previously << GIVE ANY THREE PRECAUTIONARY MEASURES CONSIDERED TO ENSURE THE SAFETY OF COMPUTERS IN A COMPUTER LABORATORY
GIVE TWO TYPES OF STORAGE DEVICES USED IN A COMPUTER GIVING AN EXAMPLE OF EACH.
There are various categories under which storage devices can be classified;
a) CLASSIFICATION OF STORAGE DEVICES BASED ON THE DURATION OF TIME THEY STORE INFORMATION.
Storage devices in this category can either be;
b) classification of storage devices based on mobility.
Storage devices can also be categorized according to mobility. I.e.
c) classification of storage device on how they function.
Storage devices functions in different ways depending on the technology used to manufacture each one of them. They include;
give any three precautionary measures considered to ensure the safety of computers in a computer laboratory
tHE KEYWORD HERE IS 'SAFETY'
Safety here means, a condition or a measure taken to protect computers from unlikely damage, risk, danger or burglary.
POSSIBLE PRECAUTIONARY MEASURES
1. BURGLAR PROOFING
Physical access to the computer room should be restricted to ensure that only authorized persons get access to the computers.
To prevent unauthorized access to the computer room, the following controls should be implemented:
Both computers and human beings emit heat energy into the environment. Therefore, the computer room must have good circulation of air to avoid overheating and suffocation.
Proper ventilation enables the computers to cool, and therefore, avoids damaging the electronic parts.
The following facilities can ensure proper ventilation in a room:
3. DUST CONTROL
The service should include; blowing dust from the System unit, cleaning the floppy drives, cleaning the Keyboard, cleaning the Monitor externally, and also cleaning all peripheral devices such as Printers and Mouse.
4. DUMP CONTROL.
Humidity in the computer laboratory must be regulated to remain at an optimum 50%. If the humidity is low, it allows static electricity to build up and causes damage to sensitive electronic components. Similarly, high humidity of over 70% causes rusting of the metallic parts of the computer system.
5. HANDLING OF MATERIALS & EQUIPMENT.
Computer devices must be handled with a lot of care as they are extremely fragile and can easily get damaged. Dropping or bumping can cause permanent damage on the device, e.g., to transport the System unit always handle it on its frame.
previously: A SPREADSHEET HAS THE FOLLOWING ENTRIES. PROVIDE A FORMULA FOR CELL C5 THAT CAN BE COPIED ONTO CELL D5 AND THE RANGE C6...D10 TO GIVE A UNIFORM INCREASE OF 10% OF THE PREVIOUS YEARS VALUE FOR EACH ITEM.
This is the ability for a computer to accept data either through input devices such as scanners, keyboards, mice and others or through information retrieved from storage devices.
Input of data is a main function because all other functions depend on the incoming data for processing and output.
Processing and storage are sometimes broken down as separate basic functions of a computer. However, looking at this critical idea keenly, we notice that processing and storage are sometimes inseparable this is because processing devices rely heavily on storage devices vis a vis.
Processing is an act where a computer converts raw meaningless piece of information called data into a more meaningful piece of information.
This is normally done with a closer help of primary storage devices such as the RAM, and special types of memories such as the registers, buffers and cache memory.
Processing is a main function of a computer because of the conversion, manipulation of numeric data and logical decisions.
This is an act for a computer to display the result of a processing activity. This can be done using output devices such as the monitor, printer, plotter, speakers etc.
The functions of a computer system cannot be complete without the output, simply because it gives a feedback of the result for the computer user to digest, change, amend, store or print.
A spreadsheet has the following entries. Provide a formula for cell c5 that can be copied onto cell d5 and the range c6...d10 to give a uniform increase of 10% of the previous years value for each item.
A spreadsheet has the following entries.
Provide a formula for cell c5 that can be copied onto cell d5 and the range c6...d10 to give a uniform increase of 10% of the previous years value for each item.
What is a laser printer?
This is an electrostatic technology powered printer that uses a laser beam of light to create characters on a piece of paper.
How a laser printer works
RELATED LINKS ..
Advantages of laser printers
Disadvantages of laser printers
wHAT ARE SECONDARY sTORAGE DEVICES?
Also called auxiliary storage devices or persistent storage media are computer hardware devices involved in the storage of data, permanently.
These devices can be categorized as:
Related links ..
01. INPUT DECICES
These are devices that enter data into a computer and also covert data from human readable form to machine readable form.
Examples of these devices include:
02. Central Processing unit
The CPU-Central Processing Unit is a device made from a collection of integrated circuits. Its main functions are:
03. Primary Storage
These are devices that provide temporary storage for task that are to and from processing. They include:
04. Secondary Storage
These are devices that permanently store data in the computer or they are portable. They include:
05. Output Devices
These are devices that display activities in the CPU to the user and converts information from machine readable form to human readable form. These devices include:
In the evolution of computers, each of the passing computer generations had its own technology which was an improvement of the previous technology. Below is a match of computer generations with their processor technology and what each of the processors were capable of.
01. FIRST GENERATION COMPUTERS
They used thermionic valves
This is a device that controls electric current flow in a high vacuum between electrodes to which an electric potential difference has been applied. as a thermionic tube or thermionic valve uses the phenomenon of thermionic emission of electrons from a heated cathode and is used for a number of fundamental electronic functions such as signal amplification and current rectification. [Source: https://en.wikipedia.org/wiki/Vacuum_tube]
02. SECOND GENERATION COMPUTERS
They used transistors
A transistor is a semiconductor device used to amplify or switch electronic signals and electrical power. It is composed of semiconductor material usually with at least three terminals for connection to an external circuit.
How does a transistor work ?
By turning a small input current into a large output current, the transistor acts like an amplifier. But it also acts like a switch at the same time. When there is no current to the base, little or no current flows between the collector and the emitter. Turn on the base current and a big current flows.
03. THIRD GENERATION COMPUTERS
They used Integrated Circuits (ICs)
A collection of transistors make up an Integrated Circuit
An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated. An IC can function as an amplifier, oscillator, timer, counter, computer memory, or microprocessor. A particular IC is categorized as either linear (analog) or digital, depending on its intended application. [Source: https://whatis.techtarget.com/definition/integrated-circuit-IC]
04. FOURTH GENERATION COMPUTERS
They used very large scale integrated (VLSI)
VLSI is an acronym that represents Very Large Scale Integrated.
A collection of Integrated Circuits (ICs) Make up VLSI
An Integrated Circuit is the circuit in which all the Passive and Active components are fabricated onto a single chip. Initially the Integrated Chip could accommodate only a few components. As the days passed, the devices became more complex and required more number of circuits which made the devices look bulky. Instead of accommodating more circuits in the system, an Integration technology was developed to increase the number of components that are to be placed on a single chip. This Technology not only helped to reduce the size of the devices but also improved their speed. Depending upon the number of components (Transistors) to be integrated, they were categorized as SSI, MSI, LSI, VLSI, ULSI & GSI.
Small Scale Integration (SSI):
What is an operating system
An operating system is a collection of integrated computer programs that provide recurring services to other programs or to the user of a computer.
These services consist of disk and file management, input/output activities, storage resources, diverse support services and control of various resources.
Ssmengg.edu.in describes an operating system as a program that acts as an intermediary between a user of a computer and the computer hardware. it further adds "the purpose of an operating system is to provide an environment in which a user can execute programs and the primary goal of an operating system is thus to make the computer system convenient to use."
Tutorial point describes an Operating System (OS) as an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.
Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/OS, etc.
factors to consider when choosing an operating system
dEFINITION OF dISTRIBUTED SYSTEMS
A distributed system is a collection of computers on the same network which process data independently and once data has been updated in one computer, other computers of the same system automatically update their database too.
A distributed system can also be defined as a collection of independent computers that appears to its users as a single coherent system
Distributed processing refers to the type of processing where computers in various geographical locations are interconnected via communication links for the purpose of local processing and data access and/or transfer.
In distributed processing data processing occurs on each of the computers, unlike a centralized processing system in which terminals are connected to a host computer that performs all of the data processing.
Advantages of distributed systems
Disadvantages of distributed system
Definition of Normalization
Normalization is the process of organizing data in a database by establishing relationships between tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency, insertion anomaly, update anomaly & deletion anomaly.
Objectives of Normalization
uSES OF COMPUTERS IN HEALTH SYSTEMS
01. KEEPING OF RECORDS
03. TRANSACTIONS SUCH AS HOSPITAL BILLS
05. DIAGNOSING PATIENTS
06. AUTOMATING LIFE SUPPORT MACHINES
07. LABORATORY ANALYSIS
08. PREPARING AND ANALYSING REPORTS
10. SUPPORTING HOSPITAL INFORMATION SYSTEMS
OPERATIONAL METHODS OF AN ORGANIZATION ENSURING THE SAFETY OF DATA
01. USE OF PASSWORDS AND PIN NUMBERS
A password is a secret code provided to a system to access its resources. Passwords and pin numbers are provided to an individual to deter any unauthorized access.
02. USER ACCESS LEVEL
This is a process by which the system administrator gives separate accounts with different access rights for each user to protect sensitive data from unwanted audience. Each user in the system is given a set of resources to access the system depending on his/her nature of the job he does. In most cases, the top management are given access to confidential data and employees are given access to filtered and limited data.
03. USING FILE ATTRIBUTES SUCH AS READ ONLY, HIDING ETC.
Most systems provide features such as hiding data or changing file properties to Read Only. This move ensures that original files are not tampered with or altered to change meaning.
04. DATA ENCRYPTION
Encryption is a secure process for keeping personal and confidential information private. It is a process by which bits of data are mathematically coded using a password key/encryption key. The encryption process makes the data unreadable unless or until decrypted using decryption key known only by the user.
05. USE OF BIOMETRIC SYSTEMS
A biometric system is an automatic identification system based on matching of biological features to authenticate a system to respond. Examples include: finger prints recognition, facial recognition, eye recognition, DNA recognition, voice recognition, palm recognition etc.
06. DATA BACKUP
Backing up data is making copies of data from the original file and saving it somewhere else which may be used to restore the original after a data loss event.
07. SECURITY QUESTIONS/STAMP
This is a data security measure that ensures the system authenticate after the visitor answers a number of questions correctly as was provided during signup.
08. SECOND LEVEL AUTHENTICATION PROCEDURES
This security measure lets the system authenticate after a secret code has been provided which is sent through a third party system such as email or SMS but belonging to the user as was provided during signup.
09. USE OF reCAPTCHA TECHNIQUE
This is a Technique in data security that tests whether the system user is human or bot.
10. USE OF ANTI-MALWARE/ANTI-VIRUS SOFTWARE
Installing anti-malware or antivirus ensures that the system is not corrupted from malicious software made by hackers to harm or eavesdrop information from the organization.
meaning of data privacy
Data privacy means that data or information belonging to an individual should not be accessed by or disclosed to other people. Its an individual's right to determine for themselves what should be communicated to others.
meaning of data security
Data security is the confidentiality, integrity and availability of data.
Confidentiality of data implies that sensitive data or information belonging to an organization or government should not be accessed by or disclosed to unauthorized people, such data includes office documents, chemical formula, employee's details, examinations etc.
Integrity of data implies that data should not be modified without owner's permission.
Availability of data implies that information must be available on demand.
DISSIMILARITY between data privacy and data security
Why should people resist computers in their work place?
Computers may lead to job replacement and displacement.
This means that computers may make a person lose his/her job or root for the transfer of a worker to another department. A condition like this one may make people resist computers at their work place.
Computers require skilled manpower.
Usage of computers requires the staff to be trained for necessary skills to handle them. For those who don't see training as a good idea, will resist its implementation in a work place.
Computers have adverse effects on our health.
It is believed that computers cause cancer, electromagnetic radiation, changes in brain activity, eye problems and sleeping patterns. However, scientists are still researching on these areas to establish elements of computers that are responsible for these problems and how they can be avoided.
Some people are just bureaucratic.
Some people in work places are just difficult to change, they follow excessively complicated administrative procedures that demands things to be done they way they used to be.
Examples of these bureaucrats are school heads who demand professional records to be handwritten rather than being typed and printed. They think that handwritten records are more original than the printed ones. These are the kind of people who will never tolerate computer changes in their institutions.
Attitude problems leading to computer-phobia
There are certain personalities who just hate computers because they either acquired this attitude myth or had previous shallow experience with computers.
These people may likely resist the introduction of computers in their workplace and if it is introduced, they will blame it for everything bad that happens.
Fear of increased work in their workplace
Computers sometimes increases the amount of work in a work place. This is especially if new programs and applications are added to be used by the system. And if there will be no addition of manpower, handling them on top of your normal tasks can sometimes be overwhelming, in this case, people tend to resist them in their work places for fear of additional tasks.
Fear of increased initial costs
Introduction of computers require high initial costs however their benefits outweigh the costs (cost effectiveness). Some people may oppose implementation of computers in their workplace simply because they fear the initial costs.
Poor communication skills/strategies
Bad communication skills from the top management to workers below them may trigger workers to resist technology change. Communication breakdown, misinformation or inaccurate communication can be a recipe on why people may opt to resist technological change.
Changes that are mandated with little or no communication, on the other hand, are often poorly received, since employees may feel that the change is being shoved down their throats. When it comes to change management there’s no such thing as too much communication.
If there is no immediate information to communicate during the change, telling employees that there is no update regarding the ongoing change is communication! Don’t just keep quiet; this is also the time to maintain an open door policy regardless of where you are placed in the organization.
The Rapid Pace of Change
People often reject technology because it presents changes, big or small, to their immediate world, a world to which they have worked hard to adjust.
People usually resist to anything that disturbs their social order and if done rapidly, change may never be taken seriously, this can lead to drastic opposition and resistance.
This is another viable reason why employees resist introduction of computers at work. Change must be introduced when there are no other major initiatives going on. Sometimes it is not what a leader does, but it is how, when and why she or he does it that creates resistance to change! Undue resistance can occur because changes are introduced in an insensitive manner or at an awkward time.