Ict Book
Ict Book
UACE Subsidiary
INFORMATION &
COMMUNICATION
INFORMATION &
TECHNOLOGY
COMMUNICATION
TECHNOLOGY
INFORMATION &
2020 EDITION
COMMUNICATION2020 EDITION
TECHNOLOGY
TWEHANGANE D. MODERN
TWEHANGANE D. MODERN
+256771 875 048
+256771 875 048
[email protected]
MODERN4CHRIST@GMAIL. COM
UACE Subsidiary
2020 EDITION
TWEHANGANE D. MODERN
Dedication
Table of C ontents
Table of Contents ___________________________________________________________________ 3
Introduction to Subsidiary ICT ___________________________________________________ 7
Aims of Teaching and Learning ICT ____________________________________________ 7
The ICT Syllabus and Paper Format ____________________________________________ 7
help the learner to develop and consolidate his acquired ICT skills
help the learner be aware of the new and emerging technologies
encourage the learner develop as an independent individual user
help learners develop ICT skills to enhance their work in a variety of fields
equip the learner with skills for lifelong learning
help the learner develop new ideas for self-employment
help the learner get skills used in learning other subjects
Subsidiary ICT has three papers paper 1, 2 and 3 that are set. Paper 1 is
compulsory. A candidate chooses one of 2 and 3.
The questions set and fetched from the entire syllabus but with more emphasis
on basic ICT concepts and their applications in various fields.
Questions for this paper will be set basing on the question allocation table
below.
Type of question
Topic Knowledge Comprehension Application Analysis Total
Introduction 01 01 02
to computers
Papers 2 and 3 (S850/2 and S850/3) are practical papers with 5 equally
weighted questions and takes only 2 hours. A candidate attempts only 3. All the
work is saved and written to a blank Compact Disc Recordable that is sent
along with hardcopies of the work to UNEB.
1
INTRODUCTION TO COMPUTING
Introduction to Computers
A Computer is an electronic machine that receives data from the user,
processes it using stored instructions (programs) into information, stores and
outputs the information for future use. A computer processes data into
information.
2. Automatic. They are automatic in that they do not need any supervision to
do tasks when instructed. They are continuous in action and carry on tasks
till they are finished.
3. Accurate. Computers cannot make mistakes. Any mistakes made are due to
human error. If wrong data is fed into a computer, wrong information is
expected hence the saying garbage in garbage out (GIGO)
4. Versatile. Modern computers can perform more than one task at the same
time
5. Diligence. They have ability to do repetitive tasks for long with the same
speed and efficiency without getting tired or fatigued
11. Flexible. They can easily switch from one task to another and support a
variety of peripheral devices
12. Processing ability. They can process data into meaningful information
basing on the instructions from the user
13. Portable. Can easily be moved from one place to another for example
laptop computers and mobile phones
Computer users or Human ware refers to the people who operate and give
instructions to computers. A computer user can be an ordinary or professional
user
Data is a collection of raw facts that are not meaningful to the user. Data can be
in form of text, numbers, images, audio, video or symbols. Examples of data are
students’ bio data, test scores, population figures, employee bio data, etc.
It is a series of stages the computer system follows to process data into useful
information. These stages are illustrated below.
Collection of data - facts to be processed are first gathered from their sources
and recorded down on paper, or using recorders, sorted and made ready for
input.
Data input - the facts are then entered into a computer with help of suitable
input devices. The facts are sent into the processing unit -CPU for processing
Data processing - the CPU processes the data by performing arithmetic and
logical operations on it basing on the instructions from the user. The resultant
at this point is information.
Forms of information
1. The system unit is a rectangular box that houses the internal electronic
delicate parts of a computer.
2. Mouse is a small device used to point and select items on the computer
screen. It used in the movement of the cursor
3. Keyboard is an input device mainly used for typing text and issuing
commands into the computer
4. A monitor is an output device that displays information in visual form like
text and graphics to the user.
5. A printer is a device that converts softcopy information into hard copy.
6. A speaker is an output device that is used to play sound.
Revision Questions
2. (a) Give the advantages and disadvantages of using computers for data
processing
(b) Give any five activities that take place during data collection
Some of the common ICT devices are laptop and desktop computers, radios,
televisions, cellular phones, compact discs, Internet and networking hardware,
software platforms, satellite systems, biometric devices, fax machines, etc.
However, the term ICTs commonly is used to refer to computers.
ICTs have changed society today; people interact with computers and other
ICTs in fields such as: education, business and commerce, health, security,
politics, communication, entertainment and leisure, technical and scientific
fields.
Productivity tools like desktop publishing are used in projects and other
school activities.
Computers are used for calculating mathematical arithmetic by students
and teachers
They are used to manage school records
They are used to create students’ progressive report cards electronically
Distance learning through computer based training (CBT). Students can get
awards such as degrees without going to class.
Teachers use simulation software to perform difficult or dangerous
experiments in class.
Special facilities for students with disabilities like text to speech and speech
recognition to help blind students can be used
Used in preparation of school daily documents such as receipts, exams etc.
Enable students to do online research using online dictionaries and
libraries
Allows studying online, cyber classes via web conferences
Teachers can use audio-visual methods such as presentations to introduce
complex topics
Computers themselves are used as teaching and learning aids
They have eased storage of data and information for teachers and students
Enable edutainment, a form of learning that combines learning and
entertainment to make learning interesting and more fun
Use of interactive whiteboards and projectors to ease learning
Customer care and service through SMS and toll free calls
Social media marketing and advertisement
Computer equipment such as CCTV cameras are used to keep security over
business premises
Multinational companies can carry out online seminars and meetings
They are used to keep basic business records
Barcode readers are used to read serial numbers on packaged products to
examine genius and determine prices
Magnetic ink character recognition readers are used to read details on
customers' cheques
EPOS terminals are used to record and invoice customers' purchases
Online banking and money transfer
Paying bills, prepare budgets using finance software
Online banking and online investment
Computers enable people to play computer games like need for speed,
solitaire etc.
Internet has promoted social networking that has enabled interaction
between people
Computers can be used to play music during free time.
Computers can be used to watch movies and videos.
Digital cameras can be used to record and capture videos on parties, tours.
They are used to compose and edit songs by producers through using audio
and video production software.
Internet enables people to read magazines online.
E-mail: electronic mail sent from one person to other using connected
computers helps a lot in the area of communication.
Video conferencing enables people in different locations to conduct
meeting as if they are in the same location.
Computers are used for faxing: sending an image of a document
electronically.
Computers enable people to send voice, image, text and data though
telephones and mobile cell phones.
Social networks such as face book, and twitter enable people to stay in
touch with their relatives, friends and interests.
The widespread use of computers and related technologies in almost all fields
of work and life has imposed both positive and negative effects on people’s
lives and work.
Green Computing
Minimize the use of paper by using the Internet to send e-mails than
physical letters
Properly recycling and disposing off of e-waste such as toner cartridges,
etc.
Sensitizing people about environmental management via social media,
radio, TV talk shows
Using Google maps to spot areas where degradation has occurred so as to
mitigate the effect
Using radio announcements to disseminate information about
environmental management
Reduced use of energy lower carbon dioxide emission from fuel used in
power plants transportation
Conserving resources means less energy is required to produce, use and
dispose of products
Saving energy and resources saves money
Green computing encourages recycling, lowering energy use by individuals
and business
Reduce risks of chemicals that cause cancer, nerve damage, immune
reactions in humans
Cloud Computing
It refers to storing, accessing data and programs on remote servers that are
hosted on Internet instead of computer's hard drive or local server. It is also
referred as Internet based computing or online storage
Or
Cloud computing-this is the practice of using a network of remote servers
hosted on the Internet to store, manage, and process data, opposed to local
server, personal computers
2
COMPUTER MANAGEMENT
Computer Booting
Booting is of two types: Warm or (soft) booting and cold (hard) booting
Cold or hard booting is the process of turning on a computer after it had been
powered off completely (starting a computer) while Warm or soft booting is
the process of restarting a computer that already is powered on.
It flushes RAM and removes files that could be causing computer freezing
Fast performance: reboots are known to keep computers running quickly
Stops memory leaks that occur when doesn’t close properly
Fixes Internet connection
Recovers the computer from software errors
Fixes most software bugs
1. When power is switched on, the PS sends a signal to the components in the
System unit.
2. The processor finds the ROM chip that contains the BIOS (Basic Input -
Output System).
3. The BIOS performs the Power-On Self-Test (POST) to check components
such as peripherals
4. The results of the POST are compared with data in a CMOS chip
5. The BIOS looks for system files on the hard disk
6. System files and the operating system load into RAM from the hard disk
7. The OS loads configuration information and displays the welcome screen
8. On startup, the OS may require a password for a legitimate user to logo on
the system
9. After the user logs on, the desktop and icons are displayed
10. The OS finally runs the programs that open automatically when the
computer boots.
A boot loader - a computer program such as BOOT MGR that loads the main
operating system for the computer after POST
A boot drive is the drive from which a computer boots or starts, usually drive
C. it can also be a removable device such as a flash or compact disc or DVD
Bootable device (installation disc) – one that contains the OS software from
where the computer boots
Starting Programs
The start menu is the gateway to all of the programs on your computer. To
open the start menu, click the start button. The left pane of the start menu
contains a small list of programs. To open a program, click it. If you don't see
you want to open, but you know its name, type all or part of the name into the
search box at the bottom of the left pane. To browse a complete list of your
programs, click the start button, and then click all programs
A folder is a named storage location where related files and subfolders can be
stored. A folder is also known as a directory in some operating systems
Features of a folder
Using my computer icon, on the folder tree on the left pane, select the
location (desktop) in which you want to create a new folder.
On the file menu tab, click new folder
Type a new name for the folder to replace the temporary name, then press
enter key or click the icon once.
Or
Right click on the free space on the desktop,
Point to new, click folder. Type a new name for the folder and click away
In Windows, deleted items from the hard disk, are temporarily held in the
Recycle bin from where they can be restored if necessary.
To restore a file or folder from the recycle bin to its original location:
Double click the recycle bin icon.
Select the deleted item(s) to be restored.
Click file then restore
To completely discard files and folders you deleted, you need to empty the
recycle bin. To empty the recycling bin proceed as follows:
Double click the recycle bin icon on the desktop to open.
Choose empty recycle bin from file menu.
Click yes when prompted to confirm deletion of the files.
Moving a folder
Right-click any open space within windows explorer and select sort by.
Choose to sort by name, date modified, type, or size.
To view more sorting options, click more
Computer files
NB: in windows, file name can contain up to 255 characters, including spaces
but, with no special symbols such as \|/:*?”<>.
Sometimes, though, you’ll want to select more than one file at a time. For
example, you might need to move a group of files, or copy several files at once.
Shift click: if the files you want to select are listed one after another, click
the first file in the group, hold down shift, and then click the last file in the
group.
Ctrl+click: if the files you want to select are not listed together, hold down
ctrl while you click each file.
Types of files
System files: contain information that is critical for the operation of the
computer.
Executable files
Application files: holds programs and are executable.
File attributes
Every file has a file name and an optional extension. The name and extension
are separated by a period (.) E.g. Jeff.doc. In this case, the file name is Jeff and
the extension is doc. The size in bytes, date, and time the file was created
Table below shows some common file extensions and file types.
Saving a file
After typing the content of the file in the work area, click file and then click
save. Otherwise, if the file will be saved with a different name or location then:
save as.
Finding files
When you are saving your work you must always be aware of:
If you follow these simple rules it will make finding your files much easier. If
you lose a file, you can use the search utility in windows explorer to look for
the file
A file specification is the name given to identify a file. The path is the first part
of the file specification. The file name and extension make up the remainder
of the file specification. Also, in windows, the folder containing information
specific to one user, including the documents, desktop and the like is known as
the profile.
C:\Users\MDT\Desktop\Music\Gospel\Worship.mp3
identifies the file named worship.mp3 in the gospel subfolder under music
folder on the desktop (location) under MDT's profile in the users’ directory
on disk drive C. The file extension .mp3 denotes that worship.mp3 is an
audio file.
The desktop is the main screen area that you see after you turn on your
computer and log on to windows or other operating system with a GUI.
Like the top of an actual desk, it serves as a surface for your work. When you
open programs or folders, they appear on the desktop. You can also put things
on the desktop, such as files and folders, and arrange them however you want.
Features of a Desktop
System tray or notification area: the notification area, on the far right side of
the taskbar, includes a clock and a group of icons that communicate the status
of something on the computer or provide access to certain settings.
Start button: the left most button on the taskbar that the user clicks to display
the start menu.
You can use the search box on the start menu to find files, folders, programs,
and e-mail messages stored on your computer.
Compressing files
Really big files can be difficult to copy or share. Fortunately, windows lets you
create compressed folders, which take big files and compress them in size
(called a “zipped” file). After the file has been transferred, you can then
uncompress / extract the file back to its original state.
If you notice that your system takes longer and longer to open and close files or
run applications, it’s probably because little fragments of files are spread all
over your hard disk. You fix the problem by putting all the pieces of the
fragmented files back next to each other—which is known as defragmenting
your disk.
Click the start button and select all programs, accessories, system tools,
disk defragmenter.
To manually defragment your hard drive, click defragment disk.
To set up automatic disk defragmenting, click configure schedule.
NB: it takes time defragmenting your drive can take an hour or more,
especially if you have a large hard drive or your drive is highly fragmented.
Computer viruses can be even very damaging, causing data loss and
malfunctioning of the computer. For that reason, you should install on your pc
an antivirus program.
One of the more popular antivirus programs is AVG anti-virus free edition,
download it from free.avg.com, and install it.
Selecting a printer
The two most common types are laser printers and inkjet printers. Laser printers
work much like copy machines, applying toner (powdered ink) to paper by using a
small laser. Inkjet printers shoot jets of ink onto the paper’s surface to create the
printed image.
Installing a printer
There are several ways to connect a printer to your pc. Which option you choose
depends on the device itself, and whether you're at home or at the office.
Always consult the information that came with your model for specific instructions.
Local printers:
The most common way to install a printer is to connect it directly to your computer.
This is known as a local printer. If your printer is a universal serial bus (USB) model,
windows should automatically detect and install it when you plug it in. If it's an older
model that connects using the serial or parallel port, you might have to install it
manually. You need to install print drivers which are usually downloadable form the
printer manufacturer’s website.
Network printers:
In the workplace, many printers are network printers. These connect directly to a
network as a stand-alone device.
If you regularly use multiple printers, you can pick one as your default printer.
Windows and other programs will then automatically use that printer whenever you
print.
Tip: a default printer doesn't have to be an actual physical device. Depending on your
computer, you might have the option to send documents as faxes, or to save them as
pdf or xps files when you print.
COMPUTER MANAGEMENT 37
Once your document or photo has started to print, you can pause or cancel it via the
print queue or print spool.
The print queue shows you what's printing or waiting to print. It also displays handy
information such as job status, who's printing what, and how many unprinted pages
remain.
Modes of printing
• Multiple page printing: this is when the user prints more than one page of the
same document on a single sheet of paper
• Multiple copies printing: this is where the user prints more than one copy of
the same document.
• Handout printing: this is where multiple slides are printed on one page
• Slide printing: this is the mode of printing where a single slide is printed and
covers the whole page
3
COMPUTER LABORATORY CARE AND
MAINTENANCE
Computer Literacy
It’s the level of familiarity with the basic ICT concepts that allows one to easily use
personal computers.
• Profitable skills: computer skills such as word processing can aid one to make
money
• Leadership and promotions: computer literacy skills may get one promoted to a
higher position
• Work performance: knowing how to use a computer often allows users do work
more efficient and timely.
• Communication: knowledge of how to access the Internet on a computer opens
up possibilities to communicate with coworkers or supervisors.
• Being prepared for the future; computer technology is advancing faster, so if you
are familiar well with computer skills now this will makes you ready for bright
future
• Ability to use new media; traditional media like newspapers and television are
being replaced by computer based media such as social media, and online blogs
which require computer literacy skills to use.
• More job opportunities; since almost all workplaces use computers, the need for
people having computer skills is really in great demand.
System startup
• On start-up, the OS may verify that the person attempting to use the computer is
a legitimate user through use of a password.
• After the user logs on, the desktop and icons are displayed on the screen.
• Finally, the operating system also executes programs in the startup folder, which
contains a list of programs that open automatically when you boot the computer.
• Microsoft windows users can see each of the programs that startup each time
their computer boots by using the Msconfig utility.
• The startup folder on windows OS contains a list of shortcuts of those
applications that start when windows starts.
The need of the organization and the amount and type of data to handle
System specifications such as hard disc and RAM size
Cost of system components and their installation, development
The source of system components and service
Available space to accommodate the computers
Areas of laboratory security to accommodate the computers
Environmental concerns
Available employee skills
Organizations, libraries, and schools running public computer labs face a variety of
complex computer security challenges. These institutions take measures to ensure
the safety of the equipment, software, data and users.
Electronic (biometric) locking mechanism with keys, swipe cards, finger print
recognition.
CCTV cameras to keep watch over computer systems and centers.
Lock the lab with strong padlocks
Security cameras
Security cameras are used to deter theft and other crimes in computer labs and data
centers.
Closed circuit television (CCTV) surveillance cameras are used to record video which
can be viewed in the monitoring room and played back in case of any investigations.
Burglar proofing
Burglar proofing provides protection against any forced physical entry into the
computer laboratory.
Burglar proofing involves fitting metal grills in windows and doors.
Consider installing security alarms at strategic access points that would alert the
security personnel in case of a break-in.
Fit strong metallic grills and locks on doors, windows and strengthen the roof in
case the roofing is weak.
Use desktop locks, system unit enclosures and laptop locks
Electric power security: place no more than two computers on each circuit. Do
safe well insulated cabling.
Keep the circuits for computer systems separate from all other equipment such
as printers, copiers and coffee makers.
Plug each computer into a surge protector or ups (un interruptible power supply
unit)
Protect computers from being damaged and data loss due to power instabilities by
having:
Computers need the time to shut down properly. Damage to devices and data can
occur when there is sudden power loss or fluctuation.
Ups, or uninterruptible power supply units, keep backup power for devices in the
event of a failure or other electrical problems.
A UPS is essentially a small battery that keeps the power supply on for long
enough for you to switch off the computer safely when there is a sudden
blackout.
Properly insulate and lay power cables away from pathways in the room.
Lay cables along the walls in trunks to prevent electric shock and power
disconnections caused by stumbling on cables.
Install lightening conductors on the lab to protect computers, users from
lightning strikes
Always install lightening conductors to the computer laboratory to protect the
machines and the users of the computers.
Minimize electrical noise in the computer environment. Electrical noise refers to
externally radiated signals that cause undesirable additions to the current
voltage
Electrical noise
A first aid kit is a box or bag that contains the necessary items for providing care in
case of any emergency in the lab such as shocks.
Tool kits are also necessary for keeping ICT repair and maintenance tools.
Fire extinguisher
Fire extinguishers are a critical component of saving property and lives in the case of
a fire emergency. Owning a fire extinguisher is a form of ensuring safety. All
computer rooms need it just in case a fire starts.
It can save our property from burning because the use of the device will help prevent
it from spreading and can even stop the flame in no time
Have gaseous fire extinguishers like those filled with carbon dioxide. Water based or
powder extinguishers should be avoided since they can cause damage to computer
components
Air conditioning units monitor and maintain the temperature, air distribution
and humidity in a computer room.
An air conditioning unit is a device used for cooling and controlling the humidity
and purity of the air circulating in a space.
Have good air circulation in the computer room since users and computers emit
heat energy.
This is possible through having enough ventilation points like windows, installing
an air conditioning system.
Dust control
Blower: used to blow/remove dust that may have entered inside the computer.
Dust and water proof covers protect computers from moisture, water and liquids.
When setting up the computer laboratory, consider a location away from
excessive dust.
The room should have special curtains and computers should remain covered
using dust covers when not in use
This is used to avoid eye strain and fatigue caused by over bright CRT monitor.
Reduces electromagnetic rays from the CRT monitor.
Radiation filter screens should be fitted to reduce the light that reaches the eye
They reduce the effect of light rays emitted from monitors.
Woolen carpet
Software update provides bug fixes and minor software improvements and is
made available by download. While
Software upgrade is the replacement of a product with a newer version of the
same product.
Burglar proofing the room.(fitting grills on doors, windows and having a roof)
Installing the intrusion detection system (ids)
Employing security guards.
Installing fire prevention and control equipment. (fire extinguishers)
Having stable power supply. (surge protectors, standby generator,
uninterruptible power supply)
Installing lightening arrestors
Insulating all power sockets.
Follow the computer lab rules and regulations.
Dust and dump proofing. (cleaning the computers daily, air conditioning systems,
fitting curtains into windows
To take out dust that can spoil the internal parts of the computer
In order to upgrade and update the computer.
To reduce the costs of long run replacement and repairs.
To prevent the computer from viruses and malware.
Computer Performance
The following are the reasons why a computer may slow down and
possible solutions
Reason Solution
Insufficient memory (ram) Add more memory
Bad hard drive (disk errors Perform a test and repair
creating delays) Replace the hard drive
Low performance CPU Replace the CPU with another
improved and faster CPU
Overheating due to failed fan Clean the accumulated dust using
Excessive dust blocking the heat compressed air
sink
Memory leak(software bug Upgrade the software causing
causes to use a lot of ram) excessive memory usage.
Restart the computer more
frequently
Wrong video driver making the Upgrade the video drivers
display slow
System Configuration
System Specifications
System specifications
Software Installation
Uninstalling a Program
A computer
A CD, DVD or flash disk with the OS
Knowledge about installation
Enough space on the bootable device (HDD)
Stable power source.
Troubleshooting
Always sit upright: to avoid muscle pains and back aches caused by poor
sitting posture.
A computer room should have enough light avoid eyestrain, and headaches.
Standard furniture: have standard furniture so that the tables are wide
enough and strong to bear the weight of the computers and accommodate
all peripherals.
The seat for the user must be comfortable and have a straight backrest that
allows someone to sit upright.
Avoid smoke and dust that can damage computer components, wearing of
moving parts.
Keep food and drinks away from the lab. Their contact with computers may
cause rusting or electrical faults.
Avoid unnecessary movements in the lab. You may knock down peripherals
or get shocked.
Follow the right procedure to start and shut down a computer. Abrupt
switching on and off the computer may damage the computer
Do not open up computers or peripherals without permission and when
power is still on.
Any repairs to the computer should be done by a trained person
Switch off the computer before connecting peripherals
regularly service and keep a regular record of computer servicing and
repair
Never use a computer during a storm.
Avoid dropping hardware to the ground. This could break or damage
components.
Be careful when using the Internet. Do not accept downloads from websites
that you don't know and trust.
And never open an email attachment unless you know and trust the person
who sent it.
Avoid making hardware connections to the motherboard when the
computer is on. E.g. keyboard, monitor and mouse connections.
Don’t bring magnetic devices to the lab. The computer has magnetic disks
which can be spoilt if they come near other magnetic fields.
Handle delicate storage devices with care. Don’t touch the inner surface of
compact disks and floppy disks. Safely remove flash disks from the system.
Avoid excessively bright and flickering computer monitors. The brightness
of the computer monitors should be adjusted to avoid eye strain.
4
COMPUTER WORD PROCESSING
Word processors are mostly used for writing letters, reports, projects, books,
essays, memos, resumes (CVs), Mailings, Labels, Certificates, Brochures,
Calendars, Stories, simple calculations
Text editors are simple word processors that are generally used to type
without any special formatting. Text editors are mainly used to create small
notes, memos and programs.
There are two types of word processors but the most common two are
1. Typeface or font type is the shape of the characters such as Times New
Roman, Arial, and Tahoma.
2. Line spacing refers to the amount of space between two lines of text,
measured in points.
3. Text alignment refers to the way text is arranged relative to the margins
i.e. in
Left alignment, text is arranged to the left margin of a document page
Centre alignment, text is arranged in the center of a document page
Right alignment, text is arranged to the right margin of a document
page
Justification, text is arranged to both the left and right margins at the
same time.
4. Indent is the amount of white space set between the margin and the
beginning of text. Indents can be: The first line indent, Hanging indent and
or Right indent.
7. Copy makes a copy of the selected text to the clipboard, does not move it
from its original position.
8. Cut moves the selected text from its original position and to the clipboard.
Note: Copy and paste duplicates the text, while Cut and paste moves the
text to a new position.
9. The clipboard is an area of memory where copied or cut text or items are
temporarily held before being pasted
10. Paste special helps avoid pasting the text with all its formatting. The paste
special feature provides more control over what to paste.
11. Format painter copies formatting effects to the selected text
12. Header refers to the text that appears in the top margin of all pages in a
document
13. Footer refers to text that appears in the bottom margin of all pages in a
document
14. Ruler is used to set the indent, margin and tab markers.
15. Tabs Stops are places where text can be made to line up. Click the ruler bar
at the desired position.
16. Hardcopy is a printed copy of a document
17. Soft Copy is a non-printed copy of a document
18. Overtype or overwrite mode causes any typed characters to replace the
characters at the cursor
19. Paragraph is the text between one paragraph break and the next. A
paragraph break is inserted by pressing the Enter key.
20. Saving This is to write the document's current state from RAM to a storage
device.
1. Word Wrap automatically breaks the text to the next line without pressing
the enter key
2. Text wrap is a facility that allows text to surround embedded features
such as pictures, tables, etc.
3. Find is a feature that allows the user to locate all occurrences of a
particular character, word or phrase.
4. Replace allows the user to substitute existing characters, words or phrases
with the new ones.
5. Spell checker checks spellings in the entire document once
6. Autocorrect corrects spellings of individual words as they are typed
7. Grammar checker reports grammatical errors and suggests ways to
correct them. Grammatical errors are usually marked by a wavy green line
8. Thesaurus suggests alternative words with the same meaning for use in
the document
9. Mail Merge is a feature used to create similar documents such as letters to
be sent to several people
10. Page numbering numbers the pages automatically in a document
11. Tables allow users to organize information in form of rows and columns
12. Columns This arranges text into two or more columns
13. Drop cap formats the first letter in paragraph to be dropped across two or
more lines
14. Clipart refers to pre-made images about various subjects used to illustrate
concepts in documents
15. Templates establish the initial document layouts and formats for various
document types
16. Printing refers to converting soft copy to hard copies
17. Word Count establishes the number of words, characters, paragraphs, etc.
used in a document
18. Footnotes are used to comment on or provide specific reference for text in
a document. It appears at the bottom of text on a page
19. Endnotes are used as references that provide additional information about
a word or phrase within a document. It appears at the end of a page
20. Insert and Delete allows a user to add and remove portions of text while
editing document
21. Page orientation is the layout in which a page is arranged for normal
viewing. it can be:
Portrait is the layout of a page in which the height of a page is greater
than the width
Landscape is the layout of a page where the width is greater than the
height
24. Blocking or highlighting text refers to selecting text to make it ready for
modification
25. Sorting is the arranging a list of text paragraphs, lines, words, etc.
26. Superscript is a feature that places text above another e.g. X2
27. Subscript is a feature that places text below another e.g. X2
28. Borders and shadings helps to enclose text or objects in a frame or
boarders
29. Page breaks are is used to terminate a page prematurely
30. Gutter margin is a feature that adds extra space to the side or top margin
to ensure text is not hidden by the binding.
31. Page margins are the blank spaces around the edges of the page.
32. Print preview is a feature in that enables users to view the document the
way it would look when printed.
33. Clip art gallery: allows a user to insert drawings, diagrams, and
photographs into a document.
34. Mathematical formulae typesetting: allows a user to typeset complex
mathematical formulae within the program.
35. Indices of keywords and their page numbers;
36. Tables of contents with section titles and their page numbers;
37. Tables of figures with caption titles and their page numbers;
38. Cross-referencing with section or page numbers;
39. Footnote numbering;
1. Title bar displays the task currently running. it also has the minimize,
restore or minimize and close buttons
2. Menu bar has a group of commands that are used to manipulate the
document
3. Tool bars has buttons for quick execution of frequently used commands
4. Document window is the working area where the document is created
5. Status bar displays information such as current insertion pointer position,
progress, pages, edit mode, etc.
Word processors can save softcopies for future use while with a type
writer; a document has to be retyped if needed again.
With a word processor, it is possible to undo a mistake, while any error
made with a type writer is impacted on the printout.
A type writer prints one character at a time while a word processor prints
many pages at a time.
Easier to add graphics, drawings in a word processor than to draw with a
type writer.
The user can type continuously while user needs to advance the lever of a
typewriter manually, at the end of every line.
It is simpler to align text in a document while with a type writer; one has to
manually align the text, which is very difficult.
A word processor has Copy, cut and Paste features and text can be copied
to and pasted from the clipboard while a type writer has no clipboard.
A word processor can work on many pages at a go by inserting pages
numbers, footers, headers, watermarks, etc. while a type writer works on
one page at a time.
A type writer makes a lot of noise during its operation as compared to a
word processor
Many people are computer illiterate, and cannot use the program.
Computers have Viruses, which lead to loss of data in soft copies.
Using word processors on light emitting computer monitors for long leads
to eye disorders, which isn’t the case with type writers
Word processors require additional hard ware like printers in order to
obtain hard copies yet with typewriters, whatever is typed is permanent
and instantly available as a hard copy: there is no delay for printing or risk
of unintended file deletion.
The following among many others are some of the common word processing
keyboard shortcuts that provide quick access to the usage of it.
5
COMPUTER HARDWARE
Computer hardware components are categorized basing on their uses into four
categories: input, processing, output or storage devices
INPUT DEVICES
An input device is any hardware component that aids users to enter data and
instructions into a computer in a form that it can use.
Different types of data are entered into a computer using a special input device
thus input devices can be grouped into the following:
Text input devices are those used to enter data and instructions in form of
characters, numbers and symbols. The common text input device is the
computer keyboard.
Demerits of keyboard
It takes a lot of time to practice in order to type quickly
Keys can easily become faulty due to dust.
Constant use of keyboards may cause finger injuries
b) Pointing devices
A pointing device is an input device that allows a user to move a pointer
and make selections on the computer screen. Common pointing devices are
described below:
The mouse
It is a hand held pointing device that aids the user to point to and make
select item on the computer screen. Mice exist in different forms and types
i.e. optical, laser, mechanical, optical mechanical and air mouse.
An optical mouse uses devices that emit light to detect the mouse's
movement. It is much more expensive than a mechanical modal.
An air mouse is a newer model that allows the user to control objects,
control media players or slide shows by moving it in predetermined
directions in the air. For example raising the mouse might increase the
volume of a media player.
A wireless mouse runs on a battery. When the user moves the mouse, it
sends an infrared beam to a sensor which moves the pointer to.
1. Clicking: pressing and releasing the left hand button of the mouse
once.
2. Right clicking: pressing and releasing the right mouse button once
3. Double clicking: pressing the left button in quick succession
4. Dragging: pointing at an item and then hold down the left button as
you move the mouse.
5. Scrolling: navigating the window page up or down by moving the
wheel like button.
6. Dropping: This refers to the release of the left button mouse after
dragging an item.
Trackball
Touchpad
Touch-sensitive pads
Works more like a touch screen but enable users to scroll through and
play music. It contains keys or wheels operated with the finger or thumb.
Light pen
Light pen- is a light-sensitive device that is used with only CRT monitors.
It allows the user to point to displayed objects, or draw on the screen, in a
similar way to a touch screen but with greater positional accuracy.
Touch screens
Track point
Touch screen
Stylus pen
It is a small metal or plastic ink pen – like device that uses pressure
instead of ink. It writes and draws on a flat device called the Graphics
tablet.
Digital pen
A graphics tablet
It is a flat, rectangular, electronic plastic board that users can use with a
stylus or digital pen to write on or sketch from.
Gaming keyboard
Gaming keyboards include programmable keys so that users can
customize it to be used in a computer game. Some have small displays
that show game statistics, such as time to targets remaining.
Gaming wheels
A gaming wheel is a steering wheel-like device that users turn to simulate
driving a vehicle using programs on a computer. Most wheels have foot
pedals for acceleration and braking actions.
Joystick
It is a handheld vertical lever mounted on a base. A user moves the lever
in different directions and presses the buttons to control actions of a
stimulated player or vehicle.
Gamepad
A gamepad controls the movement and actions of players or objects in
video games or computer games.
Light gun
A light gun is used to shoot targets and moving objects after the user pull
the trigger on the device.
Dance pad
A dance pad is a flat electronic device divided into panels that users press
with their feet in response to instructions from a music video game.
Audio input devices enter data into a computer in form of sound effects,
music, and speech. The common audio input devices include MIDIs such as
electronic keyboards, pianos, guitars, electronic drums, etc., Microphones,
Tape recorders, Radio and TV receivers
These input data in form of full motion pictures and images and storing
them on computer memory. Common video input devices are digital video
cameras, web cameras – cameras that capture videos that display on
webpage, camcorders, etc.
These devices capture data directly from source documents such as credit
cards, cheques, forms, invoices, adverts, brochures, photos, etc. They
include the following examples:
1. Optical readers
These are devices that use light to read characters, marks, codes, then
converts them into digital data that the computer can process. These are
Optical Mark Recognition readers and Optical Character Recognition readers
It is an optical reader that uses laser beams to read barcodes that are
printed on items usually in super markets.
A bar code is an identification code that consists of a set of vertical lines
and spaces of different widths and other images. Barcodes represent some
data that identifies the item such as price and the manufacturer.
It is used to read text printed with magnetized ink and converts it into a form
that the computer can process. They are mainly used in banks to process
cheques. A check is inserted into a MICR reader, which sends the check
information to a computer for processing.
It reads magnetic strips on Credit cards, bank ATM cards, SIM cards, and
other similar cards. Exposure to a magnet or magnetic field can erase the
information and contents of a card's magnetic strip.
i) Imaging devices
These are devices that input images such as still photos, motion pictures,
graphics, video etc. into the computer for processing.
Image scanner
A flatbed scanner works like a copy machine except that it creates a file of
the document rather than a paper copy.
A sheet feed scanner has motorized rollers that can feed the source
document across the scanning head during the scanning process.
A handheld scanner is manually passed over the image to be scanned.
Digital camera
A digital camera allows users to take pictures and store them digitally
instead of storing them on a traditional film. Digital cameras are replacing
film ones that store images on micro films.
Hand geometry system - measures the shape and size of a person's hand
using a hand geometry system. Some large companies use this system as
time and attendance devices or as security devices. Day-care centers use
this system to verify parents who pick up their children.
Iris recognition system - reads patterns in the iris of the eye. These
patterns are as unique as a fingerprint. Iris recognition systems are used
by government security organizations, the military and financial
institutions that deal with highly sensitive data.
Retinal scanners – scan patterns of the tiny blood vessels in the back of the
retina in the eye.
These are computer devices that allow users to send data to or receive
information from a host computer. These include:
bank card into the machine. The machine prints a receipt when
transactions are over.
There are many other special input devices that are used for doing special
customized tasks such as:
The system unit is a case that contains electronic components of the computer
that process and store data. It protects the internal components of a computer
and houses ports from where external (peripheral) devices connect to the
computer system.
Internal devices include the CPU or processor chip, memory, cooling and
power supply system, expansion (adapter) cards and slots, buses, etc. All these
attach to the Motherboard (system board).
The processor has three main components: Arithmetic and logic unit, control
unit. System clock and registers that together, form the processing unit.
The control unit directs and coordinates most of the operations in the
computer. It interprets instructions from programs and then initiates
action to carry out the instruction.
For every instruction processed, the processing unit repeats a set of four
basic steps called the machine cycle. The steps are: fetching, decoding,
executing and storing.
c) Registers
Types of registers
It is a small chip the CPU uses to control the timing of all computer
operations. It generates electronic pulse or ticks at a fixed rate, which set
the operating pace of components in the system unit.
Each tick is called a clock cycle, which affects machine cycle time. The
faster the clock, the more instructions the CPU can execute per second.
Clock speed
The PSU converts the wall outlet ac power of 110 to 240V into dc power of
0.5 to 12 volts. a fan is built into the PSU to keep it cool. Processors
generate heat, which could burn them up.
A heat sink is a small ceramic or metal component with fins on its surface
that absorbs and disperses heat produced by electrical components such as
a processor.
3. Buses
A bus is an electrical path that enables data flow between various system
components. Buses allow various internal devices, peripherals to
communicate with the processor.
Most peripheral are plug and play, work automatically with a computer
when connected without physical configuration.
5. Ports
8. Fire wire - has the same features as the USB but transmits data faster
than USB. It is mostly used for streaming video from a digital video
camera.
Connectors
Computer memory refers to the unit of the computer that stores data and
instructions to be processed. For the CPU to process data, the data must first be
copied into memory. It is the working storage area for instructions, data and
information.
Types of memory
The system unit contains two types of memory: volatile and non-volatile.
The volatile memory loses its contents when the computer turns off, while
contents of nonvolatile memory are not lost when power turns off.
RAM is the most common type of volatile memory and non-volatile memory
chips include ROM, flash memory, and CMOS.
RAM - also referred to the Main memory is the memory chips mounted on the
motherboard that can be read or written to by the processor.
When the computer is turned on, system files are loaded from a storage device
such as hard disk into RAM and remain there as long as the computer is
running.
As additional programs and data are requested, they are read from storage into
RAM for the processor. A computer only can process data that is in memory.
The more RAM a computer has, the faster the computer will respond.
RAM size in computers today ranges from 128MB, 512MB, and 1 GB, 64 GB to
164 GB.
Static RAM (SRAM) - is faster and more reliable than any form of dram.
The term static refers to the fact that it does not have to be re-energized as
often as dram.
Virtual RAM (VRAM) - modern operating systems can use spare storage
space on the hard disk as if it is working memory and this is referred to as
virtual memory
ROM refers to memory chips that store permanent data and programs. Items
stored in rom chips cannot be changed, hence the name read-only. It is
nonvolatile. The contents of ROM often are recorded when the chip is
manufactured.
RAM ROM
a) Volatile, temporally a) nonvolatile, permanent
b) Contents lost on power loss b) Contents kept when power loss
c) Read and write c) Read only
d) Can be increased d) Cannot t be increased
e) Not installed at factory e) Installed at factory
Memory cache
A cache is a relatively small block of very fast memory designed to speed up the
internal transfer of data and software instructions. Cache speeds up processing
time because it stores frequently used instructions and data.
Flash memory
Flash memory is a chip also that keeps its contents when the power shuts off. It
can be erased electronically and reprogrammed. Most computers use flash
memory to hold their startup instructions because it allows the computer
easily to update its contents.
CMOS chips use battery power to keep information even when the computer is
off. Battery-backed CMOS memory chips, for example, can keep the calendar,
date, and time current even when the computer is off.
Secondary storage devices refer to the hardware devices that keep data and
information permanent in the computer. They are non-volatile devices.
1. magnetic tape
They store mass volumes of programs and data thus increases the
productivity of a computer
They are faster in loading or retrieving data and programs than other
forms of secondary storage.
Keep diskettes away from magnet fields, such as near wire telephones, loud
speakers, and other appliances, which contain magnets.
Do not keep heavy objects on top of the diskettes.
Do not fold or bend diskettes.
While labeling or writing on the diskettes use felt tip pen, not pencil or
ballpoint pen.
Do not expose the disk to excessive heat or light.
Do not pull out the diskette from its drive when the drive light is still on.
Do not use alcohol thinners, to clean the disk surface.
Do not touch the disk surface.
Do not bang, drop etc.
Do not splash liquids e.g. water etc.
Keep out of moisture
Floppy diskettes are not reliable – they need to be handled with a lot of
care, else risk losing data.
Floppy diskettes are not durable.
Data access time is relatively slow.
They have limited storage capacity (only 1.44mb)
2. Zip drive
The zip drive is a medium-capacity removable disk storage system with
capacities of 100 mb to 750 mb that was introduced by iomega in late 1994.
However it was never popular enough. Zip drives fell out of favor for mass
portable storage during the early 2000s due to emergence of much better usb
flash drives cds, and dvds.
Similar the zip drive, the jazz drive was a removable disk storage system,
introduced by the iomega company in 1995. The jazz disks were originally
released with a 1 gb capacity. The rising popularity and decreasing price of cds
and dvds greatly hurt the success of the jazz drive and the jazz line was
ultimately discontinued in 2002.
The following should be done for the safety of data on optical disks:
Do not expose the disc to excessive heat or sunlight
Do not eat, smoke or drink near a disc.
Do not stack disks.
Do not touch the underside of the disk.
Always store the disc in a jewel box when not in use
Always hold a disc by its edges.
Do not drop the disk to the ground.
Don't bend the disk.
b) Picture cd
A picture cd is a compact disc that only contains digital photographic images
saved in the jpg file format. You can purchase picture cds that already contain
pictures. A picture cd is a multisession disc, which means you can write
additional data to the disc at a later time.
Once you have recorded the cd-r, you can read from it as many times as you
desire. A cd-r is a multisession optical disc which allows you to write on part of
the disc at one time and another part at a later time. However, you cannot
erase the disc's contents.
f) Dvd-rom
A dvd-rom (digital video disc-rom) is an extremely high capacity compact disc
capable of storing from 4.7 gb to 17 gb. A dvd-rom drive or dvd player is
required to read a dvd-rom. Although the size and shape of a dvd-rom and a cd-
rom are similar, a dvd-rom uses one of the following three storage techniques
to increase its storage capacity
The first technique involves making the disc denser by packing the pits closer
together. A second technique involves using two layers of pits, which doubles
the capacity of the disc. Finally, some dvd-roms are double-sided, which means
that they can be removed and turned over to read the other side.
•
g) High capacity dvd formats
A blu-ray discs-rom (bd-rom) has storage capacities of up to 300 gb. The hd
(high-density) dvd-rom has storage capacities up to 60 gb. A mini-dvd that has
grown in popularity is the umd (universal media disc), which can store up to
1.8 gb of games, movies, or music.
b) Smart card
Smart card: contains a processing microchip to provide it with intelligence as
well as memory it is really a tiny computer, eg. The SIM card used in a mobile
phone identifies you through a pin number, identifies and connects to your
service provider and provides a menu of options, as well as storing phone
numbers and phone settings. A smart card, which is similar in size to a credit
card or ATM card, stores data on a thin microprocessor embedded in the card.
An intelligent smart card contains a CPU and has input, process, output and
storage capabilities.
Flash memory cards are a type of solid-state media, which means they consist
entirely of electronic components and contain no moving parts. Common types
of flash memory cards include; compactflash (cf), smartmedia, miscrosd,
minisd, xd, picture card, etc. They are commonly used in electronic devices
such as digital cameras and mobile phones. They are tiny, re-recordable, and
able to retain data without power. Depending on the device, manufacturers
claim these storage media can last from 10 to 100 years.
a) Punched cards
A punched card, punch card, ibm card, or hollerith card is a piece of stiff paper
that contains digital information represented by the presence or absence of
holes in predefined positions. They were used through the 20th century in unit
record machines for input, processing, and data storage. Early digital
computers used punched cards, often prepared using keypunch machines, as
the primary medium for input and storage of both computer programs and
data.
b) Photographic film
Photographic film is a sheet of plastic such as polyester coated with a light
sensitive emulsion that is used to record and store photographs. Normal film is
shipped in small canisters (boxes) that protect it from the light. When exposed
to light, it forms an invisible image. Chemical processes can then be applied to
the film to create a visible image, in a process called film developing. A normal
photographic film can hold up to 40 pictures.
d) Data logger
A remote input/output device, which stores data received from sensors that
can then be input into a computer at another time or place. It can be left alone
to collect data over a long period of time and in hostile places, such as on a
satellite, at the bottom of the ocean or at the South Pole.
Eight little bits make one byte. The storage capacity of computers (RAM and
rom) and that of auxiliary storage units like disks are generally given in bytes.
One byte stores approximately one character.
OUTPUT DEVICES
Display devices
Display devices are also referred to as the visual display unit (VDU)
Monitors
Plasma Monitors
It is a lightweight display device with a shallow depth and flat screen that
typically uses a gas plasma technology with a gas layer between to glasses
to display information. They are more expensive than LCDs.
Flat panel display devices are common on laptops, mobile devices, desktops,
etc. Many are widescreen, i.e. much wider than they are tall. Screens are
measured diagonally from one corner to the other. Common sizes are 17”,
19”, 20”, 22”, 24” and 27”, 45” and 65 inch screens
CRT monitors
Data projectors
A data projector takes the image that displays output on a computer screen
and projects it onto a large screen or wall so audience can see it clearly.
Presence of excess light affects data projectors and so they perform well in
dark rooms.
Data projector
Printers
Types of printers
Printers can be grouped into two types:
Impact printers
Non-impact printers.
1. Impact printers
An impact printer forms characters and graphics on a piece of paper by
striking a mechanism against an ink ribbon that physically contacts the
paper. Impact printers are noisy because of this striking activity.
They are ideal for printing multipart forms because the easily print
through many layers of paper. Large businesses use impact printers
because these printers can withstand dusty environments, vibrations,
and extreme temperatures. Commonly used types of impact printers
include daisy wheel, dot-matrix, braille and line printers.
a) Daisywheel printer
b) Dot-matrix printer
This produces printed images when tiny wire pins on a print head
mechanism strike an inked ribbon like in a type writer. When the
ribbon presses against the paper, it creates dots that form
characters and graphics.
c) Drum printer
d) Braille printers
e) Line printers
A line printer is a high-speed impact printer that prints an entire line at
a time. The speed of a line printer is measured by the number of lines
per minute (LPM) it can print.
2. Non-impact printers
a) Ink-jet printer
b) Laser printer
c) Thermal printers
Basic thermal printers are cheap, but the print quality is low and
the images tend to fade over time. Thermal printing technology is,
however, ideal for use in small devices e.g. ATM receipt printers.
d) Plotters
These printers are usually very costly, and are used in specialized
fields such as engineering, and graphic art. They use ink-jet printer
technology, on a much larger scale, to print professional quality
displays.
f) Mobile printers
g) Photo printers
These are color printers that produce pictures. Most of these use an
inkjet technology.
4. Ink cartridge is a container for the liquid ink that is deposited onto
during printing of characters on a paper. Used mainly by inkjet
printers.
5. Toner cartridge is a container for the liquid ink that is deposited onto
during printing of characters on a paper. Used mainly by laser printers.
Audio output devices are the components of the computer system that produce
music, speech, or other sounds, such as beeps.
a) Computer speakers
Computer speakers typically have tone and volume controls, allowing users
to adjust settings. To boost the low bass sounds, surround sound speaker
systems also include a woofer, with one or two center speakers and two or
more satellite speakers that are positioned so that sound emits from all
directions. Some computer speakers use wireless technology.
d) Pc internal speakers
Most personal computers have a small internal speakers that basically
output beeps and low-quality sound.
There are very many kinds of emerging output devices. Some are both input
and output devices. Examples include: Fax machine, Machine tools.
A fax machine is a device that transmits and receives typed or hand written
documents over telephone lines.
A machine tool is a machine for shaping metal or other rigid materials, usually
by cutting, boring, grinding, or shearing. Through computer-aided
manufacturing, computers are used to control the output of machine tools and
related machinery in the manufacturing of work pieces.
6
COMPUTER SOFTWARE
System Software
System software refers to programs that manage, control and maintain the
operation of a computer and all devices connected to it. It performs tasks
related to the operation and performance of the computer system and avails
resources to the user.
User interface refers to the visual part of a program or OS through which a user
interacts with a computer or software. It determines how commands are given
to the computer and how information is displayed on a computer.
A user is provided with a virtually empty screen with a blinking cursor where
commands are keyed and the computer executes them by pressing the enter
key.
In a GUI, a user uses menus and visual images such as icons, buttons and other
graphical objects to issue commands. Common GUI operating systems are
Windows, Ubuntu, etc.
Utility Software
24. Disk practitioners - divide a drive into multiple logical drives, each with
its own file system which can be mounted by the operating system to be
treated as an individual drive.
25. File synchronization utilities - maintain consistency between two
sources. They enable redundancy or making copies of data.
26. System profilers - provide detailed information about the software
installed and hardware attached to the computer.
27. Network utilities - analyze a computer’s network connectivity, configure
network settings, check data transfer or log events.
28. System restore utility
Device Drivers
A device driver is small software that tells the operating system how to
communicate with the device. Each peripheral device on a computer has its
own specialized set of commands and thus requires its own specific driver.
The operating system loads each device’s driver when the computer boots up.
Programming Languages
They are easier to learn, write, correct and revise than assembler and
machine languages.
They can be used for development of application software.
COBOL Ruby
PASCAL C++
Python C#(C-sharp)
Java Script PERL
Java FORTRAN
C PHP
APPLICATION SOFTWARE
These are programs already written and ready to be run upon their purchase.
4. Database software – an application with which one can store lots of data
for future manipulation
9. Media players for audio and video – used for audio and video playback
on computers. Examples include: Windows media player,, Nero ShowTime,
Jet-audio, Power dvd, VLC media player, Virtual DJ, etc.
12. Audio and video editing software - lets users produce studio quality
soundtracks. Video editing software is used to modify video clips: you can
reduce the length of a video clip, reorder a series of clips, or add special
effects such as words that move horizontally across the screen etc.
common audio and video editing software are:
14. Reference software - provides valuable and thorough information for all
individuals. Popular reference software includes encyclopedias,
dictionaries, health/medical guides, and travel directories. Examples
include: Encyclopaedia Britannica 2011 Ultimate Reference Dvd, Microsoft
Student with Encarta Premium, etc.
15. Note taking software - enables users to enter typed text, handwritten
comments, drawings, or sketches anywhere on a page and then save the
page as part of a notebook .the software can convert handwritten
comments to typed text or store the notes in handwritten form. Examples
include Microsoft Office OneNote
16. Text editors - simple word processors that are generally used to type
without any special formatting, mainly used to create small notes, memos
and programs. Examples of common text editors are: Notepad, Notepad++,
Sublime Text, Gedit etc.
Time taken to develop the package may be long yet requirements could be
urgent.
The cost of paying programmers makes them expensive. The organisation
has to incur development and consultancy costs in this case.
They are not flexible i.e. not meant to do various tasks.
Expensive to maintain. When they breakdown programmers who are
expensive have to be called in
In-case of breakdown, the company may be brought to a standstill
There is a greater probability of bugs in bespoke programs.
They are not compatible with all computer types, designed for specific
computer types.
They may not run which means that the programmer has to design another
one. This could even lead to more costs on the side of the user as well as
causing delays
Shareware
Copyrighted software
Freeware
Open-source
Public-domain software
Public-domain software has been donated for public use and has no copyright
restrictions. Anyone can copy or distribute public domain software to others at
no cost.
Web-based software
Web-based software refers to programs hosted by a web site. Users access and
interact with web-based software from any computer or device that is
connected to the Internet. Many web sites allow free access to their programs;
some charge a fee. Examples of web-based software include e-mail, Website
builders, online games, travel and mapping software, etc.
General purpose
Software suite
4. Software bug refers to an error in the programming code that does not
permit it to function well.
8. Hot fix: this is software that is designed to fix a bug or security hole in
software program.
10. Software patch: this is software that is designed to modify, correct, and fix
problems in software.
11. Software update: this is a software application that provides fixes for
features that are not working as intended or adds minor software
enhancements and compatibility.
7
INTRODUCTION TO SPREADSHEETS
Introduction to Spreadsheets
A spreadsheet is a grid of rows and columns that accepts entry of data, allows
editing, formatting and manipulation of numeric data. Spreadsheets can also
display data graphically with the help of charts and graphs.
Types of Spreadsheets
12. Autofill – a feature that allows a user to quickly fill cells with repetitive or
sequential data such as chronological dates or numbers, and repeated text.
13. Sorting data - arranging records in ascending or descending order.
14. Filtering data - displaying of records that satisfy the set condition from the
parent list.
15. Graphs - a pictorial representation of the base data on a worksheet.
16. A chart is a graphical representation of data. A chart may be 2-D or 3-D
17. What-if analysis - a process of changing values in cells to see how changes
affect outcomes of formulas on the worksheet.
18. Freezing panes - where rows and columns are frozen such that they
remain visible during scrolling long sheets
Uses or Applications of Spreadsheets
Preparation of budgets
Preparation of cash flow analysis
Preparations of financial statements
Processing basic business information, like, job costing, payment
schedules, stock control, tax records
Analysis of data from questionnaires
Presentation of information in tabular form, graphical or charts forms
Mathematical techniques and computation like trigonometry
Statistical computations like standard deviations.
Grading students
1. Arithmetic operators
These are used to perform basic mathematical calculations such as
addition, subtraction, division or multiplication; combine numbers; and
produce numeric results.
2. Comparison Operators
These are used to compare two values, and the result is a logical value
either TRUE or FALSE.
4. Cell References
A Cell reference is an address given to a particular cell or group of cells on
a worksheet. e.g. A2, B6, B3.
reference and a relative row reference or vice versa, e.g. $G17, B$14,
D$2, $E2.
Formulas
5. Logical operators
Operator Description
AND Returns TRUE if all arguments are True and FALSE if any
argument is false
FALSE Returns the logical value FALSE
IF Specifies a logical test to perform
IFERROR Returns a value you specify if a formula evaluates to an error;
otherwise, returns the result of the formula
NOT Reverses the logic of its argument
OR Returns TRUE if any argument is TRUE
TRUE Returns the logical value TRUE
Error Alerts
Excel displays an error value in a cell when it cannot properly calculate the
formula for that cell. Below are some common error values and their meanings.
Functions
8
THE INTERNET AND WORLD WIDE WEB
The Internet
It is a company that offers Internet services to end users. It takes care of the
technical aspects of connecting to the Internet usually at a fee. In Uganda,
common ISPs are Orange, MTN, Airtel, UTL, Smile etc.
2. Protocol
It refers to a set of rules that govern how two computers send and receive
data on a network. The internet uses Transmission Control
Protocol/Internet Protocol - TCP/IP.
3. Web browsers
4. E-mail software
The www is the most exciting service that has revolutionized the Internet,
people use this service to browse for information.
10. Web directory: a listing of web sites and their urls, categorized by topic.
11. Electronic commerce/e-commerce: conducting commercial activities on
the Internet.
12. Social networking. A type of service where users can seek others who
share their interests, find out what's going on in their areas of concern, and
share information with one another (e.g. Facebook, twitter).
14. Search engines: software programs that look through the web to locate
sites matching a keyword entered by the user. Keyword: a string of letters
or words that indicates the subject to be searched.
1. Email communication
An email address has two basic parts: the username and the internet
domain separated by the @ symbol. It is usually in lowercase. The general
format is username@internet domain.
In the US, most domains end with a domain type indicating the type of the
site or geographical location such as the following:
Outside the US, a country code may be added to the domain name to
indicate the country from where the host is located: such as:
2. Body: The body of a message contains text that is the actual content
3. Message: where the content is entered. It should be short and to the
point
4. Signature: provides additional information about the sender such as
full name, address and telephone contact
Emails can spread viruses: the recipient needs to scan the mails, as viruses
are transmitted through them and have the potential to harm computer
systems.
Spam and junk: e-mails when used to send unsolicited messages and
unwanted advertisements create nuisance called spam. Checking and
deleting these unwanted mails can unnecessarily consume a lot of time,
and it has become necessary to block or filter the unwanted e-mails by
means of spam filters.
E-mail spoofing is another common practice. Spoofing involves disguising
as different sender by altering the e-mail headers or the addresses from
which the mail is sent.
Hacking and email interception: the act of unauthorized attempts to
bypass the security mechanisms of an information system or network is
termed as hacking. After the e-mail is sent and before it is received by the
desired recipient, it "bounces" between servers located in different parts of
the world. Hence, the e-mail can be intercepted by a professional hacker.
Misinterpretation: one has to be careful while posting any kind of content
through an e-mail. If typed in a hurry, the matter could be misinterpreted.
Since the content posted via e-mails is considered informal, there is a
chance of business documents going unnoticed. Thus, vital communications
and especially those requiring signatures are not managed through e-mails
Crowded inbox: over a period of time, the e-mail inbox may get crowded
with mails. It becomes difficult for the user to manage such a huge chunk of
mails.
Need to check the inbox regularly: in order to be updated, one has to
check his e-mail account regularly, which may be expensive in the long run.
Email cannot be used without computers especially in remote areas
without electricity.
In case one forgets his/her password, signing in is not possible and this
can lead to loss of information.
Email may violate privacy in case someone else gets to know your user
password since the other may check your mails.
WWW (simply the Web) is a worldwide collection of websites and servers that
can be access over the Internet. A website is a collection of related web pages
or resources on a web server.
The first page on a website is the home page. A webpage is a HTML document
accessible to a web browser. Webpages are linked by hyperlinks.
A web browser (check previous notes) helps a user access the web.
Search engines
A Search Engine is a program that retrieves information from the web basing
on the keywords from the user. Common search engines are: Google, Yahoo
search, Wikipedia, Baidu, Bing search, Bing, Ask. Com
A URL is a unique name that identifies a particular webpage on the web server.
Ii can also mean an internet address of a particular webpage on the web.
A domain name is the name of the web server where the resources are
located.
The general format of a URL is protocol: //domain name.
Some tines, more 2 codes are including on the domain name to identify the
type of organization and country where it is located such as in
http://www,mtn.co.ug. In this case, co.ug is called the top level domain.
Note: Search entries are called keywords and search results are called hits.
1. Use “quotation marks” to search as a phrase and keep the words linked
together.
2. + and – can be used to include or exclude a word
3. Boolean syntax: enter words and connect with Boolean operators: and, or,
not
• And will include sites where both words are found. Uses: joining
different topics eg (ie. “Global warming” and California).
• Or - requires at least one of the terms is found uses: join similar or
synonymous topics (i.e. “global warming” or “greenhouse effect”)
• Not – searches for the first term and excludes sites that have the second
term uses: join similar or synonymous topics (i.e. Washington not
school)
Other syntax:
• The wildcard operator (*): Google calls it the fill in the blank
operator. For example, amusement *
• Site search: many web sites have their own site search feature, but you
may use a search engine to get results from one website example:
site:www.newvision.co.ug ICT in schools.
• Related sites: for example, related:www.youtube.com can be used to
find sites similar to YouTube.
Types of websites
1. Web portal : an Internet-based website that can perform many electronic
functions and provide the user with quick access to a variety of information
and services. Eg. Uneb results portal
2. Content aggregator: combines information such as news and
entertainment, sports scores, weather forecasts, photographs and video from a
variety of sources and makes the combined content available to its customers
e.g web-based feed readers like rss feeds, delicious.com, etc.
3. A wiki: a website that allows collaborative editing of its content and
structure by its users. E.g. Wikipedia
4. A blog: a blog is a website in which journal entries are posted on a regular
basis. A person who posts entries is called a blogger
Blog posts are typically displayed in reverse chronological order (the most
recent post appears first).a majority are interactive, allowing visitors to leave
comments.
Blog Wiki
Blog usually has a single author A wiki usually has many
authors
Media sharing sites allow you to upload your photos, videos and audio to a
website that can be accessed from anywhere in the world. E.g youtube.com,
dailymotion.com, blip.tv, slideshare.net, archive.org, podbean.com, and many,
many others
A type of website where users can seek others who share their interests, find
out what's going on in their areas of concern, and share information with one
another
Cloud computing
Netiquette
Netiquette guidelines:
• Be clear: make sure the subject line (e-mail) or title (web page) reflects
your content
• Use appropriate language: avoid sending abusive and emotional
messages.
• Don't use all capital letters--it's equal to shouting or screaming
9
ELECTRONIC DATABASES
Examples of databases
Categories of databases
A flat file database is made up of only one table. It is easy to setup and use
A relational database can take information from two or more tables,
combines them into a new table or report using a key field.
Characteristics of databases
be created.
11. Forms allow you to enter or view data stored in your tables
12. Reports allow you to print data based on queries/tables that you
have created
numbers.
18. Wild cards: is a special character that represents one or more other
characters. Wild card characters may be used to represent a letter or
letters in a word. Wild cards can be used in access queries to look for
specific information
Database objects
These are the basic components that make up a database and they
include:
Tables
Queries
Forms
Reports
Macros
Modules etc
Modules:
Database tables
characters in a control.
Number Numeric values (integers or 1, 2, 4, or 8 bytes, or 16
fractional values). bytes when used for
Used for storing numbers to be replication id.
used in calculations, except for
monetary values (use the
currency for data type for
monetary values).
Date/tim Dates and times. 8 bytes.
e Used for storing date/time
values. Note that each value
stored includes both a date
component and a time
component.
Currency Used for storing monetary 8 bytes.
values (currency).
Autonum A unique numeric value that 4 bytes or 16 bytes when
ber office access automatically used for replication id.
inserts when a record is added.
Use for generating unique
values that can be used as a
primary key. Note that
autonumber fields can be
incremented sequentially.
Yes/no Boolean values. 1 bit (8 bits = 1 byte).
Use for true/false fields that
can hold one of two possible
values: yes/no or true/false, for
example.
Ole(objec Ole objects or other binary Up to 1 gigabyte.
t linking data.
and Use for storing ole objects from
embeddi other Microsoft windows
ng) applications.
object
Attachme Pictures, images, binary files, For compressed
nt office files. attachments, 2 gigabytes.
This is the preferred data type For uncompressed
for storing digital images and attachments,
any type of binary file. approximately 700k,
Note depending on the degree
Field name should be written to which the attachment
as a caption can be compressed.
Hyperlin Hyperlinks. Up to 1 gigabyte of
k Use for storing hyperlinks to characters, or 2 gigabytes
provide single-click access to of storage (2 bytes per
web pages through a url character), of which you
(uniform resource locator) or can display 65,535
files through a name in unc characters in a control.
Note
For phone numbers, part numbers, and other numbers you don’t
intend to use for mathematical calculations, you should select the
text data type, not the number data type.
For the text and number data types, you can specify the field size or
data type more specifically by setting a value in the field size
property box.
Field properties
The following table lists and describes the placeholder and literal
characters that you can use in an input mask.
Character Use
0 Digit. You must enter a single digit in this position.
9 Digit. Single digits in this position are optional.
# Enter a digit, a space, or a plus or minus sign in this position.
If you skip this position, access enters a blank space.
L Letter. You must enter a single letter in this position.
? Letter. Single letters in this position are optional.
A Letter or digit. You must enter a single letter or digit in this
position.
A Letter or digit. Single letters or digits in this position are
optional.
& Any character or space. You must enter either a single
character or a space in this position.
C Any character or space. Characters or spaces in this position
are optional.
.,:;-/ Decimal and thousands placeholders, date and time
separators. The character you select depends on your
Microsoft windows regional settings.
> All characters that follow appear in uppercase.
< All characters that follow appear in lowercase.
! Causes the input mask to fill from left to right instead of from
right to left.
\ Forces access to display the character that immediately
follows. This is the same as enclosing a character in double
quotation marks.
"literal Encloses any text that you want users to see in double
text" quotation marks.
Password In design view for tables or forms, setting the input mask
property to password creates a password entry box. When
users type passwords in the box, access stores the characters
but displays asterisks (*).
The examples in the following table demonstrate some of the ways you
can use input masks.
Query
A query criterion is a rule that identifies the records that you want to
include in the query result.
Not like "*ina" Returns records for all fields that do not end
in "ina", such as china and argentina.
Is null Returns records where there is no value in
the the field.
Is not null Returns records where the value is not
missing in the field.
"" (a pair of quotes) Returns records where the field is set to a
blank (but not null) value.
Not "" Returns records where the field has a
nonblank value.
"" or is null Returns records where there is either no
value in the field, or the field is set to a blank
value.
Is not null and not "" Returns records where the field has a
nonblank, non-null value.
>= "mexico" Returns records of all fields with values
beginning with mexico and continuing
through the end of the alphabet.
Like "[a-d]*" Returns records for fields whose values start
with the letters "a" through "d".
"usa" or "uk" Returns records for usa and uk.
In("france", "china", Returns records for all fields with values
"germany", "japan") specified in the list.
Right([value in the], 1) = Returns records for all fields where the last
"y" letter is "y".
Len([country/region]) > Returns records for countries/regions whose
10 name is more than 10 characters long.
Like "chi??" Returns records for fields with values, such
as china and chile, whose names are five
characters long and the first three characters
are "chi".
<50 or >100 Returns records where the value is not between 50 and
100.
In(20, 25, 30) Returns records where the value is either 20, 25, or 30.
Like "*4.99" Returns records where the value ends with "4.99", such
as 4.99, 14.99, 24.99, and so on.
Is null Returns records where no value is entered in the field.
Is not null Returns records where the value is not missing in the
field.
Date() + 1 Returns records that took place the day after the
current day. If today's date is 2/2/2006, you see
records for feb 3, 2006.
< date() Returns records that took place before today.
> date() Returns records that will take place after today.
Is null Returns records where the date is missing.
Is not null Returns records where the date is known.
Datediff ("yyyy", This criterion applies to a date/time field, such as
[birthdate], date()) birthdate. Only records where the number of
> 30 years between a person's birthdate and today's
date is greater than 30 are included in the query
result.
Data validation
Data validation - is the checking of input data for errors (e.g., of the
correct data type) before processing.
Validation rules
This prevents bad data from being saved in your table. Basically,
they look like criteria in a query.
-or-
You must enter a positive number.
0 or >100 Value must be either 0 or greater than 100.
Between 0 and 1 Enter a value with a percent sign. (for use
with a field that stores number values as
percentages).
<#01/01/2007# Enter a date before 2007.
>=#01/01/2007# and Date must occur in 2007.
<#01/01/2008#
<date() Birth date cannot be in the future.
M or f Enter m for male or f for female.
10
SYSTEM SECURITY, ICT ETHICAL ISSUES AND
EMERGING TECHNOLOGIES
Data confidentiality
System failure
Information theft
Computer viruses, worms and Trojan horses
Unauthorized access and use
Hardware theft
Software theft
Fire outbreaks
Unauthorized alteration
Malicious destruction of hardware software, data or network resources
As well as sabotage and other computer crimes
Computer Crimes
A computer crime is an illegal act which involves the use of computers and
information technology. It also refers to the criminal offence illegal or
unauthorized use of computer technology to manipulate critical user data.
Or
It refers to any crime that is committed on, with or to a computer or network.
6. Sabotage refers to illegal destruction of data and information with the aim
of crippling services delivery, or causing great loss to an organization.
12. Unauthorized use refers to the use of a computer or its data for
illegal/unapproved activities.
15. Knowingly selling is the act of distributing and selling child pornography.
Reinforce weak access points like windows, door and roofing with metallic
grills and strong padlocks.
Motivate workers so that they feel a sense of belonging to be proud and
trusted custodians of the company resources.
Insure the hardware resources with a reputable insurance firm.
Enforce laws that protect the owners of data and information against
piracy.
Make software cheap enough to increase affordability.
Use licenses and certificates to identify original software.
Set installation passwords that deter illegal installation of software.
Computer Malware
Computer viruses
Types of viruses
2. A file virus-this attaches itself to files, and is loaded into memory when the
infected is run.
3. A macro virus -this uses the macro language of an application (e.g., word
processor or spread sheet) to hide the virus code.
7. A Trojan horse -this is one that hides within or looks like a legitimate
program, but executes when a certain condition or action is triggered.
8. A polymorphic virus -this modifies its code each time it attaches itself to
another or file, so that even an antivirus utility has difficulty in detecting it
12. A blended threat is a more sophisticated attack that combines some of the
worst aspects of viruses, worms, Trojan horses and other malicious codes
into one single threat.
Ensure that the e-mail is from a trusted source before opening or executing
any e-mail attachment.
Install an antivirus utility and update its virus definitions frequently for
detecting and removing viruses.
Never start up a computer with a floppy disk in the floppy drive.
Scan all floppy disks and files for possible virus infection before opening
them.
Set the security level for macros in an application so that the user can
choose whether or not to run potentially unsafe macros.
Write-protect the recovery disk before using it.
Back up important files regularly.
Ensure that there is a policy of how computers are used and protected.
Anti-virus software
Antivirus software is a utility program that looks for and eradicates a wide
range of problems, such as viruses, Trojan horses, and worms.
Avg anti-virus
Avira anti-virus
Norton anti-virus software
Kaspersky anti-virus
Avast anti-virus
SMADAV USB anti-virus
Access rights - access rights help to protect the IT system and the data
stored on the system by restricting who can do what. Most company
networks will be set up so that different users have appropriate levels of
access rights. For example a manager of the company will have higher level
access right than his subordinate staffs.
Audit trails or logs - network managers should ensure that their system is
able to create an audit log that will record every important event in an
'audit file such as who logged on to the system at what time and onto which
computer, which files were opened, altered, saved or deleted or log events
such as attempts to access proxy servers
Is a legal term that refers to creations of the mind that such as software,
music, literature, discoveries and inventions.
Intellectual property rights are the rights given to persons over the
creations of their minds. They give the creator exclusive rights over the use
of their creation for a certain period of time. -
A patent right grants an inventor the right to exclude others from making,
using, selling, offering to sell, and importing an invention for a limited
period of time, in exchange for the public disclosure of the invention.
Computer Ethics
These refer to a set of moral principles that regulate the use of computers.
The human values and moral conduct relating to right and wrong decision
made when using computers.
Or
Moral guidelines that govern use of computers and information systems
Information privacy
It refers to the right of individuals and companies to restrict collection and use
of information about them.
EMERGING TECHNOLOGIES
These are innovations and advancements in the use of new technological tools
that make technology more amazing. It covers the rapid evolution of
computers and information technology with the future trends in computer and
ICT
Types of robots
Application of robots
5. Digital forensics refers to the science that involves the recovery and
investigation of material found in digital devices often in relation to
computer crime.
6. Biometric devices
Applications of VR
11. Quantum cryptography is the encryption of data with tiny light particles
called photons. Encryption is the conversion of digital data and information
into an unreadable form such that unauthorized people cannot read it.
o Secure voting, votes can be secured such that they are not changed or
altered
o Completely secure communication for example in military
o Secure bank transfers. Some banks are using this technology to have
secure money transactions
o Secure personal information transfer
o Technophobia/techno stress
o Loss of jobs say for massagers in case of networking
o Health issues for eye defects, back pain.
o Fear of cost of retaining or learning new skills
o Fear of increased electricity and subscriptions costs
o Fear of computer related crimes like forging of documents
o Fear of loss of man-hours through computer games and video during
working hours
o Data loss by virus and system crashing
o Computer related errors and accident
o Unemployment//redundancy//financial/family problems.
o Local businesses/economy affected
o Possible increase in crime (idle youth)
o People leaving community (to find other work)
o Opportunities for high skilled/programming jobs
Computer professionals
2. Computer technician
• Troubleshooting computer hardware and software related problems.
• Assembling and upgrading computers and their components.
• Ensures that all computer accessories such as printers modems,
storage media devices are in good working condition.
3. Computer engineer
• Design and develop computer components such as storage devices,
motherboards and other electronic components.
• Determine the electrical power requirement of each component.
• Re-engineer computer components to enhance its functionality and
efficiency.
• Design and develop engineering and manufacturing computer
controlled devices such as robots.
4. Computer programmer
• Develop in house application programs or system programs.
• Customize commercial application packages to suite the organization
needs.
• Install, test, debug, and maintain programs developed or customized
for the organization.
6. Software engineers
Most software engineers analyze user needs and create application
software. Software engineers usually have experience in programming, but
focus on the design and development of programs using the principles of
mathematics and engineering.
7. Computer trainers
Computer trainers typically teach new users how to use the computer
software and hardware.
8. Network administrator
• Set-up a computer network.
• Maintain and enforce security measures on the network.
• Monitor the use of network resources.
SMEs produce and gather a lot of information about customers,, supplies, and
employee activities, which require networked computers to manage and
distribute it.
1. Retail enterprises
2. Manufacturing enterprises – create, distribute and sell goods to customers
3. Services enterprises – do not create good but provide services to
consumers or other organizations. They include insurance, financial
companies and restaurants
4. Whole sale enterprises – purchase and sell large quantities of goods to
consumers at a lower price than retail sale.
5. .government enterprises – agencies or departments of a government
6. Educational enterprises – universities, colleges, schools
7. Transport enterprises – include airline, regional transport authorities or
companies, passenger railroads, trucking firms, etc.
2. Human resource
Human resource information systems are used to maintain employee
records such as bio data, attendances to determine their pay
Computers are used for communications between employers and
employees, customers
3. Product development
Computer Aided Design uses special software to create product designs
Computer aided engineering uses computers to test products before
they are used
4. Manufacturing
Computer aided manufacturing uses computers to control production
of goods such as software controlled drilling, welding, milling
Computer integrated manufacturing (CIM) uses computers to integrate
different manufacturing processes
Computers are used in material requirement planning
5. Quality control
Quality control software are used to find and predict product defects and
problems
6. Marketing
Market research systems are used to store and analyze data gathered
from product surveys
Sales managers get feedback from consumers through websites
Marketers and sales managers can communicate with customers thru
calls, SMS, emails, websites
Goods are advertised online through social media platforms, websites,
TV, radio, etc.
7. Sales
Sales software is used to manage customer contacts, schedule customer
meetings, mange product information, take orders from customers, etc.
8. Distribution
Distribution systems forecast inventory control, manage and track shipping
products, relying on GPS
9. Customer service
Customer interaction software manes day to day interactions with
customers such as through calls, emails, web interactions, messaging, toll
free lines, etc.
Usually information used by SMEs is got from sources such as: the Internet,
seminars, webinars, brochures, consultations, trade catalogues, visits and
tours, interviews, social media, TVs and radios, etc.
ICTs as an innovation in businesses have not been fully adopted. The following
are some of the reasons for non-adoption of ICTs in SMEs:
E-commerce refers to the buying and selling of goods and services on the web
(Internet). Common e-commerce services are:
E-retail – retailers use the web to sell their products and services on
business web sites such as amazon
Online banking – allows user to pay bills from their computer –
transfer of money electronically through mobile money
Online trading – users invest in stock, options, bonds, treasuries,
money market, etc.
Online advertisement
11
ELECTRONIC PRESENTATIONS
Some presentation software can convert an existing slide show into a format
that can be accessed on the Web.
15. Slide transition is a special effect for introducing an entire slide during a
slide show
16. Graphics. A general term used to mean pictures, images, charts, photo,
tables, etc., that you can add to a presentation
17. ClipArt. A general term for a library of pictures in the computer.
18. Presenter’s notes, these contain ideas you want to discuss for each slide in
your presentation.
19. Auto content wizard. This is a presentation wizard that contains data
from which one can select and edit to create a personalized or customized
presentation.
20. Master layout is a term applied to a presentation’s overall design.
21. Slide timing. Is a technique by which slides or text appearing on the screen
during a presentation, i.e. on mouse click or automatically after a defined
period
Normal view – default view, displays the text outline of the entire
presentation on the left, current slide on upper-right, and speaker’s notes
on the lower-right.
Outline view – displays only the text on a slide in one location instead of
one slide at a time. It enables one to edit and display text. It appears
without the objects or images in the slide.
Slide view - shows a graphic view of the current slide for editing and
viewing
Slide sorter view - displays the entire presentation so that one can add,
delete and move slide.
Notes page - provides a large area to view or type speaker’s notes on a
slide
Slide show - a collection of slides moving in a defined sequence at a
present timing that one can control and change with special effects
12
DATA COMMUNICATION AND
NETWORKING
Data Communication
This refers to the electronic transfer of data, instructions, and information from
one device to another via a transmission media.
These are devices that enable the users to send and receive messages.
Data communication tools can be categorized into two: electronic and manual
data communication tools.
Common examples are Computers, Fax machines, Radio and Television, Mobile
Devices like phones and PDAs, Internet services (Email, Websites, Social
networking, chartrooms Forums, etc.).
UACE 2018
A twisted pair cable is made up of solid copper wire strands wound in pairs
within a single media. The winding of the wires is meant to avoid the
development of electromagnetic fields around the two wires as they transmit
data. TP is commonly used to interconnect devices on a Local Area Network
There are two common types of twisted pair cabling, STP and UTP. The
S stands for Shielded, the U stands for Unshielded.
The extra covering in shielded twisted pair wiring protects the transmission
line from electromagnetic interference leaking into or out of the cable, but
makes it more expensive.
Coaxial cables
Coaxial cables are difficult to install, but highly resistant to signal interference.
In addition, it can support greater cable lengths between network devices than
twisted pair cable. The two types of coaxial cabling are thick coaxial and thin
coaxial.
The fiber optic cable consists of a center glass core surrounded by several
layers of protective materials. It transmits light rather than electronic signals
eliminating the problem of electrical interference.
This makes it ideal for certain environments that contain a large amount of
electrical interference.
It has also made it the standard for connecting networks between buildings,
due to its immunity to the effects of moisture and lighting.
Fibre optic cable uses light to transmit data from one point to another
on the network. The electrical signal from the source are converted to
light signals, and then sent along the fiber optic cable.
The major wireless transmission media include radio waves, microwaves, and
infrared which is part of the electromagnetic spectrum, which is the range of
all possible frequencies of electromagnetic radiation.
Wireless media send communications signals through the air or space using
radio, microwave, and infrared signals (electromagnetic waves).
1. MICROWAVES:
2. RADIO WAVES:
Radio waves frequencies are easy to generate and are widely used for
communication, both indoors and outdoors. Examples of communication
technologies using radio waves include Bluetooth, Wireless Fidelity (Wi-Fi)
5. HOTSPOT
Transmission Direction
Simplex transmission
Half-duplex transmission
Full-duplex transmission
Multiplex transmission
Packet Switching
When a computer sends data over the Internet, the data is divided into small
pieces called packets. Each packet contains the data, as well as the recipient
(destination), the origin (sender), and the sequence information used to
reassemble the data at the destination.
Each packet travels along the fastest individual available path to the recipient's
computer via communications devices called routers.
This technique of breaking a message into individual packets, sending the
packets along the best route available, and then reassembling the data is called
packet switching.
Telephone voice calls help keep people talking even when they are
distant and mobile.
Short Messaging Services SMS facilitate sending and receiving of
brief text messages.
Electronic mail and fax : An electronic mail is the message
transmitted electronically over the Internet, from one user to
another. A fax machine is a device that transmits and receives typed
or hand written documents over telephone lines.
Skype supports voice and video calls, text, instant messaging and
sharing conversation with (someone) over the Internet using the
software application Skype, frequently also viewing by webcam.
Newsgroups are organized group of Internet users who wish to
share ideas and interests through discussion forums and debates.
Instant messaging: This is a more enhanced messaging service that
allows two or more people to chat directly in real time.
Social networking e.g. Facebook and Twitter create digital societies
through linking people of common interests.
Positive Implications
Negative Implications
COMPUTER NETWORKS
Networking Hardware
Communication Media:
These are programs and applications that aid the setup and use of a network.
It includes network operating.
Network Protocols
Types of Networks
Computer networks fall into different types usually according to their span or
area of coverage.
It is a network that connects two or more LANs but limited to a specific and
small geographical area such as a college campus, industrial complex, a
military base. It spans multiple LANs but smaller than a MAN.
NETWORK TOPOLOGIES
Network Topology
A network topology refers to the physical arrangement of local Area Network
devices (nodes) in a communication network.
Bus Topology
It consists of a single central cable that connects all computers and other
devices together called a backbone or Bus
If the bus itself fails, the entire network will not work.
If more data flows, the network slows down.
Its Limited in size and speed
Its less secure since all data is transmitted by only one main cable
The transmission slows down as more workstation are added
Ring Network
Star Network:
All computers and devices connect to a central Hub / switch. Data transmitted
passes through the hub
Tree topology
A tree topology combines characteristics of bus and star topologies;
Hierarchical topology
It is like the extended star topology, except computer controls traffic instead of
a hub or switch
Mesh topology
This is a network where each device has its own connections to all other
devices on the network.
It provides each device with a point- to- point connection to every other device
in the network.
-If there are other possible routes through the network, the damage of one or
several cables or computers may not have vital impact except the involved
computers -
Mesh networks provide redundancy, in the event of a link failure, meshed
networks enables data to be routed through any other site connected to the
network.
It’s the most expensive and difficult to maintain because each device has a
point-to-point connection to every other device. The damage of at least one
cable or device may damage the network seriously if there are only few cables
in the network.
Hybrid Networks:
Money.
Length of cable needed.
Future growth.
Cable types
Flexible Access: School networks allow students to access their files from
computers throughout the school. Students can also work cooperatively
through the network.
Extranet is a computer network that allows controlled access from the outside
for specific business or educational purposes. Extranets are extensions to, or
segments of, private intranet networks that have been built in many
corporations for information sharing.
Advantages of extranet
Disadvantages of extranet
13
ELCTRONIC PUBLICATION
Desktop Publishing
Electronic Publishing refers to the use of digital resources and equipment to
create and disseminate information by electronic means.
This refers to application software that is used in the production and designing
publications with advanced features and graphics by use of the computers
Page layout: The ability to define the layout of a page using frames to place
text and pictures.
Font and styles: A wide range of fonts and styles.
Drawing facilities: Some drawing facilities, although they may be limited.
Importing pictures and text: The ability to incorporate pictures and text
from other packages into a document.
Clip art: A library of pictures for you to include in your document.
Accurate positioning: The ability to position objects extremely accurately
on the page using guidelines or a grid.
Frame-This contains a variety of objects such as graphics, tables, text
boxes which can be resized, moved and manipulated to suite the user
needs.
Handles-They enable you resize your frame by clicking and dragging
around them.
Template-These are pre-defined and pre-chosen design styles and formats
that you can use.