Data Processing/Information Processing

Operating System

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. The operating system is a component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system […]

Operating System Read More »

COMPUTER SAFETY MEASURES

Anti-virus software is your computer’s best defence against malware (e.g., viruses, Trojan horses, worms, spyware) – install and update anti-virus software on your computer and regularly scan your computer to make sure it is free from malware. Computer safety measures are essential to protect your digital data and ensure a secure computing environment. Here are

COMPUTER SAFETY MEASURES Read More »

MEANS OF TRANSMITTING INFORMATION

There are various means of transmitting information, and the choice of method often depends on the nature of the information, the distance it needs to travel, and the desired speed and reliability of transmission. Here are some common means of transmitting information: 1. Wired Communication: This involves the use of physical cables or wires to

MEANS OF TRANSMITTING INFORMATION Read More »

Information processing – Full Explanation

Information processing is the acquisition, recording, organization, retrieval, display and dissemination of information. Information processing could also be referred to as the manipulation of digitalized information by computers and other digital electronic equipment, known collectively as Information technology. A computer information processor processes information to produce understandable results. For example, an information processor works to

Information processing – Full Explanation Read More »

Internet – FULL EXPLANATION

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an

Internet – FULL EXPLANATION Read More »

File Organization

A collection of data or information that has a name, called the filename. Almost all information stored in a computer must be in a file. There are many different types of files: data files, text files ,program files, directory files, and so on. Different types of files store different types of information. For example, program files store programs, whereas text files store text. Computer File A computer file is a resource

File Organization Read More »

RELATIONAL MODEL – Integrity Constraints

Integrity Constraints over Relations An integrity constraint (IC) is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. If a database instance satisfies all the integrity constraints specifies on the database schema, it is a legal instance. A DBMS permits only legal instances

RELATIONAL MODEL – Integrity Constraints Read More »

Computer Professional Bodies

The following are some of the prominent computer professional bodies in Nigeria. Nigeria Computer Society (NCS) Institute Of Management Information System. (IMIS) Computer Professional Registration Council of Nigeria (CPN) Information Technology Association of Nigeria (CPN) Nigeria Internet Group (NIG)  Nigeria Computer Society (NCS) The Nigeria Computer Society (NCS) formed in 1978 as Computer Association of

Computer Professional Bodies Read More »

CAREER OPPORTUNITIES IN DATA PROCESSING

Computer personnel are those who assemble, install, repair and operate the computer system. The term equally includes those people who make their living out of the computer industry. They include the following: Database Administrator Software programmer Hardware Engineers System analysts Web developers Computer support specialist Network Administrator Network Engineers Computer Technician Microsoft office specialist Computer

CAREER OPPORTUNITIES IN DATA PROCESSING Read More »

SOURCES OF COMPUTER INFECTION VIRUS | WARNING SIGNS, PREVENTIVE, ANTIVIRUS

There are various ways  in which viruses can attack computer system; When you download or open attachment in e-mail message or by instant messaging messages Installing unknown program from unreliable and suspicious looking web sites Illegal duplication of software from one computer to another e.g. computer games etc. When you use infected flask h drive

SOURCES OF COMPUTER INFECTION VIRUS | WARNING SIGNS, PREVENTIVE, ANTIVIRUS Read More »

COMPUTER VIRUS | TYPES, EXAMPLES, EFFECTS

Computer virus is a software program written with malicious intentions. They are intentionally written by some software developer to cause severe damage for the computer, programs, and data files in which it found itself. A computer virus has the ability to replicates itself by changing other programs to include a copy of itself. Examples of

COMPUTER VIRUS | TYPES, EXAMPLES, EFFECTS Read More »

INTERNET | BENEFITS, FUNCTIONS, ABUSE, SECURITY

The Origins of the internet dates back to1960s when the United State funded research projects of its military agencies to build robust, fault-tolerant and distributed computer network. The internet is a global system of interconnected computer network that use the standard internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network

INTERNET | BENEFITS, FUNCTIONS, ABUSE, SECURITY Read More »

NETWORKING | LAN, MAN, WAN, SERVER, TOPOLOGY

A computer network is a system that connects two or more computers together using a communication link. It describes a processing system with a number of independent, relatively low-speed, online, simultaneously usable workstations. In a network, remotely located computer stations are connected to a centrally located sophisticated, high-speed processor via a communication link (telephone lines,

NETWORKING | LAN, MAN, WAN, SERVER, TOPOLOGY Read More »

DISTRIBUTED DATABASE

A Distributed database (DDB) is a collection of multiple, logical interrelated database distributed over a computer network. A Distributed database management system (DDBMS) is the software that manages the DDB and provides an access mechanism that makes this distribution transparent to the users. A distributed database system is a system that permits physical data storage

DISTRIBUTED DATABASE Read More »

PARALLEL DATABASE

Parallel Database improve processing and input/output speeds by using multiple CPU and disks in parallel. A Parallel  Database system seeks to improve performance through parallelization of various operations, such as loading data, building indexes and evaluating queries. In Parallel processing, many operations are performed simultaneously, as opposed to serial processing, in which the computational steps

PARALLEL DATABASE Read More »

CRASH RECOVERY | ARIES, CONDITIONS, PROCEDURES

Crash recovery is the process by which the database is moved back to a consistent and usable state. This is done by rolling back incomplete transactions and completing committed transactions that were still in memory when the crash occurred. When the database is in a consistent and usable state, it has attained what is known

CRASH RECOVERY | ARIES, CONDITIONS, PROCEDURES Read More »