ICT Modified Module.
ICT Modified Module.
✓ Introduction to ICT
✓ Computer Hardware
✓ Computer Software
✓ Computer Networks
✓ IT Security and Social Issues
This material is the property of the Technical and Vocational Teacher’s College.
Website: www.tvtc.edu.zm
3
ICT INTRODUCTION TO ICT
Foreword to module 1
Dear student,
Here we go!
All this has now changed because we live in the world of ICT. ICT is a
subject or a technology which has, more than anything else, changed
completely the way we live. ICT will continue to influence our lives in more
ways than we can imagine now. ICT has revolutionized the way we generate,
store and process information, and the way we communicate that
information. No one is left behind. An individual on the street or at home, a
worker in a factory or office, a teacher, an accountant, an engineer, and
even a pastor, all find this one thing – ICT- irresistible.
So, what is it really? What are the benefits or potential benefits, how is it
changing? Where is it taking us? As you study ICT, reflect on these issues.
TVTC
4
ICT INTRODUCTION TO ICT
Table of contents
Foreword ......................................................................................................................................................4
Introduction..................................................................................................................................................7
Objectives .....................................................................................................................................................8
Chapter 1: THE ROLE OF ICT .......................................................................................................9
1.1 The role of ICT to an individual ........................................................................................9
1.2 The role of ICT in education...............................................................................................9
1.3 The role of ICT to students ................................................................................................9
1.4 The role of ICT to a teacher.............................................................................................10
1.5 The role of ICT to a school manager ............................................................................11
1.6 The role of ICT in business...............................................................................................11
1.7 E-learning and M-learning ................................................................................................12
1.8 Some of the disadvantages of ICTs in education.....................................................13
1.9 Examples of ICTs that can be used in education .....................................................14
Chapter 2: COMPUTERS ...............................................................................................................18
2.1 Advantages of computers .................................................................................................18
2.2 Disadvantages of a computerised systems ................................................................19
2.2.1 What are the limitations of computers, and how do they come about? .....19
EXERCISE 2.1 ................................................................................................................................20
2.4 What is a computer?...........................................................................................................20
EXERCISE 2.2 ................................................................................................................................20
EXERCISE 2.3 ................................................................................................................................22
Chapter 3: CLASSIFICATION OF COMPUTERS.....................................................................23
3.1 Microcomputers ....................................................................................................................24
Exercise 3.1....................................................................................................................................24
3.2 Servers ...............................................................................................................................25
3.3 Minicomputers .................................................................................................................27
3.4 Mainframe computers ...................................................................................................27
3.5 Supercomputers..............................................................................................................28
EXERCISE 3.2 ................................................................................................................................28
Chapter 4: PARTS OF A COMPUTER .......................................................................................29
5
ICT INTRODUCTION TO ICT
6
ICT INTRODUCTION TO ICT
Introduction
1. What is ICT?
2. In what way is ICT important to you as an individual?
3. In what way is ICT important in your profession?
4. In what way is ICT changing or dictating the way we live?
5. What makes up ICT?
This module will focus on these questions. Although questions 2, 3 and 4 are
obviously subjective, as ICT is not affecting all people in the same way due
to their different circumstances, ICT has a more profound influence on
individuals and organizations in the modern age. This module highlights
some of the ways in which ICT is impacting on our activities and civilization.
In discuses the many uses of ICT for example in education and in business.
It shows, for example, that with appropriate use of ICT there is greater
potential to provide education to as many people as possible and to also
greatly improve the quality of learning at the same time.
Now let’s turn to the first question so that we begin to clear the way for
more understanding of what this module is all about.
We will begin by defining what ICT is. The letters ICT stand for Information
and Communications Technology. ICT is made up two technologies that
have somehow merged. These technologies are Computer Technology and
Telecommunications Technology. Therefore, ICT is a combination of
systems for capturing, storing, retrieving, processing, transmitting and
receiving information. Throughout your ICT course you will be learning
details about these various ways in which ICT is used. This module sets the
stage for the subsequent modules in which you will learn details about the
two technologies which make up ICT.
7
ICT INTRODUCTION TO ICT
Objectives
So, do you really want to study ICT seriously? If you do, then after studying
this module you should be able to:
8
ICT INTRODUCTION TO ICT THE ROLE OF ICT
First and foremost you are an individual. ICT can be used in many ways to
improve your life, for example in the following daily activities:
• Collecting data
• Storing data
• Retrieving data
• Processing data
• Sending information
• Receiving information
There are five different hierarchical levels of education where ICTs can be
used:
• presentation
• demonstration
• drill and practice
• interaction
• collaboration
If you cannot figure out what these things mean, don’t worry because the
meaning of each one of them will be explained in due course.
If you are studying this module you probably must be a student. Students
can use ICT in many ways, .e.g.
9
ICT INTRODUCTION TO ICT THE ROLE OF ICT
Do you think ICT has benefits for teachers? Of course you do. As we said
earlier, it has enough stocks for everyone. Teachers can use ICT in many
ways, e.g.
10
ICT INTRODUCTION TO ICT THE ROLE OF ICT
• Processing of information
• Efficient communication with schools, partners, sponsors and parents.
• Assisting in learner administration, e.g.
o Admission procedures
o Induction
o Storage of learners’ progress records and personal data
• Assisting in staff administration, e.g.
o Storage of personal data and professional development planning
records
• Assisting in library administration
• Assisting in resource management
• Assisting in establishing and maintaining contacts with labour market /
future employers
• Assisting in programme planning and development
ICT plays a vital role in modern business. Some of the benefits of ICT in
business are as follows:
11
ICT INTRODUCTION TO ICT THE ROLE OF ICT
If you want to understand and appreciate what Elearning and Mlearning are,
first reflect on traditional learning. Traditional learning involves face to face
contact. This is a type of learning in which the learner and the teacher are
physically in the same place at the same time. Some of the disadvantages of
face to face learning are as follows:
12
ICT INTRODUCTION TO ICT THE ROLE OF ICT
such a way that the learner uses mobile technologies to support his/her
learning.
Although ICTs have many potential benefits in education, they also have
some disadvantages such as the following:
13
ICT INTRODUCTION TO ICT THE ROLE OF ICT
Telephone
Cell phone
14
ICT INTRODUCTION TO ICT THE ROLE OF ICT
Television
Radio
15
ICT INTRODUCTION TO ICT THE ROLE OF ICT
Cameras
Computer
Audio tape
16
ICT INTRODUCTION TO ICT THE ROLE OF ICT
Video tape
CDs/DVDs
Internet resources
17
ICT INTRODUCTION TO ICT COMPUTERS
Chapter 2: COMPUTERS
Computers play a very important role in our modern lives. There is no day
that passes without computers affecting our lives directly or indirectly.
Without doubt, you must be agreeable that computers are extremely useful.
These machines have brought about a number of advantages, perhaps more
than any other machine has in the past.
Because computers can work mostly without human intervention, they can
be used to automate many operations and many systems. For example,
computers can lead to office automation. Office automation means that a
computer is used to do most of the operations. (What are some of the office
operations or activities which you would perform with the help or
computers?)
Computers are the best machines to use for the activities listed above
because of their characteristics which include the following:
i.) They work very fast
ii.) They work very accurately
iii.) They are very consistent
18
ICT INTRODUCTION TO ICT COMPUTERS
19
ICT INTRODUCTION TO ICT COMPUTERS
EXERCISE 2.1
a) List down at least ten routine tasks that you perform in your school or at
home. Which of these tasks would require the use of computers? Why do
you think so?
b) State the main disadvantages of a computer.
c) Explain why the use of computers greatly improves on efficiency.
d) What is meant by saying that the use of computers has economic
benefits?
e) Why are computers capable of being used to automate many human
operations?
f) List four beneficial characteristics of computers.
g) Suggest one way in which a computer can be used to reduce the risks of
danger.
h) Someone suggests that a modern teacher must be computer literate. To
what extent do you agree with this suggestion?
i) What is meant when we say that computers are programmed machines?
I know you are saying that a computer is a machine. But what type of
machine is it? Are you saying that it is an electronic machine? If you are,
then you are correct. However, is a computer the only machine which is
electronic? Or is every electronic machine a computer?
EXERCISE 2.2
Did you include radio, TV, calculator and VCR? You probably did. Are these
machines computers? Of course they are not. Perhaps you are thinking that
your scientific calculator is a computer. Is it a computer? It is not. Is it
surprising because all these are electronic machines? Please note. Not every
electronic machine is a computer!
20
ICT INTRODUCTION TO ICT COMPUTERS
For example, the current which flows in your TV to give the pictures is digital
in nature, and the current which flows in your electric bulb to produce light is
analog in nature.
Let’s continue. Looking at the definition of computer given above, you might
be wondering why a scientific calculator is not a computer since it can also
do most of the tasks stated for a computer. Note that the difference is that a
scientific calculator can perform only some of the tasks and not all of them.
For example, a scientific calculator cannot present results to you in any
desired format, and requires that for it to operate you must constantly
interact with it by pressing the buttons. If you stop pressing the buttons, it
also stops doing the operations. On the other hand, a computer does not
stop operating when the user stops his/her actions.
21
ICT INTRODUCTION TO ICT COMPUTERS
EXERCISE 2.3
Computers play a key role in how individuals work and how they live. Even
the smallest organizations have computers to help them operate more
efficiently, and many individuals use computers at home for educational,
entertainment, and business purposes. In this module, you will learn the
basics about computers; the different categories of computers, and what
makes up a computer.
22
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
• Microcomputers
• Servers
• Minicomputers
• Mainframe computers
• Supercomputers
The supercomputers are the largest in physical size, have the fastest
processing speed, have the largest memory and storage, are the most
costly, have the most sophisticated or complex hardware and software,
require the most controlled environment, and are the most complicated to
use.
The mainframe computers rank second, the minicomputers third and the
microcomputers last in these qualities or specifications. Each category of
computers will be described in various sections below, starting with
microcomputers.
23
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
3.1 Microcomputers
a) They are small in size, and therefore do not occupy large space. Some
of them, e.g. laptops, are portable.
b) They are not as costly as the other computers.
c) They do not require sophisticated hardware and software.
d) They are easier to operate and maintain.
e) They can operate in ordinary environments, i.e. they do not
necessarily require highly controlled environments.
f) They can be connected in a network in order to increase their
efficiency and effectiveness.
g) Their capability can be increased to equal the capability of higher
computers.
• Desktop computers
• Laptop computers
• Notebook computers
• Netbook computers
• Palmtop computers
• Wearable computers
Exercise 3.1
1. Computers can also be classified as special purpose, general purpose, analog or
digital. What differences are there among these types?
2. What factors would you consider before buying your own computer or one for
your organisation?
24
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
Wearable computer
3.2 Servers
Servers are not designed to be used directly. They make programs and data
available for people hooked up to a computer network, a collection of
computers connected together so that they can exchange data. See
illustration below.
25
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
26
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
3.3 Minicomputers
Minicomputers are multi-user systems that can handle the computing needs
of a smaller corporation or organization. Many people use them
simultaneously by means of remote terminals or personal computers.
Minicomputers were the second type of computers to be introduced.
What are mainframe computers, and what are they used for?
27
ICT INTRODUCTION TO COMPUTERS CLASSIFICATION OF COMPUTERS
3.5 Supercomputers
EXERCISE 3.2
1. What is the difference between a server and a minicomputer?
2. Why would you not recommend the purchase of a supercomputer for
your school?
3. What is meant by ‘Computer Network’?
4. What is a ‘remote terminal’?
5. What are the advantages of using a server?
6. What would you use a minicomputer, a mainframe computer and a
supercomputer for?
7. Which type of computer was made first?
28
ICT INTRODUCTION TO ICT PARTS OF A COMPUTER
Yes, you need to know what makes up a computer. First of all you have to
know what your computer must have and how you can tell that it has a
problem. If you do not know what makes up a computer, or what your
computer has, it is difficult to know what you can include or exclude from
your computer. It is also possible for someone, for example, to try to sell to
you a computer that cannot work, or one that has very limited use. It also
becomes difficult to fix even some minor problems. In addition, you cannot
understand easily some of the messages that a computer gives during use.
29
ICT INTRODUCTION TO ICT PARTS OF A COMPUTER
Therefore,
EXERCISE 4.1
1. What does a computer consist of?
2. What is hardware?
3. What is software?
4. Why does a computer have hardware?
5. Why does a computer have software?
30
ICT INTRODUCTION TO ICT Summary
Summary
In this introductory module you have learnt about what ICT is. It has been
shown that ICT is very useful to a wide range of operations by different
categories of people: individuals, students, teachers, school managers, office
and other workers. Generally ICTs are used to capture, store, retrieve,
process, send and receive information.
The module also indicated that there are various types of ICTs such as
telephones, cell phones, radios, TVs, VCRs, computers, etc. and that all
these can be used to increase or improve one’s productivity.
31
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS
SELF-ASSESSMENT QUESTIONS
From Question 1 to Question 17, indicate your answer by selecting the letter
for the best alternative. For Questions 18 to 20, write your answer. Answers
to the questions are given after the References. You should avoid the
temptation of trying to look at the answers before attempting ALL the
questions first.
4. Jane, Benson and Dorothy live in different towns. The three agree to
work as a team on a report about the extent of ICT use in the Zambian
education system. Using remote means, they are able to discuss and
show one another their research results. This teamwork can best be
described as:
A Demonstration
B Interaction
C Discussion
D Collaboration
32
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS
10. Which of the following would not be the best use of ICT by a student?
A Communicating with friends
B Collaborating with colleagues
C Communicating with lecturers
D Researching for study materials
33
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS
12. Suppose that you own a stand-alone computer which assists you to
perform a number of activities. Which of the following computer-
related crimes would impact on you the most?
A Virus attacks
B Pornography
C Software piracy
D Harassment
13. A computer system which you would recommend for storing all the
school records and assisting in the sharing of computer resources
among the various employees is
A Mainframe
B Server
C Minicomputer
D Microcomputer
34
ICT INTRODUCTION TO ICT SELF-ASSESSMENT QUESTIONS
17.
The picture above shows one variety of microcomputers. From this we can
conclude that microcomputers are popular because
A They are portable
B They use less sophisticated software and hardware
C They can be upgraded easily
D They do not require air-conditioned rooms
18. Many people agree that computers are very useful tools. State five
advantages which they have.
19. List five ways in which ICTs can be useful to a school manager.
20. Suppose that you wanted to buy your own computer. Outline the
procedure you would follow.
35
ICT INTRODUCTION TO ICT References
REFERENCES
36
ICT INTRODUCTION TO ICT Further Reading
Further reading
http://www.google.co.za/search?q=Images+of+cds&hl=en&prmd=imvns&tb
m=isch&tbo=u&source=univ&sa=X&ei=mLFxT-
SZOKn04QSqranqDg&ved=0CDEQsAQ&biw=1680&bih=880
http://www.google.co.za/#hl=en&sclient=psy-
ab&q=Images+of+radios&oq=Images+of+radios&aq=f&aqi=&aql=&gs_l=se
rp.3...5551l10384l0l10655l9l9l0l0l0l0l0l0ll0l0.frgbld.&pbx=1&bav=on.2,or.r_
gc.r_pw.r_qf.,cf.osb&fp=636f784017134044&biw=1680&bih=880
http://www.google.co.za/#hl=en&sclient=psy-
ab&q=Images+of+television&oq=Images+of+television&aq=f&aqi=&aql=&g
s_l=serp.3...34791l40777l1l41383l10l10l0l0l0l0l0l0ll0l0.frgbld.&pbx=1&bav
=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=636f784017134044&biw=1680&bih=88
0
http://www.google.co.za/search?q=Images+of+microcomputers&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=orRxT7WIC8LGmQWG
-8TGDw&ved=0CCYQsAQ&biw=1680&bih=880
http://www.google.co.za/search?q=Images+of+minicomputers&hl=en&prm
d=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=jrVxT4D4OMfDmQWciLS
0Dw&ved=0CCsQsAQ&biw=1680&bih=880
http://www.google.co.za/search?q=Images+of+mainframe+computers&hl=
en&prmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=37VxT6qAOafJm
AX50qnTDw&ved=0CCIQsAQ&biw=1680&bih=880
http://www.google.co.za/search?q=Images+of+server+computers&hl=en&p
rmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=SrZxT82qMc3LmAX1v
YzQDw&ved=0CCIQsAQ&biw=1680&bih=880
http://www.google.co.za/search?q=Images+of+supercomputers&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=ubdxT9LIGeHmmAXkq
bXRDw&ved=0CCwQsAQ&biw=1680&bih=880
37
ICT INTRODUCTION TO ICT Further Reading
1. D
2. D
3. A
4. D
5. C
6. B
7. C
8. A
9. C
10. A
11. C
12. A
13. B
14. D
15. C
16. B
17. A
18. Advantages of computers: Check from this list
• Work is done very fat.
• Work is done very accurately.
• Routine work can easily be done.
• There is very large storage for data.
• There is reduction in processing costs.
• There is great improvement in customer service.
• Work in inaccessible places can easily be done
19. Ways in which ICTs can be useful to a school manager: check from
this list
• Storing records
• Fast retrieval of records
• Fast and accurate processing of data
• Improved communication with parents, sponsors, suppliers,
colleagues, authorities
• Improved management of staff
• Improved management of resources
38
ICT INTRODUCTION TO ICT Further Reading
Foreword to module 2
Dear Student,
In Module 1, you were introduced to ICT. You learnt about the value of ICT
to various categories of people such as business people, students, teachers
and education administrators. It was mentioned that computers are very
useful tools for performing and automating various operations for individuals
and organizations. The module further introduced you to the various
categories of computers: microcomputers, servers, minicomputers,
mainframe computers and supercomputers. You learnt that microcomputers
are the most widespread, and reasons for this were given. Finally, the
module introduced you to the basic parts of a computer system.
39
ICT INTRODUCTION TO ICT Further Reading
In this module, you will learn in detail about computer hardware. This should
help expel some of the myth that surrounds the computer. You should pay
particular attention because this module forms the core of your study in ICT.
How well you understand what computers really are and how you can make
great use of them depends on how you comprehend the material presented
to you in this module.
The module has been prepared in such a way that each section starts with
questions. These are the questions which you must address as you study the
module. Each question has been answered by giving clear explanations and,
where necessary, suitable examples. If you find that the explanations or
examples are not clear or sufficient, do not hesitate to contact you lecturer
for more support.
TVTC
Introduction
What is hardware?
There are many things that make up computer hardware. To simplify the
understanding, these parts are often classified as:
• Input
• Output
• Processor, and
• Storage
40
ICT INTRODUCTION TO ICT Further Reading
Objectives
41
ICT INTRODUCTION TO ICT Further Reading
• Draw a diagram of a computer showing input, output and the major units
of the processor.
• State the functions of control unit (CU), arithmetic and logic unit (ALU),
random access memory (RAM) and read only memory (ROM).
• Name the various registers of the CU and state their functions
• Name the various buses in the processor and state their functions.
• State what is meant by booting a computer and how the ROM, BIOS and
CMOS get involved.
• State what is meant by program execution and how it occurs involving
the CU, the RAM, the ALU and the registers.
42
ICT INTRODUCTION TO ICT Further Reading
• These
special keys are called command or function keys. Function keys
have labels F1 to F12.
43
ICT INTRODUCTION TO ICT Further Reading
signal travels to the computer which interprets which key was pressed and
how it was pressed.
1.1.1.1 Types of keyboards
There are different types of keyboards in use. The most common type of
keyboard is called the standard keyboard. The standard keyboard has the
keys arranged on the QWERTY format. Although the standard keyboard is
the most popular, some people believe, correctly for that, that it is not very
convenient for typing. One of its disadvantages is that it is not very flexible
to allow for hand and wrist comfort. Therefore, it is believed that a health
hazard condition called repetitive strain injury (RSI) may result with
constant use of the standard keyboard. Another point against the standard
keyboard is that even very experienced typists cannot type fast enough with
it. For these and other reasons, other types of keyboards have been
developed to provide better alternatives. Examples of such keyboards are
those called ergonomic keyboards. Ergonomic keyboards are meant to be
more user-friendly - to provide more comfort and typing speed. Some of
these keyboards do not have fixed assemblies like the standard keyboard.
Instead they have parts that can be separated or adjusted to accommodate
the comfort of the user. Others are designed with special features that
provide hand and fingers support.
44
ICT INTRODUCTION TO ICT Further Reading
45
ICT INTRODUCTION TO ICT Further Reading
46
ICT INTRODUCTION TO ICT Further Reading
47
ICT INTRODUCTION TO ICT Further Reading
48
ICT INTRODUCTION TO ICT Further Reading
1.1.3.1 Scanner
What is a scanner, and what is it used for?
A scanner allows you to scan documents, pictures, or graphics and view
them on the computer. You can also use software to edit the items you
scan.
Some facts about scanners are as follows:
• They are used to put printed pictures and text into a computer.
• They convert an image into dots that the computer can understand.
• To scan text, optical character recognition (OCR) software is needed.
49
ICT INTRODUCTION TO ICT Further Reading
1.1.3.2 Microphone
• It is used to put sound into a computer.
• The computer must have sound recording/playing or editing software,
e.g. Windows Media Player and Audacity, respectively.
• A sound card may also be required on the computer.
• The sound card converts analog signals to digital signals and vice
versa.
50
ICT INTRODUCTION TO ICT Further Reading
1.1.3.4 CD-ROM/DVD-ROM
• These can be used to put both sound and images into a computer.
• They use laser light to read a Compact Disk (CD) or a DVD disk.
Note: These are often also used as OUTPUT devices.
51
ICT INTRODUCTION TO ICT Further Reading
52
ICT INTRODUCTION TO ICT Further Reading
Well, you have seen that the various input devices in use are used in
different ways. There is a variety of input devices because some of them are
specific for inputting only certain types of signals into the computer. For
example, if you wanted to type a report, the most convenient for composing
the report could be the keyboard. But if you wanted to place a photograph
into a computer, the most convenient input would be the scanner. Others
are chosen for their speed, convenience. In short, the choice of input device
we have is determined by things such as:
53
ICT INTRODUCTION TO ICT Further Reading
1.3 Exercise 1
• What is a computer input device?
• Why is there a variety of computer input devices?
54
ICT INTRODUCTION TO ICT Further Reading
Up to this point, you have learnt about input devices, what they are, their
examples, and why you need them on your computer. In this chapter you
will learn about output devices. To motivate our study, here are some
questions:
• What is an output device?
• Why does a computer require output?
• What are the various types of output?
• Why is it important to have various output devices?
What is an output device?
An output device is a device used to give feedback to the person using the
computer.
Why does a computer require output?
Imagine that a computer had no output device. Then you wouldn’t be able to
tell what the computer did for you. Why? This is because, as you learnt
55
ICT INTRODUCTION TO ICT Further Reading
earlier in the last chapter, a computer works with signals or data that are in
machine language or code - the 0s and 1s. So, within the computer, your
data is simply a large collection of strings of these 0s and 1s which you
cannot obviously comprehend as a human being. Therefore, after the
computer has worked on your data in machine code and it is time to give
feedback to you, it must convert these binary codes representing your data
into the language or form which you can understand. The computer sends
these codes to the output device which does the conversion to human
understandable form. The output device may display the information on a
screen, create printed copies or generate sound depending on the device
which you are using. This is what you will learn in the next section.
56
ICT INTRODUCTION TO ICT Further Reading
LCD Monitor
CRT Monitor
Speakers
Laserjet Printer
Deskjet Printer
57
ICT INTRODUCTION TO ICT Further Reading
Plotter
CRT Monitor
• Monitors used to be called Cathode Ray Tubes (CRTs) because of the picture
tube, which is a large vacuum tube.
• A monitor or display produces a soft copy. When the device is turned off the
information is erased.
58
ICT INTRODUCTION TO ICT Further Reading
LCD Monitor
Displays are flat and use plasma, LCD, or some other technology.
Advantages:
• They are cheaper than LCD monitors.
• They are easy to repair.
Disadvantages:
• They occupy a lot of space on the desk.
• They consume a lot of electrical energy.
2.1.1.2 LCD Monitors
They use liquid molecules.
Advantages:
59
ICT INTRODUCTION TO ICT Further Reading
Advantages:
• They can be used with carbon paper to print multiple copies at once.
• Their ribbons are not very expensive.
• They are durable.
• They are excellent for high volumes of printing where high quality is not
essential.
• The ribbons fade gradually instead of abruptly running out of ink like in a
deskjet printer.
• The ribbon does not dry out easily, so the print looks good even if the printer
is rarely used.
• They can use fanfold paper, i.e. paper that is connected in a long continuous
sheet.
60
ICT INTRODUCTION TO ICT Further Reading
Disadvantages:
• They are very slow; they print one line or one character at a time.
• They make so much noise when printing.
• Print heads are difficult to replace when they get worn out.
• Their printout has low quality.
• They can print in black only.
• They are more prone to paper jamming, and their jams are more difficult to
clear.
Advantages:
61
ICT INTRODUCTION TO ICT Further Reading
Advantages:
62
ICT INTRODUCTION TO ICT Further Reading
2.2 EXERCISE
• What is an output device?
• Give examples of computer output devices.
• Why is there a variety of output devices?
• What is meant by softcopy output device?
• What is meant by hardcopy output device?
• Why would you want your computer to have both the monitor and the
printer?
• For what kind of work would you use an impact dot matrix printer, a
desk jet printer or a laser jet printer?
• A payroll assistant who has a desk jet printer requests a teacher who
has an impact dot matrix printer to exchange their printers. Explain
why this is a good suggestion.
• What do you understand by resolution of an output device?
• Someone suggests that a laser jet printer is the best printer. Do you
agree or disagree? Explain.
63
ICT INTRODUCTION TO ICT Further Reading
So far, you have learnt about input and output devices. You have learnt why
a computer requires these systems. Storage is another system which is very
important on a computer. But before we continue, let’s put this point in
focus by asking these questions:
• What is a storage device?
• Why does a computer require storage?
• What are the various types of storage?
• Why is it important to have various storage devices?
What is a storage device?
A storage device is anything that we use to store computer data or signals.
Why does a computer require storage?
A computer requires storage for two reasons:
• To store user data, and
• To store computer programs
What is the difference between user data and computer programs?
By user data we mean the data that you create as you use the computer.
Instead of keeping your data in paper folders, box files, shelves or file
cabinets, you can keep the documents in the computer. Using the computer
to store data has many advantages than using any of the manual storage
facilities mentioned above. For instance, you can store very large amount of
data in a very small space in the computer. In addition, the data can also be
accessed very quickly.
A computer is not used for keeping user data only. A computer uses various
programs, or software. These programs are also stored on the storage.
Therefore, a computer must always have enough storage to keep both user
data and computer programs.
How does a computer store information?
The computer stores information as a string of zeros (0) and ones (1).
• The standard string length is eight 0's or 1's in a row, e.g. 11110001, or
10001110.
• Recall that this standard length is called byte.
• A byte equals one character.
• A character is a letter, number, or symbol - it is about anything that can
be typed on a keyboard.
• There are 256 standard characters used by almost all computers.
64
ICT INTRODUCTION TO ICT Further Reading
65
ICT INTRODUCTION TO ICT Further Reading
retrieved in a sequence. The computer has to search for the required data from the
beginning of the tape until it finds what it is looking for.
An optical disk is a storage device which uses light to store data on it. This type of
disk uses laser technology. Laser is a type of light. An example of an optical disk is
the ordinary audio compact dick (CD). The optical disk used in a computer for
storage is called compact disk-read only memory, CD-ROM . Unlike magnetic
tape and magnetic disk, which can be recorded and erased a number of times, the
CD-ROM is recorded once. However, there are some that can be erased and
recorded many times. An example is a CD-RW (i.e. Compact Disk - Re-writable.) A
CD-R (i.e. Compact Disk – Recordable) is written on once only.
66
ICT INTRODUCTION TO ICT Further Reading
is a flash disk which has replaced a floppy disk as a common removable storage
medium.
In a computer, a disk is controlled in order for the computer to write or read data
on it. The unit that controls the disk is known as the disk drive. A floppy disk drive
controls the floppy disk, the hard disk drive controls the hard disk and the optical
disk drive controls the optical disk.
Disk drives are identified by the letters A, B, C, D and so on. Disk drives A and B
are for floppy, and disk drive C is always for the hard disk. The CD-ROM takes the
first letter after the hard disk has been allocated the drives. Disk drives A and B are
no longer included on new computers. Thus, the common arrangement now is: C
and D where C is hard disk and D is CD-ROM. If you connect a flash disk, it is
assigned the letter E for its drive.
A special kind of high capacity floppy disk called a zip disk was also available. One
zip disk could accommodate as much as 100Mb or more of data as compared to
1.44Mb or 2.0MB of data on an ordinary floppy disk.
A DVD (digital video disk or digital versatile disk) is a type of optical disk that can
accommodate text, sound and video. A DVD is popular for movies. To use a DVD,
the computer must have a DVD-ROM drive.
67
ICT INTRODUCTION TO ICT Further Reading
68
ICT INTRODUCTION TO ICT Further Reading
CD-ROM Drive
CD-ROM
69
ICT INTRODUCTION TO ICT Further Reading
Flash Disk
Memory Card
The memory card in your cell phone or digital camera is similar to a flash
disk in the sense that it is also a semiconductor storage device.
3.7 Exercise
• Why does a computer require storage?
• Mention the three general types of storage.
• Mention the four types of storage.
• Mention the two types of magnetic storage.
• Which device offers the largest storage at the moment?
• Two types of storage are not common nowadays. Which are these?
• State the advantages and disadvantages of a flash disk.
• Someone is selling a computer which has a hard drive of 600MB.
Would you buy it or not? Explain.
• Suppose that the capacity of your flash disk is indicated as 16GB.
What is the maximum number of characters which you can store on it?
70
ICT INTRODUCTION TO ICT Further Reading
So far you have learnt about the peripheral devices – input, output and storage.
These devices interface or communicate with the system unit to perform specific
roles such as data entry (input), providing feedback (output) and data and program
storage (storage). To start with, let’s ask a few questions which should form the
basis for our study.
• System unit
• Central processing unit
• Microprocessor
• Control unit (CU)
• Arithmetic and logic unit (ALU)
• Main memory
• Random access memory (RAM)
• Read only memory (ROM)
• Basic Input/Output System (BIOS)
• Complementary Metal Oxide Semiconductor (CMOS)
• Registers
• Buses
71
ICT INTRODUCTION TO ICT Further Reading
So let’s start. The system unit, also called the processor or processing unit, is the
main unit of computer hardware. The system unit is like the brain in your body. It
processes the data which it receives from the input just like our brain processes
signals which it receives from sense organs. The diagram below shows the model of
a computer system, and also shows the basic structure of the processor. The
control unit (CU) and the arithmetic and logic unit (ALU) are manufactured on the
same silicon chip called the microprocessor.
PROCESSOR
Microprocessor
ALU
COTROL UNIT
INPUT
RAM
OUTPUT
ROM
72
ICT INTRODUCTION TO ICT Further Reading
Main Memory
STORAGE
Next let’s learn some details each of the units of the processor starting with the
control unit.
What role is performed by the control unit? This is a unit within the CPU that
controls all the functions such as the following:
We will next learn some details about the arithmetic and logic unit.
The ALU is the unit that does the actual processing of data by performing
arithmetic and logic operations on digital signals.
73
ICT INTRODUCTION TO ICT Further Reading
Memory is a storage location in the system unit. It is one of the most important
resources of the computer.
Main memory has two main parts. These parts are the random access memory
(RAM) and the read only memory (ROM).
4.1.3.1 RAM
This is the working memory of the computer because signals are always entering
and leaving it. Therefore, RAM is a transit point for data and instructions to and
from the CPU (see illustration below).
CPU
Main Memory
74
ICT INTRODUCTION TO ICT Further Reading
RAM is temporary memory because it holds data only when power is on. If power is
off, the contents of RAM are erased. For this reason, it is also known as volatile
memory. Shown below is a photograph of RAM.
DDR RAM
RAM is like a waiting room at the hospital for patients wishing to see the doctor.
Just as patients should sit in the waiting room as they cannot all go in to see the
doctor at the same time, data and instructions are kept in the RAM before they go
to the CPU or to the output devices.
To ensure that different signals do not mix, RAM has a pigeon-hole structure
consisting of several storage locations called memory addresses as illustrated
below.
Memory addresses
75
ICT INTRODUCTION TO ICT Further Reading
Different signals are kept in different memory addresses. Each memory address is
assigned a unique identification number, just like every house in a township is
allocated a unique house number.
So what role does RAM play in the computer? Some of the specific functions of
RAM are as outlined below.
Functions of RAM:
As you can see from the functions stated above, RAM is the part of main memory to
which new signals can be added or removed. As RAM works, signals keep coming in
and going out of it.
Let’s look at the details of ROM to learn why it is included in the computer and how
it is different from RAM.
4.1.3.2 ROM
The Read-only memory is a storage medium used to store firmware.
Firmware is software that is used to control the performance of specific
hardware units in the computer, for example, the monitor, the keyboard, the
mouse, the hard disk.
Unlike RAM which is volatile, i.e. which loses its contents when the computer
is turned off, ROM is permanent storage. Whereas the computer can write to
RAM, the ROM cannot be written to. The contents of ROM were programmed
into the ROM chips by the computer’s manufacturer.
What is the role of ROM in the computer?
Function of ROM
ROM is used to store programs that run when the computer is switched on.
These programs have startup instructions used to boot the computer.
(Booting means starting up a computer. See more details about it below.)
Details about how the computer boots are kept in a special program called
BIOS within the ROM chip. (BIOS is an acronym for Basic Input/Output
System.
76
ICT INTRODUCTION TO ICT Further Reading
Whenever you turn on your computer, the first thing you see is the BIOS software
performing its function. On many machines, the BIOS displays text describing
things like the amount of memory installed in your computer, the type of hard disk
and so on. During this boot sequence, the BIOS does some very important work to
get the computer ready to run.
So, how does the computer know the actual details about a particular machine, for
example, the type and amount of memory, the type and amount of hard disk, and
so on?
4.3 Registers
Having learnt about The CU, ALU, RAM, ROM, BIOS and CMOS, let’s learn
something about registers. We should be able to answer the following questions:
77
ICT INTRODUCTION TO ICT Further Reading
CPU
Register
RAM
Storage
78
ICT INTRODUCTION TO ICT Further Reading
from the fast registers instead of picking them from the slow RAM. Registers are
also very close to the CU than the RAM. This is because registers are constructed
on the same silicon chip as the CU, but RAM is on a different chip. This means that
the distance from the CU to a register is shorter than the distance from the CU to
RAM for signals.
Why can’t data or instructions move directly from storage to the CU instead of
passing through RAM?
One reason, as you can guess, is that storage is actually much slower than RAM.
Another reason is that the distance from the CU to storage is longer than that from
the CU to RAM.
What are the names of the registers, and what are their functions?
There are many registers in the CPU. The following are some of the registers:
79
ICT INTRODUCTION TO ICT Further Reading
electronic clock that produces a train of digital signals (illustrated below) and a
Program Counter which indicates the next instruction to be executed in the CPU.
The digital signal is applied to the control unit. The low state of the signal is given
value 0 and a high state value 1. The transition low-to-high-to-low or 0-1-0 is
called the clock pulse.
High
Clock pulse
Low
Low
Each clock pulse makes one complete cycle. During one clock pulse, the CPU
processes one program instruction. (A computer’s processor speed is the number of
instructions or clock pulses that it processes in one second. For example, a
computer with a processor speed of 2GHz processes two billion instructions in one
second).
At this point, let’s pause and consider these facts which have already been
presented to you. Recall that it has been said that signals (data and instructions) in
a computer are represented in binary, i.e. in machine language, and that
processing of data is also in machine language. So, how does the computer
distinguish signals that represent data from signals that represent instructions since
80
ICT INTRODUCTION TO ICT Further Reading
the two are represented in the same way? You’ll be surprised! Because a computer
is ‘an idiot’, it cannot distinguish the two types of signals. For this reason, is it
possible then that the computer may try to process instruction signals (mistaking
them for data) and try to use data signals (mistaking them for instructions)? Yes!
This confusion is very possible, but it does not occur. How is it controlled? The next
section explains this. So read on.
A bus is a route through which signals travel within the processing unit. Buses are
important because they convey signals from one point to another. They are like
traffic highways connecting towns. Just like on a highway, the size matters.
Therefore, the bus size is an important factor when determining the capability or
processing power of the computer. The wider the bus size, the faster the signals
travel from one point to another in the computer, and, therefore the faster the
computer processes.
The processor has three types of bus. These are data bus, address bus and
control bus. The computer does not confuse the different types of signals which it
handles simply because each type of signal travels through its own bus.
The data bus carries data signals between RAM and the CPU. This bus is bi-
directional. The address bus carries address signals of the data to be read or
written in RAM by the CPU, and the control bus carries control signals from the CPU
to the RAM.
Control Bus
RAM
CPU
Data Bus
Address bus
81
ICT INTRODUCTION TO ICT Further Reading
Most of the buses in the computer carry signals in parallel. For example, the data
bus between RAM and CPU is a multi-lane bus as illustrated below.
CPU
RAM
Each bit in a byte, e.g. 11110001, passes through its own line. This arrangement
ensures that digits that represent a particular character of data or an instruction
leave and arrive at points at the same time. A wider bus can therefore carry more
data signals than a narrower bus. The size of the bus is quoted in bits. For example
we can have a 32-bit bus or a 64-bit bus. A 32-bit bus carries four characters, and
a 64-bit bus carries eight characters of data at the same time. Obviously, a 64-bit
bus computer must be faster than a 32-bit bus computer, just as a four-lane road is
faster than a two-lane road.
82
ICT INTRODUCTION TO ICT Further Reading
4.6 EXERCISE
• What is the similarity and the difference between RAM and ROM?
• What is the relationship between the ROM and the BIOS?
• What is the importance of ROM in a computer?
• What is the importance of secondary storage in a computer?
• What events take place during the booting process of a computer?
• The CU controls everything that takes place in a computer. Do you agree?
• Give reasons why you would prefer an impact dot matrix printer to a deskjet or
laserjet printer.
83
ICT INTRODUCTION TO ICT Further Reading
• Give reasons why you would prefer a deskjet printer to an impact dot matrix or
laserjet printer.
• Give reasons why you would prefer a laserjet printer to an impact dot matrix or
deskjet printer.
• Why is the sequence of program execution often called the Fetch-Execute?
• Why would you prefer a flash disk to a CD-ROM for storage of your data? Give at
least three reasons.
• What do you understand by ‘a computer with voice input/output capability’?
• What are the advantages of LCD monitors over CRT monitors?
• RAM has a pigeon-hole structure as shown below. Explain why it is so.
5.0 Summary
In this module you have learnt about the computer’s hardware system. You
have learnt that a computer consists of several hardware units which are all
meant to make the computer more productive. The computer consists of
input (for entering data or commands or both), processor (for processing the
data), output (for giving feedback or results), and storage (for storing data
and computer programs).
There are many types of input devices, e.g. keyboard devices, pointing
devices, scanning or mark reading devices, and touch devices.
Similarly, there are many types of output devices, e.g. display devices,
printing devices and audio output devices. Display and audio output devices
are called softcopy output devices, and printing devices are hardcopy output
devices. Examples of printers are impact dot matrix printer, desk jet printer,
84
ICT INTRODUCTION TO ICT Further Reading
and laser jet printer. Each type of printer has its own advantages and
disadvantages.
Due to the need to have data stored electronically, a computer also has
storage. Various storage systems include magnetic storage, optical storage
and semiconductor storage. Examples of storage devices are magnetic
tapes, floppy disks, hard disks, CD-ROMs, flash disks, and memory cards.
You have learnt that the brain of the computer is the central processing unit
(CPU) which is also known as the microprocessor. The CPU is located in the
system unit on the computer’s main circuit called the motherboard. The
main roles of the CPU are to control all the activities that take place in the
computer and to process data. The CPU is assisted by other units such as
the random access memory (RAM), the read only memory (ROM), and the
registers. The CPU consists of control unit (CU), arithmetic and logic unit
(ALU), and registers. The ALU does the actual processing of data by
performing arithmetic and logic operations on binary data. RAM is the
working memory of the computer and is volatile. Registers are like RAM but
they work faster than RAM. ROM is used to store a special program which is
used to startup the computer. The startup program is kept on the basic
input/output system (BIOS) within the ROM.
Answer questions 1 to 45 by selecting the letter for the best alternative, and answer questions 46 to 52
by writing your answer. Solutions to questions are provided after the self-assessment questions. You
should avoid the temptation of looking at the answers before attempting the questions first.
85
ICT INTRODUCTION TO ICT Further Reading
86
ICT INTRODUCTION TO ICT Further Reading
B The CIR
C The RAM
D The ROM
10. Which of the following devices holds instructions to be used to start a computer?
A The CMOS
B The Hard disk
C The RAM
D The BIOS
11. Bits of data being processed in the ALU are kept in the
A MAR
B MDR
C Accumulator
D CIR
12. Which of the following is correct about an inkjet printer?
A It is cheaper to buy
B It is cheaper to operate
C It is noiseless when printing
D It is the fastest among all the printers
13. The hard disk is important because
A It stores data for the user
B It stores operating system
C It stores computer software
D It stores data and programs
14. A scanner is an example of…
A OMR
B OCR
C MICR
D LCD
15. “From input, work goes to RAM, then to ALU and to ………. before being sent to output or
storage”. Which word should be used to fill the blank space?
A RAM
B ROM
C CU
D CPU
16. The capacity of a hard disk is quoted as 80GB. What does this mean?
A The hard disk can store 80 characters only
B The hard disk can store 80 billion bits
C The hard disk can store 80 billion characters
D The hard disk can store 80 billion words
87
ICT INTRODUCTION TO ICT Further Reading
17. Suppose that the head of your school has requested you to give advice on the most appropriate
printer for the school to buy. Due to limited financial resources, the school wants a printer
which is fast but has low running costs. Which of the following printers would you recommend?
A Inkjet printer
B Dot matrix printer
C Bubble jet printer
D Laser jet printer
18. An example of an optical input device is…
A Keyboard
B Mouse
C Scanner
D Microphone
19. A computer’s memory has a capacity of 2.0GB. This means that…
A The ROM can store 2.0 billion characters
B The RAM can store 2.0 bytes of data
C The BIOS can store 2.0 billion characters
D The RAM can store 2.0 billion characters
20. During the start-up process, the computer…
A Checks itself for the presence of viruses
B Immediately loads the operating system software
C Checks if the installed memory is correct
D Checks if all its programs are ready to work
21. In the computer’s system unit, the part considered as the brain of the computer is the…
A Control Unit
B Random Access Memory
C Arithmetic and logic Unit
D Central Processing Unit
22. In order to quickly transfer data within the CPU…
A The computer has main memory
B The computer has many buses
C The computer has disk drives
D The computers has registers
23. The_____________ stores the bits of data currently being processed
A MDR
B MAR
C CIR
D RAM
24. Which of the following statements in incorrect?
A The data bus and the address bus are bidirectional buses
B RAM and ROM are constructed on the same silicon chip
C Processed data passes through RAM to reach the output
D Data is processed in a three step process by the CPU
88
ICT INTRODUCTION TO ICT Further Reading
25. The unit in the computer which does the mathematical operations on binary data is the…
A Read only memory
B Random access memory
C Arithmetic/logic unit
D Basic input/output system
26. A teacher gives Jane a coin and requests her to roll it ten times. “If the coin falls with heads up,
count up to 5, and if it falls with tails up count up to 10”. If Jane was a type of computer
hardware, she probably would be the
A RAM
B ROM
C ALU
D CU
27. A teacher buys a certain input and discovers that the device can only be used for giving
instructions to the computer. This device must be
A a mouse
B a keyboard
C a scanner
D a camera
28. Which of the following output devices produce soft copies?
A Monitors only
B Printers and speakers
C Monitors and speakers
D Plotters and monitors
29. Which of the following devices keeps programs which a computer requires for processing data?
A RAM
B Hard disk
C ROM
D CPU
30. Which of the following devices keeps instructions which initiate the computer at startup?
A RAM
B Hard disk
C ROM
D CPU
89
ICT INTRODUCTION TO ICT Further Reading
37. Which of the following statements is correct about computer magnetic storage devices?
A They are no longer in use nowadays in computers
B They currently store more data than other devices
C They are the most commonly used storage devices
D They are all non-removable storage media
90
ICT INTRODUCTION TO ICT Further Reading
91
ICT INTRODUCTION TO ICT Further Reading
44. Which of the following buses would instructions from the CU use in the computer?
A Data bus
B Address bus
C Control bus
D I/O bus
45. Which of the following registers handles information about the location of data?
A MDR
B MAR
C CIR
D Accumulator
46. What does each of the following abbreviations stand for?
(i) ROM
(ii) ALU
(iii) MDR
(iv) BIOS
(v) CMOS
(vi) PC (within the CPU)
(vii) I/O
47. The figure below shows a model of computer hardware. The arrows show the
movement of data signals.
C
B
A
D
G
F
J
I
H
92
ICT INTRODUCTION TO ICT Further Reading
Study the diagram given above very carefully and then answer the following questions:
(i) Identify the units labelled A to J.
(ii) Give two examples of devices which can be used as Unit A.
(iii) State the main function of Unit F.
(iv) State two important functions of Unit B.
(v) State one important reason why a computer requires Unit A.
48. The processing power of a computer is determined by a combination of three units found in the
system unit. Name the three units.
49. In a computer data is represented in binary. Each character is given a special code so that it is
distinguished from every other character.
(i) What do you understand by binary?
(ii) What is the difference between 50kb and 50kB?
(iii) If you enter tvtc.edu in a computer, how much memory space does it occupy?
(iv) Suppose that A is represented by 11000001. What is the representation of H? How
would h be represented? Explain.
50. Someone claims that the most important storage device in a computer is the hard disk.
(i) Do you agree?
(ii) State your most important reason for agreeing or disagreeing.
(iii) Why is the hard disk referred to as a fixed drive?
51. Identify the following devices
Device A Device B
93
ICT INTRODUCTION TO ICT Further Reading
Device C Device D
52. Examine carefully the diagram given below which represents the processing unit of a computer.
94
ICT INTRODUCTION TO ICT Further Reading
If the solid arrow and the dashed arrow represent the flow of raw data and processed data, respectively,
identify the components of the processing unit labeled A, B, C, D, X, Y.
Identify the device and then state two functions which it performs in the computer.
References
95
ICT INTRODUCTION TO ICT Further Reading
• B
• C
• B
96
ICT INTRODUCTION TO ICT Further Reading
• D
• D
• C
• C
• B
• A
• D
• B
• A
• D
• B
• A
• C
• D
• C
• D
• C
• A
• D
• A
• A
• C
97
ICT INTRODUCTION TO ICT Further Reading
• C
• A
• C
• B
• C
• C
• D
• A
• B
• D
• B
• B
• C
• A
• B
• D
• D
• B
• C
• B
98
ICT INTRODUCTION TO ICT Further Reading
PC – program counter
I/O – input/output
47.
(i) To identify the units correctly, note that the unit to which all arrows connect is the random
access memory (RAM), and the unit with two arrows in opposite directions is the storage.
Therefore,
A is output
B is input
C is storage
E is main memory
I is control unit
(ii) Examples of devices for unit are monitor, printer, plotter, or speakers. (Any two of these)
99
ICT INTRODUCTION TO ICT Further Reading
(iii) Main function of unit F is to store instructions used to boot the computer.
(iv) Two important functions of unit B are (a) to enter data, and (b) to enter commands.
(v) Unit A is used to store computer programs and to store user data. (One of these.)
48. The three units which determine the computer’s processing power are: CPU, RAM and Hard
disk. (The bigger their values the better the processing power.)
(ii) 50kb means 50 thousand bits, and 50kB means 50 thousand bytes.
(iii) tvtc.edu has eight characters. Therefore it would occupy 8 bytes of memory space.
(iii) The hard disk is not removed as you shut down the computer.
Device D is scanner
Device B is used to store data and instructions currently being used in the CPU.
100
ICT INTRODUCTION TO ICT Further Reading
Three functions of Part D are: (a) to coordinate hardware devices, (b) to control the flow of data
signals, and (c) to optimize the performance of RAM.
This is a picture of a hard disk. Hard disk is used to store data and computer programs.
Foreword to module 3
Dear Student,
101
ICT INTRODUCTION TO ICT Further Reading
TVTC
102
ICT INTRODUCTION TO ICT Further Reading
Table of Contents
Foreword ...............................................................................................................................................101
Introduction .........................................................................................................................................105
Objectives .............................................................................................................................................106
Chapter 1 ROLE OF SOFTWARE IN A COMPUTER..............................................................107
Exercise 1.0......................................................................................................................................109
Chapter 2 TYPES OF SOFTWARE..............................................................................................110
2.1 Introduction..........................................................................................................................110
2.2 Categories of Software.....................................................................................................111
2.2.1 Systems Software ......................................................................................................111
2.2.2 Applications Software ...............................................................................................112
Exercise 2.0...........................................................................................................................................113
Chapter 3 OPERATING SYSTEM .................................................................................................114
3.1 Examples of operating system software .......................................................................115
3.2 User-interface..................................................................................................................117
Exercise 3.0......................................................................................................................................121
Chapter 4: UTILITIES..................................................................................................................122
4.1 Anti-virus utilities...............................................................................................................123
4.2 Disk defragmenter utilities .............................................................................................124
4.3 Disk cleaning utilities........................................................................................................125
4.4 Backup....................................................................................................................................127
Exercise 4.0......................................................................................................................................128
Chapter 5 APPLICATIONS ............................................................................................................129
5.1 Introduction..........................................................................................................................129
5.2 Categories of applications...............................................................................................129
5.3 Word processors.................................................................................................................130
5.3.1 Examples of Word Processors ..............................................................................131
5.3.2 Common features or tools of Word Processors .............................................131
5.3.3 Formatting a document ..........................................................................................137
Exercise 5.0......................................................................................................................................139
103
ICT INTRODUCTION TO ICT Further Reading
104
ICT INTRODUCTION TO ICT Further Reading
Introduction
In this module you will learn details about software. You will learn that
basically software is the engine that drives the computer. You will appreciate
that without software a computer is just a ‘heap’ of metals with no purpose
at all. The module therefore explains what software really is, its various
categories and the specific roles which each type performs in the computer.
To try to make you understand these important ideas easily, some useful
examples and illustrations have been used.
As you read about the various categories of software, you should try to
appreciate the examples of the programs mentioned. For example, you will
learn that software is in categories. Be able to state these categories, and to
name the actual programs that are found in the categories.
One problem with understanding what software is and what role it plays is
that since you are talking about something intangible, your imagination can
easily be defeated, especially when you just read about it. For this reason,
we recommend that you must have a computer which you should be able to
use to try out some of the things mentioned in this module. Although you
will be exposed to many of these programs at the college, you will be in a
better position if you can ensure that you have access to a computer at least
twice or three times in a week.
105
ICT INTRODUCTION TO ICT Further Reading
Objectives
106
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER
If you have followed the scenario depicted above, you should not have
problems understanding the role of software in the computer. When the
computer is in use, there is You (the user; you are like the owner of a farm
107
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER
Without software, you should be operating the computer manually, the way
a typewriter is used. Then your computer would not be called an automatic
machine. The diagram below compares
Chapter Summary
108
ICT COMPUTER SOFTWARE ROLE OF SOFTWARE IN A COMPUTER
Exercise 1.0
1. What is software?
2. Why does a computer require software?
3. Why does a computer require different types of software?
4. What is meant by saying that a computer is an automatic machine?
5. What does a computer have which makes it to be an automatic machine?
6. In what way is software like a manager in the computer?
109
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE
2.1 Introduction
If a computer is like your big farm, then many activities must be taking
place in it. Yes, that’s right. Because at a farm you need many workers to
perform different activities, even in a computer there must be different types
of software to perform different activities. ‘What are these different activities
to be performed in a computer?’ you may be asking yourself. Well, think
about it. In Module 1 you learnt that a computer consists of different types
of hardware. (Refresh your memory: What are the categories of computer
hardware, and what are the examples of devices in each of the categories?
See picture insert of a computer system shown below.)
As you can see, since each type of hardware does a unique function in a
computer, and since we have said that each hardware unit is controlled by
software, then there must be different types of software in a computer in
order to manage the different types of hardware. Therefore, one function of
software in a computer is to manage or to control hardware.
110
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE
How many categories of software are there, and what are they?
There are two (2) main types of software in a computer and these are
Systems Software and Applications Software. We will now learn about
the general details of these two categories starting with systems software.
Note that these functions are quite demanding and cannot be easily
performed by a computer user. By using systems software to perform these
tasks, the computer is made to be very automatic, efficient and effective.
111
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE
Next let’s turn to applications software. What is it, and how is it different
from systems software?
112
ICT COMPUTER SOFTWARE TYPES OF SOFTWARE
Exercise 2.0
113
ICT COMPUTER SOFTWARE OPERATING SYSTEM
Having learnt about the categories of software, we will now learn some
details about the operating system software by focusing on these questions:
The operating system (or OS in short) is part of the systems software. This
is the major software in a computer because it performs many very
important functions. Without it the computer cannot do anything. It is like
the brain in your body. Like the brain in your head, the OS coordinates all
activities in the computer and sets all the rules regarding the performance of
the computer. If you should have some good knowledge of how the
computer works at its basic level, you should develop some understanding of
the work of the operating system.
You can guess that the OS must be very complex software. Yes indeed it is.
It consists of a large number of files or smaller programs that perform
critical roles in the computer.
The earliest computers were very inefficient because they were operated
almost manually. Computer operators used to setup the machine and
114
ICT COMPUTER SOFTWARE OPERATING SYSTEM
If all this sounds interesting, what are the examples of programs that
called operating system?
115
ICT COMPUTER SOFTWARE OPERATING SYSTEM
116
ICT COMPUTER SOFTWARE OPERATING SYSTEM
Have you come across the term user-interface? What does it mean, and
what are the options?
3.2 User-interface
Every operating system has what is known as the user-interface. The user-
interface is the part of the OS with which we interact, or the part the OS
presents itself to the computer user. You can compare it to the front desk in
a firm. It allows the user to make his/her requests to the rest of the OS
which works in the background.
Do you watch TV? Are you aware that in TV transmission there are many
people involved just to get the signals to your set? You can mention a few
such as the Transmission Controller, the Sound Engineer, the Graphics
Engineer, the Lighting Technicians, the Announcers, and the Cameramen
and women. Which of these people do you see or interact with as you watch
your favourite programs? Surely you must be quite familiar with the TV
Announcers. Why? Because you see the announcers, you hear their voices,
and sometimes you interact with them during the phone-in programs. You
may not know the other personnel even if they might be more important or
critical during the TV show because you do not see them or interact with
them directly.
117
ICT COMPUTER SOFTWARE OPERATING SYSTEM
operating system do their work behind the scenes. The only part of the
operating system which manifests itself to us, the part which resembles the
TV Announcer, is the part called the user-interface.
The following are some of the details about the user interface:
118
ICT COMPUTER SOFTWARE OPERATING SYSTEM
Text User-Interface
119
ICT COMPUTER SOFTWARE OPERATING SYSTEM
Menus Icons
Graphical User-Interface
6. The user clicks on pull-down menus to display the menu commands.
Icons are small pictures that represent something such as a file, a
folder or a computer program.
7. With a GUI, the user gives commands to the computer by selecting
items from a menu or by clicking on an icon when using a pointing
device such as a mouse.
8. GUIs are easier to use.
120
ICT COMPUTER SOFTWARE OPERATING SYSTEM
Exercise 3.0
1. Why does a computer require operating system?
2. Mention at least two functions of operating system. (see page )
3. Name four operating system programs.
4. An operating system is associated with a user-interface. What is a user-
interface?
5. Mention the two types of user-interface.
6. What do the letters WIMP stand for?
7. Which user-interface is associated with the command prompt?
121
ICT COMPUTER SOFTWARE UTILITIES
Chapter 4: UTILITIES
In Chapter 4 you learnt about the operating system software. You learnt that the
OS is a suite of programs that drives the computer. In this chapter you will learn
that the OS does not really operate the whole computer system by itself. There are
other types of much specialised software programs that complement the work of
the OS in the computer. These are the utilities. Wikipedia,
(http://en.wikipedia.org/wiki/Utility_software) explains this as follows:
“Utility software is system software designed to help analyze, configure,
optimize or maintain a computer.” Notice the words in bold. Utilities are
meant to enhance or to increase the functionality of the OS in the computer.
If the OS is like the top management of a company, the utilities are like the
specialised employees such as the electricians, plumbers, carpenters,
bricklayers, who facilitate the effective and efficient operation of the
company. Just as a company requires the services of these specialised
employees, a computer also requires the services of the utilities. Wikipedia
gives a large list of utilities as follows:
122
ICT COMPUTER SOFTWARE UTILITIES
We will now learn some details about a few of these utilities because they deserve
special mention.
One of the things that complicate the use of computers is computer virus. A
computer virus is a computer program designed to provide sort of negative
consequences when it is run on a computer. Some viruses can cause very
serious havoc such as deletion of data, corruption of programs and flooding
of storage or memory. No one likes these experiences. Therefore, a
computer needs some defence against viruses. One form of defence is
through use of antivirus software. Antivirus software is meant to identify and
remove viruses from the infected computer. In modern computer usage, a
computer without antivirus software is like living in a country without
security forces, such as police, immigration or military units. Without
antivirus, a computer is extremely vulnerable to virus attacks and other
security bleaches, more so if the computer is part of an extended network
123
ICT COMPUTER SOFTWARE UTILITIES
such as the Internet. (More details about these issues will be covered in
Module 5.)
The following are some of the antivirus programs which many computer
users in Zambia employ:
a) Norton
b) Kaspersky
c) AVG
d) McAfee
e) Avast
AVG and Avast are particularly good for people who do not have enough
money to buy commercial versions. These programs have free versions
which can be downloaded from the Internet and installed at no fee at all.
They help to rid and protect a computer against viruses. However, the free
versions do not provide full protection. For example, they may not provide
protection against spam and other internet security bleaches. For more
protection you need those antivirus versions that have Internet Security.
Have you come across the saying ‘divided we fall, united we stand’? As you
use your computer, many things happen without you knowing. For example,
as you delete files and create new ones, or as you install new programs and
uninstall unwanted ones, the files on your storage system (e.g. the hard
disk) split up. Technically this is called fragmentation. Note that
fragmentation does not mean that the files are now not usable. It means
that pieces of the file are in many different places within the storage
medium. Now think about this. Suppose that you store your documents in a
file cabinet and some of them have been shredded to pieces. What happens
next time when you want to read one of such documents? You can imagine
the amount of time you would spend looking for the pieces and putting them
back together before the document can be readable. This is what happens
124
ICT COMPUTER SOFTWARE UTILITIES
when fragmentation occurs on the disk. Each time the computer wants to
read documents that have been fragmented, it takes much time to find the
file fragments and assemble them again. This causes the computer to
become slow. Therefore, we need to use a program which can check if the
files on the disk are fragmented. This is the role of the disk defragmenter.
When run, the disk defragmenter checks for disk fragmentation and gives a
report about the degree of fragmentation. The report includes a
recommendation of whether defragmentation is necessary or not. If
defragmentation is necessary, you carry out the process. During disk
defragmentation, the disk defragmenter picks the fragments of every file,
assembles and moves them to new locations on the disk. With this done, the
computer does not have to look for and assemble file fragments every time
the file is to be read. This makes the computer to operate at normal speed.
If you have understood what disk defragmentation is, let us learn about
another technique which ‘computer experts’ use to fine-tube a computer.
This is called disk cleaning.
If you have lived in your house for some time, you must have accumulated a
lot of stuff some of which is no longer useful. What’s wrong with keeping
such unwanted stuff, and what do you do with it? You must agree that
unwanted stuff merely takes up space in your house which you would use for
keeping more useful items. Then you remove or get rid of all that’s not
wanted. This is what disk cleaning is all about in a computer. As you use
your computer, it accumulates many files. Many of these files become
useless and merely decrease storage space on the disk. Since the
performance of the computer is also determined by how much free disk
space is there, a computer whose storage space has been decreased by
these unwanted files becomes very slow. A disk cleaning utility, such as
Scandisk in Microsoft Windows, checks for the presence of useless files on
the disk. It gives a report which indicates how much storage space each of
125
ICT COMPUTER SOFTWARE UTILITIES
these files is occupying. By examining the report, you decide which of them
you want to remove from your computer. Once you have done the selection,
you instruct Scandisk to delete the unwanted files.
126
ICT COMPUTER SOFTWARE UTILITIES
vi. To carry out the defragmentation, you first click on the Tools tab and
then click on Defragment Now button
4.4 Backup
I remember a colleague of mine who once ‘sweated’ when his examination
which he had saved on his flash disk failed to open when it was required for
printing. Actually, the computer reported that the disk was unusable. All
efforts to retrieve data from the storage medium were in vain. As he had
destroyed the draft copies after saving the document, he had to start setting
the paper all over again. This colleague almost swore never to use a
computer again. Such miserable experiences are common if one uses a
computer without putting a disaster recovery plan in place. What this
colleague did not know was that all important data must have been backed
up. The backup utility does just this. It makes a copy of all the data saved
on the disk. When disaster strikes, you can fall back on the backed up data.
Backing up is more effective if you store the copy on a different medium. For
example, you can back up the data which is on your internal hard disk and
save the copy on the external hard disk. Or you can copy all the important
data from one flash disk and put it on another flash disk. (So, if you use a
computer but don’t backup your data, do it today!)
Up to this point you have learnt about systems software, operating system,
and utilities. These programs are mainly directed towards the machine or
the hardware. This means that we do not use these programs to do our
actual work such as typing reports or drawing. To use the computer for such
kind of work we have to use software called applications. This is what the
next chapter, Chapter 5, of this module covers. So study on.
127
ICT COMPUTER SOFTWARE UTILITIES
Exercise 4.0
1. What is a utility program?
2. Why does a computer require utility software?
3. Name at least three utility programs.
4. What is meant by disk defragmentation, and why is this important?
5. Which utility program would you use to remove files from the Recycle
bin?
128
ICT COMPUTER SOFTWARE Applications
Chapter 5 APPLICATIONS
5.1 Introduction
As was stated in earlier sections, applications are computer programs used
by people to accomplish specific tasks. These are programs which make
computers to be productivity machines. Therefore, how you make good use
of your computer depends on which applications programs you have
installed in it. Having many applications programs in your computer is a
good thing, but knowing how to use each one of them productively is better.
Try to understand this very well. There are many people who will have
(perhaps out of ignorance) many applications programs installed but actually
only make use of one or two of them. The point here is that you must learn
to be able to use a variety of applications for your computer to be really
beneficial.
• Word processors
• Spreadsheets
• Databases
• Presentation
• Desktop pushing
This chapter will give you a brief (theoretical) introduction to the first three
applications programs, i.e. word processors, spreadsheets and databases.
You will need hands-on experience to develop practical skills. During your
study of ICT, you will be given practical knowledge of some of these
129
ICT COMPUTER SOFTWARE Applications
Obviously you understand what is meant by ‘word’ and what is meant by ‘to
process’. In general, therefore, word processors are computer programs for
processing words. For example, this document which you are reading now is
in words, and was word processed. A word processor is a program which you
can use to produce a document such as this one.
Word processors are the most commonly used applications because every
computer user does some word processing operations at one time or
another. For other people, it is because word processors are very easy to
learn or use. Word processors are used for
130
ICT COMPUTER SOFTWARE Applications
Some of them have become very popular; for example, Microsoft Word is
the most popular word processor. OpenOffice.org Writer is an open-source
application. Open-source software is software which you can install and use
freely, whereas the others, which are commercial, have paid for licences.
We will now explore word processors briefly. You will understand these
features very well during your practical lessons. Examine the following
screenshots of the various word processors.
131
ICT COMPUTER SOFTWARE Applications
132
ICT COMPUTER SOFTWARE Applications
133
ICT COMPUTER SOFTWARE Applications
134
ICT COMPUTER SOFTWARE Applications
You should notice that all these programs have certain common features or
tools. Most of these tools are found on toolbars. Examine the screenshot of
the top part of a word processor given below.
At the top of the window is the title bar. The title bar shows the name of
the program.
135
ICT COMPUTER SOFTWARE Applications
Title bar
Below the title bar is the menu bar. The menu bar has menus which are
lists of command option. Menus can be activated by clicking with the
computer mouse.
Menu bar
There is the Standard Tool bar below the menu bar. The Standard Toolbar
has a number of small graphics called icons. Icons are short-cuts to
commands.
Standard Toolbar
Formatting Toolbar
136
ICT COMPUTER SOFTWARE Applications
Drawing Toolbar
If you can use the tools on the toolbars well then you have become
proficient in word processing. You should particularly be able to use the tools
on the Formatting Toolbar.
When you wake up in the morning you do many things to make yourself
ready for the day. What are some of these activities? Do they include
bathing, washing your face, cleaning your teeth, brushing your hair,
selecting the clothes to wear, having breakfast, and so on? You perhaps
perform some of these activities in order to make yourself ‘presentable’. In
data processing language we may call this formatting. When you format a
document you introduce features that improve the quality of your document,
the way you ‘format’ yourself every morning before you appear in public.
The Formatting Toolbar (the one given below) has the tools which you can
use to format your document.
137
ICT COMPUTER SOFTWARE Applications
(a) Change the font, i.e. the shape of characters. This resembles
handwriting.
(b) Change the font size. This indicates how large or small the text or
characters you use are.
(c) Use bold, i.e. emphasise the colour of the text the way the word ‘bold’
was typed.
(d) Use italics, i.e. to make the text slant or lean to the right.
(e) Use underline.
(f) Change text alignment.
(g) Change line spacing.
(h) Use styles which aid in producing tables of content automatically.
138
ICT COMPUTER SOFTWARE Applications
Exercise 5.0
1. What is a word processor?
2. Give at least two examples of word processors.
3. State three operations which you can perform in a word processor.
4. Suppose that you type the following sentence in a word processor: ‘A
computer is an electronic machine’, and you want it to appear like this ‘A
computer is an electronic machine’. Outline what you would do.
139
ICT COMPUTER SOFTWARE Applications
5.4 Spreadsheets
What is a spreadsheet?
Does your work involve data, for example numbers which you have to
tabulate in columns and rows in form of a table? For example, if you are a
teacher you may want to records your learners’ results like this:
What would you want to do with the results once recorded like this? May be
you may want to calculate and compare the learners’ total or average
scores. Or you may want to find out how many learners scored marks within
a given range. In short, you may want to do some calculations or to do
some data analysis. If you type the data in a Microsoft Word table as given
above, it may not be very easy for you to perform these tasks, i.e.
calculations and analysis of data. A better computer program to use is a
spreadsheet. Thus a spreadsheet is a computer program used for
tabulating data in columns and rows and for performing calculations
and analysis on the data. A spreadsheet can greatly simplify or automate
these data processing operations. Due to their data analysis capabilities,
spreadsheets are very useful programs in many decision making activities.
You can use them to model a situation and then predict or forecast the
outcome. In a business setting, this forecasting ability of a spreadsheet is
invaluable. Coupled with their graphic capabilities which allow you to prepare
charts based on the data, spreadsheets make it possible for you to present
information pictorially so that you are able to visualise trends.
140
ICT COMPUTER SOFTWARE Applications
OpenOffice.Org Calc
141
ICT COMPUTER SOFTWARE Applications
Lotus-123
Look at the spreadsheet window again. You can easily recognise the
program by means of its characteristic appearance. It consists of vertical
and horizontal lines which form columns and rows. You should notice that
every column has a letter at the top which identifies the column, and every
row has a number on the left also for identification of the row. Thus we have
columns A, B, C, etc, and rows 1, 2, 3, and so on. Where columns intersect
rows, boxes called cells are formed. In a spreadsheet, data is entered in
cells. Therefore, to enter or type some data you have first to choose the
appropriate cell. Every cell has a unique cell reference or cell address.
Data is always typed in the current cell. The current cell is indicated by a
rectangular box called a cell pointer which can be moved from cell to cell
using the keyboard or the mouse. In Microsoft Excel, data is entered in a
worksheet. A worksheet is like a page in your notebook where you can
142
ICT COMPUTER SOFTWARE Applications
write some data. You can have several worksheets, each with its own data.
A number of worksheets form a workbook. A workbook is like your
notebook with many pages of paper.
Columns
Cell pointer
Cells
Rows
Cell references are identifiers for cells. They are like house numbers in a
town so that when we enter data in the cells we must know where the data
is located. A cell reference is formed by combining the letter for the column
and the number for the row which intersect to make up the cell. For
example, where column C and row 5 intersect there is a cell whose cell
reference is C5. Notice that the cell reference starts with the column letter
and ends with the row number. Therefore, 5C is not a correct cell reference.
Exercise 5.1
143
ICT COMPUTER SOFTWARE Applications
You can enter three types of data in a cell. These are labels, values and
formulas. Values are numeric data or figures that we enter in cells. For
example, test scores, sales figures, number of hours worked, etc. Labels are
used for the purpose of giving meaning to values. A value without a label is
meaningless. For example, a value 60 entered in a cell has no meaning until
a label has been attached to it. You can appreciate this by referring to the
Microsoft Excel screenshot shown below.
144
ICT COMPUTER SOFTWARE Applications
On the other hand, we know what the value 70 means; it is the average
score. Formulas are used to calculate data. For example, you must agree
that to find the average score you have to use a formula. Labels differ from
values. For example, labels are aligned left in cells and values are
aligned right (see illustration below).
Examine the alignment of the data in column B. The ones aligned left are
labels, and those aligned right are values. What is the difference between
the two entries in cells B6 and B7? The entry in B6 is label. What makes it a
label? It is the inclusion of the two letters ‘Os’. Any data entry with
alphabetical characters is treated as a label in Microsoft Excel. Therefore, be
careful when entering numeric data that includes zeros; ensure that you do
not type O in place of 0. Should you type a number that gets left aligned in a
cell, know that you have included non-numeric characters in the number.
I must first mention that the best way to really appreciate the material
presented here is by you starting Microsoft Excel. If you can’t, then simply
read through. You will still get the idea.
145
ICT COMPUTER SOFTWARE Applications
To calculate data using formulas you must use operators. These are
symbols that indicate the kind of manipulation required. Given below is a list
of some operators.
To see how formulas work, let us suppose that you buy and sell grocery
items. Assume that you sell the items at a gross profit of 20%. The Microsoft
Excel screenshot below gives the details.
Our task is to fill the COST, SELLING PRICE, SALES and GROSS PROFIT
columns. Although you can use pen and paper, or your calculator to do the
computations, it is far easier to do so using Microsoft Excel. Firstly let us use
an approach which although works but is not the correct way of performing
calculations. Later I will your show you a better approach.
146
ICT COMPUTER SOFTWARE Applications
a) Click in cell D4 under COST so that we can enter the formula for finding
the cost.
b) Type =12000*50
c) Press Enter or click in another cell
We can see that the cost of the 50 units of sugar is K600,000. Although this
is correct, the method used is incorrect. Why? To understand this, remember
that one reason why we use computers is to simplify work. Work is
simplified if certain operations can be automated. Spreadsheet programs are
good for automating operations. For example, suppose that we change the
value in cell C4 so that it is now 40 instead of 50. (Try it if you are using a
spreadsheet right now.) You will notice that the value in cell D4 remains
unchanged and you have to re-calculate it. It happens like this because we
did not use a correct formula to calculate the result. The correct formula is
one which uses cell references instead of the actual values in the cells. To
calculate the COST of sugar, we should type the formula: =B4*C4 in cell D4
instead of =12000*50. (Try it!) You will get the same result, i.e. K600,000.
This is now better because you can prove it by typing 40 in cell C4 and
pressing enter. You should notice that the result changes automatically to
K480,000 in cell D4.
147
ICT COMPUTER SOFTWARE Applications
Is this all that makes a spreadsheet better? No. Let’s continue in order to
appreciate this more.
Suppose we now wish to compute the COSTS of the other products. You can
repeat the formula used for sugar. Please, do not type the formula again.
Just do this:
a) Click in cell D4 again.
b) Now put the mouse pointer on the small square called the Autofill
handle on the bottom right side of the cell pointer. It looks like this:
Autofill handle
c) Once your mouse pointer changes to a +, press the mouse button down
and drag the pointer to cell D8 and release the mouse button.
You will notice and appreciate that all the calculations are automatically
done. This should take you more time using a calculator.
Microsoft Excel has a lot of functionality which helps perform operations very
easily. It even has in-built formulas called FUNCTIONS which you can use
to perform many complex calculations such as standard deviation,
depreciation of an asset, and many mathematical, statistical, financial, and
engineering calculations. You will learn more about the program in your
practical lessons.
148
ICT COMPUTER SOFTWARE Applications
Exercise 5.2
Write the formulas which you would use to calculate the rest of the data
given in the Microsoft Excel screenshot above. (Do it practically if you have
Microsoft Excel.)
5.5 Database
149
ICT COMPUTER SOFTWARE Applications
150
ICT COMPUTER SOFTWARE Applications
What are the types of DBMS? How do they really differ from each other?
Over the years different types of database programs have been used. Of the
many types, three of them are worth talking about. The three are:
• Network database
• Hierarchical database, and
• Relational database
Network database
B1 B2 B3
C1 C2 C3 C4
Hierarchical database
151
ICT COMPUTER SOFTWARE Applications
Relational database
What differences have you noticed among the three types of database
models?
In this sense, ‘best’ is with respect to performance. The best database model
of the three types is the relational database. Why? This is because it is more
efficient. One major problem with the network and the hierarchical database
types is that there is too much duplication of data. What does this mean?
It means that in these two database models the same piece of data may be
recorded more than once. Let’s give an example. Suppose that the same
students’ performance results are recorded more than once, e.g. with the
class teacher and with the deputy head teacher. You should agree that a
problem would arise if the results are altered by one of these people, for
example by the deputy head. As the class teacher may not know what has
happened, these people will end up giving conflicting information about the
performance of some students in the class. The relational database model is
the best because it does not allow the duplication of data. In our example,
the students’ results would be recorded once only. If one person makes
changes to the data, everyone who accesses it will find that the data has
been modified. For this reason, the database type which is used nowadays is
the relational database. However, latest developments have indicated that
even the relational database is not very efficient. Other database types are
being proposed but these are mainly for very advanced use.
Field A field is the smallest item of data that can convey meaning to
someone. For example, when we describe something, e.g. a
person, we mention certain things such as first name, last
name, date of birth, nationality, sex, etc. In DBMS vocabulary
these are called fields. Fields are columns of a table.
153
ICT COMPUTER SOFTWARE Applications
Academic details:
ID QUALIFICATION YEAR OBTAINED
M2005 Diploma 2000
Z1000 Degree 2008
Employment details:
ID POSITION HELD DURATION
M2005 Accountant 6 years
Z1000 Teacher 2 years
Animal details:
CATEGORY NAME NUMBER
Domestic Cow 200
Wild Lion 3
Do the four tables qualify to belong to the same database? If not, which
one(s) would be strange to the database?
Clearly you can see that the first three tables have related data and can
therefore belong to the same database. The last table, which gives animal
details, does not seem to have any relationship with the first three. This is
why a database is defined as a collection of two or more related tables.
Let’s next focus on the last question. How does database software work? Or
how do we use it?
154
ICT COMPUTER SOFTWARE Applications
To really appreciate how a database works or how it is used, let’s now learn
about database objects.
155
ICT COMPUTER SOFTWARE Applications
DBMS to be really very important and useful programs. For example, if your
database has the tables which we used in the earlier example, i.e. Employee
personal details, Academic details, and Employment details, we can create
queries which would extract from the tables the following information:
• The names of employees that are not Zambians.
• The names of employees that have degree qualifications.
• The names of employees that are Zambians, have diplomas and have
more than two years work experience.
If you imagine that your tables have numerous records, then you will agree
that to obtain these pieces of information manually would be very difficult.
But with the use of a query, the information can be obtained from the tables
within seconds.
Another database object which can be used to work with data in the
database is a form. Forms serve multiple functions. You can use a form to
enter data into the tables. You can also use forms to view the records in the
tables or in the queries.
Suppose that we have extracted some information from the tables in the
database and we wish to present this information in a more professional
way. One thing about tables and queries is that they cannot present details
in a more professional way. Tables and queries merely display results. But if
we want to place details in more appropriate positions, and well formatted,
e.g. using appropriate fonts, colour, bold, underline, etc, we need to use
another database object which has this capability. This is the report.
Reports are particularly useful when we want to print or communicate
results to other people but in a more professional way.
156
ICT COMPUTER SOFTWARE Applications
Exercise 5.3
1. What are applications programs?
2. Why is a computer without applications software ‘worthless’?
3. Name at least four applications programs.
4. In what way does a word processor differ from a spreadsheet?
5. What is meant by ‘formatting a document’?
6. Mention four ways of formatting a document.
7. Mention four features of a spreadsheet program.
8. State what is meant by the formula =Sum(A4:F4).
9. Suppose that you have figures in cells A1 and G7 which you want to
multiply together. Write two formulas which you would use to get the
result.
10. How is a database different from a spreadsheet?
11. What is a database, and how is it different from a DBMS?
12. Every DBMS has three components. Name the components.
13. What do you understand by the following database concepts?
14. Mention any three objects of the Microsoft Access database.
15. Which object in Microsoft Access would you use if you wanted to
extract details of pupils who scored distinction in an examination?
157
ICT COMPUTER SOFTWARE Summary
Having learnt about software in this module and hardware in Module 2, we should
now learn how we can acquire these things for our use. You might be wondering if
at all this is really important. ‘Why not simply walk to a computer shop and buy the
machines from the shelves?’ You might be asking this question. What would be
wrong with this approach? This chapter explains the best approach which you must
follow in order to acquire a computer system.
158
ICT COMPUTER SOFTWARE Summary
159
ICT COMPUTER SOFTWARE Summary
Exercise 6.0
1. What is the first consideration to make if you want to acquire a computer
system? Explain why this is important?
2. What do you understand by software vendor?
3. Familiarisation with software is important before you buy one. Explain,
and state how you can achieve this.
160
ICT COMPUTER SOFTWARE Summary
Summary
In this module you have learnt about computer software. You have learnt
that computer software is a set of programs for controlling the performance
of the computer. A program is a set of instructions designed to accomplish a
specific task.
You have learnt that in general a computer has two types of software,
namely systems software and applications software. Systems software
is used by the computer and applications software is used by people to
accomplish specific tasks. Systems software consists of operating system
(OS) and utilities. The OS is the main software in the computer because it
sets all the rules about how the whole computer system works. Utilities are
used in order to extend the capability of the OS. Examples of OS are
Microsoft Windows, UNIX, and Linux, and examples of utilities are Antivirus,
disk defragmenter, and backup.
161
ICT COMPUTER SOFTWARE Self-Assessment Questions
Self-assessment Questions
(You will find answers to the questions at the end of the module. You should not
look at the answers before attempting the questions by yourself.)
Question 1
(c) The first column in the table given below shows functions performed
by programs in the computer. In the second column, write the name of
the type of software which performs each function, and in the last
column write the name of an example of the software mentioned in the
second column. [16]
162
ICT COMPUTER SOFTWARE Self-Assessment Questions
Question 2
(b) List any four formatting that you can perform on a document.
Question 3
PRINTER
SOFTWARE X SOFTWARE Y
COMPUTER
ACCOUNTANT
Figure 3
163
ICT COMPUTER SOFTWARE References
References
164
ICT COMPUTER SOFTWARE Further reading
Further reading
http://www.google.co.zm/imgres?imgurl=http://bigteaparty.com/blog/wp-
content/uploads/VaL/060407_migrantWorkers.jpg&imgrefurl=http://bigteaparty.com/farm-workers-
in-the-
us/&h=273&w=622&sz=46&tbnid=U8qTWTTtxhkzZM:&tbnh=54&tbnw=123&prev=/search%3Fq%3Di
mages%2Bof%2Bfarm%2Bworkers%26tbm%3Disch%26tbo%3Du&zoom=1&q=images+of+farm+wor
kers&docid=orcp7KeYpvGLMM&hl=en&sa=X&ei=FdOCT9izC-
Kn0QWgx5DwBg&ved=0CEgQ9QEwAQ&dur=751
http://en.wikipedia.org/wiki/List_of_word_processors
http://en.wikipedia.org/wiki/File:Word_Pro.png
http://www.softpedia.com/progScreenshots/Corel-WordPerfect-Office-Screenshot-32287.html
165
ICT COMPUTER SOFTWARE Further reading
Question 1
Question 2
(a) (i) Booting a computer means starting a computer.
(ii) Formatting a document means making changes to text in a
document in order to improve the document’s quality.
166
ICT COMPUTER SOFTWARE Further reading
Question 3
167
ICT COMPUTER SOFTWARE Further reading
Foreword to module 4
Dear Student,
168
ICT COMPUTER SOFTWARE Further reading
may not have some of the systems described in this module, you are
advised to visit some nearby places, e.g. colleges, schools, shops, offices,
just to see them. Examine the pictures which have been included just to help
you understand the material well, and ensure that you attempt all the
exercises. Since the exercises are meant to consolidate your learning, the
more you interact with them the more you will learn.
TVTC
169
ICT COMPUTER SOFTWARE Further reading
Table of contents
Foreword ...............................................................................................................................................167
Introduction .........................................................................................................................................172
Objectives .............................................................................................................................................173
Chapter 1 ROLE OF COMPUTER NETWORKS.....................................................................174
1.1 Introduction..........................................................................................................................174
1.2 Advantages of computer networks..............................................................................174
Exercise 1.0......................................................................................................................................176
Chapter 2 TYPES OF COMPUTER NETWORK .........................................................................177
2.1 Introduction..........................................................................................................................177
Exercise 2.0......................................................................................................................................177
2.2 Local area networks ..........................................................................................................177
2.2.1 Star topology ...............................................................................................................178
2.2.2 Ring topology...............................................................................................................179
2.2.3 Bus topology ................................................................................................................180
2.2.4 How CSMA/CD works ..............................................................................................180
2.2.5 Tree topology .............................................................................................................181
2.2.6 Mesh topology............................................................................................................181
Exercise 2.1......................................................................................................................................182
Chapter 3 HOW TO SET UP A NETWORK ...............................................................................183
3.1 Requirements for setting up computer network ....................................................183
3.1.1 Ethernet........................................................................................................................183
3.1.7 Hubs and Switches ...................................................................................................189
3.1.2 Protocols.......................................................................................................................191
3.1.3 Naming System...........................................................................................................193
EXERCISE 3.0 ..............................................................................................................................196
Chapter 4 THE INTERNET ...........................................................................................................197
4.1 Use of the Internet ............................................................................................................197
4.2 Advantages of the Internet ............................................................................................197
4.3 Browsing the Internet ......................................................................................................198
4.4 Internet Vs World Wide Web .........................................................................................198
170
ICT COMPUTER SOFTWARE Further reading
171
ICT COMPUTER SOFTWARE Further reading
Introduction
Have you ever heard of the saying “The whole is greater than the sum
of its parts”? This statement is really much more meaningful when applied
to computers and their associated resources. A computer network is an
interconnection of computers. There are various reasons why computers
may be interconnected to one another. Suppose that you have two or more
stand-alone computers. (Note: A stand-alone computer is a computer that
is not linked to another computer.) Although you can do quite a lot with
these computers, the benefits are multiplied when you link your computers
together to form a computer network. There are certain things which you
cannot do with stand-alone computers, or which you can manage to do but
with many difficulties. For example, think about this scenario: Mrs
Mweemba, Ms Chanda, Mr. Mubita and Mrs Silomba are teachers and they
share the same office. Each one of them has a stand-alone PC on the desk.
Mrs Silomba’s has a printer connected to her computer. The other three
teachers feel that they must also have their own printers. What is the
solution?
172
ICT COMPUTER SOFTWARE Further reading
Objectives
1. State what is meant by computer network.
2. State reasons why organisations set up computer networks.
3. State the three types of computer network.
4. State the basic differences between types of computer network.
5. State what is meant by LAN topology.
6. Name the different types of LAN topologies.
7. Draw diagrams to represent the Star topology, Ring topology and Bus
topology.
8. Describe how communication is effected in each of the three types of
LAN topologies.
9. State the relative advantages and disadvantages of each type of LAN
topology.
10. Name the basic networking requirements, i.e. transport media,
protocols and naming system.
11. Briefly describe Ethernet technology, TCP/IP and DNS.
12. State what the word Modem means, and what a modem is used for.
13. State what the letters NIC stand for, and what a NIC is used for.
14. Mention the various communication channels that can be used to send
data from one computer to another computer.
15. State some advantages and disadvantages of the communication
channels mentioned above.
16. Identify by name a communication channel given its drawing or picture.
17. State the use of each of the following computer network devices:
Router, Switch , Hub, Bridge , Gateway, Firewall
18. Set up a local area network to share resources, e.g. printer and data.
19. State what is meant by Internet and World Wide Web (WWW).
20. State the role of Internet browser software.
21. Name some popular Internet browser software.
22. State the difference between a Website and a Web page.
23. State the role played by the Internet Search Engine.
24. Name some popular Internet Search Engines.
25. State what is meant by e-mail.
26. Create an e-mail address.
27. Send and receive e-mail.
28. Mention advantages of e-mail over ordinary mail.
173
ICT COMPUTER NETWORKS Role of Computer Networks
1.1 Introduction
A computer network is an interconnection of network nodes. Although
computers have made tremendous impact on our lives, computer networks
have done so in a much more remarkable way. They have changed the way
we live and do business.
So, what are the specific advantages that we draw from networking
computers?
174
ICT COMPUTER NETWORKS Role of Computer Networks
Mwamba will find it. There are many other ways of communicating by
means of networked computers in addition to e-mail.
175
ICT COMPUTER NETWORKS Role of Computer Networks
Exercise 1.0
1. What is a stand-alone computer?
2. What is a computer network?
3. What advantages can you think of for networking computers?
4. In what way do computer networks reduce operational costs?
5. In what way do computer networks increase operational efficiency?
176
ICT COMPUTER NETWORKS Types of Computer Network
2.1 Introduction
Having learnt about what computer networks are and reasons for forming
them, you must be wondering how computers can be networked. Before we
come to this, let us first understand some fundamental details about
computer networks. How to link computers will depend on what type of
network you want to set up.
Generally, there are three ways in which computers can be linked. The
determining factor is usually the distance over which the network will span.
If computers are within the same locality, e.g. in the same room, or in the
same building or in the same school campus, the network is called the local
area network (LAN). If the computers are in the same town or district, the
computer network is called the metropolitan area network (MAN), and if
the computers are in different geographical areas or locations, e.g. in
different towns or countries or in different continents, the computer network
formed is known as the wide area network (WAN). An example of the
WAN is the Internet which links many computer networks in the world.
Exercise 2.0
1. What is the difference between a LAN and a WAN?
2. Which computer network would be set up between your school and the
DEBS office in your district?
177
ICT COMPUTER NETWORKS Types of Computer Network
work output. This is why many organisations set up local area networks at their
places of work.
There are various ways in which computers can be linked with each other to form a
local area network. For example, computers can be linked to form a star, a ring or
a bus network. (See http://www.giac.org/cissp-papers/32.pdf) The way computers
are interlinked is called a topology. Therefore, you often hear people talk about
star topology, ring topology, bus topology, and so on. You will learn about each of
these topologies in the next few sections.
In this topology, there is a central node called the server to which all other
computers are linked. The computers connected to the server are called terminals
or workstations or slaves.
by Chris Woodford
The server is usually a high-speed computer, e.g. a minicomputer or a mainframe
computer. (Note that a high capacity and high speed microcomputer can also be
used as the server). The terminal computers are also commonly known as clients.
Thus a star network is also known as a client-server network.
178
ICT COMPUTER NETWORKS Types of Computer Network
PEER
PEER PEER
PEER
179
ICT COMPUTER NETWORKS Types of Computer Network
In this network, a cable called a bus runs through. All the computers in the
network are linked to this cable.
By Jim Murray
1. A computer wishing to transmit a signal first listens in, i.e. first checks
the network to find out if another computer is also transmitting. This is
done to ensure that no two computers transmit at the same time. If two
or more computers transmit at the same time, a signal collision occurs.
2. If no other computer is transmitting, it sends its signal.
3. The transmitting computer then listens in for the second time to ensure
that no other computer transmitted a signal while it was sending its own.
4. If a computer detects a signal on the network when it listens in, all
computers that sent signals terminate transmission and wait for some
time to give each other chance. Each computer waits for a random time,
180
ICT COMPUTER NETWORKS Types of Computer Network
i.e. each computer chooses a different time period to wait for other
computers to transmit their signals.
Although a bus network is theoretically supposed to be very fast, in practice
its efficiency can greatly be affected, especially where the network is large
with many computers.
Other network topologies are tree and mesh as illustrated below.
2.2.5 Tree topology
181
ICT COMPUTER NETWORKS Types of Computer Network
Exercise 2.1
182
ICT COMPUTER NETWORKS The Internet
In this chapter you will learn details about how you can set up your own
computer network. But before we look at the details let us ask the following
question:
In order to set up any computer network you need three things. What are
they? You need transport media, you need protocol, and you need a
naming system. Why are these things required? You will discover in this
chapter. So, continue reading, but do it carefully so you don't miss vital
points.
You will agree that since a network involves sending of signals from one
point to another point there must be some resources to convey the signals
between the two points. Therefore, transport media refers to the set of
resources for conveying signals from one node or network to another node
or network.
3.1.1 Ethernet
The most common transport media used to convey network signals is called
Ethernet. Ethernet technology consists of communications channels such
as UTP or fibre optic and network repeaters such as hubs and switches. You
will learn more about these things in the sections that follow.
183
ICT COMPUTER NETWORKS The Internet
UTP
UTP stands for Unshielded Twisted Pair. This is a pair of copper wires that
are twisted around each other and are not protected from environmental
interference.
Advantages of UTP
1. The cables are cheaper.
2. UTP is easier to install.
184
ICT COMPUTER NETWORKS The Internet
3. Modern UTP (e.g. Cat 6) has higher data transfer rates or bandwidth.
Disadvantages of UTP
1. Data transfer rates are low for old UTP.
2. It has a distance limit of approximately 100m.
3. There is more environmental signal interference.
Coaxial Cable
1. Coaxial cables transmit data faster than UTP because their bandwidth is
larger.
2. Coaxial cables can cover longer distances than UTP.
3. There is less signal interference from the environment.
185
ICT COMPUTER NETWORKS The Internet
This is a very thin rod of extremely pure glass the size of your hair. Signals
are transmitted in form of light instead of in form of an electric current like
in UTP and coaxial cable. Each fibre is bent at a special angle to allow for
total-internal reflection of light. (Do you recall total-internal reflection from
your Physics lessons at school?) Several glass fibres are bundled together to
form the optical fibre.
1. Fibre optic cables carry more data because they have a much greater
bandwidth than metal cables.
2. Fibre optic cables are less susceptible (i.e. vulnerable) than metal cables
to interference.
3. Fibre optic cables are much thinner and lighter than metal wires.
4. Data can be transmitted digitally rather than analogically.
1. The main disadvantage of fiber optics is that the cables are expensive to
buy and install.
2. In addition, they are more fragile (i.e. brittle) than wire.
3. The glass can be affected by various chemicals including hydrogen
sulphide gas.
4. Most fibres become opaque when exposed to radiation.
5. Optical fibres cannot be joined together as easily as copper cable and
require additional training of personnel to handle them.
186
ICT COMPUTER NETWORKS The Internet
These are communications links that allow for the sending of data as
electromagnetic waves. Examples are infrared, radio, microwaves, and
satellite. The advantage of some of these channels is that data can be sent
over very long distances by remote. (Remote means with no physical
connection between sending and receiving systems.) The bandwidth is also
large. The picture below shows a satellite dish.
Satellite Dish
Communications
satellite
Satellite dish
187
ICT COMPUTER NETWORKS The Internet
3.1.1.5 Repeaters
When a signal is sent along any communications channel, it becomes weaker
as the distance from the source increases. It is the same with sound and
light. This is called attenuation. See illustration below.
I can’t hear you
Come and rescue your
clearly. Let me come
friend!
closer.
188
ICT COMPUTER NETWORKS The Internet
Attenuation is not good for network signals because it might cause the
signals to fail to reach their destinations. Therefore, when setting up a
computer network measures have to be taken to ensure that attenuation will
not cause signal losses. One approach used to go round this problem is by
including devices called repeaters at certain points along the network. You
must have an idea about repeaters because they are widely used in TV
signal transmission. For example, to transmit TV signals from our Lusaka
and Kitwe studios to far away areas such as Kasama, a number of repeaters
called substations have been installed along the way. The repeaters are
located at convenient points. They receive the transmitted TV signal, boost it
(or amplify it) and then re-transmit it towards its destination to the next
repeater. This is repeated until a strong signal gets to the final destination.
Client Client
Client Client
Servers 150m apart
LAN 1 LAN 2
Since the two networks are linked by UTP which has a maximum distance of
approximately 100m, signals cannot be conveyed between the two. A hub or
a switch can be connected between the two networks to boost the
transmitted signals. See illustration below.
Client Client
189
ICT COMPUTER NETWORKS The Internet
Client Client
Servers 150m apart
If the switch is placed, for example, 75m from either server, it will amplify
signals that pass through it in either direction. The switch will also direct
transmitted signals to their correct destination.
Switch Hub
H
Notice that the outside appearance of switch and hub might be the same. It
is their internal circuits and operation that differ.
SWITCH
190
ICT COMPUTER NETWORKS The Internet
So far you have been learning about transport media, or Ethernet. Let’s now
learn about protocol.
3.1.2 Protocols
What is a protocol? A protocol is a set of rules that govern how something is
done or must be done. Computer networks require a number of rules to
ensure that communication is possible between and among different devices.
Just like people speak different languages, network resources also ‘speak’
different languages. Protocols ensure that network resources and procedures
are standardized. For example, human beings have standardized the way
they greet each other by means of hand-shakes. Which hand do you use to
greet someone? What happens if the person you are greeting extends
his/her left hand to shake yours? Another way in which we are using
standards is in footwear. If you go into shoe-making business, you have to
follow the standard sizes or else your enterprise gets into ‘maningi’ (serious)
trouble.
What’s she talkin’
about? What horrible
There is a cockroach in that staff
language is that? No
you’re drinking!
shoes? I’ve no size.
191
ICT COMPUTER NETWORKS The Internet
the sending node alert the receiving node about this transmission, and how
could the receiving node tell whether or not the data received is exactly the
same as the one that was sent? Furthermore, how should data be prepared
for more efficient transmission? For this last one, think of how you would
prepare your harvested maize for efficient transportation to millers. You see
that the standard procedure (in Zambia now) is to package the grain into
sacks of 50kg capacity. What happens if you try to be ‘clever’ and make
under-weight bags?
Well, I think you now have followed the rationale for protocols in networking.
Protocols are simply about creating standards that ensure that
communication is efficient and effective regardless of the type of machine or
device used.
There are many protocols used. Some of them work in specific situations
only but there are others that are more general. Actually, to ensure that
there is harmony in networking, international standards have been
established. The organization which sets these international standards is
called the International Organization for Standardization (ISO). You can call
it the International Standards Organization if you like. The ISO does not set
standards for computer networks only. It also sets standards for all products
and services. For example, if you would like to produce goods or offer
services to international quality in order to capture the global market, you
should look at what the ISO has stipulated for those goods or services. The
branch of the ISO that sets standards for computer networks is called the
ISO-OSI. This stands for International Organization for Standardization-
Open System Interconnection. However, the rules set by the ISO-OSI are for
reference purposes only. The more specific protocols used in the world today
are called the TCP/IP. Let’s learn about these briefly.
3.1.2.1 TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
Doesn’t sound good; does it? TCP/IP has become a sort of international
networking standard. Basically, it indicates how the network hardware and
other resources should be made, how they should be connected to form
computer networks, and how signals must be sent and received on the
networks.
192
ICT COMPUTER NETWORKS The Internet
I hope you’re enjoying all this. Let’s move on. We will now learn about the
naming system which is a third requirement for setting up a computer
network.
3.1.3.1 DNS
DNS is a system of ensuring that signals on a computer network always find
their destination. Without DNS it is impossible for two or more nodes to
communicate because they would not be able to identify each other. Each
node on a network is allocated a unique address to be identified with it. This
unique address is called the IP address. Usually the IP address is a decimal
dotted number such as 192.168.1.117. Notice that the dotted decimal IP
address always has four numbers separated by dots or periods. Therefore, if
you wanted to gain access to your friend’s computer that has this IP
address, you would simply type 192.168.1.117 in a special window on your
193
ICT COMPUTER NETWORKS The Internet
screen. However, due to the fact that addresses written like this are not
easily remembered, domain names are allocated to IP addresses. For
example, the IP address could be allocated a domain name such as
tvtc.edu.zm. It is usually written as www.tvtc.edu.zm. Therefore,
entering www.tvtc.edu.zm is equivalent to typing 192.168.1.117. It does
not matter which approach you use. It’s just like you; you can be called by
your name or by your NRC number, or college number. But as you will
agree, it is easier to call people by their names.
3.1.3.2 IP addresses
An IP address has three parts. These are:
a) The kind of protocol which should be used in order to access the
computer
b) The name of the computer (or organization which owns the computer),
and
c) The nature of the organization and the country in which the organization
is located.
194
ICT COMPUTER NETWORKS The Internet
What other resources are required for linking nodes together to form
a network?
To understand why NIC or Modem are required, let's first learn about the
nature of computer signals. As was mentioned in Module 2, data in a
computer is represented in binary, e.g. 01000001 for letter A (in ASCII). In
order that the bits representing one character must arrive at the same time
in the computer, each bit follows its own line. This means that the bits
travel in parallel (i.e. side by side) within the computer. (This is why the
size of the bus matters.) Now, a problem arises when the data has to be
transmitted out of one computer along a communications channel such as
UTP to another computer. Along UTP the bits of data will be transmitted in a
serial manner (i.e. one behind the other). We say that computers handle
data in digital form and wires transmit data in analog form. This is similar
to the problem which two or more people who are running side by side along
a wide road would face if they try to go into a narrow bush path. Along the
narrow path, they would have to break into a single-file.
To transmit data out of the computer introduces this similar challenge. The
data must be converted from parallel to serial and then back to parallel
again as it enters another computer. The devices for achieving this are NIC
and modem. Only one of the two is required depending on how you want to
connect the computers to one another. If you want to connect a computer to
an Ethernet LAN, you need a NIC, but if you want to connect to another
network through your telephone line (i.e. landline, e.g. Zamtel lines) you
need the modem. Nowadys what is popular is the use of a NIC. In fact every
new computer now comes with a NIC socket into which UTP can be
connected. This socket is called the RJ45 port.
195
ICT COMPUTER NETWORKS The Internet
RJ45 Sockets
Digital signal in
computer
Analog signal in
wire
EXERCISE 3.0
1. What is a modem?
2. How does a modem differ from a NIC?
3. In what way is a modem similar to a NIC?
4. Why does a computer require a modem or a NIC?
5. Mention the three wired channels.
6. Which wired channel is the cheapest, the most expensive?
7. What is bandwidth?
8. Which wired channel has the least bandwidth, the largest bandwidth?
9. Why is UTP common on LANs?
10. What are the advantages of satellite communication?
11. Mention three things that are required for networking.
12. What do you understand by IP address, and what is its importance?
13. In what way is a switch similar to a hub? In what way is it different?
14. Explain the meaning of the URL http://www.assist.com.
15. Explain why protocols are useful in computer networks.
196
ICT COMPUTER NETWORKS The Internet
Did you know that the Internet is ranked one of the greatest inventions of all
time? Other great inventions were the wheel and the telephone. (In what
way were the wheel and the telephone great inventions?) The Internet is a
global interconnection of computer networks. Nobody owns it, but anybody
can connect to it.
197
ICT COMPUTER NETWORKS The Internet
Browsing the Internet means searching it for whatever you want. To browse
the Internet is simple. You simply start the Internet browser software, e.g.
Internet Explorer, Opera, Google Chrome or Mozilla FireFox. Once in
the browser you can navigate in so many ways. If you already know the
address of what you want, you simply type it in the address box in the
browser and then click on a button to get to the destination, or you can
simply click your mouse pointer on any of the numerous hyperlinks to take
you to the destination of your choice.
Some people find these two terms confusing. You shouldn't. The WWW is an
infrastructure of information which the Web browser software allows you
access to. The WWW consists of several sites called Websites. Websites are
located in computers called Web servers. There are thousands of Web
servers around the world. These computers store massive information on
different topics. The information contained in these different Websites is
what is collectively known as the World Wide Web (WWW). The WWW is
actually a web of information. The Internet is a system of computers that
accesses and retrieves information from the WWW. That is, you need the
global network of computers (the Internet) to access the global network of
information (the WWW).
198
ICT COMPUTER NETWORKS The Internet
This question sounds silly! It is really like asking someone the difference
between a book and a book page. So you see, a Website consists of Web
pages. The information you access on a Website is actually located in Web
pages within that Website, just as the information you access in a book is
located on a particular page within that book. A Web page is actually a
document of information that you access from a Website. A website has an
address like this: www.something.com. You will learn details of web
addresses later in this module.
They must be very Yes, they are well trained. They have
intelligent. developed some kind of super memory (like
you) which enables them to remember where
they see information on the WWW. I hope I
have satisfied your curiosity. Have I?
One of the most fascinating things about the Internet for most users is e-
mail. This is a facility available when one connects to the Internet. One can
send and receive text and both video and audio messages using e-mail. To
200
ICT COMPUTER NETWORKS The Internet
send e-mail, one types the message, indicates the address to receive and
clicks a button.
E-mail is meant to make mail more efficient. It also solves the problem of so
much paper wastage, unattended to telephones and delays in going to buy
envelops and stamps, and going to the post office to send the letters. It is
also extremely cheap to send messages by e-mail. In fact e-mail is mostly
free. You must have an e-mail address to be able to send or receive e-mail
messages.
As was mentioned, signals must be prepared and must be able to find their
correct destinations on the Internet. The router performs these functions. It
is the router which identifies the destination of a signal on the Internet. It
201
ICT COMPUTER NETWORKS The Internet
uses the IP address which the user has specified when making a service
request. Another important function of the router is to prepare signals for
more efficient transmission. Before your signal or message can be sent, the
router splits it into smaller chunks or slices called packets. It is easier to
send information in packets rather than in big chunks. This is just like we cut
nshima into smaller lumps as we eat. Once the message has been split into
packets, the router then identifies the most convenient route for each
packet. Packets don't usually travel along the same route to their
destination. Each packet is given, by the router, some accompanying
information to ensure that it reaches its destination. The receiving computer
re-assembles the packets to form the original message.
Another equally important use of the router is to ensure that only signals
meant for a particular network are allowed to enter the network. The router
acts in the same way as immigration officials at border posts to scrutinise
documents of travellers. Without routers, networks would soon be flooded by
many unwanted signals. See illustration below which shows how a LAN can
be connected to the Internet.
Signal
blocked by ISP Internet
router
Router
Switch
202
ICT COMPUTER NETWORKS The Internet
EXERCISE 4.0
1. What is Internet?
2. Mention the three functions of the Internet.
3. What is a web browser?
4. What are examples of web browsers?
5. What is a search engine?
6. Mention examples of search engines.
7. What is a website?
8. What is a web page?
9. What is email?
10. How does email make mail efficient?
11. How does a website address differ from an email address?
12. Explain the role of ISP.
13. State three roles of the router.
203
ICT COMPUTER NETWORKS Summary
Summary
Different types of network: LANs, MANs and WANs were mentioned. LANS
are those networks that interconnect computers in a building or school
campus. The Internet is an example a WAN and interconnects several
networks globally.
The module also described the various ways in which computers can be
interlinked to form LANs. These various ways are called LAN topologies, and
examples are star, ring, bus, tree and mesh. To interconnect computers to
form a network you need three things: transport media, protocols, and a
naming system. Ethernet is the most popular transport media. TCP/IP is a
network protocol which has become like an international standard. The
naming system used so that computers and networks can be easily identified
is the domain name system (DNS). Using DNS principles, every computer
and every network is given a unique address called the IP address. An IP
address is a dotted decimal number such as 192.168.1.117. Because of the
difficulties to remember IP addresses, they are given domain names such as
tvtc.edu.zm for the Technical and Vocational Teachers' College.
204
ICT COMPUTER NERTWORKS Self-Assessment Questions
Self-Assessment Questions
Question 1
Question 2
Which of the following is not a classification of computer networks?
A NIC
B LAN
C MAN
D WAN
Question 3
A star network is characterized by the fact that
A it is an expensive network to set up
B there is frequent signal collisions
C a token travels round the network
D a host computer controls signals
Question 4
Examine a communications channel shown in the figure below. This must be
A Optic fibre
B UTP
C Coaxial cable
D Infrared
Question 5
205
ICT COMPUTER NERTWORKS Self-Assessment Questions
Question 6
Question 7
Question 8
An ISP is required if one wants to connect a computer to the Internet
because…
Question 9
The type of computer network that can be set up between TVTC in Luanshya
and ZIBSIP in Kitwe is a…
(a) LAN
(b) MAN
(c) WAN
(d) Tree
Question 10
206
ICT COMPUTER NERTWORKS Self-Assessment Questions
Question 11
Question 12
Luyando and Choolwe Partnership has branches in several towns. Each office
has several computers all connected to a network. Staff at the different
offices communicate by email.
207
ICT COMPUTER NERTWORKS Self-Assessment Questions
Question 13
Question 14
Your school has three members of staff that share the same office. Each one
of them has a desktop computer, and a printer has been allocated to the
office to be shared.
(a) State the network resources which must be made available for the
sharing of the printer to be possible. (Do not include resources which
the computers may already possess.)
(b) Explain why each of the resources you have mentioned should be
available.
(c) Draw a diagram in the space given below to show how the printer
would be shared.
(d) “For our Internet connectivity, we’ll need the following: Router, ISP
and Firewall”. Suggests an IT technician. State reasons or use for
each of the suggested items.
Question 15
To set up a computer network, three things are required. What are these
resources, what are the examples and explain why they are required.
208
ICT COMPUTER NETWORKS References
References
209
ICT COMPUTER NETWORKS Further reading
Further reading
1. http://www.giac.org/cissp-papers/32.pdf
2. http://www.fotosearch.com/CSP563/k5633539/
3. http://www.google.co.zm/search?q=images+of+pupils+in+Zambia&btnG
=Search&hl=en&tbm=isch&tbo=u&biw=1600&bih=754
4. http://www.google.co.zm/search?q=images+of+cisco+router&hl=en&pr
md=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=QIKvT760CcHjtQad
v6ypBA&ved=0CH4QsAQ&biw=1600&bih=754
210
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
1 B 6 D
2 A 7 D
3 D 8 A
4 A 9 C
5 C 10 B
211
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
Client Client
Server
Client Printer
(d) Router:
• To split signal into packets for easier transmission
• To determine direction of signals
• To prevent signals not meant for a particular network from entering
it
ISP:
• To provide internet access to clients
• To allocate domain names to clients
Firewall:
• To prevent malicious code from entering or leaving a network or
computer
15 Required resources for setting up computer network:
• Transport media, e.g. Ethernet.
• Protocols, e.g. TCP/IP, and
• Naming system, e.g. DNS
• Transport media is required for conveying signals between nodes or
networks.
• Protocols are required for ensuring that nodes are able to
communicate with each other.
• Naming system is required in order to ensure that nodes are
uniquely identified on networks.
212
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
Module 5
Objectives
213
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
To every good thing, there is always some dark side. This is true with ICTs.
They have numerous advantages as you can now testify. However, all is not
rosy. ICTs also pose so many headaches. One of the major issues is that of
ICT security. Others are to do with privacy and ethics.
• Data security ensures that data, information and software are safe
from internal and external threats.
• Physical security ensures that all the various types of hardware are
safe.
Types of threats
214
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
There are many threats to IT resources. Some of the threats are as follows:
215
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
COMPUTER VIRUSES
There are many ways in which a computer may become infected by a virus.
Some of the common ones are as follows:
216
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
3. Don’t read e-mail from people you know but from whom you do not
expect e-mail.
4. Avoid the temptation to download anything you find interesting on the
Internet.
5. Don’t click on pop ups and other adverts that flash on your screen as
you browse the Internet. This requires a lot of personal discipline.
Many people simply get so excited with what they see on the screen
that they fail to hold themselves. But often they end up with lots of
problems which they regret.
6. Search for information by typing keywords in the Search Engine.
7. Ensure that your computer has latest versions of antivirus software.
8. Always update the antivirus software from the Internet.
9. Always scan your computer for viruses.
Obviously you know that there are people that find pleasure to see others
suffer. They are called sadists. Yes, there are sadists even on the Internet. A
hacker is a person who gains access to someone’s computer or network.
Some hackers do this with sinister or evil intentions. These hackers are
called crackers. Crackers always gain unauthorised access with the
deliberate intension to cause havoc. A cracker can steal your data or destroy
it. Sometimes a cracker will not enter your computer but he/she will
intercept your data and do anything to it. To protect yourself against
crackers, you should use very secure passwords and encrypt your data
during transmission. Secure passwords are those that do not use any names
of people, organisations and things like dates which a cracker can easily
decode. Secure passwords should contain alphanumeric characters that
should be extremely difficult to guess by anyone.
217
ICT INTRODUCTION TO ICT Answers to Self-Assessment Questions
Study questions
1. Someone remarks that she has a computer that she uses everyday with
no threat whatsoever of viruses and hackers. To what extent can this be
true?
2. Spam is e-mail that you receive from people that you do not even know.
Suggest how spam reaches your mail box.
3. When you start your computer, you find a message on the screen
warning you that your computer might be at risk. What does this
message mean, and what is it suggesting to you?
4. What is the difference between a Trojan horse and a worm?
5. What is the difference between spyware and spam?
6. Suppose that you notice that your computer has become very slow. When
you try to open programs it takes a very long time to do so. What are the
likely causes, and how would you resolve the problem?
7. What precautions should one take when assigning or using passwords?
8. Distinguish between physical security and data security.
218