Professional Documents
Culture Documents
ICT Chapter One For Certificate
ICT Chapter One For Certificate
ICT Chapter One For Certificate
EDUCATION
Introduction to ICT (ICTE341)for primary grade
Chapter one
Introductory Concepts of ICT
Outile
Introduction ICT
Characteristics of information
Sources of information
Application of ICT
04/30/2024 1
Objective
At the end of this unit, the student teachers will
be able to:
define ICT and related terms.
relate data, information and knowledge.
identify sources of information.
describe the basic characteristics of
information
mention the application areas of ICT in
education.
04/30/2024 2
Definition of ICT
Brain stormHow do you describe the term ICT?
I stands Information
It is collection of data
It is meaning full data
Processed data
Organized data
Used to make decision making
E.G Abebe is a student.
Data:- collection of raw facts and figures
It is not have meaning by itself
Not organized
Not processed
It used as input for making information
04/30/2024 3
Cont---
No.
Meaning of information Meaning of data
1
It is collection of data It is figures and facts
2
It is organized data It is not organized data
3
It is processed data It is not processed data
Recorded data It is not have meaning:- e.g
numbers, images, words, letters,
and sound,characters
4
E,g Abebe is a students e.g Abebe, is, a, students
04/30/2024 6
Data processing
The data processing cycle is the set of operations used to
transform data into useful information.
After data is processed it is converted into information
Data is processed digitally or electronically
We process data in order to get a usable information
Data Processing Cycle steps
Step 1: Collection. The collection of raw data is the first step of the
data processing cycle. ...
Step 2: Preparation. ...
Step 3: Input. ...
Step 4: Data Processing. ...
Step 5: Output. ...
Step 6: Storage
Step 7: Feedback
Output
Input
04/30/2024
Process 7
Conti……
04/30/2024 9
Aplication Areas of ICT
In higher education: ICT can be used as a teaching tool, as a
good source of information, as a means of communication, and as a
method to improve education quality through Electronic learning(e-
learning)
Communication: ICT can be used as one of the fastest means of
communication medium in bringing the world into one information village
through Internet.
Telecommunications and Airline industries: - ICT also acts as
the backbone for handling, processing data and communicating
information timely in telecommunications and Airline industries .
Research and experiments: - ICT is highly utilized in scientific
research and experiments including Astronomy.
Data exploration and management: - In data exploration and
management of institutions and organizations, e-commerce and others.
04/30/2024 10
Aplication of ICT in Education
04/30/2024 11
Cont---
It provide
Computer based training, computer assisted learning,
computer assisted instruction programs are available, and
they can be used to improve the teaching- learning process.
The use of Internet facilitates communication among
students and teachers
students can use computers to learn reading and writing, to
prepare reports, gathering and analyzing data, communicate
their ideas using pictures, tables and graphs, record sounds
ICT can enhance the quality of education in several ways: by
increasing learner motivation and engagement, by
facilitating the acquisition of basic skills, and by enhancing
teacher training
ICTs have also been used to improve access to and the
quality of teacher training.
04/30/2024 12
ICT and E-learning
E-learning is a type of learning that is
facilitated and supported via information and
communications technology (ICT).
It is called
Web-based training
computer-based training or web-based learning,
online learning are a few synonymous terms that have
over the last few years been labeled as e-Learning.
“just-in-time”
It is flexible learning
04/30/2024 13
Distance Learning
• It has 3 meanings
Distance Education
Distributed Learning
Remote Education.
04/30/2024 14
Types of Distance Learning
• It divided into
A. Synchronous delivery:- the teacher and the student
interact with each other in "real time. Example telephone
conversations and video conference.
B. Asynchronous delivery:- does not take place
simultaneously. Example email
04/30/2024 15
Benefits of Distance Learning
Convenience: distance learning technologies can provide
convenient locations for both students and instructors.
Flexibility:
Effectiveness: distance learning is both convenient and effective.
Multi-sensory: there is a wide variety of materials that can meet
everyone's learning preference. For example, some students learn from
visual stimuli, such as video, and others learn best by listening or
interacting with a computer program.
Interactivity:
04/30/2024 16
End of chapter
Comments
Question welcome!!!
04/30/2024 17
Chapter two
computer
Outline
Computer
Generation of computer
Types of computer
Characteristics and limitation of computer
04/30/2024 19
First Generation
The period of first generation was 1946-1959
IT was used vacuum tubes for processing data.
were very expensive and could be afforded only by very large
organizations.
mainly batch processing operating system were used.
The operating speed was quite slow.
Punched cards, paper tape, and magnetic tape were used as input and
output devices
magnetic drams were used for internal storage.
They used primitive or operator controlled operating system(machine
language)
Power consumption was very high.
Large size and has small speed. Some computers of this generation were:
ENIAC
EDVAC
UNIVAC
IBM-701
IBM-6
04/30/2024 20
Second generation of computer
04/30/2024 26
B. Mainframe Computer:
It is the second powerful multi-user computer
used in large business organizations, industries
and in defense to process data of complex nature.
It responds for several hundred requests very
quickly.
It uses several CPU for data processing.
More than 100 users can use mainframe
computer at a time because it works on time
sharing mode.
Its word length is 48 bits to 64 bits.
04/30/2024 27
C. Minicomputer(mid range)
Minicomputers are larger and more powerful than
most microcomputers
are smaller and less powerful than mainframe
computers.
Minicomputers can do all the tasks of mainframe
computers but in a reduced scale. So
minicomputers are multi-user computer and
support more than dozens of people at a time.
It is costlier than microcomputer.
They are used small to medium sized organizations
such as universities
04/30/2024 28
D. Microcomputer
A. Digital computers
Digital computer is electronic devices that process discrete data and
calculations using digits represented by number forms in high speed.
Binary system is used to represent the values of variables and quantities.
B. Analogue computers
work on wave’s principle. T
hey are used in specific to measure continuous flow of data which can
expressed in tangible quantities such as atmospheric pressure, temperature,
and voltage.
They are used in scientific and engineering fields to give round results.
C. Hybrid computers
incorporate the qualities of the previous two types (digital and analogue).
They are used in scientific fields processing necessary data from both kinds.
They are characterized by their digital processing the ability to store data,
high accuracy, and the ability to create arithmetic functions (correlations).
Their disadvantages high cost, inevitable errors, and overlapped
programming
04/30/2024 30
III. Classification of computer based on their purpose Computers
04/30/2024 31
04/30/2024 32
CHARACTERISTICS OF COMPUTER
Speed: computers can work very fast
it measured using HZ
micro second (10-6 one millionths)
nano second (10-9 one billionths)
Pico second (10-12 one trillionths).
Storage: can store a large amount of data
computer capacity measured using byte.
Hierarchy of byte
bit
Byte
Kilobyte
Megabyte
Gigabyte
terabyte
Accuracy: computers are free of committing errors by themselves unless there is error
from the user.
Automatic: Once a program is in the computer’s memory, it continues without the need
for human intervention until completion.
Versatility: computers now days are general purpose
Diligence: free from tiredness, lack of concentration, fatigue, etc. It can work for hours
without creating any error
04/30/2024
Power of remembering 33
Limitation of computers
Can’t Think:
No Feeling: It does not have feelings or emotion, taste,
knowledge and experience.
No IQ: Computer is a dumb machine and it cannot do
any work without instruction from the user.
Computer can only operate on the user provided data.
A computer needs well-defined instructions to perform
any operation.
It cannot identify its problem.
It cannot decide the input needed to solve the problem
Software that generate automatically is also designed by
humans
Computers are merely tools, useless without humans 34
04/30/2024
End of chapter 2
!!!!!!!
If you have any comment, please write by
biresb5@gmail.com
04/30/2024 35
Assignment
Define about:-
1. Batch processing
2. Parallel processing
3. Punch card
4. Magnetic drum
5. High level language
04/30/2024 36
Chapter 3
Computer Systems
Unit Learning Objectives
At the end of this unit, the student teachers will
be able to:
Describe the components of computer system.
Distinguish Hardware and software components of the computer system.
State the functions of computer hardware
Identify the units of data representation
Explain the main purpose of system software and application software.
04/30/2024 37
Computer system
04/30/2024 38
Physical setup of computer
04/30/2024 39
Physical setup of computer
The System Unit
is also called a case
It is a box that houses the motherboard
The motherboard
this is the largest rectangular circuit board
inside the computer
in which processor and RAM chips are plugged
provides connectivity to all parts of the
computer
04/30/2024 40
Cont.…
It also limits the computer’s speed
Used to expand the capability of a computer by adding different
boards
04/30/2024 42
Hardware Components
• Is a parts of computer which is called peripheral
• The touchable parts of the computer
• The physical part of the computer
• Examples of Hardware
Monitor, printer, modem….
Keyboard, scanner, motherboard…..
Mouse, CPU, RAM, NIC, CMOS battery….
Types of hardware
A, input devices
B, Output devices
C, Process devices
D, Storage devices
04/30/2024 43
Input devices
It is defined as an electronic device that allows
the user to feed information (data) into the
computer for analysis, storage, and to give
commands to the computer.
Input devices can be classified into the following
categories:
Keyboard:- the user can type text and execute commands.
Keyboard:- parts of keyboard
Alphanumeric key pad ( A,B,C,….Z) used for typing
Numeric key pad(0,1,2,3,…9 ,+,-,*,/)
Function key( F1,F2,F3,…..F12)
Modifier key (Alt, Ctrl, Shift)
Cursor movement key :- used to move cursor
04/30/2024 44
Pointing device
it is used to communicate with the computer
by pointing to location on the monitor screen.
user can move a cursor on the screen and
perform move, click or drag operations.
used to communicate with the computer by pointing
Some of the commonly used pointing devices are
Mouse
Trackball
Joystick
Light en
04/30/2024 45
Cont.….
Scanning devices:
Used to convert images such as pictures and
text into digital images
The digital image can be manipulated by
computer
Microphone
Used to accept and convert audio input into
digital data
04/30/2024 46
Output Devices
convert machine readable data or information
into human readable form
The computer output generated by output
devices is of two forms
Hard copy information
Soft copy information
• Examples of output devices are:- monitor,
printer, Speaker, PC projector…etc
Monitor:-
Display processed data in the form of image
Monitor is classified based on
a) The color they produce
04/30/2024 47
b) The type of technology they use
Cont.
Based on the color they produce monitor is classified into three:
a) Monochrome: single color monitors
b) Gray scale : black and white monitors
c) Colored : produce and use multiple colors.
Monitor
Based on the technology they use, monitors are classified as
I. CRT (Cathode Ray Tube):- –These monitors use three electrodes each
representing the three primary colors (Red, Blue and Green). The dots are
grouped into picture elements called pixels, which glow when struck by electrons
II. LCD (Liquid crystal Display):-LCD displays are made of two layers of a polarizing
material with a liquid crystal solution in between. An electrical signal makes the
crystals line up in a way that keeps light from going through entirely or just
partly.
• Printer:-
peripheral device that produces a hard copy
• Speaker:-
Outlets the Audio data/information
• PC Projector:-
Projects/ displays monitor data in large on the screen
04/30/2024 48
Processes devices
CPU central processing unit
It is the portion of the computer system
Some time called brain of computer or processor
Carries out the instructions of computer program
Perform the basic arithmetical, logical, and input operations
It is considered to be the brain of the compute
It is a place where data is processed
It has two major function
1. It co-ordinates and controls the computer’s activities
2. It performs arithmetic and Logic operations using bits
ALU ( Arithmetic and Logical Unit):- Performs numerical arithmetical & Logical (=,+,-,, /, shift,
04/30/2024 50
Primary Storage or Main Memory
04/30/2024 51
Cont.
(RAM)-Main Memory has several uses
Input area – where the data is stored
Operating system – controls the operation of the computer
Working storage – where calculations are performed and
data is stored temporarily
Output area: where the information is stored prior to output
Application program area – where the user program is held
Read Only Memory(ROM)
Is non-volatile storage
Store programs that put by computer manufactures
It contains a BIOS( basic input output system) reference
It controls the keyboard, monitor, and disk drive and so on.
04/30/2024 52
Secondary or Auxiliary Storage Devices
04/30/2024 53
Software
• Is a set of instructions that tell the computer hardware how, what and when
to do a given task or operation
• It is a sequence of instructions stored in the memory of the computer
system
• It is an executable file(.exe)
• Software can be categorized in to
a) System software
b) Application software
• System software
a) Operating system
b) Utility program
c) Programming language
I. Low level language:- COBOL, FOTRAN
A. Machine language
B. Assembly language
II. High level language :- C++, VB, Java….
04/30/2024 54
Units of Data Representation
Bit: It is the smallest unit of memory. A bit has the value 0 or 1
but not both.
Byte: One byte means a group of eight bits.
Kilobyte (KB). A kilobyte (KB) is 1,024 bytes. (1KB=210 bytes)
Megabytes (MB) - (MB) is approximately one million bytes
(1,048,576bytes, or 1,024 kb or 1,024 × 1,024 bytes, to be exact).
• Gigabyte (GB). Giga means one billion. A gigabyte (GB) is actually
1,073,741,824 bytes or 1,024 MB (i.e., 1,024 × 1,024 × 1,024
bytes). The storage capacity of a hard drive in modern personal
computer is often many gigabytes.
• Terabyte (TB): One trillion bytes (actually, 1,099,511,627,776
bytes) is a terabyte (TB).
• Word: Word refers to the number of bits or bytes that a
computer process at a time or a transmission media transmits at
a time. Computer is either 32 bits or a 64 bits that indicate the
amount of data it can process at a time.
04/30/2024 55
System software
a set of one or more programs designed to control the operations
It performs the following functions
Provides user interface
Monitors the effective use of various hardware resources
Support the development and execution of other application
software
Programming language
primary interface of a programmer with a computer
development of software
System Utilities
performing tasks of routine nature
help users in maintenance tasks
formatting a hard disk
scanning a compute
04/30/2024 56
Operating system
controls the resources of a computer system
provides a link between the hardware, application
software and the computer user
Recognizing input from the keyboard
Sending output to the display screen
Keeping track of files and directories on a disk
Controlling peripheral devices
The most widely used operating system software
o MS –DOS,
o Windows 95,
o Windows 2000,
o Windows XP,
o Windows Vista,
o Windows 7,
o Window 8.1, 10
o
04/30/2024, Mac, 57
o UNIX
Application Software
04/30/2024 58
Cont.
04/30/2024 59
UNIT four
computer network and internet
Outline
Computer network
Types of networking
Advantage and disadvantage of networks
Internet
Search engine
Malicious program
ethical and unethical uses ICT
04/30/2024 60
Objective of the chapter
At the end of this unit, the student teachers will be
able to:
Define terms related to computer networks and
internet.
Explain advantages and disadvantages of computer
networks.
Defines search engines and their effective searching
techniques.
State malicious software and computer securities
Differentiate the difference between ethical and
unethical uses ICT
04/30/2024 61
Computer network
Network :- connection of more than one computer.
04/30/2024 63
DISADVANTAGES OF NETWORKS
Expensive to install:
Requires Administrative Time:
Servers Fail
Cables May Break:
Security and compliance
04/30/2024 64
Types of Computer Networks
04/30/2024 65
Classification Based on Security and Access
a. Peer-to-peer networks:
in this type of network all computers are equal.
Peer-to-peer networks are characterized by the following:
Security is not centralized
Network is not scalable; it is good only for 10 or less number of computers.
Each user is responsible for taking local backup.
No specialized network operating system software is required
b. Client/server networks:
Server :- provide resource to the client(response to client)
Client :- get data from server(request to get resources)
Characteristics of Client/Server network
The network has centralized, tighter security.
The network is highly scalable; you can have tens of thousands of
workstations in the network
Backup is centralized and is done by a person responsible for the job
(backup operator).
Specialized networking operating systems are required, such as
04/30/2024 66
Windows NT 4.0 server, Windows 2008 server, Novell NetWare, etc.
Internet
04/30/2024 68
cont.…
04/30/2024 69
Services of the Internet
E-mail can be used transmit text, messages, audio and video clips.
E-Mail allows users to send a message to just one user or a group of users.
Large documents can be attached.
Users can read, print, forward, answer or delete a message.
E-mail is much cheaper and faster in comparison to other communication services.
Each E-mail user is assigned a unique address, which is used by the e-mail network to
deliver the message.
04/30/2024 70
Cont.…
04/30/2024 71
videoconference
A videoconference is a live connection between people in separate locations for the purpose
of communication, usually involving audio and often text as well as video .
It also known as a video teleconference
is a set of interactive telecommunication technologies which allow
two or more locations to interact via two-way video and audio
transmissions simultaneously.
Impact of Video Conferencing on Education
04/30/2024 73
Malware:-
it t is software designed to damage a computer system without the
owner's knowledge.
It includes:-
computer viruses:-program or file enabling it to spread from one
computer to another. it can damage your hardware, software or files. all
viruses are attached to an executable file, which means the virus may exist
on your computer but it actually cannot infect your computer unless you
run or open the malicious program. t is important to note that a virus cannot
spread without a human action .it transfer from device to device by sharing
infecting files or sending e-mails with viruses as attachments in the e-mail
and when using secondary storage.
worms:- is similar to a virus by design and is considered to be a sub-class
of a virus. It spread from computer to computer, but unlike a virus, it has
the capability to travel without any human action. The biggest danger
with a worm is its capability to replicate itself on your system. worm
consumes too much system memory or network bandwidth, causing
Web servers, network servers and individual computers to stop
04/30/2024 74
responding.
Trojan horses:-will appear to be useful software but will actually
do damage once installed or run on your computer. It causes
changing your desktop, adding silly active desktop icons) or
they can cause serious damage by deleting files and destroying
information on your system.
Spyware:- is a malicious program and is similar to a Trojan horse
in that users unwittingly install the product when they install
something else. Spyware can gather information about e-mail
addresses and even passwords and credit card numbers.
It is not the same as defective software, that is, software which has
a legitimate purpose but contains harmful bugs.
04/30/2024 75
Computer security and ICT ethics
Computer security :-it is the process of ensuring confidentiality, integrity, and
availability of computer, their programs, hardware devices and data. Hence, lack of
computer security results from failure of these three properties
Lack of confidentiality is unauthorized access to a computer system or a program.
A failure of integrity results from unauthorized modification of data or damage to
computer system or program.
A lack of availability of computing resources results in what is called denial of
service.
Threat:- An act or event that has the potential to cause a failure of computer
security
Vulnerabilities:- Threats that are not countered by controls
Kinds of controls are physical, administrative, logical, cryptographic, legal, and
ethical.
To prevent theft of or damage to the hardware
To prevent theft of or damage to the information
To prevent disruption of service.
04/30/2024 76
Common Signs of Infection of Computers by Malwares
Here are a few primary indicators that your system might be infected
Runs consistently slower than normal
Stops responding or locks up often
Crashes and restarts every few minutes
Restarts on its own and then fails to run normally
Applications don't work properly
Disk drives are inaccessible
Printing doesn't work correctly
You see unusual error messages
You see distorted menus and dialog boxes
04/30/2024 77
Methods of Protecting your Computer against Viruses
04/30/2024 81