Year9 Ict 2ND Term Note

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

CLASSIFICATION OF COMPUTERS

Computer, known as an electronic machine which accepts data


and instruction as an input, process the data items using the
instruction to produce information as an output. A computer is
an electronic machine that will accept some input into its
memory (data and instruction) processes it and produces some
results that are sent to the user through output unit.
Computer can be classified or typed in many ways some
common classifications include;
1. According to Generation
2. According to Purpose/Versatility
3. According to Type
4. According to Size
ACCORDING TO GENERATION
FIRST GENERATION COMPUTERS: During the period of
1940s-1950s, first generation of computers were developed.
The first generation computers used vacuum tubes for
circuitry and magnetic drums for memory, and were often
enormous, taking up entire rooms.
SECOND GENERATION COMPUTERS: The computers built
in the 1950s and 1960s are considered the 2nd generation
computers. These computers make use of the transistors
invented by Bell Telephone laboratories.
THIRD GENERATION OF COMPUTERS (1960s– 70s): The
3rd Generation computers replaced transistors with
“integrated circuits” or I.C. was inverted by Jack Kilby as
Texas instruments in 1958. Example of some main frame
computers developed during this generation are-
ICL(International computer limited.) CDC(Control Data
Corporation.)
FOURTH GENERATION (1970s-1980s): The
microprocessor brought the fourth generation of computers,
as thousands of integrated circuits were built onto a single
silicon chip. What in the first generation filled an entire
room could now fit in the palm of the hand. The Intel 4004
chip, developed in 1971, located all the components of the
computer— from the central processing unit and memory to
input/output controls—on a single chip.
FIFTH GENERATION COMPUTERS (1980s-present) : Fifth
generation computing devices, based on artificial
intelligence, are still in development, though there are some
applications, such as voice recognition, that are being used
today.
B. ACCORDING TO PURPOSE:
1. General purpose computers: These are designed to perform
a range of tasks. They have the ability to store numerous
programs, but lack in speed and efficiency. Most digital
computers are general purpose computers and used in business
and commercial data processing. They are used to prepare pay-
bills, manage inventories, print sales report and so on.
2. Specific purpose computers: These are designed to handle a
specific problem or to perform a specific task. A set of
instructions is built into the machine. Most analog computers
are special purpose computers. These special purpose
computers are widely used in industrial robotics.
C. ACCORDING TO TYPES OR DATA HANDLING.
. Analog computers : These work on the principle of measuring,
in which the measurements obtained are translated into data.
Modern analog computers usually employ electrical parameters,
such as voltages, resistances or currents, to represent the
quantities being manipulated. Examples are: thermometer,
speedometer, petrol pump, etc
2. Digital computers: These are those that operate with
information, numerical or otherwise, represented in a digital
form. Such computers process data into a digital value (in 0s
and 1s). They give the results with more accuracy and at a faster
rate. That is, they process data in discrete numerical form.
Examples are: calculator, adding machine, counting machine,
etc.
3. Hybrid computers : These incorporate the measuring feature
of an analog computer and counting feature of a digital
computer. For computational purposes, these computers use
analog components and for storage, digital memories are used.
They are useful in the control of manufacturing and processing.
D. ACCORDING TO SIZE
1. Super Computer
The fastest and most powerful type of computer.
Supercomputers are very expensive and are employed for
specialized applications that require immense amounts of
mathematical calculations. For example, weather forecasting
requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations, nuclear
energy research, and petroleum exploration.
2. Mainframe Computer

This is a large, powerful and expensive type of computer. It is


multi-user system that is to say that many people use it at the
same time. The mainframe are used for processing very large
amount of data. The most powerful mainframe are called super
computers. Examples include; IBMS/390, Control data cyber
176, Amanda 580.

3. Mini Computer

The ‘‘age of the mini’’ started in the 1960s. The creation of


integrated circuit suitable for computers enable designers to
shrink the size of the computer. Minicomputer frequent to
referred to as mid- range computers. In general, a minicomputer
is a multiprocessing system capable of supporting from 4 to
about 200 users simultaneously.
Examples
a. IBM MIDRANGE COMPUTERS
b.Prime 9755-hp3000
c. IBM system 360-IBM AS/400

4. Micro Computer or Personal Computer


This is the most commonly type of computer in use. It is
smallest, cheapest and less powerful than mainframes and
minicomputer. In the microcomputer, all the components are
integrated in one system known as the system unit.
These computers include:
 Game consoles
 Laptop and notebook
 Desktop computers
 Tablet computer
Desktop computer: A case and a display but under and on the
desk.
Game consoles: Fixed computer specialized for entertainment
purposes (video games).
Laptop and notebook: They are portable and are in one case.
Tablet computer: They are like laptops but with a touch
screen, entirely replacing the physical keyboard and so many.

ASSIGNMENT:
List and explain ten (10) different ways in which ICT has
assisted in social development.

UNITS OF STORAGE IN COMPUTER


MEMORY UNIT
The computer memory is the storage locations where data, programs and
information are stored. The two main types of memory are:
1. PRIMARY MEMORY/MAIN MEMORY
2. SECONDARY MEMORY/AUXILIARY MEMORY
PRIMARY STORAGE (MAIN MEMEORY)
The primary storage represents the core or internal storage areas of the
computer system. It is where information and programs are stored for
immediate processing by the CPU; for this reason, the main memory is also
called Immediate Access Storage(IAS).
The two types primary storage are:
A. The Read Only Memory (ROM)
B.The Random Access Memory (RAM)
A.ROM: This is a non-volatile memory that retains data stored on it even
after the computer is powered off. The data inside the ROM cannot be
changed. The operating system boot records are stored inside the ROM.
There are three variations of ROM, this includes:
i PROM: This means Programmable Read Only Memory. It is a
version of memory chip that can be programmed by the user. Once the
PROM has been programmed , the information written is permanent
and cannot be erased or deleted.
ii EPROM: This stands for Erasable Programmable Read Only
Memory. It is a version of memory chip that can be erased and
programmed. It requires an Ultraviolet light to erase its contents.
iii EEPROM: This means Electrically Erasable Programmable Read
Only Memory; this can be erased and reprogrammed using an electrical
charge without the need of removing the chip from the computer
system. EEPROM is used to store information for the computer’s
BIOS.
B.RAM: The RAM is the part of the primary memory that holds the data
and programs that the CPU is processing. The CPU reads and write
into the RAM as often as required. They are volatile because the
content is lost when the computer is powered off.
SECONDARY STORAGE
The secondary storage or auxiliary storage is any storage device that is
used to store data, information and programs outside the primary
memory. They are non-volatile and higher storage capacity, but the
access time is slow compared to the primary storage. It is also referred
to as backup storage.
The following are common types of secondary/ auxiliary storage
devices:
i Floppy disk ii Hard disk iii Flash drive iv Optical Disks Compact
Disk(CD) and Digital Video Disk (DVD).

DIFFERENCES BETWEEN PRIMARY AND SECONDARY


STORAGE
PRIMARY STORAGE SECONDARY STORAGE
1. Fast storage access Slow storage access
2. Expensive to purchase and maintain Cheap to purchase and
maintain
3. Low storage capacity Large storage capacity
4. Connected directly to the Not connected directly to the
Processor
Processor .
5. It is usually volatile It is non-volatile

Computers understand “0”s and “1”s which are referred to as binary .The “0”
stand for “off” meaning an electrically discharged state while 1 stands for “on”
meaning an electrically charged state. We have various units of storage, they
are as follows:
1. Bit
2. Nibble
3. Byte
4. Kilobyte
5. Megabyte
6. Gigabyte
7. Terabyte
8. Word
1. Bit: The bit or binary digit as it is called, is the basic unit of information
in the computer. It is expressed as 0 and 1 in binary notation. E.g 11011
2. Nibble: This is a storage unit that is made up of 4 bits. It is equal to 4 bits
or half of an octet. An octet is equal to eight bits.
3. Byte: The byte is a unit of digital information in computing. It is a
combination of bits used in representing a particular letter or character. It
is equivalent to 2 nibbles or 8 bits (11001101) . The size of computer
memory is determined by bytes. That means 8bits equals 1byte.
8bits =1byte
1024bytes = 1 kilobyte
4. Kilobyte : The kilobyte is to measure memory space. It is used to
measure memory units just as the kilometer is used to measure
DISTANCE and kilogram for measuring WEIGHT.
Since 1,000 grammes gives us 1 kilogram. Therefore, 1,000 bytes is
equivalent to 1 kilobyte. A megabyte on the other hand will be 1,000,000
bytes while a Gigabyte is 1,000,000,000 bytes respectively.
The hard disk of computers, the memory spaces, flash drives and other
storage media are measured in kilobyte, megabyte and gigabytes
respectively.
8 bits = 1byte
1024bytes = 1kilobyte (thousand of byte)
10242bytes = 1megabyte (millions bytes)
10243byte = 1Gigabyte (billions of bytes)
10244bytes = 1Terabyte (trillions of bytes)
5. Word: A word is the smallest unit of information that can be transferred
at a time. A word is made up of 2bytes, that is, 4 nibbles or 16 bits.
6. Double word: Double word is equivalent to 2words which is 4bytes
(32bits)
7. Quad Word: This is equivalent to 4words, that is 2 double words which
8bytes (64bits)

ASSIGNMENT 1
Do a research work on Windows 95, Windows 98, Windows 2000 and
Windows ME.
(State their relationship and differences).
ASSIGNMENT 2
Do a research work on COMPUTER VIRUS and ANTI-VIRUS.

GRAPHICS PACKAGE
Definition of Graphics
Computer graphics are graphics created using computers and,
more generally, the representation and manipulation of image
data by a computer.

Examples of Graphic Packages


Common examples of graphic packages are:
1.Paint
2.Corel Draw
3.Adobe Photoshop
4.Harvard Graphics
5.Print Master
6.Ventura
7.Photoshop Pro
8.Adobe Page Maker

The Features of Corel Draw


Title Bar: The title displays the name of the CorelDraw file on
which you are working. It is also used to reposition the
CorelDraw windows on the screen.
Menu Bar: There are 11 down menus. All menu commands are
found in these pull down menus.
Rulers: Ruler serves as a positioning and sizing aid. They can
be turned off optionally. In addition, you can drag guidelines off
the rulers to serve as drawing aids.
The Scroll : The Scroll Bar allows you to shift the page
horizontally and vertically.
Drawing windows: The large white portion of the screen is the
drawing window. The rectangle with the drop shadow is the
printable page.
Use the entire area for working. Use the white space on either
side of the page as pasteboard or as a test area.
Roll-Up Windows: The transform (Position) Roll –up is shown on
the left. Although they are not permanent part of the interface
( they can be if you want), Roll-up windows are nicely packed
persistent dialog boxes that remain on the screen as long as you
want them. You can use them to control many of CoreDraw’s
operations. Their beauty lies in the fact that they can remain
active for playing quick “ what0ifs without going through the
longer process of involving a standard menu dialog box.

Word processing
What is Word Processing?
This is the use of Computer software to create, edit, view, store,
retrieve and print text documents.
A text document is a written communication like letters, reports,
memos, and so on. The software that is used for Word
processing is called a Word Processor.
What are Word Processors?
These are used in place of typewriters because of the quality of
outputs, ability to replicate copies without having to retype or
photocopy, etc.

Examples of Word Processors are :


i. Microsoft Word,
ii WordStar,
iii.WordPerfect,
iv Lotus Notes,
v Perfect Writer,
vi. MultiMate Advantage,
vii Professional Write,
viii Notepad etc.

APPLICATION AREAS OF WORD PROCESSING


Word Processing is used in the following areas:
1.In office
2.For publishing
3.In Journalism
4.In Education
5.For writing articles, etc.

MICROSOFT WORD
Microsoft Word is a word processor designed by Microsoft
Corporation, U.S.A.
A WORD Processor can be defined as application software
that helps in the production of a document. Microsoft Word
is a Word Processing software. You can use it to type letters,
create or edit reports, and other documents.
It is a commonly used Word processor today because of its
special features. There are different versions of Microsoft
Office Word. Examples are: Ms office 2003, Ms office 2007,
Ms office 2010, Ms office 2013.
FACILITIES AVAILABLE IN A WORD PROCESSOR
1.Typing document
2.Editing document
3.Storing or saving documents
4.Move, copy and paste
5.Insert, remove words, sentences or paragraph
6.Typing using different fonts types and sizes

EDITING FEATURES OF A WORD PROCESSOR


Editing features in Ms Word include:
1.Copy, Cut and Paste
2.Format Painter
3.Find and Replace
4.Go to
5.Spelling and Grammar
6.Thesaurus
7.Word Count.

1.Copy , Cut and Paste : You can use word’s CUT feature to
remove information from a document. You can use the
PASTE feature to place the information you cut anywhere in
the same or another document. In other words, you can
move information from one place in a document to another
in the same or different document by using the CUT and
PASTE features.
The office clipboard is a temporary storage area where
copied and cut files are kept . When you copy or cut, Word
stores on the clipboard as often as you like. When you copy
or cut a document, the copied or cut data can be pasted into
a new location.
2.COPYING A DOCUMENT : Copying a document means
duplicating the document. The original document will still
remain while the duplicate of it will be found in a new
location. To copy a document, five major methods are
involved and are;
i Shortcut method ii Keyboard method iii Drag and Drop
method iv Ribbon bar method
v Right mouse method
i Shortcut Method :
 Highlight the portion of a document to be copied
 Right click on the highlighted text
 Select copy
 Position the insertion point in a new location
 Right click in an empty space
 Select paste
ii Keyboard Method:
 Highlight the document to be copied
 Press the keys Ctrl + C to copy
 Position the cursor on the insertion point
 Press the keys Ctrl + V to paste
iii Drag and Drop Method
 Highlight the document to be copied
 Hold down the Ctrl key as you drag the highlight
to a new location
 Release the mouse button
iv Ribbon Bar Method
 Highlight the portion of the document to be copied
 Click copy on the Home Ribbon
 Position the insertion point in a new location
 Click on paste from the Home Ribbon.
NOTE: To cut a document means to move the document from its
original location. The document or data seizes to appear in
former location. All the steps involved when copying document
are equally applicable with the cut method but the only
difference is that, instead of selecting copy now, you have to
select CUT before you PASTE.
To CUT a document with the Shortcut Method
 Highlight the document you want to cut
 Right click on the highlights and select cut
 Position the insertion point on a new location
 Right click on an empty space
 Click on paste
2. Find and Replace: When a mistake is made all over a
document, for example, you mistakenly typed Fred instead of
Fried, the Find and Replace feature helps to locate the errors
and quickly replace them with the expected text. To apply the
Find and Replace feature in a document, follow these steps:
 Click on Home Ribbon
 Click on the Find icon drop down arrow and click
Find
 Click on the Replace Tab.
 Type the error text in the Find What text box and the
corrected text in the Replace if you want it one after
another.
 Click Cancel button to abort the operations.
3. Spelling and Grammar: They check whether a document is
error free both in spelling and grammar. To confirm if a
document is error free using the spelling and grammar tool,
follow these steps:
 Click on Review button
 Click on the Spelling and Grammar icon
 It selects a sentence and asks you to ignore or click
on its suggestion and click change. Select the one
that applies.
 Click next sentence to move to next error
 Click close if you don’t want to continue
 When Spelling and Grammar action is completed , a
dialog box appears, click OK.

4. Formatting A Document: Formatting a document makes the


document presentable. Formatting entails the following:
A. FONT
 Font Face/Style: The text outlook format of a
document: Microsoft has embedded the following
font face: Arial, Times New Romans, Tahoma,
Elephant, Freestyle Script, Imprint MT Shadow,
etc.
To set a font face or style for your text , do the
following :
 Type the text
 Highlight the text
 From the Home Ribbon, click on the font face
(Font (Ctrl + Shift + F)).
Click the drop down arrow and select a font
face of your choice.
 Font Size: This displays text sizes of your choice:
Microsoft has embedded font size ranging from 8-
72. To select a font size for your text, do the
following:
 Type the text
 Highlight the text
 From the Home Ribbon, click on the
Font size.
(Ctrl + Shift + F)
 Click the drop down arrow and select
a font size of your choice.
 Font Colour: This displays colour effects on text
such as red, green, blue, etc.
To select a font colour for your text, do the
following:
 Type the text
 Highlight the text
 From the Home Ribbon, click on the
icon drop down arrow.
 Click on the colour of your choice.
Font Effects : This displays other effects on
such as strike through, subscript, superscript,
change case, paragraph, alignment,
indentation, etc,
FEATURES OF WORD PROCESSOR
1.A good word processor should have the ability to create,
save and retrieve documents.
2.It should have the ability to find and replace words in a
document
3.It should be capable of wrapping your texts
4.Generate multiple copies of a document with the aid of the
printer
5.Every word processor should have the ability to manage files
in the computer.
6.Ability to display graphics
7.A good word processor should have the ability to spell check
your document
8.Ability to mail merge documents
9.Ability to format a document and apply headers and footers.
SPREADSHEET
A spreadsheet is a sheet of paper that shows accounting or other data in
rows and columns; a spreadsheet is also a computer application
program that simulates a physical spreadsheet by capturing, displaying,
and manipulating data arranged in rows and columns.

Examples of spreadsheet programs


1. Google Sheets -
2. iWork Numbers - Apple Office Suite.
3. LibreOffice
4. Lotus 1-2-3
5. Lotus Symphony - Spreadsheets.
6. Microsoft Excel.
7. OpenOffice
Typical Uses of Spreadsheets
1. Budgets
2. Financial/Accounting Reports
3. Taxes
4. Students' Grades
5. Columns of Text
6. Graphs
Excel is the program we use to work with spreadsheets.
An Excel file consists of two parts: worksheets and workbooks.
Worksheets are the actual spreadsheets that contain the data in which you can
organize and manipulate.
Workbooks are the entire Excel files. Workbooks can have multiple
worksheets or as few as one. Each worksheet in a workbook will have a unique
name that can be accessed on the tabs at the bottom of the screen.
Definition of Terms /Parts of the Spreadsheet
~ Columns - The vertical areas of the spreadsheet; They are labeled A-Z, AA-
AZ, BA-BZ, etc..., there are 16,384 Columns in MS Excel.
~ Rows -  The horizontal areas of the spreadsheet; They are labeled
numerically; There are 1,048,576 Rows in MS Excel
~ Cell - Rectangular area in which a row and column intersect
~ Active Cell - The selected cell with the heavy border around it
~ Cell Address - A description of which row and column intersect to form the
cell. Cell A1 is the address for the first cell in the first row and first column.
The correct way to name a cell location is Column then Row.
~ Name Box - The area that displays the address of the active cell
~ Formula Bar - The area that displays the contents of the active cell. You
may edit your data here
Tip: When highlighting in a spreadsheet, the inside color of the first cell will
be white.
-------------------------------------------------------------------------

Spreadsheet Formulas
* An instruction to calculate a number
* The formula is entered in the cell where the answer should appear
* After you hit the "Enter" key, the answer is displayed in the active cell while
the formula remains visible in the formula bar
*The four math operations are: + for add; - for subtract; * for multiplication; /
for divide
Two Rules When Creating Formulas:
~ A formula always starts with =
~ A formula uses cell addresses, not the values themselves. (This way, if the
values in the cell locations change, the answer will automatically change.)
--------------------------------------------------------------------------
Spreadsheet Functions
* Built-in formulas that perform special calculations automatically.
- Sum functions add up a column of figures. (SUM)
- Average functions averages a group of numbers. (AVERAGE)
- Count functions count all the blank spaces in the range. (COUNT)
- Minimum functions indicate the lowest value in the range. (MIN)
- Maximum functions indicate the highest value in the range. (MAX)
- The IF STATEMENT is a logical function which sets up a conditional
statement to test data. the truth or falsity of the condition will determine the
results of the statement.
* Functions always start with =
*There are 3 parts of a function:  1) =
                                                      2) Function Name
                                                      3) Argument - The range of cells that the
function affects and it   lists inside parentheses, first cell : last cell
* Example: to add cells=B2 + B3 + B4 + B5 + B6 you could use the function:
=SUM(B2:B:6)
ICT AS A TRANSFORMATIONAL TOOL
INFORMATION COMMUNICATION TECHNOLOGY (ICT)
ICT – ICTs stand for Information and Communication Technologies and
are defined, for the purposes, as a “diverse set of technological tools
and resources used to communicate, and to create, disseminate,
store, and manage information.” These technologies include
computers, the Internet, broad casting technologies (radio and
television), and telephony.
AS A TRANSFORMATIONAL TOOL:  Information communication
technology is so important in the world today that it makes it
necessary for every person to be competent in the use Information
communication technology for the task they have to accomplish.
Organization of all sizes, even the smallest schools and businesses,
rely on computer to help them operate more efficiently and
effectively.

The meaning of transformation


Transformation deals with change. It could be from old to new
stage of the societal demand. Transformation comes as a result
of peoples’ desire and seeks for improvement in their activities.
Transformation tools
Transformational tools are those devices or instrument used to
transform things from old system to new system
Those tools are:
1.  Telephone (GSM)
2.  Computer
3.  Radio
4.  Television
5.  Internet
6.  Satellite
7.  Fax 
8.  Pager
9.  Telex machine

ADVANTAGES OF INFORMATION COMMUNICATION TECHNOLOGY


These are some the advantages of information communication
technology
1. COMMUNICATION: Communication has become cheaper, quicker
and more efficient. We can now communicate with anyone
around the globe by the simply text messaging them or sending
them an e-mail for an almost instantaneous part of the world
with the help of video conferencing.
2. COST EFFECTIVENESS: Information communication technology
helps to computerize the business process. Thus streaming
business to make them extremely cost effective, money making
machine. This in turn, will increase productivity, which will also
increase profit and that means better pay and less strenuous
working condition.
3. BRIDGING THE CULTURAL GAP: Information communication
technology has helped to bridge the cultural gap helping people
from different cultures to communicate with one another and
allowing for the exchange of views and ideas, thus increasing
awareness and reducing prejudice.
4. MORE TIME: Information communication technology has made it
possible for business to be open 24×7, all over the globe. This
means that a business can be open anytime, anywhere, making
purchase from different countries easier and more convenient. It
also means that you can have goods delivered right to your door
step without having to move an inch.
5. CREATION OF NEW JOBS: The best advantage of information
communication technology is the creation of new and interesting
job. Computer programmers, system analyzers, hardware and
software developed and web designers are just some of the new
job opportunity created with the help of it.
6. VERSATILITY: Computer can perform vast activities effectively.
Where the human imagination fails, computer comes into the
picture, for instance, observing the motion of very fast moving
particles. They can also work with different types of data and
information like graphics and audio visual character.
 DISADVANTAGES OF INFORMATION COMMUNICATION TECHNOLOGY
1. UNEMPLOYMENT: While information communication technology
may have streamlined the business process, it still has created
job redundancies, downsizing and outsourcing. This means that a
lot of lower and middle level jobs have been done away with,
causing more people to become unemployed.
2. PRIVACY: Though information communication technology may
have made communication so easy, quicker and more convenient,
it has also given rise to privacy issues, from cell phone signal
interceptions to e-mail hacking, people are now worried about
their private information becoming public knowledge.
3. LACK OF JOB SECURITY: Industry experts believe that the
internet has made job security a big issue since technology keeps
advancing each day. This means that one has to be in a constant
learning mode, in order for job to be secure.
4. ADDICTION: People tend to get addicted to the internet,
especially the youth. When they are supposed to view, read or
download something beneficial to them, they will be on the
computer playing games, watching movies, etc
5. PORNOGRAPHY: The internet serves as a storehouse for several
information resources including good and bad. Youths are
exposed to malicious websites on the internet where they watch
pornographic movies. This affect them psychologically and
emotionally
6. CYBERCRIME: Some people disguise themselves as businessmen
and women on the internet. They defraud people by obtaining
money and other valuables from them using trick
7. PLAGIARISM: The invention of ICT has made plagiarism rampant.
Plagiarism is the act of coping other peoples’ work and
presenting them as ones’ own.
INFORMATION COMMUNICATION TECHNOLOGY GADGETS
An information communication technology gadget involves the
technology and the applications which are used in creating
communication, transmission and storage devices. There are
many ICT gadgets which are used in communication technology. Some
of them are:
1. GLOBAL SYSTEM FOR MOBILE (GSM): Global system for mobile
communication is an ICT gadget and second generation digital
technology. GSM is top-class standard gadget relied on by millions
of people worldwide. Today’s GSM is a huge success wireless
technology and an unprecedented story of global achievement. It
is approximated that 80 percent of the world used GSM
technology while making wireless calls.
2. FAX MACHINE: The fax machine is a device that can send or
receive picture and text over telephone line. The idea of fax
machine has been around since 1842, when Alexander Bain
invented a machine capable of receiving signals from telegraph
wire and translating them into images on paper. However, fax
machine did not become popular until mid 1980s. A fax machine
consist of an optical scanner for digitizing image on paper, a
printer for printing incoming fax message and a telephone for
making the connection.
1. TELEPHONE: Telephone is an electronic telecommunication
device used for transmitting and receiving sounds. The most basic
function of a telephone is to allow communication between two
points, whether they are near or far from each other.
2. COMPUTER SYSTEM: The computer system will include the
computers along with software and peripherals devices that are
necessary to make the computer function. Every computer
system requires an operating system.
3. PAGER: A Pager is a small telecommunication device that
receives and sends alert signals or short messages. It is the size of
a pocket calculator and has built in miniature keyboard and LCD
screen that can display several lines of text.
4. TELEX: Telex is a communication system consisting of small
typewriters connected to a telephonic network to send and
receive signals or message.
GENERAL BENEFITS OF ICT
1. Greater efficiency throughout the school.
2. Communication channels are increased through email, discussion
groups and chat rooms
3. Regular use of ICT across different curriculum subjects can have a
beneficial motivational influence on students’ learning.
4. It provides faster, cheaper, timely and wider access to information
5. It removes distance barriers in the communication, since any of the
world can be connected
6. It speed up transmission and processing of information
7. It aids learning by providing access to a wide range of information
8. It makes business transaction easy since distance, time and space are not
relevant

FUNDAMENTAL COMPUTER OPERATIONS


DESCRIPTION OF BOOTING PROCESS
Booting is the process of starting the computer and loading
the operating system. This is the process where the computer
prepares itself for proper operation. When the operating
system is loaded, the icons on the desktop in windows are
displayed.
TYPES OF BOOTING
There are two types of booting.
1. COLD BOOTING : This is the process of starting the
computer from a switched off state.
2. WARM BOOTING: This is the process of re-starting the
operating system without switching off the computer. For
example, in windows this can be done by pressing ‘Alt’ and
‘CTRL’ with two left fingers and ‘Del’ key with a right finger.
COMPONENTS OF A WINDOWS DESKTOP
The basic components of the windows desktop are:
1. Icons: An icon in Windows is a small picture or object that
represents a file, program, web page, or command. Most of the
time, the icon picture relates to the function of the item that it
represents. For example, if the icon is attached to an e-mail
program, it might be a picture of a letter. Icons are located on
the desktop, in the start menu, and other various places. If
you are using Windows 95, 98, 2000 or XP you can see
several icons on0mn the desktop.
2. Taskbar: A taskbar is a visual device on the desktop
that typically shows the user which applications (tasks) are
currently active and running. Some systems, also include
icons for commonly –used utilities such as the system clock
and antivirus software. In some systems, the user is allowed
to modify the contents, location, or appearance of the taskbar.
It is usually found at the bottom of the desktop.
3. Background: A background is also called a desktop. It is
the area where icons and windows are displayed. It is the
beginning point after the Operating System is fully loaded;
the desktop appears for the user to issue an instruction or
command. The desktop is the windows interface and your
primary usage area.
RUNNING AN APPLICATION PROGRAM
Loading Microsoft Word
The word –processing package that is covered here is the
Microsoft Office Word. It is about the easiest to operate.
To load Microsoft Office Word, take the following steps:
A. Click on the start button
B. Go to ALL PROGRAMS (a menu pops up)
C. Locate Microsoft Office (a sub menu pops up)
D. Click on Microsoft Word Office

THE PROCESS OF SHIUTTING DOWN THE COMPUTER


SYSTEM
Before you turn off your computer, you must close all opened
windows application packages to ensure you do not lose any
data or configuration.
To shut down, you need to follow the steps listed below:
A. Click on START button
B. Navigate to TURN OFF COMPUTER option and click.
The following shut down options are
displayed:
i Shut down the computer
ii Restart the computer
iii Standby
iv Cancel
C. Select the option of your choice and wait for the
system to respond.

Definition of Internet and other terms:


What is INTERNET?
The Internet is a global computer network providing a variety of information
and communication facilities, consisting of interconnected networks using
standardized communication protocols(TCP/IP) to serve billions of users
worldwide.
Browse: In general, browse refers to reading and scanning through data.
Browsing is commonly used to describe when a user reads through pages on
the Internet or looks through the contents of the files on their computer.
Browser: A web browser (commonly referred to as a browser) is a software
application for retrieving, presenting and traversing information
resources on the World Wide Web. An information resource is identified
by a Uniform Resource Identifier (URI/URL) that may be a web page,
image, video or other piece of content. Some popular browsers are:
Google Chrome, Mozilla Firefox, Opera Web Browser, Safari Web Browser,
Internet Explorer, Slimjet Browser, Maxthon, Netscape Browser,etc.
Chat rooms: A chat room is a designated virtual channel where users
communicate with each other through the Internet, traditionally in plain text
only. More recent developments in Web technology now allow the
transmission of images and emoticons in a chat room as well. The term can
mean online chatting, instant messaging and online forums using either
synchronous or asynchronous conferencing. Some chat rooms require a
username and password combination in order to log in or join a conversation,
allowing for privacy among the users.
Cyber Café: Cyber cafe or internet cafe is a place where internet applications
are accessible by the general public. Customers buy vouchers, which contain a
user name, and password that gives them access to the internet via any
computer in the internet cafe.

Cyber Space: Cyberspace refers to the virtual computer world, and more
specifically, is an electronic medium used to form a global computer network
to facilitate online communication. It is a large computer network made up of
many worldwide computer networks that employ TCP/IP protocol to aid in
communication and data exchange activities. Cyberspace's core feature is an
interactive and virtual environment for a broad range of participants.
Download: Downloading is the transmission of a file from one computer
system to another, usually smaller computer system. From the Internet user's
point-of-view, to download a file is to request it from another computer (or
from a Web page on another computer) and to receive it.
HTTP: HTTP (HyperText Transfer Protocol) is the set of rules for transferring
files (text, graphic images, sound, video, and other multimedia files) on the
World Wide Web. As soon as a Web user opens their Web browser, the user is
indirectly making use of HTTP. HTTP is an application protocol that runs on
top of the TCP/IP suite of protocols (the foundation protocols for the Internet).
ISP: An ISP (Internet service provider) is a company that provides individuals
and other companies access to the Internet and other related services such as
Web site building and virtual hosting. An ISP has the equipment and the
telecommunication line access required to have a point-of-presence on the
Internet for the geographic area served. E.g: MTN, AIRTEL, GLO, SMILE,
WSIFT, SPECTRANET, ETISALAT, ETC.
Upload: Upload is a term used to describe the process of transferring
(sending) a file to another computer through a modem or network
Website: A site or website is a central location of various web pages that are
all related and can be accessed by visiting the home page using a browser. For
example, the Newhall Website address is: https://www.newhallschool.com.ng

BENEFITS OF INTERNET TO THE SOCIETY


There are many benefits to searching on the internet. A few of these benefits
include:
1. Globalization

While computers have been blamed for decreased activity and interaction in
the local community, the Internet has been credited with providing a window
into the global world. It allows anyone with a computer to think globally and
has allowed the business world to forge international relationships with new
vendors (to lower costs) and new customers (to increase sales).
2. Communication

100 years ago it might have taken over a month to get a letter to a friend in
another country. Today, communication is as easy as a mouse click, and much
cheaper too. Anyone in the world can communicate with another person
through text messages, emails, and even live video. For business, this means
higher efficiency and quicker processing of sales.
3. Cost Effectiveness

Perhaps the most obvious benefit of the Internet is cost savings. Information at
faster speeds saves time, which either saves or makes money. Many functions
in the business process, i.e. bookkeeper, have been automated, which has
helped to streamline processes and reduce the cost of labor.
4. E Banking

Banking was never so easy and convenient before! Right from opening an
account to operating it, E-Banking has really been a big boon for everyone.
Not only can one view his account activities but he can also execute online
transactions from the comfort of the home.
5. Online Freelancer

Internet has also created great opportunities for people who are interested in
working online as freelancers. Be it writing or web designing, e-commerce or
entrepreneurship, now it is possible for everyone to show off his talent online
and make a living out of it. Millions of freelancers make their living online and
this number is increasing substantially every year.

ABUSES OF INTERNET
I Pornography : Most of the people are using internet to satisfy
their sexual desires.
II Spam: The proliferation of spam email presents a harmful,
costly, and evolving threat to Internet users.
III Fraud: Computer hacking is very common by the use of
internet. Some people do this through the use of credit card and
others.
IV Some people are addicted to browsing to the extent that they
cannot do without browsing.
V Nude pictures and sexual material is easily be available
through internet which destroy the moral values of young boys
and girls.
VI Several hours on internet without any purpose produce
wrong effects on a person's health.
VII The students waste their precious hours on internet without
taking any positive and constructive benefits.
Practical Class:

STEPS TO CREATE EMAIL ACCOUNT (yahoo platform)

Follow the steps below to create email account.


1. Click on the Free Sign Up Button
2. Enter all mandatory fields (First Name, Last Name, Gender,
etc.)
3. Type in your desired Email.
4. Choose a secure Password (at least 8 characters, mixing
letters, numbers, lower and upper case, and using special
characters)
5. Select your Security Question, type in your Answer
6. Verify your registration by typing the numbers in the
captcha picture
7. Click the "Accept" - Button underneath
STEPS TO SEND AN E-MAIL MESSAGE (yahoo platform):
I Open the “mail.yahoo.com” by typing www.yahoomail.com in
the address bar of the browser.
II Log in with your e-mail address and password
III Type in the address of the receiver in the to: box
IV Give your message a title in the subject: box
V Type your letter or message in the body of the email
VI Click on send button to send your message to the receiver.

COMPUTER ETHICS/SAFETY MEAASURES


Computer ethics refers to the moral principles that guide individuals
within the computer industry.

How to Maintain Computers Lab


1. Post a "Computer Lab Rules" sheet that clearly states
computer lab restrictions. These may include prohibition of
food and drink, downloading software, opening attachments,
removal of equipment, access to illicit sites and more. Many
labs maintain that anyone caught breaking the rules is
removed from the premises.

2. Plug all your computer equipment into a surge


protector. Spikes and surges in electrical power can break or
damage electrical equipment, as well as lose lab users' data.
This is especially important in country computer labs and
places that are prone to lightning storms.
3. Dust computer screens using a thin, soft microfiber
cloth. Dedicate 1 cloth to be used only on the screens. If dirt
and debris from other surfaces gets caught in the cloth, it
can scratch the computer screen.
4. Vacuum the floor every day, if possible, so dirt and
debris is less likely to gather around the computers.
5. Dust all surfaces of the computer. If the fans in the
Central Processing Unit (CPU) fill with dust, the computer
can overheat. Use a thicker microfiber cloth to pull the dust
from the surface. Some types of microfiber cloth have been
shown to attract and trap dust.
6. Use compressed air to clean out keyboards. You may
also choose to use a disinfectant sprayed on a lint-free cloth
on the keyboard and mouses, for sanitary purposes.
THE RULES AND REGULATIONS OF A COMPUTER LAB
The computer rooms’ rules and regulations are not there to spoil anyone's fun. 
We have a large number of students all using the same facilities, so it is
important that there are some procedures in place, which help to maintain the
smooth running of the computer rooms.Computers are provided for use in
support of approved course work, and should be treated as a shared work tool,
rather than a means of passing the time between classes.
All users must behave in a manner that respects their fellow students, staff and
equipment.  In addition to the normal Institute regulations, the following points
must be obeyed:
1. Eating and drinking in computer rooms are prohibited.
2. Don’t leave rubbish lying around the rooms – use the bins provided.  If
for some reason, the bin is removed, please bring any discarded papers,
bottles, etc, with you.  It’s much nicer to work in a clean room than a dirty
one!
3. No user shall, take or omit to take any actions which damages, restricts,
jeopardises, impairs or undermines the performance, usability or
accessibility of the computing facilities, the communications network,
systems programs or other stored information/data.
4. Any behaviour that interferes with the work of other students and staff is
prohibited -this includes the use of personal stereos, radios or any
behaviour that leads to excessive levels of noise.  It also includes the use
of the computing facilities in any way which may cause offence to others.
5. Users are required to take all reasonable precautions to maintain the
integrity of passwords and any other security mechanisms.  It is the
responsibility of users to maintain the security of their own passwords. 
Do not give your passwords to any other user or allow any user to use
your account.
6. Any attempt to interfere with the integrity of the systems or data stored on
any system is prohibited.  This includes all forms of hacking.Students
may only access files which they are authorised to access. Users are
warned that gaining unauthorised access to data (including programs) and
interfering with data belonging to others are criminal offences and
persons convicted under the appropriate Act may be subject to fines or
terms of imprisonment and they, and their parents or guardians, may be
required to pay compensation to those affected.
7. It is an offence to use, access or store any unlicensed software on any
system.  It is also an offence to copy, or use any Institute licensed
software in any way that infringes that licence.Users are warned that
breaches of copyright may result in legal proceedings and in some cases
constitute criminal offences.  The Institute disclaims all liability in such
cases.
8. The holding or distribution of computer files containing any material
which is offensive, defamatory, discriminatory, obscene or otherwise
illegal is a serious breach of these regulations.
9. Students who are timetabled into a computer facility have priority over
those who are not.  There is no system of reserving workstations outside
of timetabled classes.  If you leave a workstation, it must be left available
for other users.  If your computer is idle for more than 15 minutes, you
will be automatically logged off.
10. You must inform the supervising lecturer and/or computer services staff
of any problems that arise whilst using computer equipment.

You might also like