INFORMATION TECHNOLOGY
Prepared By:
Mr. Godson Hance Mkaro
(BSc. Computer Science, ATECII, CPA (T) IP, Certified Business Etiquette, MSc Finance & Investment IP)
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 1
Table of Contents
CHAPTER1: INTRODUCTION ............................................................................................................. 4
1.1.
1.2.
1.3.
1.4.
1.5.
1.6.
1.7.
1.8.
1.9.
development ........................................................................................................................................... 16
1.10. Information Super Highway ........................................................................................................ 16
1.11. Computer Number Systems ........................................................................................................ 18
1.12. Development of information technology and its impact on accounting profession .................. 26
1.13. Challenges in adoption of ICT in developing Countries (Tanzania)............................................. 29
1.14. How to overcome challenges to facilitate adoption of ICT in the society for economic growth 30
1.15. Advantages of Using ICT in Accounting Profession..................................................................... 31
1.16. Disadvantages of Using ICT in Accounting Profession ................................................................ 32
Definition: ................................................................................................................................... 33
2.2.
Definition .................................................................................................................................... 38
3.2.
3.3.
Application Software................................................................................................................... 41
Introduction ................................................................................................................................ 45
4.2.
4.3.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 2
Definition .................................................................................................................................... 48
5.2.
5.3.
5.4.
5.5.
5.6.
5.7.
5.8.
5.9.
CHAPTER 6: INTERNET...................................................................................................................... 71
6.1. What is Internet? ............................................................................................................................. 71
6.2. Historical development of the internet ........................................................................................... 71
6.3. The World Wide Web....................................................................................................................... 71
5.4.
5.5.
Introduction ................................................................................................................................ 81
3.2.
3.3.
3.4.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 3
CHAPTER1: INTRODUCTION
1.1. What Is Information Technology (IT)?
Information Technology: is the study or use of systems (especially computers and
telecommunications) for storing, retrieving, processing and transmission of information.
OR
Information Technology deals with the processing and distribution of data using
computer hardware and software, telecommunications, and digital electronics.
When we talk about Information technology, we need to also to understand the terms
Information and technology independently.
Information Is the collection of organized analyzed facts and data about a specific subject.
OR
Is the meaningful material derived from computer data by organizing it and interpreting
it in a specific way
Therefore when facts and data are collected and processed through a computer the output
produced is a collection of well connected, organized and analyzed data which is known as
Information.
Definition of terms:
Facts
Facts are data or instances that are specific and unique. Thus facts are the details
about a certain specific thing. It can be about an object, idea, event, etc.
Example: all dogs have a tail.
Data
Is unprocessed Information or simply is a collection of disconnected facts.
Example: All dogs have a tail and fluffy is a dog.
Information
Information is simply the processed data. Thus when facts are collected and
connected and the data obtained is organized and analyzed the output of this
process is information.
Example: If all dogs have a tail and Fluffy is a dog then Fluffy has a tail.
Facts
Collecting
Connecting
Data
Organizing
Analyzing
Information
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 4
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 5
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 6
RAM is an acronym for random access memory. Random access means that memory
contents can be randomly accessed directly if you know its location. Unlike other
storage devices such as radio cassettes whereby data must be accessed sequentially.
A cache is a type of temporary memory that can be accessed faster than RAM. This
computer system has got two levels of cache memory; the level 1 (L1) cache with a
capacity of 32KB which is smaller and (probably) faster than the level 2 (L2) cache
with a capacity of 256KB.
Hard disk capacity determines the amount of data and size of programs you can
store. This one can store 80GB. 7200 RPM is the rotational speed of the disk.
Generally, the faster a disk rotates, the faster it can deliver data to RAM. (Although
there are many other factors involved e.g. size of file, speed of buses, etc.)
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 7
ATA stands for advanced technology attachment, which describes how the hard disk
interfaces with (or connects to) other system components. Other technologies
include IDE or SATA.
A CD can store about 650MB of data. This systems drive supports rewritable CDs
and CD-RW that can be written to many times. 48xs describes its speed.
Ports allow movement of data between a system and its external devices.
This system has 10 ports. These include 8 Universal Serial Bus (USB) ports, 1 serial
port and 1 parallel port.
o USB, Universal Serial Bus, is an intelligent serial interface that is selfconfiguring. (It supports plug and play.). Serial bus ports are commonly
used as insertion points for flash disks, external hard disks, mouse,
keyboards, modems etc.
o Serial ports send data as a series of pulses along one or two data lines.
o Parallel ports send data as a single pulse along at least eight data lines.
System buses can be augmented/amplified by dedicated I/O buses. PCI, Peripheral
Component Interface, is one such bus. This system has three PCI devices: a video
card, a sound card, and a data/fax modem.
The number of times per second that the image on a monitor is repainted is its
refresh rate. The dot pitch of a monitor tells us how clear the image is. This computer
monitor has a dot pitch of 0.24mm and a refresh rate of 75Hz.
The two major categories of computer elements:
All the elements that go together to make up a computer fall into one of the following two
categories:
i.
Computer hardware
ii.
Computer Software
I. Computer Hardware
Computer Hardware is the equipment involved in the function of a computer. Computer
hardware consists of the components that can be physically handled. The function of these
components is typically divided into the following three main categories:
Input devices
Output devices
Storage devices
Hardware connection devices
Components in these categories connect to microprocessors, specifically, the computers
central processing unit (CPU), the electronic circuitry that provides the computational
ability and control of the computer, via wires or circuitry called a bus.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 8
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 10
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 11
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 12
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 14
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 16
INFORMATION SUPERHIGHWAY
1. Fee Mode
2. Privacy
3. Producers
vs.
Consumers
4. Information
The Internet has got too much of
Vs.
entertainment and information
Entertainment that may not be necessary for
consumers. E.g. movies, games,
music, etc.
Information
Superhighway
provides
information-related
services that consumers would
be more willing to pay for these
than for movies-on-demand,
video games, or home shopping
services.
5. Mass
Audience
Information superhighway is
designed to reach tens (or more
likely hundreds) of thousands
of users just to justify the costs
of mounting multimedia servers
and program for high speed
data sharing.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 17
1000
400
90
+2
1492
Binary Numbers
The prefix bi- stands for 2
The binary number system is a Base 2 number system:
There are 2 symbols that represent quantities:
0, 1
Each place value in a binary number is a power of 2.
1011
1x8= 8
0x4= 0
1x2= 2
1x1=+1
11
Converting Binary Numbers to Decimal
Step 1
Starting with the 1s place; write the binary place value over each digit in the binary
number being converted.
16 8 4 2 1
1 0 1 0 1
Step 2
Add up all of the place values that have a 1 in them. 16 + 4 + 1 = 21
Example: Convert the binary number 1 10 0 1 0 1 to decimal.
64 32 16 8 4 2 1
1 1 0 0 1 0 1
64 + 32 + 4 + 1=101
Converting Decimal Numbers to Binary
There are two methods that can be used to convert decimal numbers to binary:
Repeated subtraction method
Repeated division method
Both methods produce the same result and you should use whichever one you are
most comfortable with.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 19
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 20
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 21
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 22
Step 2:
Convert each group of four digits to its hexadecimal character.
1100|0101|1011
C
5
B
Helpful Hint: The last group on the left can have anywhere from 1 to 4 binary digits
group.
If it will help you see the pattern, you can fill in enough leading zeroes to make the last
group on the left have four digits.
For example, 1 1 0 | 0 1 1 1 | 1 0 0 1 could be written 0 1 1 0 | 0 1 1 1 | 1 0 0 1
Converting Hexadecimal Numbers to Binary
Converting hexadecimal numbers to binary is just the reverse operation of converting
binary to hexadecimal.
Just convert each hexadecimal digit to its four-bit binary pattern. The resulting set of
1s and 0s is the binary equivalent of the hexadecimal number.
Example of Hexadecimal to Binary Conversion
Convert A3D7 to binary.
A
3
D
7
1010 | 0011 | 1101 | 0111
Decimal to Hexadecimal Conversion
There are two methods to choose from:
1. Do a decimal-to-binary conversion and then a binary-to-hexadecimal
conversion.
2. Do a direct conversion using the repeated division method.
Since this is a conversion to hexadecimal, 16 is the divisor each time.
This example converts 853 to hexadecimal.
Step 1:
853 / 16 = 53 Remainder 5
Step 2:
The remainder of 5 becomes the LEAST significant digit of the number. [5]
Step 3:
Divide the quotient from Step 1 by 2 all the way out.
53 / 16 = 3 Remainder 5
Step 4:
The remainder of 5 becomes the next digit of the number. [5 5]
Step 5:
The final quotient of 3 comes down to be the most significant digit. [3 5 5]
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 23
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 24
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 25
wireless and simple. Businesses don't have to buy software to run some
programs. Instead, some sites host the programs online, where files also can be
saved.
4. Security: Information technology is used widely in accounting security.
Identifications and passwords limit access to confidential information. Instead of
binders and papers lying around, security can be greatly enhanced with the proper
computer programs. Using a program, accounting information can be encrypted in a
way to prevent unauthorized use, making it quite safe. A lost, stolen or misplaced
laptop or desktop computer can be tracked using security software that can be
activated remotely.
5. Education: Because of the close synergy between accounting and information
systems, many universities have started offering four-year degrees in "accounting
and information systems" or "accounting information systems." Quite a few
universities offer a major in accounting and a minor in information systems. The
program usually includes the typical accounting concepts and IT. The accountant of
the present and future must be technologically savvy to be relevant, and the
universities are preparing new graduates for this challenge
6. E-Business, the Intranet and the Extranet: Todays accounting professionals who
understand the importance of the Internet will use the Internet for e-business. They
use the Internet to execute major business processes in the enterprise. Electronic
business (e-business) allows the accounting firm to coordinate activities for internal
management and combines the clients relationships with the use of digital
networks. Enterprise applications can be used on a small internal network called the
Intranet. The Intranet can distribute information to employees such as corporate
policies, and programs. It centers on a portal which is a single point of access.
Information can come from several different systems using a Web interface. They
can feature such things as e-mail, internal documents such as the Code of Ethics, and
a search tool. It is a good means of communication within an organization.
Accounting professionals can also communicate outside the organization with Web
technology using the creation of an Extranet. This allows the clients to have limited
access, linking to a portion of the accounting firms Intranet to import and export
files back and forth. Linking electronically increases efficiency and cuts down on
travel costs ultimately reducing operational costs
7. Diversified Opportunities: Information became available to an accountant with
the click of a mouse. This changed the nature of an accountants work. More doors
were opening with the use of information technology. This diversified opportunities
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 27
in the field of accounting. New specialized areas had developed. Business owners
started looking to professional accountants for technology advice. Accountants
became more knowledgeable about which financial systems worked best.
Accountants were becoming the IT staff and trusted advisors. An accountants role
was to help these businesses become more productive. Integrating the clients
technologies properly with the accountants systems made the practice more
efficient when it came time for write-ups and reconciliation processes
8. Input, Processing and Output: Not only does the client need to have proficient
financial processes but the accountants themselves need software programs that
keep track of clients accounting information with improved efficiency. Accountants
work with systems programmers to develop a digital process that will organize their
clients history and all their documents. When the clients data is input into the
computer program the processing cycle gives the computer instructions on how to
process the clients data. This enables it to change the data into useful information.
Output, transfers the processed information to the accountant. He/she can analyze
the data and interpret the clients financial statements so as to increase the clients
success. All the clients records can be stored and organized on an accountants
computer system. Rather than bringing a suitcase full of file folders to a clients
place of business for review, the documents can be carried on an encrypted laptop
or organized on an encrypted portable storage device. The accountant has the
clients sensitive information protected but yet at his/her fingertips, ready to
perform statistical, accounting or forecasting analysis. The program is stored on the
computer hard drive and the data is used to prepare the clients taxes. The need for
a file storage room has been eliminated
9. Cloud Computing: To go a step further, cloud computing is becoming popular
today. It is called cloud computing because the name represents the cloud symbol
used in flow charts, representing the Internet. It is a service that is being provided
over the internet to permanently store data and use business applications over a
remote server. Software-as-a-service (SaaS) is a web based service. The data is
permanently stored in huge data centers shared by many other users. The
accountant would not have to purchase anything. He/she would pay a monthly
subscription so he/she would only pay for what is needed. It would free up space on
the accounting firms hard drive while the firm rents space from giant computer
centers. However, the accountant should be aware of the security issues involved
when making a decision to use this technology. Cloud service providers are obliged
to provide a safe environment to store the organizations sensitive information as
accountants are obliged to understand the risks.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 28
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 29
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 31
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 32
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 33
2. The Chipset mediates communication between the CPU and the other
components of the system, including main memory. Chipsets refers to a group of
integrated circuits, or chips, that are designed to work together.
3. The RAM (Random-access Memory) stores resident part of the current running
operating system and all running processes (application parts, using CPU or
input/output (I/O) channels or waiting for CPU or I/O channels).
4. The BIOS (Basic Input Output System) includes boot firmware and power
management. Thus it supports the operating system to boot/start and managing
the power of the system. The tasks are handled by operating system drivers.
5. The ROM (Read-only Memory) stores the initial program that runs when the
computer is powered on or otherwise begins execution (Bootstrapping also
known as "booting" or "booting up"). ROM Usually stores the BIOS.
6. Internal buses connect the CPU to various internal components and to
expansion cards for graphics and sound.
7. External bus controllers support ports for external peripherals. These ports
may be controlled directly by the south bridge I/O controller or based on
expansion cards attached to the motherboard through the PCI bus .e.g. USB,
Memory Card, etc.
B. SECONDARY STORAGE
A Secondary storage is the hardware that keeps data inside the computer for later
use and remains persistent even when the computer has no power.
Types of Secondary Storage devices:
1. Hard disk - for medium-term storage of data.
2. Solid-state drive - a device similar to hard disk, but containing no moving parts and
stores data in a digital format.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 34
3. RAID array controller - a device to manage several internal or external hard disks
and optionally some peripherals in order to achieve performance or reliability
improvement in what is called a RAID array.
USB flash drives. They are thin, removable and able to retain data without
power. Common types of formats are SD and MS.
o Memory Card Reader - a device used for reading Memory Cards. Most modern
devices contain a Memory Card Reader. Examples are personal computers,
mobile phones, printers and some gaming devices like PSP.
o Tape drive - a device that reads and writes data on a magnetic tape, used for
long term storage and backups.
E. POWER SUPPLY
A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage
DC power for the internal components of the computer. Some power supplies have a switch
to change between 230 V and 115 V. Other models have automatic sensors that switch
input voltage automatically, or are able to accept any voltage between those limits. Power
supply units used in computers are nearly always switch mode power supplies (SMPS). The
SMPS provides regulated direct current power at the several voltages required by the
motherboard and accessories such as disk drives and cooling fans.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 37
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 38
System software is a program that manages and supports the computer resources and
operations of a computer system while it executes various tasks such as processing data
and information, controlling hardware components, and allowing users to use
application software. That is, systems software functions as a bridge between computer
system hardware and the application software. System software is made up of many
control programs, including the operating system, communications software and
database manager. There are many kinds of computers these days. Some of them are
easier to learn than others. Some of them perform better than others. These differences
may come from different systems software.
The Three components of System Software
Systems software consists of three kinds of programs. The system management
programs, system support programs, and system development programs are they.
These are explained briefly.
i. System Management Programs
These are programs that manage the application software, computer hardware, and
data resources of the computer system. These programs include operating systems,
operating environment programs, database management programs, and
telecommunications monitor programs. Among these, the most important system
management programs are operating systems. The operating systems are needed to
study more details. There are two reasons. First, users need to know their functions
first. For the second, there are many kinds of operating systems available today.
Telecommunications monitor programs are additions of the operating systems of
microcomputers. These programs provide the extra logic for the computer system to
control a class of communications devices.
ii. System Support Programs
These are the programs that help the operations and management of a computer
system. They provide a variety of support services to let the computer hardware and
other system programs run efficiently. The major system support programs are system
utility programs, system performance monitor programs, and system security monitor
programs (virus checking programs).
iii. System Development Programs
These are programs that help users develop information system programs and prepare
user programs for computer processing. These programs may analyze and design
systems and program itself. The main system development programs are programming
language translators, programming environment programs, computer-aided software
engineering packages.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 39
Operating Systems
An operating system is commonly also referred to system software. An operating
system is a collection of integrated computer programs that provide recurring services
to other programs or to the user of a computer. These services consist of disk and file
management, memory management, and device management. In other words, it
manages CPU operations, input/output activities, storage resources, diverse support
services, and controls various devices.
Operating system is the most important program for computer system. Without an
operating system, every computer program would have to contain instructions telling
the hardware each step the hardware should take to do its job, such as storing a file on a
disk. Because the operating system contains these instructions, any program can call on
the operating system when a service is needed.
Functions of an Operating System
An operating system executes many functions to operate computer system efficiently.
Among them, four essential functions are the followings.
i. Resource Management: An operating system manages a collection of computer
hardware resources by using a variety of programs. It manages computer system
resources, including its CPU, primary memory, virtual memory, secondary
storage devices, input/output peripherals, and other devices.
ii. Task Management: The function of the operating system that controls the running
of many tasks. It manages one program or many programs within a computer
system simultaneously. That is, this function of operating system manages the
completion of users' tasks. A task management program in an operating system
provides each task and interrupts the CPU operations to manage tasks efficiently.
Task management may involve a multitasking capability.
iii. File management: This is a function that manages data files. An operating system
contains file management programs that provide the ability to create, delete,
enter, change, ask, and access of files of data. They also produce reports on a file.
iv. User Interface: It is a function of an operating system that allows users to interact
with a computer. A user interface program may include a combination of menus,
screen design, keyboard commands. A well-designed user interface is essential
for an operating system to be popular. Because of the function, users can load
programs, access files, and accomplish other tasks.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 40
Enterprise Software: It deals with the needs of organization processes and data
flow. Customer relationship management or the financial processes in an
organization are carried out with the help of enterprise software.
Information Worker Software: Individual projects within a department and
individual needs of creation and management of information are handled by
information worker software. Documentation tools, resource management tools
and personal management systems fall under the category of this type of
application software.
Educational Software: It has the capabilities of running tests and tracking
progress. It also has the capabilities of collaborative software. It is often used in
teaching and self-learning. Dictionaries like Britannica and Encarta, mathematical
software like Matlab and others like Google Earth and NASA World Wind are some
of the well-known names in this category.
Simulation Software: Used to simulate physical or abstract systems, simulation
software finds applications in both, research and entertainment. Flight simulators
and scientific simulators are examples of simulation software.
Content Access Software: It is used to access content without editing. Common
examples of content access software are web browsers and media players.
Application Suites: An application suite is an important type of application
software. It consists of a group of applications combined to perform related
functions. OpenOffice.org and Microsoft Office are the best examples of this type of
application software. These application suites, as you know, come as bundles of
applications like word processors, spreadsheets, presentation software, etc.
Applications in the suite can work together or operate on each other's files.
Software that aid Engineering and Development of Products: These software
are used in the design and development of hardware and software products.
Integrated development environments (IDE) and computer language editing tools
falls under this type of application software. Interestingly, software products are
developed using other software, and software communicate with one another
through software. Application programming interfaces which aid the
communication of two or more software are examples of this application software
type.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 42
functionality
at
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 43
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 44
4.2.
Word Processors
Electronic Spread Sheets
Database management systems
Presentation packages, etc.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 45
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 46
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 47
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 48
3) Flow control: All machines are not equally efficient in terms of speed. Hence the
flow control regulates the process of sending data between fast sender and slow
receiver.
4) Error Control: Error detecting and recovering is the one of the main functions of
communication software. It ensures that data are transmitted without any error.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 49
Also the reverse process, that is the conversion of analog signal to its digital form, is known
as DEMODULATION.
The device, which converts digital signal into analog, and the reverse, is known as MODEM.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 50
above the earth in precise locations. Satellite transmission stations that can both
send and receive messages are known as earth stations. A major advantage of
satellite transmission is that large volumes of data can be communicated at once. A
particular drawback of several disadvantages is bad weather can severely affect the
quality of satellite transmissions. Another one is that it has a serious security
problem, because it is easy to intercept the transmission as it travels through the air.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 52
1. Bus topology
In bus topology computers are connected via a common bus or network link.
2. Star topology
A star topology is designed with each node (server computer, workstations, and
peripherals) connected directly to a central network or the central server computer.
More expensive than linear bus topologies because of the cost of the
concentrators.
3. Tree topology
In tree topology there is one computer acting as a head connected to multiple computers
forming a tree-like structure. A tree topology combines characteristics of linear bus and
star topologies. It consists of groups of star-configured workstations connected to a linear
bus backbone cable.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 54
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 55
The picture shows a USB Hub, wherein the data is fed into the input port and is
broadcasted to all the other 4 ports. The Network Hubs are outdated and are out of the
market.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 56
b) Repeater
A repeater is a device similar to the Hub, but has additional features. It also works in the
Physical layer. Repeaters receives signal and amplifies it then resend it to the other end of
the network connected. Therefore repeaters are used in places where amplification of
input signal is necessary. But, the kind of amplification done by the repeater is different
from the regular amplification by amplifiers. The regular amplifies everything fed into it.
That means, if the input signal has noise induced into it, both the desired signal and noise
signal are together amplified. But, in the case of a repeater, it regenerates the input signal,
and amplifies only the desirable signal. Hence, the noise component of the signal is
eliminated.
Fig 3: Repeater
The repeaters are necessary since, during the transmission of the signals over long
distances, the signal has attenuation, delay distortions and noise, which lead in loss of data.
Hence, in order to prevent this, the regenerative repeaters are used. Hence, the repeater
regenerates the faded signal. In addition, it has all the features of a Hub. One common
problem between the repeaters and the Hubs are that only one transmission can take place
on the network at a particular time. If multiple devices transmit data simultaneously, there
will be data collision.
c) Switch
A switch is an intelligent device. The term intelligent refers to the decision making capacity
of the Switch. It has knowledge of the addresses of the ports in the network.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 57
Fig 4: Switch
Hence, in the Fig 1, if data has to be sent from Computer A to Computer B, then, the data is
transferred to the Computer B only, and not to any other computers connected on the
network. Hence, it establishes a link between the sender and the receiver based on the
addresses. This also means that when data is being sent from A to B, Computer C can
establish a link with Computer D and communication can take place between them. So,
simultaneous data transfer is possible in a switch. Also, Hub divides bandwidth, but a
Switch does not.
It is also to be noted that a switch is a secure device, because it sends information only to
the desired destinations, and also certain security features such as firewalls can be
implemented in the Switches.
d) Bridge
A bridge is also a device which interconnects computer networks, but is more primitive
when compared to a switch. Initial bridges were used to connect only 2 LANs, but the most
recent ones perform similar operation as the switches. It also works on the principle of
transfer of information using the addresses of the ports.
Fig 5: Bridge
The only difference is that, when bridging is used, each time the device has to be connected
to the internet; it has to dial to the internet and establish a connection. Also, a bridge alone
cannot be used to connect to the internet, because, has no knowledge of the IP Addresses,
which are used in the Internet.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 58
e) Router
Router is a device which is used when multiple devices need to connect to the Internet
using the same Internet Protocol.
Any computer can be connected to the internet via MODEM, which performs the
MODulation and the DEModulation operations. But, when there are more than one
computer at home or in an organization, and you have a single internet connection, you
need a Router. Router is a device which is used when multiple devices need to connect to
the Internet using the same IP.
Any Internet Service Provider (ISP) provides a single Internet Protocol (IP), and especially
for personal use, the IP address is assigned dynamically. This is done because, suppose, an
ISP has 1000 IP addresses, it does not mean that it has 1000 customers. An ISP assumes
that not all devices will be connected to the internet at the same time. Hence, when a user
wants to access the internet, any IP address from the pool of IP addresses from the ISP will
be assigned to connect the user to the internet.
Fig 6: Router
Hence, the router does the job of connecting multiple devices in a LAN to the internet using
the same IP address. Since the router works in the Network Layer, it does forwarding on
the basis of IP addresses.
The Wi-Fi routers that are commonly used now are the IEEE 802.11 b/g standard router,
which is explained below.
IEEE 802.11
IEEE 802.11 is a standard for Wi-Fi. There are several different technologies/ generations
that have been implemented. As mentioned, the recent modems are IEEE 802.11 b/g
modems. The word b/g has the meaning as follows:
An IEEE 802.11 b standard uses 2.4GHz band and has a maximum transfer rate of 11 Mbps,
while the IEEE 802.11 g standard uses 2.4 GHz band and has maximum transfer rate of 54
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 59
Mbps. Thus the b/g modem refers to a dual bandwidth modem, which is compatible with
both the b and g standards. The standards are mainly differentiated based on the distance
and speed of data transfer.
The more recent IEEE 802.11 N standard has the capability to provide speeds of over 100
Mbps. It basically uses multiple wireless signals and antennas, and has increased signal
intensity in order to be able to provide network for greater distances. It employs MIMO
technology, wherein spatial encoding is used. The spatial pre-coding is done at the
transmitter and the post-coding is done at the receiver. Recently, Reliance Communications
was in news for implementing MIMO technology to improve its 3G data transfer speeds.
f) Gateway
The Gateway devices work where the different network technologies are implemented. A
gateway is necessary when there are different technologies implemented by the different
LANs which are to be connected together.
The Fig 7 shows the working of a gateway. Consider 2 networks, say in New York, and a
network in London. If data has to be sent from one place to another, we need to ensure that
the network technologies that are being used by both the networks are the same. If not, we
need to use a Gateway.
In the more common example, we use a telephone network and internet networks, which
works on different technologies. The telephone network follows the ISDN, and the Internet
follows the IP. Here, 2 different technologies are being used. In this case, the router fails to
work, since the router cannot understand the functionalities of both the networks. Hence,
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 60
Summary:
The features of the connecting devices can be explained in brief as follows:
Hub- Broadcasts data from one port to all other ports in the network.
Repeater- Regenerates the input data which is subjected to attenuation.
Switch- Intelligent device which sends data to particular port.
Bridge-Same function as switch but much more primitive and has lesser ports.
Router-Connects all computers from a LAN to internet using same IP.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 61
IEEE 802.11- Wi-Fi standard- 802.11 b has speed of 11 Mbps, 802.11 g has a speed of 54
Mbps and 802.11 N uses multiple wireless signals and antennas and has speeds of over
100Mbps.
Gateway-Needed when 2 different network technologies are being used. Acts as translator.
Connecting Cables- RJ 11(Telephone Cable), RJ 45 (LAN Cable), twisted pair cables (used in
connecting 2 computers), Null Modem Cable (RS232), Optical Fiber Cable (Gigabit
Ethernet).
5.12. Information security assurance
The greatest challenge that faces the data or information communication is the security of
information that is channeled between the sender and receiver.
Definition: Information Assurance (IA) is the study of how to protect your information
assets from destruction, degradation, manipulation and exploitation. But also, how to
recover should any of those happen.
5.12.1.
1. Availability: timely, reliable access to data and information services for authorized
users;
2. Integrity: protection against unauthorized modification or destruction of
information;
3. Confidentiality: assurance that information is not disclosed to unauthorized
persons;
4. Authentication: security measures to establish the validity of a transmission,
message, or originator i.e. the assurance that the communicating entity is the one
that it claims to be.
5. Non-repudiation: assurance that the sender is provided with proof of a data
delivery and recipient is provided with proof of the senders identity, so that neither
can later deny having processed the data.
Importance of Information Security
Human safety
Environmental safety
Property safety
Economic stability and security
Social stability
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 62
This is a mode that is used in handling the security threats. The three legs of the "security
trinity" include: prevention, detection, and response, comprise the basis for security. The
security trinity should be the foundation for all security policies and measures that an
organization develops and deploys.
DETECTION
RESPONSE
PREVENTION
5.12.3.
Classes of Security attacks
Security attacks can be classified into:
1. Passive attacks: These are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is being
transmitted. Two types of passive attacks are release of message contents and traffic
analysis.
2. Active attacks: These involve some modification of the data stream or the creation
of a false data stream.
5.12.4.
1.
2.
3.
4.
5.12.5.
Data communication and information systems security threats
One of the two most publicized threats to security is the intruder (the other is viruses),
generally referred to as a hacker or cracker.
A hacker is a person who is proficient in using and creating computer software to
gain illegal access to information.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 63
A cracker uses various tools and techniques to gain illegal access to various
computer platforms and networks with the intention of harming the system.
There are three classes of intruders
i. Masquerader: An individual who is not authorized to use the computer and who
penetrates a system's access controls to exploit a legitimate user's account.
(Outsider).
ii. Misfeasor: A legitimate user who accesses data, programs, or resources for which
such access is not authorized, or who is authorized for such access
iii. Clandestine user: An individual who seizes supervisory control of the system and
uses this control to evade auditing and access controls or to suppress audit
collection. (Either insider or outsider).
The most common known information security is computer virus
It was estimated that a virus by the name of mydoom infected well over a quarter a million
computers in one day back in 2004. There are tens of thousands of worms and viruses now
being spread via the internet with new ones being discovered each and every day. It is
often through quite innocuous and normal internet activities like the exchange of files like
music, photos and others that many people are infected with these unwanted and
sometimes dangerous programs
There are a whole group of people that spend a tremendous amount of time looking for
what have been termed backdoors into your computer so they can find ways to inject their
code into your computer and use it for their own intentions.
5.12.6.
Computer virus
The task of a virus is not always destructive like deleting files that may be important or
something like causing your hard drive to crash. Many viruses these days are more
interested in harvesting information from your computer and or using it as a zombie for
their
intentions
like
spam
or
other
illegal
purposes.
In times past it was often the intention of a virus to do damage just for the sake of
destruction and maybe bragging rights among peers but almost all viruses today that are
widespread have at their root some economic agenda.
How does a virus spread?
One of the intents of all types of computer viruses that gets installed on your computer
will be to spread itself. This happens in a fashion that is not all that different from what
happens with a virus in the human population. It is through exposure that the virus spreads
when the computers defenses are down or non existent. Also like their biological
counterpart the computer virus can be spread rapidly and are not very easy to get rid of.
Because the way a virus operates is to be stealthy, coupled with the rapid communications
that happen between todays, it is easy to dramatically increase the speed at which a virus
that is targeting a newly discovered vulnerability can move around the web
A virus that targets a network of computers can even more easily spread since so many
computers are connected and most likely will have the same vulnerability and easy access
to one another. Often viruses will spread via shared folders, email or over other media that
is often exposed to other computers via removable media like cds and flash drives.
Because there are so many types of computer viruses, a virus can infect another computer
unintentionally anytime that program is run and the virus is activated. Something like
opening a email attachment or downloading a file off the internet or giving or receiving a
copy of a program or file from a co-workers thumb drive can expose you and others to a
computer
virus.
Literally the gamut of these types of computer viruses can expose you whenever you have a
downloaded file or a external drive attached to your pc. The most common way they spread
is via email attachments or with the use or transfer of files via instant messaging.
The Types Of Computer Viruses
There are number of broad categories or types of computer viruses, some of these include:
1. Boot Sector Virus
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 65
events take place. The event often is a date or some other trigger event that is easily
defined
on
any
computer
system
you
may
have.
Multipartite Virus
That which has been termed the multipartite virus are the types of computer viruses that
are both a file virus and a boot sector virus. They enter the computer via various sorts of
media and then embed themselves in the system memory. They then go into the hard drive
and infect the boot sector. Once installed in the boot sector these types of computer viruses
infect
executable
files
and
spread
themselves
in
the
system.
This is another virus that has past its prime for various reasons but in times past these
types of computer viruses were responsible for many infections because they combined
characteristics
of
two
different
viruses
into
one.
Network virus
A virus that is especially made for networks is uniquely created to quickly spread
throughout the local area network and generally across the internet as well. Most of the
time is moves within shared resources like drives and folders. Once it finds entry into a
system it will search for vulnerable computers in the network and likewise infect that
system and do the same again and again always on the hunt for new vulnerable systems.
Email virus
Most of the time a e-mail virus is one of those types of computer viruses that is generally a
macro virus and it will multiply itself by seeking out the other contacts in a e-mail address
book and then send itself to those addresses in hopes that they will activate the virus too.
Thus it spreads over and over again exponentially. There are even times an email virus can
spread by only previewing it in the mail client. One that was very successful in spreading
worldwide was the ILOVEYOU virus and it was destructive too.
Macro Virus
Macro viruses as the name implies, will infect files of programs that use macros in the
program itself. The most common of these are the Microsoft Office files created in Excel
spreadsheets, Word documents, Access databases, Powerpoint presentations and these
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 67
of
files
from
AmiPro
Corel
Draw
and
others.
These types of computer viruses are programmed using the language that the application
understands and not in the language of the operating system thus they are operating in a
way that is independent of the operating system so it can infect any kind of system be it
Mac, PC or even Linux just as long as the computer is running the application that
understands the macro virus. As the macro language has become more and more powerful
the threat of these types of computer viruses has graduated to more critical types of
computer viruses. These viruses have been around since 1995 and the first was found to
infect Microsoft Word but now have moved to other programs and they number in the
thousands.
Polymorphic virus
Polymorphic virus actually mutates/multiply over time or after every execution, changing
the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may
guard itself with an encryption algorithm that automatically alters itself when certain
conditions are met.
The goal of this trickery is evasion. Antivirus programs often find viruses by the specific
code used. Obscuring or changing the code of a virus can help it avoid detection.
Direct Action Virus
This type of virus, unlike most, only comes into action when the file containing the virus is
executed. The payload is delivered and then the virus essentially becomes dormant it
takes no other action unless an infected file is executed again.
Resident Virus
This broad virus definition applies to any virus that inserts itself into a systems memory. It
then may take any number of actions and run independently of the file that was originally
infected.
A resident virus can be compared to a direct payload virus, which does not insert itself into
the systems memory and therefore only takes action when an infected file is executed.
Web Scripting Virus
Many websites execute complex code in order to provide interesting content. Displaying
online video in your browser, for example, requires the execution of a specific code
language that provides both the video itself and the player interface.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 68
Of course, this code can sometimes be exploited, making it possible for a virus to infect a
computer or take actions on a computer through a website. Although malicious sites are
sometimes created with purposely infected code, many such cases of virus exist because of
code inserted into a site without the webmasters knowledge.
One should always be on the lookout for these types of computer viruses and should take
every precaution to avoid them. Be ever watchful of every file you open.
Hint: Another common type of computer security threat is a computer worm
What is a worm?
A worm is a special kind of computer virus that propagates by self-replication over a
computer network. This propagation can be either via e-mail or other means such as files
being copied over a network.
Computer Worm
Definition
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 69
Do it infects file?
Can it be controlled No
remotely?
Yes
5.13.1.
Security Mechanisms
A security mechanism is a method, tool, or procedure for enforcing a security policy. There
are various ways of enforcing a security policy so as to deal with security threats. These
include:
1) Encryption: transforming data into something an attacker cannot understand,
i.e., providing a means to implement confidentiality, as well as allowing user to
check whether data have been modified.
Terminologies:
Encryption Is the process of encoding a message so that its meaning is not
obvious.
Decryption is the reverse process, transforming an encrypted message back
into its normal, original form
A system for encryption and decryption is called a cryptosystem.
Key: Piece of data used in the encryption and decryption process.
Plaintext: The original form of a message is known as plaintext i.e. Plaintext:
input to the encryption process.
Cipher text: The encrypted form of a message is called cipher text i.e.
Cryptography: science and art of designing ciphers.
Cryptanalysis: science and art of breaking ciphers.
2) Authentication: verifying the claimed identity of a subject, such as user name,
password, etc.
3) Authorization: checking whether the subject has the right to perform the action
requested.
4) Auditing: tracing which subjects accessed what, when, and which way. In
general, auditing does not provide protection, but can be a tool for analysis of
problems.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 70
CHAPTER 6: INTERNET
6.1. What is Internet?
o The internet is a network of the interlinked computers worldwide, which is accessible
to the general public. These interconnected computers work by transmitting data
through a special type of standard Internet protocol which is known as the IP or the
internet protocol (TCP/IP).
o Information can pass from one computer to another through several other computers.
o Internet is such a huge network of several different interlinked networks relating to
the business, government, academic, and even smaller domestic networks, therefore
internet is known as the network of all the other networks. These networks enable the
internet to be used for various important functions which include the several means of
communications like the file transfer, the online chat and even the sharing of the
documents and web sites on the WWW, or the World Wide Web.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 71
Web Servers: Web pages are stored on a Web server, or host, which is a computer
that stores and sends (serves) requested Web pages and other files.
Publishing a website is copying Web pages and other files to a Web server.
Web page design, or Web design, refers to the visual design and creation of the
documents that appear on the World Wide Web.
A Web browser, also called a browser, is a program that interprets and displays
Web pages and enables you to view and interact with a Web page.
Examples: Microsoft Internet Explorer, Opera, Netscape, Mozilla Firefox, etc.
Browser implements the following functions:
1. Search and access to a Web-server.
2. Loading, formatting, and displaying HTML-document.
3. Hyperlink detection and moving from one document to another.
4. Execute other programs
5. Enhance applications such as real-time audio or video
Types of internet
1. Intranet
o A network based on TCP/IP protocols (an internet) belonging to an organization,
usually a corporation, accessible only by the organization's members,
employees, or others with authorization
o A TCP/IP network located within a single organization for purposes of
communications and information processing
o An intranet's Web sites look and act just like any other Web sites, but the
firewall surrounding an intranet fends off unauthorized access
o A firewall can be defined as a system designed to prevent unauthorized access to
or from a private network
2. Extranets
o Formed when firms permit outsiders to access their internal TCP/IP networks
o Partially accessible to authorized outsiders.
o Whereas an intranet resides behind a firewall and is accessible only to people
who are members of the same company or organization, an extranet provides
various levels of accessibility to outsiders
o You can access an extranet only if you have a valid username and password, and
your identity determines which parts of the extranet you can view.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 73
o Extranets are becoming a very popular means for business partners to exchange
information.
1. Message envelope
2. Message header
3. message body
The message header contains control information, including, minimally, a senders email
address and one or more recipient addresses. Usually descriptive information is also
added, such as a subject header field and a message submission date/time stamp.
Basic Features of Email
Email Address: This uniquely identifies the sender and the receiver of the digital
messages sent by means of an email.
The structure of email Most often take the form of loginID@domain-name; e.g.
godson@covenantfinco.com No spaces, no parentheses, and no commas in the
address!
The message receiver addresses: are to be written when attempting to send an
email.
Subject: The subject to abstract the contents of the message.
The Body of the message.
Inbox: The inbox displays a list of received messages. Each message header shows
you who sent the mail, the subject line, the time and date it was sent, and at times,
the size of the message.
Sent items/messages: Displays a list of sent messages.
Drafts: the place where messages can be temporarily stored so that they can be
sent in the near future.
Uses of Email
Email allows individuals and groups to communicate with one another. Some of the
common uses of email include:
Information Exchange
Brainstorming and Problem Solving
Record Keeping
Group Work
Staying in Touch Professionally
Staying in Touch Socially
Transmitting Documents
Advantages of email
a. Fast and cheap
b. Ideal way to reach persons who are difficult to get on the phone.
c. Because it is written, you can compose and review your message before sending.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 75
Messages easily achievable; search by sender, date, subject, or put into separate
mailboxes
j.
Ability to paste from other applications directly into email document (e.g., a review
of a paper found on a website)
k. You can easily include all or part of previous messages, or the message you are
responding to, including point by point responses to questions, etc.
Disadvantages of email
a. Privacy issues
b. Easy to get swamped (but you can filter and sort messages)
c. A hazard for emotionally "fiery" people; you get mad, you fire off an email, the
recipient forwards it to 10 other people, including the target of your anger, and you
pay the consequences for many months to come.
d. You don't always know when/if your message has been read (some email programs
notify sender when email has been read)
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 76
CHAPTER 7: E-COMMERCE
7.1. Definition
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 77
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 78
Enables customers to get all of the gifts they want with a few clicks of the
mouse without starting up the engine.
More comparison of product price and features
Gives more product comparison; consumers could evaluate and compare
products with less effort before they make up decision
Ultimate convenience
Enables consumers to shopping while they sit at home which allow them to
save time and find the product more easily
This includes the overall ease of finding a product, time spent on shopping,
minimization of overall shopping effort
By definition, an online store is open 24 hours a day, seven days a week.
Infinite shelf place available
Consumers want diversity of products as they can choose the right one out of
many that would suit them
There are unlimited products available online as it enables consumers to
browse products that are available throughout the world with no
geographical limit.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 80
software which allows access to the data contained in the data base. It is a system to
manage collection of data insuring at the same time that it remains reliable and
confidential.
4. Storage: Processed actions, as described above, result into financial transaction data
i.e. withdrawal of money by a particular customer, are stored in transaction database of
computerized personal banking system. This makes it absolutely clear that only valid
transactions are stored in the database.
5. Information: The stored data is processed making use of the Query facility to produce
desired information.
6. Reporting: Reports can be prepared on the basis of the required information content
according to the decision usefulness of the report.
Scalability
Computerized accounting systems are fully equipped with handling the growing
transactions of a fast growing business enterprise. The requirement of additional
manpower in Accounts department is restricted to only the data operators for storing
additional vouchers. There is absolutely no additional cost of processing additional
transaction data.
Accuracy
The information content of reports generated by the computerized accounting system is
accurate and therefore quite reliable for decision making.
In a manual accounting system the reports and information are likely to be distorted,
inaccurate and therefore cannot be relied upon.
It is so because it is being processed by many people, especially when the number of
transactions to be processed to produce such information and report is quite large.
Security
Under manual accounting system it is very difficult to secure such information because it is
open to inspection by any eyes dealing with the books of accounts. However, in
computerized accounting system only the authorized users are permitted to have access to
accounting data. Security provided by the computerized accounting system is far superior
compared to any security offered by the manual accounting system.
3.5.
Point of Difference
1. Recording
2. Classification
Manual Accounting
Records
of
financial
Transactions is through books of
original entry.
Transactions recorded in books
of original entry are further
classified by posting them into
ledger accounts. This results in
transaction data duplicity.
Computerised Accounting
Data
content
of
these
transactions is stored in welldesigned data base.
No such data duplications is
made. In order to produce
ledger accounts the stored
transaction data is processed to
appear as classified transaction
so that same is presented in the
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 84
3. Summarizing
4. Adjusting entries
5. Financial
Statements
3.6.
The limitations of computer are depending upon the operating environment they work in.
These limitations are given below as:
Cost of Installation
Computer hardware and software needs to be updated from time to time with availability
of new versions. As a result heavy cost is incurred to purchase a new hardware and
software from time to time.
Cost of Training
To ensure efficient use of computer in accounting, new versions of hardware and software
are introduced. This requires training and cost is incurred to train the staff personnel.
Self-Decision Making
The computer cannot make a decision like human beings. It is to be guided by the user.
Maintenance
Computer requires to be maintained properly to help maintain its efficiency. It requires a
neat, clean and controlled temperature to work efficiently.
Dangers for Health
Extensive use of computer may lead to many health problems such as muscular pain,
eyestrain, and backache, etc. This affects adversely the working efficiency and increasing
medical expenditure.
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 85
Authors Biography
Godson Hance Mkaro is a successful multi-profession expert with
diverse skills in Information and Communication technology
combined with Finance expertise.
He holds a Bachelor of Science in Computer Science which he
pursued at the University of Dodoma, Accounting Technician
cerficate as well as CPA (T) W.I.P
He has a fine defined experience in both ICT and Finance industries
due to his background and hand on practice in the fields.
IT technician in the hardware department at the University Computing Center (UCC)
headquarters at UDSM main campus Dar-es-Salaam.
From July 2009 to October 2009
IT consultant and tutor at Igans Computing Center (ICC) Mwanza
From July 2010 to October 2010
Later on he become a freelancer and developed a number of reputable websites in
Tanzania such as www.bongomovies.com as well as www.swahilistores.com which is an ecommerce website under his affiliate company known as Swahili online store.
From October 2010 to May 2011
Finance officer at Advans bank. Specialized in BOT regulatory returns preparation, UMOJA
switch ATM reconciliation, Cheque clearing, Management Information System reports
preparation, TISS and SWIFT operation and management, Supplier payments controls,
Bank reconciliations as well as treasury Tanzania
From May 2012 to May 2013
Finance Officer at Diamond Trust Bank Tanzania, Specialized in BOT regulatory reports,
Management reporting, Management Information Systems reports automation, Flexicube
system Finance support.
From May 2013 to date
Financial analyst consultant and Tutor part time NBAA professional exams (evening
classes) at Covenant Financial Consultant
From May 2011 to date
Prepared By: Godson H. Mkaro (BSc. In Computer Science, ATEC II, CPA (IP), MSc Finance & Investment (IP)
Phone: +255 717 / 769 348 616 | Email: info@covenantfinco.com |Website: www.covenantfinco.com
Page | 86