Information Technology or IT is an important component in the teaching and learning process. To excel in this role, you as a teacher have to understand a number of basic concepts in the management of IT in operating and maintaining the computer as well as the computer laboratory. This topic will discuss three important aspects in this management: the maintenance of the computer, its basic networking and managing the computer laboratory. Managing IT is useful too in managing the resources of IT in teaching and learning.
SOFTWARE MAINTENANCE
Computers are dynamic machines and constantly support changes and addition of software. A computer usually possesses the minimum software which consists of the system software, utility or various other software.
With this variety of software available in the computer, proper maintenance has to be carried out to optimise the ability of the computer.
- Disk Defragmenter- Allows the data to be accessed faster
- The program operates faster
 
When the computer saves the data on the hardisk or diskette, the data is placed on the first sector of disk that can be used. The computer will try to place the data consecutively (close). However, this does not always occur. When the contents of a file are spread between two or more sectors, it is said to be fragmented. This causes slow access and subsequently affects the computerÊs performance. This problem can be solved by using the Disk Defragmenter utility facility. You can use various methods similar to the ScanDisk operation to open Defragmenter facility.
- Click the button Start > Programs > Accessories > System Tools then click on Disk The Defragmenter process will be carried out in two modes:- Setting Mode – utilities can be carried out in the background without being displayed to the
- Visible Mode – the screen will display the defragmenter
 
Installation of Software
You can add other software into your computer. Windows system operation provides the facility to install software.
There are many methods to install a software.
Some  software  has  the  auto-install  feature  and  you  can  install  the  software directly. In order to install manually, the following steps can be taken:
- Click on the icon MyComputer on the
- Click CD-Drive on the MyComputer.
- Click file.exe to start the
BASICS OF NETWORKING
• What is a network?
Computer  Network  is  a  collection  of computers  that  can  communicate  with  one another through a shared media.
Uses of computer Network
Components of computer network
a)      File server
b)     Workstation
c)      Network interface card
d)     Concentrators/Hub
e)      Repeaters
f)       Bridges
g)      Routers
h)     Network topologies
Main Types of topologies
d)     Tree Topology
Combination of characters from the Bus and Star Topology . It contains a number of work station groups in the form of stars connected to the cable forming a backbone to a topology in the bus topology form. This Tree Topology allows a spread of shapes from one existing network and it also allows schools to coordinate one network according to their needs.
Combination of characters from the Bus and Star Topology . It contains a number of work station groups in the form of stars connected to the cable forming a backbone to a topology in the bus topology form. This Tree Topology allows a spread of shapes from one existing network and it also allows schools to coordinate one network according to their needs.
e)      5-4-3 Arrangement
•     Applies  when  Ethernet  protocol  with  coaxial  cable  is used. 
     When  there  are  two  nodes  in  a  network,  only  5 segments  will  be  allowed  at  a  maximum  level.  Then, those  5  segments  will  be  connected  through  4 repeaters or concentrators. As an  addition, only 3 from the  5  segments  can  be  expanded  if  it  is  made  from coaxial  cable.
•     
      This  regulation  cannot  be  followed  by  another network  protocol  or  an  Ethernet  protocol  where  all cables  used are fibre optic  cables.
f)       Hierarchy Topology
• Sorts the resources throughout the whole organisation according to the needs of a management level.
• Hierarchy network uses a small computer that is added to a bigger computer centre.
• Although each leg of the hierarchy can operate on its own, the whole system is controlled by the main system.
• Sorts the resources throughout the whole organisation according to the needs of a management level.
• Hierarchy network uses a small computer that is added to a bigger computer centre.
• Although each leg of the hierarchy can operate on its own, the whole system is controlled by the main system.
Criteria in selecting Topology
Finance
• Bus Linear Topology may be cheaper if compared to other topologies moreover if the bus topology does not need a concentrator .
• Bus Linear Topology may be cheaper if compared to other topologies moreover if the bus topology does not need a concentrator .
Cable
• Bus topology configuration network needs a longer cable compared to other topologies
• Bus topology configuration network needs a longer cable compared to other topologies
Duration benefits
Types of cable
• The most popular cable used in school is the unshielded twisted pair - UTP
Network Protocol
Network protocol is a standard measurement that allows the computer and the IT device to communicate between one another . It is used to control communication in the network. The normal Protocol will decide:
• how the computers distinguish each other in a network,
• what form the data has to take before it is transmitted
• how the data can be processed when it reaches the desired destination and
• how to deal with faulty or lost transmission or packet.
• There are three types of information sharing through the basic computer network that is:
a. Local Area Network (LAN)
There are three types of common topology network in the LAN configuration for the customer network. The networks are
• Bus Topology or Linear Bus
• Star Topology or Spider
• Token Ring Topology
b. Metropolitan Area Network (MAN)
c. Wide Area Network (WAN)
LABORATORY MAINTENANCE
1) Safety and Laboratory Regulations
a. Regulations on the Use of the Laboratory
b. User Safety
c. Ensuring Data Safety
d. Ensuring Computer safety
i. Environment
ii. Computer System
iii. Monitor
iv. Internal System Unit
v. Keyboards
vi. Disks
2) Protecting the Computer from Virus
The Virus can enter the computer system :
• Through a copied programme or file from a disk
• Through the virus replica process itself
• Through downloading or through e-mails. It usually attacks EXE. and COM files.
Examples of Virus
• Creeper - the first virus to be invented in the year 1970
• Christmas Virus - invented on Mar 1990. It displays the Christmas tree on 24 December until 1 January every year .
• Brain - existed since 1986. It spoils the boot sector and FAT and changes the disk label.
• Dark Avenger - from Bulgaria in the year 1989. It attacks the file.com , .exe and .ovl.
• Den Zuk was detected in Indonesia on 1988.
• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.
• Stoned - created in February 1988.
• Michael Angelo - exploded on March 1992
Signs of Virus attack
• A program takes a longer time than usual to run.
• Disk operations seem difficult to conduct.
• ERROR message are displayed.
• Free Memory in RAM reduces.
• Programs or files disappear strangely.
• Changes in file size especially exe. and com. files.
• There are hidden files.
• It attacks the File Allocation Table. Boot sector or FAT that is spoilt and will cause the file in the disk to be undetected and the boot sector that is spoilt will not be able to start the
computer system.
• It attacks the file by changing the code and contents of the file disabling its use.
• It lags the computer and finally the system breaks down when it spreads and fills the computer memory.
• It creates a bad sector causing loss or inaccessibility of data.
• It causes an increase in file size and alternatively reconstructs the file.
• Controls the computer after boot sector is attacked
• It shows an untrue display screen.
• It changes the disk label.
Ways of addressing Virus attack
(i) Preventive Methods
• Use a password so that only authorized people can use the computer.
• Always scan for virus using anti-virus scans such as MacFee Scan, PcCillin, TAVS, Kasperskey , etc
• Don’t save data in the hard drive unless very important
• Always prepare a backup so that there is a copy in case the original disk is spoilt.
• Don’t share disks: possibly have virus in it.
(ii) Defense Mechanism
• Install & update anti-virus software
• Restoration Methods
3) Laboratory Use Time Table
• A Time Table for the use of the Laboratory has to be arranged so that the teaching and learning process can be implemented well.
• A teacher, especially Computer Laboratory attendants, should refer to all parties including
curriculum committees, heads of departments, time table coordinators and science laboratory attendants to arrange time tables so that they do not clash and suitable for the subjects taught.
• The most popular cable used in school is the unshielded twisted pair - UTP
Network Protocol
Network protocol is a standard measurement that allows the computer and the IT device to communicate between one another . It is used to control communication in the network. The normal Protocol will decide:
• how the computers distinguish each other in a network,
• what form the data has to take before it is transmitted
• how the data can be processed when it reaches the desired destination and
• how to deal with faulty or lost transmission or packet.
Network  Protocol:  3  kinds  of  communication protocol:
Token  Ring : Token  ring  uses  the  ring  topology   where  the  data is  sent  from  one  computer  to  another  in  a  circle until all data reaches again to the Sender
Ethernet : 
• Ethernet  uses  the  protocol  CSMA/CD  (Carrier Sense Multiple  Access/Collision Detection).
• CSMA/CD  -  The  Protocol  which  allows  computers to communicate simultaneously and provide ways to solve the problem in the event of a clash of data.
TCP/IP
• Data  is  broken  into  smaller  parts  (packet)  and  then attached  with  the  sender’s  address  and  the recipient’s  address.  Data  packets  may  not  arrive  in sequence.
• TCP  -  ensure  that  each  packet  reach  is  numbered well  &  reach  in  good  order  so  that  the  receiver arranges  the data according to the correct sequence.
• IP   -  is  responsible  for  providing  the  address  for  a computer or device.
BASICS OF NETWORKING
• There are three types of information sharing through the basic computer network that is:
a. Local Area Network (LAN)
The  basic  function  of  LAN  as  a  network  is  to connect  a  number  of  computers  in  a  restricted
area  such  as  the  university  campus,  in  a  small building,  in  a  room  and  often  connected  to  a
main  computer  framework  or  minicomputer.  Can be  connected  through  twisted  pair  cable, fibre optic,  telephone  lines,  infrared  lights  and  radio signals.
There are three types of common topology network in the LAN configuration for the customer network. The networks are
• Bus Topology or Linear Bus
• Star Topology or Spider
• Token Ring Topology
b. Metropolitan Area Network (MAN)
Metropolitan  Area  Network  or  MAN  usually  covers  a  vast geographical  area..  The  MAN network  usually  operates  in  cities, a  group  of  schools  or  in  a  small  district.  With  a comparatively wide  communication  network  in  a  geographical  vicinity, information can be disseminated widely,  quickly and effectively .
c. Wide Area Network (WAN)
The  typical  Wide  Area  Network  connects  two  or  more  Local Area  Network  and  usually  covers  a  wide  geographical  area using  the  microwaves,  telephone  cables,  satellites  or  other means of communication. 
LABORATORY MAINTENANCE
1) Safety and Laboratory Regulations
a. Regulations on the Use of the Laboratory
b. User Safety
c. Ensuring Data Safety
d. Ensuring Computer safety
i. Environment
ii. Computer System
iii. Monitor
iv. Internal System Unit
v. Keyboards
vi. Disks
2) Protecting the Computer from Virus
• Computer  virus  is  a  program  and  does not  evolve  on  its  own  but  is  written  or created  by  a  person  with  an  intention. The  computer  virus  can  spread  and affected  other  programmes  on  the system. It is usually hidden.
• BOMB  is  a  computer programme  that  does  not spread  but  that  which produces  an  explosion.
  The  explosion  of  the BOMB is unpredictable.
• WORM  is  a  vicious  program  that  can  spread  and corrupt the memory or inside the disk until there isn't a complete  memory  or  space  in  the  disk.  It  cannot explode.
• A   VIRUS  is  a  program,  a  script or  macro  that  is  more  dangerous because  it  can  explode, spread  or even  multiply .  Virus  can  be written  by  experts  in  computer programming. It aims at sabotage, investigation, research, comedy or business.
The Virus can enter the computer system :
• Through a copied programme or file from a disk
• Through the virus replica process itself
• Through downloading or through e-mails. It usually attacks EXE. and COM files.
Examples of Virus
• Creeper - the first virus to be invented in the year 1970
• Christmas Virus - invented on Mar 1990. It displays the Christmas tree on 24 December until 1 January every year .
• Brain - existed since 1986. It spoils the boot sector and FAT and changes the disk label.
• Dark Avenger - from Bulgaria in the year 1989. It attacks the file.com , .exe and .ovl.
• Den Zuk was detected in Indonesia on 1988.
• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.
• Stoned - created in February 1988.
• Michael Angelo - exploded on March 1992
Signs of Virus attack
• A program takes a longer time than usual to run.
• Disk operations seem difficult to conduct.
• ERROR message are displayed.
• Free Memory in RAM reduces.
• Programs or files disappear strangely.
• Changes in file size especially exe. and com. files.
• There are hidden files.
• It attacks the File Allocation Table. Boot sector or FAT that is spoilt and will cause the file in the disk to be undetected and the boot sector that is spoilt will not be able to start the
computer system.
• It attacks the file by changing the code and contents of the file disabling its use.
• It lags the computer and finally the system breaks down when it spreads and fills the computer memory.
• It creates a bad sector causing loss or inaccessibility of data.
• It causes an increase in file size and alternatively reconstructs the file.
• Controls the computer after boot sector is attacked
• It shows an untrue display screen.
• It changes the disk label.
Ways of addressing Virus attack
(i) Preventive Methods
• Use a password so that only authorized people can use the computer.
• Always scan for virus using anti-virus scans such as MacFee Scan, PcCillin, TAVS, Kasperskey , etc
• Don’t save data in the hard drive unless very important
• Always prepare a backup so that there is a copy in case the original disk is spoilt.
• Don’t share disks: possibly have virus in it.
(ii) Defense Mechanism
• Install & update anti-virus software
• Restoration Methods
3) Laboratory Use Time Table
• A Time Table for the use of the Laboratory has to be arranged so that the teaching and learning process can be implemented well.
• A teacher, especially Computer Laboratory attendants, should refer to all parties including
curriculum committees, heads of departments, time table coordinators and science laboratory attendants to arrange time tables so that they do not clash and suitable for the subjects taught.












 













