Académique Documents
Professionnel Documents
Culture Documents
TECHNICAL COLLEGE
Preamble
The subject is designed to develop an artisan with knowledge and enhance computer skills.
Aim
To equip and enhance students with computer skills.
Objectives
By the end of the course the students should be able to:
Demonstrate an understanding of computer functions.
Identify and describe the operation of major computer hardware components.
To set up a personal computer and install software.
Demonstrate methods of handling computer equipment and resources.
Explain different types of software.
Perform operations using appropriate DOS commands.
Use computerized data processing packages to compile process, store and output business
management information.
Topics
Introduction to Computers
Computer Equipment
Computer System Architecture
Configuration
Computer Security
Software
DOS
Windows
Data Processing: Word
Data Processing: Spread sheets
Definition of Terms:
Computer
• An electronic machine that works under the control of stored programs to accepts,
process & output data/information for use by the operator.
• A device that accepts data, processes the data in accordance with a stored program,
generates results, and usually consists of input, output, storage, and arithmetic, logic,
and control units.
• A Computer is a device that works under the control of stored programs automatically
accepting, storing and processing data to produce information that is the result of that
processing.
• A computer is an electronic device that accepts data, processes, displays information
and has an ability to store information.
Data
Basically data is a collection of facts from which information may be derived. Data is
defined as an un-processed collection of raw facts in a manner suitable for communication,
interpretation or processing.
• Refers to raw facts which can be in various forms like text, numeric, alpha-
numerical.
• Data is unprocessed information. Basically data is a collection of facts from which
information may be derived.
• Data is defined as an un-processed collection of raw facts in a manner suitable for
communication, interpretation or processing.
Hence data are
- Stored facts
- Inactive
- Technology based
- Gathered from various sources
Information
- Refers to processed data. Information on the other hand is data that has been processed in
such a way as to be meaningful to the person who receives it.
- On the other hand information is a collection of facts from which conclusions may be
drawn. Data that has been interpreted, translated, or transformed to reveal the underlying
meaning. This information can be represented in textual, numerical, graphic, cartographic,
narrative, or audio visual forms.
Hence information is
-Processed facts
-Active
-Business based
-Transformed from data.
Hardware:
Refers to all the physical tangible components of a computer e.g. the Central Processing
Unit (CPU), Visual Display Unit (VDU), keyboard, mouse.
Software:
Refers to the intangible programs which commands/instructs the computer.
Software is a collective term for computer programs and related data files that makes the
hardware run.
Examples of software are: Operating Software (O.S)
Application Software
Information Technology
• It is an organized combination and use of hardware, software, telecommunications,
database management and other information processing technologies used in a
computer-based information system.
• Information technology transforms data into a variety of useful information products
specifically by the use of a computer.
Information Communication Technology (ICT)
• Refers to all the digital technology in form of computers and communication systems
used to process and transmit information.
• Information services of ICT includes:
Computers SMS MMS IM
Scanners Digital Cameras Software programs
Internet Video conferencing
System
• It is set of interrelated components that work as a unit to perform specific functions. A
computer system therefore consists of input and output devices, primary and storage
devices, the central processing unit, the control unit within the CPU and other
peripherals Hardware- refers to physical components of a computer e.g. CPU,
keyboard, monitor etc.
• Software- various kinds of programs used by computers and related devices e.g.
windows, Microsoft office etc.
Program-
Processing
Input Control Unit Output
Arithmetic Logic Unit
Register
Storage
The Elements of a computer system
The Processor
Control Unit
Interprets stored instructions in
sequence. Issues commands to
.all elements of the computer.
Arithmetic Logic
Unit (ALU)
Performs
arithmetic and
logic operations
Input Output
Data and Information the
Instructions result of processing
Main Memory
(Main Storage). Holds
data, instructions and
results of processing
Input devices
• Allows the user to enter the program and data and send it to the processing unit.
The common input devices are keyboard, mouse and scanners.
The Processor
• More formally known as the central processing unit (CPU) has the electronic
circuitry that manipulates input data into the information as required. The central
processing unit actually executes computer instructions. Memory from which the
CPU fetches the instructions and data is called main memory. It is also called as
primary memory and is volatile in nature.
Output
• Devices show the processed data – information – the result of processing. The
devices are normally a monitor and printers.
Storage
• Usually means secondary storage, which stores data and programs. Here the data
and programs are permanently stored for future use.
The hardware devices attached to the computer are called peripheral equipment. Peripheral
equipment includes all input, output and secondary storage devices.
Input Devices
A computer uses input devices to accept the data and program. Input devices allow
communication between the user and the computer. In modern computers keyboard, mouse,
light pen, touch screen etc., are some of the input devices.
Keyboard
The most common input device is the keyboard. Keyboard consists of a set of typewriter
like keys that enable you to enter data into a computer. They have alphabetic keys to enter
letters, numeric keys to enter numbers, punctuation keys to enter comma, period,
semicolon, etc., and special keys to perform some specific functions.
The keyboard detects the key pressed and generates the corresponding ASCII code.
Mouse
Mouse is an input device that controls the movement of the cursor on the display screen.
Mouse is a small device; you can roll along a flat surface. In a mouse, a small ball is kept
inside and touches the pad through a hole at the bottom of the mouse. When the mouse is
moved, the ball rolls. This movement of the ball is converted into signals and sent to the
computer. You will need to click the button at the top of the mouse to select an option.
Mouse pad is a pad over which you can move a mouse.
Scanner
Scanner is an input device that allows information such as an image or text to be input into
a computer. It can read image or text printed on a paper and translate the information into a
form that the computer can use. That is, it is used to convert images (photos) and text into a
stream of data. They are useful for publishing and multi-media applications.
Also known as voice input or speech recognition. It analyses and classifies speech or vocal
tract patterns. The device converts speech into digital codes for entry into the computer.
However, their use is limited by the limited nature of recognisable vocabulary.
Uses:
Advantages
• Hands free
Disadvantages
Output Devices
Output refers to anything that comes out of a computer. An output device is capable of
presenting information from a computer. There are many output devices attached with the
computers. But the monitors and printers are commonly used output devices.
Monitors
Monitor is a commonly used output device, sometimes called as display screen. It provides
a visual display of data. Monitors are connected with the computer and are similar in
appearance to a television set.
Plotter
COMPUTER CLASSIFICATIONS
1. Analogue Computers
• Analogue computers measure physical quantities (e.g. Voltage, Pressure,
Temperature, Speed etc.) These quantities are continuous and having an infinite
variety of values.
• These computers recognize data as a continuous measurement of a physical
property.
• Their output is usually in the form of readings on dials or graphs.
• Analogue Computers are used mainly for scientific and engineering purposes
because they deal with quantities that vary constantly.
• These computers are mostly used in medical science.
• They give only approximate results.
• analogue computers are faster than digital
• Analogue computers lack memory whereas digital computers store information.
• Digital computers count and analogue computers measures.
2. Digital computers
• These process data presented in form of discrete values (0 or 1)
• Examples are micros, minis, mainframes and supercomputers
• These computers are high speed programmable electronic devices that are
capable of performing mathematical calculations, comparing values and storing the
results.
• They are capable of recognizing data by counting discrete signals
representing either a high ("On") or a low ("Off") voltage state of electricity.
• An array of 1s and 0s represent all the Special Symbols, Alphabets and Numbers.
• The results of digital computers are more accurate than the results of analogue
computers. Some are used in hospitals.
3. Hybrid
Hybrid computers are a device that are designed to provide functions and features that
are found with both analogue computers and digital computers. The idea behind this
combined or hybrid computer model is to create a working unit that offers the best of both
types of computers. With most designs, the analogue components of the equipment provide
efficient processing of differential equations, while the digital aspects of the computer
address the logical operations associated with the system.
By creating this type of integrated computer, the benefits of both analogue and digital
computing are readily available. A hybrid computer is extremely fast when it comes to
managing equations, even when those calculations are extremely complicated. This
advantage is made possible by the presence of the analogue components inherent within the
design of the equipment.
It has the speed of analogue computer and the memory and accuracy of digital computer.
They have the speed of analogue computers and the accuracy of digital computers.
For example a petrol pump contains a processor that converts fuel flow measurements into
quantity and price values. In hospital Intensive Care Unit (ICU), an analogue device is used
which measures patient's blood pressure and temperature etc., which are then converted and
displayed in the form of digits.
Classification by purpose
Computers can be classified as general purpose or special purpose.
General-purpose computers
Most computers in use today are General-Purpose computers — those built for a great
variety of processing jobs. Simply by using a general purpose computer and
different software, various tasks can be accomplished, including writing and editing
(word processing), manipulating facts in a data base, tracking manufacturing inventory,
making scientific calculations, or even controlling organization’s security system,
electricity consumption, and building temperature. General purpose computers are
designed to perform a wide variety of functions and operations.
Special purpose computers
Special-Purpose Computer are designed to be task specific and most of the times their job
is to solve one particular problem. They are also known as dedicated computers, because
they are dedicated to perform a single task over and over again. Such a computer system
would be useful in playing graphic intensive Video Games, traffic lights control
system, navigational system in an aircraft, weather forecasting, satellite launch /
tracking, oil exploration, and in automotive industries, keeping time in a digital
watch, or Robot helicopter.
Computers can be classified by size
Categories of Computer Systems (by size)
(i) Microcomputers
(ii) Minicomputers
(iii) Mainframe computers
(iv) Super computers
Microcomputers
• They consist of a single processor or a chip
• They are designed to be used by only one person at a time
• Small to medium data storage capacities
• These are relatively small and inexpensive.
Common examples include desktops, laptops, palmtops, embedded computers etc.
• It has a hard disk capacity ranging from GBs
• Have capabilities for networking.
• They occupy little space.
• They are capable of multiprogramming.
• They are compatible with a wide range of software.
Applications
Accounting, statistical analysis, teaching project management, entertainment, office work,
personal use, graphic designing.
Applications
-Used to process large amounts of data at very high speeds such as in Banks, insurance
companies, multinational companies which need online processing of large amounts
of transactions and massive data storage.
-used as servers in WANs.
-used to manage large centralised databases
Super computer Systems
These are extremely powerful mainframe computer systems. They are specifically
designed for high-speed numeric calculations. These an process hundreds of millions
instructions per second (mips)
-high cost, very fast CPU speed, high precision, large and fast memory
-use multiprocessing and parallel processing
Applications
-In Aerospace industry- to simulate airflow around an aircraft at different speeds and
altitude.
-In automobile industry- to do crush simulation of the design of an automobile before it is
released for manufacturing- for better automobile design
-meteorological centres for weather forecasting
-military sector-for weapons research and development, sending rockets to space etc.
CLASSIFICATION BY USE
Personal computers- a microcomputer designed for independent use by an individual at
work or home.
Lap top- a microcomputer sufficiently small and light for its user to carry comfortably on
the lap. A typical lap top computer operates on mains electricity or by rechargeable
batteries.
Desktop computer-designed for use on top of desk at home or office environment
Workstation- is PCs but have added capability of being networked with other
computers.
Embedded computer- a computing element which is within some device or system and
cannot be accessed directly e.g. in petrol pumps etc.
Printers
Printer is an output device that prints text or images on paper or other media (like
transparencies). By printing you create what is known as a ‘hard copy’. There are different
kinds of printers, which vary in their speed and print quality.
The two main types of printers are impact printers and non-impact printers
Impact printers
An impact printer creates images by using pins or hammers to press an inked ribbon against
paper. Each hammer or pin is embossed with the shape of a letter, number or symbol; that
shape is transferred through the inked ribbon onto the paper resulting in a printed character.
Examples of impact printers are:
Dot Matrix.
Line Printer
Band Printer
Daisy Wheel Printer
Characteristics of Impact Printers
The printers are reasonably fast, inexpensive to operate and can produce both text and
simple graphics. They also accommodate various paper sizes but are however noisy.
Non-impact printers
These are quieter printers and examples include LaserJet and inkjet printers. The Laser
Printers are a more popular choice for business use. They use a printing technique similar to
that used in a photocopying machine. A laser beam is used to form an image onto the paper
using toner. The print quality is high. Lasers are fast, and quiet.
They print graphics but are more expensive.
The ink-jet printers are mainly colour printers which mix ink depending on the image
colour and spray it onto the paper. The toner has the 4 basic colours. They are slow,
expensive and have a high print quality.
Factors considered when choosing printers.
• Duty Cycle (pages per month)
• Resolution (image quality measured in dots per inch i.e. dpi) the more dots per inch a
printer can produce the higher its image quality.
• Speed (pages per minute i.e. ppm)
• Duplex Printing
• Color
• Durability
• Quality (dots per inch)
• Cost (i.e. initial cost, cost of operation)
• Cost and availability of cartridges
• Multipurpose?
• Size
• Network capability
Differences between Impact and Non-Impact Printers
Print head makes contact with the paper No contact creates an image without striking a ribbon against the
surface without contacting it.
Makes noise when printing Quiet printers
Strike ribbon against the paper Use a laser beam which form an
image onto paper using toner
Slow printer Fast printers
Has too many moving parts hence Has fewer moving parts hence they
unreliable Are reliable.
inexpensive expensive
Impact Printers Non-Impact Printers
Electrostatic
Xerographic
Magnetic
Laser printer
-A type of printer that utilizes a laser beam to produce an image on a drum.
The light of the laser alters the electrical charge on the drum wherever it hits. The drum is
then rolled through a reservoir of toner, which is picked up by the charged portions of the
drum. Finally, the toner is transferred to the paper through a combination of heat and
pressure. Laser printers use toner, which is powder, rather than ink, which is liquid, and are
more suited for a larger-scale office environment.
Advantages-
• Monochrome or four colour
• -High-quality print
• -Capable of printing an almost unlimited variety of fonts
• -Quiet operation
Disadvantages
• -Colour laser printers tend to be about five to ten times as expensive as monochrome
• -Cannot print on multiple-copy paper.
Advantages
• 1 to 2 years media shelf life
• Media is not heat sensitive
• Medium to high image quality
• Wide range of available types
• Recommended for industrial use
Disadvantages
• Special ribbons required.
• Average operational cost.
• Cannot print on multiple-copy paper.
• Single-pass ribbons only.
Thermal transfer printers
-A type of printer that applies heat to a ribbon and the image or barcode is then transferred
to labels or tags.
-This technology produces a higher quality, longer lasting image on the tag or label.
Advantages
• 1 to 2 years media shelf life
• Media is not heat sensitive
• Medium to high image quality
• Wide range of available types
• Recommended for industrial use
Disadvantages
• Special ribbons required
• Average operational cost
• Cannot print on multiple-copy paper
• Single-pass ribbons only
Dot-matrix printer
A type of printer that produces characters and illustrations by striking pins against an ink
ribbon to print closely spaced dots in the appropriate shape. However, they can print to
multi-page forms (that is, carbon copies), something laser and ink-jet printers cannot do.
Also used to print very wide sheets, as data processing departments often use when
generating large reports with wide columns of information. Widely used in business set- up.
Advantages
Moderately priced
They are able to use continuous paper rather than requiring individual sheets, making
them useful for data logging.
Dot matrix printers are used for massive, bulk printouts
Dot matrix printers are highly durable.
Disadvantages
Noisy operation
Low-quality output
Slow print speed
They can only print low resolution graphics.
Daisy Wheel printer
A printer that uses a wheel with all the characters on it to produce output. The wheel spins
to the desired character and makes an imprint, then spins to go to the next character. It
sounds like a little machinegun.
These printers generally aren't used much anymore due to the decreased cost of other
printers that can produce graphics as well as text. The one good thing about a daisywheel
printer is that the text is generally very crisp, but even that advantage is nullified now with
laser printers that can produce very crisp characters as well.
Advantages
-Best print quality of impact printers
Disadvantages
• Very slow
• Only one font can be used at a time because you must change out the Daisy Wheel to
change fonts.
• Cannot print graphics
Line Printer
Line printers works like a dot matrix but uses a special wide print head that can print an
entire line of text at one time however with low resolution.
Assignment Question
You have been delegated the task of selecting a new printer from a range of
different options currently on the market. The machine has to serve a small
network of microcomputers in your office. Software used includes a word
processing package, database, spread sheet, and presentation packages. Assuming that
cost is not a major constraint, list 10 features of the printers, which you would
investigate in your evaluation.
1. Print quality, for example the print from dot matrix printers varies with the number of
pins and even the best are inferior to laser printers.
2. Character formation, whether made from dots as in matrix printer, or full characters as
with daisywheel or laser printer
3. Multi-part, i.e. whether several copies can be printed at once, as with an impact printer.
4. Fonts or type style; early computer users were satisfied with any quality whatsoever, but
the advances into areas such as word processing and desk top publishing have stimulated a
demand for varying typefaces or fonts within the same document.
5. Letter quality, whether the quality is equivalent or superior to that of a good typewriter
and so acceptable for the word processing of mail. Some printers have a choice of two print
modes, draft quality and letter quality.
6. Speed, in terms of characters per second.
7. Graphics capabilities.
8. Flexibility, for example is it suitable for one task only, such as good letter quality but not
graphics, as with daisywheel printers, or good graphics but slow speed and indifferent letter
quality, as with some dot matrix printers.
9. Sheet feeding, in terms of single sheets, friction feed or sprocket feed.
10. Capital cost or what it costs to buy.
11. Running cost or what it costs in ribbons, print toner, special stationery & maintenance.
12. Compatibility with standard packages; many programs support a range of printers by
generating the correct control characters for fonts, features like italics and underline, and
for graphics.
13. Robustness; some very cheap printers are ideal at home but would not last very long in
an office.
14. Reputation of the manufacturer as a supplier of printers.
Storage devices
A computer has the capability to hold data that it is currently using, that will be referred to
at a later time (semi-permanent) or that starts a computer. Storage is divided into 2 namely:
• Primary Memory
• Secondary Storage
Primary memory
• Is also known as the internal memory or main memory. It provides fast access and
limited in capacity. Its directly accessible to the CPU. The CPU continuously reads
instructions stored on primary memory.
• It’s divided into:
1. RAM
2. ROM
The user can alter or change the contents hence its The user cannot alter or change the
read and write. contents its read only.
Magnetic Tape
A recording medium consisting of a thin tape with a coating of a fine magnetic strip, used
for recording digital data. The tape itself is a strip of plastic coated with a magnetic
recording medium. Bits are recorded as magnetic spots on the tape along several tracks.
Usually, seven or nine bits are recorded simultaneously to form a character together with a
parity bit. Read /write heads are mounted one in each track so that data can be recorded and
read as a sequence of characters. Data is stored in frames across the width of the tape. The
frames are grouped into blocks or records which are separated from other blocks by gaps.
Magnetic tape is a serial access medium, similar to an audio cassette, and so data cannot be
randomly located. This characteristic has prompted its use in the regular backing up of hard
disks.
Floppy Disk
The floppy disks are usually 3.5" in size. However, older floppy disks may be in use; these
would be 5.25" in size or even 8" in size. A 3.5" floppy disk can hold 1.44 MB of data.
Once data is stored on a floppy disk it can be ‘write protected’ by clicking a tab on the disk.
This prevents any new data being stored or any old data being erased. Disk drives for
floppy disks are called floppy drives. Floppy disks are slower to access than hard disks and
have less storage capacity. It is less expensive and are portable. It can be accessed
randomly. Data is recorded as a series of tracks subdivided into sectors.
Advantages of floppy diskettes
1. They are cheaper than Hard disks and CD-ROMS
2. They are portable hence used to transfer data or information from one computer to
another.
3. They offer direct access and they are faster than magnetic tapes.
DISADVANTAGES OF FLOPPY DISKETTES
1. They are prone to viruses
2. They are difficult to handle
3. They can easily be corrupted
4. They have a relatively short life span
5. They hold relatively small amounts of data
6. They are not always 100% reliable
Optical Disk
Optical disks are a storage medium from which data is read and to which it is written by
lasers. The optical disk is random access storage medium; information can be easily read
from any point on the disk. CD-ROM stands for Compact Disk - Read Only Memory.
Cartridge Tape
Data is recorded in the form of magnetized spots on an iron oxide coating of a plastic tape.
Gaps are used to separate individual data records. The tape is similar to audiotapes. Access
of information from the tape is in sequential form and thus slows.
Bit (b)
• Binary digit is the smallest element of data storage which can either be a 1 or 0.
Byte
• Consists of 8 bits and is also known as a character.
Software
Computer software refers to the various programs or instructions that are stored in the
computer (stored program concept) and used to either manage or control the operation of a
computer system or to direct the computer in solving specific problems. Software is divided
into two major types.
Software Hierarchy
Software
OPERATING SYSTEM
• The main control of a computer system.
• It is a system of programs that controls & coordinates the execution of computer
programs and may provide scheduling, debugging, input/output control, system
accounting, compilation, storage assignment, data management and related services.
• The software that the rest of the software depends on to make the computer
functional. On most PCs this is Windows or the Macintosh OS. UNIX and Linux are
other operating systems often found in scientific and technical environments.
• Are programs that create an environment, which enables us to use computers?
• Is an integrated system of program that manages the operations of the CPU, controls
the input/output and storage resources and activities of the computer system, and
provides various support services as the computer executes the application programs?
• Is a set of software routines that communicate between application programs and the
hardware
• All communications go through the operating system.
E.g. when a user issues a command to print, the O/S receives the command &
processes it according to priorities with the use of interrupts. Once the processor is
free to execute the command, the O/S sends the message to the processor & receives
the output, which is then directed to the printer.
Utility software(also known as service program, service routine, tool, or utility routine) is
computer software designed to help manage and tune the computer hardware, operating
system or application software by performing a single task or a small range of tasks.
Some utility software has been integrated into most major operating systems.
1. Disk defragmenter scan detect computer files whose contents are broken across
several locations on the hard disk, and move the fragments to one location to increase
efficiency.
2. Disk checker scan the contents of a hard disk to find files or areas that are corrupted
in some way, or were not correctly saved, and eliminate them for a more efficiently
operating hard drive.
3. Disk cleaner scan find files that are unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete
when their hard disk is full.
4. Disk space analysers for the visualization of disk space usage by getting the size for
each folder (including subfolders) & files in folder or drive showing the distribution
of the used space.
5. Disk partitioner scan divide an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
6. Backup utilities can make a copy of all information stored on a disk, and restore either
the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of
accidental deletion).
7. Disk compression utilities can transparently compress/uncompress the contents of a
disk, increasing the capacity of the disk. Disk /compression utilities output a shorter
stream or a smaller file when provided with a stream or file.
8. File managers provide a convenient method of performing routine data management
tasks, such as deleting, renaming, cataloguing, moving, copying, merging, generating
and modifying data sets.
9. Archive utilities output a stream or a single file when provided with a directory or a
set of files. Archive utilities, unlike archive suites, usually do not include compression
or encryption capabilities. Some archive utilities may even have a separate unarchive
utility for the reverse operation.
10. System profilers provide detailed information about the software installed and
hardware attached to the computer.
11. Anti-virus utilities scan for computer viruses.
12. Text and Hex Editors directly modify the text or data of a file. These files could be
data or an actual program.
13. Data compression utilities output a shorter stream or a smaller file when provided
with a stream or file.
14. Cryptographic utilities encrypt and decrypt streams and files.
15. Launcher applications provide a convenient access point for application software.
16. Registry cleaners clean and optimize the Windows registry by removing old registry
keys that are no longer in use.
17. Network managers check the computer's network, log events and check data transfer.
18. Command line interface (CLI) and Graphical user interface (GUI). Allows the user to
contact and make changes to the operating system.
Commercial software is computer software sold for profit; such software represented, until
recently, the vast majority of all software used. These are bought from a vendor. Also known
as off the shelf packages e.g. MS Office, Pastel. Also known as work enhancement
applications .Generic or off the shelf software has the advantage of cost effectiveness due to
larger market & the ability to incorporate available technology in the shortest possible time.
These increase the productivity & efficiency in the work place i.e.
Advantages
• Cheaper - the software company is able to spread the software development cost over
a large number of customers, hence reducing the cost any one customer must pay.
• Less risky - the software is in existence, hence you can analyse the features and
performance of the package.
• The program is a well-tried and tested product with few errors.
• Less time - Off-the -shelf software is often installed quickly and easily.
• The package is well documented
• The packages require little maintenance
• There is continued support from the supplier through upgrades.
• It is cheaper than custom-written software. The development costs of the package
may be millions of pounds, but the customer may be able to buy it for a few hundred
pounds, since sales are made to thousands of other customers.
• It is immediately available and already thoroughly tested so is unlikely to have major
bugs in it.
• Documentation is usually available in the form of reference manuals, user guides and
tutorials
• Training courses may be available form third party trainers.
• Technical support is usually available from the manufacturers via a Web site or
telephone line [at a price].
• Other users of the package can be consulted as to its suitability before purchase.
• Upgrades are usually available every year or two
Disadvantages
• The package may not do exactly what you want it to do;
• It may not run on the firm’s existing hardware
• It may not interface with other software already in use in the organization.
• The organization might need to pay for the features that are not required and never
used.
• The package may be for general needs and therefore not ideal for the user.
• The user has no direct control over the package,
Advantages
• Internal professionals understand operations better and therefore can produce an
accurate solution.
• The Software usually meets user requirements.
• Management are in total control of the development process
• More flexibility - there is more flexibility in making modifications.
• Problem specificity - in-house developed software can give an organisation software
programmes that are easily tailored to a unique problem or task.
Disadvantages
• Time and costs of developing the program may be greater than other options.
• In-house staff may lack the expertise needed for the project.
• Reliability of the resultant software is highly questionable.
• In some cases the developers may attempt to gain fraudulently from the system.
• Being customized, the non-standard software may not be used by any other
organization.
• It has huge support costs after implementation.
• Dependency syndrome with the supplier. There is heavy reliance on the developers of
the software for its continued existence & maintenance
• Future support may be difficult if the supplying company goes under, shuts down, or
liquidate or if its development staff leaves.
• May not be upgradeable and may not run if moved to a new hardware platform.
• You are tied to a supplier of which you may not be willing to have a maintenance
contract with.
• Written or Custom-built software performs a defined function and is expensive to
build.
• Custom built is expensive to maintain.
• Custom built software has reduced lifespan due to high speed of technological
advancement in the field of computers.
Describes software that is ready made and available for sale to the general public. Any
individual software package, whichever of the above types it falls into, can be either generic
(or 'off-the-shelf') or it can be bespoke (custom-built). Generic software is mass produced
with the intention that it will be used by a wide variety of different users in a range of
different situations. Bespoke software is created for a specific purpose which will be used in a
known environment.
Often generic software is used when there is a package available that meets the needs of the
user. Because it is used by many more people the cost of creating it is spread over a greater
number of people or organisations and so the cost to the individual is much lower. It also has
the advantage that it is available immediately there's no waiting time involved while the
software package is designed, created and tested. Bespoke software has the advantage that it
can be tailor made to exact specifications but it significantly more expensive and will take
time to create.
INTEGRATED SOFTWARE
Integrated software is software for personal computers that combines the most commonly
used functions of many productivity software programs into one application. The integrated
software genre has been largely overshadowed by fully functional office suites, most notably
Microsoft Office, but at one time was considered the "killer application" type responsible for
the rise and dominance of the IBM PC in the desktop business computing world. In the early
days of the PC before GUIs became common, user interfaces were text-only and were
operated mostly by function key and modifier key sequences. Every program used a different
set of keystrokes, making it difficult for a user to master more than one or two programs.
Programs were loaded from floppy disk, making it very slow and inconvenient to switch
between programs and difficult or impossible to exchange data between them (to transfer the
results from a spreadsheet to a word processor document for example). In response to these
limitations, vendors created multifunction "integrated" packages, eliminating the need to
switch between programs and presenting the user with a more consistent interface. The
potential for greater ease-of-use made integrated software attractive to home markets as well
as business, and packages such as the original AppleWorks for the Apple II and Jane for the
Commodore 128 were developed in the 1980s to run on most popular home computers of the
day. Context MBA was an early example of the genre, and featured spreadsheet, database,
chart-making, word processing and terminal emulation functions. However, because it was
written in Pascal for portability, it ran slowly on the relatively underpowered systems of the
day. Lotus 1-2-3, which followed it, had fewer functions but was written in assembler,
providing it with a speed advantage that allowed it to become the predominant business
application for personal computers. The integrated software market of today is exemplified
by entry-level programs such as Microsoft Works which are often bundled with personal
computers as "starter" productivity suites.
EXAMPLES OF INTEGRATED SOFTWARE
• Microsoft Office 97
• Microsoft Works
• Claris Works
• Lotus SmartSuite 97
• Microsoft Office 2003,2007,2010 & 2013
• Easy to use
• Generally costs much less
• Require or needs less RAM
• Ability to pass data from one module to another.
• Takes up much less hard disk space
• Better organization of information. Data is stored in the database, calculations in an
electronic spreadsheet & images in a graphical application package
Open source is a type of software which is freely available and its source code is
available for further development, modification. Generally all open source software
have a community of developers who provide support, documentation and even
binary versions of the software to people who may be interested in it. These additional
services, though, may not be free monetarily. There are several ongoing open source
software projects. The open source nature of these projects means that there will be
several people working on modifying and improving the software from around the
world. Some such examples include the Web browser Mozilla Firefox, content
management software like Drupal, Joomla etc.
SOFTWARE COPYRIGHT
Copyright is a legal concept, giving the creator of an original work exclusive right to
control its distribution for a certain time period. Copying computer software is
therefore a breach of copyright and a criminal offence. The Act covers stealing
software, using illegally copied software and manuals, and running purchased
software on more machines than the license allows. The legal penalties for breaking
the copyright law include unlimited fines and up to two years in prison. All the
software that you use should be fully licensed. When you purchase software you
usually are licensed to use it on just one computer. It is illegal to make copies of the
software to use on other computers, even if they are your own.
Software protection
Software companies try to prevent illegal copying of their disks using the following
methods:
• Copy protection- the disk (or CD-ROM) may be formatted in a special way so it cannot
easily be copied.
• A registration key- a unique series of letters and numbers that is asked for when running
the program. The software will not run if the registration key is not typed in correctly and
online multiplayer games will not to run if another user is online who has used the same
key.
• A phone or Internet activation code- this requires the user to call a number or go online
to register the product. They then receive a unique computer-specific serial number.
• Encryption- data can be scrambled up and cannot be read without the correct software.
• A Dongle- a piece of hardware that must be plugged into the computer to run the
software. Each one contains a unique electronic serial number and as they are expensive
to produce they are mostly used to protect high-end software packages.
• Details of the user are built into the software- when the software is run it displays the
original users’ name. This does not prevent the copying but it makes is obvious that the
copy is illegal.
• A Keyfile- a small file with a unique code that is placed in the same directory as the
program. If the code is not valid then the software will not run.
SOFTWARE PIRACY
By far, the biggest legal problem affecting the computer industry today is software piracy,
which is the illegal copying or use of programs. Piracy is a huge problem mainly because it is
so easy to do. In most cases, it is no more difficult to steal a program than it is to tape a music
CD that you have borrowed from a friend. Software pirates give up the right to receive
upgrades and technical support, but they gain the use of the program without paying for it.
Implications of Software piracy
Software piracy also harms the local and national economies. Fewer legitimate software sales
result in lost tax revenue and decreased employment. Software piracy greatly hinders the
development of local software communities. If software publishers cannot sell their products
in the legitimate market, they have no incentive to continue developing programs. Many
software publishers simply won’t enter markets where the piracy rates are too high, because
they will not be able to recover their development costs.
Software piracy harms everyone in the software community including you, the end user.
How?
3) Delays in the funding and development of new products, causing the overall selection and
quality of software to suffer.
FREEWARE
• Public domain software that is freely available in magazines and on the internet at no
charge to users though manuals may be offered at a cost. Freeware may or may not
have copyrights and may or may not have distribution restrictions.
SHAREWARE
• Refers to software that is widely distributed in much the same way as freeware BUT
is always copyrighted and includes a software license that requires its users to pay for
the privilege of using the software beyond a certain trial period. If you decide to use
it, you are expected to pay for the license. There is usually a disabling system in the
program after a certain period of time i.e. a month.
Networking
Computer Network: is a group of connected computers that work as a single unit sharing
resources like printers or a common program, a common internet connection. For example,
if 20 computers ate to be connected in such a way as to use one printer.
Refers to the linking of at least two or more computers by different medium i.e. physical
cables (Twisted wire, coaxial cable, optical fibre) or through propagation of waves (Wi-Fi,
radio link, microwave, satellite).
Reasons for networking computers
-need to communicate and share limited resources.
-Networks also allow for even distribution of work and maximizing human resources. As an
employee you may not waste business time to go to other offices to print, or notify
members of a meeting.
-Distributed systems are also used to speed up the processing of data and share work load.
Wi-max
microwave
satellite
Types of Networking
1. LAN
2. WAN
Local Area Network
Local area network (LAN) refers to a group of computers connected within one building or
site. They transmit data using coaxial cables or twisted pair cables or fibre optics.
Wide Area Network
The computers are on different sites and are linked by telephone links. these are networks
that are spread over large geographical areas. It is connected through public
networks such as the telephone system or satellites. It is a long distant network of
interconnected computers on separate sites, cities or even different countries.
Network Topologies
• Refer to the layout or structure of a network in terms direction of flow of data and the
controls that manage data transmission. A network is a number of computers
connected through some channel so that they may share some of the resources
and allow access into them by users from other points. Computers are networked
for various reasons depending on the nature of the organization, the most of these
being the need to share limited resources and to communicate
Advantages of networked computers
a. Resources can be shared e.g. printers, computer files and programmes.
b. More even distribution of processing and other work by the computers and users.
c. More economic and fuller use of computers.
d. Allow for the provision of local facilities without loss of central control.
e. Mutual support and a spirit of cooperation exist.
Disadvantages of networked computers
a. There could be congestion at the shared resources.
b. Control of information and confidentiality may be lost.
c. The costs of the system may be considerable.
d. Viruses and other forms of corruption to programmes spread faster.
Half Duplex
Each station can both transmit and receive but NOT at the same time.
This is used in two-way radio transmission. In Half duplex mode data can be transmitted
back and forth between two stations. But at any point of time data can go in any one
direction only. This arrangement resembles traffic on a one-lane bridge. When traffic moves
in one direction, traffic on the opposite direction is to wait and take their turn. The common
example is the walky-talky, wherein one waits for his turn while the other talks.
Full Duplex
In full duplex mode a device can simultaneously send or receive data. This arrangement
resembles traffic on a two-way bridge, traffic moving on both directions simultaneously.
An example is two people on the telephone talking and listening simultaneously.
Communication in full duplex mode is faster. Full duplex transmission is used in large
computer systems. Products like “Microsoft NetMeeting’ supports such two way
interaction
• Both stations transmit and receive simultaneously. Link capacity is shared between
the two devices either by 2 separate transmission path.
• Channel capacity is divided for transmitting and receiving. This is the mode used in
modern telephone/ cellular transmission.
Multi-point
This links three or more devices together through a single communication medium.
For sharing a common channel, each device needs a way to identify itself and the device to
which it wants to send information. The method used to identify senders and receivers is
called addressing. Three common types of multi-point topology are star, ring and bus.
Topology
Refers to the arrangement of the nodes in the network. Topology is the geometrical
representation of linking devices (nodes/terminals/workstation) to each other in LAN which
can be star, ring, bus, mesh topology.
Star Topology
All computers are connected to the hub or central computer. The hub uses a method called
polling when computers are communicating. Polling is whereby the central computer asks
each network computer if it has a message to send. Communication is in both directions but
passes through the hub.
Advantages
a. It is easy to trouble shoot, easy to install and make configurations.
b. It is economic and offers intensive use of the terminals
c. Requires a single intelligent computer, terminals could be dump there by saving on
the cost of the network.
d. Each terminal has direct and quicker access to the host
e. If one cable fails, this doesn’t disrupt the whole network
f. There is network security and control is easy to implement through the central
computer.
Disadvantages
a. It is prone to failure - failure of the node mean loss and breakdown to the whole system.
b. The cabling may be costly i.e. it uses too many cables so it’s expensive to set up.
c. Viruses can be transmitted easily within the network.
Bus topology
All the computers are connected to a linear transmission medium called a bus and there are
terminators at each end of the bus. The terminators absorb signals so that they do not get
reflected back into the network and cause data corruption.When a computer wants to send a
message, it first checks to see if the bus is not busy then sends. If the bus is busy, it waits
for a random time and then rechecks. This method is called Carrier Sense Multiple Access
with Collision Detection (CSMA/CD). Signal bounce is eliminated by a terminator at
each end of the bus. Barrel connectors can be used to lengthen cable and repeaters can be
used to regenerate signals.
Advantages
a. Costs of setting up and maintaining the network are low.
b. Each terminal can communicate directly with any other on the network.
Disadvantages
a. Risk of network malfunction i.e. it can be slow if there is a large number of users
b. Trouble shooting is more difficult.
c. There is the risk of data collision.
Ring Topology
It is made up of a series of nodes connected to each other to form a closed loop. Each loop
can accept data transmitted to it from an immediate neighbour and forward data not
addressed to it to the next neighbour. Messages are transmitted in packets or frames. Each
node has an address and packet is delivered to the node bearing the address required.
Communication in a ring occurs by a method called token passing. A ring network would
have one token which has the ability to transmit data. Each computer is given the chance to
grab the token and receive or send a message. When a token has a message, each computer
checks to see if the token is addressed to it so that it can grab it, otherwise it passes it on
along the ring.
Advantages
a. It is easy to install and reconfigure.
b. There is less risk of packet collision.
c. More accurate and reliable.
d. easy to add new node as only two connections need changes.
Disadvantages
a. There is poor response time
b. There is risk of data interception so there should be data encryption.
c. Unwanted data may continue to circulate the network, thus reducing traffic carrying
capacity of the network.
d. It is difficult to implement central network security since there is no controlling
computer
e. If the cable develops a problem, the whole network is disrupted and is difficult to
troubleshoot
Mesh Topology
In a mesh network topology, each of the network node, computer and other devices, are
interconnected with one another. Every node not only sends its own signals but also relays
data from other nodes. In fact a true mesh topology is the one where every node is
connected to every other node in the network. This type of topology is very expensive as
there are many redundant connections, thus it is not mostly used in computer networks. It is
commonly used in wireless networks. Flooding or routing technique is used in mesh
topology.
Advantages of Mesh Topology
• Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
• Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
• Expansion and modification in topology can be done without disrupting other nodes.
• Security as data travels along a dedicated line.
• Points to point links make fault identification easy.
Disadvantages of a Mesh Topology
• There are high chances of redundancy in many of the network connections.
• Overall cost of this network is way too high as compared to other network
topologies.
• Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.
• Bulk wiring is required therefore high cabling costs.
Intranet, Extranet
Internet
The internet is the collection of all computers across the world which can access
each other in some way. The links between computers might include telephone,
fibre optic cable, radio, microwave or satellite. Today tens of millions of
computers are able to access each other. The Internet has no central organisation
which controls its use. Because the Internet knows no borders, many
governments have tried to control the flow of information across the Internet.
However, communications technology is so varied and so widespread that this
is a near impossible task.
Intranet
Extranets
Understand what the Internet is and know some of its main uses.
• Share resources.
The World Wide Web or WWW is a part of the Internet. The WWW consists of all the sites
that can be accessed using a web browser such as Mozilla, Netscape, Internet Explorer or
Opera. In order for a browser to access a web site, the web site must contain files
that have a particular format constructed using Hyper Text Mark-up Language or
HTML. These sites are developed using special web development applications. It is
possible to create simple web sites using a word processor by saving the document in
HTML format.
2. Spamming
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system. Such illegal activities can be very frustrating for you as
it makes your Internet slower and less reliable.
3. Virus Threat
Internet users are often plagued by virus attacks on their systems. Virus programs are
inconspicuous and may get activated if you click a seemingly harmless link. Computers
connected to the Internet are very prone to targeted virus attacks and may end up crashing.
4. Pornography
Pornography is perhaps the biggest disadvantage of the Internet. Internet allows you to access
and download millions of pornographic photos, videos and other X-rated stuff. Such
unrestricted access to porn can be detrimental for children and teenagers. It can even play
havoc in marital and social lives of adults.
5. Social Disconnect
Thanks to the Internet, people now only meet on social networks. More and more people are
getting engulfed in virtual world and drifting apart from their friends and family. Even
children prefer to play online games rather than going out and mingling with other kids. This
may hamper a healthy social development in children.
• E-mail
• E-commerce
• E-learning
• File transfer
• Bulletin boards
• Discussion Groups
• Podcast
• Research
• Entertainment
PSTN
The PSTN or Public Switched Telephone Network refers to the originally telephone
network. From a communications perspective it was slow and unreliable. Some
of the exchanges on a PSTN may still make use of mechanical switches to route
telephone calls. These add additional noise to the line. When lines are noisy, signals
have to be resent repeatedly between the source and the destination. The PSTN
makes use of analogue technology. Analogue technology uses continuously
variable signals. An example of an analogue signal is ordinary speech. Newer digital
technologies make use of pulses of fixed magnitude and duration. In order to improve
connections, it is possible to have an analogue leased line. This is a
dedicated permanent telephone connection between two computers using the PSTN.
In order to connect a computer to a telephone network, you need a
modem. This is an abbreviation for modulator-demodulator. The function of the
modem is to convert the digital signals from the computer into an analogue form suitable
for transmission on the PSTN.
ADSL
Asymmetric Digital Subscriber Lines allow the transmission of high speed digital data
over ordinary telephone lines using a modulation technology called DMT or
Discrete Multi-Tone. Ideally, fibre-optic is the ideal medium for high speed
digital transmission. As the installation of fibre-optic is expensive, ADSL
provides solution until copper cable is replaced by fibre-optic.
Analogue signals
Analog signals are denoted by sine wave. They use continuous range of values to
represent information. Example: Human voice in air. Data transmission is subjected to
deterioration by noise during transmission. Analogue signals are used on the PSTN as
well as for normal AM and FM radio transmissions. An analogue signal is one which
varies continuously as, for example, in ordinary speech. An analogue signal has
a graphical form as shown in the following diagram.
Digital signals
Digital signals are denoted by square wave. They use discrete or discontinuous values to
represent information. Example: Computers, Cell phones. Digital signals are used in ISDN
and ADSL connections. Newer television and radio transmission techniques are also
making using of digital technology. Digital signals are two state signals corresponding to a
switch which is On or Off. The same two state signal can also represent TRUE and FALSE
or 1 and 0.
Modems
Each 1 or 0 that is transferred is referred to as a bit. The speed of a data transfer is measured
by the number of bits that can be transferred each second or bps (bits per
second). This is also sometimes called the baud rate or bandwidth. High speed lines
have their speed measured in kbps or Mbps.
1 Mbps = 1 024 kbps = 1 048 576 bps (roughly 1 000 000 bps)
To put these figures in perspective, the maximum theoretically attainable speed with an
analogue line is 56kbps. This figure is very seldom attained and the reality is usually
substantially lower.
RSI
Repetitive Strain Injury is a condition caused by repetitive motion. In most cases, RSI
affects the neck, knees, wrists, back, and fingers. By sitting in one position and
performing repetitive motions such as typing and looking at a computer screen, the body
can experience strain and muscle fatigue. Over time, RSI can cause permanent nerve
injury and become a debilitating condition. It is vital that workers and those who sit or
stand in a job where repetitive motion is required be educated about how to prevent
injury.
• Rest breaks - Taking periodic breaks, during which you relax and gently stretch your
neck muscles, can ease muscle strain. In addition, avoid any tendency to stare at the
screen without blinking, since this can lead to dryness in the eyes.
• Frequently look away from the screen and focus on faraway objects.
• Carpal tunnel syndrome is an injury caused by a pinched nerve in the wrist. The injury
causes pain and numbness in the index and middle fingers and weakness of the
thumb. To avoid that adjust the height of your chair so that your forearms are level
with your keyboard and you don't have to flex your wrists to type. It's also important
to take breaks and rest your hands and wrists.
ERGONOMICS
• Ergonomics is the science of designing the job to fit the worker, instead of forcing the
worker to fit the job. Ergonomics looks at the industrial design of equipment with
human beings in mind. It also looks at the environment, how it affects the welfare of
the user. Ideally, ergonomics:
• Makes the job more pleasant by reducing physical and mental stress
Increases productivity
There are a variety of ergonomic products available on the market, including:
• Ergonomic keyboards
• Wrist rests
• Mouse pads
• Foot rests
• Swivel and adjustable chairs
• Adjustable desks
• Glare screens
Some examples of ergonomic environmental problems are:
• Excessive noise
• Improper lighting
• Temperature extremes
• Static electricity
• Glare on screens
Chairs and Desks
Should be carefully designed ensuring the feet can touch the ground and hands can
comfortably reach equipment desk. A poorly designed chair can give the user back ache,
thus leads to absence from work. Modern well designed chairs can swivel, have
adjustable height mechanisms, are padded, and have feet in star pattern for stability.
Lighting System
Fluorescent lightning needs to be diffused to reduce glare. The environment must be well
lit to avoid user straining eyes.
Static electricity
Is a problem in a modern air conditioned offices which have wall to wall carpeting made
from artificial fibres it causes people to be uncomfortable. Anti-static carpets are
recommended.
V.D.U
Anti- glare screen coatings are recommended. Tilting/ adjustable screens which may be
positioned at most suitable comfortable position. VDU terminals should not be used for
longer time, users should take frequent breaks.
DATA SECURITY
• Assets to be safeguarded
• -data
• -software
• -hardware
• -network facilities
Security of Data
Threats to data:
- Viruses
MALWARE
short for malicious software-this term used by computer professionals to mean a variety of
forms of hostile, intrusive or annoying behaviour which an attacker inserts into the system
to do harm or disturb normal operations of the system. Malware includes-(computer
viruses, spyware, worms etc.)
Computer virus
An executable program written intentionally to do harm to the computer system
without user’s knowledge. Virus is transmitted from computer to computer by attaching
itself to other files. Computer virus is an executable program written intentionally to do
harm to the computer system without user knowledge. Virus is transmitted from
computer to computer by attaching itself to other files.
-They copy themselves quickly.
-Effects of viruses may be mild to severe
-They copy themselves quickly.
-Effects of viruses may be mild to severe.
Computer worm
Is a self-replicating malware computer program which uses a computer network to send
copies of itself to other computers (not by attaching itself to another file like a virus) and it
may do so without any user intervention.
Trojan horse-is software that appears to perform a desirable function prior to run or install,
but with malicious intentions.
Hoaxes
A hoax is used to trick users into believing there is malicious code threat to their systems.
Hoaxes typically contain warnings, the purpose of which is to frighten or mislead users and
to entice them to spread hoax further (spread the word on). Hoaxes typically arrive in the
form of email
Spyware
Is malware that can be installed in the computer and which collects small pieces of
information about users without their knowledge.
Types of computer viruses
Boot sector
-is the virus that attaches itself to the first part of the hard disk that is read by the computer
upon boot up. The computer will fail to start.
Browser Hijacker
This type of virus, which can spread itself in numerous ways including voluntary
download, effectively hijacks certain browser functions, usually in the form of redirecting
the user automatically to particular sites. It’s usually assumed that this tactic is designed to
increase revenue from web advertisements.
Direct Action Virus
This type of virus, unlike most, only comes into action when the file containing the virus is
executed. The payload is delivered and then the virus essentially becomes dormant – it
takes no other action unless an infected file is executed again. Most viruses do not use the
direct action method of reproduction simply because it is not prolific, but viruses of this
type have done damage in the past.
File Infector Virus
Perhaps the most common type of virus, the file infector takes root in a host file and then
begins its operation when the file is executed. The virus may completely overwrite the file
that it infects, or may only replace parts of the file, or may not replace anything but instead
re-write the file so that the virus is executed rather than the program the user intended.
Although called a “file virus” the definition doesn’t apply to all viruses in all files generally
– for example, the macro virus below is not referred to by the file virus. Instead, the
definition is usually meant to refer only to viruses which use an executable file format, such
as .exe, as their host.
Multipartite Virus
While some viruses are happy to spread via one method or deliver a single payload,
Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may
take different actions on an infected computer depending on variables, such as the operating
system installed or the existence of certain files.
Polymorphic Virus
Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every
execution, changing the code used to deliver its payload. Alternatively, or in addition, a
Polymorphic virus may guard itself with an encryption algorithm that automatically alters
itself when certain conditions are met.
The goal of this trickery is evasion. Antivirus programs often find viruses by the specific
code used. Obscuring or changing the code of a virus can help it avoid detection.
Resident Virus
This broad virus definition applies to any virus that inserts itself into a system’s memory. It
then may take any number of actions and run independently of the file that was originally
infected. A resident virus can be compared to a direct payload virus, which does not insert
itself into the system’s memory and therefore only takes action when an infected file is
executed.
Symptoms of an infected computer.
• Reduced memory or disk space
• Files are overwritten or damaged
• Hard drive may be erased
• Data is modified /corrupted.
• Change files & date stamp
• Drive lights blink without reason
• Longer times are experienced when loading programs
• Slower system operation.
• Deletion of data files
• The computer completely fails to work
• Erasure or deletion of executable files
• Formatting of the hard disks
• Filling up of disk space
• Unrecognized files appear.
• File names change.
• The screen becomes distorted.
• computer ‘freezes’ frequently, or programs start running slowly.
DATA PROCESSING
Data processing may refer to a discrete step by step in the information processing cycle in
which data is acquired, entered, validated, processed, stored, and output, either in response
to queries or in the form of routine reports; the processing is the step that organizes the
information in order to form the desired output.
"A sequence of operations on data to convert it into useful information is called data
processing".
• The important operations that can be performed on data are: Arithmetic and logical
operations on data to get required results.
• Classification of data.
• -Arranging data into a specific order etc.
• summarizing
THE DATA PROCESSING CYCLE
The data processing cycle:
1. Data origination
• Data originates in the form of events or transactions and is recorded in some usable
form. It may be initially recorded on paper source documents such as cash receipts,
customer invoices, time cards etc. OR may be recorded by a direct input device in a
paperless machine readable form.
2. Data preparation
• Once data is collected, it is converted from its source documents in a form more
suitable for input and subsequent processing. Data may be codified (given
identification codes) or classified.
• Data may be transcribed that is copied into some media or form suitable for input e.g.
barcoding for faster data entry
3. Data verification
• Done to prevent errors occurring in data before it is processed.
• This can be done by visual checks-checking for errors by looking through the data OR
Double keying (using computer to verify). The data is entered twice (by two different
people). The computer will only accept the data for processing if two versions are
identical. Transcription errors can be checked at this stage
4. Data validation
• Is done upon entry in the computer before taken in as proper input. Is a process of
ensuring that a program operates on clean, correct and useful data. It uses sub
programs called “validation rules” or “check routines” that check for correctness,
meaningfulness and security of data. Computer won’t accept or input it if it fails the
validation checks.
5. Data input
• If data passes validation check, it is taken or accepted as correct data for processing
by the computer.
6. Data processing or manipulation
• It consists of the following activities
• Calculating -arithmetic manipulation like addition, subtraction, multiplication etc. for
example in calculating employee’s pay, the hours worked multiplied by hourly rate
gives the gross pay. Based on total earning, income tax deductions are computed and
subtracted from gross pay to get net pay.
• Summarizing- to condense or reduce masses of data to more usable and concise
form.eg summarizing activity may provide a general manager with sales totals by a
major product or per given period etc.
• Sorting- arranging data items in desired sequence. Sometimes sorting data itself will
transform data to information. For example a simple act of sorting the names in
alphabetical order gives meaning to a telephone directory. The directory will be
practically worthless without sorting.
• Comparing- to perform an evaluation in relation to some known measure. Example
managers compare data to discover how their companies are doing. The computer
may compare current sales figures with those for past years to analyze the
performance of the company in the current month.
7. Output
• Output of information like reports, analyses, payrolls, graphical representations of
information can be achieved
• In Zimbabwe, data is still processed manually in many small business firms as well as
government offices & institutions. In manual data processing data is processed
manually. No machine or tool is used.
• All the calculations on data are performed manually. This is a slow method and errors
may occur. This is an old method. It was used before the invention of calculators. But
data is still processed manually in many small shops.
Batch Processing
This is a method where the information to be organised is sorted into groups to allow
for efficient and sequential processing.
Online Processing
This is a method that utilises internet connections and equipment directly attached to a
computer. It is used mainly for information recording and research.
Distributed Processing
This method is commonly utilised by remote workstations connected to one big
central workstation or server, e.g. ATMs
Phishing
• Typically, the attacker sends an e-mail that appears to come from a legitimate
business—a bank, or credit card company—requesting "verification" of information
and warning of some dire consequence if it is not provided.
• The e-mail directs the user to visit a bogus website set up only to steal the user
information.
Identity Theft
• Identity theft occurs when a thief assumes someone else's identity to commit fraud in
that person's name without their knowledge.
• By the time the victim catches on, the thief is usually long gone, leaving behind a trail
of ruined credit, debts and collectors.
Shoulder Surfing
• Shoulder surfing is using direct observation techniques, such as looking over
someone's shoulder, to get information.
• Shoulder surfing is an effective way to get information in crowded places because it's
relatively easy to stand next to someone and watch as they fill out a form, enter a PIN
number at an ATM machine, or use a calling card at a public pay phone.
Natural Disasters
• Hardware malfunction
• Software Failure
• Power Surges
• Power blackouts
Access Control
Password
Is a secret word or string of characters that is used for authentication, to prove identity or
gain access to a resource e.g. an access code is a type of password.
Password Protection
Password protection can prevent unauthorized access to content.
• Two levels of password protection are recommended:
• BIOS – Prevents BIOS settings from being changed without the appropriate password
• Login – Prevents unauthorized access to the network
Password Policies
Many policies require
• A minimum password length, typically 8 characters.
• the use of both upper- and lower-case letters (case sensitivity)
• inclusion of one or more numerical digits
• Inclusion of special characters, e.g. @, #, $ etc.
• prohibition of words found in a dictionary or the user's personal information
Biometric Login
• If you want to say bye-bye to the old traditional way to log into your computer via
password, then you might want to try Biometrics!
• All you need for this is a webcam or a fingerprint reader to implement face
recognition or fingerprint login.
• If your workers can’t remember their passwords, then this is definitely a great
alternative to passwords.
• Lock computer
• More people access information on computers through unattended workstations than
by hacking into the systems
• Disable remote login: This will prevent intruders from logging to your computer
through the network.
• Turn off your computer or disconnect it from the network when you are not using it.
• An intruder cannot attack your computer if it is powered off or otherwise completely
disconnected from the network.
• You can disable remote login so that intruders cannot log on to your computer from
network computers.
Data Backup
• A data backup is the copy of the original data that can be used in the case of data loss.
• Data can be backed up on DVDs, CDs, external hard drives, magnetic tapes and other
network computers.
Encryption
• Hard drives and USB flash drives are treasure troves of personal data.
• They're also among the most common sources of data leaks.
• If you lose a flash drive, external hard drive, or laptop containing sensitive personal
information, you will be at risk.
• Fortunately, encrypting your hard drive can give your data an extra layer of protection
beyond setting up a system password.
Data Wiping
• When you delete a file or folder, it goes in the trash or recycle bin.
• Emptying recycle bin to get rid of a file or deleting from DOS in fact does not delete
them at all.
• Usually, all that happens is that the file's name is removed from the disk's index, but
the data still remains on the disk itself.
• There are some undelete programs around which can easily recover this data.
Install and update an Antivirus
• Anti-virus programs work much the same way. These programs look at the contents of
each file, searching for specific patterns that match a profile – called a virus signature
– of something known to be harmful.
• For each file that matches a signature, the anti-virus program typically provides
several options on how to respond, such as removing the offending patterns or
destroying the file.
Use a Firewall
Primary key-Is a field whose value identifies one & only one record in a file.
Secondary key- An alternative index for identifying an entity. Its value can identify single
entity occurrences of all entity occurrences. A subset of all entity occurrences.
Foreign key-Are pointers or links to occurrences of a different file. A foreign key in one file
must be a primary key in another file.
• This is programming with files. Each user defines and implements the files needed for a
specific application so that each application has its own separate data files and software
programs.
• Although both users will be interested in the same data, each maintains separate files and
programs to manipulate these files and this results in data redundancy and a lot other
problems associated with it.
• Program/Data independence
• Concurrence problems - where more than one user access and attempt to update the same
record at the same time - there is file edit locking to prevent this.
• Ownership problems - sometimes some individuals tend to own the data and thus refuse
access by other individuals or departments in the organization.
• Resources problem - with database extra resources are needed e.g. more workstations and
other devices. Substantial hardware and software startup costs are involved.
• Security problems - there is increased exposure to unauthorized entry into the data.
However, this could be reduced by the use of regularly changed passwords and by
physically denying access to unauthorized users.
Objectives;
Word Processing
1. Open, close a word processing application.
2. Create a new document. Enter text into a document
3. Save a document to a location (hard drive, flash, desktop.
4. Save a document as another file type like text file, rich text format, pdf.
5. Switch between open documents.
6. Use magnification tools/zoom tools.
7. Insert symbols, special characters ©, ™, ½, , .
8. Select character, word line, sentence, paragraph, entire body
9. Copy + paste and copy + cut.
10. Use undo, redo command
11. Change text formatting, font sizes, font types, subscript, superscript.
12. Apply case changes to text
13. Align text, indent, tab tool
14. Apply spacing 1.5, double spacing.
15. Add, remove bullets, numbers styles.
16. Create a table, insert, edit data in a table.
26. Spell checks a document and make changes. (Correcting spellings, repeat
27. Print a document from an installed printer, entire document, specific pages and number
of copies.
Formatting text
• Sentence case
• Lowercase
• Uppercase
• Toggle case
5. Line Spacing
6. Paragraph formatting
Justify- align to the centre i.e. aligned to both the left and right margins.
7. Margins
Margins determine the amount of white space around the edge of the paper. No text is typed
into the margins. Margin measurements apply to the top and bottom of the page, and the left
and right sides.
8. Shading
9. Proofing/ Spell Check
11. Thesaurus
Utterance - sound
statement
expression
remark
declaration
speech
Class Exercises
Word Processing
Exercise 1
NRZ Holiday Combo Travel is pleased to announce a number of new vacation destinations
for the forthcoming season. Bargains are available for early travelers, or for groups of six or
more travelling together.
This year, in addition to our popular resorts in Hwange and Victoria Falls, we have opened a
number of new resort centres in Bulawayo. Our catalogue is bigger now than ever before.
c. Look back over your typing and correct any spelling mistakes. Save the file again using the
same name.
Exercise 2
Mrs P Smith
44 Vale Terrace
Highlands
Harare
25 January 2017
Thank you for your letter dated 22nd January, enclosing the deposit of $4000 for the
SunBreak which you recently booked. The balance of the amount will be due not less than
three weeks before departure (i.e. before 12 March).
If you need any further assistance in this matter, please do not hesitate to contact me.
Yours Sincerely
Exercise 3
With summer just around the corner, couldn’t you use a break right now, and a few days or
even a few weeks relaxing on the beach? Or perhaps you’d rather spend a long weekend in
one of our great cities! Maybe you’d like a family getaway in Europe, or a safari tour in
Africa?
Contact us at Sunshine Travel today. One of our friendly staff will be pleased to discuss
your refreshments with you, to see if we can organise you with the getaway break of your
dreams.
Required:
I. Indent the title ‘summer is coming!’ to be indented 3cm from the left margin and 2cm
from the right margin.
II. Make the first paragraph italics and font Times New Roman, point size 14.
III. Change the last paragraph to show bullets as shown below:
London
Germany
Australia
South Africa
iv. Justify the paragraph ‘Contact us at Sunshine….’
v. Change the line spacing of the entire document to 1.5.
vi. Select the title and put any solid border around it.
vii. Save the document as Sunshine Travel on documents.
I. Type the following passage as it is, using font size 12 and font type Times New
Roman. 8 marks
II. Centre the heading change its font to Arial, font size 16. 2marks
III. Insert a water mark with the text PRIVACY, slanting across the page. 2marks
IV. Indent the second paragraph by 1inch left. 2marks
V. Replace the word governments with governments.
2marks
VI. Insert your name as footer. 2marks
VII. Save on desktop as Security and print 2 copies. 2marks
Privacy
There is no question that information technology poses risks to our cultural beliefs
about privacy. Usually the information is collected and used for appropriate purposes,
but the existence of the information does pose risks.
When you enter a tool road using an electronic tag to pay the toll, your travel
will be tracked from the on-ramp to your exit. When you a grocery store card
to get a discount on your shopping, the store will be collecting your personal
history. When you complete your taxes, your personal financial details get
stored in a vast database of the tax paying citizenry. When you use a charge
card, your purchases and payment history are recorded for the purposes of
rating you credit.
There have been occasions when such databases have been used in ways that some
would say infringed on rights of privacy. For instance, governments have listened in to
telephone conversations, both by wiretapping and by monitoring the radio
transmissions of cell phones, for example, and also intercepted e-mail messages. These
actions have usually been justified as necessary for national security, or required as
part of an ongoing investigation. In Zimbabwe, a citizen’s right to privacy is inferred
from the Fourth Amendment which insures,” the right of the people to be secure in
their persons, hoses, papers, and effects, against unreasonable searches and
seizures…”that’s all there is. Privacy is not a right on the same plane as the rights to
life, liberty, and property. In fact, there is a tension between the individual’s right to
privacy and the needs of others to know about the individual. After all, a person needs
to know certain things about another before deciding whether or not to trust the other
in a business or personal relationship.
35 minutes
i) Type the following passage in single line spacing, font size 12point save it as
Exercise 2 and print.
10 marks
In the previous tutorial we saw that an Asynchronous counter can have 2n-1 possible
counting states e.g. MOD-16 for a 4-bit counter, (0-15) making it ideal for use in
Frequency Division. But it is possible to use the basic asynchronous counter to
construct special counters with counting states less than their maximum output number
by forcing the counter to reset itself to zero at a predetermined value producing a type
of asynchronous counts up to its maximum modulus (2n) is called a full sequence
counter and a n-bit counter whose modulus is less than the maximum possible is called
a truncated counter.
But why would we want to create any asynchronous truncated counter that is not a
MOD-4, MOD-8, or some modulus that is equal to the power of two. The answer is
that we can by using combinational logic to take advantage of the asynchronous inputs
on the flip – flop. If we take the modulo- 16 asynchronous counter and modified it
with additional logic gates it can be made to give a decade (divide-by 10) counter
output for use in a standard decimal counting and arithmetic circuits.
Such counters are generally referred to as Decade Counters. A decade counter requires
resetting to zero when these output count reaches the decimal value of 10, i.e. when
DCBA=1010 and to do this we need to feed this condition back to the reset input. A
counter with a count sequence from binary “0000).
ii) Insert the title Asynchronous Counter at the top of the passage. 3 marks
Iii) Embolden, double underline and make title font size 16. 3 marks
iv) Perform drop caps on the first letter of every paragraph by three lines. 3 marks
35 minutes
I. Type the following passage as it, using font type Candara, font size 12. 6marks
II. Apply drop case on the first letter of each paragraph. 2marks
III. Insert header as Rail Logistics Freight. 2marks
IV. Save as Quotation and print. 2marks
Quotation Rail Logistics Freight
131 J.Silundika Ave
Quote Reference: 009483 Bulawayo
Date: 23 February 2015
sales@Raillog.co.zw
0772 909 760/ 0712 364 764
Dear Sir,
We have the pleasure of offering you the following quote as per contractual agreement
A4B27 dated 19/02/2015. Our standard terms and conditions apply as per this agreement.
Total £1270743.75
If you have any questions at all please do not hesitate to contact us.
Best Regards,
Farai Mlambo
CONFIDENTIALITY NOTICE
The information contained in this transmission is confidential. It may also be legally
privileged. It is intended only for the addressee(s) stated above. If you are not an addressee
you should not disclose, copy, circulate or in any other way use the information contained in
this transmission. Such unauthorised use may be unlawful. If you have received this
transmission in error, please contact us immediately so that we can arrange for its return.
The 2014
Service awards
Finalist in group 1
Data Processing: Spreadsheet
-refers to an application software that simulates an accounting worksheet paper. It is used to
perform various calculations and is especially popular for financial applications. Ms Excel
is a type of spreadsheet programme that is used to perform all mathematical calculations on
numbers, create graphs etc.
- Useful in recording, calculating and analysing data trends.
- A spreadsheet is made up of numbered rows and lettered columns.
- Originally a spreadsheet was simply a piece of paper on which people added up columns
and rows of numbers to help them plan budgets.
- The name spreadsheet derives from the fact that in the old days the figures were “spread”
out on a “sheet” of paper.
Uses of spreadsheets
• Budgeting
• Summarize accounts
• Stock Level Analysis
• Excel,
• Lotus 1-2-3,
• Open Office Calc,
• AppleWorks Spreadsheets,
• Oleo,
• GeoCalc.
Workbook
• Refers to the file created in Ms Excel which consists of different worksheets.
Worksheet
• Is the primary document used to store and work with data. Consists of different cells.
Cell
• Refers to the grid position given by column letter followed by row number.
Ms Excel
• Opening Excel
• Click start
• Click all programs
• Select Ms Office
• Click Ms Excel
Basic arithmetic operators:
• Addition = A1 + A2
• Multiplication = A3 * C5
• Division = C5/C3
• Product =C5*B4
Exercise 1
Required;
1. Find the total number of apprentices trained in a particular trade e.g. electrical and year.
A furniture shop sells furniture to customers on credit. The credit terms request the customer to
make a deposit of 25%. The balance after the total deposit is paid in monthly instalments over a 24
months period without interest. The shop customers and furniture credit values are:
a. Create a spreadsheet with the following entries. Make sure the Fixed charge, Rate per
litre and Total columns are formatted to hold Currency data. (12 marks)
b. Given the following that the water bill = fixed charge added to the product of monthly
consumption and rate per litre, calculate the November water bill, for each of the account
holder, save it on desktop as Water Bill Nov and print.
c. Add the following account details between Collin Mbaita and Amon Gutu:
d. Calculate the total water consumption and total water bill for all account holders and
print. (5 marks)
Exercise 4
Hide Out Lunch Bar
Required:
a) Type in all text and numbers shown in the spreadsheet above.
b) Format unit price, sales and total after tax to English $ (US).
c) Create formula to find sales, tax and total after tax.
d) Present the information above as a pie chart 3-D (Explode).
e) Save the spreadsheet as Hide Out.
it is essentially important for the student to be able to edit a table through inserting rows
and columns to a ready-made table
• Used to indicate a relative position in a worksheet. This allows you to copy and move
formulas from one area to another of the same dimensions. Excel, for example,
Automatically changes the column and row numbers to reflect the new position. (In
spreadsheet applications)
• Cell references in formulas that change when Excel copies them to another location.
• A cell reference in which a dollar sign ($) precedes both the column and row portions of the
cell reference.
• Cell reference in which either the column or the row is never adjusted if the formula
containing it is copied to another location.
Cell address
Primary key-Is a field whose value identifies one & only one record in a file.
Secondary key-An alternative index for identifying an entity. Its value can identify single
entity occurrences of all entity occurrences. A subset of all entity occurrences.
Foreign key-Are pointers or links to occurrences of a different file. A foreign key in one file
must be a primary key in another file.
• This is programming with files. Each user defines and implements the files needed for a
specific application so that each application has its own separate data files and software
programs
• Although both users will be interested in the same data, each maintains separate files and
programs to manipulate these files and this results in data redundancy and a lot other
problems associated with it.
Advantages of the Database Approach
• Program/Data independence
• Data sharing
Disadvantages
• Concurrence problems - where more than one user access and attempt to update the same
record at the same time - there is file edit locking to prevent this.
• Ownership problems - sometimes some individuals tend to own the data and thus refuse
access by other individuals or departments in the organisation.
• Resources problem - with database extra resources are needed e.g. more workstations and
other devices. Substantial hardware and software start-up costs are involved
• Security problems - there is increased exposure to unauthorised entry into the data.
However, this could be reduced by the use of regularly changed passwords and by
physically denying access to unauthorised users.
Terms in Databases
Entity- a real world object or event or anything that is capable of independence existence and
about which we can collect information e.g. person, building, transaction, election
• Primary key – an attribute that uniquely identifies an entity or record. A field that uniquely
identifies a record in a table. In a student’s table, for instance, a key built from last name +
first name might not give you a unique identifier (two or more Jane Does in the school, for
example). To uniquely identify each student, you might add a special Student ID field to be
used as the primary key.
• Foreign key- A key used in one table to represent the value of a primary key in a related
table. While primary keys must contain unique values, foreign keys may have duplicates. For
instance, if we use student ID as the primary key in a Students table (each student has a
unique ID), we could use student ID as a foreign key in a Courses table: as each student may
do more than one course, the student ID field in the Courses table (often shortened to
Courses, student ID) will hold duplicate values.
The process usually involves breaking down a single table into two or more tables and
defining relationships between those tables. The process of breaking up a table into multiple
tables, each of which has a single theme, thereby reducing data redundancy; 2)
The technique that reduces or eliminates the possibility that a database is subject to
modification anomalies
• Query - A view of your data showing information from one or more tables. For example,
you could query a Students database asking "Show me the first and last names of the students
who take both history and geography and have Alice Hernandez as their advisor". Such a
query displays information from the Students table (first name, last name), Courses table
(course description) and Advisor table (advisor name), using the keys (student ID, course ID,
advisor ID) to find matching information. Literally, a question you ask about data in the
database in the form of a command, written in a query language, defining sort order and
selection, that is used to generate an ad hoc list of records; 2) .The output subset of data
produced in response to a query.
• Relation- A single store of related information. A table consists of records, and each record
is made up of a number of fields. You can think of the phone book as a table: It contains a
record for each telephone subscriber, and each subscriber’s details are contained in three
fields – name, address and telephone.
•DBMS- Database management system. A program which lets you manage information in
databases. Microsoft Access is a DBMS, although the term is often shortened to ‘database’.
So, the same term is used to apply to the program you use to organize your data and the
actual data structure you create with that program.
One-to-One
Exactly one record in one table is related by a common linking field to exactly one record in
another table, implying that each value of the linking field appears no more than once in each
of the tables. Both tables can have only one record on either side of the relationship.
Each primary key value relates to only one (or no) record in the related table. They're like
spouses—you may or may not be married, but if you are, both you and your spouse have only
one spouse. Most one-to-one relationships are forced by business rules and don’t flow
naturally from the data. In the absence of such a rule, you can usually combine both tables
into one table without breaking any normalization rules.
One-to-Many
Exactly one record in one table is related by a common linking field to one or more
records in another table, implying that each value of the linking field is unique in the first
table, but not necessarily so in the second. The primary key table contains only one record
that relates to none, one, or many records in the related table. This relationship is similar to
the one between you and a parent. You have only one mother, but your mother may have
several children.
Many-to-Many
One or more records in one table may be related to one or more records in a second table by a
common value or linking (join) field. This implies that each value of the linking field may
appear any number of times in either or both tables. Each record in both tables can relate to
any number of records (or no records) in the other table. For instance, if you have several
siblings, so do your siblings (have many siblings). Many-to-many relationships require a third
table, known as an associate or linking table, because relational systems can't directly
accommodate the relationship.
This is a person responsible for planning, designing and maintaining the organisation's
database. This person relates to the management, system analysts, programmers and other
stakeholders in the organisation. He needs to have adequate managerial and technical abilities
to suit the job. He therefore must have a sound knowledge of the structure of the database and
the DBMS.
• The DBA is also responsible for the documentation of the DBMS through the designing and
availing of the data dictionary and manuals for the users giving such direction as the general
use of the database, access to information, deletion of records from the system and the
general validation and verification of data.
• The design of the database
• After the initial design, the DBA must monitor the performance of the database, and if
problems surface (such as a particular report taking an unacceptably long time to produce),
appropriate changes must be made to the database structure.
• Keeping users informed of changes in the database structure that will affect them; for
example, if the size or format of a particular field is altered or additional fields added
• Maintenance of the data dictionary for the database, and responsibility for establishing
conventions for naming tables, columns, indexes & so on.
• Implementing access privileges for all users of the database; that is, specifying which items
can be accessed and / or changed by each user.
• Data resources
• Database plans
• Design
• Operations
• Training
• User support
The DBMS is an application program that provides an interface between the operating system
and the user in order to make access to the data as simple as possible. It has several other
functions as well, and these are described below.
1. Data storage, retrieval and update. The DBMS must allow users to store retrieve and
update information as easily as possible, without having to be aware of the internal structure
of the database.
3. Managing the facilities for sharing the database. The DBMS has to ensure that problems
do not arise when two people simultaneously access a record and try to update it
4. Back-up and recovery. The DBMS must provide the ability to recover the database in the
event of system failure.
5. Security. The DBMS must handle password allocation and checking, and the ‘view’ of the
database that a given user is allowed.
File Organization-Is the arrangement of data records on storage media. It determines the
manner in which individual records can be accessed or retrieved
Definitions
Cycle time - the time usually expressed in seconds for a controller to complete one on/off
cycle.
Access time - the average time interval between a storage peripheral (usually a disk drive or
semiconductor memory) receiving a request to read or write a certain location and returning
the value read or completing the write.
The amount of time it takes a computer to locate an area of memory for data storage or
retrieval.
The time required to retrieve data from a storage device and transmit it to a specified
location.
Random access
Storage systems where data may be stored and accessed in any order, independent of the
ordinal position of the data when it was originally recorded. This is the opposite of linear
access, or linear recording media such as magnetic tape, which necessarily preserves the
sequential relation of the data as it is recorded, and depends on this sequential relation for
accurate playback. Able to read any location directly; without having to read sequentially to
the location.
Sequential access
Data must be read in the order it appears. This method applies to tape, and to a lesser degree
to disks. Reading data from a file whose records are organized on the basis of their successive
physical positions. To reach a specific record, all records previous to that record must be
read, in order. Magnetic computer tapes are sequential access storage device. Refers to
reading or writing data records in sequential order, that is, one record after the other. To read
record 10, for example, you would first need to read records 1 through 9. This differs from
random access, in which you can read and write records in any order.
TYPES OF QUERIES
a. DIRECT QUERY
b. INVERTED QUERY
DIRECT QUERY
Is one where the user can identify the entity in which he is interested?
E.g. where a sales man wants to know the amount and location of a particular product in the
organization.
He is able to identify the product by name or product number and this identification is used
as the key for making the query which is also the primary record key.
• The basic purpose of the direct query is to know the attribute values of already identified
entities
Computer
Hardware
Software
Network
Network topology
Virus
CPU
Computer System
Multi-tasking
Information Technology
Abbreviations
Gb- Gigabytes
MODEM- Modulator/Demodulator
Tb – Terabyte
DVD-R -