BIT 113 Notes
BIT 113 Notes
WRITTEN BY:
Copyright © Masinde Muliro University of Science and Technology
2019
All Rights Reserved
Published by MMUST ODEL
FOREWORD
The need for a modular system of study in the University in general and in fundamentals of computing in
particular has been necessitated by two issues. The first issue concerns the increased demand for higher
education in Kenya that requires universities to broaden access and inclusion to a greater range of students.
This is driven by the twin agendas of increasing economic competitiveness on the national and world
economic stage and promoting greater social equality by extending access to education to students from
under-represented groups. In addition, the increasing importance attached to the ‘knowledge economy’ and
to ‘lifelong learning’ is encouraging more mature-age, working students to return to formal education to
enhance their professional knowledge and skills. These changes in access to education have necessitated a
move to two key principles of an adaptable curricular namely: modularity and flexibility in course structures
and delivery. Thus, universities have to actively implement systems and approaches in teaching and learning
environments; for example, by means of electronic platforms and applications for course delivery, teaching
and learning support.
Secondly, all first year students in the university need to be ‘academically literate’, that is, they need to
develop and apply with immediate effect a range of academic computing skills to enable them to
participate effectively in the academic community they are entering. Academic computer skills are the
hardware and software skills, an understanding of computer language, data communication and
networking concepts and research skills that students require for effective engagement not only within
their discipline, but also with the wider academic community that a university represents. These skills
include the ability to manage time and resources, engage in academic debate and discussion, argue a
position, locate library resources and work in groups. All these are premised upon an understanding of the
functions of a university and the nature of knowledge and its generation and representation.
It is in this light that I consider the publication and delivery of this module – Fundamentals of Computing
– very timely. The module covers five key topics including: introduction to computers; computer hardware;
data representation and number systems; computer software; data communication and networks.
I am confident that students at MMUST will find this module valuable and responsive to their patterns of
study and participation.
Page 4 of 95
There is a common adage that says that if the dinosaurs were clever enough to accept change and adjust,
then they wouldn’t be extinct. Masinde Muliro University of Science and Technology is awake to this
reality. Modern technology has necessitated the change from traditional methods of delivery of pedagogical
content. Learning is no longer confined to the traditional classroom as we know it. It is therefore with great
pleasure that I introduce you to this module. The module is one of the first four prepared for university wide
courses.
The publication of this module is therefore a ground breaking event that will see the University develop
learning modules in all teaching subjects. This will enable us to extend educational services to all parts of
the country, continent and the world. This module has been conceptualized as a self-contained resource that
will enable the learner to actively engage the content of this subject.
In this module, there are a number of self-evaluating tasks, activities and assignments, which you should
attempt as you study this course. These activities, tasks and assignments are intended to make your study
of this subject more fulfilling and meaningful. They will support your learning and open up your mind to
more critical interpretation of issues as well as enable you to acquire competences you require in today’s
world. Make sure you attempt all questions and follow all the steps given in order to get the best out of the
module. The lecturers will always be at hand to guide you.
You will notice that this course lays emphasis on mind stimulating tasks, activities and assignments. There
are those activities to be done individually and others to be done in groups. Group activities and tasks should
help you learn from others and share your knowledge with them. This should build teamwork and
cooperation, which is one of the goals of good education.
As a centre for excellence, Masinde Muliro University of Science and Technology has taken this direction
in order to be in tandem with world trends. To integrate ICT in delivering educational content is the way to
go.
The preparation of this course was painstakingly undertaken by our professionals and has undergone various
reviews for the purpose of making sure it is of high quality. I would like to acknowledge the core team that
spearheaded this initiative. To all of them, I say you are the real pacesetters of our University.
Fundamentals of Computing course aims to provide all the undergraduate students, of Masinde
Muliro University of Science and Technology, with the relevant skills and knowledge to take on
in their respective disciplines upon graduation and grow into in to competent and an all-round
graduate. The programme encourages the student to acquire the important skills of self-directed
learning, problem solving and effective communication. The graduates who have undertaken this
course is expected to be proficient in a variety of settings, which shall include management of
computer information or systems, apply computer technology in day to day life activities, teaching
and undertaking research activities.
The department of Information Technology wishes to welcome students with their input interms
of compliments or suggestions that could help make the module even much more relevant and
easier to learn.
Dr Daniel Otanga
Page 6 of 95
TABLE OF CONTENTS
Page 8 of 95
4.1 Objectives .................................................................................................................................................... 72
4.2 This topic consists of four sections namely:-............................................................................... 72
4.2.1 Fundamentals of Software .................................................................................................................. 72
4.2.1.1: Systems Software ............................................................................................................................. 74
4.2.1.2: Application Software ....................................................................................................................... 78
4.4 Summary ................................................................................................................................................. 81
4.5 Self-check Questions ........................................................................................................................... 81
4.6 Scorecard ............................................................................................................................................... 81
Learning Outcomes.......................................................................................................................................... 82
4.6 Further reading ......................................................................................................................................... 82
TOPIC FIVE: DATA COMMUNICATION AND NETWORKS .................................................. 83
5.1 Objectives .................................................................................................................................................... 83
5.2 This topic consists of Four sections namely:- ................................................................................... 83
5.2.1 Basic Data communication concepts ............................................................................................... 84
5.2.1.3 Components of Communication Network .................................................................................. 86
5.3 Communications Channels ..................................................................................................................... 87
5.3.2 Data Transmission ................................................................................................................................. 90
5.4 Network Topology .................................................................................................................................... 90
5.3.1 Network Types ....................................................................................................................................... 92
5.5 Summary ...................................................................................................................................................... 94
5.6 Self-check Questions ........................................................................................................................... 94
5.7 Scorecard ............................................................................................................................................... 94
Learning Outcomes.......................................................................................................................................... 95
5.6 Further reading ......................................................................................................................................... 95
Content Introduction
This is a course for first year students during the first year. Nothing epitomizes modern life
better than the computer. For better or worse, computers have infiltrated every aspect of
our society. Today computers do much more than simply compute: supermarket scanners
calculate our grocery bill while keeping store inventory; computerized telephone switching
centers play traffic cop to millions of calls and keep lines of communication untangled;
and automatic teller machines let us conduct banking transactions from virtually anywhere
in the world. But where did all this technology come from and where is it heading? To fully
understand and appreciate the impact computers have on our lives and promises they hold
for the future, it is important to understand their evolution.
Page 8 of 102
COURSE OUTLINE
Description…………………………………………………………………………………………
Credit Units 3
Pre-requisite None
Learning At the end of the semester, the students should be able to:
Outcomes)
1. Define a computer
1 Introduction to Computers: 1 -2 6
Overview
History of Computers
Classification of Computers
3 CAT ONE 7 1
Coding Systems
Number Systems
Number Systems Conversations & Operations
Fundamentals of software
Introduction and classification of computer software
System Software
Application Software
Page 10 of 102
6 CAT TWO 12 1
TOTAL HOURS 42
Examination
Continuous Assessment
Total
Resources
http://www.daileyint.com/hmdpc/manual. htm
ort.htm
http://www.internet4classrooms.com/supp
http://www.pcguide.com/ts/index.htm
Page 14 of 95
Introduction to the Module
This module has ten topics with every lesson having several sub topics. Ensure that you have read
and understood every lesson before you proceed to the next one. In every lesson you will find
symbols that give instructions on what is expected of you; for example to take a note on an
important aspect, to perform an activity or even to refer to previous Modules. At the end of every
topic there will be a self-check where you are expected to assess your understanding. It is our hope
that you will enjoy reading this Module and please feel free to comment on the whole Module
Aim
1. Define a computer
2. Identify the key components of a computer
3. Describe the basic hardware devices
4. Explain the various data representation methods
5. Describe various system/application software
6. Explain the various communication technologies
Page 16 of 95
Topic 1: Introduction to Computers
1.1 Objective
Sections 1: Overview
Sections 2: History of Computers
Sections 3: Classification of Computers Sections
4: Application of Computers
Today's world is an information-rich world and it has become a necessity for everyone to know
about computers. Purpose of this tutorial is to introduce you about computer systems and its
fundamentals.
The word computer comes from the word “compute” which means, “to calculate.” Thereby, a
computer is an electronic device that can perform arithmetic operations at high speed. A
computer is also called a data processor because it can store, process, and retrieve data whenever
desired. The activity of processing data using a computer is called data processing.
Definition
Computer System is an electronic data processing device, which does the following:
A computer Is made up of two key components: the hardware and the software. This will be
discussed more in the next topics
Advantages
High Speed
It can perform millions of calculations in a few seconds as compared to man, who can
spend many months for doing the same task.
Accuracy
Storage Capability
Unlike human beings, a computer is free from monotony, tiredness and lack of
concentration.
It can work continuously without creating any error and boredom.
It can do repeated work with same speed and accuracy.
Versatility
At one instant, it may be solving a complex scientific problem and the very next moment
it may be playing a card game.
Reliability
Automation
Once a program is given to computer, i.e., stored in computer memory, the program and
instructions can control the program execution without human interaction.
The use of computers for data processing in an organization leads to reduction in paper
work and speeds up the process.
Page 18 of 102
As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of files gets reduced.
Reduction in Cost
Though the initial investment for installing a computer is high but it substantially reduces
the cost of each of its transaction.
Disadvantages
No IQ
A computer is a machine and has no intelligence of its own to perform any task.
Each and every instruction has to be given to the computer.
A computer cannot take any decision on its own.
Dependency
Environment
No Feeling
It cannot make judgment based on feeling, taste, experience and knowledge unlike a human
being.
Activity
They made use of vacuum tubes to store and process information. The tubes consumed
a lot of power and generated a lot of heat (overheating). They were huge in size and
occupy a room. They used magnetic tape. Storage capacity was very low i.e. 2kb and
speed of processing was also very low. First machine in this category was ENIAC
(electronic discrete variable automatic computer) and later came UNIVAC (universal
automatic computers).
These computers used transistors after invention of transistors. The transistor is smaller
cheaper and produced less heat than vacuum tubes and consumed less power. The cost
of computers decreased and the speed increased. The second generation saw the
introduction of more complex ALU and CPU, the use of high level languages and
provision of system software with the computer. Data access time was measured in
micro-seconds. Removable disk storage units were developed for use on these
machines.
This introduced the use of very small electronic circuit called integrated circuits (IC)
by combining several transistors together between 3 transistors to make 1 IC. With IC
you can house thousands of transistors in one IC. This change further decreased the
size, heat output and the maintenance complexity of the computers while increasing its
speed. The small circuitry that resulted improved the processing speed i.e. 10 times the
past.
Page 20 of 102
Use large scale integration circuits which housed hundreds of transistors and very large
IC which are between 200,000 to 400, 000 in one IC. Memory used includes magnetic
disc and optical disc. Memory size expanded up to several MB and speed was 10 times
faster. This generation marked the origin of mini computers in use today.
The design of these computers was based on VLSI (very large scale integration)
technology, the microchip technology that gave rise to the smaller computers known
as the micro computers in use today. These computers are used in networking.
Examples of microcomputers are IBM PCs BBC micro etc. the micro computers are
usually described as PCs or stand alone or desktop computers because they were
designed primarily to serve single person at a time. The fifth generation is still a state
of the art technology that relies on predictions and further technological refinements.
Research shows that the trend in computer technology revolution is that there is;
i. By Size
a) Micro-Computers
b) Mini- Computers
c) Main-frame Computers
d) Super-Computers
ii. By purpose
iii. By Technology
a) Analog Computers
Analog Computer use continuous data. The common available Analog Computers are:
b) Digital Computers
c) Hybrid Computer
Activity
i. Schools
vii. Banks
Keep Record of Government Bills and Statements Keep
Record Registers for easy retrieval and future reference.
Keep Record of Bank Staff
Calculation of Bank Staff Salaries
Keep Record of Account holders.
Keep Record of Post bank Account holders, the amount and balances
xi. Hospital
Keep Record of Medical Staff
Keep Record of Number of Patients and their Diseases
Keep Record of Stocks of Drugs, the Amount of Cash in the Bank and the Pre –
Numbered documents.
Calculation of Wages and Salaries of Medial Staff
Keep Record of Rules and Regulations that govern the Hospital Staff.
Activity
Write a brief description of the types of computers in place and their main uses. If
your office or surrounding has more than one type of computer, find out why?
What different tasks are the different computers intended to do?
1.3 Summary
This lesson introduced basic information about how computers work, including
information about the history of computers and different classifications.
1.4 Scorecard
20-17 Excellent
16-12 Good
11-9 Satisfactory
Learning Outcomes
You have now completed topic one.
If you have put a tick at the “not sure” column, please go back and study that section in the topic
before moving on.
In the previous lesson we discussed about the evolution of computer. In this lesson
we will provide you with an overview of the basic design of a computer. You will
know how different parts of a computer are organized and how various operations
are performed between different parts to do a specific task. As you know from the
previous lesson the internal architecture of computer may differ from system to system, but the
basic organization remains the same for all computer systems
2.1 Objectives
Upon completion of this lesson, you should be able to:
1. List different components of a computer
2. Explain how information flows in a computer
3. Explain the different hardware units of a computer system
A computer as shown in Fig. 2.1 performs basically five major operations or functions irrespective
of their size and make. These are 1) it accepts data or instructions by way of input, 2) it stores data,
3) it can process data as required by the user, 4) it gives results in the form of output, and 5) it
controls all operations inside a computer. We know that a computer is used to
(i) Collect (ii) Organise (iii) Sort and, (iv) transform raw facts into meaningful information form,
which logic conclusions can be drawn.
1. Input: This is the process of entering data and programs in to the computer system. You should
know that computer is an electronic machine like any other machine which takes as inputs raw
data and performs some processing giving out processed data. Therefore, the input unit takes data
from us to the computer in an organized manner for processing.
Figure 2.1:
Basic
computer Operations
2. Storage: The process of saving data and instructions permanently is known as storage. Data
has to be fed into the system before the actual processing starts. It is because the processing speed
of Central Processing Unit (CPU) is so fast that the data has to be provided to CPU with the same
speed. Therefore the data is first stored in the storage unit for faster access and processing. This
All data and instructions are stored here before and after processing.
Intermediate results of processing are also stored here.
3. Processing: The task of performing operations like arithmetic and logical operations is
called processing. The Central Processing Unit (CPU) takes data and instructions from the storage
unit and makes all sorts of calculations based on the instructions given and the type of data
provided. It is then sent back to the storage unit.
4. Output: This is the process of producing results from the data for getting useful
information. Similarly the output produced by the computer after processing must also be kept
somewhere inside the computer before being given to you in human readable form. Again the
output is also stored inside the computer for further processing.
5. Control: The manner how instructions are executed and the above operations are
performed. Controlling of all operations like input, processing and output are performed by control
unit. It takes care of step by step processing of all operations inside the computer.
All types of computers follow a same basic logical structure and perform the following five basic
operations for converting raw input data into information useful to their users
1 Take Input The process of entering data and instructions into the
computer system.
2 Store Data Saving data and instructions so that they are available for
processing as and when required.
5 Control the workflow Direct the manner and sequence in which all of the above
operations are performed.
Table 2.1: Five basic operations for converting raw input data into information
Activity
In the computer lab, look at the manuals that come with the computers. Review the
manuals to find out what type of microprocessor is in the computer. Look also
at the computer screen when the computer is turned on to see if information about the computer
is shown there.
Page 31 of 102
2.2.3.1 Input Hardware
This unit contains devices with the help of which we enter data into computer. This unit makes
link between user and computer. The input devices translate the human being information into
the form understandable by computer. An input unit of a computer System performs the
following functions:
i. It accepts (or reads) instruction and data from outside world ii.
It converts thee instruction and data in computer acceptable form
iii. It supplies the converted instruction and data to the computer system for further
processing
Following are few of the important input devices, which are used in Computer Systems:
a) Keyboard
b) Mouse
c) Joystick
d) Light pen
e) Track Ball
f) Scanner
g) Graphic Tablet
h) Microphone
i) Magnetic Ink Card Reader (MICR)
j) Optical Character Reader (OCR)
k) Bar Code Reader
l) Optical Mark Reader
Keyboard
Most common and very popular input device is keyboard. The keyboard helps in inputting the
data to the computer. The layout of the keyboard is like that of traditional typewriter, although
there are some additional keys provided for performing some additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now 104 keys or 108 keys keyboard is
also available for Windows and Internet.
1 Typing Keys These keys include the letter keys (A-Z) and digits keys (0-9)
which generally give same layout as that of typewriters.
3 Function Keys The twelve functions keys are present on the keyboard. These are
arranged in a row along the top of the keyboard. Each function
key has unique meaning and is used for some specific purpose.
4 Control keys These keys provide cursor and screen control. It includes four
directional arrow key. Control keys also include Home, End,
Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt),
Escape(Esc).
5 Special Purpose Keys Keyboard also contains some special purpose keys such as Enter,
Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
Mouse
Page 33 of 102
Mouse is most popular Pointing device. It is a very famous cursor-control device. It is a small
palm size box with a round ball at its base which senses the movement of mouse and sends
corresponding signals to CPU on pressing the buttons.
Generally, it has two buttons called left and right button and scroll bar is present at the mid.
Mouse can be used to control the position of cursor on screen, but it cannot be used to enter text
into the computer.
Advantages
Easy to use
Not very expensive
Moves the cursor faster than the arrow keys of keyboard.
Joystick
Joystick is also a pointing device, which is used to move cursor position on a monitor screen. It
is a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves
in a socket. The joystick can be moved in all four directions. The function of joystick is similar
to that of a mouse. It is mainly used in Computer Aided Designing (CAD) and playing computer
games.Commonly used for video games, flight simulators, training simulators, and for
controlling industrial robots
Light Pen
When light pen's tip is moved over the monitor screen and pen button is pressed, its photocell
sensing element, detects the screen location and sends the corresponding signal to the CPU.
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a
mouse. This is a ball, which is half inserted and by moving fingers on ball, pointer can be moved.
Since the whole device is not moved, a track ball requires less space than a mouse. A track ball
comes in various shapes like a ball, a button and a square.
Page 35 of 102
Figure 2.7: Track ball
Scanner
Scanner captures images from the source which are then converted into the digital form that can
be stored on the disc. These images can be edited before they are printed.
Digitizer
Digitizer is an input device, which converts analog information into a digital form. Digitizer can
convert a signal from the television camera into a series of numbers that could be stored in a
computer. They can be used by the computer to create a picture of whatever the camera had been
pointed at.
Digitizer is also known as Tablet or Graphics Tablet because it converts graphics and pictorial
data into binary inputs. A graphic tablet as digitizer is used for doing fine works of drawing and
images manipulation applications.
Microphone
Microphone is an input
device to input sound that is
then stored in digital form.
The microphone is used for various applications like adding sound to a multimedia presentation
or for mixing music.
MICR input device is generally used in banks because of the large number of cheques to be
processed daily. The bank's code number and cheque number are printed on the cheques with a
special type of ink that contains particles of magnetic material that are machine readable.
This reading process is called Magnetic Ink Character Recognition (MICR). The main advantage
of MICR is that it is fast and less error prone.
OCR is an input device used to read a printed text. OCR scans text optically character by character,
converts them into a machine readable code and stores the text on the system memory.
Page 37 of 102
Figure 2.13: Optical Character Reader (OCR)
Bar Code Readers
Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which is then
fed to the computer to which bar code reader is connected.
This unit controls the operations of all parts of computer. It does not carry out any actual data
processing operations.
It obtains the instructions from the memory, interprets them and directs the operation of
the computer.
It communicates with input/output devices for transfer of data or results from storage.
It does not process or store data.
CPU is considered as the brain of the computer. CPU performs all types of data processing
operations. It stores data, intermediate results and instructions (program). It controls the
operations of all parts of computer
CPU sends data, instructions and information to the components inside the computer as well as to the
peripherals and devices attached to it. Bus is a set of electronic signal pathways that allows information and
signals to travel between components inside or outside of a computer. The different components of
computer, i.e., CPU, I/O unit, and memory unit are connected with each other by a bus. The data,
instructions and the signals are carried between the different components via a bus. The features and
functionality of a bus are as follows—
Page 39 of 102
A bus is a set of wires used for interconnection, where each wire can carry one bit of data.
The Internal Bus connects components inside the motherboard like, CPU and system memory. It
is also called the System Bus. Figure 2.10 shows interaction between processor and memory.
Figure 2.16:
Interaction
between
processor and
memory.
The External Bus connects the different external devices, peripherals, expansion slots, I/O ports and drive
connections to the rest of computer. The external bus allows various devices to be attached to the computer.
It allows for the expansion of computer’s capabilities. It is generally slower than the system bus. It is also
referred to as the Expansion Bus.
A system bus or expansion bus comprise of three kinds of buses - data bus, address bus and control bus.
The interaction of CPU with memory and I/O devices involves all the three buses.
The command to access the memory or the I/O device is carried by the control bus.
Output unit consists of devices with the help of which we get the information from computer. This
unit is a link between computer and users. Output devices translate the computer's output into the
form understandable by users. An output unit of a computer System performs the following
functions:
• It accepts the results produced by the computer, which are in coded form and hence,
cannot be easily understood by human beings
• It converts theses coded results to human acceptable (readable) form
• It supplies the converted results to outside world
Following are few of the important output devices, which are used in Computer Systems:
Page 41 of 95
Monitors
Graphic Plotter
Printer
Monitors
Monitor commonly called as Visual Display Unit (VDU) is the main output device of a computer. It forms
images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image
depends upon the number of the pixels.
In the CRT, display is made up of small picture elements called pixels for short. The smaller the pixels, the
better the image clarity or resolution. It takes more than one illuminated pixel to form whole character, such
as the letter 'e' in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be divided into a series
of character boxes - fixed location on the screen where a standard character can be placed.
Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically. There are
some disadvantages of CRT:
Large in Size
High power consumption
Page 41 of 102
Figure 2.17: Cathode- Ray Tube (CRT)
Monitor
The flat-panel display refers to a class of video devices that have reduced volume, weight and power
requirement compared to the CRT. You can hang them on walls or wear them on your wrists. Current uses
for flat-panel displays include calculators, video games, monitors, laptop computer, graphics display.
Emissive Displays - The emissive displays are devices that convert electrical energy into light.
Examples are plasma panel and LED (Light-Emitting Diodes).
Non-Emissive Displays - The Non-emissive displays use optical effects to convert sunlight or light
from some other source into graphics patterns. Example is LCD (Liquid-Crystal Device)
Printer
a) Impact Printers
The printers that print the characters by striking against the ribbon and onto the paper, are called
impact printers.
Page 43 of 95
These printers are of two types:
Character printers
Line printers
i. Character Printers
In the market, one of the most popular printers is Dot Matrix Printer because of their ease of printing
features and economical price. Each character printed is in form of pattern of Dot's and head consists of a
Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which comes out to form a character that is why it is called
Dot Matrix Printer.
Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
Page 43 of 102
Figure 2.19: Dot- Matrix Printer
Daisy Wheel
Advantages
More reliable than DMP's
Better quality
The fonts of character can be easily changed.
Disadvantages
Slower than DMP's
Noisy
More expensive than DMP's
Figure 2.20:
Daisy Wheel
Drum Printer
Chain Printer
This printer is like a drum in shape so it called drum printer. The surface of drum is divided into number
of tracks. Total tracks are equal to size of paper, i.e., for a paper width of 132 characters, Drum will have
132 tracks. A character set is embossed on track. The different character sets available in market are 48
character set, 64 and 96 characters set. One rotation of drum prints one line. Drum Printers are fast in
speed and prints between 300 to 2000 lines per minute.
Advantages
Very high speed
Disadvantages
Very expensive
Characters fonts cannot be changed
Chain Printer
In this printer, chains of character sets are used so it called Chain Printers. A standard character
set may have 48, 64, 96 characters.
Advantages
Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages
Noisy
Do not have the ability to print any shape of characters.
b) Non-impact Printers
The printers that print the characters without striking against the ribbon and onto the paper are
called Non-impact Printers. These printers print a complete page at a time, also called as Page
Printers.
Page 45 of 102
Characteristics of Non-impact Printers:
Faster than impact printers.
They are not noisy.
High quality.
Support many fonts and different character size.
i. Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.
Advantages
Very high speed.
Very high quality output.
Gives good graphics quality.
Supports many fonts and different character sizes.
Disadvantage
Expensive.
Cannot be used to produce multiple copies of a document in a single printing.
They make less noise because no hammering is done and these have many styles of printing
modes available. Color printing is also possible. Some models of Inkjet printers can produce
multiple copies of printing also.
Advantages
Disadvantages
Expensive as cost per page is high
Slow as compared to laser printer
Activity
In the computer lab/your surroundings, identify the various Input and Output devices
in use.
Computer memory is used to store data and instructions. Computer memory is the storage space
in computer where data is to be processed and instructions required for processing are stored.
The memory is divided into large number of small parts. Each part is called cell. Each location
or cell has a unique address, which varies from zero to memory size minus one. For example, if
computer has 64k words, and then this memory unit has 64 * 1024=65536 memory location. The
address of these locations varies from 0 to 65535.
The storage Unit of a computer system holds (or stores) the following:
i. Data and instruction required for processing (received from input
devices) ii. Intermediate result of processing iii. Final result of processing,
before they are released to an output device
Page 47 of 102
Types of Memory
Cache Memory
Primary Memory/Main Memory Secondary
Memory
Cache memory is a very high speed semiconductor memory, which can speed up CPU. It acts as
a buffer between the CPU and main memory.
It is used to hold those parts of data and program which are most frequently used by CPU. The
parts of data and programs are transferred from disk to cache memory by operating system, from
where CPU can access them.
Advantage
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantage
Cache memory has limited capacity.
It is very expensive.
Page 49 of 95
A computer cannot run without primary memory (Used to hold running program
instructions, used to hold data, intermediate results, and results of ongoing processing
job(s))
Computer RAM
A RAM constitutes the internal memory of the CPU for storing data, program and program
result. It is read/write memory. It is called random access memory (RAM).
RAM is volatile, i.e., data stored in it is lost when we switch off the computer or if there is a
power failure.
Hence, a backup uninterruptible power system (UPS) is often used with computers. RAM is small,
both in terms of its physical size and in the amount of data it can hold.
Because of the extra space in the matrix, SRAM uses more chips than DRAM for the same
amount of storage space, thus making the manufacturing costs higher.
Static RAM is used as cache memory needs to be very fast and small.
DRAM, unlike SRAM, must be continually refreshed in order for it to maintain the data. This is
done by placing the memory on a refresh circuit that rewrites the data several hundred times per
second. DRAM is used for most system memory because it is cheap and small. All DRAMs are
made up of memory cells. These cells are composed of one capacitor and one transistor.
ROM stands for Read Only Memory. The memory from which we can only read but cannot write on
it. This type of memory is non-volatile. The information is stored permanently in such
Types of ROM
The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kinds of ROMs are known as masked ROMs. It is inexpensive ROM.
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM programmer. Inside the PROM chip, there
are small fuses, which are burnt open during programming. It can be programmed only once and
is not erasable.
The EPROM can be erased by exposing it to ultra-violet light for a duration of up to 40 minutes.
Usually, an EPROM eraser achieves this function. During programming, an electrical charge is
trapped in an insulated gate region. The charge is retained for more than ten years because the
charge has no leakage path. For erasing this charge, ultra-violet light is passed through a quartz
crystal window (lid). This exposure to ultra-violet light dissipates the charge. During normal use
the quartz lid is sealed with a sticker.
The EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
Advantages of ROM
Non-volatile in nature
These cannot be accidentally changed
Cheaper than RAMs
Easy to test
More Reliable than RAMs
These are static and do not require refreshing
c) Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than main
memory. These are used for storing Data/Information permanently. There are several limitations
with primary storage:
CPU directly does not access these memories; instead they are accessed via input-output routines.
Contents of secondary memories are first transferred to main memory and then CPU can access it.
For example, disk, CD-ROM, DVD, etc.
Activity
Identify the processing speed, size of RAM and the capacity of a hard disk of any of
the computers you have used.
2.3 Summary
I/O Unit, CPU and Memory Unit are the main components of the computer. Cache
memory, primary memory and secondary memory constitute the memory unit.
Primary memory consists of RAM and ROM. The different components of computer are connected
with each other by a bus. A computer bus is of two types—system bus and expansion bus. A
system bus or expansion bus comprise of three kinds of buses—data bus, address bus and control
bus. Inside a computer cabinet, there is a motherboard, ports and interfaces, expansion slots, ribbon
cables, RAM memory chips, high storage disk drives, and, processor
2.5 Scorecard
20-17 Excellent
16-12 Good
11-9 Satisfactory
Learning Outcomes
You have now completed topic one.
If you have put a tick at the “not sure” column, please go back and study that section in the topic
before moving on.
If you have ticked “sure” in all the columns you are ready for the next topic.
Further reading
When we type some letters or words, the computer translates them in numbers as
computers can understand only numbers. A computer can understand positional
number system where there are only a few symbols called digits and these symbols
represent different values depending on the position they occupy in the number.
c) The base of the number system (where base is defined as the total number of digits
available in the number system).
3.1 Objectives
Page 55 of 95
3.3 Coding Schemes
To understand how a bit pattern can convey information, consider someone who wants to give a signal (or
send a code) to another person, but has only a single light bulb at his disposal. How many different messages
(codes) can he send? Two, one for light ON and the other for light OFF. What if he had two bulbs? At first
thought one might say he can now send three signals corresponding to:
1. both OFF;
2. both ON;
3. One ON.
This would be fine if he only wanted to send three signals. But what if he wanted to send four signals?
Would he need another bulb? The answer is no, he can send four signals with two light bulbs, but the sender
and receiver (of the signals) would have to come to an agreement concerning case (3), above; that is, when
one light is ON, it must be distinguished from the case where the other light is ON. For instance, if the bulbs
are A and B, then ‘A ON’ and ‘B OFF’ is a different code to ‘A OFF’ and ‘B ON’.
4 bits = 1 nibble
8 bits = 1 byte
2 bytes = 1 word
The two main coding schemes use by computers to represent data are ASCII and EBCDIC:
Page 57 of 102
a) ASCII: American Standard Code for Information Interchange
Uses 7 bits to represent a character
Created by the USA government for use in micro and mini computers
The ASCII code provides a mechanism for encoding alphabetic characters, numeric digits, and punctuation
marks for use in representing text and numbers written using the Roman alphabet. As originally designed,
it was a seven bit code. The seven bits allow the representation of 128 unique characters. All of the alphabet,
numeric digits and Standard English punctuation marks are encoded. The ASCII standard was later
extended to an eight bit code (which allows 256 unique code patterns) and various additional symbols were
added, including characters with diacritical marks (such as accents) used in European languages, which
don’t appear in English. There are also numerous non-standard extensions to ASCII giving different
encoding for the upper 128 character codes than the standard. For example, the character set encoded into
the display card for the original IBM PC had a non-standard encoding for the upper character set. This is a
non-standard extension that is in very wide spread use, and could be considered a standard in itself.
iv. The first 32 characters (codes 0-1Fh) and 7Fh are control characters. They do not have a standard
symbol (glyph) associated with them. They are used for carriage control, and protocol purposes.
They include 0Dh (CR or carriage return), 0Ah (LF or line feed), 0Ch (FF or form feed), 08h (BS
or backspace).
v. Most keyboards generate the control characters by holding down a control key (CTRL) and
simultaneously pressing an alphabetic character key. The control code will have the same value as
the lower five bits of the alphabetic key pressed. So, for example, the control character 0Dh is
carriage return. It can be generated by pressing CTRL-M. To get the full 32 control characters a
few at the upper end of the range are generated by pressing CTRL and a punctuation key in
combination. For example, the ESC(escape) character is generated by pressing CTRL-[ (left square
bracket)
Page 58 of 102
Figure 3.1: ASCII
Character Set
b) EBCDIC: Extended
Binary Coded Decimal
Interchange Code
. … …
The coding schemes use by the computer determines the character set of the computer and the ability of
the computer to display graphics and other information. The table above illustrates the character set
depending on the amount of bits in the coding scheme. The ASCII coding scheme can represent 27 or 128
different characters. This includes all the letters of the alphabet, lower and upper case, the digit, special
symbols and other graphics and control characters.
UNICODE:- provides a systematic way of coding multilingual plain text; Defines codes for special
characters, mathematical symbols, technical symbols, and diacritics; uses 16-bits to represent characters
in the system; has capacity to encode/ represent as many millions of characters as possible
There are two types of number system: Non-Positional number system and Positional number
system
BIT 113: Fundamentals of Computing Course Page 59 of 102
a) Non-Positional Number system
Uses symbols such as I for 1, II for 2, III for 3 etc.
Each symbol represents the same value regardless of its position in the number
The symbols are simply added to find out the value of particular number
Problem
It is difficult to perform arithmetic with such a number system.
b) Positional Number system
a) Uses only few symbols called digits
b) These symbols represent different values depending on he position they occupy in the
number
d) The maximum value of a single digit is always equal to one less than the value of the
base
A number system defines a set of values used to represent quantity. Computer uses the binary
system. There many number systems used but of concern to computer professionals are
Decimal number system
Binary number system
Octal number system
Hexadecimal number system
All the above number systems use the same kind of positional notation except that
Decimal system uses powers of 10
Octal system uses powers of 8
Binary system uses powers of 2
Hexadecimal uses powers of 16
Digital computers use Binary Place Notion to store and represent values. The binary digit 0 and
1 only, are used in binary strings. A binary string is a sequence of two or more bits. Similar to
the decimal system makes use of the position of each bit to determine the value represented by
the binary number.
0 +0 = 0
1 +0 = 1
0 +1 = 1
1 +1 = 0 carry 1
1 +1 + 1 = 1 carry 1
Example
Converting a –ve decimal number to binary using sign & magnitude method
1. Convert the decimal number to its binary value, ignoring the negative sign.
2. Extend the bits to the appropriate length (i.e. one less than the size of the bit-string), by
attaching 0s to the leftmost part of the bit string.
3. Attach a 1 to the leftmost part of the bit string. The 1 is the sign bit it indicates that the
number is negative. Alternatively, a 0 indicates that the number is positive.
1. Convert the binary number to its decimal value ignoring the leftmost it in your
calculations.
2. If the leftmost bit is a 1 then the number is negative otherwise it is positive.
Ones Complement
To convert a binary number to its ones complement representation you change all the ones (1) to zeroes
(0) and the zeroes (0) to one (1)
Twos Complement
The twos complement of a binary number is formed by finding its ones complement and adding a one.
2. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string
3. Find the ones complement
4. Find the twos complement
5. Attach a 1 to the leftmost part of the bit string. The 1 is the sign it indicates that
the number is negative
To convert a positive binary number to its twos complement representation, we execute the following
steps:
1. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string.
2. Attach a 0 to the leftmost part of the bit string, the 0 indicates that the binary
number is positive
Convert the binary number to its decimal equivalent, making the leftmost bit (the sign bit) binary
place value negative.
An alternative representation of integers is simply to represent the individual numerals which comprise
them. This approach is consistent with the way in which we represent numbers ourselves. When we write
the number 879, we are choosing to represent this number as three numerals: 8 (representing 800), 7
(representing 70), and 9 (representing 9). So, we could convert this number to a binary form by converting
each of the integers, one at a time, into binary a binary code. Such a scheme is referred to as binary coded
decimal form, or BCD. The BCD codes commonly used to represent numerals are:
Using this scheme, we can represent any number by a string of binary digits.
The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the
successive positions to the left of the decimal point represent units, tens, hundreds, thousands
and so on.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
and 1 in the thousands position, and its value can be written as
3 2 1 0
(1x10 )+ (2x10 ) + (3x10 )+ (4xl0 )
1000 + 200 + 30 + 4
1234
Characteristics
Uses eight digits: 0, 1, 2, 3, 4, 5, 6, 7.
Also called base 8 number system
0
Each position in a octal number represents a 0 power of the base (8).
Example, 8 . x
Last position in a octal number represents a x power of the base (8). Example, 8 where x
represents the last position - 1.
Example
Octal Number: 125708
Letters represent numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F =
15.
Also called base 16 number system
Each position in a hexadecimal number represents a 0 power of the base (16). Example,
0
16 .
Last position in a hexadecimal number represents a x power of the base (16). Example, x
16 where x represents the last position - 1.
Example
There are many methods or techniques, which can be used to convert numbers from one base to
another. We'll demonstrate here the following:
Steps
i. Step 1 - Divide the decimal number to be converted by the value of the new base.
ii. Step
2 - Get the remainder from Step 1 as the rightmost digit (least significant digit) of
new base number. iii. Step 3 - Divide the quotient of the previous divide by the new
base.
iv. Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base
number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in Step
3.
The last remainder thus obtained will be the most significant digit (MSD) of the new base number.
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that
the first remainder becomes the least significant digit (LSD) and the last remainder becomes the
most significant digit (MSD).
Steps
i. Step 1 - Determine the column (positional) value of each digit (this depends on the position
of the digit and the base of the number system).
ii. Step 2 - Multiply the obtained column values (in Step 1) by the digits in the corresponding
columns.
iii. Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in
decimal.
Example
Steps
i. Step 1 - Convert each octal digit to a 3-digit binary number (the octal digits may be
treated as decimal for this conversion).
ii. Step 2 - Combine all the resulting binary groups (of 3 digits each) into a single binary
number.
Example
Example
i. Step 1 - Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits
may be treated as decimal for this conversion).
ii. Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single
binary number.
Example
3.6 Scorecard
10 - 9 Excellent
8-7 Good
6-5 Satisfactory
If you have put a tick at the “not sure” column, please go back and study that section in the topic
before moving on.
If you have ticked “sure” in all the columns you are ready for the next topic.
Further reading
1. Essinger, James (2004). Jacquard's Web, How a hand loom led to the birth of the
information age. Oxford University Press. ISBN 0-19-280577-0.
2. Hyman, Anthony (1985). Charles Babbage: Pioneer of the Computer. Princeton University
Press. ISBN 978-0-6910237-7-9.
4. Bowden, B. V. (1953). Faster than thought. New York, Toronto, London: Pitman
publishing corporation.
4.1 Objectives
Software consists of computer programs, which are sequences of instructions for the computer.
The process of writing (or coding) programs is called programming, and individuals who
perform this task are called programmers. Unlike the hardwired computers of the 1950s, modern
Computer programs include documentation, which is a written description of the functions of the
program. Documentation helps the user operate the computer system and helps other programmers
understand what the program does and how it accomplishes its purpose. Documentation is vital to
the business organization. Without it, if a key programmer or user leaves, the knowledge of how
to use the program or how it is designed may be lost. The computer is able to do nothing until it is
instructed by software. Although computer hardware is, by design, general purpose, software
enables the user to instruct a computer system to perform specific functions that provide business
value.
The relationship among hardware, systems software, and application software is illustrated in
Figure 4.1.
Systems software is a set of instructions that serves primarily as an intermediary between computer
hardware and application programs, and may also be directly manipulated by knowledgeable users.
Systems software provides important self-regulatory functions for computer systems, such as
loading itself when the computer is first turned on, managing hardware resources such as
secondary storage for all applications, and providing commonly used sets of instructions for all
applications to use. Systems programming is either the creation or maintenance of systems
software.
Application software is a set of computer instructions that provide more specific functionality to a
user. That functionality may be broad, such as general word processing, or narrow, such as an
organization’s payroll program. An application program applies a computer to a certain need.
Application programming is either the creation or the modification and improvement of
Page 73 of 95
application software. There are many different software applications in organizations today, as this
chapter will discuss. For a marketing application, for example, see the Market Intelligence box at
the Web site.
System software is a program that manages and supports the computer resources and operations
of a computer system while it executes various tasks such as processing data and information,
controlling hardware components, and allowing users to use application software. That is, systems
software functions as a bridge between computer system hardware and the application software.
Systems software is the class of programs that control and support the computer system and its
information-processing activities. Systems software also facilitates the programming, testing, and
debugging of computer programs. It is more general than application software and is usually
independent of any specific type of application. Systems software programs support application
software by directing the basic functions of the computer. For example, when the computer is
turned on, the initialization program (a systems program) prepares and readies all devices for
processing.
Systems software consists of three kinds of programs. They include system management programs,
system support programs, and system development programs. These are explained briefly.
System control programs control the use of the hardware, software, and data resources of a
computer system. The main system control program is the operating system. The operating system
supervises the overall operation of the computer, including monitoring the computer’s status and
scheduling operations, which include the input and output processes. In addition, the operating
system allocates CPU time and main memory to programs running on the computer, and it also
provides an interface between the user and the hardware.
Specifically, the operating system provides services that include process management, virtual
memory, file management, security, fault tolerance, and the user interface. Process management
means managing the program or programs (also called jobs) running on the processor at a given
time. In the simplest case (a desktop operating system), the operating system loads a program into
main memory and executes it. The program utilizes the computer’s resources until it relinquishes
control. Some operating systems offer more sophisticated forms of process management, such as
multitasking, multithreading, and multiprocessing.
i. Operating Systems
Operating system is the most important program for computer system. Without an operating
system, every computer program would have to contain instructions telling the hardware each step
the hardware should take to do its job, such as storing a file on a disk. Because the operating system
contains these instructions, any program can call on the operating system when a service is needed.
An operating system executes many functions to operate computer system efficiently. Among
them, four essential functions are the followings.
Task Management: The function of the operating system that controls the running of many
tasks. It manages one program or many programs within a computer system simultaneously.
That is, this function of operating system manages the completion of users' tasks. A task
management program in an operating system provides each task and interrupts the CPU
operations to manage tasks efficiently. Task management may involve a multitasking
capability.
File management: This is a function that manages data files. An operating system contains
file management programs that provide the ability to create, delete, enter, change, ask, and
access of files of data. They also produce reports on a file.
User Interface: It is a function of an operating system that allows users to interact with a
computer. A user interface program may include a combination of menus, screen design,
keyboard commands. A well-designed user interface is essential for an operating system to
be popular. Because of the function, users can load programs, access files, and accomplish
other tasks.
Data security and management: These involve these main activities: Preventing illegal
access or amendments to user or system files; ‘Dumping’ the contents of files from time in
case of future loss, e.g. disk files may be transferred to tape and then stored off-line; Keeping
track of file descriptions and locations.
Real time systems must therefore be fast and reliable. They have complex and expensive
operating system, usually involves multi-processor to share the work load.
The most popular microcomputer operating systems are DOS, Windows 3.x, Windows 95, OS/2,
Windows NT, and Macintosh System. UNIX is a popular operating system that is available for
microcomputers, minicomputers, and mainframe computer systems. The following will show the
details:
DOS
Windows 3.x
Windows 95
OS/2
Windows NT
Macintosh Operating System
UNIX
These are programs that help users develop information system programs and prepare user
programs for computer processing. These programs may analyze and design systems and program
itself. The main system development programs are programming language translators,
programming environment programs, computer-aided software engineering packages.
Low level
Languages
e.g. assembly
High level
Compiler/
languages e.g.
Interpreter
Pascal, C, Basic
etc
Assembler
There are three
main types of translators
Assembler- which converts low
Machine language
level assembly program to machine
code Compiler and interpreter- they
convert high level programs to
machine code.
Alternatively, off-the-shelf application software can be purchased, leased, or rented from a vendor
that develops programs and sells them to many organizations. Off-the-shelf software may be a
standard package or it may be customizable. Special purpose programs or “packages” can be
tailored for a specific purpose, such as inventory control or payroll. The word package is a
commonly used term for a computer program (or group of programs) that has been developed by
a vendor and is available for purchase in a prepackaged form. We will further discuss the
methodology involved in acquiring application software, whether proprietary or off the shelf
a) Spreadsheets
Computer spreadsheet software transforms a computer screen into a ledger sheet, or grid, of coded
rows and columns. Users can enter numeric or textual data into each grid location, called a cell. In
addition, a formula can be entered into a cell to obtain a calculated answer displayed in that cell’s
location. With spreadsheets, users can also develop and use macros, which are sequences of
commands that can be executed with just one simple instruction.
Computer spreadsheet packages can be used for financial information, such as income statements
or cash flow analysis. They are also used for forecasting sales, analyzing insurance programs,
summarizing income tax data, and analyzing investments. They are relevant for many other types
of data that can be organized into rows and columns. Although spreadsheet packages such as
Microsoft’s Excel and Lotus 1–2-3are thought of primarily as spreadsheets, they also offer data
management and graphical capabilities.
b) Data management.
Data management software supports the storage, retrieval, and manipulation of related data. There
are two basic types of data management software: simple filing programs patterned after
traditional, manual data-filing techniques and database management programs that take advantage
of a computer’s extremely fast and accurate ability to store and retrieve data in primary and
secondary storage. File based management software is typically very simple to use and is often
very fast, but it offers limited flexibility in how the data can be searched. Database management
software has the opposite strengths and weaknesses. Microsoft’s Access is an example of popular
database management software.
c) Word processing.
Word processing software allows the user to manipulate text rather than just numbers. Modern
word processors contain many productive writing and editing features. A typical word processing
software package consists of an integrated set of programs including an editor program, a
formatting program, a print program, a dictionary, a thesaurus, a grammar checker, a mailing list
program, and integrated graphics, charting, and drawing programs. WYSIWYG (an acronym for
What You See Is What You Get, pronounced “wiz-e-wig”) word processors have the added
advantage of displaying the text material on the screen exactly—or almost exactly—as it will look
on the final printed page (based on the type of printer connected to the computer). Word processing
software enables users to be much more productive because the software makes it possible to create
and modify the document electronically in memory.
Desktop publishing software represents a level of sophistication beyond regular word processing.
In the past, newsletters, announcements, advertising copy, and other specialized documents had to
be laid out by hand and then typeset. Desktop software allows microcomputers to perform these
tasks directly. Photographs, diagrams, and other images can be combined with text, including
several different fonts, to produce a finished, camera-ready document.
e) Graphics.
Graphics software allows the user to create, store, and display or print charts, graphs, maps, and
drawings. Graphics software enables users to absorb more information more quickly and to spot
relationships and trends in data more easily. There are three basic categories of graphics software
packages: presentation graphics, analysis graphics, and computer-aided design software.
f) Presentation
Presentation graphics software allows users to create graphically rich presentations. Many
packages have extensive libraries of clip art—pictures that can be electronically “clipped out” and
“pasted” into the finished image.
Are used for designing items for manufacturing, allows designers to design and “build” production
prototypes in software, test them as a computer object under given parameters (sometimes called computer-
aided engineering, or CAE), compile parts and quantity lists, outline production and assembly procedures,
and then transmit the final design directly to machines. Manufacturers of all sorts are finding uses for CAD
software. Computer-aided manufacturing (CAM) software uses digital design output, such as that from a
CAD system, to directly control production machinery. Computer-integrated manufacturing (CIM)
software is embedded within each automated production machine to produce a product. Overall, a design
from CAD software is used by CAM software to control individual CIM programs in individual machines.
Used effectively, CAD/CAM/CIM software can dramatically shorten development time and give firms the
advantage of economies of scope.
h) Multimedia
Multimedia software combines at least two media for input or output of data. These media include
audio (sound), voice, animation, video, text, graphics, and images. Multimedia can also be thought
of as the combination of spatial-based media (text and images) with time-based media (sound and
video).
4.3 Activity
Examine two types of software used by your institution. What system software is
running in your computer? Identify application software installed in your
system/computer
4.4 Summary
In this topic, you have been introduced to various types of computer software, including
classification, and expanded description of the two key types of software: systems software and
applications software. Systems software and applications software has been discussed with keen
interest on their functionally. The next chapter explores data communication and networking
concepts.
3. Operating systems are crucial to the performance of the entire computer system. State
and explain three ways in which operating systems can be classified
4. How are stand-alone operating systems different from embedded operating systems?
6. Describe various ways in which users of computer systems can be able to interact with the hardware
using operating systems
4.6 Scorecard
20-17 Excellent
16 - 14 Good
13-10 Satisfactory
Learning Outcomes
If you have put a tick at the “not sure” column, please go back and study that section in the topic
before moving on.
2. Zuse, Konrad (1993). The Computer - My life. Berlin: Pringler-Verlag. ISBN 0-387-
56453-5. Felt, Dorr E. (1916). Mechanical arithmetic, or The history of the counting machine.
Chicago: Washington Institute.
3. Ifrah, Georges (2001). The Universal History of Computing: From the Abacus to the
Quantum Computer. New York: John Wiley & Sons. ISBN 0-471-39671-0.
Computer users who work in this society need to know technology incorporated into the
communication networks. Although they use only applications involved in the communication
networks, they still need to know how the communication networks work to improve their
performance by using networks more efficiently and effectively. This Chapter thus is very
fundamental.
To reduce the effort and cost required to collect and transmit business data and
information.
Computer users who work in this society need to know technology incorporated into the
communication networks. Although they use only applications involved in the communication
networks, they still need to know how the communication networks work to improve their
performance by using networks more efficiently and effectively.
The earliest approach is known as timesharing. Timesharing occurs in networks in which multiple
users gain access to a single host computer from their individual terminals. An example of
timesharing is the use of a central computer at a nationwide company's headquarters by a variety of
sales professionals dispersed around the nation.
The next approach gaining popularity in computer networking systems was the distributed
processing method. This type of system involves the interconnection of minicomputers and
microcomputers throughout a business organization. Various types of resources are shared by the
interconnected terminals, while the individual computers retain control over their own processing.
The third approach to computer network processing, client/server computing, is currently attracting
the most interest among management information systems professionals. The popularity of this
approach is due to its ability to allow companies to selectively centralize and decentralize certain
Networking of computers provides a communication link between the users, and provides access to
information. Networking of computers has several uses, described as follows:
iv. For Back-up and Support— Networked computers can be used to take back-up of critical
data. In situations where there is a requirement of always-on computer, another computer on
the network can take over in case of failure of one computer.
There are many components for a communication network. The basic three components are a host
computer, a client, and a circuit. Besides these components, others include front-end processors,
teleprocessing software, input terminals, and specialists.
The host computer or server (a mainframe, minicomputer, or microcomputer) is the main unit in the
communication network. It stores data and programs that can be accessed by the clients. The host
computer is responsible for performing the data processing tasks of the network. After processing
has occurred, the data or information is routed back to a front-end processor. In distributed
processing or client-server computing, several host computers may be tied together by the data
communication network.
The client is a hardware device (a terminal or microcomputer) at the opposite end of a host computer
of a communication circuit. It usually provides end users with access to the data and software on the
server. The client is an input/output device.
The most widely used computer input/output devices for a communication network are the terminals.
There are several types of terminals in common use in business today. The most familiar type of
input/output terminal for most end users is the keyboard terminal.
iii. Circuit
The circuit is a communication channel that allows the data and information to move through the
pathway. It includes several types of lines, such as twisted wires, coaxial cables, and fiber optic
cables. It also contains wireless transmission circuits such as microwaves and satellites, and it is
becoming more popular.
The front-end processor handles the incoming and outgoing communications exchanges between
the host computer and the peripheral terminals and other host computers both inside and outside the
network.
v. Teleprocessing Software
Besides the hardware mentioned previously in this chapter, the host and the front-end processor must
contain software in order for the network system to run effectively. Software may also be located in
the terminals and the cluster control units.
Data communications can be carried from one location to another through a variety of
communications channels. These communications media include telephone lines (twisted pairs),
coaxial cable, fiber-optic cable, microwave, and satellite. In general, there can be two ways of
connecting microcomputers with each other and with other equipment: guided and radiated media.
Guided Media: Refer to channels that allow the transmission of data and information
through a physical media such as a twisted pair wire, coaxial cable, or fiber optic cable.
Radiated media: Refer to those that transmit data and information through the air such as
microwave, or satellite.
The diameters and transmission capacities of the three kinds of cable are compared below:
i. Twisted Pair
The telephone lines used to carry most of the voice and data communications consist of a pair of
thin-diameter insulated copper wires (called
twisted pairs). The wires are twisted around
each other to minimize interference from
other twisted pairs in the cable. Twisted pairs have fewer bandwidths than coaxial cable or optical
fiber. They have been the standard communication channels for voice, data and information, but
are now diminishing because of more reliable media such as coaxial cable, optical fibers,
microwave, or satellite.
ii. Coaxial Cable
.
iii. Fiber-Optic Cable
communications channels are not susceptible to electronic interference. Therefore, they are a more
reliable form of data transmission. Fiber-optic cables are also significantly less expensive than
coaxial cable. A disadvantage of fiber-optic channels is that they cannot carry information over great
distances.
The wireless technology is used for broadcasting in radio and television communication, for
communication using mobile phones and pagers, for connecting components of computers using
Bluetooth technology, for Internet connection using Wi-Fi, Wireless LAN, PDA, and in remote
controls for television, doors etc.
The wireless networks have two main components—the wireless access points that include the
transmitter along with the area it can cover, and the wireless clients like mobile handsets, laptops
with Ethernet cards etc.
The access point receives data frames from the computers attached to it wirelessly, checks the
frames, and transmits them to their destination. The coverage area of a transmitter depends on the
output power of the transmitter, its location, and the frequency used to transmit the data. Higher
frequencies require a clear line of sight as compared to lower frequencies.
The speed of wireless connection is determined by the distance of the wireless client device from
the access point, the obstruction-free path (walls, trees etc.), interference, and the number of users
using the network at a given time.
Wireless networks can be divided into three categories based on their use:
i. Bluetooth technology to connect the different components of the computer in a room, a small
office or home.
ii. Wireless LAN is used to connect computers and devices wirelessly in a LAN, for example,
different computers or devices in an office or campus.
iii. Wireless WAN is used to connect wide area systems, for example access to Internet via
mobile devices like cell phone, PDAs and laptops.
Coding
In all digital communications channels, computers transmit data and information in forms of binary
codes. Both sender and receiver of the data and information should have a standard for both to
understand them.
A coding scheme for communications is a binary system, as in the computer systems. The system
consists of groups of bits (0 or 1) that represent characters. In computer systems, a byte is a group
There are two predominant coding schemes; ASCII and EBCDIC. ASCII refers America Standard
Code for Information Interchange. It is the most popular code for data communications and is the
standard code on most communications terminals. Among two types of ASCII, a 7-bit code can
make 128 character combinations, and an 8-bit can do 256 combinations. EBCDIC refers Extended
Binary Coded Decimal Interchange Code. It is IBM's standard information code, and has 8 bits for
a character.
Networks can be classified by their topology, which is the basic geometric arrangement of the
network. Different types of network configurations exist for network designers to choose from. It
may refer to the way in which the nodes of a network are linked together.
Four basic types of network configurations are star, bus, ring, hierarchical and mesh. Ring, bus,
and star topologies are commonly used in LANs and BNs. Star and mesh topologies are commonly
used in MANs and WANS. The networks are usually built using a combination of several different
topologies.
a) Star
b) Bus
c) Ring
d) Hierar
chical
e) Mesh
f) Hybrid
i. Star Topology
A star topology is one in which a central unit provides a link through which a group of smaller
computers and devices is connected. In the star network, all interactions
between different computers in the network travel through the host
computer. The central unit will poll each to decide whether a unit has a
message to send. If so, the central computer will carry the message to the
receiving computer.
A ring configuration features a network in which each computer is connected to the next two other
computers in a closed loop. Like the bus network, no single central
computer exists in the ring configuration. Messages are simply
transferred from one computer to the next until they arrive at their
intended destinations. Each computer on the ring topology has a
particular address. As the messages pass around the ring, the
computers validate the address. If the message is not addressed to it,
the node transmits the message to the next computer on the ring.
This type of network is commonly used in systems that connect widely dispersed mainframe
computers. A ring network allows organizations to engage in distributed data processing system
in which computers can share certain resources with other units while maintaining control over
their own processing functions. However, a failure in any of the linked computers can greatly
affect the entire network.
This topology is effective in a centralized corporation. For example, different divisions within a
corporation may have individual microcomputers connected to divisional minicomputers. The
minicomputers in turn may be connected to the corporation's mainframe, which contains data and
programs.
v. Mesh Topology
This is a net-like communications network in which there are at least two pathways to each node.
In a mesh topology, computers are connected to each other by point-
topoint circuits. In the topology, one or more computers usually become
switching centers, interlinking computers with others.
Although a computer or cable is lost, if there are other possible routes through the network, the
damage of one or several cables or computers may not have vital impact except the involved
computers. However, if there are only few cables in the network, the loss of even one cable
or device may damage the network seriously.
There are two basic reasons for developing an LAN: information sharing and resource sharing.
Information sharing: This refers to having users who access the same data files, exchange
information via electronic mail, or search the Internet for information. The main benefit of
information sharing is improved decision making, which makes it generally more important than
resource sharing.
Resource sharing: It refers to one computer sharing a hardware device (e.g., a printer) or a
software package with other computers on the network. The main benefit of resource sharing
is cost savings.
The next larger network than LAN may be the Metropolitan Area Networks (MANs). MAN usually
spans a geographical area that usually encompasses a city or county area. It interconnects various
buildings or other facilities within this citywide area. For example, linkages can be established
between two commercial buildings. A more recent use of MAN technology has been the rapid
development of cellular phone systems.
5.5 Summary
5.7 Scorecard
20-17 Excellent
16 - 14 Good
13-10 Satisfactory
Learning Outcomes
If you have put a tick at the “not sure” column, please go back and study that section in the topic
before moving on.
If you have ticked “sure” in all the columns you are ready for the next topic.
1. Berkeley, Edmund (1949). Giant Brains, or Machines That Think. John Wiley &
Sons.