Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TO INFORMATION TECHNOLOGY
What is Information Technology?.............................................................1-1 Hardware..................................................................................................1-2 Software....................................................................................................1-3 Communication........................................................................................1-3 System Components.................................................................................1-3 Types of Software.....................................................................................1-4 Communication Medium..........................................................................1-4
4.3
4.4 4.5
4.3.1 Introduction....................................................................................4-3 4.3.2 Dot Matrix Painters........................................................................4-3 4.3.3 Laser Printers.................................................................................4-4 4.3.4 Ink-Jet Printers...............................................................................4-4 4.3.5 Plotters...........................................................................................4-4 LCD Projectors.........................................................................................4-5 Sound Output............................................................................................4-5
UNIT 5: PROCESSORS.................................................................5-1
5.1 5.2 Introduction..............................................................................................5-2 Components of a CPU..............................................................................5-2 5.2.1 The Control Unit............................................................................5-2 5.2.2 The Arithmetic and Logic Unit......................................................5-2 5.2.3 The Memory...................................................................................5-3 Serial and Parallel Processing...................................................................5-3 Platform....................................................................................................5-4
5.3 5.4
6.4 6.5
ii
8.3
8.4
Spreadsheets.............................................................................................8-4 8.3.1 Introduction....................................................................................8-4 8.3.2 How a Spreadsheet Works.............................................................8-4 8.3.3 Application of Spreadsheets...........................................................8-5 Databases..................................................................................................8-5
10.5
iii
12.3
13.3 13.4
iv
BA332
INTRODUCTION TO COMPUTERS
19.7 19.8
INTRODUCTION TO COMPUTERS
BA332
vi
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
1-7
INTRODUCTION TO COMPUTERS
BA332
1.1
Most successful companies, collect, process and store data. Data are raw facts and everyday, we generate an enormous amount of data. Information is data that has been collected and processed into a meaningful form. Information is necessary for the smooth operations of a successful company and for planning and control. With the large amounts of data that a company has to deal with, a less labour intensive and more efficient method of managing information is required. This is where the technology of the computer is used. Thus, Information Technology refers to the integration of computing technology and information processing. A more formal definition of IT is: The acquisition, processing, storage and dissemination of vocal, pictorial textual and numeric information through the use of computer technology and telecommunication. In an information society, knowledge workers focus their energies on providing a myriad of information services. The knowledge workers job function revolves around the use, manipulation and dissemination of information. Combining the technology of the computer and communication, information can be managed more efficiently. Using IT in business leads to the following benefits: Cheaper Faster More accurate
The technology itself can be divided into computer hardware and software and communications.
1.2
Hardware
Hardware is the physical, tangible equipment that is part of a computer system. Hardware can be classified into the following components, according to the type of work it performs. Input Output Processing Storage
1-8
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
1-9
INTRODUCTION TO COMPUTERS
BA332
2.1
Microcomputers
Microcomputers, also called Personal Computers (PC), are the most recent type of computer to be developed. In 1981 IBM introduced the PCs. They are the smallest types of computers. Conventional PCs have a full keyboard, a monitor, and can function as stand-alone systems. 2.1.1 Types of PCs PCs can be categorised as: Pocket PCs
These are light, compact and highly portable. They have batteries and can operate with or without an external power source. The pocket PC, sometimes called a palmtop, can literally fit into a pocket or a handbag. Laptop PCs
These, at about 3 kilograms, are slightly heavier than the pocket PC. Often called a notebook PC because they are about the size of a thick notebook. The power of the PC may not be related to its size. Some user conveniences must be sacrificed to achieve portability. For instance, input devices, such as keyboards and point-and-draw devices are given less space in portable PCs and may be more cumbersome to use. The display screen on some pocket PCs is monochrome (as opposed to colour) and may be difficult to read under certain lighting situations. Portable computers take up less space and therefore have a smaller capacity for permanent storage of data and programs. Laptop battery life can be as little as a couple of hours for older models to 20 hours for state-ofthe-art rechargeable lithium batteries. Desktop PCs Tower PCs
Desktops and tower PCs are not portable because they rely on an outside power source and are not designed for frequent movement. Typically the desktop PCs monitor is positioned on top of the processing component. The processing component of the tower PC is designed to sit upright. The tower may be placed in any convenient location like the floor, nearby shelf or on the desk. One person at a time uses a PC. The user turns on the PC, select the software to be run, enters the data, and request the information. The PC like other computers is very versatile and has been used for everything from communicating business colleagues to controlling household appliances.
1 - 10
BA332
INTRODUCTION TO COMPUTERS
Unlike the large computers, the processor is contained on one silicon chip, instead of a combination of chips. This processor in a PC is called a microprocessor. The common microprocessors today are the 80486 and the Pentium chips manufactured by Intel. 2.1.2 Configuring a PC: Putting the pieces together A typical multi-media configured PC includes the following A microcomputer (the processor and other electronic components) A keyboard for input A point and draw device for input (usually a mouse) A monitor for soft copy (temporary) output A printer for hard copy (printed) output A permanently installed high capacity hard disk drive for permanent storage of data and programs A floppy disk drive into which an interchangeable diskette, or floppy disk is inserted A CD-ROM drive into which an interchangeable CD-ROM is inserted A microphone (audio input) A set of speakers (audio output)
A PC system is configured by linking a wide variety of peripheral devices to the processor component.
2.2
Network Computers
In contrast to the conventional PC, the network computer or NC is designed to function only when it is linked to a server computer (normally an organisations internal network of computers). The NC looks similar to a PC but with several major configuration differences. First it has a relatively small processor and considerably less RAM than modern personal computers. Second, it does not have a permanent installed disk. And of course, it is less expensive than a stand alone PC. The NC depends on a central network server computer to do much of the processing and for permanent storage data and information.
1 - 11
INTRODUCTION TO COMPUTERS
BA332
Here is the way an NC works. The network user has access to a wide range of applications. However, the software applications are downloaded as they are needed to the NC from a networks central computer. Whether or not to buy into the NC concept is one of major debates in the information technology community. Exchanging PCs for NCs will eliminate the expensive and time-consuming task of installing and maintaining PC-based software, but it will make all NCs dependent on the server computer. If the server goes down, all NCs depending on it go down. In the server computer of the NCs, the processor is much larger than the microcomputers and consists of more than one silicon chip. Similarly, the size of the RAM is significantly larger. The increased size of the CPU enables the server to be used by a number of NC at the same time, perhaps up to fifty. As technology improves, this number will increase. Along the larger processor, the server will employ hard disks with even larger storage capacity as backing storage and will often be used with faster printers.
2.3
Workstations
A workstation looks like a PC except that it is very fast. Speed is one of the characteristics that distinguish workstations from the PCs. In fact, some people talk of workstations as souped-up PCs. The PC was fine for word processing, spreadsheets and games, but for real power users engineers doing computer-aided design or CAD, scientist and researchers who do a lot of number crunching, graphic designers, multimedia content developers, and so on the PC sometimes falls short. The workstations input/output devices also set it apart from a PC. A typical workstation will sport a large-screen colour monitor capable of displaying highresolution graphics. For pointing and drawing, the workstation user can call on a variety of specialised point and draw devices that combine the precision of a gun sight with the convenience of a mouse. Add-on keypads can expand the number of specialised key available to the user. The capabilities of todays high-end PCs are very similar to those of low-end workstations. In a few years, the average PC will have workstation capabilities. Eventually the distinction between the two will disappear and we will be left with a computer category that is a cross between a PC and a workstation.
1 - 12
BA332
INTRODUCTION TO COMPUTERS
2.4
Mainframes
Until the late 1960s, all computers were mainframe computers and they were expensive. Large companies shell out $1.5 million and more for mainframe computers with less power than todays $1,000 PCs. In the late 1960s computer vendors introduced smaller computers that were more affordable for smaller companies. These were called minicomputers. This term is seldom used today. Instead they are called midsized computers. Mainframe computers are designed specifically for the multi-user environment, in contrast to PCs and workstations, which frequently are used as stand-alone computers. The amount of work that can be performed by the mainframe computer system is limited primarily by the speeds of the input/output and storage devices. Mainframe computers have very large processors with several hundred Megabytes of RAM. This allows them to be used by many users at the same time, maybe 200 or more. This type of computer would usually be used with very large and fast peripheral devices and with many hard disk units. Since the number of users can be so high, there is quite a large processing task to control the flow of data between the computer and all the terminals. For this reason, most mainframe computers use a minicomputer to handle this activity, thereby leaving the mainframe free to process the data. In these circumstances, the minicomputer is referred to as a Front End Processor (FEP).
2.5
Supercomputers
Supercomputers are used to process very large amounts of data very quickly. The speed of the supercomputer may be 100 times that of a large mainframe computer. These are representative supercomputer applications: Enable the simulation of airflow around an airplane at different speeds and altitudes. Auto manufacturers use supercomputers to simulate auto accidents on video screens. Meteorologist employ supercomputers to study how oceans and the atmosphere interact to produce weather phenomena. Hollywood production use supercomputers to create the advanced graphics used to create special effects for movies and TV commercials.
The CRAY T90 supercomputer is one of the most powerful general-purpose computers.
1 - 13
INTRODUCTION TO COMPUTERS
BA332
1.3
Software
Hardware only becomes useful when it is instructed to perform activities. Software comprises the set of instructions which tell the hardware what to do. The purpose of software is to cause the computer to provide the user with the data processing facilities required. These instructions are usually combined in a sequence. A set of such instructions is called a program. Software are divided into: System Software Application Software
1.4
Communications
Today, telecommunications is intimately bound with information technology. Essentially, for maximum performance, computers must be linked to each other in order to exchange information. This can be done by cabling (if the computers are located close to each other), or, more commonly, by using the telephone network to transmit data.
1.5
System Components
A computer system is made up of 4 hardware components, namely input, processing, output and storage. Input Device A device which transfers data and programs to the internal memory. Output Device A device which receives the results of processing from the processor. Processor The main unit of a computer system. It accepts data from a input device, executes instructions and performs operations on data as specified by the internally stored program and outputs the results to an output device. Storage Device A computers auxiliary bulk storage device providing for the storage of data and programs until required for processing activities.
1 - 14
BA332
INTRODUCTION TO COMPUTERS
1.6
Types of Software
System Software The system software takes control of the computer on start up and then plays a central role in all interactions with the computer components. Application Software This is designed and created to perform specific personal, business or scientific processing task.
There are many different types of software, but are put into 2 main groups:
1.7
Communication Medium
In the global village, we can communicate with people electronically as easily as we might have a conversation with a neighbour. Depending on the distance between the computers, we may use one or more of the following medium: a) Computer Cables Within the home or company premises, computers can be connected directly to each other or in a network. b) Telephone Network Outside the home or company premises, we use the national telephone network or link across countries through one or more telephone systems. c) Undersea Cables and Satellite Systems Over longer distances or across oceans, the undersea cables and satellite systems may be used.
1 - 15
1 - 16
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
3 - 17
INTRODUCTION TO COMPUTERS
BA332
3.1
Introduction
Computers are electronic devices which operate in a way not easily understood by humans. It is necessary to have equipment that will convert the signals used by computers into a form that can be used by humans and vice-versa. This is the role of input and output devices. Input devices make it easier for non-technical, untrained users to input data accurately and quickly. Over time different forms of such devices have been introduced to suit varying requirements.
3.2
Keyboard
Probably the most familiar of the input devices is the keyboard. Generally this resembles the QWERTY type keyboard common on most typewriters. Unlike the typewriter keyboard, however, the computer is extended to contain up to 102 keys, which include a number pad, a series of special function keys and some keys to control the cursor on the screen.
3.3
Mouse
The mouse is a small, plastic device which is connected to the computer by a small cable. It can be moved across a tabletop and the cursor will move across the screen in the same way. The cursor is a light square or line which appears on the screen. Where the cursor is in the same position on the screen as a desired item, the item can be selected by pressing a button on the mouse. This saves the user having to type in the desired selection.
3.4
Touch Panel
Another device to assist selection of items on a screen is the touch panel. This is a touch sensitive plastic sheet which is placed on the screen and connected to the computer. The user can select items by touching the part of the touch pad at the location where the described item is on the screen. This will cause the touch pad to send an electrical signal to the computer and select the desired item.
3.5
Scanners
A scanner can be used to capture an image of a document or a picture and store this in the computer. In this way, both graphics and text can be stored and retrieved. Stored images can be used for a number of purposes. Graphics can be incorporated into reports and newsletters. Scanned documents can be retrieved easily and reprinted, instead of having to search through the registry. In the retail sector, source data automation is made possible by the use of scanners. Laser scanners could be mounted on checkout counters, in handheld consoles or penbased. Scanning technology has made the following possible: 3.5.1 Optical Character Recognition (OCR) This is the ability of the scanners to read text information into a computer system. It captures pre-determined format (like a typed letter) or non-determined format (like your handwriting). OCR captures information and put it into an editable format. 3.5.2 Optical Bar Recognition (OBR) Reading of bar codes is one of the most widely used scanner technologies. Bar codes represent alphanumeric data by varying the size of adjacent vertical lines. There are a wide variety of bar coding systems. Information must be in a predetermined format. 3.5.3 Optical Mark Recognition (OMR) The scanner detects the presence or absence of a mark in a pre-determined place. The information must exist in pre-determined format on paper.
3 - 18
BA332
INTRODUCTION TO COMPUTERS
3.6
Pointing Devices
There is a wide variety of pointing devices similar to the mouse. Trackball The trackball is a ball inserted in a small external box near the keyboard. The ball is rolled with the fingers to move the mouse cursor. Some people like to think of the trackball as an upside-down mouse with a bigger ball at the bottom.
Trackpad The trackpad has no moving parts. One simply moves a finger about a small touch sensitive pad to move the mouse cursor.
Trackpoint Trackpoints are usually positioned in or near a laptops keyboard. They function like miniature joysticks but are operated with the tip of the finger.
Joystick The joystick is a vertical stick that moves the mouse cursor in the direction the stick is pushed. Joysticks are commonly used in video arcade games.
Digitizer tablet and pen The digitizer tablet and pen has a pen and a touch sensitive tablet whose X-Y coordinates correspond with those on the computers screen display.
3.7
Magnetic Stripes
The magnetic stripes on the back of charge cards and badges are another example of data entry at the source. The magnetic stripes are encoded with data appropriate for specific applications. For example, account numbers and identification numbers are encoded on a card for automatic teller machines. Magnetic stripes hold more data than the printed bar codes. Since they are also not read easily, they are perfect for storing confidential data.
3.8
Smart Card
The smart card looks like any other charge card except it has a an embedded microprocessor with up to 32 KB of non-volatile memory. Because the smart card can hold more information, has processing capability and is almost impossible to duplicate, smart cards may replace cards with magnetic stripes. A stored value card is an example of the smart card.
3.9
Sound Input
A microphone captures data that originate in audio form. The sound data can be reproduced later or converted to text using a speech recognition system.
3 - 19
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
4 - 20
BA332
INTRODUCTION TO COMPUTERS
4.1
Introduction
New technology has resulted in the development of different output devices that serve a variety of purposes. The quality of the output has improved at a continually reducing cost. In this chapter, we shall review various output methods and devices.
4.2
Monitor
The most familiar of all output devices is the Monitor or the Visual Display Unit (VDU). When the terms screen or display are used, we refer to the part of the monitor where the output is shown. The graphic adapter is the device for the monitor. All display signals en route to the monitor pass through the graphics adapter, where the digital signals are converted to analog signals compatible with the monitors display capabilities. Most existing graphics adapters have their own RAM called video RAM or VRAM, where they prepare monitor-bound images for display. The size of the VRAM is important in that it determines the number of possible colours and resolution of the display, as well as the speed at which signals can be sent to the monitor. A minimum of 2 MB of video RAM is recommended. The newer AGP graphics adapters enjoy much better performance by using the PC systems RAM directly.
4.2.1
Monitor Size
Display screens vary in size from 5 to 30 inches (measured diagonally). The monitor size of desk top PCs is up to 17 inches.
4.2.2
Monitor Resolution
Monitors vary in quality of output or resolution. Resolution depends on: The number of pixels that can be displayed The number of bits used to represent each pixel The dot pitch of the monitor
Pixels is the smallest addressable point on the screen. Most monitors can be set at a resolution ranging from 640 by 480 to 1600 by 1200. Each pixel can be assigned a colour. Most colour monitors mix red, green and blue to achive a spectrum of colours and are called RGB monitors. When each pixel is 8-bit mode, there are possible 256 colours. The 16-bit mode has 65,536 possible colours. The dot pitch is the distance between the centers of adjacent pixels. Any dot pitch equal or less than .28 mm provides a sharp image.
4.2.3
Laptop PCs use flat panel monitors. The most common technology uses Liquid Crystal Display (LCD) using millions of transistors.
4.2.4
4.3
Printers
4 - 21
INTRODUCTION TO COMPUTERS
BA332
4.3.1
Introduction
Printers produce hard copy outputs, such as management reports, academic term papers, cash register receipts, labels, memos, check, etc. There are various types of printers available which give a variety of different results. There are two main categories of printer: Impact printer
4.3.2
The dot matrix printer is the most inexpensive printer. This is an impact printer. Most impact printers used in the office today are dot matrix printers. The dot matrix printer form images one character at a time as the printer head moves across the paper. The dot matrix uses from 9 to 24 tiny pins to hit an ink ribbon and paper much as a typewriter does. The dot matrix printer arranges printed dots to form characters and all kinds of images. Dot matrix printers print up to 450 cps (characters per second). Most dot matrix printers can accommodate both cut sheet paper and fanfold paper. The tractor feed that handles fanfold paper is standard with most dot matrix printers. Impact printers, unlike nonimpacts, touch the paper and can produce carbon copies along with the originals. The greater the density of pins, i.e. the greater the number of pins in the matrix, the better the definition of the letter will be, resulting in a higher printer quality. It follows that the more pins in the matrix, the more the printer will usually cost.
4.3.3
Laser Printers
The Laser printer is the most common type of non-impact printer. These printers use a laser to mark the parts of the page where the text or image is to be formed. The paper is passed through a toner solution where the marked areas pick up the toner and the text becomes visible. Laser printers print on standard letter size paper. These printers print at 4 to 32 pages per minute for text printing. Most of the laser printers in use print shades of grey, however, colour laser printers are becoming increasingly popular as their price continues to drop. Printing in colour or graphic images may slow down output to about 25% of the text and non-colour speed. The resolution of the low-end desktop printer is 600 dots per inch (dpi). High-end printers, which are sometimes called desktop typesetters are capable of at least 1200 dpi. The dpi is the number of dots that can be printed per linear inch horizontally and vertically. Laser printers are quiet but are the most expensive.
4.3.4
Ink-Jet Printers
To the naked eye there is little difference between the print quality of some ink-jet printers and laser printers. Resolutions for the typical ink-jet printers are about similar to that of the laser printers. Printing speed range from 4 to 12 page per minute (ppm). Ink-Jet printers are also able to print on normal paper. They work by spraying ink directly onto the appropriate parts of the paper using small jets. The quality of ink-jet printers is generally high and use of different colour inks can be made for more complex prints. One major advantage is that inkjet printers can print on a wide variety of surfaces, in addition to paper, which makes them quite versatile. Bubble-jet printers are ink-jet printers. The colour ink-jet printer is emerging as the choice of budget-minded consumers.
4 - 22
BA332
INTRODUCTION TO COMPUTERS
4.3.5
Plotters
Laser, ink-jet and dot matrix printers are capable of producing page-size graphic output, but are limited in their ability to generate large-scale, high quality perfectly proportioned graphic output. Architects, engineers, graphic artists, city planners, and others who routinely generate highprecision, hard copy output of widely varying sizes use another hard copy alternative called plotters. Plotters use ink-jet technology to print on roll-feed paper up to 4 feet wide and 50 feet in length. Plotters are used in large printing needs such as commercial posters and blueprints. They can be used to produce continuous output such as charts and earthquake activities.
4.4
LCD Projector
Computer generated graphics can be recreated on paper and transparency acetates with printers. Graphic images can also be captured on 35-mm slides, displayed on a monitor or projected onto a large screen. The projection of images on the large screen uses the LCD projector. The LCD projectors use their own built-in lens and light source to project the image onto the screen.
4.5
Sound Output
The recording and playback of audio messages in a telephone message sometimes makes it seem like we are talking to the computer. This is an example of the voice response system. Like monitors, voice response systems provide temporary soft copy output. The recording converts sounds into digital data stored on disk or memory chips. When output occurs, a particular sound is converted back into analog before routed to a speaker. All you need to produce speech and sound on a PC are sound expansion card and speakers (or headsets) and appropriate software.
4 - 23
UNIT 5 Processors
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
5 - 24
BA332
INTRODUCTION TO COMPUTERS
5.1
Introduction
The processor component of the personal computer system is a microprocessor or the CPU. The processor runs the show and is the nucleus of any computer system. It can be thought of as the brains of the computer, where the actual processing (thinking) is executed. The CPU varies from fingernail size to a postage stamp size.
5.2
Components of a CPU
a. b. c. The control unit; The arithmetic and logic unit (ALU); The memory
These parts are linked to each other and to the peripheral devices, such as input and output devices, through circuitry.
5.2.1
The control unit is the part of the CPU that controls the activities of the rest of the components both within and outside the CPU. It has three primary functions: Read and interpret program instructions Direct the operation of internal processor components Control the flow of programs and data in and out of RAM
5.2.2
The Arithmetic and Logic Unit (ALU) is the part of the CPU which actually performs all computations (addition, subtraction, multiplication and division) and all logic operations (comparisons). Examples of computations include payroll, inventory levels, and banking services. The logic operation compares two pieces of data, either alphanumeric or numeric. Based on the result of the comparison, the program branches out to one of several alternative sets of program instructions. For example, in an inventory system each item in stock is compared to a reorder point at the end of each day. If the inventory level falls below the reorder point, a sequence of program instructions is executed that produces a purchase order.
5.2.3
The Memory
The memory is used for the direct storage of information. Data and programs are held in the memory for the period that it might be used for processing. There are two kinds of memory, namely: a. b. RAM (random access memory) ROM (read only memory)
RAM enables data to be both read and written to memory. RAM is an electronic circuitry and has no moving parts. Most new PCs are equipped with synchronous dynamic RAM (SDRAM). This is able to synchronise itself with the processor, enabling the data transfer at more than twice the speed of the previous RAM technologies. RAM is volatile memory. That is, when the electrical current is turned off, or interrupted, the data is lost. In contrast to permanent storage on disk, Ram provides the processor with only temporary storage for programs and data. All programs and data must be transferred to RAM from an input device (such as a keyboard) or from a disk before programs can be executed and data can be processed. Once a program is no longer in use, the storage space it occupied is assigned to another program awaiting execution.
5 - 25
INTRODUCTION TO COMPUTERS
BA332
The ROM (read only memory) cannot be altered by the user. The content of ROM is hard-wired by the manufacturer and can be read only. When you turn on the PC system, a program in ROM automatically readies the computer system for use and produces the initial display screen prompt. A programmable Read only memory (PROM) is one where the user can load read only programs and data.
5.3
In a single processor environment, the processor addresses the programming problem sequentially, from beginning to the end. The processing speed is therefore limited by the speed of the channel. This is called serial processing. Parallel processing involves having more than one processor and breaking the programming problem into pieces. Work on each of these pieces is then executed simultaneously in separate processors, all of which are part of the same computer system. In parallel processing, one main processor examines the programming problem and determines what portion of the problem can be solved in pieces. Those pieces that can be addressed separately are routed to other processors and solved. The individual pieces are then reassembled in the main processor for further computation, output or storage.
5.4
Platform
A platform defines the standard for which software is developed. Specifically, a platform is defined by two key elements: The processor for example, Intel Pentium II, Intel Pentium III, Intel Celeron, Motorola PowerPC, etc. The operating system for example, windows 2000, Mac OS X, Unix, etc.
Generally, software created to run on one platform is not compatible with any other platform. The dominant PC platform is the Wintel PC. Wintel PCs use the Microsoft Windows control software and an Intel Corporation or Intel compatible processor. The other remaining PCs uses the Apple Macintosh line of computers or the Apple iMac line of computers. The Macintosh uses the Mac OS operating system and the iMac uses Apples next generation operating system, the Mac OS X. Both are powered by Motorola PowerPC processors.
5 - 26
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
6 - 27
INTRODUCTION TO COMPUTERS
BA332
6.1
Introduction
The memory components of the CPU are quite expensive. Furthermore, they are volatile. For these reasons, it is not practical to use the main memory to store large amounts of data permanently for future usage. In practise, different devices are used for the storage of data over a long period of time. The common storage devices are: a. b. c. Magnetic computer tapes Magnetic computer disks Optical disks
6.2
In terms of storage devices, tape is quite a cheap medium. However, this medium also has its limitations. If the tape is used to store data which is not required quickly, as a security back-up for example, then it is a cheap means of doing so. If the data has to be easily accessible, irrespective of the order in which it is stored, then tapes will require too much time to find the require data to be efficient. The saving on the cost of the tape will be lose due to the increased cost of retrieving data held on the tape. Magnetic tape has three important functions: Protection against loss of valuable files Archiving files File portability
6.3
Disks are more expensive than tapes but have significant advantages. In terms of the speed of retrieving data, disks are much faster than tapes. This is partly because it makes no difference where on the disk surface the required data is stored, since it can be accessed directly. Each disk is divided into tracks and sectors. The main types of disk are: a. b. The diskette The hard disk
6.3.2
The Diskette
Three types of interchangeable disk drives are commonly used in the PCs. They are the traditional floppy disk, the high capacity SuperDisk and Zip disk. The traditional 3.5 inch diskette, or floppy disk, is a thin mylar disk that is permanently enclosed in a rigid plastic jacket. It has 1.44 MB of storage space. The SuperDisk can store 120 MB of data. Both the floppy disk and Superdisk are of the same size but have different disk density. Disk density is the number of bits of data that can be stored per unit area on the disk surface. The SuperDisk drive reads from and writes to the traditional floppy disk but not vice versa. The Zip drive reads and writes to 100 MB Zip disks. The diskettes are not attached to the computer. Instead, they are inserted into a device called a disk drive mounted on the computer. In this way, different disks can be used as and when required.
6 - 28
BA332
INTRODUCTION TO COMPUTERS
This, of course, means that when a disk is full, another can be used so there is no restriction on the amount of data which can be stored.
6.3.3
Hard Disks
The two main objectives of the hard disk manufacturers are to put more data in less disk space and to enable a more rapid transfer of data to and from RAM. The two main types of hard disk are those that are permanently installed and those that are interchangeable. Permanently installed or fixed hard disk are 1 to 5.25 inch permanent PC based hard disk has storage capacities of 4 GB to over 30 GB. Hard disks have data stored on both surfaces of the disk. The disk spin continuously in a sealed enclosure. The enclosure keeps the disk surface free from contaminants. This contaminant free environment allows hard disks to have greater density of data storage than the interchangeable diskettes. The interchangeable hard disks are getting more popular. The 3.5 inch Iomegas Jaz drive can store 1 GB of data and is inserted and removed as easily as the 3.5 inch floppy.
6.4
Optical disks
The primary advantage of optical disks is that they are direct access forms of storage that can store vast amounts of data in a relatively small physical space. An optical disk device uses laser beams to store and retrieve data. It works just like a compact disk player for a stereo system. One laser beam writes to the recording surface by making pits in the disk and another reads the data from the light sensitive recording surface.
6 - 29
BA332
One type of optical disk is the CD-ROM (compact disk read-only memory). Similar in concept to a ROM chip, these disks are read-only. Many PCs today have a CDROM drive installed. CD-ROMs offer a huge storage capacity (compared to floppy disks) at a relatively low cost. The capacity of a single CD-ROM is 680 MB. The CD-ROM is manufactured by using special lasers to burn crevices in the disk. The spiral track on a CD-ROM is about 3 miles long with about 2 billion pits. Once the master CD-ROM has been created, copies can be manufactured using techniques similar to those used to produce music CDs. Popular CD-ROM drives are classified simply as 24X, 32X and 40X. This means they spin at 24, 32, and 40 times the speed of the original CD standard. b. Recordable CD (CD-R) For users who want to record data, a compact disk writer is used. This is a device which uses a more powerful laser than a CD-ROM laser to record onto a CD-R. The recordable compact disk is different from the CD-ROM. c. Magneto-Optical Disk The Magneto-Optical Disk is presently known as DVD (digital video disk). The DVD can store up to 10 GB of data each. It is also backward compatible. This means that it can play all CD-ROMs and CDs. who want to record data, a compact disk writer is used. This is a device which uses a more powerful laser than a CD-ROM laser to record onto a CD-R. The recordable compact disk is different from the CDROM
6.5
Data Files
Organisational data, in order to be useful, has to be structured in such a way as to facilitate ease of retrieval. This is achieved by grouping common data together in files. This is not a new concept with computerisation. Manual office systems used files to structure the information and computer systems follow the same logic. The way in which data files for computerised systems are structured follows a set pattern. It is perhaps easiest to consider an example. A common file in an organisation is the employee file in which all data relating to employees is held. The file is divided into records. In an employee file, a record would be all the data relating to one employee. The file for an organisation with 500 employees, therefore, would contain 500 records. Each record is divided into fields. The field is a particular data item which relates to a record. In an example, the employees name would be one field, date of birth another. Each record in a file would have the same set of fields. Each employee record, for example, would have a date of birth field.
6 - 30
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
7 - 31
INTRODUCTION TO COMPUTERS
BA332
7.1
Hardware Trends
We are seeing the use of computers in more and more places not used earlier. They are also found now in places quite unexpected by some people. In the field of commerce, medicine, entertainment, government, and especially in communications, the computer is being seen as getting indispensable to do more and better. The processor chip is already found in most electronic and mechanical equipment. a. Lower Cost and Greater Capability Advances in materials science, manufacturing, and concepts of computing promise to maintain the historic growth pattern in hardware power. Hardware prices have dropped while their capability has increased. The improved capabilities of the computer include higher speed and larger storage capacity. b. Better Reliability Hardware has become more reliable and has found uses in new and hostile environment not suitable earlier. There is greater confidence in using and knowing that the computer system you have will not fail when needed. c. Portability Computers are becoming smaller and more portable. This can be seen in the notebook and palmtop computers. Some computers have shrunk to become wearable.
7.2
The hardware trends have resulted, and will continue to result in greater usage of computers and information processing. Many or all aspects of a business organisation will be touched by the use of computers. The increased presence of computers brings with it a number of issues and risks.
7 - 32
BA332 a. Ethics
INTRODUCTION TO COMPUTERS
The use of computers in this electronic age is raising new ethical questions. A code of ethics provides direction for computer professionals and users so that they act responsibly in their application of information technology. A well-meaning professional may violate a code of ethics because they may unaware of the tremendous detrimental impact of their actions. With the speed and power of computers, a minor code infraction easily can be magnified to a costly catastrophe. b. Misuse of Personal Information Many people are afraid of the new technology because they fear the loss of privacy. The fear that computer based record keeping offers too much of an opportunity for the invasion of an individuals privacy. For example, credit card users unknowingly leave a trail of activities and interest that when examined can provide a surprisingly comprehensive personal profile. The monitoring of e-mail by companies on their staff is seen by some as a violation of their privacy. Monitoring was to discourage non-business messages and to keep employees focused on job-related activities. The responsible use of e-mail can boost productivity. When abused, it can be counter-productive. c. Computer Crime There are many types of computer crimes, ranging from the use of an unauthorised password by a student to a billion-dollar insurance fraud. Computer crime is serious and the greatest amounts are linked to banking, insurance, product inventories, securities, etc. Fortunately only a small percentage of people with an inclination to commit crime are capable of committing high-tech crimes. Criminals, like everyone else are moving towards information technology competency. d. Negligence and Incompetence Not all computer crime is premeditated. Negligence or incompetence can be just as bad for an organisation. Such crimes are a result of poor input/output control. For example, errors in data entry may result in unpaid bills when actual payments have been properly made. e. Hacking Hackers or crackers are those that hack through a network security. They tap into the network of commercial companies up to military high security installations. These criminals steal passwords, credit card numbers and vandalise web sites.
7 - 33
BA332
Intellectual Property Laws have been set up to protect the rights of software creators. Generally, an original software can only be installed to one original computer unless stated in an agreement. g. Viruses Viruses are written by outlaw programmers to cause harm to the computer systems of unsuspecting victims. Examples are Melissa, Chernobyl, Michelangelo, Friday the 13th, Stoned and Jerusalem. Antivirus software is needed to routinely detect and eliminate these harmful programs. h. Security Proper administrative and logical controls are necessary to prevent or minimise the chances of deliberate and unintentional crimes.
7.3
Emerging Technologies
Many businesses are embracing new and high tech tools to offer its services to the world. Information Technology is one of the most rapidly changing and dynamic aspects of the business world. Emerging technology falls into two types: It is a technology that is so new that most businesses have not exploited it. It is a technology that is fairly well established, but businesses have not fully exploited it.
The first type includes electronic cash, and shopping in the internet. The use of multi-media is included in the second type. For both types, their importance lies in learning about them so as to use them effectively. Emerging technologies can be grouped into four categories:
7.3.1
These include applications that incorporate one or more of the following features: Three dimensional images Automatic speech recognition Multi-media Virtual reality
7.3.2
New technologies for the Internet continue to emerge. These includes: Electronic cash Communication through the internet such as internet telephony
7.3.3
These includes:
Smart phones
7 - 34
BA332
INTRODUCTION TO COMPUTERS
7.3.4
These include intelligent home appliances and smart cards. These technologies will definitely make personal life easier and more exciting.
7 - 35
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 36
BA332
INTRODUCTION TO COMPUTERS
8.1
Types of Software
a. b. a. Application software System software Application Software This is the set of instructions or programs which make the computer perform a particular task which will satisfy a processing requirement of the user. An example is the inventory system. Application software are tools that save time, increase productivity and provide better presentation of information. b. Systems Software This is the set of instructions or programs which create a computer environment within which the applications software can work. Therefore, applications software determines what processing is done by the computer. Systems software determines how that processing will be done by the computer.
8.2
Word Processing
8.2.1 Introduction
The name of this software is virtually self-explanatory. A word processor is an application software which allows the user to manipulate text so as to produce documents accurately and efficiently. The software will provide the user with the blank screen page onto which text can be entered. Once the text is on the page, it can be altered with the greatest of ease, thereby allowing the correction of errors and, perhaps more importantly, allowing the author of the document to change his mind. When a document is finally complete, and the author wants it, then it can be printed and saved. The software will allow multiple copies of the same document to be printed at the touch of a button. If a word still turns out to be incorrectly spelt, the document can be called up again, the correction made without retyping the whole document, and the page printed.
8.2.2
a.
Features
Page Formatting Some processors will allow the user to select different print fonts, set a variety of tab stops, indent margins on the left or both sides and select single, double or treble spacing.
b. Word Wrap One of the most important features of word processor is that of word-wrap. With most typewriters, when the end of a line is reached, the bell rings to alert the user to the need to press the carriage return to start a new line. With the word-wrap facility, the user merely continues to type and the word processor will continue onto a new line when required, without splitting words in the middle of them. Similarly, when the end of the page is reached, the software will simply scroll the old page up the screen and a new page will appear automatically at the bottom.
8 - 37
BA332
Most word processors allow the user to identify blocks of text which can be manipulated together. Blocks can be moved, copied or deleted. This facility is often used to allow transfer of blocks of text from one document (or file) to another, thereby allowing the repeated use of standard paragraphs in several documents. d. Mail Merge The more sophisticated word processors also allow a function known as mail merge. This is where a standard letter or other document can be produced, leaving gaps for details of the recipients name and address. These details, for a number of recipients, can be entered onto another file and the two merged together at the time of printing. This process would result in a copy of the document, complete with name and address, for each of the recipients held on the second file. Such a facility is nowadays often used in mailshots and circular. e. Spell Checkers Another feature which is of great use to users is that of the spelling checker. This facility allows the user to check the spelling of any, or all, the words in the document prior to printing. The software checks the spelling against an internal dictionary and a personal one which would contain entries such as peoples names. One slight disadvantage is that much of this software is produced in America and results in the spelling checker questioning words which are spelt differently in British to America. There are, however, spelling checkers available which use the British spellings. f. Thesaurus Finally, and as an extension to the spelling checker, there are now word processors which have the facility to a thesaurus to provide alternative words for the user. This again is quite a useful tool and avoids having to use a manual method.
8.3
Spreadsheets
8.3.1 Introduction
A spreadsheet is essentially a grid made up of columns and rows. Numbers can be input into cells and formulas defined to perform numerical computation. Spreadsheets are used to perform repetitive financial computations. There are several different spreadsheet packages on the market.
8.3.2
Despite the variation in the features and purchase price of each, they are all based on the same basic concept. The software, when loaded, fills the screen with a grid formed of columns and rows. This resembles an electronic sheet of squared paper. Each of the squares is known as a cell and each cell can contain either numbers, characters of formulae which are entered and manipulated by the user. Each sheet of cells is known as a worksheet. Just as squares on a map can be identified by their gird reference, so the cell on a worksheets can be uniquely identified by a combination of letters and numbers by which the rows and columns are named. This is called the cell address. If a cell contains a number, the number can be used in calculations elsewhere in the worksheet by the use of a formula. A formula uses the numbers from other cells by referring to the address of the cell which contains the number. The package will use the number in the cell referred to, regardless of its value. This means that if you change the number in the cell, the new value will be used in the calculation without having to rewrite the formula. It is this ability to establish relationships between cells, independently from the actual content of the cells, which makes the spreadsheets such a valuable financial tool. Spreadsheets come with a variety of commands which allow the user to manipulate and copy data, set display formats and, often, produce graphical output. In the less sophisticated spreadsheets,
8 - 38
BA332
INTRODUCTION TO COMPUTERS
these commands have to be remembered by the user whereas in the more sophisticated packages, there is a menu system which acts as a prompt from which the user can select. The presentation of numerical data can be greatly enhanced with the use of graphs. In the more sophisticated spreadsheets, a variety of different types of graph can be produced from the data on the worksheet. In broad terms, the more you pay, the more you get. This relates not only to the number of different types of graph, but also how easy it is to define and produce the graphs.
8.3.2
Application of Spreadsheets
As mentioned above, the most common use of spreadsheet packages is in the financial field. The ability to define the relationships between cells using formula enables the user to perform whatif? analyses. An example of this would be a cash flow forecast for business which would entail an estimate of potential profits based on estimates of sales income minus costs of the sales and overheads. Once the formulae are set up, the values of the differences reflect the cash flow. Thus a number of scenarios can be examined with little effort.
8.4
Databases
A database is a collection of related data items that are stored together for use in many application systems. In a company, we can find many application systems (e.g. personnel system), each of which has one or more users. These applications may store all their data in a single database. Thus, many users will read or access data in that single database. Users will usually access the database indirectly, by using the application system (e.g. personnel system). The application systems themselves do not access the database directly, but will use another software called the Database Management System (DBMS).
8 - 39
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 40
BA332
INTRODUCTION TO COMPUTERS
9.1
Desktop Publishing
An office technology that is currently enjoying considerable popularity is desktop publishing (DTP). Desktop publishing involves the use of desktop microcomputer systems that are equipped with special hardware and/or software features, to produce documents that look as though they were done by a professional print shop. In using these systems, users can combine word-processed text with such elements as artwork, photos, and a variety of magazine style fonts. The overall effect can be stunningly attractive. DTP systems allow users to combine a variety of graphical fonts onto a page, use pre-stored art images (call clip art) on pages, and draw lines and boxed to highlight text or art. Fonts and clip art can also be purchased as add-ons from third-party vendors to extend the library of options offered for sale by the original-package vendor. In some DTP systems, more sophisticated options are available. For instance, one can digitise complex arty images such as photos, which are composed of a variety of halftones to which only high levels or resolution can do justice. Also, there is a much greater variety of options available with fonts and clip art. For example, both fonts and clip art can be scaled to a variety of sizes and can be created or edited, as well.
9.2
Electronic Mail
Electronic mail (or E-mail) is the second largest EUC applications area, behind word processing. It refers to the technology used to send messages or documents from one electronic workstation to another. For instance, employees within a large organisation may have electronic mailboxes that are managed by a mainframe, minicomputer, or local area network. When these employees access a workstation, they can call up their personal file or mailbox on the E-mail system to see if there are any messages. Or, they can send a message to place in someone elses mailbox. These types of E-mail systems are typically standard components in integrated office packages.
9.3
Images can be created using input devices or electronically copied from other sources. It could contain text, graphics or photographic data or a combination of these. The data can be stored, distributed, accessed and processed by computers and special-purpose workstations. Digital image processing requires certain basic hardware and software. A scanner will be used to transform physical images into electronic digitised images, which must be indexed and compressed. Database management software handle the accessing of the indexed images. Workstations comprise high resolution monitors to display images as well as large storage capacities to store image files.
9.4
Voice Processing
Voice processing is a relatively new area. It can be limited to voice input processing, voice output, or both. In the case of voice input processing, hardware and software are used to decipher speech and transform it into computer signals. Often, the system has to be taught how to recognise commands of the main person who will be using it. An example is found in some PCs where a microphone is attached to process voice input. These systems are called speech recognition systems. Voice output is also starting to be seen in some offices where the result of processing is a verbal message. For example, lifts in offices may be programmed to announce the floor. Often this is actually a pre-recorded message. The challenge is to be able to perform voice synthesis such that the computer can actually pronounce any word.
8 - 41
INTRODUCTION TO COMPUTERS
BA332
A truly interactive system where commands and questions are issued verbally and where a machine can interactively respond (both in action and in verbal responses) is still some time in the future. A speech recognition system captures both command and information that originate in audio form. Speech becomes converted to text when there are appropriate software and hardware. An example of software is generic vocabulary database while an example of hardware is a high quality microphone with noise cancelling capabilities.
9.5
Presentation Software
PC based presentation software have in many instances replaced overhead projectors and slide projectors. Presentation software lets you create highly stylised images for group presentations, self-running slide shows, reports and other situations that requires the presentation of organised visual information. The software gives a rich assortment of tools to create a variety of charts, graphs and images to help to make the presentation. The following are steps to prepare a presentation using presentation software:
8 - 42
BA332
INTRODUCTION TO COMPUTERS
9.5.1
Select a Template
Presentation software comes with many templates. Design templates are predesigned formats and complementary colour schemes with preselected background images that can be applied to any content material. Content template go one step further and suggest content for specific subjects; for example, business plan, project overview, employee orientation, etc.
9.5.2
PowerPoints tri-pane view lets you view the slide, outline and notes at the same time. This view makes it easy to add new slides, edit text, and enter notes while creating a presentation. The outline feature helps you organise your presentation material into a multilevel outline. People often import their outline from a word processing document.
9.5.3
A good presentation will include some or all of the following: photo images, charts and graphs, a variety of eye catching clip arts, and even full motion video captured with digital camera. With presentation software, you can create a variety of charts from data imported from a spreadsheet or a database.
9.5.4
Integrate Resources
Once all the text and visual resources have been compiled, it is time to integrate them into a visually appealing presentation. Non text resources are added as and when needed, usually using the outline first. The slide sorter is used as it shows thumbnail images for all or much of the presentation on a screen. The slide sorter makes it easy to add or delete slides and to rearrange them to meet presentation needs.
9.5.5
PowerPoint can make visually interesting transitions between slides during a presentation. Effects like fading out text while fading in graphics can be used. Text and objects can be animated like flying in effects. Sound effects makes the presentation more exciting.
9.5.6
Add Notes
Each slide can have corresponding notes. Notes and slides can be printed together as audience handouts.
9.5.7
The presentation can be to a single audience or to a group by projecting to a large screen. Or it can be a self-running information center where screens are preset to display in a timed sequence.
8 - 43
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 44
BA332
INTRODUCTION TO COMPUTERS
10.1 Introduction
The Operating System and Graphical User Interface (GUI), both System Software, are at the heart of the software action. All other software depends on and interacts with the operating system, the software that controls everything that happens in a computer. Its graphical user interface (GUI) provides a user-friendly interface to the operating system. System software encompasses those programs that manage, maintain, and control computer resources. Programs designed to be used by the end user are application software. The figure below shows the relationship between system and application software. Computer Games Human Resource Management Tax Planning CAD Operating System Graphical User Interface Expert System Spreadsheet Sales Summary Income Statement Office Inventory Loan Evaluation System Investment Management System
b.
8 - 45
INTRODUCTION TO COMPUTERS c. d. e.
BA332
To Maximise throughput. The operating system coordinates system resources to maximise throughput, the amount of processing per unit of time. To minimise the time needed to execute a user command. In todays interactive systems, even small decreases in user wait time pay big dividends in user efficiency. To optimise the use of computer system resources. - The operating system is continually looking at what tasks need to be done and what resources (processor, RAM, and peripheral devices) are available to accomplish these tasks. The incredible speed of a computer system dictates that resource-allocation decisions be made at computer speeds. Each millisecond the operating system makes decisions about what resources to assign to each tasks. To keep track of all files in disk storage. The operating system and its file and disk management utility programs enable users to perform such tasks as making back up copies of work disk, erasing disk files that are no longer needed, making inquiries about the number and type of files on a particular disk, and preparing new disk for use. The operating system also handles many file- and disk- oriented tasks that are transparent (invisible) to the end user. For example, operating system keep track of the physical location of the disk files so that we, as users, need only refer to them by name (for example, myfile or year-end-summary) when loading them from disk to RAM. To provide an envelope of security for the computer system The operating system can allow or deny user access to the system as a whole or to individual files. Examples of specific security measures are passwords. To monitor all systems capabilities and alert the user of system failure or potential problems. The operating system is continually checking system components for proper operation. Any problems are brought immediately to the attention of the user.
f.
g.
h.
8 - 46
BA332
INTRODUCTION TO COMPUTERS
choosing one or more operations from menus or by pointing to and choosing a graphics image, called an icon. An icon is a graphic rendering that represent a processing activity or a file. GUIs have eliminated the need for us to memorise and enter cumbersome commands. For example, in GUIs all we have to do to cpy a file from one disk to another disk is to click and drag the files icon from one area on the screen to another.
10.5 Utilities
10.5.1 Introduction
Utilities are programmes which perform tasks that are often required by end-user, or other programmes. Many of them, especially for microcomputers, come as part of the operating system. With larger systems, some of the utilities are separate. Most of these are file handling utilities such as copying and moving files which allow the user to perform housekeeping activities.
8 - 47
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 48
BA332
INTRODUCTION TO COMPUTERS
11.1 Introduction
Computer languages can be categorised into: a. b. c. d. a. Machine Language Assembly Language High Level Language Very High Level Language Machine Language Machine code or machine or language is the lowest level of computer language and is in binary notation. This is the actual language that the computer can understand and execute. However, it is very difficult to code using nothing but binary notation. Creating programs machine language is a cumbersome process, so we write programs in more programmer friendly programming language. However, our resulting programs must be translated into machine language before they can be executed. b. Assembly Language The introduction of more user friendly programming language (in 1955) resulted in a quantum leap in programming convenience. Programmers could write a single instruction instead of several cumbersome machine language instructions. These early languages were procedure-orientated languages, which require programmers to solve programming problems using traditional programming logic. COBOL is a good example of a procedure oriented language. These languages are also called Assembly languages or low level languages. They must be translated into machine language by an assembler program. The assembly language is not written in binary notation. Instead, mnemonics or abbreviations are used to represent operations (e.g. SUB for subtract). This makes the language much easier to write in than machine code but it is still relatively tedious for a programmer who has to code in every detailed steps. c. High Level Language High level languages are a group of languages, which closely resemble the structures of English and are the easiest in which to program. There is less requirement on the programmer to specify so many details. One high level language command can represent several machine code instructions which means that the same can be achieved with fewer instructions in a high level language. In procedure-oriented language the emphasis is on what is done (the procedure). In object-oriented language, the emphasis is on the object of the action. The structure of object-oriented programming (OOP) makes programs easier to design and understand. Also OOP handles images, videos, and sound better than do procedureoriented languages. Examples of object-oriented languages include Smalltalk, and C+ +. High level languages are more complex and need to be translated into machine code. The language processors which perform this task are called compilers. d. Very High Level Language Very High Level Languages are also known as Fourth Generation Language (4GL). This name is given to a group of languages that allow end users to specify what the output should be without describing all the details of how the data should be manipulated to produce that result. Fourth generation languages use high level English-like instructions to retrieve and format data for inquiries and reporting. In 4GLs the programmer specifies what to do, not how to do it. e. Natural Language: The Ultimate Programming Language The State of the Art of Natural Languages
8 - 49
INTRODUCTION TO COMPUTERS
BA332
There are no pure natural languages Currently pure natural languages that permit an unrestricted dialogue between us and a computer are being developed Advantages: Enable more people to take advantage of available information because even casual users can articulate their information needs in their native tongue For limited processing tasks, such as ad hoc inquiries and report generation
8 - 50
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 51
INTRODUCTION TO COMPUTERS
BA332
12.1 Introduction
There are two approaches to acquiring software: a. b. Custom develop the software specially for your company; Buy software already developed and sold as a package.
12.2.2 Advantages
The advantage of this type of application software development is that the resultant programmes will exactly fulfill the processing requirements of the company.
12.2.3 Disadvantages
a. Higher Cost The cost of producing tailor-made software is high, just as tailored clothing is expensive. This is because the costs of developing the software are entirely borne by the one organisation instead of them being borne by many organisations.
8 - 52
INTRODUCTION TO COMPUTERS
It is very unusual for software to be perfect when the programmers have finished their work. There is typically a period when the software is then operated where faults, or bugs, become exposed and have to be corrected. This can often cause serious inconvenience to the end-user and, in terms of lost time and efficiency, increases the overall cost of the software.
12.3.2 Advantages
a. Lower Cost The most obvious and important advantage is that packages are significantly cheaper to buy than custom-developed software. This is because the package is sold to a large market and the development costs can be spread among a large number of purchasers. b. Less Software Defects Given the large market to which packages are sold, most of the problems which commonly beset new software have been ironed out prior to the introduction into the market place. It is good policy, however, to avoid pioneering by buying new software. It is always better to purchase software that has been available for some time and is well tried and tested. c. Better Documentation Again, given the scale of the applications package market, it is more feasible for the producers to provide good documentation to accompany the software. Clearly, this will make the package easier to use, which will make it more attractive to the market and therefore easier to sell. d. Training Easily Available The ease of use is also improved by the fact that it becomes viable for consultants and training organisations to offer training courses in using the packages.
12.3.3 Disadvantages
a. May Not Meet All Requirements The facilities that are offered by a package are not as specific to a business as tailor-made software and might not quite satisfy the processing requirements of the business. b. Less Efficient Since the system is designed for more general purposes than the custom developed software, the design may be less efficient. For example, a user may have to go through some unnecessary steps in processing which cannot be avoided.
8 - 53
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
8 - 54
BA332
INTRODUCTION TO COMPUTERS
8 - 55
INTRODUCTION TO COMPUTERS
BA332
The ISDN modem allows the lines channel capacity to be split such that one channel can carry a voice conversation while the other supports an electronic link between computers. ISDN lines have become popular for telecommuters who work at home but need to be networked to their officers computer system. ADSL. Another technology, Asymmetric Digital Subscriber Line (ADSL), has made it possible to receive data over POTS lines at 1.5 to 9 M bps (the downstream rate in megabits per second). In a few years, the downstream rate will be 52 M bps. The upstream rate (sending) is 16 to 640 K bps. Like ISDN, ADSL requires a special modem. ADSL opens the door for some amazing applications to be delivered over POTS lines. Applications include support for full-motion video, very highspeed transfer of graphics, and real-time applications involving a group of online participants.
8 - 56
BA332
INTRODUCTION TO COMPUTERS
In the time it takes to transmit a single page of Websters Unabridged Dictionary over twisted-pair copper wire (about 3 seconds), the entire dictionary could be transmitted over a single optic fiber. Each time a communications company lay a new fiber optic cable, the world is made a little smaller. In 1956, the first transatlantic cable carried 50 voice circuits. Then, talking to someone in Europe was a rare and expensive experience. Today, a single fiber can carry over 32,000 voice and data transmissions, the equivalent of 2.5 billion bits per second. Nowadays, people call colleagues in other countries or link up with international computers as readily as they call home. Another of the many advantages of fiber optic cable is its contribution to data security. It is much more difficult for a computer criminal to intercept a signal sent over fiber optic cable (via a beam of light) than it is over copper wire (an electrical signal).
8 - 57
INTRODUCTION TO COMPUTERS
BA332
The wireless transceiver hooks into a serial port or PCMCIA slot. Transceivers, which have a limited range (about 50 feet) link computers via omnidirectional (travelling in all directions at once) radio waves. In actuality, you can use transceivers only locally to connect computers in adjacent rooms or even on different floors. When using transceivers, the source computer transmits digital signals to its transceiver, which, in turn, retransmits the signals over radio waves to the other transceiver. Transceivers provide users with tremendous flexibility in the location of PCs and terminals in a network; however, the flexibility advantage is offset by the transceivers limited channel capacity (about 115 K bps). Also, the number of terminals/PCs that can be linked via transceivers is limited by the frequencies allotted for this purpose. The 1998 Olympics in Nagano were the perfect venue for widespread use of wireless networks. Many sites at the games were temporary or difficult to wire and were thus made-to-order situations for wireless networks. Wireless networks allowed judges, statisticians, and journalists to move with the action within and between venues.
BA332
INTRODUCTION TO COMPUTERS
A communications channel from Computer A in Seattle, Washington, to Computer B in Orlando, Florida, usually would consist of several different transmission media. The connection between Computer A and a terminal in the same building is probably coaxial cable or twisted-pair wire. The Seattle company might use a common carrier company such as AT&T to transmit the data. AT&T would then send the data through a combination of transmission facilities that might include copper wire, fiber optic cable, microwave signals, and radio signals.
8 - 59
UNIT 14 Networks
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
14 - 60
BA332
INTRODUCTION TO COMPUTERS
14.1 Introduction
Ten years ago, the number one reason people purchased a PC was for word processing. Now people buy PCs for many reasons, but frequently they do so to get on the Internet. Everyone wants to logon and travel through cyberspace, soaking up all it has to offer. Each day our world is becoming increasingly connected, electronically. Each time you use a telephone, you use the worlds largest network, the telephone system. A telephone is an endpoint or a node, connected to a network of computers that routes your voice signals to any of the 500 million telephones in the world. In a computer network the node can be a terminal, a computer, or any destination/source device (for example, a printer, an automatic teller machine, or even a telephone). Within an organisation, computers are set up to meet the specific requirements of that organisation. Some have five nodes; others have 10,000 nodes.
Provides communication external to the LAN. Controls one or more modem, or perhaps access to an ADSL line.
14 - 61
INTRODUCTION TO COMPUTERS
BA332
14 - 62
BA332
INTRODUCTION TO COMPUTERS
14 - 63
UNIT 15 Telecommunication
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
15 - 64
BA332
INTRODUCTION TO COMPUTERS
15.1 Introduction
Telecommunications is the electronic collection and distribution of information between two points. Information can appear in a variety of formats numeric data, text, voice, still pictures, graphics and video. Raw information must be digitised before we can put it into a computer. For example, numerical data and text might be translated into their corresponding ASCII codes. Once the digitised information has been entered into a computer, that computer can then transfer the information to other computers connected over a network. Ultimately, all forms of digitised information are transmitted over the transmission media (for example, fiber optic cable) as a series of binary bits (1s and 0s).
15 - 65
INTRODUCTION TO COMPUTERS
BA332
15 - 66
BA332
INTRODUCTION TO COMPUTERS
15 - 67
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
16 - 68
BA332
INTRODUCTION TO COMPUTERS
16.1 Overview
Businesses need to be able to communicate data either between parts of the organisation or with other businesses. This chapter discusses a number of telecommunications equipment and telecommunication-based facilities.
16.2 Telephone
The most common telecommunications equipment is the telephone system. This applies to both the transmission of vocal data and the electronic communication of encoded data. The telephone system is an electronic means of transmitting data. The microphone in the handset coverts the sound waves from the user voice into an electrical signal. This is then carried via an electrical cable to a switching office. Here the signal is switched onto the correct cables to ensure that it reaches the correct telephone at the other end of the network In practice, the call might well pass through several switching offices, or exchanges, between the source telephone and the designation. At each stage, the signal might well be amplified to ensure that it has sufficient strength to reach the telephone. For two persons to speak on the telephone, there has to be a physical connection by cable from the source to the destination.
16.3 PABX
In large organisations, there will be many individuals who need to use the telephone periodically but not all the time. Under these circumstances, it is not economical for each telephone in the organisation to have direct access to its own public exchange line. Typically, therefore, a switchboard system exists in most organisations where public line can be switched to any one of the internal phone lines. The Private Automatic Branch Exchange (PABX) is a small computerised system which controls the switching of extension lines with each other and with the public system. The telephonist has only to enter the required extension number and the PABX will make the connection between the extension and the public line. The PABX also has other facilities which can be programmed by users. a. When a call is made to an individual in the company, and if this is not answered, the PABX can direct the call to all the extensions in the same department. If there is still no answer, then the call can then be redirected back to the telephonist at the switchboard so that the caller can be informed of the lack of response. Users can program a series of commonly used numbers into a memory so they can be dialled by pressing just one or two keys instead of the whole number. If an individual is going to spend some time in another office, then they can redirect their calls to the office where they will temporarily be. Also, where people share an office, there is no need to get up to answer the other persons extension if they are out. Punching a short code will cause the call to be transferred to the users desk.
b. c. d.
16.5 Fax
16 - 69
INTRODUCTION TO COMPUTERS
BA332
The facsimile, or fax, is used to send an image of printed documents and graphics to other fax subscribers. Users can subscribe to the fax system in the same way as for the telephone. Messages are sent to recipients via their fax number.
16.6 Telex
Another method of transmitting data is to use a telex. Both sender and receiver must have a telex terminal. Data such as documents can be typed at the telex terminal itself and sent to another subscriber where it is printed out. This equipment can help to overcome the problem of telephone conversations since both the sender and recipient get a copy of the data that is sent together with confirmation that the message has been received.
16 - 70
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
17 - 71
INTRODUCTION TO COMPUTERS
BA332
17 - 72
BA332
INTRODUCTION TO COMPUTERS One method of interacting with the computer is for the user to key in commands. However, this does not contribute to ease of use, since commands must be remembered and mistakes are easily made. b. Menus Menus may list different applications, such as sales ledger, purchase ledger or stock control routines, from which the user is guided to sub-menus according to the option selected.
17.7 Validation
Before data can be updated into the database, it must be checked for errors. This validation can be done in both online and batch processing. a. Presence Checks
17 - 73
INTRODUCTION TO COMPUTERS
BA332
In this instance, the input data is examined to ensure that all the necessary data items, of fields, are present. In the payroll example, a presence check would ensure that fields such as the data of the period-end, the employee number and the hours worked, are present. Any set of data failing this test would be rejected.
17 - 74
INTRODUCTION TO COMPUTERS
This check ensures that the format of the data in a field is correct, i.e. the correct number of letters and numbers, in the correct order. If a field is numeric, then any alphabetic data would be rejected. c. Range Checks This is a check that numbers or codes are within an accepted range. Employee payroll numbers, for example, could be subjected to this sort of check. Any employee number which does not fall into the accepted range could be assumed to be either a mistake or a deliberate falsehood. d. Reasonableness Checks These are a form of range check which would reject items which are unreasonable. A claim that an employee has worked 25 hours in a day, for example, would fail this test. e. Check Digits One of the most common type of mistakes is to transpose the figures in a number. If this happens, the number 12345 could be punched as 12345, for example. The check digits validation check is a method of minimising the occurrence of transposition. It is a mathematical technique in which the digits from the number are used in a mathematical process, the result of which is appended to the original number as the check digit. The number can then be tested using the same mathematical process. If the result is the same check digit, then the likelihood of transposition is minimal. If it is different then the number has been transposed.
17 - 75
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
18 - 76
BA332
INTRODUCTION TO COMPUTERS
18 - 77
INTRODUCTION TO COMPUTERS
BA332
b.
c.
BA332
INTRODUCTION TO COMPUTERS
A browser is an application software that present you with a graphical interactive interface (GUI) for searching, finding, viewing, and managing information over any network. Microsoft Internet Explorer and Netscape Communicator are the two most popular browsers. Most information on the Internet is accessed and viewed in the workspace of browser client programs. You give the browser an Internet address, called the URL, and it goes out over your Internet connections, finds the server site identified in the URL, then downloads the requested file(s) for viewing on your browser. The URL or uniform resource locator is the Internet equivalent of an address. Just as postal addresses progress from general to specific (country, state, city to street address), URLs do the same. The URL gives those who make information available over the Internet a standard way to designate where Internet elements, such as server sites, documents, files, newsgroups and so on can be found. At the top of the domain hierarchy (the part on the right) is the country code for all countries except the United States. For example, the address for the Singapore Tourism Board is stb.com.sg. Other common country codes are au (Australia), dk (Denmark), and jp (Japan).
18 - 79
INTRODUCTION TO COMPUTERS
BA332
The next level of the domain hierarchy identifies the host network or host provider, which might be the name of a business or college. Examples of domain ID and the types of organisation they usually represent are as shown below. Domain ID com edu gov mil net org web Type of organisation Commercial Education Government Military Network resource Usually non-profit organisations Business related to the web
When we do word processing, desktop publishing, spreadsheets, presentation and database software, some kind of document is produced. Browser software is different in that there is no resulting document. Browsers let you retrieve and view information as well as interact with server computers. In the Microsoft Internet Explorer and Netscape Communicator, the appearance of the browser is similar. The basic elements are: a. The Menu Bar. The menu bar at the top of the user command interface is used to select file options (print, save, and so on), to select edit options (including copy, cut and paste) and to set and change a variety of options (for example, how buttons are displayed, colour options, font choices and so on). As with most menu bars, the Help pulldown menu is the last option. The Tool bar. In a typical browser session, most of your interaction is with the toolbar and the hot links in the Web pages. The navigational buttons on the Internet Explorer toolbar (Netscape Communicators toolbar has similar functions) are:
b.
Back Forward Stop Refresh Home Search Favourites c. The URL Bar. The URL bar containing the URL of the current page, serves three purposes.
It allows you to key in the URL of the desired server site. It displays the URL of the page being displayed in the workspace. It includes a drop-down box that includes a list of previous visited URLs. To return to one of these sites, simply select it. d. The Workspace. The workspace is that area in which the document is displayed. You can view documents by scrolling or by using the page up and page down keys. Position the mouse over a hyperlink, a hot image, or a hot icon and click the left mouse button to navigate to and view another Web document. Click on the right mouse button to call up a menu that includes such options as adding the site to your favourite list, saving the current document, downloading the image and so on.
18 - 80
BA332 e.
INTRODUCTION TO COMPUTERS The Status Bar. The status bar is found below the workspace. This area displays the status of transmissions to and from Internet servers. When transmission is complete, the status bar may display other information or instructions relating to the use of the browser. The transmission status box gives you a visual reference of transmission progress. Format Checks This check ensures that the format of the data in a field is correct, i.e. the correct number of letters and numbers, in the correct order. If a field is numeric, then any alphabetic data would be rejected. g. Range Checks This is a check that numbers or codes are within an accepted range. Employee payroll numbers, for example, could be subjected to this sort of check. Any employee number which does not fall into the accepted range could be assumed to be either a mistake or a deliberate falsehood. h. Reasonableness Checks These are a form of range check which would reject items which are unreasonable. A claim that an employee has worked 25 hours in a day, for example, would fail this test.
f.
18 - 81
BA332
One of the most common type of mistakes is to transpose the figures in a number. If this happens, the number 12345 could be punched as 12345, for example. The check digits validation check is a method of minimising the occurrence of transposition. It is a mathematical technique in which the digits from the number are used in a mathematical process, the result of which is appended to the original number as the check digit. The number can then be tested using the same mathematical process. If the result is the same check digit, then the likelihood of transposition is minimal. If it is different then the number has been transposed.
18 - 82
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
19 - 83
INTRODUCTION TO COMPUTERS
BA332
19.2 Commands
One method of interacting with the computer is for the user to key in commands. However, this does not contribute to ease of use, since commands must be remembered and mistakes are easily made.
19.3 Menus
Menus may list different applications, such as sales ledger, purchase ledger or stock control routines, from which the user is guided to sub-menus according to the option selected. When a menu is displayed on the monitor, the user is able to select an option according to the nature of the processing activity or application required. This tells the computer system what it must do, and the system then deals with the selected option and gives the user appropriate prompts.
19.5 Dialogue
A dialogue provides a man/machine interface enabling a user to process data interactively by responding to prompts generated by the software. This refers to the screen-by-screen flow, whereby users interact with the system.
19 - 84
BA332
INTRODUCTION TO COMPUTERS
19.6.3 Advantages
a. Ease of Use The user points his mouse pointer to the menu, icon or dialogue box desired and clicks. This is much easier and intuitive than issuing DOS commands at the DOS prompt. The amount of time taken to learn new applications is shorter as the user only needs to concentrate on the functions unique to that application. b. Standard Interface All Windows applications (e.g. Lotus 1-2-3 for Windows) adheres to the standard user interface in terms of windows, pull-down menus, icons, dialogue boxes, buttons, etc. Thus, regardless of whether you are using WordPerfect for Windows, or Lotus 1-2-3 for Windows, there will be similarities in the common functions like printing, moving from one screen to another, help and so on. c. Exchange of Data Between Applications This is one of the most important benefits of Windows. In the past, if you typed a report in WordPerfect, you could not use this data in Lotus 1-2-3 unless you retyped it. Windows allows for the exchange of data between applications as several applications can run at the same time. Even if you don not want to copy data but simply need to view it, Windows is useful because you do not need to end one application before you can look up data in another application.
19.7 Ergonomics
What is Ergonomics?
19 - 85
INTRODUCTION TO COMPUTERS
BA332
In the context of information technology, ergonomics is the study of designing and positioning computer equipment in order to create a comfortable and safe working environment for employees. It is essential that employees are comfortable in their working environment as people work more effectively if they are comfortable. a. Height of Computer The keyboard should be at the correct height. The user should be able to alter the height of their chair to accommodate to the height of the computer. b. Computer The screen is a major issue in the ergonomics aspect of using computers. Some colour may have a potential effect on the degree of eye strain and tiredness of the user. Light reflecting off the screen can make it very difficult to read the screen. This can be overcome by the addition of a fine wire mesh over the screen which prevents reflected light.
19 - 86
BA332 c. Noise
INTRODUCTION TO COMPUTERS
Noise is another factor to take into consideration. Computers use fans to keep cool. It is surprising how noisy these can get in an office with several machines. It is often the silence which ensures after the machines have been switched off that illustrates the noise level when they were on. In addition to this, impact printers are noisy in operation. There are two ways to deal with this. Printers, for example, may be moved to another room, or they may be covered by acoustic hoods to reduce the noise.
19.8 Multimedia
Information delivery is becoming an important aspect of new systems that are implemented. Wherever possible, information should be presented in a natural and attractive manner. Multimedia is the combination of text, sound, video, graphics and animation for use in presentations. Multimedia will play a major role as a front-end to a growing number of systems, and it will be the technology of choice for public systems. Individually, text, graphics, image, sound, animation, video on computers is nothing new. The key difference is that in multimedia, these different media are almost seamlessly integrated in the digital domain. The applications of multimedia lie in the following areas: a. b. c. d. Training and education Marketing Public relations (PR) Entertainment
19 - 87
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
20 - 88
BA332
INTRODUCTION TO COMPUTERS
20 - 89
INTRODUCTION TO COMPUTERS Similarly, fibre optic cable is very expensive but has a much larger bandwidth and can also transmit at a much higher speed. The cost per bit is therefore lower if the volume is high.
BA332
20.7 Teletext
Teletext is the technology used by broadcasting companies which allow TV viewers access to large amounts of data which are broadcasted alongside TV signals. Examples are the BBCs Ceefax and ITVs oracle in the United Kingdom. The data is displayed on a television screen and the user can choose which data is displayed, by selecting with a hand held key pad.
20 - 90
BA332
INTRODUCTION TO COMPUTERS
20.9 Videoconferencing
Videoconferencing is the technology used to allow 2 groups of persons to hold meetings when the persons involved are geographically far apart. Even lectures can be conducted this way. Videoconferencing increases the efficiency of company employees since they travel less frequently and can set up a meeting very quickly. The equipment for videoconferencing can be set up in the office or the users can go to special, local conference centres and be linked up with sound to other persons in other similar conference centres in other parts of the world.
20.10 Telecommuting
Telecommuting is the situation where people use communications and computer technology to perform work at home or while travelling. In this way, they avoid the usual physical commute to work. Using a PC and a modem, for instance, a programmer can do his or her work at home instead of at the office.
20 - 91
Copyright 1995 by Thames Management Centre International. All right reserved. No part of this lecture notes may be reproduced in any form or by any means, without the permission in writing from Thames.
21 - 92
BA332
INTRODUCTION TO COMPUTERS
21.1 Introduction
Before databases were introduced, all data was stored in files. Files are still used today, but are much less common. A file stores only one type of record. On the other hand, databases can store different types of records.
21 - 93
BA332
The indexed-sequential file organisation is a combination of the earlier two methods. Like the direct access method, it is found only on disks. The physical space on a disk where records are stored is called a track. A track is the storage area of the disk consisting of a circular band. In an indexed-sequential file, data records are stored sequentially by record key. More specifically, a few data records are stored on any one track. An index is created automatically by the data management system. The index will carry the highest record key of those records in a track. When a particular record is to be accessed, the index is looked up to find the track where the record can be found. Then the records in this track are read sequentially until the particular record desired is found.
21.4 Databases
A database is a data store for accepting, storing and providing on demand data for multiple independent users. It is essentially a means of organising data in related file structure to allow quick, user specified access and manipulation of the data. They are controlled by systems software called Data Base Management Systems (DBMS). The data in a database is accessible to unauthorised managers and other personnel for administrative purposes and for use in making decisions and controlling business operations. Databases may relate to specific functional requirements such as accounting or may provide for interfunctional information needs.
21.5 DBMS
The database management system (DBMS) is the software that builds and maintains the data base. It also provides the environment through which an end-user can access the data base. What are the functions performed by a DBMS? a. Record Creation and Updates The database is maintained by the user creating, deleting or amending records. The Data Base Management System will also allow the user to process selected groups of records, the whole file or individual records. This is accomplished by selecting the required option from a menu displayed on the video screen or by keying in the relevant command from the keyboard. b. Record Selection by Search Criteria The processing can also involve the extraction of information from the selected records according to specified search criteria. In a student database, for example, if we wanted to list the students who have attended less than 80% of classed, this would be handled by the DBMS provided the required data is recorded in the database.
21 - 94
BA332
INTRODUCTION TO COMPUTERS A database has searching facilities ranging from limited searches on keywords to full text searching. This facility provides the means of extracting from a large volume of data useful facts which could not possibly be found by physical search methods in sufficient time to make a decision. A query language is used to specify the search criteria. This language facilitates enquiries using English-style words to define commands, so greatly assisting users to find the information they are seeking. c. Minimise Data Redundancy If a data element or record (e.g. an employee address) appears twice in an organisations records, this is called data redundancy, since logically, it should not be necessary to hold the date twice, hence one copy is redundant. Similarly, in a database, data redundancy should be eliminated, or at least, minimised and this is the task of the DBMS. d. Security The Data Base Management System is also responsible for providing security for the database, ensuring against unauthorised access and data corruption.
21 - 95
INTRODUCTION TO COMPUTERS
BA332
For example, if many end-users are given access to common data, there must be a way of controlling that access to ensure that no two users are able to change the data simultaneously. The DBMS is responsible for such control.
21 - 96
BA332
INTRODUCTION TO COMPUTERS
There are a variety of methods that could be used by a DBMS to logically structure the data. Two methods that will be discussed are multilists and inverted files. a. Multilist A list links common items in a database. A list is like a chain and each link in that chain is a record with the desired attribute. By starting at the first record, the DBMS can retrieve, one by one, the records in the chain which share the desired attribute. b. Inverted Files In an inverted file, the addresses of each record with a desired attribute are stored in an index. In a fully inverted file, there will be one index for each type of data item. In a partially inverted file, only some of the attributes are indexed.
Objective
To achieve the ability to: Explain the concept of a computer system and the major categories of computer systems. Explain the concept of an information system. Identify the major component of a computer system. Explain the benefits, limitations and trends in major types of computer systems and peripheral devices. Distinguish the different types of computer software. Demonstrate an understanding of computer network systems and its essential components. Explain the impact and consequence of the Internet.
Course Syllabus
-
Describe the components and properties of computer systems, such as the hardware and software.
Describe and explain the different types of computers, ranging from mainframes to portables
Understand and explain some common software applications, such as word processing, spreadsheets, desktop publishing, electronic mail. Describe the functions of operating systems and utilities. Describe and explain various types of networks such as LAN, VAN & WAN. Describe the Internet and being connected to the World-wide Web Understand the various methods of software acquisition. Elaborate on aspects of data transmission, including basic network structure and transmission media.
21 - 97
INTRODUCTION TO COMPUTERS
BA332
Explain the use of telecommunication equipment such as telephone, PABX, fax and telex. Understand and explain the various processing techniques, such as online processing, real time and batch processing. Elaborate on software interfaces, ergonomics and multimedia. Explain database concepts and creation of a database.
21 - 98
BA332
INTRODUCTION TO COMPUTERS
Recommended Textbooks
Essential Reading
Larry Long, Nancy Long, Computers, Prentice Hall, 7th edition. Supportive Textbook
Charles S Parker, Understanding Computers: Today & Tomorrow: 2000 edition, Harcourt College Publishers. Capron, Computers 6th edition with CD-ROM, Timothy J OLeary and Linda OLeary, Computing Essentials 1999 2000, Irwin McGrawHill, International Edition. Steven L Mandell, Microcomputing Today, West Printers. Shelly, Cashman and Waggoner, Discovering Computers 98 A Link To The Future.
21 - 99
INTRODUCTION TO COMPUTERS Lesson Plan Unit 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Date Topic Introduction To Information Technology Types of Computers Input Devices Output Devices Processors Storage Devices Technology Trends Application Software - Productivity Application Software - Others System Software Computer Languages Methods of Software Acquisition Communication Medium Networks Telecommunication Telecommunication Equipment Processing Techniques Going Online Software Interfaces Telecommunications Concepts Data Files & Databases
BA332
21 - 100
BA332 1998 by International Business Unit Informatics Holdings Ltd A Member of Informatics Group Informatics Building 5 International Business Park Singapore 609914
INTRODUCTION TO COMPUTERS
21 - 101