0% found this document useful (0 votes)
2 views

Comp 123 - Notes

The document outlines the curriculum for COMP 123 Computer Applications I, covering topics such as computer hardware, software, data representation, and applications of computers. It emphasizes the importance of understanding computer systems, their history, characteristics, and classifications. Additionally, it discusses the advantages of computer usage in various sectors like education, government, and healthcare.

Uploaded by

Israel Nicodemus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Comp 123 - Notes

The document outlines the curriculum for COMP 123 Computer Applications I, covering topics such as computer hardware, software, data representation, and applications of computers. It emphasizes the importance of understanding computer systems, their history, characteristics, and classifications. Additionally, it discusses the advantages of computer usage in various sectors like education, government, and healthcare.

Uploaded by

Israel Nicodemus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

TABLE OF CONTENTS

COMP 123 COMPUTER APPLICATIONS I

TOPIC 1: INTRODUCTION TO COMPUTERS ........................................................


o Overview
o History of Computers
o Classification of Computers
o Characteristics of Computers
TOPIC 2: COMPUTER HARDWARE .........................................................................
o Introduction
o Computer Components
o Basic Computer Operation
o Computer Organization
TOPIC 3: DATA REPRESENTATION AND NUMBER SYSTEMS ..........................
o Introduction
o Coding Systems
o Number Systems
o Number Systems Conversations & Operations
TOPIC 4: COMPUTER SOFTWARE ............................................................................
o Introduction
o System Software
o Application Software
o Programming Software
TOPIC 5: DATA COMMUNICATION AND NETWORKS........................................
o Introduction
o Communication Channels
o Network Topologies
o Types of Networks
o The Internet
TOPIC 6: APPLICATIONS OF COMPUTER........................................
o Advantage of Computer Studies
o Disadvantages of Internet
o Side effects of prolonged use of Computer
TOPIC 7: INTRODUCTION TO COMPUTER Ms. OFFICE........................................
o Introduction Ms. Office Applications
TOPIC 8: PC ASSEMBLY AND TROUBLESHOOTING........................................
o Introduction to Computer maintenance and repair

COMP 123: Computer Applications I Page 1 of 75


Overview
Today's world is an information-rich world and it has become a necessity for everyone to know
about computers. Purpose of this tutorial is to introduce you about computer systems and its
fundamentals.

The word computer comes from the word “compute” which means, “to calculate.” Thereby, a
computer is an electronic device that can perform arithmetic operations at high speed. A
computer is also called a data processor because it can store, process, and retrieve data
whenever desired. The activity of processing data using a computer is called data processing.

Definition

Computer System is an electronic data processing device, which does the following:

• Accept and store an input data.


• Process the data input.
• And output the processed data in required format.

A computer Is made up of two key components: the hardware and the software. This will be
discussed more in the next topics

Any digital computer carries out five functions in gross terms:

• Takes data as input.


• Stores the data/instructions in its memory and can use them when required.
• Processes the data and converts it into useful information.
• Outputs the information.
• Controls all the above four steps.

Basic computer operation

Characteristics of Computer

COMP 123: Computer Applications I Page 2 of 75


High Speed

• Computer is a very fast device.


• It is capable of performing addition of very big data.
• The computer has units of speed in microsecond, nanosecond and even the picosecond.
• It can perform millions of calculations in a few seconds as compared to man, who can
spend many months for doing the same task.

Accuracy

• In addition to being very fast, computers are very accurate.


• The computer has performed calculations 100% error-free.
• Computers perform all jobs with 100% accuracy.

Storage Capability

• Memory is a very important characteristic of computers.


• The computer has much more storage capacity than human beings.
• It can store large amount of data.
• It can store any type of data such as images, videos, text, audio and any other type.

Diligence

• Unlike human beings, a computer is free from monotony, tiredness and lack of
concentration.
• It can work continuously without creating any error and boredom.
• It can do repeated work with same speed and accuracy.

Versatility

• A computer is a very versatile machine.


• A computer is very flexible in performing the jobs to be done.
• This machine can be used to solve the problems relating to various different fields.
• At one instant, it may be solving a complex scientific problem and the very next moment
it may be playing a card game.

Reliability
• A computer is a reliable machine.
• Modern electronic components have failure-free long lives.
• Computers are designed to make maintenance easy.

COMP 123: Computer Applications I Page 3 of 75


Automation

• Computer is an automatic machine.


• Automation means ability to perform the task automatically.
• Once a program is given to computer, i.e., stored in computer memory, the program and
instructions can control the program execution without human interaction.

Reduction in Paper Work

• The use of computers for data processing in an organization leads to reduction in paper
work and speeds up the process.
• As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of files gets reduced.

Reduction in Cost

• Though the initial investment for installing a computer is high but it substantially reduces
the cost of each of its transaction.

No IQ

• A computer is a machine and has no intelligence of its own to perform any task.
• Each and every instruction has to be given to the computer.
• A computer cannot take any decision on its own.

Dependency

• It can perform function as instructed by user, so it is fully dependent on human

being. Environment

• The operating environment of computer should be dust-free and suitable to it.

No Feeling
• Computer has no feeling or emotions.
• It cannot make judgment based on feeling, taste, experience and knowledge unlike a
human being.

History of Computers

i. First generation computers (1946-1956)

COMP 123: Computer Applications I Page 4 of 75


They made use of vacuum tubes to store and process information. The tubes
consumed a lot of power and generated a lot of heat (overheating). They were huge in
size and occupy a room. They used magnetic tape. Storage capacity was very low i.e.
2kb and speed of processing was also very low. First machine in this category was
ENIAC (electronic discrete variable automatic computer) and later came UNIVAC
(universal automatic computers).

ii. Second generation computers (1957-1967)

These computers used transistors after invention of transistors. The transistor is


smaller cheaper and produced less heat than vacuum tubes and consumed less power.
The cost of computers decreased and the speed increased. The second generation saw
the introduction of more complex ALU and CPU, the use of high level languages and
provision of system software with the computer. Data access time was measured in
micro-seconds. Removable disk storage units were developed for use on these
machines.

iii. Third generation computers (1965-1980)

This introduced the use of very small electronic circuit called integrated circuits (IC)
by combining several transistors together between 3 transistors to make 1 IC. With IC
you can house thousands of transistors in one IC. This change further decreased the
size, heat output and the maintenance complexity of the computers while increasing
its speed. The small circuitry that resulted improved the processing speed i.e. 10
times the past.

iv. Fourth generation computers (1980s)

Use large scale integration circuits which housed hundreds of transistors and very
large IC which are between 200,000 to 400, 000 in one IC. Memory used includes
magnetic disc and optical disc. Memory size expanded up to several MB and speed
was 10 times faster. This generation marked the origin of mini computers in use
today.

v. Fifth generation computers (1990-current)

The design of these computers was based on VLSI (very large scale integration)
technology, the microchip technology that gave rise to the smaller computers known
as the micro computers in use today. These computers are used in networking.
Examples of microcomputers are IBM PCs BBC micro etc. the micro computers are
usually described as PCs or stand alone or desktop computers because they were

COMP 123: Computer Applications I Page 5 of 75


designed primarily to serve single person at a time. The fifth generation is still a state
of the art technology that relies on predictions and further technological refinements.

Research shows that the trend in computer technology revolution is that there is;

Continual decrease in computer size


Improved speed and power processing
Decrease in computers and the related facilities cost
Number of components in computer per circuit (IC) greatly increased over 500,000
physical elements e.g. transistors, capacities, diodes etc per chip(IC).

Classification of Computers

i. By Size

a) Micro-Computers

• Micro –Computers are the Smallest class of Computers


• Micro- Computers have one micro-processor in its Central Processing Unit • Micro-
Processor refers to Central Data Processing Unit of a Micro-Computers
• Micro- Computers can serve one user at ago.
• Micro- Computers are commonly used in modern Offices.

b) Mini- Computers

• Mini- Computers are Medium Sized Computers


• Mini- Computers can serve Two or more users at ago
• Mini- Computers have Two Micro-Processors in its Central Processing Unit
• Mini- Computers can support Telecommunication hence facilitate Sharing of Information
through computers which are Networked together.
• Mini- Computers are commonly in Banks and Super- Markets.

c) Main-frame Computers

• Main-frame Computers used in Large organization


• Main-frame Computers can serve several users at ago
• Main-frame Computers Several Micro-Processors in its Central Processing Unit
• Main – frame Computers can support Telecommunication hence facilitate Sharing of
Information through computers which are Networked together.
• Main – frame Computers are commonly used in Large Organization such as International
Monetary Fund and World Bank, Insurance Companies etc.

COMP 123: Computer Applications I Page 6 of 75


d) Super-Computers

• Super-Computers Computers used in Large organization


• Super-Computers can serve several users at ago
• Super-Computers Uncountable Micro-Processors in its Central Processing Unit
• Super-Computers can support Telecommunication hence facilitate Sharing of Information
through computers which are Networked together.
• Super-Computers are commonly used in Large Organization such as International
Monetary Fund and World Bank, Insurance Companies etc.

ii. By purpose

a) Specific Purpose Computers

Specific Purpose Computers is a Computer Classification that performs a Specific Task at


ago or Time for example Computers designed to calculate wages and Salaries, Control
Stocks of goods etc

b) General Purpose Computers

General Purpose Computers is a Computer Classification that performs a General task at


ago or at a time example Computer that can perform arithmetic and Logical Operations at the
same Time iii.
iii By Technology
a) Analog Computers

Analog Computer use continuous data. The common available Analog Computers are:

1. Car Speedometer - Measures Speed of the Approaching Bodies e.g. Cars


2. Hygrometer - Measures Humidity
3. Wind Anemometer - Measures Speed of the Wind.
4. Thermometer - Measures the Temperatures of a place.
5. Barometer - Measures Atmospheric pressure of a place
6. Voltmeter - Measures Voltage of the Electronic device

b) Digital Computers

Digital Computers a Computer Classification works on discrete/non-continuous data. The


Digital Computers have the capability of adding, subtracting, multiplying, dividing and

COMP 123: Computer Applications I Page 7 of 75


rearranges the data in predefined order they are commonly applied in Scientific and
Engineering World.

c) Hybrid Computer

Hybrid Computer is a Computer Classification by type that performs Arithmetic and


Logical operations and at the same time measures data in waveform.

Application of Computers (Advantages)


i. Schools
• Keep Record of School Fees
• Keep Record of Number of Students in the School
• Keep Record of Number of Parents
• Keep Record of Number of Staff in the School
• Keep Record of Rules and Regulations that govern the Schools.

ii. Government Institution


• Keep Record of Government Stocks of pre-numbered documents e.g. Cheques,
Receipt books
• Keep Record of Government Bills and Statements
• Keep Record Registers for easy retrieval and future reference.
• Keep Records of Government Budgets, which act as a base of planning
• Calculation of Civil Servants Salaries iii. Telecommunication.

• Computers can be Networked to facilitate between Government departments


• Keep Record of Civil Servant, Terms of Service and Terminal Benefits
• Keep Record of Rules and Regulations that govern the Government Institutions.

iv. Police Station


• Keep Record of Criminal Finger Prints in the Society
• Keep Record of Police Force Staff
• Calculation of Staff Salaries
• Telecommunication - Computers can be Networked to facilitate between Police
Force departments
• Keep Record of Police Abstracts
• Keep Record of Rules and Regulations that govern the Police Staff.

v. Weather Station
• Keep Record of Weather and Climatic conditions in the World
• Calculation of Staff Salaries

COMP 123: Computer Applications I Page 8 of 75


• Keep record of Meteorological Station Staff
• Keep Record of Rules and Regulations that govern the Weather Station Staff.

vi. Post Office


• Keep Record of Post Office Staff
• Calculation of Post Office Staff Salaries
• Keep Record of Rental Boxes Customers Names and Dates expired.
• Keep Record of Post bank Account holders, the amount and balances.
• Keep Record of Rules and Regulations that govern the Post Office Staff.

vii. Banks
• Keep Record of Bank Staff • Calculation of Bank Staff Salaries
• Keep Record of Account holders.
• Keep Record of Post bank Account holders, the amount and balances
• Telecommunication - Computers can be networked to facilitate between
communication between the Bank’s Head Office and its Branches.
• Keep Record of Rules and Regulations that govern the Banking Industry

viii. Insurance Company


• Keep Record of Insurance Staff
• Calculation of Insurance Company Staff Salaries
• Keep Record of Policy document and Premiums paid by Clients. To the Insurance Co
• Keep Record of Bonuses paid to the Client by the Insurance Co
• Telecommunication - Computers can be Networked to facilitate between
communication between the Insurance’s Head Office and its Branches country wide
• Keep Record of Rules and Regulations that govern the Insurance Firms

ix. University and Colleges


• Keep Record of University Fees
• Keep Record of Number of Students in the University
• Keep Record of Number of Parents/Guardians
• Keep Record of Admission Numbers of University Students
• Keep Record of Rules and Regulations that govern the University.

x. Industry and commerce


• Maintain Orders and Bills
• Control Stocks
• Manage large Volumes of Financial Transactions, Information and Data
• Ensure the Customers and Supplies demand are fulfilled.

COMP 123: Computer Applications I Page 9 of 75


xi. Hospital
• Keep Record of Medical Staff
• Keep Record of Number of Patients and their Diseases
• Keep Record of Stocks of Drugs, the Amount of Cash in the Bank and the Pre –
Numbered documents.
• Calculation of Wages and Salaries of Medial Staff
• Keep Record of Rules and Regulations that govern the Hospital Staff.

COMPUTER HARDWARE

Basic Computer Operations


A computer as shown in Fig. 2.1 performs basically five major operations or functions
irrespective of their size and make. These are 1) it accepts data or instructions by way of input,
2) it stores data, 3) it can process data as required by the user, 4) it gives results in the form of
output, and 5) it controls all operations inside a computer. We know that a computer is used to
(i) Collect (ii) Organize (iii) Sort and, (iv) transform raw facts into meaningful information form,
which logic conclusions can be drawn.

1. Input: This is the process of entering data and programs in to the computer system. You
should know that computer is an electronic machine like any other machine which takes as
inputs raw data and performs some processing giving out processed data. Therefore, the input
unit takes data from us to the computer in an organized manner for processing.

COMP 123: Computer Applications I Page 10 of 75


2. Storage: The process of saving data and instructions permanently is known as storage.
Data has to be fed into the system before the actual processing starts. It is because the processing
speed of Central Processing Unit (CPU) is so fast that the data has to be provided to CPU with
the same speed. Therefore the data is first stored in the storage unit for faster access and
processing. This storage unit or the primary storage of the computer system is designed to do the
above functionality. It provides space for storing data and instructions.
The storage unit performs the following major functions:

• All data and instructions are stored here before and after processing.
• Intermediate results of processing are also stored here.

3. Processing: The task of performing operations like arithmetic and logical operations is
called processing. The Central Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the instructions given and the type of
data provided. It is then sent back to the storage unit.

4. Output: This is the process of producing results from the data for getting useful
information. Similarly the output produced by the computer after processing must also be kept
somewhere inside the computer before being given to you in human readable form. Again the
output is also stored inside the computer for further processing.

5. Control: The manner how instructions are executed and the above operations are
performed. Controlling of all operations like input, processing and output are performed by
control unit. It takes care of step by step processing of all operations inside the computer.

Computer Components

All types of computers follow a same basic logical structure and perform the following five basic
operations for converting raw input data into information useful to their users
Basic operations for converting raw input data into information
No. Operation Description
1 Take Input The process of entering data and instructions into the computer
system.

2 Store Data Saving data and instructions so that they are available for
processing as and when required.

3 Processing Data Performing arithmetic, logical operations on data in order to


convert them into useful information.

4 Output Information The process of producing useful information or results for the user,
such as a printed report or visual display.

COMP 123: Computer Applications I Page 11 of 75


5 Control the workflow Direct the manner and sequence in which all of the above
operations are performed.

Computer Organization

Input Hardware

This unit contains devices with the help of which we enter data into computer. This unit makes
link between user and computer. The input devices translate the human being information into
the form understandable by computer. An input unit of a computer System performs the
following functions:

i. It accepts (or reads) instruction and data from outside world


ii. It converts thee instruction and data in computer acceptable form
iii. It supplies the converted instruction and data to the computer system for further
processing

Following are few of the important input devices, which are used in Computer Systems:

a) Keyboard

b) Mouse
c) Joystick
d) Light pen
e) Track Ball
f) Scanner

COMP 123: Computer Applications I Page 12 of 75


g) Graphic Tablet
h) Microphone
i) Magnetic Ink Card Reader (MICR)
j) Optical Character Reader (OCR)
k) Bar Code Reader
l) Optical Mark Reader

Keyboard

Most common and very popular input device is keyboard. The keyboard helps in inputting the
data to the computer. The layout of the keyboard is like that of traditional typewriter, although
there are some additional keys provided for performing some additional functions.

Keyboards are of two sizes 84 keys or 101/102 keys, but now 104 keys or 108 keys keyboard is
also available for Windows and Internet.

The keys are following

No. Keys Description


1 Typing Keys These keys include the letter keys (A-Z) and digits keys (0-9) which
generally give same layout as that of typewriters.

2 Numeric Keypad It is used to enter numeric data or cursor movement. Generally, it


consists of a set of 17 keys that are laid out in the same configuration
used by most adding machine and calculators.

3 Function Keys The twelve functions keys are present on the keyboard. These are
arranged in a row along the top of the keyboard. Each function key has
unique meaning and is used for some specific purpose.

4 Control keys These keys provide cursor and screen control. It includes four directional
arrow key. Control keys also include Home, End, Insert, Delete, Page
Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc).

5 Special Purpose Keys Keyboard also contains some special purpose keys such as Enter, Shift,
Caps Lock, Num Lock, Space bar, Tab, and Print Screen.

Computer Keyboard

COMP 123: Computer Applications I Page 13 of 75


Mouse

Mouse is most popular Pointing device. It is a very famous cursor-control device. It is a small
palm size box with a round ball at its base which senses the movement of mouse and sends
corresponding signals to CPU on pressing the buttons.

Generally, it has two buttons called left and right button and scroll bar is present at the mid.
Mouse can be used to control the position of cursor on screen, but it cannot be used to enter
text into the computer. Advantages

• Easy to use
• Not very expensive
• Moves the cursor faster than the arrow keys of keyboard.

Mouse

Joystick

Joystick is also a pointing device, which is used to move cursor position on a monitor screen. It
is a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves
in a socket. The joystick can be moved in all four directions. The function of joystick is similar
to that of a mouse. It is mainly used in Computer Aided Designing (CAD) and playing computer
games. Commonly used for video games, flight simulators, training simulators, and for
controlling industrial robots

Joystick

COMP 123: Computer Applications I Page 14 of 75


Light Pen

Light pen is a pointing device, which is similar to a pen. It is used to select a displayed menu
item or draw pictures on the monitor screen. It consists of a photocell and an optical system
placed in a small tube.

When light pen's tip is moved over the monitor screen and pen button is pressed, its photocell
sensing element, detects the screen location and sends the corresponding signal to the CPU.

Light Pen

Track Ball

Track ball is an input device that is mostly used in notebook or laptop computer, instead of a
mouse. This is a ball, which is half inserted and by moving fingers on ball, pointer can be
moved.

Since the whole device is not moved, a track ball requires less space than a mouse. A track ball
comes in various shapes like a ball, a button and a square.

Scanner

Scanner is an input device, which works more like a photocopy machine. It is used when some
information is available on a paper and it is to be transferred to the hard disc of the computer for
further manipulation.

Scanner captures images from the source which are then converted into the digital form that can
be stored on the disc. These images can be edited before they are printed.

Scanner

COMP 123: Computer Applications I Page 15 of 75


Digitizer

Digitizer is an input device, which converts analog information into a digital form. Digitizer can
convert a signal from the television camera into a series of numbers that could be stored in a
computer. They can be used by the computer to create a picture of whatever the camera had been
pointed at.

Digitizer is also known as Tablet or Graphics Tablet because it converts graphics and pictorial
data into binary inputs. A graphic tablet as digitizer is used for doing fine works of drawing and
images manipulation applications.

Digitizer

Microphone

Microphone is an input device to input sound that is then stored in digital form. The microphone
is used for various applications like adding sound to a multimedia presentation or for mixing
music.

Magnetic Ink Card Reader (MICR)

MICR input device is generally used in banks because of the large number of cheques to be
processed daily. The bank's code number and cheque number are printed on the cheques with a
special type of ink that contains particles of magnetic material that are machine readable.
This reading process is called Magnetic Ink Character Recognition (MICR). The main advantage
of MICR is that it is fast and less error prone.

COMP 123: Computer Applications I Page 16 of 75


Magnetic Ink Card Reader (MICR)

MICR Character Set

Optical Character Reader (OCR)

OCR is an input device used to read a printed text. OCR scans text optically character by
character, converts them into a machine readable code and stores the text on the system memory.

Bar Code Readers

Bar Code Reader is a device used for reading bar coded data (data in form of light and dark
lines). Bar coded data is generally used in labeling goods, numbering the books, etc. It may be a
hand-held scanner or may be embedded in a stationary scanner.

Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which is then
fed to the computer to which bar code reader is connected.

COMP 123: Computer Applications I Page 17 of 75


Optical Mark Reader (OMR)

OMR is a special type of optical scanner used to recognize the type of mark made by pen or
pencil. It is used where one out of a few alternatives is to be selected and marked. It is specially
used for checking the answer sheets of examinations having multiple choice questions.

In summary: the various input devices can be classified as: keying devices, pointing devices,
stylus, voice-recognition devices, and scanning devices

Processing Hardware

This unit controls the operations of all parts of computer. It does not carry out any actual data
processing operations.

Functions of this unit are:


It is responsible for controlling the transfer of data and instructions among other units of
a computer.
• It manages and coordinates all the units of the computer.
• It obtains the instructions from the memory, interprets them and directs the operation of
the computer.
• It communicates with input/output devices for transfer of data or results from storage.
• It does not process or store data.

CPU is considered as the brain of the computer. CPU performs all types of data processing
operations. It stores data, intermediate results and instructions (program). It controls the
operations of all parts of computer

COMP 123: Computer Applications I Page 18 of 75


CPU itself has the following three components

• ALU (Arithmetic Logic Unit)


• Memory Unit
• Control Unit

CPU is considered as the brain of the computer. CPU


performs all types of data processing operations. It stores
data, intermediate result and instructions (program). It
controls the operations of all parts of computer.

Interconnecting the Units of a Computer

CPU sends data, instructions and information to the components inside the computer as well as to the
peripherals and devices attached to it. Bus is a set of electronic signal pathways that allows information
and signals to travel between components inside or outside of a computer. The different components of
computer, i.e., CPU, I/O unit, and memory unit are connected with each other by a bus. The data,
instructions and the signals are carried between the different components via a bus. The features and
functionality of a bus are as follows—

• A bus is a set of wires used for interconnection, where each wire can carry one bit of data.
• A bus width is defined by the number of wires in the bus.
• A computer bus can be divided into two types—Internal Bus and External Bus.
The Internal Bus connects components inside the motherboard like, CPU and system memory. It
is also called the System Bus. Figure 2.10 shows interaction between processor and memory.
Interaction between processor and memory.

The External Bus connects the different external devices, peripherals, expansion slots, I/O ports and drive
connections to the rest of computer. The external bus allows various devices to be attached to the
computer. It allows for the expansion of computer’s capabilities. It is generally slower than the system
bus. It is also referred to as the Expansion Bus.

A system bus or expansion bus comprise of three kinds of buses - data bus, address bus and control bus.

COMP 123: Computer Applications I Page 19 of 75


The interaction of CPU with memory and I/O devices involves all the three buses.

• The command to access the memory or the I/O device is carried by the control bus.
• The address of I/O device or memory is carried by the address bus.
• The data to be transferred is carried by the data bus.

Output hardware

Output unit consists of devices with the help of which we get the information from computer.
This unit is a link between computer and users. Output devices translate the computer's output
into the form understandable by users. An output unit of a computer System performs the
following functions:

• It accepts the results produced by the computer, which are in coded form and hence,
cannot be easily understood by human beings
• It converts theses coded results to human acceptable (readable) form
• It supplies the converted results to outside world

There are two forms of output:

a) Hardcopy – tangible or touchable output usually in printed form


b) Softcopy output- intangible usually presented as visual or audio form

Following are few of the important output devices, which are used in Computer Systems:
Monitors
• Graphic Plotter
• Printer

Monitors

Monitor commonly called as Visual Display Unit (VDU) is the main output device of a computer. It
forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the
image depends upon the number of the pixels.

There are two kinds of viewing screen used for monitors:

• Cathode-Ray Tube (CRT)


• Flat-Panel Display

a) Cathode-Ray Tube (CRT) Monitor

In the CRT, display is made up of small picture elements called pixels for short. The smaller the pixels,
the better the image clarity or resolution. It takes more than one illuminated pixel to form whole
character, such as the letter 'e' in the word help.

COMP 123: Computer Applications I Page 20 of 75


A finite number of characters can be displayed on a screen at once. The screen can be divided into a series
of character boxes - fixed location on the screen where a standard character can be placed.

Most screens are capable of displaying 80 characters of data horizontally and 25 lines vertically. There
are some disadvantages of CRT:

• Large in Size
• High power consumption

• Cathode-Ray Tube (CRT) Monitor

Flat-Panel Display Monitor

The flat-panel display refers to a class of video devices that have reduced volume, weight and power
requirement compared to the CRT. You can hang them on walls or wear them on your wrists. Current
uses for flat-panel displays include calculators, video games, monitors, laptop computer, graphics display.

The flat-panel display is divided into two categories:

• Emissive Displays - The emissive displays are devices that convert electrical energy into light.
Examples are plasma panel and LED (Light-Emitting Diodes).
• Non-Emissive Displays - The Non-emissive displays use optical effects to convert sunlight or
light from some other source into graphics patterns. Example is LCD (Liquid-Crystal Device)
Flat-Panel Display Monitor

Printer

Printer is the most important output device, which is used to print information on paper.

There are two types of printers:

COMP 123: Computer Applications I Page 21 of 75


• Impact Printers •
Non-Impact Printers

a) Impact Printers

The printers that print the characters by striking against the ribbon and onto the paper, are called
impact printers.

Characteristics of Impact Printers are the following:


• Very low consumable costs
• Impact printers are very noisy
• Useful for bulk printing due to low cost
• There is physical contact with the paper to produce an image

These printers are of two types:


• Character printers
• Line printers

i. Character Printers

Character Printers are printers, which print one character at a time.

These are of further two types:

Dot Matrix Printer (DMP) and Daisy Wheel


Dot Matrix Printer

In the market, one of the most popular printers is Dot Matrix Printer because of their ease of printing
features and economical price. Each character printed is in form of pattern of Dot's and head consists of a
Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which comes out to form a character that is why it is called
Dot Matrix Printer.

Advantages
• Inexpensive
• Widely Used
• Other language characters can be printed
Disadvantages
• Slow Speed
• Poor Quality
Dot-Matrix Printer

COMP 123: Computer Applications I Page 22 of 75


Daisy Wheel

Head is lying on a wheel and Pins corresponding to characters are like petals of Daisy (flower name) that
is why it is called Daisy Wheel Printer. These printers are generally used for word-processing in offices
which require a few letters to be sent here and there with very nice quality representation.

Advantages
• More reliable than DMP's
• Better quality
• The fonts of character can be easily changed.
Disadvantages
• Slower than DMP's
• Noisy
 More expensive than DMP's
Daisy Wheel

ii. Line Printers

Line printers are printers, which print one line at a time.

These are of further two types:

Drum Printer

COMP 123: Computer Applications I Page 23 of 75


Chain Printer
Drum Printer

This printer is like a drum in shape so it called drum printer. The surface of drum is divided into number
of tracks. Total tracks are equal to size of paper, i.e., for a paper width of 132 characters, Drum will have
132 tracks. A character set is embossed on track. The different character sets available in market are 48
character set, 64 and 96 characters set. One rotation of drum prints one line. Drum Printers are fast in
speed and prints between 300 to 2000 lines per minute.

Advantages
• Very high speed
Disadvantages
• Very expensive
• Characters fonts cannot be changed

Chain Printer

In this printer, chains of character sets are used so it called Chain Printers. A standard character
set may have 48, 64, 96 characters.

Advantages
• Character fonts can easily be changed.
• Different languages can be used with the same printer.
Disadvantages
• Noisy
• Do not have the ability to print any shape of characters.

b) Non-impact Printers

The printers that print the characters without striking against the ribbon and onto the paper are
called Non-impact Printers. These printers print a complete page at a time, also called as Page
Printers.

These printers are of two types:


• Laser Printers
• Inkjet Printers
Characteristics of Non-impact Printers:
• Faster than impact printers.
• They are not noisy.
• High quality.
• Support many fonts and different character size.

COMP 123: Computer Applications I Page 24 of 75


i. Laser Printers

These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.

Advantages
• Very high speed.
• Very high quality output.
• Gives good graphics quality.
• Supports many fonts and different character sizes.

Disadvantage
• Expensive.
• Cannot be used to produce multiple copies of a document in a single printing.

ii. Inkjet Printers

Inkjet printers are non-impact character printers based on a relatively new technology. They print
characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output
with presentable features.

They make less noise because no hammering is done and these have many styles of printing
modes available. Color printing is also possible. Some models of Inkjet printers can produce
multiple copies of printing also.

Advantages
• High quality printing
• More reliable
Disadvantages
• Expensive as cost per page is high
• Slow as compared to laser printer
Ink Jet Printer

COMP 123: Computer Applications I Page 25 of 75


Storage hardware

Computer memory is used to store data and instructions. Computer memory is the storage space
in computer where data is to be processed and instructions required for processing are stored.
The memory is divided into large number of small parts. Each part is called cell. Each location
or cell has a unique address, which varies from zero to memory size minus one. For example, if
computer has 64k words, and then this memory unit has 64 * 1024=65536 memory location. The
address of these locations varies from 0 to 65535.

The storage Unit of a computer system holds (or stores) the following:
i. Data and instruction required for processing (received from input devices)
ii. Intermediate result of processing
iii. Final result of processing, before they are released to an output device
Types of Memory
• Cache Memory
• Primary Memory/Main Memory
• Secondary Memory

a) Cache Memory

Cache memory is a very high speed semiconductor memory, which can speed up CPU. It acts as
a buffer between the CPU and main memory.

It is used to hold those parts of data and program which are most frequently used by CPU. The
parts of data and programs are transferred from disk to cache memory by operating system, from
where CPU can access them.

Advantage
• Cache memory is faster than main memory.
• It consumes less access time as compared to main memory.
• It stores the program that can be executed within a short period of time.
• It stores data for temporary use.

Disadvantage
• Cache memory has limited capacity.
• It is very expensive.
b) Primary
Memory (Main Memory)

COMP 123: Computer Applications I Page 26 of 75


Primary memory holds only those data and instructions on which computer is currently working.
It has limited capacity and data gets lost when power is switched off.

It is generally made up of semiconductor device. These memories are not as fast as registers. The
data and instructions required to be processed earlier reside in main memory. It is divided into
two subcategories RAM and ROM.

Characteristic of Main Memory


• These are semiconductor memories.
• It is known as main memory.
• Usually volatile memory.
• Data is lost in case power is switched off.
• It is working memory of the computer.
• Faster than secondary memories.
• Relatively expensive
• A computer cannot run without primary memory (Used to hold running program
instructions, used to hold data, intermediate results, and results of ongoing processing
job(s))

Computer RAM

A RAM constitutes the internal memory of the CPU for storing data, program and program
result. It is read/write memory. It is called random access memory (RAM).

Since access time in RAM is independent of the


address to the word that is, each storage location inside
the memory is as easy to reach as other location & takes
the same amount of time. We can reach into the memory
at random & extremely fast but can also be quite
expensive.

RAM is volatile, i.e., data stored in it is lost when we


switch off the computer or if there is a power failure.

Hence, a backup uninterruptible power system (UPS) is often used with computers. RAM is
small, both in terms of its physical size and in the amount of data it can hold.

RAM is of two types:


• Static RAM (SRAM)
• Dynamic RAM (DRAM)
i. Static RAM (SRAM)

COMP 123: Computer Applications I Page 27 of 75


The word static indicates that the memory retains its contents as long as power remains applied.
However, data is lost when the power gets down due to volatile nature. SRAM chips use a
matrix of 6-transistors and no capacitors. Transistors do not require power to prevent leakage, so
SRAM need not have to be refreshed on a regular basis.

Because of the extra space in the matrix, SRAM uses more chips than DRAM for the same
amount of storage space, thus making the manufacturing costs higher.

Static RAM is used as cache memory needs to be very fast and small.

Characteristics of the Static RAM:


• It has long data lifetime
• There is no need to refresh
• Faster
• Used as cache memory
• Large size
• Expensive
• High power consumption

ii. Dynamic RAM (DRAM)

DRAM, unlike SRAM, must be continually refreshed in order for it to maintain the data. This is
done by placing the memory on a refresh circuit that rewrites the data several hundred times per
second. DRAM is used for most system memory because it is cheap and small. All DRAMs are
made up of memory cells. These cells are composed of one capacitor and one transistor.

Characteristics of the Dynamic RAM:


• It has short data lifetime
• Need to refresh continuously
• Slower as compared to SRAM
• Used as RAM
• Lesser in size
• Less expensive
• Less power consumption

Computer - ROM

ROM stands for Read Only Memory. The memory from which we can only read but cannot
write on it. This type of memory is non-volatile. The information is stored permanently in such
memories during manufacture. A ROM stores such
instructions as are required to start computer when

COMP 123: Computer Applications I Page 28 of 75


electricity is first turned on, this operation is referred to as bootstrap. ROM chip are not only
used in the computer but also in other electronic items like washing machine and microwave
oven.

Types of ROM

i. MROM (Masked ROM)

The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kinds of ROMs are known as masked ROMs. It is inexpensive ROM.

ii. PROM (Programmable Read only Memory)


PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM programmer. Inside the PROM chip, there
are small fuses, which are burnt open during programming. It can be programmed only once and
is not erasable.

iii. EPROM (Erasable and Programmable Read Only Memory)

The EPROM can be erased by exposing it to ultra-violet light for duration of up to 40 minutes.
Usually, an EPROM eraser achieves this function. During programming, an electrical charge is
trapped in an insulated gate region. The charge is retained for more than ten years because the
charge has no leakage path. For erasing this charge, ultra-violet light is passed through a quartz
crystal window (lid). This exposure to ultra-violet light dissipates the charge. During normal use
the quartz lid is sealed with a sticker.

iv. EEPROM (Electrically Erasable and Programmable Read Only Memory)

The EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased
one byte at a time, rather than erasing the entire chip. Hence, the process of re-programming is
flexible but slow.

Advantages of ROM
• Non-volatile in nature
• These cannot be accidentally changed
• Cheaper than RAMs
• Easy to test
• More Reliable than RAMs
• These are static and do not require refreshing

COMP 123: Computer Applications I Page 29 of 75


c) Secondary Memory

This type of memory is also known as external memory or non-volatile. It is slower than main
memory. These are used for storing Data/Information permanently. There are several limitations
with primary storage:

- Limited capacity because the cost per bit of storage is high


- Volatile- data stored is lost is lost when electric power is turned off or interrupted

CPU directly does not access these memories; instead they are accessed via input-output
routines. Contents of secondary memories are first transferred to main memory and then CPU
can access it. For example, disk, CD-ROM, DVD, etc.
Characteristics of Secondary Memory

• These are magnetic and optical memories.


• It is known as backup memory.
• It is non-volatile memory.
• Data is permanently stored even if power is switched off.
• It is used for storage of the data in the computer.
• Cheaper than primary storage
• Computer may run without secondary memory.
• Slower than primary memories.

DATA REPRESENTATION AND NUMBER SYSTEMS

Coding Schemes

Basic Concepts

To understand how a bit pattern can convey information, consider someone who wants to give a signal (or
send a code) to another person, but has only a single light bulb at his disposal. How many different
messages (codes) can he send? Two, one for light ON and the other for light OFF. What if he had two
bulbs? At first thought one might say he can now send three signals corresponding to:

1. both OFF;
2. both ON;
3. One ON.

This would be fine if he only wanted to send three signals. But what if he wanted to send four signals?
Would he need another bulb? The answer is no, he can send four signals with two light bulbs, but the
sender and receiver (of the signals) would have to come to an agreement concerning case (3), above; that

COMP 123: Computer Applications I Page 30 of 75


is, when one light is ON, it must be distinguished from the case where the other light is ON. For instance,
if the bulbs are A and B, then ‘A ON’ and ‘B OFF’ is a different code to ‘A OFF’ and ‘B ON’.

Bits, Bytes and Nibbles

4 bits = 1 nibble

8 bits = 1 byte

2 bytes = 1 word

2 words = 1 long word

1 kilobyte = 210 bytes = 1024 bytes

1 megabyte = 220 bytes = 1024 kb

1 gigabyte = 230 bytes = 1024 MB

1 terabyte = 240 bytes = 1024 GB

Binary Coding Schemes

The two main coding schemes use by computers to represent data are ASCII and EBCDIC:

a) ASCII: American Standard Code for Information Interchange


• Uses 7 bits to represent a character
• Created by the USA government for use in micro and mini computers

The ASCII code provides a mechanism for encoding alphabetic characters, numeric digits, and
punctuation marks for use in representing text and numbers written using the Roman alphabet. As
originally designed, it was a seven bit code. The seven bits allow the representation of 128 unique
characters. All of the alphabet, numeric digits and Standard English punctuation marks are encoded. The
ASCII standard was later extended to an eight bit code (which allows 256 unique code patterns) and
various additional symbols were added, including characters with diacritical marks (such as accents) used
in European languages, which don’t appear in English. There are also numerous non-standard extensions
to ASCII giving different encoding for the upper 128 character codes than the standard. For example, the
character set encoded into the display card for the original IBM PC had a non-standard encoding for the
upper character set. This is a non-standard extension that is in very wide spread use, and could be
considered a standard in itself.

Some important things to note about ASCII code:

COMP 123: Computer Applications I Page 31 of 75


i. The numeric digits, 0-9, are encoded in sequence starting at 30h
ii. The upper case alphabetic characters are sequential beginning at 41h
iii.The lower case alphabetic characters are sequential beginning at 61h iv. The first 32 characters
(codes 0-1Fh) and 7Fh are control characters. They do not have a standard symbol (glyph)
associated with them. They are used for carriage control, and protocol purposes. They include
0Dh (CR or carriage return), 0Ah (LF or line feed), 0Ch (FF or form feed), 08h (BS or
backspace).
v. Most keyboards generate the control characters by holding down a control key (CTRL) and
simultaneously pressing an alphabetic character key. The control code will have the same value
as the lower five bits of the alphabetic key pressed. So, for example, the control character 0Dh is
carriage return. It can be generated by pressing CTRL-M. To get the full 32 control characters a
few at the upper end of the range are generated by pressing CTRL and a punctuation key in
combination. For example, the ESC(escape) character is generated by pressing CTRL-[ (left
square bracket)

b) EBCDIC: Extended Binary Coded Decimal Interchange Code


• Uses 8 bits to represent a character
• Created by International Business Machines (IBM) for use in super and mainframe
computers.

Bits in coding scheme Possible combination of 1s and 0s Size of character set


2 1,01,10,00 22 characters can be represented
3 111,110,100,001,011,101,010,000 23 characters can be represented
. … …
. … …
ASCII (7) … 27 characters can be represented
EBCDIC (8) … 28 characters can be represented

COMP 123: Computer Applications I Page 32 of 75


The coding schemes use by the computer determines the character set of the computer and the ability of
the computer to display graphics and other information. The table above illustrates the character set
depending on the amount of bits in the coding scheme. The ASCII coding scheme can represent 27 or 128
different characters. This includes all the letters of the alphabet, lower and upper case, the digit, special
symbols and other graphics and control characters.

Other Schemes that can be discussed include: UNICODE

UNICODE:- provides a systematic way of coding multilingual plain text; Defines codes for special
characters, mathematical symbols, technical symbols, and diacritics; uses 16-bits to represent characters
in the system; has capacity to encode/ represent as many millions of characters as possible
3.2.4 Number Systems

There are two types of number system: Non-Positional number system and Positional number
system
a) Non-Positional Number system
• Uses symbols such as I for 1, II for 2, III for 3 etc.
• Each symbol represents the same value regardless of its position in the number
• The symbols are simply added to find out the value of particular number Problem
It is difficult to perform arithmetic with such a number system.
b) Positional Number system
a) Uses only few symbols called digits
b) These symbols represent different values depending on he position they occupy in the
number
c) The value of each digit is determined by:
The digit itself
The position of the digit in the number
The base of the number system
(Base -> total number of digits in the number system.)
d) The maximum value of a single digit is always equal to one less than the value of the
base
A number system defines a set of values used to represent quantity. Computer uses the binary
system. There many number systems used but of concern to computer professionals are
• Decimal number system
• Binary number system
• Octal number system
• Hexadecimal number system
All the above number systems use the same kind of positional notation except that
• Decimal system uses powers of 10
• Octal system uses powers of 8
• Binary system uses powers of 2
• Hexadecimal uses powers of 16
COMP 123: Computer Applications I Page 33 of 75
Binary Numbers and Algebra
Digital computers use Binary Place Notion to store and represent values. The binary digit 0 and 1
only, are used in binary strings. A binary string is a sequence of two or more bits. Similar to the
decimal system makes use of the position of each bit to determine the value represented by the
binary number.

Addition of binary number

0 + 0 = 0
1 + 0 = 1
0 + 1 = 1
1 + 1 = 0 carry 1
1 + 1 + 1 = 1 carry 1

Characteristics of Binary System

i. Uses two digits, 0 and 1.


ii. Also called base 2 number system.
iii. Each position in a binary number represents a 0 power of the base (2). Example, 20.
iv. Last position in a binary number represents a x power of the base (2). Example, 2 x where
x represents the last position - 1.

Example
Binary Number: 101012

Calculating Decimal Equivalent:

Step Binary Number Decimal Number


Step 4 3 2 1 0
10101
1 2 ((1 x 2 ) + (0 x 2 ) + (1 x 2 ) + (0 x 2 ) + (1 x 2 ))10

Step
10101
2 2 (16 + 0 + 4 + 0 + 1)10

Step
10101
3 2 2110

Note: 101012 is normally written as 10101.

COMP 123: Computer Applications I Page 34 of 75


Converting a –ve decimal number to binary using sign & magnitude method

1. Convert the decimal number to its binary value, ignoring the negative sign.
2. Extend the bits to the appropriate length (i.e. one less than the size of the bit-string), by
attaching 0s to the leftmost part of the bit string.
3. Attach a 1 to the leftmost part of the bit string. The 1 is the sign bit it indicates that the
number is negative. Alternatively, a 0 indicates that the number is positive.

Convert a sign & magnitude number to its decimal equivalent

1. Convert the binary number to its decimal value ignoring the leftmost it in your
calculations.
2. If the leftmost bit is a 1 then the number is negative otherwise it is positive.

Ones Complement

To convert a binary number to its ones complement representation you change all the ones (1) to zeroes
(0) and the zeroes (0) to one (1)

Twos Complement

The twos complement of a binary number is formed by finding its ones complement and adding a one.

Converting a Negative decimal number to binary using the Twos Complement

1. Convert the number to its binary value ignoring the sign


2. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string
3. Find the ones complement
4. Find the twos complement
5. Attach a 1 to the leftmost part of the bit string. The 1 is the sign it indicates that
the number is negative

Converting a Positive decimal number to binary using the Twos Complement

To convert a positive binary number to its twos complement representation, we execute the following
steps:

1. Extend the bit string to the appropriate length (i.e. one less than the size of the
bit-string), by attaching 0s to the leftmost part of the bit string.
2. Attach a 0 to the leftmost part of the bit string, the 0 indicates that the binary
number is positive

COMP 123: Computer Applications I Page 35 of 75


Converting a binary Twos Complement number to its decimal equivalent

Convert the binary number to its decimal equivalent, making the leftmost bit (the sign bit) binary
place value negative.

Binary Coded Decimal (BCD)

An alternative representation of integers is simply to represent the individual numerals which comprise
them. This approach is consistent with the way in which we represent numbers ourselves. When we write
the number 879, we are choosing to represent this number as three numerals: 8 (representing 800), 7
(representing 70), and 9 (representing 9). So, we could convert this number to a binary form by
converting each of the integers, one at a time, into binary a binary code. Such a scheme is referred to as
binary coded decimal form, or BCD. The BCD codes commonly used to represent numerals are:

Numeral BCD Representation


0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
Using this scheme, we can represent any number by a string of binary digits.

Decimal Number System

The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the
successive positions to the left of the decimal point represent units, tens, hundreds, thousands
and so on.

Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
and 1 in the thousands position, and its value can be written as

(1x1000)+ (2x100) + (3x10)+ (4xl)

(1x103)+ (2x102) + (3x101)+ (4xl00)


1000 + 200 + 30 + 4

COMP 123: Computer Applications I Page 36 of 75


1234

As a computer programmer or an IT professional, you should understand the following number


systems, which are frequently used in computers.
S.N. Number System & Description
1 Binary Number System
Base 2. Digits used: 0, 1
2 Octal Number System
Base 8. Digits used: 0 to 7
4 Hexa Decimal Number System
Base 16. Digits used: 0 to 9, Letters used: A- F

Octal Number System

Characteristics
• Uses eight digits: 0, 1, 2, 3, 4, 5, 6, 7.
• Also called base 8 number system
• Each position in a octal number represents a 0 power of the base (8). Example, 80.
• Last position in a octal number represents a x power of the base (8). Example, 8x where x
represents the last position - 1.
Example
Octal Number: 125708

Calculating Decimal Equivalent:

Step Octal Number Decimal Number

Step 4 3 2 1 0
12570
1 8 ((1 x 8 ) + (2 x 8 ) + (5 x 8 ) + (7 x 8 ) + (0 x 8 ))10

Step
12570
2 8 (4096 + 1024 + 320 + 56 + 0)10

Step
12570
3 8 549610

Note: 125708 is normally written as 12570

COMP 123: Computer Applications I Page 37 of 75


Hexadecimal Number System
Characteristics
• Uses 10 digits and 6 letters: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
• Letters represent numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F =
15.
• Also called base 16 number system
• Each position in a hexadecimal number represents a 0 power of the base (16). Example,
160.
•Last position in a hexadecimal number represents a x power of the base (16). Example,
16x where x represents the last position - 1.
Example

Hexadecimal Number: 19FDE16

Calculating Decimal Equivalent:

Step Binary Number Decimal Number

Step 1 19FDE16 ((1 x 164 ) + (9 x 163 ) + (F x 162 ) + (D x 161 ) + (E x 160 ))10


Step 2 19FDE16 ((1 x 164 ) + (9 x 163 ) + (15 x 162) + (13 x 161 ) + (14 x 160 ))10
Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
Step 4 19FDE16 = 10646210
Note: 19FDE16 is normally written as 19FDE.

Computer - Number Conversion

There are many methods or techniques, which can be used to convert numbers from one base to
another. We'll demonstrate here the following:

• Decimal to Other Base System


• Other Base System to Decimal
• Other Base System to Non-Decimal
• Shortcut method - Binary to Octal
• Shortcut method - Octal to Binary

COMP 123: Computer Applications I Page 38 of 75


• Shortcut method - Binary to Hexadecimal
• Shortcut method - Hexadecimal to Binary

Decimal to Other Base System

Steps
i. Step 1 - Divide the decimal number to be converted by the value of the new base.
ii. Step 2 - Get the remainder from Step 1 as the rightmost digit (least significant digit) of
new base number.
iii. Step 3 - Divide the quotient of the previous divide by the new base.
iv. Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base
number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3.

The last remainder thus obtained will be the most significant digit (MSD) of the new base
number.

Example

Decimal Number: 2910

Calculating Binary Equivalent:

Step Operation Result Remainder


Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7 / 2 3 1
Step 4 3 / 2 1 1
Step 5 1 / 2 0 1

As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that
the first remainder becomes the least significant digit (LSD) and the last remainder becomes the
most significant digit (MSD).

Decimal Number: 2910 = Binary Number: 111012.

Other base system to Decimal System


Steps
COMP 123: Computer Applications I Page 39 of 75
i. Step 1 - Determine the column (positional) value of each digit (this depends on the
position of the digit and the base of the number system).
ii. Step 2 - Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
iii. Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in
decimal.

Example

Binary Number: 111012


Calculating Decimal Equivalent:
Step Binary Number Decimal Number

Step 1 111012 ((1 x 2 4) + (1 x 23) + (1 x 22 ) + (0 x 21 ) + (1 x 20 )) 10

Step 2 111012 (16 + 8 + 4 + 0 + 1)10


Step 3 111012 2910

Binary Number: 111012 = Decimal Number: 2910

Other Base System to Non-Decimal System

i. Step 1 - Convert the original number to a decimal number (base 10).


ii. Step 2 - Convert the decimal number so obtained to the new base number.
Example
Octal Number: 258
Calculating Binary Equivalent:
Step 1: Convert to Decimal
Step Octal Number Decimal Number
Step 1 258 ((2 x 81) + (5 x 80))10
Step 2 258 (16 + 5 )10
Step 3 258 2110

Octal Number: 258 = Decimal Number: 2110 Step 2: Convert Decimal to Binary
Step Operation Result Remainder
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5 / 2 2 1

COMP 123: Computer Applications I Page 40 of 75


Step 4 2 / 2 1 0
Step 5 1 / 2 0 1

Decimal Number: 2110 = Binary Number: 101012

Octal Number: 258 = Binary Number: 101012

Shortcut method - Binary to Octal


Steps
i. Step 1 - Divide the binary digits into groups of three (starting from the right).
ii.Step 2 - Convert each group of three binary digits to one octal digit.
Example
Binary Number: 101012

Calculating Octal Equivalent:

Step Binary Number Octal Number


Step 1 101012 010 101
Step 2 101012 28 58
Step 3 101012 258

Binary Number: 101012 = Octal Number: 258

Shortcut method - Octal to Binary


Steps
i. Step 1 - Convert each octal digit to a 3-digit binary number (the octal digits may be
treated as decimal for this conversion).
ii. Step 2 - Combine all the resulting binary groups (of 3 digits each) into a single
binary number.

COMP 123: Computer Applications I Page 41 of 75


Example

Octal Number: 258

Calculating Binary Equivalent:

Step Octal Number Binary Number


Step 1 258 210 510
Step 2 258 0102 1012
Step 3 258 0101012

Octal Number: 258 = Binary Number: 101012

Shortcut method - Binary to Hexadecimal


Steps
i. Step 1 - Divide the binary digits into groups of four (starting from the
right). ii. Step 2 - Convert each group of four binary digits to one hexadecimal
symbol.
Example

Binary Number: 101012

Calculating hexadecimal Equivalent:

Step Binary Number Hexadecimal Number


Step 1 101012 0001 0101
Step 2 101012 110 510
Step 3 101012 1516

Binary Number: 101012 = Hexadecimal Number: 1516

Shortcut method - Hexadecimal to Binary


Steps
i. Step 1 - Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal
digits may be treated as decimal for this conversion).
ii.Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single binary
number.

COMP 123: Computer Applications I Page 42 of 75


Example

Hexadecimal Number: 1516

Calculating Binary Equivalent:

Step Hexadecimal Number Binary Number


Step 1 1516 110 510
Step 2 1516 00012 01012
Step 3 1516 000101012

Hexadecimal Number: 1516 = Binary Number: 101012

COMPUTER SOFTWARE

Fundamentals of Software

Software consists of computer programs, which are sequences of instructions for the computer.
The process of writing (or coding) programs is called programming, and individuals who
perform this task are called programmers. Unlike the hardwired computers of the 1950s, modern
software uses the stored program concept, in which stored software programs are accessed and
their instructions are executed (followed) in the computer’s CPU. Once the program has finished
executing, a new program is loaded into main memory and the computer hardware addresses
another task.

Computer programs include documentation, which is a written description of the functions of the
program. Documentation helps the user operate the computer system and helps other
programmers understand what the program does and how it accomplishes its purpose.
Documentation is vital to the business organization. Without it, if a key programmer or user
leaves, the knowledge of how to use the program or how it is designed may be lost. The
computer is able to do nothing until it is instructed by software. Although computer hardware is,
by design, general purpose, software enables the user to instruct a computer system to perform
specific functions that provide business value.

There are two major types/ categories of software:


a) Systems software
b) Application software.

COMP 123: Computer Applications I Page 43 of 75


The relationship among hardware, systems software, and application software is illustrated in
Systems software is a set of instructions that serves primarily as an intermediary between
computer hardware and application programs, and may also be directly manipulated by
knowledgeable users. Systems software provides important self-regulatory functions for
computer systems, such as loading itself when the computer is first turned on, managing
hardware resources such as secondary storage for all applications, and providing commonly used
sets of instructions for all applications to use. Systems programming is either the creation or
maintenance of systems software.
Layering of Systems and Applications software

Application software is a set of computer instructions that provide more specific functionality to
a user. That functionality may be broad, such as general word processing, or narrow, such as an
organization’s payroll program. An application program applies a computer to a certain need.
Application programming is either the creation or the modification and improvement of
application software. There are many different software applications in organizations today, as
this chapter will discuss. For a marketing application, for example, see the Market Intelligence
box at the Web site.

In summary, application programs primarily manipulate data or text to produce or provide


information. Systems programs primarily manipulate computer hardware resources. The systems
software available on a computer system provides the capabilities and limitations within which
the application software can operate. The next two sections of this chapter look in more detail at
these two types of software.

Systems Software

System software is a program that manages and supports the computer resources and operations
of a computer system while it executes various tasks such as processing data and information,
controlling hardware components, and allowing users to use application software. That is,
systems software functions as a bridge between computer system hardware and the application
software.

Systems software is the class of programs that control and support the computer system and its
information-processing activities. Systems software also facilitates the programming, testing,
and debugging of computer programs. It is more general than application software and is usually

COMP 123: Computer Applications I Page 44 of 75


independent of any specific type of application. Systems software programs support application
software by directing the basic functions of the computer. For example, when the computer is
turned on, the initialization program (a systems program) prepares and readies all devices for
processing.

Systems software consists of three kinds of programs. They include system management
programs, system support programs, and system development programs. These are explained
briefly.

System Control / Management Programs

System control programs control the use of the hardware, software, and data resources of a
computer system. The main system control program is the operating system. The operating
system supervises the overall operation of the computer, including monitoring the computer’s
status and scheduling operations, which include the input and output processes. In addition, the
operating system allocates CPU time and main memory to programs running on the computer,
and it also provides an interface between the user and the hardware.

Specifically, the operating system provides services that include process management, virtual
memory, file management, security, fault tolerance, and the user interface. Process management
means managing the program or programs (also called jobs) running on the processor at a given
time. In the simplest case (a desktop operating system), the operating system loads a program
into main memory and executes it. The program utilizes the computer’s resources until it
relinquishes control. Some operating systems offer more sophisticated forms of process
management, such as multitasking, multithreading, and multiprocessing.

i. Operating Systems

An operating system is a collection of integrated computer programs that provide recurring


services to other programs or to the user of a computer. These services consist of disk and file
management, memory management, and device management. In other words, it manages CPU
operations, input/output activities, storage resources, diverse support services, and controls
various devices.

Operating system is the most important program for computer system. Without an operating
system, every computer program would have to contain instructions telling the hardware each
step the hardware should take to do its job, such as storing a file on a disk. Because the operating
system contains these instructions, any program can call on the operating system when a service
is needed.

COMP 123: Computer Applications I Page 45 of 75


Operating System Functions
An operating system executes many functions to operate computer system efficiently. Among
them, four essential functions are the followings.

Resource Management: An operating system manages a collection of computer hardware


resources by using a variety of programs. It manages computer system resources, including
its CPU, primary memory, virtual memory, secondary storage devices, input/output
peripherals, and other devices.

Viewing the operation system as a resource manager, each manager must do the following:
- Keep track of the resources.
- Enforce policy that determine who, gets what, when and how much.
- Allocate the resources. - Reclaim the resources.

Task Management: The function of the operating system that controls the running of many
tasks. It manages one program or many programs within a computer system simultaneously.
That is, this function of operating system manages the completion of users' tasks. A task
management program in an operating system provides each task and interrupts the CPU
operations to manage tasks efficiently. Task management may involve a multitasking
capability.
File management: This is a function that manages data files. An operating system contains file
management programs that provide the ability to create, delete, enter, change, ask, and access
of files of data. They also produce reports on a file.
User Interface: It is a function of an operating system that allows users to interact with a
computer. A user interface program may include a combination of menus, screen design,
keyboard commands. A well-designed user interface is essential for an operating system to
be popular. Because of the function, users can load programs, access files, and accomplish
other tasks.
Data security and management: These involve these main activities: Preventing illegal access
or amendments to user or system files; ‘Dumping’ the contents of files from time in case of
future loss, e.g. disk files may be transferred to tape and then stored off-line; Keeping track
of file descriptions and locations.

Real time systems must therefore be fast and reliable. They have complex and expensive
operating system, usually involves multi-processor to share the work load.

Popular Operating Systems

The most popular microcomputer operating systems are DOS, Windows 3.x, Windows 95, OS/2,
Windows NT, and Macintosh System. UNIX is a popular operating system that is available for
microcomputers, minicomputers, and mainframe computer systems. The following will show the
details:

COMP 123: Computer Applications I Page 46 of 75


• DOS
• Windows 3.x
• Windows 95
• OS/2
• Windows NT
• Macintosh Operating System
• UNIX

System Development Programs

These are programs that help users develop information system programs and prepare user
programs for computer processing. These programs may analyze and design systems and
program itself. The main system development programs are programming language translators,
programming environment programs, computer-aided software engineering packages.
Before programs can be executed they must be translated into machine language. A program
written in any language other than machine language is called source program which is
converted into machine language (object program) by the system called translators.
Low level
Languages Assembler
e.g. assembly

Machine language

High level
languages e.g. Compiler/
Pascal, C, Basic Interpreter
etc

There are three main types of translators


Assembler- which converts low level assembly program to machine code
Compiler and interpreter- they convert high level programs to machine code.

Difference between compiler and interpreter


Compiler:
• They translate the whole source program at once before it can be run
• It ensures that the program need only be translated once
• The compiled program (object code) can be saved on a backing store as a
separate program and run as required.
Interpreter:
• They translate the source program one instruction at a time

COMP 123: Computer Applications I Page 47 of 75


• They translate the program each time its run which is therefore slower than
compiling
• They are helpful for line by line fault finding when developing a program

Translators also provide supporting functions as:


• Identifying syntax error
• Provide diagnostic and useful error messages
• They work out where to store the object program and its data
• Provide links to other programs and routines
• They print a list of the source and object programs
Application Software
As defined earlier, application software consists of instructions that direct a computersystem to
perform specific information processing activities and that provide functionality for users.
Because there are so many different uses for computers, there are a correspondingly large
number of different application software programs available.

Types of Application Software

Application software includes proprietary application software and off-the-shelf application


software. Proprietary application software addresses a specific or unique business need for a
company. This type of software may be developed in-house by the organization’s information
systems personnel or it may be commissioned from a software vendor. Such specific software
programs developed for a particular company by a vendor are called contract software.

Alternatively, off-the-shelf application software can be purchased, leased, or rented from a


vendor that develops programs and sells them to many organizations. Off-the-shelf software may
be a standard package or it may be customizable. Special purpose programs or “packages” can
be tailored for a specific purpose, such as inventory control or payroll. The word package is a
commonly used term for a computer program (or group of programs) that has been developed by
a vendor and is available for purchase in a prepackaged form. We will further discuss the
methodology involved in acquiring application software, whether proprietary or off the shelf

Types of Personal Application Software

General-purpose, off-the-shelf application programs that support general types of processing,


rather than being linked to any specific business function, are referred to as personal application
software. This type of software consists of nine widely used packages: spreadsheet, data
management, word processing, desktop publishing graphics, multimedia, communications,
speech-recognition software, and groupware.

COMP 123: Computer Applications I Page 48 of 75


Software suites combine some of these packages and integrate their functions. Personal
application software is designed to help individual users increase their productivity. Below is a
description of the nine main types.

a) Spreadsheets
Computer spreadsheet software transforms a computer screen into a ledger sheet, or grid, of
coded rows and columns. Users can enter numeric or textual data into each grid location, called a
cell. In addition, a formula can be entered into a cell to obtain a calculated answer displayed in
that cell’s location. With spreadsheets, users can also develop and use macros, which are
sequences of commands that can be executed with just one simple instruction.
Computer spreadsheet packages can be used for financial information, such as income statements
or cash flow analysis. They are also used for forecasting sales, analyzing insurance programs,
summarizing income tax data, and analyzing investments. They are relevant for many other
types of data that can be organized into rows and columns. Although spreadsheet packages such
as Microsoft’s Excel and Lotus 1–2-3are thought of primarily as spreadsheets, they also offer
data management and graphical capabilities.

b) Data management.
Data management software supports the storage, retrieval, and manipulation of related data.
There are two basic types of data management software: simple filing programs patterned after
traditional, manual data-filing techniques and database management programs that take
advantage of a computer’s extremely fast and accurate ability to store and retrieve data in
primary and secondary storage. File based management software is typically very simple to use
and is often very fast, but it offers limited flexibility in how the data can be searched. Database
management software has the opposite strengths and weaknesses. Microsoft’s Access is an
example of popular database management software.

c) Word processing.
Word processing software allows the user to manipulate text rather than just numbers. Modern
word processors contain many productive writing and editing features. A typical word
processing software package consists of an integrated set of programs including an editor
program, a formatting program, a print program, a dictionary, a thesaurus, a grammar checker, a
mailing list program, and integrated graphics, charting, and drawing programs. WYSIWYG (an
acronym for What You See Is What You Get, pronounced “wiz-e-wig”) word processors have
the added advantage of displaying the text material on the screen exactly—or almost exactly—as
it will look on the final printed page (based on the type of printer connected to the computer).
Word processing software enables users to be much more productive because the software
makes it possible to create and modify the document electronically in memory.

d) Desktop publishing.

COMP 123: Computer Applications I Page 49 of 75


Desktop publishing software represents a level of sophistication beyond regular word processing.
In the past, newsletters, announcements, advertising copy, and other specialized documents had
to be laid out by hand and then typeset. Desktop software allows microcomputers to perform
these tasks directly. Photographs, diagrams, and other images can be combined with text,
including several different fonts, to produce a finished, camera-ready document.

e) Graphics.
Graphics software allows the user to create, store, and display or print charts, graphs, maps, and
drawings. Graphics software enables users to absorb more information more quickly and to spot
relationships and trends in data more easily. There are three basic categories of graphics software
packages: presentation graphics, analysis graphics, and computer-aided design software.

f) Presentation
Presentation graphics software allows users to create graphically rich presentations. Many
packages have extensive libraries of clip art—pictures that can be electronically “clipped out”
and “pasted” into the finished image.

g) Computer-aided design (CAD) software


Are used for designing items for manufacturing, allows designers to design and “build” production
prototypes in software, test them as a computer object under given parameters (sometimes called
computer-aided engineering, or CAE), compile parts and quantity lists, outline production and assembly
procedures, and then transmit the final design directly to machines. Manufacturers of all sorts are finding
uses for CAD software. Computer-aided manufacturing (CAM) software uses digital design output, such
as that from a CAD system, to directly control production machinery. Computer-integrated
manufacturing (CIM) software is embedded within each automated production machine to produce a
product. Overall, a design from CAD software is used by CAM software to control individual CIM
programs in individual machines. Used effectively, CAD/CAM/CIM software can dramatically shorten
development time and give firms the advantage of economies of scope.

h) Multimedia
Multimedia software combines at least two media for input or output of data. These media
include audio (sound), voice, animation, video, text, graphics, and images. Multimedia can also
be thought of as the combination of spatial-based media (text and images) with time-based media
(sound and video).

i) Communications
Computers are often interconnected in order to share or relate information. To exchange
information, computers utilize communications software. This software allows computers,
whether they are located close together or far apart, to exchange data over dedicated or public
cables, telephone lines, satellite relay systems, or microwave circuits. When communications
software exists in both the sending and receiving computers, they are able to establish and
relinquish electronic links, code and decode data transmissions, verify transmission errors (and
COMP 123: Computer Applications I Page 50 of 75
correct them automatically), and check for and handle transmission interruptions or conflicting
transmission priorities. E-mail and desktop videoconferencing rely on communications software.

COMMUNICATION AND NETWORKS


Basic Data communication concepts
Computer-based communication refers to the movement of data and information generated by
computers from one location to another via various types of communication lines. Computer
based communication systems often are called communication networks. The networks allow
users to collect data and information from and transmit these to powerful central computers or
terminals.
Basic Element of Communication

The objectives of communication networks are:


To offer more timely interchange of information and data among users.
To reduce the effort and cost required to collect and transmit business data and information.
To support better performance of tasks and improved management control over an organization
especially with several remote locations.

Why Study Communications?


Information society dominated by computers and communications is in front of us. In this
society, the strategic resource is knowledge and information, and the value of that resource will
be increased by the movement through the information pathway. A communication network is
the pathway that allows information, data, and knowledge to be spread. Thus, the mainstream of
the information age is communication.

Communications involve many technologies. In addition, many new communication


technologies are being incorporated into the fabric of the information society as fast as people
can learn how to maintain and use the technologies. This may be the most important reason for
users to study communications.

Computer users who work in this society need to know technology incorporated into the
communication networks. Although they use only applications involved in the communication
networks, they still need to know how the communication networks work to improve their
performance by using networks more efficiently and effectively.

Generic Forms of Networks

COMP 123: Computer Applications I Page 51 of 75


A network can be defined simply as an interconnection of multiple teleprocessing devices. Three
basic approaches to network processing exist in modern communications systems.
i. Timesharing
The earliest approach is known as timesharing. Timesharing occurs in networks in which
multiple users gain access to a single host computer from their individual terminals. An example
of timesharing is the use of a central computer at a nationwide company's headquarters by a
variety of sales professionals dispersed around the nation.

ii. Distributed Processing


The next approach gaining popularity in computer networking systems was the distributed
processing method. This type of system involves the interconnection of minicomputers and
microcomputers throughout a business organization. Various types of resources are shared by the
interconnected terminals, while the individual computers retain control over their own
processing.

iii. Client/Server Computing


The third approach to computer network processing, client/server computing, is currently
attracting the most interest among management information systems professionals. The
popularity of this approach is due to its ability to allow companies to selectively centralize and
decentralize certain key operations. Thus, users can view client/server computing as a cross
between the timesharing method (which emphasizes centralized computing) and distributed
processing (which emphasizes decentralized computing). In client/server computing, the various
applications available in the network are shared by several clients and one or more host
computers (or servers). Clients obtain access to the network by means of desktop computers. The
server, which can be a microcomputer, minicomputer, or mainframe, provides control for the
entire network.
Importance of Networking

Networking of computers provides a communication link between the users, and provides access
to information. Networking of computers has several uses, described as follows:

COMP 123: Computer Applications I Page 52 of 75


i. Resource Sharing — in an organization, resources such as printers, fax machines and scanners
are generally not required by each person at all times. Moreover, for small organizations it may
not be feasible to provide such resources to each individual. Such resources can be made
available to different users of the organization on the network. It results in availability of the
resource to different users regardless of the physical location of the resource or the user, enhances
optimal use of the resource, leads to easy maintenance, and saves cost too.

A network of computers, printer and scanner

ii. Sharing of Information— In addition to the sharing of physical resources, networking


facilitates sharing of information. Information stored on networked computers located at
same or different physical locations, becomes accessible to the computers connected to
the network.
iii. As a Communication Medium— Networking helps in sending and receiving of
electronic-mail (e-mail) messages from anywhere in the world. Data in the form of text,
audio, video and pictures can be sent via e-mail. This allows the users to communicate
online in a faster and cost effective manner. Video conferencing is another form of
communication made possible via networking. People in distant locations can hold a
meeting, and they can hear and see each other simultaneously.
iv. For Back-up and Support— Networked computers can be used to take back-up of
critical data. In situations where there is a requirement of always-on computer, another
computer on the network can take over in case of failure of one computer.

Components of Communication Network

There are many components for a communication network. The basic three components are a
host computer, a client, and a circuit. Besides these components, others include front-end
processors, teleprocessing software, input terminals, and specialists.

i. Host Computer (Server)

The host computer or server (a mainframe, minicomputer, or microcomputer) is the main unit in
the communication network. It stores data and programs that can be accessed by the clients. The
host computer is responsible for performing the data processing tasks of the network. After
processing has occurred, the data or information is routed back to a front-end processor. In

COMP 123: Computer Applications I Page 53 of 75


distributed processing or client-server computing, several host computers may be tied together
by the data communication network.
ii. Client
The client is a hardware device (a terminal or microcomputer) at the opposite end of a host
computer of a communication circuit. It usually provides end users with access to the data and
software on the server. The client is an input/output device.
The most widely used computer input/output devices for a communication network are the
terminals. There are several types of terminals in common use in business today. The most
familiar type of input/output terminal for most end users is the keyboard terminal.

iii. Circuit

The circuit is a communication channel that allows the data and information to move through the
pathway. It includes several types of lines, such as twisted wires, coaxial cables, and fiber optic
cables. It also contains wireless transmission circuits such as microwaves and satellites, and it is
becoming more popular.

iv. Front-End Processor


The front-end processor handles the incoming and outgoing communications exchanges between
the host computer and the peripheral terminals and other host computers both inside and outside
the network.

v. Teleprocessing Software
Besides the hardware mentioned previously in this chapter, the host and the front-end processor
must contain software in order for the network system to run effectively. Software may also be
located in the terminals and the cluster control units.

5.3 Communications Channels

Data communications can be carried from one location to another through a variety of
communications channels. These communications media include telephone lines (twisted pairs),
coaxial cable, fiber-optic cable, microwave, and satellite. In general, there can be two ways of
connecting microcomputers with each other and with other equipment: guided and radiated
media.

Guided Media: Refer to channels that allow the transmission of data and information
through a physical media such as a twisted pair wire, coaxial cable, or fiber optic cable.
Radiated media: Refer to those that transmit data and information through the air such as
microwave, or satellite.

The diameters and transmission capacities of the three kinds of cable are compared below:

COMP 123: Computer Applications I Page 54 of 75


i. Twisted Pair

The telephone lines used to carry most of the


voice and data communications consist of a
pair of thin-diameter insulated copper wires
(called twisted pairs). The wires are twisted
around each other to minimize interference
from
other twisted pairs in the cable. Twisted pairs have fewer bandwidths than coaxial cable or
optical fiber. They have been the standard communication channels for voice, data and
information, but are now diminishing because of more reliable media such as coaxial cable,
optical fibers, microwave, or satellite.

ii. Coaxial Cable

Coaxial cable can be used for telephone lines for transmission at a high frequency. Coaxial cable
consists of a single core of solid copper. A
coaxial cable can handle 80 times as many
telephone transmissions as twisted pair media.
Many computers in local area networks are
linked by coaxial cables. Because of its
sturdiness, coaxial cable is often used for
telephone lines that must be carried under bodies
of water. Because coaxial cables have very little distortion and are less prone to interference,
they have low error rates
.

iii. Fiber-Optic Cable

A fiber-optic cable consists of tubes of


glass through which data are transmitted
as pulses of light. Although a fiber-
optic cable is diametrically smaller than
a human hair, it has 26,000 times the
transmission capacity of twisted pair
media. A major advantage of fiber-optic
media is its high level of security. These
communications channels are not susceptible to electronic interference. Therefore, they are a
more reliable form of data transmission. Fiber-optic cables are also significantly less expensive
than coaxial cable. A disadvantage of fiber-optic channels is that they cannot carry information
over great distances.

COMP 123: Computer Applications I Page 55 of 75


Wireless Networking

Wireless technology, as the name suggests, is used to establish a wire-free connection or


communication between two or more devices. In contrast to the wired technology where data is
encoded as electric current and signals travel through wires, in wireless technology data is
encoded on electromagnetic waves that travel through air.

The wireless technology is used for broadcasting in radio and television communication, for
communication using mobile phones and pagers, for connecting components of computers using
Bluetooth technology, for Internet connection using Wi-Fi, Wireless LAN, PDA, and in remote
controls for television, doors etc.

Wireless network is a computer network connected wirelessly. The communication is done


through a wireless media like radio waves, infrared or Bluetooth.

The wireless networks have two main components—the wireless access points that include the
transmitter along with the area it can cover, and the wireless clients like mobile handsets, laptops
with Ethernet cards etc.

The access point receives data frames from the computers attached to it wirelessly, checks the
frames, and transmits them to their destination. The coverage area of a transmitter depends on
the output power of the transmitter, its location, and the frequency used to transmit the data.
Higher frequencies require a clear line of sight as compared to lower frequencies.

The speed of wireless connection is determined by the distance of the wireless client device from
the access point, the obstruction-free path (walls, trees etc.), interference, and the number of
users using the network at a given time.

Types of Wireless Networks

Wireless networks can be divided into three categories based on their use:
i. Bluetooth technology to connect the different components of the computer in a room, a
small office or home.
ii. Wireless LAN is used to connect computers and devices wirelessly in a LAN, for
example, different computers or devices in an office or campus.
iii. Wireless WAN is used to connect wide area systems, for example access to Internet via
mobile devices like cell phone, PDAs and laptops.

COMP 123: Computer Applications I Page 56 of 75


Data Transmission

Coding
In all digital communications channels, computers transmit data and information in forms of
binary codes. Both sender and receiver of the data and information should have a standard for
both to understand them.

A coding scheme for communications is a binary system, as in the computer systems. The
system consists of groups of bits (0 or 1) that represent characters. In computer systems, a byte is
a group of bits and represents a character. In data communications, a byte is the same, but some
codes use different number of bits such as 5, 7, 8 or 9.

There are two predominant coding schemes; ASCII and EBCDIC. ASCII refers America
Standard Code for Information Interchange. It is the most popular code for data communications
and is the standard code on most communications terminals. Among two types of ASCII, a 7-bit
code can make 128 character combinations, and an 8-bit can do 256 combinations. EBCDIC
refers Extended Binary Coded Decimal Interchange Code. It is IBM's standard information code,
and has 8 bits for a character.

Network Topology

Networks can be classified by their topology, which is the basic geometric arrangement of the
network. Different types of network configurations exist for network designers to choose from. It
may refer to the way in which the nodes of a network are linked together.

Communications channels can be connected in different arrangements using several different


topologies. This arrangement allows users to exchange information and share resources
(software and hardware).

Four basic types of network configurations are star, bus, ring, hierarchical and mesh. Ring, bus,
and star topologies are commonly used in LANs and BNs. Star and mesh topologies are
commonly used in MANs and WANS. The networks are usually built using a combination of
several different topologies.

i. Star
ii. Bus
iii. Ring iv. Hierarchical
v. Mesh
vi. Hybrid

COMP 123: Computer Applications I Page 57 of 75


i. Star Topology
A star topology is one in which a central unit provides a link through which a group of smaller
computers and devices is connected. In the star network, all interactions
between different computers in the network travel through the host
computer. The central unit will poll each to decide whether a unit has a
message to send. If so, the central computer will carry the message to
the receiving computer.

Star networks represent a very popular form of configuration for time-


sharing systems in which a central computer makes available resources and databases for several
"client" computers to share. As such, the star network is appropriate for systems that demand
centralized control. The disadvantage of the star network is that a processing problem in the
central computer can be paralyzing to the entire system. In a star network, the central unit may
be a host computer or a file server. The host computer is a large centralized computer, usually a
minicomputer or a mainframe. In contrast, the file server is a large-capacity hard-disk storage
device. It stores data and programs files shared by the users on the network.

ii. Bus Topology


In a bus configuration, each computer in the network is
responsible for carrying out its own communications without
the aid of a central unit. A common communications cable (the
bus) connects all of the computers in the network. As data
travels along the path of the cable, each unit performs a query to
determine if it is the intended recipient of the message. The bus
network is less expensive than the star configuration and is thus
widely in use for systems that connect only a few microcomputers and systems that
do not emphasize the sharing of common resources.

iii. Ring Network


A ring configuration features a network in which each computer is connected to the next two
other computers in a closed loop. Like the bus network, no single
central computer exists in the ring configuration. Messages are
simply transferred from one computer to the next until they arrive
at their intended destinations. Each computer on the ring topology
has a particular address. As the messages pass around the ring, the
computers validate the address. If the message is not addressed to
it,
the node transmits the message to the next computer on the ring.

This type of network is commonly used in systems that connect widely dispersed mainframe
computers. A ring network allows organizations to engage in distributed data processing system

COMP 123: Computer Applications I Page 58 of 75


in which computers can share certain resources with other units while maintaining control over
their own processing functions. However, a failure in any of the linked computers can greatly
affect the entire network.

iv. Hierarchical Topology


A hierarchical network (or a tree network) resembles a star network in that several computers are
connected to a central host computer (usually a mainframe). However, these "client" computers
also serve as host computers to next level units. Thus, the hierarchical network can theoretically
be compared to a standard organizational chart or a large corporation. Typically, the host
computer at the top of the hierarchy is a mainframe computer. Lower levels in the hierarchy
could consist of minicomputers and microcomputers. It should be noted that a system can
sometimes have characteristics of more than one of the above topologies.

This topology is effective in a centralized corporation. For example, different divisions within a
corporation may have individual microcomputers connected to divisional minicomputers. The
minicomputers in turn may be connected to the corporation's mainframe, which contains data
and programs.

v. Mesh Topology

This is a net-like communications network in which there are at least two pathways to each node.
In a mesh topology, computers are connected to each other by point-
topoint circuits. In the topology, one or more computers usually become
switching centers, interlinking computers with others.

Although a computer or cable is lost, if there are other possible routes


through the network, the damage of one or several cables or computers
may not have vital impact except the involved computers. However, if there are only few cables
in the network, the loss of even one cable or device may damage the network seriously.

Network Types

Communications networks differ in geographical size. Networks may be constructed within a


building or across several buildings. Networks may also be citywide and even international,
using both cable and air connections. There are three major network types: LAN (local area
networks), MAN (metropolitan area networks), and WAN (wide area networks).

i. Local Area Networks


ii. Metropolitan Area Networks (MANs)/ iii.
Wide Area Networks (WANs).

COMP 123: Computer Applications I Page 59 of 75


i. Local Area Networks (LANs)

A computer communications network contained in a small area such as a commercial building is


known as a local area network (LAN). A local area network's linkages usually are accomplished
with either telephone, coaxial, or fiber-optic cables. Often, LANs use a bus configuration. The
major benefit of a local area network is that it can help to reduce costs by allowing people and
microcomputers to share expensive resources. Also, local area networks enable end users to
participate in office automation technology. In addition, LANs may be connected to other
networks by means of a network gateway.

Local Area Network (LAN) as compared to WAN


• Limited to a small geographical coverage
• Has much higher data transmission rate
• Experiences fewer data transmission errors
• Has lower data communication cost • Typically owned by a single organization Why Use an

LAN?

There are two basic reasons for developing an LAN: information sharing and resource sharing.

• Information sharing: This refers to having users who access the same data files, exchange
information via electronic mail, or search the Internet for information. The main benefit of
information sharing is improved decision making, which makes it generally more important
than resource sharing.
• Resource sharing: It refers to one computer sharing a hardware device (e.g., a printer) or a
software package with other computers on the network. The main benefit of resource sharing
is cost savings.

ii. MANs (Metropolitan Area Networks (MANs))

The next larger network than LAN may be the Metropolitan Area Networks (MANs). MAN
usually spans a geographical area that usually encompasses a city or county area. It interconnects
various buildings or other facilities within this citywide area. For example, linkages can be
established between two commercial buildings. A more recent use of MAN technology has been
the rapid development of cellular phone systems.

iii. WANs (Wide Area Networks (WANs))

A wide area network (WAN) is one that operates over a vast distance (e.g., nationwide). Its
nodes may span cities, states, or national boundaries. This network interconnects computers,
LANS, BNs, MANS, and other data transmission facilities. Typically, WAN will employ

COMP 123: Computer Applications I Page 60 of 75


communications circuits such as long- distance telephone wires, microwaves and satellites. FOR
example, nationwide automated teller machines used in banking represent a common application
of a wide area network.

B A S I C F U N C T I O N S O F S T A N D A R D AP P L I C A T I O N S O F T W A R E
M s. O f f i c e
Microsoft office is a group of application programs containing four programs, namely –
Microsoft Word, Microsoft Excel, Microsoft Power Point and Microsoft Access. These
four programs help us perform almost everything we need to do in everyday office work.

WORD PROCESSING.
Word processing is the art of text manipulation. It involves creating & producing professional
looking documents such as letters, memos, reports, etc.
A Word Processor is a computer program that enables a person to create, save, retrieve, edit,
format, and print text based documents.
Word is a program with which we can write and print documents, like letters, reports,
essays, newsletters, CVs, research papers, chapters of books, with texts, tables and charts
or graphs inset within text.

Common Features (Characteristics) of a Word processor.


A Word processor performs the same function as a typewriter, but offers very many useful
features / facilities, which can be used to make your work more efficient and attractive.
A Word processor can be used to produce quality-finished documents of high standards
compared to a typewriter.
The following are some of the facilities provided by all Word processors:
 They allow the user to create a file, save it, and retrieve (recover/open) it when required for
reuse, printing, editing or formatting.
 Has Text- editing features, such as: -
 Contains Text and Page formatting features such as: -
 Has different Fonts (lettering/typescripts), Character sizes & Styles such as Bold, Italic,
Underline, etc.
 Enables Printing of documents: single or multiple copies, full or part of a document.

COMP 123: Computer Applications I Page 61 of 75


 Enables creation of Tables, which can be used to perform certain calculations & sorting on a
given text.
 Has an inbuilt dictionary.
 Contains Tools such as Spelling and grammar checkers, Bookmarks & Thesaurus (which
provides alternative words – synonyms).
 Typing errors can be corrected and the text modified before printing the final version.
 Enables the use of document templates, which can be used to quickly create the most
frequently used documents once the format has been set.
 Allows Mail merging, which makes it possible to combine several letters.
 Enables creation of Newspaper layouts, which can be used for manipulation of Column text.
 Has the ability to add graphics within documents.
 Allows creation of Footnotes and Endnotes.
 Provides file protection using Passwords.
 Contain Macros, which can be used to automate the most frequent & repetitive tasks.
 Have the ability to create and import tables, text and graphics from other programs.
 All Word processors have similar document windows with the following features:
(a). They are designed to look like a piece of paper with a few electronic improvements.
(b).The screen is blank before typing of text.
(c). There is a Cursor, which blinks at the position where you can begin entering text.
(d).There is a Status bar that provides the user with information about current status such as
saving operation, the name of the file in use, the current page, and column cursor
position.
(e). Word wrap: A facility/feature that automatically moves a word or cursor to the
beginning of the next line if there is insufficient room at the end of the current line.
(f). Scrolling: This is the vertical movement of text document on the screen, either using the
Up or Down arrow keys, Page Up or Page Down keys, or using the Mouse in Windows
based word processors.
(g). Help: Contains instructions, tips, pointers, explanations and guidance on how to use an
application.
(h).Editing modes: Word processors have two editing modes; Insert mode and Type over
mode.

COMP 123: Computer Applications I Page 62 of 75


In Insert mode, every character typed between words, lines or characters is placed at the
cursor position. This pushes all the text in front of the cursor away without deleting it.
In Type over mode, every character typed deletes what was there before and replaces it
with new text at the cursor position.
Common examples of Word processors: -
* Microsoft Word. * WordStar. * Corel WordPerfect. * Wang writer.
* Lotus WordPro. * WordWrite.
Advantages of Word processors.
(i). A document can be stored in the computer for future reference in computer files. The files
do not occupy physical space like the one on paper; hence, this creates a paperless
document processing environment.
(ii). Typing using a word processor is easier & more efficient because some actions are
automated.
(iii). Most word processors have special editing tools such as Spelling and grammar checkers
that help the user to easily correct grammar and spelling mistakes. Thesaurus helps to find
a word with similar meanings.
(iv). Most word processors have Insert and Type over modes. Therefore, one can easily insert
or replace a word or a phrase without affecting the structure and neatness of the document.
(v). Word processors have superior document formatting features such as underlining,
boldfacing, italicization, applying different colors, etc.
Formatting refers to the art of making the document more attractive and appealing to the
eye.
(vi). A Word processor enables one to produce many copies of a document through printing;
whereas, a typewriter may require retying of the entire document when we want many
copies.
(vii). Word processor has Cut, Copy and Paste commands that enable the user to incorporate
other text without having to retype it.
(viii). Provides secrecy in writing documents through Passwords.
(ix). Allow simple arithmetic operations such as additions, multiplications, etc.
(x). Allows Mail merging (combining of several documents).
Disadvantages of Word processors.

COMP 123: Computer Applications I Page 63 of 75


(i). They are Expensive.
(ii). The use of Word processors creates unemployment.
(iii). The use of the Word processors is limited only to those areas with power supply.
(iv). There is need of a literate person to operate it.
Factors to consider when choosing a Word processor.
The choice of a word processor depends on:
1. The type of operating system.
2. Its user-friendliness (ease to use).
3. Its formatting and editing features. They should be good and in variety.

Basic Functions of W ord


A. Page Layout
B. Paragraph Style
C. Table Creation and Formatting
D. Formatting
E. Editing
F. Inserting
G. Printing

SPREADSHEETS.
A Spreadsheet is a ledger sheet that lets the user enter, edit, and manipulate numerical data. A
Spreadsheet usually consists of a series of rows & columns in which data entries can be made.
Excel helps us in numerical calculation with a huge volume of data on worksheets,
creation of tables, creation of charts and diagrams as well as some performing statistical
analysis of data.

Types of Spreadsheets:
There are 2 types of spreadsheets:
1). Manual spreadsheet:
A Manual spreadsheet is ledger book with many sheets of papers divided into rows and
columns for entering/writing data.
The data is entered manually using a pen or pencil.
2). Electronic Spreadsheet:

COMP 123: Computer Applications I Page 64 of 75


A computer program that looks like the manual ledger sheet with rows & columns for
entering data that can be manipulated mathematically using of formulae.
Advantages of Electronic Spreadsheets over Manual Worksheets.
1. Has a large worksheet for data entry & manipulation as compared to manual worksheet.
2. Has inbuilt formulae called Functions that are non-existent in manual worksheets. These
functions enable the user to quickly manipulate mathematical data.
3. Uses the power of the computer to quickly carry out operations.
4. Has better formatting & editing qualities than the manual worksheet.
5. Utilizes the large storage space available on computer storage devices to save & retrieve
documents.
6. Can easily be modified in its form, while a manual spreadsheet involves a lot of manual
calculations & are very difficult to amend.
7. The user can very quickly & efficiently perform complicated computations using the
information stored in an electronic spreadsheet.
8. It is accurate in its calculations & allows automatic recalculation on formulae.
9. It offers graphical representation of data leading to comprehensive decisions.
10. Replaces the pencil & paper approach of the manual operations of the worksheet.
11. It improves on the capabilities & speed of the Calculator.
Examples of the commonly used Spreadsheet packages
 VisiCalc – this was the 1st type of spreadsheet to be developed for PCs.
 Lotus 123 – this is an integrated software with spreadsheet module, graphs, and database.
 Microsoft Excel.
 Corel Quattro-Pro
 Microsoft Works Excel
 Super calculators.
 Multiplan.
 Vp-Planner.
Components of a Spreadsheet

A spreadsheet has 3 main components, namely;


(a). Workbook.

COMP 123: Computer Applications I Page 65 of 75


(b). Database.
(c). Graphs / Charts.
Graphs/Charts:
A Chart is a graphical/pictorial representation of data in a worksheet. Charts are used to
summarize data in a worksheet in a pictorial form.
They enable the users to present complex data elements from a worksheet in a simple format that
they can understand.
Charts make it easy for users to see comparisons, patterns, and trends in data, e.g., instead of
having to analyze several columns of a worksheet, one can see at a glance whether sales are
falling or rising.
Examples of charts are: Pie charts, Line graphs, Bar charts, Histograms, Column charts, etc.

Parts of the Spreadsheet

~ Columns - The vertical areas of the spreadsheet; They are labeled A-Z, AA-AZ, BA-BZ,
etc..., there are 16,384 Columns in MS Excel.

~ Rows - The horizontal areas of the spreadsheet; They are labeled numerically; There are
1,048,576 Rows in MS Excel

~ Cell - Rectangular area in which a row and column intersect

~ Active Cell - The selected cell with the heavy border around it

~ Cell Address - A description of which row and column intersect to form the cell. Cell A1 is
the address for the first cell in the first row and first column. The correct way to name a cell
location is Column then Row.

~ Name Box - The area that displays the address of the active cell

~ Formula Bar - The area that displays the contents of the active cell. You may edit your data
here

Tip: When highlighting in a spreadsheet, the inside color of the first cell will be white.

Application areas of spreadsheets (Areas where Spreadsheets are used)


1. Accounting.

COMP 123: Computer Applications I Page 66 of 75


Spreadsheets provide an easy & streamlined means of financial management. They are
mostly used by Accountants to record their daily transactions & also keep financial records.
2. Data management.
A spreadsheet enables information to be produced easily and kept up-to-date.
3. Scientific Applications.
Spreadsheet programs can be used by Scientists & Researchers to compile & analyse their
results.
4. Statistical analysis / Mathematical operations.
Spreadsheets provide a set of data analysis tools that can be used to develop complex
statistical analyses. In addition, some of the tools generate charts.
 AVERAGE – used to calculate the mean of a set of values.
5. Forecasting (What if analysis).
The automatic recalculation feature makes it possible to use the “What if” analysis
technique.
6. Budgets
7. Financial/Accounting Reports
8. Taxes
9. Students' Grades
10. Columns of Text
11. Graphs
Common features of Electronic spreadsheets.
1. Have the ability to create, edit, save & retrieve worksheets.
2. Have inbuilt functions & formulae which can be used to perform calculations.
3. Allows Automatic recalculation
4. Have the ability to Sort and filter data (i.e., arrange data in a predefined order).
5. Have a Data validation facility, which ensures that the correct data is entered into the
Spreadsheet.
6. Have a Chart facility that can be used to draw line graphs, Bar charts, histograms, etc.
7. Have the ability to format data (both text & numeric data) using predefined formats.
8. Some Spreadsheets have a SOLVER facility that is used to uncover the best uses of scarce
resources so that desired goals can be achieved.

COMP 123: Computer Applications I Page 67 of 75


9. Have the ability to adjust Column widths & Row heights automatically.
10. Have the ability to hide and unhide rows & columns, and also freeze panes.
11. They enable printing of worksheets within the shortest time possible.
12. They have pre-designed Templates for automating tasks.
13. Have the ability to summarize data using Consolidation and Pivot tables.
Differences between an Electronic Spreadsheet and a Calculator
An electronic spreadsheet: -
1. Has more memory than calculator.
2. Is able to perform complex logical operations, but a calculator cannot.
3. Uses the large storage capacity of the computer that a calculator does not have.
4. Has a large working area that a calculator does not have.

Spreadsheet Formulas

* An instruction to calculate a number

* The formula is entered in the cell where the answer should appear

* After you hit the "Enter" key, the answer is displayed in the active cell while the formula
remains visible in the formula bar

*The four math operations are: + for add; - for subtract; * for multiplication; / for divide

Spreadsheet Functions

* Built-in formulas that perform special calculations automatically.

- Sum functions add up a column of figures. (SUM)

- Average functions averages a group of numbers. (AVERAGE)

- Count functions count all the blank spaces in the range. (COUNT)

- Minimum functions indicate the lowest value in the range. (MIN)

- Maximum functions indicate the highest value in the range. (MAX)

POWERPOINT

COMP 123: Computer Applications I Page 68 of 75


PowerPoint is the leading multimedia presentation software. PowerPoint is a high-powered
software tool used for presenting information in a dynamic slide show format. Text, charts,
graphs, sound effects and video are just some of the elements PowerPoint can incorporate into
your presentations with ease.

Power Point is for presentation by using projection of slides, which may be used in any
discussion, seminar, lecture, etc. This program helps us preparing the slides containing
texts, pictures, charts, tables, as well as some animated objects.

There are many ways to use Microsoft PowerPoint:

 To create a "slide show" on the computer


 To create overhead transparencies
 To quickly create a presentation to publish on the World Wide Web
 The slides can be arranged and printed as handouts for reference.

PowerPoint Terms

Slide: An individual screen in a slide show.

Slide Show or Presentation: A series of slides displayed in sequence. A slide show can be
controlled manually or automatically.

Object: Any element that appears on a PowerPoint slide, such as clip art, text, drawings, charts,
sounds, and video clips. You can refer to a clip art object, a text object, a title object, a drawing
object, etc.

Slide Transition: A special effect used to introduce a slide during a slide show. For example,
you can fade in from black, or dissolve from one slide to another. Click on the "Transitions"
Ribbon Tab to add interesting transitions.

Animation– Add a special visual or sound effect to text or an object. To add interesting
animations to objects in slide shows, click the "Animations" Ribbon Tab.

Basic Rules

 Use the KISS Principal (Keep It Simple and Straightforward)


 Make bullet points easy to read
 Keep text easy to understand
 Use concise wording
 Keep Font Size Large
 Stick to a single background or design template

COMP 123: Computer Applications I Page 69 of 75


 No more than one font should be used per slide
 Incorporate only one thought per slide
 It is best to leave the first slide of a presentation alone and not animate it.

The views in PowerPoint that you can use to edit, print, and deliver your presentation are as
follows:

 Normal view
 Slide Sorter view
 Outline view
 Slide Show view
 Presenter view
 Master views: Slide, Handout, and Notes
 Notes Page view

Creating New Presentation

Formatting and Inserting

Slide Show
Printing
ACCESS
Access is for database management for searching and querying and some processing of
data, as for example you may build an access application for library database. Learning
all the features of each would not be required, since the special features may be learnt as
and when required taking help from the Help Menu in each program. But the beginners
should familiarize themselves with basic operational functions.

A collection of related information that helps you organize records

For what is a database program used?

A database program, like Microsoft Access, can be used for many things. Primarily, it is used to
keep track of or manage information about:

 People (customers, employees or friends)


 Items (products, CD or video collection)
 Events (sales transaction)

Other things a database program can be used for include: Storing information like a file cabinet,
finding and retrieving data of interests, as well as performing searches for specific parts of all

COMP 123: Computer Applications I Page 70 of 75


the information, analyzing data and helping you make quick, accurate and informed decisions
based on the information, and also database programs can neatly present information in
professionally designed reports.

Common Uses of Databases

In Schools -

 Student Records
 Staff Employment Records

Personal Use -

 Recipes
 Music Collection
 Addresses

Business Use -

 Business Mailing Lists


 Customer Orders
 Inventories
 Equipment
 Property
 Payroll

Advantages of Computerized Databases

 quicker to find things


 neater
 more useful
 can sort information (alphabetize)
 can group information (all friends who live in CA)
 generates reports
 analyzes data (easily see trends or relationships to make informed decisions)

Disadvantages of Computerized Databases

 Finite – Microsoft Access is useful for individual departments or small-to-medium


business sectors. Any sector whose usage goes beyond 2 GB will hit a wall and discover
limitations.
 Structure Query Language (SQL) — SQL for MS Access is not as robust as MS SQL
Server or Oracle, to just name a few.
 One file — All the information from your database is saved into one file. This limits
options and how you choose utilize data; slowing down reports, queries, and forms. Its

COMP 123: Computer Applications I Page 71 of 75


performance becomes slow as the user scales data size. Multimedia data can use up MS
Access limited space quickly.
 Static-Friendly — It’s difficult to publish files a part from static files.
 Multi-user limited — Technical limit is 255 concurrent users, but real world limit is 10 to
80 (depending on type of application).

Parts of a Database

Tables
A collection of data about a specific topic, organized into columns (called fields) and rows
(called records). In table datasheet view, you can add, edit, or view the data in a table. Tables
to store your data.

Fields
Categories of information
Each field is made up of:
•field name - titles you give to each category of information
•field entries -contents of the database, text, numbers or formulas

Record
All the information about one person or item, for example
•1 form filled out in a Form
•1 row in a table

Forms
Forms provide a quick way to view, enter and change information in a database. Forms usually
display boxes that show one record at a time.

Forms to view, add, and update data in tables.

Queries
Queries retrieve data from one or more table using criteria you specify, and then displays it in
the order you want.

Queries to find and retrieve specific data of interest.

Report
Reports are professional-looking documents that summarize the data in a database.

Reports to analyze or print data in a specific layout.

Datasheet View
Displays all the records in a table. You can enter, edit and review records in this view.

COMP 123: Computer Applications I Page 72 of 75


Design View
This view allows you to change the structure of a table. You can change the settings in this
view to specify the kind of information you can enter into a table.

Establishment of Ms Access database


All Ms Access databases files are saved with extension .mdb
A database should have a separate table for every major subject, such as pedigree records,
Production data or Treatment information. Data should not be duplicated in multiple
tables.
Microsoft Access provides three methods to create a database
■ Database Wizard (though easy, the wizard offers limited options to customize
the database)
■ Using a template (This method works best if one can find and use a template
that closely matches the specific requirements)
■ Creating a database directly (This is the most flexible method, but it requires one
to define each database element separately).
Create a new Access database
After creating a new database, this should be saved by the name which reflects the content of
the database. Upon saving the database, the Ms Access database window opens with the
Tables tab-active (i.e. in such a way that the next activity should be to create a table).
Creating a table
Tables are the data storage facilities in Ms Access. Each table contains rows called records
and columns called fields.
A record is a collection of facts about a particular animal or event. Each record in a table
should be unique. To distinguish one record from another, tables can contain a primary key
field.
A field is a single kind of fact that may apply to each animal or event. For example, date of
birth is a field in a table on animal information.
The fields in a database have settings that determine the
- type of data they can store,
- how the data is displayed,
- what can be done with the data?
For example, field settings can ensure that birth dates are entered with two numbers for the
month, two numbers for the day, four numbers for the year, and slashes in between:
01/04/2006.
One important setting for fields is the data type, which could be The data type limits and
describes the kind of information in the field. The data type also determines the actions one can
perform on a field and how much memory the data will use. a number, text, currency, and
date/time.

COMP 123: Computer Applications I Page 73 of 75


Fields also have properties that control the details of information inside them, including a
character length, a default value, and a validation rule that makes sure the data meets
certain criteria.
Tables may be created by either:
- Table wizard,
- Design view
- Entering data in a spreadsheet.

Access Data Types

Data Type Usage Size


Short Text
(formerly
Alphanumeric data (names, titles, etc.) Up to 255 characters.
known as
“Text”)
Long Text Large amounts of alphanumeric data: Up to about 1 gigabyte (GB), but
(formerly sentences and paragraphs. See The Memo controls to display a long text are
known as data type is now called “Long Text” for more limited to the first 64,000
“Memo” information on the Long Text details. characters.
Number Numeric data. 1, 2, 4, 8, or 16 bytes.
8 bytes.
Large Number Numeric data.
For more information, see Using
the Large Number data type.
Date/Time Dates and times. 8 bytes.
Monetary data, stored with 4 decimal places
Currency 8 bytes.
of precision.
Unique value generated by Access for each 4 bytes (16 bytes for
AutoNumber
new record. ReplicationID).
Boolean (true/false) data; Access stores the
Yes/No numeric value zero (0) for false, and -1 for 1 byte.
true.
Pictures, graphs, or other ActiveX objects
OLE Object Up to about 2 GB.
from another Windows-based application.
A link address to a document or file on the Up to 8,192 (each part of a
Hyperlink Internet, on an intranet, on a local area Hyperlink data type can contain
network (LAN), or on your local computer up to 2048 characters).
You can attach files such as pictures,
documents, spreadsheets, or charts; each
Attachment Attachment field can contain an unlimited Up to about 2 GB.
number of attachments per record, up to the
storage limit of the size of a database file.

COMP 123: Computer Applications I Page 74 of 75


Data Type Usage Size
Note, the Attachment data type isn't available
in MDB file formats.
Dependent on the data type of the
You can create an expression that uses data Result Type property. Short Text
from one or more fields. You can designate data type result can have up to
Calculated different result data types from the 243 characters. Long Text,
expression. Note, the Calculated data type Number, Yes/No, and Date/Time
isn't available in MDB file formats. should match their respective data
types.
The Lookup Wizard entry in the Data Type
column in Design view is not actually a data
type. When you choose this entry, a wizard
starts to help you define either a simple or
complex lookup field. A simple lookup field Dependent on the data type of the
Lookup Wizard
uses the contents of another table or a value lookup field.
list to validate the contents of a single value
per row. A complex lookup field allows you
to store multiple values of the same data type
in each row.

COMP 123: Computer Applications I Page 75 of 75

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy