100% found this document useful (1 vote)
459 views

Topic 1: Introduction To Computing

Computers can be defined as electronic devices that process user input, store data, and output information. The document then discusses the key characteristics of computers including speed, accuracy, diligence, storage, processing, communication, versatility, automation, and artificial intelligence. It also describes the main parts of a computer including the system unit, keyboard, mouse, and monitor. Computers are classified based on their physical size, purpose, and the type of data they process. The document provides examples and applications of different types of computers such as supercomputers, mainframe computers, minicomputers, and microcomputers.

Uploaded by

Kartel Gunter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
459 views

Topic 1: Introduction To Computing

Computers can be defined as electronic devices that process user input, store data, and output information. The document then discusses the key characteristics of computers including speed, accuracy, diligence, storage, processing, communication, versatility, automation, and artificial intelligence. It also describes the main parts of a computer including the system unit, keyboard, mouse, and monitor. Computers are classified based on their physical size, purpose, and the type of data they process. The document provides examples and applications of different types of computers such as supercomputers, mainframe computers, minicomputers, and microcomputers.

Uploaded by

Kartel Gunter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 123

Topic 1: Introduction to

Computing
Definition of computer

A computer can be defined as an


electronic device that processes a
user’s input (data), store, and output
(information) or retrieve information.
The computer processes data by a set
of instructions called a computer
program.
The characteristic of a computer
 Speed: Computers work at very high speeds and are much
faster than humans. A computer can perform billions of
calculations in a second. The time used by a computer to
perform an operation is called the processing speed. Computer
speed is measured in Mega Hertz (MHz) or Giga Hertz (GHz).
 Accuracy: Computers can process large amounts of data
precisely and exactly without making any errors. Modern
computers are capable of detecting mistakes and making
corrections once made by the user.
Xtics……
 Diligence: Computers are diligent i.e. they have the ability to perform
the similar task without getting tired and bored e.g. in industrial
robotics, like those in Car assembly lines.
 Storage: A computer can store large amount of data permanently. A
User can use this data at any time. We can store any type of data in a
computer. Text, graphics, pictures, audio and video files can be stored
easily. The storage capacity of the computer is increasing rapidly.
 Processing: A computer can process the given instructions. It can
perform different types of processing like addition, subtraction,
multiplication and division. It can also perform logical functions like
comparing two numbers to decide which one is the biggest etc.
 Communication: Most computers today have the capability of
communicating with other computers. We can connect two or more
computers by a communication device such as a modem. These
computers can share data, instructions, and information. When two or
more computers are connected, they form a network.
Versatility: Computers can do computations with all
kinds of input (data) including alphabets, pictures,
sound images, voice, etc.
 Automation: Computers can receive and work on
instructions given on their own (automatically), i.e.
they do not need any supervision to do program
routines.
Artificial Intelligence (AI): Computers can respond to
requests given to them and provide solutions.
Parts of a computer
 The physical parts of a computer are made of a collection
of different components that are interconnected in order
to function as a single entity. A typical desktop computer
is basically made up of a system unit and other devices
connected to the system unit called peripheral devices.
 Peripheral devices are connected to the system unit
using special cables called interface cables that transmit
data and information to and from the device. The cables
are attached to the system unit through connectors called
ports. Examples of peripheral devices include;
Monitor/screen, keyboard, mouse.
 System Unit: This is the part that houses the brain of
the computer called the Central Processing Unit
(CPU). The system unit also houses other devices
called drive. Drives are used to store, record and
read data.
 Keyboard: The keyboard is the most common
peripheral device that enables a user to enter data
and instructions in a computer.
 Mouse: The mouse is a pointing device that enables the user
to execute commands. It is used to control an arrow
displayed on the screen, the user moves the mouse which
consequently moves the pointer on the screen. Once the
pointer is on the icon (Icon is a small pictorial
representation of a command), click one of the two mouse
buttons.
 Monitor: A monitor simply the screen is a television-like
device used for displaying information. It is called a monitor
because it enables the user to monitor or see what is going
in the computer.
Classification of computers

 Computers can be classified according to the;


 physical size
 purpose
 functionality.
Classification according to size

 Based on physical size, computers can be classified into four


main groups.
 super computers
 main frame computers
 mini computers
 microcomputers.
Supercomputers
 Supercomputers are the fastest, largest, most expensive
and powerful computers available.
 They are able to perform many complex operations in a
fraction of a second. Because of weight super computers
are kept in a special room.
 Due to their huge processing power, super computers
generate a lot of heat and therefore special cooling
system is required.
 Supercomputers are mainly used for scientific research,
which requires enormous calculations.
Application areas

 These include;
 aerodynamic design and simulation
 petroleum research
 defense and weapon analysis.
 They are mainly found in developed countries such as
USA and Japan where they are used for advanced
scientific research and nuclear physics.
Mainframe computers

 Mainframesare less powerful and less expensive than


super computers. Mainframes are said to be big size.
They are used for processing data and performing
complex mathematical calculations.
 They have a large storage capacity and can support a
variety of peripherals. Mainframe computers handle
all kinds of problems whether scientific or
commercial.
Application areas

 Theyare mostly found in areas which have large


information processing needs such as;
 government agencies
 Banks
 hospital
 Airports.
Minicomputers
 it is referred to as a small-scale mainframe computer. It
supports fewer peripheral devices and is not as powerful
and fast as the mainframe computer.
 It was developed as a cheaper alternative to the
mainframes for smaller organizations.
 They are used for functions such as accounting, word
processing, database management and specific industry
applications.
Microcomputers
A microcomputer is the smallest, cheapest and
relatively least powerful type of computer. It is
called a microcomputer because, its CPU is called
a microprocessor, which is very small compared
to that of minicomputers, mainframe and
supercomputers.
Microcomputers are commonly used in training
and learning institutions, small business
enterprises, and communication centers.
Examples
 include

Desktop computer
 Laptop or Notebook computers
 Personal digital assistant (PDA).
Classification according to purpose

Computers can be classified


according to task they perform as;
General purpose computers
 Special purpose computers.
General purpose computers
General purpose computers have been
designed to be able to perform a variety of
tasks when loaded with appropriate
programs. They are the most common types
of computers in use today.
Their flexibility enables them to be applied
in a wide range of applications like
document processing, performing
calculations, accounting, data and
information management among others.
Special purpose computers
 Special purpose computers are designed to serve a
specific purpose or to accomplish one particular task.
Such computers can perform no other task except
one they were designed for.
 This means that the set of instructions, which drive a
special purpose computer, are limited in number at
the time of manufacture.
 Examples of such computers include; robots used in
manufacturing industries, mobile phones for
communication only and electronic calculators that
carry out calculations only.
Classification according to functionality

Computer can be classified into


three types according to the type of
data they process. Data can be;
 discrete (Digital computers)
 continuous form (Analog computers)
Hybrid
Digital computers

Digital computers process data that is


discrete in nature. Discrete data also
known as digital data is usually
represented by binary digits of 0 and 1.
Most modern computers such as desktop
computers, laptop/notebook, personal
digital assistant, digital cameras are
digital in nature.
Analog computers
 This refers to computers that process data that is
continuous in nature. Continuous data also known as
analog data is usually represented using a continuous
waveform.
 Analog computers are used monitoring and regulating
furnace temperatures, pressures etc.
 They are also used in weather stations to record and
process physical quantities e.g. wind, cloud speed,
temperature etc.
 E.g. Astrolabe, mechanical integrator, tide predictors,
target data computer and slide rule.
Hybrid computers

Hybrid computers are designed to


process both analog and digital data.
Examples of the hybrid machine are:
ECG monitors, assembly lines, radar
and sonar systems, process control -
industry, scientific weapons control.
Data and Information
 Data is the representation of raw facts. They do not have
meaning to the user and may include: numbers, letters
and symbols.
 Example
 P952BR, @bbcclick, 359, 23557.99
 Information is processed data. When data items are given
context and meaning, they become information. A person
reading the information will then know what it means.
 Example
 P952BR is a product code for a can of noodles.
Data/information processing cycle
 Information processing cycle is a set of operations that
take place, from collection of input data to the availability
of output (information).
 This refers to the sequence of activities involved in data
transformation from its raw form to get information.
 The four main stages of data processing cycle are:
 Data collection: include data creation, data preparation
 Data input: include media conversion, input validation,
sorting
 Processing
 Output
Qualities of good data and information
 Accuracy: accuracy refers to the close
approximation, exactness, clarity, completeness to
an actual value for efficient results.
 Timeliness: timeliness is the relative accuracy of data
in respect to the current state of affairs for which it
is needed. If received late information may become
meaningless to the user. E.g.newspaper.
 Relevance: data entered into the computer must be
relevant in order to get the expected output
(decision making). Data must meet the requirements
of the processing cycle.
Cost effectiveness: data must be
within the means of firms’ income.
Information is the processed data.
They are meaningful to the user. A
computer is said to be electronic
because it utilizes electrical signal to
process information.
World of ICTs
 ICT is an acronym for Information and Communication
Technology.
 It is defined as a diverse set of technological tools
and resources used to communicate, create, store,
disseminate and manage information.
 ICT has become a very important part of the
educational delivery and management processes.
 ICT largely facilitated the acquisition and absorption
of knowledge and hence providing extraordinary
opportunities.
Uses of ICTs
Business
 Businesses have got their websites and networked computers used to
advertise, market, process orders, receipting purchased orders which
facilitate the buying and selling of goods &services by visiting the
supplier’s websites, selecting the item and placing it in a virtual
shopping tray.
 Electronic commerce/ e-business uses ICT in internet banking,
electronic fund transfer (EFT),mobile banking, on-line marketing
(advertisement), processing customers transaction by handing at
electronic point-of-sale (EPOS) where computer terminal used in
retail stores to input and output data at the point where sales are
transacted e.g. in supermarket checkout counter.
Education
 Initially computers were used for administrative tasks such as
compiling examinational reports, writing memos and
accounting purposes.
 Use of e-learning where lessons and lectures are presented
from a central site and presentation are transmitted to remote
conference terminal displayed on TV screen.
 Others include educational research, computer aided
instructions (CAI), Computer aided learning (CAL) and
computer based simulations.
Health
Health professionals use ICT for diagnosis,
keeping patients’ records, inventory control etc.
Computers are now being used in some health
institutions where more specialized computer
systems referred to as expert systems have been
developed to help medical professionals diagnose
illnesses more accurately in the absence of human
expert.
Security
 ICTis used greatly by law enforcement systems to
carry out criminal investigations and crucial crime
detection by use of biometric analysis of the finger
prints, voice, lips, facial features like iris colors etc.
 some devices used are video CCTV cameras and
biometric scanners. ICT is used in security by
military operations and space exploration science
through the Geographic positioning systems (GPS) to
perform surveillance, enemy position plotting and
directing of missiles to targets in a precise manner.
Politics and governance

Politiciansuse ICT for soliciting of


online votes and sending bulk SMS to
voters. ICT is used in governance for
finance, planning, auditing, and
monitor governments’ activities like
administrative work.
Entertainment, leisure and arts
 The advancement in ICT has promoted the use of
multimedia technology in recreational and
entertainment. Some application areas of the
computer in entertainment, leisure and arts
include:
Playing computer games
Watching movies and listening to audio
Writing or composing music
Used by the disk jockeys (DJs) to play, store and
select music.
Industrial, technical and scientific uses
 Industrial simulation is used to enable the
manufacturers to identify and correct the
weakness of the design and process control.
 ICT is used widely in variety of applications in
science, research and technology. E.g. weather
forecasting, medical research and military and
space exploration sciences.
 In weather forecasting, it is used for weather
predictions which are more accurate and
reliable.
Searching the internet
 Search engines are used to help the user easily
search for information on the internet. Example
of the search engines are; Google, Alta vista,
Excite and Yahoo.
How to search for information on the internet:
Identify and open a search engine;
Enter the keywords in the search text box.
Be precise as possible and click search
From the displayed search result, identify the
site that contains the information you want.
Implication of using ICTs
Social/ethical The rapid growth of information
technology does not only provide us with different
ways of working, playing and thinking but also
presents challenges to our moral and cultural values.
 Information and communication technology has
changed the way we talk, affected our privacy,
human rights and integrity. For example internet
users are exposed to a form of communication called
flaming. Flaming is writing on-line messages that
derogatory, obscene or dirty language.
One can view pornographic materials that
affect moral values negatively. The free flow
of immoral information has negatively
influenced the behavior of both the young
and old in the society.
People with eroded integrity have used
computers as a tool to accomplish their
vices. E.g. where a person would use a
computer to forge certificates, passport and
other documents. This means that the person
is cheating and therefore his/her moral
integrity has been compromised.
Economical: At work places has resulted into
creation of new jobs, replacement of computer
illiterate workers and displacement of jobs
that were formerly manual. However, a
number of manufacturing companies are using
computers to automate their production.
Political: ICT is used for soliciting of online
votes and sending bulk SMS to voters. ICT is
also being used to carry out voters’ registration
and explaining of biometric persons using
fingerprints, palm print, eye iris and voice.
Green Computing
Green computing is the environmentally
responsible and eco-friendly use of
computers and their resources.
OR
It is also defined as the study of
designing/engineering, using and
disposing of computing devices in a way
that reduces their environmental impact.
Some of the environmental effects of ICT
include energy consumption and radiation,
pollution, paper consumption and disposal.
Initially computers consumed a lot of energy
thereby generating a lot of heat and emitting
electromagnetic radiation and this has
implication on environmental pollution.
For example, huge garbage damps of dead
computer parts, printer, ink toner cartridges,
monitor and other computer accessories are
disposed in landfills hence causing
environmental pollution.
Homework

 Writedown 6 advantages and 6 disadvantages of


green computing
Topic 2: Computer
Management
File Management

A folder is a named storage location where


related files can be stored. A folder also known
as directory in some operating systems, all
folders or directories originate from a special
directory called root directory or folder.
The root directory is represented by a back
slash (\). A folder or directory may be created
inside another folder or directory. Such a folder
or directory is in units called a subfolder or a
subdirectory.
File

A file is the common storage unit in a


computer. All programs and data are
“written” into a file and read from a file.
Or
A file is a collection of related data.
Creating a new folder

 To create a new folder:


 Using my computer icon, on the folder tree on the left
pane, select the location (desktop) in which you want
to create a new folder.
 On the File menu tab, Click new folder
 Type a new name for the folder to Replace the
temporary name, then press Enter key or click the
icon once.
 Or Right Click on the free space on the desktop, Point
to New, click folder. Type a new name for the folder
Renaming a folder or file
To rename a file or folder proceed as
follows:
Using My Computer icon, display the
Explorer window.
On the folder tree on the left pane, select
the file or folder to be renamed.
 On the File menu, click Rename.
Type the new name, and then press Enter
key
Deleting a folder or file
 Inwindows, when you delete an item from the
hard disk, it is temporarily held in a special folder
called the Recycle bin from where it can be
restored if necessary.
 The recycle bin is a default icon on the desktop
therefore it cannot be removed.
Warning
 One should not attempt to delete system and
application files from the hard disk.
 Items deleted from a removable storage are not
held in the recycle bin and are completely lost.
Restoring deleted files and folders
To restore a file or folder from the
recycle bin to its original location
proceed as follows:
Double click the Recycle Bin icon.
Select the deleted item(s) to be
restored.
Click File then Restore.
Empting the recycle bin
 Tocompletely discard files and folders you deleted, you
need to empty the Recycle Bin.
 Deleteditems take up the same amount of the disk space
they occupied before you deleted them.
 Tofree up the disk space occupied, you have to empty the
bin. To empty the Recycling Bin proceed as follows:
Double click the recycle Bin icon on the desktop to open.
Choose Empty Recycle Bin from File menu.
Click Yes when prompted to confirm deletion of the
files.
Copying and moving files and folders

 Cut or copy command are used to move or create a duplicate of an


item respectively. When you cut or copy an item, it is temporarily
held in a temporary storage location known as the clipboard.
 To copy a file or folder:
 Using my computer icon, display the Explorer window.
 Select the file or folder to be copied.
 On the Edit (organize) menu, click copy.
 Selectthe drive or folder where you want the item to be
copied.
 From the edit menu, click paste. Information or item is pasted
to a new location.
To move a file or folder proceeds as
follows:
 UsingMy computer icon, display the Explorer
windows.
 On the Edit menu, click Cut.
 Select
the drive or folder where you want the item
moved.
 From the Edit menu, click paste.
 Move progress dialog will be displayed on the screen.
Moving a folder
 To move a folder to a desired location:
 Click the folder and hold
 Drag and drop to the desired location

 Deleting a folder
 To delete a folder
 Right click on the folder, then click delete.
 Or Select the folder, then press the delete (DEL) key on the
keyboard.
File
A file is a collection of related data given a unique name for ease
of access, manipulation and storage on a backing storage.
 Creating a new file
 To create a new text document:
 On the free space on the desktop, right click.
 Point new, click Text Document. From the list available on
application.
 Type a new name for the new file to replace the temporary name
and press Enter key.
 NB: In windows, file name can contain up to 255 characters,
including spaces but, with no special symbols such as \|/:*?”<>.
Types of files

 There are three types of files namely:


 System files
 Application files
 Data files System

 System files: contain information that is critical for the


operation of the computer.
 Application files: holds programs and are executable.
 Data files: contains user specific data.
File extension

 File extension is a group of letters occurring after a period in a


file name, indicating the format of the file.
A unique name and an optional extension. The name and
extension are separated by a period (.) e.g. Jeff.doc.
 In this case, the file name is Jeff and the extension is doc.
 Extension are used to identify the type of a file, for example:
 .doc is a word processor file
 .txt is a plain text file
File path

A path, the general form of the of a


filename or directory, specifies a unique
location in a file system.
A path points to a file system location by
following the directory tree hierarchy
expressed in a string of characters in which
path components are separated by a
delimiting character representing each
directory.
Customizing the Desktop
 Windows lets the user change desktop appearance,
background and resolution. To customize the desktop,
right click the desktop to display properties dialog box
as shown below. Make the appropriate changes by
clicking each tab.
 Theme and background
 To apply a new theme or wallpaper
 Click the theme/background tab.
 Select theme or wallpaper of your choice.
 Click wallpaper when using windows 7,8
Setting the screen saver
 If the screen saver is set, it starts displaying on the screen
if the computer is left idle for a period of time without
interrupting the keyboard or mouse.
 To set a screen saver.
 Click the screen saver tab.
 Selecta screen saver style from the screen saver list. i.e.
3D Text, Blank, Bubbles, Mystify etc.
 Click apply to see the changes.
 ClickOK to close the dialog box. Changes the screen
appearance This will change the appearance of windows
items such as icon size, border colors, highlights etc.
Desktop features
Once a computer is turned on, windows is
loaded into the main memory and finally
the desktop, showing that the computer is
ready for use.
The three main features of the desktop
are;
background
icons
Taskbar.
Background

Background is the workspace area on


the monitor on which icons and
running tasks are placed.
Windows lets the user to customize
the desktop background by applying
favorite themes and wallpapers as
seen above.
Icon

 Anicon is a graphical representation of a software or hardware


component on the screen.
 Icons
are mostly manipulated using a pointing device e.g. the
mouse.
 Some of the common icons on the desktop are;
 My computer
 Recycle bin,
 Internet Explorer
 My documents.
Examples of icons
Taskbar
 This is a bar at the edge of the display of a
graphical user interface that allows quick access
to current or favorite applications.
 Whenever the user starts a program or opens a
file, its button appears on the task bar and stays
there until the user exits the program.
Task Manager
 This is the band where the buttons of currently running task
are displayed.
 You can switch between various tasks by clicking their
respective buttons on the task manager.
 System tray/Notification area:
 Ithas icons of tasks running in the background but are
not displayed on the screen. Examples are, the time and
calendar, an antivirus program, volume control etc.
Utility programs
 Utility
program is a system software designed to help
analyze, configure, optimize or maintain a computer.
Common utility programs
 Search utility
 Search utility is used to locate a file or folder by
name located on any of your hard drives in less than a
second. It is also known as file viewer which looks for
a range of files in a computer.
……

File compression utility


 File compression utility reduces the amount of space on
files or folders they occupy on a drive while compressing
drive decreases the amount of space used by all of the files
and folders stored on that drive.
Disk defragmenter
 Disk defragmenter consolidates files scattered (fragments)
so that each file occupies a single, contiguous space on the
drive. 
……….
Backup utility
 It enables the user to create copies of data and programs (on
separate storage devices) that helps a user to avoid losing
important data and program files in case the storage device or
the computer fails.
 It is a good practice to keep backups away from the computer
room to ensure security of the information in case of a
calamity such as fire.
Antivirus program
 Antivirus program scans, detect, prevent and remove viruses
from the storage and memory.
………
Diagnostic utility
 It compiles technical information about
computer hardware and certain system
software programs.
Screen saver
 It prevents CRT and plasma LCD from burnt
out by blanking the screen. It is used primarily
for entertainment or security.
……………
Disk Cleanup
 Disk cleanup is a computer maintenance utility designed
to free up disk space on a computer's hard drive.
 The utility first searches and analyzes the hard drive for
files that are no longer of any use, and then removes the
unnecessary files.
Disk partitions
 Disk partitions divide drive into multiple logical drives,
each with its own file system which can be mounted by
the operating system and treated as an individual drive.
Antivirus Program
 Anti-virusprogram is a software used to prevent, detect, scan and remove malware,
such as computer viruses from storage devices and memory.
 Examples include:
 Kaspersky,
 Avast
 AVG Anti-virus
 Avira,
 BitDefender
 F-Secure
 Norton Anti-virus,
 McAfee VirusScan,
 Panda security,
 Clam Antiv-virus,
 ESET nod32. etc.
Uses of anti-virus programmes

Real-Time
 Scanning Anti-virus programs provide real-time scanning,
which means the program is always on and checking for
viruses as you perform tasks.
Protection
 Antivirus software can provide real-time protection, meaning
it can prevent unwanted processes from accessing your
computer while you surf the Internet.
Cleanup
 Antivirus software allows you to scan your computer for viruses and other
unwanted programs, and provides you with the tools to get rid of them.
Alerts
 Antivirus programs can alert you when something is trying to access your
computer, or when something in your computer is trying to access
something on the Internet.
Updates
 Antivirus programs can update themselves, keeping your computer's
protection up to date without you having to manually update it.
Further Protection
 If antivirus software finds an infected file that cannot be deleted, it can
quarantine the file so that it cannot infect other files or programs on your
computer.
Print Management

Print management is to produce a printed copy of a document on


a paper.
 To print a document;
 Click file or office button
 Click print. This will bring the print menu
 Select
the printer name i.e. HP Laser jet P1102 series. And
change the necessary details A4 paper size, properties for
advance setting.
 Then click ok
………………
COMPUTER
LABORATORY CARE
AND MAINTENANCE
Booting
 Booting refers to the process of starting a computer
for use. The computer is powered, then it undergoes
power on self-test (POST) and finally the operating
system is loaded.
Types of booting
 There are two types of computer booting namely:
 warm booting
 cold booting.
 Warm booting; refers to the process of restarting a computer
that is currently on.
 Cold booting; refers to starting a computer which initially is off.
The process of cold booting a computer
 The system unit is switched on from the power button then the
monitor.
 The computer goes through power on self-test with the help of
BIOS (Basic Input-Output system).The operating system is then
loaded.
The possible ways of warm booting a computer
 Using the restart / reset button. Press CTRL+ ALT + DEL on the
keyboard
 Using the operating system command
Computer laboratory
A computer laboratory is a room that is specially
designed and prepared to facilitate the installation of
computers and to provide a safe and conducive
environment for using the computers.
Factors to consider when preparing a
computer laboratory

Security of computers, programs and other


resources
Reliability of the power source
The number of computers to be installed and the
available floor space
The maximum number of users that the computer
laboratory can accommodate
Factors to consider when buying
computers
Needs of the organization/volume of
transactions
System specifications like capacity of hard
disks, RAM, processor speeds
Costs of system components and development
Source of system components
Environmental concerns
Available employee skills
Computer literacy

Computer literacy refers to having the


knowledge and understanding of
computers and their uses.

Computer literacy refers to having the


basic understanding of what a
computer is and how it can be used as
a resource.
Computer laboratory rules and regulations
 Avoid smoking and exposing computers to dust since they contain small abrasive
particles that can damage computer components and cause wearing of moving
parts.

 Avoidcarrying food and beverages to the computer room since these may fall
into moving parts causing rusting or electrical faults.

 Avoidunnecessary movements because you may accidentally knock down


peripheral devices.

 Atall times follow the right procedures while starting and shutting down the
computer therefore abrupt switching on and off the computer should be avoided
since this can lead to damaging the computer.
Why must there be safety rules and
precautions in the computer laboratory
To avoid accidental injuries to
the users
To avoid damage of computers
To provide a conducive and
safe environment for computer
use.
 Donot open up the metallic covers of computers or peripherals without permission
and particularly when the computer power is still on.

 Anyrepairs to the computer should be done by someone who has knowledge


regarding computer repairs.

 Anyconnections (keyboard, mouse, printer and monitor) to the computer should


be done when the computer power has been switched off.

 Computers should be regularly serviced and keep a regular record of computer


servicing and repair to establish maintenance costs and common problems to your
computer.

 Guardyour computer against new users who might spoil the computer and data
corruption by unauthorized parties
 Coverthe computers after using them or when not in use.
Let the computers cool down before being covered to avoid
trapping heat.

 The
computers should be cleaned on a regular basis to
remove dust from the keyboard, mouse and other parts.

 Keep computers away from excessive dust and fit special


curtains that would reduce entry of dust particles and
computers should not be exposed to direct sunshine.
Basic requirements for setting up a computer
laboratory
UPS- Uninterruptible Power Supply
 Ifthe power goes off, computer equipment must keep running. Even
home computers need the time to shut down properly. Damage to devices
and data can occur when there is sudden power loss or fluctuation.

 UPS, or Uninterruptible Power Supplies, provide power for devices in


the event of a failure or other electrical problems.
A UPS is essentially a small battery that keeps
the power supply on for long enough for
you to switch off the computer safely
when there is a sudden blackout.
Fire extinguisher
 Fireextinguishers are a critical component of saving
property and lives in the case of a fire emergency.
 Owning a fire extinguisher is a form of ensuring safety.
 All computer rooms need it just in case a fire starts.
 Itcan save our property from burning because the use of
the device will help prevent it from spreading and can
even stop the flame in no time.
Air conditioner

 Airconditioning units monitor and maintain the


temperature, air distribution and humidity in a
computer room.
 An Air conditioning units is a device used for cooling
and controlling the humidity and purity of the air
circulating in a space.
Security camera

 Security cameras act as a deterrent to theft and other


crimes. Cameras monitor data centers or blind spots
outside of doors.
 Blower

Used to blow/remove dust that may


have entered inside the computer

 Antiglare screens
Regulate excess light from monitors
especially CRT monitors.

 Water proof covers


Protect computers from moisture,
water and liquids.
 First aid box
A first aid kit is a box or bag that contains the necessary
items for providing emergency care. It is important to
have first aid kits, because they allow someone who is
injured, to be rapidly treated with basic first aid,
before they can be properly treated at the local
hospital.
 Reasons to keep a first aid kit: Prevent infection,
Prevent excessive blood loss, Prevent scarring,
Prevent an acute injury from becoming a chronic
problem and Prevent death.
 Wool carpet
The wool carpet is used to trap dust that
enters in the computer laboratory.

 Internet gateway
An internet gateway is your modem or router or any other peripheral which allows
you to access the internet.

Burglar proofing
 Burglar proofing provides protection
against any forced physical entry into the
computer laboratory. Burglar proofing
involves fitting metal grills in windows
and doors.
Secure computer laboratory environment

 Protection against fire


Have gaseous fire extinguishers like those filled with carbon
dioxide. Water based or powder extinguishers should be
avoided since they can cause damage to computer
components.
 Computers should not share the same power line with other
office machines to avoid overloading the power units.
Cable insulation
 All
power cables must be properly insulated and laid
away from pathways in the room.
 Lay them along the walls in trunks. This prevents
electric shock and power disconnections caused by
stumbling on cables.
Stable power supply

Protect computers from being damaged and data loss due to


power instabilities by having:
 Uninterruptible power supply (UPS)
 Power stabilizers maintain power at required voltages
A surge protector can be used to protect computer equipment
against under voltage and over voltage.
Burglar proofing

 Consider installing security alarms at strategic access


points that would alert the security personnel in case
of a break-in.
 Fitstrong metallic grills and locks on doors, windows
and strengthen the roof incase the roofing is weak.
 Use Desktop locks, system unit enclosures and laptop
locks.
AIR CIRCULATION

 Have good air circulation in the computer room since


users and computers emit heat energy.
 This is possible through having enough ventilation
points like windows, installing an air conditioning
system.
 Avoid overcrowding of machines and users.
  All the above prevent suffocation and overheating.
 Lighting

A computer laboratory must be well lit with appropriate


wall paints to avoid eye strain, headaches, stress and
fatigue and always fit radiation filter screens to reduce
light that reaches the eyes
 Standard furniture
Have standard furniture so that the tables are wide enough and
strong to bear the weight of the computers and accommodate
all peripherals.
The seat for the user must be comfortable and have a straight
backrest that allows someone to sit upright.
Physical security
 Employ security guards to keep watch over data and information
centers.
 Apply burglar proof for the computer laboratory by reinforcing
weak access points like windows, doors, roofing with metal grills
and strong padlocks.
 Set up alarms to alert you in case of break-ins.
 Use system locks (locked key systems) to make it difficult to
access internal components like hard disks and memory sticks.
 Use cables to lock the equipment to desk, cabinet or floor.
 Electronic locking mechanism with keys, swipe cards, finger print
recognition.
 CCTV Cameras to keep watch over computer systems and centers.
Servicing and maintenance of computer Systems

 It is very important to keep your Computers maintained to


avoid downtime and the safety of your data/information.
 The following are some of the ways to maintain your
computer.
Cleaning of the computers:
 Physical removal of dirt, dust and debris from the interior or
exterior parts of computer peripherals such as keyboard,
mouse, monitor and system unit. This can be done by use of a
clean soft clothing or compressed air to blow out the debris
from the intake slot and fan.
Updating of software
 Provides bug fixes for features not working properly and minor
software enhancements, and sometimes include new drivers to
support printers or DVD drives.
A software update is sometimes called a patch because it is
installed over current software already in use.
 Thishelps to improve performance and safeguard against
malware by updating programs e.g. anti-virus and computer
programs.
 Upgrading software: Is a purchase of a newer version of software
for current use. This helps in replacement of older version to the
current version which supports various compatibility
Software installation
 Installation of a computer program is the act of making
the program ready for execution. Helps in creating more
applications for use and improves the system
performance of the computer with various computer
programs for use.
Fine-tuning the system:
 Fine tuning refers to the circumstance where the
parameter of a model must be adjusted precisely to
agree with the observation. Example adjusting the
screen resolution and appearance.
Importance of Servicing and maintenance
of a computer
 Detects earlier problems that may cause system start-up
errors, hanging applications and warm booting.
 Keeping the computer healthy and running smoothly by
protecting it from viruses, malware, and spyware that can
be difficult to remove and cause computer to run slowly.
 Helps to keep the computer clean from dirt, dust and
debris.
 Helps to keep the computer in a good working condition
that can work for a long time with new upgrades and
updates which will make the computer work fast.
Design this title page and make sure it is very colorful

Computer Hardware
Introduction

Computer Hardware:
Is the physical or tangible components that
make up a computer system. They are
classified into four categories namely;
input devices,
output devices,
storage devices
 processor components (processing devices).
Input devices
 Input devices are hardware components used to provide
data and control signals to a computer. These include;
 Keyboards
 Mouse
 digital cameras
 barcode readers
 Microphones
 Scanners
 touchpad
 Joystick etc.
Keyboard

 This is a keying device that converts typed numbers, letters and


special characters into machine readable form before processing takes
place. The keyboard has many types such as;
 Traditional keyboard
 flexible keyboard
 Ergonomic keyboard
 Ergonomic keyboard is designed to provide comfort and alleviate
wrist strain.
 Braille keyboard.
 Braille keyboard is a keyboard designed for use by the blind.
images

Ergonomic Braille
Mouse

 This is a pointing device used for controlling a pointer


cursor on the screen.
 Mouse has three types these include;
 Standardor traditional mouse using a ball
underneath,
 Optical mouse and cordless mouse that uses
infrared waves or wireless connection to the
system unit.
images
Digital camera

 Digital camera is used capture images and store in a


digital form.
 Pictures are mostly stored on a memory card instead
of a film. The stored images can be edited, printed or
uploaded to the internet.
images
Barcode reader

 Barcode reader is used to capture data coded in lines


of varying thickness known as bar codes or Universal
Product Code (UPC).
 Barcodeshold manufacturer’s details and the product
code but not the price details because prices vary
from one place to another.
Microphone

 Microphone is a voice input device used to enter data


inform of speech into the computer.
 Voice input has limitations in that it does not fully
support speech related aspects such as accents,
inflections and tones.
Scanner

 Scanners: is a device used for capturing data from an


object and converting it into digital format.
 Scanning can be classified according to technology
used to capture data.
 These are optical scanners and magnetic scanners.
Examples include Optical mark recognition (OMR),
optical character recognition (OCR) and Magnetic ink
Character recognition (MICR) scanners.
Optical mark recognition (OMR)

 This device reads hand-drawn marks such as small circles or


rectangles
 A person places these marks on a form, such as a test,
survey, or questionnaire answer sheet.
 The OMR device first reads a master document, such as an
answer key sheet for a test, to record correct answers based
on patterns of light;
 the remaining documents then are passed through the OMR
device and their patterns of light are matched against the
master document.
optical character recognition (OCR)

 Optical character recognition (OCR) is a technology


that involves reading typewritten, computer-printed,
or handwritten characters from ordinary documents
and translating the images into a form that the
computer can understand.
 OCR devices include a small optical scanner for
reading characters and sophisticated software (OCR
software) for analyzing what is read.
Magnetic ink Character recognition (MICR).

A magnetic-ink character recognition (MICR) reader is


used to read text printed with magnetized ink.
 MICR readers are mainly used by the banking industry
for processing cheques
 Each cheques is inserted into an MICR reader, which
sends the check information to a computer for
processing
Touchpad

 Thetouchpad has sensors that sense your touch.


When they sense your touch they send a signal to the
computer to move the mouse pointer (cursor) to that
location on the screen. Common on laptop computers

You might also like