Computer Studies Form 4 Notes
Computer Studies Form 4 Notes
ii). Store & run a special program called the server software (network
Definition of terms used in Networking operating system), which controls computers on the network.
Network
A Network can be defined as a collection of independent entities that are Clients (workstations)
arranged in such a manner as to exchange data, information or resources. Clients (also referred to as Workstations) are Personal Computers (PCs)
attached to the network, on which the network users do their work. They are
Examples of networks: used by network users to send their requests to the server.
Road network: - this is the interconnection of roads in a country, continent
or throughout the world. Road networks facilitate the transfer of goods & Clients;
services from one area to another. i). Are usually less powerful than the server, and use the resources provided
Telephone network (voice networks): - it includes the many lines that by the Server.
criss-cross a country, and enables people to communicate. ii). Have their own operating systems and files.
Railway network. The PCs can be IBM or compatible running MS-DOS, OS/2, Windows,
Nervous system. etc.
-1- ©Allande
Terms used in data communication
Data signal: Demultiplexing is the process of separating the multiplexed signals at the
A data signal is a voltage level in the circuit which represents the flow of data. receiving end.
In data communication, there are 2 types of data signals; Digital and Analog.
Analog data is made up of continuous waveforms, while digital data is made Illustration:
up of a non-continuous discrete waveform. Town A has 10 computers which want to communicate with 10 other
Analog data signal computers in town B. In a normal case, it will need a direct cable linking each
Velocity of the computers in town A to its partner in town B. However, if multiplexing
(Sine is used, the computers can be made to share a single cable laid between the
wave) two towns, hence, saving cost.
Time
The different data signals have different frequencies on the cable; hence, they
do not interfere with one another.
Demultiplex
Multiplexer
Digital data signal Multiplexed line
From computers
Velocity
To computers
er
(Rectangular waved)
Time
Fig.: A multiplexed link
Frequency (f):
Frequency of a wave is the number of cycles made by the wave in 1 second.
Frequency is measured in units called Hertz (Hz); where 1 Hz is equivalent to
1 cycle/second.
Signal modulation and demodulation:
Baud:
This is the unit to measure the speed of transmission. Generally, 1BAUD is
This is the process of converting data signals to a form that can be transmitted
1bit/second.
over a transmission medium.
Baud rate:
E.g., a modem converts a digital signal to an analog signal, which can be
This is the rate at which data is transferred or transmitted. It is measured in
transmitted over analog telephone lines. This process is called modulation. A
Bits per second (bps).
modem at the receiving end converts the analog signal into a digital signal, a
process known as demodulation.
Band:
The rate of change of a signal on a transmission line.
Multiplexing and Demultiplexing:
Multiplexing is the process of sending multiple data signals over the same
Bandwidth:
medium, e.g., a wire conductor can be made to carry several data signals
either simultaneously or at different times.
-2- ©Allande
A Bandwidth is the maximum amount of data that a transmission medium can
carry at any one time. E.g., a certain cable may have a bandwidth of 100 Half duplex transmission:
Mbps (Mega bits per second). This refers to communication in both directions, but one direction at a time.
A sender must first send the data before the recipient can reply, e.g., if two
Guardband: police officers are communicating using a ‘walkie talkie’ radio, one has to say
This is the range of frequency that is used to separate two channels. “over” to mark the end of every statement in order for the other to respond.
Baseband signal:
-3- ©Allande
iii). Messages. ix). Modems This implies that, files reside on the user’s computer rather than on a
iv). Graphics. x). Storage central computer, and are only transmitted periodically to update the
devices (optical drives). central computer.
v). Files. xi). Communication
ports. Advantages of distributed processing.
vi). Computer processing power. xii). Disk space 1. Failure of the central computer does not affect the operations of the
other terminals.
2. Processing load is shared equally; hence, no time wastage.
3. There is faster access of data as each machine can process & store its
Users whose computers are connected to a network can, for example, data.
share their files, exchange mails, send faxes, schedule meetings, and print 4. It doesn’t need powerful and expensive servers for data storage.
documents from any point on the network. This centralized access to data 5. It can accommodate users with variety of needs.
& information leads to less waste of time, and hence greater productivity.
Disadvantages of distributed processing.
2). Remote communications 1. It is more susceptible to virus, as any user could introduce an infected
file and spread it throughout the network.
Remote communication refers to the transmission of data signals between 2. Developing an effective back up plan is more difficult when users
two communication devices located at different geographical locations. store data in their individual systems.
E.g., using remote communication, one can work from home just as if 3. File management (organization) is difficult as the files are stored in
he/she is in the office. different locations.
It is mainly through remote communications that people can be able to 4). Cost effectiveness
share ideas, and pass messages over the Internet. The initial cost of purchasing and laying down of networks components
A computer that tries to access resources from another computer on the may be expensive. However, the savings experienced and the value added
network is called a remote client, while the computer being accessed is to service delivery make networks cost effective.
called a remote host.
Remote communication has been made possible by use of wireless • Networks greatly increase the efficient use of scarce resources. E.g., a
transmission media such as radio waves, microwave, and satellite. large organization with many stand alone computers will need a
printer for each computer. However, if the computers are networked,
3). Distributed processing facilities only one printer is used.
• Computer networks have also enhanced daily communication, i.e.,
Distributed processing refers to the act of running the same programs or they have made the flow of information from one place to another
databases on different computers, which are on the same network but easy. Users can send mails (e.g., e-mails) to each other, without
placed in separate locations. having to bear the cost of stamp duty or delivery charges.
Similarly, company executives can hold electronic video conferences,
Each computer has its own local peripherals, e.g., disks, printers, thus reducing the traveling costs.
terminals, etc.
5). Reliability
For example; A computer network is reliable especially when communicating or
accessing information:
In a large organization, each branch office has its own server that stores
data, information, and other resources required for their daily operations.
-4- ©Allande
i). Data can be transferred with minimum errors from source to Review questions.
destination.
ii). Incase one computer breaks down; the user can still access data & 1. List four network systems that are not computer-based networks.
information from the other computers using another computer on 2. Define the following terms:
the network. (a). Computer network.
(b). Data communication.
LIMITATIONS (DISADVANTAGES) OF NETWORKING 3. Differentiate between:
(a). A baseband and broadband signal.
1). Security issues (b). A Network server and a workstation.
(c). Remote client and remote host.
Data & information held on a network is open to many people across the (d). Half duplex and full duplex transmissions.
world, and can easily be accessed illegally. In addition, when information 4. State the factors to be considered while selecting a data transmission
is sent over the network from one place to another, it can be tapped or system.
listened to by unauthorized parties. 5. Give four advantages and two disadvantages of networking.
6. (a) Explain the concept of distributed processing in networking.
2). High initial cost (b) State 3 advantages and 2 disadvantages of distributing processing.
7. Why is a network more reliable than stand alone computers?
The initial cost of buying network hardware & software is very high. 8. What do you understand by the following terms in networking:
(i). Baud.
3). Moral and cultural effects (ii). Baud rate.
(iii). Bandwidth.
Large networks such as the Internet have chat rooms and messaging (iv). Resource.
services. These enable underage children to meet peers and adults on the
net, some of whom may have bad intentions. 9. What name do we give to each of the following:
(a). The computer that is dedicated to serving requests from other
Access to pornographic and other negative material on the Internet has computers in a network.
made the fight against social problems such as HIV/AIDS, bad sexual (b). The computers that sends requests.
behaviour, and drug abuse more complicated.
TYPES OF COMPUTER NETWORKS
4). Spread of terrorism and drug trafficking
Computer networks are usually classified according to size. The three most
The Internet makes it easy for terrorists and drug traffickers to operate. common types of networks are:
This is because; they use information networks for their business
communications. 1. Local Area Network (LAN).
2. Metropolitan Area Network (MAN).
5). Over-reliance on networks. 3. Wide Area Network (WAN).
Most organizations have done away with manual operations. This means
that, all business processes, and the society depend on computer networks. Local Area Network (LAN).
Therefore, if by any chance the network fails or goes down, then many
systems in the society will stop working.
-5- ©Allande
This is a computer network that is formed whenever computers are connected
together in a relatively small geographical area, e.g., in one building or a - Larger than LAN.
school. - Slower than LAN, but faster than WAN with data rates of 100MBps &
above.
LAN is the smallest size of network & it normally covers an area within the - Are more expensive than LANs, since special equipment is needed to
radius of 10M – 3 Km. connect the different networks together.
- Prone to few errors (moderate error rates).
LAN is usually owned by one organization. However, one LAN can be
connected to other LANs over any distance via data transmission lines or Wide Area Network (WAN).
wireless media.
This is the largest size of network.
A LAN connects several Personal Computers to a Server computer. The
server computer makes available the resources requested by the other A WAN covers a large geographical area such as an entire country, a
computers (workstations) on a network. continent, or even the whole world.
In most LANs, each workstation has its own CPU which it uses to execute It consists of many LANs and MANs connected together to form one large
programs, but still the workstation user can also access data & devices network such as the Internet.
anywhere on the network.
Characteristics of WAN
Advantages of LANs.
− They cover an unlimited (a very large) geographical area, e.g., can cover
1). They enable many users to share expensive devices such as Laser printers, the whole world.
as well as data. However, the no. of computers that can be connected & − They are expensive to build since it requires special equipment for
the distance to be covered is limited. connection.
− Their transmission links are also expensive.
2). Have Low cost (requires less expensive equipment). − Long distance transmission.
3). Enable users to communicate with each other, by sending messages or − Have low data transfer rates compared to LANs (i.e., they are slower than
engaging in chat sessions. LANs & MANs)
− More prone to errors (very high possible error rates compared to LANs and
4). LANs transmit data at very fast rates. They are much faster than data MANs).
transmitted over telephone lines.
5). Small error counts (low error rates). Differences between a Local Area Network and a Wide Area Network.
Metropolitan Area Network (MAN).
1. LAN is limited to a small geographical distance.
2. Data transmission speed in LANs is higher.
A MAN is made up of many LANs connected together.
3. Cost of data transmission in LANs is small.
It covers a metropolitan (medium-sized geographical) area, e.g., a town or an 4. There are less transmission errors in LANs.
entire city, within a radius of 5 – 50 Km.
Review questions.
Characteristics of MAN
-6- ©Allande
1. Describe THREE major data communication models. Two-wire open lines cables.
2. Explain the three most common types of computer networks in use today.
3. Describe a Wide area network. Two-wire open lines cables are made up of 2 parallel copper wires separated
4. List THREE differences between Wide Area Network and Local Area by a plastic insulator.
Network.
5. Determine the type of a network characterized by: Plastic insulator
(a). connection between computers, printers and other resources using Wire conductor
UTP cables.
(b). over 250 computers connected to share resources in a city.
Data communication (Transmission) media. Two-wire open lines cables are used in telecommunication network to
transmit voice (analogue) signals.
A data communication medium is a physical pathway used for carrying data
signals & information from one point to another. Twisted pair cables.
Data communication media can be divided into two: A twisted pair cable is made up of 2 insulated copper wires twisted around
each other in a spiral pattern.
(a). Communication using cable (bound media).
(b). Wireless communication (unbounded media).
UTP cable is prone to noise & signal interference, and therefore, not suitable 4. It is cheap because; of mass production for telephone use.
for environments that are electrically ‘noisy’.
Noise may come from lightening sparks, radio signal, or radiations from spark Disadvantages of Twisted pair cables.
plugs in motor vehicles.
1. They suffer from high attenuation. Therefore, for every cable length of
Shielded twisted pair (STP) cables. 90m, a “Repeater” is needed to amplify (restore) the signal.
2. It is sensitive to electromagnetic interference & eavesdropping.
In STP cables, a braided shield is wrapped around the wires to protect them 3. It has low data transmission rates as compared to other cables.
from noise.
Coaxial cables.
A Coaxial cable resembles the cable that is used to connect television antenna
to a television set.
The diameter of the centre core determines the attenuation rate. If the core
is thin, then the attenuation rate will be higher.
Twisted pair cables are grouped into 5 categories according to the type of data
transmitted, and the maximum rate of transmission. 2. An insulator (a dielectric material) surrounding the copper core.
3. A hollow braid (mesh conductor) surrounding the insulator. The braid is
Category Speed (max. limit) Suitable for made of copper or aluminium, and serves as the ground for the carrier
wire.
-8- ©Allande
4. A shield which covers the braid making the core more resistant to
electromagnetic interference.
The braid together with the insulator & the foil shield protects the carrier wire
from Radio Frequency Interference (RFI) and Electromagnetic Interference
(EMI).
(i). Thin coaxial cable (Thinnet): - it has 1 dielectric insulator around the
core.
Advantages of coaxial cables.
A fibre optic cable uses light to transmit data signals from one point to another
on the network.
2. Cladding.
The Cladding is able to bend light rays, (i.e., when light tries to travel
from the core to the cladding, it is redirected back to the core).
3. Buffer.
− It has a very low attenuation rate, and is preferred for long distance
It surrounds the cladding. Its main function is to strengthen the cable. transmission.
4. The Jacket. − It has a very high bandwidth of 50 Gigabits per second.
− It is very expensive, and requires very careful handling during
It is the outer covering of the cable. installation.
Light transmission along a fibre optic cable. (ii). Multimode fibre optic cable.
The light signal travels along the core through a process referred to as Total A multimode fibre has a thicker centre core than the single mode fibre.
internal reflection.
Therefore, when light signal is inserted into the cable, it tries to cross from the
core to the cladding. The light is bent back into the core, hence spreads along
the length of the cable.
Light rays
− It allows several light signals (rays) to be sent through the cable at
the same time. Hence, there are high chances of the signal being
Core Cladding distorted.
Types of fibre optic cables.
- 10 - ©Allande
− It has a high attenuation rate, and is usually used for shorter 2. Radiowaves.
distance transmission. 3. Infrared transmission.
All these waves use different frequencies of the electromagnetic spectrum,
and travel at the speed of light.
Advantages of fibre optic cable.
Disadvantages of fibre optic cable. Below is a diagrammatic representation of the electromagnetic spectrum
Microwaves
Infra-red (IR)
Visible light
Ultra-violet (UV)
X-Rays
Gamma rays
2. Installation is difficult because the cable must be handled carefully.
High Frequency
Frequency (VHF)
Very High
Frequency (UHF)
Ultra-High
(HF)
3. It is relatively complex to configure.
4. A broken fibre optic cable is difficult & expensive to repair.
Review questions.
106 Hz
107 Hz
108 Hz
1010 Hz
1013 Hz
1015 Hz
1016 Hz
1020 Hz
1022 Hz
3. Distinguish between Thinnet and Thicknet coaxial cables.
4. Define the term Pitch as used in twisted pair cabling.
5. (a). Give two advantages of fibre optic media.
(b). Differentiate between single mode and multimode fibre optic cables.
Wireless (unbounded) media is a type of media that is used to transmit data Microwave frequencies have a small wavelength, and can easily release their
from one point to another without using physical connections. energy in water as heat. This is why they are used in making domestic kitchen
In this case, a transmitting antenna & a receiver aerial are used to facilitate appliances, e.g., microwave ovens.
the communication.
In networking, microwaves are suitable for point-to-point transmissions,
Examples of wireless communication media include: whereby a signal is directed through a focused beam from the transmitter to
the receiver station.
1. Microwaves.
- 11 - ©Allande
Line of sight
Transmitter Receiving
earth station earth station
A satellite transmission system has 3 main components: 1. A satellite is convenient because; it provides a large constant line of sight
to earth stations. This means that, there is no need to keep on moving the
1. Transmitter earth station - it sets up an uplink to the satellite in order to parabolic dish so as to track the line of sight.
transmit data.
2. The satellite transmits the signal to many recipient earth stations. This is
2. A Satellite that is somewhere in an orbit. It receives, amplifies, and because; the transmitted signal spreads out in all directions to form a
retransmits the signal to a receiving earth station through a downlink Point to Multipoint transmission.
frequency.
The downlink & the uplink frequency are usually different. This is to Very Small Aperture Terminal (VSAT)
prevent the downlink signal from interfering with the uplink signal.
A VSAT is a very small satellite dish used both in data, radio, and TV
3. Receiving earth station - receives the signal sent by the satellite on the communication.
other side of the globe.
It can be set up at home or in a small business. It enables direct access to
satellite communication instead of having to go through state-owned or
licensed satellite gateways.
Satellite in space The dish has an antenna that receives the satellite signals. The signals are
decoded using a decoder which is plugged directly to a television set or a
computer.
Uplink Downlink
Radio communication
Radio waves travel just like surface water waves, i.e., they start from a central
point and spread outwards in all directions.
- 12 - ©Allande
As they travel outwards, their energy spreads outwards over the covered area. They are transmitted along the earth’s surface. However, since the earth is
The waves are radiated into the atmosphere by a radio frequency antenna at somehow curved, the signal tends to attenuate at the horizons of mountains
constant velocity. and buildings. This means that, repeater stations have to be built on raised
areas in order to receive, amplify, and propagate the signal from one area to
The figure below shows a typical radio waves link between two separate another.
geographical locations.
Note. The range of VHF is limited, however, it is preferred to HF because; it
is possible to make a VHF wave follow a narrower & more direct path to the
receiver.
Frequency Modulation (FM) radio transmission
Path
Ultra-High frequency (UHF) radio waves
The UHF radiowaves use the line of sight principle used by the VHF waves.
This means that, there should be no barrier between the sending & the
receiving aerial. However, they require smaller aerials.
Transmitting Receiving
antenna antenna For example;
The Television aerial for VHF is bigger than the one for UHF radio waves.
This is because; UHF radio waves can be made to follow a narrower & a more
Power supply direct path to the receiver than VHF radio waves.
TRANSMITTER RECEIVER
Fig.: A typical radio transmitter and receiver link The Bluetooth technology
Radio waves can be of: This is a worldwide and short range radio transmission technology that allows
all personal, hand-held devices to be able to communicate with each other
High frequency (HF). through wireless technology.
Very high frequency (VHF).
Ultra-high frequency (UHF). It enables people to use hand-held communication devices such as mobile
phones & Personal Digital Assistants (PDA’s) to access the Internet.
High frequency (HF) radio waves
The main component in Bluetooth is a small low power two-way radio
The High frequency radio wave signal is transmitted by directing it to the transceiver, which can be inserted in small devices.
ionosphere of the earth. The ionosphere reflects it back to the earth’s surface, Bluetooth enabled devices use a network called the Wireless personal area
and the receiver then picks the signal. network (WPAN) or piconet.
In computer networking environment, infrared technology can be used to A NIC is plugged into an empty expansion slot on the motherboard, and
connect devices in the same room to each other without the need for cables, has ports at the back in which the terminated end of a network cable can
e.g., a computer and a printer. However, the computer’s infrared transceiver be plugged.
must maintain a line of sight with the one for the printer. A wireless card has a wirelesss antenna instead of a port installed on it.
Wireless NIC communinicates using radio waves.
Advantages of wireless communication. The NIC assigns the computer a unique physical address which is used to
direct traffic between the computers on a network.
1. Wireless medium is flexible in operation, i.e., devices can be moved
around without losing access to the network.
2. Wireless networks can span large geographical areas easily.
3. Wireless communication can take place via satellite even in very remote
areas that do not have high cost physical infrastructure like telephone
lines.
4. Allows users of a network to roam without loosing access to the network
Disadvantages of wireless communication.
1. Distinguish between radio and microwave transmission. Modem is short for Modulator Demodulator. A Modem converts a digital
2. Describe an electromagnetic spectrum. signal to analogue form so that it can be transmitted over an analogue
3. State two advantages of satellite communication. media.
4. Give one application area of Infrared transmission.
5. Describe the VSAT technology. A Codec converts an analogue signal to digital form so that it can be
6. Explain the concept of a geostationary satellite. transmitted over a digital medium.
7. Explain the line of sight principle in wireless communication.
A modem can be external, an add-on card or built on the motherboard.
Communication devices
- 14 - ©Allande
3. Hub (Concentrator) b). To extend the length & number of workstations that a segment can
A Hub is a component that connects computers on a network, and is able support.
to relay signals from one computer to another on the same network. c). To reduce overall traffic flow by allowing broadcasts only in the
destination segment of the network.
A Hub usually connects networks that have the same set of The bridge makes sure that packets that are not meant for a particular
communication software usually called Protocols. segment are not broadcast in that segment.
5. Repeater
A Repeater receives a signal from one segment of a network, cleans it to
remove any distortion, boosts it, and then sends it to another segment.
It therefore, enables the network to eliminate attenuation problems.
4. Bridges
For a long time, networks have been implemented using tangible transmission
media like cables. However, since the cost of wireless technology has gone
down & the quality of service increased, companies & individuals are now
using wireless segments in their communications with the aim of extending
the capability of wired networks.
Fig.: A gateway PC connecting a LAN to a WAN The most common devices (components) used in wireless communication are:
8. Switches Access Points (AP), and Wireless antennae.
Unlike a hub, a Switch forwards a data packet directly to the terminal 1. Access points (AP)
equipment on the network without broadcasting. It does this by
connecting the two nodes point-to-point as if they were linked by a direct An Access point is an entry point into a bounded network.
cable.
It is used by people who have wireless devices such as Personal Digital
Note. Some hubs can also act as switches. Such a hub is referred to as a Assistants (PDA’s), Laptops, and computers with wireless links.
switching hub.
Switches are more expensive than hubs. This means that, one switch may
be used as a bridge to connect several hubs. This reduces collision
problems caused by broadcasts.
- 16 - ©Allande
Fig. 3.0: Wireless access point Network Operating systems
2. Wireless antennae
These are operating systems specifically designed to enable the networked
The Access point should have antennae so as to detect wave signals in the computers to respond to service requests.
surrounding. The waves may be Radio waves, microwaves or infrared Servers run on a network operating system.
waves.
Most Access points have 2 antennae so that the one that receives the best Functions of network operating systems
signal at any particular time can be used.
A network operating system performs the following network related
Personal Computer Memory Card International Association (PCMCIA) functions:
card
1. Provides access to network resources, e.g., printers and folders.
A PCMCIA is a card inserted into a device such as a Personal Digital 2. Enables nodes on the network to communicate efficiently with each other.
Assistant (PDA) or a laptop in order to enable wireless communication 3. Enables the various processes on the network to communicate with one
between the device and a wired network server. another.
4. Responds to requests from application programs running on the network.
5. Supports network services such as network card drivers & protocols.
6. Maintains security, ensuring that only users authorized to use the
computer system are allowed access to it.
7. Produces logs, i.e., a record of all the programs as they are run.
8. Organises the use of storage, since this has to be shared among different
users.
9. Works out the resources used by each program. If the user is paying for
Fig.: The PCMCIA card used to connect a device to a wireless LAN the service, then the computer works out the cost of running the program
Review questions. & charges the appropriate account.
1. Describe at least five devices used in data communications. Network OS are normally designed as Multi-user operating systems that run
2. Explain the function of a NIC in networking. the network server program.
3. (a). Explain the importance of a gateway on a network.
(b). Differentiate between a router and a gateway. Examples of network operating systems are:
4. Why is a Switch preferred to a hub on the network?
5. What is the function of a Repeater on a network? − UNIX - Windows NT
6. Give one disadvantage of a Hub on a network. − Linux - Windows 2000
Network software − Novell NetWare - Windows 2003
Protocols
Network software can be classified into 2 main groups:
Protocols are a set of rules and procedures that govern the communication
1. Network Operating systems. between two different devices or people.
2. Network Protocols.
- 17 - ©Allande
E.g., a diplomat from a foreign country must adhere to the set rules and 4. Transport Manages data transfer over the network to ensure
procedures of communication when representing his country in the host layer reliability. It ensures that data units are delivered free
country. of errors, in sequence, and without loss or duplication.
3. Network layer Serves the Transport layer by adding address
In computer networking, Protocols are the rules and technical procedures that information to the data packets, and routing it to its
govern communication between the different computers on the network. destination.
2. Data link layer Prepares data for going onto the communication
How Protocols work medium on the physical layer. Adds error checking &
correction information to the data.
The data transmission process over the network is divided into steps, and at 1. Physical layer Transmits raw data packets via the network card
each step, a certain action takes place. through the transmission media in form of bits.
In addition, each step has its own rules and procedures as defined by the Converts frames to electronic signals and vice versa.
network protocols. The work of these protocols is usually coordinated
through protocol layering so as to ensure that there are no conflicts or Protocols at the Application layer:
incomplete operations.
They provide services to application programs such as the E-mail editor
The Open Systems Interconnection (OSI) reference model. program that enables composing or reading of e-mail messages.
Interconnecting of the various hardware & software products from different Examples of protocols at the Application layer include:
manufacturers together into a single network requires that the equipment must
be able to communicate and work with each other. 1. Simple Mail Transfer Protocol (SMTP) - an Internet protocol for
transferring e-mails.
The OSI reference model defines standard (uniform) methods which enable
different systems to interoperate with each other and to be portable across one 2. File Transfer Protocol (FTP) – an Internet protocol for transferring files.
another.
Network protocols are usually designed using the OSI reference model. To 3. Apple Talk and Apple Share – a networking protocol standard for Apple
facilitate communication between application processes located on different computers.
computers, the model groups similar computer communication protocols into
7 layers, each performing specific functions. Protocols at the Transport layer:
Layer Function They ensure that data is passed between computers more reliably.
7. Application This is where user applications are run. It provides
layer network services such as file sharing, distributed Examples of protocols at the Transport layer include:
processing, file transfer, and network management to
users. It also generates requests for transmission of 1. Transmission Control Protocol (TCP) – enables delivery of sequenced
data or opening of received information data over the network.
6. Presentation Defines data formats to be exchanged & adds
layer formatting, display and encryption information to the 2. Sequential Packet Exchange (SPX) – used in Novell networks for
data being sent. sequenced data.
5. Session layer Sets up data transmission sessions between two
communicating devices on the network.
- 18 - ©Allande
3. NetBEUI – used in Microsoft and IBM networks to establish Logical (Signal) topology
communication sessions between computers in LANs.
Logical topology deals with the way data passes from one device to the next
4. Apple Transaction Protocol (ATP) – it is a communication session and on the network.
data transport protocol used in Apple computers.
Examples of logical topologies are:
Protocols at the Network layer:
(a). Ethernet.
They provide link services, e.g., they handle addressing and routing (b). Token ring.
information, error checking and retransmission of requests.
Ethernet topology
Examples of protocols at the Network layer include:
In Ethernet topology, all computers listen to the network media, and a
particular computer can only send data when none of the others is sending.
1. Internet Protocol (IP) – it does packet forwarding and routing. Token ring topology
2. Internetwork Packets Exchange – This is a NetWare’s protocol for packet
forwarding and routing. In Token ring topology, a special package for data called a token goes around
the network. The computer whose address is on the data held in the token
Review questions. picks it up, reads the data, and then releases the token. The token can then be
captured by another computer which needs to transmit data.
1. List two types of network software.
2. Outline four functions of network operating system. Physical topology
Physical topology refers to the physical arrangement of components on the
3. List four examples of network operating systems.
network.
4. Outline the seven open systems interconnection (OSI) reference model
layers. Examples of physical topologies are:
5. Explain the importance of the Physical layer in the open systems
interconnection (OSI) reference model. (a). Star topology.
6. (a). Define the term protocol. (b). Bus topology.
(b). Give three examples of protocols used in networking. (c). Ring topology.
(d). Mesh topology.
Network Topologies (e). Tree (Hierarchical) topology.
The term network Topology refers to the way in which computers, cables, and (f). Daisy chain
other devices have been arranged in the network.
The choice of the topology to adopt depends on factors such as Reliability,
It can also refer to how data is passed from one computer to another in the Expandability, and Performance.
network.
- 19 - ©Allande
Star topology 5. It can be extended easily, since a workstation is simply connected to the
Star topology consists of computers and other devices, each connected to a hub.
common central server called the a switch or a Hub. However, to connect to 6. Provides flexibility in adding or deleting devices.
the central machine, each computer uses a separate cable.
The wiring hubs increase the flexibility for growth. Addition & removal
Nodes communicate across the network by passing data signals through the of nodes does not involve cutting and joining of cables.
hub, i.e., any two computers (workstations) in the network communicate
through the central machine. 7. Easier to troubleshoot.
When the hub receives data from a transmitting computer, it broadcasts the When something goes wrong with the network, the administrator can
message to all the other nodes on the network. troubleshoot it from the wiring hub.
The hub isolates the network cables from each other. Even if a wire
between a workstation and the hub breaks or develops a bad connection,
the rest of the network remains operational.
4. Simple to control.
- 20 - ©Allande
Disadvantages of Bus topology.
1. A cable break in each section brings down the whole network.
2. The performance degrades since there is no signal integration.
3. Troubleshooting the cable fault can be quite difficult because; the fault
could be anywhere on the cable.
4. Heavy network traffic can slow down the network
Ring topology
In a ring topology, the computers are connected to one another in the shape of
a closed loop using a single cable.
Bus topology uses Coaxial cable as transmission medium. The cable can
carry only one message at a time and each workstation on the network must be
able to know when it can and cannot transmit using this cable.
- 21 - ©Allande
3. Difficult to add more nodes when the network is large.
Disadvantages of Ring topology. 4. Difficult to isolate faults due to lack of a central control point.
1. Failure of one computer or the cable will affect the rest in the entire
network. Tree (Hierarchical) topology
2. Modification is difficult because; adding or removing a device can disrupt This is a hybrid topology where groups of star-configured networks are
the entire network. connected to a linear bus (backbone).
3. Troubleshooting can be difficult.
Mesh topology
Mesh topology uses separate cables to connect each device to every other
device on the network providing a straight communication path.
It is mostly used in Wide Area Networks where there are many paths between
different locations.
- 22 - ©Allande
(i). Point-to-point communication.
(ii). Broadcast communication. Advantages of Centralized model
(i). Data is kept in one location, ensuring that every user is working
Point-to-point communication. with the same information.
In point-to-point, the network contains numerous cables or telephone lines, (ii). It is easier to back up data since the information is stored on only
each one connecting a pair of computers. one Server.
(iii). Easier to maintain security. It is only the server which needs to be
The message is received at each intermediate computer in whole, stored there secured since the terminals have no data.
until the required output line is free, and then forwarded. (iv). The terminals do not require floppy drives as all work is stored on a
Server.
A network using this principle is called a point-to-point or store-and-forward (v). Chances of computer being affected by viruses are very minimal as
network. no diskettes are being used.
(vi). It less costly.
Broadcast communication.
Although the Server has to be very powerful with a lot of storage
In broadcast, there is a single communication channel shared by all space, the terminals are inexpensive as they don’t require real
computers. In this case, the messages sent by any computer are received by
processing or storage capability of their own.
all other computers.
Disadvantages of Centralized model
Something in the message itself must specify for whom it is intended. After
receiving a message not intended for itself, a computer just ignores it.
(i). It is very slow as it is the server alone, which does all the
processing.
Review questions.
(ii). In case where the users have varied needs, it would be difficult to
meet these needs in a centralized computing network as each user
1. As regards to communication within a computer network, what do you
application needs to be set up separately.
understand by the following terms:
(iii). Connection is difficult. All the computers have to be connected on
(a) Point-to-point
a central place.
(b) Broadcast
(2 marks)
2). Distributive computing
In this model, data is stored and processed on the local workstation.
NETWORK MODELS
Computers acting as Stand alone systems are connected together for
A Network model describes how the computer processes information on the
increased functionality.
network.
A Stand alone is a computer which is not connected to any other
Data can be processed by a Client, a central Server or by all the computers on
computer equipment other than its own Printer.
the network.
Advantages of Distributive Computing model.
1). Centralized computer model.
(i). Each machine processes and stores its data; hence, data is accessed
Very large computers, usually mainframes, are connected with terminals.
faster.
The users input & output data using the terminals, while the processing is
done by the central computer (mainframe). (ii). It doesn’t need powerful and expensive servers for data storage.
- 23 - ©Allande
(iii). It can accommodate users with variety of needs. − There are 10 or less users.
− The users are located in a general area.
Disadvantages of Distributive Computing model. − Security is not an issue, e.g. in Bulletin boards.
(i). It is more susceptible to virus, as any user could introduce an Advantages of Peer-to-peer networks.
infected file and spread it throughout the network. (i). It is small & inexpensive.
(ii). It is more difficult to develop an effective back up plan, since each (ii). It is easier to maintain.
user stores data in his/her individual system. (iii). It is easier to setup.
(iii). File management (organization) is difficult as the files are stored in
different locations. Disadvantages of Peer-to-peer networks.
(i). It is difficult to locate information stored in the connected
3). Collaborative model. computers due to Shared level security.
In this model, all computers can share processing power across the (ii). Difficult to update documents and files.
network. Applications can be written to use the processing on the (iii). It is expensive to train staff on how to share resources, as each user
computers to complete job more quickly. is an administrator.
(iv). It is difficult to maintain security, as it is the user’s responsibility to
Advantages of Collaborative model. ensure that only authorized individuals can access their data.
(i). It is faster to complete a task as users are not limited to processing (v). It is more tedious as the user has to memorize password for
power of one system. resources, and in case of any change, they have to inform others.
(ii). Variety of users can be accommodated on a collaborative network.
2. Server-based networks.
Disadvantages of Collaborative model. In this network, there is usually a Server, e.g. a company which is
(i). Viruses can easily be transmitted through the network. dedicated to handle files and/or information for clients, make & service
(ii). Backing up of the data is difficult. requests from network clients, and ensure security of files and directories
(iii). File synchronization is difficult. for them.
Review questions.
Network Security
In networking, there are several ways of protecting your data and information
from intruders. They include: Share level and User level security.
This model of security is mostly used in peer-to-peer networks. The user can
decide which resources to give for sharing.
Most Windows operating systems such as Windows 9X provide such kind of
security.
User-level security
- 25 - ©Allande
TOPIC 2: APPLICATION AREAS OF ICT • The master file is then updated, payroll system is produced, pay slips are
INTRODUCTION printed for every employee and other reports required by management
• There is rampant use of computers in the society today; offices, or the tax department.
institutions, organizations and homes. • Computers are therefore used to store and process payrolls.
• Tasks that were previously manned manually are now tackled • Backing storage is also essential for payroll systems, since the amount
electronically. of data grows with time.
• It is imperative to therefore understand ways by which computers have • The primary purpose of the payroll system is to therefore process the
been applied in the contemporary society to add great value to the accurate information of employees including gross pay, deductions and
information systems of various organizations. the net pay.
• An information system is a collection of specific human and machine • The payroll system is designed to produce several analysis reports e.g. a
efforts required to support the decision making process, data processing, breakdown of payroll expenses against production/income of the
information output and presentation. company.
26
• Used to record incoming customer orders, authorizes delivery of items • The cash book has two accounts i.e. A cash account and the bank
or services ordered and produces invoices for customers who do not pay account.
in advance or on cash basis. • With the help of a cash book, the cash and bank balances can be
checked easily.
II) INVENTORY MANAGEMENT
• Used to keep track of the items in stock and help the management 2. BANKING SYSTEMS
determine which items to re-order, helping the management to have • Since the introduction of the magnetic encoded cheques in the 1960’s,
enough stocks at all times to meet the needs by customers. banks have become dependent on computers for many services.
• The banking industry was one of the earliest consumers of information
III) GENERAL LEDGER ACCOUNTING and communication technology.
• Also known as nominal ledger. • The computerized banking services include:
• Contains a summary of all business accounts i.e. used to keep track of i) Processing customer transactions.
how much a business makes and its worthiness by summarizing the ii) Cheque clearing and processing.
financial transactions in forms of balance sheets, profit and loss account, iii) Electronic funds transfer.
trial balance, day book/journal, list of accounts etc. iv) Internet banking.
• It produces reports on income, sources of income, expenses and the net v) Mobile banking.
profit or loss earned.
• The summary report (balance sheet) is usually generated at the end of an I) PROCESSING CUSTOMER TRANSACTIONS
accounting period. • They are used in banks to carry out financial transactions such as
recording deposits, withdrawals and calculating interests on savings and
IV) ACCOUNTS RECEIVABLE loans.
• Keeps track of money owed to a company by its customers. • Reports are also generated on the current status of accounts.
• This helps the management to make a follow up by billing the customers • The transactions are entered via terminals, which are connected to a
for overdue payments. central computer for centralized processing.
• An example is when goods are sold to a retailer; money owed on the • ATMs are used to offer 24 hour service to customers and more
sales is an accounts receivable item until the payment is received. flexibility in cash deposits and withdrawals.
27
• Credit cards are also used when paying for goods and services where
payment is transferred electronically from the customers account to the II) POINT-OF-SALE TERMINAL (P-OST, E-POST)
recipients account. • Used to input and output data at the point where sales are transacted.
• It has direct data capturing devices like bar code readers, card readers, a
IV) INTERNET BANKING (e-banking) monitor and a receipt printer, where goods are identified by means of
• Enables users to access their bank accounts through the internet. bar codes.
• The user can query account statements, pay bills and transfer funds • Transactions at the P-OST may involve the following steps:
electronically. a) The BCR (wand) is passed over the item’s bar code.
b) The barcode is automatically converted to the item number e.2.
V) MOBILE BANKING (m-banking) 2160, which is read to the computer.
• An account holder in a bank can perform banking transactions using c) Using the number, the computer searches for the item from a master
his/her mobile phone. file with a corresponding number in the products database.
• The transactions may include cash transfers, settling bills electronically d) Once the record is found, its description and price lookup file is
and performing account queries. used for processing the sale.
• Mobile phone companies like Safaricom support electronic cash transfer
services with their M-Pesa service. Advantages:
a) Correct prices are used at the checkout counter.
3. RETAIL SYSTEMS b) It is faster since the attendant does not have to enter details
• Used in supermarkets, distributor outlets and others for: manually.
i) Stock control.
ii) Transactions handling at the EPOST. 4. RESERVATION SYSTEMS:
I) STOCK CONTROL • These are distributed networked systems that are used mainly to make
• Stock control or inventory control enables a user to manage his/her bookings in areas such as airlines, hotels, car-rental, theaters etc.
stock more efficiently by keeping track of the stocks. • Bookings are made from a remote terminal connected to a centralized
• Accurate and up-to-date information on availability of stocks and computer database.
demand are critical for business success. • To access the database, a customer makes enquiries via the remote
• It enables one to reduce the risk of under stocking or overstocking i.e. terminal connected to the central computer.
overstocking ties up valuable space and capital that could have been • It involves online enquiry where an individual directly requests for
used for other valuable items while under stocking causes customer information through a terminal from a central computer and receives an
dissatisfaction. immediate response.
• Stock control systems are therefore used for the following reasons:
a) Storing full details of the items held in stock i.e. immediately 5. EDUCATIONAL SYSTEMS
available. • Computers are playing an increasingly important role in educational
b) Proving users with up-to-date information regarding stock items and institutions in the following ways:
prices. i) Computer Aided Instruction (C.A.I.)
c) Monitoring stock levels so that items can be ordered in good time. ii) Computer Aided Learning.
d) Storing details of suppliers of stock items. iii) Electronic Learning (e-learning).
e) Storing details of pending orders. iv) Computer based Simulation.
28
• Satellite technology and the Internet are used to provide quality
I) COMPUTER AIDED INSTRUCTION (C.A.I.) educational content from all over the world at an affordable cost.
• Refers to the use of a computer to learn, drill and practice particular • Courses and seminars are beamed by satellite on large screen projectors,
educational principles. TV monitors or computers.
• It entails learning new languages, educational games, typing tutor’s • Students interact with the instructors in real-time using phone, fax and
programs etc. e-mail.
• In a geography map, the student must provide the names of cities,
mountain ranges, names of rivers, lakes etc. 6. COMMUNICATION SYSTEMS
• A biology student may be asked to name or position internal organs, • Communication refers to the distribution of information or data from
muscles or bones in a picture of the human body. one person or location to another.
• Effective and efficient data communication is achieved by use of high-
speed electronic devices such as computers, cell-phones, radios and
II) COMPUTER AIDED LEARNING (C.A.L.) television.
• It presents educational materials the way a teacher does in a classroom. • The integration of computerized computer devices and
• Most CAL programs have clear graphical presentations such as video telecommunication infrastructure for the purpose of communication is
clips and voice for demonstrating or explaining difficult concepts. referred to as information and communication technology.
30
• Telecommuting takes advantage of the growing communication • Fast and efficient means of sending and receiving messages, data, files
networks to reduce unnecessary travel to the place of work, reducing or graphics.
travel expenses and less stress due to commuting inconveniences such • Once you subscribe for Internet Services through a service provider, you
as traffic jams. can send or receive e-mails to or from anyone connected to the Internet
• Telecommuting may be practical for: using a computer or a WAP – enabled cellular phone.
a) Writers. • Documents can be created, distributed, filed, stored and destroyed
b) Engineers. electronically using a computer.
c) Architects. • A user with a micro-computer and a modem types a message and then
d) Mothers with small children. identifies the message recipients, using e-mail addresses.
e) Handicapped workers.
f) Individuals whose fields work take them far from the office. Advantages of e-mail:
✓ You do not create written documents.
• This arrangement can also be practical since employees who ✓ You avoid at least some telephoning, eliminating busy signals, dealing
telecommute: with intermediate secretaries, leaving messages or playing “telephone
a) May use less office supplies like photocopying. tag” i.e. repeatedly missing each others’ calls.
b) Do not occupy valuable office space. ✓ Messages are delivered much faster than postal delivery since they are
c) Do not waste time commuting in cars, trains or buses. sent electronically and therefore received nearly instantaneously.
d) Do not waste time conversing idly or suffering the petty distractions ✓ In many circumstances, e-mail is both cheaper and more convenient
of office life. than phoning.
VI) THE INTERNET ✓ You can time-shift messages, i.e. you can send messages to people in
• A world – wide computer network linking countless thousands of different time zones even though they might not be awake.
computer networks for information transfer and efficient ✓ You can mass-distribute messages using computerized lists of recipients
communication. e.g. sales representatives.
• Some of the services available on the internet are:
a) world wide web (www) 7. INDUSTRIAL SYSTEMS
b) electronic mail (e-mail) • Industrial plants such as motor vehicle manufactures, chemical plants,
refineries and mining plants use computer systems in the following
a) World wide web (www) ways:
• A collection of web pages held on web servers. i) Computer Aided Design and Manufacturing
• One can access information using a computer or any other ii) Simulation.
communication device such as a mobile phone for WAP (wireless iii) Process control.
Application Protocol).
• A computer connected to the Internet allows the user to access a wide I) CAD and CAM
range of information such as news, entertainment, banking, reservation, 1. CAD/CAM is an integrated system that allows products that have been
business news, e-mails etc. designed to be transmitted into an automated manufacturing system for
the product to be manufactured as per the computer model.
b) Electronic mail (e-mail) 2. The computer model is designed using special software, usually capable
of displaying 3D representations of solid objects, which allows the
31
designer to view the object from different angles and modify the design b) In engineering, models are simulated to test performance under
until it is satisfactory. various conditions e.g. the strength of material to be used for
3. The CAD software will often generate a 3D view from a plan, side building a bridge can be tested using simulators.
elevation and front elevation of the object. c) In medicine, simulation can be used to train doctors on operation
4. The final design can therefore be used directly to create manufacturing techniques.
information and to provide information on quantities of materials
required to produce the item. III) PROCESS CONTROL
• Refers to the use of a computer system to control an ongoing physical
CAD hardware: process especially in manufacturing.
a) a graphics workstation that allows the designer to interactively • Such controls may include regulating temperature, pressure, fluid flow
create a drawing. etc.
b) A high resolution screen (display) to show drawings in colour and in • Computerized process control is mostly used in petroleum refineries,
fine detail. chemical plants and other manufacturing companies to manage machine
c) Fast processors with a great deal of memory. intensive processes.
37
REASONS WHY EMPLOYEES MAY RESIST AUTOMATED • The syndrome is characterized by:
SYSTEMS i) Eye strain.
a) Fear of change: people are creatures of habits and hence are afraid ii) Headaches.
of change. iii) Double vision.
b) Fear of loosing their jobs: people usually associate the computer iv) Fatigue.
with loss of jobs and hence they will be afraid that they might end up
loosing their jobs.
c) Fear of failure: since the computer is very new in a given working Remedies:
environment, the people will be afraid that they might never adapt to i) Use monitors with good resolution.
it. ii) Fit monitors with antiglare screens that filters excess light.
d) Loss of control: the management will be afraid that once a computer iii) Adjust the brightness of the screen to the intensity that is
is implemented they might lose control of the organization. comfortable to the eyes.
e) Lack of understanding: the user may not understand the benefits of iv) Use flat panel screens that do not emit so many radiations.
the computer system in their jobs; hence this will create resistance v) Use good overhead fluorescence tubes.
since the computer will be looked upon as an intruder. vi) Avoid flickering monitors and lighting systems.
vii) Have interludes of rests.
3. ISUES OF WORKERS HEALTH viii) Tilt the monitors to a convenient position.
• Some of the negative effects of ICT on our health include:
a) Repetitive Strain Injuries (RSI) C. ELECTROMAGNETIC EMMISIONS:
b) Eye Strain and Headaches. • These are waves of electrical and magnetic energy that are emitted
c) Electromagnetic emissions. by current carrying conductors.
d) Stress. • Users are advised to use low emission devices in order to avoid
e) Isolation. exposing themselves to excess emissions.
f) Radiation and visual display unit.
g) Computer chip toxin. D. STRESS:
• Mental stress is another compliant.
A. RSI – REPETITIVE STRAIN INJURIES • Many people who work at computer feel that they are expected to
• Injuries resulting from wrist, hand, arm and muscle strain, neck produce more and do it faster because computers themselves are
strains due to forced repetitive movement e.g. when entering data fast.
using keyboard. • Also those being monitored by computers frequently feel additional
pressure.
Remedy for RSI:
i) Resting.
ii) Sitting in a relaxed position.
iii) Changing typing techniques.
39
TYPES OF COMPUTER CRIMES 1. Rapid evolution in computer hardware and software.
a) Data manipulation: Refers to altering data that enter or exit a 2. Artificial intelligence.
computer e.g. changing data on a certificate. 3. Expanded information superhighway.
b) Time bomb: This is the coding of a computer program to destroy
itself after it has been run a certain number of times.
c) Computer virus: A program entered into a computer with the aim of
destroying or altering data and spreading the destruction to other
computers on a network. 1. RAPID EVOLUTION IN COMPUTER HARDWARE AND
d) Trap door: Creating of a special password that gives its creator a SOFTWARE
sole access to the system. • A lot of technological improvements have been made both in
e) Data stealing: Using a computer to steal information that has been hardware and software since the introduction of computers.
gathered for someone else for illegitimate purpose. • Computers will be more intelligent, computers will be able to learn in
f) Eavesdropping: Tapping without authorization into communication their environment, understand human voice, respond etc.
lines over which computer data and messages are sent. • Software will be more versatile and easier to use.
g) Industrial espionage: Using computer to steal designs, marketing • The silicon revolution has seen rapid increase in microprocessor
plans or other trade secrets from one company and selling them to speeds and capabilities due to advanced research in the semi-
another company. conductor industry.
h) Piracy: This is making unauthorized copies of copyrighted computer • Future trends will see reduction in size and cost of components but
software. increase in capability.
i) Fraud: This is the use of computers to cheat other people with the • Improvements in input, processing, storage, output and
intention of gaining money or information. communication devices have led to faster, cheaper and more
j) Sabotage: This is the illegal destruction of data and information with reliable data processing devices.
the aim of causing great loss to an organization. • Industries will become more automated.
k) Logic bomb: It is a program that is executed when a certain set of
• Microprocessors of a thumb’s size can now execute instructions in a
condition is made e.g. a fired employee can load a logic bomb to a
trillionth of a second hence leading to emergence of smaller but
computer to destroy when records are updated in a database.
smart devices.
BREAKTHROUGHS IN ICT:
2. ARTIFICIAL INTELLIGENCE (A.I.):
There have been a lot of breakthroughs in the fields of:
• A branch of computer science that is concerned with the
• Health care.
development of machines that emulate/copy/mimic human like
• Education. qualities such as learning, reasoning, communicating, seeing and
• Communication – fax, e-mail, internet. hearing.
• Research. • The idea of AI developed from a need to develop computer
• Commerce – shipping imports and exports. programs that would even challenge human beings in playing games
• Art and design. such as chess and scrabble.
• Entertainment – music, video, games. • Computer scientists and engineers are still working hard and
• Transport. carrying out intensive research with the aim of coming up with
smatter computers which can almost simulate human thinking and
EVOLUTION OF COMPUTER SYSTEMS: learning, instead of relying on static programmed instructions.
Future trends in ICT will be characterized by:
40
• There are 4 main application areas of AI namely: d) Voice synthesis.
e) Computer vision
a) Expert systems. f) Artificial neural networks.
b) Natural language processing. g) Robotics/perception systems
c) Voice recognition.
42
2. A robot must always obey orders given to it by a human being,
except where it would conflict with the 1st law.
3. A robot must protect its own existence, except where it would
conflict with the 1st and 2nd law.
43
TOPIC 4: CAREER OPPORTUNITIES IN INFORMATION
COMMUNICATION TECHNOLOGY (ICT)
b) Liaising with the system analyst.
ICT has created new job titles. Some of the computer career c) Review and control program documentation.
opportunities include: d) Reviews program’s performance.
e) Ensures that all programs are well tested before put into use.
1. SYSTEM ANALYST: f) Reviewing all the system specifications before handover to
Responsible for analyzing a company’s needs or problems then design programmers.
and develop a computer based information system.
46
Examples: vii. Bachelor of Science (computer programming).
i. Jomo Kenyatta university of Agriculture and technology.
ii. Kenyatta University. ICT RELATED MASTERS PROGRAMS:
iii. Nairobi University. i. Masters in computer science.
iv. Maseno University. ii. Masters in information technology.
v. Moi University. iii. Masters in hardware engineering.
vi. Egerton University. iv. Masters in science (computer engineering).
vii. Masinde Muliro University of Science and Technology.
2. RESEARCH INSTITUTIONS:
• These are the other specialized research institutions that concentrate
b) Private Universities: on narrow fields of study such as computer or ICT technology,
• Self-sponsored institutions set up by individuals, churches or any agriculture, space science etc.
other organization. • It is possible to enroll in such institutions as a research trainee.
• They are privately run.
• Students’ enrolment depends on whether the student is capable of
sponsoring himself/herself.
• For them to operate, they must be registered or accredited by the
commission of higher education or any other quality assurance body
that is recognized worldwide.
• Accreditation leads to public acceptance and confirmation evidenced
by the grant of charters by the state or accrediting bodies.
Examples:
i. Daystar University.
ii. Catholic University of Nazareth.
iii. Mount Kenya University.
iv. Kabarak university.
v. Baraton University.
vi. Catholic University of East Africa.
vii. Kenya Methodist University
47
3. POLYTECHNIQUES: i) Kenya Technical Training Institute.
• These are institutions of higher learning that mostly offer Diploma j) Kenya Science Teachers College.
and certificate courses in technical fields such as ICT, mechanics, k) Machakos Technical Training Institute.
food production etc.
• A polytechnic may also be accredited by a university or the state to The most important considerations to make before you join a college to
offer degree programmes. pursue an ICT course:
a) Whether it offers ICT courses recognized both locally and
EXAMPLES OF POLYTECHNICS THAT OFFER ICT IN KENYA: internationally.
i. Mombasa polytechnic. b) The cost of training with such an institution.
ii. Kenya polytechnic.
iii. Eldoret polytechnic. EXAMINATIONS BODIES FOR HIGHER DIPLOMA, DIPLOMA AND
iv. Kisumu polytechnic. CERTIFICATES:
a) Information Technology Standards Association (ITSA)
ICT COURSES OFFERED IN POLYTECHNICS: b) Institute of Management Information Systems (IMIS)
i. Computer repair and assembly. c) Kenya National Examinations Council (KNEC).
ii. Computer operator. d) PITMAN.
iii. Management information system.
iv. Computer programming. QUALIFICATIONS GAINED ON STUDY ON SITTING FOR AN EXAM:
v. Computer networking. i. Diploma in computer studies.
vi. Computer software engineer. ii. Diploma in computer science.
vii. Computer studies. iii. Higher diploma in computer studies.
viii. Information technology. iv. Higher diploma in information technology.
ix. Computer science. v. Certificate in computer studies.
x. Computer hardware engineer. vi. Certificate in information technology.
xi. Web administrator
4. COLLEGES:
• These are middle level institutions that offer diploma, certificates and
craft courses in many disciplines such as technical, ICT, teacher
training, business management etc.
EXAMPLES OF COLLEGES:
a) Rift valley Institute of Science and Technology.
b) Kaiboi Technical Training Institute.
c) Thika Institute of Science and Technology.
d) Kiambu Institute of Science and Technology.
e) Coast Institute of Science and Technology.
f) Kirinyaga Technical Training Institute.
g) Nairobi Technical Training Institute.
h) Nyeri Technical Training Institute.
48