D
2. D
3. A
4. D
5. C
6. B
7. C
8. A
9. C
10. A
11. C
12. A
13. B
14. D
15. C
16. B
17. A
18. Advantages of computers: Check from this list
• Work is done very fat.
• Work is done very accurately.
• Routine work can easily be done.
• There is very large storage for data.
• There is reduction in processing costs.
• There is great improvement in customer service.
• Work in inaccessible places can easily be done
19. Ways in which ICTs can be useful to a school manager: check from
this list
• Storing records
• Fast retrieval of records
• Fast and accurate processing of data
• Improved communication with parents, sponsors, suppliers,
colleagues, authorities
• Improved management of staff
• Improved management of resources

38
ICT INTRODUCTION TO ICT Further Reading

20. Procedure for buying a computer:


i.) Determine the purpose of the computer
ii.) Identify appropriate software programs
iii.) Identify appropriate hardware for the software
iv.) Familiarize with the software
v.) Identify the source of software and hardware
vi.) Buy software and hardware

Install software and hardware

Foreword to module 2

Dear Student,
In Module 1, you were introduced to ICT. You learnt about the value of ICT
to various categories of people such as business people, students, teachers
and education administrators. It was mentioned that computers are very
useful tools for performing and automating various operations for individuals
and organizations. The module further introduced you to the various
categories of computers: microcomputers, servers, minicomputers,
mainframe computers and supercomputers. You learnt that microcomputers
are the most widespread, and reasons for this were given. Finally, the
module introduced you to the basic parts of a computer system.

39
ICT INTRODUCTION TO ICT Further Reading

In this module, you will learn in detail about computer hardware. This should
help expel some of the myth that surrounds the computer. You should pay
particular attention because this module forms the core of your study in ICT.
How well you understand what computers really are and how you can make
great use of them depends on how you comprehend the material presented
to you in this module.
The module has been prepared in such a way that each section starts with
questions. These are the questions which you must address as you study the
module. Each question has been answered by giving clear explanations and,
where necessary, suitable examples. If you find that the explanations or
examples are not clear or sufficient, do not hesitate to contact you lecturer
for more support.
TVTC

Introduction

What is hardware?

Computer hardware is the physical part of a computer. This is the part of a


computer that you can see, feel or touch. It consists of all the boxes and
everything inside them that you can see or touch.

There are many things that make up computer hardware. To simplify the
understanding, these parts are often classified as:

• Input
• Output
• Processor, and
• Storage

40
ICT INTRODUCTION TO ICT Further Reading

Each of these parts will be discussed in various sections of this document.


You should ensure that you understand very well the role(s) which each of
these units performs, and how they coordinate to make a computer a very
efficient and effective machine. You will discover, as you study this module,
that some of the units, e.g. input, output and storage devices, come in a
variety of forms. Ensure that you fully appreciate the reasons for this. For
example, you will find that there are different types of input systems. Also
pay attention to new concepts that you come across.

Objectives

After studying this module, you should be able to:

• State the main units of computer hardware.


• Draw a diagram to show the main units of computer hardware and how
they relate to each other.
• Name the various computer input and output devices.
• Identify an input or an output device if you are given a physical object or
its picture.
• Explain why there are various input and output devices.
• Describe an input and output devices in terms of their mode of operation
and their relative advantages and disadvantages.
• Name the various types of storage systems.
• Identify a storage device if you are given a physical object or its picture.
• Describe a storage device in terms of mode of operation and its storage
capacity.
• State the major units of the processor.

41
ICT INTRODUCTION TO ICT Further Reading

• Draw a diagram of a computer showing input, output and the major units
of the processor.
• State the functions of control unit (CU), arithmetic and logic unit (ALU),
random access memory (RAM) and read only memory (ROM).
• Name the various registers of the CU and state their functions
• Name the various buses in the processor and state their functions.
• State what is meant by booting a computer and how the ROM, BIOS and
CMOS get involved.
• State what is meant by program execution and how it occurs involving
the CU, the RAM, the ALU and the registers.

Chapter 1: INPUT DEVICES


We begin learning about hardware with input devices. First let’s focus on
these pertinent questions to motivate our understanding.
• What is an input device?
• Why does a computer require input?
• What are the various types of input?
• Why is it important to have various input devices?
An input is a device that lets you communicate with the computer. You can
use input devices to:
• Enter data or information, and
• Issue commands.
Why does a computer require an input device?
An input device receives data from the user in human readable form. Since
a computer cannot comprehend and handle the data in this state, the data
must first be converted to a form which can directly be manipulated. This is
where the role of input becomes important. Input is required so that it
receives data in human readable form and converts it to the form which the
computer can understand and manipulate. In other words, input is required
in order for input data to be converted form human readable form to
machine readable form. This is called data capture. Does this make
sense? Machine readable form is in machine language. You will learn more
about machine language later in this section.

42
ICT INTRODUCTION TO ICT Further Reading

1.1 TYPES OF INPUT DEVICES


There are many input devices in use. Examples are:
1.1.1 Keyboard Devices
What are keyboard devices?
These are input devices that have a range of keys for typing and performing
other functions. They resemble the typewriter keyboard in many respects.
Some details about keyboard devices are as follows:
• They are the most common input devices today.
• They are used to type data into the computer.
• They have special keys for giving the computer commands.
• Commands tell the computer to do something, like save the file.

• These
special keys are called command or function keys. Function keys
have labels F1 to F12.

How does a keyboard work?


Let’s look at the most basic details about this.
A keyboard, as the illustration above shows, has a range of keys. Each key
basically operates like a switch. Each key controls a particular electronic
circuit so that when the key is pressed, a special signal is generated. This

43
ICT INTRODUCTION TO ICT Further Reading

signal travels to the computer which interprets which key was pressed and
how it was pressed.
1.1.1.1 Types of keyboards
There are different types of keyboards in use. The most common type of
keyboard is called the standard keyboard. The standard keyboard has the
keys arranged on the QWERTY format. Although the standard keyboard is
the most popular, some people believe, correctly for that, that it is not very
convenient for typing. One of its disadvantages is that it is not very flexible
to allow for hand and wrist comfort. Therefore, it is believed that a health
hazard condition called repetitive strain injury (RSI) may result with
constant use of the standard keyboard. Another point against the standard
keyboard is that even very experienced typists cannot type fast enough with
it. For these and other reasons, other types of keyboards have been
developed to provide better alternatives. Examples of such keyboards are
those called ergonomic keyboards. Ergonomic keyboards are meant to be
more user-friendly - to provide more comfort and typing speed. Some of
these keyboards do not have fixed assemblies like the standard keyboard.
Instead they have parts that can be separated or adjusted to accommodate
the comfort of the user. Others are designed with special features that
provide hand and fingers support.

Illustrations of different types of keyboard:

44
ICT INTRODUCTION TO ICT Further Reading

45
ICT INTRODUCTION TO ICT Further Reading

46
ICT INTRODUCTION TO ICT Further Reading

1.1.2 Pointing Devices


What are pointing devices?
These are devices that are used to move an object, e.g. a pointer, on the
computer’s screen. Used in conjunction with the keyboard, there is more
flexibility and productivity on the part of the computer user.
Some facts about pointing devices are as follows:
• Pointing devices move some object on the screen and can do some
action such as selecting an option from a list.
• Common pointing devices are:

• Mouse –is the most common pointing device.

• A mouse, like all other pointing devices, is used for entering


commands only.

• Track ball – is basically an upside down


mouse.

47
ICT INTRODUCTION TO ICT Further Reading

• Joystick – is commonly used in computer games

• Game controller - is also commonly used


to play games.

48
ICT INTRODUCTION TO ICT Further Reading

1.1.3 Other input devices


There are several other input devices that can be used depending on the
nature of data and the convenience of use. Some of these are described
below.

1.1.3.1 Scanner
What is a scanner, and what is it used for?
A scanner allows you to scan documents, pictures, or graphics and view
them on the computer. You can also use software to edit the items you
scan.
Some facts about scanners are as follows:
• They are used to put printed pictures and text into a computer.
• They convert an image into dots that the computer can understand.
• To scan text, optical character recognition (OCR) software is needed.

1.1.3.2 Digital Camera


• It is used to take electronic pictures of an object.
• The pictures taken by a digital camera can be used directly by a
computer.

49
ICT INTRODUCTION TO ICT Further Reading

1.1.3.2 Microphone
• It is used to put sound into a computer.
• The computer must have sound recording/playing or editing software,
e.g. Windows Media Player and Audacity, respectively.
• A sound card may also be required on the computer.
• The sound card converts analog signals to digital signals and vice
versa.

1.1.3.3 Video camera

A video camera can be used to put moving pictures


into the computer. In order to be able to edit movies, the computer must
have video editing software such as Windows Movie Maker or Pinnacle
Studio.

50
ICT INTRODUCTION TO ICT Further Reading

1.1.3.4 CD-ROM/DVD-ROM
• These can be used to put both sound and images into a computer.
• They use laser light to read a Compact Disk (CD) or a DVD disk.
Note: These are often also used as OUTPUT devices.

1.1.3.5 Video Capture Card


• A video capture card is usually found inside the computer's case.
• It is used to put video into a computer.
• It needs a video source, either a video camera or a video recorder.

1.1.3.6 Touch Screen


A touch screen is a computer screen or other screen that you can touch with
your finger to enter information. Examples of touch screens include a smart
board, a microwave, a dishwasher, or an ATM at a bank. Nowadays you have
come across cell phones and e-readers that have touch screens.

51
ICT INTRODUCTION TO ICT Further Reading

1.1.3.7 Bar Code Scanner/Reader


A bar code scanner or reader scans a little label that has a bar code on it.
The information is then saved on the computer. Bar code scanners are used
in libraries, bookshops and supermarkets a lot.

52
ICT INTRODUCTION TO ICT Further Reading

1.1.3.8 Drawing Tablet


A drawing tablet is similar to a white board, except you use a special pen to
write on it, and it's connected to the computer. Then the word or image you
draw can be saved on the computer.

Why is it important to have a variety of input devices?

Well, you have seen that the various input devices in use are used in
different ways. There is a variety of input devices because some of them are
specific for inputting only certain types of signals into the computer. For
example, if you wanted to type a report, the most convenient for composing
the report could be the keyboard. But if you wanted to place a photograph
into a computer, the most convenient input would be the scanner. Others
are chosen for their speed, convenience. In short, the choice of input device
we have is determined by things such as:

• Nature of data on its source


• Speed of data entry required
• Convenience or user-friendliness of input

53
ICT INTRODUCTION TO ICT Further Reading

1.2 Machine Language


What is machine language, and why is it important in a computer?

Machine language is a programming language that can be understood


directly by a computer’s central processing unit. It consists of codes of
characters in binary. (Binary is base two.) In machine language, characters
are represented by bits (i.e. binary digits) which consist of ones (1) and
zeros (0). For example, in a coding scheme called ASCII, A is 01000001, B is
01000010 and C is 01000011. A binary representation of a character
represents the type of current that must flow when the character is being
entered from the input to the processor. Each 1 in the code represents high
current, and each 0 represents low current. Therefore, for a code
101010101, the current has the wave form

In a computer, all processing activities are in machine language. Actually, a


computer processes all forms of data by doing arithmetic operations on the
data which is in binary form. (Please note that binary is a number system.
We do not normally count or do our arithmetic in binary but in decimal which
is called base ten.) Binary was chosen for computer operations because it is
simplified – there are only two digits: 0 and 1. Decimal is too complicated for
computer operations because there are too many digits – ten of them, i.e. 0,
1, 2, 3, 4, 5, 6, 7, 8, and 9.

1.3 Exercise 1
• What is a computer input device?
• Why is there a variety of computer input devices?

54
ICT INTRODUCTION TO ICT Further Reading

• A computer keyboard and a computer mouse are input devices. What


is the difference, in terms of function, between them?
• Suppose that you are the Head of your school and your School
Librarian has made a proposal to have a special input device installed
in the school library in order to automate the lending of books. Which
input device is the Librarian referring to? Also describe how this input
device works.
• It has been said that a keyboard is the most common computer input
device. Explain why it is so.

Chapter 2: OUTPUT DEVICES

Up to this point, you have learnt about input devices, what they are, their
examples, and why you need them on your computer. In this chapter you
will learn about output devices. To motivate our study, here are some
questions:
• What is an output device?
• Why does a computer require output?
• What are the various types of output?
• Why is it important to have various output devices?
What is an output device?
An output device is a device used to give feedback to the person using the
computer.
Why does a computer require output?
Imagine that a computer had no output device. Then you wouldn’t be able to
tell what the computer did for you. Why? This is because, as you learnt
55
ICT INTRODUCTION TO ICT Further Reading

earlier in the last chapter, a computer works with signals or data that are in
machine language or code - the 0s and 1s. So, within the computer, your
data is simply a large collection of strings of these 0s and 1s which you
cannot obviously comprehend as a human being. Therefore, after the
computer has worked on your data in machine code and it is time to give
feedback to you, it must convert these binary codes representing your data
into the language or form which you can understand. The computer sends
these codes to the output device which does the conversion to human
understandable form. The output device may display the information on a
screen, create printed copies or generate sound depending on the device
which you are using. This is what you will learn in the next section.

2.1 Types of output devices


Output devices are classified as softcopy output devices and hardcopy
output devices. Softcopy output devices give feedback that is intangible.
(What does this mean?) The information is displayed on a display device or
is given in form of sound. Therefore, displayed or visual and audio signals
from the computer are classified as softcopies. Hardcopy output devices give
feedback that is tangible. (What does this mean?) A hardcopy output device
produces an output on paper or other tangible medium which is removed
from the device.

56
ICT INTRODUCTION TO ICT Further Reading

Examples Output Devices:

Impact Dot Matrix Printer

LCD Monitor

CRT Monitor

Desk jet printer

Speakers

Laserjet Printer

Deskjet Printer

57
ICT INTRODUCTION TO ICT Further Reading

Plotter

2.1.1 Monitors and Displays


• These show the processed information on a screen

• A CRT (i.e. Cathode Ray Tube) monitor uses a


Picture Tube like a television with the image displayed on the front of
the tube, which is called the screen.

CRT Monitor

• Monitors used to be called Cathode Ray Tubes (CRTs) because of the picture
tube, which is a large vacuum tube.
• A monitor or display produces a soft copy. When the device is turned off the
information is erased.

• CRT monitors are being replaced by flat panel displays.

58
ICT INTRODUCTION TO ICT Further Reading

LCD Monitor

Displays are flat and use plasma, LCD, or some other technology.

2.1.1.1 CRT Monitors


They have the cathode Ray Tube as shown below.

Advantages:
• They are cheaper than LCD monitors.
• They are easy to repair.
Disadvantages:
• They occupy a lot of space on the desk.
• They consume a lot of electrical energy.
2.1.1.2 LCD Monitors
They use liquid molecules.

Advantages:

59
ICT INTRODUCTION TO ICT Further Reading

• They occupy less space on the desk.

• They consume less electrical energy than CRT monitors.


Disadvantages:
• They are more expensive.
• They are not easily repaired when they develop faults.
2.1.2 Printers
• Printers produce a hard copy.
• The information is printed on paper and can be used when the device is off.
• Printed information is also called a printout.
2.1.2.1 Dot-matrix printers (impact printer)

Facts about impact dot matrix printers:

• They have a knob for advancing paper.


• They use an inked ribbon.
• They print by striking a pattern of dots on paper through the inked ribbon.

Advantages:

• They can be used with carbon paper to print multiple copies at once.
• Their ribbons are not very expensive.
• They are durable.
• They are excellent for high volumes of printing where high quality is not
essential.
• The ribbons fade gradually instead of abruptly running out of ink like in a
deskjet printer.
• The ribbon does not dry out easily, so the print looks good even if the printer
is rarely used.
• They can use fanfold paper, i.e. paper that is connected in a long continuous
sheet.

60
ICT INTRODUCTION TO ICT Further Reading

Disadvantages:

• They are very slow; they print one line or one character at a time.
• They make so much noise when printing.
• Print heads are difficult to replace when they get worn out.
• Their printout has low quality.
• They can print in black only.
• They are more prone to paper jamming, and their jams are more difficult to
clear.

2.1.2.2 Ink jet printers (non-impact printer)

They use ink cartridges to print.

Advantages:

• They can print in colour.


• They are less expensive to buy.
• They make less noise when printing.
• They are very light; some are portable.
• Their printout has good quality.
Disadvantages:

• Their ink is expensive.


• They cannot be used with carbon paper.

61
ICT INTRODUCTION TO ICT Further Reading

• Their ink runs when touched with wet hands.


• Sometimes inkjet cartridges get clogged with dirty which either blocks the
ink droplets or causes them to land incorrectly.
2.1.2.3 Laser printers (non-impact printer)

They use toner and laser light.

Advantages:

• They print very fast.


• They print more quietly.
• They can print in colour or black.
• Their printout is of high quality.
Disadvantages:

• They are expensive to buy.


• Their toner is costly as well.
• They use laser light which is harmful when one is exposed to it.
• They consume more electrical energy.
How the laser printer produces an image

• Firstly, a laser makes dots on a light sensitive drum


• Toner (very tiny particles of carbon) is made to stick to the drum where the
dots where made
• Paper is pressed against the drum and the toner is placed on the paper
• The paper is heated and the toner melts into the paper
Why is it important to have various output devices?
As you have seen, different output devices work in different ways, and have their
own advantages and disadvantages. Therefore we need various output devices
depending on the nature of the output which we want to generate, and also
depending on the relative advantages and disadvantages which particular devices
have. Some output devices may be more appropriate for certain jobs. So, when
choosing an output device, we compare whether or not its advantages outweigh its
disadvantages for that particular job.

62
ICT INTRODUCTION TO ICT Further Reading

2.1.3 Resolution of an output device

What is resolution, and why is it important?

Resolution refers to the sharpness or clarity of an output. Often resolution is


quoted in dots per inch (dpi). The larger the number of dots which a
devices makes per inch, the higher the resolution, and the higher the
resolution of an output device, e.g. a monitor or a printer, the better the
quality of the output. Among the printers, the laser jet printer gives the
highest resolution, and the impact dot matrix printer the lowest.

2.2 EXERCISE
• What is an output device?
• Give examples of computer output devices.
• Why is there a variety of output devices?
• What is meant by softcopy output device?
• What is meant by hardcopy output device?
• Why would you want your computer to have both the monitor and the
printer?
• For what kind of work would you use an impact dot matrix printer, a
desk jet printer or a laser jet printer?
• A payroll assistant who has a desk jet printer requests a teacher who
has an impact dot matrix printer to exchange their printers. Explain
why this is a good suggestion.
• What do you understand by resolution of an output device?
• Someone suggests that a laser jet printer is the best printer. Do you
agree or disagree? Explain.

63
ICT INTRODUCTION TO ICT Further Reading

Chapter 3: STORAGE DEVICES

So far, you have learnt about input and output devices. You have learnt why
a computer requires these systems. Storage is another system which is very
important on a computer. But before we continue, let’s put this point in
focus by asking these questions:
• What is a storage device?
• Why does a computer require storage?
• What are the various types of storage?
• Why is it important to have various storage devices?
What is a storage device?
A storage device is anything that we use to store computer data or signals.
Why does a computer require storage?
A computer requires storage for two reasons:
• To store user data, and
• To store computer programs
What is the difference between user data and computer programs?
By user data we mean the data that you create as you use the computer.
Instead of keeping your data in paper folders, box files, shelves or file
cabinets, you can keep the documents in the computer. Using the computer
to store data has many advantages than using any of the manual storage
facilities mentioned above. For instance, you can store very large amount of
data in a very small space in the computer. In addition, the data can also be
accessed very quickly.
A computer is not used for keeping user data only. A computer uses various
programs, or software. These programs are also stored on the storage.
Therefore, a computer must always have enough storage to keep both user
data and computer programs.
How does a computer store information?
The computer stores information as a string of zeros (0) and ones (1).
• The standard string length is eight 0's or 1's in a row, e.g. 11110001, or
10001110.
• Recall that this standard length is called byte.
• A byte equals one character.
• A character is a letter, number, or symbol - it is about anything that can
be typed on a keyboard.
• There are 256 standard characters used by almost all computers.

64
ICT INTRODUCTION TO ICT Further Reading

How is information measured?


The amount of information is given in bytes (B). Since a byte is one character, the
amount of information is given as the number of characters entered or stored. The
size of a storage system or device is therefore indicated as the number of bytes
which the storage can manage to accommodate. Because we normally deal with so
many characters or bytes, large units are used to indicate the amount of
information, or to indicate the size of a storage device. These larger units are:
• Kilobyte (KB). One kilobyte equals about 1024 bytes
• 1KB is about 140 words, about half page of typed double-spaced text (words
only)
• Megabyte (MB). One megabyte equals about 1000 KB
• One megabyte equals about 1,000,000 bytes
• One megabyte equals about 500 pages of text, or one large book
• Gigabyte (GB). One gigabyte equals about 1000 MB
• One gigabyte equals about 1,000,000 KB
• One gigabyte equals about 1,000,000,000 bytes
• One gigabyte equals over 1,000 books of text
• Terabyte (TB). One terabyte is equal to 1000 gigabytes.
Now think about this. Do you have a flash disk of capacity 16GB? All the books and
magazines in the TVTC library can go into your flash disk! (The TVTC library at the
moment has approximately nine thousand books and magazines.)
What are the various types of storage?
There are four types of computer storage: magnetic tape, magnetic disk, optical
disk and semiconductor chip.

What are magnetic storage devices?


As you can rightly guess, these are storage devices that use magnetic
properties to store data. Magnetic storage devices are made by coating a
surface with magnetic powder. An example of magnetic powder is iron oxide.
Data is stored on the magnetically coated surface by forming magnetic
patterns during the recording process. In fact this is similar to the way you
record music on your audio tape, e.g. the cassette.

3.1 Magnetic tape


This is similar to ordinary audiotapes. The tape has magnetic oxide on one of its
surfaces and data is stored by magnetising the oxide. A magnetic tape is a
sequential storage medium. This means that the data is stored and read one after
the other. This is also its major problem because data or information can only be

65
ICT INTRODUCTION TO ICT Further Reading

retrieved in a sequence. The computer has to search for the required data from the
beginning of the tape until it finds what it is looking for.

3.2 Magnetic disks


A magnetic disk offers direct or random access for data. This works faster than
magnetic tape because the computer does not have to read the data that occurs at
the beginning of the tape in order to retrieve any data at any location on the disk.

3.3 Types of magnetic disks


There are two types of magnetic disk: floppy disk and hard disk. A floppy disk is a
plastic disk with magnetic powder on its surfaces. A hard disk is a metallic disk also
with magnetic powder on its surfaces. The hard disk has a higher storage capacity
than a floppy disk. The floppy disk is removable but the hard disk is not removable
from the computer.

3.4 Optical disk

What is an optical disk?

An optical disk is a storage device which uses light to store data on it. This type of
disk uses laser technology. Laser is a type of light. An example of an optical disk is
the ordinary audio compact dick (CD). The optical disk used in a computer for
storage is called compact disk-read only memory, CD-ROM . Unlike magnetic
tape and magnetic disk, which can be recorded and erased a number of times, the
CD-ROM is recorded once. However, there are some that can be erased and
recorded many times. An example is a CD-RW (i.e. Compact Disk - Re-writable.) A
CD-R (i.e. Compact Disk – Recordable) is written on once only.

3.5 Semiconductor chip

What is a semiconductor storage device?

This is a storage device which is made from semiconductors. Semiconductors are


materials which conduct an electric current just midway between good conductors
and poor conductors. A semiconductor chip is made from silicon to which other
elements have been added carefully. An example of a semiconductor storage device

66
ICT INTRODUCTION TO ICT Further Reading

is a flash disk which has replaced a floppy disk as a common removable storage
medium.

3.6 Disk drives

What is a disk drive?

In a computer, a disk is controlled in order for the computer to write or read data
on it. The unit that controls the disk is known as the disk drive. A floppy disk drive
controls the floppy disk, the hard disk drive controls the hard disk and the optical
disk drive controls the optical disk.

Disk drives are identified by the letters A, B, C, D and so on. Disk drives A and B
are for floppy, and disk drive C is always for the hard disk. The CD-ROM takes the
first letter after the hard disk has been allocated the drives. Disk drives A and B are
no longer included on new computers. Thus, the common arrangement now is: C
and D where C is hard disk and D is CD-ROM. If you connect a flash disk, it is
assigned the letter E for its drive.

A special kind of high capacity floppy disk called a zip disk was also available. One
zip disk could accommodate as much as 100Mb or more of data as compared to
1.44Mb or 2.0MB of data on an ordinary floppy disk.

A DVD (digital video disk or digital versatile disk) is a type of optical disk that can
accommodate text, sound and video. A DVD is popular for movies. To use a DVD,
the computer must have a DVD-ROM drive.

3.6.1 Hard Disk Drive


The hard disk drive is the primary device that a computer uses to store
information. It is used to store computer programs as well as data files. The
hard drive is located inside the computer case and it magnetically stores
data on stacks of rotating disks called platters. Nowadays there is also an
external hard drive. A hard disk or hard drive has the largest storage
capacity at the moment. Currently, the storage capacity of an internal hard
drive ranges from about 160GB to 1TB. The capacity of an external hard
drive ranges from about 160GB to almost 4TB.

67
ICT INTRODUCTION TO ICT Further Reading

External Hard Drive


Internal Hard Drive

3.6.2 Floppy Disk Drive


The floppy disk drive stores information on a floppy disk. As mentioned
earlier, floppies (as they were also called) are not common any more.

68
ICT INTRODUCTION TO ICT Further Reading

3.6.3 CD -ROM Drive

CD-ROM drive is a device that reads


information stored on a compact disc. CD-ROM stands for Compact Disc
Read Only Memory. Currently, an ordinary CD has storage capacity of 700
or 800MB, and a DVD has capacity of 4.7GB. Because a CD-ROM is an
optical disk, it uses laser light to write and read data. The picture below
shows a CD-ROM drive.

CD-ROM Drive
CD-ROM

3.6.4 Zip Disk


A zip disk is a removable disk that holds a large amount of information than
can be stored on a floppy disk. The storage capacity of a zip disk is between
that of a floppy disk and a hard disk. A zip disk can be used to archive,
protect and transfer large amounts of data.

Zip drive or Zip Disk

69
ICT INTRODUCTION TO ICT Further Reading

3.6.5 Flash Disk and Memory card


A flash disk is the latest storage device. It has replaced the use of floppy
disks. Its advantages over floppies are:
• It has very large storage capacity,
• It is easier to carry, and
• It is more durable.

Flash Disk
Memory Card

The memory card in your cell phone or digital camera is similar to a flash
disk in the sense that it is also a semiconductor storage device.

3.7 Exercise
• Why does a computer require storage?
• Mention the three general types of storage.
• Mention the four types of storage.
• Mention the two types of magnetic storage.
• Which device offers the largest storage at the moment?
• Two types of storage are not common nowadays. Which are these?
• State the advantages and disadvantages of a flash disk.
• Someone is selling a computer which has a hard drive of 600MB.
Would you buy it or not? Explain.
• Suppose that the capacity of your flash disk is indicated as 16GB.
What is the maximum number of characters which you can store on it?

70
ICT INTRODUCTION TO ICT Further Reading

• What is a disk drive?


• Which disk drive is associated with the internal hard disk?
• What is the difference between a CD-ROM and a CD-ROM drive?

Chapter 4: THE SYSTEM UNIT

So far you have learnt about the peripheral devices – input, output and storage.
These devices interface or communicate with the system unit to perform specific
roles such as data entry (input), providing feedback (output) and data and program
storage (storage). To start with, let’s ask a few questions which should form the
basis for our study.

• What are the major components of the system unit?


• What functions does each component of the system unit perform?
• What is meant by program execution, and how is it achieved?

As you study this section, pay attention to the following terms:

• System unit
• Central processing unit
• Microprocessor
• Control unit (CU)
• Arithmetic and logic unit (ALU)
• Main memory
• Random access memory (RAM)
• Read only memory (ROM)
• Basic Input/Output System (BIOS)
• Complementary Metal Oxide Semiconductor (CMOS)
• Registers
• Buses

71
ICT INTRODUCTION TO ICT Further Reading

4.1 The Processor

So let’s start. The system unit, also called the processor or processing unit, is the
main unit of computer hardware. The system unit is like the brain in your body. It
processes the data which it receives from the input just like our brain processes
signals which it receives from sense organs. The diagram below shows the model of
a computer system, and also shows the basic structure of the processor. The
control unit (CU) and the arithmetic and logic unit (ALU) are manufactured on the
same silicon chip called the microprocessor.

PROCESSOR

Microprocessor

ALU
COTROL UNIT

INPUT

RAM

OUTPUT

ROM

72
ICT INTRODUCTION TO ICT Further Reading

Main Memory

STORAGE

The microprocessor is a programmed chip. This means that it already has


instructions imbedded in it. Its main function is to direct and control the
performance of the computer by following instructions which it contains. The
microprocessor is also popularly known as the central processing unit (CPU).

Next let’s learn some details each of the units of the processor starting with the
control unit.

4.1.1 The control unit

What role is performed by the control unit? This is a unit within the CPU that
controls all the functions such as the following:

• Controlling the operations of the input/output (i/o) systems.


• Controlling the movement of data into and out of the processor.
• Configuring the random access memory for more efficient operation.
• Scheduling jobs to the various computer devices.
• Coordinating the work of various devices.

We will next learn some details about the arithmetic and logic unit.

4.1.2 The ALU (arithmetic and logic unit)

• What is the function of the ALU in the CPU?


• How is data processed in the CPU?

The ALU is the unit that does the actual processing of data by performing
arithmetic and logic operations on digital signals.

73
ICT INTRODUCTION TO ICT Further Reading

What are arithmetic and logic?

As you obviously know, arithmetic is a kind of popular mathematics in which we


add, subtract, multiply and divide numbers. Logic is an operation which involves
reasoning by comparing things so that we are able to make better choices. For
example, when you look for a chair in class, you have performed logic because you
could as well have sat on the floor. Therefore, whatever the nature of data given to
the computer, processing is by means of these two operations, i.e. arithmetic and
logic. To process data, the ALU makes use of digital circuits called logic circuits.
(A digital circuit is a circuit which consists of electronic components such as diodes,
transistors and integrated circuits. Logic circuits are constructed from digital circuits
called logic gates. Examples of logic gates are AND, OR, NOR, and NOT.

We now turn our attention to the main memory.

4.1.3 The main memory

• What do we mean by memory?


• Why does a computer require memory?
• What does computer memory consist of?

Memory is a storage location in the system unit. It is one of the most important
resources of the computer.

Main memory has two main parts. These parts are the random access memory
(RAM) and the read only memory (ROM).

4.1.3.1 RAM

This is the working memory of the computer because signals are always entering
and leaving it. Therefore, RAM is a transit point for data and instructions to and
from the CPU (see illustration below).

CPU

Main Memory

74
ICT INTRODUCTION TO ICT Further Reading

RAM is temporary memory because it holds data only when power is on. If power is
off, the contents of RAM are erased. For this reason, it is also known as volatile
memory. Shown below is a photograph of RAM.

DDR RAM

RAM is like a waiting room at the hospital for patients wishing to see the doctor.
Just as patients should sit in the waiting room as they cannot all go in to see the
doctor at the same time, data and instructions are kept in the RAM before they go
to the CPU or to the output devices.

How are the different types of signals kept in RAM?

To ensure that different signals do not mix, RAM has a pigeon-hole structure
consisting of several storage locations called memory addresses as illustrated
below.

Memory addresses

75
ICT INTRODUCTION TO ICT Further Reading

Different signals are kept in different memory addresses. Each memory address is
assigned a unique identification number, just like every house in a township is
allocated a unique house number.

So what role does RAM play in the computer? Some of the specific functions of
RAM are as outlined below.

Functions of RAM:

• It receives and stores unprocessed data from input.


• It stores data that has been processed in the ALU to await output.
• It stores data that has been processed in the ALU to await storage.
• It stores instructions required by the control unit to process data.

As you can see from the functions stated above, RAM is the part of main memory to
which new signals can be added or removed. As RAM works, signals keep coming in
and going out of it.

How is RAM different from ROM?

Let’s look at the details of ROM to learn why it is included in the computer and how
it is different from RAM.

4.1.3.2 ROM
The Read-only memory is a storage medium used to store firmware.
Firmware is software that is used to control the performance of specific
hardware units in the computer, for example, the monitor, the keyboard, the
mouse, the hard disk.
Unlike RAM which is volatile, i.e. which loses its contents when the computer
is turned off, ROM is permanent storage. Whereas the computer can write to
RAM, the ROM cannot be written to. The contents of ROM were programmed
into the ROM chips by the computer’s manufacturer.
What is the role of ROM in the computer?

Function of ROM
ROM is used to store programs that run when the computer is switched on.
These programs have startup instructions used to boot the computer.
(Booting means starting up a computer. See more details about it below.)
Details about how the computer boots are kept in a special program called
BIOS within the ROM chip. (BIOS is an acronym for Basic Input/Output
System.

4.2 Booting the Computer

76
ICT INTRODUCTION TO ICT Further Reading

Whenever you turn on your computer, the first thing you see is the BIOS software
performing its function. On many machines, the BIOS displays text describing
things like the amount of memory installed in your computer, the type of hard disk
and so on. During this boot sequence, the BIOS does some very important work to
get the computer ready to run.

So, how does the computer know the actual details about a particular machine, for
example, the type and amount of memory, the type and amount of hard disk, and
so on?

In a computer there is another component called CMOS. CMOS stands for


Complementary Metal Oxide Semiconductor. The CMOS (pronounced ‘See
Moss’) stores the actual details about the settings of a particular computer. These
settings can be changed at any time by the computer user as the computer starts.
The CMOS does not lose its details even after you shut down your computer
because it is kept powered by a small battery called CMOS battery.

After checking the CMOS Setup, the BIOS determines whether


the monitor is operational. Next, the BIOS checks to see if this is a cold boot or a
warm boot. If it is a cold boot, the BIOS verifies the amount RAM by comparing
the actual value of RAM chip present with the value stored in the CMOS. It then
checks for the presence of a keyboard and a mouse. It also verifies other
components on the motherboard. This whole process is called POST (i.e. Power-on
Self Test.) If the BIOS finds any errors during the POST, it notifies the user by a
series of beeps or a text message displayed on the screen.

4.3 Registers
Having learnt about The CU, ALU, RAM, ROM, BIOS and CMOS, let’s learn
something about registers. We should be able to answer the following questions:

• What are registers?


• Why does a computer include registers?
• Where are registers found?
• What are the names of the registers, and what are their roles?

77
ICT INTRODUCTION TO ICT Further Reading

Registers are temporary storage locations found in the microprocessor. The


registers, like RAM, are temporary because they do not store their signals
permanently. Since the work of registers is similar to the work of RAM, why should
a computer have registers when it already has RAM? Examine the illustration given
below which explains this design.

Faster than RAM

CPU

As fast as the CPU

Register

Slower than CPU but faster than storage

RAM

Slower than RAM, and much slower than CPU

Storage

A register resembles RAM because it is also temporary storage, but it is different


because it works much faster than RAM. Since the CU and the ALU work extremely
fast, faster than RAM, it is more efficient if data and instructions going to the CPU
are first placed in an equivalent faster storage – the register. The CU is then not
delayed as it performs tasks at high speed. It picks the data and the instructions

78
ICT INTRODUCTION TO ICT Further Reading

from the fast registers instead of picking them from the slow RAM. Registers are
also very close to the CU than the RAM. This is because registers are constructed
on the same silicon chip as the CU, but RAM is on a different chip. This means that
the distance from the CU to a register is shorter than the distance from the CU to
RAM for signals.

Why can’t data or instructions move directly from storage to the CU instead of
passing through RAM?

One reason, as you can guess, is that storage is actually much slower than RAM.
Another reason is that the distance from the CU to storage is longer than that from
the CU to RAM.

What are the names of the registers, and what are their functions?

There are many registers in the CPU. The following are some of the registers:

4.3.1 Current instruction register (CIR)


This is a register in the control unit and it holds an instruction currently in use for
processing data in the ALU.

4.3.2 Memory data register (MDR)


The memory data register is the register that keeps the data being processed. It
stores the bits of data which the control unit must send to the ALU for processing.

4.3.3 Memory address register (MAR)


The memory address register holds addresses of data so that the control unit is
able to read or write in the correct location in the RAM.

4.3.4 The accumulator


This is a register in the ALU. It is used to hold data that has just been processed
before the data is transferred to the RAM.

4.3.5 Program Counter (PC)


The program counter is a register in the CU and is used to determine the
sequence of instructions during data processing. A computer uses programs
to process data, and the programs consist of instructions. The instructions
are utilised one at a time by the CU. Following the instructions in a particular
program is called program execution. The details of program execution are
given below. So read on.

4.4 Program execution


The main function of the CPU is to execute a program. The control unit controls the
execution of a program. To perform its role, the control unit is also controlled by an

79
ICT INTRODUCTION TO ICT Further Reading

electronic clock that produces a train of digital signals (illustrated below) and a
Program Counter which indicates the next instruction to be executed in the CPU.

The digital signal is applied to the control unit. The low state of the signal is given
value 0 and a high state value 1. The transition low-to-high-to-low or 0-1-0 is
called the clock pulse.

High

Clock pulse

Low

Low

Each clock pulse makes one complete cycle. During one clock pulse, the CPU
processes one program instruction. (A computer’s processor speed is the number of
instructions or clock pulses that it processes in one second. For example, a
computer with a processor speed of 2GHz processes two billion instructions in one
second).

An instruction is processed in a sequence of three steps as follows:

• First the control unit fetches an instruction in RAM.


• Then the control unit decodes the fetched instruction.
• Finally the control unit executes the instruction in the ALU.

The sequence of activities is called the fetch-decode-execute, and is always


completed within one clock pulse. However, since an instruction is immediately
decoded after being fetched, the sequence is reduced to fetch-execute.
Immediately after an instruction is fetched and decoded, the value of the Program
Counter is increased or incremented by one (1). This causes the CU to go to the
correct location in RAM to pick the next instruction.

At this point, let’s pause and consider these facts which have already been
presented to you. Recall that it has been said that signals (data and instructions) in
a computer are represented in binary, i.e. in machine language, and that
processing of data is also in machine language. So, how does the computer
distinguish signals that represent data from signals that represent instructions since

80
ICT INTRODUCTION TO ICT Further Reading

the two are represented in the same way? You’ll be surprised! Because a computer
is ‘an idiot’, it cannot distinguish the two types of signals. For this reason, is it
possible then that the computer may try to process instruction signals (mistaking
them for data) and try to use data signals (mistaking them for instructions)? Yes!
This confusion is very possible, but it does not occur. How is it controlled? The next
section explains this. So read on.

4.5 Processor buses

• What are buses in the computer?


• What role do they play?
• What are the names of the buses?

A bus is a route through which signals travel within the processing unit. Buses are
important because they convey signals from one point to another. They are like
traffic highways connecting towns. Just like on a highway, the size matters.
Therefore, the bus size is an important factor when determining the capability or
processing power of the computer. The wider the bus size, the faster the signals
travel from one point to another in the computer, and, therefore the faster the
computer processes.

The processor has three types of bus. These are data bus, address bus and
control bus. The computer does not confuse the different types of signals which it
handles simply because each type of signal travels through its own bus.

The data bus carries data signals between RAM and the CPU. This bus is bi-
directional. The address bus carries address signals of the data to be read or
written in RAM by the CPU, and the control bus carries control signals from the CPU
to the RAM.

Control Bus

RAM

CPU

Data Bus

Address bus

81
ICT INTRODUCTION TO ICT Further Reading

Most of the buses in the computer carry signals in parallel. For example, the data
bus between RAM and CPU is a multi-lane bus as illustrated below.

CPU

RAM

RAM and CPU linked by multilane data bus.

Each bit in a byte, e.g. 11110001, passes through its own line. This arrangement
ensures that digits that represent a particular character of data or an instruction
leave and arrive at points at the same time. A wider bus can therefore carry more
data signals than a narrower bus. The size of the bus is quoted in bits. For example
we can have a 32-bit bus or a 64-bit bus. A 32-bit bus carries four characters, and
a 64-bit bus carries eight characters of data at the same time. Obviously, a 64-bit
bus computer must be faster than a 32-bit bus computer, just as a four-lane road is
faster than a two-lane road.

82
ICT INTRODUCTION TO ICT Further Reading

4.6 EXERCISE
• What is the similarity and the difference between RAM and ROM?
• What is the relationship between the ROM and the BIOS?
• What is the importance of ROM in a computer?
• What is the importance of secondary storage in a computer?
• What events take place during the booting process of a computer?
• The CU controls everything that takes place in a computer. Do you agree?
• Give reasons why you would prefer an impact dot matrix printer to a deskjet or
laserjet printer.

83
ICT INTRODUCTION TO ICT Further Reading

• Give reasons why you would prefer a deskjet printer to an impact dot matrix or
laserjet printer.
• Give reasons why you would prefer a laserjet printer to an impact dot matrix or
deskjet printer.
• Why is the sequence of program execution often called the Fetch-Execute?
• Why would you prefer a flash disk to a CD-ROM for storage of your data? Give at
least three reasons.
• What do you understand by ‘a computer with voice input/output capability’?
• What are the advantages of LCD monitors over CRT monitors?
• RAM has a pigeon-hole structure as shown below. Explain why it is so.

5.0 Summary

In this module you have learnt about the computer’s hardware system. You
have learnt that a computer consists of several hardware units which are all
meant to make the computer more productive. The computer consists of
input (for entering data or commands or both), processor (for processing the
data), output (for giving feedback or results), and storage (for storing data
and computer programs).

There are many types of input devices, e.g. keyboard devices, pointing
devices, scanning or mark reading devices, and touch devices.

Similarly, there are many types of output devices, e.g. display devices,
printing devices and audio output devices. Display and audio output devices
are called softcopy output devices, and printing devices are hardcopy output
devices. Examples of printers are impact dot matrix printer, desk jet printer,

84
ICT INTRODUCTION TO ICT Further Reading

and laser jet printer. Each type of printer has its own advantages and
disadvantages.

Due to the need to have data stored electronically, a computer also has
storage. Various storage systems include magnetic storage, optical storage
and semiconductor storage. Examples of storage devices are magnetic
tapes, floppy disks, hard disks, CD-ROMs, flash disks, and memory cards.

You have learnt that the brain of the computer is the central processing unit
(CPU) which is also known as the microprocessor. The CPU is located in the
system unit on the computer’s main circuit called the motherboard. The
main roles of the CPU are to control all the activities that take place in the
computer and to process data. The CPU is assisted by other units such as
the random access memory (RAM), the read only memory (ROM), and the
registers. The CPU consists of control unit (CU), arithmetic and logic unit
(ALU), and registers. The ALU does the actual processing of data by
performing arithmetic and logic operations on binary data. RAM is the
working memory of the computer and is volatile. Registers are like RAM but
they work faster than RAM. ROM is used to store a special program which is
used to startup the computer. The startup program is kept on the basic
input/output system (BIOS) within the ROM.

You have also learnt that the computer’s specifications, or characteristics,


are kept on another unit called the complementary metal oxide
semiconductor (CMOS)

6.0 Self-Assessment Questions

Answer questions 1 to 45 by selecting the letter for the best alternative, and answer questions 46 to 52
by writing your answer. Solutions to questions are provided after the self-assessment questions. You
should avoid the temptation of looking at the answers before attempting the questions first.

85
ICT INTRODUCTION TO ICT Further Reading

1. Speakers are an example of


A An input device
B An output device
C A processor
D A storage device
2. Which of the following devices converts computer output into displayed images?
A Printer
B Processor
C Monitor
D Hard disk
3. Which of the following is not a pointing device?
A Mouse
B Trackball
C Keyboard
D Joystick
4. Which of the following is not a data-entry device?
A Bar-code reader
B Digital camera
C Scanner
D Mouse
5. Which of the following devices is the primary storage in a computer?
A Flash disk
B Floppy disk
C RAM
D Hard disk
6. You would recommend an impact dot matrix printer for your school because
A It is less costly
B It uses less power
C It can use carbon paper
D It takes less space on the desk
7. The quality of a printer can be stated in terms of its resolution. What is resolution?
A The size of characters from the printer
B The quality of toner used by the printer
C The clarity and sharpness of the output
D The shape, size and colour of the printer
8. Which of the following units holds an instruction being used to process data?
A The ALU
B The CIR
C The RAM
D The ROM
9. Which of the following devices holds instructions currently being used to process data?
A The hard disk

86
ICT INTRODUCTION TO ICT Further Reading

B The CIR
C The RAM
D The ROM
10. Which of the following devices holds instructions to be used to start a computer?
A The CMOS
B The Hard disk
C The RAM
D The BIOS
11. Bits of data being processed in the ALU are kept in the
A MAR
B MDR
C Accumulator
D CIR
12. Which of the following is correct about an inkjet printer?
A It is cheaper to buy
B It is cheaper to operate
C It is noiseless when printing
D It is the fastest among all the printers
13. The hard disk is important because
A It stores data for the user
B It stores operating system
C It stores computer software
D It stores data and programs
14. A scanner is an example of…
A OMR
B OCR
C MICR
D LCD
15. “From input, work goes to RAM, then to ALU and to ………. before being sent to output or
storage”. Which word should be used to fill the blank space?
A RAM
B ROM
C CU
D CPU

16. The capacity of a hard disk is quoted as 80GB. What does this mean?
A The hard disk can store 80 characters only
B The hard disk can store 80 billion bits
C The hard disk can store 80 billion characters
D The hard disk can store 80 billion words

87
ICT INTRODUCTION TO ICT Further Reading

17. Suppose that the head of your school has requested you to give advice on the most appropriate
printer for the school to buy. Due to limited financial resources, the school wants a printer
which is fast but has low running costs. Which of the following printers would you recommend?
A Inkjet printer
B Dot matrix printer
C Bubble jet printer
D Laser jet printer
18. An example of an optical input device is…
A Keyboard
B Mouse
C Scanner
D Microphone
19. A computer’s memory has a capacity of 2.0GB. This means that…
A The ROM can store 2.0 billion characters
B The RAM can store 2.0 bytes of data
C The BIOS can store 2.0 billion characters
D The RAM can store 2.0 billion characters
20. During the start-up process, the computer…
A Checks itself for the presence of viruses
B Immediately loads the operating system software
C Checks if the installed memory is correct
D Checks if all its programs are ready to work
21. In the computer’s system unit, the part considered as the brain of the computer is the…
A Control Unit
B Random Access Memory
C Arithmetic and logic Unit
D Central Processing Unit
22. In order to quickly transfer data within the CPU…
A The computer has main memory
B The computer has many buses
C The computer has disk drives
D The computers has registers
23. The_____________ stores the bits of data currently being processed
A MDR
B MAR
C CIR
D RAM
24. Which of the following statements in incorrect?
A The data bus and the address bus are bidirectional buses
B RAM and ROM are constructed on the same silicon chip
C Processed data passes through RAM to reach the output
D Data is processed in a three step process by the CPU

88
ICT INTRODUCTION TO ICT Further Reading

25. The unit in the computer which does the mathematical operations on binary data is the…
A Read only memory
B Random access memory
C Arithmetic/logic unit
D Basic input/output system
26. A teacher gives Jane a coin and requests her to roll it ten times. “If the coin falls with heads up,
count up to 5, and if it falls with tails up count up to 10”. If Jane was a type of computer
hardware, she probably would be the
A RAM
B ROM
C ALU
D CU
27. A teacher buys a certain input and discovers that the device can only be used for giving
instructions to the computer. This device must be
A a mouse
B a keyboard
C a scanner
D a camera
28. Which of the following output devices produce soft copies?
A Monitors only
B Printers and speakers
C Monitors and speakers
D Plotters and monitors
29. Which of the following devices keeps programs which a computer requires for processing data?
A RAM
B Hard disk
C ROM
D CPU
30. Which of the following devices keeps instructions which initiate the computer at startup?
A RAM
B Hard disk
C ROM
D CPU

31. Temporary storage locations of the CPU are called


A RAM
B ROM
C Registers
D BIOS

89
ICT INTRODUCTION TO ICT Further Reading

32. A printer has the following characteristics:


• It costs less money to buy from shops
• It has very high printing costs
• It is suitable for use by individuals
• It does not require any heating to print
• It can print relatively fast
• It produces good quality printouts
Which printer is this?
A Laser jet printer
B Impact dot matrix printer
C Bubble jet printer
D Inkjet printer
33. Computers can be classified on the basis of all of these factors except
A Size of speakers
B Speed of processing
C Amount of storage
D Operating environment
34. It is more accurate to refer to a computer as a system because
A A computer consists of hardware and software
B A computer consists of a number of resources
C A computer consists of CU, ALU and RAM
D A computer consists of input, output and storage
35.

The device shown above is more likely to be


A Hard disk
B Printer
A Drawing tablet
D Scanner
36. CRT monitors have been replaced by LCD monitors mainly because
A Their output is of very poor quality
B They consume more electric energy
C They are generally very expensive
D They are very difficult to repair

37. Which of the following statements is correct about computer magnetic storage devices?
A They are no longer in use nowadays in computers
B They currently store more data than other devices
C They are the most commonly used storage devices
D They are all non-removable storage media

90
ICT INTRODUCTION TO ICT Further Reading

38. Lucy buys a computer which has the following specifications:


• CPU - 3.5GHz
• Storage - 320GB
• Memory - 512MB
• Bus size - 64bits
Which part should Lucy upgrade, i.e. increase in value, in order to improve her computer’s processing
power?
A The CPU
B Storage
C Memory
D Bus size
39. My Computer (or Computer) folder shows the various disk drives available in a computer. When
Mary opens My Computer, she finds the following disk drives listed: C, D, E, and F.
Which of the disk drives would definitely not accommodate a flash disk?
A C
B D
C E
D F
40. The part of the processor which inspects all the components of the motherboard during booting
is the
A CU
B ROM
C RAM
D ALU
41. The reason why the CPU has registers is that
A Registers store more data than RAM
B Registers store data permanently
C Registers are not easily damaged
D Registers work faster than RAM
42. Which of the following statements is correct?
A At start up, the control unit checks the amount of RAM of a computer
B The basic input/output system keeps specifications of the computer
C Comparing data signals is done by the read only memory unit
D Random access memory stores data awaiting output or storage

43. During program execution,


A data is fetched first
B instruction is fetched first
C fetch is done before decode
D program counter is idle

91
ICT INTRODUCTION TO ICT Further Reading

44. Which of the following buses would instructions from the CU use in the computer?
A Data bus
B Address bus
C Control bus
D I/O bus
45. Which of the following registers handles information about the location of data?
A MDR
B MAR
C CIR
D Accumulator
46. What does each of the following abbreviations stand for?
(i) ROM
(ii) ALU
(iii) MDR
(iv) BIOS
(v) CMOS
(vi) PC (within the CPU)
(vii) I/O
47. The figure below shows a model of computer hardware. The arrows show the
movement of data signals.

C
B
A

D
G
F

J
I
H

92
ICT INTRODUCTION TO ICT Further Reading

Study the diagram given above very carefully and then answer the following questions:
(i) Identify the units labelled A to J.
(ii) Give two examples of devices which can be used as Unit A.
(iii) State the main function of Unit F.
(iv) State two important functions of Unit B.
(v) State one important reason why a computer requires Unit A.
48. The processing power of a computer is determined by a combination of three units found in the
system unit. Name the three units.
49. In a computer data is represented in binary. Each character is given a special code so that it is
distinguished from every other character.
(i) What do you understand by binary?
(ii) What is the difference between 50kb and 50kB?
(iii) If you enter tvtc.edu in a computer, how much memory space does it occupy?
(iv) Suppose that A is represented by 11000001. What is the representation of H? How
would h be represented? Explain.
50. Someone claims that the most important storage device in a computer is the hard disk.
(i) Do you agree?
(ii) State your most important reason for agreeing or disagreeing.
(iii) Why is the hard disk referred to as a fixed drive?
51. Identify the following devices

Device A Device B

93
ICT INTRODUCTION TO ICT Further Reading

Device C Device D

(i) In which Hardware category do devices B andC belong?

(ii) State a use for each of the above devices

52. Examine carefully the diagram given below which represents the processing unit of a computer.

94
ICT INTRODUCTION TO ICT Further Reading

If the solid arrow and the dashed arrow represent the flow of raw data and processed data, respectively,
identify the components of the processing unit labeled A, B, C, D, X, Y.

State three functions of the part labeled D.

Examine the picture given below of some computer device.

Identify the device and then state two functions which it performs in the computer.

References

95
ICT INTRODUCTION TO ICT Further Reading

• French, C. S (2002) COMPUTER SCIENCE, 5th Edition, Book Power,


London

• Williams, B. K. , Sawyer, S. (2007) USING INFORMATION


TECHNOLOGY, 11th Edition, McGraw- Hill,
Boston

• Lauden, T., INFORMATION TECHNOLOGY, Concepts and Issues


Beekman

• Bradley, R. (1999) UNDERSTANDING COMPUTER SCIENCE for


Advanced Level, 4th Edition, Nelson Thornes, UK, ISBN-10:
0748740465

ANSWERS TO SELF-ASSESSMENT QUESTIONS

• B

• C

• B

96
ICT INTRODUCTION TO ICT Further Reading

• D

• D

• C

• C

• B

• A

• D

• B

• A

• D

• B

• A

• C

• D

• C

• D

• C

• A

• D

• A

• A

• C

97
ICT INTRODUCTION TO ICT Further Reading

• C

• A

• C

• B

• C

• C

• D

• A

• B

• D

• B

• B

• C

• A

• B

• D

• D

• B

• C

• B

98
ICT INTRODUCTION TO ICT Further Reading

46. ROM – read only memory

ALU – arithmetic and logic unit

MDR – memory data register

BIOS – basic input/output system

CMOS – complementary metal oxide semiconductor

PC – program counter

I/O – input/output

47.

(i) To identify the units correctly, note that the unit to which all arrows connect is the random
access memory (RAM), and the unit with two arrows in opposite directions is the storage.
Therefore,

A is output

B is input

C is storage

D is system unit or processor

E is main memory

F is read only memory

G is random access memory

H is central processing unit or microprocessor

I is control unit

J is arithmetic and logic unit

(ii) Examples of devices for unit are monitor, printer, plotter, or speakers. (Any two of these)

99
ICT INTRODUCTION TO ICT Further Reading

(iii) Main function of unit F is to store instructions used to boot the computer.

(iv) Two important functions of unit B are (a) to enter data, and (b) to enter commands.

(v) Unit A is used to store computer programs and to store user data. (One of these.)

48. The three units which determine the computer’s processing power are: CPU, RAM and Hard
disk. (The bigger their values the better the processing power.)

49. (i) Binary is base 2.

(ii) 50kb means 50 thousand bits, and 50kB means 50 thousand bytes.

(iii) tvtc.edu has eight characters. Therefore it would occupy 8 bytes of memory space.

(iv) H is letter number eight. Therefore its code would be 11001000.

50. (i) Yes

(ii) This is where the operating system is installed.

(iii) The hard disk is not removed as you shut down the computer.

51. Device A is keyboard.

Device B is random access memory

Device C is drawing tablet

Device D is scanner

Device B belongs to the processor and Device C to the input.

Device A is used to enter data and commands.

Device B is used to store data and instructions currently being used in the CPU.

Device C is used to draw figures and write text.

Device D is used to scan pictures or text into the computer

52. A is RAM, B is ROM, C is ALU, D is CU, X is main memory, and Y is CPU.

100
ICT INTRODUCTION TO ICT Further Reading

Three functions of Part D are: (a) to coordinate hardware devices, (b) to control the flow of data
signals, and (c) to optimize the performance of RAM.

This is a picture of a hard disk. Hard disk is used to store data and computer programs.

Foreword to module 3

Dear Student,

Welcome to ICT Module 3. In Module 2 you learnt about computer hardware


which is the physical part of the computer. In this module you will learn
about what makes the hardware work. In writing this module we have paid
particular attention to the fact that there is some kind of myth among
beginners surrounding what software really is. Since software is intangible,
some people create conflicts within their minds questioning how something
intangible can do great things the way the computer works. These ideas
have been explained in a simplified way to make it easier for you to
understand. As you study the module, also pay attention to the different
kinds of software. You should convince yourself that a computer really
requires different types of software. Try to understand clearly the role which
a particular type of software plays in the computer. This knowledge is very
important because it will lead to your development of computer skills; to be
able to use a computer more competently and productively.

101
ICT INTRODUCTION TO ICT Further Reading

TVTC

102
ICT INTRODUCTION TO ICT Further Reading

Table of Contents

Foreword ...............................................................................................................................................101
Introduction .........................................................................................................................................105
Objectives .............................................................................................................................................106
Chapter 1 ROLE OF SOFTWARE IN A COMPUTER..............................................................107
Exercise 1.0......................................................................................................................................109
Chapter 2 TYPES OF SOFTWARE..............................................................................................110
2.1 Introduction..........................................................................................................................110
2.2 Categories of Software.....................................................................................................111
2.2.1 Systems Software ......................................................................................................111
2.2.2 Applications Software ...............................................................................................112
Exercise 2.0...........................................................................................................................................113
Chapter 3 OPERATING SYSTEM .................................................................................................114
3.1 Examples of operating system software .......................................................................115
3.2 User-interface..................................................................................................................117
Exercise 3.0......................................................................................................................................121
Chapter 4: UTILITIES..................................................................................................................122
4.1 Anti-virus utilities...............................................................................................................123
4.2 Disk defragmenter utilities .............................................................................................124
4.3 Disk cleaning utilities........................................................................................................125
4.4 Backup....................................................................................................................................127
Exercise 4.0......................................................................................................................................128
Chapter 5 APPLICATIONS ............................................................................................................129
5.1 Introduction..........................................................................................................................129
5.2 Categories of applications...............................................................................................129
5.3 Word processors.................................................................................................................130
5.3.1 Examples of Word Processors ..............................................................................131
5.3.2 Common features or tools of Word Processors .............................................131
5.3.3 Formatting a document ..........................................................................................137
Exercise 5.0......................................................................................................................................139

103
ICT INTRODUCTION TO ICT Further Reading

5.4 Spreadsheets .......................................................................................................................140


5.4.1 Examples of Spreadsheet Programs..................................................................141
5.4.2 Cell References ..........................................................................................................143
Exercise 5.1..................................................................................................................................143
5.4.3 Types of worksheet data........................................................................................144
5.4.4 Using formulas to calculate data in a spreadsheet ......................................145
Exercise 5.2..................................................................................................................................149
5.5 Database ...............................................................................................................................149
5.5.1 Role of database software ......................................................................................149
5.5.2 Examples of database programs ..........................................................................150
5.5.3 Types of database software ...................................................................................151
5.5.4 Fundamental concepts of database software.................................................152
5.5.5 How database software works .............................................................................154
5.5.6 Database objects ......................................................................................................155
Exercise 5.3..................................................................................................................................157
Chapter 6 ACQUISITION OF SOFTWARE AND HARDWARE ....................................158
6.1 General consideration for acquisition of software and hardware.....................158
6.2 Identification of appropriate software........................................................................158
Exercise 6.0......................................................................................................................................160
Summary ..............................................................................................................................................161
Self-assessment Questions ............................................................................................................162
References ............................................................................................................................................164
Further reading...................................................................................................................................165
Answers to self-assessment questions ......................................................................................166

104
ICT INTRODUCTION TO ICT Further Reading

Introduction

In this module you will learn details about software. You will learn that
basically software is the engine that drives the computer. You will appreciate
that without software a computer is just a ‘heap’ of metals with no purpose
at all. The module therefore explains what software really is, its various
categories and the specific roles which each type performs in the computer.
To try to make you understand these important ideas easily, some useful
examples and illustrations have been used.

As you read about the various categories of software, you should try to
appreciate the examples of the programs mentioned. For example, you will
learn that software is in categories. Be able to state these categories, and to
name the actual programs that are found in the categories.

One problem with understanding what software is and what role it plays is
that since you are talking about something intangible, your imagination can
easily be defeated, especially when you just read about it. For this reason,
we recommend that you must have a computer which you should be able to
use to try out some of the things mentioned in this module. Although you
will be exposed to many of these programs at the college, you will be in a
better position if you can ensure that you have access to a computer at least
twice or three times in a week.

105
ICT INTRODUCTION TO ICT Further Reading

Objectives

After studying this module, you should be able to:

1. State the role of software in a computer.


2. Name the two major types of computer software, and state their
functions.
3. State what is meant by operating system software and state its role
in a computer.
4. Give names of at least three operating systems software other than
Windows.
5. State what is meant by utility software and give examples.
6. Give examples of Word processor, Spreadsheet and Database
software, and what they are used for.
7. Suggest computer operations that may require software other than
word processors, spreadsheets and databases.
8. Explain the meaning and importance of hardware and software
selection and acquisition.
9. Identify factors to be considered in the selection and acquisition
hardware and software.

106
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER

Chapter 1 ROLE OF SOFTWARE IN A COMPUTER

In Module 1 you learnt about some of the characteristics of computers. For


example, you learnt that a computer is very accurate, very fast, and that
it is good for reducing human effort in repetitive tasks. In Module 1,
you also learnt that the hardware is the physical part of the computer. By
now you must be wondering how the hardware manages to work with less
human involvement. You sure must be wondering what makes a computer to
be able to do things more automatically. The explanation lies in the
software. It is the software which controls the hardware.

How does software control the hardware?

This is an interesting question, but it is not difficult to understand. To


motivate your understanding, let us suppose that you own a large business,
such as a commercial farm. Imagine that you keep several types of livestock
and grow different types of crops for both the domestic and foreign markets.
Surely you cannot manage all the activities involved by yourself. Then you
must definitely have employees. The employees are the ones that do all the
work for you. Is that right? Well, most people with such kind of businesses
also employ supervisors or managers who assign duties to employees and
control their performance. If you have a manager, he/she will perform the
supervisory functions on your behalf. (Can you suggest some of these
supervisory functions your farm manager might perform on your behalf at
your farm?) As you can see, your farm has got You (the owner), has got the
Farm Manager and the Workers.

If you have followed the scenario depicted above, you should not have
problems understanding the role of software in the computer. When the
computer is in use, there is You (the user; you are like the owner of a farm

107
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER

who does not want to do everything by himself/herself). There is the


hardware which must do the actual work. The hardware is like the workers
at your farm. Then there is the software to supervise and control the
operation of the hardware on behalf of the user. Software in a computer is
like the manager at your farm. (See illustration below.)

Owner Manager Workers


FARM

COMPUTER User Software Hardware

Without software, you should be operating the computer manually, the way
a typewriter is used. Then your computer would not be called an automatic
machine. The diagram below compares

Why does a computer require different types of software?

Just as organizations employ managers with vast knowledge in specific


areas, a computer is also given software that is specialized in various ways
about the operations of the computer.

Since all computer hardware is software-controlled, the computer must


therefore have different types of software.

Chapter Summary

Computer software provides instructions that tell the computer how to


operate.

1. Software is also called computer program. However, ‘software’ is a


general term for all computer programs. The word ‘program’ refers to
software that is restricted to a particular function in the computer.
Using the analogue of a farm, ‘software’ is equivalent to worker and
‘program’ is equivalent to a particular worker, e.g. accountant, or
plumber who performs a particular function at the farm.
2. Programs are usually created using other software called programming
languages.

108
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER

Exercise 1.0

1. What is software?
2. Why does a computer require software?
3. Why does a computer require different types of software?
4. What is meant by saying that a computer is an automatic machine?
5. What does a computer have which makes it to be an automatic machine?
6. In what way is software like a manager in the computer?

109
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE

Chapter 2 TYPES OF SOFTWARE

2.1 Introduction
If a computer is like your big farm, then many activities must be taking
place in it. Yes, that’s right. Because at a farm you need many workers to
perform different activities, even in a computer there must be different types
of software to perform different activities. ‘What are these different activities
to be performed in a computer?’ you may be asking yourself. Well, think
about it. In Module 1 you learnt that a computer consists of different types
of hardware. (Refresh your memory: What are the categories of computer
hardware, and what are the examples of devices in each of the categories?
See picture insert of a computer system shown below.)

As you can see, since each type of hardware does a unique function in a
computer, and since we have said that each hardware unit is controlled by
software, then there must be different types of software in a computer in
order to manage the different types of hardware. Therefore, one function of
software in a computer is to manage or to control hardware.

Is managing hardware the only function of software in a computer? No!


Software has other functions. One of them is to direct the movement of data
or signals from one point to another point in the computer. There are other
functions such as receiving work from the user and allowing the user to
present the work the way he/she wants it and detecting and solving
hardware and software problems during the operation of the computer.
Therefore, in this module you should pay attention to these ideas to learn
how software manages the computer on your behalf. You should be able to
do the following:

110
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE

a) Understand the different categories of software.


b) Give examples of the different categories of software.
c) State/explain the role of each category of software.

2.2 Categories of Software

How many categories of software are there, and what are they?

There are two (2) main types of software in a computer and these are
Systems Software and Applications Software. We will now learn about
the general details of these two categories starting with systems software.

2.2.1 Systems Software

What is systems software?

This is the type of software used by the computer to accomplish tasks of


general nature. Note the words in bold in the previous sentence. When a
computer is in use, computer hardware makes use of software to enable it
perform different tasks. These tasks are often contrasted from those
performed by the person using the computer. Therefore, systems software is
the software which operates the hardware system of the computer. It is the
one which really makes a computer to be an automatic machine. Given
below are some of the tasks performed by systems software in the
computer.

Examples of functions of system software are:

a) controlling the internal function of the computer


b) controlling devices connected to the CPU
c) acting as a platform for applications software

Note that these functions are quite demanding and cannot be easily
performed by a computer user. By using systems software to perform these
tasks, the computer is made to be very automatic, efficient and effective.

What makes up systems software?

111
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE

Systems software consists of two sub categories of software called


Operating System and Utilities. These two sub categories will be
discussed in detail in the subsequent sections of this module.

Next let’s turn to applications software. What is it, and how is it different
from systems software?

2.2.2 Applications Software

This is software in a computer used by people to accomplish specific tasks.


Whereas systems software is directed towards the computer hardware in
general, applications software is directed towards the user. See arrows on
diagram below.

User Applications software Systems software Hardware

Interaction between user Interaction between Interaction between


and applications software applications software systems software
and systems software and computer
hardware

It is applications software which makes the computer to be a productivity


machine. Without applications software, computers would be of very little
benefit to us. We use applications software to accomplish different tasks for
ourselves. When in use, applications software receives work from us and
allows us to present it the way we want. While we do our work using the
applications software, the systems software is busy in the background to
monitor and control the hardware.

To appreciate the relationship which exists between applications software


and systems software, think of the roles performed by teachers and the
school managers. Teachers attend to the academic needs of students, and
are like applications software. On the other hand, school managers monitor
and control school resources and are therefore like systems software. Just
like a school has more teachers that are specialised in various ways, a
computer has various applications software for performing different tasks so
that various user needs can be met. Given below are examples of
applications software.

Some common kinds of application software are:

112
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE

a) Word Processor software


b) Database software
c) Spreadsheet software
d) Games
e) Web Page Browsers

Details of some of these applications software will be discussed in


subsequent sections of this module.

Exercise 2.0

1. What are the two main categories of software?


2. Which category of software is used by people to perform their specific tasks?
3. Which category of software is used by the computer to accomplish a task?
4. Which software makes a computer to be an automatic machine?
5. Which software makes a computer to be a productivity machine?

113
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Chapter 3 OPERATING SYSTEM

Having learnt about the categories of software, we will now learn some
details about the operating system software by focusing on these questions:

• What role does it play in the computer?


• Why was it given this name?
• What are the examples?

The operating system (or OS in short) is part of the systems software. This
is the major software in a computer because it performs many very
important functions. Without it the computer cannot do anything. It is like
the brain in your body. Like the brain in your head, the OS coordinates all
activities in the computer and sets all the rules regarding the performance of
the computer. If you should have some good knowledge of how the
computer works at its basic level, you should develop some understanding of
the work of the operating system.

You can guess that the OS must be very complex software. Yes indeed it is.
It consists of a large number of files or smaller programs that perform
critical roles in the computer.

What are some of the specific functions performed by the OS in the


computer?

Some functions of the OS are as follows:

a) Coordinating and controlling the work of the hardware, e.g. mouse,


keyboard, monitor, printer and hard disk.
b) Configuring and controlling the random access memory, e.g. which
memory addresses should be used by what, when and how.
c) Directing the flow of data between input and output systems, e.g. which
buses should be used and by what signals.
d) Loading applications software into memory and attending to its requests
such as displaying data on the screen and printing.

Why was the OS given this name?

The earliest computers were very inefficient because they were operated
almost manually. Computer operators used to setup the machine and
114
ICT COMPUTER SOFTWARE OPERATING SYSTEM

change programs manually. All errors had to be identified by a person in


attendance. For this reason, they were very slow. Therefore, something had
to be done to make the computer more efficient. Later an idea was hatched
which involved designing a program to be placed in the computer with all the
necessary routines. Instead of the person to manually operate the computer
to perform tasks, such as identifying hardware errors, changing programs
and assigning jobs to hardware, the stored program could do all these tasks.
This program was now the one operating the computer, hence the name
Operating System. Since the introduction of operating systems, computers
have become more efficient and easier to use. Computer users no longer
concentrate on understanding the machine and identifying and sorting out
errors. Instead they concentrate on the actual tasks to be performed on the
computer, e.g. typing documents, analysing data, and so on.

If all this sounds interesting, what are the examples of programs that
called operating system?

3.1 Examples of operating system software

Examples of operating system software are:

a) MS-DOS (i.e. Microsoft Disk-Operating System)


b) PC-DOS (i.e. Personal Computer-Disk Operating system)
c) OS/2 (i.e. Operating System 2)
d) Microsoft Windows (95, 98, Me, 2000, XP, Vista, 7)
e) Unix
f) Linux
g) MacOS

Given below are screenshots of some of these operating system programs.

115
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Mac OS Screen Unix Screen

Linux screen Windows screen

Solaris (Unix) screen PC-DOS screen


What is a memory resident program, and what does this mean?

116
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Every operating system is a memory resident program. This means that


when the computer is started (or booted), the OS is copied or transferred to
memory (i.e. RAM) from which it performs its functions. It stays in RAM
throughout the session. It’s arranged like this so that it can quickly be used
by the computer. To understand this, think of some schools or firms. Are
there some employees or members of staff that have to reside within or
closer to the school because of the nature of their work? Surely you must
have seen that some employees are accommodated on campus whereas
others are left to find their own accommodation in the townships. Such very
essential workers who must always be around are like the operating system
which must always be available when the computer is on.

Have you come across the term user-interface? What does it mean, and
what are the options?

3.2 User-interface

Every operating system has what is known as the user-interface. The user-
interface is the part of the OS with which we interact, or the part the OS
presents itself to the computer user. You can compare it to the front desk in
a firm. It allows the user to make his/her requests to the rest of the OS
which works in the background.

Do you watch TV? Are you aware that in TV transmission there are many
people involved just to get the signals to your set? You can mention a few
such as the Transmission Controller, the Sound Engineer, the Graphics
Engineer, the Lighting Technicians, the Announcers, and the Cameramen
and women. Which of these people do you see or interact with as you watch
your favourite programs? Surely you must be quite familiar with the TV
Announcers. Why? Because you see the announcers, you hear their voices,
and sometimes you interact with them during the phone-in programs. You
may not know the other personnel even if they might be more important or
critical during the TV show because you do not see them or interact with
them directly.

The work of operating system resembles TV transmission. The operating


system consists of several parts many of which do not interact with us
directly. Like the other people in TV transmission, the many parts of the

117
ICT COMPUTER SOFTWARE OPERATING SYSTEM

operating system do their work behind the scenes. The only part of the
operating system which manifests itself to us, the part which resembles the
TV Announcer, is the part called the user-interface.

The following are some of the details about the user interface:

1. The user interface is how the computer's operating system presents


information to the user, and how the user gives instructions
(commands) to the computer.
2. There are two kinds of User Interface: text user-Interface and
graphical user-interface (GUI).
3. The text user-interface presents information to the user in the form of
text. Because the user has to type in commands, it is hard to use since
he/she has to master the commands. Look at the picture insert of a
text user-interface given below. The user has to type and enter
commands at an insertion point called the Command Prompt.

118
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Text User-Interface

4. Examples of operating systems with text user-interface are MS-DOS


and PC-DOS.
5. Unlike the text user-Interface, the GUI presents information to the
user in the form of pull-down menus and icons. (See a screenshot
of a window below.)

119
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Menus Icons

Graphical User-Interface
6. The user clicks on pull-down menus to display the menu commands.
Icons are small pictures that represent something such as a file, a
folder or a computer program.
7. With a GUI, the user gives commands to the computer by selecting
items from a menu or by clicking on an icon when using a pointing
device such as a mouse.
8. GUIs are easier to use.

120
ICT COMPUTER SOFTWARE OPERATING SYSTEM

Exercise 3.0
1. Why does a computer require operating system?
2. Mention at least two functions of operating system. (see page )
3. Name four operating system programs.
4. An operating system is associated with a user-interface. What is a user-
interface?
5. Mention the two types of user-interface.
6. What do the letters WIMP stand for?
7. Which user-interface is associated with the command prompt?

121
ICT COMPUTER SOFTWARE UTILITIES

Chapter 4: UTILITIES

1. What are utilities?


2. What role do they play in the computer?
3. What are the common examples of utilities?

In Chapter 4 you learnt about the operating system software. You learnt that the
OS is a suite of programs that drives the computer. In this chapter you will learn
that the OS does not really operate the whole computer system by itself. There are
other types of much specialised software programs that complement the work of
the OS in the computer. These are the utilities. Wikipedia,
(http://en.wikipedia.org/wiki/Utility_software) explains this as follows:
“Utility software is system software designed to help analyze, configure,
optimize or maintain a computer.” Notice the words in bold. Utilities are
meant to enhance or to increase the functionality of the OS in the computer.
If the OS is like the top management of a company, the utilities are like the
specialised employees such as the electricians, plumbers, carpenters,
bricklayers, who facilitate the effective and efficient operation of the
company. Just as a company requires the services of these specialised
employees, a computer also requires the services of the utilities. Wikipedia
gives a large list of utilities as follows:

• Anti-virus utilities scan for computer viruses.


• Backup utilities can make a copy of all information stored on a disk,
and restore either the entire disk (e.g. in an event of disk failure) or
selected files (e.g. in an event of accidental deletion).
• Data compression utilities output a shorter stream or a smaller file
when provided with a stream or file.
• Disk checkers can scan operating hard drive.
• Disk cleaners can find files that are unnecessary to computer
operation, or take up considerable amounts of space. Disk cleaner
helps the user to decide what to delete when their hard disk is full.
• Disk compression utilities can transparently compress/uncompress
the contents of a disk, increasing the capacity of the disk.
• Disk defragmenters can detect computer files whose contents are
broken across several locations on the hard disk, and move the
fragments to one location to increase efficiency.
• Disk partitions can divide an individual drive into multiple logical
drives, each with its own file system which can be mounted by the
operating system and treated as an individual drive.

122
ICT COMPUTER SOFTWARE UTILITIES

• Disk space analyzers for the visualization of disk space usage by


getting the size for each folder (including sub folders) & files in folder
or drive, showing the distribution of the used space.
• Disk storage utilities manage the storage and retrieval of files on
disks.
• File managers provide a convenient method of performing routine
data management tasks, such as deleting, renaming, cataloging,
uncataloging, moving, copying, merging, generating and modifying
data sets.
• Memory testers check for memory failures.
• Network utilities analyze the computer's network connectivity,
configure network settings, check data transfer or log events.
• Registry cleaners clean and optimize the Windows registry by
removing old registry keys that are no longer in use.
• Screensavers were desired to prevent phosphor burn-in on CRT and
plasma computer monitors by blanking the screen or filling it with
moving images or patterns when the computer is not in use.
Contemporary screensavers are used primarily for entertainment or
security.
• System monitors for monitoring resources and performance in a
computer system.
• System profilers provide detailed information about the software
installed and hardware attached to the computer.

We will now learn some details about a few of these utilities because they deserve
special mention.

4.1 Anti-virus utilities

One of the things that complicate the use of computers is computer virus. A
computer virus is a computer program designed to provide sort of negative
consequences when it is run on a computer. Some viruses can cause very
serious havoc such as deletion of data, corruption of programs and flooding
of storage or memory. No one likes these experiences. Therefore, a
computer needs some defence against viruses. One form of defence is
through use of antivirus software. Antivirus software is meant to identify and
remove viruses from the infected computer. In modern computer usage, a
computer without antivirus software is like living in a country without
security forces, such as police, immigration or military units. Without
antivirus, a computer is extremely vulnerable to virus attacks and other
security bleaches, more so if the computer is part of an extended network

123
ICT COMPUTER SOFTWARE UTILITIES

such as the Internet. (More details about these issues will be covered in
Module 5.)

What are the examples of antivirus software?

The following are some of the antivirus programs which many computer
users in Zambia employ:
a) Norton
b) Kaspersky
c) AVG
d) McAfee
e) Avast

AVG and Avast are particularly good for people who do not have enough
money to buy commercial versions. These programs have free versions
which can be downloaded from the Internet and installed at no fee at all.
They help to rid and protect a computer against viruses. However, the free
versions do not provide full protection. For example, they may not provide
protection against spam and other internet security bleaches. For more
protection you need those antivirus versions that have Internet Security.

What about disk defragmenters? What role do they play?

Let’s learn about this in the next section.

4.2 Disk defragmenter utilities

Have you come across the saying ‘divided we fall, united we stand’? As you
use your computer, many things happen without you knowing. For example,
as you delete files and create new ones, or as you install new programs and
uninstall unwanted ones, the files on your storage system (e.g. the hard
disk) split up. Technically this is called fragmentation. Note that
fragmentation does not mean that the files are now not usable. It means
that pieces of the file are in many different places within the storage
medium. Now think about this. Suppose that you store your documents in a
file cabinet and some of them have been shredded to pieces. What happens
next time when you want to read one of such documents? You can imagine
the amount of time you would spend looking for the pieces and putting them
back together before the document can be readable. This is what happens

124
ICT COMPUTER SOFTWARE UTILITIES

when fragmentation occurs on the disk. Each time the computer wants to
read documents that have been fragmented, it takes much time to find the
file fragments and assemble them again. This causes the computer to
become slow. Therefore, we need to use a program which can check if the
files on the disk are fragmented. This is the role of the disk defragmenter.
When run, the disk defragmenter checks for disk fragmentation and gives a
report about the degree of fragmentation. The report includes a
recommendation of whether defragmentation is necessary or not. If
defragmentation is necessary, you carry out the process. During disk
defragmentation, the disk defragmenter picks the fragments of every file,
assembles and moves them to new locations on the disk. With this done, the
computer does not have to look for and assemble file fragments every time
the file is to be read. This makes the computer to operate at normal speed.

Using disk defragmenter is one technique the so-called computer experts


always carry out as they fine-tune a computer. Actually, every computer
user must learn or be able to use disk defragmenter.

If you have understood what disk defragmentation is, let us learn about
another technique which ‘computer experts’ use to fine-tube a computer.
This is called disk cleaning.

4.3 Disk cleaning utilities

What is disk cleaning, and how is it done?

If you have lived in your house for some time, you must have accumulated a
lot of stuff some of which is no longer useful. What’s wrong with keeping
such unwanted stuff, and what do you do with it? You must agree that
unwanted stuff merely takes up space in your house which you would use for
keeping more useful items. Then you remove or get rid of all that’s not
wanted. This is what disk cleaning is all about in a computer. As you use
your computer, it accumulates many files. Many of these files become
useless and merely decrease storage space on the disk. Since the
performance of the computer is also determined by how much free disk
space is there, a computer whose storage space has been decreased by
these unwanted files becomes very slow. A disk cleaning utility, such as
Scandisk in Microsoft Windows, checks for the presence of useless files on
the disk. It gives a report which indicates how much storage space each of

125
ICT COMPUTER SOFTWARE UTILITIES

these files is occupying. By examining the report, you decide which of them
you want to remove from your computer. Once you have done the selection,
you instruct Scandisk to delete the unwanted files.

Every computer user is supposed to do the disk cleaning operation every


now and then in order to keep the computer operating at its normal speed.

Shown below is an insert of a window in Windows7 which you can use to


perform the disk cleaning and disk defragmentation processes.

To open this window, you do the following:

i. You click the Start button


ii. Click Computer on the Start menu
iii. You then right-click Local Disk (C:)
iv. You click Properties on the context menu
v. To carry out disk cleaning, you click on the Disk Cleanup button in the
Disk Properties window

126
ICT COMPUTER SOFTWARE UTILITIES

vi. To carry out the defragmentation, you first click on the Tools tab and
then click on Defragment Now button

Another useful operation to be performed on your computer is backup.

What is backup, and how is it carried out?

4.4 Backup
I remember a colleague of mine who once ‘sweated’ when his examination
which he had saved on his flash disk failed to open when it was required for
printing. Actually, the computer reported that the disk was unusable. All
efforts to retrieve data from the storage medium were in vain. As he had
destroyed the draft copies after saving the document, he had to start setting
the paper all over again. This colleague almost swore never to use a
computer again. Such miserable experiences are common if one uses a
computer without putting a disaster recovery plan in place. What this
colleague did not know was that all important data must have been backed
up. The backup utility does just this. It makes a copy of all the data saved
on the disk. When disaster strikes, you can fall back on the backed up data.
Backing up is more effective if you store the copy on a different medium. For
example, you can back up the data which is on your internal hard disk and
save the copy on the external hard disk. Or you can copy all the important
data from one flash disk and put it on another flash disk. (So, if you use a
computer but don’t backup your data, do it today!)

Up to this point you have learnt about systems software, operating system,
and utilities. These programs are mainly directed towards the machine or
the hardware. This means that we do not use these programs to do our
actual work such as typing reports or drawing. To use the computer for such
kind of work we have to use software called applications. This is what the
next chapter, Chapter 5, of this module covers. So study on.

But before that, do the exercise given below.

127
ICT COMPUTER SOFTWARE UTILITIES

Exercise 4.0
1. What is a utility program?
2. Why does a computer require utility software?
3. Name at least three utility programs.
4. What is meant by disk defragmentation, and why is this important?
5. Which utility program would you use to remove files from the Recycle
bin?

128
ICT COMPUTER SOFTWARE Applications

Chapter 5 APPLICATIONS

5.1 Introduction
As was stated in earlier sections, applications are computer programs used
by people to accomplish specific tasks. These are programs which make
computers to be productivity machines. Therefore, how you make good use
of your computer depends on which applications programs you have
installed in it. Having many applications programs in your computer is a
good thing, but knowing how to use each one of them productively is better.
Try to understand this very well. There are many people who will have
(perhaps out of ignorance) many applications programs installed but actually
only make use of one or two of them. The point here is that you must learn
to be able to use a variety of applications for your computer to be really
beneficial.

5.2 Categories of applications


So, which applications should you have in your computer? This really
depends on the nature of your activities that require computer utilisation.
However, there are certain manipulations of data which are sort of common
to most people all over the world. Many people do some typing, (e.g. of
memos, letters, reports) using computers. They also do some calculations
and data analysis (e.g. in accounting, economics, mathematics, science,
engineering, etc), and information management. Software for performing
one function may not be able to perform very efficiently another different
function. By looking at the different functions, the applications are
categorised or classified in many ways, e.g.

• Word processors
• Spreadsheets
• Databases
• Presentation
• Desktop pushing

This chapter will give you a brief (theoretical) introduction to the first three
applications programs, i.e. word processors, spreadsheets and databases.
You will need hands-on experience to develop practical skills. During your
study of ICT, you will be given practical knowledge of some of these

129
ICT COMPUTER SOFTWARE Applications

programs. We will start our understanding of applications with Word


processors.

5.3 Word processors


We will start by asking these questions which should give you direction.

• What are word processors?


• What kind of work or activity would necessitate the use of word
processor?
• What are the examples?
• What are the common features or tools?

What are word processors?

Obviously you understand what is meant by ‘word’ and what is meant by ‘to
process’. In general, therefore, word processors are computer programs for
processing words. For example, this document which you are reading now is
in words, and was word processed. A word processor is a program which you
can use to produce a document such as this one.

What kind of work or activity would necessitate the use of word


processor?

Word processors are the most commonly used applications because every
computer user does some word processing operations at one time or
another. For other people, it is because word processors are very easy to
learn or use. Word processors are used for

• Typing word documents such as this module


• Formatting text in document. (You will understand what is meant by
‘formatting’ later in this module.)
• Editing documents. (You will also learn what this means later.)

130
ICT COMPUTER SOFTWARE Applications

5.3.1 Examples of Word Processors

What are the examples of word processors?

There are many word processors to choose from. (See


http://en.wikipedia.org/wiki/List_of_word_processors)

Examples of word processors are:

(i) Microsoft word


(ii) WordPerfect
(iii) OpenOffice.org Writer
(iv) Lotus Word Pro

Some of them have become very popular; for example, Microsoft Word is
the most popular word processor. OpenOffice.org Writer is an open-source
application. Open-source software is software which you can install and use
freely, whereas the others, which are commercial, have paid for licences.

5.3.2 Common features or tools of Word Processors

What are the common features or tools of word processors?

We will now explore word processors briefly. You will understand these
features very well during your practical lessons. Examine the following
screenshots of the various word processors.

131
ICT COMPUTER SOFTWARE Applications

Screenshot of Microsoft Word 2003

132
ICT COMPUTER SOFTWARE Applications

Screenshot of OpenOffice.org Writer

133
ICT COMPUTER SOFTWARE Applications

Screenshot of WordPerfect Office X5

134
ICT COMPUTER SOFTWARE Applications

Screenshot of Lotus Word Pro

You should notice that all these programs have certain common features or
tools. Most of these tools are found on toolbars. Examine the screenshot of
the top part of a word processor given below.

Some common features in word processors

At the top of the window is the title bar. The title bar shows the name of
the program.

135
ICT COMPUTER SOFTWARE Applications

Title bar

Below the title bar is the menu bar. The menu bar has menus which are
lists of command option. Menus can be activated by clicking with the
computer mouse.

Menu bar

There is the Standard Tool bar below the menu bar. The Standard Toolbar
has a number of small graphics called icons. Icons are short-cuts to
commands.
Standard Toolbar

Below the Standard Toolbar is the Formatting Toolbar.

Formatting Toolbar

136
ICT COMPUTER SOFTWARE Applications

In addition to these features, word processors also have the Drawing


Toolbar. The Drawing Toolbar has tools which you can use to draw or insert
objects in your document. Look at the Drawing Toolbar shown below.

Drawing Toolbar

If you can use the tools on the toolbars well then you have become
proficient in word processing. You should particularly be able to use the tools
on the Formatting Toolbar.

5.3.3 Formatting a document

What is formatting a document?

When you wake up in the morning you do many things to make yourself
ready for the day. What are some of these activities? Do they include
bathing, washing your face, cleaning your teeth, brushing your hair,
selecting the clothes to wear, having breakfast, and so on? You perhaps
perform some of these activities in order to make yourself ‘presentable’. In
data processing language we may call this formatting. When you format a
document you introduce features that improve the quality of your document,
the way you ‘format’ yourself every morning before you appear in public.

So, what are the formatting features that can be applied to a


document?

The Formatting Toolbar (the one given below) has the tools which you can
use to format your document.

For example, you can do the following to your document as a way of


formatting it:

137
ICT COMPUTER SOFTWARE Applications

(a) Change the font, i.e. the shape of characters. This resembles
handwriting.
(b) Change the font size. This indicates how large or small the text or
characters you use are.
(c) Use bold, i.e. emphasise the colour of the text the way the word ‘bold’
was typed.
(d) Use italics, i.e. to make the text slant or lean to the right.
(e) Use underline.
(f) Change text alignment.
(g) Change line spacing.
(h) Use styles which aid in producing tables of content automatically.

Some of the important features of a word processor are spelling and


grammar check, print preview, automatic page numbering, mail merge and
hyperlinks. Spelling and grammar is a particularly important functionality
because where English is a second language, most of the spelling and
grammar errors can be easily controlled to ensure that documents have high
quality. Mail merge is used to automate and personalise the production of
letters to be sent to many people. You will have more hands-on experience
with most of these features of word processors in your practical lessons.
Hyperlinks allow you to jump from one page or place to another page or
place in the same document or in another document. An example of a
hyperlink is ‘What are utilities?’ which takes you to Chapter 4 if you click on
it while holding the Ctrl key down.

138
ICT COMPUTER SOFTWARE Applications

Exercise 5.0
1. What is a word processor?
2. Give at least two examples of word processors.
3. State three operations which you can perform in a word processor.
4. Suppose that you type the following sentence in a word processor: ‘A
computer is an electronic machine’, and you want it to appear like this ‘A
computer is an electronic machine’. Outline what you would do.

139
ICT COMPUTER SOFTWARE Applications

5.4 Spreadsheets

We next turn our attention to spreadsheets.

• What is a spreadsheet, and what is it used for?


• What are the examples of spreadsheet programs?
• What features do spreadsheets have?

What is a spreadsheet?

Does your work involve data, for example numbers which you have to
tabulate in columns and rows in form of a table? For example, if you are a
teacher you may want to records your learners’ results like this:

NAME TEST1 TEST2 TEST3 TEST4 TEST5


Phiri 69 50 62 55 70
Sitali 98 65 70 66 86
Chanda 50 64 80 43 57
Mweemba 65 75 45 89 45

What would you want to do with the results once recorded like this? May be
you may want to calculate and compare the learners’ total or average
scores. Or you may want to find out how many learners scored marks within
a given range. In short, you may want to do some calculations or to do
some data analysis. If you type the data in a Microsoft Word table as given
above, it may not be very easy for you to perform these tasks, i.e.
calculations and analysis of data. A better computer program to use is a
spreadsheet. Thus a spreadsheet is a computer program used for
tabulating data in columns and rows and for performing calculations
and analysis on the data. A spreadsheet can greatly simplify or automate
these data processing operations. Due to their data analysis capabilities,
spreadsheets are very useful programs in many decision making activities.
You can use them to model a situation and then predict or forecast the
outcome. In a business setting, this forecasting ability of a spreadsheet is
invaluable. Coupled with their graphic capabilities which allow you to prepare
charts based on the data, spreadsheets make it possible for you to present
information pictorially so that you are able to visualise trends.

140
ICT COMPUTER SOFTWARE Applications

5.4.1 Examples of Spreadsheet Programs

What are the examples of spreadsheet programs?

Many spreadsheet programs have been developed. Examples are Microsoft


Excel, Openoffice.Org Calc and Lotus-123. Given below are screenshots of
some spreadsheet programs.
Microsoft Excel

OpenOffice.Org Calc

141
ICT COMPUTER SOFTWARE Applications

Lotus-123

What unique features do spreadsheet programs have?

Look at the spreadsheet window again. You can easily recognise the
program by means of its characteristic appearance. It consists of vertical
and horizontal lines which form columns and rows. You should notice that
every column has a letter at the top which identifies the column, and every
row has a number on the left also for identification of the row. Thus we have
columns A, B, C, etc, and rows 1, 2, 3, and so on. Where columns intersect
rows, boxes called cells are formed. In a spreadsheet, data is entered in
cells. Therefore, to enter or type some data you have first to choose the
appropriate cell. Every cell has a unique cell reference or cell address.
Data is always typed in the current cell. The current cell is indicated by a
rectangular box called a cell pointer which can be moved from cell to cell
using the keyboard or the mouse. In Microsoft Excel, data is entered in a
worksheet. A worksheet is like a page in your notebook where you can

142
ICT COMPUTER SOFTWARE Applications

write some data. You can have several worksheets, each with its own data.
A number of worksheets form a workbook. A workbook is like your
notebook with many pages of paper.

Columns
Cell pointer

Cells

Rows

5.4.2 Cell References

Cell references are identifiers for cells. They are like house numbers in a
town so that when we enter data in the cells we must know where the data
is located. A cell reference is formed by combining the letter for the column
and the number for the row which intersect to make up the cell. For
example, where column C and row 5 intersect there is a cell whose cell
reference is C5. Notice that the cell reference starts with the column letter
and ends with the row number. Therefore, 5C is not a correct cell reference.

Exercise 5.1

8. For what kind of work would you use a spreadsheet?


9. What is cell reference?
10. Look at the Microsoft Excel screenshot given below. Write the cell
reference for the current cell.

143
ICT COMPUTER SOFTWARE Applications

5.4.3 Types of worksheet data

What type of data can you enter in a cell in a worksheet?

You can enter three types of data in a cell. These are labels, values and
formulas. Values are numeric data or figures that we enter in cells. For
example, test scores, sales figures, number of hours worked, etc. Labels are
used for the purpose of giving meaning to values. A value without a label is
meaningless. For example, a value 60 entered in a cell has no meaning until
a label has been attached to it. You can appreciate this by referring to the
Microsoft Excel screenshot shown below.

144
ICT COMPUTER SOFTWARE Applications

On the other hand, we know what the value 70 means; it is the average
score. Formulas are used to calculate data. For example, you must agree
that to find the average score you have to use a formula. Labels differ from
values. For example, labels are aligned left in cells and values are
aligned right (see illustration below).

Examine the alignment of the data in column B. The ones aligned left are
labels, and those aligned right are values. What is the difference between
the two entries in cells B6 and B7? The entry in B6 is label. What makes it a
label? It is the inclusion of the two letters ‘Os’. Any data entry with
alphabetical characters is treated as a label in Microsoft Excel. Therefore, be
careful when entering numeric data that includes zeros; ensure that you do
not type O in place of 0. Should you type a number that gets left aligned in a
cell, know that you have included non-numeric characters in the number.

The use of formulas is a very important functionality of a spreadsheet. Every


formula in Microsoft Excel starts with the equals (=) sign. With the use of
formulas, even the most complex and lengthy calculations can be greatly
simplified. For this reason, you must develop practical skills of spreadsheets.
To appreciate this, let us ‘see’ how formulas work in a spreadsheet.

5.4.4 Using formulas to calculate data in a spreadsheet

I must first mention that the best way to really appreciate the material
presented here is by you starting Microsoft Excel. If you can’t, then simply
read through. You will still get the idea.

145
ICT COMPUTER SOFTWARE Applications

To calculate data using formulas you must use operators. These are
symbols that indicate the kind of manipulation required. Given below is a list
of some operators.

SYMBOL OF OPERATOR OPERATOR USED TO...


+ Add two or more values
- Subtract one value from another value
* Multiply two or more values
/ Divide one value by another value
> Find value that is greater than
< Find value that is less than

To see how formulas work, let us suppose that you buy and sell grocery
items. Assume that you sell the items at a gross profit of 20%. The Microsoft
Excel screenshot below gives the details.

Our task is to fill the COST, SELLING PRICE, SALES and GROSS PROFIT
columns. Although you can use pen and paper, or your calculator to do the
computations, it is far easier to do so using Microsoft Excel. Firstly let us use
an approach which although works but is not the correct way of performing
calculations. Later I will your show you a better approach.

146
ICT COMPUTER SOFTWARE Applications

Follow the following steps:

a) Click in cell D4 under COST so that we can enter the formula for finding
the cost.
b) Type =12000*50
c) Press Enter or click in another cell

The result should be as shown below.

We can see that the cost of the 50 units of sugar is K600,000. Although this
is correct, the method used is incorrect. Why? To understand this, remember
that one reason why we use computers is to simplify work. Work is
simplified if certain operations can be automated. Spreadsheet programs are
good for automating operations. For example, suppose that we change the
value in cell C4 so that it is now 40 instead of 50. (Try it if you are using a
spreadsheet right now.) You will notice that the value in cell D4 remains
unchanged and you have to re-calculate it. It happens like this because we
did not use a correct formula to calculate the result. The correct formula is
one which uses cell references instead of the actual values in the cells. To
calculate the COST of sugar, we should type the formula: =B4*C4 in cell D4
instead of =12000*50. (Try it!) You will get the same result, i.e. K600,000.
This is now better because you can prove it by typing 40 in cell C4 and
pressing enter. You should notice that the result changes automatically to
K480,000 in cell D4.

147
ICT COMPUTER SOFTWARE Applications

Is this all that makes a spreadsheet better? No. Let’s continue in order to
appreciate this more.

Suppose we now wish to compute the COSTS of the other products. You can
repeat the formula used for sugar. Please, do not type the formula again.
Just do this:
a) Click in cell D4 again.
b) Now put the mouse pointer on the small square called the Autofill
handle on the bottom right side of the cell pointer. It looks like this:
Autofill handle

c) Once your mouse pointer changes to a +, press the mouse button down
and drag the pointer to cell D8 and release the mouse button.

Your results should appear like the ones shown below.

You will notice and appreciate that all the calculations are automatically
done. This should take you more time using a calculator.

Microsoft Excel has a lot of functionality which helps perform operations very
easily. It even has in-built formulas called FUNCTIONS which you can use
to perform many complex calculations such as standard deviation,
depreciation of an asset, and many mathematical, statistical, financial, and
engineering calculations. You will learn more about the program in your
practical lessons.

148
ICT COMPUTER SOFTWARE Applications

Exercise 5.2

Write the formulas which you would use to calculate the rest of the data
given in the Microsoft Excel screenshot above. (Do it practically if you have
Microsoft Excel.)

5.5 Database

We now turn our attention to database software. The following questions


should serve to give you focus on the important points to look forward to:

1. What is database software, and what is it used for?


2. What are the examples of database programs?
3. What are the types of database programs?
4. What are the fundamental concepts of database software?
5. How does database software work?

Let us start with the first question.

5.5.1 Role of database software

Database software is one of the most useful applications to have in your


computer. Why? This is because if you ever deal with data or information
which you use to perform many management functions, then you definitely
need this software.

What are management functions?

Management functions are those operations that involve activities such as


planning, controlling, decision making, forecasting and organising. Each of
these functions requires information, and information comes from data. So,
what is database software?

Database software is a computer program which is used to do the following


activities:
• Collect data
• Store data
• Retrieve data
• Process data
• Communicate data

149
ICT COMPUTER SOFTWARE Applications

All these database activities are performed in every management function.


To understand the importance of a database, look at this: ‘if you use a
computer but have not created databases, then you have not computerised
your operations’. In Zambia at the moment there are many people, in homes
and offices, who use computers but without employing databases. Their
computers are merely used as typing tools and the benefits of these
expensive machines cannot be fully realised. Let me use a true occurrence to
illustrate this unfortunate situation. One time I resourced on a short
database course offered by the college during recess. There were about
twenty course participants drawn from various organisations around the
country. To set the stage for the course, I listed on the whiteboard the
following computer skills:
1. I can start a computer.
2. I can use a computer to type and save a document.
3. I can use a computer to do calculations.
4. I can use a computer to manage information.
5. I can use a computer to send and receive information.
Then I requested the participants to pick from the list those skills which they
already possessed. Interestingly, everyone picked only the first two. How
many people are like those course participants? Are you like them? The point
is this: if you really have to make good use of your computer, you must
learn to use more productivity programs such as databases and
spreadsheets. That is what computerisation really means.

Which programs can be used to perform these database operations?

5.5.2 Examples of database programs


There are many computer programs which have database capabilities. They
are often called Database Management Systems or simply DBMS.
Examples of DBMS are:
a) Microsoft Access
b) dBASE
c) Oracle
d) DB2
e) FileMaker
f) Microsoft SQL Server
g) MySQL

150
ICT COMPUTER SOFTWARE Applications

Some of these programs, such as Microsoft Access, can be used on


microcomputers whereas others, such as Microsoft SQL Server, can only run
on server computers.

5.5.3 Types of database software

What are the types of DBMS? How do they really differ from each other?

Over the years different types of database programs have been used. Of the
many types, three of them are worth talking about. The three are:
• Network database
• Hierarchical database, and
• Relational database

To distinguish these database types, look at their representations given


below. The shaded parts indicate the components or tables in which the data
is actually contained.

Network database

B1 B2 B3

C1 C2 C3 C4

Hierarchical database

151
ICT COMPUTER SOFTWARE Applications

Relational database

What differences have you noticed among the three types of database
models?

In a network database model, the degree of linkages, as seen from the


interconnecting lines, among the various components is extensive. This is
also a bit extensive with the hierarchical database type. But there is less
linkage between the tables in the relational database model.

Which of the three is the best database type?

In this sense, ‘best’ is with respect to performance. The best database model
of the three types is the relational database. Why? This is because it is more
efficient. One major problem with the network and the hierarchical database
types is that there is too much duplication of data. What does this mean?
It means that in these two database models the same piece of data may be
recorded more than once. Let’s give an example. Suppose that the same
students’ performance results are recorded more than once, e.g. with the
class teacher and with the deputy head teacher. You should agree that a
problem would arise if the results are altered by one of these people, for
example by the deputy head. As the class teacher may not know what has
happened, these people will end up giving conflicting information about the
performance of some students in the class. The relational database model is
the best because it does not allow the duplication of data. In our example,
the students’ results would be recorded once only. If one person makes
changes to the data, everyone who accesses it will find that the data has
been modified. For this reason, the database type which is used nowadays is
the relational database. However, latest developments have indicated that
even the relational database is not very efficient. Other database types are
being proposed but these are mainly for very advanced use.

5.5.4 Fundamental concepts of database software


When you use database software, you find that it is slightly different from
the other applications programs such as word processors and spreadsheets.
To start with, database uses certain concepts which must be understood first
152
ICT COMPUTER SOFTWARE Applications

for any meaningful work to be done. Secondly, it works in a different way.


This section will give some basic but important understanding of this type of
software. Let’s start with the concepts common to DBMS.

Field A field is the smallest item of data that can convey meaning to
someone. For example, when we describe something, e.g. a
person, we mention certain things such as first name, last
name, date of birth, nationality, sex, etc. In DBMS vocabulary
these are called fields. Fields are columns of a table.

Record Suppose that you prepare the following data:


ID FIRSTNAME LASTNAME DATE OF NATIONALITY
BIRTH
M2005 Mabvuto Mbewe 12/05/1990 Malawian
Z1000 Shula Mwape 24/09/1985 Zambian

In DBMS vocabulary, each row is a record. The data given here


has two records. The first record is for Mabvuto, and the second
record is for Shula. As you can see from this example, every
record has exactly the same fields or columns. So, what is a
record? A record is defined as a collection of two or more fields.

Table In DBMS language, a table is defined as a collection of two or


more records. Sometimes the term ‘File’ is used to refer to a
table.
Database A database is a collection of two or more tables. Is there any
restriction to the tables which must form one database? Yes.
Only the tables that contain data with relationships across the
tables can belong to the same database. Let’s use an example
to make this clear.

Suppose that we have the four tables shown below.

Employee personal details:


ID FIRSTNAME LASTNAME DATE OF NATIONALITY
BIRTH
M2005 Mabvuto Mbewe 12/05/1978 Malawian
Z1000 Shula Mwape 24/09/1985 Zambian

153
ICT COMPUTER SOFTWARE Applications

Academic details:
ID QUALIFICATION YEAR OBTAINED
M2005 Diploma 2000
Z1000 Degree 2008

Employment details:
ID POSITION HELD DURATION
M2005 Accountant 6 years
Z1000 Teacher 2 years

Animal details:
CATEGORY NAME NUMBER
Domestic Cow 200
Wild Lion 3

Do the four tables qualify to belong to the same database? If not, which
one(s) would be strange to the database?

Clearly you can see that the first three tables have related data and can
therefore belong to the same database. The last table, which gives animal
details, does not seem to have any relationship with the first three. This is
why a database is defined as a collection of two or more related tables.
Let’s next focus on the last question. How does database software work? Or
how do we use it?

5.5.5 How database software works


Database software is a unique program. The program is designed differently
from other applications. This is due to the nature of work which it does. To
properly understand how a DBMS works, we should first understand its
components.

What are the components of a DBMS?

Database software is very complex. It behaves or operates like a min


operating system. Every DBMS consists of three important components, just
like our bodies have the brain, the heart and the lungs and other organs.
The three components of a DBMS are:
• The database engine
• The data dictionary, and
• The user interface

154
ICT COMPUTER SOFTWARE Applications

5.5.5.1 The database engine


As the name suggests, this is the part that drives the whole database
program. It sets all the rules about how the database operates and
supervises all the database activities.

5.5.5.2 The data dictionary


A database program is a very clever program. When you use a DBMS, it
records certain details about the objects that you create. It’s like you were
building a house and the house began to keep details about the structures
that you were constructing such as the number of rooms, the size of each
room, the location of every room, and the use of the rooms. Don’t you agree
that your house would be very clever if it really did this? A DBMS does just
this. The information about the objects being created in a DBMS is
automatically recorded in the data dictionary. Therefore, a data dictionary is
a repository or storage of data about the objects created in the database.
What do we mean by ‘objects created in the database’? This will become
clear soon.

5.5.5.3 The user interface


If you recall from the material on operating system, the term user interface
was used. What did we say it is? If you have forgotten, the user interface is
that part of the operating system through which we interact with it. A DBMS
has its own user interface. This is the part which users interact with as they
create and use various database objects in the database.

To really appreciate how a database works or how it is used, let’s now learn
about database objects.

5.5.6 Database objects


Because a database is complex, it also works in a complex way. It is
designed this way in order to make it more efficient. Every DBMS has a
place or an object which stores the data which you give it. Please note that
this is not the data dictionary which we mentioned above. It is the table. Do
you remember that we defined a database as a collection of two or more
related tables? All the raw data which you enter in a DBMS is kept in the
tables, and a table is the first database object which is created in a DBMS.
After creating a table, and putting raw data into it, you may want to process
the data in order to obtain some information. For this operation, another
database object called a query is used. Queries are objects which make

155
ICT COMPUTER SOFTWARE Applications

DBMS to be really very important and useful programs. For example, if your
database has the tables which we used in the earlier example, i.e. Employee
personal details, Academic details, and Employment details, we can create
queries which would extract from the tables the following information:
• The names of employees that are not Zambians.
• The names of employees that have degree qualifications.
• The names of employees that are Zambians, have diplomas and have
more than two years work experience.
If you imagine that your tables have numerous records, then you will agree
that to obtain these pieces of information manually would be very difficult.
But with the use of a query, the information can be obtained from the tables
within seconds.

Another database object which can be used to work with data in the
database is a form. Forms serve multiple functions. You can use a form to
enter data into the tables. You can also use forms to view the records in the
tables or in the queries.

Suppose that we have extracted some information from the tables in the
database and we wish to present this information in a more professional
way. One thing about tables and queries is that they cannot present details
in a more professional way. Tables and queries merely display results. But if
we want to place details in more appropriate positions, and well formatted,
e.g. using appropriate fonts, colour, bold, underline, etc, we need to use
another database object which has this capability. This is the report.
Reports are particularly useful when we want to print or communicate
results to other people but in a more professional way.

To summarise, the common database objects are the following:


• Tables
• Queries
• Forms, and
• Reports
Queries, forms and reports don’t keep data; the data is kept in the tables.
These are tools which the DBMS uses to work more effectively or efficiently
with the data already contained in the tables. In your practical lessons you
will learn how to create a database and how to work with the various
database objects.

156
ICT COMPUTER SOFTWARE Applications

Exercise 5.3
1. What are applications programs?
2. Why is a computer without applications software ‘worthless’?
3. Name at least four applications programs.
4. In what way does a word processor differ from a spreadsheet?
5. What is meant by ‘formatting a document’?
6. Mention four ways of formatting a document.
7. Mention four features of a spreadsheet program.
8. State what is meant by the formula =Sum(A4:F4).
9. Suppose that you have figures in cells A1 and G7 which you want to
multiply together. Write two formulas which you would use to get the
result.
10. How is a database different from a spreadsheet?
11. What is a database, and how is it different from a DBMS?
12. Every DBMS has three components. Name the components.
13. What do you understand by the following database concepts?
14. Mention any three objects of the Microsoft Access database.
15. Which object in Microsoft Access would you use if you wanted to
extract details of pupils who scored distinction in an examination?

157
ICT COMPUTER SOFTWARE Summary

Chapter 6 ACQUISITION OF SOFTWARE AND


HARDWARE

Having learnt about software in this module and hardware in Module 2, we should
now learn how we can acquire these things for our use. You might be wondering if
at all this is really important. ‘Why not simply walk to a computer shop and buy the
machines from the shelves?’ You might be asking this question. What would be
wrong with this approach? This chapter explains the best approach which you must
follow in order to acquire a computer system.

6.1 General consideration for acquisition of software and


hardware
Acquisition of software and hardware is a process. This process can be
properly stated or analysed by asking a number of questions such as the
following

i.) What are the organisational objectives?


ii.) What are the information needs of the organisation?
iii.) What type of data will give the required information?
iv.) What processing must take place on the data to produce the required
information?
v.) What is the most appropriate hardware for the required processing?
vi.) What is the appropriate software to run the identified hardware?
vii.) How is the software acquired?

6.2 Identification of appropriate software


Identifying the most appropriate software may not be easy. This is because,
firstly, software has to be compatible with the chosen hardware. The
software must also be affordable and you must be able to use it. In addition,
the software must have the required display format of the output of
information. This means that one requires support when acquiring software.
Where or how can you obtain the required support? This support can be
obtained from many sources such as the following:

1. Software manufacturing companies that can be contacted to give


details of their software.
2. Software vendors that can be visited for a demonstration of how the
software works.

158
ICT COMPUTER SOFTWARE Summary

3. Other organisations with similar projects that can be contacted for


advice.
4. Software magazines that can be read for details of various software
products.
5. The INTERNET that can be accessed for more information on
software products.

Therefore, to acquire the required software and hardware, do the following:

a) State the purpose of the software which you want.


b) Identify the software which can do the work which you have stated in
step (a).
c) Identify the hardware which can support the software identified in step
(b).
d) Find the supplier of the software and the hardware identified. (Or
produce them in-house if you have the technical and financial
capabilities.)
e) Buy the hardware and the software. (If you cannot produce them by
yourself.)
f) Install the hardware.
g) Install the software.

159
ICT COMPUTER SOFTWARE Summary

Exercise 6.0
1. What is the first consideration to make if you want to acquire a computer
system? Explain why this is important?
2. What do you understand by software vendor?
3. Familiarisation with software is important before you buy one. Explain,
and state how you can achieve this.

160
ICT COMPUTER SOFTWARE Summary

Summary

In this module you have learnt about computer software. You have learnt
that computer software is a set of programs for controlling the performance
of the computer. A program is a set of instructions designed to accomplish a
specific task.

You have learnt that in general a computer has two types of software,
namely systems software and applications software. Systems software
is used by the computer and applications software is used by people to
accomplish specific tasks. Systems software consists of operating system
(OS) and utilities. The OS is the main software in the computer because it
sets all the rules about how the whole computer system works. Utilities are
used in order to extend the capability of the OS. Examples of OS are
Microsoft Windows, UNIX, and Linux, and examples of utilities are Antivirus,
disk defragmenter, and backup.

It was stated that a computer without applications is worthless. Applications


are the ones that make a computer to be a productivity machine. Many
applications, e.g. word processors, spreadsheets, databases, games,
presentations, and desktop publishing are used by people to do specific
tasks using the computer.

161
ICT COMPUTER SOFTWARE Self-Assessment Questions

Self-assessment Questions
(You will find answers to the questions at the end of the module. You should not
look at the answers before attempting the questions by yourself.)

Question 1

A computer consists of hardware and software.

(a) Mention the two categories of software in the computer.

(b) State the role of software in the computer in general.

(c) The first column in the table given below shows functions performed
by programs in the computer. In the second column, write the name of
the type of software which performs each function, and in the last
column write the name of an example of the software mentioned in the
second column. [16]

SOFTWARE FUNCTON TYPE OF SOFTWARE EXAMPLE OF


THAT CAN BE USED TO SOFTWARE
PERFORM THE
FUNCTION
Storing and managing
large amount of
information
Calculating and
analyzing data

Coordinating the work


of hardware units
Identifying and
removing malicious
code
Typing, formatting and
editing documents
Installing all new
hardware and software
in the compputer
Configuring and
optimizing computer
memory

162
ICT COMPUTER SOFTWARE Self-Assessment Questions

Question 2

(a) State what each of the following computer operations means.

(i) Booting a computer

(ii) Formatting a document

(iii) Cropping a picture

(iv) Double clicking

(v) Starting a program

(b) List any four formatting that you can perform on a document.

Question 3

After finishing working on her report, an accountant wishes to have it


printed. In general, the work of the accountant is implemented by two
software programs as depicted in Figure 3 below.

PRINTER
SOFTWARE X SOFTWARE Y

COMPUTER
ACCOUNTANT
Figure 3

(i) Name the software category X.

(ii) Name the software category Y.

(iii) Give an example of Software X which the accountant could use


for preparing her report.

(iv) One function of Software Y is depicted in Figure 3. State three


other functions of Software Y.

163
ICT COMPUTER SOFTWARE References

References

5. French, C. S (2002) COMPUTER SCIENCE, 5th Edition, Book Power, London

6. Williams, B. K. , Sawyer, S. (2007) USING INFORMATION TECHNOLOGY, 11th Edition, McGraw-


Hill, Boston

164
ICT COMPUTER SOFTWARE Further reading

Further reading

http://www.google.co.zm/imgres?imgurl=http://bigteaparty.com/blog/wp-
content/uploads/VaL/060407_migrantWorkers.jpg&imgrefurl=http://bigteaparty.com/farm-workers-
in-the-
us/&h=273&w=622&sz=46&tbnid=U8qTWTTtxhkzZM:&tbnh=54&tbnw=123&prev=/search%3Fq%3Di
mages%2Bof%2Bfarm%2Bworkers%26tbm%3Disch%26tbo%3Du&zoom=1&q=images+of+farm+wor
kers&docid=orcp7KeYpvGLMM&hl=en&sa=X&ei=FdOCT9izC-
Kn0QWgx5DwBg&ved=0CEgQ9QEwAQ&dur=751

http://en.wikipedia.org/wiki/List_of_word_processors

http://en.wikipedia.org/wiki/File:Word_Pro.png

http://www.softpedia.com/progScreenshots/Corel-WordPerfect-Office-Screenshot-32287.html

165
ICT COMPUTER SOFTWARE Further reading

Answers to self-assessment questions

Question 1

(a) The two categories of software in a computer are


o Systems software
o Applications software
(b) Role of software in general:
o To control the computer system.
(c) Completion of table:
SOFTWARE FUNCTON TYPE OF SOFTWARE EXAMPLE OF
THAT CAN BE USED TO SOFTWARE
PERFORM THE
FUNCTION
Storing and managing Database Microsoft access,
large amount of Oracle, dBASE
information
Calculating and Spreadsheet Microsoft Excel,
analyzing data Lotus 123

Coordinating the work Operating system Microsoft Windows,


of hardware units Unix, Linux
Identifying and Antivirus Norton, AVG, Avast,
removing malicious Kaspersky, Panda,
code Avira
Typing, formatting and Word processor Microsoft Word,
editing documents WordPerfect,
WordPro
Installing all new Operating system Microsoft Windows,
hardware and software Unix, Linux
in the compputer
Configuring and Operating system Microsoft Windows,
optimizing computer Unix, Linux
memory

Question 2
(a) (i) Booting a computer means starting a computer.
(ii) Formatting a document means making changes to text in a
document in order to improve the document’s quality.

166
ICT COMPUTER SOFTWARE Further reading

(iii) Cropping a picture means removing the unwanted parts of the


picture.
(iv) Double clicking means pressing and releasing the left mouse
button twice and quickly.
(v) Starting a program means loading the program into RAM from
some storage location.

(b) Examples of formatting that can be performed on a document:


o Changing font
o Changing font size
o Changing font colour
o Underlining
o Typing in bold
o Typing in italics
o Aligning text

Question 3

(i) Software X is Applications software.


(ii) Software Y is operating system.
(iii) For an example of software X, see Page 41 which talks about
spreadsheets.See Page 15 for functions of operating system.

167
ICT COMPUTER SOFTWARE Further reading

Foreword to module 4

Dear Student,

Welcome to this module in which you will be introduced to computer


networks. Computer networking has become a very important branch of
technology because it is affecting our lives in so many spectacular ways.
Through networking we are always in touch with many people with whom we
can relate in so many ways, e.g. business, social life, education, and
entertainment. Although computers on their own are good, this module
shows that computer networks are better. This is because they can be used
to solve more challenging problems which would not be possible with stand-
alone computers.

Therefore, as you study this module, pay attention to what benefits


networks have, how they are established and how they work. The material
has been presented in a simplified way for easier understanding. However,
should you find some parts unclear, do not hesitate to contact your
tutors/lecturers who will be more than willing to offer assistance. Since you

168
ICT COMPUTER SOFTWARE Further reading

may not have some of the systems described in this module, you are
advised to visit some nearby places, e.g. colleges, schools, shops, offices,
just to see them. Examine the pictures which have been included just to help
you understand the material well, and ensure that you attempt all the
exercises. Since the exercises are meant to consolidate your learning, the
more you interact with them the more you will learn.

Really, take this document as your tutor.

TVTC

169
ICT COMPUTER SOFTWARE Further reading

Table of contents
Foreword ...............................................................................................................................................167
Introduction .........................................................................................................................................172
Objectives .............................................................................................................................................173
Chapter 1 ROLE OF COMPUTER NETWORKS.....................................................................174
1.1 Introduction..........................................................................................................................174
1.2 Advantages of computer networks..............................................................................174
Exercise 1.0......................................................................................................................................176
Chapter 2 TYPES OF COMPUTER NETWORK .........................................................................177
2.1 Introduction..........................................................................................................................177
Exercise 2.0......................................................................................................................................177
2.2 Local area networks ..........................................................................................................177
2.2.1 Star topology ...............................................................................................................178
2.2.2 Ring topology...............................................................................................................179
2.2.3 Bus topology ................................................................................................................180
2.2.4 How CSMA/CD works ..............................................................................................180
2.2.5 Tree topology .............................................................................................................181
2.2.6 Mesh topology............................................................................................................181
Exercise 2.1......................................................................................................................................182
Chapter 3 HOW TO SET UP A NETWORK ...............................................................................183
3.1 Requirements for setting up computer network ....................................................183
3.1.1 Ethernet........................................................................................................................183
3.1.7 Hubs and Switches ...................................................................................................189
3.1.2 Protocols.......................................................................................................................191
3.1.3 Naming System...........................................................................................................193
EXERCISE 3.0 ..............................................................................................................................196
Chapter 4 THE INTERNET ...........................................................................................................197
4.1 Use of the Internet ............................................................................................................197
4.2 Advantages of the Internet ............................................................................................197
4.3 Browsing the Internet ......................................................................................................198
4.4 Internet Vs World Wide Web .........................................................................................198

170
ICT COMPUTER SOFTWARE Further reading

4.5 Website and Web page ....................................................................................................199


4.6 Web browser and Search engine .................................................................................199
4.7 Electronic mail (E-mail) ...................................................................................................200
4.8 How to connect to the Internet ....................................................................................201
EXERCISE 4.0 ..............................................................................................................................203
Summary ..............................................................................................................................................204
Self-Assessment Questions............................................................................................................205
References ............................................................................................................................................209
Further reading...................................................................................................................................210

171
ICT COMPUTER SOFTWARE Further reading

Introduction

Have you ever heard of the saying “The whole is greater than the sum
of its parts”? This statement is really much more meaningful when applied
to computers and their associated resources. A computer network is an
interconnection of computers. There are various reasons why computers
may be interconnected to one another. Suppose that you have two or more
stand-alone computers. (Note: A stand-alone computer is a computer that
is not linked to another computer.) Although you can do quite a lot with
these computers, the benefits are multiplied when you link your computers
together to form a computer network. There are certain things which you
cannot do with stand-alone computers, or which you can manage to do but
with many difficulties. For example, think about this scenario: Mrs
Mweemba, Ms Chanda, Mr. Mubita and Mrs Silomba are teachers and they
share the same office. Each one of them has a stand-alone PC on the desk.
Mrs Silomba’s has a printer connected to her computer. The other three
teachers feel that they must also have their own printers. What is the
solution?

Computer networks are designed to solve such kind of problems. In this


module you will learn some useful details about computer networks; what
roles they play and how they are setup. You should ensure that you
familiarize with new concepts, which will, of course, be clearly explained.

172
ICT COMPUTER SOFTWARE Further reading

Objectives
1. State what is meant by computer network.
2. State reasons why organisations set up computer networks.
3. State the three types of computer network.
4. State the basic differences between types of computer network.
5. State what is meant by LAN topology.
6. Name the different types of LAN topologies.
7. Draw diagrams to represent the Star topology, Ring topology and Bus
topology.
8. Describe how communication is effected in each of the three types of
LAN topologies.
9. State the relative advantages and disadvantages of each type of LAN
topology.
10. Name the basic networking requirements, i.e. transport media,
protocols and naming system.
11. Briefly describe Ethernet technology, TCP/IP and DNS.
12. State what the word Modem means, and what a modem is used for.
13. State what the letters NIC stand for, and what a NIC is used for.
14. Mention the various communication channels that can be used to send
data from one computer to another computer.
15. State some advantages and disadvantages of the communication
channels mentioned above.
16. Identify by name a communication channel given its drawing or picture.
17. State the use of each of the following computer network devices:
Router, Switch , Hub, Bridge , Gateway, Firewall
18. Set up a local area network to share resources, e.g. printer and data.
19. State what is meant by Internet and World Wide Web (WWW).
20. State the role of Internet browser software.
21. Name some popular Internet browser software.
22. State the difference between a Website and a Web page.
23. State the role played by the Internet Search Engine.
24. Name some popular Internet Search Engines.
25. State what is meant by e-mail.
26. Create an e-mail address.
27. Send and receive e-mail.
28. Mention advantages of e-mail over ordinary mail.

173
ICT COMPUTER NETWORKS Role of Computer Networks

Chapter 1 ROLE OF COMPUTER NETWORKS

1.1 Introduction
A computer network is an interconnection of network nodes. Although
computers have made tremendous impact on our lives, computer networks
have done so in a much more remarkable way. They have changed the way
we live and do business.

1.2 Advantages of computer networks

So, what are the specific advantages that we draw from networking
computers?

Some of the advantages of computer networks are as follows:

1. Data can be shared. For example a school can create databases to


store all records of pupils, all data of staff members, all facilities which
the school owns, etc. If one teacher enters test results in the pupils’
database, everyone authorised can retrieve information from the
database without having to print or type the details again. What is the
advantage of this? You will agree that this saves on time and printing
resources, e.g. ink/tonner and paper. Many people nowadays share
data or information (in any form, e.g. text, graphic, audio or video ) in
a more cost-effective way by means of computers. By sharing
information this way, there is greater efficiency, and many operational
costs are reduced.
2. Tasks can be shared. What is the advantage of this? This helps
improve the quality of information and the speed at which results are
obtained. For example, co-workers can collaborate on the same task
but working on different computers which are networked.
3. Computer resources, e.g. storage facilities, printers and software, can
be shared. This greatly reduces the cost of using computers. For
example, it is not economical for everyone in an organisation to have
their own printers, antivirus software, and large storage facilities. It is
more economical to put these facilities on a computer network to be
shared by everyone.
4. Communication is easier and more economical. For example, if Mr.
Mwamba sends an e-mail to Mrs Soko, Mrs Soko will find the message
when she starts her computer. She will send a response, and Mr.

174
ICT COMPUTER NETWORKS Role of Computer Networks

Mwamba will find it. There are many other ways of communicating by
means of networked computers in addition to e-mail.

175
ICT COMPUTER NETWORKS Role of Computer Networks

Exercise 1.0
1. What is a stand-alone computer?
2. What is a computer network?
3. What advantages can you think of for networking computers?
4. In what way do computer networks reduce operational costs?
5. In what way do computer networks increase operational efficiency?

176
ICT COMPUTER NETWORKS Types of Computer Network

Chapter 2 TYPES OF COMPUTER NETWORK

2.1 Introduction
Having learnt about what computer networks are and reasons for forming
them, you must be wondering how computers can be networked. Before we
come to this, let us first understand some fundamental details about
computer networks. How to link computers will depend on what type of
network you want to set up.

To start with, let us answer these questions?

• How many types of computer network are there?


• What determines the type of computer network to set up?
• What are the different computer networks?

Generally, there are three ways in which computers can be linked. The
determining factor is usually the distance over which the network will span.
If computers are within the same locality, e.g. in the same room, or in the
same building or in the same school campus, the network is called the local
area network (LAN). If the computers are in the same town or district, the
computer network is called the metropolitan area network (MAN), and if
the computers are in different geographical areas or locations, e.g. in
different towns or countries or in different continents, the computer network
formed is known as the wide area network (WAN). An example of the
WAN is the Internet which links many computer networks in the world.

Exercise 2.0
1. What is the difference between a LAN and a WAN?
2. Which computer network would be set up between your school and the
DEBS office in your district?

Let's now learn details of the LAN.

2.2 Local area networks

As has been stated, a LAN is an interconnection of computers, actually nodes,


within the same place. Local area networks are particularly useful because they
enable co-workers at a place of work to share company resources and improve their

177
ICT COMPUTER NETWORKS Types of Computer Network

work output. This is why many organisations set up local area networks at their
places of work.

Notice that it is often more accurate to refer to a computer network as an


interconnection of nodes rather than of computers. The reason is that on such
networks many resources are found. In other words, it is not only computers that
are found on computer networks.

So, how can computers be connected to form a LAN?

There are various ways in which computers can be linked with each other to form a
local area network. For example, computers can be linked to form a star, a ring or
a bus network. (See http://www.giac.org/cissp-papers/32.pdf) The way computers
are interlinked is called a topology. Therefore, you often hear people talk about
star topology, ring topology, bus topology, and so on. You will learn about each of
these topologies in the next few sections.

2.2.1 Star topology

In this topology, there is a central node called the server to which all other
computers are linked. The computers connected to the server are called terminals
or workstations or slaves.

by Chris Woodford
The server is usually a high-speed computer, e.g. a minicomputer or a mainframe
computer. (Note that a high capacity and high speed microcomputer can also be
used as the server). The terminal computers are also commonly known as clients.
Thus a star network is also known as a client-server network.

What are the advantages and disadvantages of star topology?

Advantages of star network


1. It is relatively cheaper because computer resources, e.g. printers and
software are concentrated on the server.
2. There is better or improved security and control for data and other resources
because these are located on the server computer where access can be
monitored and controlled easily.

178
ICT COMPUTER NETWORKS Types of Computer Network

3. It is easier to set up.


4. It is easier to troubleshoot, i.e. to identify and solve network problems.
5. One faulty node of link does not affect the whole network.
6. Signal collisions are not very frequent.

Disadvantages of star network


1. Communication is somehow slow due to the presence of the intervening
computer (the server computer).
2. During the down-time of the server computer, the whole network is affected.

2.2.2 Ring topology


In this topology, there is no server and no client; all the computers are peers. The
computers are connected to a cable that runs round forming a ring as illustrated
below.

PEER

PEER PEER

PEER

Because there is no server computer to control communication, a special signal


called a token is sent round the network. The computer with the token is the one
that is able to send while the other computers are able to receive only. This ensures
that only one computer can transmit at a time.

What are the advantages and disadvantages of ring network?

Advantages of ring network


1. Theoretically, this type of LAN is faster than the star network due to the
absence of the intervening server.
2. There are no signal collisions during transmission due to the use of a
token which goes round the network in one direction only.
3. All stations have equal access.
4. Because each station on the ring acts as a repeater, ring networks can
span longer distances than star networks.

Disadvantages of ring network

1. There is poor security for data.

179
ICT COMPUTER NETWORKS Types of Computer Network

2. It is the most expensive topology because it requires two sets of cabling –


one in each direction- so that should the cables on one side get cut, the
signals can be sent through the other side.
3. Failure of one node may affect others.
4. For these reasons, ring networks are no longer popular.

2.2.3 Bus topology

What is a bus network?

In this network, a cable called a bus runs through. All the computers in the
network are linked to this cable.

By Jim Murray

Theoretically, this is a very fast network because computers are allowed to


transmit their signals simultaneously. One major drawback of this type of
network is the possibility of collision of data signals. Another problem is that
if the bus is cut at some point, no signals travel along as the circuit becomes
open. Special software is used to ensure that collision of signals is avoided.
A technique or a protocol known as Carrier Sense Multiple
Access/Collision Detection (CSMA/CD) is used to control transmission of
signals on this type of network.

How does CSMA/CD work?

2.2.4 How CSMA/CD works

1. A computer wishing to transmit a signal first listens in, i.e. first checks
the network to find out if another computer is also transmitting. This is
done to ensure that no two computers transmit at the same time. If two
or more computers transmit at the same time, a signal collision occurs.
2. If no other computer is transmitting, it sends its signal.
3. The transmitting computer then listens in for the second time to ensure
that no other computer transmitted a signal while it was sending its own.
4. If a computer detects a signal on the network when it listens in, all
computers that sent signals terminate transmission and wait for some
time to give each other chance. Each computer waits for a random time,
180
ICT COMPUTER NETWORKS Types of Computer Network

i.e. each computer chooses a different time period to wait for other
computers to transmit their signals.
Although a bus network is theoretically supposed to be very fast, in practice
its efficiency can greatly be affected, especially where the network is large
with many computers.
Other network topologies are tree and mesh as illustrated below.
2.2.5 Tree topology

2.2.6 Mesh topology

181
ICT COMPUTER NETWORKS Types of Computer Network

Exercise 2.1

1. What is meant by LAN topology?


2. Draw diagrams for each LAN topology.
3. Explain why the star topology is the most common LAN topology.
4. How are signal collisions avoided on star topology, ring topology and bus
topology?
5. What do the letters CSMA/CD stand for?
6. Ring topology is not common anymore nowadays. What are the reasons?
7. In what kind of situation would you not want to implement a bus
network? Explain.

182
ICT COMPUTER NETWORKS The Internet

Chapter 3 HOW TO SET UP A NETWORK

In this chapter you will learn details about how you can set up your own
computer network. But before we look at the details let us ask the following
question:

What is required for a computer network to be set up?

3.1 Requirements for setting up computer network

In order to set up any computer network you need three things. What are
they? You need transport media, you need protocol, and you need a
naming system. Why are these things required? You will discover in this
chapter. So, continue reading, but do it carefully so you don't miss vital
points.

Let’s start with transport media?

What is transport media?

You will agree that since a network involves sending of signals from one
point to another point there must be some resources to convey the signals
between the two points. Therefore, transport media refers to the set of
resources for conveying signals from one node or network to another node
or network.

3.1.1 Ethernet
The most common transport media used to convey network signals is called
Ethernet. Ethernet technology consists of communications channels such
as UTP or fibre optic and network repeaters such as hubs and switches. You
will learn more about these things in the sections that follow.

3.1.1.1 Communications Channels


A communications channel is a route through which signals travel from one
point to another point on a computer network. It is like a road through which
traffic flows from one place to another. In the next section you will learn
about the types of communications channels. Therefore, a communications
channel is a link between two computers, or between a computer and a
network, or between one network and another network.

183
ICT COMPUTER NETWORKS The Internet

3.1.1.2 Types of communications channels


There are two types of communications channels. These are wired and
wireless.

Communications channels differ from each other mainly in the amount of


data signals which they can transmit at a time. This is known as the
bandwidth. A channel with a greater bandwidth carries more signals, and
therefore transmits data faster than a channel with a lower bandwidth. The
bandwidth of a communications channel is given in bits per second (i.e.
bps). Data is sent in form of bits. Bits is a short-cut for binary digits.
Binary digits are 0 and 1. Therefore, data consists of strings of 0s and 1s,
e.g. 01000001 which stands for A in a coding scheme called American
Standard Code for Information Interchange (ASCII). For example, the
bandwidth of a communications channel could be 100Mbps. This means that
the channel can transmit 100million bits in one second. This is clearly faster
than one which is rated 10Mbps. Do you agree?

What are wired channels, and what are the examples?

3.1.1.3 Wired channels


Having looked briefly at few details about communications channels in
general, let us now learn about the wired channels.

Wired channels form physical links between computers or other devices.


Examples are UTP, Coaxial cable and Optical fibre.

UTP

UTP stands for Unshielded Twisted Pair. This is a pair of copper wires that
are twisted around each other and are not protected from environmental
interference.

Advantages of UTP
1. The cables are cheaper.
2. UTP is easier to install.

184
ICT COMPUTER NETWORKS The Internet

3. Modern UTP (e.g. Cat 6) has higher data transfer rates or bandwidth.

Disadvantages of UTP
1. Data transfer rates are low for old UTP.
2. It has a distance limit of approximately 100m.
3. There is more environmental signal interference.

Coaxial Cable

A coaxial cable consists of a central copper wire as one conductor


surrounded by a mesh of wire as an outer conductor. Coaxial cables transmit
data faster than UTP. The drawing below shows the structure of a coaxial
cable.

Advantages of coaxial cable

1. Coaxial cables transmit data faster than UTP because their bandwidth is
larger.
2. Coaxial cables can cover longer distances than UTP.
3. There is less signal interference from the environment.

Disadvantages of coaxial cable


1. They are more costly to produce and to install than UTP.
2. They are very bulky, i.e. large and heavy.
3. They are not supported by some network standards.
4. For these reasons, coaxial cables are not very commonly used in
computer networks nowadays.

Optical fibre (or Fibre optic)

185
ICT COMPUTER NETWORKS The Internet

This is a very thin rod of extremely pure glass the size of your hair. Signals
are transmitted in form of light instead of in form of an electric current like
in UTP and coaxial cable. Each fibre is bent at a special angle to allow for
total-internal reflection of light. (Do you recall total-internal reflection from
your Physics lessons at school?) Several glass fibres are bundled together to
form the optical fibre.

Advantages of fibre optic

1. Fibre optic cables carry more data because they have a much greater
bandwidth than metal cables.
2. Fibre optic cables are less susceptible (i.e. vulnerable) than metal cables
to interference.
3. Fibre optic cables are much thinner and lighter than metal wires.
4. Data can be transmitted digitally rather than analogically.

Disadvantages of fibre optic

1. The main disadvantage of fiber optics is that the cables are expensive to
buy and install.
2. In addition, they are more fragile (i.e. brittle) than wire.
3. The glass can be affected by various chemicals including hydrogen
sulphide gas.
4. Most fibres become opaque when exposed to radiation.
5. Optical fibres cannot be joined together as easily as copper cable and
require additional training of personnel to handle them.

186
ICT COMPUTER NETWORKS The Internet

Now let us learn some details about wireless channels.

3.1.1.4 Wireless Channels

What are wireless channels, and what are the examples?

These are communications links that allow for the sending of data as
electromagnetic waves. Examples are infrared, radio, microwaves, and
satellite. The advantage of some of these channels is that data can be sent
over very long distances by remote. (Remote means with no physical
connection between sending and receiving systems.) The bandwidth is also
large. The picture below shows a satellite dish.

Satellite Dish

A satellite dish transmits and receives signals to and from a satellite


which is positioned in space above the earth. (See illustration below.)

Communications
satellite

Satellite dish

187
ICT COMPUTER NETWORKS The Internet

Using satellite communication, messages can be sent round the globe in


just a fraction of a second. A common type of dish is the VSAT such as
the one at TVTC. VSAT stands for Very Small Aperture Terminal.
(See the website: http://www.explainthatstuff.com/satellites.html for
more details by Chris Woodford.)

What are the advantages of wireless networks?

Advantages of wireless networks

1. Mobility - network access can be available all the time.


2. Fast setup – one can easily or automatically connect to wireless
networks within range.
3. Cost - Setting up a wireless network is much less costly than buying and
installing cables.
4. Expandability - New computers can be added to a wireless network very
easily.

Disadvantages of wireless networks

1. Security – unauthorized people can easily gain access to a private


network.
2. Interference - wireless networks are more susceptible to interference
from lights and electronic devices.
3. Inconsistent connections - wireless connections are not as stable as
those through a dedicated cable.
4. Speed - wireless networks are generally slower than cable networks.

Having learnt about communications channels, we now turn attention to


repeaters. What are they?

3.1.1.5 Repeaters
When a signal is sent along any communications channel, it becomes weaker
as the distance from the source increases. It is the same with sound and
light. This is called attenuation. See illustration below.
I can’t hear you
Come and rescue your
clearly. Let me come
friend!
closer.

188
ICT COMPUTER NETWORKS The Internet

Attenuation is not good for network signals because it might cause the
signals to fail to reach their destinations. Therefore, when setting up a
computer network measures have to be taken to ensure that attenuation will
not cause signal losses. One approach used to go round this problem is by
including devices called repeaters at certain points along the network. You
must have an idea about repeaters because they are widely used in TV
signal transmission. For example, to transmit TV signals from our Lusaka
and Kitwe studios to far away areas such as Kasama, a number of repeaters
called substations have been installed along the way. The repeaters are
located at convenient points. They receive the transmitted TV signal, boost it
(or amplify it) and then re-transmit it towards its destination to the next
repeater. This is repeated until a strong signal gets to the final destination.

This technique is used to convey computer network signals. The repeaters


used are hubs and switches. However, hubs and switches do not only work
as repeaters; they perform other functions such as distributing signals to the
correct destination. Let’s learn more details about them.

3.1.7 Hubs and Switches


Suppose that we have two LANs which are 150m apart, as illustrated below, that
wish to communicate.

Client Client

Client Server A UTP Server B Client

Client Client
Servers 150m apart

LAN 1 LAN 2

Since the two networks are linked by UTP which has a maximum distance of
approximately 100m, signals cannot be conveyed between the two. A hub or
a switch can be connected between the two networks to boost the
transmitted signals. See illustration below.

Client Client

189
ICT COMPUTER NETWORKS The Internet

Client Server A Server B Client


Switch

Client Client
Servers 150m apart

If the switch is placed, for example, 75m from either server, it will amplify
signals that pass through it in either direction. The switch will also direct
transmitted signals to their correct destination.

What is the difference between a switch and a hub?

A hub differs from a switch in certain respects. A switch is more “intelligent”


than a hub. When a hub receives data meant for one device, it broadcasts
the signal to all the devices on the network. Unlike a hub, a switch first
identifies the owner of the data and then sends only to that destination. A
switch also works faster than a hub. Since switches are more efficient than
hubs, they are also more expensive. See pictures of switch and hub below.

Switch Hub
H
Notice that the outside appearance of switch and hub might be the same. It
is their internal circuits and operation that differ.

A switch or a hub can be used to interconnect network resources directly as


shown below. Network resources such as printers are often shared using this
approach. Given below is an example of a network of three computers
sharing a printer.

SWITCH

190
ICT COMPUTER NETWORKS The Internet

So far you have been learning about transport media, or Ethernet. Let’s now
learn about protocol.

3.1.2 Protocols
What is a protocol? A protocol is a set of rules that govern how something is
done or must be done. Computer networks require a number of rules to
ensure that communication is possible between and among different devices.
Just like people speak different languages, network resources also ‘speak’
different languages. Protocols ensure that network resources and procedures
are standardized. For example, human beings have standardized the way
they greet each other by means of hand-shakes. Which hand do you use to
greet someone? What happens if the person you are greeting extends
his/her left hand to shake yours? Another way in which we are using
standards is in footwear. If you go into shoe-making business, you have to
follow the standard sizes or else your enterprise gets into ‘maningi’ (serious)
trouble.
What’s she talkin’
about? What horrible
There is a cockroach in that staff
language is that? No
you’re drinking!
shoes? I’ve no size.

In networking technology, similar difficulties will be faced if every network


device manufacturer, implementer and user begins to employ their own
standards. For example, since computers and telecommunications devices
are made by different people in different places around the world, how
should they be made in order that they will be compatible with each other?
Or if one node on a network is sending a signal to another node, how should

191
ICT COMPUTER NETWORKS The Internet

the sending node alert the receiving node about this transmission, and how
could the receiving node tell whether or not the data received is exactly the
same as the one that was sent? Furthermore, how should data be prepared
for more efficient transmission? For this last one, think of how you would
prepare your harvested maize for efficient transportation to millers. You see
that the standard procedure (in Zambia now) is to package the grain into
sacks of 50kg capacity. What happens if you try to be ‘clever’ and make
under-weight bags?

Well, I think you now have followed the rationale for protocols in networking.
Protocols are simply about creating standards that ensure that
communication is efficient and effective regardless of the type of machine or
device used.

So, which protocols are used in computer networks?

There are many protocols used. Some of them work in specific situations
only but there are others that are more general. Actually, to ensure that
there is harmony in networking, international standards have been
established. The organization which sets these international standards is
called the International Organization for Standardization (ISO). You can call
it the International Standards Organization if you like. The ISO does not set
standards for computer networks only. It also sets standards for all products
and services. For example, if you would like to produce goods or offer
services to international quality in order to capture the global market, you
should look at what the ISO has stipulated for those goods or services. The
branch of the ISO that sets standards for computer networks is called the
ISO-OSI. This stands for International Organization for Standardization-
Open System Interconnection. However, the rules set by the ISO-OSI are for
reference purposes only. The more specific protocols used in the world today
are called the TCP/IP. Let’s learn about these briefly.

3.1.2.1 TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
Doesn’t sound good; does it? TCP/IP has become a sort of international
networking standard. Basically, it indicates how the network hardware and
other resources should be made, how they should be connected to form
computer networks, and how signals must be sent and received on the
networks.

192
ICT COMPUTER NETWORKS The Internet

I hope you’re enjoying all this. Let’s move on. We will now learn about the
naming system which is a third requirement for setting up a computer
network.

3.1.3 Naming System


As you can rightly guess, a naming system is important in networking
especially where you have many nodes all interlinked with one another. Just
like people have names, network nodes also require names for identification
purposes. The ISO-OSI dictates that appropriate names should be used, and
rules have been set for coming up with the names for network nodes. The
idea is that each device on the network must be uniquely known so that
signals are sent to the correct destination. The naming system used for this
is called the domain name system (or DNS). To understand DNS, think of
how you send a letter to someone. You must have an address and the other
person must also have an address. Imagine you wanted to send a letter to a
person who had exactly the same name and same address as another
person. The two people wouldn’t easily know whose letter it was.
It must be my letter since my That could be my mother’s
name and address are there. letter. She has the same
names, and they work at the
same school.

Let’s learn some details of DNS.

3.1.3.1 DNS
DNS is a system of ensuring that signals on a computer network always find
their destination. Without DNS it is impossible for two or more nodes to
communicate because they would not be able to identify each other. Each
node on a network is allocated a unique address to be identified with it. This
unique address is called the IP address. Usually the IP address is a decimal
dotted number such as 192.168.1.117. Notice that the dotted decimal IP
address always has four numbers separated by dots or periods. Therefore, if
you wanted to gain access to your friend’s computer that has this IP
address, you would simply type 192.168.1.117 in a special window on your

193
ICT COMPUTER NETWORKS The Internet

screen. However, due to the fact that addresses written like this are not
easily remembered, domain names are allocated to IP addresses. For
example, the IP address could be allocated a domain name such as
tvtc.edu.zm. It is usually written as www.tvtc.edu.zm. Therefore,
entering www.tvtc.edu.zm is equivalent to typing 192.168.1.117. It does
not matter which approach you use. It’s just like you; you can be called by
your name or by your NRC number, or college number. But as you will
agree, it is easier to call people by their names.

Let’s now understand a few details about IP addresses.

3.1.3.2 IP addresses
An IP address has three parts. These are:
a) The kind of protocol which should be used in order to access the
computer
b) The name of the computer (or organization which owns the computer),
and
c) The nature of the organization and the country in which the organization
is located.

Let’s use the IP address www.tvtc.edu.zm to understand the parts of an IP


address that would be associated with a domain name. Writing
www.tvtc.edu.zm is actually a short way of writing the IP address. In full,
this is written as http://www.tvtc.edu.zm and it tells us that to get to the
computer of this address the communication rules in the http will be used.
(http stands for hyper text transfer protocol). www indicates that this
computer is part of the Internet. (www stands for world wide web, and I will
soon explain the difference between the Internet and the WWW.) In this
address, tvtc stands for the name of the computer on the Internet, or the
name of the organization which owns the computer. edu indicates that the
computer belongs to an education establishment, or that the owner of the
computer is an education institution. You can guess what zm means. It
means that the computer or the education institution is in the country
Zambia. Every country has been allocated an identification code, eg. zm for
Zambia, us for United State of America, za for South Africa, jp for Japan,
and nl for Netherlands. Com stands for commercial organisation, net for
network, mil for military, org for non-governmental organisation, and gov for
government organisation. The IP address such as

194
ICT COMPUTER NETWORKS The Internet

http://www.tvtc.edu.zm is also called the uniform resource locator


(URL).

What other resources are required for linking nodes together to form
a network?

3.1.3.3 NIC and MODEM


You also need a network interface card (NIC) or a modulator-
demodulator (MODEM).

Why are these required?

To understand why NIC or Modem are required, let's first learn about the
nature of computer signals. As was mentioned in Module 2, data in a
computer is represented in binary, e.g. 01000001 for letter A (in ASCII). In
order that the bits representing one character must arrive at the same time
in the computer, each bit follows its own line. This means that the bits
travel in parallel (i.e. side by side) within the computer. (This is why the
size of the bus matters.) Now, a problem arises when the data has to be
transmitted out of one computer along a communications channel such as
UTP to another computer. Along UTP the bits of data will be transmitted in a
serial manner (i.e. one behind the other). We say that computers handle
data in digital form and wires transmit data in analog form. This is similar
to the problem which two or more people who are running side by side along
a wide road would face if they try to go into a narrow bush path. Along the
narrow path, they would have to break into a single-file.

To transmit data out of the computer introduces this similar challenge. The
data must be converted from parallel to serial and then back to parallel
again as it enters another computer. The devices for achieving this are NIC
and modem. Only one of the two is required depending on how you want to
connect the computers to one another. If you want to connect a computer to
an Ethernet LAN, you need a NIC, but if you want to connect to another
network through your telephone line (i.e. landline, e.g. Zamtel lines) you
need the modem. Nowadys what is popular is the use of a NIC. In fact every
new computer now comes with a NIC socket into which UTP can be
connected. This socket is called the RJ45 port.

195
ICT COMPUTER NETWORKS The Internet

RJ45 Sockets

Digital signal in
computer

Analog signal in
wire

To summarise, we see that to set up a computer network you need transport


resources (e.g. UTP and switches), protocols (e.g. TCP/IP) and a naming
system (e.g. DNS). NIC and modem are a part of the transport resources.

EXERCISE 3.0
1. What is a modem?
2. How does a modem differ from a NIC?
3. In what way is a modem similar to a NIC?
4. Why does a computer require a modem or a NIC?
5. Mention the three wired channels.
6. Which wired channel is the cheapest, the most expensive?
7. What is bandwidth?
8. Which wired channel has the least bandwidth, the largest bandwidth?
9. Why is UTP common on LANs?
10. What are the advantages of satellite communication?
11. Mention three things that are required for networking.
12. What do you understand by IP address, and what is its importance?
13. In what way is a switch similar to a hub? In what way is it different?
14. Explain the meaning of the URL http://www.assist.com.
15. Explain why protocols are useful in computer networks.

196
ICT COMPUTER NETWORKS The Internet

Chapter 4 THE INTERNET

Did you know that the Internet is ranked one of the greatest inventions of all
time? Other great inventions were the wheel and the telephone. (In what
way were the wheel and the telephone great inventions?) The Internet is a
global interconnection of computer networks. Nobody owns it, but anybody
can connect to it.

Why is the Internet so popular? What is its use?

4.1 Use of the Internet

The Internet is a great achievement for mankind. Connecting to the Internet


has three benefits in general.
1. Communication. One can communicate with other people globally at
much reduced cost through use of many communication features, e.g. e-
mail.
2. Retrieval of information. From the Internet, you can retrieve almost
any information you want and on any subject.
3. Commerce. If you do business, you can advertise your products and
services to global customers. You can also buy goods and services
through the Internet.

What are the advantages of connecting to the Internet?

4.2 Advantages of the Internet


1) Educational literature e.g. books and latest publications can be
accessed in almost every field.
2) Entertainment. One can listen to music, can watch movies and
can play on-line games. These can also be downloaded, free or
after paying some subscription fees.
3) Business can be done on the Internet, e.g. an advertisement for
a wide range of products can be made to global customers. You
can also browse the Internet for products that you want to buy.
This is known as e-commerce.
4) E-mail (electronic mail) can be made use of. E-mail is the most
widely used service of the Internet by an average Internet user.
5) Computer software can be downloaded on the Internet. Finding
and buying software without the use of the Internet is extremely
difficult. Sometimes it is impossible, especially in a developing
country like Zambia. Most software requires regular updating once
installed in a computer. Updating computer software, e.g.

197
ICT COMPUTER NETWORKS The Internet

operating system and antivirus software is impossible without


internet connection. (Computer experts, unlike average users, find
this, i.e. point number 5, to be the most important use of the
Internet.)

4.3 Browsing the Internet

What is meant by browsing the Internet?

Browsing the Internet means searching it for whatever you want. To browse
the Internet is simple. You simply start the Internet browser software, e.g.
Internet Explorer, Opera, Google Chrome or Mozilla FireFox. Once in
the browser you can navigate in so many ways. If you already know the
address of what you want, you simply type it in the address box in the
browser and then click on a button to get to the destination, or you can
simply click your mouse pointer on any of the numerous hyperlinks to take
you to the destination of your choice.

4.4 Internet Vs World Wide Web

What is the difference between the Internet and the WWW?

Some people find these two terms confusing. You shouldn't. The WWW is an
infrastructure of information which the Web browser software allows you
access to. The WWW consists of several sites called Websites. Websites are
located in computers called Web servers. There are thousands of Web
servers around the world. These computers store massive information on
different topics. The information contained in these different Websites is
what is collectively known as the World Wide Web (WWW). The WWW is
actually a web of information. The Internet is a system of computers that
accesses and retrieves information from the WWW. That is, you need the
global network of computers (the Internet) to access the global network of
information (the WWW).

198
ICT COMPUTER NETWORKS The Internet

4.5 Website and Web page

What is the distinction between Website and Web page?

This question sounds silly! It is really like asking someone the difference
between a book and a book page. So you see, a Website consists of Web
pages. The information you access on a Website is actually located in Web
pages within that Website, just as the information you access in a book is
located on a particular page within that book. A Web page is actually a
document of information that you access from a Website. A website has an
address like this: www.something.com. You will learn details of web
addresses later in this module.

4.6 Web browser and Search engine

I'm beginning to learn Very good! The browser knows well


something. But, what is the how to take you to the Internet but is
distinction between a Web not very good at taking you to places
browser and a Search of your choice.
Engine?

A web browser takes you to Internet but asks you


What do to give it the address of what you want. It offers
you you links to a number of destinations called
mean? websites or web pages. These links are called
hyperlinks. Search Engine does not ask you for
addresses. It asks you to type keywords of what
you want because it already knows the addresses.
If you give it the keywords it gives you samples of
what you requested for. Then you make a
selection.

My husband, how Through studying when I


and where did was a student at TVTC.
you learn all this?

You said Internet Explorer That’s fantastic memory, my wife.


and Mozilla FireFox are Examples of Search Engines are Yahoo!
examples of browsers. and Google.
What are the examples of 199
popular Search Engines?
ICT COMPUTER NETWORKS The Internet

Yahoo and Google are Search Engines. They


Yahoo and are software used by the Web browser to
Google! What open peoples’ computers and take
do they actually information from there. Somehow, they know
do? where the information everybody wants is
kept. They go right there as long as you give
them the keywords. Of course, they are very
good at making good guesses. They look at
your keywords and then search the WWW for
something similar to what you have requested
for. They even arrange the stuff in the order of
popularity, with the most popular site on top.

They must be very Yes, they are well trained. They have
intelligent. developed some kind of super memory (like
you) which enables them to remember where
they see information on the WWW. I hope I
have satisfied your curiosity. Have I?

We'll be together; I want


Yes. I think I'll also go to to go back for Advanced
that college when I stop Diploma to acquire more
breastfeeding. knowledge.

4.7 Electronic mail (E-mail)

One of the most fascinating things about the Internet for most users is e-
mail. This is a facility available when one connects to the Internet. One can
send and receive text and both video and audio messages using e-mail. To

200
ICT COMPUTER NETWORKS The Internet

send e-mail, one types the message, indicates the address to receive and
clicks a button.

E-mail is meant to make mail more efficient. It also solves the problem of so
much paper wastage, unattended to telephones and delays in going to buy
envelops and stamps, and going to the post office to send the letters. It is
also extremely cheap to send messages by e-mail. In fact e-mail is mostly
free. You must have an e-mail address to be able to send or receive e-mail
messages.

Notice that a website address such www.tvtc.edu.zm differs from an email


address such as [email protected]. The website address, also called
the URL (URL = Uniform Resource Locator), as you can see here, does not
have the @ (at) symbol.

4.8 How to connect to the Internet

Due to the advantages of the Internet as stated earlier, having Internet


access is very useful. It is not difficult to connect to the Internet. You can
connect to the Internet by means of many devices such as cell phones,
computers, e-readers, and IPad. To connect to the Internet by means of a
computer, one requires some resources as listed below.
• A communications channel, e.g. UTP or fibre optic
• A router
• An Internet service provider (ISP)

What is ISP, and why is this important?

The Internet service provider (ISP) is an institution or organisation with


facilities to connect computers to the Internet. It is an ISP which allocates a
domain name and the IP address. In Zambia, examples of ISPs are Zamtel,
Zamnet, CopperNET, Microlink, MTN and Airtel. ISP is important because
connecting to the Internet uses very expensive resources in terms of
hardware and software. Individuals cannot afford the costs. In addition, it
may not be economical to provide your own resources to connect to the
Internet. ISPs acquire these resources but charge fees for providing Internet
services in order to gain from their investment.

What role does the router play?

As was mentioned, signals must be prepared and must be able to find their
correct destinations on the Internet. The router performs these functions. It
is the router which identifies the destination of a signal on the Internet. It

201
ICT COMPUTER NETWORKS The Internet

uses the IP address which the user has specified when making a service
request. Another important function of the router is to prepare signals for
more efficient transmission. Before your signal or message can be sent, the
router splits it into smaller chunks or slices called packets. It is easier to
send information in packets rather than in big chunks. This is just like we cut
nshima into smaller lumps as we eat. Once the message has been split into
packets, the router then identifies the most convenient route for each
packet. Packets don't usually travel along the same route to their
destination. Each packet is given, by the router, some accompanying
information to ensure that it reaches its destination. The receiving computer
re-assembles the packets to form the original message.

Another equally important use of the router is to ensure that only signals
meant for a particular network are allowed to enter the network. The router
acts in the same way as immigration officials at border posts to scrutinise
documents of travellers. Without routers, networks would soon be flooded by
many unwanted signals. See illustration below which shows how a LAN can
be connected to the Internet.

Signal
blocked by ISP Internet
router

Router

Switch

LAN connected to Internet

202
ICT COMPUTER NETWORKS The Internet

EXERCISE 4.0

1. What is Internet?
2. Mention the three functions of the Internet.
3. What is a web browser?
4. What are examples of web browsers?
5. What is a search engine?
6. Mention examples of search engines.
7. What is a website?
8. What is a web page?
9. What is email?
10. How does email make mail efficient?
11. How does a website address differ from an email address?
12. Explain the role of ISP.
13. State three roles of the router.

203
ICT COMPUTER NETWORKS Summary

Summary

In this module you have been introduced to networking. It has been


mentioned and explained that computer networks have advantages due to
the fact that they enable us to share a number of resources such as data or
information, hardware and software resources. They also make
communication to be more efficient.

Different types of network: LANs, MANs and WANs were mentioned. LANS
are those networks that interconnect computers in a building or school
campus. The Internet is an example a WAN and interconnects several
networks globally.

The module also described the various ways in which computers can be
interlinked to form LANs. These various ways are called LAN topologies, and
examples are star, ring, bus, tree and mesh. To interconnect computers to
form a network you need three things: transport media, protocols, and a
naming system. Ethernet is the most popular transport media. TCP/IP is a
network protocol which has become like an international standard. The
naming system used so that computers and networks can be easily identified
is the domain name system (DNS). Using DNS principles, every computer
and every network is given a unique address called the IP address. An IP
address is a dotted decimal number such as 192.168.1.117. Because of the
difficulties to remember IP addresses, they are given domain names such as
tvtc.edu.zm for the Technical and Vocational Teachers' College.

To connect to the Internet you need an ISP, a router and communications


channels. Various communications channels can be used such as UTP,
coaxial cable and fibre optic. These form the wired channels. Wireless
channels such as radio, infrared and satellite can also be used to link
computers and networks.

204
ICT COMPUTER NERTWORKS Self-Assessment Questions

Self-Assessment Questions

Question 1

In a______________, computers can exchange and share information and


resources.
A Office
B Network
C Restaurant
D Organisation

Question 2
Which of the following is not a classification of computer networks?

A NIC
B LAN
C MAN
D WAN

Question 3
A star network is characterized by the fact that
A it is an expensive network to set up
B there is frequent signal collisions
C a token travels round the network
D a host computer controls signals

Question 4
Examine a communications channel shown in the figure below. This must be

A Optic fibre
B UTP
C Coaxial cable
D Infrared
Question 5

Refer to Question 4 again. One characteristic of this communications channel


is that

A it is cheaper to install and maintain


B signal interference is very common
C signal transmission rates are higher
D remote communication is possible

205
ICT COMPUTER NERTWORKS Self-Assessment Questions

Question 6

To set up a school network you must definitely have a


A Router
B Firewall
C Gateway
D Switch

Question 7

Which of the following is the best description about the Internet?

A Permission is required for any computer to connect to the Internet


B It is formed by linking two or more computers anywhere in the world
C Communication is the main function for which it was established
D It is formed by linking many private local area networks in the world

Question 8
An ISP is required if one wants to connect a computer to the Internet
because…

(a) Connecting to the Internet must be cost-effective.


(b) Users do not have any network hardware and software.
(c) The law does not permit individuals to do so.
(d) One computer cannot connect to the Internet directly.

Question 9

The type of computer network that can be set up between TVTC in Luanshya
and ZIBSIP in Kitwe is a…

(a) LAN
(b) MAN
(c) WAN
(d) Tree

Question 10

A _________ is a high-speed network that connects networks in an area


such as a city or town and handles the bulk of communications activity
across that region.
A Local Area Network (LAN)
B Metropolitan Area Network (MAN)
C Wide Area Network (WAN)
D Variable Area Network (VAN)

206
ICT COMPUTER NERTWORKS Self-Assessment Questions

Question 11

A school’s large network is shown below.

(a) What type of computer network topology connects the computers in


the computer room?
(b) What type of computer network topology connects the computers in
the Science laboratory?
(c) Give two reasons for having a computer network in a school.
(d) What is the name of a network of computers on one small site?
(e) Other than cables, state one item of hardware that is needed to
connect a network to the Internet.
(f) The laptop computers are using a wireless connection to the network.
Give one advantage and one disadvantage of using a wireless
connection for the laptops.

Question 12

Luyando and Choolwe Partnership has branches in several towns. Each office
has several computers all connected to a network. Staff at the different
offices communicate by email.

(a) Give two differences between a LAN and a WAN.


(b) Which type of network would be suitable within one of the offices?
(c) The Luyando and Choolwe Partnership are considering getting a
broadband connection for each of their offices. Give two reasons why

207
ICT COMPUTER NERTWORKS Self-Assessment Questions

they should do this rather than continuing to use ordinary dialup


(phone line) access through modems in each branch.

Question 13

Computer networks have become very popular among individuals and


organizations.

(a) Draw a labeled diagram of a client-server network.


(b) State what is meant by client-server network.
(c) State two advantages of client-server network.
(d) State two disadvantages of client-server network.

Question 14

Your school has three members of staff that share the same office. Each one
of them has a desktop computer, and a printer has been allocated to the
office to be shared.

(a) State the network resources which must be made available for the
sharing of the printer to be possible. (Do not include resources which
the computers may already possess.)
(b) Explain why each of the resources you have mentioned should be
available.
(c) Draw a diagram in the space given below to show how the printer
would be shared.
(d) “For our Internet connectivity, we’ll need the following: Router, ISP
and Firewall”. Suggests an IT technician. State reasons or use for
each of the suggested items.

Question 15

To set up a computer network, three things are required. What are these
resources, what are the examples and explain why they are required.

208
ICT COMPUTER NETWORKS References

References

7. French, C. S (2002) COMPUTER SCIENCE, 5th Edition, Book Power,


London

8. Williams, B. K. , Sawyer, S. (2007) USING INFORMATION


TECHNOLOGY, 11th Edition, McGraw- Hill,
Boston

9. Lauden, T., INFORMATION TECHNOLOGY, Concepts and Issues


Beekman

209
ICT COMPUTER NETWORKS Further reading

Further reading
1. http://www.giac.org/cissp-papers/32.pdf
2. http://www.fotosearch.com/CSP563/k5633539/
3. http://www.google.co.zm/search?q=images+of+pupils+in+Zambia&btnG
=Search&hl=en&tbm=isch&tbo=u&biw=1600&bih=754
4. http://www.google.co.zm/search?q=images+of+cisco+router&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=QIKvT760CcHjtQad
v6ypBA&ved=0CH4QsAQ&biw=1600&bih=754

210
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

Answers to Self-Assessment Questions

1 B 6 D

2 A 7 D

3 D 8 A

4 A 9 C

5 C 10 B

11 (a) Star network


(b) Bus network
(c) Any two reasons, e.g.
• sharing hardware resources
• sharing software resources
• sharing data
• collaborating on tasks
• communication
(d) Local area network or LAN
(e) Router
(f) Advantage: faster and cheaper to set up
Disadvantage: poor security

12 (a) LAN interconnects computers at a local place, e.g. an office or a


school campus, and WAN interconnects computers on a global
scale, or between cities, or between countries.
(b) LAN
(c) Two advantages for broadband connection:
• Has greater bandwidth, therefore there is fast signal
transmission.
• Suffers less signal interference.
13 (a) Diagram of client-server network:

Client Server Client


Client

(b) Meaning of client-server network:


Network which has a central node which controls communication
and to it are connected a number of terminals.

211
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

(c) Two advantages of client-server network:


• Easier to set up.
• Improved security.
(d) Two disadvantages of client-server network:
• When server is down, the whole network is affected.
• Data transmission rates are low.
14 (a) Switch and UTP
(b) Switch - To distribute signals and to boost signals when they
become weaker.
UTP - To provide a path through which signals pass between
nodes.
(c) Diagram showing shared printer:

Client Client

Server

Client Printer

(d) Router:
• To split signal into packets for easier transmission
• To determine direction of signals
• To prevent signals not meant for a particular network from entering
it
ISP:
• To provide internet access to clients
• To allocate domain names to clients
Firewall:
• To prevent malicious code from entering or leaving a network or
computer
15 Required resources for setting up computer network:
• Transport media, e.g. Ethernet.
• Protocols, e.g. TCP/IP, and
• Naming system, e.g. DNS
• Transport media is required for conveying signals between nodes or
networks.
• Protocols are required for ensuring that nodes are able to
communicate with each other.
• Naming system is required in order to ensure that nodes are
uniquely identified on networks.

212
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

Module 5

IT SECURITY AND SOCIAL ISSUES

Objectives

After studying this module, you should be able to:

1. State what is meant by IT security.


2. State that there are two types of IT security.
3. Name and define the two types of IT security.
4. State the different types of threats on IT resources.
5. State and explain different measures to improve on IT security.
6. State what is meant by computer virus.
7. State the three categories of computer virus.
8. Explain how the three categories of computer virus differ from one
another.
9. State and explain how computers become infected with viruses.
10. State and explain how to minimise virus infection of computers.
11. State the role of antivirus software in a computer.
12. Scan a computer for viruses.
13. State what is meant by hacker and cracker.
14. State what is meant by password.
15. State and explain how to ensure that a password is secure.
16. State what is meant by data encryption.
17. Explain the importance of data encryption.
18. State and explain how computers can be used to infringe on the privacy
and reputation of others.
19. State how computers can be used to perpetuate crime and other
unethical behaviour.

213
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

To every good thing, there is always some dark side. This is true with ICTs.
They have numerous advantages as you can now testify. However, all is not
rosy. ICTs also pose so many headaches. One of the major issues is that of
ICT security. Others are to do with privacy and ethics.

Security refers to the defence necessary to ward off threats imposed on IT


resources. Security is ensuring that resources are free from unauthorised
internal and external manipulation. There are two types of security:
physical security and data security.

• Data security ensures that data, information and software are safe
from internal and external threats.
• Physical security ensures that all the various types of hardware are
safe.

Types of threats

214
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

There are many threats to IT resources. Some of the threats are as follows:

1. Unauthorised access of individuals to data storage.


2. Incorrect use of hardware and software, media or computer rooms.
3. Unauthorised manipulation of data files or equipment.
4. Theft of data or hardware.
5. Fire/water.
6. Environmental conditions, e.g. temperature and humidity.
7. Viruses and other malicious code.

Measures to improve on security

A number of measures should be used to protect IT resources against


threats. Examples of possible measures are:

1. Keeping all doors to computer rooms locked so that access is upon


permission granted.
2. Locking computers so that only personnel with computer keys can
unlock and use them.
3. Using passwords to start computers and to open files.
4. Installing alarm systems so that the presence of intruders, fire, smoke,
water etc, can be identified.
5. Installing air conditioners so that the room temperature and humidity
are automatically regulated
6. Backing up all data and programs so that should the data and
programs that are used become corrupt, backups can quickly be
used.
7. Keeping data and program backups in a separate room which is also
secured.
8. Training users about how to be security conscious and how to react in
an event of a disaster.
9. Training users how to properly use software and hardware.
10. Installing antivirus software and keeping it updated.

Steps that are formulated to be taken or followed when a disaster strikes


are called disaster recovery plan.

215
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

COMPUTER VIRUSES

A computer virus is a program that is meant to cause some kind of damage


or discomfort when it is activated on an infected computer. Virus is a general
term, but viruses are in categories.

• Viruses are those malicious codes that are capable of replicating


themselves and attack computer programs in memory.
• A Trojan horse is a program disguised as something useful, which
when run does damage to the computer system while appearing to do
something else.
• A virus that propagates itself across computer networks, usually via e-
mail, is referred to as a worm.
The increase in transactions over the Internet has greatly increased the
chance of virus infection.

How computers become infected with viruses

There are many ways in which a computer may become infected by a virus.
Some of the common ones are as follows:

• Transfer of removable storage media, e.g. floppies, CDs and flash


disks, from one computer to another.
• Through e-mail. When you receive and open an infected e-mail, your
computer gets infected.
• Through downloads, e.g. of music, pictures, videos, documents and
software on the Internet.

How to minimise virus attacks

To minimise the possibility of your computer getting infected by viruses,


observe the following guidelines:

1. Avoid exchanging removable storage media with other people.


2. Don’t read e-mail from people you do not know.

216
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

3. Don’t read e-mail from people you know but from whom you do not
expect e-mail.
4. Avoid the temptation to download anything you find interesting on the
Internet.
5. Don’t click on pop ups and other adverts that flash on your screen as
you browse the Internet. This requires a lot of personal discipline.
Many people simply get so excited with what they see on the screen
that they fail to hold themselves. But often they end up with lots of
problems which they regret.
6. Search for information by typing keywords in the Search Engine.
7. Ensure that your computer has latest versions of antivirus software.
8. Always update the antivirus software from the Internet.
9. Always scan your computer for viruses.

Hackers and Crackers

Obviously you know that there are people that find pleasure to see others
suffer. They are called sadists. Yes, there are sadists even on the Internet. A
hacker is a person who gains access to someone’s computer or network.
Some hackers do this with sinister or evil intentions. These hackers are
called crackers. Crackers always gain unauthorised access with the
deliberate intension to cause havoc. A cracker can steal your data or destroy
it. Sometimes a cracker will not enter your computer but he/she will
intercept your data and do anything to it. To protect yourself against
crackers, you should use very secure passwords and encrypt your data
during transmission. Secure passwords are those that do not use any names
of people, organisations and things like dates which a cracker can easily
decode. Secure passwords should contain alphanumeric characters that
should be extremely difficult to guess by anyone.

However, hackers and crackers use very sophisticated methods to crack


passwords. They use advanced programs which are capable of unlocking
what you may think is very secure. One approach to defeat cracker is to
ensure that you don’t use the same password for a long time. However,
should you forget the password you will not be allowed access to your own
data or computer system.

217
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions

Study questions

1. Someone remarks that she has a computer that she uses everyday with
no threat whatsoever of viruses and hackers. To what extent can this be
true?
2. Spam is e-mail that you receive from people that you do not even know.
Suggest how spam reaches your mail box.
3. When you start your computer, you find a message on the screen
warning you that your computer might be at risk. What does this
message mean, and what is it suggesting to you?
4. What is the difference between a Trojan horse and a worm?
5. What is the difference between spyware and spam?
6. Suppose that you notice that your computer has become very slow. When
you try to open programs it takes a very long time to do so. What are the
likely causes, and how would you resolve the problem?
7. What precautions should one take when assigning or using passwords?
8. Distinguish between physical security and data security.

218

You might also like