Data Processing/Information Processing

CLASSIFICATION OF COMPUTERS BY SIZE

SUPER COMPUTER These are the largest, fastest and most expensive computers. The cost is several millions of dollars and the speed is between 600 million to 900 million instructions per second (MIP). Another name for super computer is MONSTER. Scientists in weather forecasting, exploration make use of super computers. It can also be used for […]

CLASSIFICATION OF COMPUTERS BY SIZE Read More »

Relational database

A relational database is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. The relational database was invented by E. F. Codd at IBM in 1970. The standard user and application program interface

Relational database Read More »

HISTORY OF COMPUTERS

Consider the table below: Generations Of computers Year of development The Technology Used Characteristics Software Instruction Storage Capacity First 1951-1958     Vacuum tube Very big and slow in operation Machine language Small internal storage Second 1959-1964 Transistor Less heat generation High level & Assembly Core storage Third 1965-1975 100-1000 Chips Introduction of integrated circuit

HISTORY OF COMPUTERS Read More »

DATA AND INFORMATION

Data are raw, unorganized or unprocessed facts that need to be processed. Data can be something simple and seemingly random and useless until it is organised. TYPES OF DATA Qualitative data  i.e descriptive information Quantitative data  i.e  numeric information   SUBDIVISION OF QUANTITATIVE DATA Continuous data: this can take any value. It is also known

DATA AND INFORMATION Read More »

SOURCES OF COMPUTER INFECTION VIRUS | WARNING SIGNS, PREVENTIVE, ANTIVIRUS

There are various ways  in which viruses can attack computer system; When you download or open attachment in e-mail message or by instant messaging messages Installing unknown program from unreliable and suspicious looking web sites Illegal duplication of software from one computer to another e.g. computer games etc. When you use infected flask h drive

SOURCES OF COMPUTER INFECTION VIRUS | WARNING SIGNS, PREVENTIVE, ANTIVIRUS Read More »

Functions of Operating System

An operating system is a group of computer programs that coordinates all the activities among computer hardware devices. It is the first program loaded into the computer by a boot program and remains in memory at all times. Functions of an operating system The basic functions of an operating system are: Booting the computer Performs

Functions of Operating System Read More »

Computer Professional Bodies

The following are some of the prominent computer professional bodies in Nigeria. Nigeria Computer Society (NCS) Institute Of Management Information System. (IMIS) Computer Professional Registration Council of Nigeria (CPN) Information Technology Association of Nigeria (CPN) Nigeria Internet Group (NIG)  Nigeria Computer Society (NCS) The Nigeria Computer Society (NCS) formed in 1978 as Computer Association of

Computer Professional Bodies Read More »

INTRODUCTION TO DATA PROCESSING

Data Processing is the process of producing meaningful information from raw data.  It describes the series of actions taken to produce useful information by collecting all items of data together and performing operations on them.  The aim of data processing is to convert raw data into information. Data: Data represent the raw unprocessed input element

INTRODUCTION TO DATA PROCESSING Read More »

DATABASE SECURITY

DEFINITION OF DATA SECURITY Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.   It is a means of putting in place the different form of information security controls to protect database against compromise of

DATABASE SECURITY Read More »

GENERATIONS OF COMPUTERS

FIRST GENERATION OF COMPUTERS Electronic machine which was distinct from mechanical computers evolved about 1945. UNIVAC is a good example of this generation of computers. Computers of this generation were characterized by: They used Vacuum tubes. They were very large and expensive. They were very bulky. They had a low retentive memory. They generated a

GENERATIONS OF COMPUTERS Read More »

NUMBER BASES

CONVERSION OF OTHER BASED TO DECIMAL SYSTEM To convert numbers in other bases to denary system, expand the given number in powers of its base and evaluate. Examples 1) Convert the following numbers to base ten (i) 10012 (ii) 255eight (iii) 35416 (i) 10012 = 1 x 23 + 0 x 22 + 0 x

NUMBER BASES Read More »

CAREER OPPORTUNITIES IN DATA PROCESSING

Computer personnel are those who assemble, install, repair and operate the computer system. The term equally includes those people who make their living out of the computer industry. They include the following: Database Administrator Software programmer Hardware Engineers System analysts Web developers Computer support specialist Network Administrator Network Engineers Computer Technician Microsoft office specialist Computer

CAREER OPPORTUNITIES IN DATA PROCESSING Read More »

Internet Abuse

Internet abuse refers to improper use of the Internet and may include: Internet has so many advantages if it is used positively without caring about any false means and attractive charms of internet. The Internet is producing false trends, especially among students who easily become a victim of its colourful and charming aspects. Some disadvantages

Internet Abuse Read More »

DISTRIBUTED DATABASE

A Distributed database (DDB) is a collection of multiple, logical interrelated database distributed over a computer network. A Distributed database management system (DDBMS) is the software that manages the DDB and provides an access mechanism that makes this distribution transparent to the users. A distributed database system is a system that permits physical data storage

DISTRIBUTED DATABASE Read More »

Examples of Operating System

Definition: An operating system is a collection of programs that control the application software that users run and provides a link between the hardware and software currently running on the computer. The operating system is also responsible for the management and control of all resources (memory, hard drives, monitor, etc.) that are shared amongst the

Examples of Operating System Read More »

MAINTENANCE OF COMPUTER II

Maintenance is highly essential in order to prolong its contributing functionality. SOFTWARE MAINTENANCE The maintenance of programs inside the computer system such as virus, a spyware removal, back up software and a registry removal, cleaner. Every PC should be installed with an anti virus, a spyware removal application back up and a registry cleanser. Some

MAINTENANCE OF COMPUTER II Read More »

Internet – FULL EXPLANATION

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an

Internet – FULL EXPLANATION Read More »