Computer Notes
Computer Notes
Data
Information
Information is data that have been processed, organized and communicated in a
coherent and meaningful manner.
e.g Botswana has a population of 2 million
Data Information
Raw facts and figures Processed data
Meaningless It has a meaning attached to it
1
Computer Hardware and Software
What is a computer?
A computer is a digital electronic machine that can store, process, retrieve, and
enable you to manage information, perform repetitive tasks so quickly that in can
execute user commands in a short period of time.
It is a device attached to a host computer(System Unit) but not part of it and works
under the control of the central processing unit to give the computer additional
functionality.
Disadvantages of a computer
This refers to the physical components or tangible parts of a computer. E.g Mouse,
keyboard, Printer e.t.c
2
What is a Device?
This term refers to a single hardware item.
Define Software
This refers to a computer program or set of computer instructions that are designed to
enable the computer to tackle some task and cannot be touched. Examples; Operating
systems, word processors, spreadsheet, graphics software e.t.c
System Unit
This is a unit that houses Central processing unit, Cooling fan, Power supply,
Motherboard and also some storage devices like hard disk drive and Compact disk
drive.
The central processing unit (CPU) has three main components. These are:
3
CONTROL UNIT
Functions
Categories of Computers
CATEGORIES OF COMPUTERS
Micro Computers
Mini computers
Main Frame Computers
Super Computers
Micro computers
These computers are typically used in homes, offices and schools. Processing is done by
a microprocessor and can also be used by one person at a time. Essential characteristics
are:
Small in physical size
One user can operate it at a time
Low processing power
Cheap to buy or purchase
Commonly used for personnel applications
4
Examples of micro computers
Desk top computer, laptop computers, Palm tops and Personal Digital assistants,
tablets, Smartphones.
Mini Computers
Mini computers are a medium sized computer which have processing power that lies
between that of a microcomputers and main frame computer.
Characteristics are;
Bigger in physical size than Micro computers
More expensive to buy that Micro computers but cheaper that mainframe
computers in terms of cost of purchase
More than one user at the same time ( Usually 10 to 60 users)
More processing power than Micro computers
More storage capacity that micro computers
Commonly used in medium sized business organisations, colleges, libraries and
small banks.
These are large, powerful computers which are capable of supporting large number
of terminals. They use multiple microprocessors to run many programs at the same
time. A main frame can address thousands of gigabytes of RAM (random access
memory and connect too high speed storage system that can hold terabytes of data.
Super Computers
The more powerful Mainframes are called super computers which have been
developed from the processing requirement of advanced research projects by
scientists. It is called super computer because of its processing power which well
exceeds those of the fastest mainframe and it focus is processing data and
manipulation of data. A significant difference between mainframe and super
computer is the primary focus of super computer on processing capabilities
independent of many varied input and output devices expected on a mainframe.
Example is Cray XMP from Cray Brand
5
Applications of computers
Mini computers
Where up to 100 users may use the same system simultaneously
Where high computing power is required.
Where a large amount of data has to be processed
Super computer
Used in advanced research
Used in space exploration
6
Input Devices
An input device is a peripheral that captures the data and sends it to the central
processing unit.
Input devices are categorised as Manual input devices and Direct / Automatic input
devices
Manual input devices are input devices that require a lot of physical effort from the
user to capture the data and send it to the central processing unit.
7
Magnetic ink character reader
Optical character reader
Magnetic strip reader
Digital camera
Microphone
Sensor
2.Barcode Reader
A Barcode reader is a direct input device that is used for reading bar coded data that is
used in labeling goods, numbering the books, etc.
e.g. Barcode readers are used in supermarket, libraries, luggage and handling systems
at airport etc to read barcoded data labelling goods.
An optical character reader is a direct input device that is used to read and recognize
printed text by scanning text from a hardcopy optically character by character,
converting them into a machine readable code and stores the text on the system
memory. E.g. This device can be used to used to scan a hardcopy and transfer
characters into the computer such that the captured text can be edited or changed
with ease.
5. Sensors
Sensors are used to measure and detect changes in the physical or chemical
environment and convert them into electrical signals.
Magnetic strips are thin strips of magnetic tape which are usually found on the back of
plastic credit and debit cards. When the card is inserted into a reader (in an Automatic
Teller Machine or ATM for example) the tapes slides past a playback head similar to
that used in a tape recorder. This reads the data from the stripe and passes it to a
computer
9
Input devices helping people with disabilities
1. Key to disk – This is a method of capturing data into the computer using a
keyboard.
- Manual data capture requires the use of a keyboard which is cheap to buy
- When entering data using a keyboard, a human worker may easily recognise
wrong data from the source and correct it during data entry.
10
Examples of direct data capture methods.
Optical character recognition – This is the method of using an optical character reader
to recognize and read printed text on documents by scanning text optically character
by character and converting them into a machine readable code and stores the text on
the system memory.
Optical Mark Reading – This is the process of capturing human-marked data which was
created using a pen or pencil from document forms such as surveys and tests using an
optical mark reader.
Magnetic ink character recognition – This is the method that allows special characters
printed in magnetic ink on documents to be recognised and read into a computer.
Barcode reading – This is a method of capturing data from barcodes on products using a
device called a barcode reader.
Magnetic Strip encoding – This is a method of capturing data stored in a magnetic strip
of bank cards, club membership cards e.t.c.
This is a computerized system for recording sales, taking payments, monitoring stock
and generating sales reports.
Cash register which also act like terminals to a main computer system.
Barcode reader
Keyboard
Printer
monitor
11
Electronic Fund Transfer at Point of Sale (EFTPOS)
Similar to the EPOS but a few additional features e.g. they are able to transfer
funds from the customer’s bank directly to the bank account of the shop.
Customer uses a card called debit card to make the transfer.
12
ADVANTAGES OF EPOS
Bar codes
A bar code is set of parallel printed lines that of different thickness (usually
alternatively black and white), which represent a number. Usually the number
represented by the bars is also printed above or below it.
Bar codes are used on shop goods; the number coded identifies the product, usually
giving a number code for:
Country of origin
Manufacturer,
13
An item number for the product.
Weight or size of the product
NOTES:
The price for the product is not included in the data on a bar code. This is
because prices change so often. Instead the price is stored in the computer and
when the price is needed it is retrieved from there.
The code is printed as an actual number, therefore if the scanner cannot read a
bar code the number can be keyed in instead.
A bar code has to be read by a scanner (bar code reader)
14
Output Devices
An output device is a peripheral, which receives data in the form of electrical pulses
from the CPU. It then converts this data into information or further data.
Note:
If the data is output as information, then people can read, look at listen to or
otherwise experience it.
If the output device converts the data to further data, this may be so that it can
be:
Stored,
Or sent somewhere,
Or used to control other devices.
While
A colour monitor is a monitor that can display text and images in multiple colours.
A computer monitor uses a pixel which is a short form of picture element to form
images.
A pixel is the smallest area or smallest physical points on a display which is used to
form images.
15
The resolution of the screen is a measure of how fine the detail is on the screen.
Screens are usually classified as low resolution, medium resolution or high resolution.
The screen mode is the way a computer uses the screen for graphics and text. Usually
the users have the choice of modes. They can choose from:
i. Resolution
ii. Dot pitch
iii. Refresh rate
Resolution
The resolution refers to the sharpness and clearness of an image. The monitor’s screen
that has large number of pixels has high resolution. For example, a resolution of 800 x
600 means that there are 800 pixels horizontally and 600 pixels vertically across the
screen.
Dot Pitch
The distance between each pixel on the monitor screen is called dot pitch. It is also
referred to as Pixel Pitch. Dot Pitch is another factor that you can use to measure
image clarity on a monitor. The smaller the distance between the pixels, the higher the
sharpness of image displayed on screen.
Refresh Rate
The refresh rate is the number of times per second the electron guns scan every pixel
on the screen to redraw the images on the screen. It is measured in Hertz (Hz) or in
cycles per second. Refresh rate is also referred to as vertical frequency or vertical scan
rate. The monitor refreshes itself at least several dozen times each second. The refresh
rate is very important because dots or pixels fade quickly after the electron gun passes
over them. Therefore, if the screen is not refreshed, it appears to flicker. The flicker is
one of the main causes of eyestrain. In general, a refresh rate of 75 Hz or higher should
not cause eyestrain. This means image on the screen redraws itself 75 times in a
second.
16
Video Card/ Display Adaptors
Many monitors use an analog signal to create an image on the screen. The video card is
installed on the motherboard. Video card is also known as graphics card. It converts the
digital output from computer into analog video signal. A cable on the monitor plugs into
a port on the video card. The video card sends the analog signal through cable to the
monitor and output is displayed on the screen.
TYPES OF MONITORS
The cathode ray tubes containing an electron gun at the back of the tube fires
electrons at groups of phosphor dots coating the inside of the screen.
When the electrons strike the phosphor dots they glow to give the colours. On a colour
monitor each group of phosphor dots is made up of one green, one blue and one red
dot (RGB).
By varying the brightness of each of these primary colours, the whole group will
appear to the human eye as any colour possible. One group of dots is called a pixel
(short for picture element).
17
CRTs can produce images with softer edges that are not as sharp as an LCD at its
native resolution.
CRTs give off electric, magnetic and electromagnetic fields.
Plasma Monitors
Plasma monitors use Plasma technology which is similar to cathode ray tube
technology.
There are light bits of plasma which are excited when they are struck with specific
pixels, which causes them to turn into a specific color. Plasma Monitors are not
dependent on backlight.
It's technology diverges the intensity of the light to produce its own range of colors.
The prize of Plasma will increase according to their inch and they are ideal for a big
space and area.
It has more pixels per inch than displays based on cathode-ray tube or CRT displays.
When compared to a CRT, it is less bulky.
Better Contrast Ratios when compared with CRT monitors.
It has a wider viewing angle than CRTs and LCDs.
It has less visible motion blurs
LCD technology makes use of a liquid crystal solution(tiny crystals) that is present in
two panes of polarized and partitioned glasses. By adjusting the amount of light that
passes through these panels through an electric voltage, images are created on the
screen.
18
LCDs are also used in watches and calculators. They use much less power than a normal
monitor and are also used in watches and calculators.
This technology also reduces blurring and color smudging during motion pictures, which
makes this type of monitor appropriate for gamers or film enthusiasts.
LCD monitors have no radiation emission from the screen, they are better under
brighter conditions because of anti-glare technology.
LCD monitors are lighter in weight with respect to the screen size.
LCD monitors require less power and generate less heat.
They have satisfactory performance even when mounted at higher altitudes when
compared to Plasma monitors.
They produce very bright images due to high peak intensity, very suitable for
environments that are brightly lit.
The image is perfectly sharp at the native resolution of the panel.
There is zero geometric distortion at the native resolution of the panel, they have a
superior resolution, and they have sharp resolution and imagery compared to
Plasma monitors.
They are immune to screen image burn-in.
LCD monitors are more expensive to buy compared to Plasma TV of the same size.
They have less picture quality when viewed on the side or at an angle.
There is motion delay for the fast-moving images.
They are not proficient at producing black and very dark grays, In a “standard”
configuration, they are not appropriate for use in dimly lit and dark conditions.
LCD monitors are more fragile than CRT monitors, Touching an LCD screen with
your fingers hard can leave pressure marks that forever mar the display.
LCD monitor is not as energy efficient as the LED monitors.
LED Monitor
LED (Light Emitting Diode) technology indicates the back-light system which is
introduced in some new LCD. It's not the chips which give you the high image content.
LED chips and pixels do not produce their own light, they are produce by back-light.
LED TVs are like the new LCD TVs. The only difference between LED TV and LCD TV is
that LEDs use KKK rather than using fluorescent backlight which is found in every LCD
TV.
19
Advantages of LED monitors
LED monitors are more expensive to buy than other monitor types
LED monitors can shift color due to age and temperature
The Contrast ratios are not consistent in LED Monitors
Printers
Impact Printers
This is a printer that creates an image by using some mechanism to physically press an
inked ribbon against the page, causing the ink to be deposited on the page in the shape
desired.
Non-Impact Printers
This is a printer that forms images and characters without direct physical contact
between the printing mechanism and the paper being printed on.
20
Differences between impact and non impact printers
The print head travels from side to side across the paper and is made up of numerous
pins, which are pushed out to form the shape of each character The pins hit an ink
ribbon against the paper so the characters are printed out. The paper is usually
continuous with holes down each side and perforations so the pages can be easily
separated by tearing.
Because the pins make an impact against the paper the characters can be printed
through several layers of self-carbonating paper to produce duplicate copies.
The printer resolution is measured by dot per inch (dpi)
Suitable uses:
Limited to situations where duplicate copies are needed and the quality is not
too important.
Typical uses might be in warehouses where duplicate copies of orders need to
produced quickly and cheaply
Disadvantages:
The printing quality is low - these printers produce low to medium quality black
and white printing and can only print low resolution graphics.
Because of the impact of the pins against the paper, these printers can be quite
noisy when printing
Advantages:
The purchase cost is low and the running costs are very low.
They can print fairly quickly, particularly if you remember that multiple copies
are being printed in one print run.
They are robust and can operate in harsh environments.
21
If several sheets of self-carbonating paper are placed into the printer then the
impact will produce duplicate copies.
An impact printer which uses a spoked wheel with characters placed at the end of each
spoke. A print hammer is used to strike the desired character on to the link ribbon and
then the paper. The spoked wheel of characters is rotated around until the desired
character is under the print hammer. The print hammer is then fired, string the
character, pushing it against the ink ribbon, and on to the paper. This printer is rarely
used today.
Ink-jet printers:
Suitable uses:
A popular choice for home use where small amounts of printing are done and
photographic quality colour printing is needed
Disadvantages:
The ink cartridges can be expensive so running costs can be high.
The printing speed is slow compared to a laser printer.
Advantages:
These printers are relatively inexpensive and produce high quality black and
white or photographic quality borderless color printing.
22
Laser printers:
Suitable uses:
Common wherever fast, high quality printing is required.
Disadvantages:
Non-colour laser printers are more expensive than ink-jet printers (but the
difference is narrowing).
Colour laser printers are considerably more expensive. (but their speed and
high quality output means they are becoming more popular).
Advantages:
They produce less noise when printing and fast and produce high quality
printouts.
Running cost is low because although toner cartridges are expensive to replace,
they last a long time.
Braille printer - by converting text into the Braille code, this printer produces patterns
of raised dots on paper for use by the blind.
Thermal printers:
These uses heated electrical wires to produce characters on the surface of a heat
sensitive paper. These printers require special paper which can be quite costly.
Thermal printers are mostly used for label printing.
23
Photo printers:
These are specially designed printers which allow you to connect a digital camera
directly to it in order to have your photographs printer
24
Plotters
Suitable uses:
Plotters are restricted to line drawing and can only create a solid region of
colour by drawing a number of close, regular lines.
Plotters are often used in science and engineering applications for drawing
building plans, printed circuit boards, bill boards and machine parts.
Advantages:
They are accurate and can produce far larger printouts than standard printers.
Disadvantages:
Slow and relatively expensive compared to printers.
They can only fill solid blocks of colour using closely hatched lines.
Speakers:
25
These transducers convert an alternating electrical current into sound. An electrical
transducer converts an electrical current into an output such as light, sound or
movement.
Suitable uses -
They can output music as well as the spoken word. Useful for blind users where text or
figures can be spoken by the computer. A speaker and computer-synthesized voice can
be used by automated systems to read information such as telephone numbers or traffic
updates.
Advantages –
Cheap and widely available. Capable of producing very high quality sound.
Disadvantages-
They are an analogue device so the digital sound signal has to be converted,
usually by a sound card.
Motors
Suitable uses
In control technology, a computer can be programmed to turn motors on and off using
relay switches. Examples include electronic doors and windows, cooling fans etc.
Motors are used in the automobile industry to move robot arms that spray body shells
or assemble and in electronics manufacturing to assemble delicate electronic
components on a printed-circuit board.
Advantages –
Cheap, widely available and very accurate.
Disadvantages-
They cannot be powered directly from a computer unless they are very low
powered so need a relay to control them.
Buzzers:
These cheap transducers change a current directly into a simple sound. They use a low
current so can be powered directly from a computer.
Advantages - Cheap and widely available. They use a tiny current so can be powered
directly from a computer.
26
Disadvantages - Limited volume and they can only produce a limited range of sounds
Lights:
A light-emitting diode
(LED) converts an electrical current directly into light. Today's LEDs can be found in
just about every colour of the spectrum including invisible infra-red.
Suitable uses –
LED's are commonly used to indicate various events such as 'power on' or 'hard disk in
operation' and to monitor other control applications. Infra-red LED's are used to
transmit the data from a remote control to the receiver. Normal light bulbs are used
with relays and control systems in automatic lighting and burglar alarms.
Advantages
Cheap, widely available and very reliable. LED's use a tiny current so can be
powered directly from a computer.
Disadvantages
-Braille printer – produces the output for people blind or partially blind
-Speakers – Helps people who cant see on the screen
27
Storage
Storage of data and programs is one of the most important features of an information
processing system. This can be done:
temporarily while a program is running;
long-term to preserve programs and data while not in use.
Read and Write
To write data means to move data or copy it from the main store to the backing store.
To read data means to move it or copy it from backing store to the main store.
Secondary storage Means data storage that has a large storage capacity, stores data
permanently and can be used to transfer data from one computer to the other and a
computer can still function without.
Primary storage means the memory that is required for a computer to start which a
processor accesses first or directly, it stores running programs or start up programs.
Read Only Memory (ROM) This is the primary storage that stores data and programs
permanently mainly boot or start up programs.
28
Random Access Memory (RAM)
Random Access Memory (RAM), is the primary memory that temporarily stores programs
that are currently running in a computer. E.g. When a game application is opened, its
data is loaded on random access memory but when the computer is switched off, all
the data is lost from RAM.
RAM VS ROM
RAM ROM
Stores data and programs temporarily Stores data and programs permanently
Contents of RAM can be edited Contents of ROM cant be changed or
edited
Stores the programs that are currently Stores start up programs
running in the computer
A Cache is a high speed storage are that stores data temporarily so that future requests
of that data can be served faster. E.g. Web Cache, Disk cache
29
Backing Storages(secondary Storage)
This Means data storage that has a large storage capacity, stores data permanently and
can be used to transfer data from one computer to the other and a computer can still
function without.
A storage medium is the material on which the data is stored or recorded, e.g.
magnetic tape, floppy disk, or CD-ROM.
A storage medium is exchangeable if it can be removed from the drive and replaced by
another one of the same type, e.g., floppy disk, CD-ROM, tape cartridge.
A storage device or drive is the piece of equipment which rotates the storage medium,
and access the data on it, either writing data onto it or reading data from it.
In serial access store all data before the required item has to be read first before the
data can be accessed. For example, magnetic tapes.
In direct access store any data item can be accessed without reading other data first.
E.g. magnetic disks.
Magnetic media which stores the binary data on a disk or tape coated with a
material that can be magnetized differently, depending on whether a 0 or 1 is
stored. E.g. Hard disk, Floppy disk, Magnetic tape.
Optical media which stores the binary data in a surface that reflects laser light
differently, depending on whether a 0 or 1 is stored. E.g. Compact Disc (CD),
Digital versatile disk (DVD)
Solid state media this is a type of non-volatile computer storage that stores and
retrieves digital information using only electronic circuits, without any
involvement of moving mechanical parts. E.g. Memory stick, Memory card.
Magnetic media
Magnetic Disks
The common magnetic disks are floppy disks and hard disks. A hard disk is a rigid
magnetic disk and a floppy disk is a light, flexible magnetic disk held in protective
jacket.
30
Characteristics: of Magnetic disks.
As the disk spin, data is written to them or read from them by read/write heads.
NOTE: When a disk is formatted, magnetic rings are written to the disk, ready to hold
data. Each ring is called a track.
Hard Disks
They are usually fixed in the drive of the computer. Each is built into the sealed
unit to prevent contamination by dust and moisture.
The hard disk medium of the computer is made of metal and it is inside the hard
disk drive. A hard disk is made from more than one disk, making a pack.
31
Hard disks store more data than floppy disks. They are more reliable and robust
than floppy disks. There is better protection against dirt.
Access to data is usually faster that access to floppy disks.
Storage of the operating system, applications software and users’ files for a PC.
Storage of the operating software and files for a local area network.
Storage of work waiting to be printed on the network printer.
Advantages:
o Very fast access to data. Data can be read directly from any part of the
hard disc (random access). The access speed is about 1000 KB per
second.
o Robust There is better protection against dirt.
Disadvantages:
o It can however be a real disaster when they eventually fail because few
home users have the data on their home computer hard drive backed up.
Floppy Disks
Floppy disks are removable and easy to carry about. Most computers have floppy disk
drives into the case. These can be found on most microcomputers and accept the usual
3.5 inch floppy discs. High density discs for a PC hold 1.44 MB of data (enough to store
about 350 pages of A4 text). A floppy disc needs to be formatted before it can be used
but most discs are now sold already formatted for PC's.
32
Characteristics of Floppy disks
Magnetic Tape
Magnetic tape is the main type of serial store. Just like the tape in a tape-recorder, the
data is written to or read from the tape as it passes the magnetic heads. Magnetic
tapes are often used to make a copy of hard discs for back-up reasons. This is
automatically done overnight on the Naledi network and the tapes are kept in a safe
place away from the server.
33
Characteristics of Magnetic Tapes
Magnetic tape has serial access – an item can only be accessed by working
through all the items before it.
Tapes store a large amount of data for their size.
Advantages:
Disadvantages:
o Accessing data is very slow and you cannot go directly to an item of data
on the tape as you can with a disc. It is necessary to start at the beginning
of the tape and search for the data as the tape goes past the heads (serial
access).
Optical Media
CD-ROM (Compact disk Read Only Memory) is a form of the compact disk used for the
storage of the computer data. This means you can only read from the disc, not write or
store data onto it.
They are also known as optical discs because the data is read by a laser beam
reflecting or not reflecting from the disc surface.
34
Like a floppy disc, a CD-ROM only starts spinning when requested and it has to spin up
to the correct speed each time it is accessed. It is much faster to access than a floppy
but it is currently slower than a hard disc.
Characteristics of CD-ROMs
Access to data is faster than access to floppy disks but slower than hard disks.
Most of then are 8 / 12 cm in diameter.
Note: New recordable CDs are available. (WORM - Write Once Read Many)
CD-ROMs are good for storing information that is not liable to be changed. Information
that is not used frequently can be store in a CD-ROM.
Advantages:
o CD-ROM's hold large quantities of data (650 MB).
o They are relatively tough as long as the surface does not get too
scratched.
Disadvantages:
o You cannot save files to a CD-Rom (although CD-R and CD-RW discs now
exist which can be written to)
35
BINARY CONVERSION
Computers work with data, which, to them, is more than a string of symbols. These
symbols are letters, numbers, other characters, can be pictures and graphs. Inside the
computer, all this data is represented in the form the computer will understand (in the
computer’s own codes).
These codes are based on two symbols only – the digits 0 and 1. The digits ( 0 and 1)
are also used in the base two (binary) number system. They are given names bits
short for binary digits
Computers use a common code called American Standard Code for Information
Interchange (ASCII). An ASCII code is an 8-bit character code. A convenient grouping of
bits inside a computer is in sets of 8 bits. A set of eight bits is called a byte. A byte can
store an ASCII character with only one bit left.
Note:
1 bit = a single digit, either 1 or 0
8 bits = 1 byte, a combination of 1's and 0's
1024 Bytes = 1 KB (kilobyte)
1024 Kilobytes = 1 MB (megabyte)
1024 Megabytes = 1 GB (gigabyte)
1024 Giga Bytes = 1 TeraByte
Or
Bytes make up Kilobytes of 1024
which make up Megabytes of 1024 X 1024
which make up Gigabytes of 1024 X 1024 X 1024
To convert from a base-10 integer numeral to its base-2 (binary) equivalent, the
number is divided by two, and the remainder is 0 if the number is divisible by 2
otherwise 1. The (integer) result is again divided by two and the remainder is saved.
This process repeats until the result of further division becomes zero.
36
Operation Remainder
118 ÷ 2 = 59 0
59 ÷ 2 = 29 1
29 ÷ 2 = 14 1
14 ÷ 2 = 7 0
7÷2=3 1
3÷2=1 1
1÷2=0 1
Reading the sequence of remainders from the bottom up gives the binary numeral
11101102.
To convert binary to decimal, assign a weight to each bit, multiplying each bit's value
(0 or 1) by its weight, and then add the totals. For example, here's how 217 is
represented as 11011001 in binary:
Addition
Addition is done exactly like adding decimal numbers, except that you
have only two digits (0 and 1). The only number facts to remember are
that
37
0+0 = 0, with no carry,
1+0 = 1, with no carry,
0+1 = 1, with no carry,
1+1 = 0, and you carry a 1.
The only difficulty adding unsigned numbers occurs when you add numbers
that are too large. Consider 13+5.
38
HEALTH RISKS:
Repetitive Strain Injury (RSI) - This is caused by repetitive finger movements over
long periods of time and can cause serious pain in the finger joints.
Special, ergonomically-designed keyboards where the keys are split and contoured for
the hands, can be purchased.
Eye Strain - Eye strain is quite common among people using monitors over extended
periods of time. It can result in irritated eyes and blurred vision.
Solutions - to reduce eye strain, users should look away from the
monitor and focus on a distant object from time to time to relax their
eye muscles. An anti-glare screen can help some users.
All new monitors must comply with EU standards which ensure that
radiation emission is as low as possible and all new screens must be
fitted with tilt and swivel stands.
39
Lower Back pain - Sitting at the computer for long periods of time is never
comfortable. Leaning back in the chair reduces the pressure on the spine but then the
arms have to reach forward to the keyboard creating muscle tension which leads to
aches and pains in the neck, shoulders, back and arms.
Solutions - while working at the keyboard, the correct seating position is sitting upright
with the feet flat and the lower arms and thighs in a roughly horizontal position.
Adjustable chairs that give the maximum support for the back are also best.
Sufficient room is needed for the monitor to be moved back and forward. Ideally, the
top of the monitor should be at eye level.Even with a comfortable working
environment, it is still good to stand up, stretch and move around at regular intervals.
Safety Risks:
Power supply:
Fire risks:
It is best to avoid eating and drinking near to computer equipment. Food crumbs
can prevent a computer mouse or keyboard from working properly. Any spilt
liquids are a possible fire risk near electrical equipment and can easily ruin items
such as floppy disks.
40
Heat and Light:
Computers generate a considerable amount of waste heat and the room should
therefore be adequately ventilated or even air-conditioned.
The lighting should be subdued to reduce glare from computer monitors. Direct
sunlight should be avoided using suitable blinds etc. Computer monitors should
ideally be placed at right-angles to any bright light sources.
41
Software
Software refers to computer programs. Software is a general term for programs which
are written for computer users.
Examples of software
Types of Software
There are two major types of software, system software and application software.
Operating system
Utility programs
Program translators
Device drivers
Boot programs
42
OPERATING SYSTEMS
An operating system is software that controls the general operation of a computer and
carry out the tasks like controlling the use of peripherals, Controlling the loading and
running of programs, Organising the use of the main store e.t.c.
These include UNIX, MSDOS (Microsoft Disk Operating System), Windows 95/97/98/ NT,
Windows 2000, windows XP, Novell Netware. Mac OS and LINUX
This is the type of operating system that allows only one application program to run in
the computer at the time and only one user works at that computer. Example:
Microsoft Disk Operating system allows only one application program to run in the
computer at a time and only one user uses that computer at a time.
Multi-programming
This is a computer system that allows more than one application programs to be held in
Random access memory at the same time. This usually refers to a large computer which
is running different programs for different people.
Multi-tasking
Multitasking is when a computer runs two or more application programs at the same
time.
Example
Using a word processor to type a letter while at the same time using a music player to
play music in the same computer at the same time.
Batch Processing
This is the type of processing where input data or a list of jobs are collected and
grouped into a batch and processed at a later stage all at once or at the same time.
Examples include
Payroll processing
Cheque processing
Water bill processing
43
Electricity bill processing.
A multi user system is a computer system that allows more than one users to use it at
the same time.
- A multi user system allows two or more users to use it or connect to it at the
same time.
- Different users use their terminals to connect to the computer system through a
network.
- The resources are allocated to these users / terminals by a server they are
connected to.
Real-Time processing
This is the type of processing where the response or output is given out immediately
from the data input.
Examples of applications that use real time processing are Real time systems and Real
time transactions.
Real time systems: This is a system that processes input data quickly and gives the
output of the data input immediately, timing is critical when processing and giving out
a response or the output to the data input.
44
Real time transaction: This is a transaction where an immediate response or output is
given from data input into a system where timing is not critical when processing the
data or giving the output.
45
Utility programs
A Utility program is a system software that carryout routine tasks in a computer like analysing,
configuring, optimizing or maintaining a computer.
Interfaces
Operating systems provide user interfaces; a user interface is what the user sees and works with
when using a computer. A user interface consists of menus, prompts, icons, cursor etc.
With a CLI the user types a command to get something done. This type of user interface is not
easy to use if one is new to the interface/software, there are many commands to learn and
remember.
DOS, which stands for Disk Operating System, is a very commonly used command-driven user
interface.
Examples of commands
dir in MS-DOS and list in Linux– displays all the files that are stored in the current directory
mkdir in MS-DOS – creates a directory in the current directory
46
Advantages of CLI
Many IT professionals favor CLIs because they make up little RAM and are quick to
operate.
Many commands can be grouped together as a batch file so that repetitive tasks can be
automated.
Disadvantages of CLI
Many commands have to be learnt
Main Menu
Backup Options
F1 Load new program
F2 Run program F1 Restore a file
F3 List files on disc F2 Make backup copy
F4 Backup options F4 Pressed F3 Main Menu
ESC Quit
F2 Pressed
Advantages
They are easy to use as the user does not have to remember sets of commands.
They are user friendly - you can often guess your way around the options.
47
Disadvantages
They can be irritating if there are too many levels of menus to move around - with a
command line interface you can go to the option required immediately.
WIMP systems are the most widely used type of graphical user interface.
WIMP stands for Windows Icons Menu Pointer. Options are represented by small pictures or
'icons' arranged inside rectangular boxes called windows.
Advantages of GUIs
They are easy to use without the need to know commands.
For any application the interface is familiar
The user environment can be changed easily
Disadvantages
They require a lot of RAM to store the graphic images
They require a lot of processing power to refresh the display
A lot of disk space is needed to hold all the functions
It is difficult to automate functions for expert users
It also should consider the needs of the users. For example, young children are likely to prefer
pictures to words and people with disabilities may benefit from particular input or output
devices.
48
Applications Software
Application programs or packages (groups of programs) are designed to enable the computer to
tackle a specific task, such as writing a letter. Application software caries out user-related tasks
and can be classified as off-the-shelf, custom written or tailor-made.
Software written to
Applications Software the specification of a
particular
organisation or
customer.
Software that Prewritten
can be made to Off-the-shelf ready to
Custom-Written /
do many buy
different tasks. Bespoke
Generic Software Special Purpose
/ General Purpose Software to perform a
specific task e.g. payroll,
accounts, stock control,
fill in forms
Individual Integrated
Programs Software
Packages A number of different pieces of software
that can share / merge data.
Excel, Word, e.g.
PowerPoint etc.. 1. A graph from a spreadsheet can be placed in a
report.
2. Common screen design / toolbars / icons
18/06/2010 Microsoft Office makes it simpler for people to learn.
11
‘Off-the-shelf’ software
This refers to the software that is ready made and available for sale, lease or license to the
general public.
Advantages
The software tends to be relatively cheap as the cost of development can be spread over
a large number of users
The software can be very sophisticated (e.g. Excel or Word) as the revenues from a very
large numbers of users means that a lot of resources can be applied to it's development
It is easy to get support and literature is usually widely available as there are many other
users using exactly the same software
It is easy to share files produced by the software with others as chances are they also have
the software available to open the file
49
Disadvantages
The software can be highly complex and will usually include large sections that you will
never use
It tends to be a compromise. By it's nature it is designed for many different types of users,
each of whom will have different requirements
As the software tends to be large and complicated it may take a long time to learn
properly (some of the most asked for additions to later versions of Word were ones that
already existed in the previous version)
You may have to alter the way that you work in order to fit in with the way that the
software has been designed
There will probably be operations that you require that you simply cannot do with the
software
As the same system can be bought by your competitors it is very difficult to gain any
competitive advantage from it's use
A general-purpose application package is a type of software that can perform many different
related tasks. Word processors, spreadsheets, databases, graphics and presentation software are
all examples of application packages.
This type of software is sometimes called generic software. This means, for example, that any
one of the many different word processing packages that you could buy will all do the same
general sorts of tasks as each other
1. Integrated package
An integrated package combines many different types of application together in one single
package.
Integrated packages normally include facilities for word processing, spreadsheets, databases,
graphics, presentation and communications.
Specialist application software performs a single very specific type of task. Programs to work out
payroll, calculate accounts, plan driving routes, work out income tax returns, deal with stock
control and handle appointments are all examples of specialist application software.
50
Tailor-made / Custom made or bespoke
This refers to the software specially developed for the purpose to suit the requirements of a
particular customer.
Advantages
It has been specifically designed for your particular requirements and can be tailored to fit
in exactly with the way that your business or organisation wishes to operate.
It can be customized to interface with other software that you operate with the potential
to provide you with a fully integrated IT infrastructure across your whole organisation
Users will usually find it easier and more intuitive to use as it should not contain
unnecessary facilities and should operate in the way that they are used to working
It is much more flexible than packaged software and can be modified and changed over
time as your requirements and business practices change
You will receive much better support and can in many cases talk directly to the developers
concerned
The use of professionally developed bespoke software applications can give you a
significant business advantage over your competition
Disadvantages
The investment required will usually be much higher than with packaged software. This is
usually the biggest reason for not going down the custom route - you need to undertake a
business justification exercise and compare the costs against the expected benefits and
commercial advantages.
A large investment in your time is required during the development process and a
bespoke application will take longer to implement.
It can be difficult to get support for bespoke software, unless the developers themselves
offer support services.
If you do not have the source code you are dangerously exposed and are wholly
dependent upon the developer's continuing existence and good will.
If you pick the wrong developer you could end up with an application that is unstable,
unreliable and full of bugs
51
Examples of Application software:
- Font size/type/style
- Text alignment
- Editing features like cut/copy/paste
- Proofing tools
- Save or save as
PROGRAMMING LANGUAGES
A program is a set of instructions that the computer follows when it runs the program.
Programming languages can be divided into 2 groups which are low level languages and high
level languages
A low level language is a programming language that provides little or no abstraction from a
computer’s instruction set architecture.
52
Machine code
This the only programming language that is directly recognized by the computer and does not
need any translator program.
It is written as strings of 1's (one) and 0’s (zero). When this sequence of codes is fed to the
computer, it recognizes the codes and converts it in to electrical signals needed to run it. For
example, a program instruction may look like this:
1011000111101
Assembly Language
Assembly language is a low level language that uses a set of symbols and letters in order to
communicate with a computer.
Assembly Language and a translator program is required to translate the Assembly Language to
machine language.
- Low level language written programs are machine dependent as a program written for
one computer might not run in other computers with different hardware configuration.
- It is difficult to debug programs written in low level languages
- Low level languages are difficult to learn
- It is difficult to program or write a program in low level language
53
Examples are
- BBC Basic
- Visual Basic
- Fortran
- C++
- C
- COBOL
- JAVA
- LOGO
- Python
- Ruby
- PERL
All programming languages actually run as machine code. High level languages are either
translated into machine code while they are running (slower but easier to make changes) or
compiler software converts the whole program into machine code before it is run.
Program translators
A program translator is a software that converts a program from one programming language to
another programming language.
54
Compiler
It is a program translator that translates the instructions of a higher level language to machine
language by scanning the entire program first and then converting it into machine code for the
program to be executed.
It is called compiler because it compiles machine language instructions for every program
instructions of higher level language. Thus compiler is a program translator like assembler but
more sophisticated. It scans the entire program first and then translates it into machine code.
The programs written by the programmer in higher level language is called source program. After
this program is converted to machine languages by the compiler it is called object program.
A source code or program is a computer program that is in its original high level language before
being converted into machine code.
An object code or program is a computer program that has been converted into machine code by
a compiler.
Object program generated by compiler is machine dependent. It means programs compiled for
one type of machine will not run in another type. Therefore every type of machine must have its
personal compiler for a particular language.
- A compiler produces an object code after a program has been compiled which means next
time when a program is run the object code is run without the need to do another
translation and this makes compiled programs faster to run.
Disadvantages of a compiler
Interpreter
An interpreter is a program translator used for translating higher level language into machine
language by taking one statement of a program, translate it into machine language and
immediately execute it before moving to next instruction.
55
The disadvantage of interpreter:
56
DATA AND FILE MANAGEMENT
DATA TYPES
It is the term used to describe the kind of data used e.g. whether it is a number or a letter.
- Character: One of the symbols used to make up data. e.g. a letter (A…Z), a
punctuation mark or any digit of a number (0…9) etc. All keyboard combination
characters.
- Character set: this is a set of letters, digits and other symbols used for
representing data. These include numeric characters (digits), alphabetical
characters (letters) and even special characters (punctuation marks, mathematical
symbols, etc).
- Text
- Date/Time
DATA CODING
Coding data refers to a method of storing data where codes are assigned to it or the shortening
of data in an agreed manner in an organization.
57
DATA ENTRY CHECKS
The two data entry checks that are used to ensure that data has integrity when entering it into
the computer are Validation and Verification.
VERIFICATION OF DATA
This refers to checking whether the data that has been entered into a computer resembles data
from the source.
- Proof reading: This refers to checking each word or piece of text or data that has
been entered into the computer against the document where it was copied from
to check if they match or are the same.
- Double entry: Is a method of verification which involves two people entering the
same data into a computer, If the data is identical then it is accepted and
processed but if one of them enters wrong data, it will not be accepted and a
message will be generated.
VALIDATION OF DATA
This means checking whether the data that is being entered into a computer is reasonable,
consistent, accurate or complete.
- Check digit
A check digit is an additional single digit calculated from a string of numbers and then placed
at the end of those numbers for error detection purposes. For example; An International
Standard Book Number (ISBN), Bank account, Barcode have a check digit placed at the end.
58
It then matches the check digit it has calculated with the one that was entered to see if the
match, if they match the data is valid, if they don’t match the data is not valid.
- Range check
This is a validation check technique that checks whether the data that is entered into a
computer lies within a specific range as set by the system user.
- Presence check
This is a validation check technique that checks whether the all the data that is supposed to be
entered into the computer has been entered.
- Length check
This is a validation check technique that ensures and checks whether the data that is entered
into a computer is of the set specific length.
- Format check
This is a validation check technique that ensures and checks whether the data that is entered
into the computer is of the format that has been set.
Verification Validation
o Data is checked after o Data is checked at the time
entry of entry
o Done both manually o Done by software
and by software o Application to small data
o Application to large o Criteria used
data
o No criteria used.
59
File Organization
Database
A database is an organized collection of data for one or more purposes, usually in digital form and
sometimes on hardcopy.
The data are typically organized to model relevant aspects of reality (for example, the availability
of rooms in hotels), in a way that supports processes requiring this information (for example,
finding a hotel with vacancies).
Some examples of databases you may encounter in your daily life are:
a telephone book
T.V. Guide
airline reservation system
motor vehicle registration records
papers in your filing cabinet
A database management system (DBMS) is software that provides you with the software tools
you need to organize that data in a flexible manner.
It includes tools to add, modify or delete data from the database, ask questions (or queries)
about the data stored in the database and produce reports summarizing selected contents e.g.
Access, FileMaker, Lotus Notes, Oracle or SQL Server
A file has to have a name which is recognized by the system consist of some kind of extension
identify the kind of data in the file.
Example of a file
- student file
- Payroll file
- Inventory file
Etc.
A Table:- This is an object within database software that organizes data in rows called records
and columns called fields.
60
Record: This is a row in a database table that shows a set of related data representing the details
of an individual item, a thing or a person.
For example: a single record may contain information about a person such as their name, age,
gender, home address and phone number.
Field: This is a column in a database table that represents a single unit of data entry in a record
that is assigned a data type. A field contains information about one thing in a record. For
example the name field contains information about a person’s name.
Primary Key: This is a field that uniquely identifies each record in the database software
table.
Foreign key: A foreign key is a field in a relational table that matches the primary key
column of another table. The foreign key can be used to cross-reference tables
Arranging database components in terms of size starting with the smallest to the largest
61
FIELD
RECORD
TABLE
FILE
Directories
A directory is a small file on a disc, which is used by the operating system to locate the other
files on the disc.
The directory contains a list of names of files and the information needed to access the files on
the disc. The information given in a directory can include:
A directory can mean the area of a disc where files are stored. The main directory on a disc is
called the root directory. A sub-directory is a part of the root directory.
Types of Files
Transaction file:- It is used to hold temporary data which is used to update the master file. A list
of transactions. In a business this might be a list of sales for the day. At the end of the day the
transaction file is merged with a master file to update such information as shop stock levels and
year to date sales totals.
62
Differences between master files and transaction files
Holds the data that can be amended or added It is used to update a master file
The method of access to a file refers to the way in which a program reads data from a file or
writes data to it.
Serial access: A method of access to data in which blocks are read from the storage medium in
the physical order in which they occur, until the required item is reached.
We have serial access data on a tape. To read information at some place in the middle of the
tape we must go through step by step through all proceeding parts of the magnetic tape first.
Magnetic tapes have high capacity and are cheap. Alternatively, hard disks can also store a lot of
data but they are much more expensive to buy than tapes.
Sequential access: sequential access is the method of file access where the data in a memory
array or storage medium is accessed in a predetermined, ordered sequence.
Records are held in a logical sequence and accessed in that logical sequence. Where the items are
read, one at a time, from the logical start of the file, in key value order because the records in a
file held on a serial access device (Magnetic tape) need to be stored into the order in which they
are to be processed.
Selected records can be accessed far more quickly from direct access.
Records can be accessed in any chosen order.
Records do not have to be put into any particular order before the file is created.
63
Advantages: of sequential over direct
64
SYSTEM DEVELOPMENT LIFE CYCLE
System development life cycle is the overall process of developing information system
through a multistep process from investigation of initial requirements through analysis,
design, development, implementation and maintenances.
Feasibility study
Analysis
Design
Testing
Documentation
Implementation
Feasibility Study
This is an investigation that is carried out by a systems analyst to find out what the
main problems are with the existing system and if it is technically possible and cost-
effective to solve these problems by developing a computer based solution.
Technical Feasibility
Deals with the question of whether the proposed system will archive its
objectives, in other words will it work, Advances in technology may that a
system was not feasible a couple of year ago are now a possibility.
Social Feasibility
Economic Feasibility
It considers whether the new system will be cost effective. There are two types
of cost involved: Development cost, running cost.
A feasibility report is produced from the findings. The following are contents of a
feasibility report;
Analysis Stage
During the analysis stage systems analysts investigate the existing system to identify
exactly what the problems are with the existing system
The fact finding methods used to collect the data are as follows:
- Questionnaire
- Interview
- Document study / Literature review
- Observation
66
Questionnaire: This is a method of data collection where by a set of questions related
to the system being used are given to the respondents as hardcopy or softcopy to
answer at their own time and then collected after a certain time by the data collector.
Interview: This is the data collection method whereby there is a one on one session
between the data collector and the respondent, the data collector asks the respondent
questions related to the system and the answers are given immediately.
Observation: This is a method of data collection where by the data collector goes to
the organization and looks at how things are being done, making notes.
Literature review/Document study: This is the data collection method where by the
data collector goes to the company and studies relevant company documents or records
related to the system being used.
Design Stage
Testing Stage
Testing carried out using the plan to make sure that all the parts of the system work
correctly with normal, extreme and erroneous data
Normal test data is used to check if the system can accept valid data or the data
that would be expected during day-to-day use of the system.
Extreme test data is used to check if the system can accept the valid data that
lies on the boundaries of the range checks in the program.
Abnormal test data is used to check if a system can identify invalid data and
properly handle it by rejecting it.
67
Documentation Stage
Producing documentation
Program listing
systems flowcharts;
program flowcharts;
list of variables / data dictionary
file structures
purpose of the system
screen layouts
print formats
hardware requirements
software requirements
sample runs
User documentation
Implementation Stage
68
Implementation strategies
Direct implementation:
With this strategy, the changeover is done in one operation where by the new system
completely replaces the old system in one go or overnight.
Advantages:
Disadvantages:
Most stressful for the users - the old system has gone so there is no going
back if they have difficulties.
Most difficult to train staff on as the new system was not in place to learn
on before the change over.
Most stressful for the developers - all the data and files from the old
system will have to be converted ready for use on the new one.
Most risky - if the new system does not work properly then there is nothing
to fall back on.
Phased implementation:
With this strategy, the new brought in in stages or parts(phases), the first stage or part
is introduced, if it is deemed successful then the next stage or part is introduced and so
on and on until eventually the final stage or part gets introduced for the new system to
fully replace the old system.
69
Advantages:
Very structured, each phase can be fully evaluated before moving onto
the next one.
Lower risk, a well planned and controlled introduction of the new system.
Easy to train staff by letting them learn new skills on each phase as it is
introduced.
Disadvantages:
Slower than direct implementation.
Although each phase is easy to evaluate, you have to wait until all the
phases are complete before you can evaluate the whole change over.
Pilot implementation:
With this strategy, the new system replaces the old one in one operation or one part /
section of the organisation, if the system is successful then the pilot is extended until it
eventually replaces the old system completely in the entire organisation. For example
it might be tried out in one branch of the company or in one location.
Advantages:
Easy to control, the pilot can be halted at any time.
Easy to evaluate because the new and old systems are both running.
Low risk, if a small-scale pilot fails then not too much has been lost.
Easy to train staff by letting them learn new skills on the pilot system.
Disadvantages:
It can be slow to get a pilot to completely replace the old system.
A pilot may not show up problems that a full-scale implementation would.
This is because a system can work well as a small-scale pilot but has
difficulties when it is scaled up to a full operating system with more
realistic volumes of data to be processed.
70
Parallel running implementation:
With this strategy, the old and the new system are both used alongside each other for a
certain period of time, both being able to operate independently, if the new system
works well, the old system is stopped and new system carries on as the only system.
Advantages:
If there are initial problems with the new system then the old one can still
be used.
Both systems can easily be compared.
Easy to train staff by letting them learn new skills on the parallel system.
Easy to evaluate because the new and old systems are both running.
Disadvantages:
Expensive - both systems are being run as fully operating versions so both
are doing the same job. This may mean duplication of staff and
hardware.
Some risk - there is a greater chance of confusion or errors if the two
different systems are being run side-by-side.
Maintenance Stage
71
DATA LOGGING
Definition:
Types of Data
Analogue Data
It is the data that is represented by a quantity that varies continuously. The value of the data item
at a given time is represented by the size of the quantity, measured on a fixed scale.
- Some watches have an analogue display, where the hands move continuously round a
dial. The time is represented by the position of the hands on the dial.
- Conversations travel on an old telephone circuits as an analogue signal. The size of the
signal depends on the loudness of the speech. The words spoken show up changes in the
frequency of the signal.
Digital Data
Digital data refers to the data that is can be set to separate or discrete values or states. The
combinations of these values represent data. Digital devices are usually binary and the data is
represented as a succession of 0s and 1s.
- An electronic calculator. The display is digital with the numbers in decimal. Each digit can
have any of the ten separate states (that is the numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9). The
circuits inside are digital with binary digits represented by 0 volts and 5 volts.
- Some watches have a digital display – digits shown on a little display screen represent the
time.
- Telephone conversation can be digital.
72
How the data is collected:
Sensors are used to input the data into the data-logging equipment. Almost any
physical property can be measured with the correct sensor.
The data logger collects the data at regular intervals (the logging interval) for a set
length of time (the logging period).
Logging period: total time for which the data is going to be logged/collected
Digital sensors - these are either on or off i.e. a light gate sensing something
breaking a light beam. Such sensors can often be connected directly to a
computer as the data output is already digital.
Analogue sensors - these measure some physical quantity by converting it into a
voltage. The voltage signal is then converted into digital form by an interface
(ADC-Analogue to Digital converter) and either stored or transferred directly to a
computer. The vast majority of sensors are of this type
- Data logging can be done in places that are hostile or dangerous for human
beings. E.g collecting data in a nuclear reactor or active volcano
- With data logging, data can be collected over very short time intervals that
would be impossible or impractical for a human operator.
73
Unattended soil moisture level recording.
Unattended gas pressure recording.
Offshore buoys for recording a variety of environmental conditions.
Road traffic counting.
A flight data recorder (FDR) also known as black box, a piece of recording equipment
used to collect specific aircraft performance data
A voyage data recorder (VDR), a data recording system designed to collect data from
various sensors on board a ship.
The sort of life-support systems found in intensive care units will make extensive use of
data-logging equipment. The patients will have sensors attached to them which will
continuously measure data such as temperature, blood oxygen level and heart rate.
Advantages:
24 hour monitoring takes place without having to use a human operator who
would need breaks, could lose concentration or could get tired and make
mistakes.
Alarms would be set off automatically if any m6easurements exceed a safe
value.
A continual record can be stored or printed out of everything that is being
measured.
2 - In an experiment:
74
Advantages:
A control system is a system that manages or regulates other devices in order to get the
desired output.
A computer or microprocessor
A sensor
A control program which handles data from sensors and sends signals to output
device
An interface box(ADC) to convert signals between the sensor and processor
Sensors
75
Example might be a:
Once they have taken a reading or measurement, they might send that reading straight
back to the computer or they may store it up and take a set of readings over time and
send them back in a batch.
Types of sensors
Heat
Light
Humidity
Pressure
Smoke
Sound
Tilt
touch
Most sensors take analogue measurements. This means that the measurement can have
a wide range of values or be on a continuous scale. All computers need digital data in
order to be able to understand it and process it. Digital data only has two values either
0 and 1 or On and Off.
In order for the data collected by the sensor to be understood by the computer, it
needs to be converted from an analogue signal to a digital signal, so
An interface (ADC) box is needed to convert the data from the sensors in to
computer data. The ADC is connected between the sensor and the computer’s input-
output port and it is called an ‘interface’.
Actuator
An actuator is often part of a computer control and monitoring system. The actuator is
a mechanical device or motor, which carries out the action or decision made by the
control system.
76
For example, in a greenhouse, sensors may measure the temperature. When the
temperature rises too much, the control system will send a signal to open the windows
or vents.
The actuator is the motor, which will open the vents. Likewise, when the temperature
drops, the control system will send a message to the actuator (motor) to close the
vents.
Process
Once the input data from the sensors has been received by the computer, it can then
begin to process it. The data will be compared against a set of rules which have been
programmed into the control system and a decision will be made.
1. The sensor will take regular temperature readings in the room and send the
readings back to the computer.
2. The computer will then process the data to see if it matches the ideal 22 degrees
C.
3. If it is lower e.g. 20 degrees C, then the computer will need to identify the
correct response (e.g. the heating must be turned on).
4. If it is equal or above 22 degrees C then the computer must identify the correct
response (e.g. the heating must be turned off).
This stage is called processing. The computer can only follow the rules that it has
programmed into the control system, it cannot make its own decisions
Open Loop System: only looks at its input signal in order to decide what to do but does
not take account at all of what is happening to its output.
77
Examples of 'open-loop' systems:
a) You set the microwave oven to run for two minutes. After cooking
for two minutes, the control system turns the microwave off. It has no idea whether
your food is still frozen, burnt or cooked perfectly.
b) You program the video recorder to start recording the football game at 7.30pm.
However, because the news program finished early, you miss the first vital 15 minutes
of the match. Because the system is only checking its input (time), it had no idea that
the starting time of the match had changed.
A Closed loop / Feedback system takes place when the output from the system has a
direct effect on the input or when some of the output signal is channeled back into the
system to become the input.
What are the differences between a closed loop system and an open loop system.
In many computer controlled systems sensors provide the inputs. If such a system uses
feedback then there are also sensors monitoring the outputs.
For example:
78
Because the inputs that monitor the outputs are fed back into the system (hence the
term feedback) they can be used to control the outputs. For example:
If the input sensor detects that the greenhouse is too hot then the output, the
heater, is turned off.
If the input sensor detects that the washing machine is full then the output, the
pump, is turned off.
Control systems are used in robots so that they can perform task which where
performed by human beings. Below are ways in which robots are used in day to day
life:
Used in Factories
Improve quality of finished products
Move material through various stage of process
79
Disadvantages of Computer Control and monitoring systems
The software for the control system is specialist and may cost a lot of money to
develop
If the computer malfunctions the system will not work
If there is a power cut the system will not work
The computer can’t react to unexpected events like a human could. It can only
respond in the way it has been programmed to.
It can cause some concern if total control for a system and the decisions are
handed over to a computer.
Data Communication
Networks:
Often the computers in a network are linked to a server, this is a powerful computer
which holds the software to run the network. It also stores and manages the shared
resources of the network like the users’ files, software packages and printer queues. It
usually has a much higher specification than the other computers on the network, with
a very large hard disk drive.
Networks can be expensive to set up, both the hardware infrastructure and
expertise to create them.
Networks are vulnerable to security problems such as hacking
Virus can be spread easily and quickly in a network
If a server causes some problems, the whole network can be brought to a standstill.
Cable failure-One broken cable can bring down the entire network
80
Types of networks:
Networks are divided into two types, a LAN (Local Area Network) or a WAN (Wide Area
Network).
A wide area network is a network that covers or spans a large geographical area. E.g
Bank network can connect computers that are in different cities or countries.
In a LAN, computers and hardware such as printers can be connected by cable (copper
wiring), fibre optic cabling (glass fibres) or using a wireless (radio waves) connection.
Advantages of LANs:
81
Messages can be sent to people working at other computers on the network
which can save time and paper.
It is possible to set up a local intranet such as that on the KLB school network.
The web pages of information can be accessed only over the LAN. An intranet is
free because it does not involve phone links.
There is control over users’ access rights to programs and data.
Disadvantages of LANs:
Printing can be slow. Where a lot of workstations are served by only one or two
printers, long print queues may develop.
A virus can spread more easily. If a virus gets into one computer, it is likely to
spread quickly across the network because it will get into the central backing
store.
As data is shared there is a greater need for security. Users of the network
have to have authentication techniques such as user ids and passwords. Unique
user ID's control access to the files and settings on the network while passwords
prevent unauthorised users from logging onto the network. Data may also have
to be encrypted so that it is meaningless if intercepted.
If the server fails, all the workstations are affected. Work stored on shared
hard disk drives will not be accessible and it will not be possible to use network
printers either.
The cost of installing the equipment is greater. Cabling can be expensive to
buy and to install.
Damage to cables can isolate computers. Some sections of the network can
become isolated and will not be able to communicate with the rest of the
network.
Because networks can be complicated to maintain, a network manager may be
need to be employed to run the system.
82
Application: of WANs
Banks
An example of a computer network linking computers of different organisations is the
system of handling payments from one bank to another: Electronic fund transfer. An
ATM can be a cash terminal anywhere in the world as long as you have the card for that
bank. Banks have networks of cash terminals, connected over telephone lines to central
computers (Hosts).
Internet
The Internet is a worldwide WAN and a LAN can be connected to it using a router.
Advantages of WANs:
These are similar to those of LAN's except the scale of sharing etc. becomes far
greater and can be world-wide.
Disadvantages of WANs:
Again these are similar to those of LAN's except that issues such as security
become even more important as potential hackers could break into a computer
system from anywhere in the world rather than having to physically be in a
building.
Encryption of secure data such as financial transactions is necessary because it is
even easier to intercept data.
83
Network Components:
1) Network software (Network Operating System): This may be part of the operating
system, or it can be software designed specifically to manage a network.
Common operating systems such as windows are designed for single users to control one
computer. Network operating systems are used to coordinate the activities of multiple
computers across the network. The NOS acts as the director to keep the network
running well.
Examples of NOS are Novell Netware, Unix, Linux and Widows NT.
There are two types of network operating systems which are based on network models
such as Peer-to-Peer and Client/Server.
Peer-to-Peer
Peer-to-Peer network operating systems allow users to share resources and files located
on their disk stores. They do not have a file server or a centralized management
source. In this network computers are considered equal; they all have the same
abilities to use the resources available. Peer-to-peer networks are designed primarily
for small to medium LANs. E.g. of peer-to-peer NOSs are Appleshare and windows for
workgroups.
84
Client-server
Client –server network operating systems allow the network to concentrate functions
and applications in one or more dedicated servers .The file server becomes the heart of
the system, providing access to resources and providing security. Individual
workstations (clients) have access to the resources available on the file servers. The
NOS provides the means to integrate all the components of the network and allow
multiple users to concurrently share the same resources regardless of physical location.
This is needed to connect a computer to the network. The network card looks like a
small circuit board and slots into one of the connectors on the main circuit board
(called the mother board) inside the computer. Network cards have connectors on
them for network cables.
85
Physical Port - A connector or outlet on a networking device where the media is
connected to a host or other networking device.
Cable media
When connecting devices in a network, cables are used. There three common types of
cables that are mostly used in networks. These are:
Twisted pairs
Two insulated wires are twisted around each other to form a twisted pair. This system
leads to better electrical performance and significantly higher bit rates than untwisted
pairs. These pairs are often then, in turn, twisted with other pairs to form a cable that
is capable of high-speed communication.
The twisting of wires around each other helps to reduce the noise by cancelling
unwanted induced electrical signals and each pair usually carries a single
communication. Twisted pairs have become the most common form of transmission
media cable used today having applications in telephone and computer networks.
Twisted pair cables are at present mainly used for star-type cabling and in some cases
also for ring-type cable configurations.
Coaxial cable
Coaxial cable is a two-wire conductor with a larger bandwidth than twisted pair cable.
It is used in television, radio and Ethernet connections where each coaxial cable
86
supports about 60 speech channels. The inner cable is heavily insulated so it is safe
from bending and crushing and separated from the braided outer conductor. This outer
cable is in turn insulated. The resultant electrical field occurs outside the coaxial
cable, thus reducing the level of noise making the medium suitable for conducting high
bit rates over longer distances than twisted pairs.
Coaxial cables are mainly used for bus cabling or for connecting the network nodes in
tree structures, for example.
A technology that uses glass threads (fibers) to transmit data. A fiber optic cable
consists of a bundle of glass threads, each of which is capable of transmitting messages
modulated onto light waves. Optical fibre cables are generally used for bridging long
distances (for example connections between buildings or floors) in a backbone, and in
some cases in dual ring systems.
High bandwidths give enormous transmission capacity for national and intercontinental
links and greater distances can be tolerated between repeaters. The small physical
size, non-corrosive construction and immunity from electrical interference make
optical fibre a highly attractive form of transmission media.
87
WIRELESS MEDIA
Broadcast Radio
Cellular Radio
Cellular radio is a form of broadcast radio that is used for mobile communications such
as cellular telephones and wireless modems. A cellular telephone is a telephone device
that uses high frequency radio waves to transmit voice and digital messages. Some
mobile users connect their laptop computer or other mobile device to a cellular
telephone to access the Web, send and receive e-mail etc. while away from a standard
telephone line.
Microwaves
Microwaves are radio waves that provide a high speed transmission. In Microwaves
transmission, data is transmitted from one station to another. Microwave station
contains an antenna, transceiver (transmitter & receiver) and other equipments that
are required for microwave communication. Microwave uses the line-of-sight
transmission, which means that in microwave transmission system the data signals
travel in a straight path and cannot bend. Microwave stations or antennas are usually
installed on the high towers or buildings.
Communication Satellite
A communication satellite is a space station that receives microwave signals from earth
microwave station (earth based station). The earth based stations often are microwave
stations. Transmitting a signal from ground or earth station to a satellite station in
space is called up-linking and the reverse is called the down- linking.
88
Television & radio broadcast, global positioning systems and Internet also use the
communication satellites. The communication satellite consists of solar powered,
transceiver that receives and sends signals. The signals are transmitted from one earth
station to the satellite. The satellite receives and amplifies the signals and sends them
to another earth station. This entire process takes only a few seconds. To communicate
information from one country to another country more than one satellites are required.
The data transmission speed of communication satellite is very high such as up to 1
Gbps.
Infrared
Bluetooth
WiFi
WiFi is a "local area network that uses high frequency radio signals to transmit and
receive data over distances of a hundred to a few hundred feet."
WiFi is an industry standard way to connect computers over a network without wires, in
other words, a wireless network. For example, we use WiFi in our home so that we can
use our laptops in any room or the back yard to connect to the Internet (without messy
wires).
WiFi access is sometimes available in coffee shops like Dross, bookstores, offices,
airport terminals, schools, hotels, communities, and other public places. These are
called WiFi hotspots.
89
General Packet Radio Services (GPRS)
4) Communication Hardware:
A hub is a low-cost substitute for a switch in a network which has low network
traffic. All computers are connected directly to the hub as hub performs as
centralized device the network. When data is sent to the hub it broadcasts the
data to all the ports of the hub and then it is sent to destination computer on the
network.
A switch provides a central connection point for all the cables and the server in
a star network topology. It is used at the same place as hub is but the only
difference between the two is that switch possess switching table with in it.
Switching tables store the addresses of every computer it is connected to and
send the data to only requested address unlike hub which broadcasts the data
too all the ports. Switches can be considered advance form of hubs.
A bridge is used to connect separate LANs of the same type.
A router connects different types of LAN and connects a LAN to a WAN such as
the Internet. Router is intelligent device which routes data to destination
computers. It helps in connecting two different logical and physical networks
together.
90
Repeaters: There is distance limitation in local-area networks and electrical
signal becomes weaker as it travels.
Gateways can be software or it can also be device. Gateway device connects LAN
with internet. Its basic functionality is to provide security to the network. By
using gateways incoming/out going traffic can be monitored for any malicious
activity within the network which can be harmful to network integrity.
Networks are often arranged in a hierarchical way. This means that one or more server
computers are more powerful than the other client computers. This is known as a
client-server relationship. Servers manage all the printing, file maintenance and access
permissions.
91
The clients computers may have little no disk storage or processing power of their own
as these functions can be provided by the server.
Server Purpose
File server Controls the hard disk and handles users’ files. That is
stores shared files and software.
Web server Storage of web pages. Also database software and files
related to web activities, such as on-line orders.
Email server Emails are often stored and processed in one place.
Print server Controls a printer.
Because data is being transferred between computers it can be intercepted more easily
than on a non-networked computer. To intercept data transmitted over a wireless
network a hacker does not even have to be physically in the same building as the
network.
There are three common network topologies, called ring, line (bus) and star.
92
Ring topology:
In a ring topology, the nodes are connected in a ring and data travels in one direction
using a control signal called a 'token'. Every device has exactly two neighbors for
communication purpose. All messages travel through a ring in the same direction (
either clock wise or anti clockwise)
Advantages:
Not greatly affected by adding further nodes or heavy network traffic as only the
node with the 'token' can transmit data so there are no data collisions.
Relatively cheap to install and expand.
Disadvantages:
93
Bus (line) topology:
Nodes are connected to a main (bus) cable. If data is being sent between nodes then
other nodes cannot transmit. If too many nodes are connected then the transfer of
data slows dramatically as the nodes have to wait longer for the bus to be clear. A
device wanting to communicate with another device on the network sends a broadcast
on to the wire (Backbone), the intended recipient accept and processes the message.
Advantages:
Disadvantages:
If the bus cable fails then the whole network will fail.
Performance of the network slows down rapidly with more nodes or heavy
network traffic.
The bus cable has a limited length and must be terminated properly at both ends
to prevent reflected signals.
Slower than a ring network as data cannot be transmitted while the bus is in use
by other nodes.
94
Star topology:
In this type of network, a central computer (server) usually forms the main node and
the subsidiary nodes are connected to it and to each other through a switch or hub.
Advantages:
The most reliable because the failure of a node or a node cable does not affect
other nodes.
Simple to troubleshoot because only one node is affected by a cable break
between the switch and the node.
Adding further nodes does not greatly affect performance because the data does
not pass through unnecessary nodes.
Easily upgraded from a hub to a switch or with with a higher performance switch.
Easy to install and to expand with extra nodes.
Disadvantages:
Uses the most cable which makes it more expensive to install than the other two
topologies.
The extra hardware required such as hubs or switches further increases the cost.
As the central computer controls the whole system, the whole system will be
affected if it breaks down or if the cable link between it and the switch fails.
If the switch, the link to the server or the server itself fails then the whole
network fails.
95
CONSIDERATION WHEN CHOOSING A TOPOLOGY
Money: A linear bus network may be the least expensive way, be the least
expensive way to install a network, you do not have to purchase
concentrators.
Length of cables needed: Linear bus network uses shorter cable length.
Future growth: With a star topology, expanding a network is easily do by
adding another concentrators.
Cable Type: most common unshielded twisted pair.
96
server
causes
total
network
failure.
PROTOCOLS
A protocol is a set of rules that govern how data is transmitted between computers in a
network.
Or a set of rules that defines an exact format for communication between systems or
computers in a network.
With many different kinds of computers connected together, engineers had to find a
way for computers to speak the same language.
COMMON PROTOCOLS
HTTP(Hyper Text Transfer Protocol)
FTP(File Transfer Protocol)
SMTP(Simple Mail Transfer Protocol)
IP(Internet Protocol)
TCP(Transmission Control Protocol)
NNTP(Network News Transfer Protocol)
IRC(Internet Relay Chart)
POP3 (Post Office Protocol 3)
IMAP (Internet Message Access Protocol)
UDP (User Datagram Protocol)
97
TCP (Transmission Control Protocol) is used for verifying the correct delivery of
data from client to server. Data can be lost in the intermediate network. TCP
adds support to detect errors or lost data and to trigger retransmission until the
data is correctly and completely received.
The two most common Transport layer protocols of TCP/IP protocol suite are
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols
manage the communication of multiple applications. The differences between the two
are the specific functions that each protocol implements.
UDP is a simple, connectionless protocol. It has the advantage of providing for low
overhead data delivery. The pieces of communication in UDP are called datagram. It
uses Unreliable delivery meaning it does require an acknowledgement after delivery of
data.
98
Application protocols for TCP
HTTP is the protocol used for information exchange on the WWW. HTTP defines how
messages are formatted and transmitted, and what actions a HTTP Server and an HTTP
Client (which in most cases is a Browser) should take in response to various messages.
HTTP uses a reliable, connection-oriented transport service such as the TCP. HTTP is a
stateless Protocol, where each request is interpreted independently, without any
knowledge of the requests that came before it
FTP
Abbreviation for "File Transfer Protocol". FTP is an Internet standard for transferring
files over the Internet. FTP programs and utilities are used to upload and download web
pages, graphics, and other files from your hard drive to a remote server which allows
FTP access. The protocol is based on and uses TCP/IP.
SMTP
Abbreviation for Simple Mail Transport Protocol. This is used in sending and receiving
e-mail. However since it is limited in its abilities to queue messages at the receiving
end, it used with one of the two other protocols, POP3 or IMAP that let the user save
messages in the server mailbox and download them periodically from the server.
In other words, users use a program that uses SMTP for sending e-mails and either POP3
or IMAP for receiving e-mail.
IRC
This is a protocol used for real time internet text messaging chart or conferencing, it is
mainly designed for discussion forums and can also allow one to one communication.
NNTP
This protocol allows distribution, inquiry, retrieval and posting of news article on the a
server.
99
HALF DUPLEX COMMUNICATION
A half-duplex system provides for communication in both directions, but only one
direction at a time (not simultaneously), a transmitting system sends data to a
receiving system which as well can send the data back to the system that initially
transmitted data but not at the same time.
Typically, once a party begins receiving a signal, it must wait for the transmitter to
stop transmitting, before replying.
100
FULL DUPLEX COMMUNICATION
Land-line telephone networks are full-duplex, since they allow both callers to speak
and be heard at the same time. A good analogy for a full-duplex system would be a
two-lane road with one lane for each direction.
101
INTERNET
The internet is a global network that connects multi million computers all over the world
together with a cross platform compatibility using Internet protocol to communicate
between computers.
o ISP: An ISP (Internet Service Provider) is a company that offers business and
residential customers’ access to the Internet and in turn collects a monthly or yearly
fee in exchange for providing the subscriber with Internet access.
102
The World Wide Web
The Web also known as the World Wide Web (WWW) is a large collection of digital
documents on the Internet that are linked together.
You can navigate from one document to another by clicking on a hyperlink. A hyperlink is
normally defined with specially marked text, a symbol, or an image that connect you another
web page.
Hyper links: The feature that allows a text area, image, or other object to become a link that
retrieves another computer file (another web page, image, sound file, or other document) on
the Internet
Hypertext is the text area that serves as a link to another file on the internet.
Hypermedia is the picture, video, or graphics that serve as a link to another file on the
internet.
Addressing
The address of a Web page is defined with a Uniform Resource Identifier (URI).
The URI provides a uniform naming scheme for the resources on the Internet or an intranet
or an address for a resource on the internet or intranet.
103
For example, the URL http://www.ub.bw/computer_science/index.html consists of the
o Protocol (file :)
o The path to the resource (\\fileserv\Training\TrainingWelcome.htm).
This name does not identify where the resource is located and does not normally include the
protocol, Web server name, or path. Rather, it is a logical name defined for the resource.
ELECTRONIC MAIL
Electronic mail refers to the ability of a computer to send electronic mail to another
computer on the network.
For an electronic mail to be send, both parties should be having email accounts and email
addresses.
E-mail Address:
2. domain name
The name of your ISP
Domain name
104
A domain name on the Internet has the following form:
For example; my e-mail address includes my name and my domain name,
o modisa@mopipi.com
There are also domain names for each individual country. E.g. my e-mail address in
Botswana is modisa@mopipi.ub.bw ; bw = Botswana
Host
A host is a computer that is enabled to function on a network. To be the host in the Internet,
a computer must;
Have a domain name, e.g. www.btv.gov
Use the Internet Protocol (IP)
Be assigned a unique address: e.g. 206.96.248.2
Have a network connection that provides a route to the Internet.
A Web server is a computer that stores or generates the Web pages. It provides the pages to
the client when the page is requested. The phrase server-side refers to anything happening
on that Web Server computer.
For example, a user can launch a browser such as Internet Explorer or Netscape and access a
page such as www.info.bw. That page is found on a Web server somewhere on the Internet,
downloaded to the client, and displayed in the user’s browser.
A Web site is a collection of Web pages, usually on the same server or provided by the same
company.
A web browser is the software program you use to access the World Wide Web, the
graphical portion of the Internet. Although many different browsers are available, Microsoft
Internet Explorer, Netscape Navigator and Mozilla FireFox are the most popular ones.
105
Domain Name System (DNS)
The DNS knows how to convert the logical URI name into the physical IP address of the Web
server.
When the user enters the Web page address as a URI such as http://www.ub.bw The URI
must be converted into IP address in order to locate the Web server. This is done using the
Domain Name System (DNS).
Search engine: Websites used to search for a particular item or topic on the net, there are
many different kinds of search engine include Goggle, Dog Pile and HotBot are all examples of
search engines,
Advantages:
o An Intranet is free to use because it does not involve phone links.
o Information can be easily updated and shared inside a company or school.
o The web pages can be viewed using a standard web page browser.
o More of the information will be useful because it was created for particular
users.
Disadvantages:
o Information cannot be shared outside the local network without logging onto
the Intranet
The Internet: The Internet is the largest WAN. It is a world-wide network of linked
computers sharing a vast amount of information.
Advantages:
o Millions of people contribute information.
o Data can be rapidly added and updated to reach a huge audience.
o It can be used to sell goods to a world-wide market.
Disadvantages:
o There is a lot of useless information, much of which is out of data and it can be
very difficult to find what you want.
106
o Much of the information is biased, misleading or has not been checked for
accuracy.
o It is not regulated and offensive and illegal material exists.
o Issues such as security become even more important as potential hackers
could possibly be trying to break into a computer system from anywhere in the
world.
An extranet: An intranet is a local area network that provides information using web pages
and the information can be accessed within that network and also by some individuals
outside that network when they have been given logging in credentials.
Internet Intranet
It is a wide area network It is a local area network
It is a public network It is a private network
It is accessible to millions of people all over It is accessible to fewer people within an
the world organisation
It is less secure compared to the intranet It is more secure compared to the internet
- Email: Email program enables you to send, receive and manage electronic messages
(sound, text, video and graphics).
107
- Web publishing: Create and administer your own websites for specialist interests, etc...
108
COMMUNICATION AND INFORMATION SYSTEMS
- Telephone
- Fax
- Email
- Television
- Radio
- Social media applications
- Online banking systems
- Video conferencing systems
- Electronic commerce systems
In the olden days if people wanted to get in touch with somebody the only methods
available to them were going to see the person, making a telephone call or writing a
letter.
Today we are spoilt for choice. Technology has made available many new
communication methods such as email, fax, video conferencing and instant messaging.
Telephone
It allows people to talk to one another across a distance. As with most technology, only
the rich could afford to have a telephone in their own home. Most people made do with
a telephone box. But slowly, it became normal to have one in your house.
Now telephones are changing again, with the appearance of Internet based services.
Advantages of telephones
- The conversation is relatively private between you and the caller - although others
might be able to hear what you are saying.
109
- Most people have a telephone. No specialist equipment is needed.
- If there is an answer phone, you can leave a message if the person isn't available to
take your call.
- If you don't know the telephone number you need there are plenty of services which
will help you get the number (although they can be quite expensive).
Disadvantages of telephones
- The line might be engaged when you call so you can't speak to the person when you
want.
- You have to pay for every minute you spend on the call. In the case of mobile or
overseas calls, that can be expensive.
- There might be noise or interference so the quality of the call could be poor.
- With mobile calls you might move out of the range of a transmitter and so the call
gets cut off.
- You cannot see each other's body language so a lot of the non verbal communication is
lost
- It is not easy to make a record of what is said during the call. Things might be
forgotten or mis-interpreted.
Fax
A fax (short for facsimile) machine transmits a copy of written and graphical
information via the telephone network. It works in a similar way to a photocopier,
except the copy is transmitted to a distant machine via the telephone network.
Each Fax machine has a telephone number, this may or may not be shared with a
telephone.
Faxes are widely used in business offices because they make it very easy to transmit
invoices, orders, rough drawings, copies of contracts and so on.
It is now possible to send and receive Faxes by email. The email is sent to a service
company who then converts it to a normal Fax message and sends it to the telephone
number you specify.
110
Advantages of faxes
- Faxes are a fairly inexpensive method of sending a message - just the cost of a
telephone call.
- As long as the fax machine is switched on, messages can be received at any time day
or night.
- They don't need any specialist installation or cabling as they make use of the existing
telephone
Disadvantages of faxes
- If the fax is using the same number as the telephone then it can prevent callers from
getting through or calls being made.
- There is no immediate response or feedback from the recipient like there is with a
telephone conversation
- You might dial the wrong number and send your document to someone else
- If the receiving machine is out of paper you will think that you sent your fax but it
won't actually be printed
- If the receiving machine is busy, your fax might end up under a whole load of other
faxes which arrive after it
- It can take a long time to transmit if you have many sheets of paper
- The quality of the document which is received is often poor quality and might have
some loss of detail.
The electronic transmission of mail allows you to send formatted text and images to
someone else with an email address.
111
Each E-mail user has a 'mailbox' with a unique address into which messages can be sent
ready for the recipient to 'collect' and read.
Email is now one of the most common methods of communication - ask most people
that you know, they will probably have an email address.
Advantages of email
- Sending an email to someone is very easy, people need little training to learn how to
do this
- Emails are free to send -so long as you have an email account and a connection to the
Internet.
- Emails are usually received fairly quickly, most of the time a couple of seconds after
they are sent
- Emails can be sent any time of the day or night, 365 days a year
- You can request proof of receipt or proof of the email being opened
- Messages can be prepared in advance and saved until you are ready to send them.
Disadvantages of email
- Both you and the person receiving the email must have an email address and access to
a computer and the Internet
- If you don't know the email address of the other person then you can't send them a
message
- Some people change their email addresses fairly often as they switch ISPs or jobs
112
- Spam is a big problem; up to two-thirds of mails sent are spam
- People can waste company time at work by sending emails to friends instead of
working
- When you are on holiday, your email box can become full and extra messages might
not get stored
- There are a lot of email scams and it is easy to get fooled by them
It works by each person 'logging on' to the conference call. When you switch on your
conference call device and enter your user ID number, an automatic voice saying
something like "Mr Jones has joined the conference" is broadcast. Everyone says hello
and carries on with the meeting.
Video conferencing is similar to teleconferencing except that people in the meeting can
now see one another because video cameras are used to send live images over
telephone lines.
A computer
Internet access (essential, broadband speeds would be needed if using video-
conferencing)
Email facilities
A fax machine to send images of documents over a phone line (optional,
computer software could be used instead)
Equipment such as a microphone, speakers and a video camera
113
Advantages of video conferencing
- You can have a 'meeting' with people from many different offices /countries without
any of them having to travel
- You can see people as well as hear them. This means you can see their body language
which you can't do with a telephone call.
- You can all view a document on the screen at the same time. People can work
together and add their ideas. The document can be emailed to all of the people at the
meeting later on.
- Ideas and knowledge can be communicated between all those at the meeting very
quickly and responses gathered. Video conferencing is good for 'brainstorming'.
- Everyone who is going to 'attend' the meeting needs access to suitable hardware and
software. This can be expensive and can take a while to set up.
- A very reliable, fast data link is needed Many companies hire a connection specifically
to allow video conferences to take place
- Even with a fast connection, there might be a slight delay between responses.
- If the hardware breaks down for any of the participants, they cannot 'attend' the
meeting
- People could be in different time zones around the world. This might mean that some
people have to stay up through the night in order to 'attend' the meeting.
- The video camera might not be able to see all parts of the room at the same time.
Some people might not be easy to 'see' at the meeting.
Teleworking
Teleworking usually means working from home, using ICT to communicate with your
workplace. A teleworker would need the following equipment:
A computer (essential)
Internet access (essential, broadband speeds would be needed if using video-
conferencing)
114
Email facilities (essential)
A fax machine to send images of documents over a phone line (optional,
computer software could be used instead)
Videoconferencing equipment such as a microphone, speakers and a video
camera (optional, required for online meetings etc.)
The teleworker does not actually have to be based at home, a journalist for example
could be anywhere in the world and still get his article or photographs into the next
day’s newspapers if he had Internet access to transfer his files.
Possible advantages:
Possible disadvantages:
Bulletin Board
A Bulletin Board is an area online that allows you to view and post messages.
Usually anyone can view the messages, but if you want to 'post' a message then you will
need to sign in so you have a name on the Forum.
Instant Messaging
This is mostly a text based service, where one person types a message and the other
person immediately sees it pop up in their IM (Instant Message) window.
115
Groups can also be set up so that a number of people can chat to each other whilst
online.
Each person must have an 'Instant Messaging' (IM) client open on their computer.
The way it works is very similar to email, because both IM and Email client software
need to connect to a server in order to work.
IM window shows the message almost as soon as it is typed - no downloads are required.
This kind of service is used by business people to help keep in touch whilst on the
move.
It is also used at home. For example, you are online doing your usual stuff on the
Internet, but you have an IM window open because friends and family are also online.
You chat whilst each of you are online.
Another common use of IM is with online gaming. Perhaps twenty of you have gathered
together in the online game and now you are arranging what needs to happen next.
Each person fires up their IM client and joins the group to chat about tactics and so on.
Electronic Commerce
It covers a range of different types of businesses, from consumer based retail sites,
through auction or music sites, to business exchanges trading goods and services
between corporations.
Advantages
The company is able to conduct its business at any time of the day.
Customers can buy goods or services at any time of the day.
The customers have access to the global market place.
The company has the opportunity to reach more customers because they can trade
with customers in different parts of the world.
There is an opportunity for the company to reduce advertising costs as they can
carry out free advertising online.
The customer can easily and quickly compare prices from different businesses
online as the internet makes it very easy to ‘shop around’ for products and
services.
116
It saves customers travelling time because they don’t go to the shops or stores
physically.
It allows customers to self-service.
Travelling costs are saved because customers do not travel physically to the stores
or shops.
Disadvantages
It takes a longer time for the physical product to arrive after making a purchase
online.
There is always physical product, supplier & delivery uncertainty as it takes time
for the product to be delivered.
There is limited and selected sensory information of the physical product when
purchasing it online.
Returning of goods bought online can be very difficult as the customer may be
required to pay shipping fees to return the product.
The setup costs of ecommerce are expensive for businesses.
Lack of in-store engagement with customers
Internet Banking
Online banking (or Internet banking) is a service that allows customers to conduct
financial transactions on a secure website operated by their retail or virtual bank,
credit union or building society.
An online bank customer should have online logging on credentials to access a secure
website or mobile application of an online bank.
Advantages
A customer saves on travelling costs as they do not need to travel to the physical
bank.
A bank customer can carry out most banking transactions at any time of the day.
A customer may be charged lower fees for doing a banking transaction online than
going to the bank.
The banks hires reduced employees to serve customers when they have online
banking services as some of their customers can self-service.
117
Banks do not rent large banking halls when they have online banking services
which reduces rental costs.
Online banking can saves resources for a bank as there is no need for a lot of
paper documentation by the bank like filling of hard copy forms or printing of bank
statements.
Online banking also allow bills like utilities to be paid online.
It is convenient for banking customers as banking transactions can be carried out
anywhere there is access to the internet.
Disadvantages
118
Computer System Security and Data Protection
1. Physical security
o Physical security threats
o Computer theft
o Fire
o Dust and extreme temperatures
2. Software security.
Software security threats
o V i ru s
Anti virus software
o Worm
o Spam
o Disk failures
Measures taken to secure software
o Backup software
3. Data security
Protecting files (data) – methods of protecting data
o Passwords
Log on password
File access password
o Write protecting storage media (floppy)
o Backup data – physically lock backup tapes and disks
o Encryption
Physical security
It refers to the protection of data, software and hardware from the physical harm such
as fire, theft or damage by physical means.
1) Fire
Fire in the computer lab is rare and it might be caused by the faulty electrical wiring or
overloaded sockets.
119
o Use of gas flooding systems rather than water systems as water will cause
damage to the computer
o Fire alarm
2) Computer Theft
It is easy to deny users access to a computer lab through the use of a password but it is
difficult to prevent a thieves from picking up a computer and stealing it.
Software/Data security
It refers to the protection of data, software from being hacked, illegal copying,
unauthorized access, piracy, and alteration by means of software.
120
Methods of Protection
o Password
o Screen saver
o Encryption
o Log in /Logout
o Providing Network authorization rights
o Firewall
o Back up data
o Write protecting the storage media
o Log on Password: allow access to the user at log on, at the time the
computer is switched on.
o Access Password: Allows access to a particular file or folder, this is after the
user have log to a system.
2) Screen saver: A method of data protection which hides the contents of the
screen if a user leaves the computer idle while working.
4) Log in:-It is the procedure to gain access to the computer network by providing
user identity and password to prevent unauthorized access.
121
Log out: - it is part of security of system preventing the computer being used until
an authorized user logs on again.
6) Write protecting the storage media: This means data can not be written to or
deleted from a storage media.
DATA PROTECTION
The Data Protection Act sets out rules for collecting, storing and processing personal data.
Personal data is any data that refers to a living, identifiable individual.
The Data Protection Act applies to paper records as well as those stored on computers.
This is a law that covers the storage of personal data about members of the public on a
computer system.
Organisations that use personal data must have a data controller. This is the person in
the organisation responsible for storing and processing the personal data.
122
Data controllers must obey eight principles of good information handling which state
that:
Data user: - Data users are those who hold and process personal data on a computer
system.
o Maintain privacy.
o Copy write protection
o Avoid Unauthorized access
o Prevent hacking
o Prevent piracy
o Prevent data from Virus
There are exemptions to the Data Protection Act for which registration with the
Information Commissioner is not required – these cover data held for:
national security purposes;
assessing and collecting taxes;
detecting and preventing crime;
artistic, historical or research purposes;
personal or domestic use (including recreational purposes);
staff administration, accounting, advertising and marketing.
The Data Protection Act gives data subjects the right to:
have a copy of all the data held about them;
have inaccurate data corrected or deleted;
prevent the processing of data that could result in personal distress;
prevent the data from being used for direct marketing;
prevent automated decisions being made based on data held about them;
123
compensation for any damage or distress caused;
ask the Information Commissioner to investigate if they feel any of the
principles of information handling have not been followed.
o The Act only deals with computer data not with paper files.
o It is difficult to identify who is storing data about them.
o Data subject an only complain about the inaccuracy of data if they have ‘suffer
damage’ from it.
o Data can be held for ‘national security’ so that people cannot gain access.
Hacking
Phishing
Computer Viruses
Cyberstalking
Identity Theft
Credit fraud
Cyberterrorism
Piracy
Phantom withdrawal
124
Hacking:
A hacker is a person who gains or attempts to gain an illegal access into a computer
system in order to commit a crime such as fraud, data theft etc.
Phishing:
Cyberstalking:
The use of communication technology, mainly the Internet, to torture other individuals
is known as cyberstalking.
False accusations, transmission of threats and damage to data and equipment fall under
the class of cyberstalking activities. Cyberstalkers often target the users by means of
chat rooms, online forums and social networking websites to gather user information
and harass the users on the basis of the information gathered. Obscene emails, abusive
phone calls and other such serious effects of cyberstalking have made it a type of
computer crime.
Identity Theft:
It is the act of pretending to be someone else by using someone else's identity as one's
own and obtaining benefits or stealing money using the stolen identity.
125
This is one of the most serious frauds as it involves stealing money and obtaining other
benefits through the use of a false identity. Financial identity theft involves the use of
a false identity to obtain goods and services and a commercial identity theft is the
using of someone else’s business name or credit card details for commercial purposes.
Identity cloning is the use of another user's information to pose as a false user. Illegal
migration, terrorism and blackmail are often made possible by means of identity theft.
Cyber terrorism:
There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking
into a government website, other times it's just a group of like-minded Internet users
who crash a website by flooding it with traffic. No matter how harmless it may seem, it
is still illegal.
Piracy:
Process of illegal copying of software for personal or re-sale purpose. Piracy costs
millions of dollar to software companies, because pirated software is cheaper compare
to original and people prefer to by cheaper by compromising the quality.
Credits cards are use to obtain instant credits for goods, so the retailer does the
verification of the cardholder manually and the customer will then sigh the docket. All
the statement for the transaction will be receive during the month. This card can be
stolen and used because verification limited.
Phantom withdrawal:
Money could be debited mysteriously using an ATM without the owner of the card. The
owner of the card can see this withdraws at the end of the months through a
statement. Phantom withdrawal is possible through Hacking.
Logic bomb:
A logic bomb is a set of instructions written in computer code that can be hidden inside
other software and set to activate at a particular date and time.
Once activated logic bomb takes control of a computer and begins damaging files.
126
Ways to protect against computer crime or cyber crime
For a first hand protection an anti-virus software is a must for your Windows system.
There's a long list of Internet security suites like Norton, Kaspersky and McAfee that
offer a variety of tools, from spyware and malware detection to real-time protection
against websites with infected code. Some of these even protect your inbox from
infected attachments and phishing emails.
First download it to your hard disk, scan it with your anti-virus and then install it.
Moreover, don't download applications from unfamiliar sites.
Install a Firewall and configure your firewall to prohibit any malicious threat coming
into your computer or network.
Scanning an email attachment with updated antivirus before opening or using it.
Avoid opening email attachments that you receive from an unknown address. In case
you are in doubt save the attachment to a hard disk and scan it with your anti-virus
software. Open it only when you are assured that it is clean.
Don't enter your User ID or password unless you see the Lock icon at the bottom screen
and check that web address starts with https://(protocol) Change the passwords often
to save it from hacking attacks.
Effects of hackers
127
at the risk of losing all the data stored on his/her computer. Manipulation of
sensitive user data is a grave consequence of hacking.
Computer Virus
128
Difference between security and integrity
Data Integrity is concerned with the correctness of the data while Data security is
concerned with the safe keeping or protection of data against various hazards that
could destroy it like virus, power failure e.t.c.
Errors may be introduced into data in a variety of ways. They can be introduced while
typing or due to program or machine errors.
Validation and verification checks are performed on data to ensure its integrity.
(ii) Errors that occur when data is transmitted from one computer to another
(iii) Software bugs or viruses, Hardware malfunctions, such as disk crashes Natural
disasters, such as fires and floods.
There are many ways to minimize these threats to data integrity. These include:
Data Security is concerned with safe keeping of data from the various hazards that
could destroy it. Data security includes ensuring the integrity and privacy of data, as
well as preventing the loss or destruction of the data. Various methods are used to
secure that data such as Password, encryption, Log in /Logout, Firewall etc.
Backup
It is a procedure of making copies of data or programs in case the original data gets
corrupted or lost.
Methods of backup
Full backup: - This is a procedure where the whole data in the directory or
directories designated to be backed up is duplicated/copied in order to safeguard
against data loss (Full back up backs up even the data that may have been backed
up previously).
Assume you do your initial backup on Monday, this first backup will contain your
entire list of file and folders in your backup job. On Tuesday at the next backup run,
the entire list of files and folders will be copied again. On Wednesday, the entire
list of files and folders will be copied again and the cycle continues like this. At
each backup run, all files designated in the backup job will be backed up again. This
includes files and folders that have not changed and were probably backed up
before.
Advantages
i. Restores are fast and easy to manage as the entire list of files and folders are in
one backup set.
ii. It is easy to maintain and restore different backup versions.
Disadvantages
iii. Backup procedure can take very long as each file is backed up again every time
the full backup is run.
iv. Consumes the most storage space compare to incremental and differential
backups.
Incremental backup
Incremental back up is a backup of all the changed files and new files made since
the last backup of any type.
130
Example of incremental back up
You setup an incremental backup job or task to be done every night from Monday to
Friday. Assuming you perform your first backup on Monday. This first backup will be
a full backup since you haven’t done any backup prior to this. On Tuesday the
incremental backup will only backup the files that have changed since Monday and
any new files added to the backup folders. On Wednesday only changes and new
files made since Tuesday backup will be copied. The cycle continues this way.
Advantages
v. The backup procedure is faster than that of full backup and differential backups.
vi. There is efficient use of storage space as files are not duplicated.
Disadvantages
vii. Restores are slower than with full backups and differential backups.
viii. Restores are complicated as all backup sets are needed to perform a restore.
Differential backup
A differential backup is a backup of all the changes or changed files since the last
full backup. With differential backups, one full back up is done first and subsequent
backup runs are the changes made since the last full backup.
Advantages
Disadvantages
xii. Backup procedure slower than that of incremental backup
xiii. Not efficient use of storage space compared to incremental backups.
xiv. Restores are slower than with full backup
131
Local Backup is any backup where a storage medium is kept close at hand. For
example; backup copies in DVDs kept within the office where the backup was
carried out.
Advantages
xv. Very fast to restore as the backup copy is kept close at hand.
xvi. Since backups are kept close at hand, they are conveniently obtained when
needed.
xvii. Storage cost can be very cheap when the right storage medium is used like
external hard disk.
xviii. Data transfer costs to the storage medium can be cheap.
Disadvantage
xix. Since the backup is stored close by to the source, it does not offer good
protection against theft, fire or floods. When the source is damaged by these
circumstances, there is a good chance that the backup will also be damaged.
Offsite backup is any backup where the storage medium is kept at a different
geographic location from the source. The backup may be done locally at first on the
usual storage devices, but once a storage medium is taken to a different location it
becomes offsite backup.
Advantage
Offers additional advantage against physical harms such as protection from theft, fire,
floods, hurricanes and more that could be happening at source of backup.
Disadvantages
xx. Except for online backups, it requires more due diligence to bring the storage
media to the offsite location.
xxi. Because of increased handling of storage media, the risk of damaging delicate hard
disk is higher.
This is the type of backup where data is backed up to a storage server of facility
connected to the source via the internet. With the proper login credentials, that
backup can then be accessed securely from any other computer with an internet
connection. The term cloud refers to the backup storage facility being accesible from
the internet.
Examples of cloud
132
-Backup to an offsite FTP Server over the internet.
Advantages
-It offers protection from fire, floods, earth quake and other natural disasters.
-With just an internet connection, one is able to quickly and easily connect and access
backup.
-When the service is provided by a good commercial data center, service is managed
and protection is un-parallel.
-Data is replicated across several storage devices and usually serviced by multiple
internet connections so the system is safe from single point failure.
Disadvantages
Archive: Is a method of storing data which is no longer in use, but held for historic
purpose for long period of time? Data is likely to be compressed to take less space and
stored on cheaper storage medium. It is often stored away from the computer system,
in a secure location.
Biometrics
Biometrics comprises methods for uniquely recognizing humans based upon one or
more intrinsic physical or behavioral traits and also is used as a form of identity access
management and access control. It is also used to identify individuals in groups that are
under surveillance.
Types of Biometrics
Fingerprint identification
133
A facial recognition system is a computer application for automatically identifying or
verifying a person from a digital image or a video frame from a video source. One of the
ways to do this is by comparing selected facial features from the image and a facial
database.
Iris recognition
The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which
an individual types characters on a keyboard or keypad. The keystroke rhythms of a
user are measured to develop a unique biometric template of the users typing pattern
for future authentication.
134