Form 1 Comp Final
Form 1 Comp Final
Specific objectives
By the end of the topic you should be able to:-
a). Define a computer
b). State the different parts that make up a computer
c). Explain how computers have developed
d). Classify the various types of computers
e). Identify areas where computers are stored used
f). State the safety precautions and practices in a computer laboratory
g). Demonstrate basic hands-on skills on the use of a computer
Computer is an electronic device that accepts user input (data) and transforms it under the influence of sets of
special instructions called programs to produce the desired output (information). The computer is said to be
electronic because it utilizes small electrical signals to process information.
Programs: Set of instructions written in computer language that directs the computer what task to
perform and how to perform it.
Data: raw facts that do not have much meaning to the user which include numbers, letters and symbols.
Information is the processed data that is meaningful to the user and can be used for decision making.
Data processing: The varied activities performed to convert data into useful information.
ICT(Information and Communication Technology) is the integration of computers and telecommunication
facilities for the purpose of communication. Computers come in different sizes and designs. The most
commonly used is personal computer (PC). They are mostly used in offices, schools, business premises and at
home.
CHARACTERISTICS OF A COMPUTER
➢ Fast: in terms of speed computer can perform calculations within seconds that human beings
would take hours to complete.
➢ Accurate: computer has high degree of accuracy regardless of the complexity and number of
times a calculation is performed.
➢ Versatile: computers are flexible in that they can be used to carry out different types of activities
such as typing, calculations and playing music.
➢ Reliable: if the program is executed any number of times with the same type of data every time
the result will be the same.
➢ Memory: computers have in-built memory used to store and recall (retrieve) large amount of data
compared to human memory recall.
➢ Diligent: computer can perform repetitive or routine tasks without getting bored, tired, fatigued
or loosing concentration.
➢ Automation: they run with a very little human interference.
Advantages Disadvantages
➢ Accurate ➢ Expensive
➢ Flexible ➢ Computer technology changes very fast
➢ Tackle huge volumes of data efficiently ➢ Installation of computers requires
➢ Output is presentable retraining of staff
➢ Computer is automatic ➢ They are prone to failure
➢ Computer records are more secure than ➢ Causes job displacement
manual
1
PARTS OF THE COMPUTER
A computer is made up of different components interconnected together in order to function as a single entity.
It is made up of a system unit and peripheral devices eg. Monitor, keyboard and mouse.
System unit
It’s the part that houses the internal components of a computer. It houses the brain of the computer called the
Central Processing Unit (CPU), motherboard, main memory, and the drives. Drives are used to store,
record and read data. The two common types of system units are Tower and desktop type.
Peripheral devices
They are connected to the system unit using special cables called data interface cables that carry data and
information to and from the devices. The cables are connected to the system unit using connectors called
ports.
Keyboard
A device that enables the user to enter data and instructions in the computer by pressing its keys.
Mouse
It is a hand held device enables the user to issue instructions to the computer by controlling a special mouse
pointer displayed on the screen.
Monitor
It is simply the screen used for displaying the output. It is called the monitor because it enables the user to
monitor or see what is going on in the computer.
2
CLASSIFICATION OF COMPUTERS
1. Physical size
2. Purpose
3. Functionality
Classification according physical size
➢ Supercomputers
➢ Mainframe computers
➢ Minicomputers
➢ Microcomputers
Supercomputers
Embedded computers
Are inbuilt within machines that they control. They have hidden inputs originating from the machines they are
controlling. Embedded computers are found in microwaves, digital cameras, digital watches and air
conditioners.
Dedicated computers
These are general purpose computers that are committed to a specific job or tasks. They are however capable
of performing a variety of tasks. An example is a computer set aside for graphic design or payroll processing.
Computers can be classified into three types according to the types of data they process. Data can either be in
discrete or in continuous form.
4
Digital computers
They process data that is discrete in nature. Discrete means that their values have only two possible states,
that is 0 or 1, or ON or OFF, or TRUE or FALSE.
Discrete data also known as digital data is usually represented using a two-state square waveform as shown
below.
+1
-1
Digital signal
Apart from PCs, most modern home appliances such as digital TVs, microwaves, wall clocks are digital in
nature.
Analog computers
It refers to computers that process data that is continuous in nature. They solve mathematical operations and
logical comparison by measuring the amount of change in physical magnitude e.g. speed, temperature, etc. are
dedicated to a single task.
Continuous data also known as analog data is usually represented using a continuous waveform as shown
below.
+1
-1
Analog signal
They are used in manufacturing process control like monitoring and regulating furnace temperatures, pressure,
etc. also used in application like in weather stations to record and process physical quantities eg., wind, cloud
speed, temperature etc
Hybrid computers
They are designed to process both analog and digital data.
5. Give two reasons why smaller computers like laptops tend to be more expensive than
desktop computers.
The technology of producing smaller devices is expensive.
Convenience because of their portability.
6. A computer is called electronic device because:
It uses electrical signals.
7. What is data?.
Raw facts inform of characters, symbols and numbers.
8. The following is true about the system unit.
➢ It houses the CPU, motherboard and drives.
➢ It connects to all peripheral devices using ports.
9. What is a mouse in relation to computing.
A pointing device that controls a pointer on the screen.
10. Why the screen is also called a monitor.
It helps the user to track what is going on in the computer.
11. Pick the odd one out in the list below
a) Calculator
b) Mobile phone
c) Robot
d) laptop
12. Pick the odd one out in the list below.
a. Mainframe.
b. Microcomputer.
c. Minicomputer.
d. Digital computer.
13. Which of the following would be most suitable for travellers?.
Supercomputer .
Mainframe computer.
Palmtop computer.
Minicomputer.
14. Why is a mobile phone regarded to be a computer?.
➢ It is electronic,
➢ It has a screen,
➢ It has a keypad,
➢ It has a memory
➢ It is programmable.
15. What is meant by analog data.
Continuous data.
16. Which of the following is called a microprocessor?
a. The CPU of a mainframe.
b. The CPU of a computer.
c. The CPU of a micro computer.
d. The CPU of a supercomputer.
6
DEVELOPMENT OF COMPUTERS
Historical development of computers can be traced back to the time human beings were struggling to
invent non electronic tools that would simplify arithmetic such:
➢ Abacus
➢ Napier's bones
➢ Analytical engine
➢ Slide rule
➢ Pascaline machine
Abacus
An Abacus was Chinese counting instrument which dates back to 3000 BC. The Abacus has
bead-like parts that move along rods. Each bead above the middle bar stands for five units.
Each bead below stands for one unit.
Analytical engine
The Analytical engine was designed by English mathematician, Charles Babbage in 1832.
The engine is recognised as the first real computer and Charles Babbage as the father of
computing.
COMPUTER GENERATION
FIRST GENERATION (1940-1958)
o Large in physical size
o Relied on thermionic valves (vacuum tubes) to process data
o magnetic drum memory for data storage
o Consumed a lot of power
o Produced a lot of heat
o The computers constantly broke down due to the excessive heat generated; hence were short-
lived, and were not very reliable
o Their internal memory capacity/ size was low
o Processing speed was very low
o Very costly
o Were difficulty to program, use and maintain
o Examples: Electronic Numeric Integrator and Calculator (ENIAC), Electronic Discrete
Variable Automatic Computer (EDVAC), Universal Automatic Computer (UNIVAC) and
IBM 650.
7
SECOND GENERATION (1958-1964)
o Used transistors for processing
o Magnetic core memories for data storage
o Consumed less power and produced less heat than the first generation computers
o Were relatively faster
o Were slightly smaller in size compared to the first generation
o Were less costly
o Were difficulty to program, use and maintain
o Examples: IBM 1401, IBM 7094 and UNIVAC 1107
THIRD GERERATION (1964-1970)
o Used integrated circuits (ICs) in their processors. IC is a small chip made of silicon.
o Semiconductor memories or magnetic disks for storage.
o Increased processing speed and storage capacity
o Reduction in size and cost
o They were faster than second generation
o Were easier to program, use and maintain.
o Examples: IBM 360, ICL 19000 series
FOURTH GENERATION (1970-1989)
o The circuit technology used was large scale integrated (LSI) and very large scale integrated
(VLSI) circuits
o The LSI and VLSI were used in the innovation and technological development of the brain of
the computer called the microprocessor. Microprocessor is a complete central processing unit
used in microcomputers.
o Used semiconductor memories, magnetic memories bubble memories and optical disks for
storage purposes
o Were very fast and had high processing speed
o First operating system was introduced
o Easier to use and program
o Examples: IBM 370 and 4300, Honeywell DPS-88 and Burroughs 7700.
FIFTH EDITION (1990-Present)
o computers have very high processing power and speed
o Size is increasingly becoming smaller because of superior hardware and software products
that are small in size.
o Emit negligible heat
o Have special instruction sets that allow them to support complex programs that mimic human
intelligence referred to as Artificial Intelligence (AI). Therefore the circuit technology is AI,
parallel architectures, three Dimensional circuit design and super-conducting materials.
o Use advanced hard disks and optical disks for storage e.g. DVDs
o Perform multiprocessing
o Use multi-user operating systems and advanced application programs
o Massive connectivity to Internet and intranet.
Impaired persons
- converts speech to text for the deaf
- converts spoken language to sign language for the deaf.
- Converts text to speech for the blind using speech synthesizers. 9
REVIEW QUESTIONS 1.2
1) Match the following generations of computers with the technology used to develop them.
1. First Generation A .Very Large Integrated Circuit
2. Second Generation B. Thermionic Valves (vacuum tubes)
3. Third Generation C. Artificial Intelligence
4. Fourth Generation D. Integrated Circuits
5. Fifth Generation E. Transistors
2) Identify and explain at least five areas where computers are used to process data.
- Supermarket, airport, hospital, offices, banks, industries etc.
3) What were the characteristics of first generation computers?
a. Large in physical size
b. Relied on thermionic valves (vacuum tubes) to process data
c. magnetic drum memory for data storage
d. Consumed a lot of power
e. Produced a lot of heat
f. The computers constantly broke down due to the excessive heat generated; hence were
short-lived, and were not very reliable
g. Their internal memory capacity/ size was low
h. Processing speed was very low
i. Very costly
j. Were difficulty to program, use and maintain
8) Match the following computer application areas with the role played by computers in each
case.
10
COMPUTER LABORATORY
It is a special room set aside and prepared specifically for safe installation and use of computers. In
schools it provides a safe conducive environment for teaching and learning of computer studies and
ICT related disciplines.
Factors to consider while preparing a computer lab
• Security of computer hardware and software
• Reliability of the source of power
• Maximum number of computers to be set up or installed.
• Maximum number of users that the laboratory can accommodate.
Safety precautions and practices
They are divided into two those meant to protect computer and those meant to protect the users
Measures that protect computers
i. Burglar proofing the room: fitting grills on doors, windows and roof, installation of alarms
and employing security guards.
ii. Protection against fire
Fire in laboratories is either caused by inflammable chemicals used for cleaning and servicing
computer equipment or electrical faults due to open wires or cables and sometimes cigarette
smokers. Install fire prevention and control equipment such as smoke detectors, a gaseous
fire extinguisher filled with carbon dioxide and should be non-liquid or non-power based.
The reason is that liquids may cause rusting and corrosion of computer components while
powder particles may increase friction and wear off moving parts and/or cause disks to crash
iii. The room should be well laid out: with enough space for movement. Cables should be laid
out in trucks away from user paths to avoid people stumbling on them.
iv. Providing stable power supply: to protect the computer from being damaged due to power
instabilities, avoid connecting directly to the main power supply. Instead it should be
connected to a special device called uninterruptible power Supply (UPS) and then connect the
UPS to the mains.
Function of UPS
- It regulates power from unstable power source to the required clean stable voltage
- It temporarily provides power to the computer in case of a sudden power failure.
- Alerts the user when the power goes off by producing a beep sound.
UPS
11
Surge protector
Surge protector or surge suppressor is used to guard a computer against surges. A surge is
fluctuation in power. These fluctuations happen mostly during storms.
v. Dust and dump control: by fitting good windows, curtains and air conditioning system that
filters dust particles from the air entering the room. Cover computers using dust covers when
not in use. Humidity should be regulated by using dehumidifiers in the room to remain an
optimum of 50%. Humidity lower than this allows static electricity to built up and cause damage
to computer components. High humidity of over 70% may cause rusting of metallic parts.
vi. Cables and power sockets should be well insulated: to avoid short circuits.
vii. The user should not eat or drink: in the computer lab. Food particles may fall in moving
computer parts like keyboard and clog them while liquids may pour into electrical circuits
causing rusting, electrical faults, or short circuits..
The eye must be at the same level as the top of the screen (monitor) when user is seated upright as
show in the figure below:
12
❖ Providing antiglare screens like Light filters and adjustable screens to avoid eye strain and
fatigue caused by over bright CTR monitors. Alternatively you use LCD monitors.
❖ Ventilation
There must be good air circulation to avoid suffocation or dizziness caused by lack of oxygen and to
allow computers to cool hence avoid damage to electronic parts. A computer laboratory should be
fitted with a HVAC (Heating, Ventilation, and Air Conditioning) system. This system controls the
temperature, air flow and humidity within a room, ensuring that the computer equipment does not get
over-heated, and the occupants of the laboratory are comfortable.
❖ Avoid overcrowding. Overcrowding in the computer laboratory should be avoided others users
will suffocate.
❖ Lighting: Computer room should be well lit to avoid eyestrain that leads to headaches, stress and
fatigue. The monitor should be positioned such that glare or bright reflections on the display are
minimized. Radiation filter screens like anti-glare screen may be fitted as shown below:.
13
COMPUTER LAYOUT
- Should be such that an instructor (tutor) can teach from the front. There should be enough room
between rows so that a person can easily move about the room. This can be attained by using
the two popular patterns for laying desks in a computer laboratory namely classroom pattern
and conference pattern. Figures below shows these layouts.
Whiteboard
White board
- The computer once switched on, you hear the sound of a cooler fan running. After a view
seconds, lines of text start to scroll on the screen as the computer goes through a process of
Power-On Self-Test (POST), before it starts in preparation for use. POST is directed by a special
firmware called Basic Input Output System (BIOS) which is held in ROM chip mounted on the
motherboard. The POST checks whether existing storage, all basic Input/Output devices and
system components are working properly. If any of the devices has a faulty or is missing, the
process may stop or halt then an appropriate error message is displayed on the screen.
- After POST, the computer reads some instructions such as the current time and date from special
memory known as the complementary metal-oxide semiconductor (CMOS). CMOS is a special
memory where instructions for current date and time are contained. CMOS is powered by a dry
cell that resembles that of a digital watch. If the cell is down, the computer would always
require the user to enter the current time and date. Lastly, after the checks the operating 15
system is read from the hard disk and loaded to the memory (RAM) in a process called booting.
Once the operating system is successfully loaded, a user-interface called desktop is displayed.
- The entire process that makes the computer ready for use is called Booting up.
Types of booting
i) Cold booting {bootup}
Process of switching on a computer that has been off completely by pressing the power button.
ii) Warm booting
This happens when the computer, originally on, is forced to restart by pressing the restart button on
the system unit or using the restart command on Start menu
Shutting down a computer
If the right process is not followed, the loss of data, damage of programs and computer components
may occur. The process is as follows:
• Ensure that all the work has been properly stored (saving)
• Close all the programs that may be currently running
• Click the start button
• On the start menu click turn off computer
• On the message box the appears click turn off
• The computer will undergo the shutdown process
Importance of shutting down computer using proper procedure
➢ To avoid loss of data and information
➢ To avoid damage of system and application files
➢ To avoid the damage of storage devices that could still be in use
KEYBOARD
16
Dvorak Layout on Windows
Most of the keyboards have the typing keys Q,W,E,R,T,Y on the upper low hence they are known as
QWERTY keyboards. The other keyboard layouts include Dvorak and Colemak.
The keys are classified in five categories: alphanumeric (typing) keys, function keys, cursor
movement and editing keys, special keys and numeric keypad keys.
Alphanumeric keys
✓ Include letters A – Z, numbers 1, 2, ……..0 and special symbols such as !,%,&.
✓ Caps lock key: pressing this key lets user to type in upper case letters (capitals)
✓ Enter key (return key): pressing this key forces the text cursor to move to the beginning of the
next line. It also instructs the computer to execute a command that has been selected on the
screen. A cursor is a blinking underscore ( _ ) or a vertical beam (I) that shows where the next
character to be typed will appear.
✓ Tab key: used to move the text cursor at set intervals on the same line eg. 10mm, 20mm, etc
✓ The space bar: creates a space between the words during typing.
✓ Backspace: deletes characters from right to the left on the same line.
Function keys
These keys are located on top of the keyboard. They are labeled F1, F2 …. F12. each of these
keys is used for a special function or job. Example pressing F1 invokes the on-line help, Pressing
F7 starts Spelling and Grammar Checker
Cursor movement and editing keys
Cursor movement(navigation) keys: are used to move the cursor on the screen.
They include: Home, End, Pageup / Pagedown and Arrow keys.
✓ Arrow keys: pressing the right or left key moves the cursor one character to right or left
respectively. Pressing the upward or downward arrow key moves the text cursor one line up
or down respectively.
✓ Page up and page down keys: page up moves the cursor up one page and page down moves
cursor down one page in case a document has many pages.
✓ Home and end keys: Home key moves the cursor to the beginning of the current line while
end key moves the cursor to the end of the current line.
Editing keys: Editing keys are used to erase (delete) or insert characters in a document
✓ Insert key: help the user to insert or replace a character at the cursor position.
✓ Delete (Del) key: deletes characters at the cursor position from left to right.
Special purpose keys
They are used in combination with other keys to give certain commands to a computer. Example
CTRL + ESC is used to display the start menu. They include: SHIFT, CTRL, ALT and ESC.
Ctrl key:
used for shortcuts in combination with other keys e.g. holding down Ctrl + S activates Save command,
17
Shift Key
used for typing alternative characters for keys that represent more than one character e.g. Shift + 5 types
operator %.
Changing cases i.e. if the Caps Lock light is not illuminated and you hold down the shift key and press a
letter key, the upper case version of the character will be generated. The opposite will happen if the Caps
Lock light is illuminated.
If you hold down Shift key as you delete folders/files from hard disk they will bypass recycle bin folder
and get deleted (discarded) completely.
Numeric keypad keys
They are located on the rightmost part on the keyboard. They have digits marked on the in rows from
bottom upwards ie 0-9. They have numbers in compact form and helps in rapid entry of numeric
data. Apart from the digits the numeric keypad has some mathematical symbols also marked on its
key e.g /, +,\, -, *.
Note: that the numbers on the numeric keypad can only be used when the Num Lock key is turned
on. The key is situated on the numeric pad.
They can also be used as cursor movement keys and editing keys when Num Lock key is turned off.
Some portable computers lack numeric keypad due to size limitations.
The Num Lock used to switch between numbers, editing and navigation keys on the numeric
keypad.
Toggle Key
A toggle key is a key that is used to turn a function on or off, or to switch between two functions.
A toggle key is turned on or off when pressed; they need not be held down while pressing other keys.
Most keyboards have lights indicating whether the keys are switched on or off. Some operating
systems and applications also display the toggle key status on the screen. Examples of toggle keys
are the caps lock key, number lock key and scroll lock key.
Caps lock key: which alternates the letter keys between uppercase and lowercase.
Num lock key: it toggles the input of the numeric keypad. When Num Lock is on, the keypad can be
used to enter numeric values. When Num Lock is off, they keys provide different input. For example,
4 is left arrow, 6 is right arrow, 8 is up arrow, and 2 is down arrow.
scroll lock key: which allows arrow keys to scroll through window's contents and allows users to
scroll without depending on the scroll bar. When the scroll lock mode was on, the arrow keys would
scroll the contents of a text window instead of moving the cursor.[
Insert key: it toggles between overtype mode (which overtypes characters) and insert mode (which
inserts characters) while entering text.
MOUSE SKILLS
✓ Clicking: this means pressing and releasing the left mouse button once. A click often selects an
object.
✓ Double clicking: This means pressing the left button twice in quick succession. Double clicking
usually opens a file or starts a program.
✓ Right clicking: Pressing the right hand mouse button once displays a list of commands from
which the user can make a selection. This list called shortcut menu or context sensitive menu. It
is called a context sensitive menu because the commands on it apply to the right-clicked item.
✓ Drag and drop: this is where the user drags an item from one location on the screen to another.
Review questions 1.4
1) What is booting?
Booting refers to a process whereby the computer goes through a process of self-test and
preparation for use.
2) Differentiate between cold booting and warm booting. 18
Cold booting is starting up a computer which was originally off while warm booting is restarting
a computer which was already on.
3) What is the difference between function keys and special PC keys?
Function keys are used for a special function or perform a specific task while special purpose
keys are used in combination with other keys to give certain commands to a computer.
4) Explain the various categories of keys found on a standard keyboard.
➢ Alphanumeric (typing) keys: this are typing keys and include; A-Z and 0-9
➢ Function keys: are used for a special function or perform a specific task F1,F2….F12
➢ Cursor movement and editing keys: help in cursor movement eg. Arrow keys and editing
keys help in deleting or inserting characters in a document eg. Insert and delete keys.
➢ Special keys: are used in combination with other keys to give certain commands to a
computer. Eg. SHIFT,CTRL
➢ Numeric keypad keys: consists of set of numbers 0-9 and arithmetic signs ie +,-,*,/
5) Define the following terms:
a) Clicking: this means pressing and releasing the left mouse button once. A click often selects
an object.
b) Double clicking: This means pressing the left button twice in quick succession. Double
clicking usually opens a file or starts a program.
c) Right clicking: Pressing the right hand mouse button once displays a list of commands from
which the user can make a selection. This list called shortcut menu or context sensitive menu.
It is called a context sensitive menu because the commands on it apply to the right-clicked
item.
d) Drag and drop: this is where the user drags an item from one location on the screen to
another.
e) Mouse pointer: the pointer that echoes movements of the pointing device, commonly a
mouse or touchpad. The pointer is the place where actions take place that are initiated
through direct manipulation gestures such as click, touch and drag
f) Cursor: A cursor is an indicator used to show the position on a computer monitor or other
display device that will respond to input from a text input or pointing device.
g) Insertion point: The text cursor or insertion point represents the point of the user interface
where the focus is located. It represents the object that will be used as the default subject of
user-initiated commands such as writing text, starting a selection or a copy-paste operation
through the keyboard.
6) What makes a mouse move a pointer on the screen?
Moving the mouse on any direction on a flat surface.
7) Explain the correct procedure for shutting down of the computers in the computer
laboratory.
• Ensure that all the work has been properly stored (saving)
• Close all the programs that may be currently running
• Click the start button
• On the start menu click turn off computer
• On the message box the appears click turn off
• The computer will undergo the shutdown process
Revision questions
1. Explain why smoke and dust particles are harmful to a computer
Dust and smoke settles on storage devices scratching them during read/write operation.
2. Explain the emerging trends in a microcomputer technology in relation to size.
PCs are becoming small and portable e.g. Personal Digital Assistant (PDA).
3. describe the ideal environment for a computer to work properly 19
Free from dust, water, magnets, well ventilated rooms, medium humidity, etc.
4. Explain the term system unit and name some of the components found in the system unit
It’s the part that houses the brain of the computer called the Central Processing Unit (CPU),
motherboard, main memory, and the drives
5. What is booting? Explain what happens in the computer during the booting process.
Starting up a computer. Internally it first checks whether all the components are in good
working condition then loads the operating system.
6. State on reason why a computer needs to be connected to a stable power source.
To avoid damage and loss of data.
7. Give two examples of special purpose computers
Mobile phones, calculators, robots etc.
8. Why would it not be good to install water based fire extinguishers in the computer room?
Water causes rusting of metallic parts and short circuits if used.
9. Explain the following terms: clicking the mouse, right clicking the mouse, double clicking
the mouse
➢ Clicking-pressing and releasing the left mouse button once.
➢ Double clicking-pressing the left mouse button twice in a quick succession. Double clicking
usually opens a file or starts a program.
➢ Right clicking-pressing the right mouse button once displays a list of commands from which
the user can make a selection. This list of commands is called a shortcut menu or context
sensitive menu. It is called a context sensitive menu because the commands on it apply to
the right-clicked item.
10. What precaution would you take in the computer room in case:
a) The humidity falls below normal for prolonged periods due to weather change.
Install humidifiers in the room,
b) Users complain of backaches after long periods of using the computer.
Improve furniture to avoid bending when using the computer.
11. Classify the following keyboard characters
a) A, B, C, …Z - alphanumeric keys
b) 0,1,2,…9 - numeric keys
c) F1, F2, …F12 - function keys
d) Del, Insert - editing keys
e) Home, End, Page UP, arrow key - Cursor movement keys
f) Ctrl, shift, Alt - Special purpose keys
20
COMPUTER SYSTEMS
Specific objectives
By the end of the topic, the learner should be able to;
a) Describe a computer system
b) Explain the functional organization of the elements of a computer system
c) Describe input devices of a computer system
d) Describe the Central Processing Unit (CPU)
e) Describe the output devices of a computer system
f) Describe the types of secondary storage devices and media
g) Distinguish between power and interface cables
h) Explain basic computer setup and cabling
i) Distinguish between system software and application software
j) Evaluate the criteria for selecting a computer system.
Introduction
A computer is made up of two main components Hardware and Software while a computer system
has three components namely: Hardware, software and liveware (computer user).
A system is a collection of different entities that collectively work together to achieve a desired goal.
Examples of systems are human body, social system, school system etc.
A computer system is a collection of three components namely hardware, software and liveware
entities that work together to receive, process, manage and present information in a meaningful
format using computers.
ii). Software
Is a set of instructions or programs that direct a computer on what to do. They guide the computer in
each and every activity that happens inside the computer during data processing. The programs are
also written to help the computer users perform various tasks using the computer. The software is
intangible, flexible and changeable in nature. They are mainly classified into two categories namely
system software and application software.
COMPUTER HARDWARE
The computer hardware is classified into four categories namely:
i). Input devices,
ii). Central processing unit,
iii). Output devices
iv). Storage devices.
21
22
Input devices
These are devices which accept data and send it to the CPU. They convert user input which is in
human readable form to machine language that a computer can process. The input devices have two
tasks to perform:
➢ Read data from the medium from which it is stored
➢ Code it into a form that can be understood by the computer
Input devices are classified according to how they are used to enter data as follows:
i). Keying devices i.e. keyboard, keypad
ii). Pointing devices i.e. mouse, joy stick, light pen, track ball.
iii). Scanning and other data capture devices
iv). Speech recognition or voice input devices
v). Touch screen, digitizer and digital cameras
1) Keying devices
Keying or typing is the most common way to input data. A keying device converts typed numbers,
letters and special characters into machine readable form before processing takes place.
Advantages of keyboard
▪ It’s very reliable compared to other methods of text input (voice input)
▪ Is very cost effective, since every computer comes with a keyboard and there are no
additional costs.
2) Pointing devices
Enter data or instructions by controlling a pointer or cursor on the screen. Some examples pointing
devices include:- mouse, trackball, joystick, light pen, and stylus.
i) A mouse
Enter data or instructions by controlling a pointer on the screen. Generally there are three types of
mice available in the market today namely mechanical, optical and cordless.
23
c) Cordless ( wireless) mouse
Cordless or wireless mouse is a battery powered mouse that uses radio or infrared waves
instead of being physically connected to the system unit.
Uses of a mouse
- To select options from menus or from a set of icons by clicking the mouse button.
- To position the cursor when editing text or using design package
- To select an object in a drawing or a piece of text to be copied, moved or deleted.
ii). Joystick
Is a hand held device used for playing computer games and video games. It allows the fast
interaction needed in games. The user controls game actions by varying the pressure, speed and
direction of the joystick. Just like mouse, it has a button which is used for selecting an item, issue
commands or trigger actions.
24
Uses of light pen
- Are used as design aids
- Used to read bar codes and to indicate a point on the a screen or pad
Advantages
- Provide a direct mode of input
- More precise than using a mouse
Disadvantages
- Can only detect the presence and absence of light
- Can only be used in conjunction with a graphic VDU, which is able to sense special hardware
and software.
Uses of OMR
- Are used to mark multiple choice questions, e.g. KCPE or aptitude test.
- analyzing responses to structured questionnaires
- Insurance premium collection
- Selecting correct number combinations from lottery tickets.
- Supermarkets for stock recording
- Payroll data entry
- Market research questionnaires
- Voter’s registration process
25
Advantages
- Has low error rate
- Conspicuous errors are easily corrected
- Economical where the volume of data is large
- Data captured at source, hence no data entry errors
Uses
- On labels and on shelves for stock taking
- Printed on shop goods e.g. supermarkets
- In libraries
Advantages
i). Data is captured at source hence errors are limited
ii). Its an easier method to use
iii). Document design is less complicated
iv). Characters can be read by people
Disadvantages of OCR
- Some optical scanners are expensive
- Handling precaution necessary e.g. document should not be folded or creased for accurate reading
26
Uses
- Sale order forms
- Stock taking sheets
Advantages of MICR
- Its fast, accurate and automatic
- The codes are both machine and human readable.
- Reduces forgery i.e. its difficult to forge
Disadvantages
- MICR system is limited to only 14 characters
- MICR system is based on magnetism and can easily be damaged.
Applications
- On credit cards
- On bank cards e.g. ATM
- As a phone card
- Production control where punched cards holds data in a factory like employee’s details
- Access control for security reasons in many offices to control access to buildings or rooms
- Car parks where badges are used to raise car barriers, allowing entry or exit from a car park.
Advantages
- Simple to produce
- Not easily damaged
- Stores fairly large number of characters
27
Disadvantage
- Data can be changed or erased by magnetic fields
Advantages
- No keyboards is necessary useful in situations where hands or eyes are busy handling
documents etc
- People are moving around, since wireless microphone can be used.
- Can be used from remote locations via the telephone
Disadvantages
- Homophones: some words sound the same e.g. Fair & Fare
- Recognition is low
- Speaker variability
- Limited vocabularies
- Background noise can disrupt the data entered
28
b). Digital cameras
Capture the same way as other cameras do but stores image in digital form. Pictures are stored on a
memory card instead of a film. The digital image taken can be streamed directly into a computer,
uploaded to internet using a webcam or directly printed using a special photo printer. Are used to
take electronic pictures of an object. They are of two types:
1. still digital camera one that can take still images i.e. photographs and another
2. a video digital camera that takes motion pictures.
c). Digitizers
A digitizer also known as graphic tablet, is made up of a flat surface and allows the user to draw an
image using a stylus. The image drawn does not appear on the tablet but on the computer screen.
The stylus moves on the tablet and the drawing is directly reflected on the screen. Digitizers are used
for tracing highly detailed engineering and architectural drawings and designs.
29
Factors to consider when selecting an input device
- Device cost :The initial cost and recurrent cost to be weighed against the expected benefits and /or
operational characteristics of the facility
- Device speed: the device should enter data very fast to safe on time.
- Data volume: It should cope with that data volume to be input with appropriate timing.
- Device accuracy: the device should be able to enter data without errors.
- Device reliability: can the device work with consistency.
- Mode of operation: This will depend on the nature of the system i.e. data processing system.
- Type of data to be input: the kind of data to be input eg. Barcode reader can be used to enter data
with barcodes.
TURNAROUND DOCUMENT
- A turnaround document is a document that has been output from a computer, some extra
information potentially added to it, and then returned to become an input document. For example,
meter cards are produced for collecting readings from gas meters, photocopiers, water meters etc.
- Name any two data capture techniques that make use of turnaround documents.
- - Optical character recognition (OCR)
- Optical Mark Recognition (OMR)
- Magnetic Ink Character Recognition (MICR)
- Optical Bar Recognition (OBR)
QR code is the trademark for a type of matrix barcode (or two-dimensional barcode). A barcode is a
machine-readable optical label that contains information about the item to which it is attached. In
practice, QR codes often contain data for a locator, identifier, or tracker that points to a website or
application. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary,
and kanji) to store data efficiently; extensions may also be used
Very simply, they are barcodes, not too dissimilar to the barcodes you seen on the packaging of
almost every product you buy. The main different between QR Codes and what you may refer to as a
traditional barcode, is that QR Codes can store many times more data in a much smaller surface area.
This is due to their ability to store data in 2 dimensions rather than 1.
To read the data stored within a QR Code you will need a scanner of some sort. You don't need
special, dedicated or expensive hardware to read a QR Code, scanners can be as simple as an app on
your smartphone that uses the camera and some decoding algorithm.
• High Capacity - store a lot more data, allowing for real content to be stored and not just IDs
or references.
• Require Less Space - Get the same data stored over a much smaller surface area.
• Dust And Damage Resistant - Even when damaged there is a chance they are still readable.
• Readable From Any Direction - Scan them from any angle, readers don't need to be aligned
to the orientation of the code.
• Structured Appending - Data can be split over multiple codes which when scanned can be
30
combined to reconstruct the original content.
QR Codes are appearing everywhere with many creative uses, today they can be found in magazines,
newspapers, food packaging, supermarkets, games and on giant billboards. They are flexible, very
cheap and their scope of use is very large.
The entire purpose of a QR Code is to quickly and easily get data from a printed medium to a digital
medium such as a barcode scanner or your smartphone where it can be processed. This can be for
simple stock taking or to provide digital contents to support an experience or physical product.
Compatibility is key to the rising popularity, and the availability of free scanners on all the major
smartphone platforms means almost everyone has their own scanner on an internet connected device
at all times.
4. The automated input technique where keying of input data is eliminated is sometimes referred to
as __________.
5. The type of scanner used to grade multiple choice examination is called an ________________.
6.Name three factors one would consider when selecting data entry method, and give a reason
why each is important.
✓ Device cost :The initial cost and recurrent cost to be weighed against the expected benefits
and /or operational characteristics of the facility
✓ Type of data to be input
✓ Device speed
✓ Data volume: It should cope with that data volume to be input with appropriate timing.
✓ Device accuracy
✓ Device availability
✓ Mode of operation: This will depend on the nature of the system i.e. data processing system.
7. Describe three different optical and two magnetic techniques used for input and give an
example of the use of each.
✓ Optical: OMR, OBR and OCR
✓ Magnetic: MICR and Magnetic strip
9.Describe two situations in which speech recognition devices may be useful as a method of
data entry.
✓ For people with special needs (disabilities)
✓ In language translator programs
✓ Voice tags for voice dialing
31
10. Optical scanning of the Universal Product Code is now widely used as input method.
Give an example of a place where it is used and explain how it is used.
Supermarkets and superstores. To capture prices of goods from bar codes.
CPU is also called the Processor or microprocessor is a tiny chip etched into a silicon chip. The CPU
is the most important component of the computer. It is actually regarded as the brain of a because all
processing activities are carried out inside the processor.
In microcomputers, the CPU is housed inside the system unit where it’s mounted on a circuit board
called the motherboard or the system board.
MAIN MEMORY
Send results to Fetch data and
main memory instructions from
RAM
❖ Control unit
CU controls / coordinates all processing activities in the CPU using a system clock, which sends
electrical signals. The CU interprets instruction fetched from the Main Memory and sends control
signals to the ALU instructing it on how to execute instructions, issue control instructions to the
operating system, determines the operation to be performed by the instruction, where the results are
to be stored, and where the next instruction is located. The CU fetches data from the main memory
and puts it in the proper order for the processor. It also sends the processed results back to the main
memory. The CU also locates any data needed by the instruction and sees that the instruction is
followed.
The primary memory is used for temporarily holding data and instructions required immediately by
the CPU and contents are lost once the power is switched off. Secondary storage is used for
permanently storing information by the CPU and is not lost when power is switched off.
Primary memory
Is of two types Read Only Memory (ROM) and Random Access Memory (RAM).
RAM
ROM
A). Read Only Memory (ROM)
Used to store firmware from hardware manufacturers and/or programmed instructions and data
permanently or semi-permanently. Its contents can be read but cannot be written back or you cannot
store anything in ROM during normal computer operations. ROMs are used in computers for
permanent storage of instructions such as
- Power On Self Test (POST)
- The Basic Input Output System (BIOS)
- The bootstrap loader (the automatic program that finds and loads the operating system program
from disk) so that the computer has something to do when power is first applied.
Types of ROM
i). Mask Read Only memory (MROM) 33
Contents are written once by the manufacturer and cannot be changed afterwards.
Disadvantages of ROM
- Are not cost effective because of large production volumes
- A ROM cannot be changed, once manufactured.
- Delay in production of the ROM.
B). Random Access Memory (RAM)
RAM is mostly referred to as working storage. RAM holds the programs being run and the data
being used by the CPU at the current time. Its contents can be read directly regardless of the
sequence in which it was stored. RAM can be written to and retrieved from. RAM is the memory
used in large quantities in Main Memory and every computer must specify its size. Ram holds the
programs being run and the data being used by the CPU at the current time.
Characteristics of RAM
- Data can be read and written in it. 34
- It’s temporary (volatile) storage , its contents are lost/ disappears when the computer is
switched off.
- It’s contents is user defined.
Types of RAM
There are two types of RAM namely Static RAM (SRAM) and Dynamic RAM (DRAM)
i). Static RAM (SRAM)
SRAM is a fast type of memory found inside a microprocessor.
Characteristics
- Stores a bit of information within a flip-flop
- It’s a very fast memory and holds its contents as long as there is power.
- Its content does not require refreshment
- Its expensive
- Its very fast compared to DRAM
- Its mostly used to make special types of memories known as Cache memory
- Used for smaller memories
ii). Dynamic RAM (DRAM)
The term dynamic refers to the tendency for stored charge to leak away, even with constant power
supply. Due to this DRAM requires periodic recharging referred to as refreshing to maintain its data
storage.
- Stores a bit of information in a charge and (a disadvantage) additional logic is needed for
refreshing the memory.
- It holds its contents for a short while even when the power is on. To maintain its content it
must be refreshed severally per second.
- Is less expensive than SRAM
Summary of Computer memory
Computer Memory
RAM ROM
MROM
SRAM PROM
DRAM EPROM
EEPROM
EAROM
The central processing unit exchanges data with the main memory and input/output devices. The
control unit fetches data and instructions from the main memory then sends to ALU for execution in a
process called fetch execute cycle.
Fetch-Decode-Execute Cycle
FETCH
(Seeking for data
and instructions)
EXECUTE DECODE 37
(Obeying the (Interpreting the
instructions) instructions by the
CU)
Fetch
The first step the CPU carries out is to fetch some data and instructions (program) from main
memory then store them in its own internal temporary memory areas. These memory areas are called
'registers'. Ie. The program counter (PC) holds the address of the instruction to be fetched next. The
fetched instruction is loaded into instruction register (IR). This is called the 'fetch' part of the cycle.
For this to happen, the CPU makes use of a vital hardware path called the 'address bus'. The CPU
places the address of the next item to be fetched on to the address bus. Data from this address then
moves from main memory into the CPU by travelling along another hardware path called the 'data
bus'.
Decode
The next step is for the CPU to make sense of the instruction it has just fetched. This process is
called 'decode'. The CPU is designed to understand a specific set of commands. These are called the
'instruction set' of the CPU. Each make of CPU has a different instruction set. The CPU decodes the
instruction and prepares various areas within the chip in readiness of the next step.
Execute
This is the part of the cycle when data processing actually takes place. The instruction is carried out
upon the data (executed). The result of this processing is stored in yet another register. Once the
execute stage is complete, the CPU sets itself up to begin another cycle once more.
Types of processors
A microprocessor is a complete CPU where ALU and Control unit has been combined into tiny
single processor. The microprocessor chips use many different internal designs, and the chips vary in
appearance and capability.
- Complex Instruction Set Computer (CISC) is the name given to types of processors that use a
large number of complicated instructions microcoded into the processor, to try to do more work.
- Reduced Instruction Set Computer (RISC) is the name given to processors that use a small
number of simple instructions meant to do less work with each instruction but execute them
faster.
A Multicore processor is a single computing component with two or more independent central
processing unit. They have several independent cores which works together in parallel.
A Multicore microprocessor is one which combines two or more independent processor into a single
package, often a single integrated circuit • Eg:Dual core contains only 2 independent microprocessor
DUAL-CORE: refers to a CPU that includes two complete execution cores per physical
processor. It has combined two processors and their caches and cache controllers onto a single 39
integrated circuit (silicon chip). Dual core chip is that tasks can be carried out in parallel streams,
decreasing processing time. For example, AMD Phenom II X2 and Intel Core Duo.
Dual Core Processor Performance a. each core handles incoming data strings simultaneously to
improve efficiency. b. advantages of a dual-core processor over the single processor is a performance
gain. c. amount of improvement varies both with the hardware and software involved and also with
the particular task the user is doing.
Dual Core Processor Speed: a dual core system is faster than a single- core system, when everything
else is equal. SMT enables parallel multi-threading increases the speed of processor. Multi-core
processor is that it each processor acts independently from one another
Clock speed: Clock speed is a measure of how quickly a computer completes basic computations and
operations. Most clock speed measures is very high, the terms megahertz and gigahertz are used. A
megahertz is one-million cycles per second, while a gigahertz is one-billion cycles per second. So a
computer with a clock speed of 800MHz is running 800,000,000 cycles per second, while a 2.4GHz
computer is running 2,400,000,000 cycles per second.
QUAD CORE: Quad-core refers to a CPU that includes four complete execution cores per physical
processor. It has combined four processors and their caches and cache controllers onto a single
integrated circuit (silicon chip). Quad core chip is that tasks can be carried out in parallel streams,
decreasing processing time
Applications of quad core processor:- Light Wave 3D combines a state-of-the-art renderer with
powerful, intuitive modeling, and animalization. Light Wave is enjoyed worldwide, as a complete
3D production solution for feature film, television visual effects, broadcast design, • print graphics,
visualization, game development, and Web. Light Wave is a software package used for rendering 3D
images, both animated and static
PENTACORE: Pentacore refers to a cup that includes five complete execution cores per physical
processor.It has combined five processor and their caches and cache controllers on to a single
integrated circuit • Penta-core chip is that tasks can be carried out in parallel streams, decreasing
processing time • for example AMD phenom,intel i5
Pentacore processor performance: each core handles incoming data strings simultaneously to
improve efficiency. Advantages of a pent core processor over the dual processor is a performance
gain. Amount of improvement varies both the hardware and software involved and also with the
40
particular task the user is doing
Penta-core processor speed: Penta-core system is faster than a tri core system, when everything else
is equal. SMT increases the speed of the processor. Penta-core processor is that it each processor acts
independently from one another
Benefits of pentacore: Increased performance, faster memory, improved storage capacity, Enhanced
reliability and increased flexibility.
HEXA CORE: hexa-core refers to a CPU that includes six complete execution cores per physical
processor. It has combined six processors and their caches and cache controllers onto a single
integrated circuit (silicon chip). Dual core chip is that tasks can be carried out in parallel streams,
decreasing processing time
Features of hexa-core processor on real world • 22nm tri gate 3d -transistors • 8 cores ,16 threads •
20 mb smart cache • Turbo boost technology • Conflict –free microprocessor • Over clocking
enabled for extra- performance
OCTA CORE: Octa-core refers to a CPU that includes eight complete execution cores per physical
processor. It has combined eight processors and their caches and cache controllers onto a single
integrated circuit (silicon chip). Dual core chip is that tasks can be carried out in parallel streams,
decreasing processing time Example for octa core processor- Hasswell-E HEDT 9(OVERVIEW)
It has improved current applications experience. Advanced web browsing : octa core allows more
faster , more stable web browsing experience • Smoother user interface : renders 3d effect smoothly .
Functionality and appearance is significantly enhanced • Superior gaming experience: advanced
multithreaded programming.
Advantages of octa-core processor: Multitasking is the major advantages of octa core processor.
More cores provide more capacity to mobile performing many tasks in the single instance. Octa-core
processors are helpful in running such apps which are rather intensive and require a lot of resources.
Such apps include video editors, anti-viruses, graphics programs, etc. New octa processors consumes
less power and general less heat. That’s why they are much efficient. Octa-core is actually way ahead
of current mobile application development technology.
12. What is the meaning of BIOS, and what role does it play in a computer?
Basic Input Output System – holds hardware setup and configuration information.
Practical activity
With the help of the teacher, find out the following:
1. The type of processor in one of the computers in your computer laboratory.
2. The clock speeds of all the computers in the computer laboratory.
3. What is the size of RAM in MB of the computer you are currently using?
42
OUTPUT DEVICES
An output device is a peripheral device that a computer uses to give out information produced after
processing. The most common types of output data include text, pictures, sound and video.
Softcopy
Refers to intangible output displayed on the screen or listened to through devices like speakers.
Softcopy output devices include monitors, speakers, LCD Projectors and light emitting diodes.
Example of softcopy output devices:
Types of monitors
There are two commonly used technologies used in monitors: Cathode Ray Tube (CRT) and Flat
Panel Display. Monitors that display sharp clear images are said to have high resolution.
Pixel: Picture elements are tiny dots which are used to form the images displayed on the screen. In
colour monitor, a pixel has three primary colours namely red, green and blue.
Colour depth: refers to number of colours which can be displayed by a pixel. It is measured in bits.
Resolution: is the number of pixels per inch on the screen usually given in dots per inch (dpi) or bits.
The higher the resolution, the more the number of pixels per inch, hence the clearer the images.
Refresh rate
Since the CRTs cannot hold an image for a long time, image in the video RAM is used to refresh the
one on the screen as long as necessary. If a screen has a low fresh rate, images tend to flicker hence
causing eyestrain.
Display size: is measured in inches as the diagonal length of the screen measured from top to bottom
left.
43
CTR monitor
The screen is curved slightly outward forming a convex shape. A CRT monitor consists of a long
glass tube with an electron gun on one end and a screen on the other end. The screen is coated with
tiny phosphorus dots that illuminate red, green and blue to make a pixel. The CRTs are too bulky to
carry around, consume a lot of power and are cheap to buy.
Video adapter
Also referred to as graphic adapter or video card. The monitor is connected to the system unit
through the video port to a video adapter. The video adapter determines the resolution and clarity of
the monitor. Graphic Adapter / Video card is a piece of circuit board plugged to the motherboard
that connects a monitor to a computer and allows the computer to show images and text on its screen.
44
Sound output has the following advantages:
- No reading is needed
- Useful in situation where you can’t look at the screen or where you are too busy
Disadvantage
Not suitable for noisy situations
Inappropriate for lengthy or permanent information.
Applications of sound output
- Learning Aids e.g. Computer Aided Learning
- Lift where messages are used to greet visitors and tell them the floor they are in.
- Emergency massages i.e. Public address systems, in cars when running out of petrol.
- Text speech translation for blind people.
1. Printers
Produce a hard copy of information on papers. The printing mechanism determines the quality of
hardcopy. They are two types of printers namely impact and non-impact.
Impact printers
Impact printers print using striking mechanism, they strike the paper in order to form an imprint on
it. Impact printers are cheap to run, slow, use inked ribbons, produces multiple copies, uses cheap
technology, are noisy because of impact, produce low quality printout and print for long periods
without breaking down. They produce characters by using special light hammers with characters or
pins held on the printing head. When the hammer strikes on the head, character mark is stamped. In
impact printing, the printing head comes into physical contact with the stationery. An inked ribbon
placed between the stationery and the printing head element creates the imprints when the printing
head strikes.
Non-impact printers
Are fast, use thermal and electrostatic principles, produces single copies, are costly due to
technology involved and quiet because of non-impact. They print using ink, toner catridge , thermal
or laser mechanisms. In non-impact the printing head does not come into physical contact with the
stationery but by other means like thermal or electrostatic.
Use the concept of spraying ink onto the paper, from tiny holes on the ink cartridge onto the paper. A
colour inkjet printer may have two cartridges, one for black
and a tricolour that contains cyan, magenta and yellow
(CMY) compartments. The cartridge has nozzles that do the
actual spraying of ink on the paper
Advantages
- Are cheaper and produce better quality printouts
- Inkjets printers use smaller mechanical parts than
laser printers
- Provide inexpensive way to print full-colour
document.
Weaknesses
- Are slow
- Expensive to run because they require special type of ink
- An inkjet printout is easily gets smudged when water drops on it.
iv). Photo printers are special purpose printers designed to print photographs.
46
Deference between impact and non-impact printers
Impact Non-impact
- Slow - Fast
- Cheaper - Costly
- Use striking mechanism - Use thermal or electrostatic principles
- Noisy - Quiet
- Multiple copy production possible - Multiple copy production almost impossible
2. Plotters
These are output devices that are mostly used in engineering and architecture field for production of
graphical outputs e.g. diagrams, photographs, maps, architectural designs and such outputs.
The most common commercially available graph plotters are the
➢ Flatbed Plotter
➢ Drum Plotter.
Are alternative long-term storage devices that are not part of the Main memory. These devices are
not directly accessed by the CPU and are not housed inside the system unit. Can be carried around to
be used with another computer hence the name removable storage devices and media. A drive is
needed in order to read and write data into the storage media. The data and instruction held in these
devices must first be moved into RAM before processing. They are used to store information for
longer period, data stored in them is permanent unless erased by user. Stores large volume of data.
Stored data can be erased and the media reused to store fresh data and programs.
Difference between a drive and drivers
Drive is a computer device for reading data from or writing data into a storage media e.g. a tape, or
disk.
Drivers are software or programs that operate or control a particular type of device that is attached to
the computer.
Types / examples of computer drives
- Hard disk drive (HDD) - Floppy disk drive (FDD)
- CD-ROM drive - DVD – ROM drive
- USB Port - Zip drive
- USB Port
Examples of computer auxiliary storage devices
Magnetic tapes, floppy disks, cassette tapes, Hard disks, zip disks, jaz , Flash disks, video
compact disks (VCD), digital video disks (DVD’s), Punched cards, optical disks e.g CDs, LS-120
Super Disks, optical card, optical tape.
Classification of Secondary Storage Devices
Can be classified in two ways by:
1. Portability as removable and fixed.
2. Technology used to store and retrieve data (magnetic, optical, magneto-optical and solid
state).
It is important to have a backing storage for long – term storage of data and programs and also
when there is limited storage capacity in the main memory. Backing store is a non-volatile
(permanent) memory outside the CPU such as floppy disks, CDs and USB flash Disks.
Characteristics of a Backing store
- Data is usually accessed using read/write heads.
- Access to backing storage is slower than main storage
- Are non-volatile i.e. the data is stored on the medium until it is deleted.
REMOVABLE STORAGE
Magnetic storage media
Magnetic storage media use magnetic technology to store data.
i). Magnetic tapes
A magnetic tape is made using a thin ribbon of mylar (plastic) coated with a thin layer of
magnetic material composed of iron oxide on which data can be stored using magnetic process.48
The tape may be housed inside a plastic as a cassette or coiled around an open wheel. It uses serial
access where all proceeding data is read before the required data can be accessed.
NB: the advantage of Inter-Block Gap/Inter-Record Gap(IRG) is that it prevent the over-writing
of data stored in the tape.
Advantages
- Store large amount of data
- Light and easy to carry
- Effective when to store sequential files for batch applications
- High capacity and backup storage at relatively low cost
Disadvantages
- Slow due to sequential reading of data
- Wastage of recording surface because of Inter-block gaps left for stopping purposes.
- Easily distorted by environmental factors such as dust, moisture, humidity etc.
A block
Tracks
The structure of a disk platter
48
The surface is divided into tiny invisible concentric circles called tracks that store data. The tracks
are further divided into units called sectors. The area within the same track bound by the two
edges of a sector forms a block which forms the unit for the read/write operations. Data can be
written to and read from the disk.
Note:
To write data means to move it or copy it from the main memory to backing storage.
To read data means to move it or copy it from the backing store to the main memory.
Disks are direct access storage media.
Disadvantages of floppy disks
- Storage area is limited to 1.44MB
- Easily damaged
- Are short-lived
- Slow access time. Access time is the time taken to read the data from disk to the Main
storage.
iii). High capacity floppy disk: simply known as HiFD disk stores upto 200MB of data. HiFD
drive can also read the 1.44MB floppy disk.
v. Optical tape
Similar to magnetic tape, but data is stored on it using optical technology.
Advantages of optical storage
- Have massive capacity
- Stores data permanently
- Accessing of data is fast
- Secured i.e. it’s hard to copy
- High quality pictures and sound
- Portable
Disadvantage
- Expensive
- Costly hardware and software for reading
- It can break easily
- Very sensitive to things like dust, water, heat, scratches which easily damage them.
Solid state storage devices
Is a kind of non-volatile storage media that employs integrated circuits rather than mechanical,
magnetic or optical technology. They are regarded as solid state because they do not have moving
parts but everything is electronic as the case of RAM or EEPROM. Examples include flash disks,
Flash pen drives and memory cards.
Flash disk
It is small in size but with massive storage capacity of as much as 32GB. It’s more portable and
convenient to carry around than other secondary storage medias.
52
53
Review questions
1. Distinguish between primary memory and secondary storage devices.
Primary storage is accessed directly by CPU while secondary is not.
2. Distinguish between removable and fixed storage
Removable are portable while fixed are mounted inside the system unit.
3. Compare three types of removable disks i.e. Floppy, zip and jaz disks in relation to size.
Floppy – physically small in size and capacity. Jaz&Zip are slightly large in size and have
large storage capacity.
4. What is a hard disk? How does it differ from the floppy disks?
It is hard magnetic platter used to store data and is encased in a metallic housing (casing). It
differs from a floppy because it is metallic, shinny and non flexible.
5. What are the advantage3s of the hard disk over the floppy disk?
➢ It is large in storage capacity,
➢ More reliable,
➢ Faster access to data and information.
6. Give four examples of optical disks and how they differ from each other in term of
storage capacity and mechanism.
CD-ROM, CD-R, CD-RW, LS-120, Super disk, DVD, optical card, optical tape.
7. What are the advantages of a digital versatile disk over a typical compact disks.
➢ DVD has larger storage capacity than CD,
➢ Offers better data storage quality.
8. Define the term multimedia and list down the components required to make a computer
multimedia.
Multimedia is an integration of sound, video and text processing and output.
Components – optical drive, speakers, sound adapter, VGA monitor.
9. Why are CD-ROM and CD-R referred to as WORM?
Write Once Read Many (WORM) – recorded once but can be accessed many times without
changing content.
10. Describe the different between magnetic and optical storage media.
Magnetic – data recorded using magnetism.
optical – data recorded using a beam of light (laser).
11. Jets publishers is a company that specializes in production of news papers. One of the
editors wanted to transfer a 50MB document from the hard disk of one computer to
another using removable storage media. Give four examples of the devices he/she could
use.
Jaz, Zip, Flash disk, CD-R, CD-RW, Memory card.
12. Describe three precautions you would take to avoid damaging the hard disk.
➢ Do not drop the disk drive,
➢ Do not expose it to strong heat,
➢ Do not expose it to dust/smoke particles,
➢ Do not unprocedurally switch off the computer.
54
POWER SUPPLY AND PERIPHERAL DEVICE INTERFACE
Port
The port is a holes or a slot or a point at which a peripheral device attaches to the system unit
e.g. mouse, keyboard etc is plugged to facilitate transfer of information.
Connector
A connector is the unique end of a plug, jack, or the edge of a card that connects to a port. For
example, all desktop computer expansion cards have a connector that allows them to connect in a
slot on the motherboard. When referring to cables, the connector is the end of the cable that
connects into a port.
Power cable
They supply power to the device. Power cables connect the computers power supply unit to mains
outlet.
Power supply unit
It is a special unit inside the system unit that supplies power to the motherboard and other internal
devices. Computers are connected to AC power while internal components require DC power.
The power supply unit and adapter convert AC to DC.
55
Peripheral device interfacing
Interface cables: Transmit data signals. Connect the device on one end, and to the motherboard
via ports on the other end.
HDMI – High Defination multimedia interface
It is used for transmitting digital audio and video data from computer to a projector, TV or audio
devices.
Parallel interface
A parallel port is also called the Centronics port and the computer refers to a parallel port as LPT1
(Line Printer One). Parallel cables transfer data in parallel 8-bits at a time using a set of many
conductors. Parallel ports (the 25-holes, D-shaped holes) mainly connect printers, scanners,
portable CD-ROM drives, tapes and network adapters. Parallel cables transmit data faster over
short distances.
56
Comparison between parallel and serial cables and ports
Serial cable and port Parallel cable and port
- Transmits 1-bit at a time - Transmits 8-bits at a time
- Slow - Fast
- Connect modems, a mice & keyboards - Connect printers, scanners, network adapters
- Ports consist of 25-pin and 9-pin - Ports consist of 25-pin D-shaped holes
- More reliable for long distance - More reliable for short distances
- Allow two way communication - Only one way communication
Video port
This is where monitor is connected to LCD projectors. It is shaped like a letter D with 15 holes
and colour coded in blue.
57
Small Computer System Interface (SCSI)
- They transmit data in parallel but are faster than parallel cables. Its ports allows connection
upto 7 peripheral devices.
Other Ports and Connections
i). Infra-red and bluetooth
Infrared is a wireless interface that uses infrared to connect to infrared-enabled devices. Used for
wireless communication between the CPU and a device which is infrared – capable e.g. cordless
mouse as shown in the diagram below. Infrared, also to as infrared data association (IrDA), uses
the infrared waves to transmit data. Infrared-enabled devices must be at a line of sight of infrared
rays in order to transmit data.
Bluetooth is a wireless interface that uses short range radio broadcast to connect any Bluetooth-
enabled device. It just broadcasts a radio signal within the surrounding. Any Bluetooth device
when turned on will be detected.
58
iv). Centronic ports
This is a parallel port that uses metal clips mounted into cells in place of pins.
v). Audio ports (connectors)
Are jack plugs used to connect speakers, microphone and other portable audio equipment.
vi). Modem port
Used for plugging an external modem into the computer.
Table below shows labels and symbols used to represent common devices
59
Review questions
1. Define the following terms:
A). Port: Special socket for connecting peripheral devices on the system unit.
B). Interface cable: Cable for data transmission.
C). Power cable: Cable for power supply to devices.
2. What is the function of the power supply unit found in the system unit?
To supply stable power to system unit internal devices and the mother board.
3. Differentiate between parallel and serial interface cables.
Parallel cables transmits several bits simultaneously while serial transmits one bit at a
time.
4. Give two advantages of a USB interface cable.
➢ Offers fast transmission,
➢ Its serial nature enable it to connect devices a longer distance away,
➢ The USB port can be used to connect different peripheral devices due to its common
universal interface.
➢ Offer quality data transmission
➢ It is light
5. Draw an illustration of:
60
A). Parallel cable B). USB port
6. What would happen if you bend the pins of a monitor port as you try to connect the
monitor interface cable to the system unit?
No display or some colours will fail to display.
Tweezers
Tweezers are helpful when working in tight spots or for retrieving that lost screw inside of a
computer case. Another area where they're handy is for removing jumpers from motherboards and
drives.
Screwdrivers
Premium quality, non-magnetic screwdrivers of assorted sizes are needed because they are an
indispensable tool to open the hardware components of a PC.
Power supply tester is needed to supply power. Apart from this, it is also needed for the functional
terminals that use a voltmeter for testing the voltage.
Part retriever: Used to retrieve parts from locations that are too small for your hand to fit.
Wire stripper: A wire stripper is used to remove the insulation from wire so that it can be twisted
to other wires or crimped to connectors to make a cable.
Punch-down tool: Used to terminate wire into termination blocks. Some cable connectors must
be connected to cables using a punch down tool.
Power Tester
Pliers
Crimpers
Tweezers
Screwdriver
62
Mounting internal devices
While external devices are connected to the motherboard through ports, internal devices are
connected through slots and sockets.
63
SATA (right) and IDE (left) hard drives. The SATA hard drive has the data cable on the right and
power cable on the left. The IDE data cable is ribbon-like (on the left)
64
COMPUTER SOFTWARE
Computer software refers to a set of instructions that direct a computer on how to perform various
functions.
The computer software can be classified into three ways according to:
➢ Purpose
➢ Acquisition
➢ End– user – License (EUL).
Classification according to purpose
They are designed to manage the hardware resources or to help the user accomplish specific tasks.
It has two main categories:
➢ System software
➢ Application software
System software
It performs a variety of fundamental operations that avails the computer resources to the user.
Manages the operation of the computer itself, and makes sure that the computer works efficiently.
It enables the user to communicate with the computer and its hardware e.g. mouse.
Its functions include:
➢ Booting the computer and making sure that all hardware elements are working properly.
➢ Performing operations such as retrieving, loading, executing and storing application
programs.
➢ Storing and retrieving files.
➢ Performing a variety of system utility functions.
ii). Firmware: also referred to as a silicon chip that contains programmed instructions known as
stored logic that cannot be modified. They are mounted to electronic devices such as a microwave
and digital cameras.
iii). Utility software: also called service programs, is software that provides support to the
application software. It performs commonly used services that make certain aspects of computing
to go on more smoothly. Can also be defined as special programs used to enhance performance of
the system.
Functions of the utility software
- Formatting disks
- Repairing diskettes
- Renaming files
- Sorting files
- Copying and deleting files
- Repairing damaged files, etc.
iv). Networking software: It’s used to establish communication between two or more computers by
linking them using a communication channel e.g cables to create network. Also it enables
computers and other peripheral devices connected on a network to communicate and share
resources. Examples: Novel Netware and Linux
Application Software
They are also known as application packages and are designed to help the user to accomplish
specific tasks.
COMPUTER SOFTWARE
Application Software
System Software
- Word processor
- Operating system - Spreadsheets
- Firmware - Database
- Utility software - Desktop Publishing
- Networking software Computer aided design
- Graphics software
66
Advantages
• The company has full ownership of the final product as well as its source code and the
knowledge gained while developing it.
• Fits exactly to the business requirements of the company.
• There is a relationship between the development team and the user base which helps in
communication and expectation delivery.
• It gives you full control over the system and its functionality.
• Allows you to differentiate from your competitors (as the system is developed for your specific
needs.
Disadvantage
• It can be costly to maintain and improve the system to continuously meet business needs.
• It requires more IT personnel which in turn lead to high overhead cost.
• High switching costs: it is more expensive to change to newer technology.
• It is more time consuming to develop an in-house IT system as opposed to buying it.
• High development and maintenance costs.
• If the company decides to sell the system, it may suffer from a lack of portability, as the system
may be too tightly built into the identity of the company
Advantages
Vendor-off-the –shelf software are widely used because;
It takes less time to assess company’s needs, buy and install them.
They are less expensive to acquire and maintain.
They are readily available for almost any task.
They are thoroughly tested before being released hence less chances of errors.
Easily modified to meet specific user needs.
Disadvantages
May not meet special needs of the user.
They are not as efficient as user made programs.
When changes occur extra costs is usually needed from user.
Not all packages are compatible with all computer system.
They may have some features not needed by user which may take extra storage. 67
Classification according to End – User Licence Agreement(EULA)
Software may be classified as open source(non-proprietary), proprietary or freeware.
Open source software – is a software whose source code (programmed set of instruction) is freely
made available to users. Users are encouraged to modify and distribute the modified product.
Examples are Linux OS, Mozilla FireFox Browser, etc
Proprietary software – are software whose source code is hidden from users. Modifications can
only be made by the software manufacturer. They are licensed to users at a fee or applied freely.
Examples are; Microsoft Operating Systems, Microsoft Office, Adobe PageMaker and CorelDraw
suit.
Freeware are software products that are freely made available to the user. Some may be malicious
software. Examples are Adobe Reader and Google Talk.
Shareware these are licensed software that allow users to freely make and distribute copies of the
software with a condition that after testing the software you pay to continue using it. Examples are
Winzip, Internet Download Manager (IDM).
iii). Warranty
Warranty is an agreement between the buyer and the seller that spells out terms and conditions of,
after selling a product in case of failure or malfunction. The hardware bought must have a
warranty cover and must be guaranteed for a specific period of time.
A good warranty should cover the following:
o Scope of cover that is duration e.g. six months, one year, etc. the least warrant period should
be at least 1 year. In most cases, the longer the warranty the better the hardware.
68
o Call-out response and liability agreement e.g. how long should the supplier take to repair a
fault or replace the product and if he/she delays who bears the cost.
o Preventive maintenance for example regularity of service at intervals etc.
iv). Cost
The cost of computers is related to the size and additional components that may come with the
computer. The cost depends on:
- Processor : Processor type, speed and manufacturer.
- Storage : capacity of RAM and hard disk
- Whether it is branded or a clone: Branded computers are more expensive than their equivalent
clones because of the reliability and good after sale services
- Portability: portable computers are more expensive than desktops because of the superior
technology involved to manufacture smaller computer components without losing performance
abilities.
- Display : Size of the monitor, resolution and the technology used.
Do market survey from magazines, newspapers and electronic media or visit a number of vendors
to compare prices to enable you purchase genuine components at a reasonable cost.
vi). Portability
Look for a computer that you carry with you in case you wish to access your computer and files
wherever you are. Smaller devices enhance portability.
Other considerations include available ports, wireless connectivity, and the system unit form
factor (whether tower type or desktop).
Software Considerations
Authenticity
This is genuineness, validity or legitimacy of an item. Software is an intangible product, and its
quite easy to pirate software (make illegal copies of software). When purchasing software, get the
original software that will be supported by the developer’s license and certificate of
authenticity. This is because some people illegally produce pirated copies which are an offense. 69
Documentation
It refers to the user manuals, trouble shooting and installation guides as well as on-line help. A
good software product must be accompanied with this documentation.
User needs
It must meet users need e.g. if the user needs to type documents most often would go for a word
processor. Users with special needs may require software that recognizes forms of input like
speech recognition. For example a software used in mobile phones to store voice and allow the
user to make a call by just calling a name instead of keying in the number.
User friendliness
This is how easy the users can be able to operate the computer. The ease of use of a program will
(most likely) influence whether the user will prefer it or not.
Data security
A good software especially the operating system should have security mechanisms that protect
data and information from illegal access.
Cost
Software tends to be more expensive than the hardware. The cost of acquiring software product
must be carefully considered before acquiring it against the benefits that it is likely to bring. The
cost of software is a major contributing factor in deciding whether to purchase it or not. It is
usually cheaper to purchase general purpose software if it can meet the users need.
Portability
Software portability refers to ability of a program to be copied or installed in more than one
computer. Data is said to be portable if it can be transferred from one application to another in
electronic form. Most software’s in the market are portable.
b) Software
2. Why is it important to carefully study a warranty before committing yourself by signing it?
In order to negotiate on sensitive items like duration of warranty after sales service, etc
3. Do you need to do window-shopping before you actually buy your computer or any computer
accessory? If yes, explain why.
Yes, in order to compare quality, computer hardware and software specification and
prices.
70
4. Using newspaper cuttings such one shown below prepare a requisition form for ten up to date
multimedia computers to be used in the computer room.
Review Questions
1. Write the following abbreviations in full:
a) CPU
b) ALU
c) CU
d) ROM
e) RAM
6. What is the market name given the most recent types of processors?
Pentium processors
7. Explain the internal mechanism of the hard disk in reference to disk platters and the
read/writer
head.
The drive is made up of several disk platters that are mounted on a common axis with
read/write heads on both sides of the platters. The head moves in and out as they read
and write data. The out case is hard and metallic.
8. Describe the structure of a hard disk in reference to cylinders, tracks and sectors.
The hard disk is divided into concentric circles called tracks. Parallel tracks on several
platters are called cylinders. The tracks are further subdivided into sectors. Several
sectors can be grouped to form clusters.
9. What are pixels? What role do they play in screen display?
These are picture elements or dots on the screen that form characters and images. They
determine the clarity of the image.
10. Explain the steps you would follow to set up a new computer.
71
3.0 OPERATING SYSTEM
3.1 Definition:
Main program that controls the execution of user applications and enables the user to access
the hardware and software resources of a computer.
A program that controls the execution of an application programs and acts as an interface
between the user of a computer and the computer hardware.
User application programs do not directly communicate with hardware devices instead they send
messages via the operating system which has the capability to give instructions to the hardware to
perform a particular task.
Graphical view of the interaction with the operating system as the intermediary (role of operating
system)
User
(runs application programs)
Application software
(send users requests to OS)
Operating system
(receives executes requests)
Hardware
(Receives and does OS commands)
The operating system provides a software platform on top of which other programs (application
programs), can run.
Examples of Operating Systems: Windows, Macintosh OS, LINUX, UNIX, MS-DOS
Shell: it is the outer part of the OS used to provide the interaction between the application
software and the user.
Kernel: the core of OS regarded as the operation system. It’s responsible for providing interaction
between the application software and hardware resources such as processor, main memory,
storage devices, input devices, output devices and communication devices
Analogy: John has a pen but needs a book to write on while Mary has a book but needs a pen to
write with. Neither of the two wants to release whatever they have for the other to use first. Hence
a deadlock occurs because neither is able to write.
(iii)Memory management
Data and instructions entered into the computer are temporarily held in the main memory before
and after processing. Since RAM is a scarce resource, the operating system determines which task
remains in the memory awaiting for execution and which one will be taken back to secondary
storage.
Operating system organizes the main memory into blocks of sizes called page frame. Processes
are divided into equal pieces called pages which can fit into the frames. To manage the memory
the operating systems swaps (switches) pages between the main memory and the secondary
storage. The hard disk where pages are held is referred to as virtual memory.
➢ Number of tasks
➢ Number of users
➢ User interface
Classification according to number of tasks
76
Organization of information
Drive C:\>
1. File
It’s a collection of related data or information given a unique name for ease of access,
manipulation and storage on a backing storage and stored in one location a. A file has details that
indicate:
- A unique name and an optional extension
- Its size, date and time the file was created or modified.
Types of files
There are there are types namely; system, application and data files.
▪ System files : contain information that is critical for the operation of the computer.
▪ Application files: these files hold programs or application files that are executable.
▪ Data files contain user specific data.
The are some file extension;
Extension File type Description
.doc Data A Microsoft Word document file
.txt Data A plain text file created using note pad or DOS editor.
.exe Application file The file that launches a particular application e.g. PM
7.0 .exe, Winword.exe, etc
.bat System files File containing a series of commands loaded during
boot up.
.sys System files System files that perform fundamental operation in a
computer.
Function of file
77
- Storage of data
- Organization of information
2. Folder / Directory
It’s a named storage area where the user can store related files for easy access.
Sub-folder is a folder or directory within another folder/directory. In Windows folders and sub-
folders icon appear in yellow colour while file icons are mostly white with a fold at the top right
hand corner.
File icon
Folder icon
All folders or directories originate from a special directory called the root directory or folder. The
root directory is represented by a back slash ( \ ).
3. Drives
The Operating System views storage media or devices as drives. When creating folder or saving a
file identify a storage location which is more reliable e.g Floppy disk, Compact Disk, Hard disk,
Flash disk etc. Drives may be given labels such as letters A-Z to identify them.
Storage location Drive Remarks
Floppy drive A and B If a computer has two drives, one will be assigned letter
A the other B.
Hard disk C, D, E, F If a computer has 4 hard drives, they may be assigned
letters C – F.
Optical drives D, E, F, G If a computer has one hard disk and three or more
CD/DVD drives, may take any number between D and Z
Other D, E, …Z If a computer does not have an optional drive, any
Removables removable drive attached to the computer can take any
letter between D and Z.
Network drive Logical Network drives takes D – Z depending on the number of
physical drives installed or attached.
3.7 Getting started with Microsoft Windows
Windows Desktop
Desktop is mostly an empty screen that appears when windows starts, and has some standard
icons that show that the computer is ready for use.
Desktop features
Icons – are small images representing objects such as files, application programs, peripheral
devices, operator tools in programs, etc. Are manipulated using pointing devices. Examples icons
on the desktop are My Computer, Recycle bin, Internet Explorer, My Documents, Antivirus, etc.
Task manager: Plain stripe that displays buttons of all currently running tasks.
System tray: Right most part of the taskbar. It has icons of the tasks running in the background
but are not displayed on the screen e.g. Time and Calendar etc. To display the task simply double
click its icon. 78
Start Menu Task Manager System Tray
Sidekick
menu
Start Menu
79
Review Questions 3.2
1. Explain the following mouse concepts:
a) Click
b) Double click
c) Drag and drop
To display Windows Explorer, Right click Start button then click Explore from short cut menu or
Right click My Computer icon then select Explore.
Creating a folder
1. Display the Explorer window
2. From the folder tree on the left pane, select the location in which you want to create a new
folder e.g Local C
3. From File menu, click New then select Folder. A new folder with a temporary name
Newfolder appears on the right pane.
4. Type a new name for the folder to replace the temporary name then press enter key. 80
Note: To create a subfolder, follow the steps above but select a folder as the location.
Menu bar
Toolbar
Work area
▪ Formatting a disk
It is the creation of tracks and sectors in a new disk in preparation for use. It can also be referred
to as writing tracks and sectors on a disk to make it ready for data storage. Other devices which
are not disks can also be formatted to create a file system. Formatting a new disk enables the OS
to recognize it for reading and writing data.
Formatting process of 3 ½ floppy
- Insert the unformatted disk into floppy drive
- Double click my computer icon
- Right click the icon 3 ½ floppy
- Select the capacity 1.44MB
- Give label and click start to begin formatting
- Click close once the process is over
▪ Partitioning
Process of dividing the physical disk into two or more logical drives. Each partition is treated as a
separate drive installed on its own partition.
Reasons: to install more than one Operating System and for the purpose of backup. Windows
2000/XP allow up to 4 partitions on a single physical drive while Ms Windows 98/Me Operating
System allows a maximum of one primary and one extended partition .
To partition a disk:
(i). Reboot the computer using a start up disk
(ii). Type FDISK at the command prompt. Select yes to partition the drive using the FAT32. the
FDISK screen is displayed.
(iii). Choose ‘create a DOS Partition or logical DOS Drive.”
(iv). Restart the computer once more using the startup disk
(v). Format each partition by typing Format <drive letter>
Note: partitioning a disk in Windows 2000, XP, 2003 and Vista is done during installation
process.
Fragmentation is the condition of a disk in which the files and folders are scattered.
▪ Disk clean up
Is the process of detecting and removing files on the hard disk drive that may no longer be
needed. Disk cleanup frees and improve the system performance.
▪ Backing up data
Creating copies of data and programs on separate storage areas to avoid losing of data and
programs incase the storage device fails, gets lost or crashes (permanent destroyed).
Some problems may crop up after installing Windows Operating system like failure to boot or
function properly due to hardware, malware, improper installation or missing system files,
computer hangs now and then, abnormal restarting, etc.
NB:- You can read more information on troubleshooting and fixing an operating system related
problems by reading the online help and support utility.
85
REVISION QUESTIONS
i. A device that process user input to give out an output that is meaningful to the user -Computer
ii. Raw facts that do not have much meaning to the user -Data
iii. The result obtained after processing -Information
4. Name three non electronic tools that were used before the invention of electronic computers (3mks)
✓ Abacus
✓ Napier bones
✓ Analytical engine
5. What was the major improvement in the fourth generation computers (2mks)
✓ It employs the integration of Large Scale Integration (LSI) and Very Large Scale Integrated
(VLSI) circuits.
6. a A computer had the following characteristics
✓ Artificial intelligence
✓ Connectivity to the internet
✓ Superior hardware and software (i.e. high processing speed and storage capacity)
✓ Low emission of heat
✓ Smaller in size
State the generation described above (1mk)
b) Give the name of a computer which is small in size, portable and convenient for mobile users(2mks)
✓ laptop computers
7. State two components housed in the system unit (1mk)
✓ CPU
✓ Drives
9. a) What is the name given to the item that is usually placed on the computer screen (CRT) to avoid
eye strain caused by over bright light from the screen?
(1mk)
b). State four factors that one has to consider before setting up a computer laboratory(4mks)
b) List three safety precautions in the computer laboratory that are meant to protect the user. (3mks)
of the room
i) Antiglare screen protect the user from eye strain
ii) The cables should be well laid to protect the user from tripping on them.
iii) Use of standard furniture that prevent the user from back ache
iv) Insulating the cables to protect the user from short circuit
11. Giving TWO examples in each case outline five major categories of a standard computer
keyboard keys
(5mks)
✓ Function key i.e. F1- F12
✓ Special Purpose keys i.e. SHIFT, ALT, CTRL keys
✓ Alphanumeric keys such as letters A-Z, 1,2,…0, Space bar, enter key etc.
✓ Numeric keypad keys i.e. number 0-9, *, +,
✓ Cursor movement and editing keys i.e. page up, page down, home, end arrow keys and insert and
delete keys respectively.
ii. Give one example of artificial intelligence and where it used
✓ Robots used in industries
12. What substance or material normally cause clogging on the keyboard and therefore should not
be carried to the lab
(1mk)
✓ Food substances
13. Identify two types of booting (1mk)
Warm booting
Cold booting
14. (a) (VCDs and a DVDs are examples of optical storage media. (3mks)
Write in full the meaning of:
VCD- Video compact disk
DVD – digital video disk
(b) Joan wanted to transfer some data from a friend’s computer to VCD. How many VCD’s will
she require to transfer 4,294,967,296 bytes if a singleVCD can hold up to 700MB of data?
If 1mb = 1,048,576 bytes
700mb = ?
=7000mb 1,048,576 bytes =734,003,200 bytes
1mb
If 734,003,200 bytes = 700mb
4,294,967,296 bytes =?
=4,294,967,296 bytes 700mb
734,003,200 bytes
5.8514285714285714
Approximately 6 VCD’s
Or
If 1mb = 1,000,000 bytes
700mb = ?
700mb 1,000,000 bytes
1mb
= 700,000,000 bytes
If 700,000,000 = 700mb 87
4,294,967,296 bytes =?
4,294,967,296 bytes 700mb
700,000,000bytes
15. (a) Name the keyboard keys represented by the symbols below (3mks)
A B C
A- Shift key
B- Enter key
C- Tab key
17. Fill in the blank spaces from the table below (5mks)
Device Function
i. Scanner Captures data directly into the computer
ii. Speaker
iii. LED they give their output in form light
iv. Touch screen
v. Plotters Used for printing geographical maps, advert
posters
18. (a) What is the name given to the device used to capture data directly from the source document
such as a printout (1mk)
Document reader/scanner
(b) The diagram below shows coded data that could be input into a computer.
(i) Name the device that can be used to input the above data (1mk)
- Optical Barcode Recognition /Optical Barcode reader
88
(ii) Where would the above method of input be applied? (1mk)
- Retail systems e.g. electronic point of sale system in supermarket or Libraries for
reading barcodes on books
(iii) For the application you have given above (b)(ii), state TWO kinds of information
that this type of input may contain. (2mks)
- Name of the item
- Cost of item
- Quantity in stock
- Manufacturer
19. ) Identify the printers that have been described below (3mks)
i) Faster because of few movable parts Laser printer
ii) Produce noise because of striking activity Dot-matrix printer
iii) Printed copy must be left for some time to dry up or the information could be partly erased or
distorted with smudges Ink jet printer
20. Identify the devices labeled A and B (2mks)
A B
A- RAM B- ROM
21. Of the devices on qsn (20) above, which one stores instructions permanently or semi-permanently
(1mk)
B
22. State two technologies used to design the flat screen monitors (2mks)
active
Passive
23. Study the images below and use them to answer the question that follows
A B
i. Identify the types of system units displayed above respectively (2mks)
A ___tower type
24. The picture below shows an external part of a magnetic storage device
iii. Other than this (24) (i), name other four magnetic storage media that you know (4mks)
✓ Magnetic disk
✓ Zip disks
✓ Jaz disks
✓ Magnetic tape
25. The hierarchical system represented below shows how a school organizes its files. Study it
and answer the questions below.
C
UNIVERSITY
CATERING HOSTELS
ACADEMIC
Y1 Y2 Y3
a) The directory Y3 has the following files: Department.doc, campus.xls and Logo.pub
Write down the path of accessing the Logo.pub file. (2mks)
C:\UNIVERSITY\ACADEMIC\Y3\Logo.pub
90
b) The directory hostel has the following files: Student.mdb
Write down the path of accessing the Student.mdb file. (2mks)
C:\UNIVERSITY\HOTELS\Student.mdb
c) Draw a tree representation of the above diagram including the files mentioned in part (a)
and (b).
(5mks)
C:\
UNIVERSIT
Y
Student.mdb
Y1 Y2 Y3
Department.doc
Campus.xls
Logo.pub
Revision questions
1. a). Central Processing Unit
b). Arithmetic logic unit
c). Control unit
d). Read only memory
e) Random access memory
2. Cache, registers
3. a). Kilobyte b). Megabyte c). Gigabyte
4. MDA, HGA, EGA, VGA and SVGA
5. MICR uses magnetic technology to read magnetic characters while OCR uses laser technology
to read characters.
6. Pentium processor
7. The drive is made up of several disks platters that are mounted on a common axis with
read/write heads on both sides of the platters. The heads move in and out as they write/read data.
The outer case is hard and metallic.
8. The hard disk is divided into concentric circles called tracks. Parallel tracks on several platters
are called cylinders. The tracks are further subdivided into sectors. Several sectors can be grouped
to form clusters.
9. Pixels (picture elements) are dots on the screen that form characters and images. They
determine the clarity of image.
10. a). Gently and carefully connect the interface cable of each device to the correct port and
to the device,
b). connect the computer to the power source and switch it on,
c). Observe boot up information to see whether Power On-Self Test (POST) displays any error
massage. A successful boot means that the computer was properly setup.
Revision questions
1) It stores related data and information records into files and related files into folders and
subfolders
2) Because it does the basic functions of enabling other programs access the hardware resources.
3) Compressing – squeezing files to create more space while defragmenting consolidates files and
folders in a contiguous space or location on the disk. .
4) When one partition fails, the other can still be used.
5) To create tracks and sectors that can be recognized by a particular operating system
6) a). Processor
b). Memory
c). I/O devices and ports.
d). Communication devise and ports secondary storage devices
7) Read the manufacturers manual or Readme.text file form Windows folder.
8) Scheduling determines which task will be processed first , while sequencing arranges the task
and keeps a list of currently running tasks.
98