CHAPTER ONE
INTRODUCTION TO COMPUTERS
Introduction
Definition of a Computer
It is an electronic device that transforms data to information.
Data: Raw facts. Information: Processed data.
A computer system is made up of two parts: Hardware and Software.
Hardware
These are the physical parts of the computer e.g printers, keyboard etc.
Software
These are the programs (sets of instructions) that are used to run the computer e.g.Word processor,
spreadsheet, database, presentation software etc.
Parts of hardware
Hardware consist of three parts as follows.
Input Devices
These are devices that are used to feed the computer with data for processing within. Examples
include: Keyboard, mouse, scanners, digital cameras etc.
Output Devices
These are devices that are used to give out information (processed data) from the computer to the
user. Examples include: Monitors, Plotters, speakers etc. The output could take any of the following
forms:
◦ Soft copy-this is output that is shown on the screen.
◦ Hardcopy-this is information printed on paper e.g. from a plotter, printer.
◦ Machine readable form- this is output that can only be read using the computer e.g.
information stored on disks.
Central processing Unit
The Central Processing Unit (CPU), motherboard, storage devices and other peripheral devices.
Peripheral Devices
Devices connected directly or indirectly to the mother board.
Parts of the CPU.
CPU is made up of three parts, namely:
Arithmetic Logic Unit
The work of the ALU is to perform mathematical functions as well as do comparisons between units
of data presented to it.
Control Unit
The work of the CU is to take data from an input device, to the processor/memory, then to an output
device.
Memory
The work of memory is to store data before, during and after processing.
Classification of Computers
1. Size and Memory
2. Purpose
3. Functionality
Classification according to Size and Memory
i. Supercomputer
ii. Mainframe
iii. Minicomputer
iv. Microcomputer
v. Desktop
vi. Laptop
vii. Palmtops
Advantages of laptops
Portable
Ruggedness: Designed to withstand travelers
Display active color screen
Power batteries serve as ups
Disadvantages
Less expansion options
They are easily stolen
Classification according Purpose
1. General computers
This computer can do or handle a variety of tasks when loaded with appropriate programs.
2. Special computers
They are designed to serve a specific purpose or to accomplish one particular task.
3. Dedicated Computers
They can handle any task but it is a dedicated to one task.
Classification according to Functionality
1. Digital computers: They handle discrete data.
2. Analog computers: Deals with data that keeps on changing in time (Continuous data).
3. Hybrid computers: The computers can handle both analog and digital data.
Elements of a Computer System
1. Input: Data or raw facts.
2. Processing: Act of transferring raw facts into meaningful output or information.
3. Output: Processed data or information.
4. Storage:
Control unit:
Functions of the control unit are-
Avails instructions in sequence
Interprets instructions
Initiates the appropriate actions thereby controlling all the processes
Development of Computers
First Generation Computers (1940 - 1958)
Used thermionic valves or vacuum tubes
Advantages
Vacuum tubes technology made it possible with advent of electronic digital computers
It was the fastest calculating device that time.
Disadvantages
Too bulky
Unreliable
Had limited memory
Generated a lot of heat
Consumed a lot of power
Examples
IBM 650, UNIAC
Second Generation Computers (1958 – 1964)
They used transistors
Advantages
Smaller than first generation computers
More reliable
Generated less heat than the first generation
Less prone to hardware failure
Disadvantages
Required air condition for cooling
Required frequent maintenance
It was very expensive
Examples
IBM1401, Honeywall200, CDC1604 e.t.c.
Third Generation Computers (1964 – 1970)
They used Integrated Circuit (IC)
Advantages
Smaller in size
More reliable than the previous ones
Emitted lesser heat than the previous ones
Less maintenance cost
Less power consumption than the first and the second generation
Disadvantages
Highly sophisticated for the manufacture of Integrated Circuit
Costly
Examples
IBM360, BurroughsB5600
Fourth Generation Computers (1970-1989)
They are characterized by the use of Large Scale Integrated Circuit (LSIC)
Advantages
Smaller in size
More reliable than previous generation computers
Generated neglible heat
Faster than previous generation computers
Less prone to hardware failure
Portable
Disadvantages
Highly sophisticated technology in manufacturing of Large Scale Integrated chip
Examples
IBM3033, Buroughs67700
Fifth Generation Computers (From 1989)
Expected to do parallel processing
Based on logical inference operations
Expected to make use of artificial intelligence
Features of a Computer
Automation: Computers work with minimum human intervention once supplied with data and
instructions.
Accuracy: Computers are ever accurate but entirely depend on the data entered.
Speed: Performs tasks in very short period.
Storage: Computers can store large volumes of data and information.
Versatile: Ability of doing different tasks as per instructions.
Diligence: Work for a long period of time without getting bored
Disadvantages of Computers
Computers are very expensive
Cuts down on employment opportunities
Needs expertise which is expensive to hire and maintain
They create eye problems
Loss of information if not well managed
Areas where Computers are used
1. Supermarkets: Used to keep in stock control i.e. keep accounts of what is in the store, what has
been sold, what is out of stock e.t.c
2. Offices: First access and receiving information, automate faster message distribution and
document processes.
3. Banks: Special cash dispensing machines called Automated Teller Machine (ATM for cash
withdrawal and deposition service. They provide better record keeping and document
processing.
4. Industries: Monitoring and controlling industrial processes e.g. using robots
5. Hospitals: Keeping patients records for easier access to treatment and diagnosis.
Computerized diagnosis in laboratories.
6. Communication: Sending and receiving emails, teleconferencing, telecommuting, facsimile and e-
calling.
7. Transport: Monitoring automobile traffic, aircraft navigation and making flight reservation.
8. Law enforcement
Biometric analysis- study of human biological characteristics to know fingerprints, voice and facial
features.
Video cameras e.g. in banks.
Development of strong military bases which have international coordination by use of computer
radar.
Jet fighters are computerized with connection to control centres.
9. Education: Computer Aided Learning (CAL) and Computer Aided Teaching (CAT).
10. Domestic and entertainment/ home: used at home for recreation purposes and keeping
budgets.
11. Library services: Easy access and update of books and other library materials.
Advantages of a Computer
Stores large amount of information in a limited space
Speed: performs tasks in very short periods.
Efficiency: creates an all round saving on space and time.
Consistency: gives the same results given the same data and instructions.
Secrecy: information is fairly protected if computer system is well managed.
Versatility: Can do the same thing over and over again without being worn out.
Disadvantages
Computers are very expensive
Cuts down employment opportunities
Needs expertise which is expensive to hire and maintain
They create eye problem
Loss of information if not well managed.
Computer Laboratory, Safety Precautions and Practice
Considerations for a Computer Laboratory
1. The number of computers to be installed.
2. Size of the laboratory.
3. The number of user that the laboratory can accommodate.
4. Reliability of a source of power.
Safety Precautions and Practices
1. Behavior in Computer Laboratory
Avoid smoking or exposing computer to dust. Smoke and dust damage computer
components.
Avoid carrying food and beverages: may damage components and liquids may cause rusting
and electrical shocks.
Avoid unnecessary movement because you may accidentally knock down peripherals.
Follow the correct procedure for storing and shutting down computers.
Reporting accidents immediately.
Ask for assistance.
2. Ventilation: to avoid suffocation and overheating. This avoids damage of electronic parts.
3. Lighting: to avoid eyestrains that leads to headaches, stress and fatigue. User may adjust brightness
of computer monitor. Also radiation filter screen may be fitted.
4. Protection against fire: Use or fit gaseous fire extinguisher.
5. Dust and dump control
Special curtains reduce dust entry
Covering computers
6. Regulate humidity to remain at an optimum of 50%.by the use of humidifier and dehumidifier.
Low humidity allows static electricity to build up and cause damage to computer components. High
humidity causes corrosion, destroy devices and electrical faults.
7. Furniture: Strong and wide enough to accommodate all peripheral devices. User seats must be
comfortable and have straight back rest that allows someone to sit upright to avoid muscle pains
and aches.
8. Burglar proofing:
Fit strong metallic grills and locks on doors and windows
Don’t welcome strangers to computer room
Install security alarms at strategic access points to alert security personnel incase of break in.
9. Stable power supply: Functions of Uninterrupted Power Supply (UPS)-
Regulate high voltage
Regulate low voltage
Provide temporary power
Notify when power goes off.
Keyboard Layout
1. Alphanumeric Keys
Comprises of numbers and all alphabets, symbols like @,!,$,%,^,&,*,(,),?,>,< e.t.c. Other keys include
Caps lock, Enter key, Tab, Spacebar, Back space.
a) Caps Lock: When on letters typed appear in uppercase and when of letters appear in lowercase.
b) Enter keys: When pressed it forces the cursor to move to the beginning of the next line.
c) Tab keys: Used to move the cursor at set intervals.
d) Back space: Deletes characters to the left from the cursor position.
2. Function keys
They are always located along the top of the keyboard. They are labeled F1, F2 to F12.
3. Cursor Movement and Editing Keys
Cursor Movement Keys
a) Arrow Keys: Used to move the cursor up, down, left and right.
b) Page up and page down keys: Moves the cursor one page up or down.
c) Home and End keys: Pressing Home key moves the cursor to the beginning of the current
line. End key moves the cursor to the end of the current line.
Editing Keys
a) Insert key: It helps the user to insert or replace a character at the cursor position.
b) Delete (Del) key: This key deletes characters at the cursor position from left to right.
4. Special PC Operation Keys
They are rarely used singly but in combination with other keys to give special instructions to the
computer. They include SHIFT, CTRL, ALT and ESC.
5. Numeric Keypad
Consist of a set of numbers 0 to 9 and the arithmetic signs +,-, *, / and are located on the right side
of the keyboard.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topc
1. (a) Clearly define a computer
- A computer is an electronic device that operates (works) under the control of programs stored in its
own memory unit
- An electronic device that accepts data, as input and transforms it under the influence of a set of
special instructions called programs, to produce the desired output (referred to as information)
(b) Give one reason why a computer is refered to as an electronic device
- It uses electrical signals to process data
- It is made up of electronic components and uses electric energy to operate
2. Explain the following terms as used in computer science
(i)Data
A collection of raw facts, figures or instructions that do not have much meaning to the user
(ii) Program
A computer program is a set of related instructions which specify how data is to be processed
A set of instructions used to guide a computer through a process
(iii) Data processing
It is the process of collecting all terms of data together & converting them into information
(iv) Information
Data which has been refined summarized & manipulated in the way you want it, or into a more
meaningful form for decision- making
3. State any three functions of a computer
- Accepting data
- Processing the data
- Producing information
4. Explain the following input/ output terms as used in computer systems. Give an example
for each
(a) Read - To transfer data from an input device to the computer, e.g. the computer
reads data from a disk, a keyboard, etc
- To move or copy data from backing storage to the main
Storage
(b) Write - To transfer information from the computer to an output
Device e.g. the computer writes output on a printer or onto a disk.
- To move or copy data from the main storage to a backing storage
5. State four different parts that make up a computer (2 mks)
- System unit
- Monitor
- Keyboard
- Mouse
- Printerه
- Modem
- Scanner
- Speakers
- Graph plotters
6. (a) Explain the term system Unit
This is the casing thFSH Sat houses the internal components of the computer such as the CPU and
storage devices
(b) List four devices located under the cover of the system unit
- Central processing Unit (CPU)
- Motherboard
- Power supply uni
- Main memory
- Hard disk
- Disk drives
- Battery
- Buses
- Input/ output ports
- Video card
- Expansion slots
(c) Give two differences between tower – style and desktop system units
- Tower style system unit is designed to stand alone or to be placed on the floor, desktop units lie on
the desk with the monitor placed on top
- Tower style units have more space for expansion than the typical desktop units
(2 mks)
7.Computers have evolved through a number of generations. List any 4 characteristics of
the first generation of computers.
- Large in physical size
- Relied on thermionic valves (vacuum tubes) to process and store data
- Consumed a lot of power
- Produced a lot of heat
- The computers constantly broke down due to the excessive heat generated; hence were short- lived,
and were not very reliable
- Their internal memory capacity/ size was low
- Processing speed was very slow
- Very costly
- Used magnetic drum memory
8.Briefly explain the classification of computer according to historical development
(generations)
First generation computers
- Used vacuum tubes in their memory
- Large in physical size
- consumed a lot of power
- Produced a lot of heat
- The computers constantly broke down due to the excessive heat generated; hence were short- lived
and were not very reliable
- Their internal memory capacity/ size was low
- Slow in processing data
- Very costly
- Used magnetic drum memories
- Cards were sued to enter data into the computers
Second generation computers
- Used transistors in their memory
- They consumed less power & produced less heat than the first generation computers
- They were relatively faster than the 1st generation computers
- Used magnetic core memories
- Were less costly than first generation computers
- RAM memory capacity was 32 KB
Third Generation computers
- Used integrated circuits in their memory
- They were faster than second generation computers
- RAM memory capacity was 2 GB
- Slightly smaller in size than 1 & 2nd generation computers
st
- They used a wide range of peripheral devices
- Could support remote communication facilities/ more than one user at the same time
- Magnetic disks were introduced for storage purposes
Fourth generation computers
- Used large scale integrated (LSI) circuits & very large scale integrated (VLSl) circuits in their memory
- They were small & very fast
- Had storage (memory) capacity
- Magnetic disks, bubble memories & optical disks were used for storage
- The first operating system was introduced
Fifth generation computers
- Are the modern computers
- Are designed/ constructed using parallel architectures, 3 –D circuit design & superconducting
materials
- Are very powerful, with very high processing speeds
- The computers can perform multiprocessing
- Have virtually unlimited ( very high) memory sizes
- Can support complex programs
- Use advanced hard disks and optical disks for storage, e.g. DVDs
- Use of zip disks
- Use of multi user operating systems & advanced application programs
9. State four factors used to classify computers
- Physical size & processing power
- Power
- Functionality (mode/ method of operation)
- Type of processor (CPU)
10. State the differences between desktop computers and laptop computers
- Desktop is designed to be used when placed on a desk in an office environment. A laptop can be
used comfortably when placed on the User’s lap
- A laptop is small & portable; desktop computers are not portable
11. (a) Explain the emerging trends in microcomputer technology in relation to
size
- PCs are becoming small and portable, e.g. personal Digital Assistant (PDA).
(b) Give two reasons why smaller computers like Laptops tend to be more expensive than
Desktop computers
- The technology of producing smaller devices is expensive
- They are convenient because they are portable
- They have advanced power management capabilities (they consume less power since a laptop can
operate on rechargeable batteries
12. Which category of computers would you place an N- series Nokia phone
- Microcomputer/ palmtop
13. Give three reasons why a mobile phone is regarded to be a computer
- It is electronic * uses electric energy to operate
- It has a display unit (screen)
- It has a keypad
- It has a memory for storage
- It is programmable
14. (a) Mention three Analogue devices
- Computer used to control a flight Simulator for training pilots
- Bathroom scale
- Thermometer
- Speedometer
- Post- office scale
- A radio with a knob that slides in a slot to increase volume
(b) Give three example of special – purpose computers
- Robots
- Mobile phones used for communication only
- Calculators that carry out calculations only
- Computers used in digital watches & in petrol pumps
- Computers used in petrol pumps
- Computers used in washing machines
- An automatic pilot
- A word processor
15. State a specific example where each of the following types of computers can be
used
(a) Supercomputer
- Weather forecasting
- Petroleum research
- Defense and weapon analysis
- Aerodynamic design and simulation
(b) Mainframe computer ( 1 mk)
- Banks for preparing bills, payrolls, etc
- Hospitals
- Airports (i.e., in Airline reservation systems for booking & storing flight information)
- Communication networks as servers
(c) Minicomputer (1 mk)
- Scientific laboratories & research institutions
- Engineering plants for controlling chemical or mechanical processes
- Space industry
- Insurance companies & banks for accounting purposes
- Communication centers as servers
(d) Microcomputer / personal computer (1 mk)
- Training & Learning institutions, e.g. schools
- Communication centers as terminals
- Small business enterprises e.g. shops, small offices and homes
16. (a) Define a microcomputer ( 1 mk)
- A computer who’s CPU (processor) has been implemented with a microprocessor
(b) Differentiate between a microcomputer and a personal computer ( 2 mks)
- A microcomputer is larger in physical size than a PC
- A microcomputer is more powerful than a PC
- A PC was designed to be used by one person only
(c) List three factors to be considered when purchasing a microcomputer (3 mks)
- Type of processor
- Processing speed
- Amount of main memory (RAM)
- Storage capacity of the hard disk
- Cost of the computer
- Speed of output devices
- Number of users who can access the computers at the same time
17. Explain four reasons which make microcomputers suitable for personal computing
work
- Reduced cost, i.e. are cheaper than the minicomputers & mainframe computers
- Have high processing speed
- Are small in size (occupy less office space)
- Are more energy efficient (i.e. consume less power)
- Are more reliable in doing various functions than the early mainframe computers
- Are versatile (i.e. can be used for many different tasks)
18. (a) Identify and explain five areas where computers are used to process data ( 10
mks)
Supermarkets
- For stock control i.e. records of what is in store, what has been sold, and what is out of stock
- For calculating customer’s change
- For production of receipts
- It can be used as a barcode reader
Banks
- Manage financial transactions through the use of special cash dispensing machines called ATMs used
for cash deposit & withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping & processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information/ documents
- For calculating & keeping home budgets
Industries
- To monitor and control industries processes through the use of robots
- For management control, i.e. to keep track of elders, bills and transactions
- For advertisement purposes, which enable an industry to attack more customers
Police stations
- Matching, analyzing & keeping databases of fingerprints
- For taking photographs & other identification details
- For record keeping
- For face recognition, scene monitoring & analysis which help the police carry out criminal
investigations speedily
Transport industry
- Airports; to control the movement of aircrafts, their take off & landing using radar equipment
- For making reservations (booking purposes)
- Storing flight information
- Automobile traffic control; to monitor vehicle traffic in busy towns
- In Railways corporations; to coordinate the movement of goods & wagons
- In shipping control, for efficient management of fleets, cargo handling & communication
Offices
- For receiving & sending of information through e- mails, fax, etc
- Production of documents
- Keeping of records
19. Identify three advantages of using computers in banking (3 mks)
- Speed and accuracy
- Easy to access information
- Easy to update records
- Requires less space for storage
- Improves data security and privacy
20. (a) Define the term ‘ computer laboratory’ ( 2 mks)
- A computer laboratory is a room that has been specially prepared to facilitate installation of
computers, and provide a safe conducive environment for teaching & learning of Computer studies.
(b) Give two factors to be considered when preparing a computer laboratory (2 mks)
- Security of computers
- Reliability of the source of power
- Number of computers to be installed and the amount of space available
- The maximum number of users that the laboratory can accommodate
21. List down three safety precautions one should observe when entering a computer
laboratory (3 mks)
- Avoid smoking or exposing computers to dust
- Avoid carrying foods & drinks/ beverages to the computer room
- Avoid unnecessary movements as you may accidentally knock the peripheral devices
- Only authorized people should enter the computer room
- Computers users should be trained on how to use computers frequently
- Computer illiterates should not be allowed to operate the computers
- collect any waste papers which might be lying in the computer room & put them into the dustbin
- Shut the door of the computer room properly
22. Describe the ideal environment for a computer to work properly (3 mks)
- Should be free from dust, water and magnets
- Should be kept in well ventilated rooms with optimum (medium) humidity
23. Explain why smoke and Dust particles are harmful to a computer
- Dust and smoke particles settle on storage devices and may scratch them during read/ write
operation
- It affects the cooling of the computer
24. Identify three facilities that will ensure proper ventilation in a room
- Large & enough windows and doors
- Installing fans
- Installing air conditioning system
- Avoid overcrowding of either machines or people in the room
25. Why must foods and beverages be kept out of the computer room?
- Food particles may fall into the moving parts of the computer and damage them. Liquids may spill
into the computer parts causing rusting or electrical faults
26. Why would it not be good to install Powder or Water – based fire extinguishers in
the computer room?
- Powder particles settle on storage devices and may scratch them during read/ write operation
- Water causes rustling of metallic parts and short – circuits if used
27. (a) State one reason why a computer needs to be connected to a stable power
supply (1 mk)
- To prevent damage to the computer’s secondary storage media
- To avoid damage and loss of important data or information such as application software stored on
the media
- Prevent loss of data/ information that had not been saved before the failure
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
- It prevents sudden power surges that might destroy the computer
- It supplies power to the Computer during blackouts and brownouts
- It provides stable (clean) power supply
- Alerts the user of power loss (by beeping)
- Allows the user to save his/ her work, and switch off the system using the correct procedure
28. Mention two things that are likely to cause strain- in the computer room
- Poor lighting of the room
- Bright monitors
- Flickering monitors
- Very bright wall paints reflect too much light
29. Identify three proper sitting postures while using the computer
- Adopt relaxed and straight back position to avoid bending forward or learning far backwards
- The feet should be firmly placed flat on the floor
- The seat must be high enough allowing the eyes to be the same level with the top of the
Screen
- The seat must have a straight backrest that allows someone to sit upright. This prevents muscle
pains & backaches caused by poor sitting posture
- The height of the chair or working surface must be high enough such that your forearms are parallel
with the floor and your wrists are straight.
- The seat must be high enough relative to the table to enable the user use the hands on the
peripheral devices comfortably.
30. State two methods of minimizing dust in a computer laboratory
- Fit the computer room with special curtains to reduce entry of dust particles
- Cover the floor with carpets in order to absorb dust
- Regular cleaning of the laboratory
- Cover the computer devices with dust covers when cleaning the room
31. Name two main causes of fire in the computer laboratory and give the precautions
that should be taken to guard against them
- Inflammable chemical such as those used to clean the computer equipment
Keep the chemicals away in store after use
- Open wires/ cables
- Ensure that all electrical wires are properly insulated
- Ensure that the computer room has a gaseous fire extinguisher containing carbon dioxide in case of
any accidents
- Smocking
32. What is the purpose of labeling a diskette?
- To prevent confusing the data in the different diskettes
- To prevent mixing diskettes that are used everyday with those used for long- term storage of
important data.
33. List three things that can spoil a printer if they are not of the correct specification,
and explain what damage may be caused
(i)Printer Paper: Different printers have different sensitivity to printing papers. Using the wrong quality
paper in a particular printer can make the paper get stuck
(ii) Cartridges & Ribbons: Printers are very specific to manufacture’s cartridges & ribbons
Use of clones or imitations ( i.e., the wrong make & model) can damage the printer mechanism
(iii) Refilling of cartridges or re- inking of ribbons: It can spoil the printer due to leakage or use of
poor quality materials
34. Explain three ways that computer technology could make office more efficient (3
mks)
- There is easier & faster retrieval of data, i.e. they reduce the time and effort needed to access and
retrieve information
- Increased accuracy of data
- Better presentation of data
- Ensure faster processing of data
- Ensures economic use of storage space
35. (a) Explain the steps you would follow to set up a new computer
- Gently and carefully connect the interface cable of each device to the correct port and to the device.
- Connect the computer to the source of power and switch it on.
- Observe boot up information on the screen to see whether Power-On Self Test (POST) displays any
error message. A successful boot means that the computer was properly setup.
(b) Outline three reasons why it is important to first shut down the computer before
turning it off
- To avoid damaging storage devices that may still be in use
- To avoid damaging system and application files
- To avoid loss of data and information ( 3 mks)
36. A computer must go through the process of booting/ initialization before use
(a) Briefly explain the term “computer booting”.
Booting refers to the starting up of a computer. It is the entire process that makes the computer ready
for use.
(b) Explain what happens in the computer during the booting process
When the power is switched on, internally, it first checks whether all the components are in good
working condition, i.e. the RAM, CMOS (BIOS), hard disk & floppy disk drive controllers, and the
keyboard. If no problem is found, it then loads the operating systems
(c) Give and explain two types of booting
(i) Cold booting:
It happens when a computer which was originally off is switched on by pressing the power button on
the systems unit
The Computer starts by checking all its components to determine whether they are functioning
properly
(ii) Warm Booting
This happens when a computer that was originally on is forced to restart by pressing the restart button
on the system unit by pressing a combination of keys on the keyboard ( CTRL + ALT + DEL)
(d) What type of memory is used to store the boot up program (the first program to be
executed on switching on a computer?
Read – only Memory (ROM) ( 1 mk)
37. (a) What is a computer keyboard
An input device that lets the user enter commands into the computer for execution by
typing
(b) List four types of keys found on a computer keyboard, giving an example of each
( 4 mks)
- Function/ command keys (F1- F12)
- Alphanumeric Keys (A-Z, 0-9)
- Numeric keypad (0-9)
- Cursor control keys (PgUp, PgDn, Home, end, Arrow keys)
- Special PC keys (Ctrl, Shift, Alt, Ins, Enter, Spacebar, Caps lock, Num lock, etc)
- Editing keys (Del, Backspace, and spacebar)
(c) Name the keyboard keys that will help you: (2 mks)
(i) Type the upper character in a key - SHIFT Key
(ii) Execute a selected command - ENTER Key
CHAPTER TWO
COMPUTER SYSTEM
Specific Objectives
By the end of the topic the learner should be able to:
a) Describe a computer system;
b) Explain the functional organization of the elements of a computer system;
c) Describe input devices of a computer system;
d) Describe the central processing unit (CPU);
e) Describe the output devices of a computer system;
f) Describe the types of secondary storage devices and media;
g) Distinguish between power and interface cables;
h) Explain basic computer set-up and cabling;
i) Distinguish between system software and application software;
j) Evaluate the criteria for selecting a computer system.
Content
a.) Description of a computer system
b.) Functional organization of the elements of a computer system
• Hardware
• Software
• Live-ware
c.) Input devices e.g.
• Keying devices
• Pointing devices
• Scanning devices
• Speech recognition devices
• Other digital devices
d.) Central Processing Unit (CPU)
• Control Unit
• Arithmetic and Logic Unit (ALU)
• Memory
• Processors
(i) types
(ii) clock speeds
e.) Output Device
• Soft copy output devices e.g.
i) Visual display unit - Liquid Crystal Display (LCD), flat panel, cathode tube (CRT)
ii) Sound output
iii) Light emitting
• Hard copy output devices e.g.
i) Printers (impact, non-impact)
ii) Plotters
f.) Secondary/Auxiliary Storage Devices and Media
• Fixed e.g. Hard disk
• Removable e.g.
i) Floppy disks
ii) Tape
iii) Optical disks (CD-R, WORM, CD-RW, DVDs)
iv) Zip disks
g.) Power and Interface Cables
• Power cable
• Parallel cable
• Serial cable
h.) Basic computer Set-up and Cabling
• Connecting basic computer components
• Connecting other computer peripherals
i.) Classification of software
• Purpose
- System software
i) Firmware
ii) Networking software
iii) Operating system
iv) utilities
- Application software
• Acquisition
(i) standard software
(ii) user developed (in-house)
j.) Criteria for selecting a computer system (specifications)
- Hardware considerations
Introduction
Definition of computer system
Collection of entities that work together to process and manage data to information.
Elements of a Computer System
1. Hardware- Physical or tangible computer components e.g. keyboard, mouse etc.
2. Software- Programs installed.
3. Liveware- The computer user.
Central Processing Unit (CPU)
It processes data and controls all computer operations. Elements of the CPU are:
Arithmetic and logic unit (ALU)- Performs the actual data manipulation.
Control Unit- 1. Fetch phase-Access instruction in sequence
2. Decode phase-Interprets instructions
3. Execution phase-execution of commands
Main memory
It forms an integral element of the processor. It’s tasks are;
Holds data awaiting processing
Holds data being processed
Holds data that has been processed awaiting to be output
Read Only Memory (ROM)
Its content can be read but cannot be changed during normal computer operations.
It is normally used for permanent storage of data and instructions that remains unchanged for a
long period of time.
Types of ROMs
i. Mask Read Only Memory (MROM): contents cannot be changed once written on it by
manufacturers.
ii. Programmable ROM (PROM): the user rather than the manufacturers can after store data but
once only.
iii. Erasable Programmable ROM (EPROM): the content can be reprogrammed by exposing it to
ultraviolet light.
iv. Electrically Erasable Programmable ROM (EEPROM): the content can be erased and programmed
using electricity.
Characteristics of ROM
The content cannot be changed unless written in a special type.
Non-volatile: data cannot be lost when the computer is switched off.
Random Access Memory (RAM)
1. Static RAM: the data doesn’t need to be refreshed, it is capable of handling data extremely faster.
It is also reliable.
2. Dynamic: The data must be refreshed i.e. data must be read and written periodically. It stores
more information than static RAM.
Types of DRAM
1) Fast Page Mode (FPM)
2) Extended Data Out (EDO): improvement on FPM
3) Extended Correcting Code (ECC): Special DRAM, corrects errors, and used on savers.
4) Synchronous Dynamic Random Access Memory (SDRAM): twice fast as EDO. Run at a speed
of system bus up to 100 – 133 MHz
5) Rhombus Dynamic RAM (RDRAM): has a data transfer rate of 800 MHz
6) Double-Data rate (DDR): fast DRAM with module speed at which SRAM can transfer data to
the processor.
7) Video RAM (VRAM): Special type of memory that is used only with video adapter.
8) Window RAM (WRAM): a faster version of video memory.
DRAM in system unit on memory chamber of laptops
1) Dual-inline Package (DIP)
2) Single-inline Memory Module (SIMM)
3) Dual Inline Memory Module (DIMM)
4) Small Outline DIMM (SODIMM)
5) Micro DIMM
Characteristics of RAM
Information can be accessed at any time (random)
Data can be changed
Special Purpose in RAM
1. Buffers: They provide temporary storage for finished tasks so that the CPU is set free to carry
out other activities instead of waiting for all data to be entered in information to be output.
2. Registers: They hold a piece of data at a time and they are inside the CPU. Examples a)An
accumulator: temporarily holds the result of the last step of the Arithmetic and
Logic Unit.
b) An address register: Temporarily holds the next piece of data waiting to be processed.
c)Instruction register: Temporarily holds an instruction just before it is interrupted into a form
that the CPU can understand.
d) Storage register: It temporary holds a piece of data that is on its way to and from the CPU
and the main memory.
Cache Memory
It helps the processor to access data and instructions faster due to incorporation of small high- speed
type of Static RAM than it would have taken to fasten it from the relatively slow Dynamic RAM.
Types of Cache Memory
Level 1 (Primary cache): located inside microprocessors.
Level 2 (Extended cache): may be inside microprocessors or mounted on the motherboard.
Level 3 (Latest cache): works like level 2 to optimize system performance.
Terms used in the CPU
1. Chip: A small rectangular piece of silicon on which most circuits are implemented by extension.
2. Integrated Circuit (IC): It is a device that is integrated or joint to connect a circuit of several
electronic components in a single package.
3. Large Scale Integration (LSI): Refers to the technology that integrates thousands of transistors
on a single Integrated Circuit (IC). If more than 20000 transistors are integrated the Very Large Scale
Integration (VLSI) is used.
4. Microprocessor: This is the brain of the PC.
5. Microcomputer system: This refers to computer set of devices require using and
operating the computer. This includes peripheral devices.
Input Devices
Devices that accept data from external environment and encode it into a form understandable to the
computer for processing.
Classification of Input Devices
1. Keying devices: use buttons to make entries e.g. keyboard and keypad
2. Pointing devices: Mouse, trackball, joystick, lightpen
3. Scanning: capture data directly from source
Optical scanners
1. Optical Mark Recognition (OMR): Detects marks made on a
piece of paper using a soft pen or pencil.
Advantages
Low error rates
Conspicuous errors are corrected
Minimize manual work
Disadvantages
Relatively slow
Difficult verification of worked data
Not widely used in business
Application
Making of multiple choice exams
Market research questionnaires
Payroll entry
Traffic surveys
2. Optical Bar Recognition (OBR): Used to read bar
codes.
Advantages
Barcodes can be printed by normal printing methods
Type of item or price doesn’t have to be repeatedly written or
retyped
Disadvantages
Bar codes can be read by machines
Only numbers can be coded this way
Are relatively fixed, so they are unsuitable for recording prices
which can change frequently
Applications
On labels and on shelves for stock taking
Printed on shop goods e.g. supermarkets
In libraries
3. Optical Character Recognition (OCR): Not only does it scan
characters but also can scan real objects, pictures and drawings
Advantages
Limited errors
Early methods
Document design is less complicated
Character can be read by people
Disadvantages
Expensive or costly
May require redesigning quite frequent
Only certain font is applicable
Magnetic scanners
1. Magnetic Ink Character Recognition (MICR): Allows special
devices to read magnetic characters written in a special format.
Advantages
Fast, accurate and automatic
Codes are both machine and human readable
Reduces forgery
Disadvantages
Limited to only 14 characters
Based on magnetism and can easily
Application
Banking industry for cheques
2. Magnetic Strip Recognition (MSR):
Advantages
Simple to produce
Not easily damaged
Stores fairly large number of characters
Disadvantages
Data can be changed or erased by magnetic fields
Applications
On credit card
On bank cards
As tags on clothes
As a phone card
Keying devices
1. Traditional Keyboard
2. Flexible keyboard: can be folded
3. Ergonomic Keyboard: designed to provide comfort and allocate wrist
strain.
4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
5. Braille keyboard: designed for the blind.
Pointing devices
Mouse
1. Standard mouse: has a ball underneath, two buttons and optical
scroll button located between left and right buttons.
2. Optical mouse
3. Cordless/ wireless mouse: battery powered mouse that uses
radio or infrared waves instead of being physically connected to
the system unit
Trackball
It’s advantage over mouse is that it neither requires an extra space nor a
flat surface for movement.
Joystic
An input device like a car gear that can be moved sideways, upwards or
downwards to control the
position of the cursor.
Light pen and style
The lightpen is a hand held device that has just a light sensitive point. It
can make selections,
place images, draw and indicate dimensions by simply touching the
screen. Doesn’t emit light but reacts to light emitted by the display using a
photosensitive detector at its base.
Speech Recognition/ Voice input: This is where microphone is used to
enter data/information or spoken words into a computer. Situations for
speech recorgnition:
Where hands are busy handling documents
Due to movement
Disability e.g. blind without hands
Uses
i. Electronic fund transfer vi. Automated
ii. House/ car security i.e. material
voice activated locks handling
iii. Offer security for room
access
iv. Voice activated toys
vii. Computer
and scanners
v. Quality control and Aid Design
automation in factories Limitations
i. Existence of
homophones
ii. Word separation
is difficult
iii. Slow recognition
iv. Speaker
variability
v. It is still at the
early stage of
development
vi. Limited
vocabularies
Touch screen, Digitizers and Cameras
Touch screen: Use touch sensitive screen where the computer detects the
position of the finger on the screen and responds accordingly.
Digitizers: Almost similar to light pen but has a graph tablet on which
user writes using a pen like device called a style
Cameras: Store images in digital form.
Other Examples of Input Devices
Point of sale (POS) Terminal
This consists of numeric keypads and a few controls or function keys. They
are normally used in computerized wholesale or retail organizations like
supermarkets.
Input Facility Considerations
Cost
Input Speed
Volume
Accuracy
Reliability
Mode of operation
Appropriateness
Problems faced while collecting data
Preparation of source document is slow hence prone to mistakes.
Low typing speed leads to keyboard bottleneck.
It is wasteful to use a media which can only be used once like
punched cards.
Mistakes can be made when copying data from one medium to
another.
Translation delays or losses can occur if data is physically transferred
to the computer.
Data entry can be expensive
The Main methods of data entry
1. Source document reader: Orders, sheets and forms are batched and
converted into computer acceptable medium.
2. Online data entry (keyboard entry): Data is entered directly into
computer one translation at a time under program control.
3. Direct data capture: Data capture directly without conversion stage.
Outputs Devices
Devices that accept information from internal environment and then
decodes it in a form understandable to user
Classification of Output Devices
1. Soft copy: includes monitors/ VDU and the speakers
2. Hard copy: Printers and plotters
3. Microfiche: Computer Output on Microform (COM)
Visual Display Unit (VDU)/ Screen
Types
a) Monochrome- Display images and text in only one colour
b) Color- Display in multiple colours
Examples of Graphic Adapters
1. Monochrome Display Adapter (MDA)- display text in only one color.
2. Hercules Graphic Adapter (HGA)- Support monochrome image and
text
3. Color Graphic Adapter (CGA)- Display using sixteen colours.
4. Enhanced Graphic Adapter (EGA)- An improvement over colours but
use 16 colours.
5. Video Graphic Array (VGA) – Offers at most 256 colors.
6. Super Video Graphic Array (SVGA) – an enhanced VGA
Common Types of Flat panel Display
1. Liquid Crystal Display (LCD): Doesn’t emit light of their own instead
have tiny liquid crystals that reflect light falling on them from the
environment.
2. Electro Luminescent: Improved LCD. Emit light when electrically
charged.
3. Gas plasma: Use gas that emits light in presence of electric charge.
4. Thin Film Transistor (TFT): This is the latest technology
advancement that provides high quality resolution.
Printers
How printers are classified
a) Speed
b) How the produce the print; character, line or page printers
c) How they provide prints on the stationery; impact or non-impact
printers
Types
a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
b) Non-impact printers: Thermal, inkjet, electrostatic and laser printers
Impact Non-impact
Slow Fast
Use ink ribbon Thermal/electrostatic principle
Cheaper Costly due to technology involved
Noisy Quiet
Multiple copies produce is Multiple copies produce almost
possible impossible
Printers Consideration
1. Printers initial price, subsequent maintenance cost and cost of
consumable items.
2. Volume of printing expected.
3. Nature of report to be generated.
4. Range of capability for the selected printer.
5. Interface with computer at hand on for family particular make.
Plotters
They are used to produce graphical output e.g. maps and diagrams.
1. Flatbed plotters: Has a flat surface which the stationery is placed for
the pen to be moving over it in all directions to produce graphical
output.
2. Drum plotters: Has a drum onto which stationery is placed for the
drawing to be possible.
Difference between a printer and a plotter
Printer: produces hardcopy of information on papers.
plotter: Produces big charts e.g. maps, pictures and drawings. Used for
printing geographical, architectural and engineering drawings e.g. maps,
advertisements posters to be placed on bill boards, machinery parts etc.
Computer Output (originated) microform (COM)
Provides photograph type of output into the microform (photographs
reduced documents on films)
Advantages 5. Longer lifespan compared
1. Saves stationery and space to paper medium output
2. Faster than printing Disadvantages
3 Non-bulky hence 1. Expensive
conveniently 2. Cause eyestrains
transportable 3. Expensive additional
4. Guarantee security as equipment for viewing
content cannot be ready by contents
naked eyes
Computer Bus
Communication medium within a computer that allow different
elements of the computer to communicate with one another.
1. Address bus: Pathway used to locate storage position in
memory for the data to be executed.
2. Data bus: Pathway where the actual data transfer takes place.
3. Control bus: Pathway for all timings and controlling functions sent
by the control unit to the parts of the system
Auxiliary/secondary storage
Factors to consider when choosing a storage device
Volume of data to be stored
The cost
The quantity or size of data it can hold
Magnetic Tapes
These are sequential access devices. Implies that information is at the end
of tape the program will have to read almost entire tape which may take
time to read. Data recorded as series of magnetic dots across tracks on
the tape cassette when characters are stored serially down the length of
the tape.
Sequential access medium: Data is stored across magnetic tape
Serial access medium: data is stored along the media
Advantages Slow since they are
Light and easy to sequential access
carry media
Effective for batch Gaps between (called
applications since they Inter Record
are cheaper Gap, IRG) waste storage
Disadvantages space.
Magnetic Disks
Floppy Disks (Diskettes)
Information is recorded on number of concentric circles called tracks.
Tracks are divided into sectors. Sectors and tracks have same storage
capacity because inner tracks have a high density. Diskettes are direct
access storage medium (DASM) and access time is made up of 3
parameters.
1. Seek time: Time taken by the read/write (R/W) head to locate
right track that contains content.
2. Rotational delay time: Time taken by drive mortar to spin the
diskette past R/W head.
3. Data transfer time: Time taken by the R/W head to interpret
content and send it ascomputer input.
Advantages
1. Exchangeable and easy to carry
2. Can be used with PCs with no hard disk
3. They are cheap
4. Used for back up
Disadvantages
1. Slower than hard disk
2. Less storage capacity
3. Damaged by light, magnet and dirt
Zip Disks
Come with portable external drive and are slightly large and thicker in size
and has a capacity of up to 250MB
Jaz Disks
Come with portable external drive and have a capacity of 1GB to 2GB and
have high access speeds.
Advantages of Magnetic Disks
1. Light and portable
2. Effective for batch application
3. Cheap
Care of Magnetic Storage Media
a.) Keep away from extreme temperature
b.) Never touch the disk surface
c.) Keep them away from magnets
d.) Never use clips to hold disk
e.) Keep them away from dust, moisture and high humidity.
Optical Laser Disk
They are recorded using a laser beam (very strong concentrated
light)that burns patterns as fine circular tracks (indentations) on the
surface. Data is retrieved using relatively low power laser.
Super disk (SD) LS-120
They resemble 3 ¼ floppy disk but has a high capacity of 128 MB
Compact Disk (CD)
They have a high recording density of about 700MB. There are three types
of compact disks:
1. CD-ROM (Read Only Memory): The recorded data cannot be
changed, deleted or added.
2. CD-R (Recordable): They are initially blank but when data is
recorded it becomes permanent.
3. CD-RW (Re-writable): Data can be overwritten/ added or raised.
CD-ROM and CD-R are referred to as WORM (Write Once Read Many)
since you cannot write the second time but you can read many times
Digital Versatile Disk (DVD)
They resemble the compact disks but have a greater storage capacity up to
17GB
Optical Tapes
They resemble magnetic tapes but they use optical technology
Hard disk
Advantages
1. They offer cheap storage
2. They are well protected since they are housed in the CPU
3. Fast in terms of access retrieval and saving of data
Care for the Hard disk
a) Keep them away from smoke and dust.
b) Use the right procedure to switch of the computer to allow the R/W
head to move from the disk surface to avoid scratching on rotating
surface
c) Exposure to magnetic property
Minimal Requirements for a multimedia computer
A Video Graphic Array (VGA)/ Super Video Graphic Array (SVGA) card
and monitor.
A sound card
128MB RAM or higher
CD or DVD drive
FM/TV card
Ports
Power and Interface Cables
Power cables are used to connect the computer to main power outlet.
Interface cables connect all peripherals to the motherboard and transmit
data signals.
Power supply unit supplies power to motherboard and other internal device
Types of Cables and Ports
1. Parallel ports: They transmit data simultaneously using a set of
connectors- 8bit parallel cables. They are faster over short distance. Printers,
removable storage drives and network adapter. Port is (PT1) 25 PIN
2. Serial ports: They transmit one bit at a time. They are slower than
parallel ports but they support two way communications. They are 25 pin
and 9 pin. COM 1 and COM2. Used by the serial printers.
3. Universal Serial Bus (USB)
They transmit one bit at a time but at a very high speed and provide quality
data transmission about 15m distance. – External storage devices, cameras
etc.
Advantages of USB
Provide very high speed
Quality data transmission over long distance
Support a wide range of peripheral devices
4. Small Computer System Interface (SCSI) - Use parallel method but
faster than parallel cables. The port connects up to 8 peripheral devices.
Other ports and connectors
5 PIN DIN and 6 pin (PS/2): used by keyboard and mouse
9 pin D and 15 HI-pin-D: monitors
Audio connectors: jack plugs found on sound adapter for connecting
speakers, microphone and other portable audio equipments.
Classification of software according to purpose
System software
Operating system
A set of computer programs that normally reside in the main memory and
used to control the basic computer hardware resources & the operation of
the entire system.
Firmware (Store Logic)
A combination of both software and hardware recorded permanently on
electronic chips mounted on the motherboard. May hold operating system,
utility programs, language processors etc.
Utility Software
A special program that performs commonly used services that make
certain computing aspects go on smoothly e.g. sorting, copying, disk
management etc. There are two types:
1. System level: Help user to work with the operating system and its
function. It tells whether the command entered is wrong and give
suggestion on how the error can be corrected.
2. Application level: Make use of an application program smoother and
efficiently.
Functions of utility software
Reporting of errors which occur during program execution
Control input and output devices
Protest use hardware and data from misuse
Provide program testing routines
Provides communication between computer user and each program
Memory management
Maintenance of internal time clock and log of system usage by all
users.
Network software
Establish communication between two or more computers by linking them
using a
communication channel like cables to create a computer network e.g.
Novell Netware
Application (packages) software
Programs that are designed to help user accomplish specific tasks.
Software Uses Examples
Word processors Typing long MS-Word, Word Pro
Spread sheet documents
Calculating budgets MS-Excel, Quatropro
Desktop Publishing Designing publications Adobe PageMaker, MS-
(DTP) Publisher
Computer Aided Technical drawing AutoCAD
Design
Database
(CAD) Keeping records and MS-ACCESS, Dbase
Graphic Design files
Creating and Corel Draw, Adobe
manipulating Photoshop
graphics
Internet Software
Used in communication and perusing the internet.
Programming Software
Used to create programs that behave like software
Classification according to Acquisition
1. In-house developed programs/ Custom design programs
They are designed to meet the needs of a specific user or organization
2. Standard/ Vendor of the shelf software
Designed by software engineers to be used by different users. When
closely related software are put under one software it is known as suit/
integrated/ general software. While packages are known as single purpose
software e.g. Lotus Suite, MS Office etc.
Advantages of Standard Software
Less expensive
They’re readily available for almost any tasks
Well tested before they are released hence chances of errors are
minimal
Easily modified (customized) to meet specific user needs
Other software can be linked to it and use the same data
Disadvantages
Easily pirated
Do not meet all user requirements
Consideration for a Computer System
Criteria for selecting a computer system
Identify the user requirement
Evaluate the hardware requirements that will meet users’ needs
Evaluate the software requirements
Hardware Considerations
a) Processing speed: For faster data processing the speed
of the processor must be relatively high.
b) Memory capacity: At least 128MB RAM. There are also factors to
be considered when buying a memory module-The type of module
supported by motherboard
-Whether there is an empty slot on the motherboard
-Compatibility of the module with the existing one
-Module capacity
c) Warranty: Arrangement between the buyer and the seller
whereby incase the product fails during the agreed period of time it
is taken care by the seller free of charge or for an agreed fee. Things
to consider in a warranty –The scope of cover
-Call out response and liability agreement
-Regular preventive
maintenance
d) Cost: The cost is determined by the processor, size, and the
memory capacity.
e) Upgradability and compatibility: Whether the hardware chosen
can be easily upgraded to accommodate emergent technologies.
f) User’s needs: Can it meet the unique needs like for the disabled?
g) Monitor: Always consider the size, resolution and the technology
involved.
h) Multimedia capability: It should have speakers, CD/DVD drive,
sound card, VGA or
SVGA card.
Software Requirements
a) Authenticity: Always consider genuine, valid and legitimacy and
developers license.
b) Documentation: Manual from the developers that guide the user
on installation, usage and maintenance. –User guides
-License
-Manual guide
-Installation process
-Quick reference
-Warranty
c) Reliability and security: Consider whether the software
offers good security to confidential and private information.
d) User friendliness: How easily the user can interact with the
software.
e) Compatibility and system configuration: Consider whether the
software can work with the computer at hand.
f) Cost: Always consider the cost and whether it serves the purpose.
g) Users’ needs: The purpose of the software.
h) Portability: Consider whether it can be installed in different
computers.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. Define the following terms as used in computing
(i) System
A collection of independent entities that collectively work together to achieve
a desired goal
(ii) Computer system
A collection of entities that work together to process and
manage information using computers
A collection of hardware software and live- ware all working
together in data inputting, processing and production of required
output from a computer
2. Differentiate between a computer and a computer system
A computer is made up of both hardware and software, while a computer
system integrates hardware, software and user
3. (a) List and explain three functional elements of a computer
system ( 6 mks)
Hardware
They are the physical & tangible devices that make up a computer systems,
e.g system unit, input devices, output devices and storage devices
Software
These are programs & data used in a computer system that enable it
perform a number of specific functions, e.g. operating systems, application
programs, utility programs, programming languages & device drives
Live – ware ( people – ware)
These are the people who coordinate the various activities which are
necessary to make a computer system perform useful tasks e.g. data entry
clerks, computer operators, programmers, system analysis, etc
(b) Draw a well – labeled diagram showing the functional units
of computer hardware
4.
(a) Give two main functions of a computer input device. (2 marks)
- Accepts data & instructions from the user and sends them into the CPU. V
- Converts data into a form that the computer can understand (i.e.,
machine-
Sensible/readable form)
(b) Give an example of a: (3 marks)
Device that reads data (scanning device).
- Scanner,
- Digital cameras,
- Barcode readers.
~ Credit/smart card readers,
- Kimball tag readers.
- OMR, OCR, MICR, etc
Keying device.
- Keyboard,
- Keypad.
Pointing device.
- Mouse.
- Trackball.
- Light pen
- Joystick.
Voice input device.
- Microphone.
Printing device.
- Printer.
- Plotter.
5. State two advantages of using a mouse instead of a keyboard. (2
marks)
- The mouse is easy & convenient to use.
- Modern software includes an option to use it.
- It selects a position on screen much more quickly than a keyboard.
6.Outline any two advantages of a light pen as an input device, (2
marks)
- It is a faster input device because it involves just pointing on the screen
and selecting options.
- Can be used to draw images on the screen.
~ It is light and easily portable (saves energy).
- A light pen will result in few errors.
7. (a) What are computer scanning devices? (2 marks)
These are devices that enter (capture) data into the computer directly.
(b) Name the type of scanner used: (2 marks)
(i). To capture prices of goods at points of sale terminals in
supermarkets and superstores.
Barcode reader
(ii).To grade multiple choice examination
Optical mark reader (OMR)
-12- Computer studies
8. Mr. Otieno a French teacher used speech method to store
students oral answers to an exam into a computer
(a) What is a speech input?
It is a type of input where a microphone connected to a computer system is
used to enter data in form of spoken words into the computer
(b) State two advantages and two disadvantages of using this
method of data input (4 mks)
Advantages
- Voice input is fast
- Its suitable for people with special needs especially
those with impaired hands
- Can be used in emergency situations
Disadvantages
- Voice input is complex to develop
- Voice input does not take care speech related problems such as
accents, tone etc
- The response rates of speech input devices are relatively slow
- Most speech input devices can recognize a limited, standard
vocabulary of spoken words, and the voice of only one speaker
- Cannot differentiate words that have same sounds (homophones)
(c) State four areas where speech input would be used
- For people with special needs or disabilities (e.g. the handicapped
especially those with impaired hands.
- Emergency situations
- Where faster data input is required
- In language translator or programs
- Voice tags for voice dialing
- In automated materials handling e.g. in airports, a good handlers give
spoken commands that direct the luggage to the appropriate conveyor belt.
- For house/ office or car security where voice activated locks are used
for access control
- In voice- activated toys and games
- In electronic funds transfer
9. Name two examples of scanning (data capture) devices used at
point of scale terminals in supermarkets
- Barcode reader
- Light pen
- Cash registers
10. (a) What are turnaround documents
These are documents produced as output and which can be re-used as
input by the computer
(b) Name any two data capture techniques that make use of
turnaround documents
( 2 mks)
- Optical character recognition (OCR)
- Optical Mark Recognition (OMR)
- Magnetic Ink Character Recognition (MICR)
- Optical Bar Recognition (OBR)
- Magnetic Stripe Recognition
11. List five factors one would consider when selecting a data
input device (4 mks)
- The needs of the user
- Type of data to be input
- Volume of data to be entered
- Input speed
- Cost, i.e. the initial cost of the input device & cost of using the device
on a day – to – day basis.
- Availability & reliability of the data entry device
- Accuracy required
- Availability of space
- Appropriateness of the device in reference to where it is to be used
12. Describe three functions performed by the CPU (3
mks)
(i) It carries out processing of data
(ii) System control- it controls the sequence of operations within the
computer
(iii) It gives commands to all parts of the computer
(iv) It controls the use of the Main Memory in storing of data &
instructions
(v) Storage of data- It provides temporary storage (RAM) &
permanent storage (ROM)
13. Explain the functions performed by each of the following
central processing unit elements
(i) Control Unit (2
mks)
- Interpreting instructions
- Issuing control instructions to the operating system
(ii) Arithmetic and logic Unit
- Performs arithmetic calculations such as addition, or multiplication of
figures
- Performs logical operations & comparison on data
- Performs output of logical functions (variables)
(iii) Registers
- Holds data and instructions temporarily just before and after
processing
(iv) The main memory
- Stores data just before and after processing
- Stores instructions waiting to be obeyed/ executed
- Holds program instructions & the data currently being processed
- Stores intermediate results of processing awaiting transfer to the
output devices
(v) The system clock
It determines the processing speed of the CPU
14. In reference to ALU, explain the meaning of logic operations
and give an example of this processing operation
Logic operation is the ability to compare two quantities or numbers to
determine which is greater than, less than, equal to, or not equal to the
other.
It also involves the testing for existing of a condition encountered during the
processing of an application & altering the sequence of instructions
accordingly.
15. Give four types of registers found in the CPU
- Accumulator
- Instruction
- Address register
- Storage register
16. (a) Name the basic unit used to measure the processing speed
of a computer ( 1 mk)
Hertz (Hz)
(b) A computer processor speed is measured in Hertz. What
fraction of a second is the following?
(i) 1. Nanosecond
1 1__________
1 x 109 = 1,000,000,000 seconds
(ii) 1. Microsecond
1 = 1________
1 x 106 1,000,000 seconds
17. (a) What is a computer bus? (1
mk)
A communication path/ medium within the computer that connects
the basic computer components. It allows different elements or
sections of the computer to communicate with each other.
A parallel collection of conditions that carry data & control signals
from one element to another
b. State the functions of each of the following computer bus ( 3
mks)
Data bus- carries data from the processor to memory during the
write operations and from memory to the processor during the read
operations
Address bus- it conveys addresses, i.e it carries the address of the
memory location or device to be acted on by the processor
Control bus- it carries the timing & control signals necessary to
coordinate the activities of the entire system
18. (a) What is the computer Motherboard?
This is the electronic board where all electronic components such as
processor, memory chips, BIOS, bus connections etc are assembled
(b) State any four components found on the computer motherboard
- Processor (CPU)
- SIMM/DDR sockets
- Memory chips
- BIOS
- Interface chips
- Buses
19. (a) What is a Drive?
A drive is a computer device for reading data from or writing data into a
storage media, e.g. a tape or disk
(b) State any two types of computer drives, giving an example of a
storage device used by each
( 3 mks)
Hard disk drive (HDD) - Floppy Disk drive (FDD)
CD- ROM drive - DVD – ROM drive
Tape drive - Zip drive
USB port – for flash disk
20. (a) Give two reasons why there are many forms of computer
storage devices ( 2 mks)
- Permanency of storage
- Cost of implication
- Capacity of storage systems
(b) State three different examples of auxiliary storage devices
- Magnetic tape
- Floppy disk
- Cassette tapes
- Hard disk
- Zip disks
- Jazz disks
- Flash disks
- Video Compact Disk (VCD)
- Digital video Disks (DVD’s)
- Punched cards
- Optical discs (e.g., Compact Disks LS- 120 super disks, optical
card, optical tape)
21. Using examples, distinguished between:
(i) Primary and secondary (2
mks)
Primary storage devices are accessed directly by the CPU, while
secondary storage is not
(ii) Fixed and removable disks
Fixed disks are mounted inside the computer system unit, e.g. Hard disk.
Removable disks are not hosed inside the system unit & are portable, e.g.
floppy disk, Jazz disk, Zip disk, flash disk, CD- R, CD – RW, DVD
22. Explain the following storage devices
(i) Hard disk
A fixed storage device housed inside the Computer System Unit
(ii) Flash disk
A high capacity plug-in portable storage device. Usually attached at the USB
port of the computer
(iii) Zip disk
High capacity disk that resembles a floppy disk, but is slightly
larger and thicker in size
23. (a) Compare a floppy disk and zip disk in relation to size (2
mks)
A floppy disk is physically small in size and capacity, while a zip disk is
slightly large in size and has large storage capacity.
(b) Give three disadvantages of floppy disks as storage devices
- Floppy disks are slower than hard disks
- Highly affected by viruses
- Low storage capacity
- Not reliable
- Affected by environmental factors, exposure to sunlight,
magnetism and dirt
24. (a) State three advantages of using hard disks as medium of
storage
- They provide permanent storage of data
- They have a large storage capacity
- Are cheap per unit of storage
- Are rewritable (provide read & write facilities)
- Are very fast compared to other secondary storage devices in
terms of data transfer
(b) Describe three precautions you would take to avoid
damaging the hard disk ( 3mks)
- Do not drop the disk drive
- Do not expose it to strong heat
- Do not expose it to dust/ smoke particles
- Do not unprocedurally switch off the computer
(c) Describe the structure of a hard disk in reference to
cylinders, tracks and sectors
The surface of hard disk is divided into circles called Tracks. Parallel tracks
on several platters are called cylinders
The tracks are further subdivided into sectors. Several sectors can be
grouped to form clusters.
25. State two reasons why Magnetic tapes are not commonly used
as computer data storage medium today
- Are slow when retrieving data. This is because of the linear
storage of data o the tape.
- Do not fully use their recording surface due to inter- record Gaps
26. Differentiate between:
(i) Microcomputer and microprocessor
A microcomputer is a computer whose Central Processing Unit (CPU) has
been implemented with a microprocessor
A microprocessor is a small computer processor, mainly a combination of the
ALU & CU manufactured on a single chip.
(ii) Volatile memory and non- volatile memory
Volatile memory is temporary, while non- volatile memory is
permanent
(iii) RAM and ROM
RAM is a temporary and rewritable memory, while ROM is a permanent and
read only memory.
(iv) Hard disk and floppy disk
Hard disk is a hard metallic platter used to store data and is encased in a
metallic housing (casing)
Hard disk is metallic. Shinny and non- flexible
(v) Magnetic and optical storage media
In magnetic storage media, data is recorded using magnesium, while in
optical storage media data is recorded using a beam of light (laser)
(vi) Hardcopy and softcopy output
Hardcopy is printed copy, e.g. printout on paper such as letters while
softcopy is intangible information e.g. screen display or music.
(vii) MICR and OCR scanners
MICR uses magnetic technology to read magnetic characters, while OCR uses
laser/ light technology to read characters
27. Explain four rules for handling magnetic disks
- Keep magnetic away from excessive heat. This is because heat energy
weakens the ability of the magnetic media to store data.
- Store the media in their cases when not in use in order to protect/
safeguard their recording surfaces against environmental influences such as
dust, touch, direct sunlight, radiations, etc
- Do not drop the disk on the ground
- Never bring them near moving or strong magnetic bodies. Such bodies
might demagnetize the recording surfaces making recording in terms of
magnetism impossible
- When mounting the media into its reading/ writing unit, avoid brushing
the recording surfaces against the mechanical components of the drive
- Put on the power before mounting the media and off after removing
the media from the drive.
This is because; the fluctuation in power might cause demagnetization
28. (a) Calculate the capacity in MB of a two sided floppy disk with
6 sectors per surface, and 512 bytes per sectors
No. of sectors = (2 sides x 6 sectors)
= 12 sectors
If 1 sector = 512 bytes
(12 x 512) = 6,144 bytes
1,000,000 bytes 1 MB
6,144
1,000,000 = 0.006144 MB
(b) A double – sided disk contains 40 tracks on each side. The tracks
are divided into 9 sectors of 512 bytes each. What is the total
capacity of the disk in megabytes? ( 2mks)
Total tracks = (40 x 2) = 80
Total sectors = (80 x 9) = 720
Total bytes (720 x 512) = 368, 640 bytes
If 1 MB = 1,048, 576 bytes
? = 368, 640 bytes
368, 640
1,048, 576
= 0.352 MB
29. By giving examples, differentiate between primary and
Secondary Computer storage
( 3 mks)
Primary Memory Secondary Memory
1. Used for holding data & 1. Used for storing backup
instructions required information that is not
immediately by the CPU needed immediately by the
CPU.
2. It is accessed directly by
the CPU 2. It is not accessed directly by
the CPU
3. Provides fast access to
information is accurate & 3. Provides slow access of
reliable information
4. It is expensive per bit of 4. Secondary storage devices
memory dues to the are cheap
technology involved
5. it has high storage capacity
5. It has low/ limited storage
6. It is non- volatile i.e. stores
capacity
data permanently.
6. It is volatile & therefore it is
E.g. punched cards, magnetic
used to store temporary
tapes, floppy disks, hard disks, etc
programs & data
7. The speed of the processor
depends on the size & type
of primary storage
E.g. Read Only Memory (ROM) &
Random Access Memory (RAM)
30. (a) State four functions of Read – Only Memory (ROM)
It stores Firmware (bootstrap instructions) - the essential files the
computer uses while booting/ starting up.
It stores the system data & instructions that are necessary for
the normal functioning of the computer hardware e.g. the Kernel
/ supervisor of the OS
It stores translation programs (code converters) used for
converting a user’s program into machine language
It stores special functions (facilities) peculiar to a given machine
It stores character generators for printers & Video displays
It stores instructions used in special – purpose computers &
computerized fuel pumps
(b) Give three characteristics of ROM
It can only be read, but cannot be written to (i.e., the user can
only read the information in the ROM, but cannot write on it
unless it is a special type of ROM).
Provides permanent or semi-permanent storage of instructions &
data from the manufacturer.
It is nonvolatile memory
Forms a small proportion of the main storage (i.e. it contributes
30% of the internal Memory).
Stores essential files for starting the computer (Bootstrap
programs)
(c) Name two different types of ROM
- Masked ROM
- Programmable Read- Only Memory (PROM)
- Erasable Programmable Read- Only Memory (EPROM)
- Electrically Alterable Read- Only Memory (EAROM)
31. (a) Outline three characteristics of Random Access Memory
(RAM)
- Stores data & programs temporarily during the times when they are
needed in the Main Memory (or during execution).
- Provides “read & write facilities” i.e. it allows instructions to be written,
read out & to be changed at will.
- The contents in RAM are user – defined, i.e. the user dictates what is to
be contained in the RAM
- Its contents are temporary
- It is a volatile memory
- Forms the major proportion of main storage
(b) Name the two types of RAM clearly starting their differences
(3 mks)
(i) Static RAM
A static RAM can retain its data/ content as long as power is provided
to the memory chips, i.e. it does not need to be re- written periodically
(ii) Dynamic RAM
- Dynamic RAM can only hold its content for a short while even when
power is on.Therefore, in order to maintain its content/ data, a DRAM must
undergo the refreshing process (i.e. it must be re- written continually)
- Static RAM is much faster than Dynamic RAM
- SRAM chips are physically large & much more expensive than DRAM
chips
- Dynamic RAM has a much higher packing density than SRAM, i.e., a
DRAM chip is able to store more information than a SRAM chip of the same
size.
32. The diagram below shows as example of a secondary
(i) Identify the name of the devices
Flash Disk
(ii) List down two advantages of this device over a floppy
disk in storage ( 2 mks)
- Smaller in size than a floppy disk, hence, easily portable
- Has a high data storage capacity compared to a floppy disk
- Flash disks are more reliable than floppy disks
33. (a) List any four examples of optical storage devices
- Compact Disk Read – Only Memory (CD – ROM)
- Compact Disk Recordable (CD-R)
- Compact Disk Rewritable (CD-RW)
- LS- 120 super disk
- Digital Versatile Disk (DVD)
- Optical card
- Optical tape
(b) Give two advantages of a digital Versatile Disk over a
normal Compact disk
- DVD has a larger storage capacity than a CD (2
mks)
- A DVD offers better data storage quality
34. (a) State the two types/ forms of computer output
- Softcopy
- Hardcopy
(b) List any four examples of output devices in a computer
- Monitors
- Printers
- Sound output, e.g. speakers
- Audio response units
- Plotters
- Sound cards
- Digital projectors
- Computer output on microforms (COM)
- Storage devices
(b) Identify three Functions of computer devices
- Transmit the intermediate & final results to the users
- Convey messages e.g. error messages to the operators
- Provide immediate response to queries
- Convert the coded results produced by the computer to human-
readable form
35. (a) State one function of the screen (monitor)
- Used to display the results of all the data that has been
processed from the computer
- It converts machine- coded outputs results from the processor into a
form that can be understood by people
(b) Show two differences between a CRT monitor and a flat-
panel display
- CRT monitor uses a cathode ray tube to display information,
while a flat panel does
not.
- CRT has a protruding back, while a flat panel does not.
- Flat panel displays are light & easily portable, while CRT’s are
heavy
- CRT can display a wide range of colours, while a flat panel
displays a limited number of colours
- CRT consumes more electrical power than flat panel displays
- The screen of a flat panel is much thinner & smaller than that of
a CRT
- The screen resolution of a CRT is adjustable, while that of a flat
panel is often set
(c) Give there examples of flat- panel monitors available in the
market today
- Liquid crystal displays (LCD)
- Electro luminescent (EL)
- Gas plasma
- Thin Film Transistor (TFT)
36. (a) What are pixels?
Pixels (picture elements) are dots on the screen that form
characters and images
(b) What role do pixels play in screen display?
They determine the clarity of images on the screen
(c) Give two advantages of the higher number of pixels per
square centimeter (2 mks)
- Higher screen resolution
- Displays of sharp & clear images
- The screen is able to display a higher number of different images
37. (a) What are character printers?
(1 mk)
Are usually low- speed printers that print one character at a
time?
(b) Give two examples of character printers
- Dot matrix
- Thermal
- Daisy wheel
- Inkjet
- Golf ball
38. Distinguish between impact and non impact printers and give
two examples of each
Impact printers print by striking mechanism & are noisy, e.g Dot matrix,
Daisy wheel, and Golf Ball, drum and chain printer.
Non- impact printers print either by laser, ink or thermal transfer mechanism
& are silent, e.g. Laser, Inkjet, thermal printer, electrostatic and xerographic
39. (a) Distinguish between a line printer and a page printer
A page printer prints documents page by page, while a line printer prints
documents line by line
(b) State three advantages and one disadvantages of:
(i) Laser Printers
Advantages - Cheap running cost
- Produces high quality of printouts
- Has a very high speed of printing ( it is fast)
- Economical in maintenance
- It is very silent
Disadvantages - Expensive to purchase & maintain
- Involves expensive multiply colour printing
(ii) Inkjet Printers
Advantages - Cheap to purchase
- Cheaper multiple colour printing
- Produces high quality prints
Disadvantage - Expensive to run (i.e. to buy cartridges)
- Produces a water based print which fades easily
40. Highlight four factors one should consider when purchasing a
printer (4 mks)
- Cost involved i.e. the printer’s buying price, cost of maintenance &
cost of consumable items like printing papers, ribbons/ cartridges
- Volume of printing expected ( speed of the printer)
- Quality of printing e.g. ability to print graphics & colour
- Capability of the selected printer, i.e. multiple copy production, paper
size, etc
- Compatibility with other computers
- Environment in which the printer will operate
- Ease of maintenance
- Reliability of the printer
- Application it is required for (i.e. purpose/ use of the printer)
- Type of paper used by the printer
- Documentation
- Availability
41. List three advantages of a plotter over normal printer
machines
- Plotters produce information in an easily understandable form
- Their presentation is quick & reliable
- Produces large graphical designs of high quality, which are east
to read & use
- Can print on large sized papers, e.g. papers e.g. Al, Which a
normal printer cannot
42. Give two advantages of using sound output devices
- Very fast making it useful in emergency situations
- One can receive the output even when a few meters away from
the computer
- No reading ability is required of the user
- Suitable for the blind and people with poor sight
- Can be used for distant communication if done over telephone
lines
- Errors are easily corrected, e.g. if used in a camera, one know when
the film or exposure is set wrongly.
- Makes computing interesting and entertaining
43. George connected new multimedia speakers to his computer
and tried to play his favorite music CD, but no sound came out.
Suggest two problems that might have occurred ( 2 mks)
- Volume control was too low
- Loose or improper connection to the sound card
- Speakers not powered
- Multimedia not supported
- Lack of analogue cable connecting the optical drive to the
motherboard or sound card
- Sound card drivers not installed
44. List down 4 factors to consider when buying an output device
- The volume of the data
- The speed at which the output is required
- Cost of the method chosen as compared with the benefits to be
derived
- Suitability of the application
- Whether a printed version is required
45. Define the following terms
(a) Port
A special kind of socket found at the back of a computer used to connect an
external peripheral device such as a printer, monitor, mouse, scanner,
modem, flash disk, etc to the interface cards inside the computer
(b) Data interface cable
These are special cables that connect all the peripheral devices to the
motherboard and the CPU. They transmit data signals and information to and
from the devices
(c) Power cable
Cable for power supply to devices
46. State the function of the power supply unit found in the
system unit (1 mk)
- It supplies stable power to the motherboard and other internal
devices of a computer
- Converts the potentially dangerous alternating current (AC) into a
steady low- voltage direct current (DC) usable by the computer.
47. (a) Name any two peripheral devices which get their power
supply through ports
- Keyboard
- Mouse
(b) State the type of port that would commonly be used to
connect the following devices
(i) Mouse - PS/2, Serial, or USB
(ii) Modem - Serial
(iii) External CD drive - Parallel
48. (a) Explain two differences between serial and parallel
communication ports of a computer
- Serial ports have 9 pins, while parallel ports have holes for 9 or
25 pins
- Parallel cables transmit several bits of data simultaneously, while
serial cables transmit
One bit at a time
- Serial cables are slower than parallel cable
- Serial cables allow for 2 ways communication (i.e. communication to
and from the computer and the device connected to it) while parallel cables
usually offer 1- way communication.
(b) Give two major advantages of a USB interface cable over other
cables in the computer
- It is light & convenient to carry
- It provides faster transmission of high – quality data
- Its serial nature enables it to connect devices a longer distance away
- The USB port can be used to connect a wide range of peripheral
devices due to its common universal interface
49. Outline three precautions one should take when assembling a
computer
- Disconnect all diverts from the power source before starting to
work on them
- Never work alone because you may need help in ease of energy
- Discharge ant static electricity that might have built up on the hands
by touching an earthed metallic object and wearing an anti- static wrist
member.
50. State six factors which you would consider when selecting
computer hardware for an organization
- Cost of the system
- Processor type and speed
- Storage capacity of hard disk & RAM memory size
- Warranty (service contract)
- Upgradeability of the computer
- Compatibility of the system
- Portability (light to carry)
- User needs
- Popularity of the hardware manufacturer
- Availability of spare parts
- Multimedia capability
51. List down any four hardware components you can add or
upgrade in a computer system
(4 mks)
- Processor (CPU)
- Ports e.g. USB ports/ SCSI ports
- Hard disk
- DVD drives/ tape drives
- RAM memory
- Expansion slots
52. (a) What is warranty with reference to the purchase of
computers
A warranty is an agreement between the buyer and the seller that spells out
terms and conditions of after selling a product in case of failure or
malfunction.
A warranty is usually the duration in which your computer is supposed to
work without any problem.
(b) Why is it important to carefully study a warranty before
committing yourself by signing it?
In order to negotiate on sensitive items like duration, after sales
services etc.
(c) List down three issues to understand about warrants
- Duration (scope of cover)
- How comprehensive is the warranty- good warranty should cover
all the parts of the Computer.
- Liability agreement e.g. how long should the supplier take to repair a
fault or replace the product, and if he/ she delays, who bears the cost.
- Does the warranty offer online support?
- Regularity of service or maintenance
53. What are clones with reference to computers and what is their
disadvantage?
- Clones are locally assembled computers
Disadvantages
- Their components are not optimized to work with each other
- They are not as reliable as their brand names like IBM, Compaq,
Hewlett Packard (HP), Dell, Gateway etc.
(i) What is in- house developed software?
These are programs that are uniquely designed & written by the user or a
software house under contract, to meet the specific needs of a particular
user or organization.
They are usually customized (tailored) to perform a specific job or solve only
specific processing tasks in one organization
(ii) Give two reasons that may be influencing these
organizations for such a decision ( 2 mks)
- The user gets well tested program, which he/ she is able to use
with confidence
- The program provides all the facilities required to solve a
particular problem
- The purchaser has direct control over the package, as he/ she is
involved in its
Production
- The user is able to quickly implement the results obtained from
the use of the package
- They can easily be modified to meet specific user’s needs without
involving expert programmers.
55. Differentiate between single- purpose programs and
integrated software
- Single – purpose software is developed for only one purpose, while
integrated software is a suite of more than one program and can be used to
carry out a variety of tasks
56. Explain the following considerations when purchasing software
( 2 mks)
(i) Authenticity
It is the genuineness, validity or legitimacy of software. The copy of the
software you buy should be accompanied by the license and certificate of
authenticity of the developer.
(ii) Portability
It refers to whether a program can be copied or installed in more than one
computer
57. Differentiate between portability with reference to hardware
and software
In hardware, the computer device should be sufficiently small &
light to carry
In software, portability refers to whether a program can be copied from one
computer to another or installed in more than one computer.
58. (a) Explain why documentation is necessary for any software
package
It contains details on how to install use and maintain the software. It also
shows the purchaser how the program can be used to solve particular
problem as well as provide the user with assistance on using the program.
(b) A firm intends to purchase new software. List three items of
documentation that should accompany the software
- A license
- Installation guide
- User manual (guide)
- Reference manual
- Warranty
- Upgrades
- Service pack
CHAPTER THREE
OPERATING SYSTEM
Specific Objectives
By the end of the topic the learner should be able to:
a) Define an operating system;
b) State the functions of an operating system;
c) Describe types of operating systems;
d) Describe how operating systems organize information;
e) Manage files using an operating system;
f) Manage disks using an operating system;
g) Identify internal and peripheral devices under Operating System control.
Content
a.) Definition of an operating system
b.) Functions of an operating system
• Job scheduling
• Resource control
• Input/output handling
• Memory management
• Error handling
• Interrupt handling
c.) Types of Operating Systems
• Number of users
i) single user
ii) multi user
• Number of tasks
i) single tasking
ii) multi tasking
• Interface
i) command line
ii) menu driven interface
iii) Graphical user interface (GUI)
d.) Organization of Information using an operating system
• Files
• Directories/folders
• Storage media
e.) File management using an operating system
• Description of files
• Types of files
i) System files
ii) Application files
• Functions of files
i) storage of data
ii) organization of information
• Creating files
• Manipulating files
i) Viewing files and directories
ii) Organization of information
iii) Creating files/directories
iv) Opening
v) Editing
vi) Renaming
vii) finding/searching
viii) sorting
ix) Copying
x) Moving
xi) Deleting
f.) Disk Management using an operating system
• Formatting
• Partitioning
• Defragmentation
• Disk diagnostics/Disk compression
• Back up
g.) Devices under operating system control
• Processor
• Memory (Ram)
• Storage devices
• Input/output devices and ports
• Communication devices and ports
h.) Installation and configuration of an operating system
• Trouble shooting
Application packages
a.) Word processors
b.) Spreadsheet
c.) Database
d.) Desktop publishing
e.) Internet and E-Mail
Introduction
Definition of Operating System
A set of complex programs that work together to control execution of
user programs called applications.
Examples:
MS Windows, UNIX, LINUX, Macintosh (Mac OS) and OS/2.
Functions of an operating system software
(i) Memory allocation & loading of programs
- Loads application programs from an external storage into the available
locations in the Main memory (RAM)
- It keeps track (monitors) of the parts of the memory that are in use,
and those which are free
(ii) Processor management:
The processor can only execute one program at any one time. Therefore, in a
multi- tasking system access to the CPU must be carefully control &
monitored. The OS must decide, which program will be allowed into the
system, and for how long
(iii) Job scheduling
It schedules & loads programs in order to provide a continuous sequence of
processing. This is necessary when more than one application program is
occupying the main storage
(iv) Error reporting and interrupt handling
The OS reports any errors that occur during program execution.
(v) Management of CPU time
In a multi- taking system where several user programs share the
computer resources, the processing is done according to the job priorities
allocated and in a continuous process until all the jobs in the queue within
the memory are executed. This ensures that the CPU does not remain idle at
any given time.
(vi) Manages the input and output devices
The OS controls the allocation of I/O devices and tries to resolve any conflicts
that arise. It also monitors the state of each I/O device and signals any faults
detected
(vii) File management
OS is concerned with the logical organization of the files in the computer &
provides ways for sorting, retrieving & sharing of the files
It also provides a means of protecting the data files & programs against
unauthorized access and corruption.
It controls the selection & operation of the hardware devices used for input,
output & storage
It interfaces the user to the system’s hardware, i.e. it provides a quick means
of communication between the computer user and his programs
(viii) Logging & accounting
The OS keeps records (internal logs) on how the computer resources (e.g.
CPU time, memory, peripherals) are being used
It also keeps a complete record of all what happens during processing
(usually in the form of a printed log)
Resources under the Operating System
Processor: The operating system arranges all tasks accordingly to
prioritize and decides which task to continue and which task to stop.
Main memory: The operating system determines which task to
remain in memory for execution and what to send back to backing
storage to wait.
Input Output devices and ports: It controls the input of the
data and output of information.
Secondary storage device: The operating system manages the
storage (saving) and the retrieval of data and information in storage
devices. It utilizes hard disk space by holding task not needed
currently by the RAM.
Communication devices and ports: Operating system controls the
exchange of data and information.
Types of Operating System
Classification according to task handled currently
1. Single program operating system: It allows processing of only one
program at a time like the Microsoft Disk Operating System (MS DOS)
2. Multitasking operating system: It allows a single CPU to
execute more than one program at a time
Classification according to number of user
1. Single user operating system: Can only be used by one application
at a time e.g. Windos95/98, MS DOS.
2. Multi-user/ multi-access operating system: can be used by more
than one use at a time e.g. UNIX, LINUX, Windows
NT/2000/XP/VISTA, and Novell.
Human Computer Interface (HCI)
This is a method of interaction between the user and the computer.
1. Command line interface: The user interacts with the computer by
typing the command in the command prompt then pressing the enter
key for execution.
2. Menu driven interface: They give the use a list of options to select
from
3. Graphical user interface: It represents commands in form of graphics
or icons.
Operating System Consideration
1. Hardware configuration: memory size, hard disk c apacity and the
processor type.
2. Basic design of the computer
3. User friendliness and the human computer interface (HCI)
4. Availability in the market
5. Cost
6. Reliability: can it run without crashing/ hanging i.e. stop responding
to commands
Common features in Windows Operating System
Similar interface/ interaction
Long file name
Plug n play (PnP) windows automatically accept a new hardware once
installed
Support multi-tasking and multi-user
Factors that dictate how an operating system organizes
information
Rapid access: organization method should allow quick
access to stored data.
Ease of update: by keeping a record of the
date modified.
Economy of storage: should use the least storage possible because
memory is a scarce resource.
Simplicity of maintenance: organization method should enable quick
navigation through the file system and make it easy for it to be
maintained.
Reliability: organization method must be
reliable.
Properties operating system display about a file
Capacity
Location
Extension
Date
Two types of Windows
1. Application Window: Screen that appears when an application
program is opened.
2. Document window: this represents the work area
File
Common storage unit in a computer where
Types of files
System files: files that contain information required for the operation
of the computer
Application files: Files that hold programs or start an application.
File
Extensions
Importance
Examples
DAT- data
TXT- text
DOC- document
XLS- excel
SYS- system files
COM- command file
BAK- back up
PPT- PowerPoint
BAT- batch file
Folder/ directory: A named storage area created for storing files for
easy access.
Subfolder: divided folder
Windows desktop: This is the first screen after successful booting.
Desktop Elements
Icons: This is the graphical/ pictorial representation of items.
Taskbar: It allows the user to switch between different
files and programs. Start button: It displays the start
menu.
Task manager: Display buttons of the current running tasks.
System tray: Has icons of tasks running in the background but not
displayed on the screen.
Parts of an application window
Title bar: Display name of current application
program or task. Minimize button: Reduces a
window to a button on the taskbar.
Restore/ maximize: It stretches a window to cover the entire screen or
return to the original screen. Close button: Exits the document but not
the application.
Menu bar: provides a list of commands
inform of buttons. Toolbar: represents
shortcuts to menu commands.
Work area/ document window: Where data is being entered.
Disk management
Formatting: Preparing a disk for use by imprinting tracks and sectors.
Scanning: -scanning for virus
-scanning for errors: SCANDISK: Check up for minor storage problems e.g.
lost storage location or damaged surface
Defragmenting: Re-arranging scattered folders to speed up access and
retrieval.
Compressing: Squeezing disk contents to free space on the media.
Backing up data: Creating duplicate copies of data on separate storage
device for security purposes.
Boot up (start-up)/ system disk: System disk created to start the system in
case the components of starting up fail or when the hard disk is seriously
damaged. The booting instructions are copied on the disk.
Portioning: Subdividing a large physical disk into two or more partions
called logical drives. Reasons for disk partioning:
When user intends to install more than one operating system on the same
disk.
For back up purposes
Troubleshooting Windows Related Problems
This is a process of diagnosis and trying to fix hardware or software
related problems.
Some problems Windows experience
Failure to boot
Computer hanging now and then
Abnormal restart
These problems may result from
1. Problem in installing process missing files
2. Insufficient system memory
3. Problems with hard disk boot sector may be due to virus infection
4. Corrupted window registry system
5. Due to interrupt request conflicts
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. The central processor and peripheral devices of a computer
system are coordinated by the operating system
(a) Define the term ‘operating system’
A set of computer programs that normally reside in the main memory
and used to control the basic computer hardware resources & the
operation of the entire system
The main program that controls the execution of user applications, and
enables the user to access the hardware & software resources of the
computer
(b) List two resources/ components that an operating system manages
- Processor
- Memory (RAM)
- Secondary storage devices
- Input/ output devices
- Communication devices
- I/O & communication ports
- Files
(c) There are several types of operating systems in use today. State two
examples of
Operating systems which you are familiar (2
mks)
- Disk Operating System (DOS)
- Windows
- MacOS
- Unix
- Linux
2. Name the two latest operating systems from Microsoft
corporation(2 mks)
- Windows XP
- Windows Vista
3. Explain any four functions of an operating system software ( 8
mks)
(i) Memory allocation & loading of programs
- Loads application programs from an external storage into the available
locations in the Main memory (RAM)
- It keeps track (monitors) of the parts of the memory that are in use, and
those which are free
(ii) Processor management:
The processor can only execute one program at any one time. Therefore, in a multi-
tasking system access to the CPU must be carefully control & monitored. The OS
must decide, which program will be allowed into the system, and for how long
(iii) Job scheduling- it schedules & loads programs in order to provide a
continuous sequence of processing. This is necessary when more than one
application program is occupying the main storage
(iv) Error reporting and interrupt handling- The OS reports any errors that
occur during program execution.
(v) Management of CPU time:
In a multi- taking system where several user programs share the computer
resources, the processing is done according to the job priorities allocated and in a
continuous process until all the jobs in the queue within the memory are executed.
This ensures that the CPU does not remain idle at any given time.
(ix) Manages the input and output devices
The OS controls the allocation of I/O devices and tries to resolve any conflicts that
arise. It also monitors the state of each I/O device and signals any faults detected
(x) File management
OS is concerned with the logical organization of the files in the computer & provides
ways for sorting, retrieving & sharing of the files
It also provides a means of protecting the data files & programs against
unauthorized access and corruption.
(xi) It controls the selection & operation of the hardware devices used for
input, output & storage
(xii) It interfaces the user to the system’s hardware, i.e. it provides a quick
means of communication between the computer user and his
programs
(xiii) Logging & accounting
The OS keeps records (internal logs) on how the computer resources (e.g. CPU time,
memory, peripherals) are being used
It also keeps a complete record of all what happens during processing (usually in
the form of a printed log)
4. What is an interrupt?
An interrupt is break from the normal sequential flow of instructions processing in a
program
5. Give three ways in which operating system are classified
(3 mks)
The number of users they handle
The number of tasks they execute concurrently
Human computer interface
6. Giving an example in each case, explain the following types of
operating systems
(a) Single – user / single tasking
A system that allows only one user to run one user program at a time in an
interactive, conversational mode. E.g. Ms- DOS, PC- DOS.
(b) Multi- User/ Multi- tasking
A multi- user computer system can allow interactive facilities to several at a time. A
Multi- tasking Computer system can allow more than one program which are in the
memory to be processed at the same time. E.g. Microsoft Windows, Linux.
7. A computer user may interact with a computer either through
Graphical User Interface (GUI) or though typed commands
(a) Give one advantage of using GUI based operating system over a command
line interface
( 1 mk)
User friendliness
Easy to learn & use even by those who do not have much knowledge
about them
One does not need to master any commands
It is faster to work with than a command line interface as it only relies
on clicking the icons by use of a pointing device
(b) Some computer systems still use command line interfaces. State two
advantages of command line interface
- They are more flexible than menu- driven interfaces
- There is security of data as only those who know how to use the commands
will access it.
- They use cheap hardware & software facilities
- One has a better control over the system resources
8. What is a deadlock in reference to operating systems?
- It is a situation in an OS when a particular task holds a needed resource and
refuses to release it for use by other tasks
9. Explain briefly the following concepts as used in the windows
environment:
(a) Desktop
Desktop is mostly an empty screen that appears when windows starts and has
some standard icons that show that the computer is ready for use.
(b) Window
A rectangular area on a computer screen in which text, graphical images or the
contents of a folder or disk may be displaced
(c) Icon
A little picture on the computer screen representing a program, disk file folder or
any other item
(d) Sidekick menu
A submenu that appears either on the right or left of a main menu
(e) Taskbar
A long bar/ strip that runs across the desktop and displays the start button and any
other active tasks.
(f) Task
Any activity taking place in windows and is displayed on the taskbar, e.g. running
program (3 mks)
10. Identify three functions of taskbar
Indicates what programs are running
Holds minimized programs
Provides a shortcut menu for arranging programs
11. State two differences between Disk Operating System (DOS) and
Windows operating system
( 2 mks)
DOS Windows
(i) Single - tasking (i) Multi- tasking
(ii) Single- user (ii) Multi- user
(iii) Command driven interface (iii) Graphical User Interface
(iv) Not easy to use (iv) User friendly
12. Identify three factors you would consider when choosing an
operating system for use in a computer
( 3 mks)
(i) Hardware configuration of the computer, e.g. RAM memory size, Hard disk
capacity, type of processor, etc
(ii) Basic design of the computer – It is an IBM compatible, or apple computer?
(iii) Hardware compatibility
(iv) User (type of work to be done), i.e. the applications intended for the
computer
(v) User friendliness or human computer interface, i.e. it is command line based,
Menu driven or graphical user interface?
(vi) Availability in the Markey, e.g. Microsoft Windows based operating systems
are very common
(vii) Portability
(viii) Cost- how expensive the OS is
(ix) Reliability, i.e. can it run without crashing (stop responding to commands)?
(x) The method of communicating with the computer, e.g. the number of
peripherals
(xi) The method of operating the computer
13. Explain how windows organizes information in reference to files
and folders
It stores related data & information records into files, and related files into folders &
subfolders
14. (a) Distinguish between systems files and application files
( 2 mks)
System files hold critical system information while application files hold programs
data
(b) State the extensions used signifying the following file types (2
mks)
(i) Driver or system file - DLL, SYS, INI
(ii) Batch file – BAT
15. (a) List and explain down the three parts of the windows Taskbar
( 3 mks)
Start button - Provides access to the start menu
Task Manager - Displays buttons of currently running tasks
System tray - displays icons of applications that automatically start
and run in the background
(b) Outline the procedure of renaming a file or folder using windows
operating system
(3 mks)
Method 1:
In an explorer window, click the file/ folder you want to rename
Click on file, choose rename
Type the new name, then press enter
Method 2:
In an explorer window, right- click the file/ folder you want to rename
Choose Rename from the shortcut menu that appears
Type the new name, then press Enter
16. (a) What is a dialog box?
Window that appears temporarily to request or supply information. It contains
options (settings) one must select to complete a task
(b) List five settings that may be found in a dialog box
Textbox- a box you can type data in
List box – a box that contains a list of options, one of which is selected
Checkbox- a small, square box that can be selected or cleared. It
appears with an option that you can turn on or off. When the checkbox
is selected, a selected, a checkbox ( or )appears in the box
Radio button – a round button that can either be blank or can contain a
dot. If the button contains a dot, it is selected.
Pull down menu – A box with a downward – pointing triangular button
at its right end (). When the triangular button is clicked, it displays a
menu.
Command button- A button that can click to carry out or cancel the
selected action. E.g. the OK or cancel button.
17. (a) Define ‘ folder/ directive tree’
Directory tree is the hierarchical arrangement of folders and storage locations from
the root downwards.
(b) Give two examples of root directories you know (1
mk)
- A:\
- C:\
- D:\
- E:\
(c) Give three uses of sub- directories or subfolders (3
mks)
- Used to store files that are not required currently until they are needed again
- Used to store the files of one program separately from the files of another
program
- It allows each user to keep his/ her files separately, even if all the users are
using the same systems.
18. The Hierarchical system represented below shows how a school
organizes its files. Study it and answer the questions below.
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write
down the path of accessing the Districts. xls file.
A:\SCHOOL\EXAMS\F2\Districts.xls (2 mks)
19. (a) (i) Explain the meaning of backup (2
mks)
It means making of duplicate copies of data or programs from the hard disk into
storage media so that in case the system fails, or originals are corrupted or lost, the
data can be reconstructed from the backups.
This is used to protect data from accidental erasure or hardware problems
(ii) Explain two methods you can use in windows to back up data into a
storage device
(2 mks)
- Using copy and paste commands on the Edit Menu
- Using the send to command on the file menu
- Using the backup facility to compress the data into another disk
1. (b) List and explain down the three parts of the windows Taskbar
( 3 mks)
- To know the amount of data that can be stored in the hard disk
- To know how much space is left in the hard disk in case a new programs
needs to be installed
- To detect the likelihood of a virus infection
2. Name the command one would use to repair cross- linked files in
graphical user interface software
( 1mk)
Scandisk
3. (a) Explain the team Disk Defragmenter, and give two
advantages of this feature ( 3 mks)
Disk defragmenter is a tool that is used to re- arrange scattered files & folders on a
storage media
Advantages
- Rearranges scattered folders & files on storage media
- Reduces the time by the read / write head to locate files or folders on the
storage media this speed up access to files & folders, hence, makes files to open
more quickly
- Consolidates related data close to each other, hence, frees space on the
storage media
(b) Distinguish between disk compressing and disk defragmenting
Compressing is creating more space on a disk by squeezing disk contents (files) into
a smaller storage location on the disk.
Defragmenting is rearranging scattered related files/ folders closer to each other on
the surface of a storage unit.
22. Give two reasons why a new disk must be formatted before using it
(2 mks)
- To prepare a new disk so that files can be stored on it
- To create sectors & tracks for the storage of data
- To create/ prepare a new root directory and file allocation tables on the disk
- To remove/ delete any existing files or information stored on the disk, if it is
no longer needed
- To determine the effective storage capacity of the disk, i.e. formatting
enables the user to know how much data the disk can hold.
- It can also check for bad sectors on the new disk.
23. (a) What is meant by the term ‘disk partitioning’?
It is the process of dividing a large physical disk into 2 or more
partitions/ volume
(b) Give two reasons why the hard disk may be partitioned
- To install more than one operating systems on the same disk
- For the purposes of backup on the same disk, so that if one partition fails the
other will still be working.
24. A Form four computer student is attempting to print a programming
documentation. The printer is not responding to the print command.
Explain three possible causes for the anomaly. (3 marks)
- The printer may not be installed.
- The printer may not have been set as the default printer.
- The data interface cable to the printer could be loose. Make sure it is firm at
the ports.
- The printer could still be off. Switch it on, and it will start printing.
- The wrong printer could have been selected. Select the right printer in the
print dialog box and send the print job again.
25. State two purposes of the recycle bin. (2 marks)
- Contains the files and folders that have been deleted.
- Can be used to restore files & folders accidentally deleted from the computer.
CHAPTER FOUR
APPLICATION PACKAGES
Application packages include the following:
Word processors
Spreadsheet
Database
Desktop publishing
Internet and E-Mail
WORD PROCESSORS
Specific Objectives
By the end of the topic the learner should be able to know:
a) Define a word processor;
b) State the purpose of word processing;
c) Use a word processing package;
d) Format and edit a document;
e) Create and edit a table;
f) Create and update a mail-merge document;
g) Print a document;
h) Insert and edit objects.
Content
a.) definition of a word-processor
b.) Purpose of word processing eg
• Letter preparation
• Reports
• Newsletters
c.) Using a Word processing package
• Getting started
• Screen layout
• Running the program
i. Creating a document
ii. Saving
iii. Retrieving
iv. Closing
v. Exiting
d.) Editing and formatting a document
• Editing a document
• Block options
i. Selecting
ii. Moving
iii. Copying
iv. Deleting
v. Inserting and type over
• Find and replace
i. Search/find
ii. Replace
• Proof-reading
i. Spelling and grammar checking
ii. Thesaurus
iii. Auto-correct
iv. Undo and redo
• Formatting a document
a) Text formatting
i) Bolding
ii) Italizing
iii) Underlining
iv) Fonts
v) Drop caps
vi) Change case
vii) Superscript/subscript
b) Paragraph formatting
i) alignment
ii) indenting
iii) spacing
iv) section breaks
v) bullets and numbering
c) Page formatting
Layout
i) columns
ii) headers/footers
Setup
i) Margins
ii) Orientations
iii) Paper size
iv) Tabs
Creating and Editing a Table
• Create a table
i) Rows
ii) Columns
• Enter data
• Editing tables
i) Resizing rows/columns
ii) Inserting rows/columns
iii) Deleting rows/columns
iv) Merging rows/columns
v) Splitting rows/columns
• Formatting tables
i) Borders
ii) shading
• Table conversions
i) Converting text to table
ii) Converting table to text
iii) Importing
• Arithmetic calculations
i) Perform calculation
ii) Insert formulae
• Sorting
e.) Sorting creating and updating a mail merge document
• Creating main document
i) Form letters
ii) Labels
iii) envelopes
• create/import data source
i) editing
ii) saving
• Merging Fields
• Main and data source to
i) Printer or
ii) New window or
iii) Fax or
iv) E-mail
• Updating merged document
f.) Printing a document
i) Printer setup
ii) Print preview
iii) Print option
- printer selection
- orientation
- page and copies
iv) Printing
g.) Inserting Graphics
• Types of graphics
i) Drawing
ii) Pictures
iii) Charts
• Inserting
i) importing
ii) drawing
• Editing graphical objects
i) Updating
ii) Resizing
iii) Enhance
Introduction
Definition
This is the creation of long document, reports, memos etc.
Main types of Word Processors
1. Dedicated: This word processor is the only program in the computer.
2. Non-dedicated: the word processor is among other programs installed
in that computer.
Terms in Word Processing
Word wrap: This is the way the word processor detects whether the last
word on a certain line will fit if not the whole word is pushed to the
beginning of the next line.
Hyphenation: The way the word processor detects if the last word on a
certain line will fit if not it adds hyphenation after the first words then
part of word in argument is pushed at the beginning of the next line.
Justification: Position of line according to the centre of the page, left
and the right margin. There are for ways
Full: All lines in a paragraph start at the same point and end at the
same point.
Left: All lines in a paragraph start at the same point but end at
different point.
Right: All lines in a paragraph start at different points but end at
the same point.
Centre: All lines in a paragraph are centered along the page.
Indentation: Way lines(s) start and end from the normal starting or
ending point by the use of Tab key indent tools from format command
in the main menu. Ways of indenting;
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Indenting from both margins
Bolding: Increasing the intensity of text such that when printed it
appears darker than normal text.
Blocking: Separating part of text by highlighting so that any issued
command affects the highlighted text.
Orphan: The last line in the last paragraph of a page that becomes the
first line on the next page after the first page is filled up.
Widow: First line in the last paragraph of a page that becomes the
last line on that page while the other part is moved to the next page
after the first page is filled up.
Superscript: Character above the normal typing line.
Subscript: Character below the normal typing line.
Header: Text/ message appearing on top of each page of a document.
Footer: Text/ message appearing at the bottom of each page of a
document.
Pagination: Default page numbering that the word processor provides.
Repagination: Situation where the default page numbering is altered by
the user.
Softcopy: Document that is in computer memory or the screen where
changes are applicable.
Hardcopy: Document that is already printed.
Soft return: Situation where the cursor automatically moves to the next
line before it reaches the end of the current line.
Hard return: Situation where the user forces the cursor to move to the
beginning of the next new line by pressing the enter key on the keyboard
before it reaches the end of the current line.
Soft page: Automatic page ending as per the settings that comes when one
page is filled up.
Hard page: Forced page ending before the current page is filled up.
Continuous stationery: Situation where the printer uses rolls of papers
therefore one does not need to keep on inserting a paper after the other.
Preprinted stationery: One needs to insert a paper after the other is
printed.
Toggle switch: How word processor behaves depending whether certain
keys are on or off like Insert and the Caps Lock keys.
Margin: Blank space around the edges of a page.
Boarder: Printable edges around the page.
Paper Orientation
Portrait
Landscape
Difference between Elements and Features Features:
Inbuilt facilities that can be activated on text.
Elements: Physical components that can be
viewed on the screen.
Features of a word processor
1. Enables one to create a file and save it again for retrieval, editing and
formatting.
2. Have spell checker, thesaurus and grammar checkers.
3. Provides headers and footers, indexing, footnotes
4. Ability to create and import text and graphics from other applications
Advantages of Word Processor
1. It is faster to create a document because of the availability of facilities
like formatting and editing features.
2. Enables the users to proofread and spell check the document on the
screen before printing.
3. It allows multiple copies printing unlike the typewriters.
4. Enables the user to store the document for future editing/ reference if
need be.
5. Has a superior document formatting features.
Mail merging Document
The process of generating personalized letters or documents by
combing a main document with an existing document. Files involved
in mail merging:
1. Primary file: Contains data that is to appear on all the letters after
combining.
2. Secondary file: Content to appear in all the letters.
3. Merged file: Combined primary and secondary document.
Ways of Mail Merging
Previewing merged document
Merging to a printer
Merging to a new document
Sending merged document via email or fax
Editing a Document
Deleting text
There are many ways to accomplish this operation
highlighting the text then right click the highlighted text and
choose delete or press delete key.
Backspace Key: Deletes text on the left side of the cursor position.
Delete key: Deletes text on the right side of the cursor position.
Find and replace: Fast way to search for a word in the document and
if necessary replacing it with another word.
Spelling and grammar: Press F7 or go to Spell checker to correct
wrongly spelled words and incorrect grammar
Thesaurus: Used to search for words with similar meaning (synonyms) or
with opposite meaning (antonyms).
Autocorrect and autotext: Autocorrect automatically corrects
wrongly spelled word during data entry while autotext completes words
when the user types in the first letters of a word.
Undo and Redo: Undo (CTRL+Z) automatically cancels the last action
done by the user while
Redo (CTRL+Y) automatically reverses the last command or action
undone by the user.
Formatting Document
Text Formatting
Changing the font type, size and colour
Changing the case
Uppercase: automatically changes the highlighted text into capital
letters.
Lowercase: automatically changes the highlighted text into small
letters.
Sentence case: automatically makes the fast letter of a sentence
to a capital letter.
Toggle case: automatically changes capitalized letters to small
letters and vice versa.
Superscript and subscript
Press (CTRL+SHIFT++) for superscript option or (CTRL+=) for subscript
option.
Paragraph Formatting
Alignment or Justification
Full: All lines in a paragraph start at the same point and end at the
same point.
Left: All lines in a paragraph start at the same point but end at
different point.
Right: All lines in a paragraph start at different points but end at
the same point.
Centres: All lines in a paragraph are centered along the page.
Line spacing
Tab setting and Indents
Indenting a paragraph from the left margin
Indenting the first line of a paragraph from the left margin
Hanging indent
Indenting a paragraph from the right margin
Indenting from both margins
Drop cap
Formatting the first letter of a paragraph to appear bigger and
occupy several lines. Bullet and numbering column page and
column breaks.
The Word 2013 program window, displaying a document and the standard
program window elements.
The title bar of a program window for an existing document.
The ribbon, showing the Home tab.
The Backstage view, where you can manage files and customize the
program.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. a) What is a word Processor? (1 mk)
A computer program that enables a person to create, retrieve, edit, format,
and print text based documents
b) List two common examples of word processing software widely
used in the market today.
(2 mks)
-Microsoft word
-WordPerfect
-Lotus WordPerfect
-WordStar
-WordPad
2. Give three comparisons of the traditional method of typing a
document on a
Typewriter against using a word processor
(6mks)
Correcting typing mistakes using a word processor is easy; it is
hard to correct mistakes on a typewriter.
Producing multiple copies of the same page is possible using a
word processor, but it is not possible to produce multiple copies
on a typewriter.
Text formatting features are available on a word processor, e.g.
front size, font type, font colour, boldfacing, italicization, etc.
The documents created can be stored in the computer for future
reference
Typing using a word processor is easier & more efficient because
most of the actions are automatic. For example; the word wrap
feature automatically takes the text cursor to the beginning of
the next line once it reaches the end of the current line.
A new page is automatically inserted after reaching the end of
the current page
Graphics can be added within documents using a word processor
Grammar& spelling mistakes can be checked & a text-editing
tool that provides alternative words with similar meanings.
A word processor allows mail merging, which makes it possible to
produce similar letters and sent them to several people.
3. a) What is a template? (1mk)
It is a document that acts as a blue print or outline for other documents of
the same type. It contains the standard text, graphics and formatting for
use in all documents of this type.
b) State two advantages of using a template to create a
document.
(2mks)
- It helps save time and makes creating of new documents easy
- It ensures that there is consistency between the documents being
created.
4. Explain the difference between overtypes and insert mode in
word processing
(2mks)
Type over deletes the current text at cursor position and inserts
new text.
Inserting pushes the old text away as new text is inserted at cursor
position.
5. Veronica tried to retrieve a document file following all the
steps correctly. The filename did not appear in file list box. State
three causes for this.
(3mks)
- The file may not have been saved
- The file may have been deleted
- The file may be located in a different folder from the one she was
trying to
retrieve from (or may have been moved).
- The file may have been destroyed by a computer virus.
6. Mwikali selected a paragraph in word processing. Explain what
happened after pressing the following keys on the keyboard:
(3mks)
i) CTRL + B -Changes the paragraph to bold/removes bold from
paragraph
ii) CTRL +A -the whole document is selected
iii) CTRL+ U -the selected text is underlined/removes underline from
the
selected text.
7. Precisely explain the role of the following editing features of a
word processor;
(3mks)
i) Find and replace -To find words that you want replaced by
others
ii) Undo and redo- Undo reverses the previous/latest action, while
redo does the undone action
iii) Thesaurus -It gives suggestion of words or phrases with similar
meaning (synonyms), and sometimes antonyms to the selected word.
iv) Autocorrect-It checks for wrongly spelled words, and automatically
replaces them with the correct ones as set by the user.
8. Give the steps you would use to find and replace the
occurrence of a particular word in Microsoft Word.
(4mks)
- Click on edit, select find (or replace)
- Type the word you want to replace with in the replace with box
- Click replaces or Replace all if you want to replace all the occurrences
of that word in your document at once.
9. Name and explain the use of any three buttons found in a
spell-check dialog box (6mks)
Change: Accepts the current selection in the suggestions box
Ignore Once: Leaves the highlighted error unchanged (if the highlighted
word is a valid word) & finds the next spelling or grammar error
Ignore all: retains all the occurrences of the same word or phrase in the
document from another language, e.g. a Kiswahili.
Add:Adds the highlighted word in the Suggestions box to the Custom
dictionary.
10. Clearly explain the meaning of the following terms as used in
word processing:
(7mks)
i) Editing a document - Making changes to an already
typed/existing document.
ii) Blocking text- Selecting a group of text in order to work with it
as a
whole, e.g. a word sentence or paragraph.
iii) Printing – having your work copied on a piece of paper as
output
iv) Saving- Storing a file/document permanently in the computer’s
secondary memory (e.g., hard disk) so as to be used in the future.
v) Italicizing text- making the text saint forward
vi) Header- It is a standard text or information such as page numbers,
chapter
titles, etc that appears above the top margin of every page in a document
or in a section
vii) Footer-It is a standard text or information that appears below
the bottom
margin of every page in a document.
11. a) What is document formatting?
(1mk)
Applying various styles to enhance the appearance of a
document
b) Give any five document formatting features of a word
processor.
(5mks)
- Bolding
- Font colouring
- Text alignment
- Font type
- Setting tabs
- Underlining
- Italicizing
- Font size.
c) Differentiate between ‘superscript’ and ‘Superscript is
text formatted to be at the bottom of a line.
Superscript is text formatted to be at the top of a line, Subscript is text
formatted to be at the bottom of a line.
12. What are page margins?
Non-printing but visible text-limiting borders that mark the distance that
text starts on a page away from the edge of the page
13. Differentiate between:
a) A Hard page break and a Soft page break.
(2mks)
A hard page break is inserted on a page even before the end of the page,
e.g. by pressing CTRL+ ENTER or setting a manual page break.
For a Soft page break, the text cursor moves or creates a new page
automatically when at the end of the current page during typing.
b) Auto complete and AutoCorrect (2mks)
AutoComplete helps a person to type quickly by completing automatically a
word that he/she has already started to type
AutoCorrect automatically replaces mistyped words with the correct ones
as set by the user.
c) Drawing and inserting a table in a document
(2mks)
Drawing – use the pen tool to draw the table
Inserting table- use the Table-Insert-table Command
14. Explain how a paragraph can be moved from one page to
another using a word processor.
(4mks)
- Select the paragraph
- Click Cut on the Edit menu/ standard toolbar, (or Press CTL + ‘X’)
- Click to place the insertion point here you want to put the text
- Click on Edit, then choose Paste (or Press CTRL + ‘V’)
15. a) What is line spacing? (1mk)
The vertical distance between two text lines in a document
b) Explain any three line spacing specification used in
Microsoft Word.
(3mks)
i) Single space – accommodates the largest font in a line
ii) 1.5 line space- 1 ½ time that of single line spacing
iii) Double – twice that of single line spacing
iv) Exactly – a fixed line spacing that word does not adjust
v) At least – the minimum line spacing that is needed to fit
the largest font or graphic on the line.
vi) Multiple- a line spacing that is increased or decreased by a
percentage that you specify . (4mks)
16. Give any four text alignment features (4
mks)
- Left alignment
- centre alignment
- Right alignment
- Justified
17. List any thee sources of graphics that can be used in Microsoft
word. (3mks)
- From Microsoft clip gallery
- From Scanner
- By drawing using the Drawing tools available in Ms-World
- Import from another file
18. a) Explain the concept of graphics that can be used in
Microsoft word.(3mks)
Getting ready-made objects and text from other applications into
the word processor.
b) What is the difference between object linking and
embedding? (2mks)In linking, the object imported can only be edited in
the original
application from which it was created.
In embedding, the object imported becomes part of the current application
and can be edited there.
19. Give a reason why it may be necessary to merge cells in a
table. (1mk)
To create larger cells in a table without increasing the height or width of the
existing cells.
20. a) Define mail merging. (2mks)
The process of generating personalized letters or documents by
combining
a standard document, but addressed to different recipients.
b) Give two advantages of mail merge over copy and pasting
several times to mass mail a document.
(2mks)
combining of letters saves time when printing
It allows producing of many documents at once
The mailing list can be re-used on another document
21. a) Give two advantages of previewing a document before
printing.
(2mks)
To check whether the page layout is OK
To confirm that no details are outside the printable area
to go through the document before printing
To save on printing papers & printer toner because; errors on the
printouts that may require reprinting will be minimal.
22. a) Distinguish between Portrait and Landscape orientations.
(2mks)
In Portrait, text & graphics are printed with the longest side of
the page vertically upright, while in Landscape, text & graphics
are printed with the longest side of the page placed horizontally.
b) State two reasons why it is necessary to specify the
correct paper size before printing a document?
(2mks)
Select a paper size depending on the document page size
needed
To comply with printer capabilities
23. Outline any three main features that make word processors
popular
programs.
(3mks)
Saving of documents for future reference
Printing of multiple documents after editing
formatting of documents into required form
Mailing features such as mail merging of standard document with
another saved file.
Spreadsheet
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define a spreadsheet;
b) Describe the components of a spreadsheet;
c) State the application areas of a spreadsheet;
d) Create and edit a worksheet;
e) Explain different cell data types;
f) Apply cell referencing;
g) Apply functions and formulae;
h) Apply worksheet formatting;
i) Apply data management skills;
j ) Apply charting and graphing skills;
k) Print worksheet and graph.
Content
a.) Definition of a Spreadsheet
b.) Components of a spreadsheet
i. Worksheet
ii. Database
iii. graphs
c.) Application areas of a spreadsheet
• Statistical analysis
• Accounting
• Data management
• Forecasting (what i f analysis)
• Scientific application
d.) Creating a worksheet/workbook
• Getting started
• Worksheet layout
• Running the program
i. Creating a worksheet
ii. Editing a cell entity
iii. Saving
iv. Retrieving
v. Closing a worksheet
vi. Exiting from spreadsheet
e.) Cell Data Types
• Labels
• Values
• Formulae
• Functions
f.) Cell referencing
• Cell addressing
• Absolute referencing
• Relative referencing
g.) Basic functions and formulae
• Functions
i. Statistical (average, count, max, min)
ii. logical (if, count-if sum-if)
iii. mathematical (sum, product, div)
• Arithmetic formulae (using operators +,-,/,*,
h.) Worksheet formatting
• Text
• Numbers
• Rows and columns
• Global
i.) Data management
• Sorting
• Filtering
• Total/subtotals function
• Forms
j.) Charts/graphs
• Types
• Data ranges
• Labels
• Headings and titles
• Legends
k.) Printing
i. page set-up
ii. print preview
iii. print options
• select printer
• selection
• worksheet/workbook
• orientation
• pages and copies
v) Printing
Introduction
Definition
An essentially large sheet that lets you enter, edit and manipulate numerical
data.
Types of Spreadsheet
Manual
Electronic
Examples of Spreadsheet
Lotus 123
VisiCalc MS-Excel VP Planner
Advantages of Electronic over manual spreadsheet
1. It utilizes powerful aspects of the computer like: speed, accuracy and
efficiency to enable the user accomplish the task.
2. It offers a large virtual sheet for data entry and manipulation.
3. It utilizes large storage space on computer storage devices to store and
retrieve documents.
4. Enables the user to produce neat work because traditional paper, pencil,
rubber and calculator are not required
5. Has a better document formatting capabilities.
6. Has inbuilt formulas called functions that enables the user to quickly
manipulate mathematical data.
7. Automatically adjusts the results of a formula if the data in the worksheet
is changed- Automatic recalculation.
Components of a Spreadsheet
1. Worksheet: where data is entered. It consists of cells, columns and rows.
2. Database: Does the actual management of data e.g. filtering records,
using forms, calculating subtotals, data validation, pivot tables, pivot charts
and reports.
3. Graph and charts: Pictorial representation of the base data in a worksheet.
Types of charts
Line, bar, column, pie, scattered, histogram,
Legend: A key that explain what each colour or pattern of data
representation in a chart means.
Application Areas of Spreadsheet
1. Statistical analysis
2. Accounting: Recording daily transactions and keeping of financial records.
Also in;
3. Track the value of assets overtime (Depreciation and Appreciation).
4. Calculate profits
5. Prepare budgets.
6. Data management: Sorting, filtering data, calculating subtotals, and using
forms.
7. Forecasting/ What if analysis: Changing values of a cell or argument in a
formula to see the difference the change would make to the calculation
results.
Worksheet Layout
Cell: Intersection between a row and column.
Rows: Horizontal arrangement of cells.
Columns: Vertical arrangement of cells.
Range: A group of rectangular cells that can be manipulated as a block.
Cell Data Types
1. Label: Any text or alphanumeric characters entered in a cell.
2. Values: Numbers that can be manipulated automatically.
3. Formula: Designed mathematical expression that create a relationship
cell and return a value in a chosen cell.
4. Functions: Inbuilt predefined formula that the user can quickly use
instead of creating new one each time a calculation has to be carried out.
Cell Referencing
Identifies a cell or range of cells on the worksheet and shows MS-Excel where
to look for the values or data needed to be used in a formula.
1. Relative cell referencing: The formula keeps on changing automatically
depending on the position on the worksheet.
2. Absolute: Cell reference that is always referring to a cell in a specified
location of the worksheet even if they are copied from one cell to another.
A1 referencing style: A cell can be identified by its column label followed
by the row number.
R1CI referencing style: A cell is referred by its row number followed by its
column number.
A1 style R1C1
B2 R2C2
C2 R10C3
E20 R20C5
Data Management
1. Sorting
2. Filtering data: Quick and efficient method of finding and working with a
subset of data in a list.
3. Auto filter: Uses simple criteria and include filter by selection
4. Advanced filter: Uses more complex criteria.
5. Subtotal
6. Total function
7. Forms: Special prepared templates that the user can use to make
data entry fast.
Basic Functions and Formulas
Statistical Functions
1. Average: Returns the average or mean of a certain formula which can
be numbers or array.
2. Count: Counts the number of cells that contain values.
3. Max: Returns the largest value in a set of values.
4. Min: Returns the smallest value in a set of values.
5. Mode: Returns the most frequent occurring value in a set of values.
6. Rank: Returns the rank of a number in a list by comparing its size in
relation to the others.
Logical Functions
1. If: Returns a specified value if a condition is executed and found to be
true and another value if it is false.
2. Count if: Counts a number of cells within a specified range that
meet the given condition of criteria. Example A10:E10 contain
eggs, in cell 6, 5 and 2 =COUNTIF (A10:E10,”eggs”) will return 3.
3. Sum If: Adds values in the specified cells by giving a condition or
criteria. Example A10:E10 contain 10, 50, 60, 30, 70 sum all values
greater than 50 =SUMIF (A10:E10,”50”) returns 180.
Mathematical Functions
1. Sum: Adds values in a range of cells as specified and returns the
result in a specified cell.
2. Product: Multiplies values in a range of cells as specifies and returns
result in a specified cell.
Order of execution
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
What is electronic spreadsheet software? (2mks)
A computer program that looks like the manual ledger sheet with
rows & columns for entering data that can be manipulated
mathematically using formulae.
2. Give any two application programs classified as spreadsheets.
(2mks)
Microsoft Excel
Lotus 123
-Corel Quattro Pro
-super calculators
-Multiplan
-VP-Planner
-VisiCalc
3. Differentiate between the traditional analysis ledger sheet and
an electronic spreadsheet.
(5mks)
An electronic spreadsheet;
- Has a large worksheet for data entry & manipulation as
compared to manual worksheet
- Has inbuilt formulae (called functions) that are non-existent in
manual worksheets
- Uses the power of the computer to quickly carry out operations
- Has better document formatting & editing qualities than a
manual worksheet
- Utilizes the large storage space available on computer storage
devices to save & retrieve documents.
- Can easily be modified, while manual spreadsheets involve a lot
of manual calculations & are very difficult to amend
- The user can very quickly & efficiently perform complicated
computations using the information stored in an electronic
spreadsheet.
- Enables the user to produce neat work
- Offers graphical representation of data leading to comprehensive
decisions.
- It is accurate in its calculations & allows automatic recalculation
on formulae. For a manual worksheet, changing one value
means rubbing the result & writing the correct one again.
4. Explain five application areas where spreadsheet software can
be used.
(5mks)
i) Accounting: - spreadsheet software can be used by accountants
to record
their daily transactions & also keep financial records, e.g. they can record
sales & purchases, produce invoices, compile financial statements, calculate
profits, prepare budgets, etc.
ii) Data management: - a spreadsheet enables data & information
to be
arranged neatly in tables, produced easily and also kept up-to-date, e.g. one
can edit, save , sort, filter, use forms to enter and view records, and
worksheet data.
iii) Scientific applications: - spreadsheets can be used by
scientists &
researchers to compile and analyze their results.
iv) Statistical analysis: - spreadsheets provide a set of statistical
Functions/tools that can be used to develop complex statistical or
engineering analyses, e.g., teachers can compile their students’ marks and
produce results.
v) Forecasting: - using the ‘what if’ analysis technique,
spreadsheets can be used to find out the effect of changing certain values in
a worksheet on the other cells. This helps in financial forecasting, budgeting,
etc.
5. State five features of spreadsheets that are useful in financial
modeling. (5mks)
Have inbuilt functions & formulae which can be used to perform
most mathematical statistical, trigonometric or financial
calculations
Allows automatic recalculation on formulae
#have ability to perform ‘what if’ analysis, which can be used to
find out the effect of changing certain values in a worksheet on
the other cells
Have the ability to sort & filter data
Have a data validation facility, which ensures that the correct
data is entered into the spreadsheet.
Have a chart facility that can be used to draw Line graphs, Bar
charts, Pie charts, Histograms, etc.
Some spreadsheets have a SOLVER facility that is used to
uncover the best uses of scarce resources so that desired goals
such as profit can be maximized, or undesired goals such as cost
can be minimized.
They enabled printing of entire worksheets, portions of a
worksheet or several worksheets within the shortest time
possible
Have the ability to summarize data using Consolidation and Pivot
tables.
6. Define the following terms as used in a worksheet:
(3mks)
i) Columns
These are the fields that make up the worksheet of a spreadsheet, and
are
identified by letters.
They run vertically from top downwards
ii) Rows
These are the records that form a worksheet, and are identifies by numbers.
They run horizontally from left to right.
iii) Cell
A box formed when a row & a column intersect in a worksheet where the
data is entered
7. Explain the following concepts as used in spreadsheets:
(4mks)
i) Automatic recalculation
This is whereby an electronic spreadsheet will adjust the result of a formula
automatically when the values are changed, so that they correspond with the
different input.
ii) ‘What if’ analysis
‘What if’ analysis is a feature in spreadsheets that is used to find
out the
effect of changing certain values in a worksheet on the other cells.
It involves changing the values of one of the arguments in a
formula in
order to see the difference the change would make on the result of the
calculation.
iii) Sheet tabs
These are names of the worksheets that appear at the bottom of the
worksheet window. They enable the user to move from one worksheet to
another.
iv) Worksheet
A page (single sheet) stored in a workbook
8. Name four data types used in spreadsheets
(2mks)
Labels
Values
Functions
Formulae
9. An Agrovet Company wants to analyze its employee’s personal
details using Microsoft Excel. The company has five employees:
Mary Anne, Francis Kihara, Lena Achieng, Hellen Wanjiku, and
mwangi Peter. Their ages are 20, 45, 90, 45 and 34 years
respectively. Mary department; Mwangi Peter in finance
department and Hellen Wanjiku in Computer department
Mary Anne and Hellen Wanjiku are single whereas Francis Kihara,
Lena Achieng and Mwangi Peter are married.
Construct a worksheet showing the above information. Use
appropriate column headlings
(6mks)
A B C D
1 AGROVET COMPANY
2 NAMES AGE DEPARTMENT STATUS
3 Mary Anne 23 Research Single
4 Francis 45 Personnel Married
Kihara
5 Lena 90 Research Married
Achieng
6 Hellen 45 Computer Single
Wanjiku
7 Mwangi 34 Computer Married
Peter
8
10. a) What is a cell reference?
(1mk)
A cell reference is the identity of a cell in a worksheet. A cell is identified by
use of the column letter and the row number headings.
b) For each of the following, state the type of cell reference. (4
mks)
i) A5 Relative reference
ii) $F$5 Absolute row reference (only the row reference is
absolute)
iii) H$21 Absolute column reference (only the column reference is
absolute)
Database
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define a database;
b) Explain the concepts of a database,
c) Explain data organization in a database;
d) Create a database;
e) Edit a database;
f) Design a form;
g) Apply basic concepts of queries;
h) Create report and labels;
i) Print queries, forms and reports.
Content
a.) Definition of Database
b.) Database concepts
• Traditional filing methods (manual flat files)
• Functions of databases
• Types of database models
• Database software
• Features of a database (e.g. data structures,
report generating, querry language,modules)
c.) Data Organization
• Character types
• Fields
• Records
• Files
• Database
d.) Creating a database
• Design a database structure
• Field properties and data types
• Key-fields and index
• Data entry
e.) Editing a database
• Modify structure
• Updating database
f.) Form design
• Form layout
• Data manipulation
• Formatting fields
g.) Queries
• Creating
• Updating
• Viewing
• Printing
h.) Reports layout
• Creating (using relational and logical operator, local operators - AND OR,
NOT)
• Modifying
• Sorting and grouping
• Labeling
• Printing
Introduction
Definition of Database
Collection of structured and related data items organized to produce a
consistent and controlled access to the items.
Challenges facing human way of managing databases
(Manual)
1. Unnecessary duplication of data.
2. Burning and time wasting when searching for an item.
3. Misleading reports due to poor data entry and organization.
4. Poor update of records.
Functions of Database Management System
1. Enables users to add or delete records.
2. Enables users to update or modify records.
3. Allows user to organize data for easy access, retrieval and
manipulation.
4. Acts as an interface between database and other application
programs.
5. Ensures security of data by safeguarding it against unauthorized
access.
6. Keeps statistics of data items in a database.
NB: Database Management Software (DBMS) facilitates the creation,
organizing and management of databases.
Components of a Database System
1. Hardware: Storage disks, tapes and other associated devices like the
CPU.
2. Data: Values physically recorded.
3. Software:
Data definition: Method of data definition and storage.
Data maintenance: Checks data in the fields.
Data manipulation: Inserting, updating and sorting data.
Data display: Viewing data.
Data integrity: Accuracy or completeness of data and
information in a computer or received from an information
system.
4. User:
a) Application programmer: Write programs
that use databases. b) End users: Interact with
the database from a terminal.
c) Database administrator: Functions
Overall in charge of the system
Determine the information content of a database
Define unauthorized checks and validation procedures
Monitor performance and respond to changes in user
requirement
Define a strategy for backup strategy
Advantages of Computerized Databases
1. Reduces redundancy through the integration of files that have
something in common.
2. Avoids inconsistency by safeguarding item duplication.
3. Data can be shared- data requirement can be satisfied even
without necessary creation of a new file.
4. Offers security by restricting unauthorized access.
5. Data integrity is maintained- the accuracy of data.
6. Data independence: the immunity of the application to changes in
storage and access strategy.
Database Models
1. Flat files: They hold only one set of data and is not any different
from the manual files. Example is the library catalog.
2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access
level two data one has to first access level one data items.
3. Networking models: Links or paths are used to express the relation
between different data items forming a network of items.
4. Relational model: Related data items are stored together in structures
called relations or tables.
Relationships created between records of different tables.
5. Object Oriented Model: Database is a complete program built to
hold a collection of objects which have both properties and
behavior.
Features of Database Management System
1. Tables: Hold related records.
2. Queries: A database tool used to search or question the database
on specific data items. Types of queries-
Select query- Used to search and analyze data in one or more
tables.
Action query- Used to make changes to many
records once. Task- a) Update: updates
data in a table
b) Append: adds data in a table from one
or more tables. c) Make table: Creates a
new table from a dynaset.
d) Delete: Deletes specified records from one or more tables.
3. Forms: Enables users to view and enter data in a table.
4. Reports: Provides users with means to specify output layout and what
is to be printed.
5. Macros: A set of procedure to automatic frequently performed tasks.
6. Programming module: A powerful tool than macros to automate the
database operations further.
Data Organization in a Database
Fields: Character or logical combination of characters.
Records: Collection of related fields that represent a single entity.
Tables: A collection of related records.
Database: Highest in data records.
Field Data Types
Text: Alphanumeric letters, numbers, space and functions.
Number: Numeric numbers can be manipulated mathematically.
Memo: Made of alphanumeric data up to 64000 characters.
Date/ Time: Identify a field as either a date or time.
Currency: Identify numeric values that are in decimal or fraction.
Auto number: Numeric value u wish MS-Access to automatically
increment values in a field.
Yes/ No: Logical field where entry is either a yes or no using a
check box.
Object Linking and Embedding (OLE): Used for graphical
interface applications for inserting graphical objects.
Field Properties
1. Field size: Allows user to set the number of characters in a field.
2. Format: Determines how information appears on screen and when
printed.
3. Decimal places: Used for number or currency fields, and to
specify the number of decimal places.
4. Input Mask: Automatically formats field entry into specified format.
5. Caption: A more descriptive name for a field to be used in a table.
6. Default value: A value that will automatically appear in datasheet if
nothing is entered.
7. Validation rule: Logical expression that restricts the value to be
entered in a field.
8. Validation text: Message that appears when the validation rule is
violated.
9. Required: Determines if an entry must be made in a field
before you proceed to the next field.
10. Allow zero length: Allows the users to proceed without making
any entry in fields set as zero length.
11. Indexed: Facilitates the organization of records for easy search.
12. Primary key: Enforces uniqueness in a table so that one record
isn’t entered twice.
13. Index: Used to speed up search and sort operations in a table.
14. Foreign Key: A key in a child table which is a primary key in a
parent table.
Ways of Protecting Information System from
Unauthorized Access
Use of passwords
User and group permission
Data encryption
User level security
Data integrity Constrains
Rules governing entering, changing and deletion of data and records in a
database.
1. Entity integrity: Rules governing the composition of primary key.
Cannot contain a null value, it must be unique- No zero length
No duplicate- indexed
Input mask
Caption
2. Referential integrity: Governs the nature of records in a one to many
relationship between tables in the database.
-All foreign keys in child tables must have a matching field in a parent
table.
a) Restricted database- the system deletes or updates a parent
record if there are no matching records. A parent record has a
primary key and a child record has a foreign key of the
relationship in the second table.
b) Cascades database- deletes or updates all matching child
records when the parent record is deleted or updated.
3. Domain integrity: Ensures no field takes on a value outside the range of
valid values.
Format
Validation rule
Validation text
Indexed
Terms used in Database
1. Normalization: This is the process of dividing information into
independent tables to avoid repletion of data entries.
2. Query language: Special language used to write query statements.
3. Data redundancy: duplication of data.
4. Data inconsistency: When one piece of information in a record
doesn’t concur with the other piece in a different file.
Types of Controls used in Database
1. Bound Control: One whose source of data is a field in a table or a
query.
2. Unbound Control: A control that is not connected to any data source.
Query Criteria
Relational operations: >, <, <=, >=, <>, and =.
Wildcards: *(asterisk) and #.
Logical operators: AND, OR and NOT.
LIKE and BETWEEN: relate or display values within a range.
Considerations for a Database Relationship
Field of similar data types
Field content
Primary key
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. a) Define a database. (2mks)
A collection of related files organized to provide consistent and
controlled access to the data items.
A collection of related data elements stored together under one logical
structure so as to provide a consistent & controlled access to the
items.
A collection of information related to a particular subject or purpose
A common data pool, maintained to support the various activities
taking place within the organization.
b) List four examples of database programs in the market today.
(2mks)
Microsoft Access
Oracle
FoxPro
Dbase
2. State the components of a Database hierarchy in ascending
order. (2mks)
Character (alphabets, numbers and special characters)
Fields (Facts, attributes, set of related characters)
Records (Collection of fields)
File (Collection of records)
Database (Logical collection of files)
3 a) Explain three types of database models. (6
marks)
i. Flat file database: It holds only one set of data
ii. Relational database: Related data items are stored or
organized together in structures called relations or tables. Each
table consists of rows and columns.
iii. Hierarchical database: The data items are organized in
hierarchical (tree-like) structure. The records are stored in
multiple levels, where units further down the system are
subordinate to the ones above
iv. Network database: It allows a data element (or record) to be
related to more than one other data element/record. Links are
used to express the relationship between different data items
forming a network of items.
b) Define the term sorting (2mks)
Sorting involves arranging of records in a logical order in the database. It
can either be in Ascending or descending order.
4. a) What are database management system software?
(2mks)
A collection of programs used to store & retrieve data, and manage files or
records containing related information from a database.
b) Give the two classes of database software.
(2mks)
PC-based database software:-Are usually designed for individual users or
small businesses, e.g. Ms-Access, Dbase, Paradox, FoxPro
Corporate database software:-Are designed for big corporations that handle
large amounts of data, e.g. Oracle, SQL Server, Sybase, etc
5. State the use of the following objects in databases.
(3mks)
i) Tables To store related records
ii) Forms They act as screens for entering, changing &
viewing data
in tables
iii) Query Searching for specific records/Data
manipulation/Selecting
6. a) Define the term normalization as used in database
design. (2mks)
Normalization is the process of trying to eliminate storage of
duplicate
values in a database.
b) State three objectives of normalization.
(3mks)
To relate different tables in a database
To ease the retrieval of data from a relational database
Breaking up multi theme tables into smaller workable tables
7. Give three advantages of separating data from the
applications that use the data in database design.
(3mks)
You can retrieve recorded data easily
You can do calculations in an easy way
Creating of queries, forms, reports will be easy by using data
separation.
8. Differentiate between:
i) Primary key and relationship
(2mks)
Primary key is a field or a set of fields that can be used to uniquely identify
each individual record in a table. It is used to relate a table to the foreign
keys in other tables.
ii) Tabular and columnar form layout.
(2mks)
Tabular – the records are displayed from left to right across the
page, and
the labels appear at the top of each column, with each row representing a
new record.
Columnar – the fields for each record are displayed down a column, i.e.
each value is displayed on a separate line with field labels to the left.
9. State three types of relationships that can be used to link
tables in databases.
(3 mks)
One-to-One
One-to-many
Many –to-Many
10. Explain how ‘parents’ and ‘child’ tables are related in
relational database. (4mks)
A parent table is the one that has the primary key of the relationship, while a
child table is the one that has the foreign key of the relationship.
Parent and child tables are related through a common field that links the two
tables. Records in a child table relate to one record in a parent table.
11. a) Describe four major shortcomings of the conventional
(paper )file
structures that are being addressed by the database approach.
(4mks)
Unnecessary duplication of data
Boredom & time wastage especially when searching for a
particular item
In order to carry out any file processing task(s), all the related
files have to be processed
Misleading reports due to poor data entry and organization
Difficulty in sorting, retrieving & updating records
Security: no protection of files against unauthorized access and
corruption
Sharing of files is difficult
Some information resulting from several files may not be
available.
b) List any two methods used to secure data in a database
(2mks)
Password protection
User and group permissions
User-level security
Data encryption
12. The following car details are to be entered in a database:
Make, Date-of-manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and
their field data types (5 mks)
Field name Data type
ID (Primary key) Auto Number
Make text
Date of manufacture Date/time
Colour Text
Cost Currency
b) Explain how you index the data such that cars of the same
make and colour are together.
(2mks)
Create a query to show same make and colour
c) Write a statement that can be used to select cars of colour
green. (2mks)
Create a query. In the colour field, and in the Criteria row, write
“green”
d) Give an instruction that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/=
(3mks)
Create a query. In the cost field, and in the criteria row, write
“.>500000 and <1000000”
ii) Determine the average cost of all cars. (3mks)
Create a query. Choose average of costs “Avg” option in the
total section.
Desktop publishing DTP
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define desktop publishing;
b) State the purpose of DTP;
c) Identify types of DTP software;
d) Design a publication;
e) Edit a publication;
f) Format a publication;
g) Print a publication.
Content
a.) Definition of Desktop publishing
b.) Purposes of DTP
• Graphic design
• Page layout design
• Printing
c.) Types of DTP software
• Graphical based
• Layout based
d.) Designing a publication
• Types of publications e.g. newsletters, cards, brochures,
posters etc
• Running the program
• Screen layout
• Setting up a publication
• Manipulating text and graphics
e.) Editing a publication
• Editing tools
f.) Formatting a Publication
• Text
• Graphics
g.) Printing
• Page set up
• Print options
Introduction
Definition
This is the production of publication work within the computer framework
of art and design
Purpose of Desktop Publication
Graphic design
Page layout design
Printing
Application areas Desktop Publication
1. Designing text and images
2. Production of publication
3. Creating illustrations
4. Editing text and graphic
5. Composing templates
Types of Desktop Publishing Software
Graphical based software
They are used to develop, edit and format graphical objects. Examples
of graphical based software are: Adobe Photoshop, Corel Draw,
Harvard Graphics e.t.c
Layout based software
Examples are Adobe PageMaker, MS-Publisher.
PageMaker Screen Layout
1. Pasteboard: A large blank area where you place text and objects
before arranging them on printable area.
2. Printable area: Area surrounded by margins on the pasteboard.
3. Master Pages: They are used to design the general layout that
needs to be applied in all other pages of publication.
4. Rules: Help the user to manually create ruler guides which are non
print extensions, and also to measure publication size.
5. Control Palette: Shortcut toolbar mainly having text and paragraph
formatting command icons.
6. Toolbox: A set of buttons that contain various tools used to create
and manipulate publications.
The buttons are;
Pointer- Used to select, move and resize text blocks and graphics.
Hand- Used to scroll the page and preview it.
Text- Used to type, select and edit text.
Line- used to draw straight lines in any direction.
Rotating- used to select and rotate objects.
Constrained line- Used to draw horizontal and vertical lines.
Cropping: Used to trim imported graphics.
Rectangular frame- used to create a rectangular placeholder for
text and graphics.
Zoom- used to magnify or reduce an area of a page.
Ellipsis frame- used to create an oval or circular placeholder for text
or graphics.
Polygon: used to draw basic polygons, triangles and stars.
Rectangle- Used to draw squares and rectangles.
Ellipsis- Used to draw circles and elipses.
Terms used in Desktop Publishing
Tracking: Changing the visual denseness or openness of characters in a
line
Kerning: Fixing particular pairs of letters that are either too close or too
far from each other.
Cropping: Trimming graphics.
Non Printing Guides in PageMaker
1. Ruler guides: They are used to measure a publication size.
2. Column guides: They help on to divide a page into columns that make the
publication more organized.
3. Margin guides: Used in the development of the printable area of your
publication.
Layering
The process of placing objects, text and graphical objects on one another.
Importance of Layering
To have presentable levels
Advantages of PageMaker over Word Processor
The use has control over the desktop
Master pages are used to set a common layout which may be repeated on
all the pages of the publication
There is a wide range of templates available e.g. brochures, posters e.t.c
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1 a) Define the term desktop publishing.
(2mks)
The process of producing publications such as newspapers, books,
newsletters, cards, etc by marking areas for text and graphical objects using
specialized programs installed on a desktop computer.
b) Give any three examples of desktop publishing software
available in the market today.
(3mks)
- Adobe PageMaker
- Adobe Photoshop
- Adobe illustrator
- Ventura
- Microsoft Publisher
- CorelDraw
- Harvard graphics
2. Identify four different types of publications that can be
produced using desktop publishing software.
(4mks)
- Cards, e.g. for special occasions such as weddings, graduations,
congratulations, etc
- Newsletters
- Newspapers
- Calendars
- Advertisements/Posters
- Magazines
- Certificates
- Notices
- Catalogues
- Pamphlets
- Books
- Brochures
3. Differentiate between the following:
a) Pasteboard and printable page. (2mks)
Pasteboard is where text & objects are placed for editing before transferring
them to the printable area; Printable page refers to the area enclosed in
margin guides. (2mks)
b) Margins and column guides.
(2mks)
Margins mark text areas on the page along the edges, while
column guides divide the page into several fields. They are used to define
the printable area.
c) Change case and drop cap.
(2mks)
Change case is changing text from upper to lower case, sentence, title, or
toggle case, while drop cap refer to making the first character in a line bigger
and drops down to occupy the space in the lines that follow.
d) Kerning and tracking. (2mks)
Tracking refers to changing the visual denseness or openness of characters
in aline, while Kerning is fixing particular pairs of letters that are too close or
too far apart from each other.
e) Fill and stroke
A stroke refers to a line style, while a fill refers to applying background
pattern such as shading to a graphical object.
4 a) What is layering as used in DTP (1 mk)
Layering is the placing of text or objects on top of each other.
b) Why is layering very useful in a desktop publisher?
(1mk)
It may be used to create watermarks.
5. What commands are used in place of portrait and landscape
page orientation in PageMaker?
(1mk)
i. Portrait-tall;
ii. Landscape-wide
6. Give three methods that are used to transform an object.
(3mks)
i. Rotating
ii. Skewing
iii. Reflecting
7. a) what is text wrap?
(1mk)
Text wrap is controlling the flow of text over or around a
graphical object.
b) Give three ways you can wrap text on an object.
(3mks)
Make the text jump the object to the next page or column
Allow to text to jump over the object and continue on the same
page
Create a rectangular text wrap around all the sides of the object.
8. Define the term object grouping
(2mks)
This refers to joining objects in order to manipulate them as one
object.
Internet and email
Specific Objectives
By the end of the topic, the learner should be able to:
a) Define internet;
b) Explain the importance of internet;
c) Describe internet connectivity;
d) Identify internet services;
e) Access internet;
f) Use e-mail facilities;
g) State the moral, social and spiritual issues that may emerge through
access to the internet.
Content
a.) Definition of internet
b.) Development of internet
c.) Importance of internet
d.) Internet connectivity
• Telecommunication facilities
• Modems
• Internet services providers (ISP)
• Internet software
e.) Internet services e.g.
• World Wide Web (www)
• Electronic mail (e-mail)
• Electronic Commerce (e-commerce)
• Electronic Learning (e-learning)
f.) Accessing Internet
• Log-in/sign-in
• Surf/browse
• Search engines and hyperlinks
• Downloading/saving/printing
g.) Electronic Mail (e-mail)
• Definition
• E-mail software
• E-mail facilities
i. Mails (checking, composing, forwarding, sending, saving and
printing)
ii. Fax
iii. File attachment
iv. On-line meetings
v. Telephone messages
vi. Contact management
NB: Emphasis is on the procedure and not necessarily on on-line
connectivity
h.) Use the internet to access information on emerging issues e.g.
• HIV/AIDS
• Drug abuse
• Environmental issues
• Moral integrity
Introduction
Definitions of Internet and Intranet
Internet: This is an interconnection of many large computer networks
to enable different computers world wide to communicate.
Intranet: Interconnection of computers within an organization to form a
network.
Importance of Internet
Research activities
News and information dissemination
Leisure
Communication
Business transactions
Internet Connectivity Requirements
Data terminal equipment: processor, host computer and transmit
data on networks e.g. mobile phones, Personal Digital Assistant
(PDA).
Transmission media: physical (wired) or wireless pathway.
Telecommunication lines: fiber optic cables.
Wireless telecommunications like the GSM use GPRS.
Satellite transmission
Internet Service Providers (ISPs): Companies that offer internet
services to end users at a fee.
Software: Help to facilitate you access to internet- Internet Protocol
(IP/ TCP), browsers (Mozilla, Opera, Internet Explorer), Email (Ms-
Outlook, Express, Eudora, Yahoo Mail e.t.c)
Modem: Special digital to analog interface card that is changes
digital data to analog so as to be transmitted and on receiving end
the data is changed from analog to digital form for computer to
understand
Protocols
A set of rules that governs how two computers can send and receive data
on the network.
Types of protocols are:
Transmission Control Protocol (TCP): Governs how data is
transferred from one computer to the next.
Internet Protocol (IP): Determines the addressing system on the
internet.
Types of Internet Connection
1. Analog:ISP ancholes.
2. Integrated Service Digital Network (ISDN): Dial up faster than analog.
3. Broadband/ Asymmetrical Digital Subscriber Line (ADSL)/ Symmetrical
Digital Subscriber Line (SDSL): Faster than dial up.
Internet Architecture
GPRS device using TCP/ IP required for Gateway to reach
GSM Air Each IP gate External IP network
Interface
Internet Services
1. E-mail: Electronic exchange of letters, data and graphics on the
internet.
2. E-learning: Learning through interacting with special programs on the
computer.
3. E-commerce: Buying and selling of goods and services on the internet.
4. Video conferencing: Use of computer, digital camera and audio
capturing equipment and communication network to enable people
in different locations to talk to one another.
5. Instant messaging: Allow two or more people communicate directly
e.g. Yahoo! Messenger, Google talk, IzzyTalk.
6. News group
7. Searching: Google, Opera Mini, Yahoo, Excite, Alta Vista.
8. World Wide Web (www): Vast virtual space on internet where
information pages called websites is installed.
Website: Group of related web pages or other resources located on a
web server.
Web portal: It offers specialized services like search, email, sports
updates, financial news and links to selected websites.
Blog: Website containing information that can be easily updated. It
acts as resume diary and may be used for business, advocacy and
campaigns.
Multimedia: contains photos, movies, music, web TV, and internet
radio.
Terms used in accessing the internet
1. Uniform Resource Locater (URL): Address given to every
resource on the internet which specifies the files or data and its
location.
2. Log in:
3. Sign up:
4. Surf/ browser: Process of accessing internet resources.
5. Hyperlinks: Text or picture on an electronic document especially web
pages that causes other web pages to open when link is clicked.
6. Search engine: program that searches document for specified
keywords anad returns a list of document where keywords are found.
7. Downloading: Process of transferring information from host computer
network to the local storage.
8. Uploading: Process of transferring information from a local storage to a
remote computer on network.
9. Computer Network: This is a collection of independent entities that are
arranged in such a manner so as to exchange data, information or
resources all interconnected with a computer.
E-mail Facilities
1. Mails
Checking
Compose
Send
Forward
2. File attachment
3. Online meeting
4. Telephone messaging
5. Contact management
Advantages of Emails over Letters
They are cheaper per individual message
They are faster
One can attach any kind of file
More safer than a letter
Precautions when setting an email system
Install, use and regularly update antivirus software to reduce virus
infection.
Have a mail filtering system to track unsolicited mails.
Install firewalls to block unauthorized internet traffic.
Use passwords to allow only authorized users.
Email Address Parts
Example: josedeororah@ovi.com
Josedeororah- Username
@- Separates username from host
Ovi- Host computer on network
.com- Identifies the type institution or domain.
Web Address Parts
Example: http://www.pioneershomepage.com
http- protocol that transfers hypertext.
www- Internet (web) server
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. The first computer Network was set up by ARPA in the United
States of America. What is the full meaning of the acronym ARPA
(1mk)
Advanced Research Projects Agency
2. Your manager wishes to be connected to the Internet. He
already has a powerful personal Computer (PC), a printer, and
access to a Telephone line. However, he understands that he will
need a Modem.
State why a modem is required to connect him to the internet.
(2mks)
A modem enables one to connect to the Internet and access information by
transmitting data from one computer to another across telephone lines.
3. The Internet connects millions of computers and
telecommunication devices that have different hardware and
software configurations. For these incompatible devices to be able
to communicate, a protocols? (1mk)
A protocol is a set of rules that govern how tow computers can send and
receive data on a network
Special communication rule that government sending and receiving of
messages by computers on a network
b) Name the two most common protocols for the Internet, and
state their functions.
(3mks)
Transmission control Protocol (TCP); - It governs how data is transferred
from one place to another
Internet Protocol (IP); - It is used to provide routing from one network to
another (i.e. it enable data to be sent& received by the different computers
on a network)
4. a) Explain the following terms as used in internet:
i) Website ( ½ mk)
A collection /group of related Web pages belonging to an
organization or individual
ii) Browse/Surf the web. ( ½ mk)
Moving around and between the Web pages
5. a) What is meant by the term e-learning? (1mk)
This is learning through interaction with special programs on the
computer.
b) A school intends to set-up an e-learning system. List three
problems that are likely to be encountered.
(3mks)
- Lack of capital
- Lack of skilled manpower (required technology to run & support
the e-learning system)
- Spread of computer viruses
- Availability of pornographic material & literature to the students
from the internet.
6. a) Identify the parts of the following e-mail address labelled
A, B, C and D
(4mks)
lat @africaonline . co.ke
A B C D
A Name of the individual or organization
B Name of the host computer in the network on which the e-mail account
is hosted
C Identifies the type of the organization or institution offering a particular
service, i.e. commercial organization
D Name of the country where the site is located, i.e. Kenya.
b) Mention two examples of e-mail software.
(2mks)
- Microsoft Outlook
- Outlook express
- Microsoft exchange
- Eudora
7. Discuss four advantages and two disadvantages that electronic
mails have over regular mails.
(6mks)
Advantages
i) Cheap & economical: -It costs almost nothing to transmit and e-
mail
message over the network. There is no need for stamps, envelopes, etc
ii) Secure;-Access to a user’s mailbox can be restricted by use of a
password
iii) Faster: - The delivery of an e-mail message normally takes
seconds or minutes depending on the distance to the receiver.
iv) Efficient:- A message prepared only once can be sent to several
people
v) Convenient: - with e-mail, one can send his/her messages when
it is
convenient for him/her & the recipients can respond at their convenient
times.
vi) Cheaper in preparing the message: - Most e-mail users accept less
well-formatted messages and slight typing errors are overlooked, unlike in
business letters which are expected to be error-free and formatted according
to certain standards.
Disadvantages
- the initial installation cost is higher
- Messages may be lost before they can be read due to virus
infection
- Messages may not be kept for future reference due to the high
cost of storage (2mks)
8. a) What is a search engine? (2mks)
Google .com
Yahoo. Com
Hotmail.com
Excite.com
9. Briefly describe four factors contributing to Internet access
and growth in Kenya.
(6mks)
i) Cost: - for effective use of internet, a powerful & costly computer
is needed. The cost of installing internet services, telephone bills is also high
hence discouraging internet growth.
ii) Illiteracy: - Many people are computer illiterate and therefore
have no idea of computer internet services.
iii) Inadequate infrastructure: - Lack of infrastructures such as
telephone services in rural areas also hinders growth of internet access.
Lack of electricity discourages people from installing internets in their
offices.
iv) lack of awareness of the existence of such services by the public.
CHAPTER FIVE
DATA SECURITY AND CONTROL
Specific Objectives
By the end of the topic the learner should be able to:
a) Define the terms data security and privacy;
b) Identify security threats on ICT and possible control measures;
c) Identify types of computer crimes.
Content
a.) Definition of data security and privacy
b.) Security threats and control measures
• Threats e.g.
i) virus
ii) unauthored access
iii) computer errors and accidents
iv) theft
• Control measures e.g.
i) anti-virus software
ii) password
iii) user access levels
iv) backups
c.) Computer crimes e.g.
i) trespass
ii) hacking
iii) tapping
iv) cracking
v) piracy
vi) fraud
v i i ) sabotage
viii) alteration
• Detection and Protection e.g.
i) audit trail
ii) data encryption
iii) log fries
iv) firewalls
d.) Laws governing protection of information systems
Introduction
Data and Information Security involves
Protection of data and information against unauthorized access.
Denial of data and information to unauthorized access.
Provision of data and information to authorized users.
Data Security Core Principles
1. Confidentia
2. Integrity CIA
3. Availability
Security Threats and Control Measures
1. Virus
Destructive program that installs itself in the computer
Types of Viruses
1. Boot sector: It destroys the booting information on storage devices.
2. File: It attaches themselves to files.
3. Hoax: They are spread through e-mails.
4. Trojan: It performs undesirable activities in the background.
5. Worms: They stick in the computer memory.
6. Backdoors: Trojan/ worm that allow hidden access to computer files.
Sources of Viruses
Contacts with contaminated system
Pirated software
Infected proprietary software
Freeware and shareware
Updates of software distributed
Symptoms of viruses
Quizzical messages appearing on the screen
Unfamiliar graphics
Keys on keyboard changing
Program taking longer to load
File access taking longer to load
Less memory available is unusual
File programs disappearing mysteriously.
Disk access seem extensive for simple tasks
Control Measures against viruses
Install the latest version of antivirus
Avoid foreign disks
Scanning mails before opening
2. Unauthorized Access
Types
1. Eavesdropping: Tapping into communication channels to get
information.
2. Surveillance: Gathering information and use it for illegal purpose
3. Espionage: Spying to get information to use it to counter or finish
another computer.
Control Measures against Unauthorized Access
Data encryption during transmission
Reinforce check access points
Enforce network security measures
Keep the computer room closed when nobody is using it
Fingerprint identification strategies
3. Computer Error and Accidental Access
Occur as a result of people experimenting with features which they’re
not familiar with or make a mistake by printing sensitive reports and
unsuspecting give them to unauthorized person.
Control Measures
Give various file access privileges
Set up comprehensive error recovery strategy in the organization
4. Theft
Control measures
Employ guards
Burglar proofing
Reinforce weak access points
Install backup storages preferably out of the computer room
5. Computer Crimes
1. Trespass: Gaining access to information without permission.
2. Cracking: Guess work till one discovers weakness in security.
3. Hacking: Intentional breaking of codes and passwords to gain access.
4. Tapping: Sending an intelligent program to the host computer to get
information.
5. Piracy: Making illegal copies of copyrighted software.
6. Fraud: Use of computers to cheat people with the intention of gaining
money or information.
7. Sabotage: Illegal destruction of data and information with the aim of
crippling service delivery or causing great loss to an organization.
8. Alteration: Illegal changing of data and information without permission
with the aim of gaining ormisinforming the authorized users.
Control measures against piracy
Make software cheap enough to increase affordability.
User license and certificates to identify originals.
Set installation passwords to deter illegal installation.
Detection and Protection against Computer Crimes
a) Audit trial: Careful study of an information system in order to
establish or find out all weakness in the system that could lead to
security threats and weak access points.
b) Data encryption: Transforming data in a way that only the sender and
receiver can understand.
c) Log files: Special system files that keep records of events on the use
of the computer and resources in the information system.
d) Firewalls: Software that filters data and information exchanged
between different networks by enforcing the host network access
control policy.
Rules in selection of a good password
A good password should be at least six characters long, including
both letters and numbers.
It should not be easy for somebody to know.
It should be easy to remember.
Reason for Information System failure
1. Hardware failure due to improper use.
2. Unstable power supply as a result of brownout or blackout and
vandalism
3. Network breakdown
4. Natural disasters like floods, etc.
5. Program failure or crash
Difficulties in detection and prevention of computer
crimes
Crime right be complex
It’s not easy to find clear trail of evidence leading to the guilty party
e.g. no fingerprints.
There are no witnesses.
Few people in management and law enforcement know enough about
to prevent crimes.
Causes of Data Loss
Attack by malicious programs like viruses
Data manipulation- alteration and deleting ( sabotage)
Piracy: illegal copying of copyright protected data and information
Data Protection Measures
Encryption
Enforcing data and information access control policies on all
employees and outsides
Reinforce computer room security
Assign user accounts in a networked environment
Install firewalls: They act as security buffers or wall between private
network and other networks
Install security and antivirus software, which should be updated
regularly to protect the computer against malicious programs.
Put in place disaster recovery plan
Avoid downloading programs, games, screen savers and themes you
are not sure of
Enable write protection on removable disks.
Protect the computer against brownouts or blackouts which may
cause physical damage or data loss by using surge protectors and
UPS.
Concerns related to collection and use of private and
confidential data are:
Spreading information without the owners consent or awareness
Spreading inaccurate information
Eavesdropping and taping of information from a communication line
Secretly recording and reporting user activities by using normal
recording devices, spyware and copiers
Laws governing Piracy and Confidentiality
1. No secret databases e.g. in government or private organizations
2. Right to individual access
3. Right of consent- information for one purpose cannot be used for
other purpose without owners consent.
4. Right to correct- individual corrects or amends records of his or her
information.
5. Assurance of reliability and proper use- Data must be reliable.
Laws governing protection of Information
1. Data and information should be kept secure against loss or exposure.
2. Data and information should not be longer than necessary.
3. Data and information should be accurate and up to date.
4. Data and information should not be transferred to other counties
without
owners’ permission.
5. Data and information should be collected and kept for specified lawful
process.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. Differentiate between data security and data integrity.
(2mks)
Data security – the protection of data & information from
accidental or
intentional disclosure to unauthorized person or from unauthorized
modification.
Data integrity-the accuracy & completeness of data entered in a
computer.
Define integrity – the accuracy & completeness of data entered
in a
computer.
2. a) Define the term Computer crime (2mks)
The use of computer hardware or software for illegal activities,
e.g., stealing, forgery defrauding, etc.
A deliberate theft or criminal destruction of computerized data
Committing of illegal acts using a computer or against a
computer system.
b) Explain the meaning of each of the following with
reference to computer crimes.
(7mks)
i) Cracking – use of guesswork over and over again trying to
look for
weak access points in software in order to get access to
data & information
ii) Hacking – Breaking of security codes and passwords to
gain
unauthorized access to a computer system.
iii) Tapping - Listening to a transmission line to gain a copy
of the
message being transmitted.
iv) Piracy –Making illegal copies of copyrighted software, data,
or
information (i.e. copying of software illegally).
v) Data alteration – Illegal changing of stored data &
information
without permission with the aim of gaining or misinforming
the authorized users. Alteration changes the information
inferences from the data.
vi) Fraud- use of computers to conceal information or cheat
other
people with the intention of gaining money or information
vii) Trespass-illegal physical entry to restricted places where
computer
hardware, software & backed up data is kept.
3. Outline four ways of preventing piracy with regard to data and
information.
(4mks)
- Enact & enforce copyright laws and other regulatory frameworks
that
- protect the owners of data & information against piracy
- make software cheap enough to increase affordability
- -use licenses and certificates of authenticity to identify originals
- Set installation passwords that prevent illegal installation of
software.
4. a) What is a Computer virus? (2mks)
This is a program intentionally written to destroy data,
information or the
working of other programs inn a computer system
b) i) State two ways through which computer viruses may be
controlled.
(2 mks)
Running antivirus software programs regularly
Controlling the movement of storage media (e.g. floppy disks,
flash disk, etc)
in and out of the computer room
Disabling the floppy disk drives
ii) Explain how each of the two ways listen in b (i) above
assist in controlling computer viruses.
(2mks)
Antivirus software helps to detect and remove the viruses from
the
computer controlling the movement of floppy disks ensures that
infected
disks are not inserted into computers.
5. Computer systems need maximum security to prevent an
unauthorized access.
State six precautions that you would expect an organization to take
to prevent
illegal access to its computer-based systems. (6mks)
Lock the doors, (i.e. keep the computers in a strong room, which
should remain firmly locked when nobody is using it).
Avoid welcoming strangers into the computer room
Use of personal identification cards
Use of fingerprint identification
Install security alarms at strategic access points so as to alert the
security personnel in case of a break in.
Use of special voice recorders that would be able to analyse the
voice of a trespasser & check against the database containing
the voice patterns of valid users
Enforce data & information access control policies on all
employees to control access to data
Use file passwords to prevent any person from getting access to
the electronic files
Enforce network security measures, e.g. use of firewalls
Encrypt the data & information during transmission
Perform frequent audit trails to identify threats to data &
information.
6. Give four rules that must be observed in order to keep within
the law when
working with data and information.
(4mks)
- It should be kept secure against loss or exposure
- Should not be kept longer than necessary
- Should be accurate and up-to-date
- Should be collected, used & kept for specified lawful purposes
(e.g., data should not be used for unlawful gain)
- The owner of the data has a right to know what data is held by
the person
- or organization having it.
- Data should not be transferred to other countries without the
owner’s
- permission
- Do not collects irrelevant and overly too much information for a
purpose.
7. An individual has a right to demand guarantee to privacy of
personal information stored on a computer. Give three such
types of information. (3 mks)
- Name
- Date of birth
- ID. Number
- Residence
- Address
- Phone number
CHAPTER SIX
DATA REPRESENTATION IN A COMPUTER
Specific Objectives
By the end of the topic the learner should be able to:
a) Explain concepts and reasons for data representation in a computer
b) Define the terms bit, byte, nibble and word
c) Explain types of data representation in the computer
d) Perform binary arithmetic operations.
Content
a.) Concepts and Reasons of data representation
b.) Definition of terms: bit, byte, nibble and word
c.) Types of data representation.
• Number Systems and their representation of integral values
i) Decimal
ii) Binary
iii) Octal
iv) Hexadecimal
'A
• Symbolic representation
i) Binary Coded Decimal Code (BCD)
ii) Extended Binary Coded Decimal Interchange Code (EBCDIC)
iii) American Standard Code for Information Interchange Code (ASCII)
d.) Conversion between binary and decimal
e.) Binary arithmetic operations
• Binary addition
• Binary subtraction
(i) ones complement
(ii) twos complement
Introduction
In this topic we will focus on the classification of computers according to
their functionality:
1. Analog
2. Digital
3. Analog
In digital computers, the user input is first converted t h e n transmitted
as electrical pulses called periodic that can be represented by two
distinct states ON and OFF. The ON state may be represented by a “1”
and OFF state by a “0”. The sequence of the two states results to an
electrical signal that the computer can understand.
Digital Signal Analog signal
In order for data to be exchanged via network the data is first
converted to analog signals during transmission (modulation) then
the analog signals are converted to digital (demodulation).
Three Signal parameters in a periodic
Amplitude (A): The maximum value attained by a pulse in a wave.
Frequency (f): Number of cycles made by the wave in one second.
Periodic time (T): Time taken by signal to complete one cycle
Concept of data representation
Data representation in electric circuits
High voltage (ON) is represented as “1” while a low voltage (OFF) is
interpreted as “0”.
Data representation in magnetic media
The presence of magnetic field in one direction is (1) while absence of
magnetic field is (0).
Data representation in optical media
The presence of light is (1) while absence is interpreted as (0)
Reasons for use of binary digital technology
1. It is the only language the computer can understand.
2. Devices that use binary technology use less energy, are more
reliable and are small in size than analog devices
Bits, bytes, nibble, word, word length
Bit: Binary unit/ Basic unit of data and information in a digital
computer.
Byte: A collection of eight bits.
Nibble: four bits or half a byte.
Word: Combination of logical characters.
Word length: Number of bits of in each word of a computer.
Types of Data Representation
Number system and their representation
Decimal number system
Consists of 10 digit ranging from 0 – 9. It is written as base10. In
decimal number system the magnitude of a number is evaluated
using three parameters:
Absolute value- magnitude of a digit in a number line
Place value/ position value-
Base value
Binary number system
Use two digits “0 and 1”. It is written as base2.
Octal number system
It consists of eight digits ranging from 0 to 7. It is written as base8.
Hexadecimal number system
It consists of sixteen digits ranging from 0 to 9 then letters A to F. A=
10,B= 11 and so on.
Reasons for using Octal and Hexadecimal number
system
A single octal/ hexadecimal digit encodes more than one binary
digit. This is automatic data compression, hence saves space on
storage media.
Instead of transacting long digits of 0’s and 1’s between devices, the
data can be encoded sa octal or hexadecimal to improve
transmission efficiency.
Base Conversion
Decimal to binary
Divide by 2 noting the remainder from bottom. For fractional part
multiply by 2 while noting the remainder from top.
Example
Convert the decimal number 7.562510 into its binary equivalent
Solution
Convert the two parts separately
Integral part
2 7
2 3R1
2 1R1
0 R 1 7 is equivalent
to 1112
Fractional part
Read this digits
0.5625 x 2 = 1.125
0.125 x 2 = 0.250
0.250 x 2 = 0.500
0.500 x 2 = 1.000
Since the product of the last step of the fractional part is zero. We stop
here.
0.5625 x 2 = 0.10012
7.5625 = 111.10012
Binary to decimal:
The integral part
First write the place values starting from the
right hand side. Write each digit under its
place value.
Multiply each digit under its corresponding place
value i.e. 2^ (from 0, 1). Add up the products. The
answer will be the decimal number in base 10. The
fractional part
Multiply each digit under its corresponding place value i.e. 2^ (from -1).
Decimal to octal
Divide by 8 noting the remainder from bottom. For fractional part
multiply by 8 while noting the remainder from top. The answer is to
base 8.
Octal to decimal
The method is similar to converting binary to decimal but using 8 instead
of 2.
Binary to octal
Divide the binary numbers in pairs of three from the right side. Then
multiply each digit by its place
value i.e. 2^. The answer is to base 8.
Octal to Binary
Divide each digit by
2. Decimal to
Hexadecimal
Just like the process done in converting decimal to binary but using 16.
The answer is to base 16.
Hexadecimal to decimal
Like binary to decimal conversion but using 16^. The answer is to Base
10.
Binary to Hexadecimal
Divide into four parts, then multiply each digit by the place value of 2^,
answer to base 16.
Hexadecimal to Binary
Divide each digit by 2. Answer to base 2.
Symbolic Representation using Coding Schemes
Binary Coded Decimal (BCD)
This is a 4 bit code scheme applied in calculators and microwaves
because it makes it easier
to process and display individual numbers on the LCD screen. Standard
BCD is an enhanced BCD in an 8 bit representation scheme and can
4
represent non-numeric characters. Only 64 or (2 ) characters can be
represented.
American Standard Code for Information Interchange (ASCII)
A 7 bit code scheme that only represents 128 characters (28).
Extended Binary Coded Decimal Interchange Code (EBCDIC)
An 8 bit digit character coding scheme used primarily in IBM systems. A
total of 256 or (28) characters can be represented.
Binary Arithmetic Operations
Arithmetic and Logic Unit (ALU) performs subtraction by process
called (complementation). For multiplication and division the ALU
uses a method called (shifting) before adding the bits. Representation
of signed binary numbers
Both positive and negative numbers can be represented in the computer
memory during processing.
Various methods are used to represent negative numbers in the
computer:
1. One’s Complement (1c Method)
The binary bits representing the negative number are negated that in
the number are changed to 0’s and vice versa. Example; -1710
-17 can be represented in binary as a negative as follows
Solution
1710 100012
Therefore -17 011102 (One’s Complement)
2. Two’s Complement (2c Method)
The negative number is represented into binary, then complemented as
in 1c method but a (1) is added to the least significant digit of the
complement value. Example; -1710
Solution
1710 100012
Therefore -1710 011102
01110
+ 1
011112
3. Signed Magnitude
In decimal numbers, signed number has a prefix “+” for a positive
number and (-) for negative number may be represented by prefixing
a digit ‘1’ to the number while a positive number may be represented
by prefixing a ‘0’ ie.
1710 100012 (unsigned)
-1710 To indicate it’s a negative number we add an extra bit
(1) 100012
+1710 To indicate the positive number we add an extra bit
(0)100012
Advantages of Two’s Complement
There are no two ways of representing a zero as in 1c method and signed
magnitude.Effective addition and subtraction can be done even with
numbers that are represented with a sign bit.
Binary Arithmetic
Binary Addition
Binary addition rules
A+B SUM CARR
0+0 0 Y
0+1 1 0
1+0 1 0
1+1 0 1
1+1 1 1
+1
Binary Subtractions
Rules
A-B DIFFERENCE BORROW
0-0 0 0
0-1 1 1
1-1 1 0
1-1 0 0
Subtracting Using One’s Complement
Question: Get the difference in 7-4 using Ones complement.
Solution
Rewrite the problem as 7+ (-4)
Convert the absolute value of 4 to 8 bit equivalent ie.
240
240
11
000000012
Take the one’s complement of 000000012 ie 111111102 which is
the binary representation of -
410
Add the binary equivalent of 7 to 1c of 4 ie.
R
2 7 1
2 3 1
1 00000111
1
+11111110
(1)00000101
2
Looking at the difference of two binary numbers, you will observe
that
1. Has an overflow bit
2. The results shows that the difference between the two
numbers is 000001012. This isn’t true! We know it should be
000001102.
00000101
1
000001102
Subtracting using Two’s Complement
Question: Using 2’c Method work out 710 –
410 in binary form.
Solution
Convert 410 to binary equivalent ie. 000000012
One’s complement of 000000012 is 111111102
Two’s complement of 111111102 + 1 = 111111112
Add the 2’c to the binary equivalent of 710
11111111
+00000111
(1)000001102
000001102
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. With the aid of a diagram, explain the difference between a digital
signal and an analogue signal.
(2mks)
An analogue signal is continuous in nature, while a digital signal is in discrete
form.
Analogue signal- sine wave
Digital signal – rectangular shaped
2. Explain the role of a modem is communication.
(2mks)
A modem converts (modules) data from digital to analogue form to be
transmitted
over the telephone ling. At the receiving end, the modem attached to the
receiving computer converts (demodulates)the analogue signal back to the
original digital form.
3. Explain each of the following computer terminogies as used in data
representation. (4mks)
i) bit - The smallest binary unit, ‘0’ or ‘1’
ii) Byte - A group/collection of 8 bits used to represent a character.
iii) Nibble- a group of four binary digits usually representing a numeric
value.
iv) word - The total number of bits that a single register of a particular
machine can hold
4. State two reasons for using binary in digital technology.
(2mks)
- It is easier to develop devices that understand binary language
- Devices designed using binary logic are simple, more reliable & consume
less
energy.
5. Distinguish between Binary and Octal number systems, and give an
example of each.
(2mks)
Binary (base 2) system has just two states usually called “ON” and “OFF” or
“0”
and “1”, Octal (base 8) system has eight different characters, I.e, 01234567.
6. Perform the following computer arithmetic. In each case, show how
you arrive at your answer.
a) Convert the following Decimal numbers to their Binary equivalent.
i) 4510 (2mks)
2 45 Rem
2 22 1
2 11 0
2 5 1
2 2 1
2 1 0
1 1
4510 = 1011012
ii) 4.75 (1mk)
2 4 Rem
2 2 0
2 1 0
1 1
=0.112
0.75 x 2 = 1.50 1
0.50 x 2 = 1.00 1
= 1002 = 100.112
b) Convert 778 to Binary. (2mks)
Step 1: Convert the octal number given to decimal
(7x81) + (7x80)
56 + 7 = 6310
Step 2: Convert the resulting decimal number to binary
2 63 Rem
2 31 1
2 31 1
2 15 1
2 7 1
2 3 1
1 1
` =1111112
c) Use binary addition to solve the following: 410 +310
(2mks)
Step 1: Convert the decimal numbers to binary.
2 4 Rem
2 2 0
2 1 0
1 1
410 = 1002
Step 2: Add binary notations
1002
112 +
1112 1112
3 Re
2 1 1
1 1
310 = 112
d) Convert 101000000011111112 to its Hexadecimal equivalent.
(2mks)
20 23222120 23222120 232+2120+ 23222120
1 0100 0000 0111 1111
= [1] + [4] + [0] + [4+2+1] +[8+4+2+1]
=[1] +[4] +[0] +[7] +[15]
= 1407F16
7. a) State one use of hexadecimal notation in a computer.
(1mk)
- Helps to manage long binary digit properly
- Helps to improve the processing speed and optimize memory usage.
b) Convert 7678 to hexadecimal equivalent. (2
mks)
Step 1: Convert 7678 to decimal
82 81 80
7 6 7
7x82 + 6 x 81 + 7 x 80
448 + 48 + 7 = 50310
Step 2: Convert 50310 to hexadecimal
503 Rem
16 31 7
16 1 15
1 1
7678 = 1 F716
8. Use One’s compliment to solve the following the following sum: - 5 10
(2mks)
2 5 Re
2 2 1
2 1 0
1 1
9. Perform the following conversions:
(3mks)
(a). 3410 to Binary.
2 34 Rem
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1 1
34 10 =1000102 (2mks)
b) 7.12510 to binary (2mks)
2 7 Rem
2 3 1
2 1 1
1 1
=1112
0.12 x2 0.250 0
0.20 x2= 0.500 0
0.500x2=1.000 1
= 0.0012
= 111.0012 (1mk)
c) 1011012 to a base 10 number.
25 24 23 22 21 20
1 0 1 1 0 1
= (1x25) + (1x23) + (1x22) + (1x20)
=32 + 8 + 4+ 1
=4510
d) 10.112 to decimal (2mks)
= (1x21) + (0x20) (1x2-1) + (1x2-2) 1
=2+0½+¼
= 2. {0.5 + 0.25} = 2.7510 1 (3mks)
e) 20.216 to decimal (2mks)
161 161 160
7 0 2
= [2x161] + [ 0x160] [2x (1/16)]
=32. [0.125]
= 32.12310
f) 7AB16 to decimal (2mks)
162 161 160
7 A B
= [7x162] + [10x 161 ] + [11x160]
=1792 + 160 +11 = 196310
g) 0.111011.0102 to Octal (2mks)
22 21 21 2 0 21
20
000 111 0 1 . 0 1 0
1
= {4 + 2+ 1} {2+1} {2 +1} {2}
=73.28
10. Convert 57.410 to its Octal equivalent (2mks)
8 57 Rem
8 7 1
8 7 1
2 7 7
0.4 x 8 = 3.2 3
0.2 x 8 = 1.6 1 = 0.318
=718 71.318
11. a) Perform the following Binary arithmetic:
i) 11100111 + 00101110 (1mk)
11100111
00101110 +
(1) 00010101 =1000101012
(1 mk)
ii) 101012 – 110+2 (1mk)
101012
1102
11112
b) Use Two’s compliment to subtract 101 from 1000:
(2mks)
Step 1: change the values to 8 binary digits.
000010002 - 000001012
Step 2: Add the binary equivalent of the first value to the Two’s
complement of
the second value
00001000
11111011 +
(1)00000011 =1000000112 (2mks)
12. Convert 7AE16 to a decimal number.
(2mks)
Step 1
162+ 161 160
7 A E
=[7x162] + [12x161] + [1x160]
= 3840 + 192 +1 = 403310
Step 2
2 4033 Rem
2 2016 1
2 1008 0
2 504 0
2 252 0
2 126 0
2 63 0
2 31 1
2 15 1
2 7 1
2 3 1
2 1 1
1 1
403310 = 1111110000012
14. Write the following abbreviations in full:
(4mks)
i) BIT -Binary digit
ii) BCD -Binary Coded Decimal
iii) ASCII -American Standard Code for information Interchange
iv) EBCDIC -Extended Binary Coded decimal Interchange Code
CHAPTER SEVEN
DATA PROCESSING
Specific Objectives
By the end of the topic the learner should be able to:
a) Define the terms data, information and data processing;
b) Describe data processing cycle;
c) Explain types of errors in data processing;
d) Explain the various methods of data processing;
e) Describe data integrity;
f) Describe a computer file;
g) Describe types of computer files;
h) Describe file organization methods;
i) Describe the various data processing modes.
Content
a.) Definition of the terms data, information and data processing
b.) Data processing cycle
• Data collection
i) stages of data collection
ii) methods of data collection
• Data input
• Processing
• Output
c.) Description of errors in data processing e.g.
• Transcription errors
• Transposition
d.) Data processing methods
• Manual/conventional
• Mechanical
• Electronic
e.) Data Integrity
• Accuracy
• Timeless
• Relevance
f.) Computer files
• Elements of computer file
• Logical and physical files
g.) Types of computer processing files e.g.
• Master
• Transaction
• Report
• Sort
• Backup
• Reference
h.) File organization methods
• Sequential
• Random/direct
• Serial
• Indexed sequential
i.) Electronic Data processing modes
• On-line
• Distributed
• Time-sharing
• Batch processing
• Multi-processing
• Multi programming/multi-tasking
• Interactive processing
• Real-time
Introduction
Definition
This is the process of transforming data into a meaningful output i.e.
information.
Data Processing Cycle
Data Collection
Data Data Input
Output
Processing
Data collection/ Information gathering/ Fact Finding
Methods involved in data collection are; interviews, questionnaires,
observation or direct data capture. Stages involved
i. Data creation: the process of putting together facts
in an organized format. ii. Data transmission:
converting the collected data to something meaningful.
iii. Data preparation: conversion of data from source document to
machine readable form.
iv. Media conversion:
v. Input validation: check and remove errors
vi. Sorting: arranging data in an organized format.
Data Input
This is the process where the collected data is converted from
human readable form to machine readable form.
Data Processing
This is the actual transformation of input data by the control
processing unit (CPU) to a more meaningful output or information.
Data Output
This is the final activity of data processing cycle which
produces the information. Ways of data dissemination
Electronic presentation over media or television
Distribution of hard copies
Broadcasting the message over the internet
Mobile phones
Description of Errors in Data Processing
Types of Data Processing Errors
Transcription errors
Errors that are made during data entry. Types of transcription errors are;
a) Misreading errors-Occur as a result of incorrect reading of
source document by the user like typing S instead of 5.
b) Transposition errors- Occurs as a result of incorrect
arrangement of characters or incorrect order of characters.
Example, instead of typing 567, typing 576.
Computational errors
Result from an arithmetic operation that doesn’t produce the required
output. Types;
a) Overflow errors- Occur from a calculation that is too large to be
stored in allocated memory space.
b) Truncation errors- result from real number that has a long
fractional part which cannot fit in
the allocated memory. Example 0.75535322 0.755
(truncated to four digits)
c) Rounding errors- from raising or lowering a digit in a real
number to the required rounded number. Example 7.56
7.6
Algorithm or Logical errors
Result from logarithmic design.
Data Integrity
The accuracy and completeness of data intended in a computer or
received from the information system. Data integrity is determined by;
1. Accuracy: whether the data is true or false.
2. Timeliness: This relays the availability of data in time or whether it
is already outdated.
3. Relevance: Consider whether the expected output meets the
processing cycle requirements, the daily operations and the
decision making.
4. Audibility (Verifiability): Ability of the user to check the
accuracy and completeness of information.
Minimizing threats to data integrity
Using error detection and correction software when transmitting
data.
Using devices that capture data directly from source e.g. cameras
Controlling the access to data by enforcing security measures.
Back-up data preferably on external storage media.
Design user interface that minimize chances of invalid data entry.
Data Processing Methods
1. Manual data processing
2. Mechanical data processing
3. Electronic data processing
Factors determining the Methods of Data Processing
Size and type of business
Timing aspects
Link between applications
Computer Files
Definition: A collection of related records that give a complete set of
information about a certain data
item.
Advantages of a computer files
Information takes less time than manual system
Enhances integrity and reduces item duplication
Offers faster data access and retrieval
It’s much easier to update and modify easier
Elements of a Computer File
Character- any single entry
Field- a single character or a collection of character that represent
a single piece of data
Records- A collection of related fields that represent a single entity
File
Ways of viewing a file
1. Logical: the file is viewed in terms of its content and the
processing to be carried upon.
2. Physical: the file is viewed in terms of its appearance and how
processing is made possible.
Types of Computer Files
1. Master: Main permanent or semi permanent file containing record
of particular item.
2. Transaction: Input output file holding incoming and outgoing
data and also updates master file.
3. Reference: Permanent or semi-permanent used for look up
purposes and it contains static records.
4. Sort: File created from existing transaction/ master file.
5. Back up: Duplicate existing files to supplement the
operational files incase of any loss reason.
6. Report: They contain extracted records from master file.
File Processing Methods
Updating: Changing data in master file to reflect the current
status.
Reference: Happens when it is made to particular records to
ascertain what is contained there in but doesn’t alter the content.
Sorting: Entails arranging of file contents into a predetermined
sequence of the key field which occupy the same position.
Merging: Process of combining the contents of master file from a
file.
Matching: Input files records are matched or compared to
ensure that records exist in both files.
Summarizing: Records of interest from the file are accumulated
to form a record in an output file.
Searching: Entails looking for the record of interest from the file.
File Updating
Hit rate: Used to describe the rate of processing of a master file in
terms of its active records
Volatility: Frequency with which records are added to the
file or deleted from. If the frequency is high then the file is
said to be “volatile” otherwise “static”.
Size: Refers to the amount of data stored in the file. Its expressed
in terms of the total number of records in the file.
File Organization Methods
Sequential file organization
Records are stored and accessed in a particular order sorted using a key
field. The key field is used to search for particular record. Searching
commences from the beginning of file and proceed to the tail of the file
till the record is reached e.g. in magnetic tapes.
Advantages
Simple to understand the approach
Easy to organize, maintain and understand
In expensive input output media and devises are used
Disadvantages
Entire file must be accessed even when the activity rate is very
low.
Random enquiries are impossible to handle.
Data redundancy is typically high.
Random or direct file organization
Records are stored randomly but accessed directly. A record key is
issued to determine where the record is stored on storage media e.g.
in magnetic and optical disks.
Advantages
Records are quickly accessed
File update is easily achieved
Disadvantages
Data may be accidentally erased or overwritten unless precaution
taken
Expensive hardware and software resources are required
Relative complexity of programming
System design around is complex and costly
Serial file organization
Records are laid out contiguously one after the other in no particular
sequence. The records are stored one after another in the same order
they come into the file and there exists no relationship between
contiguous records e.g. magnetic tapes.
Indexed sequential file organization
It is similar to sequential method only that an index is used to enable
the computer to locate individual records on the storage media e.g.
magnetic disks.
Advantages
Resources can be accessed sequentially or randomly
Records are not duplicated
Accessing of records can be fast if done randomly
Disadvantages
Storage media is rather expensive
Accessing records sequentially is time consuming
Processing records sequentially introduce redundancy
Elements of Data Processing Modes
1. Online: Data is processed immediately received. The computer is
connected to data input unit via communication link and stores the
results.
Application
Banking
Stock
exchange
Stock
control
Water/
electricity billing
Advantages
Files are maintained up to date.
Information is readily available for current decisions.
Files enquiries are possible through terminals (workstations).
Disadvantages
Systems are complex to develop.
Costly in terms of hardware, software, storage media e.t.c.
2. Real-time: Process incoming data as soon it occurs, updating
transaction file and giving immediate results.
Application
Air reservation
Hotel reservation
Chemical plant processing
Advantages
Information is readily available for instant decision making.
Provides immediate control.
Fast and reliable information.
Disadvantages
Requires complex and expensive operating system.
Aren’t easy to develop.
Require Front End Processors (FEPs) to relieve the central
processor.
3. Distributed: Divides processing task to two or more computers
on separate sites connected by data transmission media.
Application
Banks where customers can be served from different branches but
information is updated at head branch.
Advantages
Less risk to system breakdown.
Incase of data loss, only a small portion of data is lost.
Reduces the load on the host computer hence faster
processing.
Disadvantages
Requires more expensive CPUs.
Operating system is complex and more difficult to operate.
4. Timesharing: Terminals are connected to the central computer
are given access to the CPU apparently the same time.
Application
Bureau
Companies
Learning institutions
Advantages
Better services to users, for information/ output are fast.
File enquiries possible since files are held online.
User interaction possible through terminals.
Disadvantages
User has no control over the central computer.
Not reliable with regard to data
security. Response time is slow wher
there are many tasks.
5. Batch: Data is accumulated as a group (batch) over a specified
period of time then processed
Application
Payroll processing
Advantages
Simple to develop
Timing reports is not a necessity
Unit cost of processing is low
Disadvantages
Time lag between origination of transaction and the
information available
Late information is not suitable in situations when instant
decisions are required.
Difficult to provide the desire priority schedule
6. Multiprocessing: Different processors are connected to the
main processor like in banks to update transactions made.
7. Multitasking/ multiprogrammining: Capable of handling
more than one task but the processes one at a time.
Advantages
Increase productivity of computer reducing CPU idle time
Reduces incidence of peripheral bound operations
Disadvantages
Requires more expensive CPUs
More sophisticated software is required to maintain data
integrity.
8. Interactive: Continuous communication between the user and the
computer.
Advantages of Electronic Processing
1. Quick processing especially where all required data is available
2. Availability of data and information digitally
3. Distance between entities that are processing data is made non-
significant
4. Support for information sharing and collaboration
Disadvantages of Electronic information Processing
1. Security of data can be compromised during storage or while
in transept on networks if appropriate measures are not taken
2. Lack of legal framework in many countries that should
support electronic processing activities
3. Lack of ICT skills among many knowledge workers to support
electronic data processing
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. With an aid of a diagram, explain the stages of the data
processing cycle.
(6mks)
Data
Collection
Data Input
Data
processing
Output of
‘information’
Data collection involves getting the data/facts needed for
processing from the point of its origin to the computer
Data Input- the collected data is converted into machine-
readable form by an input device, and send into the machine.
Processing is the transformation of the input data to a more
meaningful form (information) in the CPU
Output is the production of the required information, which may
be input in future.
2. Clearly differentiate between data collection and data capture.
(2mks)
Data capture is the process of obtaining data in a computer-
sensible form for at the point of origin (the source document
itself is prepared in a machine-sensible form for input)
Data collection involves getting the original data to the
‘processing centre’, transcribing it, converting it from one
medium to another, and finally getting it into the computer.
3. Outline the 5 stages of data collection.
(3mks)
Data creation
Data transmission
Data preparation
Media conversion (i.e, conversion of data from one medium to
another
Input validation
Sorting
4. a) Explain the relevance of the term garbage in garbage out
(GIGO) in reference to errors in data processing.
(1mk)
The accuracy of the data entered in the computer directly determines the
accuracy of the information given out.
b) Give and explain two transcription and two computational
errors committed during data processing.
(8mks)
Misreading errors: -they occur when the user reads source
document incorrectly, thus entering wrong values, e.g. a user
may confuse 5 in the number 586 with S, and type S86 instead.
Transposition errors: - they result from incorrect arrangement of
characters (i.e., putting characters in the wrong order especially
when keying data onto a diskette), e.g. the user may enter 396
instead of 369 computational errors
Overflow errors: -An overflow occurs if the result from a
calculation is too large to fit in the allocated memory space, e.g.,
if the allocated memory space is able to store an 8-bit character,
then an overflow will occur if the result of the calculation gives a
9-bit number.
5. a) Define the term data integrity. (2mks)
Data integrity refers to the dependability, timeliness, availability, relevance,
accuracy & completeness of data/information
b) State three ways of minimizing threats to data integrity.
(3mks)
Backing up the data on external storage media
Enforcing security measures to control access to data
Using error detection & correction software when transmitting
data
Designing user interfaces that minimize chances of invalid data
being entered.
6. a) briefly explain real-time processing. (2mks)
Airline reservation systems
Theatre (cinema) booking
Hotel reservations
Banking systems
Police enquiry systems
Chemical processing plants
Hospitals to monitor the progress of a patient
Missile control systems
c) Give three advantages and two disadvantages of a real-time
system. (5mks)
Advantages
Provides up-to-date information
The information is readily available for instant decision-making
Provides better services to users/customers.
Fast &reliable
Reduces circulation of hardcopies.
Disadvantages
Require complex Os & are very expensive
Not easy to develop
Real time systems usually use 2 or more processors to share the
workloads, which is expensive.
Require large communication equipment.
7. Differentiate between CPU bound jobs and I/O bound jobs.
(2mks)
CPU bound jobs require more of the CPU time to process these jobs. Most of
the work the I/O devices perform is on the Input; and Output; hence, they
require very little CPU time.
8. Most companies are now shifting from the use of geographically
distributed personal computers. This method of data processing is known as
Distributed Data Processing (DDP)
Required:
i) Name any threes computing resources that can be distributed.
(3mks)
-CPU (Processors) time
-Files
-Application software
-Data/information/messages
-Computer processing power
-Memory (computer storage)
-Input/Output devices, e.g. printers
-communication devices/communication ports
ii) Name four examples of industries and business organizations
that extensively use distributed processing systems.
(4mks)
Banks
Computerized retails stores, e.g. supermarkets
Learning institutions with many departmental offices
Bureaus or communication cyber cafes
Airline reservation systems
iii) List down two benefits and three risks that might be
associated with the distributed data processing system.
(5mks)
Benefits
The load on the host computer is greatly reduced
The use of low cost minicomputers minimizes the cost in data
processing
Delays in data processing are reduced
Provides better services to the customers
There is less risk in case of system breakdown
The design & implementation of the system is less complex due to
decentralization
The level of expertise required is less.
Risks
Data duplication is very common
Programming problems occur with microcomputers &
minicomputers
Security threats, i.e. the data & information sent one the network
from one place to
another can be tapped, or listened to by unauthorized parties
More training is needed for the users involved
It is expensive due to the extra cost of communication
equipment.
9. a) Explain the concept of multi-programming
(2mks)
A Multi-programming system allows the user to run 2 or more programs, all
of which are in the computer’s main memory, at the same time.
b) Give two benefits that are derived from multi-
programming
(2mks)
It increases productivity of a computer
Reduces the CPU’s idle time
Reduces the incidence of peripheral bound operation
10. State at least four advantages of storing data in computer files
over the manual filing system
(4mks)
Stored information takes up less space
Easier to update and modify
Provides faster access and retrieval of data
Reduces duplication of data or stored records
Cheaper
Enhances data integrity (i.e. accuracy and completeness)
11. Distinguish between logical and physical computer files.
(2mks)
A logical file is viewed in terms of what data items it
contains and what processing operations may be
performed on the data
A physical file is viewed in terms of how the data items
found in a file are arranged on the storage media and how
they can be processed.
12. Arrange the following components of the information system
data hierarchy in ascending order of complexity:
Field, Database, Byte, Record, Bit, and file
(4mks)
Bit Byte Field Record File
Database
13. In a computer based information system, state the purpose of
the following files, and give one example where such a file may be
required in a school.
(8mks)
i) Report file- It contains a set of relatively permanent records extracted
from the data in a master file.
They are used to prepare reports, which can ve printed at a later date,
e.g. report on student’s class performance in the term, extract of students
who have not cleared their school fees, report on absentees.
ii) Backup file- Used to backup data or to hold duplicate copies of
data/information from the computer’s fixed storage or main file for security
purposes e.g. a copy of all the students admitted in a school fees, report on
absentees
iii) Reference file - Used for reference purposes. It contains records that
are fairly permanent or semi-permanent, e.g. Deductions in caution money,
wage rates, tax deductions, employees address, price lists etc.
iv) Sort file – used to sort/rank data according to a given order, e.g.
ranking position in a class of students.
14. a) What is file organization?
It is the way records are arranged (laid out) within a particular file or any
secondary storage device in a computer
b) Differentiate between the following file organization
methods: (4mks)
i) Sequential and serial
In sequential file organization, records are stored in a sorted
order using a key field, while in serial; the records are stored in the order
they come into the file, and are not sorted in any way.
ii) Random and indexed-sequential
In random file organization, records are stored in the file randomly and
accessed directly, while in indexed –sequential, the records are stored
sequentially but accessed directly using an index.
CHAPTER EIGHT
ELEMENTARY PROGRAMMING PRINCIPLES
Specific Objectives
By the end of the topic the learner should be able to:
a) Define Programming;
b) Describe the various levels of programming languages;
c) State the advantages and disadvantages of each level of the programming
language;
d) Define the terms assembler, compiler, interpreter, source program and
object
program;
e) Describe the stages of program development;
f) Describe the program control structures;
g) Define and develop algorithm, pseudo-code and flowchart.
Content
a.) Definition of Programming
b.) Levels of programming languages
• Low level language
i) Machine
ii) Assembly
• High Level languages
i) Third Generation Languages (3GLS)
ii) Four Generation Languages (4 GLs)
iii) Object Oriented Programming (OOPs)
iv) Internet (scripting) Programming Languages
c.) Advantages and disadvantages of low and high level languages
d.) Description of terms
i) assembler
ii) compiler
iii) interpreter
iv) source program
v) object program
e.) Program development
• problem recognition
• problem definition
• program design
• program coding
• program testing
• implementation
f. ) Program Control Structure
• Sequence
• Selection
• Iteration (looping)
g. ) Definition and development of Algorithm
• Pseudo-code
• Flow chart
Introduction
Program: A set of instructions
Programming: The process of developing computer instructions used to
solve a particular task.
Programming language: Special list of symbols that can be translated
into machine readable form by a computer when in a particular
sequence or order.
Terms used in Programming
Source program: Program code that programmers enter in the
program editor window that is not yet translated into machine
readable.
Object code: Program code that is in machine readable form
Translator: Language processor that converts source program into
object code.
Assembler: Translates assembly language into machine language
that computer can understand.
Interpreter: Translates source program line by line allowing CPU to
execute one line before translating
Compiler: Translates the entire source program into object code.
Encapsulation: Process of having data and functions that operate on the
data within an object.
Interpreter Compiler
Translates source Translate entire source
program one code at once for
statement at
Translates a time code
program execution
Object code can be saved on a
each time it storage
is run hence slower the media and run as required
Levels of Programming
Low Level
They were easy, understandable and hardware oriented hence not
portable.
1. First Generation Language (1st GLs)/ Machine Language:
they are written using binary logic.
nd
2. Second Generation Language (2 GLs)/ Assembly Language:
used MNEMONICS (symbolic operation codes, shortened two or three
words)
High Level
They are very close to human language and are machine independent,
hence they are portable
rd
1. 3 GLs (Structured procedural): Pascal, Formula Translator
(Fortran), COBOL,BASIC, Ada.
2. 4th GLs: They present programmers with programming
tools. Examples; Visual Basic, Visual Delphi, Visual COBOL.
th
3. 5 GLs: They depict human like intelligence- PROLOG, MERCURY,
LISP and OCCAM.
4. Object Oriented Programs (OOP): Simula, C++, Java and Small
Talk.
5. Web scripting: Java, php (hypertext preprocessor), Visual Basic
Script.
Advantages and Disadvantages of Low and High Level
Advantages and Disadvantages of Low Level
Advantages
1. Easily understood by the CPU
2. Processed faster
3. Stable and hard to crash
Disadvantages
1. Difficult and cumbersome to use and learn
2. Require highly trained personnel
3. Debugging is difficult
4. Machine dependent
Advantages and Disadvantages of High Level
Advantages
1. They are portable
2. Friendly and easy to use and learn
3. Flexible enhancing the creativity of programmers
4. Debugging is easier
Disadvantages
1. Easily crash
Program Development Stages
1. Problem recognition
2. Problem definition
3. Program design
4. Program coding
5. Program testing and debugging
6. Implementation and maintenance
Problem recognition
Reasons for development of a computerized program:
Problem or undesirable situation that prevents an individual from
achieving their goals.
Opportunity to improve the current system.
A new directive, given by the management requiring a change in
status quo.
Problem analysis
Determining or defining the likely input, processing activities and the
expected output.
Program Design
Actual development of program’s processing or problem solving logic
called the algorithm.
Program Coding
Process of converting a designed model into its equivalent program using
programming language.
Program Testing and Debugging
Correcting errors in the program being developed and making sure it
meets the requirements.
Types of errors:
a) Syntax errors: Arise from the improper use of language rules e.g.
punctuation and spelling.
b) Logic errors: They are not detectable by translator but halt the
program when running it.
Method of Error Detection
1. Desk checking (dry run): correction is done on papers.
2. Debugging utilities: errors are corrected before execution.
3. Test data: trial runs by programmers.
Reasons for testing the system before implementation
1. Ensure that all the system programs are error free
2. Guarantee that the end user can successfully interact with the system
3. Establish whether components of the system interface correctly
4. Determine the ruggedness of the system
5. Ensure that operations group has adequate group has
documentation and instructions to operate the system properly
Implementation and Maintenance
Implementation: Actual delivery and installation of the new
program ready for use. Review and maintenance
Program Documentation
Writing of support materials explaining how program can be used by
users, installed by experts by operations and modified by
programmers:
1. User oriented- enables the user to use the program easily and
quickly.
2. Operator oriented: help to install and maintain the program.
3. Programmer oriented: provide necessary technical information
for future modification of programmers.
Benefits of program documentation
Help during future modification of a program
Help other programmers to understand the code statement
User learns how to use the program quickly
Help in installing and maintaining the program.
Algorithm Development
Pseudocode
Guidelines for designing a good Pseudocode
1. The statement must be short, clear and reliable
2. The statements must not have more than one meaning i.e. should be
unambiguous
3. The Pseudocode lines should be clearly outlined and indented clearly
4. A Pseudocode should show clearly the start and stop of
executable statements and the control structures (to be discussed
later in the section).
5. The input, output and processing statements should be clearly
stated using keywords like PRINT, READ, INPUT etc.
Program Flowcharts
Common symbols used in drawing program flowcharts are:
Start/ Ellipse: denotes the beginning and end of the
Stop program algorithm. Parallelogram: used to
denote an input or output operation.
Input/
output Rectangle: Indicates that a processing or data
transformation is taking place.
Proces Rhombus: Used to specify a condition. A condition
s must evaluate to a Boolean value (True or false)
for the program to execute the next instructions.
Decisi
on
Connector: Used as a connecting point or interface
Conne for arrows coming fro different directions
ct or
Arrow: Used to indicate the direction of flow of the program
logic.
Advantages of Flowcharts
Gives programmer good visual reference of program function.
Serves as a program or system document.
It is easy to trace through from the start to find the action resulting
Program Control Structure
Blocks of statement that determines how statements are to be
executed; sequence, selection and iteration.
Sequence
Computer read instructions from a program file stretching from the
first top lines and proceding document one-by-one to the end-
sequential program execution.
Selection
Execution of statement depends on a condition that returns true or false.
There are four types
IF…THEN
Only one IF option is available. All others are ignored during program
execution. General format: IF <condition> THEN
Statement;
END IF
IF…THEN…ELSE
Only two Ifs are the available option. The
general format: IF <condition> THEN
Statement;
ELSE
Statement;
END IF
Nested IF selection
There two or more If options and statements to be conditioned to
make a selection. General format; IF <condition> THEN
Statement
ELSE
IF <condition>
THEN Statement
ELSE
Statement
END IF
END IF
Case Selection
An alteration to Nested If especially where there are several options to
choose from. The flowchart not different from Nested IF.
CASE X OF
Label 1: statement 1
Label 2: statement 2
Label 3: statement 3
.
.
.
Label n: statement n- 1
ELSE
Statement n
END CASE
Iteration/ Looping
Repetition designed to execute the same block of code again and
again till a certain condition if fulfilled.
The WHILE…DO loop
General format
Pseudocode Flowchart
While
<condition> Do Statements
Statement
Condit
End while
ion Yes
?
No
End Loop
The REPEAT…UNTIL loop
General format
Pseudocode Flowchart
Repeat
Stateme Statements
nt
Until
<condition>
Condition
? Yes
No
End Loop
The FOR loop
General Format
1. Format for the FOR loop that counts from the lower limit
FOR loop variable= Lower limit To
Upper limit DO Statements
End FOR
2. Format for the FOR loop that counts from the upper limit down to the
lower limit
FOR loop variable= Lower limit Down to Lower limit Do
Statements
End For
Flowchart extract for a FOR loop that counts upwards
Loop variable= Lower limit=
Lower limit Loop variable
+1
Statement
N
Condit
o
ion?
Yes
Flowchart extract for a FOR loop that counts
downwards
Loop variable= Upper Limit=
Upper Loop variable +
Limit 1
Statement
N
Condit
o
ion?
Yes
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. Define the following terms:
(3mks)
i) Computer Program
A computer program is a set of instructions that directs a
computer on how to process a particular task.
ii) Programming
Programming is the process of designing a set of instructions which can be
used to perform a particular task or solve a specific problem.
iii) Programming language
A programming language is a language (set of instructions) used
in
writing of computer programs. The language must be understood by the
computer for it to execute.
2. Explain the meaning of the following as used in computer
programming. (2mks)
i) Syntax -these are rules that govern the arrangement of
commands in a particular language
ii) Semantic - the meaning attached to every command in a
particular language.
3. a) What are low-level languages? Give their features.
(4mks)
These are the basic programming languages, which can easily be understood
by the computer directly, or which require little effort to be translated into
computer understandable form.
Features:
They are machine hardware-oriented
They are not portable, i.e. , a program written for one computer
cannot be installed and used on another computer of a different
family
They use Mnemonic codes
They frequently used symbolic addresses.
b) Give three advantages of high-level languages as opposed to
low-level
languages (3mks)
Easier to learn, understand and use
Easily portable, i.e. they can be transferred between computers
of different families and run with little or no modification
The programs are short & take shorter time to be translated
More flexible, hence they enhance the creativity of the
programmer and increase his/her productivity in the workplace
Easier to debug (correct errors)& maintain
Easy to modify
They are user-friendly & problem –oriented, hence can be used
to solve problems arising from the real world.
4 a) Examine two features of fourth generation languages
(4GLS) (2mks)
Have programming tools such as command buttons, forms,
textboxes, etc
Use of mouse pointer to drag an object on a form
Use application generators to generate program codes
Can enquire & access data stored in database systems
b) List three examples of fourth generation programming
languages. (3mks)
Visual Basic
Delphi Pascal
Cobol
Access Basic
5. Describe 5 factors to be considered while choosing a
programming language. (5mks)
i) The availability of the relevant translator
ii) Whether the programmer is familiar with the language
iii) Ease of learning and use
iv) Purpose of the program, i.e. application areas such as education,
business, scientific, etc.
v) Execution time: High –level languages are easy to read, understand &
develop; hence, they require less development time. Machine code &
Assembly languages are relatively difficult to read, understand and develop;
hence, they are time-consuming.
vii) Popularity: - the language selected should be suitable and /or
successful in the market with respect to the problems to be solved.
viii) Documentation: - It should have accompanying documentation
(descriptions on how to use the language or maintain the programs written
in the language
ix) Availability of skilled programmers: - The language selected should
have a pool of readily available programmers to ease the programming
activity, and reduce development time.
6. Differentiate between the following as used in programming:
a) A source program is a program that is not yet translated;
Object code is a program that is in machine readable form obtained from a
source program by use of a translator
b) Flowchart and pseudo code.
(2mks)
A flowchart is a graphical representation of step-by-step processing logic of a
program, while pseudo code is a set of structured English like statements
that describe the processing steps to be followed to solve a given problem.
7 What do the following abbreviations stand for:
(2mks)
i) FORTRAN - formula Translator
ii) COBOL - Common business oriented language
iii) OOP - Object Oriented Programming
8 a) Define a Language translator
(1mk)
This is a language processor such as an assembler, interpreter, or compiler
that converts the source program into object code.
b) Give two advantages of compiling a program rather than
interpreting
it. (2mks)
- Interpreters translate the source program one statement/line at
a time, Compilers translate the entire source code at once before
execution.
- Interpreters translate the program each time it runs, hence
slower than compiling. Complied programs can be saved on a
storage media. It does not require any further translation any
time the program is run, hence executes faster than interpreted
programs.
- Interpreter translation takes less memory, while compiled
programs require more memory as the object code files are
larger.
9. Name the stages of a program development in their logical
sequence. (31/2)
Problem recognition
Problem definition
Program design
Program coding
Program testing and debugging
Program implementation and maintenance
Program documentation
10. (a) Give two reasons why it is necessary to have a program
design. (2mks)
It identifies the exact order in which the processing tasks will be
carried out so as to solve the problem
It provides for easy maintenance & modification
b) State two requirements during computer program testing.
(2mks)
Compilation to check the whole program if there are any errors
Debugging the program
11. a) State any four rules/guidelines that should be followed
when drawing program flowcharts.
(4mks)
A flowchart should have only one entry (starting point) and
one exit point
The flowchart should be clear, neat and easy to follow
Use the correct symbol at each stage in the flowchart
The flowchart should not be open to more than one
interpretation
Avoid overlapping the lines used’ to show the flow of logic
as this can
create confusion in the flowchart
Make comparison instructions simple, i.e , capable of
Yes/No answers
The logical flow should be clearly shown using arrows
Ensure that the flowchart is logically correct & complete
b) Give one advantage of pseudo codes over flowcharts
(1mk)
Pseudo codes are easier to write and understand
They are convenient especially for long algorithms which
span over several pages.
12. Explain the following types of computer program errors:
a) Syntax error (2mks)
These are programming errors/mistakes that occur due to incorrect/improper
use of the grammatical rules of a particular language
E.g., Punctuation mistakes, (i.e. omitting a comma or a semicolon), improper
naming of variables, wrong spellings of user defined and reserved words.
b) Logical Errors
These are errors that occur as a result of bad program design
Logical errors relate to the logic of processing followed in the
program to get the desired results e.g. they may occur as a result of misuse
of logical operators.
c) Run-time (execution) error. (2mks)
Run-time (execution) errors. They occur when the programmer develops
statements, which are not projecting towards the desired goal. Such
statements will create deviations from the desired objectives
13. Explain four error detecting methods in program development
(4mks)
i) Dry running (desk checking); - checking a program for errors by
making the corrections on a paper before entering it in the program editor.
ii) Translator system checking: - It involves the running of a
translator
program (e.g., compiler or Interpreter) after entering the set of coded
instructions in order to detect any syntax errors.
iii) Use of debugging utilities: - It involves supplying data values to the
program for which the answer is known. If the program does not give the
correct answers, it shows that it contains some errors.
14. Describe three types of program documentation in reference to
programming (6mks)
i) User-oriented documentation: - It is a manual that enables the
user
to learn how to install and use the program
ii) Operator –oriented documentation: - It is a manual that enables the
user to learn how to install and use the program.
iii) Programmer-oriented documentation: - This is a detailed
documentation written for skilled programmers. It provides the necessary
technical information to help the programmer in future modification of the
program.
15. a) State three types of control structures use in
programming. (3mks)
-Sequence
-Selection/decision
-Iteration/looping
b) Draw a simple flowchart diagram to illustrate the FOR-DO
structure.
(3mks)
Boolean
Expressio Stop
n
Counter
16. a) Define the term Increment
structured programming
(2mks)
This is the technique of program design that allows large programs can be
broken down into smaller components/sub-programs called modules or sub-
routines), each performing a particular task.
b) List any two characteristics of Structured programming.
(2mks)
Modules or sub-routines
Use of control structures in problems solving
c) Give two benefits of structured programming.
(2mks)
Breaks (splits) a large program into smaller sub-programs
(modules) each able to solve a particular/specific problem
Structured programs are easier to read
They are easy to code and run
Programs are easy to modify because; a programmer can change
the details of a section without affecting the rest of the program
Modules are easy to test & debug (i.e correct mistakes/errors).
This is because; each module can be designed, coded & tested
independently
It is easier to document specific tasks.
Use of modules can be named in such a way that, they are
consistent & easy to find in documentation
It is flexible.
17. a) Define the term selection to program control structures.
(1mk)
Selection refers to a situation where further program execution depends on
making a decision from two or more alternatives.
b) List four selection control structures used in writing a
program (4mks)
IF…THEN
IF…THEN…ELSE
Nested IF
CASE …OFF
18. a) Name the control structure depicted by the following
diagram (2mks)
Selection control
structure, e.g. If –then –else
b) Name the symbols
labeled A and b in the diagram
above. (2mks)
A-Decision box
B- Process symbol
19. Define the term ARRAY as used in computer programming.
(1mk)
An array is a data structure that stores several data items of the
same type.
20. Draw a simple flowchart diagram showing:
(2mks)
a) IF….THEN…. selection
Continuation of program
b) IF...THEN…ELSE
selection (2mks)
c)
REPEAT…UNTIL loop (4mks)
21.
a)
With
aid of
a
pseudo code and a flowchart, design an algorithm that would:
Prompt the user to enter two number X and Y
Divide X by Y. However, if the value of Y is 0, the program should
display an error message “Error: Division by zero”.
START
PRINT (“Enter two numbers, X and Y”) Input X, Y
IF Y=0 THEN
PRINT ‘Error: division by zero’
ELSE
Quotient = X/Y
PRINT X, Y, Quotient
ENDIF
STOP
Flowchart
b) Write down the assignment statement used in the algorithm
above. (2mks)
Quotient=x/Y
c) Which program control structure is depicted in the algorithm?
(1mk)
If …then...Else
22. Draw a flowchart for a program that is to prompt for N
numbers, accumulate the sum and them find the average. The
output is the accumulated totals and the average.
23. Write a pseudo code
that reads temperature for each day in a week, in degree Celsius,
converts the celcius into Fahrenheit and then calculate the average
weekly temperatures. The program should output the calculated
average in degrees Fahrenheit.
START
INPUT temperature in 0C
SET Initial day to 0
WHILE Initial day <=6 DO
F = 32 + (9c/5)
INPUT temperature in 0C
Initial day = Initial day + 1
Cumulative = Cumulative + 0F
END WHILE
Average = Cummulative/7
PRINT average
Stop
24. Michael deposits 1,000 in a bank at an interest rat of 10% per
year. At the end of each year, the interest earned is added to the
amount on deposit and this becomes the new deposit for the next
year.
Develop a pseudo code to determine the year in which the amount
accumulated first exceeds 2,000. Also for each year, print the year
(starting from 1), the deposit, the Interest earned, and the total
accumulated at the end of the year.
START
Input initial deposit, Interest rate, and Target deposit
Set Deposit to 1000
Set Year to 0
REAPEAT
Year= Year + 1
Interest = Deposit x 10%
Total = Deposit +Interest
Deposit = total
UNTIL Deposit > 2000
PRINT Deposit, Year
STOP
25. Study the flowchart diagram
below and answer the questions
that follow:
a) What will be the value of the sum when printed? Show how you
arrive at your answer. (5mks)
R Term Sum
0 0x20 0 + 0=0
1 1x21 = 2 0+2=2
2 2x22 = 8 2 +8 =10
3 3x23 = 24 10 + 24 =
34
The value of Sum = 34
26. Mwalimu savings society (MSS) Pays 5% interest on shares
exceeding 100,000 shillings and 3% on shares that do not meet this
target. However, no interest is paid on deposits in the member’s
MSS bank account
a) Design a pseudo code for a program that would:
i) Prompt the user for shares and deposit of particular members
ii) Calculate the interest and total savings
iii) Display the interest and total savings on the screen for particular
members of the society.
(7mks)
START
PRINT “Enter member Name, share and Deposit”
INPUT Name, Shares, Deposit
IF shares > 100,000 THEN
Interest = 0.05 x Shares
ELSE
Interest = 0.03 x Shares
ENDIF
Total savings =Deposit + shares +Interest
PRINT Name, Total savings, Interest
STOP
b) Draw a flowchart for the above pseudo code.
(8mks)
27.a)
Study the flowchart below and answer the questions that follow:
a) List all the outputs from the flowchart.
(3mks)
24, 50, 102 (any correct 3)
b) What will be the output if the statement in the decision
box is changed to?
(3mks)
i) M100
Only one value, 11 will be printed 1
ii) M < 100
Only one value, 11 will be printed 1
iii) M = 100
values starting with 11 to infinity, i.e. , 11, 22, 44,……….
1
c) Modify the flowchart to print the sum of all the outputs.
(9mks)
28.The gross
Basic and
additional benefits. Employees with more than 10 year’s experience
get an additional pay of 10% of their basic salary. Bonuses are
given as per employees’ sales of the month as:
>200,000 15%
100,000 – 200,000 10%
Below 100,000 5%
Draw a flowchart for the program that will calculate Gross salary
and output each employee’s Basic salary, gross salary and all
benefits. (15 mks)
CHAPTER NINE
ELEMENTARY PROGRAMMING PRINCIPLES
Specific Objectives
By the end of the topic the learner should be able to:
a) Describe a system;
b) Define an information system;
c) State the purpose of an information system;
d) Identify the stages of system development;
e) Develop a system using a case study;
f) Write a report on the case study.
Content
a.) Description o f a system
b.) Definition of an Information System
c.) Purpose of an Information System
d.) Stages of system development
• Problem recognition and definition
• Information gathering eg
i) investigation .
ii) observation
iii) interviews
iv) questionnaires
• Requirement specification for the new system
• System design
• System construction
• System implementation
• System review and maintenance
(*A number of theories exist on system development. The above is a general
guide to the stages)
9.2.5 System Documentation
• Reports on fact finding/information gathering
436
• System flowchart
• Table/file structure/descriptions
• Sample data
• Output reports
• User manual
Introduction
Definition of System Development
Organization of components which interact in a given environment and
within a specified boundary to achieve collective goals and objectives
that are emergent.
Description of a system
A system is described as either hard or soft system
Soft System
Their boundaries may be fluid or keep on changing.
Their goals and objectives usually conflict and may not be
captured clearly because they are human based.
It is difficult to precisely define exact measure of
performance for them. Examples: sales tracking and
predicting systems, political system,
Hard systems
They are systems whose goals and objectives are clearly defined and
the outcome from the system process are predictable and can be
modeled accurately.
Characteristics of Systems
1. Holistic thinking: Combination of various components to create a
complex whole.
2. Subsystems: A system doesn’t exist in solitude but may be a
component of a large system.
3. Boundary and environment: An external element whose
changes in attitudes, behavior and property affect respectively.
4. Processor: Transform or processes data from one state to another.
5. System entropy: The decaying or becoming useless because
of the improvement in technology, new management policies
or the change in user requirements.
6. Inputs and outputs: The system communicates to its environment
by receiving inputs and giving outputs.
7. Open and Close: The open system receives input from and gives
output to the environment while the closed system uses input as
its own benefit thus building itself from the output.
8. Purpose: The objectives that a system is supposed to achieve
enable system developers to measure the performance of a
system during its operation.
9. Control: This is the method by which the system adapts to changes
in the environment in order to give the expected output or to
perform to the expected level.
Input
Output
System
Processes
System Processes
Control Feedback
Signal
Control
Information System
An arrangement of people, data processes and information that works
together to support and improve the day to day operation in a business
and decision making. Purpose:
Supporting information processing task e.g. data collection,
processing and communication.
Helping in decision making by collecting operational data, analyzing
it and generating reports to be used in supporting decision making
process i.e. online analytic process.
Enable information sharing
Reasons to develop a new system
New opportunities to improve quality of internal processes
and service delivery in an organization.
Problems that prevent an organization from meeting its goals.
Directives or new requirements by the government, management or an
external influence.
The Role of an Information System Analyst
1. Responsible for identifying an organization’s needs and problems.
2. Reviewing the existing system and making recommendations on
how to improve or implement an alternative system.
3. Working hand in hand with programmers to construct a computerized
system.
4. Coordinating training of the new system users and owners.
Theories of system development
1. Traditional approach: Relies mostly on the skills and
experience of individual staff members carrying out the
project.
2. Rapid Application Development (RAD): Quick implementation of
the new information system.
3. Structured approach: System developers define a set of
procedures to be followed when developing a system.
Stages of System Development
1. Problem recognition and definition (Problem analysis)
The system analyst needs to carry out a special study to establish
the cost and benefits of a new system i.e. a feasibility study. The
feasibility of a system is assessed in four ways:
1. Operational feasibility: Establishes the extend to which the
users are comfortable with the proposed system.
2. Schedule feasibility: Whether development of proposed system will be
accomplished within the available time.
3. Technical feasibility: Whether the available technology is sufficient or
can be upgraded.
4. Economical feasibility: The effective cost i.e. cost and benefit of
proposed system.
2. Information Gathering/ Fact finding
Studying available documentation
Advantages
One has the necessary material.
Disadvantages
Slow method
If wrong data was entered wrong information will be collected.
Interviews
Guidelines:
Interviewee must be informed in good time and the topic of
discussion communicated before to allow for adequate preparation.
Avoid personal biases in your questions.
Be careful about body language and proxemics.
Types of Interviews
Structured: Questions have been already organized or prepared and
spaces for the answers/responses.
Unstructured: Questions are not written or prepared.
Advantages
Non-verbal communication can be used.
Questions can be rephrased instantly for clarification and to probe the
interviewee further.
Gives adequate opportunity for the interviewer.
Interviewer is accessible to first hand information.
Disadvantages
It is difficult to organize interviews and they are time consuming.
Interviewee may not fully open up on some issues that may be
personal or sensitive.
They are expensive to conduct.
Automated Methods
The uses of data capture devices like cameras, scanners and camcorders.
Advantages
The method is accurate.
Fast.
Disadvantages
Expensive equipment required.
Questionnaire
It is a special purpose document that allows a person to collect
information and opinions from the people who receive and respond to
it.
Application
When limited amount of information is required from a large number
of people.
People you need to gather information from are vastly dispersed.
Advantages
Since they are filled and returned in primary more sincere responses
are
possible.
Respondent can fill the questionnaire at their own pace.
Disadvantages
Good ones are difficult to prepare.
The respondent may not fully understand the questions because of
ambiguity of language hence giving erroneous responses.
Time consuming in analyzing.
Observation
Advantages
Difficult concept for non-technical staff to explain can be observed.
Helps analysts become acquainted with the operational personnel.
Helps the analyst acquire know how needed to assist that have been
recommended.
Can correct “hazy” understanding/ erroneous impressions.
Disadvantages
The person being interviewed can alter behavior leading to wrong
requirement being observed.
The need to be on-site consumes a lot of time.
The method cannot give information about past activities and
problems.
3. System Classification
Deterministic system: system whose output is precisely
known by their inputs like the computer system.
Probalistic system: Output can only be predicted but not
precise like in business and economics.
Cybernetics system: Self system which adapts to the
environment and regulate their own behavior by accessing the
feedback e.g. in human beings, plants.
4. Requirement Specification
Output Specification
Activities that entail generation of reports used to facilitate decision
making. Factors to consider;
Target audience.
Frequency of report generation.
Quality and format of output.
Input Specification
Content and volume of input.
Mode and device of input selection.
Layout and information sequence
File / data store specification
The key attribute/ field
Type of data
Length of each field
Back up and recovery strategies
Hardware and software specification
Economic factors e.g. prices
Operational factors e.g. reliability, upgradability, compatibility with
existing resources
User-friendliness
5. System Construction
The coding, installing and testing modules and their components e.g.
Input, output by
Using high-level structure language like PASCAL, COBOL e.t.c.
Fourth Generation languages- Visual Basic, Visual COBOL, Visual
Delphi e.t.c.
Customizing the standard packages.
Testing
6. System Design
Development of flowcharts, data flow diagrams, structured charts e.tc.
7. System Implementation
The activities involved during this stage are: Installing the system,
testing, converting from old system to the new system and training the
users.
File creation and convention: Setting up of master files to be used to
support the new system.
Training the staff
Convert staff of user department on the effectiveness of the new
system
Remove fear of change from them
Enabling staff cope with processing task of the new system
Methods used in training: documentations, film shows, manual reference,
group discussions and visits
Changeover
The process of changing over from old system to the new system.
1. Direct Changeover: The new system commences live
operations and immediately the old system is abandoned.
Advantages
Cheap method
Disadvantages
Places the organization in a do or die situation
Extremely risky
2. Parallel Changeover: Operations of the old system and the new
system are run alongside each other
Advantages
Provides a method of training in the new system
Personnel become familiar with the new system
Disadvantages
Costly to run two systems
Cross checking is difficult
Requires more staff hence more training is required
3. Phased Changeover: Implementation is done only on part of
the new system at one time or step by step.
Advantages
Allows the system to be implemented quickly
Less costly
Failure of the new system is limited
Cause minimal description
Disadvantages
Problems on assuming that the final sphere is implemented and
converted
8. System Review and Maintenance
Adjustment and enhancement or correction of errors after the system
has been implemented. Reviewing includes going through the
specification and testing the system after implementation to find out
whether it still meets the original specifications.
System Documentation
1. Reports on fact-finding
2. Requirement specification
3. System and module flowcharts
4. Table/ file structure description
5. Sample test data and expected output
6. Output reports.
CHAPTER TEN
INTRODUCTION TO NETWORKING AND DATA
COMMUNICATION
Specific Objectives
By the end of the topic the learner should be able to:
a) Define computer networking TERMS;
b) State the purpose of computer networks;
c) Describe the elements of a network;
d) Describe various types of networks;
e) Describe various types of network topologies.
i) Resource sharing
ii) Remote communication
iii) Distributed processing facilities
iv) cost effectiveness
v) reliability
• Limitations
f.) Elements of Networking
a) Data communication media
• Communication with cables
i) twisted pair cables
ii) coaxial cables
i) fibre-optic cables
• Communication without cables (wireless) e.g.
i) Microwave
ii) satellite
iii) radio transmission
b) Data Signal
• Analog
• Digital
c) Communication Devices e.g.
• Modems
• Network cards
• Hubs
Content
a.) Definition of terms
i) computer networks
ii) data communication
Purpose and Limitations of networking
• Purpose
b.) Network software
• Operating systems
• Protocols
c.) Types of Networks
• Local Area Network (LAN)
• Metropolitan area Network (MAN)
• Wide Area Network (WAN)
d.) Types of Network topologies e.g.
• Ring
• Star
• Bus
Introduction
Computer Network: Collection of computers linked together
using transmission media for the purpose of communication and
resource sharing.
Terms used in Networking
1. Data signal- Voltage level in the circuit which represent flow of
data.
2. Multiplexing- Process of sending multiple signals over same
media.
3. Demultiplexing- Process of separating multiple signals at
receiving point.
4. Bandwidth- Maximum amount of data a transmission medium can
carry at one time.
5. Baseband signal- Analog signal send over transmission
medium using a particular frequency.
6.Baseband width- Digital signal generated and applied to transmission
medium directly without modulation.
7. Attenuation- Decrease in magnitude and energy as signal
progressively moves along a transmission medium.
8. Repeater station- Receive signals, clean, amplify them for
transmission.
Modes of Communication
1. Simplex- Communication in only one direction e.g. television
and radio broadcasting
2. Half duplex- Communication in both directions, one at a time
e.g. Walkie Talkie
3. Full duplex- Communication in both directions simultaneously.
Types of Computer Network
1. Local Area Network (LAN)- Network that spans a relatively small
geographical area e.g. a building, a school etc.
2. Metropolitan Area Network (MAN) - Covers a metropolitan are like
a town or a city of typically a radius of between 5 to 50Km or MAN
is made up of many LAN’s in a metropolitan area.
3. Wide Area Network (WAN) – Covers a large geographical area like
continent or the world.
Server: This is computer dedicated to serving requests
for resources from other computers(workstations) on
network.
Advantages of LAN
1. Enables many users share expensive resources like printers and
data.
2. Enables communication- sending messages and open chat
sessions.
3. Capable of transmitting data very fast.
Purpose of Networking
1 Resource sharing- File sharing, mail exchange, sending faxes,
schedule meetings and print documents leading to less wastage of time
and enhances greater productivity.
2 Remote communication- faster data transmission from different
geographical site. Problems that faced workers.
Roaming of officers who by virtue of their work cover long distance
away from their work place.
Time wastages in accessing organization information.
Remote communication is the process of transmission of data signals
between communications devices located at different geographical
locations. Components of remote communication are:
Remote Client- Computer that tries to access resources from another
computer on network.
Remote host- Computer being accessed on network
3. Distributed processing facilities- Def. Process of running
databases or programs on different computers which are on the
same network. The advantages:
(i) Failure of central computer doesn’t affect the
operations of the other terminals.
(ii) Processing load shared is equally distributed hence no
wastage.
4. Cost effectiveness- Although the initial installation cost is high it
cuts down most expenses and adds value to service delivery.
Advantages
(i) Daily communication- paperless
communication environment.
(ii) Reduces transport cost for executive
meetings.
(iii) Resource sharing e.g. printers, fax machine, optical
drives, files and applications.
5. Reliability
(i) Transfer of data with minimum errors from destination
(ii) Easy recovery incase of computer breakdown.
Limitations of Networking
1. Security issues- Data is prone to more illegal access threat in the
network
2. High initial cost for software and hardware.
3. Moral and cultural effect- chartrooms and pornography.
4. Spread of terrorism and drug trafficking.
5. Overeliance on network thus network failure may halt the
system or bring down the organization.
Elements of Networking
A. Data Communication Media
1. Bounded (cabled) Media
Two line open cable
Insulator between the two wire help reduce interline interference.
They capture environmental frequencies e.g. radio waves hence
causing noise in the transmission medium/pathway.
Insulator
Wire
Conductor
Twisted pair cable-
Wires are in a double helix manner. They transmit both voice and signal
data. Types
(i) Unshielded Twisted Pair (UTP) cables- Don’t have a
shied that prevents electromagnetic interference (EMI)
or “electronoise” from the environment.
(ii) Shielded Twisted Pair (STP) cables
Advantages
Used in the telephone systems
Cheap installation equipments
Cheap due to mass production of telephone
Disadvantages
Suffer a high attenuation rate.
Sensitive to EMI and eavesdropping
Low data transmission but more than
two line
Coaxial cables
Has a central copper core surrounded by a dielectric material
(insulator) that is then surrounded by a hollow mesh conductor
covered by a shield. The braid (mesh conductor) is made of copper/
aluminum and serves as the ground for the carrier wire. The braid
protects radio and electromagnetic interference. The thinner the
conductor determines the attenuation rate. Thinner have a high
attenuation rate. Used in network blockade- A link that connects two
separate LAN’s
(ii) Thin coaxial cables (Thinnet)- has no dielectric insulator
(iii) Thick coaxial cables (Thicket)- has two dielectric
insulators.
Copper core
Core insulator
Aluminum foil
Braided
shielding
Outer layering
(b) Thicknet
Advantages
Stable even under high loads
Large bandwidth than twisted pair
Carry voice, data and video signals simultaneously
Resistant to radio and EMI than twisted pair cables.
Disadvantages
Thicket is hard to work with
Are relatively expensive to buy and install compared to
twisted pare
Fiber optic cable
Electronic signals from source are converted to light signals the
propagated along the fiber cable by a Light Emitting Diode (LED) at the
transmitter then at the receiving end a photosensitive device used to
convert light signals back to electric signals. Components:
(i) Core- Central part and is made of a hollow
transparent plastic glass.
(ii) Cladding- Single protection layer
surrounding the core. (iv) Buffer- Surrounds
the cladding, strengthening the cable. (v)
Jacket- Outer casing
Types of optical fiber cables:
(i) Multimode: Has a very narrow center core hence
have low attenuation rate as light takes only one path in
its suitable for long distance
(ii) Single mode: Has a thicker core hence allow several light
rays
Cladding
Jacket
Light rays
Cor
e Cladding
Advantag
es
Immune to EMI and eavesdropping.
Fast and support high bandwidth.
Large distance can be covered- low attenuation
Used in hazardous places- Don’t generate electric signals.
Smaller and lighter than copper- Ideal for space limited
situation
Disadvantages
Difficult installation since it must be carefully be handled
Expensive connectivity devices and media are required
Relatively complex to configure
Difficult and expensive to repair
A. Unbounded (Wireless) Media
Microwave Transmission
Line of sight
Have a high frequency of 3 GHz to 4 GHz. It suitable for point to
point transmission (line of sight): Signal is directed through a
focused beam from transmitter to receiver.
Advantages
It is less prone to transmission errors.
It is capable of operating on both digital and analog data
Operates at a high speed.
Disadvantages
Signals affected by atmospheric conductors e.g. lightening
Additional numbers of repeaters are added after every few
kilometers.
Satellite Transmission
Satellite in
space
Uplink Downlink
Receiving Transmitter
earth earth station
station
A satellite transmission system has three main components:
1. The transmitter earth station- sets up an uplink in order to transmit
data.
2. A satellite (geostationary) - receives, amplifies and transmits
the signal to receiving earth station via a downlink frequency.
3. Receiving earth station- receives signals on the other side of the
globe from the satellite
Satellite footprint: Area on earth where line of site can easily be
located. Transmission of signals to many recipients’ earth stations forms
a point to multipoint transmission.
Very Small Aperture Terminal (VSAT): This technology refers to very
small satellite dish used in radio, data and TV communications. It
enables direct access to satellite communication instead of having to go
through satellite owned or licensed satellite gateway.
Advantages
Has a high band width.
Earth station can be installed on a customer property than layering
extensive cables.
Cheap since cost is not dependent on the distance.
Disadvantages
Expensive to install ground stations.
Heavy rains or bad weather increases loss of signals.
Any station can receive the signals.
Radio Communication
(i) High Frequency (HF) - Propagated by directing it to
ionosphere on earth. Then the ionosphere will reflect back to
earth surface and the receiver will pick it up.
(ii) Very High Frequency (VHF) - Transmitted over the
earths surface. Stationeries are place strategically to
maintain the line of sight from one another.
(iii) Ultra-High Frequency (UHF)- It is the same as VHF but
require smaller aerial because
they can be made to follow even narrow and direct path to
the receiver than VHF
(iv) Bluetooth- Enables people to use hand-held communication
devices e.g. phones PDA’sto access the internet. Network Bluetooth
enabled devices is called a wireless personal are network (WPAN) or
piconet.
Infrared Transmission
Infrared transceivers must be within the line of sight in the same room
because unlike radio signals they cannot penetrate objects.
Advantages of Wireless Media
Flexible in operations compared to wired.
Span a large geographical area.
Can take place in satellite even in remote areas.
Disadvantages of wireless Media
Relatively difficult to establish or configure.
High initial cost.
Communication Devices for Bounded (Wired) Media
1. Network Interface Card (NIC): Creates a physical link
between computer and transmission media.
2. Modems and Codec: Modem (Modular demodulator) is a
device that converts digital to analog signals when sending data
over a transmission media then converts the analog signals to
digital at the receiving point. Codec converts analog signals to
digital form for transmission via a digital medium.
3. Hubs (Concentrators): Connects computers on the
network and relay signals from one computer to another on the
same network using protocols.
4. Bridge: Determines selectively the appropriate network
segment for which a message is meant for delivery through
address filtering thus dividing a busy network into segments
reducing network traffics.
5. Repeaters: Receive signals from one segment of the
network, cleans it to remove any distortion then send it to
another segment.
6. Routers: Interconnects different networks and directs
transfer of data packets from source to destination depending
on the network address.
7. Router: Communication device that combines the
functionality of a bridge and therouter.
8. Gateway: Any device that can be configured to provide
access to a Wide Area Network (WAN) or the internet.
9. Switches: Unlike the hub, a switch forwards a packet
directly to the address node without broadcasting
NB Node- Data terminal equipment e.g. workstation.
Wireless (Unbounded) Communication Devices
1. Access points (AP): Entry point into a bounded
network for people who have wireless network devices
like PDAs, laptops and computers with wireless links.
2. Wireless antennae: Detects signals in the surroundings.
3. Personal computer memory card international
association (PCMCIA): Add-on card inserted in devices
e.g. PDA or laptops in order to enable wireless
communication between devices and wired network server.
Mostly used in LAN connection.
Network Software
Classifications of Network Software
a) Network operating system
b) Network protocols
Network operating system
Network operating system is specially designed to optimize the network
computer ability to respondto services request. Its functions are:
(i.) Provide access to network resources e.g. printers and folders.
(ii.) Enables nodes on network to communicate with each other more
efficiently.
(iii.) Support interprocess communication i.e. enables various
process on the network communicate.
(iv.) Respond to request from application program running one
network.
(v.) Support network services e.g. network cards,
drivers and protocols.
(vi.) Implementing network security features.
Functions of network Administrators
(i.) Secure the network against unauthorized access
(ii.) Track network usage and keeps a log of all people who
have used the network.
(iii.) Ensures inter-operatability between various systems on
the network.
(iv.) Performance monitoring to ensure maximum
throughput on the network. Examples of networking
operating systems are:
Windows NT,/2000 /2003
UNIX
Linux
Novell Netware.
Network Protocols
They are a set of rules and procedures that govern communication
between two different two devices or people.
Concept behind network protocols
In order to transmit data over the network it has to be broken into
discrete systematic steps. Each step has its own rule and procedures i.e.
protocols that must be coordinated so that there are no conflicts or
incomplete operations. Achieved through protocol layering .Network
protocols are designed after the Open System Interprocess (OSI) model.
The open system interconnection model is not a protocol as such but is
meant to help designers to come up with high quality layered protocols.
Layer Function
7. Application User application run here and generate
layer request for data
6. Presentation Adds formatting,
transmission or opendisplay and files.
received encryption on
layer information to data
5. Session layer Sets
beingup data transmission session between
presented.
two communication
4. Transport layer Manages
devices. data transfer over the network to
ensure reliability.
3. Network layer Address information is added to the data
packet and routed to
2. Data link layer Adds error
destination. checking information and
prepares data for going into
1. Physical layer Data packetsconnections.
the physical are finally transmitted via the
network and through
transmission media in form of bits.
Network Topologies
This refers to the way in which computers her devices have been
arranged or how data is passed from one computer to another in the
network.
Classifications of Network Topologies
1. Logical topology
2. Physical topology
Logical / Signal Topology
Mainly concerned with the way data passes from one device to the
next on the computer network.. Examples of signal topology are
Ethernet and Token ring topologies.
a) Ethernet topology: All the workstations or computers adhere to
the network media and can only send data when none of the
others are sending data.
b) Token ring: There is a special package for data called a token
that goes around the network and only the computer whose
address is on the data held in the token will take up the token to
read the data then release the token.
Physical Topology
Bus Topology.
All the devices on the network are connected to a central cable called the
bus r the backbone. Each
end of the cable is connected to a terminator to avoid signal from
bouncing back and fourth on the cable causing signal distortion. The
network address of computers on the network is called the medium
access control (MAC) address
Advantages of bus topology are:
It is to install.
It is less costly because doesn’t require a complete cable length
per computer.
The disadvantages of bus topologies are:
Failure of central cable brings the whole network down.
Only one node can transmit message at a time.
Difficult to troubleshoot
Star Topology
All the devices are connected to the central hub (concentrator).
Computer
Centr Computer
Computer al
comp
uter
Computer Computer
Advantages of Star topology
Easy to configure.
If one node fails it doesn’t affect the other nodes.
It is easy to expand this topology.
Allows the centralization of key network resources.
Disadvantages
It requires more cables to install hence it is more expensive.
Failure of the central hub puts the entire network at a stand still.
Installing this type of network is time consuming.
Ring Topology
All the components in this topology are connected to a single
transmission cable forming a ring styled connection of computers
Computer
Computer Computer
Computer
Computer
Advantages of Ring topology
Data transmission is fast.
They use a short length cable.
Ring topology is simple to install.
Disadvantages of the ring topology
Modification may be difficult because adding or removing a
device can disrupt the entire network
Troubleshooting can be difficult.
If one site fails it affects the entire network.
Mesh Topology
Device in this topology are connected with repeating (redundant)
cables between the workstations. Each node is connected to one
another.
Advantages of Mesh Topology
It is easier to troubleshoot.
Disadvantages
Expensive: Costly to provide the redundant cables.
Difficult to install and maintain.
Tree/Hierarchical Topology
All the nodes are connected in form of a tree with nodes as leaves and
links as branches. The branches are connected to one another by the
means of devices called hubs.
Advantages of Hierarchical topology
If the node below the main node fails, the network does not fail.
Disadvantages
If the top node fails the entire network fails because it controls the
other nodes.
Expensive to install since it is complex.
Printer
Hub
Bus/backbone
Network Security
Classification of Network Security
(i.) Share level security
(ii.) User level security
Share level Security
Mostly the share level security is use in the peer to peer networks.
Used to decide on which resource to share. It is provided by most
desktop operating systems like Windows 9X.
User level Security
Applied in server based networks. A network administrator assigns
accounts to users hence each user must provide a unique name and
password in order to access the network resources. It is found in
Microsoft Windows NT, 4.0/2000/2003, UNIX, Novell Netware, Linux
Fedora etc.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. Define the following terms: (2mks)
(i) Computer network
(2mks)
A collection 2 or more computers connected together using
transmission media (e.g., telephone cables, or Satellites) for the
purpose of communication and sharing of resources.
(ii) Data transmission
(2mks)
Passing information from one terminal to another in a computer
network through telecommunication channels
(b) Differentiate between a modern and a multiplexer.
(2mks)
A Multiplexer enables sending of multiple data signals over the
same medium, either simultaneously or at different times.
A Modern converts a digital signal to analogue form, so that it can
be transmitted over analogue telephone lines.
3. State three advantages and three disadvantages of computer
networking. (6mks)
Advantages
- Sharing of resources between the computers
- Sharing of risks.
- Provides cheaper and efficient communication.
- Running cost is low because of the minimal hardware required.
- Reliable and error-free.
- Enhances faster communication
- It is not time-consuming.
Disadvantages of networking
- High initial installation cost (i.e., expensive to install).
- Security threats e.g., hacking, which posses a great danger to
loss of information
- Moral and cultural effects.
- Spread of terrorism, drug-trafficking and viruses.
- Over reliance on networks.
4. (a) What is a distributed system? (2mks)
This is a system in which data is manipulated in different
processors/computers, which are on the same network but placed
in separate locations.
(b) State any two advantages of distributed systems.
(2mks)
There is sharing of data & other resources.
Relieves the central computer of the burden of processing data
Failure of the central computer does not affect the operations of
the other terminals
Processing load is shared equally; hence no time wastage
There is faster processing of data since each machine can process
& store its data
It doesn’t need powerful & expensive servers for data storage
It can accommodate users with variety of needs
Creation of employment at the remote centers.
5. Distinguish between bounded and unbounded transmission
media, giving two examples in each.
In bounded media, data signals are transmitted from the source
to the destination through a restricted pathway, e.g., two open
wire cables, twisted pair cables, Coaxial cables, fiber optic cables.
Unbounded media transmits data without physical connections,
e.g. microwave, satellite, radio, infrared communication.
6. State what is meant by each of the following data
transmission media, and give two advantages and three
disadvantages for each.
i) Twisted pair cables. (3mks)
A twisted pair cable is made up of 2 insulated copper wires twisted
around each other in a spiral pattern. This prevents electromagnetic
fields from developing around the two wires as they transmit data.
Advantages
-Has high data transfer rates of up to 100 Mbps
-It is cheap because; of mass production for telephone use.
Disadvantage
o They suffer from high attenuation
o affected by electromagnetic fields
o It has low data transmission rates as compared to other
cables
ii) Coaxial cables
Coaxial cables consist of two conductors which are insulated and shielded
to provide high noise immunity & also more resistant to electromagnetic
interference.
Advantages
o They have a large bandwidth (up to 1 Gbps) compared to
twisted pair cables
o They can carry voice, data and video signals
simultaneously
o They are more resistant to radio and electromagnetic
interference than twisted pair cables
Disadvantages
o They are hard to work with
o They are expensive to buy & install
iii) Fibre optic cables is made of transparent glass and uses light
to transmit data signals from one point to another on the
network.
Advantages
o It is immune to electromagnetic interference, and
eavesdropping.
o It is fast and supports high bandwidth
o It has low attenuation; hence, a long distance can be
covered
o It is small & light.
Disadvantages
o Difficult & expensive to install
o Once broken, it is difficult & expensive to repair.
iv) Wireless/microwave/radio transmission.
(3mks)
In wireless transmission, no physical connections are
used to transmit data from one point to another. Instead
a transmitting antenna & a receiver aerial are used to
facilitate the communication
Advantages
o wireless networks can span large geographical areas
easily
o Can be used in very remote areas that do not have high
cost physical infrastructure like telephone lines
o Flexible.
Disadvantages
o The initial cost is very high
o It is relatively difficult to establish or configure.
7. Explain the function of the following network devices:
i) Network interface card (NIC)
NIC creates a physical link between the computer and the
transmission media.
ii) Gateway
Gateways provide access to the Wide area networks & the
Internet.
iii) Bridge
This is a network device that selectively determines the
appropriate network
segment for which a message is meant to be delivered.
iv) Repeater
A repeater receives a weak signal on the network, cleans and amplifies it
for transmission over the next portion of the network. Signals become
weak due to attenuation
8. List two advantages of cell phones over fixed lines.
(2mks)
Are cheaper than fixed lines
Less prone to transmission errors
Can be used even where there are no telephone lines
Portable, i.e. can be carried around
9. a) Study the diagram below and answer the questions that
follow:
i)
Name
the
communication media depicted in the above diagram. (1mk)
Satellite communication
ii) Name the parts labelled A, B, C, and D. (4
mks)
A -Receiving earth station
B -Satellite in space
C -Down link
D -Up link
iii) List three advantages of the above communication media.
(3mks)
- It is fast
- It is convenient because; it provides a large constant line of
sight to each station Hence, there is no need to keep on
moving the parabolic dish so as to track the line of sight
- Can be in very remote areas that do not have high cost
physical infrastructure like telephone lines.
(2mks)
10. a) Define the term network topology.
(2mks)
Network topology refers to the arrangement of the computers,
printers and other equipment connected on the network.
b) Distinguish between logical and physical network
topology.(2mks)
Logical (signal) topology deals with the way data passes from
one device to the next on the network
Physical topology refers to the physical arrangement (layer
out) of devices on the network.
CHAPTER ELEVEN
APPLICATION AREAS OF ICT
Specific Objectives
By the end of the topic the learner should be able to:
Describe the use of computers in different application
areas.
Content
Application Areas of Information and Communication Technology
• Financial Systems
a) accounting
b) banking
c) payroll
• Retail Systems
i) point of sale systems
ii) stock control
• Reservations Systems
i) hotels
ii) air-lines
• Communication Systems
i) Fax and telex
ii.) radio
iii.) television
iv.) video conferencing
v.) e-mail
vi.) telecommuting
vii.) internet
• Education
i) Computer Aided Learning (CAL)
ii) e-learning
iii) computer based simulation
• Industrial systems
i) simulation
ii) process control
iii) CAD (Computer Aided Design)/CAM (Computer Aided
Manufacture)
• Scientific and Research Systems
i) Weather forecasting
ii) Medical research
iii) military/space exploration
• Transportation Systems
i) air-traffic control
ii) Shipping control
iii) Automobile traffic control
• Entertainment Systems
i) Computers and movies
ii) Multi-media
• Virtual reality
i) Uses of virtual reality
ii) visor
• Library Systems
Library lending system
• Home use
• Health
• Expert systems
• Offices
Expert systems
• Offices
Expert systems
• Marketing
i) e-commerce
ii) business
Field work Report
Application areas of Information and Communication
Technology Retail systems Stock control
Computers enables the user to manage his or her stock more efficiently
by helping to track what is in stock and what needs recording.
Transaction handling at the electronic point of sale terminal
(EPOS)
EPOS is a computer terminal that is used in retail stores to input and
output data at the point where sales are transacted e.g. supermarkets
and wholesales. Other additional equipments required are: The
barcode reader (wand): passed over items mar code.
Monitor: Enables the user to interact with the system
Receipt printer: Produces the receipt based on the customers purchase.
Advantages of EPOS are:
Accuracy: Correct prices are used at the
check out counter. Faster: Since data entry
is not manual
Financial Systems
Payroll systems
This system helps an organization to process accurately information of
employees including gross pay and deductions and getting their net
pay.
Accounting systems
(i.) Customer order entry and billing: Subsystem records
incoming customer orders authorizes delivery of items or
services and produce invoice for customers whoi don’t pay in
advance
(ii.) Inventory management: Keeps track of items in stock
and help the management to determine which item to
reorder.
(iii.) General ledger account: Keep track of how much a business
makes and its worthiness by summarizing the financial
transactions producing a report called balance sheet.
(iv.) Accounts payable: Keeps track of the amount the business
sows other organizations like the tax organizations, suppliers
and transporters.
(v.) Accounts receivable: Keeps track or records the
amount owed by the customers.
Banking Systems
(i.) Processing customers’ transactions: Computers are
used in banks to record deposits, withdraws and calculating
interest on savings and loans.
(ii.) Cheque clearing and processing: The use of magnetic Ink-
Character Recognition (MICR) details of the cheque is
automatically entered into the computer for the cheque process.
The special characters on the cheques includes the bank in which
the cheque is drawn from, the customer accounts number the
cheque number and the cheque amount.
(iii.) The electronic fund transfer: Use of Information
Communication Technology to move money. Used especially with credit
cards and the ATM cards.
Reservation systems
These systems are also called online enquiries. The concept used in
reservation systems is the application of distributed network systems.
Applications of reservation systems:
(i.) Hotel booking: Booking and reservations rooms in a hotel
are made from a remote terminal connected to a centralized
computer database or via the internet using the hotels website.
(ii.) Airline booking: All the flights and passenger records are
stored in a centralized database.Travel agents from all over the world
can access each data via communication lines. Likewise the agents book
in clients where tickets have not been bought.
(iii.) Car rentals
Education Systems
1. Computer Aided Instruction (CAI): The process of using
computers to learn, drill and practice particular education principles.
2. Computer Aided Learning (CAL): This is meant to drill the
learner and present particular education materials the way a
teacher does in class.
3. E-learning: Lessons and lectures are presented from a central site
like a website the transacted to remote conference terminals or
displayed on television screens.
4. Computer Aided Simulation: It refers to the science of
representing behavior of a real life situation by using
computerized models.
Communication Systems
(i) Fax: During the process of sending the fax the document is
scanned then converted into analog form then transmitted. The
receiver fax converts it into the original softcopy the it prints
the document.
(ii) Radio communication: Computers are used to:
Record and manage radio programmes for broadcasting.
Manage radio transmission and took performance.
Create slides, simulated objects and sound effects when
preparing electronic and printed media advertisements.
Downloading information from the internet like international
news.
(iii) Television sets
Ceefax (teletext):This refers to the computerized service
where news and other information are provided on television
screens to subscribers using an add-on card. It involves
simplex transmission
Videotext (view data)
(iv) Video conferencing: Use of computers, digital camera
(camcorder), audio capturing equipments and communication
network to enable people from different locations to see and
talk to one another.
(v) Telecommuting: Situation where an employee work at home
using a computer connected to workplace network.
Advantages
Reduces transport cost.
Gives people the option of flex time.
Saves costs.
Reduces pollution and congestions inroads.
Disadvantages
Lack of discipline.
Work quality may suffer.
Few opportunities for brainstorming with colleagues.
Disappear of direct supervision.
(vi) Internet
World Wide Web: This is the collection of webpages, which may
be made of text, images, animations, sounds and video held on
web servers.
E-mail: Electronic sending and receiving of messages, data, files
or graphics in the internet.
Industrial systems
(i) CAM and CAD
Computer Aided Design (CAD): Refers to the integration of
computers and graphics to aid in the design and drafting
process. Examples of software are: Softpan, Autocad and
Archicad.
Computer Aided Manufacturing (CAM): It refers to the use
of computers to control machines in the manufacturing
process e.g. Delta.
(ii) Industrial simulation: Allows activities that would
otherwise be expensive and dangerous to real life situation to
be put under test. The Non Destructive Testing (NDT) can be
used to test motors and other machines with the use of
computers.
(iii) Process control: Computers are used to contol ongoing
physical process like regulating temperature, pressure and
fluid flow.
Scientific and Research Systems
(i) Weather forecasting: Analyzing, predicting, processing weather
patterns through the use of Geographical Information System (GIS) and
Geographical Positioning System (GPS).
(ii) Medical research: Diagnosing, Keeping of patients’ records,
inventory control. Expert systems that emulate the reasoning of a
human expert in a narrow field of
specialization.
(iii) Military and space exploration e.g. the National Aeronautics
and Space Administration (NASA).
Library Systems
(i) Lending system: Information system that manages the
issuarance and the return of the borrowed reading materials.
(ii) Inventory control: Manages the stock by checking for books
currently in the shelves and those on high demands for purpose of
adding more.
(iii) Cataloging: A catalog refers to the collection of cards with
information about each book or reference materials found in the
library. Electronic cataloging is updated constantly when new
reference materials are required.
Entertainment Systems
(i) Games: Games are now found on the Digital videos disks
(DVDs) and three- dimensional (3D) games are now possible
on personal computers.
(ii) Music and video: Video compact disks (VCDs) and Digital
versatile disks (DVDs) have become a common feature in the
music industry. In music industry computers are used in recording,
synthesizing, editing and adding special effects on music. In video
industry, computers are used to produce high simulated and
animated movies, generate scenes and actors.
Transportation Systems
(i) Automobile traffic control: controlling traffic lights in road
junctions.
(ii) Air traffic control: Computers are used to monitor air traffic
movement, take off and landing of aircrafts.
(iii) Shipping control: Controlling and guiding paths taken by
spaceships and water vessels as they travel to distant land using
the Global Positioning System (GPS).
Home Use
(i) Preparing
domestic budgets.
(ii) Entertainment.
(iii) Research.
(iv) Education.
Office Expert System
This is a system capable of simulating decisions making process and
intelligent problems solution just like a human expert.
Marketing
(i) Electronic commerce (e-commerce): Transactions are carried
out directly without physical interaction between the buyer and
the seller.
(ii) Electronic presentation
(iii) Advertising
Virtual/ Artificial Reality/ Cyberspace/ Virtual Works/
Virtual
Environment
Condition in which a person is psychologically immersed in an artificial
environment generated by a computer system: Requirements
Head mounted display (HMD)/ Headgear: made up of two tiny
display screens and sound systems that channel images and sound
from the source to the eye and early presenting a stereo three
dimensional (3D) sound effect in the virtual world.
Gloves: Allows the user to navigate through the virtual world and
interact with virtual objects. They have sensors that collect data
about the movement of the hands and relays the data into the
system
Body suit: Worn during virtual reality session and iis made of condux
VR software
Applications
(i) Training in medicine, military education
(ii) Entertainment
(iii) Simulation
(iv) Study of human anatomy
(v) Exploring landscape, underneath
(vi) Crime scene reconstruction
Law Enforcement
Biometric analysis: fingerprints and facial identification.
Use of video camera e.g. in banks
Development of strong military bases which have international
coordination by use of a computer radar system
Jet fighters are computerized with correct control centers.
Teleworking
A situation where an employee works usually at home using at home using
a computer connected to work place.
Advantages
Reduces travel expenses due to reduction of unnecessary travel to
work.
Gives people the option of flextime giving them the option of
working long hours part time.
Saves cost if people work from home.
Reduces pollution and congestion as a result of fewer people
commuting to work.
Disadvantages
People who lack discipline may not do work, where as others may
overwork.
Work quality may suffer if employees take the attitude “no one sees
me doing the job so it doesn’t matter.
Fewer opportunities of brain storming with colleagues.
Direct supervision disappears when people work from home.
Application of computers in radio communications
Record and manage radio programs
Automate running of selected programs
Create slides, simulate objects and sound effects to prepare adverts
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1.Write in full hence, explain the term ICT.
(2mks)
ICT- Information and Communication Technology
ICT- refers to the integration of computers and
telecommunication facilities for the purpose of communication.
2.State four areas where computers are used today.
(4mks)
i) Financial systems, e.g. accounting, stock exchange, payroll,
banking, etc,
ii) Transport systems, e.g. air traffic control, shipping control,
automobile traffic control
iii) Entertainment systems, e.g. used in showing movies, playing
music, &
computer games.
iv) Scientific research, i.e. weather forecasting, medical research,
military & space exploration.
3.State two ways in which a computer may be used in efficient
running of a hospital.
- Keeping records of incoming and outgoing patients
- In electro-cardiogram screening and monitoring, analyzing the
sickness & checking
for damages, e.g. X-ray
- A computer controls life supporting machines
- For inventory control
- To access foreign expertise or labour, i.e. to get in touch with
consultants or surgeons in another country, thereby reducing
traveling of patients & professionals.
4.a) Name the type of processing that would be required by a
payroll system. (1mk)
Batch processing
b) Identify two benefits of using computers in accounting
systems. (2mks)
- They make the processing of financial records easier
- Error checking procedures can e established to ensure accuracy
& security of data
- Used to store volumes of financial records
- Ensure fast & easy production of financial reports
- They are cheaper than manual systems
5.a) Write down all the input and output devices of an ATM
machine of Pesa-point in Kenya.
- Keyboard
- The ATM card
- Screen (Visual display)
- Printer
b) List down three advantages of ATM cards.
(3mks)
- Offer 24 hour service to customers
- Ensure more flexibility in cash deposits and withdrawals
- It is secure because; it requires a personal identification number (Pin),
which is only known by the card holder
- There is no need for human bank clerks.
6.a) State four components of an electronic Point-of-sale
terminal. (4mks)
Terminal, e.g. Console, which is connected to the main computer
Monitor
Printer
b) Give two advantages of using electronic point-of sale
terminals as opposed to manual entry at a supermarket checkout
counter. (2mks)
Fewer errors made by employees, i.e. correct prices are used at
the point of entry
It ensures faster entry of data, since the attendant does not have
to enter details manually.
Ensures good stock management procedure.
7.Define the following terms:
a) Biometric analysis
This is the study, measurement & analysis of human biological
characteristics. It uses a computer and a biometric device to recognize &
analyze features of human body parts such as fingerprints, lips, voice iris
colour, etc
b) Telecommuting
A situation where an employee works in a location that is remote
from the normal place of work either on full-time or part-time basis.
8.Outline four devices required in order to conduct a video
conference. (4mks)
- A computer
- A digital video camera (camcorder) attached to a computer
- Network software for video conferencing
- A microphone
- Speakers
9.a) Define the term E-commerce
(2mks)
E-commerce is a way of doing business where the transactions are
carried out electronically without the seller and buyer interacting
physically.
b) List down two advantages of e- commerce as used in
modern business
environment (2mks)
- Reduces traveling, hence saves money and time
- A company can access customers all over the world, and is not
limited by space & wagons
- Reduces operating costs of small business as they can establish
websites where they can auction their good & services. This also
increases their sales.
10. Describe how computing has been applied to each of the
following areas:
i) Transportation systems.
(2mks)
- Used by railway corporations to coordinate the movement of their
goods & wagons
- Used in airline industry for air traffic control, surveillance of airspace
using radar
equipment
- Used in shipping control
- Used in automobile traffic control in busy towns, i.e. to simulate the
timing of traffic lights.
vi) Reservation systems.
(2mks)
- To keep record of reservation
- For online reservation (i.e. provide online remote services)
- Paperless transaction (Paying via credit cards)
- Easy to check for vacant positions
vii) Law enforcement (2mks)
For keeping record on fingerprints
Biometric analysis in crime detection so as to provide immediate
& accurate information
Scene monitoring & analysis to help the police in arresting traffic
offenders and criminals.
viii) Library management systems
(2mks)
- Keeping book records and stock management
- Tracking overdue books
11. Suggest how computers may in future be made more
user-friendly for persons
that are:
a) Blind (1mk)
- Development of Braille keyboards, or engraved keyboards
- Computers can be installed with talking software, i.e., can
store voice patterns of the user
b) Without hands
- Use of voice-activated commands.
- Computers can be installed with powerful multimedia system &
speech
recognition devices.
12. Give at least four reasons why a firm may decide to
computerize its operations
- Handling of errors easily
- Easy storage and retrieval of information
- Increased efficiency
- Higher quality work
- Reduced cost.
CHAPTER TWELVE
IMPACT OF ICT ON SOCIETY
Specific Objectives
By the end of the topic the learner should be able to:
a) Identify issues resulting from the use of ICT;
b) Discuss future trends in ICT.
Content
Issues resulting from use of ICT
a) Effects on employment
• job creation
• job replacement
• job displacement
b) Automated production
• pros & cons
c) Issues of workers health
d) Breakthroughs
• Health care
• Education
• Communication
• Research
• Commerce
• Arts
• Entertainment
• Transport
e) Cultural effects
• Computer crimes
• Moral effects
Evolution of computer systems
• Possible future trends in capabilities, physical size, price, software etc
• Artificial intelligence
i) expert systems
ii) natural language processing
ii) artificial neural networks
iii) robotics
Introduction
Issues Resulting from the use of ICT
Effects on employment
1. Job creation: New opportunities; computers operators,
programmers, network administration, information technology and
information science managers, database administrators, software
developers, system analyst etc.
2. Job replacement: Clerical and repetitive tasks that require a large
number of employees have been made redundant. Computer illiterate
are replaced.
3. Displacement: Loosing job, displacement of employees
from another place or department when computer skills are
required.
Automated Production
Advantages
Increases efficiency due to balancing of workload and production
capacity.
Improved customer service: Adequate and high quality goods are
produced in time.
Efficient utilization of resources
Disadvantages
High initial cost of setting up automated systems
Automated production may lead to unemployment
Issues of Workers Health
1. Repetitive Strain Injuries (RSI): Injuries resulting from wrist, hand,
arm, mode strain,tendonitis and neck strains due to forced repetitive
movement. The cure for RSI is by resting, sitting in a relaxed position
and changing typing techniques.
2. Eyestrains and headaches: Computer Vision Syndrome (CVS) is
characterized by eyestrains, headaches, double vision and other
problems caused by improper use of monitors. The solution for this
is good resolution, antiglare filters, adjusting brightness.
3. Stress
4. Isolation
5. Electromagnetic emissions: Computer users are advised to use
low emission device to avoid expressing thermals to excess
emission.
6. Radiation from the VDU causes birth defects, blindness, cancer,
miscarriage and sterility.
7. Computer chip toxin: workers are exposed to toxic chemicals in
chip manufacturing industries that may pose health problems
similar to those from the VDU.
Environment pollution: Huge garbage dumps of dead computer parts,
printers, ink, tonner cartridges, monitors and other computer accessories
are disposed in landfills causing environmental pollution. Nickel-cadmium
laptop batteries that contain toxic cadmium which when buried in a
landfill can leak into underground water tables and attachment areas.
Cultural Effects
1. Flaming: writing online messages that use derogatory, obscene or
dirty language.
2. Pornographic material
3. Computer crimes: hacking, eavesdropping, piracy etc.
4. ICT have erased people’s integrity by using computers as a tool to
accomplice their vices e.g. forge certificates, passports and other
document.
5.
Breakthrough in ICT
It has changed lifestyles in health care, education, communication,
research, commerce, art and design, entertainment, transport etc.
Evolution of Computer Systems
1. Rapid evolution in computer hardware and software.
Computers will become more intelligent
Software will b e more versatile and easier to use
Cheaper and more powerful computers which will have faster
processor
Industries will become more automated
More application software will be available because of high
speed, large available memory for programs
Education will have to gear itself to training students to computer
assisted services rather
than teaching them physically
Smaller size in computers
Operating systems that will handle real time data analysis and
objects oriented will be developed
Will have improved user interface that offers user easier and more
intrusive access to
information.
2.Artificial Intelligence (AI):
This is a branch of computer science that is concerned with the
development of machines that emulate human like qualities as learning,
communication, seeing and hearing.
Applications
1. Expert System: Software designed to make a computer operate at
a level of a human expert on a specific narrow area of specialization.
Examples are;
Mycin- blood and meningitis
Prospectors- Predicting mineral deposit in certain geographical
site
Delta- Repair diesel electric locomotive
Xcon
Components of artificial intelligence are;
1. Knowledge base: Expert system’s database of knowledge about
a particular subject.
It contains relevant facts, beliefs, assumption and procedures
for solving particular problems.
2. Inference engine: Software that controls the search for
knowledge in the knowledge
base , procedures and
conclusions.
3. User interface: Display screen that enables the user to interact
with the system.
2. Natural language
programming:
3. Artificial neural network: use of electronic devices and
software to enable the neurological structure of human basic.
Essential attributes;
The neurodes can be trained to distinguish between
what constitutes a signal and what doesn’t.
They are capable of recognizing patterns in large amount
of data that are
too complex for human beings.
4. Robotics: Computer controlled device that emulates human
beings in carrying out tasks that would otherwise be dangerous and
different.
Merits
A robot can work on repetitive task without getting
bored or tied.
Can work on dangerous areas unlike human beings
Increased production because they are capable of
working at a high speed
Leads to less operating expenses since less personnel is
required
Demerits
Lead to job replacement
Expensive to install
3. Expanded superhighway
Involves integration of cabled and wired technologies for the purpose of
data and information transmission.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1. Identify four problems associated with the introduction of
computers in a society.
(4mks)
o Job displacement and replacement
o Computer crimes, e.g. piracy, fraud, hacking
o Health effects, e.g. repetitive strain injury, eye
problems
o Cultural effects and immorality (DVD’s, pornographic
literature on the Internet
2. Distinguish between “job replacement” and “job
displacement” in reference to Computerization
(2mks)
In job replacement, the unskilled workers may be replaced
with the skilled ones. In job displacement, some
employees may be displaced/ moved to new working
areas as the computer may serve to perform tasks that
may be performed by several people.
3. A recent breakthrough in the manufacturing industry is the
development of a full manufacturing plant, that can produce
vehicles using robots only.
a) Give three advantages of fully automated manufacturing.
(3mks)
Increases efficiency due to the balancing of workload and
production capacity.
Production increases in the workplace
Improves customer service
Enables production of adequate & high quality goods in
time
Enables efficient utilization of resources, e.g. raw
materials, personnel and equipment; hence reducing
operating expenses.
b) State three other areas where automation is applicable.
(3mks)
- Intelligent control of traffic lights
- The autopilot in aircrafts
- Use of robots in industries
- Manufacturing industries such as vehicle assembly plants, oil
refineries, and food processing companies.
4. Discuss the applications of Artificial Intelligence in each of
the following fields:
i) Expert systems
In medical institutions for diagnosis of diseases
In mining companies for prospecting of minerals.
Financial forecasting, e.g. formulation of taxation &
marketing policies, and making of investment decisions.
Financial forecasting, e.g. formulation of taxation &
marketing policies, and making of investment decisions.
ii) Natural language processing (2mks)
It involves development of programming languages,
whether spoken or written
This will make the task of data processing even faster
iii) Artificial neural networks. (2mks)
This is the use of electronic devices & software to emulate
the learning process of the human brain and how it
recognizes patterns.
5. Explain the impact of information technology on
organization in each of the following areas
(i) Competition (2 mks)
- Ability to advertise in the internet
- Improved quality goods & services
- Reduced operational costs
(ii) Pace of growth (2
mks)
- Reduced costs
- Reduced need for manpower
- Reduced space requirement
- Greater output
6. State three reasons why users may resist the introduction
of information and communication Technology (ICT) to their
place of work
(i) Fear of change- people are creatures of habit, hence are afraid of
change
(ii) Fear of losing their jobs: By installing the computer into an
organization, employees fear that they might end up losing their jobs
(iii) Fear of failure – Since the computer is very new in a given working
environment, the people will be afraid that they might never get used to
it.
(iv) Loss of control: The management fear that once a computer
system is implemented, they might lose control of the organization.
CHAPTER THIRTEEN
CAREER OPTUNITY IN ICT
Specific Objectives
By the end of the topic the learner should be able to:
Describe career opportunities in ICT.
Content
a.) Description of careers in the field of ICT e.g.
i) Computer Operators
ii) Programmers
iii) Software Engineers
iv) Database Administrators
vi) System Administrators
vii) Computer Technicians
viii) Computer Engineers
ix) Information Systems Managers
x) Computer Trainers
xi) Web Administrators
xii) Systems Analysts
b.) Identification of further Educational Opportunities
i) Colleges
ii) Institutions
iii) Polytechnics
iv) Universities
v) Research Institutions
Introduction
Computer Operator
1. Entering data into the computer for processing
2. Keeping up to date records (log files) of all information processing
activities.
Computer Technician
1. Troubleshooting computer hardware software related problems
2. Assembling and upgrading computers and their components
3. Ensuring that all computer related accessories e.g. printers, storage
media, modems are in good working conditions
4. Help hardware engineers in designing and creating some
computer components e.g. motherboard, storage devices
System Analyst
1. Attributes/ Qualities of a good system analyst
2. Good problem solving skills and creativity: experience in problem
solving
3. Good communication skills
4. Must have business knowledge
5. Technical knowledge in hardware, software and processing
Responsibilities
Reviewing the current manual system and making
recommendations on how to replace it
Preparing system specification
Working with programmers to construct and test the system
Preparing instruction manual
Coordinating training for users of the new system
Computer Programmer
1. Writes in-house application programs/ system programs
2. Customize commercial application packages to suite the
organization needs
3. Test, install, debug and maintain programs developed
Software Engineers
1. Develop system and application software
2. Develop user and technical documents for the new software
3. Maintaining and updating software to meet day to day
requirement while overcoming challenges.
Computer Engineers
1. Design and develop computer components such as storage
devices, motherboard and other components
2. Determining the electrical power requirements of each computer
component
3. Re-engineer computer components to enhance its functionality and
efficiency
4. Design and develop engineers and manufacturing computer
controlled devices such as robots
Information Software Manager
1. Making sure that all tasks in the IT department are done correctly
and online in order to
support business planning, control and design making process
2. Providing budgets for the department
3. Keeping the department inventory records up to date
4. Managing human resources within the department
Database Administrator (DBA)
1. Designing and developing database application for the organization
2. Setting up security measures needed to control access to data and
information
3. Keeping the database up to date by adding new records, modifying
and editing
4. Computer Trainer
5. Training people how to use computer and other application
programs
Computer Trainer
1. Developing training reference materials
2. Guide learners on how to acquire knowledge through carrying out
research
3. Advising learners on the best career opportunities in the broad field
of ICT
4. Preparing learners for ICT examination
Web Administrator/ Webmaster
1. Developing and testing websites
2. Maintain, updating and modifying information on website to meet
new demands
3. Monitoring access and use of internet connection by enforcing
security measures
4. Downloading information vital for the organization
Computer graphics designing and typesetting
Designing graphical objects and professional publication
Network Administration
1. Set-up a computer network
2. Maintaining and enforce security measures on the network
3. Monitoring the use of network resources
4. Maintaining and troubleshooting network related problems
Computer Sales Representatives
1. Analyzing customer needs
2. Advertising them accordingly
Characteristics of a good computer sales representative
Must be confident
Be persuasive
Proficient in business communication
Further Education Opportunities
Universities
1. Public universities: They are established by state through the
award of charter run by state appointed management term.
2. Private universities: They are self-sponsored institutions set-up
by individuals, churches or Non Governmental Organizations (NGOs)
Research Institutions
1. Polytechnics: Offer diploma and certificate courses
2. Colleges: Offer diploma, certificate and craft courses.
End of topic
Did you understand everything?
If not ask a teacher, friends or anybody and make sure you
understand before going to sleep!
Solved KCSE Questions on the topic
1.Give a brief description of the following careers available in
the computing field.
(i)A Software engineers is one who is skilled in software development
and technical operations of computer hardware
He develops and updates both system and application software together
with the associated documentations.
(ii) Data processing managers (DPM) ( 2 mks)
A data processing manager is the person who usually is in charge of the
overall running of the data processing department in an organization
He plans, monitors and controls the personnel, ensures that resources
and labour are available as required and interfaces to users
2.Differentiate between software engineer and a computer
engineer ( 2 mks)
Software engineer develops software/ programs as per requirements;
computer engineer designs computer hardware and improves on existing
ones.
3.(a) Sate three public universities where one can further her
computer studies ( 3 mks)
- Nairobi university
- Moi University
- Kenyatta University
- Jomo Kenyatta University of agriculture and Technology (JKUAT)
- Egerton University
- Maseno university
(b) Identify at least three related courses offered at
(i) College level
- Certificate in information technology
- Diploma in information technology
- Diploma in Education (computer science)
(ii) University level
- Bsc. Computer science
- Bsc. Information technology
- Msc. Information systems
4.(a) Name three responsibilities that are carried out by a:
(i) Web administrator
- Develop & test websites
- Maintains, updates & modifies information on the websites to meet
new demands by the users.
- Monitors the access & use of internet connection by enforcing security
measures
- Downwards information needed by an organization or institution from
internet websites
(ii) Computer trainer
- Training people on how to use a computer & the various application
programs
- Development training reference materials
- Guiding learners on how to acquire knowledge through carrying out
research
- Advising the learners on the best career opportunities in the broad
field of ICT
- Preparing learners for ICT examinations
5.Explain two factors one would consider before enrolling for an
ICT course in a college
- The cost of the course
- Marketability of the course, i.e. whether it offers courses recognized
both locally and internationally.
- Basic course requirement, e.g. qualifications
- Job opportunities
PROJECT
Specific Objectives
By the end of the Project, the learner should be able to:
a) Identify and define a problem;
b) Carry out fact finding through either or all of these methods:
i) Investigation
ii) Observation
iii) Interviews
iv) Questionnaires;
c) Define systems hardware and software requirement;
d) Design a system;
e) Construct a system that would:
i) Input data through forms or screen
ii) Update: modification, deletion of existing data
iii) Carry out data validation
IV) Search/filter/query/retrieve records
v) Generate/print reports.
f) Test the system;
g) Prepare a project report(Documentation) that includes
i) Reports on fact finding system flowchart/flow diagram
ii) System flowchart/flow diagram
iii) Table/file structure descriptions
iv) Sample input and test data
v) Output reports
vi) User manual.
GENERAL REQUIREMENTS
Schools intending to offer Computer Studies are expected to have the
following minimum equipment:
1) Computer Laboratory/classroom(s)
ii) Computer desks that accommodate monitor at eye level
iii) At least one computer per every four students (1:4) in Forms one and
two and one computer for every two students (1:2) for Forms three and
four.
iv) At least one printer for every four computers
v) Printing Stationery
vi) Appropriate storage devices e.g. diskettes
vii) Storage facilities for diskettes and other consumables e.g. disk banks
viii) Appropriate software for the curriculum
ix) Relevant reference materials
Note: The computers to be used for the course should preferably be
IBMs or IBMcompatibles due to their low maintenance costs and
availability of spare parts.
In addition to the above, the following facilities though not mandatory
will greatly assist in achieving the objectives of the course.
1. HARDWARE
i) The PCs should be Pentium I I or higher
ii) The PCs should have a CD-ROM drive
iii) At least one of the PCs in the school should be full multimedia
iv) A network environment
v) Internet connection
vii) Printers with graphic capabilities (not necessarily in colour)
2. SOFTWARE
i) It is recommended though not necessary that the operating system be
a
Graphical User Interface (GUI)
ii) Software for the application packages may also be GUI - based which
supports pointing devices
iii) Up to date anti-virus software are highly recommended.