You are on page 1of 9

Question 1

a) With examples distinguish between data and information


Information is defined as data which have been processed into a form that is meaningful to a
recipient and is of perceived value in current or prospective decision making. It is anything
that is communicated.
Data: is defined as a body of facts or figures, which have been gathered systematically for
one or more specific purposes
o data can exist in the forms of

linguistic expressions (e.g. name, age, address, date, ownership)

symbolic expressions (e.g. traffic signs)

mathematical expressions (e.g. E = mc2)

signals (e.g. electromagnetic waves)

b) By use of a diagram, describe a computer system

In the diagram, the arrows indicate the direction of data flow. Some data flows in one direction only.
In some cases it flows in both directions.
At the heart of the computer is the microprocessor. This contains several REGISTERS to store data
and an ARITHMETIC LOGIC UNIT (ALU) which manipulates data.
It acts as the central processing unit (CPU) of the computer, carrying out a sequence of instructions,
called a program.
The program may be stored in memory, as software, or written into the memory from tape or disk.

There are two types of memory.


Read Only Memory (ROM) which stores software permanently. The software is not lost when the
computer is switched off but the stored data cannot be changed.
Random Access Memory (RAM) which can be written to and read from.
The stored data is volatile.
It is lost when the computer is switched off.
The actual computer, its case and printed circuit boards are known as hardware.

er System
Input
Home computers are microcomputers. Input is supplied to the microcomputer with
the use of a keyboard, a mouse, or another input device. These input devices may be
called peripheral devices.
Processing
Processing is done inside the computer in an area called the central processing
unit (CPU). Processing is the conversion of input to output.
Storage
Storage refers to holding information somewhere.
RAM, Random Access Memory, is short-term memory. It is volatile memory because the
memory is automatically "erased" when the power is turned off or interrupted. The RAM
memory is located inside the computer case on the motherboard. A motherboard is not
the keyboard. The keyboard is what you type with. A motherboard holds RAM memory,
electronic circuits and other computer parts including the central processing unit. ROM,
Read-Only-Memory, is not volatile meaning the memory is still there when power is
interrupted or turned off. When the computer is turned back on again, ROM memory is
still in storage on the internal hard disk.
Output
Output is the result of a computer process. Output may be viewed on a monitor
screen, heard through speakers, printed on printers, and so forth. Output devices may
be considered hardware and are also considered to be peripheral devices.
Basic Computer "System"
A computer system refers to the computer AND all of its equipment. Equipment like
speakers, printer, keyboard, scanner, etc. is called peripheral equipment, sometimes
shortened to "peripherals". The central processing unit (CPU) is considered to be "the
computer". Without peripheral equipment (such as monitor, printer, speakers, etc.) for
input and output the microcomputer (home computer) will not be able to do anything
you find useful.

Question 2
a)Distinguish between Minicomputer and micro computer.
Microcomputer is the smallest computer which is normally called a personal computer
(PC). Microcomputers are almost everywhere - in schools, homes, offices, hospitals, and
libraries, for example. Wherever people have work to do, the microcomputer can be
found.
There are other computers in the middle range of computer power. Such computers are
called minicomputers. Minicomputers are smaller than mainframes, but they are bigger
than microcomputers. Minicomputers are commonly used in business, colleges, and
some large organizations

Contrast Read only memory (ROM) and Random Access Memory (RAM)
RAM and ROM are two common computer acronyms that many people take for granted. But what
do they really mean, and what are the differences between the two?
RAM stands for "random access memory," and is basically your computer's short-term memory. Any
open programs that you are currently running (such as Internet Explorer or Microsoft Word) are
copied into RAM so that your system can access them faster and make them perform better.
RAM is typically measured in either megabytes (MB) or gigabytes (GB), and unless your computer
is old, it probably has around 1 or 2 GB of RAM. The more RAM your computer has, the faster it
can run programs and execute code. RAM comes in different types (such as DDR, DDR2, and ECC)
and different speeds. Upgrading your RAM is one of the easiest ways to increase your system's
performance. To see how much RAM your Windows computer currently has, right-click on My
Computer.
The majority of the RAM used by your computer is synchronous dynamic RAM, also called SDRAM. It is made up of tiny transistors and capacitors stored on a memory stick, which (if you open
up your computer) you can see sticking out of your motherboard. Many devices other than
computers use RAM to store dynamic information - your toaster probably has a tiny bit of RAM
inside it.
Another type of RAM your computer uses is NV-RAM (non-volatile RAM). Non-volatile RAM is
sort of an oxymoron, since RAM can easily be changed. NV-RAM holds vital system information,
and is also located on your motherboard, but it's probably either soldered on or attached by tiny
clips.
ROM, on the other hand, is static memory - it almost never changes. ROM stands for "read-only
memory," and is used to store information your computer needs to access, but doesn't need to
change. Your computer's BIOS is stored on a ROM chip.

Information stored on ROM chips is also known as "firmware." Whereas software refers to programs
and applications and hardware refers to the physical devices and components that make up your
computer, firmware is a set of system files and instructions that help your computer run.
Occasionally firmware will get upgraded - this can be accomplished by either downloading new
firmware (which will be "flashed" onto your existing ROM chip) or by replacing the current ROM
chip with a new one.
b)

*An operating system manages hardware, runs applications, provides an interface for users, and
stores, retrieves, and manipulates files.
*It manages the hardware and software resources of the system.
*It provides a stable, consistent way for applications to deal with the hardware without having to
know all the details of the hardware.
*System tool (programs) used to monitor computer performance, debug, problems, or maintain parts
of the system.
*A set of libraries or functions which may use to perform specific tasks especially relating to
interfacing with computer system components.
Question 3
a)
b) List six functions of an operating system

An operating system provides a way for the user to communicate with the computer.

An operating system tells the computer hardware what to do.

Operating systems provide tools and run applications.

The operating system manages processes and memory.

The operating system manages workflow.

The operating system handles file and data management.

Operating systems help maintain security

Computer software can be divided into two main categories: application software and system
software. Application software consists of the programs for performing tasks particular to the
machine's utilization. Examples of application software include spreadsheets, database systems,
desktop publishing systems, program development software, and games." Application software is
generally what we think of when someone speaks of computer programs. This software is designed
to solve a particular problem for users.
On the other hand, system software is more transparent and less noticed by the typical computer
user. This software provides a general programming environment in which programmers can create
specific applications to suit their needs. This environment provides new functions that are not
available at the hardware level and performs tasks related to executing the application program.
System software acts as an interface between the hardware of the computer and the application
software that users need to run on the computer. The diagram below illustrates the relationship
between application software and system software.
The most important type of system software is the operating system. An operating system has three
main responsibilities:
1. Perform basic tasks, such as recognizing input from the keyboard, sending
output to the display screen, keeping track of files and directories on the disk,
and controlling peripheral devices such as disk drives and printers.
2. Ensure that different programs and users running at the same time do not
interfere with each other.
3. Provide a software platform on top of which other programs (i.e., application
software) can run.
The first two responsibilities address the need for managing the computer hardware and the
application programs that use the hardware. The third responsibility focuses on providing an
interface between application software and hardware so that application software can be efficiently
developed. Since the operating system is already responsible for managing the hardware, it should
provide a programming interface for application developers.
Nutt [1997] identifies four common types of operating system strategies on which modern operating
systems are built: batch, timesharing, personal computing, and dedicated. According to Nutt, "the
favored strategy for any given computer depends on how the computer is to be used, the costeffectiveness of the strategy implementation in the application environment, and the general state of
the technology at the time the operating system is developed." The table below summarizes the
characteristics of each operating system strategy as described by Nutt [1997].
By the end of this section, you should be able to do the following:

Understand the purpose of the operating system,

Distinguish between a resource, a program, and a process,

Recognize critical resources and explain the behavior of semaphores,

Describe various memory page replacement algorithms, and

Describe how files are stored in secondary storage.

References

Brookshear, J. G. (1997), Computer Science: An Overview, Fifth Edition, AddisonWesley, Reading, MA.

Nutt, G. (1997), Operating Systems: A Modern Perspective, First Edition, AddisonWesley, Reading, MA.

Question 7
a) List four services available on the internet
i. communication
ii. news
iii. weather conditions
iv. shopping
v. entertainment

Question 8

a) What is a computer virus?


Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your email program to spread itself to
other computers, or even erase everything on your hard disk.
Computer viruses are often spread by attachments in email messages or instant messaging messages.
That is why it is essential that you never open email attachments unless you know who it's from and
you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
b) explain four practices that may help prevent virus propagation
i.

Install anti-virus software. Anti-virus software scans files and attachments you receive for
known viruses. The program will warn you if any virus is detected, and then either clean,
quarantine, or delete the infected file(s). In addition to protecting you against computer viruses,
most brand name anti-virus programs also provide protection against computer worms and Trojan
horses.

ii. Frequently update your anti-virus software virus definition list. New viruses, worms, and
Trojan horses are created daily. To lessen the risk of executing a new virus that is not on outdated
virus definition lists, update the database against which your anti-virus software checks for known
viruses.
iii. Configure your anti-virus program for maximum protection. Set your anti-virus program to
automatically start when your computer boots and run at all times. In case you forget to start your
anti-virus software, configuring it to automatically run will ensure the computer is always
protected. Make sure your anti-virus program does not automatically open e-mail attachments
when your e-mail program receives them. Doing so will allow you to evaluate the attachment
using a virus scan to make sure it is safe before launching it.
iv. Scan all incoming e-mail attachments before opening them. Scan every attachment you plan to
open using your anti-virus software. Most anti-virus programs can be set up to automatically
check files. This should be done even if you recognize and trust the sender. Dangerous code that
appears to be from a reputable source (Trojan horses, for example) can gain access to your
computer if you open the attachment before scanning it.
v. Only download files from well-known, established, and trusted Web sites. Questionable
sources such as Internet news groups, message boards, chat sessions, or Web sites you do not
know much about may be suppliers of viruses for your computer. If you must download files or
programs, make sure to scan each file/program before executing it.

vi.

Keep current on Microsoft" Windows and Microsoft Office critical updates. Virus writers
are always looking to take advantage of "holes," or vulnerabilities in popular programs used
around the world. Keeping up-to-date on the current updates available for Microsoft Windows and
Microsoft Office ensures that your computer cannot be compromised by code that exploits these
holes in security. To download Windows updates, go to Microsoft Windows Update. For
Microsoft Office updates, go to Office Update.

vii.

Educate yourself on the latest viruses and their behaviors. There are many Web sites that
keep lists of all old and new viruses, including those sites that are hosted by anti-virus software
manufacturers. Many of them have mailing lists that send timely e-mail to subscribers regarding
immediate virus threats. One of the Web pages that you may find to be useful is the Security
Response page that is maintained by Symantec.

viii. Quarantine network infections. If your computer is on a network and it becomes infected with a
virus, report the matter to your systems administrator. He/she can determine the source of the
infection and act accordingly. This will prevent the virus from spreading to other networked
computers.
ix. Use floppy disks with caution. Although floppy disks are giving way to other forms of media,
they are still widely used and are a breeding ground for viruses. Never boot your computer from a
floppy disk of unknown origin. Doing so could cause your computer to launch a virus. Do not
share floppy disks. Even a trusted source may unknowingly pass along a virus-laden disk. Clearly
label your floppy disks, and do not loan them out. Always scan floppy disks with your anti-virus
program before using them, especially when using the floppy disk to transfer information from
one computer to another. You could acquire a virus from an insecure network and pass it to your
system.
x. Use common sense. Do not open any e-mail attachments from dubious or unknown sources. Do
not open any attachments from a trusted source that you were not expecting to receive. Be wary of
odd links or attachments that come through instant messaging programs. Do not download files or
programs from Web sites that look highly unprofessional or are known to harbor illegal activity.

You might also like