Professional Documents
Culture Documents
Ict Theory
Ict Theory
Ict Theory
E
SUBSIDIARY ICT (THEORY)
In some topics, a few pictures have been included to bring the ideals
closer. A straight forward point outline method has been used to
enable learners quickly master the subject content.
i
ACKNOWLEDGMENT
b) Mr. Kizito G., Mrs. Ssenkubuge S.S., Mr. Kakuru R.D, and the
entire staff of the Computer Department of King‘s College, Budo
for your help accorded.
ii
TABLE OF CONTENT
PREFACE ........................................................................................ i
ACKNOWLEDGMENT ................................................................. ii
TABLE OF CONTENT ................................................................. iii
INTRODUCTION TO FUNCTIONAL COMPUTING ................. 1
THE COMPUTER .......................................................................... 2
COMPUTER LABORATORY..................................................... 32
BOOTING A COMPUTER .......................................................... 37
INPUT DEVICES ......................................................................... 39
OUTPUT DEVICES ..................................................................... 57
DATA STORAGE ........................................................................ 67
CENTRAL PROCESSING UNIT ................................................ 76
COMPUTER SOFTWARE .......................................................... 82
THE INTERNET ........................................................................ 104
DATA COMMUNICATIONS ................................................... 122
COMPUTER NETWORKS ........................................................ 129
NETWORK PHYSICAL TRANSMISSION MEDIA ............... 148
COMMUNICATIONS SOFTWARE ......................................... 154
TELEPHONE NETWORK......................................................... 158
COMMUNICATION CHANNELS ........................................... 162
TRENDS IN COMPUTING ....................................................... 172
EMERGING TECHNOLOGIES ................................................ 197
CAREERS IN THE COMPUTER INDUSTRY......................... 204
iii
GREEN COMPUTING .............................................................. 213
COMPUTER CERTIFICATION ............................................... 219
REFERENCES ........................................................................... 225
iv
INTRODUCTION TO FUNCTIONAL COMPUTING
1. Introduction to Computers
2. Lab Care, Troubleshooting and Maintenance
3. Computer word processing
4. Computer Hardware
5. Computer Software
6. Electronic spreadsheets
7. Internet and World Wide Web
8. Electronic presentation
9. Data Communication and Networking
10. Databases
11. Desktop Publisher
12. Trends in Computing
1
THE COMPUTER
What is a computer?
2
perform the same routine repeatedly. This is evidenced in
industrial robotics, like those in car assembly lines.
The best example for this is the washing machines today, which
incorporate some form of logic. Such machines are capable of
taking in required amount of detergent and water for washing
after assessing the amount of dirt in the clothes.
Many branded computer sets e.g. Dell, Compaq are expensive yet
cerelone computer sets of the same size are relatively cheap.
4
Common terms used in functional computing
A. Computer system
Computer hardware
Hardware devices of a PC
You will learn about the various components and how they work
together in a basic operating session.
5
2. Memory - This is very fast storage used to hold data. It has to be
fast because it connects directly to the microprocessor. There are
several specific types of memory in a computer:
3. Motherboard - This is the main circuit board that all of the other
internal components connect to. The CPU and memory are
usually on the motherboard. Other systems may be found directly
on the motherboard or connected to it through a secondary
connection. For example, a sound card can be built into the
motherboard or connected through PCI.
6. Operating system - This is the basic software that allows the user
to work with the computer.
6
7. Integrated Drive Electronics (IDE) Controller - This is the
primary interface for the hard drive, CD-ROM and floppy disk
drive.
11. Sound card - This is used by the computer to record and play
audio by converting analogue sound into digital information and
back again.
12. Graphics card - This translates image data from the computer into
a format that can be displayed by the monitor.
Connections: Ports
Connections: Internet/Network
9
Designed to replace older Serial and
Parallel ports, the USB (Universal
Serial Bus) can connect computers
with a number of devices, such as
printers, keyboards, mice, scanners,
digital cameras, PDAs, and more.
Better yet, the USB port supports
plug-and-play, so you can simply plug
USB in a USB device and start using it.
USB 1 ports can transfer information
at a speed up to 12 Mbps (Megabytes
per Second). Newer USB 2 ports can
transfer information at a speed up to
480 Mbps. Most computers come with
two USB ports.
You plug your monitor into the video
port.
Video or
Monitor
Plug in your speakers or headphone
/ into the Line Out jack.
Line Out
The Line In jack allows you to listen
to your computer using a stereo
Line In system.
You can plug a microphone into this
jack to record sounds on your
Micropho computer.
ne
If you have a joystick, musical (MIDI)
keyboard, or other gaming device, this
Joystick is where you plug it in.
or Game
The phone or modem jack is where
you plug your computer into a phone
10
Phone or line.
Modem
You can connect your computer to a
network by plugging in an Ethernet
Network <•••> cable in this port.
or
Ethernet
An SCSI port is one of the fastest
ways to connect a hard drive, CD-
SCSI ROM drive, or other device to a
computer.
A FireWire (IEEE 1394 or I. LINK)
port lets you connect such devices as
hard disks and digital camcorders to a
Fire wire
computer. A FireWire port can
transfer information at a speed up to
400 Mbps (Megabytes per Second).
B. Computer literacy:
C. ICT
11
1. INFORMATION
2. COMMUNICATIONS
3. TECHNOLOGY
A good way to think about ICT is to consider all the uses of digital
technology that already exist to help individuals, businesses and
organisations use information.
ICT covers any product that will store, retrieve, manipulate, transmit
or receive information electronically in a digital form. For example,
personal computers, digital television, email, robots.
Internal networks
External networks
Your ICT course will almost certainly cover the above examples of
ICT in action, perhaps focusing on the use of key applications such as
14
spreadsheets, databases, presentation, graphics and web design
software.
It will also consider the following important topics that deal with the
way ICT is used and managed in an organisation:
15
5. Improved transparency and governance through availability of
free space of discussions through the use of ICT.
D. Data
E. Information
Storage
The six basic stages of information processing
3. Input of Data -- entering the data or sending the stored data into
the processing system. Checking the accuracy and validity of the
input data are often done at this stage.
17
Common information processing systems include
- The method of data entry for early computers was using punched
cards, which were handled in bunch / set / group, and hence the
term batch processing.
a) Actually, the CPU cannot do two things at the same time, but
makes use of 'idle time' to increase the capacity of a computer.
b) An example of multi-tasking is typing in a word processor while
listening to music played from a CD-ROM.
c) Both batch and interactive jobs may be run in a multi-tasking
environment.
19
5. Multi-user System is a time-sharing system that allows different
users to independently run different programs at the same time.
a) Each user is given a time slice of CPU time (e.g., each user is
served every 0.1 s by the computer).
b) The computer works so fast that each user seems to be the sole
user of the computer.
20
3. Space: Paper files and archives take large space to store. This
may be quite expensive.
10. Management can observe new information and new trends more
quickly.
21
11. Customer services can be improved due to efficient management
and operations.
3. Some jobs may be lost due to computerization and thus lower the
morale of staff members.
23
Research and education
a) Take college classes online (i.e., cyber classes).
b) Produce assignment and reports.
c) Learn to speak a foreign language.
d) Help youngsters to read, write, count and spell.
24
5. The School Administration and Management System (SAMS) for
keeping records of students and producing report cards or other
related documents.
b) Students can only follow what the CAL packages are designed to
offer.
26
Electronic commerce (e-commerce)
27
h) Manufacturers can buy and sell directly, avoiding the cost of the
middleman.
i) Distribution costs for information is reduced or eliminated.
Quality control
The following are some of the areas where computers are used.
30
8. Law enforcement agencies: Information held in computers such
as fingerprints, photographs and other identification details helps
law enforcers to carry out investigations speedily.
31
COMPUTER LABORATORY
4. At all times follow the correct procedure for starting and shutting
down the computer to avoid loss of data and damage to computer
programs.
33
5. The room should be well laid out with enough space for
movement. Computers should be placed on stable, wide enough
desks to avoid accidentally knocking them down. Cables should
be laid out in trunks away from user parts to avoid stumbling on
them.
6. The walls of the computer room should not be painted with over
bright reflection oil paints and the screens should face away from
the window to avoid glare caused by bright backgrounds.
1. Shut down all the computers, and turn off any power strips that
are still on to avoid the risk of electrical shock or damaging any
components.
35
4. Clean the tops of the computer desks. As mentioned earlier, the
desk tops are one of the biggest culprits for bacteria. Use
antimicrobial wipes to clean them at least once a day.
6. Dust the monitors. Use dryer sheets to remove any dust from the
monitors.
8. Wipe down the chairs. About once a week, clean the chairs with
some antimicrobial wipes, as these are another commonly
overlooked home to bacteria.
36
BOOTING A COMPUTER
The steps that occur during a cold boot using the Windows operating
system are:
a) If all the cables are well connected, turn on the wall switch that
sends the power to the power supply unit.
c) The CPU resets itself and looks for the ROM that contains the
BIOS.
d) The BIOS executes the Power-On Self Test (POST) to make sure
that the computer hardware is connected properly and operating
correctly.
e) The results of the POST are compared with data in a CMOS chip
on the motherboard.
37
h) The operating system loads system configuration information, and
the remainder of the operating system is loaded into RAM, and
the desktop and the icons display on the screen.
Revision questions
38
INPUT HARDWARE DEVICES
i. Mechanical mice
Has a rubber or metal ball on its underside that can roll in all
directions. Mechanical sensors within the mouse detect the direction
the ball is rolling and move the screen pointer accordingly.
Uses a laser to detect the mouse's movement. One must move the
mouse along a special mat with a grid so that the optical mechanism
has a frame of reference. Optical mice have no mechanical moving
parts. They respond more quickly and precisely than mechanical and
optomechanical mice, but they are also more expensive.
i. Serial connection
They connect to an RS-232C serial port; one of the COM ports on the
back of the computer (a DB-9 or a DB-25 male connector).
A serial port is an interface that transmits one bit at a time, and RS-
232C is a standard that most serial ports conform to. The fact that
40
they do take up a COM port (and it's respective IRQ) is the biggest
problem with the serial mouse. Personal Computers are very limited
to the number of COM ports available.
The bus mouse was originally developed to help alleviate the problem
of the COM port shortage. It connects to the computer through a
small round connector (female mini-DIN-9) on the back of an
expansion card installed on the motherboard. Because an expansion
card had to be configured and installed on the motherboard, these
mice were considered much more difficult to install. Now they are
pretty well obsolete. They did free up a COM port, but they still took
up an IRQ as well as an expansion slot.
The PS/2 mouse seems to be the answer to both problems. It's a type
of serial mouse but it connects to a PS/2 connector (female mini-
DIN-6) that is hard-wired directly to IRQ 12. It installs as simply as
any serial mouse, doesn't use up a COM port, and needs no expansion
card installed. Not only that, but it uses a fairly obscure IRQ that was
mostly unavailable to other devices.
They also have a receptor that must be visible to the mouse (line of
sight), if anything is in the way, the mouse won't respond. This can
sometimes cause a little stress unless you keep a very tidy desk.
Cordless mice are more expensive than other types.
41
To effectively use a mouse, one has to learn seven techniques that
include:
a) Point (move the mouse and place it on a given icon, folder, file,
command, menu, e.t.c.),
e) Single click (press the left hand button of the mouse only once),
i) Scroll (means to use the mouse to move the page in any direction
to allow the user to navigate it well). A user can scroll using the
scroll wheel that exists on all new types of mice.
2. Tracker ball
Is an input device where a finger is used to rotate a ball.
This moves a pointer on the screen. (It is very like an
upside-down mouse!). You need less room to use a
tracker ball than a mouse.
Advantages
a) Requires fine control of the ball with just one finger or thumb.
b) Repeated motions of the same muscles are stirring and can cause
carpal tunnel syndrome.
3. Touch screen
Advantages
Disadvantage
Drag a finger along the surface of a touch pad and it acts like a
mouse, moving a pointer on the computer screen. Touch pads may be
connected to a PC (microcomputer) or built into a laptop computer.
Advantages
a) The hand tires faster than with a mouse since there is no support.
b) Some people don't find the motion as natural as a mouse.
5. Pointing stick
Is a pointing device that looks like a pencil eraser between the G, H
and B keys. It is moved with the forefinger, while the thumb is used
to press related keys located in front of the space bar.
6. Graphics tablet (or digitizing tablet)
A graphics drawing tablet used for sketching new
images or tracing old ones. Also called a "graphics
tablet," the user contacts the surface of the device with a
wired or wireless pen or puck.
Often mistakenly called a mouse, the puck is officially the "tablet
cursor."
7. Stylus
A pointed instrument used as an input device on a pressure-sensitive
screen.
8. Light pen
A light-sensitive stylus wired to a video terminal is used
to draw pictures or select menu options. The user brings
the pen to the desired point on screen and presses the
pen button to make contact. Screen pixels are constantly
being refreshed.
When the user presses the button, the pen senses light, and the pixel
being lit at that instant identifies the screen location.
44
9. Cyber glove
It is an input device for virtual reality environments.
Various sensor technologies are used to capture
physical data such as bending of fingers. Often a
motion tracker, such as a magnetic tracking device or
inertia tracking device, is attached to capture the global position /
rotation data of the glove.
These are devices with which one can enter text into a computer.
Text refers to character data, or to one of the segments of a program
in memory. Text input hardware devices include:
1. Keyboard
Physically, computer keyboards are an
arrangement of rectangular or near-
rectangular buttons, or "keys". Keyboards
are designed for the input of written text,
and also to control the operation of the computer. Keyboards
typically have characters engraved or printed on the keys; in most
cases, each press of a key corresponds to a single written symbol.
45
However, to produce some symbols requires pressing and holding
several keys simultaneously, or in sequence; other keys do not
produce any symbol, but instead affect the operation of the computer,
or the keyboard itself.
A keyboard is made up of various special buttons that perform
specific functions. These buttons include:
a) Control key: Is a key, which when pressed in combination with
another key, will perform a special operation. The Control key is
a modifier key; it is used in the same fashion as the Shift key.
c) Alt key: Is either of two keys located next to the Space bar, used
to change the function of a key pressed. The Alt key is a modifier
key, it is used in the same fashion as the shift key. For example,
simply pressing "A" will type the letter A, but if you hold down
either alt key while pressing A, the computer will perform an
"Alt-A" function, which varies from program to program.
b) Typing speeds are still very slow when compared with computer
speeds.
2. Handwriting recognition
Is the ability of a computer to receive intelligible
handwritten input. The image of the written text may be
sensed "off line" from a piece of paper by optical
scanning (optical character recognition).
Alternatively, the movements of the pen tip may be sensed "on line",
for example by a pen-based computer screen surface.
47
3. Optical character recognition
The process of converting scanned images of machine-printed or
handwritten text (numerals, letters, and symbols) into a computer-
processable format; also known as optical character recognition
(OCR).
A typical OCR system contains three logical components: an image
scanner, OCR software and hardware, and an output interface. The
image scanner optically captures text images to be recognized. Text
images are processed with OCR software and hardware.
The process involves three operations: document analysis (extracting
individual character images), recognizing these images (based on
shape), and contextual processing (either to correct misclassifications
made by the recognition algorithm or to limit recognition choices).
4. Speech recognition
Refers to the Ability of computer to accept speech input and act on it
or transcribe it into written language. Current research efforts are
directed toward applications of automatic speech recognition (ASR),
where the goal is to transform the content of speech into knowledge
that forms the basis for linguistic or cognitive tasks, such as
translation into another language.
5. Chorded keyboard
7. Keyer
A keyer may take the form of a single telegraph key for keying
Morse code. In this use, the term "to key" means to turn on and off a
carrier wave, typically. For example, it is said that one "keys the
transmitter" by interrupting some stage of amplification with a
telegraph key.
Bar codes are read using a Bar Code Reader, which can be in the
form of a hand-held ‗wand‘ or a stationary
laser scanner over which the bar code is
passed. This method of data entry is used in
big shops and supermarkets and in libraries.
49
Advantages
9. QR code Reader
QR Codes can contain more than just a simple link to a website: Use
them to link to a video, your Facebook profile or an MP3 file—
anything a modern smartphone is capable of doing. Directly take
your visitors to the relevant content, without the bother of typing in
complicated URLs.
50
c) It can also be used in storing personal information for use by
government.
d) Users may receive text, add a vCard contact to their device, open
a Uniform Resource Identifier (URI), or compose an e-mail or
text message after scanning QR codes.
The main use of MICR is to input data from bank cheques. The
Cheque Number, the Branch Sort Code and the Account Number are
printed in magnetic ink at the bottom.
The Amount gets typed in later. All the cheques received get fed into
an MICR Reader and the data is automatically input to the bank's
computer system.
Advantages
Disadvantages
Others include:
1. Joystick
a) Paddle
b) Power Pad
Are devices that are used to record video, images and other moving
activities with one late downloads to the computer for storage,
saving, copying onto media, or otherwise in any other form.
52
They include among others
1. Image scanner
2. 3D scanner:
3. Digital camera
4. Digital camcorder
5. Webcam
53
Web cams are used for teleconferencing. Users communicate with
each other using microphones and speakers as well as web cams to
see each other on their monitors.
Are devices with which helps a user to record sound waves into a
digital file on a computer. Examples include:-
1. Digital Dictaphone
54
1. Midi instruments:
2. Sensor
3. Remote Control
Review Questions
56
OUTPUT HARDWARE DEVICES
Are devices with which a user can display, represent, and reproduce
information.
1. Monitor:
CRT monitor
57
LCD monitor
OLED
58
OLEDs are used to create digital displays in devices such as
television screens, computer monitors, and portable systems such as
mobile phones, handheld games consoles and PDAs.
59
Measurements of monitor performance
e) Dot pitch is the distance between sub pixels of the same colour in
millimetres. In general, the smaller the dot pitch, the sharper the
picture will appear.
f) Refresh rate is the speed that the monitor redraws images on the
screen. Refresh rate is measured in hertz, which is the number of
times per second the screen is redrawn.
60
h) Contrast ratio is the ratio of the luminosity of the brightest
colour (white) to that of the darkest colour (black) that the
monitor is capable of producing.
2. Speakers
Are used to play music or speech from programs, CD-
ROMs and musical instruments.
3. Printer
A printer is an output device that produces text and
graphics on a physical medium such as paper. Printed
information is often called hard copy because the
information exists physically and is a more permanent
form of output than that presented on a display device
Printers come in different types depending on the nature of work as
designed by the manufacturer. Printers can be categorised in several
ways the most common distinction is the IMPACT and NON-
IMPACT printers.
Impact printers
61
In other types the hammer strikes the paper and presses it into the
ribbon characters created through impact printing can be formed by
either a solid font or dot matrix printing mechanism.
Non-impact printers
a) Very quiet.
b) Full black and colour print on same page.
c) It has a very high resolution of between 300 – 600 dpi.
d) Thousands of colours are created by mixing tiny dots of cyan,
magenta and yellow (CMY) ink on the paper.
63
Disadvantage
a) Colour laser printers are quite expensive but are cheaper to run
than colour inkjet printers.
Braille Printer
By converting text into the Braille code, this printer produces patterns
of raised dots on paper for use by the blind.
Thermal Transfer Printer
Multifunction printer
a) Line printer
b) Daisywheel printer
c) Ball printer
d) Thermal printer
e) Plotter
f) Large-format printer
g) Portable printer
h) Photo printer
i) Label printer
j) Braille printer
64
Factors to consider before buying a printer
c) Ink Cartridges and Toner: computers are a lot faster than most
printers are, so they can send information faster than the printer
can accept it. A printer buffer or spooler fixes this problem.
A print buffer works like a dam: it holds back the information and
releases it at a rate that the printer can handle. Today many Inkjet
printers are cheap. The ink for most printers costs a lot of money.
Inkjet printers use ink cartridges that seem to run dry at an
alarming speed.
Laser printers user toner cartridges filled with the same messy
black powder that is found in copy machines. Laser toner
cartridges last a lot longer than Inkjet cartridges, but they also
cost significantly more.
d) Memory: Laser printers have their own memory, or RAM, just
like a computer. This memory is used to store pages before they
are printed. Memory is important for printing complex or high -
resolution images. Most laser printers have anywhere from 2 MB
to 8 MB of memory.
e) Print Buffer and Spooler: Computers are a lot faster than most
printers are, so they can send information faster than the printer
can accept it. A printer buffer or spooler fixes this problem. A
print buffer works like a dam: it holds back the information and
releases it at a rate that the printer can handle.
65
4. Graphics Plotter
Uses high precision motors controlled by the
computer to draw on paper with coloured ink pens.
Used for drawings where a high degree of accuracy is
required such as building plans, printed circuit boards
and machine parts.
5. Light-Emitting Diode (LED)
Small low power devices, which emit light. Used to indicate various
events such as power on or hard disk in operation and to monitor
other control applications.
Review Questions
66
DATA STORAGE
Refers to keeping of data for some time. Data is kept either for a
short time (temporary storage) or for a long time (permanent storage).
While working with a computer, it is important that data is stored /
kept awaiting other actions and steps related to its manipulation.
Primary memory
Refers to a storage location that is very fast but looses data easily and
it is volatile. Examples of primary storage include:
When you turn on your computer, the BIOS does several things.
This is its usual sequence:
1. Magnetic storage
a) Compact disc
b) DVD
c) Blue ray
3. Magneto-optic storage
a) Magneto-optical drive
b) Write Once Read Many
70
Solid-state storage
a) Flash disk.
b) Memory cards.
Storage devices:
Refers to storage locations that keep data for a long period of time i.e.
permanently. They perform the following functions:
c) Can be set to run automatically during the night and then will
only be needed in an emergency.
Disadvantage of using tape:
(a) Very slow, as need to wind tape (perhaps a long way) to find
any specific position of data to view.
For proper use of the floppy diskettes, one must study the following
aspects:
(a) Much faster to access than a floppy but currently slower than a
hard disk (single-speed 15 KB per second so a 40X speed CD-
ROM drive is 40 times faster, and they are getting faster).
73
(c) Useful for the distribution of today‘s large programs and
information libraries, which you can then copy (all or in part)
onto your hard disk.
(d) Also widely used by the music industry as they give better
quality sound and do not wear out like audiocassette tape.
(e) It is the safest form of storage, provided that you don‘t attack it
with a sharp or heavy object.
6. Digital Versatile Disk (DVD): (Also known, as a Digital Video
Disk) is a very large capacity CD with similar access speed. It can
store up to 4.7 GB (gigabytes) of data, which is more than enough
to store 8 music albums with full video presentation, or 4 feature-
length films. A DVD drive can also read a normal CD-ROM.
7. Blue Ray: refers to the blue laser used to read the disc, which
allows information to be stored at a greater density than is
possible with the longer-wavelength red laser used for DVDs.
74
Revision Questions
a) Sequential access.
b) Random access.
6. State four storage media; two that use sequential, two that use
random access.
7. State the advantages of using random access to sequential access
while dealing with data storage.
75
CENTRAL PROCESSING UNIT
The central processing unit also called the brain of a computer; refers
to a computational engine found in the computer whose major
purpose is to process data. The central processing unit (CPU) is the
electronic device that interprets and carries out instructions that tell
the computer how to work.
1. Control unit
The control unit directs and coordinates most of the operations in the
computer.
3. Registers
77
b) Instruction register, which holds the current instruction fetched
from memory.
Memory Unit
Data flow
Backing Store Control flow
The system clock controls how fast all the operations within a
computer take place. The system clock generates regular electronic
pulses, or ticks, that set the operating speed of components in the
system unit.
78
The speed at which a processor executes instructions is called clock
speed, or clock rate.
Note: P - Pentium
Bus
Functions of Buses
79
- Addressing - A bus has address lines, which match those of the
processor. This allows data to be sent to or from specific memory
locations.
- System bus: The bus that connects the CPU to main memory on
the motherboard. The system bus is also called the front-side bus,
memory bus, local bus, or host bus.
Revision Questions
81
COMPUTER SOFTWARE
- Ability Office
- Aster*x
- AUIS — an office suite developed by Carnegie Mellon
University and named after Andrew Carnegie.
82
- Breadbox Ensemble runs under the GEOS (16-bit operating
system) and effectively requires a version of DOS to be installed
on the host system.
- EasyOffice
83
- Framework — historical but also still supported for Windows by
the present developer, Selection & Functions Inc.
- Interleaf
84
- MarinerPak — MarinerPak includes Mariner Write, a fully
featured word processor, and Mariner Calc, a fully featured
Spreadsheet application.
- Microsoft Office
- Microsoft Works
- Polaris Office
- QuickOffice, QuickOffice HD Pro (iOS and others)
- WordPerfect Office
- Zoho Office Suite — a free online office suite from AdventNet,
Inc. Includes a word processor, spreadsheet, presentations, and
collaboration groupware.
Most software needs to be installed onto the hard disk before it can
be used, but some can be loaded into memory directly from the
storage media.
System software
88
appear to be a single computer is known as a distributed operating
system.
89
6. Multi-user operating system: enables two or more users to run a
program simultaneously.
b) It also occupies more disk space to hold all the files for
different functions.
1. DOS
2. Windows 3.X
90
3. Windows 95
4. Windows NT Workstation
5. Windows 98
6. Windows 2000 Professional
7. Windows ME
8. Windows XP Home
9. Windows XP Professional
10. Windows Vista Inspirat
11. Windows 7
12. Windows 8
13. Mac OS
14. OS/2 Wrap
15. NetWare
16. Windows NT Server
17. Windows 2000 Server
18. Windows.NET Server
19. OS/2 Wrap Server for E-Business
20. UNIX
21. Linux
22. Solaris
23. Windows CE
24. Palm OS
25. Pocket PC 2002
91
9. It helps in the processor management e.g. multitasking and time
sharing.
Utility programs
9. Disk space analyzers: to get the size for each folder/ sub folders
& files in folder or drive. Showing the distribution of the used
space.
92
10. Disk storage utilities: ensures that data is stored and files arranged
in order of ascending. It also helps the computer to re-arrange
data files.
93
22. Merging and combining utility: Merges or combines different
files in one.
24. Debuggers: helps the computer to find out the error and fixes it.
25. Data recovery: enables the user to get back all the data that might
have been deleted or lost by virus from a computer.
26. System recovery: it enables the user to get back to the last best
known configuration settings of a computer.
Programming languages
Programming languages are computer tools, editors, compilers, e.t.c.
used to make programs/software. Programming tools are software in
the form of programs or applications that software developers (also
known as programmers, coders, hackers or software engineers) use
to create, debug, maintain (i.e. improve or fix), or otherwise support
software.
94
Application software programs
6. It is faster to get set up, as the development work has already been
done.
4. You may have to adjust the way that you work in order to fit in
with the way that the software has been designed.
6. As one small voice amongst many others your requests will not
carry much weight.
7. If you have problems you are usually at the mercy of a large and
faceless organisation who may not be quite as concerned as you
are if you have a major problem that absolutely MUST be fixed
before tomorrow morning!
97
12. Business processes can be an issue as you may need to change
your business to fit the off-the-shelf software rather than having
your software fit the business.
13. Off-the-shelf software may not provide a single solution for your
requirements as a result you may have to use multiple off-the-
shelf packages to achieve a final result.
14. On-going licensing costs can add to the overall cost of an off-the
shelf software solution
Bespoke (custom-made) software
Refers to application software that has been developed to meet users‘
specific needs.
5. The user receives much better support and can in many cases talk
directly to the developers concerned.
6. If you are lucky and find a good developer then they can
significantly add value to your company by suggesting
98
alternatives, improvements and by acting as a source of IT advice
and information
99
6. Support for bespoke software can become an issue if sufficient
documentation is not produced or if there is limited/ no on-going
support from the Developers.
7. Custom software usually does not have all the functionality you
might need. If you really know your business it is highly probable
that you have ideas that the software doesn't implement.
100
d) An application service provider (ASP) is a third-party
organization that manages and distributes software and services
on the Web.
10. Paint and image editing software: is used to create and modify
graphical and photo images. For example, Adobe Photoshop.
102
18. Communications software: consists of programs that help to
establish a connection to another computer or network, and
manage the transmission of data, instructions, and information
between computers and other devices. For example Skype,
Outlook, e.t.c.
Revision questions
(i). Freeware
(ii). Shareware
(iii). Custom software:
(iv). Public domain software
2. (a). Define the term ‗operating system‘ and give four examples of
OS.
(b).State any four functions of operating system in a computer.
(c) (i). Give the difference between command line and graphical
user interface.
(ii). Give two advantages of disadvantages of command line and
GUI.
(d).(i). Define the term application software.
(ii). Explain any 10 examples of application software
applications.
103
THE INTERNET
The World Wide Web is one of the most popular services available
on the Internet. Other widely used Internet services include e-mail,
FTP, newsgroups, message boards, mailing lists, chat rooms, instant
messaging, Internet telephony, and videoconferencing.
105
8. Instant messaging: is a real-time communications service that
notifies a user when one or more people are online and then
allows the user to exchange messages or files with them.
2. There are predators that hang out on the internet waiting to get
unsuspecting people in dangerous situations.
108
3. Some people are getting addicted to the internet and thus causing
problems with their interactions of friends and loved ones.
5. Easy to waste a lot of time on the internet. You can start surfing,
and then realize far more time has passed than you realized.
Internet and television together if added to the more inactive
lifestyles of people which further exacerbate the obesity problem.
6. Internet has a lot of "cheater" sites. People can buy essays and
pass them off as their own far more easily than they used to be
able to do.
8. Hackers can create viruses that can get into your personal
computer and damage valuable data.
The WWW
The World Wide Web (WWW), also called the Web, consists of a
worldwide collection of electronic documents. Each of these
documents on the Web is called a Web page. The WWW emerged in
the early 1990s, but has grown fast to become the most widely used
service on the Internet. A Web page can contain text, graphics,
animations, audio, and video (i.e., multimedia elements), as well as
built-in connections, called hyperlinks, to other documents. A Web
site is a collection of related Web pages. A home page is the starting
109
page or a table of contents for a Web site, and normally has a name
called index.htm or index.html.
a) Internet Explorer
b) Mozilla Firefox
c) Opera
d) Safari
e) Google Chrome
f) Konqueror
g) Arora
h) Dillo
i) K-Meleon
j) Lynx
k) Lobo
l) Kazekhase
m) Amaya
n) NetPositive
o) QNX Voyager
p) Planetweb
q) Netscape
r) Lunascape
s) Flock
t) Avant
110
Types of web sites
2. Affiliate Agency: Enabled portal that renders not only its custom
CMS but also syndicated content from other content providers for
an agreed fee.
5. Blog (web log): Sites generally used to post online diaries which
may include discussion forums (e.g., blogger, Xanga). Many
bloggers use blogs like an editorial section of a newspaper to
express their ideas on anything ranging from politics to religion to
video games to parenting, along with anything in between. Some
bloggers are professional bloggers and they are paid to blog about
a certain subject, and they are usually found on news sites.
10. Content site: Sites whose business is the creation and distribution
of original content
12. Dating website: A site where users can find other single people
looking for long range relationships, dating, or just friends.
112
17. Gripe site: A site devoted to the criticism of a person, place,
corporation, government, or institution.
18. Gaming website and Gambling website: A site that lets users
play online games. Some enable people to gamble online.
20. Information site: Most websites could fit in this type of website
to some extent many of them are not necessarily for commercial
purposes
21. Media sharing site: A site that enables users to upload and view
media such as pictures, music, and videos
28. Political site: A site on which people may voice political views,
show political humor, campaigning for elections, or show
information about a certain political party or ideology.
29. Porn site: A site that shows sexually plain content for enjoyment
and relaxation. They can be similar to a personal website when
it's a website of a porn actor/actress or a media sharing website
where user can upload from their own sexually explicit material
to movies made by adult studios.
30. Question and Answer (Q&A) Site: Answer site is a site where
people can ask questions & get answers.
31. Rating site: A site on which people can praise or laugh at what is
featured.
33. Review site: A site on which people can post reviews for
products or services.
39. Social bookmarking site: A site where users share other content
from the Internet and rate and comment on the content.
44. Wiki site: A site which users collaboratively edit its content.
115
A Web server is a computer that delivers Web pages requested by
users. Multiple Web sites can be stored on the same Web server. A
Webmaster is the individual responsible for developing Web pages
and maintaining a Web site. Web publishing is the development and
maintenance of Web page.
Search engines
Structure of an e-mail
4. C.C.: make a copy of work to other recipients, but all will know
that others have received a copy of the e-mail
117
6. In box: shows that list of all incoming e-mails.
b) It is not secure.
118
such as personal information and bank account numbers on a fake
website. The details will then be used for identity theft.
g) No guarantee the mail will be read until the user logs on and
checks their email.
Cyber crime
Revision questions
i.) Affiliate.
ii.) Blog.
iii.) Content site.
iv.) Gripe site.
v.) P2P torrent site.
vi.) Social networking site.
i.) To
ii.) Compose, new
iii.) Subject
121
DATA COMMUNICATIONS
Simplex channel
A half-duplex channel
A full-duplex channel
123
3. Fax: A facsimile (fax) machine is a device that transmits and
receives documents over telephone lines. Documents sent or
received via a fax machine are known as faxes. Fax capability can
also be added to the computer using a fax modem.
Advantages of Fax
124
9. Internet telephony: sometimes called Voice over IP (VoIP), is a
Web-based telephone service that allows a user to talk to others
for just the cost of the Internet connection.
a) Reduces the time and expenses for traveling to and from work.
b) Eliminates traveling during unsafe weather conditions.
c) Allows a flexible work schedule for employees.
d) Provide a convenient, comfortable work environment for disabled
employees or those recovering from injury or illness.
125
e) Reduces air pollution caused by vehicles driven to and from
work.
f) Employers reduce costs due to less office space and furniture is
required.
Disadvantages of telecommuting include
a) Reduced human face-to-face interactions among working staff.
b) Work has to stop if any component of the communications
system fails to work.
c) Leisure time at home may be replaced by work.
d) Data security may be jeopardized.
126
An operating system with FTP capabilities or a separate FTP program
is required to upload files to an FTP site.
16. RSS (Rich Site Summary) (originally RDF Site Summary, often
dubbed Really Simple Syndication) is a family of web feed
formats used to publish frequently updated works—such as blog
entries, news headlines, audio, and video—in a standardized
format. An RSS document (which is called a "feed", "web feed",
or "channel") includes full or summarized text, plus metadata
such as publishing dates and authorship.
17. Wiki: is a website which allows its users to add, modify, or delete
its content using a web browser usually with help of a simplified
markup language or a rich-text editor. Wikis are powered by wiki
software. Most are created collaboratively.
19. Web 2.0: Describes web sites that use technology beyond the
static pages of earlier web sites. A Web 2.0 site may allow users
to interact and collaborate with each other in a social media
dialogue as creators of user-generated content in a virtual
community, in contrast to websites where people are limited to
the passive viewing of content. Examples of Web 2.0 include
127
social networking sites, blogs, wikis, video sharing sites, hosted
services, web applications, mashups and folksonomies.
Revision questions
i.) Videoconferencing.
ii.) Telecommuting.
iii.) Fax.
i.) RSS
ii.) FTP
iii.) GPS
iv.) BBS
v.) VoIP
128
COMPUTER NETWORKS
What is a Network?
129
Wireless LANs
More and more networks are operating without cables, in the wireless
mode. Wireless LANs (WLAN) use high frequency radio signals,
infrared light beams, or lasers to communicate between the
workstations, servers, or hubs.
Each workstation and file server on a wireless network has some sort
of transceiver/antenna to send and receive the data. Information is
relayed between transceivers as if they were physically connected.
130
Advantages of Installing Network
1. File Management
File management is where the network allocates where you store your
files within the network in-order for later recovery by the user for
example saving a word document in a certain place so that only you
can access it and nobody else.
2. Shared Storage
Shared storage is where the network allocates storage for files that
can be viewed and accessed by other people within the network for
example having a document that many people will need to view and
edit would get stored in the shared storage area of the network.
3. Account Management
4. Web Services
Web services are managed by the network in-order to restrict the end
users on computers from accessing potentially bad websites, these
can include pornography and sites deemed unsafe to the network.
They will do this by blocking the access to such website.
5. Printing
1. Expensive to Install
Large campus networks can carry large price tags. Cabling, network
cards, routers, bridges, firewalls, wireless access points, and software
can get expensive, and the installation would certainly require the
services of technicians.
3. Servers Fail
132
4. Cables May Break
Peer-to-Peer
133
Advantages of a peer-to-peer network
Client/Server
134
Advantages of a client/server network
Network Topology
135
Advantages of a Linear Bus Topology
1. Easy to implement and extend.
2. Well suited for temporary networks (quick set-up).
3. Typically the cheapest topology to implement.
4. Failure of one station does not affect others.
5. Easy to connect a computer or peripheral to a linear bus.
6. Requires less cable length than a star topology.
Star topology
136
destination.
137
Advantages of a Tree Topology
Mesh topology
A network topology in which there are at least two
nodes with two or more paths between them. A
special kind of mesh, limiting the number of hops
between two nodes, is a hypercube.
Ring topology
A network topology in which every node has exactly
two branches connected to it. These nodes and branches
form a ring. If one of the nodes on the ring fails then the
ring is broken and cannot work.
A dual ring topology has four branches connected to it, and is more
resistant to failures.
Advantages
138
Disadvantages
A grid network
Is a kind of computer network consisting of a number
of (computer) systems connected in a grid topology. In
a regular grid topology, each node in the network is
connected with two neighbours along one or more
dimensions.
1. Cost of installation.
2. Number of computers and other devices.
3. Architecture of the building to be used.
4. Purpose of the network.
5. Distance of connectivity.
6. Safety provisions of the network.
7. Personnel provisions/technicalities involved.
8. Ease in accessing the network/ speed on the network.
9. Future growth of the organization and expansion of the network.
Network Protocol
What is a Protocol?
The table above illustrates how some of the major protocols would
connect to the OSI model in order to communicate via the Internet. In
this model, there are four layers, including:
The data link layer of the network addresses the way that data packets
are sent from one node to another. Ethernet uses an access method
called CSMA/CD (Carrier Sense Multiple Access / Collision
Detection). This is a system where each computer listens to the cable
before sending anything through the network. If the network is clear,
the computer will transmit. If some other node is already transmitting
on the cable, the computer will wait and try again when the line is
clear.
Gigabit Ethernet
142
correct addresses (via IP or IPX) and then uses routers to send the
data packets to other networks.
When the data packets are sent over a network, they may or may not
take the same route. At the receiving end, the data packets are re-
assembled into the proper order. After all packets are received, a
message goes back to the originating network. If a packet does not
arrive, a message to "re-send" is sent back to the originating network.
TCP, paired with IP, is by far the most popular protocol at the
transport level. If the IPX protocol is used at the network layer (on
networks such as Novell or Microsoft), then it is paired with SPX at
the transport layer.
143
3. FTP - File Transfer Protocol - a protocol that is used to transfer
and manipulate files on the Internet
6. IRC - Internet Relay Chat - a protocol used for Internet chat and
other communications
Revision questions
i.) LAN.
ii.) MAN.
iii.) WAN.
iv.) WLAN.
i.) IP/IPX.
ii.) TCP/SPX.
iii.) HTTP.
146
iv.) FTP.
v.) SMTP.
vi.) DNS.
vii.) DHCP.
viii.) Telnet.
i.) WAP.
ii.) WiMAX.
iii.) RFID.
iv.) IrDA.
v.) UWB.
vi.) Bluetooth.
147
NETWORK PHYSICAL TRANSMISSION
MEDIA
148
e) A network server (e.g., a DNS) manages network traffic.
Workstation
149
Ethernet Cards
Repeaters
Routers are the traffic directors of the global internet. All routers
maintain complex routing tables which allow them to determine
appropriate paths for packets destined for any address. Routers
communicate with each other, and forward network packets out of or
into a network. Here's an example:
So, routers are network gateways. They move network packets from
one network to another, and many can convert from one network
protocol to another as necessary. Routers select the best path to route
a message, based on the destination address of the packet. The router
can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts.
If you have a school LAN that you want to connect to the Internet,
you will need to purchase a router. In this case, the router serves as
the forwarder between the information on your LAN and the Internet.
It also determines the best route to send the data over the Internet.
Firewalls
152
private network, to protect the private network users and data from
malicious hackers.
153
COMMUNICATIONS SOFTWARE
Dialing feature that allows a user to store, review, select, and dial
telephone numbers to connect to another computer.
File transfer feature that allows a user to send one or more files
from one computer to another.
154
c) An e-mail address is a combination of a user name and a domain
name that identifies a user who sends or receives e-mail.
e) Most ISPs provide their users with a mailbox, which stores their
e-mails, on a special server called a mail server.
2. Web browser
A Web browser allows a user to access and view Web pages on the
Internet.
a) Most Web browsers also allow the use of other Internet services
such as e-mail and chat rooms.
4. Newsreader
5. Instant messenger
7. Videoconferencing software
Revision questions
i.) E-mail.
ii.) Web browser.
iii.) Newsreader.
iv.) Instant messege.
v.) Group ware.
157
TELEPHONE NETWORK
Advantages of Telephone
Disadvantages of Telephone
Dedicated lines
b) DSL is much easier to install and can provide much faster data
transfer rates than ISDN.
c) ADSL (asymmetric digital subscriber line) is a type of DSL that
supports faster transfer rates when receiving data (i.e.,
downstream rate) than when sending data (i.e., upstream rate).
159
3. Cable TV lines
4. T-carrier lines
b) A T-3 line is equal in speed to 28 T-1 lines, and can carry 672
individual signals at a transmission of 64 Kbps each, for a total
transmission rate of 43 Mbps.
Revision questions
161
COMMUNICATION CHANNELS
There are several types of cable which are commonly used with
LANs. In some cases, a network will utilize only one type of
cable, other networks will use a variety of cable types. The type
of cable chosen for a network is related to the network's topology,
protocol, and size.
162
Unshielded Twisted Pair (UTP) Cable
Coaxial Cable
164
Coaxial Cable Connectors
a) Always use more cable than you need. Leave plenty of slack.
c) Stay at least 3 feet away from fluorescent light boxes and other
sources of electrical interference.
d) If it is necessary to run cable across the floor, cover the cable with
cable protectors.
f) Use cable ties (not tape) to keep cables in the same location
together.
Wireless networks
166
Examples of wireless transmission media include
167
c) A newer technology, called 4G, provides even faster transfer rates
than PCS so that users can display multimedia, watch TV, or
conduct a videoconference on a cellular device.
168
Advantages of satellites
Disadvantages of satellites
169
3. Cost - Setting up a wireless network can be much more cost
effective than buying and installing cables.
Revision questions
170
i.) Bandwidth.
ii.) Latency.
iii.) Broadband.
iv.) Cable.
171
TRENDS IN COMPUTING
173
There is no single DoS attack method, and the term has come to include
a variety of different forms of attack, a number of which are outlined
below:
174
Fraggle - A fraggle attack is similar to a smurfing attack with the
exception that the User Datagram Protocol (UDP) is used instead
of using ICMP.
Boink - Similar to the Bonk attack except that the corrupted UDP
packets are sent to multiple ports, not just port 53 (DNS).
Back Door attacks use programs that provide a method for entering a
system without going through the usual authentication process. This
can either take the form of hidden access points deliberately put into
application by the original developers to help in maintaining and
debugging the software or a malicious program that is placed on a
system through a virus, or other method which opens up the system
to unauthorized access.
175
A number of back door programs have been discovered over the
years, some which are listed below:
Spoofing
176
Man-in-middle attacks have increased considerable since the
introduction of wireless networking. Now there is no need for the
rogue to connect to a wire, instead the data can simply be intercepted
from anywhere within range of the wireless signal (such as in the
parking lot outside an office or the road in front of a house). The best
way to avoid such attacks is to use encryption and secure protocols in
all communications.
Replay Attacks
TCP/IP Hijacking
Mathematical Attacks
177
rather than rely on weaker encryption (both 40-bit and 56-bit
encryption can easily be broken).
Password Guessing
178
Dictionary Password Attacks
Dictionary password attacks take advantage of the fact that many user
simply rely on easy to remember words as their passwords. A
dictionary attack simply works through a list of words from a
dictionary to see if any of them turn out to be a valid password. Such
brute force programs also take into consideration such tricks as using
the number 3 instead of the letter 'e' and the number 1 in place of the
letter 'l'.
Password Cracking
179
One way to prevent unauthorized access and unauthorized use of
computers is to utilize access controls.
6. Software theft:
180
b) A software site license gives the buyer the right to install the
software on multiple computers at a single site (e.g., a school
computer laboratory).
7. Information theft:
Some systems assign the user names and even passwords to their
users, but some systems allow their users to choose their own user
names and passwords.
182
It translates a personal characteristic into a digital code that is
compared with a digital code stored in the computer.
A hand geometry system, which can measure the shape and size
of a person's hand.
8. System failure
- Aging hardware
184
- Natural disaster (e.g., fires, floods, storms, or earthquakes)
- Electrical power variation. Electrical power variations can cause
loss of data or equipment. A single power disturbance can
damage multiple systems in a computer network.
9. Backing up
Types of backup
185
b) Differential backup, which copies only the files that have changed
since the last full backup.
1. Encryption
186
are generally defined as passwords containing symbols, numbers, and
mixed case letters, at least 14 characters long).
2. Isolation
3. Hidden SSID
Every access point has a Service Set IDentifier (SSID) that by default
is broadcast to client devices so that the access point can be found.
By disabling this feature, standard client connection software won't
be able to "see" the access point. However, the eves-dropping
programs can easily find these access points, so this alone does little
more than keep the access point name out of sight for casual wireless
users.
11. Computers and health risks
a) Eye strain
b) Back pain due to poor sitting posture
c) Electromagnetic radiation especially with CRT monitors
d) Addiction from use
e) Wrist pain to do non-ergonometric
f) Repetitive Strain Injury(RSI)
g) Headaches
h) Neck pain
i) Stress due to noise from fans, printers, power inputs
j) Ear problems for use of ear phones especially with embedded
systems
Are the moral guidelines that govern the use of computers and
information systems.
b) Software piracy
The Web site providing access to the information may not be the
creator of the information. Always evaluate the content provided
on a Web page before using it.
Codes of conduct
189
legally binding but once someone agrees to abide by it, then it is
considered binding.
Other things that are often covered by Codes of Conduct are the
security and use of user names and passwords, for example, not
leaving your workstation logged on if you are not present or not
telling anyone else your password.
190
Information privacy
a) Electronic profiles
b) Cookies
c) Spam
d) Phishing
191
e) Pharming
f) Spywares
g) Adware
h) Privacy laws
Privacy law refers to the laws which deal with the regulation of
personal information about individuals which can be collected by
governments and other public as well as private organizations and its
storage and use. Privacy laws are considered in the context of an
individual's privacy rights or reasonable expectation of privacy.
i) Social engineering
j) Employee monitoring
193
amount of time before a parcel will be delivered, or which taxi is
closest.
k) Content filtering
Revision questions
195
7. (a). Define the term information privacy.
(b). Describe eight tools used for information privacy.
196
EMERGING TECHNOLOGIES
1. Artificial intelligence
a) Game playing
You can buy machines that can play master level chess. There is
some AI in them, but they play well against people mainly through
bully force computation--looking at hundreds of thousands of
positions.
b) Speech recognition
d) Computer vision
e) Expert systems
f) Heuristic classification
One of the most possible kinds of expert system given the present
knowledge of AI is to put some information in one of a fixed set of
categories using several sources of information. An example is
advising whether to accept a proposed credit card purchase.
Information is available about the owner of the credit card, his record
of payment and also about the item he is buying and about the firm
from which he is buying it (e.g., about whether there have been
previous credit card frauds at this establishment).
g) Computer science
- Time sharing.
- Interactive interpreters.
- Graphical user interfaces and the computer mouse,
198
- Rapid development environments.
- The linked list data structure.
- Automatic storage management.
- Symbolic programming.
- Functional programming.
- Dynamic programming and object-oriented programming.
h) Finance
j) Heavy industry
k) Transportation
l) Telecommunications
m) Music
The Air Operations Division AOD, uses AI for the rule based expert
systems. The AOD has use for artificial intelligence for substitute
operators for war and training simulators, mission management aids,
support systems for tactical decision making, and post processing of
the simulator data into symbolic summaries.
p) Other
2. Digital forensics
- Computer forensics
- Network forensics
Traffic is usually stopped at the packet level, and either stored for
later analysis or filtered in real-time.
202
- Database forensics
Revision questions:
203
CAREERS IN THE COMPUTER INDUSTRY
This is great news indeed for those looking to join the field. One of
the only computer related jobs to be wary of are positions in
computer programming, as much of this work is being outsourced to
different countries. However, most other computer related
professions are experiencing an exciting growth.
204
f) These professionals have strong leadership and managerial skills,
excellent communicators, and able to quickly think seriously and
reasonably.
2. Computer Scientist
d) Once installed, they also teach customers how to properly use the
new devices and even write instructional handbooks.
f) Most of their work consists of dealing with people who are not as
technologically gifted as they are and it's important that they
remember this and be patient when customers do not understand
how to correct the issue the first time.
c) The analysts formulate a plan and design (or perfect) systems that
will help the company achieve their goals. For example, a large
retail store or food corporation might want a systems analyst to
create a new computerized inventory system.
206
d) The analyst is responsible for specifying all the details from
beginning to end when configuring a new system; including
determining if the system is economically possible.
c) Your work may be done onsite for one particular company, or you
might do your work on a contract basis for several organizations.
207
f) However, some may work in computer operations centers if they
specialize in facilities management and maintenance, and others
are able to work from home or other remote locations.
6. Computer Programmer
7. Database Administrator
208
b) They come up with effective ways of storing, organizing,
analyzing, using and presenting this data.
8. Network Administrator
210
10. Software Engineer
211
Review questions:
212
GREEN COMPUTING
213
Resource allocation
Virtualizing
Terminal servers
214
software include Terminal Services for Windows and the Linux
Terminal Server Project (LTSP) for the Linux operating system.
Power management
Data centers, which have been criticized for their particularly high
energy demand, are a primary focus for green computing. Data
centers can improve their energy and space efficiency through
techniques such as storage consolidation and virtualization.
215
Power supply
Storage
Smaller form factor (e.g., 2.5 inch) hard disk drives often consume
less power per gigabyte than physically larger drives. Unlike hard
disk drives, solid-state drives store data in flash memory or DRAM.
With no moving parts, power consumption may be reduced
somewhat for low-capacity flash-based devices. As hard drive prices
have fallen, storage firms have tended to increase in capacity to make
more data available online. This includes archival and backup data
that would formerly have been saved on tape or other offline storage.
The increase in online storage has increased power consumption.
Reducing the power consumed by large storage arrays, while still
providing the benefits of online storage, is a subject of ongoing
research. An example is sky drive and drop box respectively.
Video card
216
Display
CRT monitors typically use more power than LCD monitors. They
also contain large amounts of lead. LCD monitors typically use a
cold-cathode fluorescent bulb to provide light for the display. Some
newer displays use an array of light-emitting diodes (LEDs) in place
of the fluorescent bulb, which reduces the amount of electricity used
by the display. Fluorescent back-lights also contain mercury, whereas
LED back-lights do not.
Materials recycling
Telecommuting
217
Review questions:
218
COMPUTER CERTIFICATION
Professional certifications in computer technology are non-degree
awards made to those who have achieved qualifications specified by
a certifying authority. Depending on the particular certification,
qualifications may include completing a course of study, proof of
professional accomplishments, achieving a specified grade on an
examination or some combination thereof. The intention is to
establish that an individual holding a certification is technically
qualified to hold certain types of position within the field.
1. Vendor-specific certifications
219
Hewlett-Packard sponsors the HP ExpertONE certification
program.
Dell sponsors the Dell Certified Systems Expert program with
Associate and Master levels.
IBM sponsors certifications.
ISIS Papyrus sponsors the Papyrus Certified Professionals
Program.
Juniper Networks sponsors the Juniper Networks Technical
Certification Program.
LANDesk sponsors the Certified LANDesk Administrator and
Certified LANDesk Engineer program.
Microsoft Corporation sponsors the Microsoft Certified
Professional program.
MySQL (as part of Oracle now) sponsors a certification program.
National Instruments offers certifications in Lab VIEW,
TestStand, and LabWindows/CVI software.
Nortel sponsors the Nortel Certifications program.
Novell sponsors a certification program.
Object Management Group sponsors the Certified Professional
program for the Unified Modeling Language.
Oracle Corporation sponsors the Oracle Certification Program.
Red Hat sponsors the Red Hat Certification Program
SAP sponsors individual training and certifications
SAS sponsors a certification program
SolarWinds sponsors the SolarWinds Certified Professional
Program for network management
SpringSource sponsors the SpringSource Certified Professional
program.
Sun Microsystems sponsors the Sun Certified Professional
program (now part of the Oracle Certification Program)
Sybase sponsors the Certified Sybase Professional program
Ubuntu, provides Ubuntu Certified Professional program
VMware sponsors certification programs (VCP & VCDX)
Zend Technologies sponsors the Zend Certified Engineer (PHP)
program.
220
2. Third-party and vendor-neutral certifications
3. General certification
222
The BCS sponsors the Chartered IT Professional (CITP)
programme.
The Institute for Certification of Computing Professionals
sponsors the Certified Computing Professional (CCP) and
Associate Computing Professional (ACP) certifications
The BDPA IT Institute sponsors the BDPA IT Associate (BITA),
the BDPA IT Professional (BITP), and the BDPA IT Master
(BITM) certifications
The Canadian Information Processing Society sponsors the
Information Systems Professional (ISP) and Information
Technology Certified Professional (ITCP) in Canada.
The American Institute of Certified Public Accountants sponsors
the Certified Information Technology Professional program.
APICS establishes operations management standards and
sponsors certification for Logistics.
The New Zealand Computer Society sponsors the Information
Technology Certified Professional programme
The Australian Computer Society offers pathways to Certified
Professional (CP) and Certified Technologist (CT) designation.
The Canadian Council of Technicians and Technologists sponsors
the Certified Engineering Technologist or Professional
Technologist Information Technology or Electronics (Computer)
Technology profiles.
223
Information Systems Examination Board (ISEB) Foundation
Certificate in Green IT is appropriate for showing an overall
understanding and awareness of green computing and where its
implementation can be beneficial.
224
REFERENCES
225