Computer Application Module
Computer Application Module
c DEBRETABOR UNIVERSITY
Chapter one
Introduction to computer
A computer is an electronic machine, operating under the control of instructions stored in its own
memory that can accept data, manipulate the data according to specified rules, produce results, and store
the results for future use. Computers process data to create information.
Data- is a collection of facts, unprocessed datum. It cannot give a meaning by itself. When symbols
(numbers, pictures, figures etc.) are represented based on a certain rules and standards, it forms data. Data
is an input for information system.
Information-is a processed data that has a meaning to its users. It is informative about something.
Information needs cognitive states of its users i.e. demands awareness of data.
Data Computer Information
It involves the application of computers and communication technology in the task of information
handling from the generation to the utilization levels.
It is also a set of tools, processes, and methodologies such as programming, data communications, data
conversion, storage and retrieval, System analysis and design, system control and associated equipment
employed to collect, process and present information.
IT encompasses all forms of technology to create, store, exchange information (such as business data,
video, audio, images, motion pictures, etc.) with high-speed communications links.
Information Technology has been defined differently by different people, some of them are:-
IT, as defined by the Information Technology Association of America (ITAA), is "the study, design,
development, implementation, support or management of computer-based information systems,
particularly software applications and computer hardware." It deals with the use of electronic
computers and computer software to convert, store, protect, process, transmit and retrieve information,
securely.
The British Department of Industry considers IT as science of information handling, particularly by
computers, used to support the communication of knowledge in technical, economic and social fields.
It defines IT as, “the acquisition, processing, storage and dissemination of vocal, pictorial, textual and
numerical information by microelectronics based combination of computing and telecommunication”.
UNESCO defines IT, “Scientific technology and engineering disciplines and the management
techniques used in information handling and processing their application, computers and their
interaction with men and machines and associated social, economic and cultural matters”
The history of computer development is often referred to the different generations of computing devices.
Each generation of computer is characterized by a major technological development that fundamentally
changed the way computers operate, resulting in increasingly smaller, cheaper, and more powerful, and
more efficient and reliable devices. Therefore computers passes so many generations to
1. First Generation (1940-1956): Vacuum Tubes
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were
often enormous, taking up entire rooms. They were very expensive to operate and in addition to
using a great deal of electricity, generated a lot of heat, which was often the cause of
malfunctions. The UNIVAC and ENIAC computers are examples of first-generation computing
devices.
2. Second Generation (1956-1963): Transistors
Transistors replaced vacuum tubes and ushered in the second generation of computers. The
transistor was far superior to the vacuum tube, allowing computers to become smaller, faster,
cheaper, more energy-efficient and more reliable than their first-generation predecessors.
3. Third Generation (1964-1971): Integrated Circuits
The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
4. Fourth Generation (1971-Present): Microprocessors:
The microprocessor brought the fourth generation of computers, as thousands of integrated
circuits were built onto a single silicon chip. What in the first generation filled an entire room
could now fit in the palm of the hand.
5. Fifth Generation (Present and Beyond): Artificial Intelligence:
Fifth generation computing devices, based on artificial intelligence , are still in development,
though there are some applications, such as voice recognition , that are being used today. The use
of parallel processing and superconductors is helping to make artificial intelligence a reality.
Assignment 1:- Write the major technologies and changes take place in each
generation history of computers.
The characteristics of computers that have made them so powerful and universally useful are speed,
accuracy, diligence, versatility and storage capacity. Let us discuss them briefly.
Speed: - A computer is a very fast deviceand works at an incredible speed. A powerful computer is
capable of performing about 3-4 million simple instructions per second. Their speed is measured by
the amount of time it took to perform or carry out a basic operation. Computer speed measured in
terms of microsecond (10-6 one millionths), nanosecond (10-9 one billionths), and Pico second (10 -12
one trillionths).
Accuracy: - computers are accurate. Unless there is an error in the input data or unreliable program
the computer processes with a very high accuracy.
Diligence: - Unlike human beings, computers are highly consistent. They do not suffer from human
traits of boredom and tiredness resulting in lack of concentration. Computers, therefore, are better
than human beings in performing voluminous and repetitive jobsand can work for hours without
creating any error and without grumbling.
Versatility: - Computers are versatile machines and are capable of performing any task as long as it
can be broken down into a series of logical steps. The presence of computers can be seen in almost
every sphere – Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
Automatic: -Once necessary information and program is fed, the computer performs processing
without human intervention.
Storage capacity: -Today’s computers can store large volumes of data. A piece of information once
recorded (or stored) in the computer, can never be forgotten and can be retrieved almost
instantaneously. And the time it took to retrieve or process single information is not more than a
micro or nanoseconds.
Power of Remembering: - A computer can store and recall huge amount of information because of
its secondary storage capability.
No I.Q:- A computer is not a magical device. It can only perform tasks that a human being can. The
difference is that it performs these tasks with unthinkable speed and accuracy. It possesses no
intelligence of its own. Its I.Q. is zero. It has to be told what to do and in what sequence. Hence, only
the user can determine what tasks a computer will perform.
No Feelings:- Computers are devoid of emotion. They have no feelings and no instincts because
they are machines. Computers cannot make judgments on their own. Their judgment is based on the
instructions given to them in the form of programs that are written by us.
In general a computer has a capacity to store a very large amount of information in organized manner so
that accessing information is very fast.
Human Computer
Can Think Cannot think by itself
Gets Mental Tiredness Never gets Tiredness
May do mistake Can’t do mistake by itself
Has limited speed Very High Speed
Has limited Memory More Amount of memory
Accuracy may be missing Never missing
“Human can do anything computer can do but a computer cannot do everything a human can do” is a true
statement based on the following table.
Operations Performedby a Computer Corresponding Actions Performed by a Human
Hold instruction in internal storage Remember a set of instructions
Read data in machine readable form Read data in written or printed form and memorize it
or file it.
Perform arithmetic Computations Can perform arithmetic operations
Make comparisons Can make comparisons
Retrieve any data from internal memory or Remember data or retrieve data from file
secondary storage
Output the results on an output device Speak or Write the result on paper
1.5Classification of Computers
Computers can be classified into different categories based on different characteristics.
1. Based on type of data they process
Based on the type of data they process computers can be classified as:
Analog computers
Digital computers
Hybrid computers
Analog
Analog computers operate by measuring physical properties. They deal with continuous variables; they
don’t compete directly with numbers, rather, they operate by measuring physical magnitude such as
pressure, temperature, voltage, current etc.
Examples: Thermometer, Voltmeter, Speedometer
Digital
Digital computers deal with discrete variables; they operate by counting rather than measuring. They
operate directly up on numbers (or digits) that represent numbers, letters, or other special symbols.
Examples: Abacus, Desk & pocket calculators, general purpose computers
Hybrid
Hybrid computers inherit the best features of both analog and digital computers. Usually the Input is
continuous data (analog). Since Digital Processing is more accurate, processing takes place digitally. The
processed information – the output – could be either digital or analog, depending on the user preference or
the type of application.
Examples: digital camera, health monitoring machines in some hospitals,
2. Based on Size, Capacity and price
Size and capacity are also the other characteristics of computers that can be used to categorize computers.
Based on these characteristics computers can be classified as:
Super computer
The term supercomputer has been coined to describe a category of extremely powerful computer designed
for high-speed processing. A supercomputer is generally characterized as being the fastest, most powerful,
and most expensive computer.
Generally, Supercomputers are:
The largest and the most efficient computers
Very expensive
very fast and
Supports hundreds of users at different locations
Mainframe computer
Mainframe computers are large, powerful computers that are physically larger than micros and minis and
usually have processors with faster instruction processing speeds. For example, they may be able to
process from 10 to 200 million instructions per second (MIPS). Mainframe computers also support
multiple users and are expensive.
Mini computer
Minicomputers are midrange computers that are larger and more powerful than most microcomputers but
are smaller and less powerful than mainframe computer systems. Minicomputers are being used for a large
number of business and scientific applications. They are popularly used in scientific laboratories, research
centers, universities and colleges, engineering firms, industrial process monitoring and control, etc.
Micro computers
The smallest computers ever produced in the history of computers are microcomputers. Since they are
designed to be used by a single user, they have the least capacity as compared to the other types of
computers. They are also the least expensive of all types. There two different types of microcomputers are
desktop computers and portable computers (laptops, notebook computers and palmtops)
1. Special purpose computers: -They are designed to solve a single type of problem (task), that is their
components and their functions are uniquely adapted to a specific situation involving specific
application.
Example:
The public telephone box
Traffic control system
Ticket machines (used in grocery, super market etc.)
Pocket-calculators etc.
Most analog computers are special purpose computers.
Special purpose computers:
Designed to perform one specific task
Instructions is built into, or permanently stored in the machine
Specialization results in the given task being performed very quickly and efficiently
It is inflexible and cannot be easily used to perform other operations.
Past, it was expensive.
2. General purpose computers
They are designed to solve variety of problems (purposes) through the use of “store program concept”.
A program or set of instructions designed to solve a problem is read and stored into the memory and
then executed by the computer one by one. The same computer can be applied to solve another set of
problem using different program. General computers are more flexible and versatile.For example, the
personal computers (PCs) currently in wide use are general-purpose computers.
A general purpose computer is one that has the ability to store different programs of
instructions
Performs a variety of operations
It is designed to do a wide variety of jobs rather than perform a specific activity.
It is also called personal computers (PC’s)
1.6Limitation of computers
Computers have the following limitations:-
1. Cannot decide how to be programmed
2. Does not provide its own inputs, unless people provide with the input
3. Interpretation of data and implementation of decision is left for human beings
4. Unlike human beings, computers are incapable to:
Think
Create
Judge and
Motivated
To store and process large amount of information with high speed and accuracy;
To transmit information across continents via communication channels;
To perform complex mathematical computations and make comparisons;
To perform repetitive process with great ease, speed and reliability;
For research purposes;
For diagnostic purposes;
For weather forecasts etc.
c. Computers in education
For instruction and administration purpose.
Can guide a user through a course of instruction.
Can guide /provide instruction and ask questions of the user.
CAE (Computer Assisted Education), online teaching, training, conferencing, and distance
learning are good examples of computer applications in the fields of education.
d. Computers in Medicine
Used as an aid to medical research by analyzing data produced from the trial of drugs.
Used as an aid for diagnosis.
Used to hold details of patients (to maintain detailed records of the medical history of
patients)
Medical imaging is the process of creating a picture of the inside of a human (or animal)
body. Ex X-rays
e. Computersin manufacturing
Stock and production control
Engineering design
Design, manufacturing and testing processes are all in computerized.
f. Computers in Biology
Biological simulations, like molecular scale the design of therapeutic drugs, predictions of
protein structure or microscopic exercises
Collection and analysis of biological data
Bioinformatics:It involves using computers in the analysis of DNA, RNA and protein
sequences.It is part of a larger field of biology called Computational Biology.
Implantable device that is mainly used for tasks like monitoring the body’s activities or
inducing therapeutic effects, all at the molecular or cellular level.
Review questions
1. Define the term computer and IT.
2. Differentiate computer generations based on the characteristics.
3. State types of computers.
4. List and explain the computer characteristics.
5. What are the applications of your mobile?
6. What are the applications areas of computers?
7. List some limitations of computers.
Chapter two
i) Input Devices
Input devices are used to enter data into computer. They convert the data we given to them into the
form that can be manipulated in the computer (electronic format).
Some examples of input devices are Keyboard, mouse, scanner, Bar Code Reader, mice, etc
ii) Central Processing Unit
CPUexecutes instructions and performs the computer's processing activities. It is also known as processor
or microprocessor. It functions the same purpose as the human brain for human being. It is called the brain
of the computer.
One of the basic features of a computer that affects its entire performance is the CPU speed. CPU speed is
measured in Hertz (Hz).
CPU has three sub-components:
Control Unit (CU)
Arithmetic Logic Unit (ALU)
Memory
Control Unit:- It controls the overall operations of the computer system.As human brain controls the
body, control unit controls the computer hardware. Control Unit does not execute instruction by itself, i.e.
does not carry out instruction processing, but it directs other processing elements to execute instructions.
Arithmetic Logic Unit (ALU): The purpose of ALU is to execute instruction. It performs two operations:
Arithmetic operation
Logic Operation
Arithmetic operation: this includes mathematical operations like addition, subtraction,
multiplication, division, etc. If you give your computer the instruction 2+3, this will be included in
arithmetic operation and it is executed by Arithmetic Unit.
Loical Operation: this is concerned with the comparison of data and it is called logical operation.
It includes operators like less than, greater than, equal to, less or equal to, greater or equal to,
different from, etc. e.g. if mark>80, grade is 'A'.
Memory (Register) -is the memory found in CPU which store intermediate results of ALU
Speaker
LCD projector.
iv) Storage Devices
One of the unique features of computers is storage. Data can be stored on different storage media
temporarily or permanently. Storage devices can be categorized into to as:
1. Primary storage device
2. Secondary storage device
Functions of OS
Main functions of the operating system are as follows:
Process management, memory management, file management, device management, protection
and security, user interface
Device Management— The device management tasks handled by OS are—(1) open, close and write
device drivers, and (2) communicate, control and monitor the device driver.
User InterfaceorCommand Interpreter— Operating system provides an interface between the computer
user and the computer hardware. The user interface is a set of commands or a graphical user interface via
which the user interacts with the applications and the hardware.
Process Management— The process management activities handled by the OS are—(1) control access to
shared resources like file, memory, I/O and CPU, (2) control execution of applications, (3) create, execute
and delete a process (system process or user process), (4) cancel or resume a process (5) schedule a
process.
Memory Management — the activities of memory management handled by OS are—(1) allocate memory,
(2) free memory, (3) re-allocate memory to a program when a used block is freed, and (4) keep track of
memory usage.
File Management— The file management tasks include—(1) create and delete both files and directories,
(2) provide access to files, (3) allocate space for files, (4) keep back-up of files, and (5) secure files.
Protection and Security— OS protects the resources of system. User authentication, file attributes like
read, write, encryption, and back-up of data are used by OS to provide basic protection.
Chapter Three
Data Representation in Computer System
Ones
Tens
Hundreds
Thousands
(4 * 103) + (8*102) + (5 * 101) + (6 * 100)
The weight of the nth digit of the number from the left of the decimal point is equal to:
o nth digit * 10n-1
The weight of the nth digit of the number from the right of the decimal point is equal to:
o nth digit * 10-n
Module of Computer Application (Comp1031) Page 14
2013 e.c DEBRETABOR UNIVERSITY
Group discussion:
Why do we go for binary numbers instead of decimal numbers?
Repeat step 3 & 4, recording remainder from right to left until the quotient become zero in step 3.
Note that the last remainder thus obtained will be the most significant digit of the new base number
(30)10 =(11110)2 then, 0001 1110 we can add zero before the one
After that we can do 0*23+0*22+0*21+1*20 1*23+1*22+1*21+1*20
0+0+0+1 8+4+2+1=14(E)
=1 E
Therefore (30)10=(1E)16
Exercises: 1
1. Convert the following numbers to the decimal form.
a. (1001)2 b. (1101.11)2 c. (4603)3 d. (1A81)6
Solutions
1. a. (1101)2 =1*23 +1*22 +0*21 +1*21
=8+4+0+1
= 13
b. (1001.11)2 =1*23 + 0*22 +0*21 +1*21 + 1*2-1 + 1*2-2
1 1
=8+0+0+1+ 2 + 4
= 9.75
Chapter - Four
Definition: Data communication is a process of sharing ideas, information and messages with others in
particular time and space. Communication includes writing, talking and non-verbal communication (like
facial expressions, visual communications), electronic communications, etc.
It is also the transfer of information from one place to another. It may be manual – one person talks to
another. Or it may be mechanical or electronic gadget or device. Whatever the case, the process of
communication involves the following.
Basic components of communication
Source- Generates data to be transmitted
Message -Information/data to be transmitted
Transmitter- Converts data into transmittable signals
Transmission System- A communication Equipment (intermediate device) that carries data
Receiver-Converts received signal into data
Destination-Takes incoming data
Protocol-Rules and standardsthat govern data communication
Half-duplex transmission: - Transmission is possible in both directions but only one way at a time i.e.
both stations may transmit, but only one at a time. It is possible to perform error detection and request the
sender to retransmit information that arrived corrupted. Eg. Police radio (wacky talky) or talk back radio
S
Half Duplex e
n
Full-duplex transmission: - In this transmission, d signals transmitted in both direction, both stations
may transmit simultaneously. The medium carries signals in both directions at the same time.
Eg. Telephone e
Modes of Data Transmission summary: r
Full Duplex S
o
e
r
4.4Computer Network n
d
R
Computers are now found in every walk of life; in
e home, in the office, in banks, in supermarkets etc.
In earlier days, computers carryout their intended
rc functions in a stand-alone mode. But, today, it
becomes necessary to exchange information with other computers. A standalone is workstation
e
computer that cannot share information with o other computers.
i
r
v
eR
re
c
e
i
v
A computer network is a group of computers and
e associated peripheral devices connected by a
communication channel; capable of sharing files
r and other resources among several users.
Standalone PC’s are not enough to give all the utilities the user demands.
Because: Standalone PC has only
Uses a single printer for each PC.
Use floppies/flash disk to share documents (that is boring & easy to be corrupted)
No internet connection, etc.
If the computer shown above was to be connected to other computers, then, it could share data with the
other computers or send documents to a printer. This connecting together of computers and other devices
is called a network, and the concept of connected computers sharing resources is called networking. See
the following diagram.
Sharing of peripheral devices: Printers, Hard disk drives and Scanners are examples of
peripheral devices. All these devices cannot be connected to each and every computer as they are very
expensive. Hence, these devices can be shared by many users through a network.
Sharing information/data: Message,Assignment, documents, audio/video, photos using e-mail and
Facebook
Sharing of Programs: In many organizations, people use almost the same software and access the
same dataE.g. word-processors, spreadsheets
Better Communication: In the digital world, information can be transferred within fraction of a
second over long distances. And one of the greatest features of networks is Electronic Mail (E-Mail)
system. Thus, a company can eliminate the delays encountered with standard postal services or with
telephone tag, by using E-Mail services.
Centralizing administration/support: Easier to maintain computers if they are all set up in a uniform
manner with the same operating system, etc.
Security of information: Before networks became a common place, an individual employee was
storing information in his or her desktop computer which was not secured. But today, such data or
information could be backed-up or duplicated on a network storage device, shared by others.
MAN
Metropolitan area network (MAN) covers a much larger area than a LAN and is a public or a private
network used to connect various locations, including the sub urban. Campus networks are the example of
a MAN
Basic features:
It covers large geographical areas than LAN such as cities, districts, Regions etc
It is an interconnection of several LANs e.g.: if your organization has several branches in
different cities.
It uses expensive cables (media) – fiber optic.
E.g.: Commercial Bank of Ethiopiafrom Addis Ababa to other branches in different cities (Adama and
Hawasa branches)
WAN
A WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists
millions or more local area networks (LANS) which can communicate to each other and access internet
(global networks)
Computers connected to a wide area network are often connected through public networks, such as the
telephone system. They can also be connected through leased lines or satellites. The largest WAN in
existence is the internet.
Basic features:
The idea of connecting computers within a target Geographical area like between
o Countries & b/n Continents
Uses fiber optic cables, microwaves,& satellite (wireless Technology), Telephone line, modem etc.
o E.g. Global Area network (GAN) Internet
E-mail services and chatting
Example: Wide area network architecture- global internet working
Peer-to-Peer Networks
In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers.
All the computers are equal and therefore are known as peers. Each computer functions as both a client
and a server, and there is no administrator responsible for the entire network. The user at each computer
determines what data on that computer is shared on the network.
Basic features:
There is no dedicate sever
All PCs are peers (equal) -No hierarchy
They all work both as a client & as a server.
Module of Computer Application (Comp1031) Page 26
2013 e.c DEBRETABOR UNIVERSITY
There is a need of additional software-NOS ( Network operating system), and Server software
Advantage
security is the main importance
easy to backup
Redundancy is available (duplicating the important data into other workstations)
Supports thousands of users (more 100)
1. Bus Topology
In a bus topology, all of the computers in a network are attached to a continuous cable, or segment, that
connects them in a straight line (See Figure below). In this straight-line topology, a packet is transmitted
to all network adapters on that segment.
Advantages of the bus topology are
Use of cable is economical
Media is inexpensive and easy to work with
System is simple and reliable and is easy to extend.
Because of the way electrical signals are transmitted over this cable, the ends of the cable must be
terminated by hardware devices called terminators.
If there is a break anywhere in the cable or if an end is not terminated, the signal will travel back and
forth across the network and all communication will stop.
An increase in the number of computers results in an increase in noise and a corresponding decrease in
network efficiency.
Bus topology
Star Topology
In a star topology, cable segments from each computer on the network are connected to a central
component, or hub (See Figure below). A hub is a device that connects several computers together to
form star topology. In a star topology, signals are transmitted from the computer, through the hub, to all
computers on the network. On a larger scale, multiple LANs can be connected to each other in a star
topology.
An advantage of the star topology is that if one computer on the star topology fails, only the failed
computer is unable to send or receive data. The remainder of the network functions normally.
The disadvantage of using this topology is that because each computer is connected to a hub, if the hub
fails, the entire network fails.
Star topology
Ring Topology
In a ring topology, computers are connected on a single circle of cable (See Figure below).. The signals
travel around the loop in one direction and pass through each computer, which acts as a repeater to
boost the signal and send it to the next computer.
The advantage of a ring topology is that each computer acts as a repeater, regenerating the signal and
sending it on to the next computer, thereby preserving signal strength.
Ring topology
The method of transmitting data around the ring is called token passing. A token is a special series of
bits that contains control information. Possession of the token allows a network device to transmit data
to the network. Each network has only one token.
The disadvantage of a ring topology is that only one computer at a time can send data on a single token
ring.
Mesh Topology
In a mesh topology, each computer is connected to every other computer by a separate cableas shown in
the figure below. This arrangement provides redundant paths through the network so that if one cable
fails, another carries the traffic and the network continues to function.
Mesh topology
Hybrid Topologies
In a hybrid topology, two or more topologies are combined to form a complete network design.
Networks are rarely designed using only one type of topology. For example, you may want to combine a
star with a bus topology to benefit from the advantages of each.
Two types of hybrid topologies are commonly in use: star-bus topology and star-ring topology.
The requirement to share resources is sometimes global. People need to exchange mail, to discuss about
issues, to read news, to advertise, to sell and buy, to exchange information etc. The network of networks
that connects hundreds of thousands of networks, and millions of computers around the world is called the
internet
The Internet is a network of networks that is extended all around the world. It is not owned by anyone
or any institution, but controlled and managed by the internet service provider (ISP), in our case Ethiopian
Telecom.
The Internet is a term used to describe thousands of computers connected with each other spanning over
the world. It is the largest network in existence. It is a network of networks acting as one. It is a
worldwide communication to businesses, homes, schools and governments.
Internet is also acts as acyberspace (a virtual place that you can do a lot of things like visiting places,
chatting with friends, buying and selling products, advertise products, reading researches, etc).
With internet:
You can communicate with friends or colleagues.
You can communicate with one person at a time or thousands.
You can send & receive files or information over a greater distance.
Chapter – Five
Threat is a source of probable trouble or attack to a system that could cause losses. One of the threats in
computer system is Virus.
Computer Viruses
Computer viruses are software programs that are able to reproduce themselves. It is the intellectual
creation of a human computer programmer. If a program is not able to replicate, then it is not a virus. Most
computer viruses are damaging. Computer virus is a program that is intentionally done to harm users’
program without permission.
printers and disk drives have a number of moving parts that get dirty causing overheating and early
failures
Measures:
Clean computer systems and its peripherals periodically
Use dust covers
Keep computer room windows closed
No smoking near the system
Do not touch the surface of disk drives and other internal components
Clean the inside portion as well as the area with a vacuum cleaner
Blow the dust in the screen with a pressurized anti-static spray
Use soft brush to clean the screen and clean the cabinets with mild soap and then dry them with a
piece of soft cloth.