0% found this document useful (0 votes)
64 views89 pages

Lesson 1

The document provides an overview of IT skills for teachers, focusing on the fundamental components of computers, including hardware, software, and their functions. It outlines the types of computers, memory types, and the historical development of computing technology across five generations. Additionally, it discusses information systems and their various types, emphasizing the role of computers in organizations and education.

Uploaded by

davidhaitange83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views89 pages

Lesson 1

The document provides an overview of IT skills for teachers, focusing on the fundamental components of computers, including hardware, software, and their functions. It outlines the types of computers, memory types, and the historical development of computing technology across five generations. Additionally, it discusses information systems and their various types, emphasizing the role of computers in organizations and education.

Uploaded by

davidhaitange83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 89

IT Skills for Teachers.

Introduction to computers
COMPUTER
• Is an electronic device which is capable of
receiving information (data) in a particular
form and of performing a sequence of
operations in accordance with a
predetermined but variable set of procedural
instructions (program) to produce a result in
the form of information or signals.
5 Components that make up a computer

1. Software
2. Hardware
3. Data (These are raw facts )
4. People
5. Procedure (processing of information)
INPUT DEVICES
• Input device: are devices that sends or enters
information to a computer system for
processing.
• Examples: keyboard, mouse, microphone,
scanner
OUTPUT DEVICES
• Output device are devices that reproduces or
displays the results of that processing.
• Example a computer sending data to a printer
that will be reproduced on a piece of paper as
a hard copy (output)
• Examples: printer, speakers, monitor, projector
INPUT OUTPUT DEVICES (I/O device)

• A device can be both input and


output this is referred to as an
input/output or I/O device.
• CD-RW drive, USB flash drive
Functions of a computer
1. INPUT- you input data you provide data; set of instructions to
the computer thru input devices.
2. PROCESSING- the processing of information, and
manipulates the data which is done by the C.P.U
3. OUTPUT- After processing the data the computer displays the
result , it gives an output. Output devices are the monitor, in
the case of visual output. speakers, in the case of audio
output, printers
4. STORAGE- You can save your data for future use in the CPU
itself which is stored in the computer's ROM. There are
several other storage devices also like removable disks , CDs,
Hardware
• Is the physical parts or components of a
computer which are tangible (touch).
• Example: monitor, mouse, keyboard,
computer data storage, hard disk drive (HDD),
system unit (graphic cards, sound cards,
memory, motherboard and chips), and so on,
all of which are physical objects that can be
touched (that is, they are tangible).
Hardware
• Mouse: handheld pointing device used to point
and click, to make selection on the screen
• Keyboard: typing
• Printer
• Plotter: is a computer printer for printing vector
graphics. Eg: plans of house, ship, buildings
• Microphone: input audio into the computer
• Speakers: output sound
Monitor
• Is a hardware. And Output device
• Display screen monitor
• Help the user see and view activities on the
computer
• That displays the video and graphics
information generated by the computer
through the video card.
Software
• Software: is a program used by a computer
that gives instructions to operate a computer
and related devices.
• Collection of instructions that enable the user
to interact with a computer, its hardware, or
perform tasks. Without software, computers
would be useless.
2 Types of software
1. Application software: (also called end-user
programs)
• These are programs that enable the user to complete
tasks such as creating documents, spreadsheets,
• Examples: database programs, word processors, Web
browsers and spreadsheets ms word, games.
2. System software: System software is a type of
computer program that is designed to run a computer’s
hardware and application programs. Example: The
operating system (OS)
Hardware Components Required By
computers
• Central processing unit (CPU): The heart of the computer, this
is the component that actually executes instructions organized
in programs ("software") which tell the computer what to do.
• Memory (short-term memory(RAM)): Enables a computer to
store, at least temporarily, data, information, programs, and
intermediate results.
• Mass storage device (long-term memory): Allows a computer
to permanently retain large amounts of data and programs
between jobs. Hard drive, disk drives and USB.
• Input devices
• Output devices
Types of computers
1. Personal computer
2. Workstation
3. Minicomputer
4. Mainframe
5. Supercomputer
Types of computers
1. Personal computer: A small, single-user computer based on a
microprocessor. A computer designed for an individual user.
2. Workstation: A powerful, single-user computer. A workstation
is like a personal computer, but it has a more powerful
microprocessor and, in general, a higher-quality monitor.
3. Minicomputer: A multi-user computer capable of supporting
up to hundreds of users simultaneously.
4. Mainframe: A powerful multi-user computer capable of
supporting many hundreds or thousands of users
simultaneously.
5. Supercomputer: An extremely fast computer that can perform
hundreds of millions of instructions per second.
Types of personal computers
• Laptop computers
• Desktop computers
• PDA
• Palmtop
Laptop computer:
• A small computer that is easy to carry
Palmtop
• A small computer that literally fits in your
palm. Compared to full-size computers,
palmtops are severely limited, but they are
practical for certain functions such as phone
books and calendars
• Palmtops are also called PDAs, hand-held
computers and pocket computers.
• Example: tablets and iPad
Personal Digital Assistant (PDA)
• Handheld device that combines computing,
telephone/fax, and networking features. A
typical PDA can function as a personal
organizer, keeping schedule calendars and
address book information handy. Example:
tables and ipads.
Desktop Computer:
• A computer designed to fit comfortably on top
of a desk, typically with the monitor sitting on
top of the computer. Desktop model
computers are broad and low, whereas tower
model computers are narrow and tall.
Computer Memory
• RAM- RANDOM ACCESS MEMORY
• ROM- READ ONLY MEMORY
RAM
• Stores information temporarily
• Is a volatile memory. Is a memory type of
storage whose contents are erased when the
system's power is turned off or interrupted.
Meaning users will lose a document if they do
not save their work to a non-volatile
classification of memory, such as a hard drive,
before shutting down the computer.
RAM
• RAM allows the computer to read data quickly
to run applications. It allows reading and
writing.
• Random Access Memory or RAM is a form of
data storage that can be accessed randomly at
any time, in any order and from any physical
location., allowing quick access and
manipulation.
ROM
• It stores information permanently
• Is a non- volatile memory. It is non-volatile and
the contents are retained even after the
power is switched off. When power shuts
down information is not lost
• ROM stores the program required to initially
boot the computer. It only allows reading.
Abbreviations
• BIOS: Acronym for Basic Input/output System. This is a
built-in ROM Chip on the Motherboard containing
essential programs to manage the computer's input and
output, which are loaded into memory during the boot
process.
• POST: power on Self test. runs to determine if the
computer keyboard, random access memory, disk
drives, and other hardware are working correctly.
(Starting Program)
• DOS: disk operating system. was the first widely-
installed operating system for personal computers.
Abbreviations
• ICT: information and communication
technology is an umbrella term that includes
any communication device or application,
encompassing: radio, television, cellular
phones, computer and network hardware and
software, satellite systems and so on, as well
as the various services and applications.
• Wi-Fi: wireless fidelity. For wireless internet
connections
Impact of computers in organisations
• Computers are used for business and
distribution purposes, business advertising
• Learning and research tool
• Social networking
• Learning different software, e.g. typing,
Microsoft Office.
The History of Computer Development:
• The history of computer development is often referred to in reference to
the different generations of computing devices. A generation refers to
the state of improvement in the product development process. This term
is also used in the different advancements of new computer technology.
With each new generation, the circuitry has gotten smaller and more
advanced than the previous generation before it. As a result of the
miniaturization, speed, power, and computer memory has proportionally
increased. New discoveries are constantly being developed that affect
the way we live, work and play.
• Each generation of computers is characterized by major technological
development that fundamentally changed the way computers operate,
resulting in increasingly smaller, cheaper, more powerful and more
efficient and reliable devices. Read about each generation and the
developments that led to the current devices that we use today.
The 5 Generations of Computers
• First Generation Computer
• Second Generation Computer
• Third Generation Computer
• Fourth Generation Computer
• Firth Generation Computer
First Generation Computer
• 1940 – 1956: First Generation – Vacuum Tubes
• These early computers used vacuum tubes as circuitry and magnetic
drums for memory. As a result they were enormous, literally taking up
entire rooms and costing a fortune to run. These were inefficient
materials which generated a lot of heat, sucked huge electricity and
subsequently generated a lot of heat which caused ongoing breakdowns.
• These first generation computers relied on ‘machine language’ (which is
the most basic programming language that can be understood by
computers). These computers were limited to solving one problem at a
time. Input was based on punched cards and paper tape. Output came
out on print-outs. The two notable machines of this era were the UNIVAC
and ENIAC machines – the UNIVAC is the first every commercial
computer which was purchased in 1951 by a business – the US Census
Bureau.
Second Generation Computer
• 1956 – 1963: Second Generation – Transistors
• Transistors replace vacuum tubes and ushered in the second generation of computers.
The transistor was invented in 1947 but did not see widespread use in computers
until the late 1950s. The transistor was far superior to the vacuum tube, allowing
computers to become smaller, faster, cheaper, more energy-efficient and more
reliable than their first-generation predecessors.
• Though the transistor still generated a great deal of heat that subjected the computer
to damage, it was a vast improvement over the vacuum tube. Second-generation
computers still relied on punched cards for input and printouts for output.
• Second-generation computers moved from cryptic binary machine language to
symbolic, or assembly, languages, which allowed programmers to specify instructions
in words. High-level programming languages were also being developed at this time,
such as early versions of COBOL and FORTRAN. These were also the first computers
that stored their instructions in their memory, which moved from a magnetic drum to
magnetic core technology.
• The first computers of this generation were developed for the atomic energy industry.
Third Generation Computer
• 1964 – 1971: Third Generation – Integrated Circuits
• By this phase, transistors were now being miniaturised and put
on silicon chips (called semiconductors). This led to a massive
increase in speed and efficiency of these machines. These were
the first computers where users interacted using keyboards and
monitors which interfaced with an operating system, a
significant leap up from the punch cards and printouts. This
enabled these machines to run several applications at once
using a central program which functioned to monitor memory.
• As a result of these advances which again made machines
cheaper and smaller, a new mass market of users emerged
during the ‘60s.
Fourth Generation Computer
• 1972 – 2010: Fourth Generation – Microprocessors
• This revolution can be summed in one word: Intel. The chip-maker
developed the Intel 4004 chip in 1971, which positioned all computer
components (CPU, memory, input/output controls) onto a single chip.
What filled a room in the 1940s now fit in the palm of the hand. The Intel
chip housed thousands of integrated circuits. The year 1981 saw the first
ever computer (IBM) specifically designed for home use and 1984 saw the
MacIntosh introduced by Apple. Microprocessors even moved beyond the
realm of computers and into an increasing number of everyday products.
• The increased power of these small computers meant they could be linked,
creating networks. Which ultimately led to the development, birth and
rapid evolution of the Internet. Other major advances during this period
have been the Graphical user interface (GUI), the mouse and more recently
the astounding advances in lap-top capability and hand-held devices.
Firth Generation Computer
• 2010- future : Fifth Generation – Artificial Intelligence
• Computer devices with artificial intelligence are still in
development, but some of these technologies are beginning
to emerge and be used such as voice recognition. AI is a
reality made possible by using parallel processing and
superconductors. Leaning to the future, computers will be
radically transformed again by quantum computation,
molecular and nano technology. The essence of fifth
generation will be using these technologies to ultimately
create machines which can process and respond to natural
language, and have capability to learn and organise
themselves.
Primary and Secondary Storage
Secondary storage
• Secondary memory can be external devices like CD,
floppy magnetic discs.
• secondary storage cannot be directly accessed by the
CPU and is also external memory storage.
• the secondary storage is permanent.
• secondary memory is cheaper and larger
• secondary storages are slower.
• where as the secondary storages are connect through
data cables to CPU
• Examples: CDs, USB, harddrives
Primary storage
• Primary memory is the main memory (Hard
disk, RAM) where the operating system resides.
• Primary memory storages are temporary.
• Primary memory is expensive and smaller
• Primary memory storages are faster.
• Primary memory storages are connected
through data buses to CPU.
• Examples: BIOS, RAM
Central Processing Unit CPU
• The CPU is the brain of the computer. 2 Main
components of the CPU:
• Control Unit: It is responsible to direct the system to
execute instructions.
• It helps in communication between the memory
• Arithmetic Logic Unit: The ALU is responsible for
performing all logical and arithmetic operations.
• Some of the arithmetic operations are as follows:
addition, subtraction, multiplication and division.
Information Systems
• A computer Information System (IS) is a
system composed of people and computers
that processes or interprets information. The
term is also sometimes used in more
restricted senses to refer to only the software
used to run a computerized database or to
refer to only a computer system
Types of Information Systems
• Transaction processing systems
• Decision support systems
• Management information systems
• Office support system
• Executive information systems
Transaction Processing Systems
• What is a Transaction Processing System?
• Transaction Processing System are operational-
level systems at the bottom of the pyramid. They
are usually operated directly by shop floor
workers or front line staff, which provide the key
data required to support the management of
operations. This data is usually obtained through
the automated or semi-automated tracking of
low-level activities and basic transactions.
Management Information Systems
• What is a Management Information System?
• For historical reasons, many of the different types of
Information Systems found in commercial organizations
are referred to as "Management Information Systems".
However, within our pyramid model, Management
Information Systems are management-level systems that
are used by middle managers to help ensure the smooth
running of the organization in the short to medium term.
The highly structured information provided by these
systems allows managers to evaluate an organization's
performance by comparing current with previous outputs.
Decision Support Systems
• What is a Decision Support System?
• A Decision Support System can be seen as a knowledge
based system, used by senior managers, which facilitates
the creation of knowledge and allow its integration into the
organization. These systems are often used to analyze
existing structured information and allow managers to
project the potential effects of their decisions into the
future. Such systems are usually interactive and are used to
solve ill structured problems. They offer access to
databases, analytical tools, allow "what if" simulations, and
may support the exchange of information within the
organization.
Executive Information Systems
• What is an EIS?
• Executive Information Systems are strategic-level
information systems that are found at the top of the
Pyramid. They help executives and senior managers analyze
the environment in which the organization operates, to
identify long-term trends, and to plan appropriate courses
of action. The information in such systems is often weakly
structured and comes from both internal and external
sources. Executive Information System are designed to be
operated directly by executives without the need for
intermediaries and easily tailored to the preferences of the
individual using them.
Open Systems
• Refers to software whose source code is freely available on the
Internet (can be downloaded) is a free software that you can
downloaded from the internet and pay no licensing fees to use.
• Are built and maintained by groups of interested people all over the
world. While there is typically one controlling body, they belong to
no one.
• Make the source code available to all. Anyone with the skills and
time can extend and modify the code and create new functionality
as required.
• Can be hosted anywhere. You can host an open source web site
with just about any ISP or hosting company on their servers or your
own.
• Are typically free – or at least the software itself is. Customisation,
design, and hosting are not.
Proprietary systems
• proprietary software that is trademarked and likely requires you
to obtain or purchase a license to use it.
• Can not be downloaded on the internet
• Not free, is bought
• Are built and maintained by a single company.
• Typically do not allow access to the source code, although the
best of them provide an open framework (or API) that means
they can be extended by others.
• Are typically hosted by the company that created them, although
some can be hosted elsewhere.
• Typically require a license fee of some sort, although it is often
built into the hosting charges.
Information systems Security
• Security issues
• Protected sites – site which allows only restricted access. In many cases sites are restricted
via password. If you do not supply the correct password when you access the site, you are
not allowed to view the sites contents.
• Use stronger, unguessable passwords/ pass codes
• Digital certificates : A digital certificate is used to encrypt information for secure transmission
across the Internet. A digital certificate can be used to create a digital signature for an email,
the signature guarantees the identity of sender, and it also ensures that the message cannot
be tempered with in transit.
• Encryption : Encryption is a means of ‘scrambling’ a message or web page. It is used to make
a transmission more secure, so that only the intended recipient of the message will be able to
read the message.
• Computer viruses attacks
• Spam: be very careful about entering your email address into forms on web sites which you
are not familiar with. You may later get unsolicited emails (called spam) from that web site.
Even worse, your email address may be passed on to companies which sell lists of email
addresses to advertisers
Information systems Security
• 7.5.3. The danger of surfing!

• Viruses: surfing the Internet can provide you with an incredible source of
information. If you download anything from the web (even a document file),
there is the possibility that the downloaded item may have been infected with a
computer virus.
• Spyware: this is different from a virus. Details such as your online browsing
habits can be sent, without your knowledge, to marketing companies. Or even
criminal organizations that will try to get information.
• 7.5.4. Protecting your credit cards

• Spam: be very careful about entering your email address into forms on web sites
which you are not familiar with. You may later get unsolicited emails (called
spam) from that web site. Even worse, your email address may be passed on to
companies which sell lists of email addresses to advertisers
Information systems Security
• Firewalls
• A firewall consists of software and hardware
protection against invasion via the Internet. In
most large companies any connection to the
Internet automatically goes through a firewall
which have been installed and customized by
the companies technically it team.
INFORMATION PROCESSING

• Information processing refers to the manipulation of


digitized information by computers and other digital
electronic equipment, known collectively as information
technology (IT).

Information processing systems include business


software, operating systems, computers, networks and
mainframes. Whenever data needs to be transferred or
operated upon in some way, this is referred to as
information processing
Methods of processing
There are four main types of information
processing system.
• Batch processing
• Online processing
• Real-time processing
• Offline processing
BATCH PROCESSING
• BATCH PROCESSING
• Such a system process batches of data at regular intervals. The data is usually in
large volumes and of identical type. The batch processing methods closely
resembles manual method of data processing, in that data on transactions in
collected together into batches sent to the computer enter, sorter into the order
of the master file and processed.
• Such systems are known as traditional data processing system. Payroll system is a
example of batch processing system.
• Disadvantages of batch processing
• The delay between collecting the transaction and receiving the results of
processing.
• Advantages of batch processing
• Batch processing provides many opportunities for controlling the accuracy of data.
• It is useful when immediate updating of files is not crucial.

Offline Processing
• Computer physically but not electronically
connected to a network or other computer
and, hence, not under its direct control. Many
data entry or processing functions are
performed offline to protect sensitive data
from other users on the network.
ON-LINE PROCESSING SYSTEM
• ON-LINE PROCESSING SYSTEM
• On-line processing systems are those where all peripherals in
use are connected to the CPU of the main computer.
• Transaction can be keyed in directly.
• The main Advantages of on-line processing system
• Is the reduction in time between the collection & processing
of data.
• There are two main methods of on-line processing
• a) Real-time processing
• b) Time sharing processing

REAL TIME PROCESSING
• REAL TIME PROCESSING
• In real – time information processing, the response time must
meet the needs of the user.
• Response time is the time between the entry of a transaction or
enquiry and the computer response.
• The delay or response time may vary between fraction of a second
to 2-3 seconds, depending on the nature of transaction and the size
of the computer.
• There are two types of information
• - Processing system which can be operated in real-time these are:
• - 1. Transaction Processing
• - 2. Information storage / Retrieval.
• Single-Tasking
• Single-tasking refers to focusing on one thing until it
is completed. For example, if you are responding to
emails, you block out time to concentrate on that
task alone.
• Multitasking
• Sending emails while talking on the phone is an
example of multitasking. When you do several tasks
at one time, you might feel more effective and
productive.
The Internet

Computer Literacy
What is the internet
• Is a global computer network providing a
variety of information and communication
facilities, consisting of interconnected
networks using standardized communication
protocols
Web Browser and Search engines
• Web Browser: is an application used to access and
view websites. Common web browsers include
Microsoft Internet Explorer, Google Chrome,
Mozilla Firefox.
• Search Engines: a program that searches for and
identifies items in a database that correspond to
keywords or characters specified by the user, used
especially for finding particular sites on the World
Wide Web. Example: Google, Yahoo and Bing
E-mail
• Stands for Electronic Mail
• Examples:
[email protected]
[email protected]
[email protected]
Components of an email
• Address: The email address(es) to where you
want to send
• Subject: A brief summary of the topic of the
message.
• Body: the message that you want to send
Computer Viruses
• Computer viruses: is a program or piece of
code that is loaded onto your computer
without your knowledge and runs against your
wishes.
• Viruses can also replicate themselves
• Is a virus that infect your programs and files
on the computer.
• It corrupts file and computer systems
Different types of Viruses
• Trojans
• Trojans can illegally trace important login details of
users online. For example E-Banking is very common
among users, therefore, vulnerability of tracing your
login details whenever your PC is working without
any strong powerful antivirus installed.
• Email Virus
• This is a virus spread via an email. Such a virus will
hide in an email and when the recipient opens the
mail.
Different types of Viruses
• Directory Virus
• Also known as cluster virus or file system virus. They
infect the computer’s directory by changing the path
indicating file location. They are usually located in the
disk but affect the entire directory.
• Macro Virus
Macro viruses infect files that are created using
certain applications or programs that contain macros,
like Microsoft office products : .doc, .xls, .pps, .mdb
Antivirus Programs
• Anti-virus software is a program or set of
programs that are designed to prevent, search
for, detect, and remove software viruses, and
other malicious software like worms, trojans,
adware, and more.
Antivirus Programs
• Always:
• Scan your computer and any removable drives
(USB) with an antivirus
• Update your antivirus Program
• Keep your antivirus program up to date
How to prevent from computer Viruses
• Install an antivirus program. Installing an
antivirus program and keeping it up-to-date
can help defend your computer against
viruses.
• Don't open email messages from unfamiliar
senders, or email attachments that you don't
recognize.
• Use a pop-up blocker with your browser.
How to prevent from computer Viruses
• The Pop-up Blocker feature in
Internet Explorer is turned on by default.
• Keep Windows updated.
• Use a firewall.‌
• Turn on User Account Control (UAC).
What are the symptoms of a computer virus?

• Slow computer performance


• Erratic computer behaviour
• Unexplained data loss
• Frequent computer crashes
Size of Memory
• Arranged from smallest to largest
• Byte
• Kilobyte
• Megabyte
• Gigabyte
• Terabyte
System Software: Operating system
• Example: Windows 7, 8, XP, Vista
• System Software is the most important
software that runs on the computer which is
the operating system (Windows)
Windows
• Is a GUI operating system for personal computers.
• Windows is a Graphic User Interface (GUI) operating system
for personal computers.
• GUI is defined as: computer program that enables a person
to communicate with a computer through the use of
symbols, pictures, visual. A picture used in place of a word
or words to issue commands.
• GUI interfaces have standards that are usually the same or
similar in all systems and applications. Standards apply to:
• Pointers and pointing devices
• Icons, desktops, windows and menus
OPERATING SYSTEM
• What is an operating system?
• It is the most important software that runs on
a computer.
• It manages the computer's memory,
processes, and all of its software and
hardware. It also allows you to communicate
with the computer without knowing how to
speak the computer's language. Without an
operating system, a computer is useless.
OPERATING SYSTEM
• Operating systems can be found on many
devices that contain a computer. EXAMPLES:
cellphones, video game, supercomputers and
web servers
• Every PC has to have operating system to run
other applications or programs. It’s the first
thing that loads on the computer when is
comes on.
TASKS OF OPERATING SYSTEMS
• Operating systems performs basic tasks such as:
• Recognizing input from the keyboard or mouse
• Sending output to the monitor
• Provides the facilities to create, modification of
program and data files using and editor.
• Access to the compiler for translating the user program
from high level language to machine language
(programming).
• Provide a loader program to move the compiled
program code to the computer‘s memory for execution.
TASKS OF OPERATING SYSTEM
• Keeping track of files and directories on
the disk, and Controlling peripheral
devices such as disk drives and printers.
ADVANTAGES OF USING OS

• Convenience: An OS makes a computer


more convenient to use (fits well with
peoples needs)
• Efficiency: An OS allows the computer
system resources to be used in an
efficient manner with maximum
productivity.
FUNCTIONS OF AN OPERATING SYSTEM
• It manages the hardware and software
resources of the system. In a desktop
computer, these resources
• It provides a stable, consistent way for
applications to deal with the hardware.
EXAMPLES OF OPERATING SYSTEMS
• UNIX
• MICROSOFT WINDOWS 7, 8, 8.1, XP, VISTA
• LINUX
• MAC OS
TYPES OF OPERATING SYSTEM
• Generally, there are four types of OS based on the type of
computer they control and the sort of applications they
support.
1. Single-user, single Task: This type manages the computer
so that one user can effectively do one thing at a time.
2. Multi-user, multi-task: Allows two or more users to run
programs at the same time.
3. Real Time Operating Systems: RTOS are used to control
machinery, scientific instruments, and industrial systems,
in the military. There is typically very little user interface
capability.
TYPES OF OPERATING SYSTEM
4. Single-user, Multi-tasking: This is the
type of operating system most desktops
and laptops use today. It allows a single
user to open and use several programs in
at the same time.
Example: Microsoft Windows and MAC
Features of Windows
• Windows has a number of internal programs as part of the
operating system that help keep you organized and your PC
healthy.
• My Documents – a place to store the documents and files you
create. Clicking on this opens an explorer window displaying the
detail.
• Recycle Bin – Deleted files and folders go here first, where they
wait to be permanently deleted by you, or by rules that you set
up. This is a temporary storage area on your hard drive.
• My Computer- a place where all hard drives and removable
drives and CD Drive are found.
• Libraries- are libraries created to store pictures, videos and music
Features of Windows
• LOGOFF/ SWITCH USER: If your have multiple users on a
PC with separate “profiles” or user logons, use the logoff
process to close out of your profile or to switch users.
• SHUTDOWN: There is a way of shutting down your PC
that will save your program settings and files. This
shutdown process basically puts the operating system to
bed.
• CONTROL PANEL: helps users to view all programs
installed on the computer and also helps uninstall
programs.
GUI – Cursors / Pointers

• What is a Cursor?
• The term cursor typically is used to show
where your typing will appear.
• A cursor is a movable indicator on a computer
screen identifying the point that will be
affected by input from the user.
ICONS
• An icon is a graphic image, a small picture or object
that represents a file, program, web page, or
command. Icons help you execute commands, open
programs or documents quickly.
• To execute a command by using an icon, click or
double-click on the icon.
• Icon - A small picture that represents a command,
object, file, or window.
• Icons are moveable around the display screen, just
like moving things around on your desk.
Advantages of Using Windows as an OS
• Everyone knows how to use it. Its user friendly
• Easy to use and not complicated
• Software and Hardware compatibility
• Its fast
• Makes use of icons and shortcuts
• Makes use of graphics
• Fits the needs on the users
• Has security: antivirus and makes use of passwords
and pins to avoid unauthorised users

You might also like