0 оценок0% нашли этот документ полезным (0 голосов)
38 просмотров171 страница
A computer is an electronic device that operates under a set of instructions. A computer can take many forms and will usually include not only the microprocessor but also devices which will make data available for processing. Computers are considered to be powerful devices by its ability to perform its operations quickly, accurately and reliably.
A computer is an electronic device that operates under a set of instructions. A computer can take many forms and will usually include not only the microprocessor but also devices which will make data available for processing. Computers are considered to be powerful devices by its ability to perform its operations quickly, accurately and reliably.
A computer is an electronic device that operates under a set of instructions. A computer can take many forms and will usually include not only the microprocessor but also devices which will make data available for processing. Computers are considered to be powerful devices by its ability to perform its operations quickly, accurately and reliably.
IT. 1 MAJOR FUNCTIONS AND PARTS What is a Compute! A computer is an electronic device that operates under a set of instructions stored in its memory unit that can accept data, process that data arithmetically and logically, produce output after processing and store it for future use. This definition encompasses many devices e.g. the microprocessor chip fulfils the definition of a computer. However, the computer can take many forms and will usually include not only the microprocessor but also devices which will make data available for processing. These data will be processed into information by the computer and made available as output for people to use. 1 LESSON " What #oes a Compute #o! Although the result of computer processing can be marvellous such as controlling the flight of a space shuttle or keeping track of millions of credit cards or allowing a user to perform thousands of calculation, computers are basically capable of performing only a number of specific operations. These operations comprise of the Information Processing Cycle. Data is required for all computer processing. Data refers to raw facts including numbers, words and symbols that are entered into a computer to be processed. The computer manipulates data in a predetermined manner to create information. Information refers to the data that has been processed into a form that is useful and meaningful. This information can be stored in electronic format for future use. Wh$ ae Computes so po%e&u'! The input, process, storage and output operations that a computer performs may be simple. However, computers are considered to be powerful devices by its ability to perform its operations quickly, accurately and reliably. n a computer, operations occur due to the use of electronic circuits on small chips. !hen data flows along these circuits, it travels at close to the speed of light. This allows processing to be accomplished at a very fast rate. "torage capability is another reason why computers are so powerful. The computer can store enormous amounts of data and can keep that data readily available for processing. Therefore the factors of speed, accuracy, reliability as well as storage are some of the reasons that have made computers such a powerful tool. # LESSON ( The ha#%ae )ompo*e*ts o& a )ompute Data processing in a computer is performed by special equipment that is referred to as hardware. Hardware is the physical devices of a computer that we can see, touch and feel. The hardware consists of nput devices, processing unit, output devices and storage unit. I*put De+i)es nput devices are used to enter data into the computer. nput devices translate symbols that people understand into symbols that computers can process i.e. input devices convert people readable data into machine readable form. Po)essi*, U*it The processor unit of a computer contains electronic circuits that actually cause the processing of data to occur. This is normally done by a chip called the $entral %rocessing &nit '$%&(. The $%& controls or coordinates the activities of all other components. t usually carries out instructions issued by the user. The $%& consists of three ma)or components* 1. Arithmetic and +ogic &nit #. $ontrol &nit ,. -emory Output De+i)es .utput is the information that is displayed by the computer. .utput from the computer can be presented in many forms. The two most commonly used devices are* 1. -onitor aka "creen aka /isual Display &nit '/D&( aka $athode 0ay Tube '$0T( 1 softcopy #. %rinter 1 hardcopy 'on paper( , LESSON - Au.i'ia$ Stoa,e De+i)es "torage devices store instructions, data and information permanently. A common au2iliary storage device in personal computers is a floppy disk. Another storage device is the hard disk. The hard disk is a non3removable metal disk which stores data in large capacity. The $D30.-, D/D and &"4 have also become very popular. D/D 3 Digital /ersatile Disk $D 0.- 3 $ompact Disk 0ead .nly -emory &"4 3 &niversal "erial 4us 5ach computer component plays an important role. The input and output devices, memory and storage units that surround the processing unit are referred to as peripheral devices. The Fou Mai* Compo*e*ts o& a Compute LESSON / %0.$5"" data "T.0A65 7%&T information .&T%&T %0.$5"" data information 8eyboard -ouse "canner -onitor %rinter 7%&T .&T%&T 9loppy Disk Hard disk $D30.- "T.0A65 : I*put The i*put &u*)tio* i*+o'+es e*tei*, #ata i* huma* ea#a0'e &oms %hi)h the )ompute a))epts i* ma)hi*e ea#a0'e &om a*# se*#s to the CPU &o po)essi*,. nput refers to the process of entering programs, commands, user response, or data into the computers main memory. The four main types of input used by a computer are* 'i( %rograms 1 a set of instructions that directs a computer to perform necessary operations in order to process data into information. 'ii( $ommands 1 are keywords and phrases that a user inputs to direct the computer to perform certain operations. 'iii( &ser response 1 refers to the data that a user inputs in response to a question from the program. 'iv(Data 1 are the raw facts that are input by the user to be processed into information. Devices involved in the input function are many and vary from human interface devices such as keyboards to automatic real time data capture equipment such as scanners. %eople understand languages which are constructed using letters, numbers, punctuation marks. However, computers understand only binary machine language which consists of ;ero<s and one<s. = LESSON 1 nput devices are of two types* 1. 8eyboard 5ntry #. Direct 5ntry 1. 2e$0oa# E*t$ 2e$0oa#s Data is input into the computer using a keyboard that looks like a typewriter keyboard but has additional keys. 8eyboard entry is where the user reads from an original document called source document and enters the contents of the document into the computer by typing on the keyboard. n keyboard entry people type input and that input appears on the monitor after being processed by the $%&. 8eyboards are the most common way in which you will input data. The keys on the keyboard are divided into four categories* 'i( Typewriter keys 1 these keys resemble regular letters, numbers and punctuation marks on the keyboard. These are the keys A 1 >, ? 1 @ along with keys showing special characters. 'ii( 9unction keys 1 these keys are labelled from 91 1 91#. 9unction keys are usually used as a shortcut to an operation or frequently used task. They save the user from typing too many keystrokes. 'iii( 7umeric keys 1 these keys are labelled ? 1 @ and are used for tasks principally involving numbers. These keys are also collectively referred to as the numeric keypad. 7umeric keys are very useful when working with spreadsheet. 'iv("pecial purpose and $ursor control keys 1 these keys are used to help enter and edit data as well as e2ecute commands. "ome special purpose keys are 5"$, $T0+ 'control(, A+T 'alternate(, D5+ 'Delete(. They are used in combination with typewriter and function keys to carry out tasks. The cursor control keys or the directional arrow keys are used to move the cursor or the insertion point. A LESSON 3 Temi*a's A terminal is a form of input device that consists of a keyboard, monitor and a communication link. There are three types of terminals* 'i( Dumb terminal Dumb terminals can only be used to input and receive data but cannot process data independently. t is used to gain access to and view information from a large computer and input data. "uch a terminal may be used by an airline reservation clerk to gain access to a mainframe computer for flight information. 'ii( "mart terminal These terminals have some memory and allows the user to perform some editing or verification before the data is sent to the larger computer, for e2ample, a bank loan officer might o some calculation associated with a loan on a smart terminal. He would do this before the information is stored on the banks mainframe computer. 'iii( ntelligent terminal ncludes a processing unit, memory and secondary storage devices such as hard disk. 5ssentially an intelligent terminal is a microcomputer with a modem or other communication links that connect the intelligent terminal to larger computers. 7early all large organisation today have intelligent computers 'microcomputers(. Sta*# A'o*e Compute A stand alone computer is one that is not connected to any other computer on the network. B LESSON 4 ". Die)t E*t$ Die)t e*t$ #e+i)es ea# ma)hi*e ea#a0'e #ata &om pape o ma,*eti) me#ia a*# &ee# it #ie)t'$ to the )omputes CPU to 0e po)esse#. Direct entry is a form of input that does not require data to be keyed in by someone sitting and typing at a keyboard. This form of entry includes pointing, scanning and voice input devices. This reduces the possibility of human error from being introduced. t is also an economical way of data entry. An e2ample of an input device that uses both keyboard and direct entry is the %oint of "ale '%."( terminal. This sort of electronic cash registers are those that you see in department stores. !hen goods are sold, employees can record the sale using the keyboard or they can use a hand held scanner or wand reader to read special characters on the price tags. The reflection is changed into machine readable code and sent to the $%&. !hether the input is done using a keyboard or direct entry the result will be displayed on the screen. Direct entry devices may be categorised into three areas* 'i( %ointing devices 'ii( "canning devices 'iii( /oice input devices C LESSON 5 6i7 Poi*ti*, #e+i)es %ointing devices require cursors to be placed over an item to e2ecute commands. "ome forms of direct entry using pointing devices are* 'a( -ouse 'b( Touch "creen 'c( +ight %en 'stylus( 'd( Digiti;ers 'e( %en based computing 'f( Doystick 'g( 5lectronic pen 'h( Digital camera 'i( -ouse The mouse is the most common direct entry device. t is used to control cursor 'called the mouse pointer( on the screen and e2ecute commands. There are , basic types of mouse* i. The standard mouse 1 has a rubber ball inside and two or more buttons for selecting commands. t is connected by a chord via the systems unit. !hen rolled upon the table top the mouse simultaneously controls the movement of the cursorEthe mouse pointer on the screen. This is made possible through the use of rollers inside the mouse. These rollers detect the movement of the rubber ball and the mouse sends signals to the $%& to move the mouse pointer. The $%& then moves the mouse pointer on the screen. Left mouse button right mouse button (left-click) (right-click) @ Rubber ball LESSON 18 ii. The second type of mouse is called a trackball mouse or a roller ball mouse and does not require a flat surface. n this mouse the mouse pointer is controlled by a rotating ball placed on a keyboard. This type of mouse is usually found on portable computers, for e2ample, laptops, notebooks. iii. The newest type of mouse is called a touch surface. This mouse is controlled by sliding your finder on the sensitive surface of a touch pad. $hoices are confirmed using buttons placed at the bottom of the touchpad or by tapping on the surface. These have become the more common option on portable computers. 0ecently, wireless mouses have been introduced. 'ii( Touch "creen A touch screen is a type of monitor covered with a plastic layer. 4ehind this plastic layer are criss3crossed infrared 'invisible( beams of light. This arrangement enables users to select action and commands by touching the surface on the screen by a finger. 'iii( +ight %en 'stylus( A light pen is a light sensitive pen3like device. The light pen is used by placing it against the monitor. This closes a photoelectric cell and identifies the spot for entering and modifying data. +ight pens are used for selecting and e2ecuting commands. +ight pens are also called stylus. They are used by engineers for designing, for e2ample, microprocessors and aeroplane parts etc. 1? LESSON 11 'iv(Digiti;ers s a device that can be used to trace or copy a drawing or a photograph. The shape is then converted into digital data. A computer can then represent the data on the screen and print it out on paper. A digiti;er is an input device that converts points, lines and curves from images, drawings or photographs to digital pulses 'signals( and transmits them to a computer. A digiti;ing tablet enables you to create an image using a stylus. mages are converted into digital data and processed by the computer. A digiti;ed image consists of lines which are connected separately and can be manipulated as individual lines by the stylus. 'v( %en based computing A pen based computer is a small computer that lets you write directly onto a display screen using a stylus. This is usually used in banks to recognise a person<s signature since the software in pen based computing is able to recognise the different hand writings. t also interprets the different alphabets on a digital data. 'vi(Doystick t comprises of a vertical stick mounted on a base. t has one or more buttons that can be used for selecting commands. The movement of the vertical stick translates directly to the movement required by the pointer in the screen. Doysticks are usually used for playing games. 11 LESSON 1" 'vii( 5lectronic pen An electronic pen utili;es radio waves to communicate with a grid of wires underneath a liquid crystal display '+$D(. 0adio waves are sent to the tip of the pen and returned for position analysis. An electronic pen looks and feels like an ordinary pen yet contains no batteries or wires and does not need to be connected to a computer. As the tip of the pen touches the screen , the location of the pen is determined by the wires in the grid which detects the presence of the pen using radio waves. The software can then interpret the movement and meaning of the pen strokes. 'viii( Digital camera Although cameras are the most widely used methods to capture photographs, and then later they are scanned using a scanner to turn them into digital images, digital cameras are becoming a newer way of doing real3time image capturing. Digital cameras are an imaging method of capturing images directly in digital form and storing them to be processed alter. A newer form is the digital video camera which records real3time motion in digital form. 6ii7 S)a**i*, #e+i)es Direct entry scanning devices record images of te2t, drawings or special symbols. These images are converted to digital data that can be processed by a computer or displayed on a monitor. There are four categories of scanning devices* 'a( mage scanner 'b( 9a2 machine 'c( 4ar code reader 'd( $haracter and -ark 0ecognition devices 1# LESSON 1( 'a( mage scanner An image scanner automatically converts images on a page into electronic signals 'digital data( that can be stored on a computer. This process identifies pictures or different typefaces by scanning each image with light and breaking it into light and dark dots. These dots are then converted into digital data for storage. mage scanners are widely used as input devices. They are commonly used in desktop publishing to scan graphic images to be placed on a page of te2t. 'b( 9a2 machine A 9acsimile Transmission -achine commonly called a fa2 machine has become a popular office machine because they can transfer documents at electronic speeds. 9a2 machines scan the image of a document and encode it into a series of instructions representing black and white image areas. These instructions are then sent electronically over telephone lines to a receiving fa2 machine which converts the signal back to an image and recreates it on paper. The fa2 machine uses a process much like that used by an office photocopier. 9a2 machines are used by anyone who needs to send images and probably some te2t, for e2ample, engineering drawing, legal documents with signatures, sales and promotional materials. "ome people may use microcomputers to send and receive fa2. n order to do this, a fa2 board has to be installed to the computers system unit. t is also necessary to have special fa2 software. However, many users prefer to install a fa2Emodem board that provides the independent capabilities of a fa2 and a modem. 1, LESSON 1- 'c( 4ar code reader These are photoelectric scanners that read the bar codes or the vertical ;ebra stripe marks printed on products. "upermarkets use a bar code system called a &niversal %roduct $ode '&%$(. The bar code identifies the product when the bar code scanner is run over the bar code. The scanner emits light over the bar code which is reflected back of the scanner. These reflected signals are sent to the supermarket computer which has a description and the latest price of that product. The computer automatically transfers the relevant detail to the %." terminal. The terminal then displays the price, products name, amount received, change and other relevant information on the /D& and later prints them out on a receipt. 'd( $haracter and -ark 0ecognition devices $haracter and mark recognition devise are used to recognise any form of printed matter or markings on items and paper by using special devices* 1. -agnetic nk $haracter 0ecognition '-$0( #. .ptical $haracter 0eader '.$0( ,. .ptical -ark 0ecognition '.-0( 1: LESSON 1/ 1. -agnetic nk $haracter 0ecognition '-$0 ( s a direct entry method used in banks. This technology is used to read the futuristic looking numbers at the bottom of cheques. A special purpose machine known as a reader sorter reads characters made of ink containing magneti;ed particles. #. .ptical $haracter 0eader '.$0( &ses special pre3printed characters such as those printed on telephone bills that can be read by a light source and changed into machine3readable language. A common .$0 device is a hand3held wand reader. These are used in department stores to read the retail price printed on price tags by reflecting light on printed characters. ,. .ptical -ark 0ecognition '.-0( This is also called mark sensing. An .-0 device senses the presence or absence of a mark such as a pencil mark. .-0 is often used to find the score of multiple choice tests. t is also used to enter the entries for lottery games. 1= LESSON 11 6iii7 9oi)e i*put #e+i)e s $onverts a person<s speech into digital code. This input device, when combined with the appropriate software, form a voice recognition system 'speechEword recognition( in which the computer recognises spoken voice commands. These systems enable users to operate microcomputers and create documents by using voice commands. -ost of these systems must be trained to a particular users voice. This is done by matching the persons spoken words to patterns previously stored on the computer. -ore advanced systems that recognise the same word spoken by different people have developed. &ntil recently the list of words in voice input systems have been limited but now there are systems that would even translate from one language to another. /oice input devices enable users to keep their hands free for other tasks. They are thus obvious advantage for physically disable people. There are two types of voice recognition systemsF continuous speech and discrete words recognition systems. 6i+7Othe I*put #e+i)es "ensors and meters are instruments that are able to directly encode physical events into digital data. "ensors can record changes in temperature, weight, pressure, odour and light, all of which may be useful as input. At a computer controlled traffic signal, an electronic sensor called a pressure transducer is buried under the street. t senses the flow of traffic and inputs the data to the processor that controls the flow of traffic. 1A LESSON 13 Students to draw a summary tree of the input devices. 1B LESSON 14 Po)ess This part of the computer is responsible for running all the programs 'e2ecuting program instructions( and carrying out specific tasks. This device is used to carry out processing and is known as the processor or the $entral %rocessing &nit '$%&(. The hardware device which carries out the functions of the $%& is called the microprocessor. The process component of a computer system is responsible for processing data into information and controlling the overall operations of the computer. n a microcomputer, the $%& is on a single electronic component 'chip( called the microprocessor inside the system unit. The system unit, which houses the $%&, is also referred to as the computer housing or the system cabinet. The $%& has three main components* 1. Arithmetic and logic unit 'A+&( #. $ontrol &nit '$&( ,. -emory 1C LESSON 15 1. Aithmeti) a*# 'o,i) u*it 6ALU7 s usually called the A+& and is responsible for all calculations and comparisons to be done by the computer. t performs two types of operations* Arithmetic +ogical Arithmetic operations are fundamental mathematic operations. These operations are addition, subtraction, multiplication and division. Anytime the $%& receives an instruction to perform one of these operations, the control unit simply transfers the request to the arithmetic part of the A+& which performs the calculation and sends the information back to the control unit which transfers it to the memory unit to be output or saved. +ogical operations of the A+& consist of comparisons of two different pieces of data. Here these two different pieces of data are compared to see whether one is equal to 'G(, less than 'H(, greater than 'I(, less than and equal to 'HG(, greater than and equal to 'IG(, or not equal to 'HI( another. The A+& is sometimes referred to as the au2iliary unit.
". Co*to' U*it 6CU 7 t tells the rest of the computer system how to carry out program instructions given to it by the user or programs. t directs the movement of electronic signals between the memory and the A+&. t also directs the control signals between the $%& and the input and output devices. 1@ LESSON "8 (. Memo$ -emory is where the computer holds the data and instructions that have been processed. nformation shown on the output screen is also kept in the memory. There are three types of memory* 'i( 0andom Access -emory '0A-( 0A- chips temporarily hold data, program instructions and information. 0A- is also referred to as* %rimary memory 'storage( -ain memory nternal memory 0A- stores three items* data for processing instructions for processing that data 'program( information 'i.e. processed data( .ne of the most important facts about 0A- is that the contents are held temporarily. !hen you turn off the computer, the content of 0A- will vanish. Therefore, the stored content of the 0A- is said to be volatile. #? LESSON "1 'ii( 0ead .nly -emory '0.-( 0.- chips have data permanently recorded onto them when they are manufactured. 0.- retains its contents even when the power is switched off. The data of the program can be read and used but cannot be altered. 0.- is also called 9irmware of -icrocode. 5%0.- 1 5rasable %rogrammable 0ead .nly -emory allows the user to change 'update( the contents of 0.- using special programs. 'iii( $ache $ache memory is an area of 0A- set aside to store the most frequently accessed information. The cache acts as a high speed holding area between the 0A- and the $%&. n a computer that has cache memory the $%& detects which information is frequently accessed. t then copies that information so that it can be accessed faster than usual. Students to draw a summary tree of process. #1 LESSON "" Output .utput devices convert machine readable information into human readable form. .utput is the information displayed or printed by the computer for the user to see and use. Data input into the computer and processed by the $%& remains in machine readable form until output devices convert it into people readable form. .utput devices used to show output are* 1. -onitor #. %rinters ,. %lotters :. /oice3.utput 1. Mo*ito -onitors are the most common form of output devices today. They are used to display the soft copy of data and information. "oft copy refers to the images on the screen that can only be viewed when the screen is switched on and e2ist in electronic form. Two different characteristics of monitors are the number of colours that can be displayed and the clarity of images produced. mages are represented on a monitor by individual dots called picture elements or pi2els. A pi2el is the smallest unit of the screen that can be turned on or off and made into different shades of colour. The density of dots 'pi2els(, that is the number of rows and columns, determines the clarity of the image 1 the resolution. The more the pi2els on the screen, the finer the image will be. ## LESSON "( "tandards "tandards 0esolution $olours &ses $6A 1 $olour 6raphic Array ,#? 2 #?? : 56A 1 5nhanced 6raphic Array A:? 2 ,=? 1A /6A 1 /ideo 6raphic Array A:? 2 :C? ,#? 2 #?? 1A #=A "/6A 1 "uper /ideo 6raphic Array C?? 2 A?? #=A J6A 1 52tended 6raphic Array 1?#: 2 BAC B1C?????? #, LESSON "- There are two types of monitors* 'a( Desktop monitors 'b( %ortable monitors 'a( Desktop monitors This is the most common type of monitor for homes and office. These monitors are typically placed directly on top of the system unit 'for desktop computers( and on top of the desk 'for tower %$<s(. They are also referred to as $athode 0ay Tube '$0T(, /isual Display &nit '/D&( or screen. 7owadays the desktop monitor is also of the +$D type 'flat panel monitor(. 'b( %ortable monitors 4ecause $0T are bulky to be transported, portable monitors were developed. These types of monitors are known as flat panel monitors or +iquid $rystal Display '+$D(. &nlike technology used in $0T<s, portable monitors use liquid crystals to display. #: LESSON "/ ". Pi*tes t is used to give output on paper. nformation output on paper are called the hard copy. 'This output is done by either a printer or plotter(. -any types of printers are used with microcomputers* 'i( Dot matri2 printer 'ii( nk )et printer 'iii( +aser printer 'iv(Thermal printer 'i( Dot matri2 printer 'character printer, impact printer, internal communication( A dot matri2 printer forms characters and images using a series of small pins on a print head. These pins strike an ink ribbon that creates dots which form a character or image on paper. These printers are used for tasks where a high quality of image is not essential. Thus they are often used for documents that are circulated within the organisations. "ome dot matri2 printers have the ability to print in colour. The dot matri2 printer is usually very large and noisy but is ine2pensive. #= LESSON "1 'ii( nk )et printer 'line printer, non3impact printer, internal and e2ternal communication( An ink )et printer forms characters and graphics by spraying small droplets of ink at a high speed on the surface of the paper. This process not only produces a letter quality image but permits printing to be done in a variety of colours. nk )et printers ink are kept in ink cartridges sometimes called ink tanks. There are separate cartridges of black and colour ink. nk )et printers have recently become the more widely used printer. They are reliable, quiet and ine2pensive. !hile ink)et printer can be used to print out in black, they are best used wherever colour and appearance are important such as in advertising and public relations. 'iii( +aser printer 'nternal and 52ternal communication, non3impact, page printer( The laser printer creates dot like images on the drum using a laser beam towards light source. The characters and images that are formed on the drum are then treated with magnetically charged ink 'toner( which is transferred from drum to paper as the paper rolls past the drum, very similar to that of a photocopying machine. %rinters require special paper 'heat proof( because a heat process is used to create the finished document. +aser printers produce images with e2cellent letter and graphics quality. t is widely used in applications requiring high quality and high quantity output 'up to ,?ppm( and has made possible a whole new world of desktop publishing. +aser printers can also print in colour should they be fitted with a colour ink cartridge. #A LESSON "3 'iv(Thermal printer 'non impact, page printers( A thermal printer uses heat elements to produce images on a heat sensitive paper. .riginally these printers were used in scientific labs to record data. -ore recently colour thermal printers have been widely used to produce very high quality art work and graphics. $olour thermal printers are not popular because of their cost and their requirement of specially treated paper. These printers are more specifically used printer that produces a Knear photographic outputL. Students to copy summary of printers from tetbook pg! #B LESSON "4 Othe t$pes o& pi*tes 'i( Daisy wheel printers 'impact printers( %roduces very high quality and professional looking correspondence however they are slower and less reliable than dot matri2. 'ii( $hain printers 'impact printers( %roduces professional and high quality correspondences. They are very e2pensive and are used in large organisations to print out large amount of outputs. They were originally designed for mini and mainframe computers. 'iii( 5lectrostatic %rinters 'non impact( These are page printers that use electrostatic or laser beams to create charges on metal drums which are later produced on paper. The images are made up of tiny dots. These printers output on specially treated paper and use e2pensive chemicals. #C LESSON "5 Impa)t a*# No* impa)t Pi*tes 7on impact printers use electronic or photographic techniques to produce outputs at a very high speed. These printers do not come in hard contact with the paper e.g. thermal, laser, ink3)et, electrostatic printers. mpact printers function like a typewriter. They strike a print3head against a ribbon to leave an impression on the paper and e2amples include dot matri2, daisy wheel, chain printers etc. Impa)t Pi*tes No* Impa)t Pi*tes Dot matri2 printer nk )et printers Daisy wheel printer +aser printer $hain printers Thermal printer 5lectrostatic printer $haracter %rinter %rints out one character at a time e.g. dot matri2, daisy wheel and chain printers. +ine %rinter %rints an entire line of te2t at once, e.g. ink )et printer %age %rinter %rints an entire page at once e.g. thermal printer, laser and electrostatic. #@ LESSON (8 (. P'ottes %lotters are special purpose drawing devices for producing bar charts, map, architectural drawings and even ,D drawings. %lotters can also produce high quality multi coloured documents. They can also produce documents which are large in si;e e.g. A,. There are : types of plotters* 'i( %en %lotter $reates images by using a pen or a pencil over drafting paper. 'ii( nk )et %lotter $reates line drawings and solid colour output by spraying droplets of ink on paper. 'iii( 5lectrostatic %lotter &ses electrostatic charges to create images made up of tiny dots on metallic drums which is then reproduced on specially treated paper. 'iv(Direct mage %lotterEThermal %lotter 'direct imaging( $reates image using electronically heated pins on heat sensitive paper. ,? LESSON (1 -. 9oi)e:Output /oice output devices make sounds that resemble human speech but are pre recorded vocalised sound. There are many occasions where you will hear synthesi;ed speech being used, for e2ample, telephones, car alarm systems, mobiles etc. 9or multimedia applications, the voice output devices are typically a set of stereo speakers or headphones. These devices are connected by a sound card which is plugged into the system uni 'plugged onto the mother board(. The sound card is used to capture and send back the captured sound. /oice output is also used as reinforcement for learning, for e2ample, a student learning a foreign language. .ne of the most powerful capability is to assist the physically challenged. Students to draw a summary tree of the output devices. ,1 LESSON (" Au.i'ia$ Stoa,e De+i)es Data may be input, processed and output but one of the most valuable features of a computer is its ability to store 'save( that information permanently even after the computer have been switched off. This way you can save your work for future use, share information with others, or modify the information readily available. "econdary storage holds information e2ternal from the $%&. t allows you to store programs such as word processors '-" !ord(, spreadsheet '-" 52cel(. t also allows you to store data processed by the program such as te2t in a document or numbers in a spreadsheet. There are two approaches to secondary storage* 1. "equential Access #. Direct Access ,# LESSON (( 1. Se;ue*tia' A))ess n this method data is stored in a sequential order or as a sequence either chronologically, alphabetically, numerically etc. An e2ample of a sequential access media is a magnetic tape. n order to locate a piece of data saved on a sequential access storage media, the computer will look through the entire content of the storage device until the correct data is found. ". Die)t A))ess This form of storage allows you to directly access information where it is stored. "ome direct access storage devices are floppy disks, hard disk, optical disk '$D3 0.-, D/D30.-(, &"4. 0etrieving data and information is much faster with disk storage 'using direct access( than tape storage 'using sequential access(. 9our 8inds of "econdary "torage 1. 9loppy disk 1 direct access #. Hard disk 1 direct access ,. .ptical disk 1 direct access :. -agnetic tape 1 sequential access ,, Tape ??, ??# ??1 LESSON (- 1. 9loppy disk 9loppy disks are removable storage media that are inserted into a floppy disk drive and used to store information. This type of storage is convenient, reliable and relatively low in cost. They consist of mylar plastic that rotate within the )ackets. Data and programs are stored as electromagnetic charges on a metal o2ide film coating the -ylar plastic. Data and programs are represented by the presence or absence of these charges 1 using the A"$ or 54$D$ data representation codes 'schemes( 1 referred to as binary schemes. A newer type of binary scheme is called &ni$ode. A"$ 1 American "tandard $ode for nformation nterchange 54$D$ 1 52tended 4inary $oded Decimal nterchange $odes &ni$ode 1 &niversal $ode The two most popular si;es of floppy disks are* = M inch diameter , N inch diameter ,: LESSON (/ The Disk Drive OOO diagram The disk drive obtains stored data and programs from a floppy disk. t is also used to store data and programs on a floppy disk. The disk drive consists of a bo2 with a slot into which you insert a floppy disk. That slot is covered by a door called a drive gate. A motor inside the drive rotates the floppy disk. As the floppy disk rotates, the electronic heads called the read3write heads read data from and write data to the floppy disk. The read write heads are mounted on the access arms. 0ead means that the read write head in the disk drive copies data 'stored as magnetic impulses and electronic charges( from the floppy disks to the memory. !rite means that the disk drive transfers data 1 into electronic signals to the memory to the floppy disks. t is important to realise that reading makes the copy of original data. t does not alter the original data. n contrast, writing replaces any data that is e2isting or in most cases occupy any space that is empty. ,= LESSON (1 <o% a F'opp$ Dis= Wo=s A floppy disk is inserted into the slot in front of the floppy disk drive and the drive gate closes. The floppy disk is then positioned over a spindle that holds it so that the floppy disk can revolve without slipping when the drive motor is in motion. The floppy disk can rotate at over ,A? revolutions per minute depending on the drive. The magnetic data signals are transferred from the loppy disk into the computer and vice versa 'from computer to disk( by the read write heads. Data is stored in tracks character by character using the same binary scheme that is used to store characters in the main memory. -agnetic impulses are placed along a track to represent the bit pattern for each character. The read write head is on an access arm which moves back and forth on a floppy disk. To read or write on a particular part of a floppy disk, the access arm moves the read write head along the floppy disk. This is called the seek operation. The drive then rotates the floppy disk into the proper position. This is called the search operation. ,A LESSON (3 Pats o& a F'opp$ Dis= Data is recorded on a floppy disk in rings called tracks. These tracks are close concentric circles. They do not have any visible grooves. 5ach track is divided further in wedge shaped sectors. OOO diagram "ectors are used to help in the storage of information on a disk. -ost disks are manufactured without tracks and sectors. These are called soft sectored disk and they must be adapted to a particular brand of microcomputer and disk drive. Thus, you must put on the tracks and sectors yourself. The process of creating tracks and sectors on a floppy disk and preparing it for use is called formatting or initialising. The process of formatting can also be used to delete the entire contents of a floppy disk. F'opp$ Dis= Capa)it$ Description 4ytes = M inch Double sided, double density 'D", DD( Double sided, high density 'D", HD( ,??kb 1.#-b , N inch Double sided, double density 'D", DD( Double sided, high density 'D", HD( B#?kb 1.::-b ,B LESSON (4 Di&&ee*)es 0et%ee* /> i*)h a*# (? i*)h F'opp$ Dis=s The two most popular si;es of floppy disks have distinctive differences in how the )acket and the write protect notch are handled. The = M inch has an e2terior made of fle2ible plastic )acket. The disk is protected by a paper envelope when it is not in use. The write3protect notch is covered with a removable tab which comes with the disk when you buy it. The , N inch disk is sturdier. The e2terior )acket is made up of hard plastic )acket to protect the fle2ible disk inside. The write3protect notch is covered by a sliding shutter. The write3protect notch prevents the computer from accidentally writing over the information that you want to keep. A 3 inch Floppy Disk Back Front data access window data access area shutter hub hard plastic jacket label write-protect notch ,C LESSON (5 Fu*)tio*s o& #i&&ee*t pats o& a F'opp$ 1. !rite protect notch %rotects the information stored on a disk. f the notch is closed by the shutter then the information can be written onto the disk and read from the disk. This is called the read3write mode. f the notch is e2posed then data can only be read from the disk but no writing or editing can be done 'write protect mode( #. nde2 Hole ndicates the beginning of the revolutions of the disk and is used by the drive to revolve the disk. ,. $entre Hole &sed by the disk drive to hold the floppy disk in place. The spindle comes and attaches itself on this hole. The spindle ensures that the disk does not move during reading and writing process. :. -ylar %lastic %latter This is where the information is stored in the form of electromagnetic charges on tracks and sectors. =. +iner %rotects the -ylar plastic from damage and removes the dust which gets accumulated on the -ylar plastic. ,@ LESSON -8 A. 0ead !rite !indowEData Access !indow The computer can read or write information through this window. The shutter is pulled back so that the -ylar plastic 'data access area( can be shown through the data access window. Therefore, the data access window is simply a rectangular hold cut onto the shutter to provide access to the data. B. Data access areaEread3write area This is the -ylar plastic which is visible through the data access window when the shutter is pulled back. The access arm is placed over this area so that the read3write heads can read data from and write data to the disk. C. Hub 6oes inside the disk drive and fi2es itself on the motor mechanism and helps the disk to rotate. The centre and inde2 hole are part of the hub. @. "hutter $overs the read3write area and protects the -ylar plastic which is e2posed through the data access area. 1?. +abel To show the contents of a disk, the user has to write the appropriate name and description of the content of the disk onto the label which is pasted on top of the disk. 11. Hard plastic )acket %rovides a safe covering for the -ylar plastic and prevents it from being damaged. :? LESSON -1 Ta=i*, Cae o& a F'opp$ Dis= 1. Do not touch the disks surface 'data access area(. t is easily contaminated and will cause errors. #. 8eep disks away from strong magnetic fields, for e2ample, telephones and stereos. ,. Do not burn the disk. :. Do not put heavy ob)ects on the disk. =. Do not use rubber band or paper clips on the disks. A. Do not e2pose the disks to e2cessive heat or sunlight. B. Do not use sharp ob)ects on the disks. C. 8eep disks away from chemicals or liquids. @. 8eep disks in protective )ackets when not in use. 1?. &se felt3tip pens when writing on the label of the disk. The best protection to save data on the floppy disk from getting lost is to make a backup 1 a duplicate copy of a disk. :1 LESSON -" ". <a# #is= @ #ie)t a))ess Hard disks consist of metallic rather than plastic platters. They are also tightly sealed to prevent any foreign matter from getting inside. Hard disks are e2tremely sensitive devices. The read3write head writes on a cushion of air ?.?????1 inch thick. t is so thin that a smoke particle, finger print, dust or human hair would cause what is known as a head3crash. A head3crash happens when the surface of the read3write head comes into contact with the magnetic disk surface or particles on the surface of the disk. A head3crash is disaster for a hard disk. n this case some or all of the data on the hard disk could be destroyed. There are , types of hard disks* 'i( nternal Hard Disk 'ii( Hard Disk $artridge 'iii( Hard Disk %ack :# LESSON -( 6i7 I*te*a' <a# Dis= A hard disk consists of one or more metallic platters sealed inside a container. The container includes a motor for rotating the disk. t also contains an access arm and read3write heads for reading from and writing data to the disk. +ike a floppy disk drive, the internal hard disk has a seek operation and a search operation for reading and writing data in tracks and sectors. The internal hard disk is housed within the systems unit. t is screwed and connected to the motherboard to be a component of the systems unit itself. Therefore, it is also called a fi2ed disk. nside the internal hard disk is a ,N inch metallic platter with access arms on which read3write heads are mounted. These access arms move back and forth. The internal hard disk is connected to the mother board via a ribbon cable 'data cable(. This cable communicates all data between the $%& and the hard disk. Another cable, which is the power supply cable, connects the hard disk to the power supply. 'A floppy disk is connected to a computer in the very same manner(. An internal hard disk has two advantages over floppy disk* 'a( $apacity A hard disk can hold many times the amount of information compared to a floppy disk. 'b( "peed A hard disk spins much faster than a floppy disk. Therefore, it can read and write at a much faster rate. :, LESSON -- 6ii7 <a# Dis= Cati#,e A hard disk cartridge can be removed and transferred when they are filled. The disadvantage of the internal hard disk is that they only have a fi2ed amount of capacity and cannot be easily removed. Hard disk cartridges have the advantage to be easily removed like a video cassette from a recorder. Hard disk cartridges need special drives. They give microcomputers faster access to large quality of data. The amount of storage available is only limited by the number of cartridges used. !hile a regular hard disk system has a fi2ed storage capacity, a removable hard disk cartridge system has virtually unlimited capacity 1 you )ust need to keep on buying additional hard disk cartridges. 6iii7 <a# Dis= Pa)= -icrocomputers that are connected to other large computers often have access to hard disk packs. -icrocomputer internal hard disks and hard disk cartridges typically have one or two disk platters and two or more access arms. n contrast a hard disk pack consists of several platters in a stack thereby offering much greater storage capacity. There is space between the stack of disks to allow the access arms to move in and out. The hard disk pack has several platters placed in a stack. 5ach access arm has two read3write heads 1 one reads the surface above it and the other reads the surfaces below it. 9or instance, a disk pack with 11 platters will only provide #? recording surfaces. This is because the top and bottom outside surfaces are not used at all. All the access arms move in and out together, however, only one of the read3write heads is activated at any given time. Access time is the time between the computers request for the data from secondary storage and the accomplishment of data transfer. Access time for most drives is )ust under #= milliseconds. :: LESSON -/ (. Opti)a' #is= @ #ie)t a))ess .ptical disks are used for storing great quantities of data. An optical disk can hold from B?? -b to B.1 6b of data. n optical disk technology, a laser beam alters the surface of a metallic disk to represent data. To read this data a laser light scans these areas and sends the data to a microprocessor for conversion. There are four kinds of optical disks* 'i( $D30.- 'ii( $D30 'iii( $D30! 'iv(D/D 6i7 CD:ROM &nlike floppy and hard disks, which use magnetic charges to represent ?<s and 1<s, optical disks use flat areas and bumpy areas called pits. "iagram # leave around $% lines := LESSON -1 The optical disk is read by a laser light that pro)ects tiny beams of light on these areas. The amount of reflected light determines if an area represents ?<s and 1<s. +ike a commercial audio $D, a $D 0.- is read only disk. 0ead .nly means that the data on a disk cannot be written on or erased by a user. .ptical disks '$D 0.-s( are used to distribute large databases, reference and software, for e2ample an encyclopaedia which contains thousands of words and hundreds of pictures. $D 0.-<s are also used to contain large software application packages, for e2ample, -icrosoft .ffice #??? is available on a single $D 0.-. .ne advantage of the $D30.- is that the installation of software from the $D 0.- to the internal hard disk is much faster. 6ii7 CD:R This type of optical disk is also known as !.0- '!rite .nce, 0ead -any(. $D30 disks can be written to only once. The writing 'burning( on the disk is done using a $D writer. After that they can be read many times but they cannot be written to or erased. This is because the $D writer writes the information onto the $D30 and it becomes permanent. $D30 disk are ideal to be used as archives, to permanently store large amounts of information or for backups. :A LESSON -3 6iii7 CD:RW These are also called erasable optical disks or rewritable optical disks. These disks are like $D30 disks e2cept that they can be rewritten to many times, i.e. data that has been written onto the disk can be erased and the same disk used over and over again. 5rasable optical disks also need $D writers. 6i+7D9D D/D stands for Digital /ersatile Disk. D/D disks and disk drives are very similar to $D30.-<s e2cept that more data can be packed into the same amount of space. They are used for a variety of high capacity needs such as recording and playing full length motion pictures, advanced multimedia games and interactive encyclopaedias. Today D/D and D/D30! 'also known as D/D 0A-( disks are available and D/D storage capacity has increased to 1B 64 1 enough storage for an C hour motion picture or an entire library of encyclopaedias. Opti)a' Dis= Description $apacity $D30.- A=? 1 B?? -4 $D30 A=? 1 B?? -4 $D30! A=? 1 1??? -4 D/D :.B 1 B.1 64 1 1B 64 :B LESSON -4 -. Ma,*eti) tape @ se;ue*tia' a))ess -agnetic tapes are primarily used for back3up purposes. t falls in the category of sequential access storage. Therefore it is slower, however, it is an effective and cheap way of making backups or duplicate copies of your programs and data. n some situations magnetic tapes are also used to store large amount of information. There are two forms of magnetic tape storage* 'i( -agnetic Tape "treamers 'for microcomputers( -any microcomputers with a hard disk utilise a device called a backup tape cartridge unit 'tape drive( to backup the contents of a hard disk onto a tape cartridge 'magnetic tape streamers(. 'ii( -agnetic Tape 0eels 'for larger computers( A reel of magnetic tape 1 used with minicomputers, mainframes and supercomputers 1 is half inch wide and around half a mile long. t stores about 1A?? to A:?? characters to an inch. /. Othe Se)o*#a$ Stoa,e De+i)es &"4 1 &niversal "erial 4us &"4 drives are a new way of portable data storage. These plug and play devices require a port called a &"4 port. &"4 drives are plugged in the &"4 port in order to be detected and to store data. They are slowly becoming more popular than floppy disks. &"4 dries use direct access and read and write data faster than floppy and optical disks. Students to draw a summary tree of the auiliary storage devices. :C LESSON -5 The Ai*a$ S$stem Data and instructions are represented electronically using two state systems called the binary system. There are three principle binary schemes* A"$ 1 American "tandard $ode for nformation nterchange. This is the most widely used binary code for microcomputers and uses C bits. 54$D$ 1 52tended 4inary $oded Decimal nterchange $odes. t was developed by 4- and is used primarily for large computers and uses C bits. &ni$ode 1 &niversal $ode. s a 1A bit code designed to support international language like $hinese and Dapanese. These languages have too many characters to be represented by C bit A"$ and 54$D$ codes. &ni$ode was developed by &ni$ode nc. with support from Apple, 4- and -icrosoft. !hen you open up a system unit of a microcomputer, you would mainly see electronic circuitry. The most fundamental statement you can make about electricity is that it can be turned on and off, for e2ample, a light switch maybe on or off, an electronic switch 'circuit( may be open or closed. +ikewise, a magneti;ed spot on a storage media or a bit travelling with the electronic circuitry may have a positive 'P( or negative '3( charge, i.e, the presence or absence of electronic pulse. This is the reason why a binary scheme is used to represent data and instruction. The decimal system has 1? digits from ? 1 @. However, the binary system consists of only two digits '?, 1(. n a computer, ? is represented by electricity being off, '3( charge and 1 is represented by electricity being on, 'P( charge. 5verything that is entered into the computer is converted into electronic signals 'C bit(. $haracter A"$ 54$D$ ! ?1?1?111 111??11? :@ LESSON /8 &nit of -easure and $apacity 5ach ? or 1 in the binary system is called a bit 1 short for binary digit. n order to represent numbers, letters and special characters, bits are combined into bit of C to form a byte. 5ach byte represents one character and therefore* 1 byte G C bits G 1 character. 1 kilobyte G 1?#: bytes 1 megabyte G 1,?:C,=BA bytes '1?#: 2 1?#:( 1 gigabyte G 1,?B,,B:1,C#: bytes '1?#: 2 1?#: 2 1?#:( 1 terabyte G 1,?@@,=11,A#C,??? bytes '1?#: 2 1?#: 2 1?#: 2 1?#:( E.e)ises 'don<t write this. This is the teachers note. The e2ercise will be a the back of your book( =? LESSON /1 1T. " TBPES OF COMPUTERS END:USERS These are people who use microcomputers and has access to large computers. They use microcomputers and pre3written programs 'word processing, spreadsheet, databases, etc( to solve information related or decision making problems. 4y gaining computer literacy end3users can use microcomputers to improve their productivity and their value in the work place. 4y becoming computer competent 'literate( 1 learning how to use a computer to meet your information needs 1 will certainly increase your value as a student andEor an employee in your organisation. FOUR TBPES OF COMPUTERS 1. -icrocomputers #. -inicomputers ,. -ainframes :. "upercomputers 1. Mi)o)omputes The most widely used and the fastest growing types of computers is called the microcomputer. -icrocomputers are small computers that are placed on top of a desk or carried around by end3users in order to fulfil their information needs. There are two categories of microcomputers* =1 LESSON /" 'a( Desktop computers These computers are small enough to fit on top or along the side of a desk and yet are too heavy and too big to be carried around. The desktop computer comes in two designs 1 the desktop or the towerEmini tower case. The desktop design has a flat system unit placed hori;ontally on the desktop with a monitor placed on top of it. The newer and more popular designs are the tower and mini tower cases. Here the vertical system unit is placed beside the monitor. There are two categories of desktop computer* 'i( %ersonal $omputers '%$( 'ii( !orkstations 'i( %ersonal $omputers '%$( Are a type of desktop computers which run comparatively easy to use application software. They are used by a wide range of individuals from clerks to manager. Their users are usually called end3users. 'ii( !orkstations Are another type of desktop computers which are more powerful than %$<s and designed to run more advanced application software. !orkstations are utili;ed by engineers, scientists who process a lot of data. 7owadays there is not much difference between a %$ and workstations as both of them have similar strength. t is largely the software programs that determine the difference between a workstation and a %$. =# LESSON /( 'b( %ortable computers Are microcomputers which are small and light enough to be moved easily from one place to another. There are four types of portable computers* 'i( +aptops 'ii( 7otebooks 'iii( "ub3notebooks 'iv(%ersonal Digital Assistant '%DA, %almtop %$, Hand Held %$( 'i( +aptops These are microcomputers that are small and looks like a standard si;e briefcase and light enough to be moved easily from one place to another. These computers maybe A$ powered 'battery powered( or D$ powered or both. The user of a laptop may be a businessman or an accountant or e2ecutive who needs to work away from the desk. nstead of a mouse a laptop uses a device called a trackball to move the mouse pointer on the screen. 7ewer computers use touch surface pads. +aptops also have a $D 0.- drive 'optical drives( as well as ports at the back to attach to peripheral devices. 7owadays laptops and other portable devices come with a standard &"4 port and optical disk writers. 'ii( 7otebooks Are smaller version of laptops. 7otebooks are especially valuable in locations where electrical connections are not available. The key feature of a notebook is its si;e. Although smaller than a laptop it gives the user access to all devices and capabilities of a laptop. The user of a notebook %$ might be a student, sales person or a )ournalist who uses computer for note taking. =, LESSON /- 'iii( "ub3notebooks Are for frequent flyers and life on a road types. "ome sub3notebooks users give up a full si;e display screen and keyboard in e2change for less weight. These computers fit easily into a briefcase. 'iv(%ersonal Digital Assistant '%DA( These computers are small enough to fit onto a persons hand and are smaller than sub3 notebooks. The typical %DA combines pen input, writing recognition, personal organisational tools and communication capabilities in a very small package. A %DA user might be a worker at a warehouse or a busy e2ecutive handling daily communications. Aa*#s o& Mi)o)omputes The most common microcomputer in 9i)i today are 4- compatible computers. There are also families of computers* 'i( 4- 1 nternational 4usiness -achine 'ii( Apple -acintosh =: LESSON // 'i( 4- 4- compatible computers have similar internal structures, can run the same program and share hardware. These compatible computers are sometimes called KclonesL and have designs which are based on original 4- computer structure. They are more popular to users than the original 4- which is also available on the market because they are much cheaper. There are many different brands of 4- compatible computers available in 9i)i. "ome that are commonly used are* Dell $ompaq Digital %ride $ompuAdd Hewlett %ackard A.pen 'ii( Apple -acintosh t is relatively e2pensive and has different internal structure from 4- and 4- compatible computers. These families of computers are incompatible i.e. their operating systems are different and they would not run the same programs. They also do not use the same hardware devices. n order to use each others hardware devices or programs additional hardware and software need to be added. $ompatible computers are those that essential operate in the same way. Two computers are compatible if they can communicate freely with each other, share the same software, data and use the same peripheral devices. A third family of computers called $ommodore was once very popular but is no longer used today. == LESSON /1 #. -inicomputers Also known as mid3range computers, minicomputers are desk3si;ed machines. They fall between microcomputers and mainframe computers in their processing speed and their data storing capabilities. These computers can support a number of users and perform many different tasks at once. They were originally developed to perform specific tasks such as engineering calculations. +ater they became popular for business use. Their use grew rapidly as their performance and capabilities increased. -inicomputers cost more than microcomputers. +ower price minicomputers are also available. They are also quite similar to %$<s but offer features that make them appropriate for business and administrative use. These features are* 'i( more disk space 'ii( faster processing capability 'iii( sufficient memory to support time sharing systems 'serving multiple users simultaneouslyEat the same time(. Taking time sharing capabilities into accounts, medium si;ed companies or departments of large companies typically use minicomputers for specific purposes. These computers may be used for research or to monitor a particular manufacturing process. "maller si;ed companies typically use minicomputers for their general data processing needs such as accounting and storing databases. =A LESSON /3 ,. -ainframes These are large computers occupying specially wired, air conditioned rooms. They can handle numerous users, store large amounts of data and process transactions at a very high rate. n other words, mainframe computers have a high data storage capacity and great processing speeds. They are used by large organisations such as businesses, banks, universities and government agencies to handle millions of transactions. 9or e2ample, insurance companies use them to keep track of customer accounts. These computers are time3sharing computers and can support hundreds of users simultaneously. :. "upercomputers These computers are the most powerful category of computers and accordingly the most e2pensive. "upercomputers are special high capacity computers used by very large organisations. These computers have the ability to process millions of instructions per second and issued for applications by very large and rich organisations. 9or e2ample, 7A"A '7ational Aeronautics and "pace Agency( use supercomputers to track and control space e2plorations and simulations. They are also used for oil e2plorations and world wide weather forecasting. =B LESSON /4 SUMMARB 1. -icrocomputers mostly used in homes costs about 1??<s to 1???<s processor performs about 1?? million operations per second microcomputers come in many si;es and shapes such as* 3 Desktop %$ 3 +aptop %$ 3 7otebook 3 %almtop %$ 52amples* Apple, -4 %$<s #. -inicomputers Are somewhat larger than microcomputer &sed in business and industry for specific tasks, such as processing payroll .ne minicomputer can carry out the processing tasks for many users %rice tag ranging from 1??s to 1???s &sed in medium si;ed firm or businesses 52amples* 4- A" :??, D5$ -icro /a2 ,. -ainframes Are large, fast and fairly e2pensive The cost is about millions -ostly used by large business or government to provide centrali;ed storage "ervices more users '1??( than a minicomputer 52ample* 4- "ystem ,B? :. "upercomputers Are the largest, fastest and most e2pensive types of computer Designed to optimi;e processing for multiple users "olve a few very difficult problems such as predicting the wether and modelling nuclear reactions The speed of a supercomputer can reach one trillion instructions per second &sed by researchers, military and scientists The cost tops out at Q,= million 52ample* $ray 1. =C LESSON /5 CUIDELINES FOR CARE OF T<E COMPUTER U*i*teupti0'e Po%e Supp'$ 6UPS7 This is the best protection against your power problems. A &%" is a device containing a battery and other circuitry that provides a continuous supply of power to a computer in the case of a power shutdown. t is designed to give enough power to keep your computer working through momentary power interruptions. t is designed to give you time to save your files, e2it your programs and properly shutdown your computer in the event of a power outage 'few minutes only(. Different types of &%" are available. "ome support individual computers while others are capable of providing power to five or more %$<s at once. Su,e Pote)tos ts main purpose is to ensure that in the event of a power surge, the e2cessive electricity which could damage the computer does not reach the computer. t is a device which ensures a clean supply of power is sent to the power supply of the computer at a given time. 9ius 6Au,7 A computer virus is a program that attaches itself to a file and reproduces to spread from one file to another. Therefore a virus is a rogue or malicious program that is able to make copies of itself, attach itself to a host 'file( in order to do damage. A virus can destroy data, display irritating messages and disrupt computer operations. /iruses have been known to erase interior hard disk 'disk crash(. They also can disrupt the operations of the operating system. =@ LESSON 18 9ius Dete)tio* So&t%ae 6A*ti+iusD 9ius S)a**es7 /irus Detection "oftware finds and eradicates viruses but is not totally reliable since new viruses emerge. f a new virus is detected, then the file is cleaned. f the repair for that virus is not available then it is moved to a quarantine folder so that it can be repaired once the virus scanning software is updated. &sers also have the option of deleting the infected file. /irus scanning software will only work if you use it. Rou can also make the software run automatically at regular intervals. E.amp'es o& 9ius Dete)tio* Po,ams 3 8apersky 3 7orton antivirus 3 -cafee 3 Doctor "olomons 3 7.D ,# 3 A/6 antivirus Rou should run virus detection programs periodically to check for any virus that have found their way into your computer. Antivirus scanners should be updated regularly to allow it to detect newer viruses. These updates can occur over the internet 'live update(. A? LESSON 11 The most common way that viruses will gain entry into your computer is through* 'i( 9loppy diskE &"4 disk 1 are used in different computers and there is a high probability that a virus would attach itself to a file on a disk. Always virus check a floppy disk before using it. 'ii( nternet 1 when you download files from the internet always virus check them as they would contain viruses. Downloading means copying a file from a larger computer to your computer. 'iii( 5mails 1 you also get viruses in your computer through emails therefore it is a wise decision to virus check your file before reading them. The worst viruses has spread through emails e.g. the +ovebug ' +ove Rou(, -elissa, $ode red, -y Doom etc. i. Wom A worm is a variant to the virus. This destructive program fills the computer with self replicating information, clogging the system so that its operations are slowed or stopped. ii. ToEa* <ose Po,am nstructions are written to destroy or modify software or data. A1 LESSON 1" 1T. ( OPERATINC SBSTEMS An operating system is a software that manages the overall operation of the computer system. t is a set of programs that instructs and controls the hardware features of the computer. The operating systems manage the resources. The main resource they manage is the computer hardware i.e. processors, storage, inputEoutput devices and communication devices. .perating systems are part of the system software. "ystem software consists of programs that* start up a computer load, e2ecute, store and retrieve application programs store and retrieve files, perform utility functions. %art of the system software that is available on the hard disk of the computer and sold separately on a $D30.- is called the operating system. The other part of the system software is found on the 0.- chips inside the systems unit. "ystem software and operating systems are available for both %$<s and large computers such as minicomputers and mainframe. n any case systems software perform essentially the same functions* booting or starting a computer interface with users and application software resource management. !hen a computer is turned on, the operating system is loaded into the main memory by a set of instructions contained in 0.-. This process is called booting or initial program loading. .nce the operating system is in the main memory the user can then communicate with it to load application programs or perform other functions. A# LESSON 1( COMMON OPERATINC SBSTEMS 9or end users, the most important operating systems are for microcomputers. There are a variety of operating systems and each one is designed specifically for the family of hardware with which it is used. To achieve computer competency it is important to know something about the principle types of operating systems that have been made available for microcomputers over the past years* 1. Disk .perating "ystem 'D."( #. -icrosoft !indows 'a( -" !indows @= 'b( -" !indows 7T 'c( -" !indows @C 'd( other !indows .perating "ystem ,. ."E# '.perating "ystemE#( :. Apple -acintosh =. &ni2 A, LESSON 1- 1. Dis= Opeati*, S$stem 6DOS7 D." was the standard operating system for many years after the introduction of microcomputers. t was widely used, ran thousands of applications and required ine2pensive hardware. ts original developer, the -icrosoft $ooperation, sells it under the name -" D." '-icrosoft Disk .perating "ystem(. t was also known as %$ D." '%ersonal $omputer Disk .perating "ystem( and used by the %$<s manufactured by the 4-. -" D." was the standard operating system for a long time, advertising themselves as 4- compatible software. There have been several upgrades since -" D." was introduced 1 from version 1.? to A.#. An important characteristic of new version was that they were backward compatible i.e. data and information from older versions of D." would have no problems opening in the newer version. The reason why D." was revised so much was to add more compatibility, to take advantage of sophisticated hardware, introduce better features and correct errors. -" D." had a prompting system 'command based interface, command based system( where the user is required to enter commands at the command prompt. A#+a*ta,es 'i( !idely &sed D." was the most popular microcomputer operating system at its time. At one time it was installed on almost C=S of all computer '4-( used. 'ii( 7umber of applications "ince D"." was the most widely used operating system, an enormous number of application programs had been written for D.". 'iii( 0uns on ine2pensive hardware D." runs on many computers, old and new. 'All 4- compatible computers support D."(. D." does not require too much memory or hard disk space since it is character based. Therefore computers do not need to have too much primary or secondary memory to run D.". Disa#+a*ta,es 'i( +imited %rimary storage 4efore an application program can be used it must be stored in the computers primary memory. An application program designed for D." has access to up to A:? kb of 0A-. t does not recognise or need any more memory. A: 'ii( "ingle tasking D." can support one user and one program at any given time. 'iii( $haracter based interface n D.", users issue commands by typing at a prompt or selecting items from a menu by using a keyboard. The user needs to know the commands in order to use D." 'master the language(. A= LESSON 1/ ". Mi)oso&t Wi*#o%s The first release of -icrosoft !indows was an operating environment while the newer releases of !indows called !indows @=, !indows 7T are powerful operating systems. 'a( MS Wi*#o%s &nlike !indows @= and 7T, !indows was not an operating system. t was a program that required D." in order to run !indows. Therefore, -icrosoft !indows was initially referred to as an operating environment. !indows e2panded the capability of D." by creating an easy to use operating environment. This environment required the use of mouse and icons '6&(. !indows is designed to run on 4- and compatible microprocessors. The initial release of !indows required a % processor or a ,CA. As newer microprocessors were designed, !indows was also upgraded and newer versions released to suit the capabilities of the microprocessors and accommodate new technology. A#+a*ta,es 'i( -ultitasking Allows a single user to run several programs at the same time on one computer, i.e., several applications are opened in 0A- by one microprocessor. 9or e2ample, multitasking allows a user to run -" !ord, -" 52cel and -" Access simultaneously 'at the same time(. 'ii( 6raphical &ser nterface '6&( Allows a user to move the mouse in order to move the pointer, position the pointer on a graphic symbol called icons and click the mouse button in order to e2ecute commands 'point and click environment(. 'iii( 7umber of applications Although more programs have been built for D." there are a large number of programs that were written for -icrosoft !indows after its introduction. 'iv(-ore memory !indows has a memory manager that allows it to access well beyond A:? kb of 0A-. 'v( "haring data between applications AA !indows can share data from one application to another application e.g. data typed in -icrosoft !ord and can be copied to -icrosoft 52cel and vice versa. Disa#+a*ta,es 'i( -inimum system configuration 0efers to the minimum hardware requirements needed for any computer to run a program 'operating system application software(. To effectively run !indows, a computer system needed to have at least a ,CA microprocessor, four times more memory than D." and a considerable amount of hard disk space. 'ii( &nrecoverable errors This is where application programs cannot proceed any further 'the computer hangs or Kfree;esL( and the users have to restart their computers. The user would then encounter the message Kunrecoverable application errorL on the screens. This means that any data not saved would be lost. "ometimes this activity would affect e2isting data and program files on the computer 'corrupted files(. AB LESSON 11 607 MS Wi*#o%s 5/ &nlike !indows, !indows @= does not require D." to run. A#+a*ta,es 'i( -ultiprocessing "imilar to multitasking e2cept that applications are run independently by different users and at the same time i.e. the $%& serves two different programs individually. The demands of one program do not affect the demand of the other. 'ii( 9le2ibility !indows @= does not require D." and is able to run with a much wider variety of powerful computers and microprocessors. 'iii( nternet Access !indows @= enables you to connect to the internet. n order to connect to the internet through an "% 'nternet "ervice %rovider( your computer must have T$%E% 'Transmission $ontrol %rotocolEnternet %rotocol( which is found on all computer and internet utilities. %rotocols are rules that allow computers to communicate with each other. 4rowsers are application programs which allows a user to gain access to different resources 'web pages, disk packs( n order to gain access to the nternet, you need to have appropriate protocol installed. Rou also need permission from your "%. .nce ready, you can use a browser to gain access to the nternet. 'iv(5asy upgrades K%lug and playL feature has greatly simplified the hardware installation process. f you need to upgrade your computer to include newer hardware devices, !indows would automatically detect your hardware upon booting and install or request the necessary driver files onto the hard disk. Drivers are software that enable a computer to recognise and use different hardware devices attached. All hardware devices have their driver files installed on their hard disk. Also if you want to upgrade your operating system to a newer version of !indows @= or !indows @C, all you need to do is to slot in the $D and !indows will take you through the installation process. Rou will need to respond to some questions and the software will install itself. AC Disa#+a*ta,es 'i( -inimum system configuration +ike !indows, !indows @= also have minimum system configuration. t has to be installed onto a computer system, it requires at least a :CA microprocessor or greater $%& speeds :-4 or greater of 0A-, #?? -4 or greater hard disk space. 'ii( 9ewer applications $ompared to D." and !indows few applications have been written specifically for !indows @=. -ost applications used by !indows @= have been upgrades of newer versions. A@ LESSON 13 6)7 MS Wi*#o%s NT s a very sophisticated and powerful operating system. t is not considered to be a replacement for !indows @= or !indows @C. rather it is an advanced alternative designed for very powerful microcomputers and networks. A#+a*ta,es 'i( -ulti3user !indows 7T allows more than one person 'multi3users( to use the same computer at the same time. Different users log onto the network using the same %$Eterminal. 'ii( 7etworking !indows 7T had networking capability and security checks built into the operating system. This made networking relatively easy. Disa#+a*ta,es 'i( -inimum system configuration !indows 7T required more memory and twice the hard disk space as !indows @=. 'ii( &pgrade support %lug and play is not supported. &pgrading and installation of hardware under !indows 7T can be more difficult compared to !indows @=. B? LESSON 14 6#7 MS Wi*#o%s 54 !as one of the newer operating systems from -icrosoft and an upgrade from !indows @=. windows @C was an advanced operating system designed for newer and powerful microcomputers. t had better interface and network capabilities than !indows @= but it lacked the security at networks compared to !indows 7T. A#+a*ta,es 'i( %erformance !indows @C is faster in any common tasks like loading and closing down applications. 'ii( nternet ntegration !indows @C is fully integrated with -icrosoft browser and nternet tools making access to nternet easier and faster. 'iii( 5ase of &se %lug and play capability is e2tended to support the newest advances in technology. -ultiple views of an application can be viewed on separate monitors simultaneously. 'iv(-ultimedia !indows @C has advanced video and audio capabilities. -ultimedia %$<s consists of a $D or a D/D 0.- sound card and speakers. !ith a tuner card you can watch television on a computer. Disa#+a*ta,es 'i( -inimum system configuration !indows @C requires at least a %entium processor. t also needs at least ,#-b of memory and more hard disk space is necessary. 'ii( 9ewer applications "ince !indows @C is a new operating system, fewer application programs have been written specifically for it. t can however run most D.", !indows and !indows @= and !indows 7T applications. B1 LESSON 15 6e7 Othe Wi*#o%s Opeati*, S$stem 'i( !indows for work groups This operating system was introduced before !indows @= and has similar features to -icrosoft !indows ,.=1. ts ma)or feature was that it introduced basic microcomputer networking. 'ii( !indows #??? 0eleased after !indows @C. t combined the capabilities of !indows 7T and !indows @C to one. 'iii( !indows -5 '-illenium 5dition( 'iv(!indows Home 5dition 'v( !indows J% t has got all the features available in any previous operating system. Another feature is that it relies more on nternet. t has quick and easy links to gain access to the nternet to look for assistance or download important files. ts interface is very user oriented and employs single clicks to perform common tasks. +ike !indows #??? !indows 2p is designed to easily work on a network. t has also got built3in security features. n addition, it is made to be a very user3friendly operating system. 'vi(!indows $5 'Hand held %$<s( 'vii( !indows /ista This is -icrosoft top of the range operating system. +ike !indows 2p, its designed to work efficiently on networks, provides increased security as well as providing an increased user3friendly interface. ts minimum system requirements are much greater. B# LESSON 38 (. OSF" 6Opeati*, S$stemF"7 t was originally developed by 4- and -icrosoft to work on all 4- range of computers. The most recent version is ."E# !arp. A#+a*ta,es 'i( -inimum system configuration ."E# requires nearly the same system configuration as !indows @C. $ompared to !indows 7T, however, ."E# requires one3third memory and less than half hard disk space. 'ii( /oice 0ecognition ."E# works as built3in voice recognition. /oice commands can be used to perform many basic operations such as opening, closing, and deleting files. Disa#+a*ta,es 'i( 7etworking $ompared to !indows 7T, neither ."E# nor !indows @C have the same level of network and security capabilities.
'ii( &pgrade support +ike !indows 7T, ."E# does not provide the same level of support for plug and play as !indows @C. Therefore upgrading or installation of new hardware can be more difficult. B, LESSON 31 -. App'e Ma)i*tosh The -acintosh only runs on the Apple family of computers. They offer a high quality of 6& and are therefore very easy to use. "ome recent version of -acintosh are "ystem C, -ac .", -ac .s J. -acintosh operating system are standard for Apple computers. -acintosh was the first operating system to offer 6&. A#+a*ta,es 'i( 5ase of use The graphical user interface has made the -acintosh popular with many new comers to computing. This is because it is easy to learn. n fact, studies shows that user training costs are half as much for -acintosh as for D." based computers. 'ii( -ultimedia -acintosh has established a high standard for graphics processing. This is the principle reason why the -acintosh is popular for desktop publishing. Additionally "ystem C includes special viewers program that support powerful three dimensional graphics. 'iii( 5asy upgrades +ike !indows @= and !indows @C, the -acintosh "ystem C supports plug and play. As mentioned earlier, -acintosh was the first operating system to support this concept. Disa#+a*ta,es -any characteristics that were previously considered as disadvantages may no longer prove to be so. 7ever the less let us consider these disadvantages as* 'i( A K4usinessL machineT Apple has had to struggle against the corporate perception i.e. its products are not for Kserious business usersL. $orporate buyers have had a history of purchasing from 4- and other vendors of large computers. -any have viewed Apple from the beginning as a producer of microcomputers for students, game players and hobbyists. This however has been changing. 'ii( -ultiprocessing &nlike !indow 7T and ."E# !arp, -acintosh "ystem C does not support multiprocessing. 'iii( $ompatibility difficulties B: $ompatibility difficulties of D." and !indows with -acintosh computer was a ma)or drawback for a long time. However, hardware and software are now available to allow Apple 4- computers to communicate with each other. B= LESSON 3" /. U*i. t was generally developed for minicomputers by ATUT and was popular for networking. t is now able to run on more powerful microcomputers. "ince &ni2 was designed to be a network operating system, an important consequence is that &ni2 has become popular with engineers 1 it has a scientific and technical orientation. &ni2 gained its popularity after being licensed out by ATUT to universities. &ni2 is a portable operating system, i.e., it can be used with different types of computer systems. There are different versions of &ni2 available. A#+a*ta,es &ni2 has the advantage of being a portable operating system. That means that it is used with 'Kis portableL( different types of computer systems. t is used with microcomputers, minicomputers, mainframes and supercomputers. The other operating systems are designed for microcomputers and are not nearly as portable. "ome advantages of &ni2 are* 'i( -ultitasking &ni2 enables you to do multitasking. t allows you to run several programs at the same time, each one sharing the $%&. 'ii( -ultiprocessing &ni2, like !indows 7T and ."E# !arp, is able to run several programs independently and at the same time. 'iii( 7etworking &ni2 is able to share files over electronic networks with several different kinds of equipment. Although the other operating systems can also do this, &ni2 systems have been successfully and reliable sharing networks for years. Disa#+a*ta,es &ni2 was a microcomputer operating system used by programmers and computer science professionals, some time before the rise of the microcomputers. This means it has certain qualities that make it useful to programmers 1 lots of supporting utility programs and documentation, for instance. 4ut some of these features make &ni2 difficult for end users. These are* 'i( +imited business application software This is a great barrier at the moment. There are many engineering application programs. 4usinesses that depend on off3the3shelf programs for microcomputer will find offerings very limited. BA 'ii( 7o &ni2 standard This may be the biggest stumbling block. There is no &ni2 standard. This means that an application written for one version of &ni2 may not run on another version. The principal microcomputer versions are ATUT<s &ni2 "ystem /, 4-<s AJ, 7ovell<s &ni2!are #, and the &niversity of $aliforniaE4erkeley<s :.# &ni2. An organi;ation called the JE.pen $o. is trying to create a standard. This organi;ation is a consortium of ma)or computer suppliers led by D5$, Hewlett3%ackard, 7ovell and "un"oft. 'iii( -ore difficult to learn &ni2 is a very powerful and comple2 operating system. ts commands are frequently long and comple2. 4ecause of this, many microcomputer user find &ni2 difficult to learn and use. BB LESSON 3( SUMMARB OF OPERATINC SBSTEMS OS AD9ANTACES DISAD9ANTACES D." !idely used 7umber of applications 0uns on ine2pensive hardware +imited primary storage "ingle tasking $haracter based interface !indows -ultitasking 6raphical &ser nterface '6&( 7umber of applications -ore memory "haring of data between applications. -inimum system configuration &nrecoverable errors !indows @= -ultiprocessing 9le2ibility nternet access 5asy upgrades -inimum system configuration 9ewer applications !indows 7T -ulti3user 7etworking -inimum system configuration &pgrade support !indows @C %erformance nternet integration 5ase of use -ultimedia -inimum system configuration 9ewer applications ."E# -inimum system configuration /oice recognition 7etworking &pgrade support Apple -acintosh 5ase of use -ultimedia 5asy upgrades A business machine -ultiprocessing $ompatibility difficulties &ni2 -ultitasking -ultiprocessing 7etworking +imited business application software 7o &ni2 standard -ore difficult to learn. BC LESSON 3- SIG AROAD CATECORIES OF DOS Aooti*, s when the computer loads the program files and the operating system into the main memory. The si2 main categories of D." 'operating system( are* 1. The 4ootstrap loader #. Diagnostic routine 'tests( ,. .perating "ystem 52ecutive :. 4." '4asic nput .utput "ystem( =. &tility programs A. 9ile maintenance 1. The 4ootstrap loader s a program that is stored permanently in 0.- and is used to read the main portion of the operating system from the secondary storage and load it into memory '0A-( when the computer is switched on. This process of loading the operating system from the secondary storage 'hard disk, $D, floppy( to the memory is commonly known as booting. #. Diagnostic routine 'tests( Are programs stored in 0.-. These test start3up when you switch on the computer. They are used to test the operations of the systems components, for e2ample, the condition of the disk drive, main memory 'memory count(, $%&, keyboard and other parts of a computer. The purpose of this test is to make sure that the computer and all tis components 'basic operating hardware( are working properly. f it finds any problems, diagnostic tests will use series of beeps to inform the user. B@ LESSON 3/ ,. .perating "ystem 52ecutive s the collection of program that help the computer to manage its resources. The operating system e2ecutive takes care of internal matters. t controls the activities of the system including e2ecuting programs and assigning tasks to different hardware devices. t also interprets the commands you give to run programs and also enables you to interact with programs when they are running. t also manages memory, data and files. :. 4." '4asic nput .utput "ystem( 4." control the basic input and output functions of the computer. 4." programs are kept in 0.- on a special chip called 4." chip. 4." enables the computer to interpret keyboard characters and transmit them to output devices or secondary storage i.e. these programs enables a computer to interpret keyboard strokes, mouse clicks or any other outputs and transmits the characters to the monitor, printer or any other output devices. Therefore 4." reads data from input devices and displays it on output devices. t also displays the data that is transferred from the secondary storage to the screen. =. &tility programs These programs perform common housekeeping and repetitive tasks, for e2ample, formatting a disk, displaying disk contents, determining disk space, copying and deleting files and programs, naming and renaming files etc. A. 9ile maintenance These programs provide service routines needed to maintain files in secondary storage. t basically allows programs to create, read and write files. C? LESSON 31 AOOTINC T<E COMPUTER !henever you start up a computer, whether to use word processor or to play a game, you will need to switch on 'if it is off(. 4y turning on a computer you begin a process which will load the operating system into the computers main memory 'its workplace(. The process of having the operating system loaded into the main memory from the secondary storage is called booting the system. There are two ways to boot a computer* 1. $old 4oot "witching on a computer that is currently in an off state by pressing the power button. #. !arm 4oot !arm boot is when the computer is started, while computer is still switched on. This process is called reboot. A warm boot can be done by pressing the reset button, using the restart command or pressing $trl Alt Del button together. t is oftern used when the computer stops responding 1 KhangsL or Kfree;esL. 4ooting the system means turning on the computer so that diagnostics are performed and the main portion of the operating system are loaded into the memory from secondary storage. .nce the operating system is loaded into the main memory, it is divided into , sections* C1 LESSON 33 'i( "upervisor program $ontains instructions which communicate with the user to cause inputEoutput operations to occur and generally controls the operations of a computer.
'ii( 0esident program 1 internal file management The resident program portion of the operating system contains programs for frequently used utility functions. These programs are loaded from the 0.- and made resident during 0A- booting. They are always available in the 0A- while the computer is switched on, for e2ample, when a file is copied from one disk to another by a utility program, the copy program that has been used had been loaded into the memory to be part of the operating system during booting. 'iii( Transient program 1 e2ternal disk management The transient portion of the memory is reserved for the instructions which performs frequently required operation such as formatting a disk. !hen a user requires one of the functions to be performed these instructions are loaded into the transient area from the secondary storage and e2ecuted. !hen another command is to be e2ecuted the required program is loaded into the transient area to overlay previous instructions. Thus these instructions are said to be transient because they move into the area of 0A- especially reserved for them in order to perform their function. After being e2ecuted the command remains in the transient area of 0A-. !hen a new command is e2ecuted it overlays and replaces the previous commands in 0A-. C# LESSON 34 Di&&ee*)e 0et%ee* Resi#e*t po,am a*# Ta*sie*t Po,am A resident program is one that resides in 0.- and a transient program is one that has to be loaded from the secondary storage. The resident programs are loaded and made resident in 0A- 'a portion of 0A-( is reserved by the operating system e2ecutive when the computer is booting up. Transient programs on the other hand are not loaded into the 0A-. During booting the operating system e2ecutive simply reserves space in 0A-. 5very time the transient command is e2e:cuted from the secondary storage, the old program 'if any( in the transient memory is overlayed by the new command being used. nitially the transient memory is empty. I*te*a' a*# E.te*a' DOS )omma*#s n D." there are internal commands which relates to resident programs because they are resident in 0.- and have to be loaded into the computer memory when the computer is booting up. There are also e2ternal D." commands which relate to transient programs because they are kept in the secondary storage with the operating system and only loaded into the 0A- every time they are used. nternal and e2ternal commands are processed and e2ecuted by a file 'program called command.com(. The command.com file is an operating system file that is loaded into the memory during booting. ts function is to process and e2ecute all the instructions issued by the user. 9or this reason it is also known as the command processor or the command interpreter. The entire operating system cannot be kept in 0.- because of limited space. t also cannot be kept in 0A- when the computer is running for the same reason. That is why the operating system is installed to the secondary storage. "o when the computer is booted only the main portion of the operating system is loaded into the 0A-. The remainder of the operating system stays in the secondary storage. 5very time e2ternal commands are e2ecuted by the user, they are fetched from the secondary storage and e2ecuted in 0A-. C, LESSON 35 I*te*a' Comma*#s nternal commands are processed by a file called command.com. The command.com file holds all the internal commands. t is loaded into the 0A- and made resident during booting. Rou cannot see the internal command because they are hidden or embedded in the command processor. 52amples of internal commands are* $+" 1 clears the screen D0 1 displays the contents of the directoryEfolder $.%R 1 copies filesEdirectoriesEfolders D5+ 1 deletes files DAT5 1 shows date T-5 1 shows time TR%5 1 displays contents of a file E.te*a' Comma*#s These commands are not resident in memory. They are found on the disk in which the operating system is stored. 9iles with e2tension .com, 'e2cept command.com(, .e2e, .bat are considered to be e2ternal commands. "ome e2amples of e2ternal commands are* 9ormat $H8D"8 ATT04 Diskcopy 4ackkey deskey 0estore C: period C , LESSON 48 DOS Fi'e*ames a*# E.te*sio*s A file is a collection of te2t, data or instructions that are treated and kept as single unit by the computer. Dust as each folder in a file cabinet has a label, each file on the disk should also have a name. files are stored in directories. A directory must also have a nameF a root directory is the only e2ception. A filename has two main parts 1 a filename and an e2tension. The filename and e2tension are separated by a dot 'period(. A filename can be C characters in length. The e2tension on the other hand can only be , characters long. 52tensions are option but they are considered to be useful tools to describe the contents of a file to you and the operating system. Directories on the other hand do not need an e2tension but their names can only be C characters long. 9ilename.e2tension
C= LESSON 41 Nami*, Fi'es a*# Die)toies 9ilenames are not case3sensitive. t does not matter if you type in upper case or lower case. They can only use alphabets, numbers from ? 1 @ and some special characters. D." filenames do not contain any spaces. They can only use the following special characters* 1. V 3 caret #. W 3 tilde ,. X 3 e2clamation :. S 3 percent =. U 3 ampersand A. Y 3 hash B. Z [ 3 brackets C. \ 3 at symbol @. 1 3 hyphen 'dash( 1?. ] 3 single quote 11. < 3 apostrophe 9ilenames cannot hold the following special characters* 1. 3 space #. , 3 comma ,. ^ 3 backslashEbackswitch :. . 3 fullstopEperiod T$pes o& Fi'es 9iles can be classified as in different kinds of files* 1. 0ead3!rite 9iles s a file that can be read from and written to. #. Hidden 9iles Are files that are not displayed in directories. These are usually operating system files that do not concern the user. ,. 0ead3.nly 9iles These files can only be read from but not written to. LESSON 4" CA Commo* Fi'e E.te*sio*s 52tensions are optional but it is a good idea to use them since they are useful for describing the contents of a file to a user. 9or e2ample +A41.doc indicates that this is a document file that has been saved in -" !ord, +A41.2ls indicates the worksheet file has been saved in -" 52cel. The following are commonly used for e2tension filenames* 1. .e2e 'e2ecutable( #. .com 'command( ,. .bat 'batch( These e2tensions are used for files which e2ecutes files '.e2e(, contains application data '.com( or instructions of paths to files '.bat(. if you type a filename containing one of these e2tensions at the command prompt in D." they will* A. e2ecute programs '.e2e( 4. run the programs held in the file '.com( $. carry out the instructions in the file '.bat( .ther e2amples of commonly used file e2tensions are* 1. .t2t 3 te2t have no formatting #. .sys 3 system files for booting ,. .doc 3 document files 'word processor( :. .pas 3 pascal files 'programming( =. .bas 3 4A"$ '_basic programming( A. .2ls 3 spreadsheet B. .mdb 3 database C. .;ip 3 compressed file e.g. win;ip @. ppt 3 powerpoint presentation files 1?. .gif 3 graphic interchange format 'picture file( 11. .)pg 3 1#. .mpg 3 motion picture group 'video( 1,. .wma 3 !indows -edia Audio 'audio file( 1:. .wmf 3 !indows -edia 9ormat 'audio( 1=. .rar 3 compressed file 'win rar( 1A. .dat 3 data file 1B. .mp, 3 mpeg, audio 1C. .cda 3 compact disk audio 1@. .htm 3 html format 'internet( #?. .vob 3 video files #1. .pdf 3 %ortable document format 'Adobe 0eader files( LESSON 4( Opeati*, s$tems #e+i)es: CB 1. %07 3 printer #. "$07 3 screen ,. $.7 3 console 'keyboard( :. $.- 3 communication port Some 0asi) tas= a)hie+e 0$ opeati*, s$stems ae: 1. %rovides files sharing, data locking and file security 'password firewall( #. Disk formatting ,. %rovides a range of communications 1 connect to a +ocal Area 7etwork '+A7( and the internet. :. Database management =. 6ives peripheral access A. nput, output management B. DirectoriesEfolders and files 1 manage location of information 'files( on disk. C. $ontrols programs flow. @. %rovide network with programs. 1?. $heck errors that occur when reading from and writing to a disk. E.p'ai* %hat the opeati*, s$stem #oes %he* the app'i)atio* po,am is u*: !hen a command is given to the application program to be loaded, the operating system finds the program and transfers it to 0A-. t then releases control to the application program and waits for further instructions. CC LESSON 4- Stat:up Fi'es There are a few important files that D." looks for and needs to start3up or boot a computer. 9irstly there are , system files, two of which are hidden and which must be in the route directory in the boot disk. Aoot #is= refers to the disk that holds the operating system 'start3up files(. These files are* 1. -"D.".sys '-icrosoft Disk .perating "ystem( #. ..sys 'nputE.utput( ,. command.com 1. -"D.".sys
$ontrols files management routines, screen, graphics, printers etc #. ..sys nterfaces between D." and 0.-34." services ,. command.com Accepts, interprets and e2ecutes internal and e2ternal programs. t also displays the command prompt. These files are essential and must be present to boot the computer. f one or more is missing then the computer will not boot up. Apart from these , files, D." 'operating system( requires two other files to assist in the start up process. The user can use and edit these files in order to customise his work environment. C@ LESSON 4/ These two files are* 1. Autoe2ec.bat 'auto e2ecute configurations( #. config.sys These batch files and system files are located in the root directory of your start3up disk. 5ach time your start up your computer system D." carries out the commands in the A&T.5J5$.bat file. Rou run the A&T.5J5$.bat file without restarting the computer by typing A&T.5J5$.bat at the command prompt. $*^IA&T.5J5$.bat A typical A&T.5J5$.bat file may look as follows @echo off prompt$P$G PathC:\DOS, C:\windows,..\winword, C:\ quickmenu.qm 1. A&T.5J5$.bat files The A&T.5J5$.bat files contains paths to application sand programs that you need to be e2ecuted automatically and loaded into 0A- when the computer is booting up. #. $.796.sys -"D.".sys carries out a group of commands that loads device drivers and reserves space in the systems memory for information processing. The program that contains these commands is the config.sys files. +ike the autoe2ec.bat file, the config.sys file is loaded during setup when the operating system is being installed, and e2ists in the root directory of a computer. t is automatically updated whenever a new hardware device is added. A typical config.sys file looks like this* Device G $^D."^setver.e2e Device G $^D."^Himem.sys 9ile G ,? "tacks G @#=A Device G $^D."^mouse.sys @? LESSON 41 S$stem Pompt The $ drive 'c(, A drive 'A*(, D drive 'A*( or the 5 drive '5*( is referred to as the system prompt or the command prompt. 4y default the command prompt refers to the $* drive 'hard disk(. This is because the system is prompting to the user the disk which is currently in use 'boot disk(. !hen a system prompt is shown, D." is at what is often called command level, because it is waiting for a command to be entered by the user. The system prompt identifies two things* 1. The current drive D." is looking at. The $* prompt '$*^( tells you that D." is current looking at the hardisk. n case of a floppy disk it would be the A* prompt 'A*^I(. 4ut it is always called the system prompt. #. The current directory of the current path, for e2ample, $*^ prograW^-" !ordI. The current drive is the $* drive, the current directory is %rogram files and the current sub directory is -" !ord. 4y default when you boot your computer your current directory becomes the directory in which your operating system is stored $*^!indowI or $*^D."I. @1 LESSON 43 Die)toies 6)a''e# &o'#es i* Wi*#o%s7 %art of a structure for organising files on a disk is called directory. A directory can contain files and sub directories. These sub directories in turn contain other sub directories and files. All directories have a root directory that is created when the disk is formatted for use by the operating system. f you do not create directories, files will be unorganised, making it difficult to quickly locate a file. Therefore, directories are essential to the organisation of a disk, especially the hard disk. However it is becoming increasingly important to organise data on floppy disks and optical disks using directories because of disk space. Directories are like file folders in which you store files which have something in common. "ome directories are further divisions within the directory. The operating system lets you format a disk and create directories and sub directories. 4oth directories and sub directories are used to store files and other subdirectories. +ike filenames, each directory must be assigned a unique name. The same rules that apply to filenames also apply to directories. However directories do no have e2tensions. Two directories cannot have the same name. Two subdirectories within a directory or a sub directory also cannot have the same name. directories and sub directory names can only have C characters. @# subdirectories subdirectories 0oot directory Directories 5nglish.doc LESSON 44 The Die)to$ Tee The structure of directories, subdirectories and files is called a directory structure or a directory tree. A directory structure resembles a filing cabinet and is only used to organise your files. They can only have C character long names e2cept for filenames. files The organisation of directories, subdirectories and files are represented using directory tree. All directories branch out from main or root directory. "ub directories branch out within directories. 9urther sub directories branch out form sub directories. 9iles can be stored in the root directory, directory or sub directory. n any case, each file must have a unique filename. f you give a new file the same name as a file already e2isting in the same directory, the contents of the original file will be replaced by the new file. 7ewer D." versions have the ability to safeguard the accidental overwriting of files. $* -" .99$5 !7D.!" -" !.0D -" 5J$5+ H.-5!.08 -yfile.doc @, LESSON 45 Root Die)to$ 5very disk has at least 1 directory. !hen you format a disk, D." creates a root directory where other directories, sub directories and files would be stored. n your root directory you can use directories to organise your work. Rou can also create directories within the directories. To even further organise your work you can create more sub directories within the sub directories. All directories and subdirectories contain files. Path Names The root directory of a disk leads to other directories, subdirectories and files. "ometimes programs require that you spell out the path name so that hey know the e2act location of the file that you are referring to. A path name follows the following sequence* @: %+A7.e2e 0..T D05$T.0R 0..T D05$T.0R D05$T.0R D05$T.0R D 05$T.0R D 05$T.0R D05$T.0^R D05$T.0^R -".99$5 -".99$5 "&4D05$T.0R "&4D05$T.0R "&4D05$T.0R "&4D05$T.0R -"!.0D -"!.0D "&4D05$T.0R "&4D05$T.0R D.$&-57T" D.$&-57T" "&4D05$T.0R "&4D05$T.0R 9+5" 9+5.e2t !.08.2ls 9+5.e2t !7.e2e LESSON 58 52ample Drive*^Directory^"ubdirectory^9ile.e2t $*^-" .ffice^-" !ord^!inword.e2e A*^wonder^game.e2e D*^setup.e2e Fomatti*, a Dis= 4efore a new disk can be used it must be formatted 'initialised( or converted into a state so that it can be used by the computer. "ome disks are shipped from the manufacturer in a blank format 'unformatted( so that they can be used by a wide variety of computer families< i.e. 4- and Apple computers. These unformatted disk are referred to as soft sectored disk. 7owadays many disks are available in 4-ED." formats. 9ormatting prepares a new disk to accept D." '."( information and files. t sets up and labels tracks 'concentric circles( and sectors 'divisions of tracks( to accept information and store data on the disk. t also checks the tracks for any bad sectors that cannot be used to store information and marks that area so that it cannot be used. 9ormatting also sets up the area of disk where directories and files would be maintained 1 kept track of 1 using the file allocation table '9AT(. The first sector also contains boot sector. Any disk old or new can be formatted. However if you format a used disk all the directories, subdirectories and files would be erased. @= $* D05$T.0R -".99$5 "&4D05$T.0R -"!.0D !7!.0D.e2e LESSON 51 U*#esta*#i*, Die)toies 1. $reating Directories 1 -D 'make directory( To create a directory or subdirectory on a disk at any level 1 root directory, directory or subdirectory 1 the -D command is used. -D is an internal D." command. 52ample $*^I-D white $*^I-D black $*^I-D 0ed @A $* !HT5 4+A$8 05D LESSON 5" #. $hanging Directories 1 $D 'change directory( 5ven though you have created , directories, you are still in the root directory. The directory or subdirectory that you are currently present in is always called the current directory. 4y default when you first access a disk you start in a root directory which becomes your current directory. The windows command prompt is as follows* c*^windows. Therefore by default the current directory is windows. To change from a root directory to another directory or from the directory to the subdirectory we use the internal command $D. 52ample $*^I$D white $*^whiteI @B $* !HT5 4+A$8 05D LESSON 5( ,. $reating "ubdirectories 1 -D 'make directory( !hen creating subdirectories the current directory must always be a directory under the root directory in which a new subdirectory has to be created. t can also be a subdirectory in which another subdirectory is needed. The -D command will again be used to create subdirectories. 52ample $*^IwhiteI-D 6reen $*^IwhiteI-D .range $*^IwhiteI$D 6reen $*^IwhiteI-D 6reen $*^Iwhite^6reenI :. -oving back in directories To move back one level to the previous directory or subdirectory we need the $D.. command. n order to move right back to the root directory we keep on issuing the $D.. command until the current directory is the root directory. %resently your current directory is 6reen. To move back to the previous directory called white, we have to use the $D.. command. This will make white your current directory. ssuing the $D.. command will make the root directory your current directory. $*^Iwhite^6reenI$D.. $*^IwhiteI$D.. $*^I $D^ @C $* !HT5 4+A$8 05D 6reen .range To return from any level of directories or subdirectories from anywhere within the directory structure straight to the root directory, the $D^ is used. $*^white^6reenI$D^ $*^I @@ LESSON 5- =. -oving a directory or subdirectory 1 -./5 To move a directory and subdirectory we need to use a move command. n order to use the move command, you should be one level above the directory or subdirectory to be moved. 9or e2ample move the contents of the sub directory orange to pink. $*^I$D white $*^IwhiteImove orange pink $*^whiteI 1?? $* !HT5 4+A$8 05D 6reen .range -ove $* !HT5 4+A$8 05D 6reen %ink LESSON 5/ A. 0emoving a directory or subdirectory 1 0D 'remove directory( To remove a directory or subdirectory the 0D command is used. n order for a directory or subdirectory to be deleted there should not be any subordinate directories or subdirectories. f there are subordinate subdirectories then first you will have to remove the subdirectories before you can proceed with the deletion of the intended directory and subdirectories. 0emoval of directories and subdirectories can be made only from 1 level above it. The root directory cannot be removed. 52ample $*^whiteI0D %ink $*^whiteI 4ecomes* 1?1 $* !HT5 4+A$8 05D 6reen %ink $* !HT5 4+A$8 05D 6reen LESSON 51 B. 0ename a directory 1 057A-5 To rename a directory or a subdirectory the rename command is used. Rou need to be one level above the directory or subdirectory to rename it. 0enaming only changes the name of the directory or subdirectory. t does not transfer the file to a new location. HpromptI Hold nameI Hnew nameI $*^whiteIrename 6reen yellow $*^whiteI 1?# $* !HT5 4+A$8 05D LESSON 53 DOS Comma*#s Wi'# )a#s Are symbols used to represent characters in a file. "ome e2amples of wildcards are* 1. Asterisk 'O( 0epresents 1 or more characters that a group of files have in common. #. _uestion mark 'T( 0epresents a single character that a group of files have in common. I*te*a' Comma*#s 1. 'a( D0 'Directory( This command displays the directories, subdirectories and filenames within any directory or subdirectory. The disadvantage of this command is that the contents of the directory are one screen load. That is, all the contents will be scrolled up and only the last portion of the directory listing would be shown. HpromptI dir 52ample* c*^I dir c*^!indowsIdir This command would display the date the file was created, the time the file was created, whether a directory or a file si displayed, the si;e of the file and the file or directory name in columns. leave & lines to write an eample from the computer. 1?, LESSON 54 'b( D0E% 'DirectoryE%ause( Displays files and directories screen load by screen load. This command pauses after displaying its contents at each screen load while giving the directory listing. To view the ne2t screen load of directory listing the user has to press a key. This command displays the directory listing in the e2act same manner as the D0 command 'using columns( but pauses after each screen load of listing. HpromptI D0^% 52ample* c*^ID0^% c*^!indowsID0^% 'c( D0E! 'DirectoryE!ide( Displays all the directories and files that e2ist within the current directory in columns. This command is used if the user needs to view only the names of directories and subdirectories and filenames but not any other information. This information is displayed in columns. -ore files and directories are displayed this way. The drawback of this command is that if there are more files and directory names then what can fit on a screen then the upper portion of the directory listings will not be shown., HpromptI D0^! 52ample* c*^ID0^! c*^!indowsID0^! leave & lines to write an eample from the computer. 'd( D0E!E% or D0E%E! These commands are used to display the files and directory names if the contents of a directory or a subdirectory do not fit on the screen by using the D0^! or D0^%. HpromptI D0^!^% 52ample* c*^ID0^!^% c*^!indowsID0^!^% 1?: LESSON 55 &sing !ildcards !ildcards are used to display directories or filenames that have one or more alphabets, numbers or symbols common. 'i( $*^ID0 O.O Displays all files and directories and their e2tensions in a directory or subdirectory. "ame as the D0 command. 'ii( $*^windowsID0 "O.O Displays all files and directories starting with the letter s where the remainder of the name can be made up of any alphabet, symbol or numeral and any e2tension. leave & lines to write an eample from the computer. 'iii( $*^windowsID0 "O.dat Displays all files and directories starting with the alphabet s where the remainder of the filename can be made up of any alphabet, numeral or symbol and the e2tension should be .dat. leave & lines to write an eample from the computer. 'iv($*^windowsITTT.O Displays all the files, directories and subdirectories with only , characters for filename and any e2tension. leave & lines to write an eample from the computer. 'v( $*^windowsIsTTT.dat Displays all files and directories starting with the letter s and the remaining , letters of the filename being number, symbols or any special characters and the e2tension is .dat. All together there are : characters in the filename. leave & lines to write an eample from the computer. 1?= LESSON 188 #. $opy This command is used to copy files from one location to another. HpromptI copyHsourceIHdestinationI 52ample* c*^I copy $.796.sys A* c*^I $opies the file called $.796.sys from the root directory to the A*^'drive(. 52ample* $*^!indowsIcopy pbrush.e2e A*^%rints $opies a file called pbrush.e2e from the !indow directory in the c*^ to a directory called %rints in the A*^. 52ample* $*^IcopyA*^letter.docA* $opies a file called letter.doc from the A*^'drive( to the $*^'drive( 52ample* $+^Icopy sO.e2e A* $opies all files starting with the alphabet s and the e2tension .e2e to the A*^. 1?A LESSON 181 ,. 0enaming files HpromptI renameHoldfilename.e2tensionIHnewfilename.e2tensionI 52ample* $*^I rename pro)ect.doc homework.doc 0enames a file called pro)ect.doc in the $*^ to homework.doc. 52ample* $*^I rename A*^ midyear.doc e2am.doc 0enames a file in the A*^ called midyear.doc to e2am.doc. :. Deleting files The delete command deletes a file or a group of files. HpromptI D5+Hfilename.e2tensionI 52ample* $*^D5+ te2t.doc Deletes a file called Te2t.doc from the $*^ 52ample* $*^D5+ pO.t2t Deletes all files starting with the letter p and with e2tension .t2t in the $*^ =. 9ormat $*^I9.0-AT A* This command formats the contents of the destination drive. Rou cannot format a drive within itself. Rou have to be in another drive to do so. 1?B LESSON 18" A. "can disk $*^Iscandisk .r A*^Iscandisk This utility deletes, diagnoses and repairs disk errors. "can disk can repair file system errors 'such as cross links and lost clusters( in addition to physical drive errors. B. Diskcopy $*^Idiskcopy .r A*^Idiskcopy $opies the entire contents of a floppy disk onto another floppy disk. The diskcopy command overwrites the e2isting contents of the destination disk as it copies the contents from the source disk. !hen using the diskcopy command you will be first asked to insert the floppy disk into the floppy drive. The computer will then copy the content of the source floppy into its memory. Rou will then be asked to remove the source disk and insert the destination disk. The computer will then write the contents of the source disk from its memory to the destination disk. C. Defrag 'defragment( $*^Idefrag .r A*^Idefrag A program that reorganises the contents of the disk to minimi;e the time it takes to access these programs and files. This command is used to optimise disk performance. @. +abel $*^Ilabel .r 1?C A*^Ilabel This command allows you to assign volume label to the current drive. A volume label is used to name and identify the disk currently in use. 1?@ LESSON 18( 1?. 4ackup HdriveI4ackupHsourceIHdestinationI 52ample* $*^I4A$8&% $*^pro)ect^computer.doc A* 4acking up your files safeguards them against the loss of data, if your hard disk fails or you accidently overwrite or delete data. using backup you can return to older file versions, move backup files around the hard disk and transfer data from one computer to another. After you have backed up you will need to use the file again. n order to do this, you use the restore command. HdriveI05"T.05HsourceIHdestinationI 52ample* $*^I05"T.05 A*^computer.doc $* 11. &ndelete 5nables you to recover previously deleted files. Does not work with all versions of D.". HdriveI&7D5+5T5HpathI 52ample* $*^I&7D5+5T5 timebook.doc* 1#. &nformat 0ecovers information that might have been formatted. $*^I&79.0-AT A*^ .r A*^I&79.0-AT $*^ 1,. /50 '/ersion( This command displays the version of D." used by the current drive. $*^ver 1:. Time 11? This command displays the system time. $*^IT-5 1=. Date This command can display and change the system date. "ome computers have the date format as --EDDERR 'American "ystem(. $*^I DAT5 111 LESSON 18- IT. - APPLICATION SOFTWARE "oftware is another name for program. Therefore, software and programs are interchangeable words. %rograms are instructions that tell the computer how to process data into the form you want. App'i)atio* so&t%ae refers to programs which are written for specific and general task which are not related to the computer system itself. There are two kinds of software* 1#. "ystem software 1,. Application software 1. S$stem so&t%a e 5nables application software to interact with the computer system. "ystem software is sometimes called background software. This is because the operation of the software is not visible to the user. t includes programs that help a computer manage its own internal resources 'also booting programs(. The most important part of the system software is the operating system which actually interacts with the application software and computer and manages the overall operations of the computer system software. ". App'i)atio* so&t%ae t is described as end3user software. These programs are written for specific and general tasks which are not related to the computer system itself. Application software can be thought of programs that the user interacts with. Application software can be bought of the shelf at computer stores, ordered from overseas or even developed by programmers. 11# LESSON 18/ There are two categories of application software* 'i( "pecial purpose programs 'ii( 6eneral purpose programs 6i7 Spe)ia' pupose po,ams Are dedicated to performing specific tasks such as payroll, accounting, inventory, calculation, stock analysis, games, etc. "ome categories of special purpose software are as follows* 'a( -anagement software ncludes pro)ect management decision 1 modelling and statistical analysis programs. 4asically these programs are used by administration and management to analyse data with which to form decisions. 'b( Accounting programs 0anges from personal finance systems '_uicken, _uickbook %ro, -R.4 etc( and income ta2 programs to comple2 accounting systems 'sunsystem, A$ %ac, %latinum etc(. nventory systems and payroll systems are also part of accounting programs. 'c( 5ntertainment programs $onsists primarily of computer games and movies. 'd( 5ducational programs This category includes computer aided instructions and computer based training. "pecial purpose software packages have been developed in response of scientific needs of individuals, professionals, businesses and end3users. "pecial purpose programs contains built3in problem solving features specially designed for particular tasks. 11, LESSON 181 6ii7 Ce*ea' pupose po,ams Are used for a variety of tasks, for e2ample, word processing, spreadsheet, calculations, database, graphics and presentation and communication programs. A user defines a problem and process and uses a general purpose program to assist in preparing a solution. 'a( !ord %rocessor 'Document processing tool( A word processor is a program which is used to prepare a document electronically. t allows you to enter te2t using a keyboard, edit the te2t, save it and print it. Therefore the basic steps for a word processor are* iii. $onceive iv. !rite v. 5dit vi. "ave vii. %rint The key advantage of a word processor is the users ability to make changes e.g. formatting, spell check, etc. in word processing you can retrieve a sav ed document and make changes to it. 52amples of word processing software are* -icrosoft !ord $orel !ord %erfect !ord "tar -ulti-ate +otus !ord %ro -icrosoft !orks !ord %rocessor 'b( "preadsheets s a programs that acts like an electronic worksheet. t allows you to organise numeric data in a worksheet or table format. t enables users to manipulate numbers and te2t in rows and columns and perform calculations on them using formulas and functions. The very first spreadsheet was called /isi$alc. Data in an electronic worksheet is organised in hori;ontal rows and vertical columns. The intersection of a row and column is called cells. These cells may contain , types of data* i. +abels Are used to identify data in a spreadsheet and may contain numbers and alphabets. ii. /alues 11: Are represented using numbers of different types e.g. currency, percentage, numeric etc. iii. 9ormulas andEor functions 9ormulas are used to automatically calculate the results of the contents of several cells which may hold values and other formulas and functions. 9ormulas are designed by the user. 9unctions are pre3designed commonly used formulas to assist in calculation. To use functions you simply select the range of cells and chose the function. The calculation will be done automatically. The reason why formulas and functions are used is that if one of the values in the range of cells reference by the formulas or function are changed, the result would also automatically change. 0ecalculation is automatic. A range of cells are a collection of two or more ad)acent or isolated cells. 52amples of spreadsheet software are* -icrosoft 52cel +otus 13#3, $orel _uattro %ro "ymphony -icrosoft !orks "preadsheet 11= LESSON 183 'c( Database A database is a program that is used for computeri;ed record keeping. t allows you to create electronic files in the computer, retrieve and manipulate and update the data that is stored in files. The data in a file is called records. The database provides a place to store information and a way to organise that information so that it can be accessed and utilised in an orderly manner. Databases can be used to store records relating to inventory, mailing lists, personal address books, student records, employee records etc. the program used to create, update and maintain databases is called a database management system 'D4-"(. 52amples of database software are* -icrosoft Access +otus %arado2 Dbase / 'D."( 0base 'D."( 0efle2 .racle '+arge D4-"( 'd( 6raphics and presentation programs This category includes drawing software, for e2ample, -" %aint, $omputer Aided Design '$AD(, analytical graphics and presentation programs. 6raphic and presentation programs used to manipulate or enhance images and create presentation and publications that would appeal to its viewers. 52amples of drawingEgraphic programs are* Adobe 9reehand /isio -icrosoft %aint Auto $AD Adobe %hotoshop -" %ublisher %rint shop 52amples of presentation programs are* -" %ower%oint $orel %resentations 11A LESSON 184 'e( $ommunication programs Allows you to link your personal computer and communicate with other computers over the nternet. n order to connect to a nternet you need to have a special software called browser. t enables you to gain access to different computers and use their resources. Apart from communicating with computers on the nternet, you can also send emails 'electronic mails(. 5mails use special software to send messages to recipients who can respond to your electronic messages by using their own communication software. Rou can also send emails by connecting to the nternet and using email services offered by online service providers. 52amples of browsers are* -icrosoft nternet 52plorer 7etscape 7avigator -o;illar 9ire 9o2 52amples of 5mail programs* -icrosoft .utlook 7etscape $ommunicator 'f( ntegrated "oftware s a collection of programs where two or more application software 'general purpose( are combined to form a package. ntegrated software are also called integrated packages or bundled software, for e2ample, the -icrosoft .ffice "uite and $orel .ffice "uite are integrated packages which provide a word processor, spreadsheet program, a database program, and a communication program to the user as a package. An integrated package usually consists of general purpose programs that share a common interface. As a matter of fact, most general purpose programs developed by a publisher will share a common interface. Rou can switch from one program to another with ease. Data can be freely and easily shared between all applications in an integrated software. 52amples of integrated software are* -icrosoft .ffice $orel .ffice "uite -icrosoft !orks .pen.ffice.org LESSON 185 -ost applications have features that are common to other applications sold by the same publisher. -ost end3user programs are designed with similar features. 11B "ome features that are present in all applications in an integrated package are as follows* Featues Des)iptio* 1. /ersion and 0elease ndicates ma)or and minor changes in software. 52ample -" !ord B.?, -" !indows =.?11 etc. The number before the dot represents the version and the number after the dot represents the release. 5very time a minor change is made the release number is changed and every time a ma)or change is made the version changes. #. nsertion %oint 'cursor( "hows the location where the data can be entered. ,. -enu 4ar %resents all commands available for selection in a program. :. Tool 4ar A collection of icons which gives shortcut access to most frequently used commands which are offered by the menu bar. cons represent frequently used command and are placed on a bar for easy access. =. "hort3cut keys Are special combinations of key for commonly used tasks. 52ample $T0+ P c G $opy, $T0+ P 2 G $ut, $T0+ P v G %aste, "hift or G highlight te2t, $T0+ P Home G Top of document etc. A. !R"!R6 !hat Rou "ee s !hat Rou 6et. This feature enables you to find the output as you work on a program. !hatever content is displayed in the screen is e2actly how they would be printed out. B. Help To assist a user when he encounters a problem or needs to learn a new method. C. Dialogue 4o2es Displays a set of options available for a certain task. "ometimes used to accept additional data. @. %ull down -enus 'drop down -enus( This feature is available only from the menu bar. !hen you click on one of the menu bar buttons, a pull down 'drop down( menu will appear showing you the different commands available. 1?. "croll 4ar "ometimes you are not able to view the entire document on one screen. The vertical and hori;ontal scroll bars enable a user to scroll and view different parts of a document or application. 11. "hort3cut -enu This menu is displayed when a user right clicks anywhere on the window or on the desktop. t is used to display a set of convenient shortcuts. 1#. 5dit The ability to change any data that is entered into a program. 1,. $ut, $opy and %aste -oves 'cuts, removes(, or copies a selection of 11C te2t, data or ob)ects and pastes them in another location in the same application or in another application. $ut relocates the contents to another location. $opy makes a duplicate of a selection. 1:. &ndo, 0edo Allows the user to reverse any changes he has made in an application. The redo feature brings back any feature that you have undone. 1=. $lipboard A small portion of the memory used to hold temporarily used data or ob)ect that has been copied using copy operation or removed using cut operation. 1A. "ave and %rint $ommon to all applications is your ability to save or store you work as a file on a disk. This allows you to open and use the file at a later time in case you want to add or modify the document. n addition, all applications allow you to print a hard copy of your file on paper. 11@ LESSON 118 1T./ LIMITATIONS OF COMPUTERS 4asic things a computer cannot do* 1. $omputers cannot do anything unless they are programmed with special instructions. #. $omputers cannot think and reason and therefore let the ability to make decisions and form )udgements. ,. $omputers can not perform calculations on infinite numbers e.g. the value of pi, find the value of pi, the e2act value of pi. :. $omputers cannot input data itself. t requires users to input its data. =. $omputers cannot do any arithmetic with any bases other than base 1?. All the programming 'giving instructions( in a computer must be done by humans because a computer cannot decide how to be programmed. Also, all inputs must be provided by humans because the computer cannot provide its own inputs. $omputers cannot interpret the information they generate from the data that is input since they cannot think or reason. 9or e2ample, they can be used to keep track of a series of measurement in a scientific measurement but cannot interpret the ideas suggested by the data. t needs a user or a program to instruct it how to present the information. Therefore, a computer is used to provide a solution, not make decisions. This is done after following the instructions given by humans in the form of input and programs. $omputers may have high processing speeds, large amount^s of primary and secondary memory but there are limitations that are faced by a computer. 1#? LESSON 111 Fou Aasi) Cate,oies o& Compute Mista=es 6Compute Eos7 :. Hardware 5rror =. "oftware 5rror A. nput 5rrors B. .utput 5rrors 1. Hardware 5rror 5rrors cause due to hardware failure. These errors occur due to power fluctuations, natural causes, improper connections by users, damaged devices etc. 9or e2ample hard disk crash, floppy drive inaccessible, cables and plugs not connected properly, disk not formatted, etc. #. "oftware 5rror Threes are normally created by programs. These errors occur usually if the program refuses to carry out required functions or operations for some reason. f programs are not developed properly then these errors are bound to happen. f software files are missing from the application itself or not properly installed then the program will not run, for e2ample, if the program halts 'hangs, free;es( or does not respond in the middle of e2ecution, does not process data accurately, starts giving error messages, does not load properly, etc. ,. nput 5rrors These are errors that arise during the input of data. These errors normally occur when the user is using a keyboard 'although sometimes direct entry devices could enter incorrect data(. f you input wrong information into the computer, the computer will report an error message 'in special purpose programs( or produce the wrong input. :. .utput 5rrors Are any errors which restrict the computer from giving valuable output, for e2ample, the printer is not functioning properly, problems with the display on the monitor. 1#1 LESSON 11" Ca0a,e I*D Ca0a,e Out 6CICO7 This term refers to processing information that has been distorted due to invalid or inaccurate input. 66. is commonly used in the computer industry. t means that a computer provided with inaccurate input will most certainly give inaccurate outputs. Therefore, if you want a computer to produce the desired results then you must obviously input the correct data. Ta=i*, Cae o& a Compute La0 $ertain factors have to be kept in mind in order to maintain a good computer lab. "ome of these factors are* 1. $ontrolled environment #. 4ackups ,. Data $leanup :. "torage of diskettes =. 8eyboard A. -ouse B. /isual Display &nit '/D& 1 -onitor( 1. $ontrolled environment This normally refers to the setup of the lab. This is where all the elements of the computer system are monitored and kept under control to prevent the computers from facing any forms of damage. A controlled environment would include the following features* 'i( Air conditioning To maintain a cool environment and in the process keep the computer and other devices cool. 'ii( Dust 9ree To ensure that computers are free of dust. Dust can damage parts of a computer. 'iii( %ower "tabilisers To maintain power in the lab '&%" 1 constant power, surge protectors 1 clean power(. 1## LESSON 11( #. 4ackups $ertain housekeeping tasks are essential to maintain the working environment of your comtpuer lab. .ne of these tasks include doing regular backups. "ome issues that you should keep in mind when doing backups are* regular backups testing the restore function using the correct backup restore versions of the program off3side storage or backup data and software backup 4ackup is making additional compressed copies of data and software in order to ensure security against the loss of the original data and programs. ,. Data $leanup This is another housekeeping task. Data clean ups need to be done in a computer in order to free secondary storage space. The following tasks are done when doing data cleanup* 'i( ntegrity checks &sually perform in larger computer installations where many databases are used. t is done to ensure the e2istence of all data is up3to3date and correct. These checks highlight the e2istence of unnecessary copies of data. 'ii( Delete redundant files 'iii( Disk check 'performance( :. "torage of diskettes Disk must be kept in cool and humid free facilities &sers must ensure the proper handling of disks to safeguard from any physical damage. Disks must be labelled appropriately to ensure easy identification. 1#, LESSON 11- =. 8eyboard care must be taken not to damage the keyboard. The buttons on the keyboard must be pressed gently. Activity such as eating and drinking must be strictly prohibited. 8eyboards must be cleaned regularly with a clean dry cloth. A. -ouse The mouse is an integral element in 6& since it is used to e2ecute instructions. Always use a mouse pointer which is free from dirt 'ensure that you have clean hands when you use the mouse so that the dirt from your hand does not rub onto the mouse pad( The rollers inside the mouse should be free of dirt built regularly, to ensure good performance and long life. f you regularly clean those then your mouse will have a long life. Do not press the buttons too hard. B. /isual Display &nit '/D& 1 -onitor( 9or a ma2imum performance, a /D& must be cleaned regularly. Anti3glare screen 'glare3reducers, screen filters( reduces brightness and contrasts. The screen display should be aligned properly. 1#: LESSON 11/ "P.1 WORD PROCESSINC !ord processing software is used to prepare documents electronically. t allows you to enter te2t and format that te2t to your liking. All characters and pictures that are displayed on the document are done using the 0A-. A copy of the document can also be stored on a disk. The key advantage of a word processing software is its ability to make changes to the content of the document e.g. spell check, changing margins, adding and deleting words and entire paragraphs and setting tables, etc. After a document is complete it can be stored on a disk. The document can be later referenced by the user as many times he wishes. $opies of the documents can also be printed out. %reviously stored documents can be combined to make new documents. Therefore, word processors are a computer program that facilitates creation, editing, formatting, saving and printing of te2t. 6raphics can also be added to a document. The main advantage of a word processor is that it reduces the time required to prepare and produce written documents. All editing is done on the screen saving precious re3 typing time. This promotes efficiency. 52amples of a word processor are* -icrosoft !ord $orel !ord %erfect !ord "tar -ulti-ate +otus !ord %ro 1#= LESSON 111 -a)or $apabilities of !ord %rocessing 1. !ordwrap 1 this feature allows te2t to automatically start on a new line when the current line reaches the end margin during typing. &sers do not have to press enter to create a new line. #. $ut and paste 1 allows the user to move entire blocks of te2t and insert it in other locations. The cut and paste feature refers to the method of selecting the required te2t or graphics, removing it 'cut( and pasting it elsewhere in the document. ,. $opy and paste 1 involves selecting te2t or graphics and making a duplicate copy 'copy( which is pasted elsewhere in the document. n this feature the original te2t and graphics remain in their original locations. :. "earch and replace E 9ind and replace 1 allows a user to search for a word or a block of te2t 'phrase( and replace it. This allows a user to save time that would otherwise have been wasted looking for that information. The find feature can also be used alone. =. "pell $heck E "pelling and 6rammar $heck 1 allows you to check for spelling grammar in a document by comparing words and phrases to the word processors dictionary. &sers share the choice of changing the spelling, ignoring the changes e.g. foreign names. The user can also add the new words to the dictionary. A. 9ormatting 1 word processors allow a user to format 'change the appearance of te2t( documents in an appealing way e.g. bold, underline, italic, coloured te2t, font si;e, font style, highlight etc. B. Alignment 1 te2t and paragraphs can be aligned to the margin in various ways to make it presentable e.g. algin left, align right, centre, )ustify. C. !ord count 1 allows you to count the number of words and characters in a document. .ther capabilities of !ord processing are* columns thesaurus mail merge tab setting 'tab stops( page setup adding and removing borders inserting files inserting clipart 1#A 1#B Title 4ar -enu 4ar Drop Down -enu "hortcut 8ey Tool 4ars Task 4ar Tool 4ars LESSON 113 1#C !hite "pace 9ormatting Toolbar "tandard Toolbar 0uler "croll bars LESSON 114 "P." MAIL MERCE -ail merge is the process of taking two files and merging them together. -ail merge is largely used to merge letters and their addresses. t can also be used to create labels. There are two files required to do mail merge* 'i( %rimary file 'ii( "econdary file The primary file contains the basic form letter. This form letter is the main body of your letter which contains the actual correspondence and the merge codes 'field codes(. The merge codes control what information is used from the secondary file and where it is entered into the document after merging. The primary document is also known as the main document. The secondary file is also known as the address file and contains the information needed to complete the form letter that is contained in the primary file. t will contain recipients details, for e2ample, name, address, phone contact and any other relevant data. 5ach piece of data in a secondary file is called a field, for e2ample, the recipients name is one field of data, the street address is another field and the phone contact another field. The collection of fields about a single recipient 'sub)ect( needed to complete a mail merge process is a record. 1#@ LESSON 115 How to merge 9irst prepare a primary file. The primary file is simply a letter to mass audience. 4lank spaces should be left at the locations where the merge codes are supposed to appear. After the primary file 'letter( has been created it should be saved with an appropriate filename. nstead of creating a new file you can also use a letter which has been typed previously. "econdly prepare a secondary file. The secondary file consists of the addresses of the recipients. The fields of the secondary file should be selected properly 'if you are creating a new secondary document(. t will contain name and address of the recipients and other relevant information that will replace the merge codes in the primary file after the merge process is completed. A secondary file can also be used. After finishing both the files, the mail merge process continues. Here, the secondary file fields are inserted in the required locations within the primary document. These are called merge codes. .nce the merge codes are in place the user has an option of viewing the entire mail merge as individual documents, one after the other or all at once. The merge can be saved, printed or fetched using computer software or even email. Advantages of merging 'i( t is easy because we don not have to type each document several times. 'ii( "aves a lot of time since several copies are made after merging. 'iii( t is fast. Disadvantages of merging 'i( 7ot many people are aware of merging. 'ii( f one information is wrong then the whole document is spoiled. 'iii( &ntil recently many word processors did not contain the mail merge option 'iv($reates problems if there is a large amount of mail and not enough memory. %rimary fileEdocument s the document where the main information or correspondence is given. t consists of the actual letter intended for the reader. There are blank spaces in the primary document which would contain fields from the secondary document 1 merge codesEmerge fields. These fields are replaced with information from the secondary file. The primary document is also known as the primary file, data file, form letter or the main document. 1,? 1,1 LESSON 1"8 Samp'e o& a pima$ #o)ume*t $ourts Home$entres %. .. 4o2 1,# "uva. HH7ameII HH4o2 7o.II HHAddressII Dear HH7ameII, 05* .&T"TA7D76 %AR-57T %lease be informed that your payment is behind by QHHamountII. 9ailure to pay up by the end of the month could result in the repossession of your hire purchase product. Thank you. Rours faithfully, ````````` -anaging Director Samp'e o& a Se)o*#a$ &i'e 7ame 4o2 7o. Address Amount 0. "ingh =B#A 7ausori =??.?? 8. "eniloli ### 7asinu =?.#= D. 7air 1##= "uva #.1= A. $hand ,# 7akasi ?.#? A Comp'ete# Mai' Me,e Do)ume*t $ourts Home$entres %. .. 4o2 1,# "uva. 0. "ingh =B#A 7ausori Dear HH7ameII, 05* .&T"TA7D76 %AR-57T %lease be informed that your payment is behind by Q=??.??. 9ailure to pay up by the end of the month could result in the repossession of your hire purchase product. Thank you. Rours faithfully, ````````` -anaging Director 1,# LESSON 1"1 "T.1 <ISTORB OF COMPUTERS Ea'$ Computi*, De+i)es The early computing devices were* =. The abacus A. 7apier<s bone B. "lide 0ule 1. The abacus This is the world<s oldest known computing device. t was used by the $hinese as early as 1A?? 4$ and is still used today. The abacus is an instrument which uses beads and computes numbers that represent the numerical unit of notation 'units, tenths, hundredths, etc(. 4asically an abacus is a calculating device that is used to perform calculation on numbers using beads. #. 7apier<s bone Dohn 7apier, a "cottish -athematician, invented a computing device that facilitated the operations of addition, subtraction, multiplication and division on a series of calculating sticks made of ivory which became known as 7apier<s bones. These were marked in a manner similar to the multiplications tables used today 'portable multiplication table( therefore 7apier<s bone made the process of multiplication, division, addition and subtraction much easier. 7apier<s bones, engraved in ivory, were movable multiplication tables 1 the first modern step towards the mechanisation of calculating device. ,. "lide 0ule &sing the principles of 7apier<s bone !illiam .ughtred '1A#1(, an 5nglish -athematician, developed the first slide rule. t was simply a circular rule that transferred the logic of 7apier<s bones onto a set of rotating scales. This device is considered to be one of the earliest and long calculating devices 1,, LESSON 1"" Ce*eatio*s o& Computes FIRST CENERATION 615/1 @ 15/47 I*putD Stoa,e a*# Output The first generation of computers are considered very primitive from today<s perspective. 9or input, punched cards were used. Although &7/A$ could accept input from magnetic tapes, the punched cards were also used to store information. "torage on punched cards were done by a series of punched holes on the cards where each character was represented by a column. An ordinary punched card had about C? characters. f a mistake was made, the whole card was damaged and as a result would be thrown away. .ne column was used to represent one character. A key punch was also used to do data entry. Po)ess Data was processed using vacuum tubes also called valves. A vacuum tube is an electronic switchEdevice that controls the flow of electronic signals in different directions. Therefore it was used to construct the processing units of the first generation of computer. The functions of the processing units in the 1 st generation were isolated to the different computers itself. The problems with vacuum tubes were that* they failed frequently because they heated up quickly and got damaged. they were also very large contributing to the immense si;e of earlier computers. they were quite slow in transmitting data to different parts of the computer. 9irst generation computers were therefore very large and produced heat 4urning out the vacuum tubes which needed to be replaced at a very high cost. They also used up a lot of electricity making computers very e2pensive to maintain. These computers had difficulties operating for more than a few hours and were prone to failure. .ne of the first complete digital automatic computer was 57A$ '5lectronic 7umeric ntegrator and $alculator(. The 57A$ was used for military purposes. The commercial computer industry began with the &7/A$ '&niversal Automatic $omputer(. The &7/A$ used less vacuum tubes than 57A$ and therefore was much faster and reliable. The &7/A$ was made commercially by Dohn %resper 5ckert for the 4ureau of $ensus to keep census records. Dohn %resper 5ckert had previously worked with Dohn !. -auchly on the 57A$ and together they formed the company that built the &7/A$. 9or memory the first generation computers used magnetic drums. 1,: LESSON 1"( La*,ua,e Data was input using machine language and later in 1 st generation Assembly language was sometimes used. The use of Assembly language continued in # nd generation. -achine language contained instructions composed of series of ?<s and 1<s. 4inary schemes were used to combine the ?<s and 1<s of machine language to represent alphabets, numerals and special characters. SECOND CENERATION 615/5 @ 151(7 I*putD Stoa,e a*# Output The second generation of computers still maintained the use of punched cards for input but newer storage devices had been introduced. The key punch was still in use. This generation saw the introduction of magnetic tape reels and streamers. %rinters were also introduced thus output was largely dumped through printers. Po)ess "econd generation computers were made using transistors instead of vacuum tubes. Transistors were smaller, more reliable, used less energy and produced less heat. $omputers made with transistors operated much faster and were much smaller than the 1 st generation of computers. Transistors are devices that can also be used to control the flow of electricity in electronic circuits but are less prone to heating and therefore last longer. La*,ua,e n contrast with first generation machines and assembly language, the second generation saw the development of high level programming languages. These languages enabled the programmer to enter instructions into a computer using 5nglish sounding commands and could be used on different computers. These languages used compilers to translate the 5nglish like language into machine language. Two languages introduced during second generation are* 11. $.4.+ 1 $ommon 4usiness .riented +anguage 1 used to write programs for business. 1#. 9ortran 1 9ormula Translation 1 used by scientists and engineers for comple2 tasks and calculations. The first and second generation of computers were large, e2pensive, targeted for businesses for huge budgets, business co3operations and government departments. The first two generations used a system of data processing called 4atch processing. 1,= 4atch processing is the collecting of data over time into a file 'transaction file( that is later processed as a collection called 4atch. During batch processing, a computer program reads a file and processors 'updates( the old data 'master file( with the new data without any interaction from users, clerks or any other individual, for e2ample a bank savings account 'passbooks(, credit cards etc. This system is time consuming and inefficient. n the first two generations of computing batch processing was only done on the large computers that were available, these computers were referred to as mainframes. This system is still in use today. 1,A LESSON 1"- T<IRD CENERATION 6151- @ 15317 I*putD Stoa,e a*# Output Data was input into computers in this generation with the use of keyboards and a video display was used for output. -agnetic tapes being used for data storage became widespread, disk packs and printers were still popular with users. Po)ess n this generation the key technological innovation was the development of computers based on integrated circuits '$(. An integrated circuit is an electronic circuit that packs many 'thousands( transistor on small silicon chip and is used to process data. ntegrated circuit use a material called silicon 'which is a semi3conductor( that conducts electricity with only a little 'semi3resistance(. ntegrated circuits 'chips( are found on the computers memory. 0.- chips also use this technology. This was a better method because in operating several circuits onto one chip enables the chip to occupy less space and work much faster. This technology made it possible for the production of small3in3si;e but power minicomputers. 4ecause of this innovation 'integrated circuits( computers came to support capabilities such as* :. -ulti3programming A computer system in which two or more programs are e2ecuted concurrently by one computer 'operating system(. n actual effect he programs take turns running. Here the user would be under the illusion that he or she is the only person using the program. Here the operating system interrupts and switches rapidly back and forth several programs while they are running. =. Time3sharing Allows the concept of multi3programming to be possible. Here multiple users access the same or different programs on a computer from their own computers. Time sharing is typically found on large computer systems where many users need to access one central computer at a time. n time3sharing, the attention of the $%& is shifted among the users on a timed basis that is controlled by the operating system. Time sharing is available on all computers today. &sing time sharing many users can access the computer simultaneously therefore a computer can also be accessed remotely by the use of terminals. Terminals are devices usually equipped with a /D&, a keyboard and a communication line to a larger computer which allows it to access data. 1,B nstead of punched cards and printouts, users interacted with , rd generation computers using keyboards and terminals. The operating system was also introduced in the , rd generation. Another , rd generation innovation was the stands for computer networking resulting in the nternet. 1,C LESSON 1"/ La*,ua,e The languages used in this generation were command based. $.4.+ and 9ortran were still in use 'their use continued well into the fourth generation(. 7ewer language like %ascal was introduced. +anguages like 4A"$ and &7J were also introduced in this generation. The ma)or land mark in the , rd generation was 4- "ystem ,A?. this family of computers allowed small businesses to start off with a small but relatively ine2pensive computer system. 4- "ystem ,A? was the first in the range of compatible computers i.e. unlike previous computer devices, programs and data on one 4- "ystem ,A? could easily and conveniently be used by another 4- "ystem ,A? computer. 4- "ystem ,A? was the first family of mini computers. 'Compatible computers are computers that can use the same programs and hardware. The computers have similar internal architecture 'design(). FOURT< CENERATION 61531 @ pese*t7 I*putD Stoa,e a*# Output This generation is the current generation of computers. Data is input using numerous devices 1 keyboards, scanner, mouse etc. There are also many ways to output information using printers, monitors, plotters etc. "torage units used today vary from magnetic tapes to floppy and hard disks, to disk packs and optical disks and from recently &"4 disks. This generation consists of portable computers. t also has huge networks where data is communicated very easily and quickly '+ocal Area 7etwork(. The intelligent terminal 'microcomputer( was also introduced in this generation. Po)ess The ma)or innovation in this generation was the introduction of microprocessors. %reviously the arithmetic unit, the logic unit and the control unit were housed on different integrated circuits. The microprocessor holds the components of the $%& together on a single silicon chip, having the ability to handle more work at a faster rate. A microprocessor consists of thousands of integrated circuits 'millions of transistors( on a silicon chip. The microprocessor was used to package the entire $%& of the computer 1 complete with the A+&, $& and some memory 1 onto one silicon chip 'it was initially referred to as large scale integrated circuits(. The first microprocessor was the ntel :??: produced by the ntel $orporation in 1@B1. The introduction of microprocessor enabled the invention of smaller computers 1 the microcomputer. The first %$ 'personal computer( was produced in 1@BB by Apple 1,@ $orporation founded by "tephen Dobs. This was first in the family of Apple computers. Apple went on to introduce Apple +isa which was one of the first computers to use 6& but it was not a success. +ater Apple produced Apple -acintosh which is acknowledged as the first computer to use a 6& .peration "ystem 1 -acintosh '1@C:(. After Apple computers released its %$, 4- introduced its own family of microcomputers. The 4- %$ range of 4- microcomputers was released with an operating system called %$3D." '-"3D."( in 1@C1. 1:? LESSON 1"1 La*,ua,e nitially all software were command based, so an important innovation in the : th generation was the graphical user interface '6&(, where the users would interact with programs that would run in their re3si;eable window and by using a mouse, users can choose options by pointing and clicking on symbols called icons or ob)ects that represent program functions. -any application languages have been introduced in this generation. The very first spreadsheet software called /"$A+$ was introduced for the microcomputer. t was a character based program. -icrosoft also introduced the -"3D." operating system 'a character based and command based interface( for 4- %$<s and compatible computers. After the introduction of 6&, Apple came out with the Apple -acintosh and in 1@C= -icrosoft introduced its !indows range of operating systems which ahs been the largest and the most popular operating system today. DIFFERENCE AETWEEN COMPUTER CENERATIONS 1 "T 6eneration # nd 6eneration , rd 6eneration : th 6eneration /acuum tubes 'valves( Transistors ntegrated $ircuits -icroprocessors The microprocessor was used to package the entire $%&, complete with the A+&, $& and the memory on one silicon chip. FIFT< CENERATION The development of Artificial intelligence 'A( is being though of the start of fifth generation. Artificial ntelligence can be defined as computer systems that can mimic 'copy( human thought processes and actions. True A that corresponds to the human intelligence is still a long way off. However, several tools that imitate human problem solving skills have been developed. These tools would be combined to assist human effort to create artificial intelligence. "ome areas are* 'iv(52pert "ystems 'v( 0obotics 'vi(7atural +anguages 'vii( /oice 0ecognition 'viii( $omputer /ision 1:1 LESSON 1"3 'i( 52pert "ystems Are computer programs that provide advice to decision makers who would otherwise rely on human e2perts. The users of e2pert systems type their question into the e2pert system using a program called an inference engine and they are given a professional responseErecommendation by e2pert systems. The e2pert system stores its knowledge n a knowledge3base. t is also referred to as a knowledge base system. The knowledge base consists of te2t book knowledge that would have been prepared by human e2perts. 'ii( 0obotics 0obotics is a field of study concerned with the development of robot and its associated functions. 0obots are computer controlled machines that mimic the motor activities of human. They are usually used to e2ecute repetitive functions and do monotonous work, also used for dangerous works. Artificial intelligence robots will also assist in its motor movement. 'iii( 7atural +anguages t is where a user would be able to communicate directly with the computer 'A( in his own spoken language and the computer would be able to understand and process the information given by the human. 7atural language is the everyday language spoken by human beings. The artificial intelligence will also communicate in their own natural language. 'iv(/oice 0ecognition Are programs which the computer will use to identify and interpret different human voices that are used to give instructions. Here the computer will be able to differentiate between the different voices automatically. 'v( $omputer /ision This would allow the computer to have the ability to KseeL and interpret different ob)ects and distinguish the difference between them. Therefore, the intention of scientists who wish to introduce the fifth generation of computers is to design a computer which has human qualities. "cientific research has been done on different levels with the purpose of* teaching the computer to KthinkL, Kmake decisionsL and KlearnL making computers easier to use finding practical applications for the e2isting technology. The goal of fifth generation is to develop services that respond to natural languages and are capable of learning and self organisation. 1:# 1:, LESSON 1"4 Summa$ 1 st 6eneration # nd 6eneration , rd 6eneration : th 6eneration = th 6eneration %rocessing &nit /acuum tubes 'valves( Transistors ntegrated $ircuit '$( -icroprocessor T "torage 3 punched cards 3 magnetic tapes 3 tape printouts 3 punched cards 3 magnetic tapes 3 disk packs 3 magnetic tapes 3 disk packs 3 floppy disk 3 hard disk 3 optical disk 3 magnetic tapeEreels 3 &"4 T -emory -agnetic drums -agnetic drums 3 0A- 3 0.- 3 0A- 3 0.- T nput 3 punched cards 3 key punch 3 punched cards 3 key punch 3 keyboards 3 keyboards 3 direct input devices 3 voice input .utput 3 punched cards 3 tape printouts 3 printers 3 /D& 3 monitor 3 printer 3 plotter 3 voice output 3 voice output 3 voice output +anguage 3 binary language 'machine( 3 Assembly language 3 high level programming languages* 3 $.4.+ 3 9ortran 3 &ni2 3 /ery high level programming language* 3 %A"$A+ 3 4A"$ 3 0%6 3 %roblem oriented language* 3 /"$A+$ 3 D." 3 -acintosh ." 3 7atural language 1:: LESSON 1"5 PEOPLE IN <ISTORB 1. Au,usta A#a @ Cou*tess o& Lo+e'a)e 6141/ @ 14/"7 !as the daughter of the poet +ord 4yron. "he worked closely with $harles 4abbage and proposed the idea that it would be possible to program the analytical engine with a single set of cards for recurring sets of instructions 'the conditional loop and subroutine(. "he is attributed to have written the first program 1 a detailed sequence of instruction 1 for the analytical engine to perform comple2 calculations. Although the analytical engine was never completely built. Augusta Ada<s contribution was so important that she is regarded as the worlds first programmer. The programming language Ada 3 used largely to program weapon system 3 was named after her. ". Joh* 9o* Neuma** 6Cema* Mathemati)ia*7 6158( @ 15/37 %roposed a computer design called 5D/A$ '5lectronic Discrete /ariable Automatic $omputer( '1@:A(. The main feature of his design was that both the program and data were stored in an internal memory using a binary scale. This design was referred to as the stored program concept. t was also called the first draft. This formed the basis of modern day computing where both the data and programs are stored in the same location during use i.e. 0A-. 7eumann also worked on the 57A$. (. Joh* Pespe E)=et 61515 @ 155/7 He built the first commercially available computer, called the &7/A$ '&niversal Automatic $omputer(, for the 4ureau of $ensus '1@=1( which was used to record and process census data. 4oth Dohn %resper 5ckert and his partner Dohn !. -auchly were on the team who built 57A$. 5ckert later built Dohn /on 7eumann<s design of the stored program concept computer, 5D/A$, but could not finish it on time. Therefore, the first stored program computer was called 5D"A$ 'built in 5ngland(. The ma)or feature of the &7/A$ was that it used less valves and therefore was much smaller in si;e, processed data faster and cost less. 1:= LESSON 1(8 -. Stepha* Jo0s .ne of the founders of Apple computers. Apple produced the fist completely assembled commercial microcomputers and made them available on the commercial market '1@BB(. Aplle ws also responsible for introducing and making popular 6& based productsEprograms 'Apple +isa, Apple -acintosh(. /. <ema** <o''eith 61418 15"57 A statistician who made the first tabulating machine which was practically used to tabulate the 1C@? $ensus. All data collected were transcribed on punched cards. The Tabulating -achine 'the first electromechanical punched card system( was based on Doseph -arie Dacquard<s invention called the Dacquard<s loom. After the success of the tabulating machine in processing and storing the census data, Hollerith formed the Tabulating -achine $ompany 'T-$( which later went on to become part of 4-. 1. Cha'es Aa00a,e 6Fathe o& Computes7 61351 @ 15317 Designed mechanical calculators and computers. These machines were built with gear wheels and levers. His first achievement was a working difference engine which was used to do simple arithmetic calculations. This research was funded by the government and even though the difference engine worked, 4abbage never quite finished it. !hile he was working on the difference engine, he started work on his real dream 1 the Analytical 5ngine. The Analytical 5ngine was a general purpose machine that would be capable of performing any type of digital calculations. Although the analytical engine was never finished, its principles and procedures mapped out the basis of all digital modern computers 'Automatic computers(. 3. A'aise Pas)a' 611"( @ 111"7 nvented the %ascaline which is thought to be the first automatic calculator. The machine could add and subtract and was based on very precise interconnected gears. The %ascaline required its user to interpret results from the machine, which made it very difficult to use 1 a reason why it was not too popular. Another reason was that the %ascaline was in 9rench. 1:A LESSON 1(1 De&i*itio*s 1. De#i)ate# Ma)hi*es 3 are computers which are used for only one particular task in a computer network. 9or instance, a dedicated file server would only have the purpose of storing files, internet server, printer server, etc. #. Ja);ua#Hs Loom 1 Doseph -arie Dacquard invented the punched card loom that would help make silk weaving easier. Dacquards loom was not a computer but was used for weaving clothes 1 but it was a ma)or influence in the computing industry because of the ideas of using punched cards as input and output devices. ,. EDSAC 1 5lectronic Delay "torage Automatic $omputer 1 the first working full scale stored program computer. A group of developers led by -aurie /. !ilkes '$ambridge &niversity 1@:@( developed the first working stored program computer. He used the ideas suggested by Dohn /on 7eumann 'who suggested the stored program concept and a design of stored program computer 1 5D/A$( and made it possible. 1:B LESSON 1(" R5A0 7/57T.0 7/57T.7 AD/A7TA65 D"AD/A7TA65 1A?? 4$ $hinese Abacus 3 3 1A1= Dohn 7apier 7apier<s 4ones 3 computing device that facilitated the operation of multiplication and division 3 3 1A#? !illiam .ughtred '5dmund 6unter( "lide 0ule 3 3 1A:# 4laise %ascal %acaline 1 a calculating machine that was difficult to interpret. 3 3 52pensive 3 required considerable skill to interpret 3 in 9rench 1AB, 6odfried +eibni; +eibni; wheel 1 a cylinder with stepped teeth which is thought to be the first general purpose calculating device 'P, 3, , ( 3 3 1C?1 Doseph -arie Dacquard Dacquard<s loom 1 used punched cards to program a loom. 3 3 1C## $harles 4abbage Difference 5ngine 1 used to do simple arithmetic calculations and display results. 3 3 1C,, $harles 4abbage Analytical engine 1 could perform any type of digital calculations 3 3 1C,, Augusta Ada 9irst programmer 1 proposed the idea to program 4abbage<s analytical engine. %erformed comple2 calculations by using loops and subroutines 3 1C=: 6eorge 4oole 4oolean algebra 1 introduced the principles of 4oolean logic and the mathematic of variables and values and the theory of logic based on , operations A7D, .0, 7.T. 3 3 1CC# Hermann Hollerith The punched card tabulating machine usd to transcribe census data onto 3 3 1:C punched card. 1@11 Dames %owers "imultaneous punching machine 3 3 1@:# Dohn /incent Antasoft 5lectronic tube computer called A4$ 1 Antasoft 4erry $omputer 9irst tube electronic digital computer 3 1@:: Howard H. Aiken -ark 1 1 9irst general purpose electromechanical computer. 3 3 1@:= Dohn %resper 5ckert 57A$ 1 1 st digital computer 3 4ulky, gave enormous amount of heat. 1@:A Dohn von 7eumann %roposed 5D/A$ which used ideas based on his stored program concept. 3 3 1@:C Transistors 1@:@ -aurice !ilkes 5D"A$ 9irst complete stored program computer 1@=1 Dohn %resper 5ckert, Dohn !. -auchly &7/A$ 1 for the 4ureau of $ensus 1 used vacuum tubes, the first commercially available computer. 9aster than 57A$ 3 1@=1 0emington 0and 'owned by 5ckert and -auchly( nstalled the first data processing system 3 3 1@=,, 1@=: Thomas D. !atson -odel B1, -odel A= for 4-. 3 3 1@=@ ntegrated $ircuits 1@A= 4- 4- "ystem ,A? 1 first family of compatible computers. "tarts ,rd generation &sed integrated circuits 3 1@B1 ntel 9irst microprocessor 1 ntel :??: 1@B, 9irst internal hard disk 1 !inchester disk 1@B= 1 st "upercomputer 1 $ray 1 1@BB "tephen Dobs "teve !o;niak 'Apple $omputer $orporation( Apple 1 first commercially assembled commercial %$. 1@B@ /isicalc 1 1 st electronic spreadsheet '1 st commericail application program( forerunner to end3 user program 1@C1 4- 9irst 4- %$ 1:@ 1@C: Apple $orporation Apple -acintosh 9irst 6& operating system 1@C= -icrosoft !indows 1.? 1@@# -icrosoft !indows ,.11, !indows for workgroups 'networkable( 1@@, 4- =CA range of processors called %entium. 1=? LESSON 1(( "T." APLICATION OF COMPUTERS $omputers can serve as tools in many different areas. "ome common areas are as follows* ##. 5ducation #,. -edicine #:. +aw and law enforcement #=. $ommerce 3 5conomicsEAccounting #A. Airlines #B. 6overnment #C. nsurance #@. Art and -usic ,?. "pecial 5ducation 1. E#u)atio* $omputers can be used by students and teachers as a new way of information gathering 'research( and learning. An e2ample of how this is made possible is through the popularity of the nternet as a tool for information gathering. 0apidly growing computer technology has enabled the creation of interactive education. The introduction of multimedia, where computers are used along with $D3 0.-" and stickers to display graphics and sound, has made interactive education a reality. The information in interactive education media uses hyperte2t. Hyperte2t connects a user to other pages of information when they are clicked upon. $omputers in education can be used at different levels of educationF at primary level where students can learn through pictures, music and sounds and at secondary and tertiary levels where students gain access to large amounts of information from $D3 0.-" 'hypermedia databases( or the nternet. &sing computers in education is interesting learning for students because of their usually appealing interfaces and the different ways in which students have to interact with the computer itself. $omputers are equipped with graphics, speech synthesi;ers and speech recognition software which can be used to create an e2citing educational environment which would hold the students attention. 1=1 LESSON 1(- ". Me#i)i*e Doctors and nurses depend heavily on computers to assist and do much of their tasks. Having a computer to store and retrieve information is already a natural part of the information process. 'i( %atient -onitoring in ntensive $are &nit '$&( s an early e2ample of a computer controlled patient monitoring system where critical patients are connected to a wide variety of sensors to measure vital science of the body, for e2ample, pulse, heart rate, breathing, brain activity etc. %atient monitoring is not only confined to $& patients. Active patients can also carry portable monitors, implants or controlled devices to keep track of different details 1 all results of advancement in computer technology, e.g. an implant which measures the level of insulin in a diabetes patient. 'ii( Diagnostic "ystem Doctors face with specialised problems can consult special systems to diagnose complicated diseases and disorders, for e2ample, cases of brain infections, lung disorders, cancers and tumours. These e2pert systems are a very effective way to diagnose patients and although most of them are still in the e2perimental stages, they still have proven to be invaluable. 'iii( -edical maging $omputers are able to analyse vast quantities of data resulting from imaging systems, such as J30ays and -agnetic 0esonance maging '-0(. These are used to give images of the skeletal and the organic structure of the human body as well as images of a patients brain to be analysed by human e2perts. &sing techniques such as 23rays and 6amma rays and ultrasound to obtain data about a patients internal structures is also referred to as computer based scanning systems. 'iv(Therapy Therapists who treat people with speech or hearing problems as well as other impaired patients can use computers in the rehabilitation process. "pecial programs are designed to run on %$<s to assist disabled individuals to achieve a limit of independency, for e2ample, computers which have 4raille keyboards, voice input and output etc. &ser paced learning could enhance education prospects for the disabled. 1=# LESSON 1(/ 'v( Heart 0esearch -icroprocessor technology are now being integrated into implantable device such as pacemakers to provide precise controls of the hearts function. These battery powered devices are now powered by body heat. (. La% a*# 'a% e*&o)eme*t +aw firms today have the need to manage, process and interpret large and comple2 amount of information. +egal documents such as briefs, transcripts, laws, codes and rules are increasingly available in the electronic version. A wealth of historical legal data are available through computer based retrieval systems. $omputers are also used in crime prevention for purposes such as matching finger prints, checking to see if a vehicle is stolen by looking at the database etc. $riminal record of people are also kept on computer and retrieved quickly whenever needed. -. Comme)e : E)o*omi)sFA))ou*ti*, .ne of the earliest applications of computers was Accounting and 4ook3keeping activity which was concerned with recording and processing basic transactions of an organisation. &sing information that has been entered into a computer can be represented in many forms such as reports, charts, diagrams, illustrations etc., all tools greatly utili;ed by Accountants and 5conomists. "ome e2amples of how computers make data transfer easier are* 'i( 59T%." '5lectronic 9und Transfer %oint of "ale( s the process by which money is transferred automatically by a computer from a customers account to that of a teller. This system is largely available in supermarkets and retail stores and eliminates the problem of carrying too much cash. 'ii( AT- 'Automatic Teller -achine( A #: hour service machine, an AT- is a computeri;ed device for handling routine teller transactions automatically. AT-<s can handle withdrawals, deposits, funds transfer and even make payments. AT-<s use a method called real time processing where data is transferred from and updated in a computer system as it occurs 'real time(. t is not kept in a separate file to be processed later. $omputers are also used for communication in business through the use of emails. 1=, LESSON 1(1 /. Ai'i*es 6A+iatio*7 $omputers are used in Airlines to control the functions and monitor the positions of the aircraft. They help pilots and navigators locate positions of planes and monitor flight paths, detect potential collision and assist pilots to control the aircraft 'auto3 pilots(, to help a pilot land the aircraft at night or in poor weather conditions. They also teach pilots how to fly )ets and planes without ever having to leave the ground 'flight simulation(, determine how much fuel a plane might carry etc. These are some of the functions of computers in aviation. $omputers are also used largely for airline reservation and ticketing systems. At any given time it is known to the users of the computer systems how many people are booked on one flight and how many seats are available. $omputers are also used in the manufacture of aircrafts. -uch design and testing of different components of an aircraft are done using computers. 1. Co+e*me*t $omputers are used for record keeping, collection, analysis and reporting of information by government. 52amples of some uses of computers in government are* keeping of ta2 records by 9i)i slands 0evenue and $ustoms Authority '90$A( keeping record of island si;e, titles and categories by the +and Department '9i)i +and nformation "ystem 1 9+"( 9i)i %olice force to keep records of prisoners. The reserve bank keeps records of foreign and local currency and at the same time measure and forecast the economic condition of a country. 7+T4 1 uses a new system '"A%( to keep track of all native land leases and relevant details regarding these leases. Hospital 1 to keep patient records +TA 1 to keep track of driver and vehicle records -ilitary 1 to record details about army personal T" 1 to record detail about all civil servants and government workers, maintain government<s website and network. 3. I*sua*)e nsurance companies use computers to keep track of clients and to bill them. &sing computers, insurance agents can present different insurance and loan schemes in a more easy to understand form. &se of computers enables companies to keep information about clients and to update and present their service in an appealing way. $omputers also help add value to services because clients records are processed immediately and thus accurate and up3to3date record are presented to clients whenever needed. 1=: LESSON 1(3 4. At a*# Musi) $omputers have become a very important part of art and music. 'i( Art $omputers have assisted Art in many forms. t has replaced pen and paper as a drawing tool. &sing computers, different colours can be mi2ed by manipulating the light of the monitor to provide many different types of shades for drawings and artwork. $omputers have also been used to enhance and restore drawings and paintings. $omputers are also used in movies to create spectacular effects 'special effects(, for e2ample, scenes from other planets, special effects in recent times, feature length films. $omputers are also used to combine real life actors with background scene. "ometimes they are used to manipulate movement or enhance action sequences. 'ii( -usic "ound is a communication medium that can e2press ideas which cannot be e2pressed by any other art. "ound can include the human voice, sound of nature or synthesi;ed sound such as beeps from a computer to give you feed back. n entertainment, music is an integral part and the ability to produce quality music and quality sound has been a great task for entertainers. The invention of some new types of devices have made the medium of sound very appealing both within the entertainment industry and outside it. A synthesi;er is a device that electronically generates sound instead of picking it up from a microphone. These sounds are pre3programmed or pre3recorded. -D '-usic nstrument Digital nterface( is a system that enables a synthesi;er, musical equipment and computer to be connected together. -D enables users to control the creation of sound on a synthesi;er and other musical devices. !hile a composition is being played out on the synthesi;er and other devices, -D will help the computer to keep track of the other relevant information, for instance the intensity of the sound. -usicians can then make changes or enhancements using the computer. $omputers are sometimes used to modify the sounds that are produced. 5. Spe)ia' E#u)atio* $omputers have been used to improve the quality of life through various means for physically challenged people. 1== 'i( "pecial 5ducation The use of speech recognition devices, synthesi;er and 4raille keyboards along with multimedia have helped handicapped people to better educate themselves. 'ii( -obility $omputers have been attached to wheel chairs to allow physically challenged people to control the movement of their wheel chairs much more easily and efficiently. 'iii( 4io -edical 9ield $omputers are used to design better artificial fields for the physically disabled. -icroprocessors have also been built into artificial links to make the motor activities of people easier. 1=A LESSON 1(4 (T.1 COMPUTERS AND INFORMATION PROCESSINC Aim To assist the student to recognise how the computer can manage, store and retrieve vast amount of information. I*&omatio* !hat is nformationT nformation can be described as processed or meaningful dataF data in conte2t or any collection of alphabets, numbers and symbols that is meaningful to the person using it. Data are facts that are gathered and entered into a computer to be processed. %rocessed data is meaningful and is called information. Data may be made up of numbers called numeric data that are called alpha3data or a combination called alpha3numeric data. 52amples of these data are* 1. 7umeric data 1 1??, 1#:, 1=??? #. Alpha data 1 all alphabets and symbols 'A 1>, Y, \, etc( ,. Alpha3numeric data 3 Q1??.?? Computes @ A Po0'em So'+i*, too' !hile computers affect our lives in many ways, what they basically do is solve problems. They are there as problem solving tools providing computer solutions to many repetitive tasks that normally would require a lot of time and manual labour. Three elements are required to produce a computer solution* hardware, software and data. This can be represented in the following equation* Hardware P software P data G "olution 1=B LESSON 1(5 Data Po)essi*, Data processing is the step of processing data to produce information. t is also the activity of manipulating data in one or more of the following procedures* 'a( $ollecting data 1 data may be collected from a number of sources to be processed. 'b( .rganise data 1 data must be arranged into relevant categories so that the relationship between various facts can be seen. 'c( $ombining data 1 this involves combining of similar data to reduce the number of data items to be processed. 'd( "orting data 1 this involves the arrangement of data in the order that is needed, for e2ample, alphabetically, ascendingEdescending, chronologically etc. 'e( -anipulating data 1 this involves the performing of calculations on data, for e2ample, finding the average of a set of numbers, finding the percentage of students who have passed the e2am. 'f( "ummarising data 1 data is summarised based on the contents of relevant categories. Data processing produces information which is required to form conclusions and make decisions based on plans of actions. 6ood decisions are based on sufficient and timely information. nsufficient information usually do not help in making good decisions. 4ecause the computer can handle large amount of data efficiently and present summaries of information effectively e.g. in the production of tables and graphs, it is considered to be essential for decision makers. 1=C LESSON 1-8 App'i)atio*s o& Computes $omputers are used in many different fields. 5ach of their fields have its own application of computers. "ome places in which computers are commonly used are business, government and home. 'a( 4usiness $omputers are largely used in the business sector. "ome activities that computers are used for are* 'i( nventory 'ii( Accounting 'iii( Database management $omputers are also used in areas such as spreadsheets, graphics, mailing list management, word processing, databases, publishing, banking, air reservations etc. 'b( 6overnment The government also rely greatly on computers. "ome common ways in which computers are utilised in the government are* 'i( Database management 'ii( Data analysis 'iii( !ord processing "ome e2amples of how computers and electronic databases are used to keep track of government activities are as follows* The 9i)i sland 0evenue Authority keeps ta2 records using computers $ivil servants and other government employees salaries are processed using computers at the information technology centre. -inistry of +and has 9i)i +ands nformation "ystem '9+"( which keeps records of land titles, categories, si;es, etc. The ma)or uses of computers in government are for collection of information, analysing and reporting of economic and demographic statistics. 'c( Home n homes computers are used for* writing using word processors calculating home budgets using spreadsheets entertainment in the forms of games, movies and other hypermedia databases LESSON 1-1 Commo* Uses o& Data0ases 1=@ 1. I*+e*to$ 3 is essential in business if it is to be efficient and profitable. An inventory management program keeps a record of every item in a business. 5ach record contains all necessary information about an item. 9or e2ample, item D number, item name, cost of item, retail price, e2piry number, etc. An inventory program enables the following* immediate access to the status of an item printing of daily, weekly and monthly summary of each item 'these printout indicates the sales by for each item, total sales, profit made on each item, which items are selling faster(, etc. #. A))ou*ti*, 1 an accounting program can assist users in the preparation of formatting of records and summary of financial transactions. 0ecords such as accounts payable, accounts receivable, customer accounts, payroll and general ledger can be updated automatically. An accounting software can also provided summaries and analysis for future business plans. "mall 4usiness Accounting "oftware -edium to +arge 4usiness "ystems -R.4 _uick4ook _uicken %latinum "un "ystem A$$ %ac ,. Mai'i*, List Ma*a,eme*t 1 mailing list are part of many businesses and are used to promote, advertise and do customer billings, etc. a mailing list management program is used to keep records of names, addresses, telephone numbers, postal contacts and other useful information about individuals and organisations. These information need to be accurate 'cross3checked regularly and current(. A user may add or delete names from a mailing list at any time and also make the program sort list according to a given criteria, for e2ample, surnames, payments due, items sold, etc. The program can also printout mailing labels for every name and address on the list. -ailing list management programs are also used as the secondary file when the large organisations do a mail merge tho their clients. LESSON 1-" :. Li0aies 1 many large libraries all over the world now have their bibliography computerised using special programs. The computers secondary memory stores all the information that were previously kept on cards, for e2ample, titles, authors name, etc. and the users access these information through computer terminals which are connected to the secondary storage. &sers therefore have direct access to information about available books etc. 1A? Through the use of computers libraries do not have to store original materials, for e2ample, important documents, newspapers, artwork, etc. The librarians work is also made easier as the user can locate and retrieve materials themselves using the terminal system. =. Aa*=i*, 1 computers are making work easier for bank customers through the use of AT- 'Automated Teller -achines(. !ith the use of cards and personal identification numbers '%7( a customer may perform cash withdrawals, deposit money, query hisEher account, transfer money from one account to another, make payments etc. at the end of the transaction, the customer receives a paper copy confirming the activitiesEtransaction. AT-<s work day and night and allow their customers to access their accounts regardless of the time and area they are in. 4anks also hold customer information and account information in computers. This provides tellers with a quick and easy way to access and update client particulars. &ses of computers have enabled services such as 59T%." electronic banking, credit cards, home banking, etc, a possibility. 1A1 LESSON 1-( (T." INFORMATION RETRIE9AL 'i( $haracter 1 a character can be a letter of the alphabet, numbers, or symbols. $haracters are usually combined to present data and every individual element in a database is called a character. 9or e2ample a, C, :, Y, G. A space is also a character. $haracters are combined to create fields. The si;e of a field is determined by how many characters are there in the field. 'ii( 9ields 1 a field is usually an important feature on the sub)ect whose data is stored in a record. A field is a set of related characters, for e2ample, surname, first name, D number, etc. 'iii( 0ecord 1 a record contains a number of fields which is related, i.e., a record will contain information on a particular sub)ect. 9or e2ample, in a file of student grades a record may contain the following fields* student name D number 9orm "ub)ects 6rade 'iv( 8ey field 'primary key( 1 a key field is a field that can be used to locate a particular record. A key field uniquely identifies a record, for e2ample, in the previous list the best key field would be the D number because each individual student will have a unique D therefore making each different. "ometimes one key field is not enough to identify a record. 9or e2ample, in an airline reservation system a passengers name is not a useful primary key because there can be more than one passenger with the same name on the same flight. n the same way a flight has so many passengers on it and the same flight goes up many times each day making flight number an unsuitable key field, but a combination of passengers name, flight and date of flight will be able to uniquely identify a record. 'v( 9iles 1 is a collection of data stored in a secondary storage device. t is composed of a number of related records containing information about a particular sub)ect. 9or e2ample, a file of student grades will contain a record for each student, )ust like a paper file containing pages of gathered information about a particular sub)ect. 'vi( Database 1 is a collection of related ifles that can be retrieved when needed. t is usually stored in the secondary storage devices, for e2ample, a hard disk, magnetic tape or a floppy disk. The data in a database is accessed using a database management system 'D4-"(. 1A# 'vii( Database -anagement "ystems 1 A D4-" is an application software that is used to create a database, edit and control the access of information in a database. t is a program that manages the functions of a database. "ummary character 1 single alphabet, symbol or numbers field 1 a collection of logically related characters record 1 a collection of related fields ' on a particular sub)ect( file 1 a collection of related records 'n a particular sub)ect( a database 1 a collection of related files. 1A, LESSON 1-- Data0ase Ma*a,eme*t S$stems A D4-" has five functions* 1. $reate files #. &pdate files ,. -aintain files :. %rovide access to files 'nterface( =. $ontrol the integrity and security of files 1. $reate files A D4-" provides a structure for data in the database and identifies the relationships among the data. #. &pdate files A D4-" allows for the updating in the entry of new data and it sees that new data conform to the defined structures already e2isting. ,. -aintain files A D4-" corrects errors of misspelling, omission in the content, e.g. filename or data. t also allows for changes in the structure of the database in cases where important information may have been left out or useless information included. :. %rovide access to files Data may be accessed through the use of command languages where the user types in the commands. This systems are also called prompting systems Data may also be accessed through menu based systems where the users select commands through menu 'made possible through 6&(. Almost all databases today utili;e the menu systems. Depending on the users needs information can be retrieved in various forms. =. $ontrol the integrity and security of files -ost systems perform the following to control the integrity and security of files* 3 -aintain conformity to the database definition by, for e2ample, comparing new entries to the database definition to see that no errors are made. 3 $ontrol updating particularly when many users access the database simultaneously. 3 Assure the e2istence of data in the case of technical problems which may cause loss of data. This may require complicated techniques in restoring data. 3 $ontrol access to data to ensure that users can only see the data that they have legal access to 'authori;ed users(. 1A: LESSON 1-/ Resou)e Lo)=i*, 0efers to maintaining a database so that its data are accurately accessed and problems which can arise from having two or more users working simultaneously on the data can be prevented, for e2ample, double booking of a plane seat. Co*te*t Eo a*# Stu)tua' Eo $ontent error refers to wrong input or misspellings whereas structural error refers to errors or flaws in the programming or definitions of the database. $ommunication with a database may be through a menu system 'menu driven system( or by issuing commands in a prompting system 'command drivenEcommand based system(. Access to a database must be controlled in order to maintain integrity and security of data. Comma*# Aase# S$stems 6ives the user other options but do not remind them of those available options. $ommand based systems offer a character based interface where the user has to master the various commands in the language used in order to use the program effectively. These systems require languages like D." and &7J. Me*u Aase# S$stems Are easier to learn and they will always provide the users with a list of available options via a menu. -enu based systems were initially available as character based interface but have been made more popular through the introduction of 6& operating system '!indows, -acintosh, +inu2(. -enu based interface makes it easier to locate available options. The user does not necessarily have to master the language. Therefore a menu based system is one where available commands are kept and e2ecuted through a menu. 1A= LESSON 1-1 (T.( MANACINC INFORMATION t is important that we identify relevant information for the creation of database* dentify important information to act as fields in a database This is made possible through the use of data processing techniques where it is important that relevant data is recognised. t is necessary that relevant and important information are chosen as fields. The choice of fields is an important step in a database design. t is imperative to ensure that the fields satisfy the overall requirements of the database. .nce a database has been created it is wise to refrain from inserting new field since a lot of records would have to be updated. Therefore, a good database is one whose fields have been appropriately thought up and designed 'structured( and does not need any addition or removal of fields. 9ields should be categorised according to the following data types. These data types would be used to identify the type of data entering the associated fields* 'i( $haracterEte2t 1 contains characters, alphabets, numbers and special characters and other entries that do not need calculations to be done upon them. The number of characters in a field needs to be identified. 'ii( 7umeric 1 this data type is used to represent numbers. These fields are designed according to future calculations. 'iii( DateETime 1 contains date andEor time usually in the form of mmEddEyy or ddEmmEyy. This field does not allow any entry apart from date or time. 'iv( +ogical 1 contains ]y< and ]t< for yes and true or ]n< and ]f< for no and false. 'v( $urrency 1 this data type is used to represent fields that hold monetary value. 'vi( -emo 1 contains comments made about records and other fields within the database. 1AA LESSON 1-3 Data 5ntry .nce fields have been defines, a structure is set for the database 'data dictionary(. llegal entries 'entries that do not comply with the field structure( will not be accepted. n designing the fields of the database the format of the field should be kept in mind. A Mo#e' Data0ase Stu#e*t I*&omatio* Data0ase "tudent Academic 9ield 7ame Type Description "i;e 9irst 7ame Te2t $ontains students first name #? .ther 7ames Te2t $ontains students other names ,? Date of birth DateEtime !hen the person was born C Test 1 7umeric -arks of first test , Test # 7umeric -arks of second test , Test , 7umeric -arks of third test , %assE9ail +ogical ]y< for pass, ]n< for fail 1 $omment -emo $omments on conduct Soti*, Re)o#s Database entries in a file can be displayed in any logical order. The sorting tool can rearrange records in both ascending and descending order. "orting can be done by specifying one or multiple fields and will be effective on any field other than data type memo. 0ecords are kept together when sorted. 1AB LESSON 1-4 T%o pats o& a Data0ase 'i( Data Dictionary 'design view( A data dictionary contains the description of the data used in a database for a particular item of data. t defines the name used for a field 'fieldname(, data type 'te2t, memo, etc( and description. t also specifies the property of each field, the number of characters in each field 'field si;e(, the caption whether it is a key field etc. The design view of -" Access displays the data dictionary for a database 'it contains the records entered by the user which can be seen in the datasheet view in -" Access(. 'ii( _ueries A query is used to ask a question is a database. _ueries are used to find and display selected fields from records in a database. These records usually meet complicated criteria which are designed by the user. _ueries are designed for situations where the user needs to know which record have fields in common. _ueries are often preferred as sources for reports. 52ample 'leave 1? lines( Repots Are used to display the user selected information 'fields from the database( reports are usually printed out in hard copy for presentation and to be filed. 0eports are best designed using queries but tables can also be used. The reason why queries are best used in reports is that usually only some fields are required for a report so if a query is created its entire contents can be used to create a report making the process much faster. "ome reports are produced regular therefore it is a good idea to have their own query. Fi'tei*, Another way to locate information is to apply a filter to the database. A filter displays the subset of records that meet certain conditions of criteria. 9or e2ample if you were to enter the criteria of 7ew Rork in a city field, only these records would be displayed. nformation is located and then displayed either by finding records filtering through the records or query the database. Fi'te po,ams allow parents as well as organisations to blockout selected sites and set time limits. These programs can monitor use and generate reports detailing the total time spent on the internet and time spent at individual website, chat groups and news groups e.g. cyber patrol, cyber sitter and net nanny. 1AC Table* 4ook Details Table* "upplier Detail 'leave 1= lines( 1A@ LESSON 1-5 The Nee# &o Data0ases Databases are necessary because organisation have different files on the same sub)ect. These files need to be integrated together to provided purpose and meaning to the data kept in within. Therefore databases are used to integrate individual items of data and transform them into useful information. 9or both individuals and organisations, there are many advantages of having databases. 9our advantages of having databases are* 1. "haring n organisations, information from various departments can be readily shared with other departments and users. #. "ecurity &sers are given passwords or access to only the kind of information they need to know. 9or e2ample, the payroll department may have access to employees pay rate but other departments may not. Access is restricted to authorised users only. ,. 9ewer 9iles !ith several departments having access to one file, there are fewer files in the information system. 52cess storage 'e2tra copies of information( called data redundancy is also reduced. -icrocomputers are linked by networks to file servers which give access to databases located on and shared to the servers. :. Data ntegrity .lder filing systems did not have data integrity i.e. a change made in a file in one department might not be made in another copy of the file holding the sae information in another department. This can cause serious problems and conflicts when data is used for important decision affecting both departments. Data integrity is when changes made in one file to a particular data updates are made in other files which contain the same data as well. 1B? LESSON 1/8 Disa#+a*ta,es o& #ata0ases 1. $ost of initial conversion is very high as new equipment 'hardware and software( and e2pertise are needed. #. $omple2ity of design ,. &sers need special training to use database :. /ulnerability 3 data in a database can be stolen by hackers and crackers, lost due to virus, destroyed during a fire or natural disasters etc. 1B1