Ict Notes Updated
Ict Notes Updated
CHAPTER ONE
GENERAL INTRODUCTION
Computer
A computer is an electronic device, operating under the control of instructions stored in its
own memory that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use.
Computer science
Computer science is the study of computer and computational systems.
Information is data that has been processed in such a way that it makes meaning to the
receiver.
Communication
Communication is defined as the exchange of information between two or more persons with
one being the sender and the other being the receiver.
Internet
Internet is defined as the global system of interconnected computer networks.
Functionalities of a computer
Any digital computer carries out five functions in gross terms:
Computer Components
Any kind of computers consists of HARDWARE AND SOFTWARE.
Hardware:
Computer hardware is the collection of physical elements that constitutes a computer system.
Computer hardware refers to the physical parts or components of a computer such as the
monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit
(graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical
objects that can be touched.
Input Devices
Input device is any peripheral (piece of computer hardware equipment to provide data and
control signals to an information processing system such as a computer or other information
appliance.
Input device Translate data from form that humans understand to one that the computer can
work with. Most common are keyboard and mouse
Note: The most common use keyboard is the QWERTY keyboard. Generally standard
Keyboard has 104 keys.
Primary Memory:-
1. RAM: Random Access Memory (RAM) is a memory scheme within the computer system
responsible for storing data on a temporary basis, so that it can be promptly accessed by
the processor as and when needed. It is volatile in nature, which means that data will be
erased once supply to the storage device is turned off. RAM stores data randomly and the
processor accesses these data randomly from the RAM storage. RAM is considered
"random access" because you can access any memory cell directly if you know the row
and column that intersect at that cell.
2. ROM (Read Only Memory): ROM is a permanent form of storage. ROM stays active
regardless of whether power supply to it is turned on or off. ROM devices do not allow
data stored on them to be modified.
Secondary Memory:-
Stores data and programs permanently: its retained after the power is turned off
1. Hard drive (HD): A hard disk is part of a unit, often called a "disk drive," "hard drive," or
"hard disk drive," that store and provides relatively quick access to large amounts of data
on an electromagnetically charged surface or set of surfaces.
2. Optical Disk: an optical disc drive (ODD) is a disk drive that uses laser light as part of the
process of reading or writing data to or from optical discs. Some drives can only read from
discs, but recent drives are commonly both readers and recorders, also called burners or
writers. Compact discs, DVDs, and Blu-ray discs are common types of optical media
which can be read and recorded by such drives. Optical drive is the generic name; drives
are usually described as "CD" "DVD", or "Bluray", followed by "drive", "writer", etc.
There are three main types of optical media: CD, DVD, and Blu-ray disc. CDs can store up
to 700 megabytes (MB) of data and DVDs can store up to 8.4 GB of data. Blu-ray discs,
which are the newest type of optical media, can store up to 50 GB of data. This storage
capacity is a clear advantage over the floppy disk storage media (a magnetic media), which
only has a capacity of 1.44 MB.
3. Flash Disk
A storage module made of flash memory chips. A Flash disks have no mechanical platters or
access arms, but the term "disk" is used because the data are accessed as if they were on a
hard drive. The disk storage structure is emulated.
Output devices
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human readable form.
Printer types:
1-Laser Printer.
2-Ink Jet Printer.
3-Dot Matrix Printer
Software
Software is a generic term for organized collections of computer data and instructions, often
broken into two major categories: system software that provides the basic nontask-specific
functions of the computer, and application software which is used by users to accomplish
specific tasks.
Software Types
A. System software is responsible for controlling, integrating, and managing the individual
hardware components of a computer system so that other software and the users of the
system see it as a functional unit without having to be concerned with the low-level
details such as transferring data from memory to disk, or rendering text onto a display.
Generally, system software consists of an operating system and some fundamental
utilities such as disk formatters, file managers, display managers, text editors, user
authentication (login) and management tools, and networking and device control
software.
B. Application software is used to accomplish specific tasks other than just running the
computer system. Application software may consist of a single program, such as an
image viewer; a small collection of programs (often called a software package) that work
closely together to accomplish a task, such as a spreadsheet or text processing system; a
larger collection (often called a software suite) of related but independent programs and
packages that have a common user interface or shared data format, such as Microsoft
Office, which consists of closely integrated word processor, spreadsheet, database, etc.;
or a software system, such as a database management system, which is a collection of
fundamental programs that may provide some service to a variety of other independent
applications.
Comparison Application Software and System Software
Unit of Measurements
Storage measurements: The basic unit used in computer data storage is called a bit (binary
digit). Computers use these little bits, which are composed of ones and zeros, to
do things and talk to other computers. All your files, for instance, are kept in the
computer as binary files and translated into words and pictures by the software
(which is also ones and zeros). This two number system, is called a “binary
number system” since it has only two numbers in it. The decimal number system
in contrast has ten unique digits, zero through nine.
Computer Storage units
Bit BIT 0 or 1
Kilobyte KB 1024 bytes
Megabyte MB 1024 kilobytes
Gigabyte GB 1024 megabytes
Terabyte TB 1024 gigabytes
Size example
Speed measurement: The speed of Central Processing Unit (CPU) is measured by Hertz
(Hz), which represent a CPU cycle. The speed of CPU is known as Computer Speed.
CPU SPEED MEASURES
1 hertz or Hz 1 cycle per second
1 MHz 1 million cycles per second or 1000 Hz
1 GHz 1 billion cycles per second or 1000 MHz
Computers classification
Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
Netbook: A netbook is a type of laptop that is designed to be even more portable. Netbooks
are often cheaper than laptops or desktops. They are generally less powerful than
other types of computers, but they provide enough power for email and internet
access, which is where the name "netbook" comes from.
Mobile Device: A mobile device is basically any handheld computer. It is designed to be
extremely portable, often fitting in the palm of your hand or in your pocket. Some
mobile devices are more powerful, and they allow you to do many of
The same things you can do with a desktop or laptop computer. These include tablet
computers, e-readers, and smartphones.
Tablet Computers: Like laptops, tablet computers are designed to be portable. However, they
provide a very different computing experience. The most obvious difference is that
tablet computers don't have keyboards or touchpads. Instead, the entire screen is
touch-sensitive, allowing you to type on a virtual keyboard and use your finger as a
mouse pointer. Tablet computers are mostly designed for consuming media, and
they are optimized for tasks like web browsing, watching videos, reading e-books,
and playing games. For many people, a "regular" computer like a desktop or laptop
is still needed in order to use some programs. However, the convenience of a tablet
computer means that it may be ideal as a second computer.
Data: Facts and figures which relay something specific, but which are not organized in any
way and which provide no further information regarding patterns, context, etc. So data means
"unstructured facts and figures that have the least impact on the typical manager."
Knowledge: Knowledge is closely linked to doing and implies know-how and understanding.
The knowledge possessed by each individual is a product of his experience, and encompasses
the norms by which he evaluates new inputs from his surroundings.
Characteristics of Computer
Speed, accuracy, diligence, storage capability and versatility are some of the key
characteristics of a computer. A brief overview of these characteristics are
• Speed: The computer can process data very fast, at the rate of millions of instructions per
second. Some calculations that would have taken hours and days to complete otherwise,
can be completed in a few seconds using the computer. For example, calculation and
generation of salary slips of thousands of employees of an organization, weather
forecasting that requires analysis of a large amount of data related to temperature, pressure
and humidity of various places, etc.
• Accuracy: Computer provides a high degree of accuracy. For example, the computer can
accurately give the result of division of any two numbers up to 10 decimal places.
• Diligence: When used for a longer period of time, the computer does not get tired or
fatigued. It can perform long and complex calculations with the same speed and accuracy
from the start till the end.
• Storage Capability: Large volumes of data and information can be stored in the computer
and also retrieved whenever required. A limited amount of data can be stored, temporarily,
in the primary memory. Secondary storage devices like floppy disk and compact disk can
store a large amount of data permanently.
• Versatility: Computer is versatile in nature. It can perform different types of tasks with the
same ease. At one moment you can use the computer to prepare a letter document and in
the next moment you may play music or print a document. Computers have several
limitations too. Computer can only perform tasks that it has been programmed to do.
Computer cannot do any work without instructions from the user. It executes instructions as
specified by the user and does not take its own decisions.
Computer Viruses
Viruses: A virus is a small piece of software that piggybacks on real programs. For example,
a virus might attach itself to a program such as a spreadsheet program. Each time the
spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by
attaching to other programs) or wreak havoc.
•E-mail viruses: An e-mail virus travels as an attachment to e-mail messages, and usually
replicates itself by automatically mailing itself to dozens of people in the victim's
e-mail address book. Some e-mail viruses don't even require a double-click --
they launch when you view the infected message in the preview pane of your e-
mail software
•Trojan horses: A Trojan horse is simply a computer program. The program claims to do one
thing (it may claim to be a game) but instead does damage when you run it (it
may erase your hard disk). Trojan horses have no way to replicate automatically.
•Worms: A worm is a small piece of software that uses computer networks and security holes
to replicate itself. A copy of the worm scans the network for another machine that
has a specific security hole. It copies itself to the new machine using the security
hole, and then starts replicating from there, as well.
Some tips to avoid viruses and lessen their impact
• Install anti-virus software from a reputable vendor. Update it and use it regularly.
• In addition to scanning for viruses on a regular basis, install an "on access" scanner
(included in most anti-virus software packages) and configure it to start each time you
start up your computer. This will protect your system by checking for viruses each
time you run an executable file.
• Use a virus scan before you open any new programs or files that may contain
executable code. This includes packaged software that you buy from the store as well
as any program you might download from the Internet.
• If you are a member of an online community or chat room, be very careful about
accepting files or clicking links that you find or that people send you within the
community.
• Make sure you back up your data (documents, bookmark files, important email
messages, etc.) on disc so that in the event of a virus infection, you do not lose
valuable work.
Installation and configuration of computer peripherals:
computer peripheral devices are those devices which are connected to the
computer and it helps the computer to function. They contain both input and
output peripheral devices. Input peripheral devices are those we use to give
command to the computer while the output devices help computer displaying
the result to the user. So it is important to have a clue on how to install and
configure some of these peripherals as seen below:
Input devices:
1- Mouse: a mouse is usually plugged in with the USB connection. It would
be connected through the PS/2 port. The installation of a mouse is easy.
Ones connected drivers would be searched by windows itself.
2- Keyboard: the keyboard is connected through the USB at the back or
corners of the laptop.
3- Scanner: scanners are connected to the CPU using a port and cable to be
able to operate.
4- Microphone: some microphones are built in but some are external which
can be equally connected through cables and ports to the computer. They
have specific drivers and their configuration can be done through the
control panel.
5- Digital cameras. Most often digital cameras share information with the
computer. To do this there is need for the drivers to get installed and that
driver comes with the accessories.
Output devices
1- Printers: printers are of various types and the laser printer is the common
one. For printers need appropriate drivers to work. The configuration of a
printer can be done manually once it is connected to the computer.
2- Speakers: the laptop contains the right left speakers which are located on
both sides. External speakers can be plugged into the computer.
3- Projector: A projector can be connected to the computer using the VGA
(video graphic Array) cable that contains 15 pins with 5 each at a row.
CHAPTER TWO (2)
FUNCTIONING OF AN OPERATING SYSTEM
b) Taskbar: this is a horizontal thin bar at the button of the computer screen
containing the start button. It contains the start button, and icons which
contains all applications which are currently running.
c) Start button: this is found at the left end of task bar in windows
operating system. It allows users to open menus and start application
programs
d) Menu bar: it is a vertical bar below title bar used for formatting and
editing documents etc.
Management of user sessions:
A user session is referred to as an encounter between the computer user and
application or the computer in general. There exist a desk top user session
management and a browser user session management.
Sessions management is therefore the keeping of records a user or users
activities across various sessions. Eg a single session may record a series of
activities such as downloads, multiple display of pages etc
a) Desk top session management: here we use a desktop session manager.
A desk top session manager is a program that can save and restore desk
top sessions. The desk top session is all the windows that are currently
running and their content.
Session management on LINUX based system is provided by x-session
manager.
On Microsoft windows system, session management is provided by the session
manager subsystem
b) Browser session management: session management is particularly
useful in a browse r where a user can save all open pages and settings and
restore them at a later date. Google chrome, internet explorer, maxilla
Firefox etc are all browsers that provide user management sessions.
Storage devices are used to store data and instructions permanently. Storage
devices can be classified as follows:
- Secondary storage
- Backing storage
- External storage
- Auxiliary storage devices
CD-R= CD recordable
CD-RW=CD Rewritable
The computer receives data and instructions during the input stage of the
information processing cycle. Useful information is obtained when appropriate
instructions are applied to data. To avoid re-entering of information for
processing, computers stores information and this occurs at the storage stage.
This then followed by the output stage where the users get access to already
processed data.
The four phases of information processing cycle
- Input – computer receives data and instructions. This input can be done
using different devices such as keyboards, mouse, scanners, joysticks,
digital data tablets, electronic cash registers.
- Processing: computer applies instructions to data to produce information
(perform operations on the data). This processing is done by the CPU
(central processing unit).
- Storage: saving the information for retrieval. Storage can be done on
external hard disk, pen drives, micro SD Cards, and compact disks.
- Output: computer sends out information to computer users. This
information can be used as it is or for further processing.
Output
Data Processing
Stora
ge
Information processing diagram
r) Allow pupils with poor pencil skills to use a key board instead.
s) It can be used to create standardized test items.
Excel ; it is a basic spread sheet used in computation by applying
formulae eg adding, mean ( average), multiplications, etc. A spread sheet
is a type of document that stores data in a grid of vertical columns and
horizontal rows or Spread sheet is a name given to a table made of rows
and columns. Rows are typically labelled using numbers( 1,2,3, etc) while
columns are labelled using letters ( A,B,Cetc)
Importance; it is a fundamental spread sheet program used in windows
which many people and organisations use for their record keeping.
Using a spread sheet is more beneficial than using a manual grading
work.
It improves efficiency in school management
Uses;
It is used to calculate marks, averages, ranking
Analyse finances,
Teachers can use excel to create charts giving data a visual display
A spread sheet can be used by teachers to track pupils’ daily temperatures
or help keep accounting records for the school etc
Power point
It is a slide show presentation program currently developed by Microsoft
Use; used for preparing slide show presentation formats
MS publisher; Microsoft publisher is an entry-level desktop publishing
application from Microsoft. It differs from Microsoft word in that the
emphasis is placed on page layout and design rather than text
composition.
Text editors
It is a type of program used for editing plain text files. Such programs are
sometimes known as notepad software following the Microsoft notepad.
Note that; plain file is produced by text editor while document file is
produced by MS word.
- Presentation and publication with computer (PowerPoint
presentation)
Presenting and publishing with computer is done with the use of
presentation programs for example power point.
A presentation program is a software package used to display
information in the form of slide show
The term animation is used to describe the motions that are applied to the
objects not to the slides themselves.
The graphical user interface (GUI) is a type of user interface that allows users to
interact with electronic devices through graphical icons and visual indicators
such as secondary notations instead of text-based user interface, typed
command labels. For example all versions of Microsoft windows use GUI,
which is using icons instead of using texts from key board.
Note that graphical user interface elements are usually accessed through
pointing devices like the mouse, pen.
Exercise;
Figure 1
Figure 2
Website: a set of related web pages located under a single domain name ( a collection of
related web pages.
Search engine; this is a web site that help you fine other web sites which has information
you need.
E-mail; stands for electronic mail. They used in sending electronic messages.
E-mail address; this is a unique name given to a person by the internet service provider to
send and receive e-mails.
URL; uniform resource locator. It is an address that shows where a particular page can be
found on the World Wide Web.
Computer network; it is a set of computers connected together for the purpose of sharing
resources. It can also be seen as two or more computers that are connected with one another
for the purpose of communicating data electronically.
The most common resource shared today is the internet. Other shared resources include the
printer or a file server.
http; hypertext transfer protocol . It is the protocol used to transfer data over the internet. It
defines commands and services used for transmitting web data.
Network etiquette: these are the norms that regulate the use of computer. These has to
do with the DOs and the DON’Ts
Uses of internet
-companies use the internet for electronic commerce, also called e-commerce, including
advertising, selling, buying, providing customer service
-businesses and institutions use the internet for voice and video conferencing
-the use of e-mail help improve and speed up communication between companies, among co-
workers and school institutions.
-the search engines that are available online are fast and powerful
E-mailing,
Online chat,
Worldwide web,
Web radio,
Online radio,
Web phone,
Online marketing,
1) Go to www.gmail.com
2) Type your user name( e-mail address) and password, then click next
To sign out:
In the top-right corner of the page, locate the circle that has your first initial ( if you have
already selected an avatar image, it will show the image instead). To sign out, click the circle
and select sign out.
Why do you think it’s necessary to sign out of your e-mail box?
How do you download an attachment on your e-mail box?
How do you delete an unwanted message in your box?
Create a yahoo mail account
Computer etiquettes are set of moral conducts or guidelines or principles set aside to regulate
the use of computers. Computer etiquettes ensures that certain aspects related to people’s
privacy, intimacy, cyber-crimes , use of pervasive sites in the internet should be checked to
ensure high moral standing in society.
The ten commandments of the computer put in place in 1992 by one famous computer
Institute (CEI) are
The increasing use of computers and other related devices in our world today has promoted
criminality. There are various ways through which these manifest;
Software privacy
Cyber terrorism; this is where other people use the internet to issue threats to a given set or
group of individuals.
Scamming; this is a situation where others use the internet to dupe others of their money.
Harassment; by using the computer or internet to harass someone either sexually or through
threats.
Hacking; this is a situation where a computer user break into someone’s secret information
unauthorised usually by illegally gaining access to someone’s account. It is also seen as the
act of breaching into a computer or network.
Cracking; this the act of breaking into the computer system with malicious intent.
Drug trafficking; this is an illegal internet practice where people trade in the black-market
over the internet by supplying illegal drugs such as cocaine.
The practice of plagiarism; this is the practice where a person uses some ones work without
authorisation or citing the work.
- Physical security
- Encryption
- Passwords
- Firewalls. It is a network security device that monitors incoming and outgoing traffic
and decides to allow or block specific traffic based on a defined set of security rules
- Backup and recovery
- Copyright laws
COMPUTER NETWORK
A computer network is a group of two or more interconnected computer systems that helps to
share various resources and files.
You can develop a computer network connection by using either a cable or wireless media.
Every network requires hardware and software that connects computers and tools.
The classification of this computer networks is done by size and as wells as their purpose.
The size of a network is determined by the geographic area and number of computers which
are part of their network.
The most common network types are PAN, LAN, WAN and MAN.
PAN= Local Area Network. PAN is a computer network that involves a person. It usually
covers a room space and can help an individual to connect to other digital devices etc. for
example using Bluetooth to connect to other devices.
LAN= Local Area Network. It is a group or set of peripheral devices which are connected in
a limited area such as school, office, laboratory, home etc for the sharing of resources like
files, printers, and other applications.
MAN= Metropolitan Area Network. It is a computer network that covers a whole city or
small region.
WAN= Wide Area Network. It a computer network that is spread across a large
geographical area. WAN can be regarded as interconnection of different LAN networks.
Mostly used by organisations to share data. It is anchored on telephone or radio wave.
II) Use of the ICTs in the teaching/ learning and evaluation processes
(7mks)
1) Complete without recopying, the paragraph below matching each number
with the appropriate expression from the following list:
Hypertext links, digital, software, interactivity, multimedia, information
A ---------learning environment is characterised by the grouping on the same
medium of at least two elements: texts, sound, still image, animated image,
in-----------------form. These elements are accessible via a computer program or
……………..allowing a greater or lesser degree of ……………between the
user and the aforementioned elements. By interactivity, we mean the
possibilities of navigation, hyper navigations (through…………), search for
……………… (Free or guided) and online help.
2) In order to improve the administrative management of his school, the
director of messangmena Government primary school decided to set up a
computer system. He acquired a personal workspace to each of his
collaborators.
a) What is meant by computer system? 1mk
b) How do you name the workspace assigned by each collaborator?
1mk
III) Pedagogic integration of ICTs in the Education system
(6mks)
[….As far as ICT issues are concerned, at the educational level, they are of
great importance. They are true allies of education. They modify the teacher-
student relationship and change the relation to knowledge (Devauchelle,
2012). They allow the development of disciplinary skills but also transversal
skills. Klein (2013) confirms that digitalisation not only enhances the
motivations it induces in the learner, but also has other effects: ‘‘Beyond this
Presentation……………………………………………………………….(1mk)
5) As a 21st century teacher, integration of ICTs in the teachning/learning
process in inevitable. The usage of terms like simulator, tutorial software,
teaching ICTs, teaching with ICT and teaching through ICTs, interactive
white board is common. Your course mate who does not understand these
terms come to you for help.
a) Define the above concepts 0.5*6= 3mks
b) Give two advantages of interactive white board. 0.5*2=1mk