form-4 COMPUTER--all-chapters
form-4 COMPUTER--all-chapters
Form four
studies
work
1
Table of contents
1. Introduction to networking and data
communication
2. Application areas of information and
communication technology (ICT)
3. Impact of information and
communication technology (ICT) on
society
2
4. Career opportunities in information and
communication technology (ICT)
3
Chapte
Introduction
r 1 to networking
communica
and data
tion
4
Computer network
It’s
a collection of computers linked
together using transmission media for the
purpose of communication and resource
sharing.
5
Data communication
Refers to the process of transmitting data
signals from one point to another through
the network
Terms used in data communication 1
7
Terms used in data communication 2
Multiplexing – it’s a process of sending multiple
data signal over the
same medium while
demultiplexing is
the process of
separating the
multiplexed signals
at the receiving
end.
8
Modes of data communication
Simplex transmission – refers to communication
in only one direction e.g. radio transmission.
Half duplex – refers to communication in both
directions but one direction at a time e.g. police
walkie talkie.
Full duplex – in this transmission communication
occurs in both directions simultaneously e.g.
computers connected in network.
9
Types of computer network
Local Area Network (LAN) – this is formed whenever
computers are connected together in a small geographical
area e.g. floors, building, school etc within a radius of 10m
up to 3km.
Wide Area Network (WAN) – this covers unlimited
geographical area e.g. across states, entire country or
entire world. They are expensive to build and have low
data rates and higher speed (over 100Mbps or higher).
Metropolitan Area Network (MAN) – this network covers a
metropolitan are like a town or city within a radius of
between 5 and 50km. They are data rates of 100Mbps and
above and are more expensive than LANS.
10
Computer Networking – refers to a collection of
independent entities that are arranged in such a manner as
to exchange data, information or resources.
Purpose of networking 1
Resource sharing –
different computers
are connected to
each other hence a
user at one site
may be able to use
the resource
11
available at another site e.g. printers, programs
etc.
Purpose of networking 2
Remote communication – this involves transmission of
data signals between two communication devices located
at different geographical location. Through remote
communication, people can be able to share ideas and
pass messages over the network.
Cost effectiveness – reduction of resources in networking
lead to reduction in costs. Example instead of purchasing
many computers resources, one buys one which can be
shared hence reducing the costs.
Distributed processing – if a particular process can be
sub-divided into several sub-process then each
12
subprocess can be processed at different sites co-
currently hence speeding up the entire process.
Reliability – if one site fails in a computer network, the
remaining site can potentially continue operating.
Limitation of networking
Cost – it’s expensive to acquire networking equipments, train
network administrators and users and maintenance of network. The
cost are high.
Data security – data and information held on a network is prone to
more illegal access, danger of data theft and also tapping by
unauthorised people during transmission.
Network failure – there is a danger of failure which may paralyze the
operational of an organisation besides damaging files and programs.
Moral and cultural effects – large networks like Internet have chat
rooms and messaging services that may enable underage children to
meet peers and adults on the net some of whom have bad intentions.
13
Access to pornographic and other negative materials is also a
problem.
Over-reliance on networks – most organisations have done away
with manual operations. This means that all business process and
society depend on computer networks. The disadvantage of
overreliance is that if the network fails then many systems will stop
operating.
Elements of networking
Data communication media – a data
communication is a channel through which data is
transmitted between computers and other devices.
Data communication media are categorised into
two:
Communication with cables (bounded media)
Two wire open lines cables
Twisted pair cable
14
Coaxial cable
Fibre optic cables
Wireless communication (unbounded media)
Microwave
Satellite
Radio transmission
Infrared transmission
Advantages
Easy to install
Very cheap
Disadvantages
Has low data transmission rates.
19
It’s
sensitive to electromagnetic interference.
Suffers high attenuation.
Coaxial cable
This cable has a central copper core which may
be solid or stranded wires surrounded by an
insulator. The insulator is then surrounded by a
hollow mesh conductor covered by a shield to
prevent electromagnetic interference. The
diameter of the centre core or conductor
determines the attenuation rate. There are two
types of coaxial cables:
20
Thin coaxial cable (thinnet) which has one dialectric
insulator.
Thick coaxial cable (thicket) has two dialectric
insulator around the core and is thicker than thinnet.
21
Samples of coaxial cables
22
Advantages and disadvantages of coaxial cables
Advantages
They are immune to external electrical
interference because of insulation.
High data transmission rate.
Has capability of carrying more signals.
They are very stable even under high loads.
Disadvantages
Lack of security due to illegal taps.
They are relatively expensive to buy.
23
It’s bulky therefore difficult to work with i.e.
install.
Fibre optic cables
These are made of glass fibres and
transmit information in light form. The
cable is made up of:
The core – the central part of the cable which
is made of transparent plastic or glass.
Cladding – it’s a single protective layer
surrounding the core, and has some light
bending characteristic inside it.
24
Buffer – it surrounds the cladding and its
function it to
strengthen the
cable.
Jacket – outer
covering of the
cable.
Types of fibre
optic cables 1
Single mode fibre –
it has a very
25
narrow centre core. The light in the cable
therefore take only
one path through it
making it to
have a low
attenuation rate.
Types of fibre
optic cables 2
Multimode fibre – it has
a thicker core and
allows several light
rays to be fed in the
26
cable have a high attenuation rate and they are mainly
used for shorter distance transmission. The light is bent
back into the core hence propagates along the length of
the cable as shown in figure right below.
27
Fibre based network transmits data
Disadvantages
Very expensive
Installation is difficult. It’s complex to configure
Broken cable is difficult and expensive to repair
29
This communication transmit data from
one point to another without physical
connections. Example of wireless
transmission includes:
Microwave
Satellite
Radio transmission
Infrared transmission
30
The electromagnetic spectrum
Figure right is a diagrammatic representation of
an electromagnetic
spectrum. All these
waves travel at the
speed of light. For
our concern here,
we will only deal
with microwaves
radiowaves and
infrared waves.
31
Microwave
In microwave transmission signals travel in a
straight line and
therefore the
transmitter and
receiver must be in
a direct line of sight
of each other.
Advantages and
disadvantages of
microwave
32
Advantages
They operate at a high speed.
It’s less prone to transmission errors unlike
twisted wire pair.
Are capable of operating in digital or analog data.
Disadvantages
Signal is affected by atmospheric conductor like
lightning.
Additional number of repeaters are added after
every few kilometres.
33
Satellite
Inthis transmission microwave radio signal is transmitted
from antennae from the ground to a satellite on the orbit
around the earth. The microwave radio signal is beamed
to the satellite on a specific frequency called uplink
freq1uency where it is received, amplified and then
rebroadcasted on a different frequency called downlink.
The satellite transmit the signal to many earth stations to
form a point to multipoint transmissions. Very small
aperture (VSAT) is a new technology used in microwave
transmission. It’s a very small satellite dish used both in
data, radio and TV communication. This technology
enables direct access to satellite communication instead
of having to ft through the sate owned or licensed
satellite gateways.
34
Satellite transmission system
35
Advantages and disadvantages of satellite
Advantages
The cost is not dependant on distance.
Has the second highest bandwidth after optical
cable.
Earth station can be installed on a customer
property than layering extensive cables.
Disadvantages
Any station can receive the signals. It’s
expensive to install ground stations.
36
Heavy rains or bad weather will increase
loss of signals
VSAT technology
The new trends in microwave transmission have seen the use of very
small aperture terminal
(VSAT) technology. This
refers to a very small
satellite dish used both in
data, radio and TV
communication. Many
businesses are adopting
this new technology
because it enables direct
access to satellite
communication instead of
having to go through the state owned satellite gateway. Figure right
37
shows VSAT technology as set up to enable two laptops in
geographically disparate locations to communicate.
Radio communication
Radio waves travel just like
surface water waves, i.e.
they are omnidirectional.
This means that they start
from a central point and
spread outwards in all
directions. As they travel
outwards, their energy
spreads outwards over the
covered area. The waves
are radiated into the
atmosphere by a radio
frequency antenna at
constant velocity. Radio waves are not visible to the human eye.
38
Figure right shows a typical radio waves link between two separate
geographical locations.
Radio transmission
Data can be transmitted over
radio waves communication.
The radio waves can be High
Frequency (HF), Very High
Frequency (VHF) or Ultra-High
Frequency (UHF). The high
frequency radio waves signal is
transmitted by directing it to
ionosphere of the earth. The
ionosphere will reflect it back to
the earth’s surface and the
receiver will pick the signal. Very
high frequency radio waves are
transmitted along the earth’s
39
surface. Ultra high frequency radio waves use the line of sight principle
thus there should be no barrier between the sending and receiving
devices.
40
personal communication devices through wireless
technology.
Infrared transmission
Communication through this medium is
achieved by having infrared transmitters
and receivers. The transmitter and receiver
of infrared signals must be within a line of
sight in the same room.
41
Advantages and disadvantages of
wireless communication
Advantages
They can cover larger geographical area easily.
They are flexible in operation unlike the bounded
media.
Disadvantages
Initial cost is very high.
Relatively difficult to establish or configure.
42
Modem – It’s a device used to connect computer to a
telephone line. It changes the digital signal to analog form
and then analog back to digital signal. Hub – it’s a
component that connects computers on a network and is
able to relay signals from one computer to another on the
same network.
43
Communication media 2
Repeater – it receives a signal from one segment of a
network, cleans it to remove any distortion, boosts it and
then sends it to another
segment.
Routers – its
interconnects different
networks and directs
the transfer of data
packets from source to
destination.
44
Communication media 3
Bridge – it’s a network
device that selectively
determines the
appropriate network
segment for which a
message is meant for
delivery through address
filtering.
Gateway – it’s a device
that can be configured to
provide access to wide
area network or Internet.
45
Communication media 4
Network Interface Card –
it’s a circuit board that fits
inside an expansion slot of a
workstation and creates a
physical link between the
computer and the
transmission media.
Switches – unlike the
hub, the switch forwards
a packet of data directly
to the address mode
46
without broadcasting. It transmits the packet using a
point to point transmission.
Wireless communication devices 1
Access points (AP)
– mainly used for
wireless devices
such as personal
digital assistants,
laptops and
computers with
wireless links.
These devices
47
need to have antennas in order to detect signals
in the surrounding.
Wireless communication devices 2
Personal Computer
Memory
Card
International Association
Cards – the PCMCIA is
an add on card inserted
into a device such as
personal digital assistants
or a laptop in order to
enable wireless
48
communication between the devices and a wired network
server.
Network software
This
refers to programmes that generally
manage a network. They include:
Protocols
49
Network operating system
It’s function involves
Making sharing of resources possible.
Transmitting data around network.
Respond to requests from application programs
running on the networks.
Enables nodes on the network to communicate
with each other more efficiently.
Implementing network security features.
Supporting services.
50
Examples of network operating systems
Windows NT/2000/2003
Unix
Linux
Novell Netware
51
Protocols
Network protocols are rules and technical
procedures that govern communication
between different computers. Data
transmission process is broken into
discrete systematic steps. At each step, a
certain action takes place and it has its
own rules and procedures.
52
How protocols work
The data transmission process over
the network has to be broken down
into discrete systematic steps. At
each step, a certain action takes
place. Each step has its own rules
and procedures as defined by the
network protocols. The work of these
protocols must be co-ordinate so that
there are no conflicts or incomplete
operations. This coordination is
achieved through protocol layering.
Network protocols are designed after
the open system interconnection
(OSI) model. The open systems
interconnection model is not a
protocol as such but is meant to help
designers to come up with high
quality layered protocol it has seven
layers, each performing distinct
functions as shown in table right
53
Examples of protocols
Transmission Control Protocol / Internet
Protocol (TCP/IP) – TCP is responsible for
delivery of sequenced data over network.
The IP handles the address scheme i.e. it
does packet forwarding and routing.
56
take up the token to read the data then
release the token.
Example of physical topology 1
Star topology – in this topology, all devices are connected
to a central hub.
Workstations
communicates across
the network by passing
data through the hub.
When the hub receives
data from a
transmitting computer,
57
it broadcasts the message to all the other workstations
on the network.
Advantages and disadvantages of star topology
Advantages
Easy to configure. It’s easily expanded.
If one workstation fail it does not affect the others.
Allows centralization of key networking resources
e.g. server.
Disadvantages
If the central hub fails, the entire network will be down.
Requires more cables to install hence more expensive.
58
Installing this type of network topology is time
consuming.
Example of physical topology 2
Ring topology – in
this topology all the
components are
connected to a
single cable forming
a ring. The data
flows in only one
direction and the
signal is actively
59
retransmitted by each node to its neighbour if its
not addressed to it.
Advantages and disadvantages of ring topology
Advantages
It’s simple to install.
Data transmission is very fast.
Use a short length cable hence cheap.
Disadvantage
If one site fails it affects all the other nodes.
Troubleshooting can be difficult.
60
Modification may be difficult because adding or
removing a device can disrupt the entire network.
Example of physical topology 3
Mesh topology –
this topology uses
separate cables to
connect each
device to every
other devices on
61
the network providing a straight communication
path.
Advantage and disadvantages of mesh topology
Advantages
Easy to troubleshoot.
Disadvantage
Costly to provide the redundant cables.
Difficult to install and maintain.
62
Example of
physical
topology 4
Tree/Hierarchical
topology – all the
nodes are connected
in form of a tree with
nodes as leaves and
links as branches. The
transmission medium
is a branching cable
with no closed loops.
The branches in turn
63
can have more sub-branches. Branches are connected
to each other by means of devices called hubs.
Advantage and disadvantages
of tree/hierarchical topology
Advantage
If the workstation below the main
workstation fails, the network does not fail.
64
Disadvantages
If the top node fails the network fails
because it control all other nodes.
Installation is expensive and complex.
Advantages
It’s easy to install. It’s less
expensive.
If one mode fails, others are not
affected.
66
Disadvantages
The failure of the cable will bring the whole
network to a stand still.
Only one node can transmit message at a time.
Difficult to troubleshoot.
Review questions 1
1. List four network systems that are not computer-based networks.
2. Define the term computer network.
3. Define the term communication.
4. Differentiate between a baseband and broadband signal.
5. State four advantages of networking.
6. Give two disadvantages of networking.
7. Differentiate between a network server and a workstation.
8. Explain the concept of distributed processing in networking.
67
9. Why is a network more reliable than stand alone computers?
10. Explain the three most common types of computer networks in use
today.
11. Differentiate between remote client and remote host.
12. Explain the term bandwidth. 13. What is a “resource” in networking?
14. Differentiate between half duplex and full duplex transmission.
69
8. Distributed processing is a configuration in which
terminals with processing power are located in a wide
geographical area.
9. If one of the computers breaks down information can
still be accessed from the server using another
computer on the network.
73
6. Network Interface Card (NIC’s), modems, hubs,
bridges, repeaters, routers, switches and brouters.
7. A repeater receives a weak signal on the network,
cleans it and amplifies it for transmission over the next
portion of the network. Signals become weak due to
attenuation.
8. A hub may cause broadcast problems.
9. Communication in wireless devices.
76
17. Geostationary satellite’s speed in its orbit is relatively
equal to the rotation of the earth hence, an observer on
earth will see as if the satellite is stationary in space.
18. The braid protects the carrier wire from radio frequency
interference and electromagnetic interference.
19. In line of sight principle, a signal is directed through a
focused beam from the transmitter station to receiver
station without obstructions in between them.
Review questions 3
1. List two types of network software.
2. Give three examples of protocols used in networking.
3. Outline the seven Open Systems Interconnection (OSI)
reference model layers.
4. Define the term network topology.
77
5. Distinguish between logical and physical network
topology.
6. Explain the importance logical and physical network
topology.
7. List four examples of network operating system.
8. Outline the functions of network operating system.
78
C) NetBEUI – a local area network protocol and is limited to Microsoft and
IBM networks.
D) IPX/SPX – is an internetworking protocol like TCP/IP. It also routes
packets. However, duplication of network addresses is the main.
3. OSI model layers – application layer, presentation layer, session layer,
transport layer, network layer, data link layer, physical layer.
4. Network topology refers to the layout of the computers, printers, and
other equipment connected on the network.
Revision questions
1. Determine the type of a network characterised by:
a. Connection between computers, printers and other resources
using UTP cables.
b. Over 180 stand alones in an office building.
c. Over 254 computers connected to share resources in a city.
2. Explain the function of a NIC in networking.
80
3. The computer that is dedicated to serving requests from other
computers in a network is called a ( ) while the computer
that sends requests is called ( ).
4. Distinguish between thinnet and thicknet coaxial cables.
5. Distinguish between radio and microwave transmission.
6. The layer that surrounds the core of a fibre optic cable is called
( ).
7. Describe any three types of physical network topologies used in LAN.
8. The device that connects workstations and the server to a central
point is called a ( ).
9. Define the term protocol.
83
Practical
exercise
Njabini Boys
high school
Form four 84
Setting up a peer-to-peer local area network
This practical activity is a step by step guide on how to set up a
simple local area network. The following are some of the
requirements you need.
1. Hardware requirements.
2. Tools
3. Installing a network card
4. Installing the drivers manually
5. Adding protocols
6. Identifying your computer in a workgroup
7. Configuring transport control protocol/Internet protocol
(TCP/IP)
8. Media preparation and connection
85
9. Connecting the computers to hub/switch
Hardware requirements
1. A computer running on any version of
Microsoft Windows especially Windows
9x/2000/ME/windows XP.
2. Network interface card. Some computers
may have it already installed onboard so
that you do not have to purchase one.
3. A hub or a switch.
86
4. Transmission media preferably
unshielded twisted pair category 5.
5. RJ45 connectors.
Installing a network card
The network interface card acts as the
physical interface or connection between
the computer and a properly terminated
transmission cable. As mentioned earlier,
come motherboards come with on-board
87
network interface cards hence you may not
need to plug in a separate add-on card.
Steps of physically
install an add-on
card 1
1. Disconnect the computer from
the power source.
2. Open te system unit and
identify an empty expansion
slot on the motherboard.
3. Insert the card as shown in
figure right and screw it into place. Some little force may be needed
88
to push the card into place squarely. Make sure that all the
conductor points of the card sink into the expansion slot. Avoid
touching the golden conductor points and chip on the card with your
bare hands.
Steps of physically install an add-on card 2
4. Replace the casing then connect the computer to the power
supply and boot it up. If you are using Microsoft Windows 9x
and above, the computer will detect the new hardware
because of the plug and play feature found in the operating
system. It may install the protocols and device software
needed for the proper operation of the network interface card
automatically. If there is a problem of the card being detected,
you may have to configure the card manually using a disk that
comes with the card.
89
NB: some cards are slotted into Industry Standard Architecture
(ISA) slots while others for Peripheral Components
Interconnect (PCI) slots. Make sure you install in the right slot
and then screw into place.
90
Panel” window double click the
“Network/Network Connection”
icon. A dialog box such as the one
shown in figure right will be
1.
2.
3.
Adding protocols
1. Make sure the “Network” dialog box is
open.
2. Click “Add” then “protocols”.
92
3. Click “Microsoft”, select “TCP/IP” and
“NetBEUI” from the network protocols list
then “OK”.
4. Click “Apply”.
Identifying your computer in a workgroup
A workgroup is a collection of computers that are
on the same network. To specify your computer
and the name of the workgroup:
1. If you are using Windows 9x, click the “Identification: tab
from the :Network dialog box. If you are using Windows
Me, 2000 or XP. Identification (computer Name) tab is
93
located in system properties dialog box. Right click “My
computer”, click “Properties” then click the computer
name tab.
2. Type your computer name and the workgroup name.
the computer name you give must be unique.
Configuring TCP/IP 1
In order to communicate with other
computers, you need to install and
configure a protocol. In our case let us
use TCP/IP. To configure TCP/IP,
94
1. Select the TCP/IP Ethernet adapter from the
list titled. the following network components
are installed / This connection uses the
following items.
2. Click the “Properties” button then the
“Specify and IP address” option.
95
Configuring TCP/IP 2
96
3. Type
in the IP
address such as
192.168.00.001.
97
Each computer
should have unique
IP address. Figure
right shows a TCP/IP
properties dialog box
in Microsoft Windows
XP.
Configuring TCP/IP 3
4. Specify the subnet mask. Subnet masks are values
that allow the router to distinguish the network ID
from host ID portions of the IP address. If the IP
address is examined by the subnet mask and found
98
to be identical, the message is destined to a host on
the same network otherwise it is routed to another
network. Typically, subnet masks use the format
255.x.x.x. In our case let us use a subnet mask
such as 255.255.255.0.
5. Click “Apply” then “OK”. The computer will prompt
you to restart in order for the changes to be
effected.
6. Restart the computer.
99
Media preparation and connection
In
this practical exercise, we are going to use twisted pair
cabling technique
because it has
become almost the
default method. This
type of media uses a
connector known as
RJ45 to terminate the
cable. Figure right
shows illustration of
RJ45 port and RJ45
terminated cable.
RJ45t is attached to a UTP cable using crimping tool.
100
Steps of attach an RJ45 connector to a UTP cable 1
102
terminated on both ends and should be like the one shown in figure
right.
8. You can then test the media for continuity and correct termination
using the cable tester.
Connecting the computers to the hub/switch
It is now time to connect the computers together through the hub.
To connect the computer do the following:
1. Connect one end of the cable to the RJ45 port of the network
card and the other end to one port in the hub. If the hub is
powered, a LED will indicate the connection. Repeat all this
process for all other computers that you wish to connect on
the network.
2. To see if the networking is successful, right click the Network
Neighbourhood / My Network Places on the desktop. If all the
connected computers in the same workgroup can “see” one
103
another then you have succeeded setting up a peer-topeer
network.
3. If not, you may decide to test the connection using the PING
command to test connection. For example if you have two
computers with the IP addresses 192.168.001.001 and
192.168.001.002.
Steps of test the connection between the two
1. From the “Start” menu of the computer with IP address
104
192.168.001.001, choose the “Run” menu and type the
command [PING 192.168.001.002]. 2. Click “OK”
A connection failure will
be displayed on the
screen as shown in
figure right above while
a successful network is
shown on figure right
below.
Sharing network
resources
If you have
successfully installed the
105
network, you can then start enjoying the
benefits of networking by enabling resource
sharing. For example if you are using Windows
XP, you can share resources by enabling
sharing and security as follows: 1. Open “Windows
Explorer”
2.From the explorer window, right click the drive folder or
file you wish others on the network then select sharing
and security. 3. Click the “Sharing” tab then enable “share
this folder”.
4. Type in the share name and set other options as
required.
5. Click “OK”.
106
Chapte
Application
r 2 areas of
communication
information and
technology (ICT)
Njabini Boys high
schoolForm four
work 107
Reservation systems
Thisare distributed networked systems
that are used mainly to make bookings in
areas such as:
Hotels booking
Airline booking
108
Hotels booking
Booking and reservation of rooms in hotel
are made from remote terminal connected to
a centralized computer database. A
customer makes enquiries via the remote
terminal connected to the central computer.
109
Airline booking
Majorairline have centralized databases.
This means that all flights and passengers
records are stored in a computer system in
one location. Travel agents from all over
the world can access each data via
communication lines. In that way, agents
book in client where tickets have not been
bought.
110
Retail system
Point of sale system – an Electronic Point Of Sale (EPOS) is
a computer terminal in
retail stores to input and
output data at the point
where sales are
transacted e.g.
supermarket checkout
counters.
Stock control – a
computerized stock
control is used to track
what is in stock and what
needs recording.
111
Banking system 1
Processing customer transactions – computers are
used in banks to carry out financial transactions such
as recording, deposits, withdrawals and calculating
interests on loans and savings.
Electronic funds transfer – involves movement of
money using information and communication
technology e.g. when paying goods using credit
card, payment is transferred electronically from the
customers account to recipient account.
112
Cheque processing – the use of Magnetic Ink
Character Reader (MICR) details of the cheque are
automatically entered into a computer for cheque
processing.
Banking
systems 2
Cash dispensers
(ATM) – they allow
customers to do
113
their banking at any hour of the day or night
seven days a week.
Educational systems 1
Computer Aided Learning (CAL) – this presents educational
materials the way a teacher does in a classroom. In this
program there are clear graphical presentations such as
video clips and voice for demonstration or for explaining
concepts.
E-learning – lessons and lectures are presented from central
site and presentation is transmitted to remote conference
terminals. Learners can also access learning materials on the
Internet.
Computer based simulation – refers to the science of
representing the behaviour of a real life situation by using
114
computerized models. This programs creates real situation
which replaces very dangerous and expensive experiments
in science. Mainly used in areas where practical skills have to
be learnt like training pilots, engineers etc.
Educational
systems 2
Computer Aided
Instructions (CAI) – refers
to the use of a computer
to learn, drill and practice
particular educational
principles. The learner is
115
presented with explanation of the concept. The computer
then presents questions from which the learner is to select
correct answer.
Industrial systems 1
Modelling – computer modelling is the creation of
electronic representations of objects or ideas.
Computer model shows what something might
look like when the real thing would be too difficult
or too expensive to create and visualize.
116
Process control – refers to the use of a computer
system to control an ongoing physical process
especially in manufacturing e.g. regulating
temperature, fluid flow etc.
Industrial systems 2
Industrial simulation – this allows some activities that
would otherwise be
117
expensive and dangerous in real life situation to be put
under test e.g. a plane crash test simulation with the use of
a virtual model on the computer screen that represents the
real situation or object.
Industrial
systems 3
Computer Aided Design
(CAD) / Computer Aided
Manufacturer – this involves
use of a system that allows
products that have been
designed using design
application software, to be
118
transmitted into a automated manufacturing system for the
product to be manufactured as per the computer model
e.g. a motor vehicle engines designed using CAD then feeding
it to an automated machine which engineers the required
specifications.
Transport system
Air traffic control – airports and airstrips have been computerized.
Computers are used to monitor air traffic movement, take off and
handling of crafts. The human control errors and mistakes have
been eliminated due to computerized systems. Computers are
used for air reservations and also to direct aircrafts to follow the
shortest path between two locations.
Shipping control – computers are used to load and offload an also
in docking of ships. Records are also handled with much ease at
the ports with use of computers also are used to control and
guide the paths taken by spaceships and water vessels.
119
Automobile traffic control – computers are used to control both
human an motor vehicle traffic using a computerized lighting
system. These lights are controlled using a computer system or a
clock switch. Computerized traffic light systems have sensor pads
laid underneath the road which detect the pattern of the traffic
flow. The collected data is sent to a computer system which
detects and analyses the traffic flow.
Scientific
Research
systems 1
Weather forecasting – modern
weather forecasting have been automated using computerized
systems, hence weather predictions are more accurate and reliable.
The data collected from rainfall air, pressure, humidity, temperature,
120
clouds etc are analysed with the help of computer to predict the
weather patterns. Also computers are used in Geographical
Information System (GIS) and the geographical data in graphical form
by positioning and superimposing it on the world map.
123
Games – three dimensional multimedia games
are now possible on personal computers. There
are computer games that simulate sports e.g.
driving, war combat etc. such games gives the
player maximum pleasure in a virtual
environment on the screen.
Library systems
Inventory control – computers are used to manage stock which
includes checking for books currently in shelves and those on
high demand that need adding and also those that have
become obsolete can be retired to archives.
124
Cataloguing – computerised catalogues have replaced manual
card catalogue which enhance service delivery and efficiency.
The electronic catalogue is updated constantly when new
reference materials are acquired.
Lending system – computerised library system manages the
issuance and return of borrowed reading materials. Books,
magazines, reports etc are given unique identification numbers
or codes. Members details are recorded once a book is
borrowed and updated when the book is returned to reflect new
status.
Marketing system
Electronic commerce (E-learning) – e-commerce involves the
carrying of day to day transactions of an enterprise
electronically through the Internet. The transactions involves
125
sales, promotions etc. companies and organisations have
logged websites for online transactions. The online buying
website tracks the whole session as the customer chooses
various items and calculates the total bill. Payment is then
made through a cheque, credit card or electronic fund transfer.
Electronic presentation – marketing agents can create exiting
presentations concerning the procedures of business and
present them to audience using presentation software.
Advertising – it’s possible to create advert materials and video
clip using simulation, presentation and animation software and
then have them displayed on billboards, broadcasted over
television or place them in Internet.
126
Communication systems
Effectiveand efficient data communication is
achieved by use of high speed electronic
devices such as computers, cell phones, radios
and television. Some of the communication
systems include:
Facsimile (fax)
Radio communication
Television sets
Voice messaging
Video conferencing
Telecommuting
127
Internet
Facsimile (Fax)
This is a
telecommunication device
used to send documents
via telephone lines. A
document is placed in the
machine, scanned and
converted into analog
form then transmitted over
the telephone line. The
receiving fax machine
converts the analog data
into the original softcopy
and prints a hardcopy.
128
Sending fax over the Internet, a special modem called fax
modem is attached to sending and receiving computers.
Radio communication
Computer used in broadcasting stations to:
129
Download information from Internet to prepare
programmes like international news.
Television sets
Dataand information is transmitted via a TV channel
same way. It is used to broadcast conversional TV
programmes. The most common types of data
transmitted via TV include:
Teletext – this refers to a computerized service whereby
news and other information are provided on TV screens to
subscribers. TV is configured using a special adapter. The
subscriber can browse for information using a remote
controlled device.
130
Videotext (view data) – this is an interactive computer
information service that can transmit text and graphics.
Computers and phones are used for two way
communication to order goods and services. A subscriber
can interact with the service provider databases and the
information is displayed on home TV screen.
Voice messaging and telecommuting
Voice messaging – this is a combination of a
telephone and a computer to create a
computerized system that allows a message to
be sent in human voice without the receiver
needing to be present at the same time to
receive the message.
131
Telecommuting – this is a term used to refer to a
situation whereby a person uses a computer and
a communication channel to establish a link with
a remote office computer. With a personal
computer connected to a company’s computer,
an office employee can communicate with the
office.
132
Video conferencing
This refers to the
use of computers, a
digital video
camera, audio
capturing
equipments and
communication
networks to enable
133
people in different locations to see and talk to
one another.
Internet
This Internet transmits huge amounts of information in
form of words, images and sounds. Some of the
services available on the Internet are:
World Wide Web (www) – www refers to a collection of web
pages, which may be made up of text, images, animations,
sounds and video held on web servers. One can access
information using a computer or other devices like mobile
phones.
134
E-mail– once you subscribe for Internet services through a
service provider, you can send or receive e-mails to or from
anyone connected to Internet using a computer or a WAP
enabled cellular phone.
Law
enforcement
systems
Immediate and accurate
information is very crucial in
crime detection, biometrics
analysis using computers is
135
used in this area which involves the study, measurement and
analysis of human biological
characteristics. The biometric devices attached to computer are
used to identify people by recognizing one or more specific
attributes such as finger, lips, facial features e.g. iris etc.
136
sensory equipments are used to achieve
virtual reality effect.
Head mounted display (HMD) headgear
Gloves
Virtual reality software
Body suit
137
Head mounted display headgear
A headgear is made up of two
tiny display screens and sound
systems that channel images
and sound from the source to
the eyes and ears thus
presenting a stereo three
dimensional sound effect in the
virtual world. The wearer of the
headgear is able to look
around in the virtual
environment. A boom is an
alternative to the
oftenuncomfortable headgear.
Screen, optical and sound
systems are housed n a box
138
(figure right below). The user looks into the box through the two
screens to see the virtual world.
139
They give the wearer a sense of touch in the virtual
world.
Virtual reality software and body suit
Virtual reality software –this software gives the
wearer of the sensory devices an interactive
virtual sensory experience that makes him/her
feel as if he/she is in a world.
142
3. Discuss how a computer is used in A)
Reservation systems.
B) Banking.
C)Law enforcement.
4. Explain how computers have made it possible
for most organisations or institutions to have a
paperless office.
Answer of review questions 1-1-1
1. A).
Financial systems: B) Electronic point of sale
A) Payroll systems terminals
B) Accounting systems C). Computers in
C) Banking systems reservation systems:
B). Retail systems: D). Educational systems:
A) Stock control
143
A) Computer aided instruction E) Internet
B) Computer aided learning F) E-mail F). Computers in
C) Computer simulation industry.
D) Electronic learning A). Fast entry of data.
E). Communication systems: B). Less errors at point of
A) Facsimile entry.
B) Radio – internet radio C) Television – C). Good stock management
video streaming procedures.
D) Telecommunication
145
A) Computer aided instruction and computer aided
learning.
B) Computer aided design and computer aided
manufacturing.
C) Simulation and virtual reality.
7. Explain the role of robots in a motor vehicle assembling
plant.
8. Explain the term virtual reality giving examples of
devices used.
9. Discuss the devices required in order conduct a video
conference.
Answer of review questions 1-2-1
5. A). In medical institutions for diagnosis of diseases. B).
In mining companies for prospecting minerals.
146
6. A). Computer aided instructions involves drilling
students on techniques and content while computer
aided learning presents content and asks questions to
the learner later.
B). Computer aided design enables the user to design
products while computer aided manufacturing involves
controlling the manufacturing process using computers.
C). Simulation is creation of computer models on the
screen based on mathematical expressions. Virtual
reality is generation of 3 dimensional virtual models of
real world environments.
7. Robots carry out tasks that would have otherwise been
repetitive, hazardous and boring to human beings.
147
Answer of review questions 1-2-2
8. Virtual reality is a kind of computer simulation that
constructs models of real world environments. The
computer user can interact with the environment by
wearing special components namely: A) The
headgear/boom.
B) The glove.
C) The body suit.
9. A). A computer.
B). A digital video camera attached to a computer.
C). A network software for video conferencing.
D). A microphone.
148
Field work report
Visitone in the information and communication
technology (ICT) application areas discussed in
this chapter and write a detailed report of about
five pages on the use of computers in the area.
The report should include the following:
Title page
Table of contents
Introduction
A detailed description of information and
communication technology implementation in the area
of field work study
149
Conclusion
Revision questions
1. Differentiate between an electronic point of sale
and a cash register.
2. Explain how computers are used in accounting
systems.
3. Define the following terms:
4. Differentiate between computer aided design
and computer aided manufacture.
5. Explain why computer have become important
library management tools.
150
6. List some of the interactive sensory devices
used in virtual reality.
Answer of revision questions 1
1. EPOS is connected to a computerised system hence utilizes
computer’s intelligence and processing power. A cash
register simply records cash transactions.
2. A). Generating payroll reports.
B). Generating ledger, balance sheets and accounts payable.
C). Balancing books.
D). Capturing daily transactions.
3. A). Biometric analysis: a computer system that can recognise
features of human body parts like fingerprints, iris colour,
facial features etc.
151
B). Telex: sending/receiving of text via television.
C). Videotex: sending/receiving of video via television.
D). Telecommuting: working from home via a computer
network instead of commuting to work.
153
Chapte
Impact ofr information
3 and
technology (ICT) on
communication
society
154
Introduction
An impact is a positive or negative effect.
Information and communication
technology sector, like any other sector
has its positive and negative effects at
different levels in society.
155
Issues resulting from the use of ICT
A number of issues have risen as a result
of use of ICT. These issues include:
Effectson employment
Automated production
Issues of workers health
Environment issues
Cultural effects
156
Effects on employment
The computer based information systems
have altered the job market. Incorporation
of computers has changed the way work
has traditionally been done. Also it has its
effect in employment through job creation,
job replacement and job displacement.
157
Job creation
ICThas introduced new employment
opportunities that never existed before.
The use of computers in banks, industries,
communication, reservation system etc
has created new jobs titles such as
computer operators, programmers,
network administrators, software
engineers, system analysts, web
administrators etc.
158
Job replacement
Job replacement – this is a situation
whereby certain jobs disappears in an
organisation but reappears in another form
requiring more and high skilled manpower
e.g. copy typist using typewriters are still
needed in organisations but now use
computer word processor instead of
typewriter.
159
Job displacement
Job displacement – this is the process of
replacing man power with computerized
machines, their own or with the help of a
few skilled and highly trained people. In
most cases, the eliminated jobs are those
involving monotonous and unskilled labour
e.g. factory jobs can be displaced by
machine like robots.
160
Automated production
This involves computerization of production process in industries i.e.
the use of computer aided production which does not require high
manpower.
161
High initial cost of setting up an automated system.
164
Electromagnetic emissions
Electromagnetic emissions – these are
waves of electrical and magnetic energy
that are emitted by current carrying
conductors. Computer users are advised
to use low emission devices in order to
avoid exposing themselves to excess
emissions.
165
Eye strain and headache
Eye strain and headache – since computer
users have their eyes at close range with
the monitor, there is danger of developing
the Computer Vision Syndrome (CVS).
The syndrome is characterised by eye
strain, headache etc. the solution to this
problem is to use monitors with good
resolution and fitted with antiglare screen
166
that filters excess light, specific changes in
screen brightness.
Stress
Stress – mental stress is another compliant.
Many people who work at computer feel that
they are expected to produce more and do it
faster because computer s themselves are
fast. Also those been monitored by
computers frequently feel additional pressure.
167
Isolation
Isolation – people can conduct business
and communication without ever coming
face to face. Computer operators can work
an entire shift, taking their instructions
from a computer screen, sending and
receiving memos to each other
electronically without engaging in personal
conversation. These people feel isolated
from other workers.
168
Radiation and visual display unit
Radiation and visual display unit – there
have been reports that VDU emit
radiations that causes, birth defects,
blindness, cancer, miscarriages, sterility
etc.
169
Computer chip toxin
Computer chip toxin – workers in
computer chip manufacturing industries
are exposed to toxic chemicals that may
pose health hazards similar to those
feared from VDU
170
Ergonomics
The science of designing the workplace for
the comfort and safety of the worker. This
is the study of how living and working
conditions can be adapted to the
information technology. The need for
better working environment has resulted to
designing of special furniture to prevent
backaches, special monitors to prevent
eyestrain etc.
171
Environmental issues 1
Energy consumption and radiation – initially
computers consumed a
lot of energy hence
generated a lot of heat
and emitting
electromagnetic
radiation. In recent years
the
Environment Protection
Agency (EPA) launched
energy star policy to
encourage minimal use
of power of electronic
devices.
172
Environmental issues 2
Environmental pollution – it has
contributed to environmental pollution e.g.
garbage dumps of dead computer parts,
printers, monitors etc are disposed in
landfills hence causing environment
pollution Nickie-Cadmium laptops batteries
contain cadmium and when buried in
landfills can leak into underground water
tables and catchments areas.
173
Cultural effects
Moral effects – it has changed the way we talk,
affected our primary, human rights and integrity.
Internet users are exposed to so many things
e.g. watching pornographic materials, chatting
online, sending dirty messages online etc that
affect morals negatively. People also use
computers as a tool to accomplish their vices e.g.
forging documents such as certificates,
passports etc.
174
Computer crimes – this is the use of computers
software for illegal purpose.
Types of computer crimes 1
Data manipulation – refers to altering the
data that enter or exit a computer e.g.
changing data on a certificate.
Time bomb – this is coding a computer
program to destroy itself after it has been
run a certain number of times.
175
Computer virus – a program entered into a
computer with aim of destroying or altering
data and spreading the distraction to other
computers.
Types of computer crimes 2
Trap door – creating of a special password
that gives its creator a sole access to the
system.
176
Data stealing – is using a computer to
steal information that has been gathered
for someone else legitimate purpose.
Eavesdropping – tapping without
authorization into communication lines
over which computer data and messages
are sent.
177
Types of computer crimes 3
Industrial espionage – using a computer to
steal designs, marketing plans or other
trade secrets from one company and sell
them to another company.
Piracy – this is making unauthorized
copies of copyrighted computer software.
178
Fraud – this is the use of computers to
cheat other people with the intention of
gaining, money or information.
Types of computer crimes 4
Sabotage – this is illegal destruction of
data and information with the aim of
causing great loss to organisation.
179
Logic bomb – it’s a program that is
executed when a certain set of condition is
made e.g. a fired employee can load a
logic bomb to a computer to destroy when
his records are updated on database.
Evolution of computer systems
Future trends in ICT will be characterised
by:
180
Rapid evolution in computer hardware and
software
Artificial intelligence
182
Operating system that will handle real time data analysis
and object oriented will be developed.
Will have improved user interfaces that offers users
easier and more intuitive access to information
Artificial
intelligence
This is the ability
of computers to
think and reason
like human being
183
e.g. learning, reasoning, communicating.
Seeing and hearing. To accomplish this
technology a more computer speed, more
powerful and more memory to accomplish
this program application areas of artificial
intelligence.
Application area of artificial intelligence
Expert systems
Natural language processing
184
Voice recognition
Voice synthesis
Computer vision Neural networks
Robotics
Expert systems
This is software that store the knowledge of human
experts and is then used as consultant in a particular
field e.g. to help doctors diagnose patients.
185
Examples of expert system
Mycin – used to diagnose blood and meningitis
infections.
Prospector – used in predicting mineral deposits in
certain geographical sites.
Delta – used to help people repair diesel electric
locomotive.
Xcon
190
similar manner by perceiving stimuli and hence decide
whether to pass it on to the system or not.
191
Robotics
A robot is a computer
193
Expanded information superhighway
This involves the integration of cables and
wireless technologies for the purpose of
data and information transmission. Fibre
optic cables are used to carry millions and
millions of data items per second.
194
Review questions 1
1. Explain at least three effects of
introduction of ICT in workplaces.
2. List three advantages and two
disadvantages of automated production.
3. Describe some of the effects of ICT on
human health.
4. Why is there concern on the disposal of
Nickel-cadmium batteries?
195
Answer of review questions 1
1. A). Job replacement: workers without IT skills are
replaced by computerised machines and people who
have the skills to operate the machines.
B). Job displacement: employees moved to
another department where IT skills are not needed.
C). Job creation: new jobs are created.
2. A). Advantages of automated production.
A) Efficiency, increase in production.
B) Productivity increases in work place.
C) Cost effectiveness.
D) Improved communication.
B). Disadvantages of automated production
A) Unemployment.
196
B) Data and information insecurity.
C) Over reliance on ICT may cause a disaster if systems go down.
197
4. Nickel-cadmium battery contents
are not biodegradable hence may
seep down to the underground
water table causing poisoning.
Revision questions
1. Explain the effects of ICT on employment.
2. Explain how the use of ICT may affect health and the environment.
3. Explain the role of Environmental Protection Agency (EPA).
4. Define the term flaming.
5. Why should a parent be concerned when a child requests oftenly to be
given some money to go and browse Internet in a cyber cafe?
6. ( ) is an electronic device designed to emulate the human nervous
system.
7. Explain the four main areas of artificial intelligence.
198
8. Give a reason why success in natural language processing is important.
9. Define the term robot.
10. Describe the features and capabilities of an intelligent robot
11. Briefly explain the possible features of microcomputer and information
technology in a few years to come.
12. Briefly explain the concept “information superhighway”, its services and
potential growth.
200
that seeks to test whether students have any vision of ICT in
future).
11. Sublimation of ICT into a totally intelligence driven capacity
with devices that can emulate or simulate human
communication, speech, reasoning, learning and performance.
12. Information superhighway mainly deals with communication of
data and information on a large scale based on cable networks
and more sophisticated wireless communication. It is aimed at
making communication more efficient and reliable.
201
Chapte
Career opportunities
r4 in
communication
information and
technology (ICT)
202
Introduction
ICT has created new Software engineer
job titles. Some of the Computer engineer
computer career Web designers
opportunities include: Computer operator
Computer technician
Duties processing
System analysts manager
Chief
Information system
programmer/program manager
ming manager
Computer trainer
Computer
Network administrator
programmers
Computer typesetters
Database administrator
Librarian
(DBA)
203
System analysts
This is a person who is responsible for analysing a
company’s needs or problems then design and develop
a computer based information system.
204
Should have knowledge of data processing methods
and current hardware and familiarity with available
programming language.
205
Work with programmers to construct and test
the system.
Prepares system specifications.
Co-ordinates the implementation of new or
modified system.
Chief programmer/programming manager
He reports to data processing manager what has
been reported by programming group, junior and
senior programmers.
Duties
Managing the programmers.
206
Liaising with chief system analyst.
Review and control program documentation.
Reviews programs performance.
Ensures that all programme are well tested
before put into use.
Reviewing all the system specifications before
handover to programmers.
Computer programmers
These are people whose work entails coding i.e.
formulating instructions for the computer to solve
given problems.
207
Qualities of programmers
Good command of programming language in
use.
Knowledge of general programming
methodology and relationship between
programs and hardware.
Creativity for developing new problems solving
methods.
Patience and persistence.
208
Duties of programmers
Coding computer program using appropriate
programming language.
Testing of programs for logical errors, syntax
errors and semantic errors.
Debugging of programs.
Documenting programs i.e. program manuals.
Designing and implementing programs.
Maintaining and reviewing existing computer
programs.
209
Database administrator
This is a person responsible for the design and
implementation of the database.
Duties
Responsible for the design and control of
organisation database.
Controls and monitors database usage through
assignment of user passwords.
Keeping the database up-to-date by adding new
records, modifying or deleting unnecessary
records.
210
He establishes the appropriate content and
format of data records.
Software engineer
This is a person who is killed in
software development and technical
operation of computer hardware.
Duties
Developing system and application
software.
211
Developing user and technical
documentation for the new software.
Maintaining and updating the software to
meet day-to-day requirements.
212
Computer engineer
These are specialized personnel whose duties
are to assemble the computer systems.
Duties
Design and develop computer components e.g.
motherboard, storage devices etc.
Design and develop engineering and
manufacturing computer controlled devices
such as robots.
213
Re-engineer computer components to enhance
its functionality and efficiency.
Web designers
Web designers design website using
various software tools. These webs
contains pages where individuals and
organisation can advertise themselves
when promoting the products.
214
Web administrators
He administrate the web organisation, websites
by making sure the website is updated
periodically to give the right information.
Duties
Developing and testing websites.
Monitoring the access and use of Internet
connection by enforcing security measures.
Downloading information needed by an
organisation from Internet website.
215
Maintaining, updating and modifying information
on the website.
Computer operator
This is a person who interfaces the user demands
to the computer hardware by use of set of special
instructions known as commands.
Duties
Entering data into the computer for processing.
Keeping up-to-date records of all information
processing activities.
216
Responsible for the general equipment layout
within the computer room.
Activating the computer to obey programs
through use of commands.
Mounting the storage media e.g. disk to their
drives.
Computer technician
These are member of the technical staff whose
job is service and repair computers.
217
Duties
Troubleshooting computer hardware and
software related problems.
Ensuring that all computer related accessories
such as printers, storage media etc are in good
condition.
Assembling and upgrading computers and their
components.
218
Data processing manager
This is the person in the data processing
department within the organisation. His major
duty is to ensure that the organisation’s needs
are met.
Duties and responsibilities
In charge of data and information flow within the
department.
Responsible in data collection and preparation.
Purchase of hardware and other facilities and
their management.
219
Software development and maintenance.
Assessment and evaluation of staff
performance.
Information system manager
This person controls, plans, staffs, schedules
and monitors all the activities of the ICT
department in the organisation.
Responsibilities
Making sure that all tasks in the IT department
are done correctly and on time.
220
Preparing budgets for the departments.
Keeping the department inventory records up-
todate.
Managing the human resource within the
department.
Computer trainers
These are specialized personnel in the field of
computing, well conversant with various
disciplines and computer related issues, which
they can execute with ease for those who are
first venturing into this field.
221
Duties
Training people on how to use a computer and
various application programs.
Developing training reference materials.
Guide learners on how to acquire knowledge
through carrying out research.
Preparing learners for ICAT examinations.
222
Network administrator
Thisis a specialist who oversees the smooth
running of network systems in an organisation.
Responsibilities
Set-up a computer network.
Maintain and enforce security measures on
network.
Monitor the use of network resources.
Maintain and troubleshoot network rekated
problems.
223
Computer typesetters
Graphic designers and typesetters are
required in order to design graphical
objects and profession publications e.g.
books, newspapers, magazines.
Librarian
Heis responsible for keeping the files in various
storage devices. He is responsible for the
physical security of storage media.
224
Duties
Ensures that there are enough physical files
available for use.
Maintains the external files labels.
Ensures duplicates files are kept.
Ensures access of files is restricted to authorised
persons.
225
Further educational opportunities in
ICT
There are other areas in computing where
one would further his or her educational
ambitions. These areas include institutions
such as colleges, university, polytechnics,
institutions etc.
226
ICT courses offered in tertiary institutions
University
Public university
Private university
Polytechnics
Colleges
227
University
This is considered as the highest
institution in formal education. There are
two categories of universities.
228
Private university – they are self sponsored
institutions set up by individuals, churches or
any other organisation.
Examples of university that offer ICT courses
Public university Private university
Jomo Kenyatta Daystar university
University of Catholic university
Agriculture And Nazareth
Technology (JKUAT)
Kabarak university
Kenyatta university
AUSI university
Nairobi university
Maseno university
University are authorised
Moi university
to offer approved diploma,
229
Egerton university undergraduate and post
graduate programmers.
ICT related degree programmes
Bachelor of computer science.
Bachelor of information technology.
Bachelor of science in computer engineer.
Bachelor of computer networking. Bachelor
of software engineering.
Bachelor of business and information
technology.
230
Bachelor of science in information
technology.
Bachelor of computer programming.
234
Certificate in computer studies, information
technology etc.
Colleges
This is middle level that offer diploma,
certificates and craft courses in ICT and
other fields.
PITMAN
237
Factors to consider before joining a
college to pursue ICT course
Revision questions
1. Give at least six examples of public and accredited private
universities that offer computer related courses in Kenya.
2. Identify at least three ICT related courses offered at
241
1. University level
2. Polytechnic level
3. College level
3. Define the term accreditation as used in education.
4. Identify ICT courses you would enrol in at the postgraduate
university level.
5. Identify three national polytechnics that offer ICT courses in
Kenya.
6. Identify at least three colleges that offer computer science as a
subject at diploma level.
7. State and explain some of the factors you would consider
before enrolling for an ICT course in a college.
243
Answer of revision questions 2
3. Accreditation is the process of recognising an institution as being able to
offer degrees and diplomas. 4. A). Msc. information system /Ph.D B). Msc.
Information technology /Ph.D
5. National polytechnics in Kenya are Kenya polytechnic, Mombasa and
Eldoret Polytechnics.
6. Colleges that offer compute science as a teaching subject at diploma
level are Kenya Science, Kagumo Teachers College, Kenya technical
Teachers College etc. (The list is not exhaustive).
7. Factors to consider when enrolling for ICT course in a college:
A) Cost
B) Job opportunities
C)Whether the examinations offered are recognised etc.
D)The organisation offering the course.
244
END
245