You are on page 1of 61

BASIC COMPUTER SKILLS D-CS 01

LECTURE 01

The Background and Computer Concepts

What is a computer?
An electronic device which operates under control stored programmes automatically accepts data, processes it, gives it as output and has also a capability of storing it for later use.

Main Functions of a Computer


a. Input b. Processing c. Output d. Storage

Data :collection of unprocessed items, which can include text, numbers, images, audio, and video. Information: conveys meaning and is useful to people. Hardware: Physical components of a computer. These are the parts that you can see, feel and hear. Software: programs that control the computer and make it function. Program :a set of instructions that the computer obeys.. Peripheral Device: device that connects to the system unit and is controlled by the processor in the computer.
4

Definition of Terms

Common Components of a Computer

INPUT PROCES SING OUTPUT HARDWARE STORAGE COMPUTER SYSTEM SOFTWARE

KEYBOARD, MOUSE, JOYSTICK, MIC, SCANNER, CAMERA, BARCODE READER, LIGHT PEN, TOUCH SCREEN , ETC

CPU

ALU

CU

CACHE MEMORY

TOUCH SCREEN, PRINTER, PLOTTER, MONITOR, SPEAKERS, MULTIMEDIA PROJECTOR, ETC PRIMARY RAM , ROM, Cache Memory
HARD DISK, ZIP DISK, DATA CARTRIDGE, MEMORY CARD, FLASH MEMORY, DISKETTE, CD, DVD,

SECONDARY

SYSTEM SOFTWARE

OPERATING SYSTEM UTILITIES GENERAL SOFTWARE TAILOR MADE SPECIFIC

WINDOWS XP, VISTA, 7, 8 LINUX, UNIX, MSDOS, MACINTOSH ETC DISK CLEANER, SYSTEM RESTORE, ETC MS WORD, MS EXCEL, MS POWER POINT, ACESS, COREL DRAW Tailor made software for an organisatios. E.G MYCIN, used in Medcine 6

APPLICATION SOFTWARE

COMPUTER SYSTEM HOW IT WORKS

Input Devices
Any device which allows us to send data or instructions to the computer can be regarded as an input device. We can use any mechanical movement, sound, light, heat or electronic signals to input data and instructions. The main devices for inputting data into a computer such as:
Mouse, Keyboard, Trackball, Scanner, Touchpad, Lightpen, Joystick, Digital Camera, Microphone.

Processing
Central Processing Unit Phase A: Instruction Cycle 1. Fetch Instruction: The control unit fetches (gets) the program instruction from memory. 2. Decode Instruction: The control unit decodes the instruction (decides what it means) and then moves the necessary data from memory to the ALU. Phase B: Execution Cycle 3. Execute Instruction: The ALU performs the requested action, by executing the arithmetic or logical instructions on the data. 4. Store (write) Result: The ALU writes or stores the result of this operation in memory or in a temporary register. Arithmetic-logic unit: On-board cache memory: Because the CPU can perform its operations much faster than data can be transferred from RAM, many CPUs have on-board cache memory. This is memory that the control unit can access very quickly and use for intermediate storage. Further, data and instructions can be loaded into cache before they are actually needed. When they are needed, the transfer is much faster than it would have been if RAM had been used.

10

Output Devices
An output is any device that the computer uses to send the results of processing to the user. The output can be a hard copy (paper), visual or sound. The common output devices for displaying the results of processing carried out by a computer, such as:
Monitors, screens, Printers, Plotters, Speakers.
11

Storage Memory
There are two general categories of memory: primary and secondary. Secondary memory consists of the various devices that are able to store data and programs even when the power is off. This includes devices such as hard drives, floppy drives, tape drives, CD drives and DVD drives. Primary memory is the memory that is intimately associated with the actual working of the computer. This includes memory that holds the startup routines as well as the current program and data it is working with. There are various forms of primary memory: RAM, ROM and Cache memory. RAM or Random Access Memory holds the current running program and its associated data. ROM or Read Only Memory contains certain key routines (small programs). One example, is the set of start-up routines. These take control of the computer when you switch on and ensure that the computer boots-up. Booting-up is the process of starting the computer up so that it is able to load and run computer programs. Cache memory is very high speed memory that is used by the CPU in executing the individual instructions of the program. It is used to hold items such as instructions that are next in line to be executed and data that is likely to be needed by the CPU. 12

Comparison of RAM and ROM.

13

Secondary Storage Devices


The main types of memory storage such as:
Diskette, Zip disk, USB Data cartridges, CD/DVD Internal, external hard disk.

14

Computer Software

15

System Software
System software consists of the programs that control or maintain the operations of the computer and its devices. System software serves as the interface between the user, the application software, and the computers hardware. Two types of system software are the operating system and utility programs.

16

Operating System
An operating system is a set of programs that coordinates all the activities among computer hardware devices. It provides a means for users to communicate with the computer and other software. Some of the functions of the operating system:
Boot-up the computer. Control the hard drives: This includes such features as formatting and defragmenting disks as well as saving files to and retrieving files from disk. Control input devices such as keyboards, mice and scanners.
17

Utility Program
Utility Program allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs. For example, you can use a utility program to transfer digital photos to an optical disc. Most operating systems include several utility programs for managing disk drives, printers, and other devices and media. You also can buy utility programs that allow you to perform additional computer management functions.
18

Application Software
Application software consists of programs designed to make users more productive and/ or assist them with personal tasks There are many types of system software which include; general purpose software and application specific software

19

The system and application software interface between end users and computer hardware.

20

Types Of Computers

21

Types Of Computers
Computers may be categorized into 2 broad groups First group: Conventional computers this group comprise of machines which are designed with all standard hardware features of computers Second group: Embedded computers this group comprise of special-purpose machines which are designed with embedded microprocessors which behave similar to computers

22

Examples of standard computers


Mainframe Computers Supercomputers Desktop Computers Laptop Computers Handheld Computers Tablet PCs

23

Examples of computer-embedded machines


TVs (Flat screens, Plasma, LCD, LED) Stereo systems (home theatres) Digital cameras Electronic Calculators Electronic Appliances Car computer box Airplane control system

24

Classes by Size
Microcomputers (Personal computers) Minicomputers (Midrange computers) Mainframe computers Supercomputer

25

Classes by function
Servers Workstations Information appliances Embedded computers

26

Large Computers
have several other devices connected to them They posses very high processing power Also have very large storage capacities They perform complex and sophisticated functions They process large volumes of data/information at very high speed Mainly used by very large organizations which require processing of several thousands of records in a very short time
Examples are Mainframe, supercomputers
27

Personal Computers
are relatively smaller in size designed to fit on office desks Generally referred to as PCs Usually used by one person at a time Has the capabilities of performing professional and business functions at offices and homes
Examples are: Desktops, Laptops, Tablet etc.

At organizational level they are usually interconnected through networking to augment their capabilities and functionalities
Through sharing of resources and information
28

Servers: Server usually refers to a computer that is dedicated to providing a service. For example, a computer dedicated to a database may be called a "database server". "File servers" manage a large collection of computer files. "Web servers" process web pages and web applications. Workstations: Workstations are computers that are intended to serve one user and may contain special hardware enhancements not found on a personal computer. Embedded computers: Embedded computers are computers that are a part of a machine or device. Embedded computers generally execute a program that is stored in non-volatile memory and is only intended to operate a specific machine or device. Embedded computers are very common. Embedded computers are typically required to operate continuously without being reset or rebooted, and once employed in their task the software usually cannot be modified. 29

Classes By Functions

CLASSIFICATION BY MOBILITY
Tablet computer Like laptops, but with a touch-screen, sometimes entirely replacing the physical keyboard. Smartphones, smart books and PDAs (personal digital assistants) Small handheld computers with limited hardware. Programmable calculator Like small handhelds, but specialized on mathematical work. Handheld game consoles The same as game consoles, but small and portable.
30

Classes By Sizes Microcomputers are the most common type of computers used by people today, whether in
a workplace, at school or on the desk at home. The term microcomputer was introduced with the advent of single chip microprocessors A minicomputer is a class of multi-user computers that lies in the middle range of the computing spectrum, in between the mainframe computers and the microcomputers or personal computers. The contemporary term for this class of system is midrange computer, such as the higherend SPARC, POWER and Itanium -based systems from Sun Microsystems, IBM and HewlettPackard. Mainframe computers: The term mainframe computer was created to distinguish the traditional, large, institutional computer intended to service multiple users from the smaller, single user machines. Mainframe computers are used in large institutions such as government, banks and large corporations. Its SPEED is measured in MIPS (Million instructions per second) It responds to 100's of million users at one time Supercomputer: is focused on performing tasks involving intense numerical calculations A computer that is at the frontline of current processing capacity, particularly speed of calculation. Supercomputer processing speeds are measured in floating point operations per second or FLOPS. In terms of computational capability, memory size and speed, I/O technology, supercomputers are the most powerful, 31
very expensive,

Attributes Of Information Quality

32

33

COMPUTER TECHNOLOGY IS EVERYWHERE


Generating information Accessing information Surveillance Changing the way we communicate

34

IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON SOCIETY


Corporate Application All organisations, no matter their size, can benefit from computer applications. Examples found in business include:
a)
b) c)

Office application suites such as OpenOffice.org, Koffice, StarOffice or Microsoft


Office for creating documents, spreadsheets and presentations. Accounting packages such as Pastel Accounting for keeping debtors and creditors records and creating statements and invoices.

d)

Inventory systems for keeping track of stock.

e)
f)

Desktop publishing packages such as Microsoft Publisher and Page Maker for creating newsletters and press releases.
Client tracking software such as Gold Mine for representatives to maintain regular contact with clients and record their activity.

g)

Airline bookings systems which manage large amounts of data and reservation details and also have the flexibility to handle frequent changes to bookings.

h) i)

Insurance claims systems to manage the processing and payment of claims. Online banking systems enable corporates and individuals to have easy access to funds transfer and account maintenance.

35

Public Sector Applications


Know some of the uses of large-scale computer

applications in government such as:


a)Inland Revenue b)National census and other demographic data c)Vehicle Registration d)Electronic voting

36

Health Sector Applications


Some of the uses of large-scale computer applications in hospitals/healthcare such as:
a) b) c) d) e) Patient records Scheduling Ambulance control systems Diagnostic tools Specialised surgical equipment

37

Education Sector Applications


Uses of computer applications in education such as: a) Student records
b) c) d) e) f) Timetabling Computer Based Training Automated examinations Distance learning Homework using the Internet

38

Other Applications Of IT
Teleworking Applications Advantages of Teleworking

Professionals do not waste time on commuting between home and work. are free to undertake work where ever they are. greater ability to focus on one task. have flexibility to arrange their work time according to their needs and inclinations. generally have tax advantages as they can claim business expenses.
Organisations save on office space, equipment and facilities. Disadvantages of Teleworking Professionals may suffer from lack of human contact. need to be highly self-disciplined. Organisations will not get the benefits of teamwork. will have less control over workers.

39

Other Applications Of IT
Electronic World

To use email, you need to have access to a network or the Internet. A mail client is installed on the computer. This is used for the creation, sending, receiving and storage of email messages. Well known email clients include Evolution, KMail, Microsoft Outlook and Outlook Express. Electronic Mail Email addresses Email address consist of two parts separated by an @ symbol. The first part is the name of the user and the second part is the name of the mail server. For example, in the email address david@icdlafrica.com, the user name is david and the name of the mail server is icdlafrica.com. This is the address of the computer which holds his mail. Advantages of email It is very fast and efficient. Documents and files can be sent with the email. Th It is very cost effective. There is a saving on paper, printing and envelopes. Email clients can be organised so that copies of emails that have been sent can be stored under appropriate directories.

Disadvantages of email If there is a problem with the telephone lines, email cannot be sent or received. There are certain security problems such as the interception of email by hackers. Occasionally problems in the complex system between the sender and recipient occur which cause email to disappear.
Unsolicited email or spam is becoming a problem.

40

Computer Viruses

What is a computer virus?


A computer virus is a program that is designed to replicate itself by copying itself into the other programs stored in a computer. It can cause a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory

Virus Types:
There are six broad categories or types of computer viruses: 1) Boot Sector Virus 2) File Infection Virus 3) Multipartite Virus 4) Network Virus 5) E-mail Virus 6) Macro Virus

Virus Types:
Boot Sector Virus - These Viruses aim at the boot sector of a hard drive are infecting a very crucial component of the boot process. File Infection Virus- File viruses are coded so that they will attach themselves to exe files, compressed files like zip files and driver files.

Virus Types:
Multipartite Virus - That which has been termed the multipartite virus are the types of computer viruses that are both a file virus and a boot sector virus. Network Virus - A virus that is especially made for networks is uniquely created to quickly spread throughout the local area network and generally across the Internet as well. Most of the time is moves within shared resources like drives and folders.

Virus Types:
E-mail Virus - Most of the time a e-mail virus is one of those types of computer viruses that is generally a macro virus and it will multiply itself by seeking out the other contacts in a e-mail address book and then send itself to those addresses in hopes that they will activate the virus too. Macro Virus - Macro viruses as the name implies, will infect files of programs that use macros in the program itself.

Preventing Viruses
The most important thing to do is to install virus protection software and update it on a regular basis (at least weekly). While having anti-virus software is critical, it is no longer enough to provide maximum protection. You should also run operating system updates regularly, as recommended by the developer of your operating system.

The Internet
Global group of interconnected networks

Originated in 1969
Department of Defense ARPANet

Only text, no graphics until 1989


World Wide Web - WWW

Copyright @ 2009 Pearson Prentice Hall. All right reserved.

48

The WWW
World Wide Web Subset of the Internet that displays graphics Hyperlinks (links)
Connections to other Web pages

Viewed with graphical browser No commercial interest in the Internet until the advent of the WWW
Copyright @ 2009 Pearson Prentice Hall. All right reserved.
49

What Do You Need to Connect?


A computer A physical connection An ISP (Internet Service Provider)

50

ISP - Internet Service Provider


Company that provides a connection to the Internet through their host server Local or national
Local - phone companies or long-distance carriers National - AOL or CompuServe

Cost depends on level of service Individual needs differ


Choose what is best for you

51

Web Addresses
Anyone can have a Web page
Web authoring tool (software) HTML, JavaScript, or Java Internet server Physically hosts the Web page

Every Web page has a unique Uniform Resource Locator (URL)

52

URL
Uniform Resource Locator
String of unique characters
Domain name - address of the Internet server where the Web page resides

Filename with extension

http://www.sou.edu/Admissions/index.html
Type of organization Folder name

Hypertext Transfer Protocol - Internet communication protocol

53

Domains
Top-level domain
Represents organizations purpose (or is supposed to)
May include a country code mx Mexico
.edu .com .gov .mil .org .net Educational institution Commercial business Government agency Military Nonprofit organization Network organization

ca Canada
gb Great Britain
List of country codes through w3c

New ones soon to come!


54

Browser
Software program used to display Web pages Handles information from the Internet Most popular browsers
Internet Explorer (IE) Netscape

America Online (AOL)


FireFox Opera Safari

User can use more than one Browser

55

How Do I Surf the Web?


The Address bar of the browser
Type the URL Copy and paste URL if it exists elsewhere

AutoComplete
Begin typing and URL pops up from list Better to paste or use AutoComplete
Fewer errors

56

Searching the Web


Two types of search services
Subject Directories Offers links organized by subject areas Best used with broad topic or idea Search Engines Keyword search

Best used with specific topic

57

Search Engine Issues


Paid sponsors for links
Some search engines clearly show them
Google is highly regarded

Know the search rules


Lessen stress Receive more relevant sites

Not waste time


Choose search keywords carefully
58

Favorites or Bookmarks
When viewing a page that you want to return to
Add page to either
Favorites (Internet Explorer) Bookmarks (Netscape)

Sites can be organized into folders

History list
Keeps Web page addresses for short time
59

Downloading or Uploading
Downloading
Process of obtaining a file from another computer Receive a copy of the file Success depends on
Having enough disk space on your computer File must be available for unrestricted copying

Uploading
Process of placing a file onto another computer Give a copy of the file
60

Societal Implications
Wide access and limited control results in
Misuse Hacking Viruses Unscrupulous profiteering Privacy issues Security concerns

Can you think of other concerns? Would government control be better?


What would be given up for government control?
61

You might also like