Form Four Notes -Computer Studies
Form Four Notes -Computer Studies
24 lessons
Specific objectives
By the end of the lesson the learner should be able to:
a). Define computer networking
b). State the purpose of computer networks
c). Describe the elements of a network
d). Describe the various types of networks
e). Describe the various types of network topologies
1.1Definition of Terms
A network is a collection of independent entities that are arranged in such a
manner as to exchange data, information or resources.
Telephone networks are called voice networks.
A computer network –
- A series of computers and other devices connected through data
communication links or channels for the purpose of sharing information and
programs or
- A collection of two or more computers connected together using
transmission media e.g. telephone cables, or satellites for the purpose of
communication and sharing of resources or
- Is a set of two or more computers linked through telecommunications
hardware, software and media to share resources and data.
Multiplexed line
To computers
From computers
Throughput: is the measurement of how much data is being put through the
wires (media) connecting computer systems and devices. The data transmission
rate is measured in bits per second (bps).
Bandwidth:
- is the range of frequencies that can be accommodated on a particular
telecommunications medium; or
- the maximum amount of data that a transmission medium can carry at any
one time e.g. 100mps (megabits per second).
There are two main types of bandwidth namely Baseband and Broadband
Broadband transmission: It send analog signals with different frequency
over the transmission medium. Two computers can send signals at the same
c). State two ways in which collision can be avoided in a wired network
( bounded media)
Sending signals at different times (baseband)
Sending signals with different frequency (broadband)s
Attenuation refers to signal loss i.e. the strength of the signal reduces as the
distance increases or the decrease in magnitude and energy as a signal
progressively moves along a transmission medium. Is corrected by placing
signal amplifiers (repeater stations) along the medium at appropriate distances
in order to receive the weak signal, clean it and amplify it then retransmit it.
Disadvantages
- They require a greater bandwidth than analog signals
- Digital processing of data is very complex i.e. converting data from analog
form to digital form.
Wireless LANs
Not all networks are connected with cabling; some networks are wireless.
Wireless LANs use high frequency radio signals, infrared light beams, or
lasers to communicate between the workstations and the file server or
hubs. Each workstation and file server on a wireless network has some sort
of transceiver/antenna to send and receive the data.
v). Metropolitan Area Network (MAN)
These are large networks that spans a university or city. They typically use
fibre optics connections to link LANs in different geographical area. It is a
bigger version of LAN.
Advantage
Sharing of resources in different LANs.
vi). Wide Area Network (WAN)
Refers to computers connected together by telephone line, satellite or
microwave linked over a wide geographical area. The largest WAN is the
Internet which uses point – to – point data transmission method. This is a
Advantages
Faster data transmission
Allows communication between users in remote locations.
NB: Only three are the basic: LAN, MAN and WAN.
Computer server
A computer server is a computer in a network that provides services to other
computers on the network.
There are different computer servers depending on their functions:
1). File server - are generally powerful PCs with a large RAM and large
amount of hard disk space dedicated to storing files in a network.
Clients / work stations refers to other computers on the network that send
requests to the server.
Remote communication
Remote communication refers to the transmission of data signals between
two communication devices located at different geographical locations. It
enables people to share ideas and pass messages over the Internet.
The computer mailing a remote request is called a remote client while the
computer that is being accessed is called a remote host.
Cost effective
Limitations of networking
Costly to install:
The high initial cost of buying networks hardware and software is very high.
You also need an expert to set up the network.
Security issues
Networks are vulnerable to hackers, disgruntled employees or even competitors.
These people can easily try to break into a network system to read or damage
crucial information. Much effort is thus spend on trying to prevent unauthorized
access to data and software.
Over-reliance on networks
Modern organizations have phased out most manual operations, meaning that
all business and the society depend on computer networks. If the network fails
or goes down, then many systems will be brought to a halt e.g if all mobile
phones services were brought to a halt.
1.4Elements of Networking
There are three major categories of elements/components namely;
i). Data communication media
ii). Communication devices
iii). Networking software
Insulator Wire
conductor
The two common types of twisted pair are: unshielded twisted pair (UTP)
and shielded twisted pair (STP).
Unshielded twisted pair (UTP) is the most popular and is generally the best
option for school networks (See fig. 1). UTP cables don’t have a shield that
prevents electromagnetic interference (RMI) from the environment. It is
The quality of UTP may vary from telephone-grade wire to extremely high-
speed cable. The cable has four pairs of wires inside the jacket. Each pair is
twisted with a different number of twists per inch to help eliminate interference
from adjacent pairs and other electrical devices. The tighter the twisting, the
higher the supported transmission rate and the greater the cost per foot. The
EIA/TIA (Electronic Industry Association / Telecommunication Industry
Association) has established standards of UTP and rated five categories of wire.
Type Use
Twisted pair
Cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield (See fig. 3).
The metal shield helps to block any outside interference from fluorescent lights,
motors, and other computers and also prevents any internal fields from
escaping. The layers of insulation help minimize interference and distortion.
Coaxial cables transmit electrical signals that run through the central wire and
the metal braid. Coaxial cable have greater bandwidth of upto 1Gbps. These
cables are widely used to connect 2 or more separate LANs or worksites for
Local Area Networks, office buildings and cable television to connect TV
aerials.
than twisted pair cable. The two types of coaxial cabling are; Thicknet and
Thinnet (cheapernet)
a). Thin coaxial cable is also referred to as thinnet or Cheaper – which has
one dielectric insulator.
Disadvantages
- Thick coaxial cable is hard to work with
- Are expensive to buy and to install as compared to twisted pair
Electrical signals from source are converted into optical signals; they are then
retransmitted through a glass fiber and reconverted into electrical signals. It
transmits light which can travel over long distance and higher bandwidths. Fiber
optic cables are not affected by electromagnetic radiation and transmission
speed could go upto as high as trillions of bits per second. The speed of fiber
optics is hundreds of times faster than coaxial cables and thousands of times
faster than twisted – pair wire. This capacity broadens communication
possibilities to include services such as video conferencing and interactive
services.
Fiber optic cabling consists of a center glass core surrounded by several layers
of protective materials (See fig. 5). LED is used at the transmitter to convert
electric signal to light then at the receiving end a photosensitive device is used
to convert light back to electric signals that can be processed by computer. It
transmits light rather than electronic signals eliminating the problem of
electrical interference. It has also made it the standard for connecting networks
between buildings, due to its immunity to the effects of moisture and lighting.
Single mode fibre: has a very small core diameter of approximately 8 microns.
It allows only one mode of light to propagate. This makes it to have very low
attenuation rate an d is preferred for long distance transmission. It has a
bandwidth of 50 Gbps.
Graded index multimode fibre: it has a gradual change in the core’s refractive
index. The light rays thus gradually bend back into the core path. This results in
a better receive signal than with stepped index.
Both stepped and graded index allows more than one mode light source to be
fed in the cable, so distortion occurs. Have a high attenuation rate and are used
for shorter distances unlike single mode.
Light signal propagates through the core in a process called total internal
reflection caused by refraction. Refraction is the bending of light when it
crosses boundary of two mediums that have different density. Light is refracted
back to the core from cladding hence propagate through the cable.
- Since they transmit light rather than electronic signals they do not suffer
from electromagnetic interference, radio interference or cross-talk.
- Are immune to the effects of moisture and lighting
- Transmit signals over much longer distances than coaxial and twisted pair
- Have a high transmission rates from 100 Mbps way up to 2 Gbps enabling
services like video conferencing and interactive services.
- Are flexible in size and weight thus ideal for space limited situations.
Disadvantages
- Are very expensive to install and difficult to work with.
- Are more fragile than wire and difficult to split.
- Physical vibration at times shows up as signal noise.
- Are difficult to configure or fix together
- If a cable breaks is difficult and expensive to repair.
Cables summary
BOUNDED MEDIA
Two wire open Twisted pair Coaxial cable Fibre optic cables
lines cables cables
Transmission and reception for wireless media are usually achieved by means
of an antenna and can be one of the following.
Directional: point – to – point focused beams employing high frequencies.
Omnidirectional: Waves propagating in all directions using signals of lower
frequency
Ionospheric propagation
Definition of ionosphere: ionized layers in upper atmosphere: four layers of
the Earth's upper atmosphere in which incoming ionizing radiation from space
This propagation bounces off the earths ionospheric layer in the upper
atmosphere. It operates in the high frequency (HF) of 30-85 MHz. because it
depends on the earths ionosphere it changes with the weather and time of day.
The signal bounces off at the ionosphere and back to earth’s surface and the
receiver will pick the signal. The limitation of high frequency communication is
signal interception by unauthorized parties. AM radios operates in earth’s
atmosphere.
Bluetooth
A short range wireless technology. Operate at approximately 1Mbps with range
from 10 to 100 metres. Blue tooth is an open wireless protocol for data
exchange over short distances.
The main component in Bluetooth is a small low power two-way radio
transceiver, small enough to be inserted in small devices. A network of
Bluetooth enabled devices is called a wireless personal area network (WPAN)
or piconet. Bluetooth is best suited for personal or hand held devices thus
making it very popular in mobile communication and Internet connectivity.
Microwave Transmission
Microwaves are radio waves that provide a high speed signal transmission. The
transmission process involves sending signals from one microwave station to
another.
Satellite communication
A satellite is a microwave relay station and the microwave earths stations make
parabolic dishes with an antenna fixed on them in order to focus a narrow beam
towards the satellite in space. Satellite communication is often used for long
distances communications. Signals are send from earth station to a satellite.
Satellites are transponders (units that receive on one frequency and retransmit
on another) that are set in geostationary orbits directly over the equator. A
satellite transmission system has three main components:
a). Transmitter earth station – that set up an uplink to the satellite in order to
transmit data. The uplink has unique frequency.
b). A satellite – its in space where it receives, amplifies and retransmits the
signal to a receiving earth station via a downlink frequency different from
that of the uplink to avoid signal interference.
c). Receiving earth station - receive the sent signal on the other side of the
globe.
New trends in microwave transmission have seen the use of very small aperture
terminal (VSAT) technology which is a very small satellite dish used in data,
radio and TV. It enables direct access to satellite communication.
Infrared transmission
Is a form of light which is invisible to the human eye but can be used in the
same way as laser beams to carry data. Communication is through transceivers,
which must be within a line of sight in the same room. It is used in TV remote
controls but can also be used to communicate between computers or between a
computer and a printer at a short distance. Just like TV remote control, the
signal needs a clear “line of sight” between the sender and the receiver. Infrared
signals cannot penetrate obstacles like walls unlike radio signals. But the signals
Cellular radio
Use several radio communication technologies. The systems are divided to
different geographic area. Each area has low-power transmitter or radio relay
antenna device to relay calls from one area to the next are.
With so many users, it would be impossible to allocate individual radio
frequencies to each cellular telephone. With a cellular radio system, the country
is divided into a number of geographical areas called cells. These vary in size
according to the number of mobile phones users in the area. Within each cell,
the phones can each operate on a different frequency so that privacy and
security is maintained.
COMMUNICATION DEVICES:
For the network to be fully operational computers and transmission media
require communication devices, to be used as interfaces or junctions between
the terminal devices. Examples of data communication devices are;
o Network interface card s(NICs)
o Modems and codecs
o Hubs
o Bridges
o Repeaters
o Gateways
3. Hub
Also called multi port repeater or concentrator, operates at the Physical
layer and are simple devices that pass all traffic from both directions they link.
Hubs forward everything they receive. Hub connects and amplifies digital
signals from one computer, and transmits them to all other computers in
the network by broadcast. A hub will usually connect networks that have
common architecture software usually called protocols. Protocols. Several
hubs can be connected one after another to expand a network. This increases
the broadcast range which may lead to broadcast storms on the network.
Broadcast Storm: a condition where a network is overwhelmed with message
broadcast due to malfunctioning of network interface cards or hub related
problems.
4. Repeater:
- Repeater works at the Physical layer and are fast in performance. A repeater
solves the problem of attenuation, which is the loss of power of a signal. A
repeater takes an incoming signal and repeats it, but at a higher power and
noise- free. A repeater not only amplifies but also regenerates signals.
- Signal regeneration means that the original signal is absorbed, copied and
retransmitted along another segment of cabling.
- The new signal has been beefed up and cleaned up and when it leaves the
repeater is both renewed and noise free.
- Under OSI model the repeater functions on the physical layer to regenerate
BASEBAND digital signals.
- A repeater does not check errors and does not re-package the original signal.
If the signal had become corrupted before reaching the repeater, the device
would pass the corrupted data onto the attached segment.
- Both segments connected by a repeater must use the same access method i.e.
the logical link protocols must be the same in order to send a signal.
- Repeaters can move packets from one physical medium to another e.g. they
can take an Ethernet packet from a thinnet coaxial cable and pass it on to a
fiber- optic segment. In this case, the same access method is being used on
both segment but a different medium is used to deliver the signal.
- Because repeaters broadcast data from one segment to the next and back, are
simplest to expand.
5. Bridges:
Operate at the Data Link layer and are fast in performance. Connect similar
types of LANs (i.e. Ethernet to Ethernet, Token Ring to Token Ring) over a
wide area communication links. They understand only data link layer protocols
and addresses. They may connect similar types of cables.
- A bridge selectively determines the appropriate network segment for which
a message is meant for delivery through address filtering. A bridge can
divide a busy network into segments to reduce network traffic.
- A bridge is informed of where data is going to, and based on that
information can make an intelligent call whether or not to allow the data to
go to the destination.
- Bridges operate on the data link layer of the OSI model. On this layer
network systems group packets from data off the wire and make a
determination as to where the data goes.
Purpose of a bridge
o Isolates networks by Media Access Control (MAC) addresses i.e. it takes
an overloaded network and splits it into two networks, therefore they can
divide the network to isolate traffic or problems and reduce the traffic on
both segments.
o Manages the network traffic by filtering packets. The term filtering
packets refers to the process of deciding whether or not to forward a
packet.
o Translates from one protocol to another on the data link layer.
o Extend the length and the number of stations that a segment can support.
Advantages of bridges:
Increase the number of attached workstations and network segments.
It is possible to interconnect different segments, which use different
MAC protocols.
Since bridges work at MAC layer, they are transparent to higher-level
protocols.
By subdividing the LAN into smaller segments, overall reliability is
increased.
Used for non- routable protocols like NetBEVI, which must be
bridged.
Help localize network traffic by only forwarding data onto other
segments as required unlike repeaters.
Disadvantages:
The buffering of frames introduces network delays.
Bridges may overload during periods of high traffic.
6. Routers:
- Routers operate at the Network layer. The router interconnects different
networks and directs the transfer of data packets from the source to the
destination. Routing depends on network address enabled by a special
internetworking protocol called the Internet Protocol (IP).
- All the computers on the same network have the same network address but
different host numbers.
- The router receives a packet from another router on the internet work and
checks the destination network address is the same as the one on which the
router is, it passes the data packet to the destination host by reading the
host address otherwise the packet will be routed to the next network
address.
- A router links physically dissimilar LANs like Ethernet to token ring
LANs. Some modem routing devices combine the functionality of a bridge
and a router using a device called a brouter.
- Routers determine the best path for data to flow and filter broadcast traffic
to the local segment. They do NOT pass on the broadcast traffic.
In summary:
Require specific addresses.
Only pass packets to the network segment they are destinated for.
Routers do not talk to remote computers, only to other routers.
They can segment large networks into smaller ones.
They act as safety barrier (firewall) between segments.
They prohibit broadcast storms, because broadcasts and bad data not
forwarded.
Are slower than most bridges.
Can join dissimilar access methods.
Routers do not look at the destination computer address but NETWORK
address and only pass on the data if the network address is known. This
leads to less traffic.
Disadvantages of routers:
7. Brouters
Are devices that combine the functions of both Bridges and Routers. It
combines the best qualities of both bridges and routers. When a brouter
receives a data packet to be forwarded to the remote segment, it checks to
see if it recognizes the Network layer protocol. If the Brouter does, it acts
like a Router and finds the shortest path. If it doesn’t recognize the
Network layer protocol, acts like a bridge and forwards the data packet to
the next segment.
Brouters connect mainly different types of LANs together like Token ring
and Ethernet. Brouters are more cost effective than individual bridges and
routers.
8. Switches:
- Like Bridges, Switches operate at the Data Link layer (again
understanding only data link layer protocols and addresses.
- Unlike a Hub, a switch forwards a packet directly to the address node
without broadcasting. A node is data terminal equipment such as a
workstation or computer on the network. Switches connect two nodes
point to point thus reducing the broadcast problems on the network.
- Switches are enhanced version of the hub and one switch may be used as a
bridge to connect several hubs thus reducing the collision caused by
broadcasts.
- Switches are more expensive than hubs.
9. Gateways
A gateway is a translator which allows communication between dissimilar
systems or environments which do not use the same protocols, data formatting
structure, languages and architecture.
Gateways work at the Application layer making communication possible
between different architectures and environments. They perform protocol and
data conversion / translation by taking the data from one environment, strip it,
and re-repackage it in the protocol stack from the destination system. They
repackage and convert data going from one environment to another so that
each environment can understand the other environments data so that each
environment can understand the other environments data . Gateways can
translate protocols and data.
Network software
The software is classified into two main groups namely;
1. Network operating system s
2. Network protocols.
Data Link At this layer, data packets are encoded and Switch, None
(Layer 2) decoded into bits. It furnishes transmissionbridge and
protocol knowledge and management and router
handles errors in the physical layer, flow
control and frame synchronization. The
data link layer is divided into two sub
layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC)
layer. The MAC sub layer controls how a
computer on the network gains access to
the data and permission to transmit it. The
The seven layers of networking is sometimes referred to the OSI Model, Open
System Interconnection. Networking is broken down by traveling through
several layers or protocols. This process is broken down into seven layers;
Application Layer, Presentation Layer, Session Layer, Transport Layer,
Network Layer, Data Link Layer, and Physical Layer. When a person
communicates to another person on a network the information passes through
these layers. It begins at the Application Layer, works its way through to the
Physical Layer and then back up to the Application Layer.
(6) Presentation Layer - This layer is where encryption occurs. This layer
converts the file and/or information into a language (format) that the
remaining layers can read and handle without any compatibility
problems.
(4) Transport Layer - This layer is responsible for ensuring the data
completes it's transmission to the other user. It's also responsible for flow
control and error recovery.
(3) Network Layer - This layer is where the routing and switching takes
place. Packet sequencing, addressing, congestion control, and
internetworking happen at this layer. Logical paths are created at this
level to allow users to communicate to each other. This layer utilizes IP
addresses.
(2) Data Link Layer - This layer is where packets (information) is broken
into bits through encoding and decoding. At this layer you have two
sections; Media Access Control (MAC), and Logical Link Control (LLC).
The MAC section is where packets (information) is gathered and gets
permission to transmit the data. The MAC section is where your
computer's MAC address is located to allow proper delivery to a specific
system (computer). The LLC section controls synchronization, flow
control, and error checking.
(1) Physical Layer - This layer is where your hardware such as ethernet
cable, Network Interface Cards, etc., provide the transmission through
electrical impulse, light, and radio waves. This layer is the hardware
means of sending and receiving data (information).
The top four layers have been grouped together and are called ‘Application Set’
mainly concerned with controlling how the various applications currently
running are making use of the network.
The bottom three layers are called the ‘Transport Set’ concerned with passing
of information through the network.
Network topology is the way in which computers and other devices have been
arranged or how data is passed from one computer to another in the network.
Network topologies is classified into two: logical and physical topology.
The logical topology describes how the network works while a physical
network describes how the network has been cabled.
In this topology all computers wanting to transmit on the Ethernet first perform
a preliminary check to determine whether the medium is available or whether a
transmission is currently in progress and can only send data when none of the
computers is sending.
Data sent over the Ethernet exists in the forms of frames. An Ethernet frame
contains a header, a data section, and a footer having a combined length of no
more than 1518 bytes. The Ethernet header contains the addresses of both the
intended recipient and the sender.
Physical Topology
Main Types of Physical Topologies
Linear Bus
Star
Star-Wired Ring
Tree
Considerations When Choosing a Topology
Summary Chart
Linear Bus
Also called multidrop/Ethernet/parallel
Terminator
The bus network topology use Ethernet which uses CSMA/CD {Carrier Sense
Multi Access with Collision Detection}
Terminator- is attached to each end of the cable to avoid signals from bouncing
back and forth o the cable causing signal distortion.
Star Topology
A star topology is designed with each node (file server, workstations, and
peripherals) connected directly to a central network hub or concentrator or
switch. (See fig. 2).the main computer is the file server or network server.
Communication between any two stations is via the server. The ne6twork
server is the computer that controls all other computers and monitors user’s
access to the shared resources.
Data on a star network passes through the hub or concentrator before continuing
to its destination. The hub or concentrator manages and controls all functions of
the network. It also acts as a repeater for the data flow. This configuration is
common with twisted pair cable; however, it can also be used with coaxial cable
or fiber optic cable.
The protocols used with star configurations are usually Ethernet or LocalTalk.
Token Ring uses a similar topology, called the star-wired ring.
Users
Supermarkets, bank halls, airline booking, water billing offline mostly where
similar tasks are done by all workstations.
The ring topology is actually a logical ring, meaning that the data travels in
circular fashion from one computer to another on the network. It is not a
physical ring topology. Figure 4 shows the logical layout of a ring network.
It’s a Hybrid topology because it combines characteristics of linear bus and star
topologies. It consists of groups of star-configured workstations connected to a
linear bus backbone cable (See fig. 4). In this topology the main file server
connects to other File Servers and workstations, whereby the workstations by be
connected to other workstations. This network is very complex and on a Wide
geographical area. Tree topologies allow for the expansion of an existing
network, and enable schools to configure a network to meet their needs.
Users:
Large organizations e.g. National Banks, airlines, universities etc. which have
operations over a wide geographical area.
Users:
Offices e.g. Newsroom, accounts department, etc.
Advantages of Mesh Topology
- Faster communication between work stations while still having access to
the File Server.
- Efficient flow of data because data does not have to go through the file
server.
- Suitable for a busy network
- It is highly fault tolerant. A single cable break will not stop network
communications between any two computers.
Disadvantages
- Used in a small Geographical area
- Supports few work stations
Summary Chart:
Twisted Pair
Ethernet
Linear Bus Coaxial
LocalTalk
Fiber
Twisted Pair
Tree Coaxial Ethernet
Fiber
Florida ©1997-2005.
Bit - Binary digit in the binary numbering system. Its value can be 0 or 1. In an
8-bit character scheme, it takes 8 bits to make a byte (character) of data.
Bridge - Devices that connect and pass packets between two network segments
that use the same communications protocol.
Fast Ethernet - A new Ethernet standard that supports 100 Mbps using
category 5 twisted pair or fiber optic cable.
Node - End point of a network connection. Nodes include any device attached
to a network such as file servers, printers, or workstations.
Physical Topology - The physical layout of the network; how the cables are
arranged; and how the computers are connected.
Tape Back-Up - Copying all the data and programs of a computer system on
magnetic tape. On tape, data is stored sequentially. When retrieving data, the
tape is searched from the beginning of tape until the data is found.
Thicknet - A thick coaxial cable that is used with a 10Base5 Ethernet LAN.
Thinnet - A thin coaxial cable that is used with a 10Base2 Ethernet LAN.
Token - A special packet that contains data and acts as a messenger or carrier
between each computer and device on a ring topology. Each computer must
wait for the messenger to stop at its node before it can send data over the
network.
Topology - There are two types of topology: physical and logical. The physical
topology of a network refers to the configuration of cables, computers, and
other peripherals. Logical topology is the method used to pass the information
between workstations. Issues involving logical topologies are discussed on the
Protocol chapter
Tree Topology - LAN topology similar to linear bus topology, except that tree
networks can contain branches with multiple nodes.
Introduction:
The use of computers is spreading virtually in all areas. Some companies are
using it for competitive advantage while others are using it to be abreast of the
(b) Accounting system: are popular in business management. There are six
business accounting activities/subsystems as follows:
(i) Customer order entry billing: records incoming customer orders,
authorizes delivery of items or services ordered and produces
invoices for customers who do not pay in advance or on cash basis.
(ii) Inventory management: keep track of the items in stock and help the
management determine which items to reorder. Management will
make enough stock at all times to meet the needs of the customers.
(iii) General ledger account: also known as nominal ledger. It contains a
summary of all business accounts. It is used in preparing balance
sheet, profit and loss account, trial balance, day book/journal, list of
accounts, and so on.
» It is used to keep track of how much a business makes and is
worthiness by summarizing the financial transactions. It produces
reports on income, sources of income, expenses, and the net profit or
loss earned.
(iv) Accounts receivable: keeps the money owed to a company by its
customers e.g. when goods are sold to a retailer, money owed on the
sales is an account receivable item until the payment is received.
This helps the management to make a follow-up by billing the
customers for overdue charge.
(v) Accounts payable: keeps track of the amount the business owes to
the others e.g. when a wholesaler purchases goods from a
2. BANKING SYSTEMS:
Modern banks are self- service. Most of the work is done by the customer
and not the bank staff. The computerized banking services include:
(a) Processing customer transactions: computers are used in banks to carry
out financial transactions such as recording deposits, withdrawals and
calculating interests on loans and saving.
(b) Cheques clearing and processing: the use of Magnetic Ink Character
Reader (MICR) details of the cheques are automatically entered into a
computer for cheques processing. The characters identify the bank in which
the cheque is drawn, the customer account number, the cheques number and
the amount of the cheques.
Advantages
» Is quick and reliable
» Risk of loss or stolen or misdirected payments is minimized.
» The bank’s processing costs is lowered
Disadvantage
Customers are compelled to a fixed standard time of payment.
(f) Cash dispensers (ATMs): they are set outside banks and are linked to the
central computer. An ATM is simply a data terminal with two inputs and
four output devices.
Input devices: card reader, a keypad.
Card- reader captures the account information stored on the magnetic
stripe on the back of an ATM/ debit or credit card.
A keypad is used by the card holder to tell the bank what kind of
transaction is required e.g. cash withdrawal, balance inquiry, deposit of
cash, etc. it is also used to enter the cardholder’s personal ID (PIN) for
verification.
Output devices: a speaker, display screen, a receipt printer, the safe and cash
dispensing mechanism.
ATMs allow customers to do their banking at any hour of the day or night.
3. RETAIL SYSTEMS:
(a) Stock control: this is managing sensibly the amount of goods in stock. A
computerized stock control system enables a user to manage stock more
efficiently.
Aims of stock control:
To keep enough of each item in a stock so that they do not run out.
To avoid making too much of any item(overstocking)
4. RESERVATION SYSTEMS:
Are distributed networked systems that are used mainly to make bookings
in such areas as:-
(a) Hotel booking: booking and reservation of rooms in hotels are made
from a remote terminal connected to a centralized computer database.
A customer makes enquiries via the remote terminal connected to the
central computer.
(b) Airline booking: major airlines have centralized databases. This means
that all flights and passengers records are stored in a computer system
in one location. Travel agent from all over the world can access each
5. EDUCATIONAL SYSTEMS:
(a) Computer Aided Learning (CAL): it involves using the computer as an
aid to normal teaching. Some CAL programs improve basic skills with
drill and practice exercises which provide extra motivation. Also have
graphical presentations such as video clips and voice for
demonstrating or explaining difficult concepts. Can also be used to
replace difficult, dangerous or lengthy science experiments.
Advantages of E- learning:
It can work from any location and any time.
Courses can be tailored to specific needs.
Asynchronous reading is possible when communication takes place
in turns.
It is very flexible.
You can save on traveling costs.
You do not spent a lot of time away from work.
Disadvantages:
It can at times make boring slides.
There may be monotonous speeches.
There might be little opportunity for interaction.
Categories of E- learning:
1. Knowledge of databases.
2. Online support.
3. Asynchronous training.
4. Synchronous training.
Advantages of fax:
There is instant transmission thus making it quite faster compared
with letters.
It is convenient and simple. Documents with signatures and
handwritten are send.
Hard copy is produced.
A document can be faxed to any part of the world so long as the
recipient has a fax machine.
If a computer has a fax modem, the fax will be answered and
automatically stored on the hard drive.
Disadvantages:
Faxed printouts are sometimes of poor quality.
Can be slow to send bog documents because every paper has to be
scanned and converted into digital form before being sent.
The telephone line cannot be used whilst you are sending faxes. You
must separate fax number to avoid this problem.
Faxing text that is in color is not easy.
Advantages:
People in different places can link up to see and hear each other.
This saves the time and cost of traveling to meetings.
Meetings can take place without one leaving the office.
Meetings can be arranged at a short notice.
Participants can still attend meetings even if they are physically
unable e.g. weather preventing them from traveling.
You can even send text messages to a lecturer over a long distance
in real time.
Disadvantages:
It provides low quality pictures.
It may not be as productive as a face to face discussion round a
table.
Meetings may be disrupted due to a technical failure.
Setting up the whole system is quite expensive.
It may not be necessary for confidential documents e.g. a contract
to be viewed and signed in- person.
(f) Internet:
Internet transmits huge amounts of information in form of words,
images and sounds. Some of the services available on the internet are:-
(i) World Wide Web (www):
WWW refers to a collection of web pages which may be made up of
text, images, animations, sounds and video held on web servers. One
can access information using a computer or other devices like mobile
phones.
NB: for a mobile phone to be used to access the internet, it must have a
wireless application protocol. (WAP)
(ii) E- mail:
This is a system that allows a person to type out a text message on his/
her computer. Once you subscribe for internet services through a
service provider, you can send or receive e- mails to or from anyone
connected to internet using a computer or a WAP- enabled cellular
phone.
Advantages of E- mail
Sending messages is much faster.
It is cheaper.
You can send one message to a number of people.
You can send attachments.
Disadvantages:
You can only send letters and attachments but not physical objects
like parcels.
You must subscribe to ISP
Sending e-mail messages can be expensive when lines are busy.
Not all businesses or homes have equipment for sending e-mail.
You may end up getting a lot of mail that you do not need i.e.
spam or junk mail.
Unless you make a new email alert, you have to remember to
check your mail box.
7. INDUSTRIAL SYSTEM:
(a) Computer Aided Design or Computer Aided Manufacturing.
(CAD or CAM):
Is the use of a computer to help in the drawing of designs from
which objects are going to be manufactured or constructed. In CAM
or CAD, the computer is involved in all the stages from design to
manufacture.
One application of CAM is the use of robots to carry out assembly
line operatives. A robot is a computer controlled device that
emulates a human being in carrying out operations that would
otherwise be hazardous, repetitive and boring to a human being e.g.
welding, lifting heavy objects, spray painting of vehicle bodies,
removing red hot materials from furnaces etc.
(b) Industrial simulation:
This allows some activities that would otherwise be expensive and
dangerous in real life situation to be put under test e.g. a plane crash test
simulation with the use of a visual model on the computer screen that
represents the real situation or object.
(c) Modeling:
Disadvantages
It can lead to unemployment as fewer employees are needed
The initial cost of the system may be expensive.
9. LIBRARY SERVICES:
(a) Lending services:
Computerized library system manages the issuance and return of
borrowed reading materials. Books, magazines, reports etc. are given
unique identification numbers or codes. Member’s details are recorded
once a book is borrowed and updated when the book is returned to reflect
new status.
(c) Cataloguing:
Computerized catalogues have replaced manual card catalogue which
enhance service delivery and efficiency. The electronic catalogue is
updated constantly when new reference materials are acquired.
10.ENTERTAINMENT SYSYEMS:
(a) Music and video:
In music industry computers are used in recording, synthesizing, editing
and adding special effects to music. In video industry, computers are used
to produce highly simulated and animated movies, generate scenes and
actors.
(b) Games:
11.TRANSPORTATION SYSTEMS:
(a) Air traffic control:
Airports and airstrips have been computerized. Computers are used to
monitor air traffic movement, take off and landing of crafts. Computers are
used for air reservations and also to direct aircrafts to follow the shortest
path between two locations.
13.MARKETING:
(a) Electronic commerce (E- commerce)
E- Commerce has changed the way in which goods are sold. A large
number of dot com companies have cropped up that operate solely from
the internet. Even supermarkets are selling goods and arranging home
delivery via the internet. Therefore e- commerce involves the carrying of
day- to- day transactions of an enterprise electronically through the
internet.
(c) Advertising:
It is possible to create advert materials and video clips using simulation,
presentations and animation software and then have them displayed on
billboards, broadcasted over television or place them in internet.
REVISION QUESTIONS:
1. (a) What is meant by computer Aided Manufacture? (2 marks)
(b) Give two examples of Computer Aided Design software. (2
marks)
2. (i) What is simulation? (1 mark)
(ii) Name two application areas of simulation. (2 marks)
(iii) State two advantages of Computer Based Simulation. (2 marks)
3. Explain two ways in which ICT can enhance commerce. (2 marks)
4. describe the following network services and identify their application:
(i) Voice mail. (2 marks)
(ii) Video conferencing. (2 marks)
5. distinguish between the following:
(a) tele text and videotext.
(b) CAI and CAL.
(c) e- learning and CBS.
6. i) What is tele working? (1 mark)
ii) State three advantages and two disadvantages of tele working. (5 marks)
iii) Give four examples of the expert system. (4 marks)
2.AUTOMATED PRODUCTION
This involves computerization of production
processing industries i.e. the use of computer
aided production which does not require high
manpower.
Disadvantages
It may lead to unemployment in some areas
that are labor intensive.
High initial cost of setting up an automated
system.
People may be cynical (feel that pos are
overrated and it takes much effort and time to
learn and use them), naïve or frustrated by
technology.
(v) Isolation
People can conduct business and
communication without ever coming face to
face. Computers workers can work by taking
the instructions from computer screen,
sending and receiving memos to each other
electronically without engaging in personal
conversation. These people feel isolated from
other workers.
4.ENVIRONMENTAL
Keep Abreast With ICT Skills!!!
78
(i) Environmental pollution
Huge garbage dumps of dead computer parts,
printers ink toner cartridges, monitors and other
computer accessories are disposed in large fills
hence causing environmental pollution and
leaking into underground water tables and
catchment areas.
Disadvantages:
Make mistakes and they do not
learn from them.
Are difficult to build.
Keep Abreast With ICT Skills!!!
86
They require a lot of space.
Human beings can easily become
slaves of it.
Heavy usage of expert systems
can make experts to lose their jobs.
Can only be built with the help of
experts alone.
Lack of human touch.
6. ROBOTICS
Robotics is the study, design and use of
robots.
A robot is an automated device used to
perform tasks that are difficult and
dangerous for a human being. Also a
machine that is designed and
programmed to perform a specific set
of tasks without human interactions.
Keep Abreast With ICT Skills!!!
90
Perception systems are sensing
devices that emulate the five common
senses of a human being i.e. sight,
hearing, touch, smell and taste.
Types of robots:
Types of robots include mobile robots,
industrial robots, perception robots.
They can be found in these areas:
Manufacturing industry.
The military.
Space exploration.
Transportation.
Medical applications.
Uses of robots
oPerform dull and difficult jobs like
lifting heavy objects, painting,
handling chemicals and welding,
automobiles and manufacturing
industry i.e. car manufacturing.
Keep Abreast With ICT Skills!!!
91
oHigh risk jobs, in design field, space
based robots.
Advantages of robots
They can work 24 hours, all year
round without getting bored or
taking a break.
Can work faster with high
productivity than human beings.
The output is of consistently high
quality.
Performs repetitive tasks that are
monotonous to human beings.
Are more accurate than humans.
Can work in conditions that
would appear hostile or dangerous to
humans such as under water and in
radioactive environments.
Disadvantages
Components of a robot
A robot is made up of:
A microprocessor to process the
data from the sensors.
Actuators and mechanical parts
e.g. motors, pistons, grippers,
Expanded information
superhighway:
- This includes the integration of
cables and wireless technologies for
the purpose of data and information
transmission.
- Fiber- optic cables are used to carry
millions and millions of data items
per second.
- Information superhighway mainly
deals with communication on a
large scale base on cable networks
and more sophisticated wireless
communication. It is aimed at
making communication more
efficient and reliable.