Information Technology or IT is an important component in the teaching and learning process. To excel in this role, you as a teacher have to understand a number of basic concepts in the management of IT in operating and maintaining the computer as well as the computer laboratory. This topic will discuss three important aspects in this management: the maintenance of the computer, its basic networking and managing the computer laboratory. Managing IT is useful too in managing the resources of IT in teaching and learning.
SOFTWARE MAINTENANCE
Computers are dynamic machines and constantly support changes and addition of software. A computer usually possesses the minimum software which consists of the system software, utility or various other software.
With this variety of software available in the computer, proper maintenance has to be carried out to optimise the ability of the computer.
- Disk Defragmenter
- Allows the data to be accessed faster
- The program operates faster
When the computer saves the data on the hardisk or diskette, the data is placed on the first sector of disk that can be used. The computer will try to place the data consecutively (close). However, this does not always occur. When the contents of a file are spread between two or more sectors, it is said to be fragmented. This causes slow access and subsequently affects the computerÊs performance. This problem can be solved by using the Disk Defragmenter utility facility. You can use various methods similar to the ScanDisk operation to open Defragmenter facility.
- Click the button Start > Programs > Accessories > System Tools then click on Disk The Defragmenter process will be carried out in two modes:
- Setting Mode – utilities can be carried out in the background without being displayed to the
- Visible Mode – the screen will display the defragmenter
Installation of Software
You can add other software into your computer. Windows system operation provides the facility to install software.
There are many methods to install a software.
Some software has the auto-install feature and you can install the software directly. In order to install manually, the following steps can be taken:
- Click on the icon MyComputer on the
- Click CD-Drive on the MyComputer.
- Click file.exe to start the
BASICS OF NETWORKING
• What is a network?
Computer Network is a collection of computers that can communicate with one another through a shared media.
Uses of computer Network
Components of computer network
a) File server
b) Workstation
c) Network interface card
d) Concentrators/Hub
e) Repeaters
f) Bridges
g) Routers
h) Network topologies
Main Types of topologies
d) Tree Topology
Combination of characters from the Bus and Star Topology . It contains a number of work station groups in the form of stars connected to the cable forming a backbone to a topology in the bus topology form. This Tree Topology allows a spread of shapes from one existing network and it also allows schools to coordinate one network according to their needs.
Combination of characters from the Bus and Star Topology . It contains a number of work station groups in the form of stars connected to the cable forming a backbone to a topology in the bus topology form. This Tree Topology allows a spread of shapes from one existing network and it also allows schools to coordinate one network according to their needs.
e) 5-4-3 Arrangement
• Applies when Ethernet protocol with coaxial cable is used.
When there are two nodes in a network, only 5 segments will be allowed at a maximum level. Then, those 5 segments will be connected through 4 repeaters or concentrators. As an addition, only 3 from the 5 segments can be expanded if it is made from coaxial cable.
•
This regulation cannot be followed by another network protocol or an Ethernet protocol where all cables used are fibre optic cables.
f) Hierarchy Topology
• Sorts the resources throughout the whole organisation according to the needs of a management level.
• Hierarchy network uses a small computer that is added to a bigger computer centre.
• Although each leg of the hierarchy can operate on its own, the whole system is controlled by the main system.
• Sorts the resources throughout the whole organisation according to the needs of a management level.
• Hierarchy network uses a small computer that is added to a bigger computer centre.
• Although each leg of the hierarchy can operate on its own, the whole system is controlled by the main system.
Criteria in selecting Topology
Finance
• Bus Linear Topology may be cheaper if compared to other topologies moreover if the bus topology does not need a concentrator .
• Bus Linear Topology may be cheaper if compared to other topologies moreover if the bus topology does not need a concentrator .
Cable
• Bus topology configuration network needs a longer cable compared to other topologies
• Bus topology configuration network needs a longer cable compared to other topologies
Duration benefits
Types of cable
• The most popular cable used in school is the unshielded twisted pair - UTP
Network Protocol
Network protocol is a standard measurement that allows the computer and the IT device to communicate between one another . It is used to control communication in the network. The normal Protocol will decide:
• how the computers distinguish each other in a network,
• what form the data has to take before it is transmitted
• how the data can be processed when it reaches the desired destination and
• how to deal with faulty or lost transmission or packet.
• There are three types of information sharing through the basic computer network that is:
a. Local Area Network (LAN)
There are three types of common topology network in the LAN configuration for the customer network. The networks are
• Bus Topology or Linear Bus
• Star Topology or Spider
• Token Ring Topology
b. Metropolitan Area Network (MAN)
c. Wide Area Network (WAN)
LABORATORY MAINTENANCE
1) Safety and Laboratory Regulations
a. Regulations on the Use of the Laboratory
b. User Safety
c. Ensuring Data Safety
d. Ensuring Computer safety
i. Environment
ii. Computer System
iii. Monitor
iv. Internal System Unit
v. Keyboards
vi. Disks
2) Protecting the Computer from Virus
The Virus can enter the computer system :
• Through a copied programme or file from a disk
• Through the virus replica process itself
• Through downloading or through e-mails. It usually attacks EXE. and COM files.
Examples of Virus
• Creeper - the first virus to be invented in the year 1970
• Christmas Virus - invented on Mar 1990. It displays the Christmas tree on 24 December until 1 January every year .
• Brain - existed since 1986. It spoils the boot sector and FAT and changes the disk label.
• Dark Avenger - from Bulgaria in the year 1989. It attacks the file.com , .exe and .ovl.
• Den Zuk was detected in Indonesia on 1988.
• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.
• Stoned - created in February 1988.
• Michael Angelo - exploded on March 1992
Signs of Virus attack
• A program takes a longer time than usual to run.
• Disk operations seem difficult to conduct.
• ERROR message are displayed.
• Free Memory in RAM reduces.
• Programs or files disappear strangely.
• Changes in file size especially exe. and com. files.
• There are hidden files.
• It attacks the File Allocation Table. Boot sector or FAT that is spoilt and will cause the file in the disk to be undetected and the boot sector that is spoilt will not be able to start the
computer system.
• It attacks the file by changing the code and contents of the file disabling its use.
• It lags the computer and finally the system breaks down when it spreads and fills the computer memory.
• It creates a bad sector causing loss or inaccessibility of data.
• It causes an increase in file size and alternatively reconstructs the file.
• Controls the computer after boot sector is attacked
• It shows an untrue display screen.
• It changes the disk label.
Ways of addressing Virus attack
(i) Preventive Methods
• Use a password so that only authorized people can use the computer.
• Always scan for virus using anti-virus scans such as MacFee Scan, PcCillin, TAVS, Kasperskey , etc
• Don’t save data in the hard drive unless very important
• Always prepare a backup so that there is a copy in case the original disk is spoilt.
• Don’t share disks: possibly have virus in it.
(ii) Defense Mechanism
• Install & update anti-virus software
• Restoration Methods
3) Laboratory Use Time Table
• A Time Table for the use of the Laboratory has to be arranged so that the teaching and learning process can be implemented well.
• A teacher, especially Computer Laboratory attendants, should refer to all parties including
curriculum committees, heads of departments, time table coordinators and science laboratory attendants to arrange time tables so that they do not clash and suitable for the subjects taught.
• The most popular cable used in school is the unshielded twisted pair - UTP
Network Protocol
Network protocol is a standard measurement that allows the computer and the IT device to communicate between one another . It is used to control communication in the network. The normal Protocol will decide:
• how the computers distinguish each other in a network,
• what form the data has to take before it is transmitted
• how the data can be processed when it reaches the desired destination and
• how to deal with faulty or lost transmission or packet.
Network Protocol: 3 kinds of communication protocol:
Token Ring : Token ring uses the ring topology where the data is sent from one computer to another in a circle until all data reaches again to the Sender
Ethernet :
• Ethernet uses the protocol CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
• CSMA/CD - The Protocol which allows computers to communicate simultaneously and provide ways to solve the problem in the event of a clash of data.
TCP/IP
• Data is broken into smaller parts (packet) and then attached with the sender’s address and the recipient’s address. Data packets may not arrive in sequence.
• TCP - ensure that each packet reach is numbered well & reach in good order so that the receiver arranges the data according to the correct sequence.
• IP - is responsible for providing the address for a computer or device.
BASICS OF NETWORKING
• There are three types of information sharing through the basic computer network that is:
a. Local Area Network (LAN)
The basic function of LAN as a network is to connect a number of computers in a restricted
area such as the university campus, in a small building, in a room and often connected to a
main computer framework or minicomputer. Can be connected through twisted pair cable, fibre optic, telephone lines, infrared lights and radio signals.
There are three types of common topology network in the LAN configuration for the customer network. The networks are
• Bus Topology or Linear Bus
• Star Topology or Spider
• Token Ring Topology
b. Metropolitan Area Network (MAN)
Metropolitan Area Network or MAN usually covers a vast geographical area.. The MAN network usually operates in cities, a group of schools or in a small district. With a comparatively wide communication network in a geographical vicinity, information can be disseminated widely, quickly and effectively .
c. Wide Area Network (WAN)
The typical Wide Area Network connects two or more Local Area Network and usually covers a wide geographical area using the microwaves, telephone cables, satellites or other means of communication.
LABORATORY MAINTENANCE
1) Safety and Laboratory Regulations
a. Regulations on the Use of the Laboratory
b. User Safety
c. Ensuring Data Safety
d. Ensuring Computer safety
i. Environment
ii. Computer System
iii. Monitor
iv. Internal System Unit
v. Keyboards
vi. Disks
2) Protecting the Computer from Virus
• Computer virus is a program and does not evolve on its own but is written or created by a person with an intention. The computer virus can spread and affected other programmes on the system. It is usually hidden.
• BOMB is a computer programme that does not spread but that which produces an explosion.
The explosion of the BOMB is unpredictable.
• WORM is a vicious program that can spread and corrupt the memory or inside the disk until there isn't a complete memory or space in the disk. It cannot explode.
• A VIRUS is a program, a script or macro that is more dangerous because it can explode, spread or even multiply . Virus can be written by experts in computer programming. It aims at sabotage, investigation, research, comedy or business.
The Virus can enter the computer system :
• Through a copied programme or file from a disk
• Through the virus replica process itself
• Through downloading or through e-mails. It usually attacks EXE. and COM files.
Examples of Virus
• Creeper - the first virus to be invented in the year 1970
• Christmas Virus - invented on Mar 1990. It displays the Christmas tree on 24 December until 1 January every year .
• Brain - existed since 1986. It spoils the boot sector and FAT and changes the disk label.
• Dark Avenger - from Bulgaria in the year 1989. It attacks the file.com , .exe and .ovl.
• Den Zuk was detected in Indonesia on 1988.
• Ping Pong - was invented on Mac 1988. The display screen shows the picture of a bouncing ball.
• Stoned - created in February 1988.
• Michael Angelo - exploded on March 1992
Signs of Virus attack
• A program takes a longer time than usual to run.
• Disk operations seem difficult to conduct.
• ERROR message are displayed.
• Free Memory in RAM reduces.
• Programs or files disappear strangely.
• Changes in file size especially exe. and com. files.
• There are hidden files.
• It attacks the File Allocation Table. Boot sector or FAT that is spoilt and will cause the file in the disk to be undetected and the boot sector that is spoilt will not be able to start the
computer system.
• It attacks the file by changing the code and contents of the file disabling its use.
• It lags the computer and finally the system breaks down when it spreads and fills the computer memory.
• It creates a bad sector causing loss or inaccessibility of data.
• It causes an increase in file size and alternatively reconstructs the file.
• Controls the computer after boot sector is attacked
• It shows an untrue display screen.
• It changes the disk label.
Ways of addressing Virus attack
(i) Preventive Methods
• Use a password so that only authorized people can use the computer.
• Always scan for virus using anti-virus scans such as MacFee Scan, PcCillin, TAVS, Kasperskey , etc
• Don’t save data in the hard drive unless very important
• Always prepare a backup so that there is a copy in case the original disk is spoilt.
• Don’t share disks: possibly have virus in it.
(ii) Defense Mechanism
• Install & update anti-virus software
• Restoration Methods
3) Laboratory Use Time Table
• A Time Table for the use of the Laboratory has to be arranged so that the teaching and learning process can be implemented well.
• A teacher, especially Computer Laboratory attendants, should refer to all parties including
curriculum committees, heads of departments, time table coordinators and science laboratory attendants to arrange time tables so that they do not clash and suitable for the subjects taught.
No comments:
Post a Comment