0% found this document useful (0 votes)
13 views

ict-all-powerpoint-notes (1)

The document provides an introduction to Information and Communications Technology (ICT), detailing its components: Information Technology and Communications Technology. It explains the functions of computers, classifications of computers, and the differences between data and information, alongside the roles of hardware and software. Additionally, it covers various input and output devices, including their functions and examples.

Uploaded by

Peter Mwenya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

ict-all-powerpoint-notes (1)

The document provides an introduction to Information and Communications Technology (ICT), detailing its components: Information Technology and Communications Technology. It explains the functions of computers, classifications of computers, and the differences between data and information, alongside the roles of hardware and software. Additionally, it covers various input and output devices, including their functions and examples.

Uploaded by

Peter Mwenya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 310

Introduction to ICT

ICT
What is ICT?
• ICT stands for Information and
Communications Technology.
• Notice that two technologies make up ICT
and these are:
– Information Technology
– Communications Technology
What is Information Technology?
• It is a combination of facilities for collecting,
storing, retrieval and processing of information.
• It can be manual or electronic.
• The major component of electronic information
technology is the computer.
Advantages of electronic
information technology
• There is faster and easier retrieval of information.
• There is greater accuracy in data processing.
• There is reduced cost of data processing.
• There is greater and efficient storage of information.
• It is capable of making complex calculations easier.
• Can easily handle routine and repetitive tasks.
• Can be used to do or monitor work in places
inaccessible to humans
What is Communications Technology?
• Communications Technology is a collection of
facilities for transmission and reception of
information.
• Communications Technology can be manual or
electronic.
• The major components of electronic
Communications Technology are computers
and telecommunications facilities.
What does one learn in ICT?
• You will learn;
• How to collect, store, retrieve and process
data.
• How to transmit and receive information.
• How to identify and correct errors during
processing or transmission.
• How to identify, install and troubleshoot
ICT facilities.
ECONOMIC BENEFITS OF COMMPUTERS
• These are financial savings that are
attributed to the use of computers, e.g.
– Reduction in the time of processing data.
– Reduction in the cost of storage facilities.
– Reduction in the number of staff employed to
do routine tasks
CLASSIFICATION OF COMPUTERS
• It is important to understand the various
classes of computers for a number of
reasons, consider the following.
– Different computers are used for different
purposes.
– Different computers have different processing
power.
– Different computers have different costs.
– Different computers require different operating
conditions.
CLASSIFICATION OF COMPUTERS
• Computers can be classified on the basis
of many factors, e.g.
– Cost
– Speed of processing
– Amount of storage
– Operating environment
CLASSIFICATION OF COMPUTERS
• On the basis of the factors outlined above,
computers are classified as follows:
– Microcomputers
– Servers Compters
– Minicomputers
– Mainframe computers
– Supercomputers
CLASSIFICATION OF COMPUTERS
• MICROCOMPUTERS
– A personal computer; designed to meet the
computer needs of an individual.
– They are the most widespread.
– They are also called personal computers
because of being single user.
– They include the following:
• Desktops
• Laptops
• Notebooks
• Netbooks
• Palmtops
WHY MICROCOMPUTERS ARE
THE MOST COMMON
• They are portable.
• They cost the least amount of money to
buy.
• They use less sophisticated software and
hardware.
• They can be easily upgraded.
• They do not necessarily require air-
conditioned rooms.
• They can easily be connected in a network.
Minicomputers
 These are called midrange computers.
 Power between mainframe and desktop.
 They have greater storage capacity and faster speed than
microcomputers.
 Handle hundreds of users.
 Users access through a terminal.

1A-13
Server Computers
• a server is an instance of a computer program
that accepts and responds to requests made by
another program, known as a client.
• Servers are used to manage network resources.
For example, a user may setup a server to control
access to a network, send/receive e-mail, manage
print jobs, or host a website.

•.

Supercomputers
 Theses are the most
powerful computers
made and very
expensive
 Handle large and
complex calculations
 They are designed for
very fast processing
speed of processing
trillions of operations
per second
 Found in research
organizations
Mainframes
• These computers have many
terminals and several disk and
tape drive
• Mainframe computers are used
in large organizations
• Mainframe Computers are
usually slower, less powerful
and less expensive than
supercomputers.
• These computers handle
thousands
of users.
• Users access through a
terminal e.g ATM network.
COMPUTER SYSTEM

• As a system, a computer consists of two main


parts.
• The main parts that make up a computer are
hardware and software.
• Computer = Hardware + Software
COMPUTER SYSTEM HARDWARE

18
Speakers Monitor

Key board CPU


Mouse
Which is a computer ?

20
What is a Computer?

 A computer is an electronic device


that accepts user input (data)
processes or store it and produce
desired output (Information).

21
Function of computer

A computer has four functions:

1.Accepts data Input


2.Processes data Processing
3.Produces output Output
4.Stores results Storage

22
Information Processing

23
Data
 They are raw facts that are
meaningless to the user and
cannot be used to make decision
e.g. 260978765401.
infomation
 This is the processed data that convey a
meaning e.g. 260978765401 is cell phone
number or Bank account number
24
Processing

 Refers to the way data is


manipulated to turn into information
e.g. arithmetic operation, addition
subtraction etc.

25
Information

 Refers to data which has been


processed.

26
Difference between data and information
Data Information
Meaning Data is raw, unorganized facts that When data is
need to be processed. processed, organized,
Data can be something simple and structured or presented
seemingly random and useless in a given context so as
until it is organized. to make it useful, it is
called Information.

Information is
interpreted data.

Example Each student's test score is one The class' average


piece of data score or the school's
average score is the
information that can be
concluded from the
given data.

27
Exzample of data and information

28
Likes & Dislikes of computer

 Things computer like:


 Good ventilation
 Clean environment
 Stable,vibration free surface

29
Likes & Dislikes of computer

 Things computer don’t like


• Dust
• Drinking and eating over the
keyboard
• Heat, Cold or Moisture
• Don’t place objects on top of
monitors 30
Login instructions
Username [ user08 ]

Psssword [ zicta ]
Hardware and Software
What is Hardware?

Hardware is the physical parts of the


computer system – the parts that you can
touch and see.

A motherboard, a CPU, a keyboard and a


monitor are all items of hardware.
32
Typical examples of hardware

Computer
system

33
What is computer software ?

Can you give me some examples ?

34
What is software ?

Software is a collection of instructions that


can be ‘run’ on a computer.
One instruction is called program.
These instructions that tell the computer
what to do.
Software is not a physical thing

35
Types of Software
 System software
It is computer software
designed to operate and control the computer
hardware and to provide a platform for
running application software, eg. operating
system and utility programmes
 Application software

It is a group of programs designed to accomplish


a single task or a group of related tasks eg.
Microsoft Office
36
System Software
System Software is used to control and manege
computer devices and operations.
It consists of
 Operationg System

A set of programs that coordinates all the


activites among the computer hardware devices
 Utillity Programme

A type of system software that allows a user to


perform maintenance type tasks,

37
Examples of system software?

38
how the operating system software and
application software are layered

The arrows indicate information flow.


39
Figure show the some example of
system software

40
INPUT AND
OUTPUT DEVICES
Prepared by:
Mr. Bwalya M.
ICT
INPUT PERIPHERALS OR
DEVICES
Peripherals are
devices that are
connected to the
computer box or
Central Processing
Unit (CPU).
TYPES OF PERIPHERALS
Input devices – these are
devices that pass data into the
computer system.
Output devices – these are
devices that pass information
out of the computer system
Backing storage devices –
these are deices that store
programs and data.
INPUT DEVICE
 This is the hardware or
device used to enter or
transfer data into the
computer system.
It is categorised into
Manual input devices &
Automatic/Automated input
devices.
MANUAL INPUT
DEVICES
MANUAL INPUT DEVICE:
This is a type of
control device that
requires an individual
to manually press a button
OR
this is the entry of data by
hand into a device at the
time of processing
EXAMPLES
OF MANUAL
INPUT
DEVICES
MOUSE
Mouse: is an input
device that controls
the movement of
the cursor or
pointer on the
display screen.
EXAMPLES OF MICE
TRACKERBALL
Is an input device
that looks like an
upside down mouse.
The pointer is moved
by rotating the ball
using a thumb or
finger.
EXAMPLES OF TRACKER BALL
JOYSTICK
An input device that looks
similar to a control device
that is used for playing
games.
A joystick allows an
individual to move
an object in a game such as
navigating a plane in a flight
simulator.
EXAMPLES OF JOYSTICKS
LIGHT PEN
A light pen is a light-
sensitive pointing
device commonly
used to select or
modify text or data
on a screen.
EXAMPLES OF LIGHT PENS
KEYPAD
Keypad is a small and special
keyboard with fewer keys or
buttons used in special
dedicated devices. it consists of
digits, symbols and/or
alphabetical letters which can
be used to enter data.
For example, calculator, cell
phone, remote control etc.
EXAMPLES OF KEYPADS
EXAMPLES OF KEYPADS
EXAMPLES OF KEYPADS
MICROPHONE
Microphone: is an input
device used to send audio
into the computer system.
OR
is an input device that allows
a user to speak to the
computer to enter data and
instructions into the
computer system.
EXAMPLES OF MICROPHONES
EXAMPLES OF MICROPHONES
KEYBOARD
Keyboard : is an
input device used
mainly for typing
text into the
computer system.
The keyboard has keys for
letters and numbers. The
following are the main parts
of a keyboard:
The function keys,
The numeric keypad
(number pad), navigation
keys (arrow keys), QWERTY
or Alphanumeric Keys.
PARTS OF THE KEYBOARD
(i) Function keys (F1 to F12)
The Function keys found on
the top row, perform different
functions or tasks depending
on which program someone is
using. Example in a word
processor (Ms Word) F7 key is
used for spell checking, F1 is
used for help etc
(ii) Numeric Keypad or
Number pad
The numeric keypad,
located on the right side
of most keyboards, allows
you to enter numbers
quickly. Although not
available on laptops.
(iii) Arrow keys or
Navigation keys
The navigation keys, such
as the four directional
arrow keys allow you to
move the cursor and
position within a
document or webpage.
(iv) Alphanumeric or QWERTY pad
This has keys for letters, numbers
and special keys Ctrl (Control),
Shift, Alt, Fn, Alt Gr, Caps lock, : ;
%,&, $, @,” ?, #, Window button,
Pg(Page) down, Pg(Page)Up,
Del(Delete), Enter, Esc(Escape),
Home, Tab, Pause break, Prt
Sc(Print Screen), End, Back
space, Space Bar,
Wrist pad
This is a plastic wrist
pad which supports
the users wrists and
relieve stress found
from typing on a
keyboard.
EXAMPLES OF KEYBOARDS
EXAMPLES OF KEYBOARDS
EXAMPLES OF INPUT DEVICES
CONCEPT KEYBOARD
This is the type of
keyboard where
pictures represent some
item of data and is
sometimes used in fast
food restaurants,
supermarkets on tills.
EXAMPLES OF CONCEPT
KEYBOARDS
EXAMPLES OF CONCEPT
KEYBOARDS
EXAMPLES OF CONCEPT
KEYBOARDS
REPETITIVE STRAIN
INJURY (RSI)
This is when a user
uses a keyboard or
mouse over and over
and damages the
nerves of the hands,
wrists.
GRAPHIC TABLET
Graphic Tablet/Drawing
tablet: This is a highly
accurate hardware
input device that is
used for drawing or
sketching. e.g. an artist
drawing
EXAMPLES GRAPHIC TABLET
DIGITAL CAMERA
Digital Camera: is
an input device that
stores the pictures
and videos in
electronic format.
EXAMPLES OF DIGITAL
CAMERAS
EXAMPLES OF DIGITAL
CAMERAS
TOUCH SCREEN
Touch screen: This is
a device which is both
an input and output. It
is a special screen
that allow a user to
choose options by
touching images.
EXAMPLES OF TOUCH SCREENS
EXAMPLES OF TOUCH SCREENS
EXAMPLES OF TOUCH SCREENS
EXAMPLES OF TOUCH SCREENS
AUTOMATIC OR
AUTOMATED INPUT
DEVICES
AUTOMATIC INPUT
DEVICE:
This is a type of
control device that
automatically
control each step
in a process.
EXAMPLES OF
AUTOMATIC
OR
AUTOMATED
DEVICES
SCANNER
Scanner: This is a
device that captures
printed material, text,
images into the
computer and
convert it into a
digital file.
EXAMPLES OF SCANNERS
BARCODE READER
Barcode Reader: is a
device that uses light-
beam to read and
interpret bar codes in
the computer. E.g. Point
Of Sale (POS)
EXAMPLES OF BARCODE
READERS
EXAMPLES OF BARCODE
READERS
EXAMPLES OF BARCODE
READERS
EXAMPLES OF BARCODE
READERS
WEBCAM / WEB CAMERA
Web Cam or Web Camera:
is a small camera
connected to a computer
used to capture and
transmit audio and video
over the Internet.
EXAMPLES OF WEB CAM OR
WEB CAMERAS
EXAMPLES OF WEB CAM OR
WEB CAMERAS
EXAMPLES OF WEB CAM OR
WEB CAMERAS
OPTICAL CHARACTER
READER/RECOGNITION
(OCR)
OCR: is the device that
process text or letters
and converting them
into data that a
computer can interpret.
EXAMPLES OF OPTICAL CHARACTER
READER/RECOGNITION (OCR)
EXAMPLES OF OPTICAL CHARACTER
READER/RECOGNITION (OCR)
OPTICAL MARK READER /
RECOGNITION (OMR)
OMR: is a device that
detects the presence of
pencil marks made on a
piece of paper or
document. E.g. marking
grade 7 multiple questions
exams.
EXAMPLES OF OPTICAL MARK
READERS/RECOGNITION
EXAMPLES OF OPTICAL MARK
READERS/RECOGNITION
MAGNETIC INK CHARACTER
READER/RECOGNITION
(MICR)
MICR: is a device
that is used in the
bank for reading
paper cheques.
EXAMPLES OF MAGNETIC INK
CHARACTER READER /RECOGNITION
EXAMPLES OF MAGNETIC INK CHARACTER
READER / RECOGNITION (MICR)
Infrared detectors –
useful in burglar alarm
systems to detect body
heat.
Pressure sensors –
also in burglar alarm
systems and many
control applications.
Light sensors – can be used
in microprocessor-controlled
cameras to adjust exposure.
Card readers – cards such
as credit cards have a data
encoded in a magnetic strip.
Others such as satellite
viewing cards are called
smart cards and have more
data stored in a microchip.
OUTPUT
DEVICES
OUTPUT DEVICE
 This is the device that
pass processed
information or results to
the user.
Two types of output are
hard copy (printed
output) and softcopy
(visual or sound/audio).
Soft-copy: This is output
information displayed
visually on a VDU/
screen/monitor or in audio
form.
Audio output: is output from
the speaker/loudspeaker
Hard-copy: This is a
permanent paper printed by a
printer.
EXAMPLES
OF OUTPUT
DEVICES
MONITOR/VISUAL DISPLAY
UNIT(VDU)/SCREEN
This is an output
device that
displays signals on a
computer screen. It is
used to view images
and documents.
There are different types
of computer monitors
such as the Cathode Ray
Tubes (CRT), Liquid
Crystal Display (LCD),
Thin Film Transistor (TFT-
LCD) and the Light
Emitting Diodes (LED).
EXAMPLES OF CATHODE RAY TUBES
(CRT) MONITORS
EXAMPLES OF LIQUID CRYSTAL DISPLAY
(LCD) MONITOR
EXAMPLE OF LIGHT EMITTING DIODE
(LED) MONITOR
PRINTER
Printer: This is
an output device
that prints text or
graphics on
paper.
TYPES OF PRINTERS
Below are some of
the examples of
printers:
Laser Printer,
Ink Jet Printer
Dot Matrix Printer
LASER PRINTER
Laser Printer: This is an
output device that prints
high-quality resolution
text and graphics by
means that is similar
to photocopying.
EXAMPLES OF LASER JET
PRINTERS
EXAMPLES OF LASER JET
PRINTERS
INKJET PRINTER
Inkjet Printer: This
is an output device
that prints by
spraying ink on
paper. It is
mostly used at home
EXAMPLES OF INKJET PRINTERS
DOT MATRIX PRINTER
Dot Matrix Printer:
it is an output device
that print images that
are made up of a
number of individual
dots.
EXAMPLES OF DOT MATRIX
PRINTERS
EXAMPLES OF DOT MATRIX
PRINTERS
MOTORS:
These are found on
computer control
devices such as robots
or paint spraying
machinery, electric
motors.
PLOTTER
Plotter: is a special output device
that prints, draws, produce high
quality graphical images on very
large pieces of paper. E.g.
Computer Aided Design (CAD),
Architect and technical drawings
(drawings of buildings and maps).
Types of plotters are drum
plotters, flatbed plotters etc.
EXAMPLES OF PLOTTERS
EXAMPLES OF PLOTTERS
EXAMPLES OF PLOTTERS
LCD PROJECTOR
LCD PROJECTOR: An
output device that
can display and
project large images
from the computer
system.
EXAMPLES LCD PROJECTORS OR
BEAMERS
SPEAKERS
SPEAKER: This is an
output device which is
sometimes
connected to the
computer to give out
beeping signals and
audio sounds.
EXAMPLES OF SPEAKERS
HEADPHONES
Headphones: are output
devices with a pair of
small loudspeakers that
are placed over the
head, for listening to
audio signals such as
music or speech.
EXAMPLES OF HEADPHONES
LASER JET PRINTERS
• They use toner and laser light.
Advantages:
• They print very fast.
• They print quietly.
• They can print in colour or black.
• Their printout is of high quality.
LASER JET PRINTERS (Continued)

Disadvantages:
• They are expensive to buy.
• Their toner is costly as well.
• They use laser light which is harmful when
exposed to it.
• They consume more electrical energy.
STORAGE DEVICES
• Storage devices are used to store user
data and computer software.
• There are three types of storage devices.
• The three types are magnetic devices,
optical devices and semiconductor
devices.
MAGNETIC STORAGE DEVICES
• These use magnetic properties to store
data.
• To make a storage device, a magnetic
powder, e.g. iron oxide, is coated on a
material.
• Data is stored by forming a magnetic
pattern on the powder, similar to way
music is recorded on audio tapes.
MAGNETIC STORAGE DEVICES
(Continued)

• There are two types of magnetic storage


devices:
• The two types are magnetic tapes and
magnetic disks.
• Magnetic tapes are used very rarely
nowadays because they are slow.
• There are two types of magnetic disk.
MAGNETIC DISKS
• The two types of magnetic disk are floppy
disk and hard disk.
• The hard disk stores more data than the
floppy disk.
• The hard disk is make from hard material
such as aluminium.
• The floppy disk is made from soft material,
i.e. plastic.
MAGNETIC DISKS (Continued)

• Floppy disks are no longer popular on


modern computers.
• Floppy disks are removable from the
computer.
• Hard disks are not removable from the
computer.
OPTICAL STORAGE DEVICES
• Optical disks do not use magnetic
properties to store data.
• Optical disks use laser light to store data
on storage medium.
• Examples of optical disks are CDs, CD-
ROMs, and DVD-ROMs.
• Optical disks store more data than floppy
disks.
SEMICONDUCTOR STORAGE
• A semiconductor storage device does not
use magnetism or light to store data.
• Semiconductor storage devices use
electronic chips to store data.
• An example of a semiconductor storage
device is a flash disk.
• Flash disks store more data than floppy
disks, and they are easier to carry.
• Some flash disks store more data than
CD-ROMs and DVD-ROMs.
Examples of Storage Devices

Hard Disk Floppy Disk CD-ROM

Zip Disk Flash Disk


STORAGE CAPACITY
• The storage capacity of a storage medium
is given in BYTES.
• One byte of data is equal to eight bits.
• For example, in a coding system called
Extended Binary Coded Decimal
Interchange Code (EBCDIC), the letter A is
represented by 11110001.
• 11110001 is one byte.
STORAGE CAPACITY
• 1kilobyte (kB) means one thousand bytes.
• 1megabyte (MB) means one million bytes.
• 1gigabyte (GB) means one billion bytes.
• 1terabyte (TB) means one trillion bytes.
EXERCISE
1. How many bits make up one character?
2. How many characters can a 512MB flash
disk hold?
3. How many bits can a 160GB hard disk
hold?
4. What is the difference between 20b and
20B?
DISK DRIVES
• In the computer, a disk (floppy, hard or
optical) is controlled by a mechanism
called a disk drive.
• Disk drives are identified by letters A, B, C,
D, and so on.
• Disk drives A and B are no longer used on
modern computers because they control
floppy disks.
DISK DRIVES (Continued)

• Disk drive C is always for the first hard disk


which was installed.
• If a computer has two hard disk drives, the first
is C and the second is D.
• A computer denotes a flash disk as a removable
disk.
• For a computer with one hard disk drive, flash
disks are assigned letters D, E, F, G, and so on.
• To check how many and which drives a
computer has, you simply open the My
Computer folder on the Windows Desktop.
THE PROCESSOR
• This is the most important part of computer
hardware.
• It has many parts that perform different
functions.
• The most fundamental parts of the processor
are as follows:
 Control Unit – CU
 Arithmetic and Logic Unit – ALU
 Random Access Memory – RAM
 Read Only Memory - ROM
THE PROCESSOR
.

PROCESSOR
CPU
CU

ALU
INPUT OUTPUT

RAM
ROM MAIN MEMORY

STORAGE
THE CONTROL UNIT – CU
• Controls all functions of the computer,
e.g.
–Controlling operations of
input/output (i/o) systems.
–Controlling flow of data within the
processor and between the
processor and the peripheral
devices.
–Configuring and optimizing RAM to
ensure that it works efficiently.
THE ALU
• This is the unit that does the actual processing
of data.
• It processes data by doing arithmetic and logic
operations.
• Arithmetic means addition, subtraction,
multiplication and division.
• Logic is comparing things so as to make
appropriate choices.
• The CU and the ALU are made on the same
computer chip called the Central Processing
Unit (CPU) or the microprocessor.
RAM
• RAM is temporary storage.
• When power is switched off, everything is
erased from RAM.
Functions of RAM include the following:
– Receiving raw data from input.
– Receiving processed data from the ALU.
– Storing instructions required by the CU.
– Holding data awaiting output.
– Holding data awaiting storage.
ROM
• ROM stores instructions that are used to start the
computer.
• Instructions in ROM cannot be erased.
• During startup, the computer follows instructions in ROM
to do the following:
– Read the amount of RAM present.
– Check that monitor, keyboard and mouse are connected
and working.
– Check that components on the motherboard are
working properly.
– Check that the hard disk drive is connected and
working.
– Load the operating system software in RAM from
storage.
THE BIOS
• BIOS stands for Basic Input/Output Systems.
• Every computer has specifications such as hard
disk size, memory size, and processor speed.
• A bios is a unit (usually part of the ROM) which
keeps these specifications.
• During booting, the computer uses instructions in
the ROM to check that these parameters are
correct.
• Together, ROM and BIOS are called ROM-BIOS.
BASIC UNDERSTANDING OF PROGRAM
EXECUTION
• The main function of the CPU is to execute, i.e.
to run a program.
• A program consists of several instructions , or
steps.
• Each instruction tells the computer to perform a
specific task.
• A program is executed one instruction at a time.
• Initially a program is loaded in RAM.
• The CU, the ALU and the RAM coordinate very
closely during program execution.
HOW CU, ALU AND RAM WORK TOGETHER
• CU fetches an instruction from RAM and puts it in its
CIR (i.e. Current Instruction Register).
• CU decodes, i.e. interprets the instruction and
communicates with ALU.
• CU directs RAM to send data to ALU.
• ALU processes data and places the processed data in
its ACCUMULATOR.
• CU directs ALU to send processed data back to RAM.
• CU directs RAM to send processed data to Output or
Storage.
• Current Instruction Register and Accumulator are
examples of Registers found in the CPU.
REGISTERS OF THE CPU
• The CPU has a number of registers.
• Registers are temporary storage locations.
• Registers are used because they work
faster than RAM.
• Because within the CPU data and
instructions must be transferred very
quickly, the CPU places current
instructions and data in the registers.
REGISTERS OF THE CPU (Continued)

• Some of the registers of the CPU are:


1. Current Instruction Register (CIR) in the CU
and is used to hold an instruction being
obeyed to process data.
2. Memory Data Register (MDR) in the CU used
to hold data being processed.
3. Accumulator in the ALU and is used to hold
data that has just been processed.
4. Memory Address Register (MAR) in the CU
used to hold the address of data being
processed.
STARTING THE COMPUTER
• Locate the power switches on the system
unit (or CPU) and on the monitor.
• Switch on the monitor.
• Switch on the system unit.
• Wait for the computer to be ready.
Starting a computer is also called BOOTING.
Windows Desktop
This is the screen that you come to when you
start Microsoft Windows.
Parts of Windows Desktop
Desktop background
Icons

START button Clock


Open Program or Document Task Bar
Computer Mouse
Right button Scroll Wheel

Left button

• A mouse is a pointing device.


• It is used to move a pointer on the screen.
Pointing, Clicking and Double-clicking
• Pointing is moving a pointer on the screen
so that its tip is placed on a chosen area
or spot.
• Clicking is pressing and releasing a mouse
button.
• Double-clicking is pressing and releasing a
mouse button twice in rapid succession.
• Clicking is used to select an item.
• Double-clicking is used to start something,
e.g. to open a program, a folder or a file.
Parts of a Window
Minimize button Restore button Close
Title bar
button

Menu bar

Scroll
Address button
box Scroll bar

Icons
My Computer
It is a window which shows the disk drives
connected to your computer.
My Documents
It is a window which contains the
documents or files that you save in your
computer.
Recycle bin
It is a window which contains documents
or folders that you have removed from
your computer.
Control Panel
It is a window you use to customize the
appearance and functionality of your
computer.
CUSTOMIZING THE COMPUTER
• This is setting the computer so that it
appears and behaves the way you want.
• You use Control Panel to customize the
computer.
• Using Control Panel you can customize
the mouse, the keyboard, the printer, the
monitor, e.t.c.
CUSTOMIZING WINDOWS DESKTOP
• Click on the START button.
• Click on Control Panel.
• Click on Appearance and Themes.
• Select what you want to customize, e.g.
– Change the computer’s theme
– Change the desktop background
– Choose a screen saver
– Change the screen resolution
Using Help and Support
Microsoft Windows offers help and support
for users. To get help and support on any
topic in Windows, do the following:
• Click the START button on the Taskbar.
• Click Help and Support on the displayed
menu.
• Click a help topic of your choice in the
window that opens.
• Keep clicking options of your choice until
you find what you want.
Folders
•Folders are used like box files or File
cabinets.
•They are used for organizing documents.
• A folder can have another folder or a file
inside it.
• A folder found inside another folder is called
a sub-folder.
• Folders can be made in any storage location,

e.g. hard disk, floppy disk, flash disk, or inside


another folder.
Making Folders

Do the following to make a folder:


1. Open the place where you want to make
the folder.
2. Click File menu.
3. Point to New and click Folder.
4. Type the name of the folder and either
press the enter key or click outside the
name you have typed.
WordPad
• WordPad is a word processor found within
Microsoft Windows.
• A word processor is a kind of computer
software for creating and editing
documents.
WordPad
STARTING WordPad:
• Click the START button on the Task bar.
• Check on the Start Menu for WordPad and
click on it if you see it. If you don’t see
WordPad, proceed as outlined below.
1.Point to All Programs.
2.Point to Accessories.
3.Move to WordPad and click on it.
Title bar
WordPad
Menu bar Standard Toolbar
Formatting bar
WordPad
EXERCISE
Type the following in WordPad:

ADVANTAGES OF A COMPUTER
Advantages of using a computer are many, for example:
1. A computer is very fast.
2. A computer is very accurate.
3. A computer has very large storage in a
very small space.
4. A computer makes communication easier
through electronic mail (e-mail).
5. A computer can be used to control or monitor
operations in places that are hazardous to humans.
6. A computer can be used to handle very complex
calculations.
WordPad
SAVING A DOCUMENT IN WordPad:
• Saving is transferring work from the computer’s
memory, i.e. RAM, to the computer’s storage.
• To save your work in WordPad, do the following:
– Click File Menu.
– Click Save As…
– Open the place in which you want to save the work.
– Click in the File Name box and erase any name you
find there.
– Type the name you want to use for your document.
– Click Save
Opening a saved document in
WordPad
• Start WordPad.
• Click File Menu.
• Open the storage location where the
document was saved.
• Click in the File Name box and type the
name of the document.
• Click Open.
COPYING AND MOVING FILES
AND FOLDERS
• Open My Documents.
• Open the storage location where the file or folder
is.
• Right click the file or folder.
• Left click Copy (to copy file) or Cut (to move file).
• Open the storage location where you want to
place what you have copied or cut.
• Right click some where.
• Left click Paste.
MICROSOFT WORD
• What is Microsoft Word?
• Microsoft Word is a word processing software.
• A word processing software is used for typing,
formatting and editing word documents.
• Word documents are documents that contain
mainly text information.
• Word Processors are the most popular software
because they are easier to use and almost
everyone always wants to communicate text
messages with other people.
MICROSOFT WORD
Starting Microsoft Word
• Do one of the following to start Microsoft
Word:
– Look for the Microsoft Word icon on the
desktop and double click it.
– Click the Start button, look for Microsoft Word
on the Start Menu and click it.
– Click the Start button, point to All Programs,
point to Microsoft Office, point to Microsoft
Word and click.
THE MICROSOFT WORD WINDOW

• The Microsoft Word window has the usual


features of a window, i.e. Title bar, Menu
bar and tool bars.
• The toolbars in Microsoft Word have tools
for doing word processing.
• Examples of the popular toolbars are
Standard Toolbar, Formatting Toolbar
and Drawing Toolbar.
THE MICROSOFT WORD WINDOW

Title bar Menu bar Standard Toolbar Formatting Toolbar

Drawing Toolbar
CUSTOMIZING MICROSOFT WORD WINDOW
• You can customize the Microsoft Word by
removing or adding toolbars or by
changing the colour of the work area.
• To add or remove toolbars do the
following:
– Click the View menu.
– Point to Toolbars
– Click on the name of the toolbar to remove a
check mark or to add a check mark.
CUSTOMIZING MICROSOFT WORD WINDOW

To change the background colour of the


window, do the following:
• Click the Format menu.
• Point to Background and click the colour
on the colour palette you want to apply.
TYPING A DOCUMENT IN MICROSOFT WORD
• Start Microsoft Word.
• Ensure that you have the Standard
Toolbar, the Formatting Toolbar and the
Drawing Toolbar present.
• Start typing your text.
• Press the Space bar to put spaces
between words.
• Press the Enter key to start a new
paragraph.
MICROSOFT WORD
Formatting a document:
• This means applying some quality improving
features onto the document.
• Examples of formatting are:
– Bold
– Italics
– Underline
– Changing font type and size
– Aligning
– Indenting
– Changing colour of text
– Line spacing
– Bulleting
MICROSOFT WORD
Formatting text in a document:
1. Highlight the text you want to format.
2. Click the appropriate formatting toolbar
icon on the formatting bar.
3. Click any where outside the highlighted
area to remove the highlight.
MICROSOFT WORD
Editing a document
• This means making changes by removing
or adding text at appropriate points in the
document.
• Examples of editing are:
– Copy and paste
– Cut and paste
– Undo
– Re-do
MICROSOFT WORD
Using Undo and Redo
• Undo reverses the changes made to a
document.
• Redo reverses the changes done by
Undo.
• Click the Undo icon on the Standard
Toolbar to reverse your action.
• Click the Redo icon on the Standard
Toolbar to reverse the changes made by
Undo.
MICROSOFT WORD
Using Format Painter
• Format Painter is a tool used to apply the
formats from one part to another part of a
document.
• Highlight the part that has the formats you
want to apply to another part of your
document.
• Click the Format Painter icon on the
Standard Toolbar
COMPUTER NETWORKS
What is a computer network?
• A computer network is an interconnection of
computers.
• It is a link between two or more computers.
• A network is simply a collection of computers or
other hardware devices that are connected together,
either physically or logically, using special hardware
and software, to allow them to exchange information
and cooperate. Networking is the term that
describes the processes involved in designing,
implementing, upgrading, managing and otherwise
working with networks and network technologies.
What are the reasons for
networking computers?
• To share data
– For example, a centralized database can be
used to store all the records of an
organization.
– The same data in the database can be
accessed by everyone.
• To share tasks
– Co-workers can collaborate on tasks to speed
up processing.
What are the reasons for
networking computers? (Continued)

• To share computer resources


– Expensive resources, such as hard disk
drives, printers and software programs can be
shared.
– Sharing these resources greatly reduces
acquisition and maintenance costs.
• To make communication more efficient
and effective
– It is easier and cheaper for people to
communicate.
How can computers be linked?
• There are many ways in which computers can
be networked.
• The type of computer network formed is
generally determined by the distance which the
network will cover.
• On the basis of distance, there are three basic
computer networks:
– Local Area Network (LAN)
– Metropolitan Area Network (MAN)
– Wide Area Network (WAN)
Advantages of networking
• Connectivity and Communication
• Data Sharing
• Hardware Sharing
• Internet Access
• Internet Access Sharing
• Data Security and Management
• Performance Enhancement and Balancing
• Entertainment
The Disadvantages (Costs) of
Networking
• Network Hardware, Software and Setup
Costs
• Hardware and Software Management and
Administration Costs
• Undesirable Sharing
• Illegal or Undesirable Behavior
• Data Security Concerns
How can computers be linked?
(Continued)

• A LAN is a computer network within a room, a


building or a small area such as a school
campus.
• Computers in a LAN are separated by distances
of up to a few kilometers.
• A LAN enables the fast and effective transfer of
information within a group of users and reduces
operational costs.
• An example of a LAN is the TVTC computer
network.
The Local Network (LAN)

Client Client

Client Client

Client Client
How can computers be linked?
(Continued)

• A MAN is a computer network within a


town or district.
• A MAN covers a longer distance than a
LAN.
• An example of a MAN is the computer
network used to connect branches of a
bank within a town.
Metropolitan Area Network (MAN)
How can computers be linked?
(Continued)

• WANs connect computers separated by longer


distances, for example in different towns, in
different countries or different continents.
• WANs also use specialized and expensive
hardware and leased communications services.
• An example of a WAN is the Internet which
interconnects many computer networks in the
world.
Wide Area Network
How can computers be linked in
a LAN? (Continued)

• The way computers and other resources


are laid out is known as topology.
• There are various LAN topologies in use.
• Examples of LAN topologies are:
– Star topology
– Ring topology
– Bus topology
– Tree topology
– Mesh topology
STAR TOPOLOGY
• In this topology, there is a central
computer called the host or server to
which all other nodes are linked.
• The computers connected to the host are
called terminals or workstations or
slaves or clients.
STAR TOPOLOGY (Continued)

Host
STAR TOPOLOGY (Continued)

• A high speed computer, e.g. a


minicomputer or a mainframe computer,
can be used as a server.
• A star network is also commonly known as
a client-server network.
STAR TOPOLOGY (Continued)

Advantages of star topology


• It is relatively cheaper because computer
resources, e.g. printers and software are
concentrated on the server.
• There is better or improved security and control
for data and other resources.
• It is cheaper to install and easier to implement.
• A faulty client does not affect network traffic
between other clients.
STAR TOPOLOGY (Continued)

Disadvantages of star topology


• The whole network is affected when the
server is down.
• The whole network is affected if the
server is slow.
• Extra hardware is required in order to
extend the network beyond the limit of
the star network.
• Requires more cable length.
RING NETWORK
• There is no host and no slave; all the
computers are peers.
• Computers are connected to a cable that
runs round forming a ring.
Peer

Peer Peer

Peer
RING NETWORK (Continued)

• Because there is no host computer to


control communication, a special signal
called a token is sent round the network.
• The computer with the token is the one
that is able to send while the other
computers can receive only.
RING NETWORK (Continued)

Advantages of ring topology


• This type of LAN is faster than the star
network.
• There are no signal collisions during
transmission.
• All stations have equal access.
• Because each station on the ring acts as a
repeater, ring networks can span longer
distances.
RING NETWORK (Continued)

Disadvantages of ring topology


• There is poor security for data.
• It is the most expensive topology.
• Failure of one node may affect others.
• For these reasons, ring networks are no
longer popular.
Let’s see an animation of the token ring

226
BUS NETWORK
• In this network, a cable called a bus runs
through.
• All the computers in the network are linked
to this cable.

Bus
BUS NETWORK (Continued)

• Sometimes computers may transmit


signals at the same time.
• Transmitted signals are broadcast.
• Every computer receives a transmitted
signal but checks if the signal is its own.
BUS NETWORK (Continued)

Advantages of bus topology


• Theoretically, this is the fastest network.
• It is easier to connect a computer to the
bus.
• It requires less cable length than star
network.
BUS NETWORK (Continued)

Disadvantages of bus topology


• There is a possibility of signal collisions.
• The entire network shuts down if there is a break
in the bus.
• The process of preventing signal collisions
makes this network slow and expensive
practically.
• Requires terminators at the end of the bus.
• It is difficulty to identify the problem if the
network shuts down.
BUS NETWORK (Continued)

How signal collisions are prevented


• A special technique known as carrier sense
multiple access/collision detection
(CSMA/CD) is used.
• CSMA/CD works as follows:
– A computer wishing to transmit first listens in to check
if there is no signal on the network.
– If no signal is detected, the computer sends its signal
and listens in again to be sure that no other computer
transmitted at the same time.
BUS NETWORK (Continued)

• How signal collisions are prevented


(Continued)

– If another signal is detected, both computers


terminate transmission and wait a random
length of time.
– The procedure is repeated until each
computer sends its signal.
TREE TOPOLOGY
MESH TOPOLOGY
COMMUNICATIONS CHANNELS
• A communications channel is a link
between nodes on a network.
• It is a transport medium that conveys
signals from one network node to another.
• A communications channel can either be
wired or wireless.
• Communications channels differ from each
other mainly in the amount of data signals
which they can transmit at a time.
COMMUNICATIONS CHANNELS
(Continued)

• The capacity or size of a communications


channel is known as bandwidth.
• Bandwidth is the amount of information that
can be sent through a communications
channel in a given amount of time.
• A channel with a greater bandwidth carries
more signals, and therefore transmits data
faster than a channel with a lower bandwidth.
COMMUNICATIONS CHANNELS
(Continued)

• Bandwidth is measured by the number of


bits per second (bps) that can be sent over
a connection.
• For example, the bandwidth of a
connection can be quoted as 10Mbps, i.e.
10 megabits per second.
COMMUNICATIONS CHANNELS
(Continued)

WIRED CHANNELS
• Wired channels form physical links.
• Examples are UTP, Coaxial cable and
Optical fibre.
UTP
• UTP stands for Unshielded Twisted Pair.
• UTP consists of a pair of copper wires
twisted around each other.
COMMUNICATIONS CHANNELS
(Continued)

UTP
COMMUNICATIONS CHANNELS
(Continued)

Advantages of UTP
• The cables are cheaper.
• UTP is easier to install.
• Modern UTP (e.g. Cat 6) has higher data
transfer rates.
Disadvantages of UTP
• Data transfer rates are low for old UTP.
• It has a distance limit of approximately 100m.
• There is more environmental signal interference.
COMMUNICATIONS CHANNELS
(Continued)

Coaxial cable
• A coaxial cable consists of a central
copper wire as one conductor surrounded
by a mesh of wire as outer conductor.
COMMUNICATIONS CHANNELS
(Continued)

• Coaxial cable
COMMUNICATIONS CHANNELS
(Continued)

Advantages of coaxial cable


• Coaxial cables transmit data faster than
UTP because their bandwidth is larger.
• Coaxial cables can cover longer distances
than UTP.
• There is less signal interference from the
environment.
COMMUNICATIONS CHANNELS
(Continued)

Disadvantages of coaxial cable


• They are more costly to produce and to
install than UTP.
• They are very bulky.
• They are not supported by some network
standards.
For these reasons, coaxial cables are not
very commonly used in computer networks
nowadays.
COMMUNICATIONS CHANNELS
(Continued)

Fibre Optic
• This is a very thin rod of extremely pure
glass the size of a human hair.
• Signals are transmitted in form of light
instead of in form of an electric current.
• Each fibre is bent at a special angle to
allow for total-internal reflection of light.
COMMUNICATIONS CHANNELS
(Continued)

Fibre optic
COMMUNICATIONS CHANNELS
(Continued)

Advantages of fibre optic


• Fibre optic cables carry more data because they
have a much greater bandwidth than metal
cables.
• Fibre optic cables are less susceptible than
metal cables to interference.
• Fibre optic cables are much thinner and lighter
than metal wires.
• Data can be transmitted digitally (the natural
form for computer data) rather than analogically.
COMMUNICATIONS CHANNELS
(Continued)

Disadvantages of fibre optic


• The main disadvantage of fiber optics is that the
cables are expensive to buy and install.
• In addition, they are more fragile than wire.
• The glass can be affected by various chemicals
including hydrogen sulphide gas.
• Most fibres become opaque when exposed to
radiation.
• Optical fibres cannot be joined together as easily
as copper cable and requires additional training
of personnel to handle.
COMMUNICATIONS CHANNELS
(Continued)

WIRELESS CHANNELS
• Wireless channels allow for the sending of data
as electromagnetic waves.
• Examples are infrared, radio, Bluetooth,
microwaves, and satellite.
• The advantage of some of these channels is that
data can be sent over very long distances by
remote.
• Remote means no physical connection between
sending and receiving nodes.
COMMUNICATIONS CHANNELS
(Continued)

• The picture below shows satellite dishes.


COMMUNICATIONS CHANNELS
(Continued)

• A satellite dish transmits and receives signals to


and from a satellite which is positioned in space
above the earth.
• Using satellite communication, messages can be
sent round the globe in just a fraction of a
second.
• A common type of dish is the VSAT such as the
one at TVTC.
• VSAT stands for Very Small Aperture Terminal.
COMMUNICATIONS CHANNELS
(Continued)

• Bluetooth symbol
COMMUNICATIONS CHANNELS
(Continued)

• Example of Bluetooth network


OTHER NETWORK
REQUIREMENTS
• Transport media are one of the three
things required in order to link computers
together.
• The other two are protocols and a
naming system.
OTHER NETWORK
REQUIREMENTS (Continued)

• Protocols are a set of rules that govern the


way communication has to be established.
• A naming system or conversion controls
how machines are identified on the
network.
OTHER NETWORK
REQUIREMENTS (Continued)

ETHERNET
• Ethernet has become the most common
transport technology.
• Ethernet enables computers to
interconnect on a local area network.
• Ethernet uses coaxial, twisted-pair or fibre
optic cables as a communication medium.
OTHER NETWORK
REQUIREMENTS (Continued)

TCP/IP
• The protocol that has become the
standard is the Transmission Control
Protocol/Internet Protocol.
• TCP/IP enables different types of
computers and networks on the Internet to
communicate with one another.
OTHER NETWORK
REQUIREMENTS (Continued)

TCP/IP
• TCP/IP consists of two sets of protocols.
• TCP defines how data is transferred across the
Internet to their destination.
• IP defines how data is divided into chunks,
called packets, for transmission; it also
determines the path each packet takes between
computers.
• On a network each computer is assigned an
address called IP address so that signals can
be delivered to the correct destination.
OTHER NETWORK
REQUIREMENTS (Continued)

TCP/IP
• For example, 165.165.38.19 is the IP
address of Google.
DNS
• Hosts or nodes on a network are identified
by names derived from a naming
conversion called Domain Name System.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• Because IP addresses are difficult to
remember by heart, a naming system was
introduced to simplify the task.
• Each IP address is assigned a domain
name.
• A DNS server translates names into IP
addresses.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• For example, the domain name for the IP
address 165.165.38.19 is
www.google.com.
• When a user enters a domain name e.g.
www.google.com, into the web browser,
the local DNS server tries to translate it to
an IP address by consulting its database.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• If it cannot find the address then the local
DNS server consults other DNS servers
on the Internet.
• If the domain name cannot be resolved
by all the DNS servers, the Web browser
displays an error message such as The
webpage cannot be found.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• The IP address naming system uses a
name system that has names in levels.
• Examples of the top-level domain, also
known as the primary domain, are names
that end with .com, .edu, .org, .gov, e.t.c.
• .com means commercial organisation.
• .edu means education organisation.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• The top-level domain may also define the
country in which the DNS server is
located, e.g. .zm (Zambia), .uk (United
Kingdom), .za (South Africa).
• All computers on the Internet are required
to register to one of these primary domain
names.
OTHER NETWORK
REQUIREMENTS (Continued)

DNS
• For example, a domain name such as
business_studies.tvtc.edu.zm is
interpreted as follows:
– zm defines the country Zambia.
– edu shows that the network belongs to an
educational institution.
– tvtc gives the name of that educational
institution.
– business_studies gives the name of the sub
network within tvtc.
SETTING UP AN ETHERNET LAN
• To set up a LAN you need the following
resources.
– A hub or a switch
– Communications channel, e.g. wired or
wireless
– Communications software
– A network interface card (NIC)
SETTING UP AN ETHERNET LAN
(Continued)

• Hub or switch is used to interconnect computers


and other network resources or segments.
• Communications channel is required as a
passage of signals between network devices.
• Communications software is required for
controlling the hardware and the transmission of
signals.
• A network interface card is required for
connecting network devices onto the LAN.
SETTING UP AN ETHERNET LAN
(Continued)

• A hub differs from a switch in certain respects.


• A switch is more “intelligent” than a hub.
• When a hub receives data meant for one device,
it broadcasts the signal to all the devices on the
network.
• Unlike a hub, a switch first identifies the owner of
the data and then sends only to that destination.
• A switch also works faster than a hub.
EXAMPLE OF AN ETHERNET
LAN
.

SWITCH
SWITCH
HUB
THE INTERNET
• Internet is an interconnection of computer
networks.
• Internet is rated one of the most significant
human inventions of all time.
• The Internet offers many possibilities for
individuals and organizations.
THE INTERNET (Continued)

There are three main functions of the Internet:


1. Communication
• One can contact and exchange
information with friends and organisations
anywhere in the world.
2. Retrieval of information
• One can have access to a broad range of
data and information from other
computers around the globe.
3. Commerce
• One can advertise, buy and sell goods
and services on the Internet.
CONNECTING A LAN TO THE
INTERNET
• To connect a LAN to the Internet you need
the following resources:
– Router
– Internet software
– Internet service provider (ISP)
– Communications channel (wired or wireless)
CONNECTING A LAN TO THE
INTERNET (Continued)

• The router is required for two reasons:


– To split the signal into packets for effective
transmission.
– To identify the most convenient route for each
packet to take to its destination.
• Internet software is required for controlling
the hardware and for correcting errors
during transmission.
• An ISP provides advanced and expensive
resources for accessing the Internet.
ROUTER
MODEM and NIC
• Modem stands for Modulator Demodulator.
• A modem is a device that connects the computer
to the telephone line.
• In a computer data signals travel in parallel lines,
but in a telephone wire the signals travel serially,
i.e. one behind the other.
• We say that computers handle data in digital
form and telephone wires transmit data in
analog form.
• A modem is used to convert data from digital to
analog, and from analog to digital.
MODEM and NIC (Continued)
MODEM and NIC (Continued)
MODEM and NIC (Continued)

• NIC stands for Network Interface Card.


• A NIC connects a computer to a LAN, not
to a telephone wire.
• A NIC also does the conversion of signals
from digital to analog and vice versa.
• Generally, a NIC transmits signals faster
than a modem.
• A NIC has a unique number which
identifies every computer on a network.
MODEM and NIC (Continued)

NIC
BROWSING THE INTERNET
• To browse the Internet is simple.
• You simply start the Internet browser
software.
• If you already know the URL, i.e. the
address of what you want, you simply type
it in the address box in the browser and
then click on a button to get to the
destination.
BROWSING THE INTERNET
(Continued)

• URL stands for Uniform Resource Locator.


• An example of a URL is
http://www.yahoo.com
• Web browser is a software program that
connects your computer to the Internet.
• Examples of web browsers are Internet
Explorer, Mozilla FireFox and Opera.
• The best way to browse the Internet is to
use an Internet Search Engine.
BROWSING THE INTERNET
(Continued)

• A Search Engine is a software program in which


the user types keywords instead of the URL.
• Examples of search engines are Google and
Yahoo.
• The Search Engine uses the keywords to locate
information in servers on the Internet.
• It lists down links to websites or web pages
where the actual details are found.
BROWSING THE INTERNET
(Continued)

• The web pages are listed in the order of


the number of visits made to that page.
• Pages that are visited more frequently are
listed at the top.
• An example of a list of links given by a
search engine after entering the keywords
Search Engine is shown below.
BROWSING THE INTERNET
(Continued)

• Web search engine - Wikipedia, the free


encyclopedia
A web search engine is designed to search for
information on the World Wide Web and FTP servers.
The search results are generally presented in a list of ...
History - How web search engines work - See also -
References

• AltaVista
AltaVista provides the most comprehensive search
experience on the Web! ... SEARCH: Worldwide or
Select a country RESULTS
BROWSING THE INTERNET
(Continued)

• To read the article, you click on the link.


• The links are shown as underlined texts,
and most of them are in blue.
• You can narrow your search by using
Advanced Search.
• After you click on the Advanced Search
link, you enter your preferences in a form.
BROWSING THE INTERNET
(Continued)

• The Internet is a global infrastructure of


computer networks.
• The Internet is used to access information
which is stored in the World Wide Web
(WWW).
• The World Wide Web is an infrastructure
of information.
BROWSING THE INTERNET
(Continued)

• Websites consist of Web pages.


• The information in the WWW is found in
Websites.
• Actually, websites are servers with huge
databases.
• A web page is a place within the website
where documents are located.
BROWSING THE INTERNET
(Continued)

• The URL
http://homepages.uel.ac.uk/u0311625/topo
logy.html, is the web page of a document.
• The website or server name is
homepages.uel.ac.uk
• The document name on the web page is
topology, and is in hypertext markup
language (html) format.
ELECTRONIC MAIL (E-MAIL)
• This is a facility available when one
connects to the Internet.
• One can send and receive text and both
video and audio messages using e-mail.
• To send e-mail, one types the message,
indicates the address to receive and clicks
a button.
ELECTRONIC MAIL (E-MAIL)
(Continued)

• E-mail is meant to make mail more


efficient.
• It also solves the problem of so much
paper wastage, unattended to telephones
and delays associated with traditional mail.
• It is also extremely cheap to send
messages by e-mail.
• The same message can be sent to many
people at the same time.
ELECTRONIC MAIL (E-MAIL)
(Continued)

• To create an email address, you do the


following:
– Start the browser software, e.g. Internet
Explorer.
– Click on the mail client, e.g. Gmail in google.
– Click on Create an Account.
– Complete the form which appears and select
submit at the end of the form.
UNDERSTANDING EMAIL
ADDRESSES
• Normally an email address consists of
three parts.
• These parts are:
– Username
– Server name
– Top-level domain, i.e. primary domain name.
• The username is separated from the rest
by the @ symbol.
UNDERSTANDING EMAIL
ADDRESSES (Continued)

• For example, in the address


[email protected], the username is
tchiinza, the host computer name is tvtc,
and the primary domain name is edu in the
country Zambia.
• Note that the name that follows the @
symbol immediately is always the host
computer name, i.e. the server name.
IT SECURITY
• Security refers to the defence necessary to ward
off threats imposed on IT resources.
• Security is ensuring that resources are free from
unauthorised internal and external manipulation.
• There are two types of security: physical
security and data security.
• Data security ensures that data, information and
software are safe from internal and external
threats.
• Physical security ensures that all the various
types of hardware are safe.
TYPES OF THREATS
Some of the threats are as follows:
– Unauthorised access by individuals to data storage.
– Incorrect use of hardware and software, media or
computer rooms.
– Unauthorised manipulation of data files or
equipment.
– Theft of data or hardware.
– Fire/water.
– Environmental conditions, e.g. temperature and
humidity.
– Viruses and other malicious code.
MEASURES TO IMPROVE ON
SECURITY
• Examples of possible measures are:
• Keeping all doors to computer rooms
locked so that access is upon permission
granted.
• Locking computers so that only personnel
with computer keys can unlock and use
them.
• Using passwords to start computers and to
open files.
MEASURES TO IMPROVE ON
SECURITY (Continued)

• Installing alarm systems so that the


presence of intruders, fire, smoke, water
etc, can be identified.
• Installing air conditioners so that the room
temperature and humidity are
automatically regulated
MEASURES TO IMPROVE ON
SECURITY (Continued)

• Backing up all data and programs so that


should the data and programs that are
used become corrupt, backups can
quickly be used.
• Keeping data and program backups in a
separate room which is also secured.
• Installing antivirus software and keeping
it updated.
MEASURES TO IMPROVE ON
SECURITY (Continued)

• Installing Firewalls to scrutinize all signals


that enter or leave the computer or the
network.
• Training users about how to be security
conscious and how to react in an event of
a disaster.
• Training users how to properly use
software and hardware.
COMPUTER VIRUSES
• A computer virus is a program that is
meant to cause some kind of damage or
discomfort when it is activated on an
infected computer.
• Virus is a general term, but viruses are in
categories.
COMPUTER VIRUSES (Continued)

• Viruses are those malicious codes that are


capable of replicating themselves and attack
computer programs in memory.
• A Trojan horse is a program disguised as
something useful, which when run does damage
to the computer system while appearing to do
something else.
• A virus that propagates itself across computer
networks, usually via e-mail, is referred to as a
worm.
• The increase in transactions over the Internet
has greatly increased the chance of virus
infection.
HOW COMPUTERS BECOME
INFECTED WITH VIRUSES
• There are many ways in which a computer may
become infected by a virus.
• Some of the common ones are as follows:
– Transfer of removable storage media, e.g.
floppies, CDs and flash disks, from one computer
to another.
– Through e-mail; when you receive and open an
infected e-mail, your computer gets infected.
– Through downloads, e.g. of music, pictures,
videos, documents and software on the Internet.
HOW TO MINIMISE VIRUS
ATTACKS
To minimise the possibility of your
computer getting infected by viruses,
observe the following guidelines:
• Avoid exchanging removable storage
media with other people.
• Don’t read e-mail from people you do not
know.
• Don’t read e-mail from people you know
but from whom you do not expect e-mail.
HOW TO MINIMISE VIRUS
ATTACKS (Continued)

• Avoid the temptation to download anything


you find interesting on the Internet.
• Don’t click on pop ups and other adverts
that flash on your screen as you browse
the Internet.
• Search for information by typing keywords
in the Search Engine.
HOW TO MINIMISE VIRUS
ATTACKS
• Ensure that your computer has latest
versions of antivirus software.
• Always update the antivirus software from
the Internet.
• Always scan your computer for viruses.
HACKERS AND CRACKERS
• A hacker is a person who gains remote
access to a computer or network not
necessarily for bad motives.
• A cracker is a person who also gains
remote access to someone’s computer or
network but with the intension to cause
havoc.
HACKERS AND CRACKERS
(Continued)

• To protect yourself against hackers, you should


use very secure passwords and encrypt your
data during transmission.
• Secure passwords are those that do not use
any names of people, organisations and things
like dates which a cracker can easily decode.
• Secure passwords should contain
alphanumeric characters that should be
extremely difficult to guess by anyone, and
should be long.
HACKERS AND CRACKERS
(Continued)

• Hackers and crackers use very sophisticated


methods to crack passwords.
• They use advanced programs which are capable
of unlocking what you may think is very secure.
• One approach to defeat them is to ensure that
you don’t use the same password for a long
time.
• However, should you forget the password you
will not be allowed access to your own data or
computer system.

You might also like