Itc Notes
Itc Notes
Itc Notes
Study Notes
Knowing that you don’t know something and doing something positive
about it, is not only a profound sign of maturity, but it makes life worth
living.
N.C. Uta [2001]
For Caltus
Contents
Chapter 1
Computer Concepts
Computer: An electronic device that works under the control of stored programs,
automatically storing and processing data to produce further data or
information.
Data: These are raw facts, figures, symbols, pictures, etc, which do not
convey a complete meaning to the recipient. These are the objects that
are manipulated in the data processing activities. The term data’s
definition is not absolute as what can be data to one can be information
to another.
Information: These are processed data items that have now been organised into more
meaningful representation. The recipient can understand these
representations.
Information
Processing: These are procedures by which data is collected, transmitted, stored,
processed, output and, communicated and used. This is not a onetime
activity. It goes on for as long as the organisation continues to exist.
Software: These are a set of instructions written in the language of the computer.
The instructions direct the computer on what to do.
Processor This is the device that controls what happens in the computer system. It
is “The Computer”, i.e. is the device that manipulates the data into
information.
Peripheral: These are devices connected to the processor. They include input,
output, storage and communication devices.
Advantages of computers
1 Easy access to data or records
2 Security of information is ensured
3 It reduces the work load for personnel
4 Accuracy of information is ensured
5 It saves storage space compared to other systems
6 It is economic in that it reduces processing costs
7 It can work for 24 hours non-stop
8 It is easily adjustable
9 It is highly reliable in that it can reproduce the same information
2
over and over again without changing it.
10 It is fast because it can process large volumes of data in a short
space of time compared to other systems.
11 It promotes efficiency in data/information communication
Disadvantages
1 They are very expensive to buy, run, maintain, train operators and install
security
2 Sensitive information can end up in wrong hands if the system is not well
designed
3 The organisation has to resort to manual procedures if the computers are
down or if there is a power cut and this delays information processing.
4 Many tend to rely on computers to the extent of wanting them to make
decisions for them yet they are just tools for decision-making.
5 Computerisation causes social ills e.g. unemployment and criminal
activities increase.
6 If used by inexperienced persons it can loose data.
System
A system is a combination of related components or elements designed to satisfy a
pre-defined goal.
Manual System
A manual system uses paper and pen for information processing. Storage is done using
physical files e.g. cash books, receipt books and journals. Communication is done
verbally or using mail.
Electromechanical system
Uses electromechanical devices for processing data, e.g. typewriters, electronic cash
registers and duplicating machines. This system is an improvement of the manual
system. It retains the communication mode of a manual system that is verbally or by
use of mail.
Computerised system
It uses a computer for information processing. Storage is done by the use of magnetic
discs and tapes. Communication is done through computer networks on local area and
wide area networks using telephone, satellite, radio and computer systems. This has
revolutionised data processing operations in that these can be done more quickly,
accurately, efficiently and timeously.
2
Collection Input Processing Output Use
storage
Legend
Control unit
(CU)
Arithmetic
and logic
unit (ALU)
Secondary Storage
Legend:
Signal/Command Flow
Data/instruction flow
CONTROL UNIT
It controls all functions within the computer. It co-ordinates, controls and monitors the
functions of both computer hardware and software.
2
Arithmetic and Logic Unit (ALU)
It performs arithmetic and logical operations. Arithmetic operations include addition,
subtraction, multiplication and division. Logical operations include comparisons,
sorting and merging.
The ALU and Control Unit are ROM chips, that is, they are read only memory. The
data held there is permanently inscribed on the chips. It is therefore a static or non-
volatile memory. It can be read by the computer but cannot be changed by the user.
Switching off the computer does not affect the information stored in these chips. ROM
is used to store programs that the computer frequently needs for its running, e.g., its
operating system. Programs stored in ROM are put there by the computer
manufacture during the last stages of the chip’s development.
MAIN MEMORY
This is also called RAM, which means random access memory. It is a temporary
memory mainly used for user programs. It is a working space/area. This memory is
volatile, that is, it can lose information or data by switching off the computer.
2
support 500 simultaneously
user at time
Uses Used for Suitable where General Can be used in
research by high volume of business data the home, school
large data must be processing e.g. and office for
organisations processed e.g. word- playing games,
e.g. Shell, banks, airlines, processing, word-processing,
Ford, GM, telecommunicati spreadsheet spreadsheet
Boeing, ons and travel processing, processing, stock
NASA, industries, large stock control, control, payroll,
meteorologica manufacturers payroll, accounts, etc
l and defence and government accounts, etc.
establishments can be used as
a front end and
backend
processor for
mainframe
computers
Numbe Several Several A few Normally a
r of thousands of hundreds of processors single processor
process high speed processors
ors processors
which are
much more
closely packed
together than
human brain
cells
Computer Networks
2
A computer network is an inter-link of two of more computers for the purpose of
effecting communication between or amongst them. There are three distinct types
of networks:
LAN Topologies/Configurations
Networks can be configured or structured in several ways. The following are some
of the structures of LANs:
i.) Star Configuration
Terminal 1
Terminal 4
2
Disadvantages of Star Network
a) The speed of the network depends on the speed at the centre, and if it is
slow then the whole network is likewise affected.
b) It is vulnerable to failure of the central system
c) There are no direct links among the terminals
d) Security of files/data is difficult to maintain
e) Open to virus attack
Terminal B Terminal
Terminal Terminal
U
Terminal Terminal
S
Terminal Terminal
A Bus Network was also referred to as Ethernet, after the bus network of that name. It
is built around a single strand of cable, called a BUS to which all the devices are
connected. The bus simple connects all devices and does not have control over the
network. BUS LANs are therefore passive networks. A device that needs to
communicate over the network will first monitor the network to see if there is any
traffic. There is a mechanism for avoiding collisions. All communications are
broadcasted across the network, with devices constantly monitoring traffic and
reading only those messages addressed to them. Speeds of up to 10 Megabytes per
second are achievable.
Advantages
1. Each terminal is a computer in its right, therefore the
failure of one device does not greatly affect the
operations others.
2. Work can easily be shared across the many processors
available
2
3. End-user participation is assured as each sub-station
can determine it needs.
Terminal Terminal
Terminal Terminal
Intelligent Terminals
Terminal Terminal
Terminal Terminal
Terminal Terminal
Terminal Terminal
2
Intelligent Terminals
7) Mesh Configuration
Terminal Terminal
A B
C
D E
Terminal Terminal
Intelligent Terminals
It provides many routes through which messages can be relayed from one
terminal to another. It however has the longest line mileage.
Host
Computer
(mainframe)
Sub-Host Sub-Host
(mini- (mini-
computer) computer)
Work- Work-
station station
P P P P P P
C C C C C C
2
A tree network organises network communications as illustrated above. Each level
performs operations that are best suited to its capabilities. The lower levels can pass
difficult tasks to upper levels that have greater computational power than the lower.
The failure of a superior level will affect those below it especially in terms of data
communications.
Examples of WANs
i) ATM systems used by banks to allow clients/account
holders to access funds and perform other transactions
from remote locations.
ii) Laser scanners used by supermarkets at checkout points.
These collect data/information on minicomputers before
passing it to the mainframe computer located at the
company’s main computer centre.
iii) Electronic Funds Transfer at Point of Sale (EFTPOS). It
allows the transfer of money from a customer’s account
into the account of the retailer at the time of purchase.
Both the retailer’s and customer’s banks must be
connected into the network.
iv) EURONET – It links European Union countries for
economic, scientific and technical operations.
v) Links between universities and research institutions.
COMPUTER PROGRAMS:
SOFTWARE
2
Software is the name given to the set of programs that controls the operation of
computer hardware. A broad definition will include the associated documentation
Types of software:
There are three distinct types of software. These are:
1) Systems software
2) Applications software
3) Program languages
Systems Software
-A suite of programs that controls how computer resources are used
-A suite of programs that takes over the control/operation of the computer to the extent
of being able to allow a number of programs to be run without human intervention
-Is a set of instructions and associated documentation that controls the operations of
computer hardware elements, applications software and programming languages.
Usually the computer manufacturer installs systems software. Some of the
software/programs are stored in ROM but others are stored on the disc e.g. DOS.
Included in systems software are utility programs. These are frequently used facilities
on the computer. They include: TRANSLATORS, DBMS, SORT, RENAME, COPY,
EDIT, DELETE and FORMAT. Facilities that a computer system is able to offer are
partly determined by systems software, applications programs and available hardware
devices.
Part of the operating system that remains in main storage permanently during the
running of the computer is called the EXECUTIVE or SUPERVISOR or KERNEL.
The remainder is on DAS(Direct Access storage) where it can be called when needed.
In small computers, the operating system is rudimentary and is called the MONITOR
and is normally permanently stored in ROM and starts execution the moment the
computer is turned on.
2
b) Multitasking: Is able to perform more than one task at a time e.g., printing and
typing simultaneously
c) Single user: Can support one user at a time, i.e., has a single screen, single
keyboard.
d) Multi-user: Can support more than one user at a time, e.g., may two or more
key-stations attached to it.
h) Virtual memory: This is the portioning of main memory into segments, with
each compartment housing an active part of a program. The other inactive
portion will be stored on disc and only called when need. Time sharing, multi-
programming and multi-processing can use this facility.
i) Multi-Access: Allows many users to get the same data/information from the
computer simultaneously.
Applications Software
This refers to computer programs and associated documentation and is designed to
solve a particular problem e.g. word processor, pay roll and process control program.
The ability to change the functions of a given computer attributed to software gave rise
to the name software.
There are two types:
Application packages
These are sets of programs and associated documentation used for a particular type of
problem it can be used by a number of organisations with similar problems e.g. word
processing spreadsheet and data base. They are more useful to small computer users
who do not have the necessary experience or expertise to produce their own software
Advantages of packages
a. Quick implementation results are achievable as packages are off-the-shelf
programs
b. They are cheap because development costs are shared amongst purchasers and they
are produced
from production/assembly line.
c. They are well-tested and tried programs and have a history of success
2
d. They are portable and compatible with many machines
e. They are well documented
f. Maintenance is assured
Disadvantages of Package
a. The user has no total control over the package
b. The package may not be ideal for a particular customer.
c. The package might be too big thus causing memory constraints.
d. The package may do too little and a lot of time and money may be spent
upgrading the program to suitability.
OBTAINING SOFTWARE
When obtaining software the purchaser normally pays for the following:
1) Licence - One pays a licence fee, which outlines the nature of use
e.g. number of users, time, period, place, type of computer and
where software is going to be installed.
2) Installation Guide – It specifies what hardware would be required to
make the software functional and procedures for installation which
may require a specialist.
3) Installation - The user may pay an additional fee if unable to install
the software himself.
4) Maintenance and Upgrading- These may be paid for or may be free
depending on the nature.
5) Support Contract - This provides for assistance if the purchaser is
facing problems with the software, not bugs.
6) User Guide - This is for end users’ reference e.g. manuals
7) Reference Manuals - This is for particular areas where the user
needs reminding especially the critical areas.
8) Quick Reference Guide - These are cards or single sheets e.g.
showing the sequence of commands to perform a particular task
9) Training for the user
10) Membership to a user group
PROGRAMMING LANGUAGES
These are a special type of software which is used to create both systems and
applications programs.
2
Machine language
This is the elementary type of language used by most computers. It is a form of
representation that uses 0s and 1s or binary. In this language instructions are
automatically executed in the sequence in which they occur in main storage. Each
instruction is fetched from the storage by the control unit, interpreted and then
executed. Mechanisms for repetition are there. There are five basic types of machine
instructions:
1) Input/output (I.O) : These control the transfer of data between peripherals and
the processor
2) Arithmetic: These perform arithmetic operations such as addition and
subtraction.
3) Branch: These control repetitions and selections.
4) Logic: These perform logical operations like matching, comparing and sorting
data items.
5) Data handling: These move and manipulate data
Assembler’s Functions
1) Translates symbolic language to machine code and symbolic addresses to
actual machine addresses.
2) It links object code to subroutines.
3) It allocates areas of main storage to various programs.
4) It indicates invalid source language instructions.
5) It produces object programs on disks or tapes.
6) It produces printed listing of the source program with comments.
7) One symbolic instruction is translated into one machine code instruction.
2
5) They are highly user friendly.
6) They are highly portable (can run on variety of machines without the need to
modify them)
7) They are easy to maintain.
A compiler’s translation is done once. Thereafter the object program can be loaded
into main storage and executed. On the other hand an interpreted program is translated
every time the computer executes it. The execution is 10 times slower than the
equivalent compiled program.
Interpreter
An Interpreter is a program which converts source language instruction one line at a
time during the running of a program. It does not produce a copy of the original source
code.
Interpreter uses
a) Handling commands in an interactive system.
b) Debugging programs as they run
c) Handling software produced for or by a different computer that is if:
d) Similar machines are to be connected together.
e) Software produced on an older model and not yet converted is to be run on a
new machine.
N.B. Both the interpreter and the program are to be accommodated in the main
storage when the computer executes the application program and this congests
the memory.
2
NB The above are procedural languages because they describe how the
computations are carried out.
Non-Procedural Languages
These describe WHAT the required result is rather than HOW it is arrived at, e.g.
PROLOG. They are also called “4 GLs”. They allow one to :
1) Define data.
2) Define what processing must be performed on the data.
3) Define layouts of reports or screen-based forms including the formats of
printed or displayed data.
4) Define processing operations to be carried out in the preparation of reports or
in the user’s interaction with screen-based forms.
5) Define input data and validation checks.
6) Select a combination of standard processing operations.
7) Handle user queries
8) Some incorporate GUIs (Graphic User Interface) particularly Wimps.
Chapter Questions:
1) Define the term “Computer”. How does a computer
differ from a computer system?
2) Explain the meanings of the following terms: Data,
Information, Hardware, Software, Information
Processing
3) Cite and explain advantages and disadvantages that
arise when an organisation uses computers for
information processing
4) Draw a labelled diagram to show the structure
(configuration) of a computer system. Show data and
command flow.
5) What are the determinants of the speed of a
computer’s operation?
6) Define the term LAN. Show network configurations and
describe each briefly.
7) What is the importance of networking your computer
systems: locally and globally?
8) There at least three broad types of software. What
are these and what roles do they play in a computing
environment?
9) A user can interact with a computer through GUI,
Menu, and Command driven interfaces. What are these
and how far easy do they help the user operate a
computer?
10) How are assemblers, compilers and interpreters
related and different? Spell out their functions.
11) What are the functions of systems software?
12) Describe the following terms: Multi-user; Multi-
processing; Single-tasking; Virtual memory; Time
sharing
CHAPTER 2
COMPUTER HARDWARE
2
Computer Model/Organisation of a simple computer
Main memory
data & programs under
execution
Secondary Storage
data and programs stored on-line
Four basic parts of a computer system are input, output, storage and central processing
unit. All input, output, storage and other devices are called peripherals.
The CPU can be thought of as the brain of the computer, since it is this part which
coordinates the operations of the rest of the computer system. The CPU is referred to
as the chip or microprocessor or processor. Small computer systems are likely to be
built around a single processor. Large computers may have several processors that
enable them to operate and share the workload.
Arithme Control
tic & Unit
Logic (ROM)
Unit
(ROM)
Central Memory
(RAM)
Computer Memory
Is divided into 2 distinct types namely permanent and temporary memory. Temporary
2
memory uses electrical power in order to hold data. If electricity supply is cut off the
information held in this memory is also lost. Because of this it is called volatile
memory. This is also called RAM, Primary, Core, Central, Internal, Main or Immediate
Access Storage.
EPROM This refers to a chip which can be bought from a computer a manufacturer
and programmed by the user just as PROM. However, the chip can be erased and
written onto again by using special devices to both erase and delete the information.
Once written onto, the instructions cannot be deleted by a simple delete command
issued by the user through software. Exposure to ultraviolet rays can cause cells to be
discharged or deleted.
RAM is the memory which is available for programs or data that a computer user
wishes to use in addition to those in ROM which tell the computer how to work. The
more RAM the computer has the larger the programs and the more data it will handle.
Only a small part of the information that an average computer uses is likely to be on-
line, the rest is stored until it is needed. This storage is referred to as secondary or
supplementary storage. It comes in 2 basic forms: DISK BASED and TAPE BASED
storage.
Input Device - This is computer machinery used to input/feed data into the computer.
Each type of input device has been designed for a particular need e.g. Banks use
devices that allow a large number of cheques to be cleared quickly. Architects and
designers use devices that allow designs to be input quickly. However the most widely
used input device is the keyboard. Once information is input into the computer, it is
said to have been captured. Data capture is another term for data input.
2
Output Device - This is the means by which the computer presents the results of its
processing whether as text, graphics, tables or some other form. A permanent form of
output such as computer printout is called a hard copy. Output that is not in permanent
form is called softcopy. It may be in the form of a screen display or in audio output.
N.B. Each computer is built around one particular chip. The chips have the same
basic structure but differ in:
a) Speed of operation
b) Amount of data each can handle at a time
c) Amount of memory each can use
d) Number of tasks each can perform at once
Connection points
Features of Chips
a) Its operation is wholly electronic
b) It is very fast and reliable
c) It is cheap
d) It is highly miniaturised
The Fetch-Execute-Cycle
In addition to the three components of the CPU we have high-speed devices called
registers. Registers speed up execution of the CPU instead of using the ALU.
2
register called memory data register.
The whole process in which a computer system executes instructions is called a fetch-
execution-cycle. It can be summarised as follows:
1) Locate the instruction to be executed using the instruction register via the
memory address register.
2) Locate the instruction in 1) above using the program counter.
3) Send the instruction pointed to by the program counter to ALU via the CU
4) Locate the next instruction to be executed using the instruction register.
5) Analyse or decode instruction pointed to by the program counter.
6) Execute that instruction
7) Go back to step 1
The fetch is the stage at which an instruction is located in storage. When the
instruction has been located the computer must then decode which means interpreting
the instruction to determine the kind of operation which is to be done on it. After the
decoding process the instruction is then executed or manipulated to produce the
specified results. Thereafter the next instruction is fetched.
Chapter Questions:
RESEARCH WORK
Address Formats
Addressing modes
Coding of data in computer systems
Attributes of information
Computer Personnel, their qualifications and duties
Computer, data and information control and security
measures
CHAPTER 3
DATA REPRESENTATION & Software
2
When you press a button on a computer, a signal is sent to the processor which in turn
sends a signal instructing a device to do something. All the communication inside the
computer is in the form of electronic signals, and for that reason the data that is used
by the computer is also stored using electrical signals. An International Distress Signal
(SOS) is represented by … - - - …, a Morse Code. Inside a computer a code is used
which is similar to Morse Code. The two (2) states of . and – are represented in the
computer as an ON and an OFF so that … - - - … becomes ON ON ON OFF OFF
OFF ON ON ON. These two states are in turn represented by digits 0 and 1 of the
binary number system so that our message will now look like 111 000 111. Generally 8
elements each either a 0 or a 1 are needed to represent a character using a computer
code.
1) Absolute value
Absolute values are allowable numbers to be used in a numbering system. The values
are bounded by a minimum number and a maximum number. These boundary numbers
are included in the numbering operations, e.g. in Binary 0 and 1 are used; in Octal 0 to
7 are used; and in denary (decimal) 0 to 9 are used.
2) Positional value
The positional value is the value or weight a digit has on the basis of its position in a
number, e.g. given:
3 9 T H T U
7 6 h
3 6 7 9
7 6 9 3
9 3 7 6
6 9 7 3
9 7 6 3
etc
Some of the computer codes commonly in use are American Standard Code for
Information Interchange (ASCII), Binary Coded Decimal (BCD) and Extended Binary
Coded Decimal Interchange Code (EBCDIC).
ASCII Representation
1 49 0011 0001
2 50 0011 0010
3 51 0011 0011
4 52 0011 0100
2
20
BCD Representation
1 1 00 0001
2 2 00 0010
3 3 00 0011
4 4 00 0100
EBCDIC Representation
In ROM the cells of storage are permanently charged. They cannot be changed. In
RAM cells can be changed at will, that is, the states of positive and negative can
alternate depending on the bits being stored.
Input of Data
There are a number of ways through which data is input into the computer.
1) Keyboard Keying
2) Mouse Clicking
3) Barcode reader Reads bar codes
4) Document reader Reads actual documents
5) Voice input Recognises words
6) Touch screen Senses touches on the screen
7) Card reader Reads information on cards
8) Pen based input Uses light pens
9) Graphic input Uses image and video scanners
10) Joy stick Uses a gear/lever
Data collection
Is the process of getting data from the point of origin to a computer in a form suitable
for processing. It starts at the source of raw data and ends when valid data is within the
computer in a form ready for processing. The following stages normally apply:
2
a) Data creation
b) Data transmission
c) Data preparation
d) Data conversion
e) Data input
f) Data sorting
g) Data control, which occurs at all stages
1) Data Creation
a) Source documents
In this case data cannot be readily read by the computer. It is a form of
clerically prepared source documents e.g. writing hours worked on a piece of
paper for later input to the computer for processing a payroll. This method has
a number of problem, such loss of documents, errors in copying/typing-in of
data, is tedious and slow.
b) Data Capture
Data is produced in machine readable or sensible form at source. It is read-in
directly by suitable devices, e.g. Barcode Reader, MICR, OMR, etc. This
method is faster than the use of source documents, is less error prone and is
less labour intensive.
2) Data transmission
This is a method through which data is moved from the source of origin to the
machine that will do the actual processing. This can be done through two
distinct methods:
a) Physical Transmission
This is where data is moved by postal services, messenger or courier
services.
b) Electronic Transmission
This is where telecommunications systems such as telephone system,
radio, satellite, computer networks and optical fibres are used.
Objectives of Control
a) To ensure that all data is processed
If some data remains unprocessed, the final results will not be reflective of
the true position of the situation on the ground. A decision maker will then
2
have difficulty in making a wiser decision.
Types of Errors
a) Missing source documents e.g. invoices might slip out of a batch and this
might not be noticed
b) Source documents in which entries are omitted, illegible or dubious e.g.
omission of a name
c) Transcription and data preparation errors
d) Machine hardware faults
e) Program faults
2
d) Re-keying
The same data is entered twice say by two different people. The second
entry is checked against the first entry, if the two do not match, the source
of the error is found. Necessary corrections are then carried out.
2) Validation
This is a program built into the computer which automatically checks and
reports incorrect entries or entries that do not conform to specified
standards. Areas that can be validated are:
Presence check
This is a check meant to ensure that all necessary fields of a record have
been completed and none has been left blank
Size check
This is a check meant to ensure that a field is made up the correct number of
characters, that is, it must not have more or less than the required number
e.g. An Account number may have no more nor no less than a given number.
Range check
This is normally used on numeric fields i.e. it is a check which ascertains
that a value within a field lies within the minimum and maximum allowable
boundaries, e.g. a day value falls between 1 and 31, a month value falls
between 1 and 12.
Type/character check
This checks whether the required characters constitute a particular field i.e.
if a field is supposed to be made up of alphabetic characters only, so be it.
An age field may contain numeric characters only and an account number
may contain both numeric and non-numeric characters.
Format check
This spells out the way the characters are arranged within a field e.g. it can
be two digits followed by a dash followed by six digits followed by an
alphabetic character, space and end with two digits as shown below:
43-780987D 48 for ID Number.
Reasonableness check
It checks whether quantities are either too low or too high, e.g. 100 hours
worked per week by one person is unreasonable.
Check digit
This is normally used in association with numeric digits. Its primary
purpose is to minimise or control transposition, that is, the interchange of
digit positions within a number. Modulus 11 is normally applied to check
digit e.g.: Number 48763
Number: 4 8 7 6 3
Weights: 5 4 3 2 1
{(4x5) + (8x4) + (7x3) + (6x2) + (3x1)}/11
= (20 + 32 + 21 +12 + 3)/11
2
= 88/11
= 8 remainder 0
The number becomes 487630
Parity Check
This is primarily used in data transmission to ensure that data has been
correctly moved from point A to B. There are generally 2 forms of parity that
is odd and even parity.
Odd parity: The ones (1s) making up the character code should add up to
an odd number,
if not, a parity bit is added. The sending and receiving devices are
synchronized to understand the same parity. If the bit pattern to be sent is
111 000 111 then a 1 must be added, on the other hand, if the bit pattern 101
010 is to be sent, then there is no need to add another bit as the ones add up
to an odd number.
Even Parity: The total number of ones making up a character code must
add up to an even number, if not, a parity bit is added.
Echo Check
This is used in data transmission. This is whereby an answer back code is sent
back to the source after the data has been received by the destination. This
answer back code is confirmation that the data has been received.
Read-after-write Check
A two-gap dual read/write head first writes data onto a storage medium then
immediately reads what has just been written. A rewrite is effected if an error
occurred at writing. This is meant to ensure that data has been accurately
written on the storage medium.
The last two are more of verification than they are validation checks.
SUMMARY OF COMPUTER INPUT
DEVICE SPEED FEATURE APPLICATION
General text input. Is the most
Keyboard 5 cps Qwerty layout widely used input device
Mouse - Hand held device that Used with GUIs, windows and
controls an on-screen menus as a way of selecting
cursor options. It is not used for text
2
input
- Is a special screen that It is used as a way of selecting
Touch enables a user to choose options with the menu system.
Screen an option by touching an Can be used for inputting text
image on screen
Voice - Can be used to input Used in areas where hands are
words in a particular not desirable
language
Optical 2000 Reads OC, type-writer Is used for large scale input,
Character doc/min fonts and neat hand e.g. for billing by Electricity
reader writing and water suppliers
Optical 200 Reads marks in set places Used in marking multiple
Mark Doc/min on special documents choice answer sheets
reader
2000 Reads specially Used by banks to speed up the
MICR Char/min formulated characters clearing of cheques
which contain magnetic
particles
Bar Code Reads patterns of bars Used in retail shops, libraries
Reader 1.8 which indicate a code and stock control systems
cm/sec number
Card - Reads information on Used for security systems,
Reader magnetic stripe cards telephone and banking
Graphs Pad - Enables existing and free Used with (CAD) Computer
hand drawings to be input Aided Design Software in
into the computer architectural and design work
Image - Captures 2-dimensional Used by designers and as part
Scanner diagrams, tables and of publishing systems
pictures in digital form
Video - Captures an image either Used by designers and as part
Scanner of an existing picture or a of publishing systems
3-deminessional image in
digital form
Magnetic Information is stored Used when large volumes of
Tape or 3-5 magnetically on disk or data are to be input as a way
Disk million tape of maximizing the rate of
cps input
Input Media
Refers to where data and/or information are recorded, from where it will be read into
the computer for processing. The media include:
1) On paper data – which is keyed in, document read, scanned
2) Cassette – for transfer on to magnetic tapes or disks
3) Diskette – for transfer on to magnetic tape
4) Optical disk for inputting programs or packages
Online Systems
These are devices that work in conjunction with computers in order to process data. An
online system is a situation where by the user is able to enter information directly into
2
the computer for immediate processing. Transactions are used to update the master file
as they are entered.
Online Peripherals
Online peripherals are devices that are directly linked to the processor. This is
achieved through the use of telecommunications systems e.g. telephone or direct
privately owned lines. Entry is through keying-in via a keyboard or via a document
reader. No physical transportation of source documents to the processing point is
necessary. There are minimal delays in processing information especially where there
is 2-way transmission between the terminal and the computer. Useful in time critical
operations e.g. process control, ATM, Airline Reservation, etc.
2
taken to ensure that, if the current working copy is lost, it can be recreated and
operations can proceed.
2) Password, User code, Terminal code and Encryption can be used.
3) For applications like manufacturing, EFTPOS, Nuclear, chemical stations and
air-line traffic control which can not afford a system failure, it may be
necessary to have a duplicate computer on standby.
If we assume that we have a new system in which the master file (MF) is updated from
the Transaction file (TF) in a batch at the end of each working day, the system would
work as follows:
DAY1
MF1 is update with the day’s transactions held on TF1 to produce next day’s MF
called MF2. MF1 and MF2 are both stored in a safe place.
DAY 2
MF2 itself is updated with the day’s transactions on the TF2 tape to produce MF3.
MF2 and TF2 are both stored in a safe place. At this stage we have three versions of
MF, i.e. MF1, MF2 and MF3. MF1 is called the grandfather file, MF2 the father file
and MF3 is the son file.
DAY 3
MF3 is in turn updated with the day’s transactions stored on TF3, the results being
stored on MF1 tape which now becomes MF4, the new son file. MF3 is now the new
father file and MF2 is the new grandfather file. MF2 and TF2 are both stored in a safe
place, possibly in another location.
2
DAY 4
MF4 is updated with the day’s transactions stored on TF4 the result being stored on the
MF2 tape which now becomes MF5, the new son file. MF4 is now the father file and
MF3 the new grandfather. MF3 and TF3 are both stored in a safe place possibly at a
remote location.
Distributed Processing
This is where information is processed at a number of separate locations, which may
then share results and work in cooperative manner. It differs from the centralised
system where terminals are connected to a single computer. It uses LANS and WANS
to link up computers and enables information to be exchanged. The configuration of a
distributed system is as shown below:
Other Configurations
Centralised system
DEPT
TERMINAL
DEPT DEPT
TERMINAL HOST TERMINAL
COMPUTER
(Central System)
DEPT
TERMINAL
2
hand. The system allows data standardization and minimizes data and program
duplication. Common data is available to all who need the data. Consolidated reports
are easy to make as data can easily be drawn from different files and integrated into a
single report.
Decentralised System
Bureau Configurations
1) On-line structure
Client Company
Terminal
Client Company
Terminal
The on-line bureau service allows data to be sent from Client Companies to the Server
(Bureau) Company electronically. However, processing may occur after some time or
it may occur immediately. The terminals are used either to sent data or receive results
of processing. The Bureau charges the Client either a fixed monthly charge or it may
2
charge on the basis of volumes processed or time used on the computer.
2) Off-line Structure
Bureau
Input Batch Computer Output For
From Client Client B
B
Chapter Questions:
CHAPTER 4
INPUT DEVICES
1) Keyboard
It resembles a typewriter, but has additional special keys. Data is entered into the
computer by depressing the relevant keys on the keyboard. It enables the keying-in of
2
numeric, alphabetic and special characters. It has function keys that allow the
performance particular activities either through the use of single keys or as a
combination of keys.
2) Character Recognition
Source documents are prepared in machine sensible/readable form and thus no
transcription is required. The documents are also human readable.
Features of Documents
a) Document is printed in a styled form that can be recognised by the
machine.
b) In the case of optical marks e.g. scanner sheets, predetermined positions
on the document are given values and when shaded tally with the value.
c) Good quality printing and paper necessary.
d) Size of document and scanning area maybe limited.
e) Documents must be undamaged
Application of OMR
Billing e.g. of gas, electricity, water and insurance premium renewals. OMR is
used in combination with OCR for the above said documents.
Features of MICR
1) Document is written with iron oxide in the ink which is magnetised at
reading.
2) Can read up to 2400 characters per minute.
3) Very high print quality needed.
4) Characters should be in highly distinctive type style, e.g. bold or italics.
5) Size of document is standardized and scanning area may be limited
2
b) A pen sensitive screen, usually in the form of an A4 sized note pad or the
monitor/screen itself.
c) A powerful character-recognition software.
The current generation of pen-based word processing systems require the user to
learn a set of editing commands for such tasks as cutting, pasting, deleting and
inserting text. Some systems can be trained to recognise a particular user’s
handwriting.
4) Mouse
Developed in order to get over the problem that non-typists had with using the
keyboard to communicate with the computer. It is used in conjunction with
windowing systems and GUIs in which the use of visual prompts/icons is practical,
rather than using memorized commands. It is a desktop device in which the
movement of the mouse by the user on the desk controls the movement of an on-
screen cursor. The cursor travels around the screen in response to the action of the
user moving it. To select a desired option you point at an icon or visual prompt and
press/click a button on the mouse to select it rather than having to type a complex
command. On clicking a window opens and further options are displayed and can
be selected as per need. Used in conjunction with the keyboard.
Applications of a Mouse
Include generalised use, desktop publishing and graphics. Some mouse-based
systems allow copy delete, calculator, diary, etc, functions to be performed.
Features System
1) Documents/Items have barcodes arranged in vertical bars interleaved with spaces
that can be read by an optical scanner and used as a means of identifying
products/stock items.
2) Speed of reading is about 1.8cm/sec
4) Types of bar codes used are EAN (European Article Number) and UPC
(Universal Product Code).
The bar-code reader scans/reads coded data when item is passed over the scanning
device. It then refers to the central computer for description and price. This
information is relayed to checkout points where it is displayed on a customer panel
and printed on the receipt. At the same time, the stock level of the item purchased
will be reduced, providing management with up-to-date stock information and
enabling more efficient stock-control and ordering.
2
used at POS, chemical works and breweries.
Data Loggers/ Recorders
Record and store data at source. The data is input into the computer later.
Features
Contain own microprocessor and data storage device/medium or radio transmitter.
Magnetic cassettes are used for storage. Data entry is by means of a small keyboard
8) Tags:
Used as a data collection technique usually with clothing retail applications. Tags
were originally miniature punched cards but now are in magnetic strip form. A
special code, which may include data items such as price, type and size of garment
and branch/department are recorded on tag by a machine. Tags are affixed on
garments before sale and removed at POS for processing later. Tags are converted
to disk/magnetic tapes for input into the computer. Data is captured at source, and
there is no need for transcription.
1. Appropriateness
Appropriateness implies suitability of a device to a particular computing or data
processing operation. A process control would need a system that is able to capture
events as they happen rather than wait for keyboard entry.
a) Magnetic Media:
Tape and magnetic disks are used for storing data that will be processed by the
main computer. It enables checking and controls to be effected on data keyed.
Tapes and disks are relatively cheap. They can be reused for as much as 50 000
times.
b) Character Recognition:
i) MICR confined to banking very reliable, but expensive
ii) OCR more versatile and less expensive than MICR
iii) OMR very simple and inexpensive, however needs specially prepared
fonts and also requires standardized documents e.g. grade 7’s
scanner sheets
c) Terminals:
Are a means of a DDE (Direct Data Entry). They are costly to provide because
of the detached branches and data transmission lines required. They are a fast
and convenient way of data transmission.
d) Special Media:
Tags and bar-coded strips reduce cost, but are tailor made for particular
applications.
2. Time
This is quite fundamental. The quicker the response the costly it is e.g. online
systems. Some systems would require that the input be transferred very quickly into
the computer and results be obtained instantly. Such a system would normally
2
require a fast input method. A payroll system on the other hand, may not require a
very fast input method as the data can be collected over a period of time before
being processed at month-end or at weekend.
3. Accuracy
Data must be clean because errors may cause delays in data processing. Entries
through keypunching via the keyboard may suffer from errors of omission,
commission and transposition, therefore, if data is to be very accurate keyboard
entry method may not be ideal. Data capture devices are normally more accurate
than keyboard entry.
4. Volume
The larger the volume of the data, the faster the method ought to be as this would
ensure that the data enter the system in time for processing. Some systems will not
be able to handle large volumes of data, for example, a keyboard at 5 characters per
second is very slow.
5. Confidence
Record of success of the system should be taken into account. A well-tested and
tried system would be ideal to use than a new one. Generally a system that has been
in operation for some time and had been used elsewhere successfully, would find
easier acceptance than a new one that has not yet been used anywhere.
6. Input Medium
The input medium on which the data sits also determines which method can be
adopted. If data is paper-based and the data is such that no there is need for a lot of
editing before entry, then keyboard entry may be ideal. Some are faster and some
are slower.
Chapter Questions
1) Describe in detail the operation of:
(i) Keyboard; MICR; Light Pen; Tags
2) Describe five (5) factors that determine the choice
of data collection methods and media
3) How do data capture devices overcome some of the
problems associated with traditional data input
methods? What are these “problems” mentioned above?
4) Which applications/situations are best fitted to the
application of pointing devices such as mice?
5) What do the following mean: Command Driven, Menu
Driven and GUI interfaces?
RESEARCH WORK
Find out information on:
a) New input devices, their purposes and how they
function
b) Components that can be added to an already
working computer to enhance its capabilities. (
Hint: Computers are built on a modular basis)
2
c) Modern Programming Languages and their features
and applications
d) The role of computers in Industrial, Education,
Health, Domestic, Commercial and Communications
environments.
e) Social implications of computerisation.
CHAPTER 5
OUTPUT DEVICES & MEDIA
Computer output can take the form of a display on a screen, printout, the control of a
mechanical device or the transfer of information onto magnetic disk/tapes. Most out
put falls into one of the two categories:
1. Hard copy which is in a permanent or printed
form.
2. Soft copy which is a display on the screen or
is in audio form.
Visual Output
On-screen display or CRT (cathode ray tube). Operated by converting electrical signals
into visual display. Displays can either be colour or monochrome. CRT is a major
component in a number of devices notably VDU, TV and the monitor. VDU enables
the user to input information to a computer using a keyboard, a mouse, or a touch
screen facility and to view output on a monitor. Image displays on CRT are made up of
a number of small dots or picture elements called pixels. The more pixels a computer
is able to use to generate its display, the greater the sharpness/resolution of the image.
Liquid Crystal Displays (CDs) can be used especially on portable computers and on
digital watches because they are not heavy and do not consume much power.
Audio Output
Synthesized signals and speech/voice converted into digital form and stored in RAM
or on disk to be output later. Speech synthesis is the production of sound
corresponding to spoken words.
It's now usual for all printers to have their own on-board RAM called buffer storage.
2
Instead of the computer only sending text at the speed it will be printed, a buffer
enables the entire document to be down-loaded or transferred into the printer buffer for
printing whilst the computer performs other processing functions.
Further Classifications
Features
Mimics the action of a typewriter by printing single characters at a time in his
lines across stationery. Print heads move to, from and across the paper,
stopping momentarily at each character position to strike a print ribbon against
the stationery with an array of wires. According to the number of wires in the
print head, character matrix may be 7*5, 7*7, 9*7, 9*9 and even 24*24. The
more the dots the better the image. Line widths range from 80 through
120,132,160, characters across the page. Speed ranges from 100CPS-300CPS.
Multiple copies can be produced through use of carbon ribbon. Supports
graphics.
2
3 Main Types of Line Printers:
a) Drum printers
b) Chain printers
c) Band printer
Page Printers:
Print an image of the whole page at once. The image may be made of conventional
diagrams, pictures and text or as a combination of these. According to the technical
features these printers are also known as laser or xero-graphic printers. An
electronically controlled laser beam marks out an electrostatic pattern on the surface of
the drum. The toner is then transferred to the stationery as the stationery comes into
contact with the drum. A typical high-speed laser printer prints 146 PPM. The laser
printer prints a combination of text and diagrams or pictures and is therefore very
useful for producing manuals, magazines and other publications. They are used in
conjunction with word processors and more advanced document creation systems such
as desktop publication.
Desktop Printers:
Are suitable for use in an office environment and look very similar to photocopies.
They have paper trays just like those of photocopiers. Speed varies but is not more
than 10PPM. The quality of output is very high.
Thermal Printer
A thermal printer is a non-impact character printer, which prints onto special papers
using heated print heads. It is very quiet and this gives it a very big advantage in some
applications where noise is unwelcome.
Microform Recorders
Microforms are photographically produced documents on film there 2 types:
a) Microfilm is a 16mm roll film
Holds 3000 A4 pages
2
Output is written onto a magnetic tape, which is then fed onto a machine called the
microform recorder. It reads the magnetic tape and copies that data onto the
microforms. The information can be subsequently inspected by using the
microfilm viewer that projects onto a screen. The following diagram illustrates:
Tape
unit/drive Printer Print out
Computer
Microform
recorder Transducer/ View
converter station
Advantages of COM
1) Less storage space required if documents have to be saved.
2) Easy to retrieve data
3) Multiple copies of the film can be made
4) Mail postage is cheaper if information is to distributed through mail
5) Robust (adapts to different types of environments)
Disadvantages of Com
Graph Plotters
These are specialist devices which are used to produce high quality pictures and
designs. They reproduce the human action by drawing using a pen. They draw an
image using a pen that is moved to, fro and horizontally or vertically by 2 separate
motors. Circles and diagonal lines are drawn by moving each motor in turn. These are
2 types of graph plotters:
Pen Movement
Directions
Pen
2
2) Drum Plotter
It only moves the pen to plot the y-axis, moving the paper itself to plot the x-
axis.
Speed of up to 8cm/second is achievable.
Chapter Questions
1) Describe two major categories of output and cite
situations where each would be more ideal.
2) What are the differences between audio output and
visual output?
3) Printers can be described by amount of print
produced at once, speed and impact. Explain these
classifications of printers
4) Compare and contrast a laser printer and a dot
matrix printer in terms of their features
5) Draw a labelled diagram of a daisy wheel or dot
matrix printer
6) What advantages and disadvantages do microforms have
as output/storage devices?
7) Define the term “spooling” and explain its operation
and importance in computing environments.
8) What improvements have been done on modern day
computer screens and printers?
9) Technology relating to computer output continues to
change. Cite some of the latest changes to
computer output systems that have made computing
easy to many.
CHAPTER 6
COMPUTER STORAGE
Computer storage may come in different forms. The purpose of computer storage is to
support the main storage, which is limited in many ways.
Registers
CPU
Increasing Speed & Cost
Cache Memory
SECONDARY
STORAGE
A variety of storage devices are used in an effort to achieve the best performance and
largest capacity at reasonable cost, i.e. optimum speed and capacity at minimum cost.
Register storage
These are cells inside a microprocessor that facilitate the execution of instructions,
acting as temporary holding areas for both instructions and data. can serve a specific
function or a general purpose, eg, to store intermediate results during processing.
Some of the temporary holding areas are called accumulators.
Cache Memory
It allows the computer to load and reference information that it anticipates it will need
in the near future. With controls, active program parts are stored there.
Buffer Memory
It bridges the speed gap between the operation of the main memory and that of the
secondary storage device. If there are segments of the program that are resident on disc
which may be required later, these may be stored in the buffer so that the are easily
accessible. Data or results of printing may also be stored in the buffer so that the
printing process can be done from that buffer to free main memory for use by other
programs.
Hard discs
These normally supplement the main memory by keeping data or programs on-line
which may be required regularly by the computer. Since these have greater storage
capacity than the main memory they are able to store larger amounts of data. They are
also able to store information without power support, that is, where information which
may be needed in future may be kept.
2
for confidential data that must be kept away from the computer. They may also be
used to backup the hard disc so that in the event of a disc crash or a virus attack data or
information will be able to recovered.
Exchangeable Disk
Access Mechanism
Read/Write Heads
This may come individually or in stacks of 6/11. The term exchangeable means that
when the data they contain is required these disks must be loaded by an operator into
special disk drives to enable them to be read by the computer. Storage capacity
depends on the number of disks in the stack and the density with which data is stored
on disk. Capacities of over several gigabytes per disk pack/stack are possible.
Advantages
Fixed Disks
Are located permanently inside a computer. Offer better performance than
exchangeable disks. Storage capacity is several gigabytes per disk. They have fast
access times. Their construction is similar to that of exchangeable disks.
Fixed-Head Disk
Spindle
Read/Write Heads
Have read/write heads fixed permanently over each track on the surface of each disk,
so a disk with 200 tracks will have 200 heads for each surface. As a result high speeds
of access are achieved because the delay caused by the head moving back and forth is
2
non-existent. Can store several gigabytes of data and have access time of about 3 milli-
seconds.
Floppy Disk
Thin flexible magnetically coated disk protected by a semi-rigid jacket. The common
ones in use are 3 ½ and 5 ¼. Floppies are inferior to hard disks in many respects:
Floppies, however can be used for porting software between machines and for backing
storage.
Magnetic Tapes
Plastic tapes coated with a thin film of magnetic material. It can be an open reel of
tape, in a cassette or cartridge. It is a serial access medium and therefore is not a
suitable means of storage if the data it contains is to be accessed at random.
Reel Tape
Used with mini and mainframe or as a means of storing data that is to input for
processing or else for backup of information held on hard disk. Can store 100s of
megabytes of data.
The Header label contains information about the tape itself including the file-name,
creation date and the date after which it can be over-written (purge data). When the
tape is loaded details the header label is checked to ensure that a correct tape has been
loaded. A trailor label provides a crosscheck that ensures that processing is completed.
Data is read from or written to tape 1 block at a time and transfer rate is in excess of
1megabyte/second. Tape is reusable for as many as 20 000 to 50 000 times. The tape
can be used for both I/O purposes. For security purposes a special device is used and is
called a write-permit ring.
Cassette
2
Used to take copies or backups of files held on disks.
Optical Disks
Store information in the form of a series of microscopic pits on the surface of a plastic
disk. Information can be read from the pits with the use of a finely focused laser
beams. Store data at a much higher density than magnetic media e.g. a high-density
5¼ floppy stores 1.2 megabytes, whereas an optical disk of the same size can store 800
Megabytes. Because laser beams read optical disks, the disks do not suffer from wear
as do magnetic media. Disk surface is protected from damage by a clear plastic coating
that enables a disk to be touched unlike magnetic media.
Uses of CD-ROM
CD-ROM is able to store large amounts of written, graphic and/or audio data and
therefore can be used by banks, building societies, and post offices.
There are also Recordable Compact Disks and Re-writeable Compact Disks. The
former is recorded once and thereafter it becomes ROM. The latter is recorded and
erased at will.
2
Access
Exchangeable Random 600 30 >1 Mbytes/ Sec
Disk stack Mbytes milliseconds
Fixed Head Disk Random 10-20 GB 3-5 ms >1 Mbytes/Sec
Floppy Disk Random 1.4 MB 800 ms 60 Kbytes/Sec
Reel Tape Serial 100 Up to 60 Sec 1 Mbytes/Sec
Mbytes
Cd-ROM Random 850 1 Sec 170 Kbytes/Sec
Mbytes
WORM Random 4 Gbytes 50 Ms 1 Mbytes/Sec
DVD Random >10 GB 3-5 ms 1MB/sec
ACCESS TIME
Access time is the amount of time taken to locate a particular record on tape/disk. It
may be made up of seek time, rotational delay and data transfer rate.
Seek time
This is the time taken to move the read-write head to the appropriate track or cylinder
holding the data that need to be retrieved.
Rotational delay
This is the time taken to rotate the disk so that the sector or block holding data lies
below the read-write head, ready to be accessed.
Bits Binary digits generally 8 bits are needed to form a byte or character.
Byte Generally it is a character = (2^0)
Kilobytes 1024 bytes (2 ^10)
Megabytes 1024* 1024 bytes (2^20) = 1 048 576 bytes
Gigabytes 1024 *1024* 1024 bytes (2^30) = 1 073 741 824
bytes
Tetra bytes 1024 *1024*1024 *1024 bytes (2^40) = 1 099 511 627 776 bytes
Chapter Questions
1) Exchangeable, fixed, fixed head, floppy and optical
disks are used for computer storage. Describe;
differentiate in terms of characteristics; and
identify situations where each type would be ideal
for use.
2) Why is magnetic tape generally used as a backup for
data stored on disk instead of being used for storing
data/information that needs to be accessed directly,
i.e., for on-line operations?
2
3) What is Access Time? It is generally made up of three
aspects. Name and describe each briefly.
4) Define the following:
(i) Bit
(ii) Byte
(iii) Kilobyte
(iv) Megabyte
(v) Gigabyte
(vi) Tetra byte
RESEARCH WORK
Find out information on:
(a) Data bases and the storage devices necessary for
storing large data bases
(b) The work of Database Administrator; Network
Administrator; Computer Operator and Data Capture
Clerk
(c) The ways Internet can be used in various business
situations
Why is it that computer people need to keep on learning
new computing skills and concepts?
CHAPTER 7
BINARY SYSTEM
The binary system is based on the numbering system that has 2 as its base.
1) Absolute value
The absolute values of a numbering system are the minimum and maximum
allowable value, e.g. In Binary 0 and 1 are the only allowable values. Two (2)
cannot be used.
In base 8 allowable values are 0-7
In base 10 allowable values are 0-9
In base 16 allowable values are 0-15
2) Positional value
The positional value defines the weight of a digit on the basis of the position
the digit occupies in a given number. The following examples illustrate:
2
1 0 1 0 7
0 1 0 8 3
9
Value 8 4 2 1 100 10 1 1 64 8 1
0 0 0
23 22 21 20 TH H T U 82 81 80
Positio
ns 1 0 0 1 0 9 8 1 0 7 3
of
digits
1 1 0 0 9 8 0 1 3 0 7
0 1 0 1 1 9 0 8 0 3 7
0 0 1 1 8 1 9 0 7 3 0
The ones (1’s) and zeros (0’s) making up a binary number are called binary digits or
bits. For example the number 39 is composed of 6 bits. Inside the computer storage,
“1” will be represented by an electronic cell in a charged (on) state and “0” in a
discharged state (off). Thus the number 39 represented in binary form as 100 111
would occupy storage cells as on off off on on on which will be interpreted by the
computer and displayed on the screen as 39.
2
Conversions
8 3 R
9
8 4 7
8 0 4
= 478
2
For example:
478 = ?10
4 7 Base 8 number
= (4 * 8) + (7 * 1)
= 32 + 7
= 3910
Example:
23410 = ? 16
1 23 R
6 4
1 14 10
6
1 0 14
6
= EA16
E A Base 16 number
14 10
= (16 * 14) + (1 * 10)
= 224 + 10
= 23410
Binary Fractions
It is also possible to represent values as fractions using binary in computers. We have
the bits following the decimal point e.g. .01, is a binary fraction. We can derive the
decimal equivalent using the power of two, starting from 2-1 2-2 2-3, etc.
Example: .0112
2
= (½ * 0) + (¼ *1) + (1/8 * 1)
= (.5*0) + (.25*1) + (.125*1)
= 0 + .25 + .125
= .37510
Computer Arithmetic
The ALU of the CPU performs arithmetic functions when data is in the form of binary
digits. Common arithmetic operations include addition, subtraction, multiplication and
division.
1) One’s Complement:
Given a binary representation of a number, to find one’s complement, we
replace where there is a 0 by a 1 and where there is a 1 by a 0. The result
will be a negative representation of that number in binary form. We can
represent the first 16 digits using one’s complements:
2
3 0011 1100
4 0100 1011
5 0101 1010
6 0110 1001
7 0111 1000
8 1000 0111
9 1001 0110
10 1010 0101
11 1011 0100
12 1100 0011
13 1101 0010
14 1110 0001
15 1111 0000
Two’s complement
This method improves on one’s complement. We can obtain two’ complement through
two techniques:
Technique 1
Add 1 to one’s complement bit pattern and the result becomes two’s complement as
shown below:
Technique 2
This is applied to the original binary pattern as follows:
2
-From the bit pattern, find the first 1 from the right (least significant digit) of
the pattern
-That 1 (i.e. the first 1 you encounter) does not change.
-The remainder bits to the left of the first 1 encountered will change, i.e. where
there was a 1
there will be a 0 and where there was a 0 there will be a 1. The following
diagram illustrates:
The result of performing an addition using two’s complement can produce an extra bit
such that the result seems to be bigger than the two values. This extra bit will not be
accommodated in the available space as part of the result. This extra bit is called
the Arithmetic Overflow.
A Boolean is a variable which can take values True or False, Yes or No, On or Off or 1
or 0. In computers, execution is done using Boolean expressions which when
evaluated will take a value of all the possible values in Boolean.
NB
Since computers use 1s and 0s a value 1 will have a representation of True, Yes or On;
while a 0 will be represented by a false, No or Off.
A computer is always constructed in such a way that Boolean variables will take some
2
input values and perform some operations to produce some results. The Boolean
variables are manipulated by operators, which are designed in a computer to form a
general table (truth table), which shows all possible input values as well as the results
depending upon the type of functions to be done on the inputs. There are 3 common
functions commonly used to construct a truth table namely OR, AND and NOT. The
following tables summarize possible inputs taken by Boolean variables as well as
outputs depending on the operations.
OR Function
It operates by combining at least 2 input variables to provide a single output. The
result is always a 1 or true, if at least one of the input values is a 1 otherwise it is a
0. To derive the output the OR function uses the following rules:
E.g., If A and B are Boolean variables we can derive a truth table using the OR
function as follows:
Inputs Output
A B A OR B
0 0 0
0 1 1
1 0 1
1 1 1
A B C Output
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
AND Function
It operates by combining 2 or more logic input values to produce a single output. This
result is always a 1 or True if both inputs are 1s otherwise it is False or 0. It uses
the following rules:
0 AND 0 = 0 (False AND False = False)
0 AND 1 = 0 (False AND True = False)
1 AND 0 = 0 (True AND False = False)
1 AND 1 = 1 (True AND True = True)
E.g., If A and B are Boolean variables we can derive a truth table using the AND
2
function as follows:
Inputs Output
A B A AND B
0 0 0
0 1 0
1 0 0
1 1 1
A B C A AND B AND C
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
NOT Function
This operates by taking a single input value producing a single result. It has the effect
of changing values of inputs to their opposite using the following rules.
0 = 1 (0 equals Not 0)
1 = 0 (1 equals Not 1)
In most cases it is used to change the result of the expression derived using AND or
OR
E.g., The following truth tables illustrate the NOT function:
Boolean Expressions
2
Y = A OR B
X = NOT (A OR (NOT B))
A B A AND B A OR B NOT (A OR B) P
0 0 0 0 1 1
0 1 0 1 0 0
1 0 0 1 0 0
1 1 1 1 0 1
NB:
The OR can be represented as “v” or as “+” e.g. A + B; A v B means A OR B
The AND can be represented as “^” or as “.” e.g. A ^ B; A.B means A AND B
The NOT can be represented as “-” or as “~” e.g. A ; ~A means NOT A
Questions
Since a computer uses logic of 1 and 0. It has to be manufactured in such a way that
there are devices which function is such away that they have to take the logical values.
They are called logic gates. If one or more logic gates are combined they produce a
logic diagram, which represents the whole computer system. The logic gates are
constructed using chips. The 3 Boolean functions OR, AND, and NOT are represented
by the following symbols as functions gates:
OR Function Gate
Y = A OR B OR C
A
B Y
C
A B C A OR B OR C (Y)
0 0 0 0
0 0 1 1
2
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
Y = A AND B
A
Y
B
A B A AND B (Y)
0 0 0
0 1 0
1 0 0
1 1 1
A NOT A
51
Logic diagrams can be constructed from any Boolean Expression e.g., given:
B Y
2
B OR C) AND C)
1) NAND Gate
This can be considered as an AND followed by a NOT operation. It has 2 or more
inputs. The gate functions in such a way that the output is always a 0 only if input
variables are all 1s otherwise it is 1. It uses the following symbol:
A C
B
2) NOR Gate
Can be considered as an OR function followed by a NOT operation. It has 2 or more
inputs producing 1 output. The output is always a 0 if at least 1 of the inputs is a 1
otherwise it is a 1.
A
C
B
A B A OR B A NOR B
0 0 0 1
0 1 1 0
1 0 1 0
1 1 1 0
2
3) EXCLUSIVE OR (XOR)
Is also called the Equivalent operation with two inputs only and one output. It
is represented by the following symbol:
A C
B
It operates using the following principle: The output is 1 only if either, but,
not both inputs are 1 i.e. output is 1 if inputs are different, otherwise it is 0.
A B A XOR B
0 0 0
0 1 1
1 0 1
1 1 0
These three gates can be used to simplify any given circuit diagram. Given the
following circuit diagram, it can be simplified using the three logic gates:
Q
X
(SIMPLIFIED DIAGRAM)
Q X
All computers do addition using hardware. The logic circuit which forms the hardware
used for addition is called ADDER. It uses rules of binary addition as follows.
2
0+1 1 0
1+0 1 0
1+1 0 1
If you observe the sum of the output and carry we can see the following:
1) The sum column can be produced by the EXCLUSIVE on gate
2) The carry column can be produced by the AND gate.
It is now possible to design a logic circuit diagram to represent binary addition of this
nature. Such a unit is called a HALF-ADDER, which can be represented by the
following diagram.
A
SUM (SUM = A XOR B)
B
The diagram is called the HALF – ADDER since the carry is not contributing to the
sum implying that addition has been done halfway. This addition unit will need an
improvement such that a carry from the previous sum should continue to the overall
sum, thus completing the addition process. The product can be represented by a circuit
diagram called a full–adder i.e. a combination of 2 half adders to produce a complete
addition unit. What-ever the carry produced in a full adder will be taken as arithmetic
overflow.
A
B
C p
P = C XOR (A XOR B)
P = SUM
Q = CARRY
C = Previous carry from A AND B
Chapter Questions
2
4) What is the value of 60288 in base 2, 10 and 16?
5) Carry out addition and subtraction operations on the
following pairs of numbers:
a) 100012 and 11112
b) 70058 and 101112
c) DF5A16 and 98710
d) 10000112 and 6548
6) Given 100 111 111 101 and 111 101 111 101
a)
Add the two using both half adder and full
adder. Explain the differences in results.
b) Draw a logical diagram for the Boolean
Expression NOT (NOT (A AND (NOT B)) OR (C OR
(B OR A)))
Construct a truth
c) as table for: C AND (NOT A) OR (NOT C) AND
((NOT B) AND A)
7) From the following Logic Diagram, create a Boolean
Expression and a Truth Table.
b)
C.B + A.C + B + A
CHAPTER 8
PROGRAMMING LANGUAGES
Classification of Computers
1. By size
2
Mainframe, Minicomputer and microcomputer
2. Basic types
a) DIGITAL: So called because they process data that is represented in the
form of discrete values by operating on it in steps. Counting on one’s
fingers is an example of a simple digital operation.
b) ANALOG: Process data in the form of electrical voltages, in similar
principle to thermometer that has pointers on circular dials. Output is in
the form of smooth graphs from which information can be read.
c) HYBRID: Have combined features of both analogue and digital
3. Purpose
a) Special Purposes: Designed for a particular job only, i.e. to solve
problems of a restricted mature e.g. in digital watches, petrol pumps,
pocket calculators, etc.
b) General Purpose: designed to solve a wide variety of problems. Can
be adapted to perform particular tasks or solve problems by means of
specially written programs.
NB – the above distinction is not clear-cut, as a general purpose can
become a special purpose by adaptation.
4. By Use
a) Word Processors
Used in the production of office documents such as letters and contacts.
b) Home Computer
Low cost microcomputer for domestic use and used to do such things as
playing computer games and controlling family finances.
c) Personal Computer
Microcomputer designed for independent use by an individual at work
or in the home mainly for business. Some are portable and can be
interlinked to minicomputer systems.
d) Desk Top
Any computer for use on a desk in an office environment. Home and
PCs are desktop computers.
e) Work Station
A desktop computer that has advanced features not found on PCs.
These include included in-built capabilities for their connection and
operation in conjunction with other computers and for them to process
pictorial data as well as text.
f) Laptop
It is sufficiently small to be used on the lap. Operates on mains or using
rechargeable batteries. It is small enough to fit in a brief case.
g) Embedded
Is within some other devices or system e.g. watch, petrol pump,
cameras, videos, recorders, and many types of domestic and industrial
equipment.
2
5. Computer Generations
The Ladder of Computer languages
People
AI languages 5th GL
Barrier
Computers
2
programmer from the individual operation of the processor. They are also called
Problem Oriented Languages (POLs). They reflect the type of problem solved rather
than the features of the machine. They use English language e.g. additional of 2
numbers is a single statement i.e. c = b + a, this single instruction would have required
several machine code instructions. This enabled the development of languages geared
towards particular areas e.g. science, mathematics or business. The emphasis was on
application area rather than the computer and this provided a means on which
programs would , in theory be made to be portable between different computers. This
is achieved by a special type of software that translates the source language program
into a particular processor’s own machine code. Examples of high-level languages are
C, BASIC, FORTRAN, PASCAL, etc.
Translation Programs
Are a special class of software designed to convert source programs into machine
code. Instructions to be translated are called source code which on translation
becomes object code, a machine code version of the original instruction. There are 2
main types of translation software:
New version translators also called compilers. They convert high-level language into
machine code, with the result that at the end of the compilation process there will be at
least two versions of the same program. This is similar to a situation where one has
got the Shona and English versions of the book ‘Pfumo Reropa’.
2
source code. Compilers and assemblers perform a number of checks on the source
code before translation. These include syntax and program structure checks. Errors in
the programmer’s logic will be picked up only when the program is tested. The main
advantage of compilers and assemblers is that they produce efficient machine code
versions of source code that operates much faster than one line translated programs.
One-line translators convert and execute each line of the original program, so that no
version is produced. This type of translator is called an interpreter and is usually
associated with high-level languages.
Interpreter
Are useful because the effect at small changes in the source code is seen immediately
since compilation is avoided. There is no need to recompile after every change when
developing programs. This speeds up the development process. The disadvantage is
that the program executed through interpretation is not very efficient in operation,
because every time the program needs to be run, it has to be translated. The program
is many times slower than a compiled program.
Source Code
Compiler Program
Interpreter Program (New version Translator)
(One Line Translator) Translator
2
Chapter Questions
1) Computer can be classified by size, by purpose, by
use and by generations. Describe each category.
2) Why are translation programs required in programming?
3) Explain the operation of compilers, assemblers and
interpreters.
4) Define the following terms:
a) Source program
b) Object program
c) Syntax error
d) Logic error
e) Runtime error
5) Cite situations where Fifth generation languages are
used. What advantages do they have over Third
generation languages?
6) Why has programming become “everybody’s business”
unlike in the early days of computing?
CHAPTER 9
DATA FILES & FILE ORGANISATION
Types of files
a) Document (text) file: Those that contain text e.g. letters, reports, essay, etc.
The records may not necessarily have key fields.
b) Program file: A file in which the data held in the file is some item of software
such as a simple program or collection of program parts (modules)
c) Input and output files: formed from source documents or files holding
processed data awaiting output.
A Record Is a collection of data items that pertains to a single area of interest such
as a particular entity e.g. customer record, student record or product
record.
A Field Is an item of data within a record e.g. customer name, date of birth.
2
A Character Is an alphabetic, numeric or special symbol e.g. a, 2, 1, +.
File
Master Files:
These are files of a fairly permanent nature e.g. payroll, customer or student file.
Master records contain both data of statistic nature e.g. a customer name and address;
and dynamic data that changes each time a transaction occurs, e.g. if the customer is
buying on credit terms, when a payment is made or a purchase is made for his
particular balance field is updated to show the current status of his account.
Reference File
File with a reasonable amount of permanency e.g. price list, table of rate of pay, tax
tables and so on.
Physical files: Represents “how” the data is stored on a storage medium and “how”
the processing operations are made possible.
FILE PROCESSING
Processing activities encompass the following.
Updating
When data on master record is changed to reflect the current position e.g. for a
2
customer, the current account status will either reflect an increase or decrease
depending on the transaction that would have transpired i.e. deposit or withdrawal.
Referencing
To ascertain what is contained there in. No alterations are involved on the record.
File Maintenance
This involves the addition of records to or deletion of records from file e.g. when a
new customer becomes an entity within our records or when we delete a redundant
record. Changes to static data elements in also file maintenance.
Sorting
This is the arrangement or rearrangement of records of files either for processing or as
preliminary procedure before producing a particular report.
Merging
The combination of records into a unitary form either from two or more files so as to
present a consolidated picture of what has transpired.
Searching
This is a procedure to establish where a record exists in a file or not, and may be a
procedure that is carried out before other file processing operations.
File Organisation
Refers to the physical arrangement of a file’s records on a storage medium. This can
take any of the four distinct types are shown below:
Serial Organisation
The records are stored on the storage medium on a first come first served
basis. There is no distinct order of the records according to the record keys:
10 11 10 12 10 11
7 5 1 0 4 0
Sequential Organisation
In sequential organisation, records are arranged according to their record keys.
The records are placed on storage medium in ascending or descending order of
the record keys as shown below:
10 10 10 11 11 12
1 4 7 0 5 0
2
A 10 10 10 B 11 11 12
1 4 7 0 5 0
Random Organisation
Records are scattered similar to Serial organisation, but each record has its
own address which is used to access the record, as shown below:
1 2 3 4 5 6
10 11 10 12 10 11
7 5 1 0 4 0
Sequential
Records are written on to tape in sequence according to record keys e.g. master files
and sorted transaction file
Indexed sequential
Records are written on to tape sequentially but with a number of records falling under
a particular index.
Sequential files
The method used is still serial, but the file is now in sequence and the term sequential
is used. Records are accessed according to record keys one after the other i.e. in order
of ascending or descending order of record keys. To process a sequential master file,
the transaction file must also be in the order of the master file. Access is achieved by
first reading the transaction file then the master to match records, using records keys.
If the 20th record needs to be updated then 19 other records have to be read first.
NB: Limited methods of file organisation and access on tape have lead the tape to
become much of a storage medium for offline data and backup, and much less as an
online medium for storage of master files
2
2) Transaction record is read to main storage.
3) Master record is read to main storage and written straight out again on the new
reel of tape if it does not match the transaction. Successive records from
master file are read and written out until the record matching the transaction is
reached.
4) Master record is then updated in main storage and written out in sequence on
the new reel. The four steps are repeated until all the master records for which
there is a transaction have been updated. The result is the creation of a new reel
of tape containing the records that did not change and records that have been
updated. The new reel will be used on the next updating run.
FILE LABELS
There are generally two label records. One comes at the beginning and the other comes
at the end.
a) Header label:
The first record and its main function is to identify the file. It contains the
following data.
The label will be checked by the program before the file has been processed to ensure
that the correct tape reel has been mounted.
b) Trailor label
Comes at the end of the file and contains:
1) As in the header label in 1)
2) A count of the number of records in a file. This will be checked against
the total
accumulated by the program during processing.
3) Reel number if the file takes more than one reel.
Blocking Records
Gaps created between records represent:
2
1. Wasted space
2. Unproductive time spent by tape unit in slowing down and accelerating
between each write and read operation.
These problems can be reduced by blocking records. Thus a single write or read results
in many records being written or read. The area of main storage used to hold
individual blocks when they are read-in a written-out is called a buffer. Number of
records making up the block is known as the blocking factor.
e.g. the blocking factor is 4 below:
Unblocked records
1 2 3 4 5 6 7 8
If each space takes 1mm, then 7mm will be wasted in storing the 8 records.
The wasted space will increase with an increase in the number of records
stored.
Blocked Records
1-4 5-8
Access to Files
Once records have been stored, they will need to be accessed one day either for
updating or maintenance or some such other processes.
Key field: A unique identifier of a record or file. It may be called a Record Key. It is
one of the fields in a record and if it can be used to uniquely identify a record, then it is
called a primary key. An identifier can be made from two or more fields and in this
case it will be called a composite or compound key. Other fields which are not
unique identifiers are called secondary keys. Key fields used to access a record on
storage media .
File Characteristics
a. Hit rate: Refers to the rate of processing master file in terms of active records e.g. if
1000 transactions are processed everyday against a master file of 10000
records then hit rate is 10 which is a measure of the activity of the file.
b) Volatility: The frequency with which records are added or deleted from a file.
Frequency Description
High Highly Volatile
Low Semi-static
Fixed Static
2
c) Size & Growth: Amount of the data stored in file. It is expressed in terms of
number of characters or records. This must be planned for. Files can expand
with the growth of the business and the storage chosen must be expandable so
that data processing won’t be adversely affected.
Writing on Disks
This disk must be loaded into a disk unit. Records are written onto the disk as it
resolves at a constant speed within its unit. Data goes from main storage through a
read-write head onto a track on the disk surface. Records are written or recorded one
after the other on each track.
Cylinder concept
This is a result of having a number of disks within a pack. Common types are the
‘6disk’ pack and ‘11 disk’ pack. The former having 10 recording surfaces and the
latter 20 recording surfaces. There is a read/write head for each surface. All read/write
heads are fixed to one access mechanism. When the access mechanism moves all the
10 or 20 read/write heads move in unison across the disk surface. One movement of
the access mechanism give access to 10 or 20 tracks of data. Records are written
starting with track 1 on surface 1 then track 1 on surface 2 until track 1 on the last
surface. Conceptually, the 10 to 20 tracks from a cylinder. Data is written onto
successive cylinders involving one movement only of the access mechanism for each
cylinder. Each disk pack will normally have 200 cylinders. A cylinder is also called
the seek area.
2
a) The need to optimise fillage of a track.
ii) The need to minimize the number of transfers between main and
disk storage. The bigger the block the more records are transferred
into main memory.
2) The need to economize in the use of main storage, bigger blocks
occupy bigger space.
E.g. an address like 1900403 implies that the cylinder number is 190, tracks number is
4 and block number is 3
Access Time
This is the time interval between the moment a command is given to transfer data from
disk to main storage and the moment the transfer is completed.
This is made up of:
a) Seek time: This is the time the access mechanism takes to position itself at the
appropriate cylinder
b) Rotation delay: Time taken for the bucket to position it self under the
read write head.
c) Data transfer time: Total time taken to read the contents of the bucket into
main storage.
2
serial files, the updating principle applied to tape applies here or can be written on to
different location on the same disk. Back up is by keeping a duplicate copy of the
master file.
File Reorganisation
When records in the over flow area increase this will affect efficiency in terms of
access time, thus reorganisation will be necessary so that a record is written in one
place. This reorganisation will mean rewriting the file or record on to a new disk or
using disk defragmentation program..
DATA BASES
A Data Base is a collection of records or files that have been organised to enable them
to be easily retrieved e.g. telephone directory. The traditional approach to the storage
of information involves the keeping of discrete applications each of them having a set
of files. This method has a number of loopholes and a high degree of redundancy e.g.
customer account may contain half the details of a stock account. It was from this
situation which made it paramount to come up with the idea of a DATA BASE or
“Central Accessing Point” from which the organisation’s applications depend-on for
all their information requirements.
Less data proliferation This means that one copy of each data item is kept thus
element data duplication.
2
b) Costly became has to be duplicated i.e. must have interrupted handling
facilities or capability.
c) Requires a large software system to create and maintain the whole system of
database and a fairly large computer to support it. This is in contrast to the
current tendency towards small software and the modern distributed systems.
d) Specialists needed.
Chapter Questions
1) Name five (5) types of files and describe each
briefly.
2) Relate the following terms: record key, key field,
file, record, field, character and bit
3) How do master files differ from transaction files?
4) File processing operations may involve the following:
(a) Updating (b) Maintenance (c) Referencing
(d) Enquiry/Interrogation (e) Merging
(f) Sorting (g) Searching
Explain what is involved in each operation.
5) With the aid of diagrams show four methods of file
organisation, describe each and explain the methods
of access applicable to each. Which situations would
suit each and why?
6) A database system has advantages and disadvantages.
a) Define the term database
b) What the advantages of a database over the
storage of files as separate entities?
c) What problems may result in a database system
setup?
CHAPTER 10
DATA COMMUNICATION
Data Transmission
The movement of data from one location to another can be by post, messenger or
courier services but today it normally refers to the movement of data and information
by electronic telecommunications systems. Electronic telecommunications make the
transmission faster than the traditional forms. The basic components of the system
are:
a) Central computer
b) Terminal devices
c) Telecommunication links between (a) and (b)
2
A source is the origin of data or information. A medium is the path along which data
or information moves. Receiver is the mechanism that receives data or information.
Serial transmission:
This is a mode of transmission in which each bit in a character code is transmitted
separately and sequentially. The least significant bit is transmitted first and the
transmission speed is expressed in bits per second (Baud Rate). Its advantage is that it
can transmit data over long distances. Its disadvantage is that the speed of transmission
is very slow as it uses a narrow band channel. The following diagram illustrates:
2nd bit transmission
1 1 1 0 0 01 0 1 1 1 0 0 0 1 1 1 1 01 1 110 00 1 011 10 0 01 1 11 0 1
One-path channel
Character code with Varying Time intervals Fixed time
intervals
stop & start bits between character codes between bits
Parallel Transmission
All bits in the character code are transmitted simultaneously. Its advantage is that the
speed of transmission is much faster as a whole character is transmitted at one go. Its
disadvantage is that the distance of transmission is short. The diagram below
illustrates:
1 1 1
0 0
0
0 0
0
0 0
0
1 1
1
0 0
1 0 1
1 1 1
2
Many paths making
Data frame carried a broadband channel
as a complete set of bits
all at once.
Message Switching
This is the sending of a message along a communication link in its totality, i.e. the
whole message is sent in one continuous train until its end. A message, in data
transmission, may be a word or two in the conventional sense. For example, the
word baba may be considered a message. If message switching is being used, all the
four characters of baba will be sent from start to finish without stopping.
Packet Switching
This is the sending of a message in segments. The word baba, therefore can be sent in
two batches, i.e. ba is sent then the other ba is sent. This implies that we have two
transmissions to complete the transmission.
Circuit-division-switching
This implies sending the data, a character at a time, that is, if there are many devices
transmitting, each one will be given an opportunity to transmit single character before
giving the opportunity to another to transmit. This means no device is monopolising
the usage of the line as does message switching. However, it means that particular
device will be delayed in sending its total package of data. The word/message baba
will therefore be sent in four transmissions.
2
Digital Analogue Digital
Signals Signals Signals
Types of channels
A channel is a link by which dada or voice are transmitted between sending and
receiving devices in a network. these include twisted wire, coaxial cable, fibre
optics, terrestrial microwave, satellite and wireless transmission.
Multiplexing
Multiplexing is a means of using one line to transmit data from a number of separate
terminals at the same time. It reduces the cost of setting up many lines. The signals are
transmitted by a device called a Multiplexor and received by a Demultiplexor. The
following are the two forms of multiplexing:
T1 (channel)
Terminal 2 Terminal 2.1
Multiplexor T2 (Channel) Multiplexor
T3 (channel)
2
Modes of Transmission
There are three modes of transmission. these are:
Simplex Transmission
Data/information moves in one direction only. One device is a receiver and the other
device is a receiver. The is possible with some terminals which just receive signals
from the computer, without them sending any signal to the computer in turn. Radio
and TV broadcasting falls in this category.
Transmitter/
Source/ Receiver/
Sender destination
Half Duplex
This mode of transmission involves devices that send and receiver data, i.e. they are
not only senders or receivers but they do both. They can send at one time and receive
at another. they cannot send and receive simultaneously. Some computer terminals can
use this mode of transmission. Two-way radio systems fall in this category.
Transmitter- Transmitter-
Receiver Receiver
Full Duplex
In this mode a device can send whilst receiving data/information. Some computer-to-
computer communication can use this mode of transmission.
Transceiver Transceiver
Off-line The communication lines are not connected directly to the computer.
The data is Transmission physically moved to the processing centre. A variation of
this will have terminals connected to disk drives that gather/store information for a
period before transmitting that information to a computer. This is called a batch
processing system.
Asynchronous In this transmission, time intervals between characters are not fixed,
2
although the time Transmission intervals between consecutive bits within a character
are fixed. In order to enable the transceiver to recognize the tart of a character, a start
bit is transmitted first before each character. The start bit triggers the timing
mechanism in the receiving device, which counts the succeeding bits as a series of
time intervals. The stop signal resets the receiver ready for the next character. This
mode of transmission is used in slow speed devices. Characters are thus dispatched at
irregular intervals.
Synchronous Clocks, which keep in track with each other synchronized sending and
receiving
Transmission devices. Synchronisation is assured at the beginning of transmission by
means of special synchronisation characters, which align clocks at each terminal, i.e.
arrange things so that the source and receiver function simultaneously (in a
synchronous way). The systematic representation is as follows:
Backend A computer system connected to the mainframe or host which links the
host to the Processor: database. Its purpose is the retrieval of data/information
from the database and storage of data or information to the database.
Protocol A statement that explains how a specific task will be performed, e.g.,
transferring data. In data electronic communications it refers to a set of rules that
governs the way in which two or more computers or devices communicate or pass
messages to each other. Common Protocols include http, ftp and TCP/IP.
2
a) Communication and collaboration: This allows user to send
mail, transmit data and documents
b) Access information: Allows the search of documents,
databases, read electronic mail, brochures, manuals, books and
advertisements
c) Participate in discussions: Allows one to join interactive discussion
groups and allows primitive voice transmission
d) Obtain information: Allows the transfer of computer files of
text, computer prgrams, graphics animations and videos.
e) Find Entertainment: Allows the [playing of interactive video
games, view short video clips, read illustrated and even animated
magazines or books.
f) Exchange business transcations: Allows advertising, selling and
purchase of goods and services.
Client/ A model for computing that splits the processing between “clients” and
“servers”
Server model: on a network assigning functions to the machine most suited to
perform the function.
Surf: Navigate from web site to web site on world wide web. Web browsers
include Microsoft’s Internet Explorer And Netscape’s Navigator
Home page: A WWW text and graphical screen display that welcomes the user and
explains the organisation that has established the page. this page can
then lead to other pages containing information on the organisation. all
pages of the individual or organisation is called a Website.
Multimedia: These are technologies that facilitate the integration of two or more
types of the media such as text, graphics, sound, voice, full motion
video, still video or animation into a computer based application
requirements for multimedia are:
2
a. personal computer with a 32-bit processor
b. high resolution colour monitor
c. a high capacity hard disk drive
d. dvd/cd-rom disk drive
Uses include advertising of new consumer products andf services eg, electronic books
& newspapers, electronic classroom presentation technologies, full motion video
conferencing graphics design tools video and voice mail. WWW sites are multimedia.
Baud: A change in signal from positive to negative or vice versa that is used as a
measure of transmission speed. Baud rate is not always the same as the bit rate
as at higher speeds. a single change can transmit more than one bit at a time.
Chapter Questions
Chapter 11
Uses of Computers
2
Hospitals
Used to keep patients’ records, on x-ray machines, keeping records of accounts
receivable and payable, records of patients’ insurance companies, records of those who
are unable to pay for the medical services provided to them, records of drug stocks,
medical statistics of diseases, monitoring patients who have undergone surgery, etc.
Police
Used for scanning fingerprints and photographs into the computer, faxes for the
transmission of photographs from one to other stations, keeping records of criminals,
radar (radio detecting and ranging) used for speed traps, etc.,
Airlines
Keeping of records of passengers
Reservations of passengers
Stock control
Checking of goods
Monitoring flights
Providing flight schedules, etc
Education
Used in interactive learning (computer aided instruction- cai), research, virtual
education, etc
Engineering
Used in fields such as vehicle inspection, robotics, computer aided manufacturing and
design
Banking
Used to check on credit worthiness of an individual, or organisation when one wants to
enter into a credit transaction with their bank or another organisation, accounts, lists of
credit cards, one’s financial status, records of loans, ATMs, etc