Form 1 Comp Simplified Notes
Form 1 Comp Simplified Notes
SERIES 1
MWALIMU CONSULTANCY
Downloaded by centrine afandi ([email protected])
lOMoARcPSD|47482502
Copyright ©Mwalimu
All rights reserved. This book or any portion thereof may not be reproduced or used in
any manner whatsoever without the express written permission of the publisher
Printed in Kenya
00100
Nairobi
0746-222-000
[email protected]
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CHAPTER 1
INTRODUCTION TO COMPUTERS
This chapter introduces the student to what a computer is, classifies computers into different
categories, compares the different classes of computers and also introduces the keyboard as
a basic input device.
Data is the name given to facts. For example, in a school, the number of students in a class, the
number of teachers, names of students, the name of customers in a business.
Information is result from processed data. For example adding some numerical values like the
numbers 14 and 17 into the computer will give you the result of 31. The later is information you
required. Information can be defined as data computed into a more useful form than raw form.
Program is a series of instructions written in the language of the computer for them to obey and
perform specific tasks as outlined by the instructions.
A Computer can therefore be defined as “an electronic machine that takes in data (facts) in
the raw form, processes the data to give out in another form called information”.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
When a computer is fed with data, it passes through four basic steps before the data can be
displaced;
(i) Input Process – the user will type the data from say the keyboard (to be introduced later
in the chapter) and the computer will accept the dame and store within it.
(ii) Storage Process – the data that is fed into the computer at the same time is held, even
during the time of processing and after processing; it can further be stored for further reference.
These data are held in computer memory.
(iii) Processing – the computer will manipulate the data held within it to a more useful form
– results (information).
(iv) Output Process – the user is given the information he desired.
The four basic processes can be summarized in the following way by looking at the same terms
of information processing cycle.
Organizing data for processing – to get quality results (information) you must have quality
data to start with. Unreliable original data generates unreliable results. If you give a computer
garbage, you get garbage in return. Its called GIGO – Garbage In – Garbage Out.
Information Processing Cycle - Information Processing Cycle includes a series of steps for
transforming data into meaningful information for people.
A Processing Cycle is repeated, it means, if the same resources are used in the same way, the
same outcome will result. The standard cycle followed to process data and deliver information
comprises of 4 major functions:
(i) Input Function - the input function gathers and collects stored data items and enter
them into the system for processing. Input can come from many sources, for example from files
kept in the office, banking institutions and accounts.
(ii) Storage Function – this function allows the user to store data being processed in the
memory of the computer as well as to store the information for future use.
(iii) Processing Function – the desired operation by the user is carried out on the data keyed
in and stored in the memory so as to turn it into meaningful information.
(iv) Output Function – the data stored is processed and then output into files, printed as hard
copies or displayed on the screen for the user.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Note: For any information processing system to run smoothly on a day-to-day basis, the
processing activities must be organized. A system has little work if it provides helpful
information on one day and useless information the next day. Output should be useful the first
time and every time for the system.
1.2.1Physical Size
The following computer systems are categorized by how large they are:
a) Monster Computer
Sometimes it is referred to as Super computers or Maxi computers. These are computer of
enormous power and are very large in size. Its installation requires special floors to carry its
weights and it also needs special plumbing to carry a fluid known as fluorocarbon needed to
cool it.
One unique feature of maxi computers is that when you purchase it, the purchase price will
include the services of 2 permanent engineers to maintain it forever. They are typically used for
scientific research and military applications, petroleum engineering, nuclear physics and
meteorology.
Examples of monster computers include CYBER and CRAY computers. For example, the whole
globe needs only one monster computer to forecast weather at once.
b) Mainframe Computers
Mainframe computers are second in size to monster computers. These computers perform more
data processing work than any other type of computers. For this reason they form a large portion
of installation in most organization.
As does the monster computers, mainframe computers also have some special requirements, for
the reason, they are housed in special rooms brought about by the special power that they posses
together with environmental control requirements.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Mainframe computers can be used by more than one person at a time since they can support a
large network of other computers organizations that employ mainframe computers alongside
other computers are banks, government agencies, commercial and industrial agencies.
c) Minicomputer
Also called Medium sized computers. These computers compared to mainframe are smaller,
slower and less expensive.
A minicomputer has an advantage over the previous two in the sense that it does not have any
special power or environmental control requirements. For this reason, the medium sized
computer can always be located anywhere within the organization.
Minicomputers can do the work that the mainframe does but on a small scale.
d) Microcomputers
Of the types of computers, microcomputers are the slowest. However, they counteract this
disadvantage because they are easy to use and the cost of purchase is also low.
A microcomputer gets its name from the fact that its main computing component, the
microprocessor (to be introduced later) is located in one integrated circuit (IC) or what we call
a Chip. Microcomputers fit nicely on desktops, for that reason they are sometimes known as
Desktop Computers. They are also referred to as Personal Computers since many individuals
purchase them for personal use.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(ii) Digital Computers
As opposed to analog computers, these type count things. Data passed to a digital computer is
usually operated on in steps i.e. form of discrete numbers, 0, 1, 2, 3, (a discrete operation). It is
like counting on one’s fingers (1, 2, 3, 4…). Most computers in use today are digital. This is
because there are more counting applications than there are applications than there are
applications that require continuous measurements.
1.2.3 By Purpose
Classification by purpose falls into 2 categories:
a) Special Purpose Computers
These are computers that are single task oriented. In other words, they are designed to solve only
a particular type of problem. Examples include embedded computers in our common digital
watches.
b) General Purpose Computers
These are computers that can perform a vast number of operations or solve problems of different
varieties. Most of the computers in use today are general purpose. However, it is wise to note
that general-purpose computers can always be adapted with special programs to do a job
specified hence becoming special purpose computer.
c) Embedded Computers
These are computers attached to other computers that help in operating them. E.g. computers
embedded in lifts, petrol pumps, digital watches and so on.
1.2.4 By Use
It is worthy noting that we categorize these computers according to what it is used for and when
it is used. Under this category, the list is endless. For this reason we will limit ourselves to only
five main types.
(i) Personal Computers or Desktop Computers
These are also known as Microcomputers. They get their name from the fact that they fit nicely
on the desktop. They can also be used on the desk in the office environment or for personal use
at home.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(ii) Home based Computers
These computers are those designed to be used at home. An individual may install only games
program in it or a word processor to enable them write letters, still some would install accounting
packages to enable them budget and control their finances at home.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Other special keys include: Delete keys and backspace keys which deletes characters. Delete key
deletes a character that is in front of the cursor whereas backspace key delete characters before
the cursor. Insert key will insert characters from text. Others e.g home key will take you to the
top of the document and end key to the end of the document.
Computer keyboard employ one or more control keys. Control works just like the shift key on a
keyboard in that they cause other keys to perform functions different from their normal
operations. Example, if you hold shift key down and press the letter “e”, you get a different
character “E”. Holding down the control key while you press any of the other keys causes still
another character to be sent to memory.
Like the control keys, the escape key is used to cause other keys to perform special functions.
Unlike the control keys, however, it is not held down while pressing another key. Once sending
a signal to the computer system, for that purpose. If you press another key following Escape, it
will cause the computer to execute a function established by the program in use.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
1.3.3 QUESTIONS:
i. Define a Computer.
ii. Differentiate between Data and Information.
iii. What is a Computer Program.
iv. What are the 4 basic functions a Computer will perform on data.
v. Discuss in detail how computers can be classified.
vi. Discuss the layout of a typical keyboard and functions of the different keys
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CHAPTER 2
COMPUTER COMPONENTS
This chapter introduces the student to the computer hardware system. At the end of the chapter,
the student should be able to: differentiate between hardware and software, identify the elements
of a computer systems’ hardware, explain the functional organization of the elements of a
computer system, describe the central processing unit, describer the types of input and output
devices, describe the types of secondary storage devices and media and finally be able to
distinguish between system software and application software.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
KEY:
C.P.U - Central Processing Unit
A.L.U - Arithmetic Logic Unit
DOS - Disk Operating System
ROM - Read Only Memory
RAM - Random Access Memory
DBMS- Data Base Management System
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
APPLICATION
INPUT SOFTWARE OUTPUT
OPERATING
SYSTEM
HARDWARE
FEEDBACK
Fig. 2.3
Control Arithmetic/Logic
Unit Unit
Input Input
Devices Devices
memory
C.P.U
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
Monitor
C.P.U.
Disk Drive
Mouse
Keyboard
Fig. 2.6
Arithmetic Logic Unit forms the second part of the CPU. The ALU performs the calculations
and makes comparisons between units of data. The last component is the Control Unit (CU), the
work of which is to control the operations of the hardware for example by issuing commands to
all elements of the computer as per the dictations of memory. (e.g from the input devices to
memory, from memory to output devices, etc).
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
The Central Processing Unit determines the power of a computer hardware system which is
described in terms of :
(i) Size of Memory, which is measured by the number of characters of data it can store
(ii) Speed of the Control and Arithmetic Logic Unit, which is measured in millions of
instructions per second (MIPS).
The work of the various input devices such as terminal keyboard, disk storage units and tape
storage units is to send data into the CPU, whereas the work of the output devices such as
printers, visual display units, disk and tape units is to give out the results from the processing
operations.
The Central Processing Unit also “houses” Registers. The latter is a small part in the CPU that
holds data before processing or probably after. They store data to be processed and thereafter
partial results.
When reading a word from the memory, the CPU stores the address of that word in MAR and
sends a read signal to a main memory. After one memory cycle, the value of the word is in DAR
from where the CPU will search for it.
When reading a word, the CPU stores in MAR the address of where the write operation will take
place. The value to be written will be stored in the DAR and then it sends the write signal to the
memory.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
Execution of an Instruction
The execution of an instruction of the central processing unit is performed through the following
steps:
(i) Storage of the next instruction to be executed from the main memory to the instruction
register (IR);
(ii) Modification of the contents of the OC registers the address of the next instruction;
(iii) Recording of the instruction recently stored;
(iv) Localization of the data needed by the instructions in the memory;
(v) Storage of data if necessary into the internal registers of the CPU generally the
accumulator;
(vi) Execution of the instruction;
(vii) Storage of the results in the appropriate place;
(viii) Return to step (i) for the execution of the next instruction.
The Processor
The Control and Arithmetic/Logic Units are usually considered as a hardware device separate
from the memory. This is because the size of the memory may vary independently from the
Control and Arithmetic/Logic Units. As separate devices they are known as Processor.
Processors used in microcomputers are known as microprocessors (refer to chapter 1), but
conceptually they are the same processors found in larger computer systems.
Memory
A computer’s memory stores data before, during and after processing as well as the application
program in use at the time. These data are stored in cells of the memory. Each memory cell
contains one byte of data (a byte = 8 characters: a character is say a letter of the alphabet, or a
number). Therefore, one cell will contain eight characters called a byte.
The size of the computer memory is measured in terms of “Kilobytes” or “Megabytes” or
“Gigabytes”. Since “Kilo” stands for 1,000 and “Mega” for 1,000,000, computer memory is
measured by the thousands or millions of bytes that can be stored in memory at one time.
In computer usage, the prefix “Kilo” actually stands for 1024 bytes and “Mega” for 1,048,576
bytes (explanation later in form 2 – Number systems).
Computer memory is sometimes known as Primary memory Storage, Main Memory and RAM
(Random Access Memory).
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
Primary Memory
Primary storage or RAM is the computer’s working bench. All data to be processed must first be
recorded in it and all output of results draws data from it. Primary storage has 2 crucial
characteristics. The first is that data can only be stored temporarily, and two, it cannot store a
great deal of data.
Secondary Storage
These characteristics of primary storage give rise to the requirements to store large quantities of
data in machine readable form that can be fed into RAM in small segments for processing. Units
that do this are called secondary storage devices also referred to as Auxiliary Storage or
Backing Storage. (Description of these devices latter in the chapter).
The two most prevalent of these are disks and magnetic tapes. These media offer the ability to
store data off line, meaning that data can be processed from time to time by the computer system
and are not stored permanently as part of the hardware configuration. When needed, they are
mounted on data reading and writing device, called drops, as required by their application
programs.
(i) The processor receives data from main storage, performs operations on them, then the
result is given back to the same.
(ii) Data then goes to the main memory comes from input devices or secondary devices, and
data from the main memory goes to backing storage or output devices.
(iii) The ALU and CU combine to form the processor as discussed.
Input devices in whatever form as the name suggests are devices that help the user to
communicate with the computer by issuing commands in different ways which the computer
obeys.
2.7.1 Keyboard
Please refer to 1.4 for full keyboard explanations. Using the keyboard is a matter of knowing
which command you want to issue to the machine or what entries in the form of characters you
want to make; then simply type in the right characters from the keys of the keyboard.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
2.7.2 Mouse
This is another type of input device but as opposed to the keyboard, it doesn’t have keys. A mouse
has usually two buttons (but not always). When installed in your machine, a pointer is always
seen on the screen. Underneath the mouse is a rotating ball which with the slight movement of
the device on a pad, the pointer will correspondingly move on the screen by the same distance
and to the right direction. To issue an instruction to the system, the user simply needs to click
(press the mouse button once – usually the left) a menu and choose a command he wishes to
issue or click a command he would want to use. You can use a mouse also to draw different
shapes of your style apart from simply clicking commands. A mouse (mice – plural) is usually
employed in Windows Applications without which the Windows Operating System become
incomplete.
Fig. 2.7.2 Mouse
2.7.3 Light Pens
Looks like an ordinary pen but its tip is a light sensitive detector. When you touch the tip of the
pen to the display screen, the computer locates what are called the x-y -ray coordinates of that
point. By touching the screen at various points, or by moving the pen across the surface of the
screen, you can write and draw.
Normally used with palm tops. Since palm tops are very small light pens replace mouse.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
locate keys (cursor control) on the keyboard. But it is faster and lets you move in 8 directions
instead of four.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
signature, and logo on other documents. Another scanner is known as flat bed which is used by
placing the document to be scanned on it.
Fig. 2.7.6 Laser Scanner
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
2.7.11 Bar Code Readers (or Line Code Readers)
Bar Code Readers will read price and inventory codes printed on products that are frequently
purchased such as in supermarkets. This code is usually referred to as Universal Product Code
(UPC). Such Bar Code Readers employed in supermarkets are one type of remote date entry
terminals. They are known as Point-Of-Sale (POS) terminals. Remote data entry terminals
promote entry of data directly into the computer system for the purpose of updating, inventing
files and preparing customer’s bills and other similar tasks. They are often used in manufacturing
and distribution in warehouses, retail stores, bank teller counters and other business offices.
Workers and executors in the field usually use portable data entry terminal to enter and retrieve
data directly into and from the main computer control via telephone lines.
Fig. 2.7.10 Bar Code
This is a system of data entry normally employed when processing spiral documents usually in
batches. In any key to disk system, there must be a microcomputer that is used as the processing
computer or server. There will be a special computer terminals, each with a different operator
in front of it. Provision for a fixed disk drive where data is stored when keyed in is made, and
finally there is a tape drive where after completing a given batch of data, then you re-locate. One
of the terminals is usually dedicated for a supervisor to the system that oversees the whole
operation.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Once a batch is verified as compact, the data is transferred from the disk to the tape drive and
finally physically transferred to the server (minicomputer) for processing.
2.7.14 Printers
Printers are necessary when hard copies of displayed work on the monitor have to be sent to
customers, report prepared by the Management and the Board of Directors and so on must be
printed. It’s not disputable the fact that other electronic means of transmitting information are
now available. Printed-paper, however, still remains the most popular means of communicating
the same information. Printers fall into three main categories classified by the amount of printed
work the device is able to produce in one operation.
a) Page Printers
These printers print a whole page at once. They are sometimes known as image printers. They
produce the images by laser or electrostatic means. The quality of output from such printers is
sufficiently high for business correspondence. They use toners just like a photocopy.
b) Line Printers
These type of printers produce a whole line of a text at ago. They are very fast but the quality of
the output is always low.
It is important to note that the length of a line is not standard as it differs with the requirement of
the application in use. However, most of the printers will print between 120 and 144characters
per line. This will require approximately paper width of about 14 inches so as to accommodate
the said character scale. 132 characters are often the most common width. These use cartridges.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
c) Character Printers
Form or print one character as a time on the paper. This rate of printing varies between 20 and
600 characters per second depending on the mechanism or use in the different makes employed.
These printers make use of ribbons.
There are many different types of character printers. The first is called Daisy Wheel Printer,
which creates fully formed letters much like a typewriter sometimes called Letter Quality
Printer. The output is often good enough for business correspondence.
a) The Whole
The Whole Daisy Wheel
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
The second is Dot Matrix Printer, which creates characters as spools of dots in a rectangular
matrix. The speed of the dot matrix printer is much higher than that of a daisy wheel but the
quality of the former is not sufficient enough for business correspondence. A dot matrix printer
has a print head consisting of a number of small pins between 9 and 24 depending on the make.
A printer with a 9 pin print will give a poor quality print compared to that of a 24 pin print head
since the dots in the former are widely spaced apart. If a dot matrix is to produce a better quality
output, sometimes referred to as Near Letter Quality (NLQ), then a line is printed twice with the
print head being moved along very slightly in the second printing so that those moved spaces
between the dots are filled into ensure continuity. One advantage with the dot matrix printers is
that they can print from either side, meaning the print head does not have to move say to the left
side of the paper in order to begin printing but begin from the right as well. With the dot matrix
printer you simply need to change the ribbon of different colour to get a colored output.
Another way to categorize printers is by whether or not the print head strikes the paper. If it does,
it is called Impact Printer and if it does not it is called a Non-Impact Printer. Dot matrix and
Daisy wheel printers fall in the former category; all strike the paper while printing.
Non-impact printers are usually the fastest since they minimize the amount of physical
movement required during the printing process. Examples of non-impact printers include
Thermal Printers, Inkjet and Electrostatic Printers.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Impact Printers are usually noisy given the physical motion involved during the printing process
when the printing device strikes the paper. To get multiple copies from impact printers, all you
need to do is interlace a carbon paper between the papers.
Thermal Printer
b) Electrostatic Printers
They form characters by charging the paper electrically. The paper is then passed through a toner
solution. Particles of the toner solution (ink) stick to the electrically charged areas of the paper.
When the paper is heated, the particles melt thus producing the characters. They are quite fast;
some print about 300 pages per minute.
c) Ink Jet Printers
These printers “spit” streams of ink to the surface of the paper. The ink then drips almost
immediately. They are fairly slow. They produce from about 50 to 100 characters per second.
These printers offset their relative disadvantage of slowness by their low cost and multiple
colour printing.
2.7.15 Voice Output
Computer voice output is common place. For example a computer could be programmed to offer
telephone information service, like directory help. Others let you know if you dialed a wrong
number or if the number you are calling is out of order or busy and the like.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
2.7.16 Plotter
This is an output device used to produce graphical output like drawing graphs, charts, maps or
electric circuits. The design of the graph, circuit is done on the computer then the output is sent
to the plotter. Plotters are of two types: one that has a single sheet sometimes called Flat Set
Plotter and the second uses a continuous sheet which rolls continuously on drum like cylinders:
also known as Drum Plotters.
2.7.17 Microfiche/Microfilm
Microfiche and Microfilm are both better known collectively as microform. The later is a
document photographed and hence stored in a film. Microfiche is a sheet of film that measures
105mm x 148mm whereas a microfilm is actually a 16mm roll film. A typical 16mm will hold
the equivalent of 3,000 A4 Pages. One typical microfiche will hold the equivalent of about 98
A4 Pages.
Usually this technique of giving output to a microfilm/microfiche or microform is usually
referred to as COM (Computer Output to a Microform). The technique is simple, a machine
called a microfilm Recorder reads output that is relayed onto a magnetic tape for the computer,
once read, the output is copied out on microfilm/microfiche. The application of COM is suitable
where an organization has to store data over a long period of time or where backup copies need
to be made. Records that need to be out a long time would include: receipts and invoices of an
organization or say catalogues in a library or a bookstore.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
head” for reading the information stored on the tape that’s for transforming data from the tape
into main memory. It also has a “write head” for recording the information. Usually, to read
from, write to an individual tape, you have to mount it on a tape drive.
In processing data is read from the tape into main memory (or RAM) where processing takes
place. The results are given out only as a written report or as another tape file written on another
drive. Because RAM capacity is limited, only a small amount of data is used for the input tape
or written to the output device at one time.
Data that is stored on magnetic tape as well as other auxiliary storage devices are usually
organized into records. A record for now should be understood as a unit of data consisting of
characters about someone or something. How data processing uses records is a matter of loading
one or more records into RAM for an output device. Processing those records and sending the
result to an output device.
This technique of sorting records on tape in the form of groups that are read into or written from
RAM all at once giving rise to a number of technical terms that are used in all types of secondary
storage media. See fig. 2.9.1 below.
Physical Record
I I I
R 100 Logical R 100 Logical R 100 Logical
G Records G Records Records
Physical Record
I I I
R 100 Logical R 100 Logical R 100 Logical
G Records G Records Records
Physical Record
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
A group of records is called Physical Records or Block. Each record in the group is known as a
Logical Record. The number of logical records in a physical record is referred to as the
Blocking Factor. A blocking factor of ten will indicate that ten logical records make up one
physical record or block. The term block refers to a group of logical records, all of which are
read onto or written from RAM at once. The physical records, or block, are suspended from each
other by blank spaces on the tape known as Inter-record Gap (IRG). Sometimes known as
Interlock Gap.
Magnetic tape is a sequential medium, this means that records appear on it in sequential order for
example personal records will appear by: employee number, account number and so on. Because
data is stored on tape sequentially, they must also be processed sequentially. If a tape file has
only 60,000 records, access to record number 50,747 can be had only by reading through all of
the proceeding 50,746 records. This is usually a very slow way of accessing data.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Each track is divided into sections or blocks, similar to the blocks of data in magnetic tape. Each
sector has an address. To store/retrieve data, the system finds the disk address used to contain
data by moving the read/write head to the appropriate track where it waits until the desired sector
passes by.
Fig. 2.9.2 (b) shows how a track is divided into sectors and how the sector contains an address
used to locate where data is stored on the disk. A hard disk with a capacity of 300k for example
contains forty tracks (40) of nine sectors each; having a total of 360 sectors available on each
side; of a two-sided disk for a total of 720 sectors. Each sector contains 512 bytes or 4096 (512
x 8)characters, so the disk offers a total data storage capacity of 368,649-bytes. Such a disk is
said to be a 360k disk following the conception that “k” equals 1,024 (360 x 1024= 368640).
Read/Write
Head
Track Disk
Access
Rotation Arm
Spindle
Fig. 2.9.2(a)
Address Data
Fig. 2.9.2(b)
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
Disk storage media take different forms. Hard disks are rigid in nature. They contain the most
data. Hard disks may be fixed in their devices or may be removed. They are usually 14” in
diameter, although it is unusual to the smaller had disks in microcomputers. One such system is
known as Winchester, so named because its prototype makes use of two drops of thirty million
bytes each has effectively the “30-30”. It uses a 14” plotter. Later versions called Mini-
Winchester or Mini-winns” used 8” or 6” and one-quarter inch plotters, which are stored in the
drives and can store up to 85,000,000 bytes.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
2.8.5 Mass Storage Media
A great need for machine-readable data storage in industries has prompted computer equipment
manufacturers to develop storage devices with even higher capacities. The top of the time disk
unit manufactured by IBM doe example, stores more than 2.5 billion bytes of data. Data Car-
tridge System store data in series of 50 MB cartridges. These devices provide up to half a million
bytes of on line storage.
The operation is similar to that of other secondary storage devices. A cartridge is loaded into the
read/write mechanism, the data is processed and then the cartridge is replaced in its honeycomb-
the storage bin. Then the read/write mechanism moves onto find the next catalogue to be
processed. Cartridge systems are slower than disk systems because they involve more physical
movements.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
2.10 SUMMARY
Computer Hardware is defined as all the electrical, electronic and mechanical components
of the computer together with their devices used at the peripheral.
Software are programs that are used to run the computer together with the associated
documentation.
Computer hardware comprises of Input devices, Output devices and the Central
Processing Unit.
A complete computer system comprises the operating system, system software,
application program and hardware.
CPU is consisted of Arithmetic and Logic Unit which performs arithmetic and logic
comparisons, the control unit which coordinates the activities of the hardware (I/O operations)
as per the dictates of the memory, memory which stores data being processed, results and the
application in use, registers which are slam areas in the CPU that holds data before processing
and probably after.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Storage Devices are in two forms: Primary Storage devices, the Main Memory and
Secondary Storage devices which supplements the main memory.
Input devices include: Keyboard, mouse, paper scanner and magnetic ink holder. Other
data capture methods include: speech, magnetic, optical character readers and optical mark
reader.
Output devices include: Printers – which could be line, page or character printers, they are
also categorized by whether the print head strikes the paper while printing – impact and non-
impact printers, visual display Unit, (or monitor) – displays the text/graphics for the user to see
and plotters for plotting graphical output, electric circuits, charts etc.
Secondary storage media and devices include: Magnetic tapes and disks, optical disks and
mass storage media.
System software are programs that control the entire operation of the computer together
with the associated documentation. An application program is software that is usually applied
on one area of operations only. They could be standard packages or user developed packages.
2.11 QUESTIONS
1. Differentiate between hardware and software in a computer.
2. What does computer hardware consist of:
3. Discuss the functions of components of a computer hardware system.
4. A complete computer system comprises of which components?
5. Discuss any 4 input devices.
6. Discuss any 4 output devices
7. What do you understand by secondary storage devices?
8. Discuss any three backing storage media and devices.
9. Distinguish between System Software and Application Software.
10. What is an Operating System?
11. What are Utilities?
12. What is Firmware?
13. What are the two types of Application Software? Discuss
This is a Property of Mwalimu Consultancy Ltd. Contact Mr Isaboke
0746-222-000 for more Educational Materials.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CHAPTER 3
One factor to be taken into consideration is the cost involved in setting up the lab including the
cost of equipment. This should not be taken for granted and computers and other peripherals
damaged in the short run could result in great losses to the organization.
Cleanliness is a factor that stands out in the lab. The personnel need to be clean while in the lab.
Dust in the hands, oil on fingers is not allowed among personnel/students. Foodstuffs to the lab
is not allowed as the broken pieces from such will ultimately find their way into the peripherals
e.g keyboards, disk drive and so on.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Depending on what material cover is on the floor, certain shoes tend to cause a lot of distraction
by making noise to the rest of the seated personnel. This slows down the work process as
attention will definitely be shifted. External disks into the lab are not recommended as this may
result in virus infection to the system in the lab from outside sources.
Internal disks should not be allowed to leave the room. Some stringent procedures should be laid
down to check the personnel who ignore the rule. If this is not observed, it may lead to data from
the organization being exposed to rivals or would be “hackers” – those who gain access to the
system without authority.
Any mechanical or technical faults noted should always be reported to the technical personnel
immediately for attention. Non-technical personnel should never attempt to deal with such a
fault!
It is important also that every personnel make routine backup copies of every work done in the
lab as this will save the organization from any data loss in the event of disaster.
Shutting down and booting of computers is very important. Strict procedures depending on the
operating system specification should be adhered to, otherwise damages to the disk in the long
run and fragmentation of files and storage in the storage location will happen. This will cause
delays in reading and writing to the same. All equipment should not be moved around the lab
rather they should always be used where they are installed!
Changing of peripherals from one machine to another is not an encouraged practice. Let a mouse
meant for machine A remain the machine; if it does not work, please ask a technical personnel
to attend to it, but do not interchange it with another!
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Computer cables should, if detached, be properly returned each to the right machine. Technical
operations in the lab should be left for only technical personnel. If every Tom, Dick and Harry
in the lab assume to repair every damaged equipment, then more will be worse off than they
were.
Disks should be kept from natural hazards like excessive temperatures, water and dust places and
a way from magnets if data integrity is to be maintained.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Cables in the lab should be properly located either on false floor or ceiling or along the walls so
as to avoid interference for example with communication coolers in the lab. Cables put
haphazardly may result in possible power disconnection if stepped on or pushed around.
3.6.4 Ventilation
It is a good practice to include ventilation in a computer room but the same should not provide
an entrance to hackers to tamper with data.
VDU LEGISLATION
This is a legislation (British) that was passed in 1990 for frequent users of computer screens in
the lab. It states as follows:
1. One should not use a computer for more than one hour continuously.
2. While using the VDU, the eyes should not look at the screen directly but at an angle of
30-60.
3. The distance from the screen should be between 300mm-480mm.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
4. While using the keyboard, the arms and elbows should be at right angles and parallel to
the ground.
5. The seats and desks in the lab should be adjustable to the users height this is to aid (iv)
and avoid Repetitive Strains Injuries (RSI) of the fingers and wrists. The seats should have
backrests!
6. All seats in the lab should be fitted with castors – to make them mobile and less noisy.
NB: An Anti-glare screen is still recommended.
Air Conditioning
Air conditioning is very essential in the computer room where main frames are housed or some
minicomputers together with their associated peripherals. Most devices however, usually
contain their own environmental controls that are automatic for example fans, filters and sealed
units.
Air conditioning is done to enable control the following:
(i) Temperature – for equipment should be between 18C and 24C.
(ii) Humidity – this helps to avoid moisture precipitation and build up of electrostatic charges.
Recommended humility should be 45% - 55%.
(iii) Dust control – disk media require high level of cleanliness. Processors with highly packed
electronics require high levels of cleanliness. To help keep high level of cleanliness, the lab
should have positive pressure, air lock and sticking nuts on the floors.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Dimensions of the Lab
The size of the computer room should take into account the following:
Requirements specified by the equipment supplier
Operating conditions and
The need for future expansion.
The height should be enough to provide for false floors and ceiling to help spread equipment
loads provide safe cable paths and air ducts.
Accessibility
While installing equipment in the lab, there must be a provision for a through route, which is also
important for emergency exit. Only for security purposes should such a route be closed.
Corridors of the lab must be high enough with double doors and floors, stairs or lifts must be
strong enough t bear the load of equipment. It is often recommended that ground floor should
be used but this again has many security risks.
Reception should always be spacious enough to allow for storage of trolleys (used for moving
equipment around the lab).
Equipment Sitting
Design of the sitting equipment should always be such that it ensures the workflow of the
operator and minimizes the walking distance from one equipment to another. This means for
example that the location of a stand-alone computer and the printer should be close enough to
ease the work!
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
d) Physical security
General:
Only authorized personnel should be allowed into the computer room.
The lab should not have any outside walls to keep off intruders.
The lab should have small windows’ provision for ventilation.
Video cameras should be on to monitor the activities of the personnel and intruders.
e) Fire
Alarms should be in place as discussed earlier. Automatic detection of smoke and electrocuting
system should be provided for. In the computer room, there should be hand held Co 2 and BCF
extinguishers. The personnel should be given evacuation training in the event of the fire break
out.
f) Flooding
Computer labs should never be sited in basements where they are vulnerable to floods. No water
pipes should be placed under, over or in the computer rooms. This is because water is likely to
destroy equipment, programs and data in the lab.
g) Power
The computer room should have independent power supply, stable and adequate with shrouded
panic off button. Problems with power supply come in three main forms:
(i) Supply interruption – is caused by a number of factors that include transformer failure,
cutting of supply lines by accident, by people, lightening and so on.
(ii) Spike – this is a voltage level imposed onto the supply by interface source such as
switches, electro-mechanical devices and so on.
The problem caused by spikes is generally loss of data as soon as power is removed. Disk files
also get corrupted when store cycles are interrupted by removal of power.
(iii) Voltage Frequency Variation – this is variation or fluctuation in the voltage frequency
of electricity supply. Such fluctuations normally do not have effect since in most computers,
there are power supply units that are designed to adequately cope with any small fluctuations
Problems caused by voltage frequency variations is generally loss of users in the sense that
terminal links get broken in those parts of a network whose power is interrupted or destroyed.
So this problem is normally experienced when computers are networked.
When designing a computer lab, it is important to have a stand by generator, large batteries or
other uninterrupted power supply (UPS) units so that in the event of power failure, the data is
not lost, or users disconnected or disk media damaged etc.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
3.6.6 Dust/Dump Proof
Disk storage media and processor require a high level of cleanliness and standard temperature in
order to maintain the data stored and of course for power to adequately function.
The lab should therefore have a positive pressure, suitable building materials to reduce dust,
special floor covering to reduce the dumpness and so on.
3.6.7 Lighting
The computer lab should have adequate lighting. This lighting should be large enough to
minimize reflections and glare on the part of the user. There should also be a provision for
emergency lighting.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Spike – is the second form of power supply problem, this is a situation where a voltage
level is imposed onto the supply by interference source such as switches, electromechanical
devices and so on.
All these forms of power problems especially supply interruption and spikes result in damage to
disk heads which often crush when power is suddenly removed. This will mean loss of data
since it will be hard to read or write to such a disk. Spikes often result in serious loss of data
since RAM being volatile losses data immediately power supply is cut off.
Disk files also get crumpled when stores are interrupted by removal of power.
3.7.2 Virus
A virus is a peace of software (program) that replicates itself without the user intending it or
noticing it. Viruses often affect our computers having been brought about by hardware/software
engineers who move from one computer to another carrying out demonstrations or through
external infected disks, which are brought into the lab. Such disks are often infected with boot
sector virus (boot sector is the first partition of the hard disk/floppy). When it (infected disk) is
put into the drive, it will be loaded into memory. The disk is now infected since the memory to
which it must be loaded first is now infected.
A virus usually has many effects for example replication where a virus divides itself repeatedly
thus spoiling the data on the screen/memory/or disk.
Viruses have so many effects they cause to data/information and to the user. What we need to
note here is simply the fact that viruses will change or modify the data that was stored to take a
different format that is never useful to the operator.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
Disk heads, as mentioned earlier, often crush when there is sudden power supply disconnection.
Data is often lost since reading from one disk and writing to them is not possible. This means
that data in that disk was lost.
3.8 PRECAUTIONS
The following precautions should be put in place to avert the possible loss of data through the
risks identified above.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
detected and all data is automatically stored and also safely packed before the system is switched
off.
d) Use of Batteries and Generators
Standby generator systems together with large batteries are necessary to sustain the continuity of
computer facilities in such organizations as hospitals, military installations, factories and some
offices. In the event of power interruption, what happens is that the system is first maintained
by the battery while the generator is started up.
3.8.2 Virus
The following precautions should be adhered to so as to guard against virus:
a) Write Protection Disks
Every floppy 3½ disk contains a physical write protect tab on the left hand corner that slides
down to indicate its “on”. When the disk is write protected, it means you cannot be able to write
anything or change a word in it, you can only read! This will protect you against virus since it
cannot allow any external data of any form!
b) Restriction of Disk Movement
Strict procedures should always be put in place and adhered to by all IT staff. Such software will
ask the user to “repair” hard disks and floppies as well as the boot sector from viruses. Such a
procedure should be for the sake of data integrity, no disk from the organization should leave
the computer room and at the same time any external disk should not be used in the system
unless “sheep dipping” is carried out. The term simply means scanning the disk for viruses first
before being used.
c) Disable Disk Drives
Another viable alternative to virus protection would be to physically remove all the disk drives
once the normal working hours are over. This should be done by the technical staff only. When
this is done, it means that even if you had your disk to use you cannot because the disk drive to
let you read and write to the disk is not there. This will help protect the organization against boor
sector virus and the like.
d) Anti Virus Software
Software are available in the market today that help to disinfect diskettes (disks) and of course
the main memory from the virus infection. Since new viruses come up often, it is always
recommended that such software installed into your system should be regularly updated or a
newer more powerful one installed. Such software is often easy to use once installed.
Examples of such software include: Norton Anti-virus, Dr. Solomon Anti-virus Tool Kit, F-Prot
Professional etc. Such software will scan and ask the user to “repair” hard disks and floppies as
well as the boot sector from viruses.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
demagnetization of this sequence could be altered. This will of course destroy the data stored in
the disk.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
NB: Note that a word to be encrypted in full as you move along the row. Separate each space by
a dot. To read, read the first letter in the first column and move down the column. Each dot is a
space.
3.9 SUMMARY
Factors to consider when designing a computer lab are the following: Dimension,
accessibility, sitting of equipment, health and safety of personnel, lighting, power supply,
physical security and noise.
For safety precautions on the lab, the following should always be considered: Fire fighting
equipment, standard furniture, proper lighting, dust/dump-proof lab, proper installations, stale
power supply and burglarproof doors.
Possible causes of data loss and programs are the following: power failure, viruses,
accidental erasure, erasing of disks, poor storage and handling of disks and unauthorized access
by hackers and other intruders.
The following are precautions to be taken in the event of data loss from such risks
mentioned.
Use UPS, large batteries and generators in the event of power failure.
Use of anti virus software, write protecting disks.
Movement restrictions.
Disabling disk drives to protect against viruses or accidental erasure.
Use of undeleted and unformatted utilities.
Use of backup copies and heat resistant safes.
Disks should be stored away from water, fire or excessive temperatures and away from
magnets and should be kept in dust free environments.
Use of passwords and encryption methods to protect files against unauthorized access by
people.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
3.10 QUESTIONS
1. List factors to consider while designing a computer lab.
2. What points would be observed in the computer lab as far as behaviour of personnel is
concerned?
3. Handling of materials and equipment in the lab is vital. Discuss.
4. What safety precautions and practices should be put into place in a computer lab?
5. What are desirable and possible causes of data loss in an organization?
6. List and discuss the factors to be put in place as recovery measures to the above data threats
to an organization
This is a Property of Mwalimu Consultancy Ltd. Contact Mr Isaboke
0746-222-000 for more Educational Materials.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CHAPTER 4
OPERATING SYSTEMS
This chapter will introduce the student to what operating terms are, the functions and types. It
will also serve to explain how disk Operating System (DOS) organizes information. The student
is expected to use some DOS commands for file and disk management and be able to list external
and internal DOS commands at the end of the chapter.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
4.2.2 Input/Output (I/O) Management
The Operating System controls reading of data coming in from the various input devices into the
memory and writing of data to output devices such as printers.
The Operating System will ensure that each time the user types in commands those inputs are
accepted into the memory, and if the latter is busy the it holds the same temporarily on buffers
until the memory is free and also does the same to output data awaiting to be displayed on the
monitor or to be sent to the printer if the same are busy.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
4.3.2 Multi User System
This system as the name suggests is for multi user, as opposed to the single user system. This
system is employed by larger microcomputers and minicomputers. More than one program can
be loaded into the main memory by different users and processed at the same time in an
interactive manner. Examples of such an operating system are UNIX and Windows NT
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(iii) The number of bytes contained in this file
(iv) Date and time on which it was printed into the directory.
(v) The total figure at the bottom of this directory listing show the number of bytes remaining
for storing other files.
MS-DOS has certain rules for formation of filenames for example;
A filename must not exceed 8 characters in length and in some cases requires filename
extensions, which is 3- character in addition to the filename. In the above example, COM and
EXE are extensions. Although not visible, there is usually a full stop between the filename and
the extension e.g. Diskcopy.COM is the complete name for the above file. The user has to type
in the computer name of the file including the period in order to effectively use some file
maintenance utilities like copying or deleting. Filename extensions usually indicate the type of
file for example “COM” and “EXE” above will refer to program files.
-75-
KENYA
Fig. 4.4.2
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
To be able to specify which file to open, the user has to specify to the operating system the data
path or path to that file. For example, to open a filename Milimani, the following path must be
specified: Kenya\Nakuru\Milimani.
A path is often defined as a logical, sequential list of directories and subdirectories leading to a
filename. The names of directories and subdirectories are separated from each other by
determinates which could be a backslash(\) or a hyphen (-) or a slash (/) depending on the Ms-
Dos version in use.
The directory names have extension DIR wheras the files have TXT. The directory named Kenya
under which the subdirectories Nakuru, Mombasa and Nairobi are stored is called root directory.
The operating system will ensure that disk on a volume label Country is located first if it is the
one mounted, before it searches for the actual file in the specific directories.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
of a number of operating system commands also called system commands that control the
operating system.
How does one know that the application program has finished its work and it is no longer loaded
by the operating system? The operating system will display that by displaying its prompt; it
could be a character or two that will signal the user it awaits further system commands.
The MS-DOS Operating System, uses the prompt C:\> or C>. The “C” in the prompt indicates
the disk drive in which the operating system will look for any files referred to by the next TCL
instructions. The disk drive attached to the system are usually identified by letters of the alphabet
through a system with four drives could have drive identifiers A: through D. Any reference to a
drive must include the colon in the drive identifier. The drive identifier displayed by the dos
prompt is known as a logged drive, the default drive or the active drive.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
To run a program with filename extension COM, BAT, TXT, simply enter its filename without
the extension for example to a Basic Program simply enter BASIC. Its filename is BASIC.COM.
When you want to execute a program that is not stored on a disk in the logged drive, the first
thing would be to change the logged drive to the disk containing the program. For example,
suppose you wanted to run a program with the filename MILO.EXE which is on the disk in
drive B:, and the logged drive is A:, to specify the drive on which Dos should look for the
program, proceed with the filename with the drive identified with no blank in between the colon
and the filename.
B:MILO
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
This command will display filenames and their extension only for the entire directory at once.
They will be displayed in rows five files wide. The format is DIR/W <enter>.
In this case, Dos will display the particular information about that file or tell you that it is not on
disk.
The asterisk wildcard is a many character wild card. It fills out a filename or extension from its
position to the end of the name in the above EXE file, the asterisk is the fifth, sixth, seventh and
eighth character if they exist in the filename beginning with SAME.
Another wild card used in the Dos command if? It is usually called a one character wild card.
When it appears in a command, you can substitute it with one character e.g.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
DIR ?AME*.DBF, will substitute ? with any character as long as the next line i.e AME is part
of that filename. So if it is a command, like DIR SAME*??? Would be the same as DIRD
SAME*.* when the three questions marks in the former stand fir three character.
Suppose you were to go straight to the root directory i.e. KENYA, all you need to type in at the
prompt is:
CD\ <ENTER>
If you want to see the subdirectory of a current directory, type DIR. <ENTER>.
For example if you have made Nakuru your current directory, to see subdirectory like Milimani
simply enter the latter command!
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
RD NYALI <ENTER>
4.6.6 Copying a File
It is often necessary to make a copy of a file. All important files should always be copied so as
to guard yourself against the loss of data. Data loss often occurs if you accidentally erase a file,
Power goes off before you save your files, store data under an incorrect name, do physical
damages to a diskette.
When you copy a file to protect against loss of data we say you are backing up a file. The copy
command requires 2 parameters/arguments to accomplish the task. It is a resident command.
(i) The first argument is the name of the file to be copied.
(ii) The second argument is the filename for the copy. If the file is not on the logged drive,
then drive identification must be included.
4.6.6.1 Copying from the same Drive
Thus: Copy SAME1.DBF ZAME2.DBF
The above command will copy file named SAME1 on the same drive and give it a new name
ZAME2.DBF. it is important to note that if you are copying within the same drive, then the new
file must have a different name.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
For the sake of clarity, the user can rename an old file with a new name. The command is
RENAME or simply REN. The format of this resident DOS command is:
At the prompt of the logged drive containing the disk with the old filename type:
RENAME OLDNAME.TXT NEWNAME.TXT
This DOS internal command will not allow you to change a file name to one already existing in
the diskette.
Notice the single space left between the arguments themselves and between Dos command and
the argument oldname.
The use of wildcard is important here as they could help rename a wide range of files, for
instance:
RENAME SAME*.DBF SAME*.WPF
This will change all the filename extensions of all the SAME files to Word Processing Files
(WPF). To rename a file on a different drive, you would do this:
RENAME B: SAME.DBF ZAME.DBF to rename a file in B:
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
Procedure:
(i) To Format a non system or data disk
Simply enter FORMAT followed by a drive identification if the new disk is not to be in the
logged drive i.e.
FORMAT or FORMAT B:
This command will prompt Dos to load format program and display the following message:
INSERT NEW DISKETTE FOR DRIVE A: and strike any key when ready. In the file case or
INSERT NEW DISKETTE FOR DRIVE B: and strike any key when ready in the second case.
Simply put the new diskette in the indicated drive and press any key. Dos will display:
Formatting …
After a few minutes, Dos repeats
Formatting……Format Complete
362496 bytes total disk space
362496 bytes available on disk
Format another (Y/N)
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
To which you will answer “Y” or “N” press Y if you want to format another otherwise press N
key from the keyboard.
The messages displayed are the same as the ones above with addition of the ones indicating that
system transferred and how much space it required.
A disk with the system includes some hidden files the names of which do not appear when you
look at the contents of the disk, and a file called COOMAND.COM. These files form the resident
portion of Dos.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
362496 bytes total disk space
362496 bytes used by the system
321536 bytes available on disk
Format another (Y/N)
A>
NB: Always have some formatted disks with you because some application programs will not
give the leeway to format a disk while working on it.
Procedure:
The format for DISKCOPY includes two parameters:
(a) Source Drive and
(b) Destination Drive.
To be able to execute the command, enter the following:
DISKCOPY A:B:
This command will copy the contents of the entire drive A: to the one in drive B:.
NB: Everything on the disk in B:, the destination drive, will be destroyed by the operation.
After the command, Dos will prompt you to insert the disks.
You can as well specify DISKCOPY B:A: if you intend to copy from drive B: to drive A:.
This method is often effective for disks that are full, otherwise we would use the command:
COPY A:*.*B:
To copy all the files in drive A: with any extension to a disk in drive B. this command as opposed
to diskcopy, will always check for faulty areas on the destination drive and mark them so that
no data is kept in them.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
4.8 SUMMARY
An Operating System is a set of program “housed” within the system software that
standardizes the way the computer’s resources are made available for the user to applications
software.
The functions of an operating system are the following: Memory management,
Input/Output management, Resource allocation, Error handling, Provision for user interface,
Interrupt handling, File management and Job control.
Operating Systems could be single user of multi user. Ms-Dos commands can be divided
into File Management Commands and Disk Management Commands. Some Dos commands
are internal (or resident) and some are external (non-resident or transient) which means they
have to be logged first before they can be used.
Examples of file management commands are: Deleting, copying and renaming files,
viewing, changing and creating directories. Examples of Disk Management commands are:
Copying disks, labeling disks and formatting disks.
Resident Dos commands include: DIR, COPY and DISKCOPY, RENAME.
Non-resident Dos commands include: FORMAT, SYS.
4.9 QUESTIONS
1. Define the term Operating System.
2. State and discuss functions of an Operating System.
3. What are the two types of Operating Systems? Explain.
4. List commands under the following headings:
(i) File management;
(ii) Disk management;
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(iv) RENAME OLDNAME.TXT NEWNAME.TXT
8. What is a Wildcard? Differentiate between Wildcard and Asterisk(*) and (?).
9. Explain what the following Dos Commands will do:
(i) COPY DATA *.*A:
(ii) DISKCOPY A:B:
(iii) DEL DATA*.DBF
(iv) ERASE ?ATA*.*
(v) TYPE DATA*.*
(vi) TYPE DATA*.DBF>PRN
10. (i) What is formatting? Why is it important
(ii) How would you format a Diskette? How can you include an Operating System to a
formatted diskette?
(iii) What are the two ways of Adding Dos to a formatted disk?
(iv) Write down the command for Adding Volume Label to Disk.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
END
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
F1 TOPICAL REVISION
QUESTIONS
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
INTRODUCTION TO COMPUTERS
1. (a) Clearly define a computer
(b) Give one reason why a computer is referred to as an electronic device
2. Explain the following terms as used in computer science
(i) Data
(ii) Program
(iii) Data processing
(iv) Information
3. State any three functions of a computer
4. Explain the following input/ output terms as used in computer systems. Give an example for
each
5. State four different parts that make up a computer (2 mks)
6. (a) Explain the term system Unit
(b) List four devices located under the cover of the system unit
(c) Give two differences between tower – style and desktop system units (2 mks)
7. Computers have evolved through a number of generations. List any 4 characteristics of the first
generation of computers.
8. Briefly explain the classification of computer according to historical development (generations)
First generation computers
Second generation computers
Third Generation computers
Fourth generation computers
Fifth generation computers
9. State four factors used to classify computers
10. State the differences between desktop computers and laptop computers
11. (a) Explain the emerging trends in microcomputer technology in relation to size
(b) Give two reasons why smaller computers like Laptops tend to be more expensive than
Desktop computers
12. Which category of computers would you place an N- series Nokia phone
13. Give three reasons why a mobile phone is regarded to be a computer
14. (a) Mention three Analogue devices
(b) Give three example of special – purpose computers
15. State a specific example where each of the following types of computers can be used
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(a) Supercomputer
(b) Mainframe computer ( 1 mk)
(c) Minicomputer (1 mk)
(d) Microcomputer / personal computer ( 1 mk)
16. (a) Define a microcomputer ( 1 mk)
(b) Differentiate between a microcomputer and a personal computer ( 2 mks)
(c) List three factors to be considered when purchasing a microcomputer (3 mks)
17. Explain four reasons which make microcomputers suitable for personal computing work
18. (a) Identify and explain five areas where computers are used to process data ( 10 mks)
19. Identify three advantages of using computers in banking (3 mks)
20. (a) Define the term „ computer laboratory‟ ( 2 mks)
(b) Give two factors to be considered when preparing a computer laboratory (2 mks)
21. List down three safety precautions one should observe when entering a computer
laboratory (3 mks)
22. Describe the ideal environment for a computer to work properly (3 mks)
23. Explain why smoke and Dust particles are harmful to a computer
24. Identify three facilities that will ensure proper ventilation in a room
25. Why must foods and beverages be kept out of the computer room?
26. Why would it not be good to install Powder or Water – based fire extinguishers in the
computer room?
27. (a) State one reason why a computer needs to be connected to a stable power supply (1
mk)
(b) List down four functions of the uninterruptible Power Supply (UPS) (4 mks)
28. Mention two things that are likely to cause strain- in the computer room
29. Identify three proper sitting postures while using the computer
30. State two methods of minimizing dust in a computer laboratory
31. Name two main causes of fire in the computer laboratory and give the precautions that
should be taken to guard against them
32. What is the purpose of labeling a diskette?
33. List three things that can spoil a printer if they are not of the correct specification, and
explain what damage may be caused
34. Explain three ways that computer technology could make office more efficient (3 mks)
35. (a) Explain the steps you would follow to set up a new computer
(b) Outline three reasons why it is important to first shut down the computer before turning it off
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
36. A computer must go through the process of booting/ initialization before use
(a) Briefly explain the term “computer booting”.
(b) Explain what happens in the computer during the booting process
(c) Give and explain two types of booting
(i) Cold booting:
(ii) Warm Booting
(d) What type of memory is used to store the boot up program (the first program to be executed on
switching on a computer?
37. (a) What is a computer keyboard
(b) List four types of keys found on a computer keyboard, giving an example of each ( 4 mks)
(c) Name the keyboard keys that will help you: (2 mks)
COMPUTER SYSTEMS
1. Define the following terms as used in computing
(i) System
(ii) Computer system
2. Differentiate between a computer and a computer system
3. (a) List and explain three functional elements of a computer system ( 6 mks)
Hardware
Software
Live – ware ( people – ware)
(b) Draw a well – labeled diagram showing the functional units of computer hardware
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(h). Voice input device.
(v). Printing device.
5. State two advantages of using a mouse instead of a keyboard. (2 marks)
6. Outline any two advantages of a light pen as an input device, (2 marks)
7. (a) What are computer scanning devices? (2 marks)
(b) Name the type of scanner used: (2 marks)
(i). To capture prices of goods at points of sale terminals in supermarkets and superstores.
(ii).To grade multiple choice examination
8. Mr. Otieno a French teacher used speech method to store students oral answers to an exam into a
computer
(a) What is a speech input?
(b) State two advantages and two disadvantages of using this method of data input (4 mks)
Advantages
Disadvantages
(c) State four areas where speech input would be used
9. Name two examples of scanning (data capture) devices used at point of scale terminals in
supermarkets
10. (a) What are turnaround documents
(b) Name any two data capture techniques that make use of turnaround documents ( 2 mks)
11. List five factors one would consider when selecting a data input device (4 mks)
12. Describe three functions performed by the CPU ( 3 mks)
13. Explain the functions performed by each of the following central processing unit elements
(i) Control Unit ( 2 mks)
(ii) Arithmetic and logic Unit
(iii) Registers
(iv) The main memory
(v) The system clock
14. In reference to ALU, explain the meaning of logic operations and give an example of this
processing operation
15. Give four types of registers found in the CPU
16. (a) Name the basic unit used to measure the processing speed of a computer ( 1 mk)
(b) A computer processor speed is measured in Hertz. What fraction of a second is the
following?
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(a) What is a computer bus? ( 1 mk)
(b) State the functions of each of the following computer bus ( 3 mks)
17. (a) What is the computer Motherboard?
18. (a) What is a Drive?
(b) State any two types of computer drives, giving an example of a storage device used by each
( 3 mks)
19. (a) Give two reasons why there are many forms of computer storage devices ( 2 mks)
(b) State three different examples of auxiliary storage devices
20. Using examples, distinguished between:
(i) Primary and secondary (2 mks)
(ii) Fixed and removable disks
21. Explain the following storage devices
(i) Hard disk
(ii) Flash disk
(iii) Zip disk
23. (a) Compare a floppy disk and zip disk in relation to size ( 2 mks)
(b) Give three disadvantages of floppy disks as storage devices
24. (a) State three advantages of using hard disks as medium of storage
(b) Describe three precautions you would take to avoid damaging the hard disk ( 3mks)
(c)Describe the structure of a hard disk in reference to cylinders, tracks and sectors
25. State two reasons why Magnetic tapes are not commonly used as computer data storage medium
today
26. Differentiate between:
(i) Microcomputer and microprocessor
(ii) Volatile memory and non- volatile memory
(iii) RAM and ROM
(iv) Hard disk and floppy disk
(v) Magnetic and optical storage media
(vi) Hardcopy and softcopy output
(vii) MICR and OCR scanners
27. Explain four rules for handling magnetic disks
28. (a) Calculate the capacity in MB of a two sided floppy disk with 6 sectors per surface, and 512
bytes per sectors
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(b) A double – sided disk contains 40 tracks on each side. The tracks are divided into 9 sectors of
512 bytes each. What is the total capacity of the disk in megabytes? ( 2mks)
29. By giving examples, differentiate between primary and Secondary Computer storage ( 3 mks)
30. (a) State four functions of Read – Only Memory (ROM)
(b) Give three characteristics of ROM
(c)Name two different types of ROM
31. (a) Outline three characteristics of Random Access Memory (RAM)
(b) Name the two types of RAM clearly starting their differences (3 mks) size.
32. The diagram below shows as example of a secondary
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(b) State three advantages and one disadvantages of:
(i) Laser Printers
(ii) Inkjet Printers
40. Highlight four factors one should consider when purchasing a printer (4 mks)
41. List three advantages of a plotter over normal printer machines
42. Give two advantages of using sound output devices
43. George connected new multimedia speakers to his computer and tried to play his favorite music
CD, but no sound came out. Suggest two problems that might have occurred ( 2 mks)
44. List down 4 factors to consider when buying an output device
45. Define the following terms
(a) Port
(b) Data interface cable
(c) Power cable
46. State the function of the power supply unit found in the system unit (1 mk)
47. (a) Name any two peripheral devices which get their power supply through ports
(b) State the type of port that would commonly be used to connect the following devices
48. (a) Explain two differences between serial and parallel communication ports of a computer
(b) Give two major advantages of a USB interface cable over other cables in the computer
49. Outline three precautions one should take when assembling a computer
50. State six factors which you would consider when selecting computer hardware for an
organization
51. List down any four hardware components you can add or upgrade in a computer system
(4 mks)
52. (a) What is warranty with reference to the purchase of computers
(b) Why is it important to carefully study a warranty before committing yourself by signing it?
(c)List down three issues to understand about warrants
53. What are clones with reference to computers and what is their disadvantage? -
Clones are locally assembled computers
Disadvantages
54. (a) What is standard software?
(b) Small and large scale organizers are turning to the use of in- house developed software for the
processing activities rather than use of standard software
(i) What is in- house developed software?
(ii) Give two reasons that may be influencing these organizations for such a decision ( 2 mks)
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
55. Differentiate between single- purpose programs and integrated software
56. Explain the following considerations when purchasing software ( 2 mks)
(i) Authenticity
(ii) Portability
57. Differentiate between portability with reference to hardware and software
58. (a) Explain why documentation is necessary for any software package
(b) A firm intends to purchase new software. List three items of documentation that should
accompany the software
OPERATING SYSTEMS
1. The central processor and peripheral devices of a computer system are coordinated by the
operating system
(a) Define the term „operating system‟
(b) List two resources/ components that an operating system manages
(c) There are several types of operating systems in use today. State two examples of
Operating systems which you are familiar ( 2 mks)
2. Name the two latest operating systems from Microsoft corporation ( 2 mks)
3. Explain any four functions of an operating system software ( 8 mks)
What is an interrupt?
5. Give three ways in which operating system are classified ( 3 mks)
6. Giving an example in each case, explain the following types of operating systems
(a) Single – user / single tasking
(b) Multi- User/ Multi- tasking
7. A computer user may interact with a computer either through Graphical User
Interface (GUI) or though typed commands
(a) Give one advantage of using GUI based operating system over a command line interface ( 1 mk)
(b) Some computer systems still use command line interfaces. State two advantages of command
line interface
8. What is a deadlock in reference to operating systems?
9. Explain briefly the following concepts as used in the windows environment:
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
[email protected]
(a) Desktop
(b) Window
(c) Icon
(d) Sidekick menu
(e) Taskbar
(f) Task
10. Identify three functions of taskbar
11. State two differences between Disk Operating System (DOS) and Windows operating system
( 2 mks)
12. Identify three factors you would consider when choosing an operating system for use in a
computer ( 3 mks)
13. Explain how windows organizes information in reference to files and folders
14. (a) Distinguish between systems files and application files ( 2 mks)
(b) State the extensions used signifying the following file types (2 mks)
15. (a) List and explain down the three parts of the windows Taskbar ( 3 mks)
(b) Outline the procedure of renaming a file or folder using windows operating system (3 mks)
Method 1:
Method 2:
16. (a) What is a dialog box?
(b) List five settings that may be found in a dialog box
17. (a) Define „ folder/ directive tree‟
(b) Give two examples of root directories you know 1mk
- A:\
- C:\
- D:\
- E:\
(c) Give three uses of sub- directories or subfolders (3 mks)
18. The Hierarchical system represented below shows how a school organizes its files.
Study it and answer the questions below.
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
The F2 directory has the files: classlist.doc, Districts.xls, and the tribe.mdb. Write down the path of
accessing the Districts. xls file.
A:\SCHOOL\EXAMS\F2\Districts.xls (2 mks)
19. (a) (i) Explain the meaning of backup ( 2 mks)
(ii) Explain two methods you can use in windows to back up data into a storage device (2 mks)
(b) Identify two reasons why a user needs to know the space available for data storage in the hard
disk
20. Name the command one would use to repair cross- linked files in graphical user interface
software ( 1mk)
21. (a) Explain the team Disk Defragmenter, and give two advantages of this feature (3 mks)
Advantages
(b) Distinguish between disk compressing and disk defragmenting
22. Give two reasons why a new disk must be formatted before using it (2 mks)
23. (a) What is meant by the term „disk partitioning‟?
(b) Give two reasons why the hard disk may be partitioned
24. A Form four computer student is attempting to print a programming documentation. The
printer is not responding to the print command. Explain three possible causes for the anomaly. (3
marks)
25. State two purposes of the recycle bin. (2 marks)
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CONTACT MR ISABOKE
0746-222-000
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])
lOMoARcPSD|47482502
POWERED BY MR
ISABOKE
SUCCESS
CONTACT 0746-222-000
Downloaded FOR
by centrine afandi SIMILAR RESOURCES.
([email protected])