Uci 101 Week 1
Uci 101 Week 1
Uci 101 Week 1
•Definition of terms
•Application of Computers in Society
•Evolution of Computers: History of computers, Computer Generations, Computer
Classification
CHAPTER TWO: COMPUTER HARDWARE ..................................................................................
10 Categories of computer hardware: input, processing, storage, output, system unit
• acquiring computer hardware
• Computer care
• Computer Ergonomics
CHAPTER THREE- COMPUTER SOFWARE ...................................................................................
19
• categories of software: system software, application programs
• Selecting and Evaluating Software
• Data Processing Methods
CHAPTER FOUR: BASIC COMPUTER NETWORKS ........................................................................
24
• types and topologies of networks
• advantages and disadvantages of networks
• components of networks and communication,
CHAPTER FIVE - INTERNET .........................................................................................................
32
• Introduction
• Internet services
• negative Impact of the internet
CHAPTER SIX - OFFICE AUTOMATION ........................................................................................
37
• office automation systems
• software tools in office automation
• advantages of office automation
CHAPTER SEVEN – COMPUTER SYSTEM SECURITY .....................................................................
39
• What is a security system
• Computer security risks
• Physical security
• Information security
COURSE OUTLINE Course
Objectives:
At the end the course, students will be able to:
• To gain a better understanding of the history and evolution of the computer system
• To gain a better understanding of the operation and organization of the computer system,
computer hardware
• To gain a better understanding of the computer software.
• To gain a better understanding of the basic computer networks and data communication
• Understand the evolution and role of internet in society
Course Content:
1. Chapter one – Introduction: definitions, application of computers in society. Evolution of
computers, generation of computers, classification of computers, computer structure.
2. Chapter two - Computer hardware: input, processing, storage, output, multimedia,
computer care, Ergonomics
3. Chapter three - Computer software: Types, choice of software, software requirements, data
processing methods
4. Chapter four - Basic Computer networks; components of networks and communication,
types and topologies of networks, network and communication applications.
5. Chapter five - Internet services: Communication, information search and retrieval,
application of internet in business.
6. Chapter six - Office automation : ways of office automation
7. Chapter seven – Computer System security : physical security and software security
Teaching Methods:
• Class lectures which consist of proper explanation of the various elements.
• Regular assignments and CATs and discussion of the questions asked in the assignments and
CATs.
• Group discussions and active participation in class.
Evaluation:
1. C.A.T’s - 20%
2. Assignments - 10%
3. End of Semester Exam - 70%
Reference Textbook:
1. Peters Norton’s (2006), Introduction to Computers.
2. Shelly Cashman (2011), Discovering Computers: Your Interactive Guide to the Digital World
3. Internet
4. class notes
Page
ii
Page 2
• Speed – Computers have higher processing speeds than other means of processing,
measured as number of instructions executed per second.
• Accuracy – Computers are not prone to errors. So long as the programs are correct, they
will always give correct output. A computer is designed in such a way that many of the
Page
inaccuracies, which could arise due to the malfunctioning of the equipment, are detected
and their consequences avoided in a way, which is completely transparent to the user.
• Consistency – Given the same data and the same instructions computers will produce
exactly the same answer every time that particular process is repeated.
• Reliability – Computer systems are built with fault tolerance features, meaning that
failure of one of the components does not necessarily lead to failure of the whole system.
• Memory capability – A computer has the ability to store and access large volumes of
data.
• Processing capability – A computer has the ability to execute millions of instructions per
second.
APPLICATION OF COMPUTERS IN SOCIETY Finance
• Management of financial records e.g. balance check books, pay bills, track personal income
and expenses, manage investments and evaluate financial plans.
• Software may provide for online services like banking. With online banking users’ access
account balances, pay bills and copy monthly transactions from banks, computer right into
their personal computer.
• Investors often use online investing to buy and sell stocks and bonds without using a broker.
• Computers are also used for investment analysis i.e. analyze performance of company shares
or debentures.
• The fundamental Analysis Package analyzes present financial position, prospect, analyses
increase in sales in previous years, present years etc.
• Personal Financial Management is used for keeping record and making analysis of a person’s
investment, income, expenditure and savings. It also helps prepare budget, calculate income,
interest, insurance, printing cheques etc.
Science
• Computers are used to assist with collecting, analyzing and modeling data.
• Internet is used by scientists to communicate with colleagues around the world.
• Neutral networks have been created to attempt to imitate the human brain so as to
recognize spoken words etc.
• Computers have been used to do research e.g. BOINC stands for Berkeley Open
Infrastructure for Network Computing and what it does is use processing power that you
aren't actively using on your computer, to help solve scientific problems in medicine,
astronomy, physics along with other important research.
• Earth scientists and computer scientists have collaborated to produce the first global digital
geological map, allowing you to see rocks underground everywhere.
• Physics, biology, chemistry, neuroscience, genetics, even sociology and anthropology depend
heavily on computers. Increasingly, experiments are done by developing and experimenting
with models of real systems rather than the systems themselves. Travel
Vehicles, Airplanes use on board navigation systems, use micro processors based systems to
control efficient burning of fuel and other operations e.g. door locks, air conditioning and
braking. Airlines provide online access, allowing passengers to connect their mobile computers
or devices to the internet. Reservation of cars, hotels and flights are made sufficient by use of
computer software.
Page 4
Industrial Control and Instrumentation
Computer Aided Manufacturing (CAM) refers to use of computers to assist with manufacturing
processes such as fabrication and assembly. Industries use CAM to reduce product development
costs, shorten a product’s time to market and stay ahead of competition.
Often robots carry out processes in a CAM environment. CAM is used by a variety of industries,
including oil drilling, power generation, food production and automobile manufacturing. Special
computers on the shop floor record actual labour material, machine and computer time used to
manufacture a particular product. The computer processes this data and automatically updates
inventory, production, payroll and accounting records on company’s network.
Computers are used in industry for automatic control of machines, process, mechanical and
display of electrical and physical quantities. Examples are automatic control of temperatures of a
furnace speed of a motor, generator’s voltage and power, boilers’ pressure, testing of products.
Furnace Temperature Control
Transducer
Furnace
A/D
Converter
Amplifier
Micro
processor
Fuel Control I/O Ports
Transducers read temperature and signal are amplified. Analogue / Digital converter convert the
signal into digital form. Digital signal is processed by the microprocessor. The processor can then
issue commands to increase or reduce fuel. LED displays are also used to show levels / values. All
type of modern instruments contain embedded, microprocessor based system or microcontroller
(single chip microcomputer) for their operation and control.
Communication
This involves the use of computers in sending and receiving information. Communication
packages are used to facilitate this. The computers are used to engage in computer conferencing
(Online conferencing, teleconferencing or video conferencing, to view or post news on computer
bulletin boards, for electronic shopping and banking & brokerage.
These services available through use of computers can be put into 3 main categories:
Communication services – email, online conferencing, bulletin boards
Transaction Services – e-shopping, banking and brokerage
Information services – online information given by organizations that maintain databases for
such purposes. Government
Provide society with direction by making and administering policies. Provides citizens with up to
date information using government web sites e.g. taxes, application for jobs, permits and
licenses, report crime and apply for financial aid and renew vehicle registrations and drive
licenses. Government agencies use computers to help protect the citizens.
Health Care
Computers are used for different purposes.
• Hospitals and doctors use computers to maintain patient records.
Page 5
• Computers monitor patient’s vital signs in hospital rooms and at home.
• Computers and computerized devices assist doctors, nurses and technicians with medical
tests
• Doctors use the Internet and medical software to assist with research and diagnosis of health
conditions.
• Pharmacists use computers to file insurance claims
• Surgeons implant computerized devices such as pace makers that allow patients to live
longer.
• Surgeons use computer controlled to provide them with greater precision during operations
such as laser eye surgery and robot assisted heart surgery surgery.
• Web sites provide up to date medical fitness, nutrition or exercise information.
• Another new development is telemedicare – healthcare which is a form of long distance
healthcare i.e. professionals in separate locations conduct live conference on the computer
Publishing
Preparation of books, magazines, newspapers, music film and video. Special software assist
graphic designers in developing pages that include text, graphics, photographs, artists composing
and enhancing songs, filmmakers in creating and editing film and journalists and mobile users in
capturing and modifying video clips . Publishers make their work s available online.
Education 1. Radio and TV Broadcasting in Education
Radio and television have been used widely as educational tools since the 1920s and the 1950s,
respectively. There are three general approaches to the use of radio and TV broadcasting in
education:
• Direct class teaching, where broadcast programming substitutes for teachers on a
temporary basis;
• School broadcasting, where broadcast programming provides complementary teaching
and learning resources not otherwise available; and
• General educational programming over community, national and international stations
which provide general and informal educational opportunities.
2. Teleconferencing
Teleconferencing refers to “interactive electronic communication among people located at two
or more different places.” There are four types of teleconferencing based on the nature and
extent of interactivity and the sophistication of the technology:
• audio conferencing - involves the live (real-time) exchange of voice messages over a
telephone network.;
• audio-graphic conferencing -When low-bandwidth text and still images such as graphs,
diagrams or pictures can also be exchanged along with voice messages
• videoconferencing - allows the exchange not just of voice and graphics but also of moving
images.; and
• Web-based conferencing - involves the transmission of text, and graphic, audio and visual
media via the Internet
Teleconferencing is used in both formal and non-formal learning contexts to facilitate
teacherlearner and learner-learner discussions, as well as to access experts and other resource
Page 6
persons remotely. In open and distance learning, teleconferencing is a useful tool for providing
direct instruction and learner support, minimizing learner isolation.
Page 7
• 1951 UNIVAC - first commercial computer; 1954 first installation
• 1964 IBM - first all-purpose computer (business + scientific)
• 1973 HP-65, hand-held, programmable ‘calculator’
• ~1975 Altair, Intel - first Micro-computer; CPU on a “chip”
Computer Generations
The view of computers into generations is based on the fundamental technology employed. Each
new generation is characterized by greater speed, larger memory capacity and smaller overall
size than the previous one.
First Generation Computers (1946 – 1957)
• Used vacuum tubes to construct computers.
• These computers were large in size and writing programs on them was difficult.
• Major drawbacks of First generation computers.
• The operating speed was quite slow.
• Power consumption was very high.
• It required large space for installation.
• The programming capability was quite low.
• Cumbersome to operate – switching between programs, input and output
Second Generation Computers (1958 - 1964)
• Replaced vacuum tubes with transistors
• The transistor is smaller, cheaper and dissipates less heat than a vacuum tube.
• Second generation also saw the introduction of more complex arithmetic and logic units,
the use of high – level programming languages and the provision of system software with
the computer.
• Transistors have higher operating speed. They have no filament and require no heating.
Manufacturing cost was also lower. Thus the size of the computer got reduced
considerably.
• It is in the second generation that the concept of Central Processing Unit (CPU), memory,
programming language and input and output units were developed.
• The programming languages such as COBOL, FORTRAN were developed during this period
Third Generation Computers (1965 - 1971)
Had an integrated circuit.
• Although the transistor technology was a major improvement over vacuum tubes,
problems remained. The transistors were individually mounted in separate packages and
interconnected on printed circuit boards by separate wires. This was a complex, time
consuming and error-prone process.
• The early integrated circuits are referred to as small-scale integration (SSI). Computers of
this generation were smaller in size, lower cost, larger memory and processing speed was
much higher.
Fourth Generation Computers (1972 - Present)
• Employ Large Scale Integrated (LSI) and Very Large Scale Integrated (VLSI) circuit
technology to construct computers.
• Over 1,000 components can be placed on a single integrated-circuit chip.
Page 8
Fifth Generation Computers
• These are computers of 1990s
• Use Very Large Scale Integrated (VLSI) circuit technology to build computers. Over 10,000
components can be incorporated on a single integrated chip.
• The speed is extremely high in fifth generation computer. Apart from this it can perform
parallel processing. The concept of Artificial intelligence has been introduced to allow the
computer to take its own decision.
Computer Classification
Computers can be classified in different ways as shown below:
1. Classification by power and size/ configuration
Micro Computer System - These are also known as personal computers and are the ones
mostly found in big and small office, they are normally standalone computers known PC,
or Desktop Computers. Micro Computers are small and designed for individual use.
Minicomputer systems - Mini computers are midsized computers capable of supporting
from 4 – 200 users simultaneously. Mini pc are mainly used as departmental computers
for data processing in large organization or governmental institutions like hospitals
Main frame computer systems - A main frame computer is a very large expensive
computer system capable of supporting hundreds and thousands of users
simultaneously, most of these computers are found in large organizations like
universities, hospitals, world governing body like UN among many others
Super computer systems - Super Computers are the fastest types of computers which
were very expensive and require a lot of mathematical calculations. The first generation
of super computer was developed by VON-Newman. This computer generation of super
computers had only one controller and was called VON-Newman. Modern super
computers systems are equipped with many processors enabling them to process
complex operation, e.g. weather forecast which needs to be processed within a short
period
Mobile computers – Personal Computers you can carry from place to place. e.g:
• Note Books (Laptops) – Portable personal computers designed to fit on your Lap.
• Hand Held Computers (Hand Top Computers) – Computers small enough to fit in
one hand. Many hand held computers communicate wirelessly with other devices
or computers. Many hand held computers are industry specific and serve the
needs of mobile employees such as meter readers and parcel delivery people
whose job requires them to move from place to place.
• Personal Digital Assistant (PDA) – Provide personal organizer functions such as a
calendar, appointment book, address book, calculator and notepad.
• Embedded Computers – Special purpose computers that functions as a
component in a larger product. Embedded computers are everywhere – at home,
in your car and work. Examples of everyday products that contain embedded
computers include: Consumer electronics –Mobile and digital telephones, Digital
TVs, cameras
Home Automation – Devices and appliances, thermostats, sprinkling systems,
security monitoring systems, microwaves ovens, washing machines.
Automobiles – antilock breaks, engine control, airbag controller.
Page 9
Processor controllers & Robotics – remote monitoring systems, power monitors,
machine controllers, medical devices. Computer Device & Office Machine –
Keyboard, Printers, Faxes, Copies.
2. Classification by purpose General
Purpose Computers
General-purpose computers are designed to solve a large variety of problems. That is
they can be given different programs to solve different types of problems.
Generalpurpose computers can process business data as readily as they process complex
mathematical formulas. General-purpose computers can store large amount of data and
the programs necessary to process them. Because general-purpose computers are so
versatile, most businesses today use them. Most digital computers are general
computers and it is mainly such computers that are used in business and commercial
data processing.
Page 10
business data processing and scientific purposes since digital computation results
in greater accuracy.
Analog computers - are used for scientific, engineering, and process-controlled
purposes. Outputs are represented in the form of graphs. Analogue computers
process data represented by physical variables and output physical magnitudes in
the form of smooth graphs.
Page 11
CHAPTER TWO: COMPUTER HARDWARE
OUTLINE
Categories of computer hardware
1. Input
2. System unit o power supply o buses
o Mother Board
o Processor – Control Unit, Arithmetic Unit, Registers o Primary
Memory (main)
3. Secondary Storage
4. Output
Computer care
Ergonomics
Block Diagram showing components of a computer
INPUT DEVICES
An input device is any hardware component that allows users to enter data and instructions into
a computer. Instructions entered into the computer can be in form of:
• Programs – Series of instructions that tells a computer what to do how to do it.
• Command – an instruction that causes a program to perform a specific action. Users issue
command by typing or pressing keys on keyboard, click a mouse button, speaking into a
microphone or touching an area of a screen.
• User response – an instruction a user issues by replying to a question displayed by a
program.
Types of Input Devices
1. Keyboard – an input device that contains keys users press to enter data and instructions into
a computer. Desktop computers keyboards have from 101 to 105 keys. Categories of keys on
a keyboard include:
a) Function Keys – F1, F2, F3 to F12. They have programmed instruction depending on
the application.
Page 12
b) Typing Keys – Alphabetic and numeric keypads
c) Numeric Keypad
d) Arrow keys- control cursors
e) Special Keys – SHIFT, CTRL, ALT, WINDOWS KEY, ESCAPE, ENTER, BACKSPACE Some
keyboards do not use wires at all (wireless keyboards or cordless keyboards). Has a
battery powered device that transmits data using wireless technology.
2. Pointing Devices - Input devices that allow a user to control a pointer on the screen.
a) Mouse – is appointing device that fit under the pointer of your hand comfortably. Used to
control a mouse pointer.
b) Track ball – a stationary pointing device with a ball on its top or side. To move the pointer
using a trackball you rotate the ball with your thumb, fingers or palm of your hand.
c) Touch pad – a small flat rectangular pointing device that is sensitive to pressure and
motion. To move the pointer using a touch pad slide your fingers across the surface of
the pad.
d) Pointing Stick – a pressure sensitive device shaped like a pencil eraser that is positioned
between keys and keyboard.
e) Light Pen – Handled input device that can detect the presence of light. Some light pens
require a specifically designed monitor. To select objects on the screen points the light
pen at the screen and press a button on the pen.
f) Touch screen – is a touch sensitive display,. Users can interact with these by touching
areas of the screen.
g) Joystick: A hand-held stick that can be moved around in any direction. Used mainly for
playing games (i.e., flight simulators etc).
h) Graphics Pad: This is a square piece of material that you can use to draw pictures (as a
mouse is not always practical for drawing complicated lines and shapes).
(a) (b)
(c)
(d )
3. Voice Input – Entering input by speaking into a microphone or wireless technology using blue
tooth. Voice recognition programs recognize a vocabulary of programmed words.
4. Digital Cameras – allow users to take pictures and store the photographed images digitally,
instead of traditional film.
Page 13
5. Video Input – Process of capturing full motion images and storing them on a computer’s
storage medium of hard disk. A digital Video (DVD) camera can be used for this purpose.
Personal Computer Video cameras is a type of video camera that enables a home or small
business user to capture video and still images, send email messages with video attachments.
6. Scanners and reading devices – They eliminate manual data entry, users do not type, speak,
or write into the computer. They capture data from a source document which is the original
form of the data. Examples of such devices include:
• Optical scanners – is alight sensing input device that reads a printed text and graphics and
then translates the results into a form the computer can process.
• Optical readers – uses light source to read characters, marks and codes and then converts
then into digital data that a computer can process.
7. Biometric Input – is a technology of authenticating a person’s identity by verifying personal
characteristics. Biometric identifier is a physiological (Related to physical or chemical
activities in the body) or behavioral characteristics e.g. finger prints, facial features, voice,
signatures
SYSTEM UNIT
It is a case that contains electronic components of the computer used to process data. Many
electric components and most storage devices are part of the system unit. Other devices such as
keyboards, mouse, microphone, monitor, printer, and scanner are all connected to the system
unit.
Inside the System Unit
Page 14
b) Processor (Central Processing Unit)
Interprets and carries out the basic instructions that operate a computer. It impacts on overall
computing power and manages most of a computer’s operations. Examples of Processor
Manufacturers: Intel Corporation (Xeon MP, Itanium, Pentium, 80486, Celeron). AMD (Opteron,
Athlon MP, Duron). Motorola (68040, 68030) Motorola/IBM(Power PC). Transmeta (Efficeon,
Crusoe)
Parts of a processor
• Control Unit (CU) - Component of the processor that directs and co-ordinates most of the
operations in the computer. It interprets each instruction issued by a program then
initiates the appropriate action to carry out the instruction.
• Arithmetic and Logic Unit (ALU) - Performs arithmetic comparison and other operations.
Also includes basic calculations such as addition, subtraction, multiplication and division.
• Registers - A processor contains small high speed storage locations called registers that
temporarily hold data and instructions.Register functions include storing the locations
from where an instruction was fetched, storing an instruction while the CU decodes it,
storing data while the ALU computes it and storing these results of a calculation. Bus –
This is a highway connecting internal components to each other.
c) System Clock – The processor relies on a small quartz crystal circuit called system clock to
control the timing of all computer operations. Just as your heart beats at a regular rate to
keep you body functioning, the system clock generates regular electronic pulses or ticks that
set the operating pace of components of the system unit. The pace of the system clock,
called clock speed is measured by no of ticks per second (current personal computer
processors have clock speeds in gigahertz. Giga is a prefix that stands for billions and hertz is
one cycle per second; thus one gigahertz equals one billion ticks of the system clock per
second)
d) Main Memory - Consists of electronic components that store instructions waiting to be
executed by the processor, data needed by those instructions and results of processed data
(Information). Memory usually consists of one or more chips on the motherboard. Memory
sizes are given in terms of number of bytes the device has available for storage:
1 kilobyte = 1024 bytes
1 Megabytes = 1024 Kilobytes
1 Gigabytes = 1024 Megabytes
1 Terabytes = 1024 Gigabytes
Types of memory
Page 15
Volatile – when power of computer is turned off it loses its contents.
Non – volatile – Doesn’t lose its contents when power is removed from computer Volatile
• RAM (Random Access Memory) – Main memory which consists of memory chips that can
read from and written to by the processor and other devices. The processor interprets
and executes a program’s instructions while the program is in the RAM. RAM can
accommodate multiple programs simultaneously. Examples of RAM include:
• Dynamic RAM (DRAM) – must be energized constantly or they lose their contents.
• Static RAM (SRAM) – Chips are faster and more reliable than any variation of DRAM. They
do not have to be energized as often as DRAM chips.
• Magneto-resistive RAM (MRAM) – stores data using magnetic charge instead of electrical
charges. Have greater storage capacity, consumes less power and has faster access that
electronic RAM. Non – Volatile
• ROM (Read Only Memory) - are chips storing permanent data and instructions. Data on
most ROM chips cannot be modified hence the name read only. Manufacturers of ROM
chips often record data and instructions or information on chips (firmware). Other types
of ROMs include PROM and EEPROM. SECONDARY STORAGE
Storage holds data, instructions and information for future use. Is cheaper, infinitely extendable
than primary storage which is finite. Is not volatile. It is portable than primary storage – that is, it
is possible to remove it from a computer and use the device and its contents in another.
Examples include:
Floppy Disks (Magnetic Disks)
Hard Disks (Magnetic Disks)
Magnetic Tapes (Magnetic Disks)
Compact Disks (Optical Discs)
Digital Versatile Disks (DVD) -(Optical Discs)
PC Cards
Flash Memory
Microfiche
Capacity is the number of bytes (Characters) a storage medium can hold. Terms used by
manufacturers to measure capacity are same as those used for memory.
Typical sizes for devices include
Floppy Disks 1.44 Megabytes
Hard Disks 20 – 320 Gigabytes up to terabytes
Flash Memory 512 – 16 GB
Compact Disc 700 MB DVD
– 4.7 Gigabytes
Secondary Storages are used to supplement the Primary storage. Their typical uses include:
a) Storing the operating system, Application software, user data and information b)
Software back ups
c) Transportation of files
Magnetic Disks – use magnetic materials to store items such as data, instructions, and
information on a disk’s surface. Depending on how the magnetic particles are aligned, they
represent either a 0 bit or a 1 bit. Examples are floppy disks, Zip Disks, Hard Disks.
Optical Discs – Is a type of storage media that consists of a flat, round, portable disc made of
metal, plastic, and lacquer that is written and read by a laser. They primarily store software,
Page 16
data, digital photographs, movies and music. Some optical discs are read only – meaning users
cannot write (save) on media. Others are read/write – allows users to save on discs. Examples
include: CD (Compact Discs), DVD (Digital Versatile Disc)/ (Digital Video Disc).
USB Flash Drives – is a flash memory storage device that plugs in a USB port on a computer or
mobile device. They are convenient for mobile users because they are small and light weight
enough to be transported in a pocket. Experts predict that USB flash drives will become the
mobile user’s primary portable storage device, eventually making the floppy disk obsolete.
ZIP/JAZ drives are another type of floppy drive that use special disks instead of floppy disks. Zip
disks can hold about 100 times as much as a floppy disk. JAZ disks can hold much more data.
Currently, ZIP and JAZ disks range from 100MB diskettes to around 2GB’s.
OUTPUT DEVICES
Output is data that has been processed into a useful form. A computer generates several types of
output depending on hardware and software being used and the requirements of the user.
These types may include: Text, Graphics, Audio, and Video.
An output device is any type of hardware component that conveys information to one or more
people.
Examples of Output devices include:
a) Display devices – give output that is visually conveyed sometimes called soft copy. Examples
include:
- Monitor (Display device packaged as a separate device)
- Flat Panels Displays (is a lightweight display device with a shallow depth and flat
screen and that typically uses Liquid Crystal Display-LCD)
b) Printers – is an output device that produces text and graphics on a physical medium such as
paper or transparency film. Printed information, called hard copy, exists physically and is a
more permanent form of output. Examples of types of printers include:
- Non Impact printers (Ink Jet Printers, Photo Printers, Laser Printers, Mobile Printers)
- Impact Printers (Dot Matrix, Line Printers)
c) Speakers and Head sets – Produce music speech or other sounds such as beeps.
d) Plotters and Large formats Printers – are sophisticated printers used to produce high quality
drawings such as blue prints, maps and circuit diagrams.
e) Other Output Devices - Fax Machines, Multifunction Peripherals (printer, scanner, and
photocopy) and Data Projectors.
MULTIMEDIA DEVICES
Multimedia is used to describe something that uses sound, music, pictures, video, and
animation. Most modern PCs are multimedia machines, and need certain hardware to
input/output information:
• Sound card: A special controller inside the PC that translates sound into a form the computer
can understand.
• Microphone: So that you can record your voice, for example.
• Speakers: So that you can hear the sounds and music playing.
• Digital camera: This works like a normal camera, but doesn't use film - instead it lets you
transfer the pictures directly into your PC.
Page 17
COMPUTER PORTS
Standard computer ports : Keyboard and mouse ports, USB ports, Parallel, Network, Modem,
Audio, Serial, Video
Page 18
• Do not expose to direct sunlight
• Keep away from foods and drinks
• Service=blowing, clean keyboard, monitor etc
• Peripherals also clean=printers ,mouse
• Use UPS for steady input power in areas of power fluctuations.
• Viruses???????????????
• Booting= process(startup) by which the computer becomes ready for use.
o We have warm booting and cold booting. - cold-from ON state, Warm-restart
COMPUTER ERGONOMICS
Ergonomics is the study of how people physically interact with their work – fitting the job, the
equipment and the work environment to the worker. Essentially, ergonomics is the relationship
between the worker and the job and focuses on the design of work areas to enhance job
performance. Ergonomics can help prevent injuries and limit secondary injuries as well as
accommodate individuals with various disabilities, including those with musculoskeletal
disorders (MSDs).
Eliminate any reflection on your monitor, Position any additional equipment in accessible places
Computer addiction occurs when the computer consumes someone’s entire social life Symptoms
of users include:
• Craves computer time
• Overjoy when at the computer
• Unable to stop computer activity
• Irritable when not at the computer
• Neglects family and friends
• Problems at work or school
Page 19
Computer ethics are the moral guidelines that govern the use of computers and information
systems. Information accuracy is a concern. Not all information on the Web is correct
Page 20
CHAPTER THREE- COMPUTER SOFWARE
OUTLINE
categories of software o
system software o
application programs
Selecting and Evaluating Software Data Processing Methods
CATEGORIES OF SOFTWARE
Software is a set of electronic instructions consisting of complex codes (also known as programs)
that make the computer perform tasks. In other words, software tells the computer what to do.
Some programs exist primarily for the computer's use and help the computer perform and
manage its own tasks. Other types of programs exist primarily for the user and enable the
computer to perform tasks, such as creating documents or drawing pictures.
Page 21
Examples of Operating Systems
a) DOS - DOS has a "command line interface". The user has to remember common commands
e.g. CD (Change Directory), DIR (give directory listing).
b) Apple Macintosh OS - While MS were developing DOS, Apple was working on a GUI
(Graphical User Interface). This was launched in 1984. It had a WIMP environment (WIMP =
windows, icons, menus, pointers). The term "user-friendly" was used to describe the MacOS.
Users of the MacOS could have more than one application open at once, each within its own
"window". Data could easily be transferred from one application to the other. Even after
GUIs became available for the PC, most people continued to be of the opinion that the
MacOS was much easier to use.
c) Windows 95/98/2000/NT - Windows 95 is a full OS offering 32 bit processing (this means that
applications should run faster and should multi-task. Windows 95 offers long filenames (DOS
had an 8 character restriction). "Plug and Play", in theory, allows users to add and remove
hardware very easy by auto detecting devices). By their dominance in the software market,
Microsoft have ensured that their OS is also dominant. To add insult to injury, Microsoft
have also launched their own web browser and integrated it with the operating system. MS
have even produced popular hardware that is optimized to work best with their OS (e.g.
keyboards and mice). To many people, this amounts to a "monopoly".
Windows NT is a 32 bit environment that is designed for networking. It is said to be more
stable than Windows 95.
d) Unix - UNIX is a very old OS but it is still widely used today. It is available on a wide variety of
platforms (from home PCs to supercomputers). It has a command line interface and it very
complicated to use. It is extremely stable and it used for computers that are hardly ever
turned off. On some computers, it can keep running while maintenance is being performed
on the computer (this is crucial for 24/7 services, such as those on the Internet). UNIX offers
good security on networks against unauthorised access. UNIX is a network OS. "Dumb
terminals" can be networked to a UNIX server, allowing many users to use the same powerful
machine at once. Software written for UNIX is very expensive.
e) Linux - Linux was started as a hobby by a Finnish college student called Linus Torvalds. He
had bought a brand new 386 computer and he didn't want to put any Microsoft software on
it. He couldn't afford UNIX so he started writing his own OS. He kindly made the code
available to anyone to edit, so nowadays, LINUX is not only free, it has been worked on by
thousands of the world's most talented programmers. The OS has attracted the attention of
big software developers who are distributing the product and, slowly, writing applications for
it.
Utility programs
Utility software consists of programs which are designed to help with the maintenance of the
computer and to ensure that it works correctly and efficiently.
Examples of utility programs
• Programming Language Compilers - used to translate instructions into a programming
language
• Disk Defragmenter – reorganizes the file sand unused space on a computer’s hard disk so
that the operating system accesses data more quickly and programs run faster).
Page 22
• Diagnostic Utility – Compiles technical information about your computer’s hardware and
certain system software programs and prepares a report outlining any identified problem.
• Back up utility - allows users to copy or back up selected files or an entire hard disk to
another storage medium.
• Disk editor is a utility program that lets the user read, edit, and write the low-level raw data
on a disk. It can be used to repair/reconstruct damaged files and directories.
• Virus Checker - A virus is a program or programming code that replicates by being copied or
initiating its copying to another program, computer boot sector or document. A virus checker
examines a computer system to find virus software.
Applications Software
Applications are written to perform a specific task.
• Bespoke software is "tailor made" to meet the requirements of a specific organization. Off
the Shelf software can be purchased by anyone.
• General Purpose software does a particular job e.g. WP, DTP, Spreadsheets, CAD etc.
• Integrated Packages/Software Suites e.g. Lotus SmartSuite, MS Office are packages of
common productivity tools that are bundled together at a lower price than if they were
purchased separately. The applications are "integrated" i.e. they have a common interface
and they can export/import data between applications.
Page 24
DATA PROCESSING
Batch Processing
Batch data processing involves the processing of data in groups (or batches) of like transactions
at periodic intervals. Used when transaction activity is low or periodic. In batch processing,
transaction data are stored in a transaction file until a master-file update is performed. The
storing of transaction data in a transaction file may occur either through off-line or on-line entry
of data
Advantages of batch processing include:
• processing can be done in background mode
• processing is only performed when needed
• batch processing leaves a good audit trail Disadvantages:
• the master-file is only as current as last processing run.
• If transactions are batched before entry, any errors in transaction data cannot be
corrected at the time of entry. They must be corrected and reentered either through a
separate run or during the next processing cycle Real-time processing consists of processing
each transaction as it arises and is captured. Real-time processing involves the processing of
each transaction as it arises and is captured. Data from each transaction are entered via an
online device and posted directly and immediately to the affected record(s) in one or more
master files. Real-time processing may be interactive in that it may involve direct interactions
between humans and computerized systems Advantages of real-time processing include:
• This method keeps the master file more current than the batch runs
• Errors are caught at the time of data entry Drawbacks of real-time processing
include:
• More complex and expensive than batch systems
• Harder to audit
• Controls and backup procedures are more elaborate in order to guard against
unwarranted access and human error
Page 25
CHAPTER FOUR: BASIC COMPUTER NETWORKS
OUTLINE
types and topologies of networks advantages and disadvantages of networks
components of networks and communication, ,
applications
Definition of computer network
A network consists of two or more computers that are linked in order to share resources (such as
printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
TYPES OF NETWORKS
The three basic types of networks include:
Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
Page 26
Metropolitan Area Network
A Metropolitan Area Network (MAN) covers larger geographic areas, such as cities or school
districts. By interconnecting smaller networks within a large geographic area, information is
easily disseminated throughout the network. Local libraries and government agencies often use
a MAN to connect to citizens and private industries.
NETWORKING TOPOLOGIES
Topology: Commonly used to discuss the properties of various types of networks. Topology is the
branch of mathematics that examines the characteristics of geometric shapes. Networks have
shapes, and the shape of a network determines the way it functions. Different types of
topologies are used because each topology has strength and weaknesses.
Page 27
Advantages of the star topology
• Network administration and error detection is easier because problem is isolated to central
node
• Networks runs even if one host fails
• Expansion becomes easier and scalability of the network increases
More suited for larger networks Disadvantages
of the star topology
• Broadcasting and multicasting is not easy because some extra functionality needs to be
provided to the central hub
• If the central node fails, the whole network goes down; thus making the switch some kind of
a bottleneck
• Installation costs are high because each node needs to be connected to the central switch
Bus Topology
Consists of a single cable, called a Backbone that connects all workstations on the network using
a single line. All transmissions must pass through each of the connected devices to complete the
desired request. Each workstation has its own individual signal that identifies it and allows for
the requested data to be returned to the correct originator. In Bus Network, messages are sent
in both directions from a single point and are read by the node (computer or peripheral on the
network) identified by the code with the message. the network will continue to function even if
one computer is down. This topology works equally well for either peer to peer or client server.
Advantages
• Broadcasting and multicasting is much simpler
• Network is redundant in the sense that failure of one node doesn't affect the network. The
other part may still function properly.
Page 28
• Least expensive since less amount of cabling is required and no network switches are
required
• Good for smaller networks not requiring higher speeds
Disadvantages
• Trouble shooting and error detection becomes a problem because, logically, all nodes are
equal
• Less secure because sniffing is easier
• Limited in size and speed
Ring Topology
It is a physical, closed loop consisting of point-to-point links. Each node is connected to the two
nearest nodes so the entire network forms a circle One method for passing data on ring
networks is token passing. Each workstation transmits data.
Advantages
• All workstations share the same communication medium.
• The loss of one workstation does not affect the functionality of the network.
• The cost of a single shared medium is low.
• Adding another station amounts to making a connection to the single communication
medium.
Disadvantages
Each workstation must pass on unintended messages.
Response speed degrades as the network size increases.
Network intelligence must be distributed
Mesh topology
Devices are connected with many redundant interconnections between network nodes.
Page 29
Advantages
Fast response time.
Single workstation failure does not affect network.
Connections determined by movement of data
Disadvantages
Network intelligence must be distributed.
Adding a new station can be expensive.
Making connections between many stations is expensive.
Page 30
g) Flexible Access - Networks allow users to access their files from computers throughout an
organization. Users can begin an assignment in their office, save part of it on a public access
area of the network, and then go home after work to finish their work. Users can also work
cooperatively through the network.
h) Workgroup Computing - Workgroup software (such as Microsoft BackOffice) allows many
users to work on a document or project concurrently. For example, educators located at
various schools within a county could simultaneously contribute their ideas about new
curriculum standards to the same document and spreadsheets.
DISADVANTAGES OF INSTALLING A NETWORK
a) Expensive to Install - Although a network will generally save money over time, the initial
costs of installation can be prohibitive. Cables, network cards, and software are expensive,
and the installation may require the services of a technician.
b) Requires Administrative Time - Proper maintenance of a network requires considerable time
and expertise. Many firms have installed a network, only to find that they did not budget for
the necessary administrative support.
c) File Server May Fail - Although a file server is no more susceptible to failure than any other
computer, when the files server “goes down,” the entire network may come to a halt. When
this happens, the entire school may lose access to necessary programs and files.
d) Cables May Break - Some Network configurations are designed to minimize the
inconvenience of a broken cable; with other configurations, one broken cable can stop the
entire network.
NETWORK COMPONENTS
Networking hardware includes all computers, peripherals, interface cards and other equipment
needed to perform data-processing and communications within the network.
1. Servers The server controls the communication of information between the nodes on a
network. For example, it may be asked to A server stands at the heart of most networks.
It is a very fast computer with a large amount of RAM and storage space, along with a fast
network interface card. The network operating system software resides on this
computer, along with any software applications and data files that need to be shared.
Server types include file, application, database, web, mail, print, and backup.
Server
The server controls the communication of information between the nodes on a network.
For example, it may be asked to send a word processor program to one Workstation,
receive a database file from another workstation, and store an e-mail message during the
same time period. This requires a computer that can store a lot of information and share
it very quickly.
2. Workstations - All of the computers connected to the server on a network are called
workstations. A typical workstation is a computer that is configured with a network
interface card, networking software, and the appropriate cables. Workstations do not
Page 31
necessarily need floppy disk drives or hard drives because files can be saved on the
server. Almost any computer can serve as a network workstation.
3. Network Interface Cards- The network interface card (NIC) provides the physical
connection between the network and the computer workstation. Most NICs are internal,
with the card fitting into an expansion slot inside the computer. Network interface cards
are a major factor in determining the speed and performance of a network. It is a good
idea to use the fastest network card available for the type of workstation you are using.
4. Hubs/Switches - A hub is a device that provides a central connection point for cables
from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run
from each workstation to a central hub. Some hubs are passive, that is they allow the
signal to pass from one computer to another without any change. Most hubs are active,
that is they electrically amplify the signal as it moves from one device to another. Active
hubs are used like repeaters to extend the length of a network.
A hub is a device that provides a central connection point for cables from workstations,
servers, and peripherals. The repeater electrically amplifies the signal it receives and
rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a
hub. They are used when the total length of your network cable exceeds the standards
set for the type of cable being used. A good example of the use of repeaters would be in
a local area network using a star topology with unshielded twisted-pair cabling. The
length limit for unshielded twisted-pair cable is 100 meters. The most common
configuration is for each workstation to be connected by twisted-pair cable to a multiport
active concentrator. The hub amplifies all the signals that pass through it allowing for the
total length of cable on the network to exceed the 100 meter limit.
Page 32
5. Bridges - A bridge is a device that allows you to segment a large network into two
smaller, more efficient networks. If you are adding to an older wiring scheme and want
the new network to be up-to-date, a bridge can connect the two. A bridge monitors the
information traffic on both sides of the network so that it can pass packets of information
to the correct location. Most bridges can “listen” to the network and automatically figure
out the address of each computer on both sides of the bridge. The bridge can inspect
each message and, if necessary, regenerate it on the other side of the network. The
bridge manages the traffic to maintain optimum performance on both sides of the
network. You might say that the bridge is like a traffic cop at a busy intersection during
rush hour. It keeps information flowing on both sides of the network, but it does not
allow unnecessary traffic through. Bridges can be used to connect different types of
cabling, or physical topologies. They must, however, be used between networks with the
same protocol.
6. Routers - A router translates information from one network to another; it is similar to a
super intelligent bridge. Routers select the best path to route a message, based on the
destination address and origin. The router can direct traffic to prevent head-on collisions,
and is smart enough to know when to direct traffic along back roads and shortcuts. While
bridges know the addresses of all computers on each side of the network, routers know
the addresses of computers, bridges, and other routers on the network. Routers can even
“listen” to the entire network to determine which sections are busiest—they can then
redirect data around those sections until they clear up.If you have a school LAN that you
want to connect to the Internet, you will need to purchase a router. In this case, the
router serves as the translator between the information on your LAN and the Internet. It
also determines the best route to send the data over the Internet.
Routers can:
• Direct signal traffic efficiently
• Route messages between any two protocols
• Route messages between linear bus, star, and star-wired ring topologies
• Route messages across fiber optic, coaxial, and twisted-pair cabling
7. Cables - Cable is the medium through which information usually moves from one
network device to another. There are several types of cable that are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks will use
a variety of cable types. The type of cable chosen for a network is related to the
network’s topology, protocol, and size. Understanding the characteristics of different
types of cable and how they relate to other aspects of a network is necessary for the
development of a successful network. Unshielded Twisted Pair (UTP) Cable
Page 33
• Shielded Twisted Pair (STP) Cable
• Coaxial Cable
• Fiber Optic Cable
• Wireless LANs
Twisted pair
The cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair
(UTP) is the most popular and is generally the best option for school networks.
A disadvantage of UTP is that it may be susceptible to radio and electrical frequency
interference. Shielded twisted pair (STP) is suitable for environments with electrical
interference; however, the extra shielding can make the cables quite bulky. Shielded
twisted pair is often used on networks using Token Ring topology.
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield
helps to block any outside interference from fluorescent lights, motors, and other
computers. Fiber Optic Cable
Fiber optic cabling consists of a center glass core surrounded by several layers of
protective materials. It transmits light rather than electronic signals, eliminating the
problem of electrical interference. This makes it ideal for certain environments that
contain a large amount of electrical interference. It has also made fiber the standard for
connecting networks between buildings, due to its immunity to the effects of moisture
and lighting.
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs
use high frequency radio signals, infrared light beams, or laser beams to communicate
between the workstations and the server or hubs. Each workstation and server on a
wireless network has some sort of transceiver/antenna to send and receive the data.
Information is relayed between transceivers as if they were physically connected. For
longer distances, wireless communications can also take place through cellular telephone
technology, microwave transmission, or satellite.
8. Firewall - It is a system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in both hardware and software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially intranets. All messages entering or
leaving the intranet pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
Page 34
NETWORK COMMUNICATION STANDARDS (PROTOCALS)
• Ethernet is a network standard that specifies no computer controls when data can be
transmitted. It is specified by the 802.3 standards.
• The token ring standard specifies that computers and devices on the network share or
pass a special signal (token)
• Wi-Fi identifies any network based on the 802.11 standard that facilitates wireless
communication Sometimes referred to as wireless Ethernet.
• Bluetooth defines how two Bluetooth devices use short-range radio waves to transmit
data
• UWB (ultra-wideband) specifies how two UWB devices use short-range radio waves to
communicate at high speeds
• IrDA(Infrared) transmits data wirelessly via infrared (IR) light waves
• RFID uses radio signals to communicate with a tag placed in or attached to an object,
animal, or person
Page 35
An additional attribute of the Internet is that it lacks a central authority—in other words; there is
no "Internet, Inc." that controls the Internet. Beyond the various governing boards that work to
establish policies and standards, the Internet is bound by few rules and answers to no single
organization.
How Do People Use the Internet?
Among the ways that users like you are taking advantage of the Internet are:
• Sharing research and business data among colleagues and like-minded individuals.
• Communicating with others and transmitting files via E-mail.
• Requesting and providing assistance with problems and questions.
• Marketing and publicizing products and services.
• Gathering valuable feedback and suggestions from customers and business partners. The
Internet's potential is limited only by users' vision and creativity. And as the Internet
grows, new and innovative uses will surely follow.
Connecting to the Internet
An ISP, or Internet Service Provider, is a company that provides you with a point of access to the
Internet. When you connect to your ISP, your computer (or your own network) becomes an
extension of the Internet itself whilst you remain connected.
INTERNET SERVICES
1. WORLD WIDE WEB - It is a method of posting and accessing interactive multimedia
information & is a true "information superhighway," allowing users the world over to access
a wealth of information quickly and easily.
Importance
The World Wide Web brings you all of the advantages of the Internet—and more! Among the
things that the Web allows you to do are:
• Publish and make frequent updates to on-line documents, and receive direct feedback on
those documents via E-mail.
• Connect with a diverse, global audience—a community defined not by geography, but by
interests.
• Keep abreast of the latest news and developments in your profession... often before such
news appears in conventional media.
• Reference other Web resources easily via hypertext.
• Access otherwise obscure information not readily available in other media.
• Download useful software at little or no cost.
The difference between world wide web and internet…?
Page 36
Many people use the terms Internet and World Wide Web, but in fact the two terms are not
synonymous. The Internet and the Web are two separate but related things.
• The Internet is a massive network of networks. It connects millions of computers
together globally, forming a network in which any computer can communicate with any
other computer as long as they are both connected to the Internet.
• The World Wide Web, or simply Web, is a way of accessing information over the medium
of the Internet.
So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not
synonymous and should not be confused.
The Fundamental concept of the World Wide Web The Hypertext concept
Hypertext is text which contains links to other texts. The term was coined by Ted Nelson
around 1965.
The Hypermedia concept
Hypermedia is a term used for hypertext which is not constrained to be text: it can include
graphics, video and sound. Uniform Resource Identifiers
Web resources need names/identifiers – Uniform Resource Identifiers (URIs). Resource can
reside anywhere on the Internet. A pointer to a resource to which request methods can be
applied to generate potentially different responses. A request method is e.g. fetching or
changing the object. Most popular form of a URI is the Uniform Resource Locator (URL) Web
browsers
A web browser is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web. Examples of web browsers
• Mosaic, April 22, 1993
• Netscape Navigator and Netscape Communicator, October 13, 1994
• Internet Explorer 1, August 16, 1995
• Opera, 1996, see History of the Opera web browser
• Mozilla Navigator, June 5, 2002
• Safari, January 7, 2003
• Mozilla Firefox, November 9, 2004
• Google Chrome, September 2, 2008
The Web Server
This is a program that waits patiently for the browser to request a web page. The servers
looks for the requested information, retrieves it and send it to the browser or sends an error
message if the file is not found.
2. ELECTRONIC MAIL - Electronic mail, commonly called email or e-mail, is a method of
exchanging digital messages from an author to one or more recipients. Modern email
operates across the Internet or other computer networks. Some early email systems required
that the author and the recipient both be online at the same time, in common with instant
messaging. Today's email systems are based on a store-and-forward model. Email servers
accept, forward, deliver and store messages. Neither the users nor their computers are
required to be online simultaneously; they need connect only briefly, typically to an email
server, for as long as it takes to send or receive messages.
3. FILE TRANSFER PROTOCOL - File Transfer Protocol (FTP) is a standard network protocol used
to transfer files from one host to another over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and utilizes separate control and data connections
Page 37
between the client and server. The first FTP client applications were interactive commandline
tools, implementing standard commands and syntax. Graphical user interface clients have
since been developed for many of the popular desktop operating systems in use today.
4. CHAT - Online chat may refer to any kind of communication over the Internet, that offers an
instantaneous transmission of text-based messages from sender to receiver, hence the delay
for visual access to the sent message shall not hamper the flow of communications in any of
the directions. Online chat may address as well point-to-point communications as well as
multicast communications from one sender to many receivers.
5. NEWSGROUPS - A newsgroup is a discussion about a particular subject consisting of notes
written to a central Internet site and redistributed through Usenet, a worldwide network of
news discussion groups. Usenet uses the Network News Transfer Protocol (NNTP).
Newsgroups are organized into subject hierarchies, with the first few letters of the
newsgroup name indicating the major subject category and sub-categories represented by a
subtopic name. Many subjects have multiple levels of subtopics. Some major subject
categories are: news, rec (recreation), soc (society), sci (science), comp (computers), and so
forth (there are many more). Users can post to existing newsgroups, respond to previous
posts, and create new newsgroups.
6. BLOGS - A blog (a blend of the term web log) is a type of website or part of a website. Blogs
are usually maintained by an individual with regular entries of commentary, descriptions of
events, or other material such as graphics or video. Entries are commonly displayed in
reverse-chronological order. Blog can also be used as a verb, meaning to maintain or add
content to a blog. Most blogs are interactive, allowing visitors to leave comments and even
message each other via widgets on the blogs and it is this interactivity that distinguishes
them from other static websites. Many blogs provide commentary or news on a particular
subject; others function as more personal online diaries. A typical blog combines text,
images, and links to other blogs, Web pages, and other media related to its topic. The ability
of readers to leave comments in an interactive format is an important part of many blogs.
Most blogs are primarily textual, although some focus on art (art blog), photographs
(photoblog), videos (video blogging or vlogging), music (MP3 blog), and audio (podcasting).
Microblogging is another type of blogging, featuring very short posts.
7. VIDEO CONFERENCING - Video conferencing is a communications technology that integrates
video and voice to connect remote users with each other as if they were in the same room.
Each user needs a computer, webcam, microphone, and broadband internet connection for
participation in video conferencing. Users see and hear each other in realtime, allowing
natural conversations not possible with voice-only communications technology. Very
appealing to the educational and business sectors, video conferencing allows users to save
time and money on travelling and housing costs by bringing people face-to-face virtually.
Many prominent universities have adopted video conferencing as an educational tool to be
used in conjunction with online courses. Business leaders around the world use video
conferencing to keep in touch with important contacts while on the go.
The components required for a videoconferencing system include:
• Video input : video camera or webcam
• Video output: computer monitor , television or projector
• Audio input: microphones, CD/DVD player, cassette player, or any other source of
PreAmp audio outlet.
Page 38
• Audio output: usually loudspeakers associated with the display device or telephone
• Data transfer: analog or digital telephone network, LAN or Internet
• Computer: a data processing unit that ties together the other components, does the
compressing and decompressing, and initiates and maintains the data linkage via the
network.
NEGATIVE IMPACT OF USING THE INTERNET
There are a number of psychological implications, with the growing use of internet by children.
Some of which include the following:
1. Limited Knowledge: With the growing use of internet for research purposes, there is now
a decline in the number of books used for research. Also the information available on the
internet is limited and mostly pertains to the developed nations; a result, the knowledge
obtained is limited.
2. Isolation: Due to spending countless hours on the internet, children now spend a very
limited time with family and actual friends. Therefore, there is a weakening of the family
bond and also limited interaction with actual people. As a result, the children may miss
out on real life interaction with different relatives’ results in distorted social skills &
limited real life social network.
3. Feeling of Deprivation: Since most of the information available online is about the
developed nations, the people in developing countries, feel that the developed nations
are much better off and they have a feeling of deprivation.
4. Distorted Sense of Reality: Since the online games are completely cut off from reality,
the children tend to confuse the “real world” from their “game world”. This results in a
distorted sense of reality. Can result in Identity Confusion. Furthermore, online, a
person’s identity is concealed and therefore people act like themselves and have no
inhibitions saying how they feel. As a result, racist, sexist people have made hate sites.
And this is a growing problem.
5. Negative Impact of Uncensored Material: In today’s day and age it is harder to keep a
check on the websites, a child is visiting and therefore, a lot of children are now being
exposed to obscene, sexual material online such as pornography. Also since the identity
of an individual is concealed online, there are a number of sexual predators online, who
take advantage of children.
6. Exposure to Violence: With the growing use of the internet by children, there is an
increase in online games. These games are very violent and expose children to explicit
content and violent situations thus desensitizing the children and making them more
prone to inflicting self harm, as well as harm on others.
7. Addiction to the Internet: The children also have an unrealistic feeling of power and
control, when using the internet and as a result, they become addicted to the internet.
8. Information Fatigue Syndrome: With the growing use of the internet, there is an excess
of knowledge available online. As a result, there is “too much information”. Information
Fatigue Syndrome is when an individual becomes highly stressed through trying to cope
with the huge amounts of information.
CHAPTER SIX - OFFICE AUTOMATION
OUTLINE Introduction office automation systems software tools in office automation
advantages of office automation
What is office automation?
Page 39
Office automation refers to the varied computer machinery and software used to digitally create,
collect, store, manipulate, and relay office information needed for accomplishing basic tasks and
goals. Raw data storage, electronic transfer, and the management of electronic business
information comprise the basic activities of an office automation system.
Office automation helps in optimising or automating existing office procedures. The backbone of
office automation is LAN, which allows users to transmit data, mail and even voice across the
network. All office functions, including typing, filing, copying, fax, Telex, microfilm and records
management, telephone and telephone switchboard operations, fall into this category.
Page 41
CHAPTER SEVEN – COMPUTER SYSTEM SECURITY
OUTLINE What is a security system Computer security risks Physical security
Information security WHAT
IS A SECURITY SYSTEM?
A security system is a set of mechanisms and techniques that protect a computer system,
specifically the assets. They are protected against loss or harm including unauthorized access,
unauthorized disclosure and interference of information
A computer security risk is any event or action that could cause a loss of or damage to computer
hardware, software, data, information, or processing capability Hazards (exposures) to
information security An exposure is a form of possible loss or harm.
Examples of exposures include:
• Unauthorized access resulting in a loss of computing time
• Unauthorized disclosure – information revealed without authorization
• Destruction especially with respect to hardware and software
• Theft
• Interference with system operation.
Computer Security Risks
PHYSICAL SECURITY
Physical accesses exposures exist from accidental or intentional violation include:
• Unauthorized entry
• Damage, vandalism or theft to equipment or documents
• Copying or viewing of sensitive or copyrighted information
• Alteration of sensitive equipment and information
• Public disclosure of sensitive information
• Abuse of data processing resources
• Blackmail
Page 42
• Embezzlement
Physical access controls
1. Bolting door locks – these locks require the traditional metal key to gain entry. The key
should be stamped ‘Do not duplicate’.
2. Combination door locks (cipher locks) – this system uses a numeric keypad or dial to gain
entry. The combination should be changed at regular intervals or whenever an employee
with access is transferred, fired or subject to disciplinary action. This reduces the risk of the
combination being known by unauthorized people.
3. Electronic door locks – this system uses a magnetic or embedded chip-based plastic card key
or token entered into a sensor reader to gain access.
4. Biometric door locks – an individual’s unique body features, such as voice, retina, fingerprint
or signature, activate these locks.
5. Manual logging – all visitors should be required to sign a visitor’s log indicating their name,
company represented, reason for visiting and person to see. Logging typically is at the front
reception desk and entrance to the computer room. Before gaining access, visitors should
also be required to provide verification of identification, such as a driver’s license, business
card or vendor identification tag.
6. Electronic logging – this is a feature of electronic and biometric security systems. All access
can be logged, with unsuccessful attempts being highlighted.
7. Identification badges (photo IDs) – badges should be worn and displayed by all personnel.
Visitor badges should be a different colour from employee badges for easy identification..
8. Video cameras – cameras should be located at strategic points and monitored by security
guards. Sophisticated video cameras can be activated by motion. The video surveillance
recording should be retained for possible future playbacks.
9. Security guards – guards are very useful if supplemented by video cameras and locked doors.
Guards supplied by an external agency should be bonded to protect the organization from
loss.
10. Deadman doors – this system uses a pair of (two) doors, typically found in entries to facilities
such as computer rooms and document stations. For the second door to operate, the first
entry door must close and lock, with only one person permitted in the holding area. This
reduces risk of piggybacking, when an unauthorized person follows an authorized person
through a secured entry.
The Workstations
• Workstations should ALWAYS be logged off or locked out whenever unattended.
• Screens positioned such that they cannot be seen through the windows. o Hackers with
telescopes to record keystrokes.
• Workstations should be secured and physically locked while unattended.
• Steel cable that runs through the computer case and attaches to an “anchor” to prevent
the tower from being removed
Safeguarding the Computer Rooms
• Keep the doors locked
• Tuck networking cables out of sight o Keep networking cables inaccessible
from outside room
• Secure items in the room according to value
• Intrusion detection systems
Page 43
• Ensure walls extend to the physical ceiling versus ceiling panels o Attackers
can gain access to the room via scaling the wall
• Access Control Methods o Biometrics
o Key Card access w/ PIN #s
o Security Guard presence at all times - Watchdogs if the assets merit o
Security Cameras
Fire
• Extinguishers
• Fire Detectors/Alarms
Flood/Water
• Locate sensitive equipment on the second story or above
• Don’t allow water pipes to run through or around computer room
Earthquake/Seismic Vibrations
• Airports, railroads, major thoroughfares, industrial tools, and road construction are
common sources of vibration
• Common solutions involve supporting the foundation of computers with springs,
gelfilled mats, or rubber pads.
• THE most effective solution: o Don’t position your data center near a source of
seismic vibrations Power Outages/Fluctuations
• UPS
o Large solutions available to large power consumption
• Generator o When UPS just isn’t enough
• Extreme Temperature/Humidity o Control must be maintained over the environment
o Larger computers run hotter and thus more susceptible to heat in the room o
Humidity problems with moisture developing on the inside of the machine
Redundant HVAC unit (Heating, Ventilation, and Air Conditioning) that can
handle temperature and humidity control of the computer room,
sheltered from the weather
Page 46