COMPUTER STUDIES FORM 4 REVISION NOTES

INTRODUCTION TO NETWORKING AND DATA COMMUNICATION

INTRODUCTION

A computer network forms whenever 2 or more computers are interconnected together with other related accessories to work together.

Non computer networks include:

  1. Road networks that facilitate transfer of goods and services.
  2. Telephone networks (voice networks) with many lines that criss cross a country.
  3. Blood circulatory system in the human body.
  4. The neuron system in the human brain.

DEFINITION OF TERMS USED IN NETWORKING

  1. COMPUTER NETWORK
  1. TRANSMISSION MEDIA
More Free Unlimited Computer Notes, Exams and Revision Materials downloads:

COMPUTER STUDIES FORM 1 NOTES FREE

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking Schemes, Topical revision materials, Syllabus and Many more

Computer Studies Schemes of work term 1-3, Form 1-4

Computer Studies Notes Form 1, 2, 4 and 4- Free Download

COMPUTER STUDIES NOTES FORM 1-4

Free Computer Studies Notes, Exams and other revision resources
  1. DATA COMMUNICATION

 

TERMS USED IN DATA COMMUNICATION

  1. Data signal.
  2. Signal modulation and demodulation.
  3. Multiplexing.
  4. Band width.
  5. Base band.
  6. Broad band transmission.
  7. Attenuation.

 

 

  1. DATA SIGNAL
  1. Analog signal: data made up of continuous varying wave form similar to voice or sound wave.
  2. Digital signal: data made up non-continuous discrete signal.

 

  1. SIGNAL MODULATION AND DEMODULATION
  1. Modulation: converting digital data signals into analog data signals.
  2. Demodulation: converting digital data by superimposing it on analog carrier signal which can be transmitted over analog telephone lines.

 

  1. MULTIPLEXING

A multiplexed link

  1. BAND WIDTH

 

  1. BASE BAND SIGNAL

 

  1. BROAD BAND TRANSMISSION

 

  1. ATTENUATION
  2. This is the loss of signal strength (decrease in magnitude and energy) as a signal progressively moves along a transmission medium.
  3. If the signal is not boosted, it will totally be lost along the way and may never reach the destination.
  4. This condition is usually corrected by placing signal amplifiers also called repeater stations along the medium at appropriate distances in order to receive the weak signal, clean it, amplify it then retransmit it.

 

MODES OF DATA COMMUNICATION

  1. Half duplex.
  2. Full duplex.

 

  1. SIMPLEX
    • Communication is only in one direction.
    • They re only meant to send or receive messages.

 

Example

  1. Radio broadcast – the listener cannot communicate back through the radio receiver.
  2. Television broadcast.
  3. Transmission from a computer to a line printer.

 

 

 

 

  1. HALF DUPLEX

 

 

 

 

Example

  1. Walkie talkies
  2. Fax machines.

 

  1. FULL DUPLEX

 

 

 

Example:

  1. Telephone system, a person can talk without waiting for the other to finish.
  2. Computers can send and receive data on a network.

 

TYPES OF COMPUTER NETWORKS

Classified according to size.
  1. Metropolitan Area Network (MAN)
  2. Wide Area Network (WAN)

 

  1. LOCAL AREA NETWORK
  1. Limited geographical area.
  2. High data transmission rates.
  3. Low cost transmission
  4. Low intra-office traffic.

 

  1. Mass storage devices.

 

  1. Work stations.
  2. Network interface cards (NIC)
  3. Network transmission cables.
  4. Network operating systems.
  5. Network accessories.

 

  1. SERVER

 

  1. WORK STATIONS
  1. METROPOLITAN AREA NETWORK (MAN)

 

  1. WIDE AREA NETWORK (WAN)

 

CHARACTERISTICS OF WANs

  1. Unlimited geographical area.
  2. Low data transmission rates.
  3. High transmission link costs.
  4. Long distance transmission.
  5. High degree of vender independence.
  6. Costly to install and maintain.

 

PURPOSE AND LIMITATIONS OF NETWORKING

 

PURPOSE OF NETWORKING

  1. Resource sharing
  2. Remote communication.
  3. Distributed processing facilities.
  4. Cost effectiveness.

 

  1. Resource sharing

 

  1. Remote communication

 

  1. Distributed processing facilities

 

Advantages of distributed data processing:

  1. The failure of the central computer does not affect the operations of the other terminals.
  2. Processing load is shared equally hence no time wastage.

 

  1. Cost effectiveness

 

  1. Reliability

 

LIMITATIONS OF NETWORKING

  1. Security issues.
  2. High initial cost.
  3. Moral and cultural effects.
  4. Spread of terrorism and drug trafficking.
  5. Over-reliance on networks.

 

  1. Security issues

 

  1. High initial cost

 

  1. Moral and cultural effects

 

  1. Spread of terrorism and drug trafficking

 

  1. Over-reliance on networks

 

ELEMENTS OF NETWORKING

A computer network is made up of several standard elements (components) which can be classified into 3 major categories:

  1. Data communication media.
  2. Communication devices.
  3. Networking software.
  4. Data signal.

 

  1. DATA COMMUNICATION MEDIA
  1. Communication using cables (bounded media).
  2. Wireless communications (unbounded media).

 

  1. COMMUNICATION USING CABLES (BOUNDED MEDIA)
  1. Two wire open line cables.
  2. Twisted pair cables.
  1. Fibre optic cables.

 

  1. I) TWO WIRE OPEN LINES CABLES:

 

 

 

 

 

 

 

 

  1. Attenuation: the loss of signal strength (amplitude) as is travels along the cable.
  2. Cross talk: caused by signal coupling between the different cable pairs contained within a multipair cable bundle i.e. interline interference.
  3. Noise: Random unwanted signals picked up by the channel, caused by either cross talk or externally included impulses e.g. from sources like motors, switching equipments, high current equipments etc.
  4. Impendence: this is the resistance offered by the cable to the signal.

 

  1. II) TWISTED PAIR CABLES

 

  1. a) Unshielded Twisted Pair (UTP)
  1. They do not have a shield that prevents electromagnetic interference (EMI) also called (electric noise” from the environment like lightening sparks, radio signals and radiations from spark plugs in motor vehicles.
  2. They are therefore not suitable for environments that are electrically “noisy”.

 

  1. b) Shielded Twisted Pair (STP)

 

Category Suitable for transmitting Speed (max. limit)
1 Voice Less than 1 Mbps
2 Data 1 Mbps
3 Data 16 Mbps
4 Data 20 Mbps
5 Data 100 Mbps

 

KEY:

 

Advantages of twisted pair cables:

  1. They can support high data rates (bandwidth) of up to 100 Mbps.
  2. Telephone systems use UTP which is present in most buildings hence it is easier to set up a network media because connection is already available.
  3. Installation equipment is cheap and readily available.
  4. It is cheap because of mass production for telephone use.

 

Disadvantages of twisted pair cabling

  1. Suffers high attenuation – a repeater is needed to amplify the signal.
  2. It is sensitive to electromagnetic interference and eavesdropping (tapping into communication channels to get information).
  3. It has low data transmission rates as compared to other cables.

 

III) COAXIAL CABLES

 

Types of coaxial cables:

  1. a) Thin coaxial cable (Thinnet)

 

  1. b) Thick coaxial cable (Thicknet)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Advantages of coaxial cables

  1. They are very stable even under high load.
  2. Have a large bandwidth – up to 1Gbps compared to twisted pair.
  3. Can carry voice, data and video signal simultaneously.
  4. More resistant to radio and electromagnetic interference than twisted pair cables.
  5. Extensively used for longer distance telephone lines and as cables for closed circuit TV.
  6. Many are packaged in bundles that can handle 15000 telephone calls simultaneously.
  7. Have a higher immunity to noise distortion and data loss.

 

Disadvantages of coaxial cables

  1. Thick coaxial cables are hard to work with.
  2. They are relatively expensive to buy and to install as compared to twisted pairs especially for longer distance transmission.
  3. They are vulnerable to tapping.
  4. Attenuation for long distance transmission.

 

  1. IV) FIBRE OPTIC CABLES

 

 

 

 

 

 

 

 

 

 

 

 

 

Fibre network.

 

 

Types of fibre optic cables

  1. Single mode fibre.
  2. Multimode fibre.

 

  1. a) Single mode fibre

 

  1. b) Multimode fibre cable

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The fibre optic cable is made up of:

  1. The Core.
  2. Buffer
  3. Strength member.

 

 

  1. a) The core:

 

  1. b) Cladding:

 

  1. c) Buffer:

 

  1. d) Jacket:

Advantages and features of fibre optic cables

  1. Offer high quality transmission of signals.
  2. Light weight – a normal glass fibre is the size of a human hair.
  3. Can transmit voice, data and video signals simultaneously.
  4. Have a large bandwidth (up to 1Gbps).
  5. Low cross talk.
  6. Immune to interference and eavesdropping.
  7. More resistant to radio and electromagnetic interference.
  8. Long distance can be covered because they have low attenuation.
  9. Can be used in hazardous places – high flammable, because the do not generate electrical signals.
  10. Can withstand extreme temperatures – up to 10000

 

Disadvantages of fibre optic

  1. Connectivity devices and the media are expensive.
  2. Installation is difficult because the cable needs careful handling.
  3. Relatively complex to configure.
  4. A broken cable is difficult and expensive to repair.
  5. Expensive for shorter distances.
  6. Prone to water seepage and freezing.

 

  1. WIRELESS COMMUNICATION (UNBOUNDED MEDIA)
    • Type of media used to transmit data from one point to another without using physical connections.
    • A transmitting antenna and receiver aerial are used to facilitate the communication.

 

Examples of wireless transmission media:

  1. Infrared transmission.
  2. Bluetooth technology.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. I) MICROWAVE TRANSMISSION

 

 

 

 

  1. II) SATELLITE COMMUNICATION

 

Main Components of a satellite transmission system

  1. Transmitter earth station:

 

  1. A satellite:

 

  1. Receiving earth station:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

III) RADIO COMMUNICATION

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. a) High frequency (HF) radio waves

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. b) Very high frequency (VHF) radio waves

 

  1. c) Ultra high frequency (UHF) radiowaves.

 

  1. IV) BLUETOOTH TECHNOLOGY

 

  1. V) INFRARED TRANSMISSION

 

Advantages of wireless communications

  1. Wireless medium is flexible in operation as compared to bounded media i.e. devices can be moved around without losing access to the network.
  2. Wireless networks can span large geographical areas easily.
  3. It can take place via satellite even in very remote areas that do not have high cost physical infrastructure like telephone lines.

 

Disadvantages of wireless communications

  1. Relatively difficult to establish or configure.
  2. The initial cost is very high.

 

COMMUNICATION DEVICES

  1. Modems and codecs.
  1. Access points.

 

  1. I) NETWORK INTERFACE CARDS (NIC)

 

  1. II) MODEMS AND CODECS

III) HUBS Illustration pg 24

 

  1. IV) BRIDGES illustration pg 25.

 

Purpose of using a bridge:

  1. To extend the length and number of stations that a segment can support.
  2. Reduce overall traffic flow by allowing broadcasts only in the data destination segment of the NT.

 

 

  1. IV) REPEATERS

 

  1. V) ROUTERS

 

  1. VI) GATEWAYS Illustration pg 27

A gateway is any device that can be configured to provide access to wide area networks or Internet.

One such device is the router in which the gateway software is installed.

A gateway is the most powerful network and internetwork connectivity device because of its ability to convert data across different network architectures and protocols.

 

VII) SWITCHES Illustration pg 28

 

WIRELESS COMMUNICATION DEVICES

 

  1. I) ACCESS POINTS (AP)

 

 

  1. II) WIRELESS ANTENNAE

 

III) PERSONAL COMPUTER MEMORY CARD INTERNATIONAL ASSOCIATION (PCMCIA) card.

 

NETWORK SOFTWARE

  1. Network operating systems.
  2. Network protocols.

 

  1. NETWORKING OPERATING SYSTEMS

 

Main network related functions of NT O.S.

  1. Provides access to network resources e.g. printers.
  2. Enables nodes on the NT to communicate with each other more efficiently.
  1. Respond to requests from application programs running on the network.
  2. Supporting NT services like NT card drivers and protocols.
  3. Implementing NT security features.

 

  1. Secure the network against unauthorized access.
  2. Track network usage and keep a log/record of all the people who use the network.
  1. Performance monitoring to ensure maximum throughput on the network.

 

Examples of NT operating systems:

  1. Windows NT/2000/2003
  2. UNIX
  3. Linux
  4. Novel Netware.

 

NB:

 

  1. PROTOCOLS

 

WORKING MECHANISM OF PROTOCOLS

 

  Layer Function
7 Application layer User applications run here and generate requests for data transmission or open received information.
6 Presentation layer Adds formatting, display and encryption information to the data being sent.
5 Session layer Sets up data transmission sessions between two communicating devices.
4 Transport layer Manages data transfer over the network to ensure reliability.
3 Network layer Address information is added to the packet and routing to destination.
2 Data link layer Adds error checking information and prepares data for going onto the physical connection.
1 Physical layer The data packets are finally transmitted via the network card through the transmission media in form of bits.

 

Application layer protocols:

 

Examples of application protocols:

  1. An e-mail program that enables composing or reading of e-mail messages.
  2. Simple mail transfer protocol (SMTP) – An Internet protocol for transferring e-mails.
  3. File Transfer Protocol (FTP) – for file transfer.
  4. Apple talk and apple share – Apple computers networking protocol suit.

 

Transport layer protocols:

 

Examples of transport protocols

  1. Transmission control protocol (TCP) – Responsible for delivery of sequenced data over the network.
  2. Sequential Packet Exchange (SPX) – Part of the Novell’s internet work packet exchange/sequential packet exchange (IPX/SPX) for sequenced data.
  3. NetBEUI: a local area network protocol for Microsoft and IBM networks that establishes communication sessions between computers.
  4. Apple transaction protocol: (ATP): Apple computer’s communication session and data transport protocol.

 

Network layer protocols

 

Examples of network layer protocols

  1. Internet protocol (IP) – it does packet forwarding and routing.
  2. Internetwork packets exchange: Netwares protocol for packet forwarding and routing.
  3. NetBEUI: provides data transport services, Netbius sessions and applications.
  4. DATA SIGNAL

 

NETWORK TOPOLOGIES

Topology:

  1. logical topology.
  2. Physical topology.

 

  1. LOGICAL TOPOLOGY

 

Examples of logical topology

  1. i) Ethernet topology.
  2. ii) token ring topology.

 

  1. I) ETHERNET TOPOLOGY

 

  1. II) TOKEN RING TOPOLOGY

 

  1. PHYSICAL TOPOLOGY

 

 

 

Examples of physical topology

  1. i) Star topology.
  2. ii) Bus topology.

iii) Ring topology.

  1. iv) Mesh topology.
  2. v) Tree/hierarchical topology.

 

  1. STAR TOPOLOGY

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Star topology

 

ADVANTAGES OF STAR TOPOLOGY

  1. Star networks are easy to configure.
  2. network failures due to cables breakdown are low since cables are not shared.
  3. failure of any computer does not affect communication in the NT, unless it has major effects on the host computer.
  4. wiring hubs increases flexibility for growth i.e. additional and deletion of nodes does not involve interfering with the others.
  5. allows centralization of key networking resources like concentrators and servers.
  6. gives the NT administrator a focal point for NT management. It is easier for the administrator to troubleshoot and diagnose NT related problems.

Disadvantages of star topology

  1. If the central hub fails, the entire network will be grounded.
  2. Installation is time consuming; each node forms a segment of its own.
  3. It is costly, requires one complete cable per computer.

 

  1. BUS TOPOLOGY

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Bus topology

 

Advantages of bus topology

  1. It is easy to install.
  2. Requires less physical lines hence less costly.
  3. It is independent i.e. any single computer can’t affect communication between other computers.
  4. Easy to expand, just need to add the new computer on the line.

 

 

 

 

Disadvantages of bus topology

  1. Only one node can transmit signals at a time.
  2. Failure or fault in the transmission line affects the whole communication network.
  3. Troubleshooting a cable fault is difficult.
  4. Limits the number of computers that can be connected to the cable. Increase in the number of computers results in an increased collision as machines compete for transmission.

 

III. RING TOPOLOGY

 

Advantages of ring topology

  1. They use short length cables – less costly.
  2. Simple to install.
  3. Very effective where there is distributed data processing.
  4. More reliable because of alternate routing if one computer breaks down.
  5. The packet delivery time is fixed and guaranteed.

 

Disadvantages of ring topology

  1. Installation requires sophisticated software.
  2. Delays in communication are directly proportional to the number of nodes the message has to pass through.
  3. Requires a lot of reconfiguration when new nodes are added.
  4. Troubleshooting can be difficult.
  5. Token management must be robust because loss or corruption of the token can cause chaos.
  6. One device or media breakdown may affect the entire network. However, this is not the case with IBM token ring where a device called Multi Station Access Unit (MSAU) is used for station bypass in the event a station fails.
  7. Modification may be difficult because adding or removing a device can disrupt the entire network.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ring topology

 

  1. IV) MESH TOPOLOGY

 

Advantages of mesh topology

  1. The network is reliable and effective due to direct relationship between the computers.
  2. Point to point connections optimize throughput of data.
  3. The NT can still operate even when a node breaks down or a connection breaks.

 

Disadvantages of mesh topology

  1. It is expensive on cable due to redundant links.
  2. Administration of the network is difficult because of the peer to peer connections.

 

  1. V) TREE/THERARCHICAL TOPOLOGY
    • A hybrid topology.
    • Groups of star – configured networks are connected to a linear bus backbone.
    • It can also be derived out of breeding a combination of other networks.

Advantages of tree topology

  1. Failure of one or more nodes does not affect the whole network.
  2. Failure of a single branch does not bring the whole network down.

 

Disadvantages of tree topology

  1. Communication path can sometimes become quite long.
  2. Installation can become costly and complex.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Tree topology

 

SETTING UP PEER – TO – PEER LAN

Hardware requirements

  1. A computer running on any version of Ms Windows especially Windows 9x/2000/Me/Windows Xp.
  2. Network interface card (NIC). Some computers may have it already installed onboard so that you do not have to purchase one.
  3. A hub or a switch.
  4. Transmission media preferably unshielded twisted pair category 5.
  5. RJ45 connectors.

 

Tools

  1. Crimping tool.
  2. Cable tester.
  3. Screw drivers.

NETWORK SECURITY

 

  1. a) Share level security

 

  1. b) User-level utility

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

APPLICATION AREAS OF ICT NOTES

 

 

INTRODUCTION

 

APPLICATION AREAS

1. Financial systems. 9. Entertainment systems
2. Retail systems. 10 Transportation system
3. Reservation systems 11 Home use
4. Educational systems 12 Office expert systems
5. Communication systems 13 Marketing
6. Industrial systems 14 Virtual reality systems
7. Scientific and research systems 15 Law enforcement systems
8. Library systems

 

  1. FINANCIAL SYSTEMS
  1. Payroll systems.
  2. Accounting systems.
  3. Banking systems.

 

  1. PAYROLL SYSTEMS

 

  1. ACCOUNTING SYSTEMS

 

There are five major/key business accounting activities/subsystems as outlined below:

  1. Customer order and entry.
  2. Inventory management.
  1. Accounts receivable.
  2. Accounts payable.
  3. Cash book.

 

  1. I) CUSTOMER ORDERS ENTRY AND BILLING

 

  1. II) INVENTORY MANAGEMENT

 

III) GENERAL LEDGER ACCOUNTING

 

  1. IV) ACCOUNTS RECEIVABLE

 

  1. V) ACCOUNTS PAYABLE

 

  1. VI) CASH BOOK

 

  1. BANKING SYSTEMS
  1. Processing customer transactions.
  2. Cheque clearing and processing.
  1. Internet banking.
  2. Mobile banking.

 

  1. I) PROCESSING CUSTOMER TRANSACTIONS

 

  1. II) CHEQUE CLEARING AND PROCESSING

 

III) ELECTRONIC FUNDS TRANSFER (EFT)

 

  1. IV) INTERNET BANKING (e-banking)

 

  1. V) MOBILE BANKING (m-banking)

 

  1. RETAIL SYSTEMS
  1. Stock control.
  2. Transactions handling at the EPOST.
  3. I) STOCK CONTROL
  1. Storing full details of the items held in stock i.e. immediately available.
  2. Proving users with up-to-date information regarding stock items and prices.
  3. Monitoring stock levels so that items can be ordered in good time.
  4. Storing details of suppliers of stock items.
  5. Storing details of pending orders.

 

  1. II) POINT-OF-SALE TERMINAL (P-OST, E-POST)
  1. The BCR (wand) is passed over the item’s bar code.
  2. The barcode is automatically converted to the item number e.2. 2160, which is read to the computer.
  3. Using the number, the computer searches for the item from a master file with a corresponding number in the products database.
  4. Once the record is found, its description and price lookup file is used for processing the sale.

 

Advantages:

  1. Correct prices are used at the checkout counter.
  2. It is faster since the attendant does not have to enter details manually.

 

  1. RESERVATION SYSTEMS:

 

  1. EDUCATIONAL SYSTEMS
  1. Computer Aided Instruction (C.A.I.)
  2. Computer Aided Learning.
  1. Computer based Simulation.

 

  1. I) COMPUTER AIDED INSTRUCTION (C.A.I.)

 

 

  1. II) COMPUTER AIDED LEARNING (C.A.L.)

 

III) ELECTRONIC LEARNING (e-learning)

  1. Learning time is reduced, thorough and consistent.
  2. Instant availability of courses at any time.
  3. Eliminates the need for classroom instructors.
  4. Minimizes travel time, costs and time away from the workplace.
  5. Learners do not need to go physically to a college.

 

  1. IV) COMPUTER BASED SIMULATION

 

  1. COMMUNICATION SYSTEMS

 

 

Examples of communication systems are:

  1. Facsimile (Fax)
  1. Video conferencing.

 

  1. I) FACSIMILE (FAX)

Advantages of facsimile communications:

  1. The ability to transmit an image over long distances is less than 10 seconds.
  2. The ability to confirm the receipt of a transmission quickly.
  3. Low cost for high-volume operations.
  4. There is guaranteed security – the transmitted image is sent as a digitized code (which can be scrambled) rather than a usable picture.
  5. Convenience – the ability to store the resultant image on a computer file instead of apiece of paper.

 

  1. II) RADIO COMMUNICATION
  1. Record and manage radio programmes meant for broadcasting.
  2. Manage the radio transmission and track performance.
  3. Automate the running of the selected programmes.
  4. Create slides, simulated objects and sound effects when preparing electronic and printed media advertisements.
  5. Download information from Internet that can be used in preparing programmes such as international news.

 

III) TELEVISION SETS

  1. Teletext (ceefax)
  2. Videotext (view data)

 

  1. a) Teletext

 

 

  1. b) Videotext (viewdata)

 

  1. IV) VIDEO CONFERENCING

 

  1. V) TELECOMMUTING
  1. Mothers with small children.
  2. Handicapped workers.
  3. Individuals whose fields work take them far from the office.

 

  1. May use less office supplies like photocopying.
  2. Do not occupy valuable office space.
  3. Do not waste time commuting in cars, trains or buses.
  4. Do not waste time conversing idly or suffering the petty distractions of office life.
  5. VI) THE INTERNET
  1. world wide web (www)
  2. electronic mail (e-mail)

 

  1. a) World wide web (www)

 

  1. b) Electronic mail (e-mail)

 

Advantages of e-mail:

 

  1. INDUSTRIAL SYSTEMS
    • Industrial plants such as motor vehicle manufactures, chemical plants, refineries and mining plants use computer systems in the following ways:
  2. Computer Aided Design and Manufacturing

 

  1. I) CAD and CAM
  2. CAD/CAM is an integrated system that allows products that have been designed to be transmitted into an automated manufacturing system for the product to be manufactured as per the computer model.
  3. The computer model is designed using special software, usually capable of displaying 3D representations of solid objects, which allows the designer to view the object from different angles and modify the design until it is satisfactory.
  4. The CAD software will often generate a 3D view from a plan, side elevation and front elevation of the object.
  5. The final design can therefore be used directly to create manufacturing information and to provide information on quantities of materials required to produce the item.

 

CAD hardware:

  1. a graphics workstation that allows the designer to interactively create a drawing.
  2. A high resolution screen (display) to show drawings in colour and in fine detail.
  3. Fast processors with a great deal of memory.

 

USES OF CAD AND CAM SYSTEMS:

  1. Engineering designs for roads, chemical plants, machine parts, aircrafts, cars etc.
  2. Pattern design for clothing, architectural design and kitchen design.
  3. Robotics for carrying out assembly line operations, welding, lifting heavy objects, spray painting of vehicle bodies etc.

 

  1. II) INDUSTRIAL SIMULATION
  1. in aviation where computers are used for training pilots, where a pilot feels as if he were controlling an actual aircraft.
  2. In engineering, models are simulated to test performance under various conditions e.g. the strength of material to be used for building a bridge can be tested using simulators.
  3. In medicine, simulation can be used to train doctors on operation techniques.

 

III) PROCESS CONTROL

 

 

 

 

  1. SCIENTIFIC AND RESEARCH SYSTEMS
  1. Weather forecasting
  2. Medical research

 

 

  1. I) WEATHER FORECASTING

 

 

  1. II) MEDICAL RESEARCH

 

III) POLICE MILITARY AND SPACE EXPLORATION SCIENCE

 

  1. LIBRARY SYSTEMS
  1. Lending system.
  2. Inventory control system.

 

  1. I) LENDING SYSTEM:

 

 

 

  1. II) INVENTORY CONTROL:

 

III) CATALOGUING

 

  1. ENTERTAINMENT SYSTEMS
  1. Music and video.

 

  1. I) GAMES

 

  1. II) MUSIC AND VIDEO

 

  1. TRANSPORTATION SYSTEMS
  1. Automobile traffic control.
  2. Air traffic control.

 

  1. I) AUTOMOBILE TRAFFIC CONTROL

 

  1. II) AIR TRAFFIC CONTROL

 

III) SHIPPING CONTROL

 

  1. HOME USE

 

  1. OFFICE EXPERT SYSTEMS

 

  1. MARKETING
  1. E-commerce or e-business.
  2. Electronic presentations.

 

  1. I) E-COMMERCE / E-BUSINESS

 

  1. II) ELECTRONIC PRESENTATION

 

III) ADVERTISING

 

  1. VIRTUAL OR ARTIFICIAL REALITY
  1. Head mounted display / head gear.
  1. Virtual reality software.

 

  1. I) HMD/head gear

 

  1. II) GLOVES

 

III) BODY SUIT

 

 

 

  1. IV) VIRTUAL REALITY SOFTWARE

 

APPLICATION OF VIRTUAL REALITY

 

  1. LAW ENFORCEMENT SYSTEMS

 

PERSONAL NOTES

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

IMPACT OF INFORMATION TECHNOLOGY ON SOCIETY

 

 

 

ISSUES RESULTING FROM THE USE OF ICT

An impact is a positive or a negative effect. ICT sector, like any other sector has its positive and negative effects at different levels in society.

  1. Effects on employment.
  2. Effects on automated production.
  3. Issues of workers’ health.
  4. Environmental issues
  5. Cultural effects.
  6. Breakthrough in ICT.

 

  1. EFFECTS ON EMPLOYMENT:

The introduction of computers in the workplace has resulted in the following:

  1. Creation of new jobs.
  2. Replacement of computer illiterate workers.
  3. Displacement of jobs that were formerly manual.

 

  1. JOB CREATION:

 

  1. JOB REPLACEMENT:

 

  1. JOB DISPLACEMENT:

 

 

 

  1. EFFECTS ON AUTOMATED PRODUCTION:

 

ADVANTAGES OF USING AUTOMATED PRODUCTION:

  1. Increased efficiency due to the balancing of workload and production capacity.
  2. Improved customer service because of adequate and high quality goods
  3. Faster which are produced in time.
  4. Efficient utilization of resources such as raw materials, personnel and equipment hence
  5. Less operating expenses incurred.
  6. Helped in reduction of accidents in sectors like mining and chemical production where much work is potentially hazardous.

 

DISADVANTAGES:

  1. High initial cost of setting up an automated system.
  2. May lead to unemployment in some areas that are labour intensive.
  3. Possible lack of compatibility with software and hardware.
  4. Overreliance on automated systems leads to laziness.
  5. Resistance to change.

 

REASONS WHY EMPLOYEES MAY RESIST AUTOMATED SYSTEMS

  1. Fear of change: people are creatures of habits and hence are afraid of change.
  2. Fear of loosing their jobs: people usually associate the computer with loss of jobs and hence they will be afraid that they might end up loosing their jobs.
  3. Fear of failure: since the computer is very new in a given working environment, the people will be afraid that they might never adapt to it.
  4. Loss of control: the management will be afraid that once a computer is implemented they might lose control of the organization.
  5. Lack of understanding: the user may not understand the benefits of the computer system in their jobs; hence this will create resistance since the computer will be looked upon as an intruder.

 

  1. ISUES OF WORKERS HEALTH
  1. Repetitive Strain Injuries (RSI)
  2. Eye Strain and Headaches.
  3. Electromagnetic emissions.
  4. Radiation and visual display unit.
  5. Computer chip toxin.

 

  1. RSI – REPETITIVE STRAIN INJURIES

 

Remedy for RSI:

  1. Sitting in a relaxed position.

 

  1. EYE STRAIN AND HEADACHES:
  1. Eye strain.

 

 

 

 

 

Remedies:

  1. Use monitors with good resolution.
  2. Fit monitors with antiglare screens that filters excess light.
  1. Use flat panel screens that do not emit so many radiations.
  2. Use good overhead fluorescence tubes.
  3. Avoid flickering monitors and lighting systems.

 

  1. ELECTROMAGNETIC EMMISIONS:

 

  1. STRESS:

 

 

  1. ISOLATION:

 

  1. RADIATION AND VISUAL DISPLAY UNIT:

 

  1. COMPUTER CHIP TOXIN:

 

ERGONOMICS:

 

  1. ENVIRONMENTAL ISSUES:
  2. Energy consumption and radiation:

Initially, computers consumed a lot of energy thereby generating a lot of heat and emitting electromagnetic radiations which are harmful to the user.

Remedy:

  1. Environmental issues:

 

 

 

 

 

 

  1. CULTURAL EFFECTS
  2. i) Moral effects:

 

  1. ii) Computer crimes:

 

 

TYPES OF COMPUTER CRIMES

  1. Data manipulation: Refers to altering data that enter or exit a computer e.g. changing data on a certificate.
  2. Time bomb: This is the coding of a computer program to destroy itself after it has been run a certain number of times.
  3. Computer virus: A program entered into a computer with the aim of destroying or altering data and spreading the destruction to other computers on a network.
  4. Trap door: Creating of a special password that gives its creator a sole access to the system.
  5. Data stealing: Using a computer to steal information that has been gathered for someone else for illegitimate purpose.
  6. Eavesdropping: Tapping without authorization into communication lines over which computer data and messages are sent.
  7. Industrial espionage: Using computer to steal designs, marketing plans or other trade secrets from one company and selling them to another company.
  8. Piracy: This is making unauthorized copies of copyrighted computer software.
  9. Fraud: This is the use of computers to cheat other people with the intention of gaining money or information.
  10. Sabotage: This is the illegal destruction of data and information with the aim of causing great loss to an organization.
  11. Logic bomb: It is a program that is executed when a certain set of condition is made e.g. a fired employee can load a logic bomb to a computer to destroy when records are updated in a database.

 

BREAKTHROUGHS IN ICT:

There have been a lot of breakthroughs in the fields of:

 

EVOLUTION OF COMPUTER SYSTEMS:

Future trends in ICT will be characterized by:

  1. Rapid evolution in computer hardware and software.
  2. Artificial intelligence.
  3. Expanded information superhighway.

 

 

 

 

  1. RAPID EVOLUTION IN COMPUTER HARDWARE AND SOFTWARE

 

  1. ARTIFICIAL INTELLIGENCE (A.I.):

 

  1. Expert systems.
  2. Natural language processing.
  3. Voice recognition.
  4. Voice synthesis.
  5. Computer vision
  6. Artificial neural networks.
  7. Robotics/perception systems

 

 

 

 

 

 

 

 

 

  1. EXPERT SYSTEMS:

 

COMPONENTS OF AN EXPERT SYSTEM:

  1. i) Knowledge base:

This is the database/store of knowledge about a particular subject. It contains relevant facts, believes, assumptions and procedures for solving a particular problem.

 

  1. ii) Inference engine:

This is Software that controls the search for knowledge in the knowledge base and produces conclusions. It takes the problem posed/given by the user and seeks to analyze it in order to arrive at a conclusion.

 

This is the display screen that enables the user to interact with the system.

EXAMPLES OF EXPERT SYSTEMS:

  1. i) MYCIN: used for diagnosis of blood and treatment of bacterial infections.
  2. ii) DELTA: for maintaining locomotives.

iii) MUDMAN: predicting mineral deposits in geological exploration by analyzing composition of soil samples.

  1. iv) STEAMER: training boiler room technicians in the navy.
  2. v) R-1: designing computer systems for customers.

 

ADVANTAGES OF EXPERT SYSTEMS:

  1. They can perform some tasks much faster than a human being.
  2. They can easily identify faults in equipment.
  3. The computer can store much more information than a human.
  4. The system gives impartial and consistent recommendations.
  5. The computer does not ‘forget’ or make mistakes.
  6. Data can be kept up to date.
  7. Always available 24 hours a day and will never retire.
  8. The system can be used at a distance over a network.

 

DISADVANTAGES OF EXPERT SYSTEMS:

  1. They can make mistakes and fail to learn from them.
  2. They work best when the problem is specific and well defined hence complex and costly to design.
  3. They lack human touch i.e. they can’t be questioned further.
  4. Heavy use of them can make human experts lose their jobs.

 

 

 

  1. NATURAL LANGUAGE PROCESSING:
  1. VOICE RECOGNITION:
  1. i) Words with similar sounds.
  2. ii) Different people pronounce same words differently.

iii) One word has multiple meanings.

  1. iv) Background noise etc.

 

  1. VOICE SYNTHESIS:

 

  1. COMPUTER VISION:

 

  1. ARTFIFICIAL NEURAL NETWORKS:
  1. i) The neurodes can be trained to distinguish between what constitutes a signal and what does not.

 

 

  1. ii) They are capable of recognizing patterns in large amounts of data that are too complex for the human brain. From these patterns, they can make predictions and point out anomalies.

 

EXAMPLE:

In banking, the pattern of credit card usage can be tracked over time to try and generalize spending patterns of individual card owners. Incase of loss or theft, the bank can notice the change of spending pattern and conclude that the card is in the wrong hands, hence take appropriate security measures even before loss of the card is reported.

 

  1. ROBOTICS/PERCEPTION SYSTEMS:
  1. i) Feeling the shape of an object.
  2. ii) Listening to ultra sound.

iii) Detecting smell of leaking gas/chemicals.

  1. iv) Testing quality of food.
  2. v) Seeing using two miniature video cameras.

 

ADVANTAGES OF ROBOTS

  1. They can work 24/7 all year round without getting bored or taking a break.
  2. They can work faster than human.
  3. Productivity is very high.
  4. The output is of a consistently high quality.
  5. They can work to great degrees of accuracy than human workers.
  6. They can work in conditions that would appear hostile or dangerous to humans.

 

DISADVANTAGES OF ROBOTS:

  1. They are expensive to build, install and maintain.
  2. Not flexible as they are designed to do one job.
  3. The robot may malfunction and cause a lot of chaos or a batch of faulty goods.
  4. They take up the job of many people, leading to being sacked.
  5. Evil people may use robots in war to manipulate biological material.

 

THE LAWS OF ROBOTICS:

  1. A robot must not injure a human being or, through inaction, allow a human being to come to harm.
  2. A robot must always obey orders given to it by a human being, except where it would conflict with the 1st
  3. A robot must protect its own existence, except where it would conflict with the 1st and 2nd

 

EXPANDED INFORMATION SUPERHIGHWAY

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CAREER OPPORTUNITIES IN INFORMATION COMMUNICATION TECHNOLOGY (ICT)

 

 

ICT has created new job titles. Some of the computer career opportunities include:

 

  1. SYSTEM ANALYST:

Responsible for analyzing a company’s needs or problems then design and develop a computer based information system.

 

QUALITIES OF A GOOD SYSTEM ANALYST:

  1. Should have good problem solving skills and creativity i.e. must have wide experience in solving problems.
  2. Should have good communication skills i.e. be able to communicate clearly and precisely to different groups.
  3. MUST have business knowledge i.e. understand the environment for which the system is being developed.
  4. Must have technical knowledge i.e. well trained in relevant areas of computer science.
  5. Must have general knowledge of the firm including its goals and objectives.
  6. Should have knowledge of data processing methods and current hardware and familiarity with available programming language.

 

DUTIES OF A SYSTEM ANALYST:

  1. Gather, record and analyze facts of the system.
  2. Design new system and recommend changes to existing systems.
  3. Prepare instruction manuals.
  4. Co-ordinates training for users of new systems.
  5. Work with programmers to construct and test the system.
  6. Prepares system specifications.
  7. Co-ordinates the implementation of new or modified system.

 

  1. CHIEF PROGRAMMER/PROGRAMMING MANAGER:

Reports to data processing manager what has been reported by programming group, junior and senior programmers.

 

DUTIES OF CHIEF PROGRAMMERS;

  1. Managing the programmers.
  2. Liaising with the system analyst.
  3. Review and control program documentation.
  4. Reviews program’s performance.
  5. Ensures that all programs are well tested before put into use.
  6. Reviewing all the system specifications before handover to programmers.

 

 

  1. COMPUTER PROGRAMMERS:

These are people whose work entails coding i.e. formulating instructions for the computer to solve given problems.

QUALITIES OF PROGRAMMERS:

  1. Good command of programming language in use.
  2. Knowledge of general programming methodology and relationship between programs and hardware.
  3. Creativity for developing new problem solving methods.
  4. Patience and persistence.

 

DUTIES OF PROGRAMMERS:

  1. Coding computer program using appropriate programming language.
  2. Testing of programs for logical errors, syntax and semantic errors.
  3. Debugging of programs.
  4. Documenting programs i.e. writing manuals.
  5. Designing and implementing programs.
  6. Maintaining and reviewing existing computer programs.

 

  1. DATABASE ADMINISTRATOR:

A person responsible for the design and implementation of the database.

The major purpose of computerizing an organization or institution is to store data in an organized way for easy access, retrieval and update.

 

DUTIES:

  1. Responsible for the design and control of organization database.
  2. Controls and monitors database usage through assignment of user passwords.
  3. Keeping the database up-to-date by adding new records, or deleting unnecessary records.
  4. Establishing the appropriate content and format of data records.

 

  1. SOFTWARE ENGINEER:

Person skilled in software development and technical operation of computer hardware.

 

DUTIES:

  1. a) Developing system and application software.
  2. b) Developing user and technical documentation for the new software.
  3. c) Maintaining and updating the software to meet day-to-day requirements.

 

 

  1. COMPUTER ENGINEER:

Specialized personnel whose duties are to assemble the computer systems.

 

DUTIES:

  1. Design and develop computer components e.g. motherboards, storage devices etc.
  2. Design and develop engineering and manufacturing computer controlled devices such as robots.
  3. Re-engineer computer components to enhance its functionality and efficiency.
  4. WEB DESIGNERS:

They design website using various software tools. These webs contain pages where individuals and organizations can advertise themselves when promoting the products.

 

  1. WEB ADMINISTRATORS:

They administrate the organization’s websites by making sure the website is updated periodically to give the right information.

 

DUTIES:

  1. a) Developing and testing websites.
  2. b) Monitoring the access and use of internet connection by enforcing security measurers.
  3. c) Downloading information needed by an organization from internet website.
  4. d) Maintaining, updating and modifying information on the website.
  5. COMPUTER OPERATOR:

This is a person who interfaces the user demands to the computer hardware by use of a set of special instructions known as commands.

 

DUTIES:

  1. a) Entering data into the computer for processing.
  2. b) Keeping up-to-date records of all information processing activities.
  3. c) Responsible for the general equipment layout within the computer room.
  4. d) Activating the computer to obey programs through use of commands.
  5. e) Mounting the storage media e.g. disk to their drives.

 

  1. COMPUTER TECHNICIAN:

These are members of the technical staff whose job is to service and repair computers.

Given that computers require regular maintenance, upgrading as well as emergency repairs, demand for computer technicians continues to grow as more people computerize their workplaces and homes.

 

DUTIES:

  1. Troubleshooting computer hardware and software related problems.
  2. Ensuring that all computer related accessories such as printers, storage media etc are in good condition.
  3. Assembling and upgrading computers and their components.
  4. Help hardware engineers in designing and creating some computer components such as storage devices, motherboards etc.

 

 

 

  1. DATA PROCESSING MANAGER:

This is the person in the data processing department within the organization whose major duty is to ensure that the organization’s needs are met.

 

DUTIES AND RESPONSIBILITIES:

  1. In charge of data and information flow within the department.
  2. Responsible in data collection and preparation.
  3. Purchase of hardware and other facilities and their management.
  4. Software development and maintenance.
  5. Assessment and evaluation of staff performance.

 

  1. INFORMATION SYSTEM MANAGER:

This person controls, plans, staffs, schedules and monitors all the activities of the ICT department in the organization. Using computerized management information system (MIS), the manager can test the impact that an alternative course of action might have on business.

 

RESPONSIBILITIES:

  1. Making sure that all tasks in the IT department are done correctly and on time.
  2. Preparing budgets for the departments.
  3. Keeping the department inventory records up-to-date.
  4. Managing the human resource within the department.

 

  1. COMPUTER TRAINER:

Specialized personnel in the field of computing and well conversant with various disciplines and computer related issues which they can execute with ease.

 

RESPONSIBILITIES:

  1. Training people on how to use computers and various application programs.
  2. Developing training reference materials.
  3. Guide learners on how to acquire knowledge through carrying out research.
  4. Advising the learners on the best career opportunities in the broad field of ICT.
  5. Preparing learners for ICT examinations.

 

  1. NETWORK ADMINISTRATOR:
  2. Specialist who oversees the smooth running of network system in an organization.

 

RESPONSIBILITIES:

  1. a) Setup computer network.
  2. b) Maintain and enforce security measures on network.
  3. c) Monitor the use of network resources.
  4. d) Maintain and troubleshoot network related problems.

 

 

  1. COMPUTER TYPESETTERS:

Graphic designers and typesetters are required in order to design graphical objects and professional publications e.g. books, newspapers and magazines.

 

  1. LIBRARIAN:

Responsible for keeping the files in various storage devices and for the physical security of the storage media.

 

DUTIES:

  1. Ensures that there are enough physical files available for use.
  2. Maintains the external files labels.
  3. Ensures duplicates files are kept.
  4. Ensures access of files is restricted to authorized persons.

 

  1. SELF EMPLOYMENT:

This can be achieved by using a computer or other ICT devices such as mobile phones to start bureau services, internet services, consultancy services and computer hardware and software vendor business.

 

  1. COMPUTER SALES REPRESENTATIVES:

Should have good knowledge in information ands communication technology. This would help them to analyze customer needs and advice them accordingly. A good computer salesman needs to be self confident, persuasive and proficient in business communication.

 

FURTHER EDUCATIONAL OPPORTUNITIES IN ICT

There are other tertiary institutions in computing where one would further his or her educational ambitions. They include:

  1. Universities.
  2. Polytechnics.
  3. Middle level colleges.
  4. UNIVERSITIES:
  1. a) Public Universities:

Examples:

  1. Jomo Kenyatta university of Agriculture and technology.
  2. Kenyatta University.
  1. Maseno University.
  2. Moi University.
  3. Egerton University.

 

 

  1. b) Private Universities:

Examples:

  1. Daystar University.
  2. Catholic University of Nazareth.
  1. Kabarak university.
  2. Baraton University.
  3. Catholic University of East Africa.

 

Universities are authorized to offer approved Diploma, Undergraduate and Post graduate programmes.

 

ICT RELATED DEGREE PROGRAMMES

  1. Bachelor of computer science.
  2. Bachelor of Information technology.
  1. Bachelor of Science (Computer Networking).
  2. Bachelor of Science (Software Engineering).
  3. Bachelor of Business and Information Technology.

 

ICT RELATED MASTERS PROGRAMS:

  1. Masters in computer science.
  2. Masters in information technology.
  1. Masters in science (computer engineering).

 

  1. RESEARCH INSTITUTIONS:

 

 

  1. POLYTECHNIQUES:

 

EXAMPLES OF POLYTECHNICS THAT OFFER ICT IN KENYA:

  1. Mombasa polytechnic.
  2. Kenya polytechnic.
  1. Kisumu polytechnic.

 

ICT COURSES OFFERED IN POLYTECHNICS:

  1. Computer repair and assembly.
  2. Computer operator.
  1. Computer programming.
  2. Computer networking.
  3. Computer software engineer.
  1. Computer science.
  2. Computer hardware engineer.
  3. Web administrator

 

  1. COLLEGES:

 

EXAMPLES OF COLLEGES:

  1. Rift valley Institute of Science and Technology.
  2. Kaiboi Technical Training Institute.
  3. Thika Institute of Science and Technology.
  4. Kiambu Institute of Science and Technology.
  5. Coast Institute of Science and Technology.
  6. Kirinyaga Technical Training Institute.
  7. Nairobi Technical Training Institute.
  8. Nyeri Technical Training Institute.
  9. Kenya Technical Training Institute.
  10. Kenya Science Teachers College.
  11. Machakos Technical Training Institute.

 

The most important considerations to make before you join a college to pursue an ICT course:

  1. a) Whether it offers ICT courses recognized both locally and internationally.
  2. b) The cost of training with such an institution.

 

EXAMINATIONS BODIES FOR HIGHER DIPLOMA, DIPLOMA AND CERTIFICATES:

  1. a) Information Technology Standards Association (ITSA)
  2. b) Institute of Management Information Systems (IMIS)
  3. c) Kenya National Examinations Council (KNEC).
  4. d) PITMAN.

 

QUALIFICATIONS GAINED ON STUDY ON SITTING FOR AN EXAM:

  1. Diploma in computer studies.
  2. Diploma in computer science.
  1. Higher diploma in information technology.
  2. Certificate in computer studies.
  3. Certificate in information technology.
Exit mobile version