Module 2 - Application of ICT
Module 2 - Application of ICT
BACHELOR OF SCIENCE
FINANCE AND ACCOUNTING
MODULE 2
1
© Copyright
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, electronic or mechanical, including photocopying,
recording or otherwise without the permission of the publisher.
2
ACKNOWLEDGEMENTS
The University of Zambia (UNZA), Institute of Distance Education (IDE) wishes to thank
Mr. John Mulenga Chita for writing this module 2, APPLICATION OF INFORMATION AND
COMMUNICATION TECHNOLOGIES (ICT)
3
Module Introduction
The aim of this module is to enhance participants’ understanding of the application of Information
Communication Technologies in business organizations.
Objectives
As you can see from the table of content below, the module is divided into Twelve (12) units.
Each unit is in turn divided into several sub-units. Each unit has a core text and an exercise at the
end. You are required to read the text and thereafter attempt the exercise before proceeding to the
next unit.
4
METHOD OF TEACHING
Four contact hours per week: 3 lectures, 1 seminar e-Learning
ASSESSMENT
Continuous Assessment 50%
One Assignment 10%
One Test 20%
One Laboratory (Practical) 10%
Prescribed Readings
1. Stair, R.M. & Baldauf, K.J. 2007, Succeeding with Technology: Computer System Concepts
for Real Life, 2nd edition, Thomson Course Technology, United States of America.
2. Long, L. & Long, N., 2004, Computers: Information Technology in Perspective, 11th edn,
Prentice Hall, New Jersey.
Recommended Readings
1. Snyder, L., 2004 Fluency with Information Technology: Skills, Concepts and Capabilities,
Pearson/Addison Wesley, New York.
2. Pfaffenberger, B. & Daley, B., 2004 Computers in your Future 2004, Complete edn, Prentice
Hall, New Jersey.
3. Capron, H.L. & Johnson, J.A. 2004 Computers: Tools for an Information Age, 8th edn,
Prentice Hall, New Jersey.
4. Leavitt, H.J. and T.L. Whistler ‘Management in the 1980s’, Harvard Business Review
November/December 1958. This is available in the Online Library.
Time frame
You are expected to spend at least 72 hours of study time on this module. In addition, there shall
be arranged contacts with lecturers from the University from time to time during the course. You
are requested to spend your time judiciously so that you reap maximum benefit from the course.
Study Skills
As an adult learner, your approach to learning will be different to that from your school days: you
will choose what you want to study, you will have professional and/or personal motivation for
5
doing so and you will most likely be fitting your study activities around other professional or
domestic responsibilities.
Essentially you will be taking control of your learning environment. As a consequence, you will
need to consider performance issues related to time management, goal setting, stress management,
etc. Perhaps you will also need to reacquaint yourself in areas such as essay planning, coping with
examinations and using the internet as a learning resource.
Your most significant considerations will be time and space i.e. the time you dedicate to your
learning and the environment in which you engage in that learning.
I recommend that you take time now—before starting your self-study—to familiarize yourself
with these issues. There are a number of excellent resources on the web. A few suggested links
are:
http://www.how-to-study.com/
The “How to study” web site is dedicated to study skills resources. You will find links to
study preparation (a list of nine essentials for a good study place), taking notes, strategies
for reading text books, using reference sources, test anxiety.
http://www.ucc.vt.edu/stdysk/stdyhlp.html
This is the web site of the Virginia Tech, Division of Student Affairs. You will find links
to time scheduling (including a “where does time go?” link), a study skill checklist, basic
concentration techniques, control of the study environment, note taking, how to read
essays for analysis, memory skills (“remembering”).
Need help?
In case you have difficulties during the duration of the course, please get in touch with the
Director, Institute of Distance Education, or the resident lecturer in your province.
Your lecturer can be contacted for routine enquiries at: Institute of Distance Education,
University of Zambia, Great East Road Campus, PO Box 32379, Lusaka, Zambia, during
working days (Monday-Friday) from 08:00 to 17:00 hours on Telephone: +260211290719; Fax:
+260211253952; E-mail: [email protected]; Website: www.unza.zm. You can also see your
lecturer at the office during working hours and days as stated above. You could also utilize the
services of the phone as well as the email address. For other details, you may visit the website as
stated above.
6
You are free to utilize the services of the University library which opens from 0700 hours to 2400
hours every working day. As for weekends and public holidays, the library opens from 0900 hours
to1800 hours. It will be important for you to carry your student identity card for you to access the
library and let alone borrow books.
CONTENT
TITLE PAGE
UNIT 01
7
USAGE OF ICT& ENVIRONMENT FOR COMPUTERS ....................................................... 63
6.1 Computers at work ................................................................................................................................ 63
6.2 Usage of ICT in different sectors ........................................................................................................... 64
6.2.1 Potential Sectors with ICT usage ................................................................................................................ 64
6.2.2 ICT in Education.......................................................................................................................................... 64
6.2.3 ICT in Business/Trade and Commerce........................................................................................................ 65
6.2.4 ICT in Banking ............................................................................................................................................. 66
6.2.5 ICT in Medicine ........................................................................................................................................... 67
6.3 Health, Safety, and Environment for computers ................................................................................... 68
6.3.1 Work environment ..................................................................................................................................... 68
6.3.2 Computer related health problems ........................................................................................................... 69
6.3.3 Proper use of mouse, monitor, and key board .......................................................................................... 71
6.3.4 Reference postures .................................................................................................................................... 72
6.4 Protecting environment ......................................................................................................................... 73
6.4.1 Go paperless ............................................................................................................................................... 73
6.4.2 No Screen Saver ......................................................................................................................................... 73
6.4.3 Turn It Off ................................................................................................................................................... 73
6.4.4 Use a Flash Drive ........................................................................................................................................ 74
6.4.5 Fix Your Old Computer ............................................................................................................................... 74
6.5 Self Assessment Questions ..................................................................................................................... 74
UNIT 07
UNIT 8
UNIT 9
UNIT 10
UNIT11
UNIT 12
UNIT 13
UNIT 14
UNIT 15
UNIT 16
12
16.1.1 Snail mail Vs. E-mail ............................................................................................................................ 209
16.1.2 How e-mail works in brief ................................................................................................................... 209
16.2 More about E-mailing concepts ......................................................................................................... 210
16.2.1 E-mail clients ....................................................................................................................................... 210
16.2.2 The SMTP Server ................................................................................................................................. 211
16.2.3 The POP3 Server ................................................................................................................................. 211
16.2.4 The IMAP Server ................................................................................................................................. 212
16.3 Different e-mailing methods ..............................................................................................................213
16.4 Need of Email etiquettes ..................................................................................................................... 214
16.5 Using emails ......................................................................................................................................... 214
16.5.1 Email address ...................................................................................................................................... 214
16.5.2 Creating a free e-mail account ........................................................................................................... 215
16.5.3 Receiving e-mail .................................................................................................................................. 217
16.5.4 Sending e-mail ..................................................................................................................................... 218
16.5.5 Sending/receiving attachments ......................................................................................................... 219
16.5.6 Set up an Address Book Group for List Mailing in Yahoo .................................................................. 220
16.6 Security and risk in Internet .............................................................................................................. 221
16.6.1 Security settings in web browsers/e-mail client software ................................................................ 221
16.6.2 Taking precautions when using the Internet ..................................................................................... 222
16.7 Self Assessment Questions .................................................................................................................. 223
UNIT 17
13
14
UNIT 01
Introduction:
This UNIT outlines the uses of computers in the day to day life and comprehensively model the
environmental effects as well as the physical impacts.
You might have not seen a place of work without a single computer in use. The computer has
become such essential equipment for almost all places of work no matter if it is a small scale or
large scale company. Computer literacy in varying extents has become an essential item under
the qualifications required for most of the job vacancies. However, the utilization of computers
may vary from place to place depending on the nature of the business they perform.
When we consider the both private and government sector places of work in Zambia, following
can be considered as the typical uses of computers.
• Managing data – keep track of data about customers, products, demographics and other
information important to the business, uses secured mechanisms for storages.
• Maintain financial status – Keep track of the financial status of the company on an
annually, monthly or even day-to-day basis. Spreadsheet software is commonly used to
track expenditures, sales, and profit and losses. Accounting software provides a business
with even more assistance with financial matters, as it is used to do payroll, invoice
customers, prepare taxes and execute other essential functions. Companies can use their
computers to print checks for payroll and expenditures, and can form a direct link to the
company's bank account.
• Communication–Uses e-mails, publishes information on web, keeps in touch with stake
holders via social networks, conference meetings avoids the need of physical availability
of participants of the meetings,
• Networking- shares resources, common database of files accessible for authorized
members
• Research work – Investigate new products, improve the quality of the existing products
through effective research
• Audio and Video business presentation
15
• Process simulations- The processes allows you to see effect of changes, without having to
actually make those changes to your processes, can use to maximize the overall
confidence with the proposed changes without implementing
• Increase productivity through Industry specific software
Though the typical usage of computers at work has been summarized as above, there will be
many more answers to the question „What are the uses and advantages of computers in your
office? ‟ depending on the nature of work handled within the company/office of the person. So it
is not a marvelous fact that most of the organizations move towards automating the tasks with
the help of modern computers.
We looked at the usage of computers in a typical office in the previous section. It was quite
difficult to list of uses as it is vast. However, it can be clearly identify the sectors where ICT is
now used in the Zambia and in the world, in general as listed below.
• Education
• Heals care/medicine
• Agriculture
• Banking
• Business/trade and commerce
• Transport
• Manufacturing
• Travel and Tourism
• Environment
• Gender
• Culture
Following sections will give a brief to some of the above sectors with respect to usage of ICT.
Accordingly, as a student who follows this Module, you are dealt with the above first category;
ICT as a subject. However, you will be able to get more familiar to use the computer for your
studies not only this Module but also the other courses you follow at OUSL by using your
computer as a tool to support your studies. This category is often referred to as e-learning. We
will be discussing deeply about e-learning in UNIT 25 in this course material. However, the
16
following description is given as it is worth to get a brief idea on what e-learning is before
proceeding to the next sections.
E-Learning
The advantages of e-learning with respect to both teaching and the learning parties can be
considered as;
• Cost effective
• Saves time without sacrificing quality
• Minimizes travel cost
• Can be accessed from anywhere any time in the world
• Consistent course delivery
• Individual instruction
Online shopping and electronic payments can be considered as the most famous examples of
ecommerce. In online shopping, the seller creates their sales outlet in the web while the buyer
brows and purchase products with mouse clicks. For an example, Amazon.com (See figure 1.1
below) is a famous online shopping destination where you will see the sale details of thousands
of goods and services.
17
Figure 1.1: Interface of the Amazon shopping place (www.amazon.com)
Suppose that you need to buy a mobile phone online from amazon.com, there should be a
mechanism to make your payment online to the supplier. This mechanism is known as electronic
payments. Paying through your credit card is an example for an electronic payment. This type of
e-payments very effective and you do not need worry about the safety as the reliable shopping
destinations such as Amazon.com have taken sufficient safety measures.
18
Figure 6.2: Online banking with Commercial Figure 6.3: Online Banking with Bank of
Bank PLC Ceylon
Having read the previous units of this Module you might now have the feeling „what a vast
range of uses we get from out computers today‟. Computer, being such common equipment used
by people no matter a kid or an adult; did you ever think whether you are working in a good
19
computer based environment? Did you ever think that there are specific guide lines to use your
computer with respect to its physical environment? How many hours do you spend a day in front
of the computer? You might not thought of these types of questions before.
Following sections discuss about the computer based good working environment and the facts
that you need to keep in mind and obey as a computer user.
Working space
You must have enough space to perform your tasks safely and comfortably. The amount of
working space depends on the user, nature of work you do, and the devices and the furniture you
need to use. Everything should not be crowded. Sometimes, you get stressed or less productive
when the space is too compact. Therefore, you need to make sure that your work space gives you
a good comfortable posture and that you have easy access to and from the location of your
computer.
Location
It is important to think about the visual environment when locating your computer with other
peripherals. Here, the arrangement of lighting, the type of light fittings used, and the location of
the window are important to consider.
• The office layout should be planned around the position of light fixtures to prevent walls
or partitions blocking or creating shadows over the work area.
• If the user is sitting near photocopiers and printers they may be distracted by noise and
the heat generated by the other machines and also may get disturbed by the people who
are coming often to operate those other machines.
• Make sure that you have an easy access to hardware and power points. Well positioned
power points can prevent use of multi-plug boards and extra cable lying.
Lighting
You may use artificial to provide lighting, but it is better to go for a combination of natural and
artificial light. Some instances like using LCDs or if the user is an older person, then you may
require high level of lighting. Your lighting should be:
• Adjustable in direction and intensity level
• Does not produce excessive contrasts in different regions of your working area
20
• Does not result in glare or screen reflections at nearby users. Glare may cause visual
discomfort and may cause headaches as well as reduces the performance of the user.
Decor
Too much of dark colors can create contrasts in brightness so that additional lighting is needed.
As a general rule the ceiling should be brighter than walls and walls brighter than the floor.
Atmospheric conditions
It is a known fact that people react strongly when they think the air is stuffy, stale or polluted and
may express this as general dissatisfaction with the environment. So your working area should be
well ventilated and have a comfortable temperature. You may use air conditioners to satisfy this
condition.
Noise
Noise in your working area (may be generated from equipment, ringing phones, air
conditioners/fans, people work close by) can make communicating and concentrating difficult,
and may be leading to stresses. Generally, the more complex a task, the lower a user’s tolerance
for noise is. So it is required assure that your work area is minimized with noise.
Housekeeping
Good housekeeping is promoting maintenance of good health and safety in your work place. So
the floors should be tidy and cleaned, environment should be dust free, and it is required to make
sure that the power cables do not present tripping hazards.
If you are physically affected or about to affect you may get one or more symptoms as listed
below.
• Pain
• Fatigue
• Muscle discomfort
• Stiffness
• Burning sensations
• Weakness
21
• Numbness
• Tingling
You may get these symptoms in different extents, and sometimes may get worsen gradually.
However, it is important to take corrective actions as soon as symptoms present. The small
changes you can make avoid bigger discomforts.
Following are two specifically identified health issues which come under the category described
above.
Carpal Tunnel Syndrome:
The Carpal Tunnel is an area on the palm side of the wrist bordered on one side by the carpal
bones and on the other by the Carpal Ligament, a fibrous band. This structure is quite rigid. If the
space in between the structure gets shrink, the structures within the tunnel gets an increasing
pressure. Repetitive movement at the wrist, as occurs with prolonged use of a computer
keyboard can lead to inflammation in the carpal tunnel and the resultant painful syndrome.
Patients usually feel pain in the forearm area as well as numbness in the affected hand in the
thumb, index, long and radial half of the ring finger. This numbness often occurs at night. The
treatments vary from wearing wrist splints, anti-inflammatory medications, or surgeries.
Visual discomforts
The symptoms such as sore eyes, red eyes, watery eyes, dry eyes, blurring of vision and
headaches may say that you are about to a vision problem due to computer work. So it is
required to take following precautions to avoid such health issues.
Fatigue
You may feel either physically, mentally, or emotionally fatigue due to bad computer use.
Common approaches for preventing fatigue and discomfort when using computers include
pauses, regular breaks, stretching and task variety, knowing deadlines and negotiate to get
achievable deadlines, break large tasks into small parts, have plans to achieve deadlines and
targets, etc.
• Place the mouse in an easy reach zone so that the shoulders and upper arms can be
relaxed and close to the body while operating the mouse.
• Keep the wrist and hand in a neutral position, never bent. Keep arm and hand in line
(See Figure 1.5 below)
• Use as little force as possible when clicking or dragging.
• Use alternative devices on the market such as graphic tablets and pens, touchpad, touch
screens, and foots witch-operated mice.
• Use mouse wrist supports to elevate the hand and wrist if feel better when using.
23
Figure 1.5: Keep arm and hand in line Monitor
• Position the monitor so that you do not have to bend the neck up or down or twist the
neck sideways to view the screen.
• The top of the display screen should be at or slightly below eye level and at about 18" to
24" away from the face.
• The angle of the screen should be easily visible.
• Dark letters on a light background should be used to reduce eyestrain.
• Adjust brightness and contrast.
• Choose a monitor with good resolution for clarity of characters on the screen. The screen
refresh rate should be at least 60 Hertz to eliminate screen flicker.
• The screen should be cleaned of dust frequently to ensure the image is sharp. Keyboard
• Place your keyboard at approximately elbow height with the surface at a comfortable
angle.
• The hands and wrists should be held in a neutral position when typing: the wrists should
be straight and not be bent upward, downward or sideways. This position places the least
pressure on the tendons and nerves passing through the carpal tunnel.
• The shoulders should be relaxed, the upper arms should hang comfortably down along
the sides of the body and the elbows should not be cocked out away from the body.
• Wrist rests can be used to cushion and support wrists in breaks between typing based on
the recommendations of your doctor. However, they should not be used to support wrists
or hands while typing as this usually puts a bend in the wrist.
Following Figure 1.6 shows a range of acceptable postures that computer users may adopt as
starting positions to move in and around, but note that there is no uniquely correct posture that
would suit any user for an extended period of time.
24
Reward Tilt Sitting upright Forward Tilt Standing
Sometimes, we may not think that usage of computers may be harmful to the environment. But if
you use the computer smarter, intelligently, and in moderation you can prevent those harmful
effects from your computer. Some of such good practices are described below:
1.4.1 Go paperless
Printing every document sent to you not only uses up paper, but also ink and energy. Instead of
printing documents and filing them, try saving receipts and e-mails to your hard drive using a
PDF printer. This not only helps the environment, but can often be a lot easier to keep track of
than paper documents. Linux- and Mac-based systems come with this option by default;
Windows users can install a free program called PDF Creator.
1.4.2 No Screen Saver
Screen savers are mostly an outdated concept and few modern monitors will "burn" anymore. If
your computer is set to use a screen saver, it is using electricity unnecessarily. Consider instead
setting your computer monitor to turn off after a set period of time. This easily can be done in the
same window where you configure your screen saver.
25
Think it is time to buy a new computer? Think again. Many computers, especially with Microsoft
Windows, get slower as time goes on, but that has more to do with software than hardware.
Simply reinstalling the operating system can give what seems like an old, slow computer a new
lease on life. Still not fast enough? Installing more RAM is cheap, impacts the environment less
and might be all you need. Try this before buying a new computer, which unnecessarily uses up
resources and energy, not to mention your money.
26
UNIT 02
Introduction:
This UNIT gives an idea of legal regulation that covers the information security.
• Identify the types of computer threats that you may meet with the software and hardware of
your computers
• Take safety precautions to minimize threats to your computer
• Identify and solve privacy issues
• Understand what copyright is
• Avoid using computers illegally
• Understand the other legal regulations related to computers
Information security is the practice of defending information from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction.
Wikipedia
In the other words, Computer Security is the protection of computing systems and the data they
store or access. Here, it is required to assure that your information are protected in terms of
Confidentiality, Integrity, and Availability as illustrated in the Figure 2.1 below.
27
network. In the other hand it can be a case for the other computers which are available in its
network.
The functionality of virus differs from one to another. Some will increase size of certain files
when infected. Some other viruses especially worms create files inside Windows or other folders
hiding their identity by naming them in irrelevant characters or with a name that is closer to a
required system file with hidden attributes. (e.g. lsass.exe is a valid system file whereas isass.exe
is virus file). Some viruses employ polymorphic and an anti-stealth technology which prevents
them from identified and erased by virus catching programs called antivirus programs.
29
Other harmful programs
When people browse internet there are many web pages that displays a bogus question to user
saying that your computer is infected with some harmful program and do you wish to clean it
using their advertised program?. People are tempted to click on yes then the harmful program is
installed in the computer with user’s permission. Then it will always nag the user to buy the
program or slows down the computer, prevent from browsing some other sites especially
antivirus (virus cleaning program) vendor’s sites. These programs are called malware.
30
If you see that files are automatically created with unknown rubbish names it is a sign of virus
activity. If you cannot double click and access drives in My Computer it is also can be an activity
of a virus.
Though you manage and protect your data with proper use of software, your data may get lost or
damaged due to hardware problems. Really, Hardware is a common cause of data problems.
While you work, all of a sudden the power can fail, you can mistype, a repair technician can
accidently damages the data, or a magnets used closer to the PC without your knowledge can
damage disks. Likewise, hardware errors are of varying types and most of them are
unpredictable. But, some of them have solutions; unfortunately some do not. So, it is worth to
have a fair knowledge about the hardware threats to your PC and the solutions if any.
The following sections discuss the examples for possible hardware threats along with solutions,
if any.
Brownout: Lower voltages at electrical outlets. Usually they are caused by an extraordinary
drain on the power system. Frequently you will see a brownout during a heat wave when more
people than normal have air conditioners on full. Sometimes these power shortages will be
“rolling” across the area giving everyone a temporary brownout. Maybe you’ll get yours just as
that important file is being written to disk.
Voltage Spikes: Temporary voltage increases are fairly common. Large motors or circuit
breakers in industry can put them on the electrical line. Sudden losses (ex; a driver hits a power
pole) can causes spikes as the circuits balance. An appliance in your home can cause a spike,
particularly with older wiring. Lightning can put large spikes on power lines. And, the list goes
on. In addition to current backups and integrity information for your software and data files,
including a hardware voltage spike protection device between the wall and your computer
hardware (don’t forget the printer and monitor) can be very helpful.
Frequency Shifts: While infrequent, if the line frequency varies from the normal 60 Hertz (or 50
Hertz in some countries), the power supply on the computer can be affected and this, in turn, can
reflect back into the computer causing data loss.
Solution: Consider using a Combined Surge Protector (CSP) and Uninterruptible Power Supply
(UPS). See Figure 2.2 and 2.3 below for a CSP and UPS used for PCs respectively.
31
Figure 2.2: Combined Surge Figure 2.3: Uninterruptable Power
Protector for a PC Supply for a PC
2.2.2 Age
It is not an amazing thing that as computers age they tend to fails more often. Electronic
components are stressed over time as they heat up and cool down. Mechanical components
simply wear out. Some of these failures will be dramatic; something will just stop working.
Some, however, can be slow and not obvious. Unfortunately, it’s not a question of “if”, but
“when” in regard to equipment failure.
Solution: Keep an eye on the specials after three to five years.
2.2.3 Incompatibilities
You can have hardware problems on a perfectly healthy PC if you have devices installed that do
not properly share interrupts. Sometimes problems are immediately obvious, other times they are
subtle and depend upon certain events to happen at just the wrong time, and then suddenly
strange things happen.
Solution: Make a really good backup before installing anything (hardware or software) so you
can revert the system back to a stable state which should something crop up.
Someone may accidentally or purposely delete or change a file on your PC when you’re not
around. If you don’t keep your PC locked in a safe, then this is a risk. Sometimes, you may not
detect that something has happened to your data while you are not around. Most of this type of
32
damage is done unintentionally by someone you probably know. This person didn’t mean to
cause trouble; they simply didn’t know what they were doing when they used your PC. That may
be a person who is new to use computers.
Solution: Never run the computer as an administrative user and have guest accounts available for
others who use the computer. Keep up-to-date backups as well.
One possible source for computer infections is the Customer Engineer (CE), or repairman. When
a CE comes for a service call, they will almost always run a diagnostic program from CD. It’s
very easy for these CDs to become infected and spread the infection to your computer. Sales
representatives showing demonstrations via CDs are also possibly spreading viruses. Always
check your system after other people have placed their data carriers such as CDs, Portable Hard
disks, and USB pen drives into it. (Better yet, if you can, check their disk with up-to-date
antivirus software before anything is run.)
Solution: Insist on testing their CD/Pen drive/portable hard disk before use or make certain
they’ve used an up-to-date anti-virus before coming to your location.
Computer data is generally stored as a series of magnetic changes on disks. While hard disks are
generally safe from most magnetic threats because they are encased within the computer
compartment, the older technology: floppy disks are highly vulnerable to magnets. You may be
happy that Floppy disks are not now in use with your PC.
The obvious threat would be to post a floppy disk to the refrigerator with a magnet. Some of the
more subtle sources of magnetism include:
Computer Monitor: Don’t put floppy disks anywhere near the monitor; it generates a magnetic
field. (Generally applies to the older CRT displays.)
Telephone: When ringing, telephones (particularly older phones with a bell) generate a magnetic
field.
Solution: Stay away from magnets or sources of static of all kinds when working with a
computer.
Note: There are tools to assist in recovery from disk problems, but how do you know all the data
is OK? These tools do not always recover good copies of the original files. Active action
on your part before disaster strikes is your best defense. It’s best to have a good, current
backup and, for better protection, a complete up-to-date integrity-check map of everything
on your disk.
Sometimes, you may think that you are unidentified an unexposed to other users when you
browse web sites. But there may be a possibility of leaving information about you left behind.
However, you can reduce the amount of such information that reveals about you to other users
33
by following some privacy policies. Next sections will discuss how to protect your privacy when
using Web.
IP address of your computer: the Internet Protocol address assigned to each computer on the
internet. It may be a static one which remains unchanged or it may be dynamic which changes
time to time as you access internet.
Domain name: the domain (division of internet) to which your user account associated with.
Details of pages visit: what pages and for how long you stay on a particular page, and the fact
whether you used a search engine to access that page can be identified
Other information: some non-critical information such as the web browsing pattern and some
critical information such as passwords saved in temporary memory also can be detected if the
web site uses cookies.
You can follow the actions mentioned below in order to reduce the amount of information that
can be collect about you.
Pay special attention when supply personal data: If you don’t trust any site, don’t give your
personal data such as your credit card details, account details, passwords, etc.
Limiting cookies: the cookies can provide the store data about you to the attackers who access
your computer. You cannot limit it. But you can limit the use of cookies. Check and delete
cookies: All popular browsers let users view and delete cookies installed on their computer.
Methods vary by browser. For instance on Internet Explorer 8, go to the "Tools" menu, pull
down to "Internet Options" and under the "General" tab there are options for deleting some or all
cookies. There might be hundreds, so deleting all might be easiest. But the next time you visit a
favorite site, you may need to retype passwords or other login data previously stored
automatically by one of those cookies.
Adjust Browser Settings: Once you've deleted cookies, you can limit the installation of new
ones. Major browsers let you accept some cookies and block others. To maintain logins and
settings for sites you visit regularly, but limit tracking, block "third-party" cookies. Safari
automatically does this; other browsers must be set manually.
Browse safely: If you see that the site you access is suspicious, then immediately leave the site.
Keep your virus definitions updated. Scan your computer for spyware.
34
Privacy Policy: You are advised to look for the privacy policy statement given in the sites before
you submit your information such as e-mail address, name, phone number, etc. Usually, the
privacy policy must state how the information they request are used and whether they are going
to distribute those data to other organizations, etc.
Encrypt the information provide: Many sites use SSL (Secure Socket Layer) certificate to
encrypt the information you provide to that site so that other attacker or an organization cannot
access your information collected by the site. If the „https:‟ is available in place of „http:‟ in the
URL of the site you visit together with the „lock‟ icon as shown below, that indicates that your
information will be encrypted at the time of providing them.
Work only with trusted companies: When you do business with some sites, you are required to
assure that you trust them. You may answer yourself to the facts such as whether the company is
a reputed, well established one, is it providing assurance on privacy of information provided, is
there legitimate contact information provided that enables you decide that the company is a
trusted one.
Avoid using primary e-mail address: When performing online submissions, use an additional
e-mail address in place of your primary e-mail address to avoid accumulation of spam or
unwanted messages.
Avoid using Debit Cards for online purchasing: Your Credit card usually give the protection to
some extents. However, the Debit cards do not give such protection and they deduct charges
immediately from your account. So, if an attacker obtains your debit card details, they will
completely use your money in the account even without giving you a time to realize it.
Use Options in providing information: You might have found that some options are there with
certain web sites to make your work easy without concerning your security. Prompting an option
to remember your password is an example for such instances and such options may make your
data readily available for the attackers. We can take the privacy settings given to your account in
social networks such as Face book as another example. You can restrict the other parties
accessing your data by setting the privacy options to reduce the risk of attackers.
As a person who uses the computer and the internet, it is worth to get a considerable knowledge
in the legal aspects related to the computer using to be aware and prevent any illegal actions. The
following UNITs will brief you about the premier organizations/projects developed in Zambia on
this regard, the copyright law, and the data protection laws in the context of Zambian law.
2. Monitor the performance of the sector including levels of investment and availability, quality,
costs and standards of electronic communication services
3. Administer the Country Code Top Level Domain (ccTLD) as well as electronic addresses
4. Disseminate information and promote the participation by the public in the provision of
electronic communication services
7. Promote competition in the sector and also regulate tariffs charged by operators offering
electronic communication services
8. Protect the rights and interests of consumers, service providers, suppliers and manufactures.
In addition to the ICT ACT, the Authority was in 2009, assigned to manage and administer two (2)
other pieces of legislation: Postal Services Act No. 22 of 2009 and Electronic and Communications
Transactions (ECT) Act No. 21 of 2009 The Postal Services Act expanded the Authority’s mandate to
cater for the regulation of Postal and Courier services.
The Electronic and Communications Transactions Act on the other hand provides for: The
development of a safe, secure and effective environment for the consumer, business sector and the
government to conduct and use electronic communication; Promotion of legal certainty and
confidence, as well as encouraging of investment and innovation, in the electronic communications
industry, and Facilitation of the creation of secure communication system and networks
As a regulator of ICTs, the Authority’s overall mandate is the maintenance of a delicate balance of the
interests of all stakeholders in the sector.
36
copyright if you download music, including an image on your website, pirating software owned
by another person. So it is required to get know that you have the permission to do so.
37
2.3 What is a computer virus?
2.4 Give two types of computer viruses with two examples for each type.
2.5 What is meant by malware?
2.6 Briefly explain the ways to find out that a computer virus or malware program is present in
your computer.
2.7 Discuss the examples for possible hardware threats to your computer along with solutions.
2.8 What are the functions and duties of following ICT policy formulation bodies in Zambia?
a. ZICTA b. MINISTRY OF COMMUNICATIONS AND TRANSPORT
UNIT 3
Introduction to Windows 7
Aims:
38
This UNIT introduces the learner to the Windows 7 operating system and get the learner familiar
to operate the computer through the Operating system Windows 7.
Windows 7 is a latest public release version of Microsoft Windows. Windows 7 was released to
manufacturing on July 2009. Windows Server 2008 R2 was released at the same time. It is
redesigned with Windows Shell with a new taskbar. Windows 7 includes a number of new
features, such as advances in touch and handwriting recognition, support for virtual hard disks,
improved performance on multi-core processors, improved boot performance, Direct Access, and
kernel improvements.
1. Starter is the smallest version of the windows 7. Actually it is less waiting, less clicking,
less hassle connecting to networks. Windows 7 Starter combines the latest in reliability and
responsiveness with the familiarity and compatibility of Windows.
2. Home Premium makes it easy to create a home network and share all of your favorite
photos, videos, and music. And you can watch shows for free when and where you want with
Internet TV on Windows Media Center.
3. Professional is a great choice for home and for business. Using Windows 7 professional, You
can run many Windows XP productivity programs in Windows XP Mode and recover data
easily with automatic backups to your home or business network. You can also connect to
company networks effortlessly and more securely with Domain Join. With all the exciting
entertainment features of Windows Home Premium.
4. Ultimate is the most versatile and powerful edition of Windows 7. It combines remarkable
ease-of-use with the entertainment features of Home Premium and the business capabilities
of Professional, including the ability to run many Windows XP productivity programs in
Windows XP Mode. For added security, you can encrypt your data with BitLocker and
BitLocker-To-Go. And for extra flexibility, you can work in any of 35 languages. Get it all
with Windows 7 Ultimate.
39
A Processor of 1 GHz or faster 32-bit A Processor of 1 GHz or faster 64-bit
(x86) (x64)
At least 1 GB of RAM memory A At least 2 GB of RAM memory
hard disk with at least 16GB space A hard disk with at least 20GB space
available available.
DirectX® 9 graphics processor with DirectX® 9 graphics processor with
WDDM or higher driver WDDM or higher driver
A DVD drive from which to install A DVD drive from which to install
Windows. Windows.
A monitor, keyboard, and mouse or A monitor, keyboard, and mouse or
other pointing device. other pointing device.
Table 3.1: Windows 7 Requirements
The Windows 7 Setup Wizard guides you step-by-step through the process of installing Windows
7. When the installation is finished, you are ready to log on to Windows 7. Be aware that your
computer restarts several times during the installation process. Depending on the type of
installation you need to perform, either upgrade or clean, you will have to start the Windows 7
Setup Wizard in different ways. If you need an upgrade or clean install on a Windows version,
you simply start your computer and insert the Windows 7 installation DVD to start the Windows
7 setup Wizard. However, if you perform a clean install on a non-supported operating system or
a blank hard disk, you need to start your computer by inserting the Windows 7 installation DVD
into the DVD drive, which starts the Windows 7 setup Wizard. A clean install requires you to
select additional options as you step through the wizard, but the steps are basically the same.
Steps to follow:
1. Insert the Windows 7 DVD into your DVD drive, and then start your computer.
2. Select the language and click Next
3. Click Install now
4. Click “I accept the license terms” and click Next
5. Click the custom installation methods
6. Select the disk partition you want to install Windows 7 and click Next (New setup is
installing windows 7 into your system)
7. Please wait for finish
8. Enter user name and a computer name and click Next
9. Type a password and click Next
10. Enter the product key and click Next
11. Click „Ask me later‟ and click next
12. Set the system date and time and click Next
13. Select the computer location as a Home network and Click Next
14. After installing windows 7, you can logon it.
Let us have a look at the basic operations available with Windows 7. This knowledge will be
helpful to you to make working with your computer easy.
First, we will learn about some required fundamental skills before performing basic operations
available with your operating systems.
40
Keyboard Operations
Enter: There is an Enter key in your keyboard. The command „Enter‟ means you to press the
Enter key.
Escape: Press the Esc key in your keyboard
Move: To move left to right or up to down use the arrow keys
Control key: There is button labeled „Ctrl‟ you can press any keys with this ctrl key. Example
Ctrl + C means press ctrl key and C button in the same time or (First press Ctrl
then C but not reverse order)
Mouse operations
Click: The click operation means you can move the cursor in to a particular place and press left
button in your mouse
Double Click: Click the mouse left button twice quickly/consecutively
Right click: Click the right mouse button
Drag: Move the courser with the left button
Drop: After dragging from one place to another palace you can release the left button.
After a successful login, your desktop will be loaded. Figure 3.2 shows the screen layout of the
first user interface of the Windows 7. The Windows 7 system mainly contains three components
namely the desktop, start button, task bar & the system tray.
Let us have a look at the components of the Windows 7 Interface by means of the Figure 3.2
below.
41
6
1 8
2 5 3 4
42
Figure 3.3: Start menu
Windows 7 has a new way to access additional folders on the start menu. Instead of program
menus displaying to the right side of the Start menu, each subsequent menu you select, such as
the Accessories menu, displays on top of the previous folder.
Clock-A decent clock with one major advantage over virtually every
downloadable clock gadget I've tried: You can set it to the time in any time
zone, not just the system time. Clock is configurable with 8 clock faces, some
of which are quite attractive.
44
CPU Meter-This gadget features two simple analog-style dials measuring the
current CPU utilization and memory usage, respectively. Note that CPU Meter
is overly simple and can't differentiate between multiple CPUs or CPU cores.
Feed Headlines-This gadget is an RSS feed aggregator that links into the RSS
feeds you've subscribed to through Internet Explorer 7. It rotates through the
currently-unread feeds. If you click a headline, a pop-out window displays the
entire feed. Click the feed headline in the pop-out window, and the entire post
or article will be displayed in your default Web browser.
Picture Puzzle- A simple tile-based sliding puzzle game with 11 different images and timer.
Weather- A very handy and attractive weather gadget that can be configured for
any location worldwide.
To end a computing UNIT, on the start menu, click the Shutdown Options button to display a list
of ways you can pause or end your computing UNIT. Windows 7 provides six options to end
UNITs such as Switch user, logoff, lock, restart, sleep and shutdown as shown in the Figure 3.8
below.
A program is a software which you use to accomplish a specific task, such as word processing or
managing files on your computer. Windows comes with several small programs, called
Accessories that are extremely useful for completing basic tasks, such as creating a written
document or performing basic calculations. Windows 7 also provides a number of ways for you
to resolve some common problems. For example, you can use older programs (designed to run
on previous versions of Windows) on your Windows 7 computer by changing specific settings
using the Accessories menu. You can run commands from a text-based interface (called a
command line), and Windows provides an interface for quitting a program that has stopped
responding without turning off your computer and losing information in other programs. Other
special programs in Windows 7 are games. You can play games on your computer or with other
people over the internet.
46
Figure 3.9: Accessing recently used programs using start menu
47
Windows Media Player Plays sound, music, and video
Windows Meeting Provides an online place to share files, programs, or your desktop
Space
Windows Movie Maker Creates movies using audio and video files
Windows Photo Gallery Views, edits, organizes, and shares photos and videos
WordPad Creates, edits, and displays text, Rich Text Format, and Word
documents
TT T
Table 3.3: Common Windows Applications
Older versions of the FAT file system (FAT12 and FAT16) had file name length limits, a limit on
the number of entries in the root directory of the file system and had restrictions on the
maximum size of FAT-formatted disks or partitions. Specifically, FAT12 and FAT16 had a limit
of 8 characters for the file name, and 3 characters for the extension. This is commonly referred to
as the 8.3 filename limit. VFAT, which was an extension to FAT12 and FAT16 introduced in
Windows NT 3.5 and subsequently included in Windows 95, allowed long file names (LFN).
FAT32 also addressed many of the limits in FAT12 and FAT16, but remains limited compared to
NTFS.
NTFS, introduced with the Windows NT operating system, allowed ACL-based permission
control. Hard links, multiple file streams, attribute indexing, quota tracking, compression and
mount-points for other file systems (called "junctions") are also supported, though not all these
features are well-documented.
Unlike many other operating systems, Windows uses a drive letter abstraction at the user level to
distinguish one disk or partition from another. For example, the path C:\WINDOWS represents a
directory WINDOWS on the partition represented by the letter C. The C drive is most commonly
used for the primary hard disk partition, on which Windows is usually installed and from which
it boots. This "tradition" has become so firmly ingrained that bugs came about in older versions
of Windows which made assumptions that the drive that the operating system was installed on
was C. The tradition of using "C" for the drive letter can be traced to MS-DOS, where the letters
A and B were reserved for up to two floppy disk drives. Network drives may also be mapped to
drive letters.
File
File Folder
File File
File
….
Figure 3.10: File hierarchy
Note: You can explore the file structure of your computer as follows:
1. Click on Start
2. Select All programs
3. Select Accessories 4. Select Windows Explorer
Libraries are new in Windows 7. Libraries are where you go to manage your documents, music,
pictures, and other files. It is the location of your documents but more. You can browse your files
the same way you would in a folder or you can view your files arranged by properties like date
and type. In some ways, a library is similar to a folder. For example, when you open a library,
you'll see one or more files. However, unlike a folder, a library gathers files that are stored in
several locations. This is a subtle, but important, difference. Libraries don't actually store your
items. They monitor folders that contain your items, and let you access and arrange the items in
different ways. For instance, if you have music files in folders on your hard disk and on an
external drive, you can access all of your music files at once using the Music library.
What happens if you delete a library or the items in a library?
If you delete a library, the library itself is moved to the Recycle Bin. The files and folders that
were accessible in the library are stored elsewhere and therefore aren't deleted. If you
accidentally delete one of the four default libraries (Documents, Music, Pictures, or Videos:
Please see figure 3.11 below), you can restore it to its original state in the navigation pane by
right-clicking Libraries and then clicking Restore default libraries. If you delete files or
folders from within a library, they're also deleted from their original locations. If you want to
remove an item from a library but not delete it from the location it's stored in, you should remove
49
the folder containing the item. When you remove a folder from a library, all the items in the
folder will be removed (but not deleted).
32 Bit O/S
System Root
50
Figure 3.13: Admin User profile
Ex: If there is a user named DMCS, the desktop of the DMCS‟s path can be written as follows:
C:\Users\d mcs\Desktop
System root
User’s name
Note that, Administrator is the person who can manage your computer. If you are an
administrator then you can see the other users‟ profiles. Managing user accounts in windows 7 is
described in the next section.
Example: To see the user Saman’s desktop, click Saman folder in the Users folder and then click
the Desktop.
If you wish to format your C drive and re-install the operating system please backup your user
profile. After installing the operating system please create user by same name and copy your
profile in to document and setting folder. It saves your all personal data without any change.
Generally in windows you can give up to 255 characters including spaces to your file name.
Special characters are not allowed similar to MSDOS. For example valid file names in Windows
are,
Organizing files/folders
As you learnt above, Windows 7 allows organizing your files and folders with your data in a
Drive other than the C: drive. The files/folders can be managed through the window you get
when you explore a particular location. This window will be similar to the Windows Explorer.
Following Figure 3.14 shows the basic components/areas of your file exploring window.
52
Back and Next buttons Path to the Click here to create Type here to search
to navigate within the file/folder named a new folder inside any file/folder within
folders ‘ICT Skills OUSL’ ‘ICT Skills OUSL’ ICT Skills OUSL
Tool to ‘Help’ on
organize Files/Folders
A file Sub folder Click here to change
files/folders
the options of the
file/folder view
Ex: To see with
large/small icons,
This is the ‘Detail’
Total no. of files view of file/folders
and folders
53
Figure 3.15: Creating and naming a folder
Steps to follow:
1. Click the Start button, and then click Documents.
2. Click the file you want to add or modify properties.
3. In the details pane, click the tag you want to change, and then type the new tag. If the
Details pane is not available, right-click the file, click properties, click the Details tab.
When you are done, click Apply.
4. To add more than one tag, separate each entry with a semicolon.
5. To rate a file using the rating property; click the star that represents the rating you want to
give the file.
6. Click Save.
Copying a File/Folder
54
Steps to follow:
1. Open the drive or folder containing the file or folder you want to copy.
2. Select the files or folders you want to copy.
3. Click the Organize button on the toolbar, and then click Copy
4. Display the destination folder where you want to copy the files or folder.
5. Click the Organize button on the toolbar, and then click Paste.
Moving a File/Folder
Steps to follow:
1. Open the drive or folder containing the file or folder you want to move.
2. Select the files or folders you want to move.
3. Click the Organize button on the toolbar, and then click Cut.
4. Display the destination folder where you want to move the files or folder.
5. Click the Organize button on the toolbar, and then click Paste.
Imagine that you deleted a file/folder by mistake. Don’t worry! You can get it back from the
Recycle Bin into the original location where you had it, if you have not emptied the Recycle Bin.
Steps to follow:
1. Double-click the Recycle Bin icon on the desktop.
2. Select the item or items you want to restore.
3. Click the Restore this item or Restore all items button on the toolbar.
4. The restored file(s) now will be available in the original location
You can compress files in special folders that use compressing software to decrease the size of
the files they contain. Compressed folders are useful for reducing the file size of one or more
large files, thus freeing disk space and reducing the time it takes to transfer files to another
computer over the Internet or network. A compressed folder is denoted by a zippered folder icon.
You can compress one or more files in a compressed folder by simply dragging them onto the
compressed folder icon. When a file is compressed, a copy is used in the compression, and the
original remains intact. You can uncompress, or extract a file from the compressed folder and
open it as you normally would, or you can open a file directly from the compressed folder by
double-clicking the Compressed File icon. When you open a file directly, Windows extracts the
file when it opens and compresses it again when it closes.
Steps to follow:
1. Select the files and folders you want to copy to a compressed folder.
2. Right-click one of the selected items, point to Send To, and then click Compressed
(Zipped) Folder.
3. To copy additional files or folders to the compressed folder, drag the files onto the
compressed folder.4
56
Figure 3.18: Compress files and folders1
Searching Files
Windows provides several ways to find files and folders. There isn't one best way to search. You
can use different methods for different situations.
Use the search box on the Start menu
You can use the search box on the Start menu to find files, folders, programs, and e-mail
messages stored on your computer.
To find an item using the Start menu:
1. Click Start button.
2. Type a word or part of a word in the Search box.
3. Search results will appear as soon as you start typing in the Search box.
Search results
Search Box
Note: When searching from the Start menu, only files that have been indexed will appear in
search results. Most files on your computer are indexed automatically.
Use the search box in a folder or library
You're often likely to be looking for a file that you know is in a particular folder or library, such
as Documents or Pictures. Browsing for the file might mean looking through hundreds of files
and subfolders. To save time and effort, use the search box at the top of the open window.
57
Figure 3.20: Use the search box in a folder
The search box filters the current view based on text that you type. The search looks for text in
the file name and contents; and in the file properties, such as in tags. In a library, the search
includes all folders included in the library as well as subfolders within those folders.
To search for a file or folder by using the search box:
Windows 7 provides two main types of user accounts such as administrator and standard. For a
domain network computer, different account types (administrator, standard user, and restricted
user) provide similar permissions as the ones on a shared or workgroup computer.
The Administrator account is for the person who needs to make changes to anything on the
computer as well as manage user accounts. An administrator can install programs and hardware,
make system-wide changes, access and read all non-personal files, create and delete user
accounts, change other people’s accounts, change the own account name and type, change the
own picture, and create, change, or remove the own password.
T h e Standard user account is for the person who needs to manage personal files and run
programs. The standard user cannot install password for easy access and contains more
restrictions than the standard account.
The guest account is disabled by default and needs to be turned on. You can also create a user
group, which is a collection of user accounts that all have the same security rights. The most
common user groups are the standard user and administrator. A single account can be a member
of more than one group.
See Figure 3.21 below shows the main two types of user accounts: Standard user and
Administrator.
58
Figure 3.21: Windows 7 User Accounts
59
Figure 3.22: Control Panel category view2
60
UNIT 4
Aims:
This UNIT introduces the user to the concept of an electronic word processing package and to
make the user proficient in the use of the Microsoft Office 2007.
Word processing is the creation of documents using a word processor. In computers, a word
processor is a computer application used for the production, including composition, editing,
formatting, and possibly printing of any sort of printable material. In general, word processor is a
type of stand-alone office machine which was popular in the 1970s and 80s, combining the
keyboard text-entry and printing functions. Type writers were commonly used in offices before
the computers came more popular as a word processing device. At present, these type writers are
out of date and all these functions of the type writers are done by the computer and word
processing applications. Figure 4.1 shows a manual type writer and an electronic type writer.
Computer based word processor is a computer software that can be used to word processing. At
present there are thousands of word processing packages available all over the world. Compared
to others Microsoft word, OpenOffice.org Writer, KWord and AbiWord are some of the popular
61
word processing packages. These packages contain their own characteristics and features. Some
common characteristics and features of the word processing packages are listed below.
There are several word processors available. These word processors can be categorized as
Free/open source software (FOSS), Commercial software, and Online Word Processors. Let us
look about each category.
AbiWord
AbiWord is a free software word processor and it runs on Linux, Mac OS X (PowerPC),
Microsoft Windows, and other operating systems. AbiWord has a comprehensive language
database with multiple languages. It also has support for tables and footnotes, as well as a spell
checker and an advanced grammar checking system.
AbiWord is a package with several import/export filters, including HTML, Microsoft Word
(DOC), Office Open XML (DOCX)[2][3], OpenDocument (ODT) and Rich Text Format (RTF).
LaTeX is supported for export only. Plug-in filters are available to deal with many other formats,
notably WordPerfect documents. The native file format is .abw. You can freely download
AbiWord at http://www.abisource.com/download/
62
Figure 4.2: AbiWord Interface
KWord
KWord is a frame-based word-processing and desktop publishing application and it is capable of
creating, demanding and professional looking documents. KWord is a word processor based on
frames. This can be used to place components in precise locations, as with many professional
Desktop Publishing applications. KWord can also handle huge amounts of texts and allows you
to do professional markup with ease. It has special features such as;
• Uses the standard ISO 26300 Open Document format.
• Paragraph style sheets (borders, alignment, spacing, indentation, bullet points, tab stops,
page breaks, and font type, style, color and size), together with a stylist to edit, add,
remove and update styles (a number of predefined styles are provided)
• A frame orientation, suitable for simple desktop publishing (DTP)
• Numerous preset as well as custom page sizes
• Multiple columns per page
• Headers and footers (including different first page headers/footers)
• Variables, such as page number, company name, user name, document summary, date and
time or a custom variable
• Tables
• Embedding of text frames, images and clip-art (.wmf and .svg files)
• Chapter numbering
• auto-generation of table of contents
• auto-correction and spell checking
• templates
63
Figure 4.3: KWord Interface
OpenOffice.org Writer
OpenOffice.org Writer is a word processor component of the OpenOffice.org software package.
Writer is a word processor similar to Microsoft Word and Corel's WordPerfect, with some of
their features. As with the entire OpenOffice.org suite, Writer can be used across a variety of
platforms, including Mac OS X, Microsoft Windows, Linux, FreeBSD, IRIX and Solaris. Writer
is a free software, which is released under the terms of GNU Lesser General Public License.
Writer is capable of opening and saving documents in a number of formats, including the OASIS
Open Document Format 1.1 (its default format), Microsoft Word's DOC, DOCX, RTF and
XHTML. Writer provides a number of features not present in Word, including the ability to
export to the PDF format natively. It also includes a word completion mechanism for predictive
writing that is not available in Microsoft Word as of June, 2008.
Features include:
• AutoCorrect
• AutoComplete
• Styles and Formatting
• Text Frames and Linking
• Tables of Contents
• Indexing
• Bibliographical References
• Illustrations
• Tables
• Though OpenOffice.org Writer has a spell checker, it lacks a built-in grammar checker,
which is available only as an extension since version 3.0.
• Writer's mail merge functions, although substantially rewritten in 2.0, are still less
flexible than those of other word processors.
64
Figure 4.4: OpenOffice.org writer Interface
Microsoft Word
Microsoft Word is Microsoft's word processing software. It was first released in 1983 under the
name Multi-Tool Word for Xenix Systems. The latest releases are Word 2013 for Windows and
Word 2011 for Mac OS X. Microsoft Word's native file formats are denoted either by .doc or
.docx file extension. Word has a built-in spell checker, thesaurus, dictionary and an Office
Assistant.
Now you have some idea about what are the word processors available. Before starting the word
processing you are required to get an idea about followings.
65
4.3 Improve your typing Skills
Function Keys
Function keys are available in front of the keyboard. In this key layout there are 14 Function
Keys Such as Esc, F1, F2.. F13. These function keys are used to run Specific functions in your
Application. Example: F1 is used to show help, F2 is used to save your document etc.
Control Keys
There are three control keys such as Control key, Alt key and Shift key. The Control key is a
modifier. When pressed in conjunction with another key, will perform a special operation (for
example, Control-Alt-Delete).
Key combination Microsoft Windows/KDE
Ctrl+A Select all
Ctrl+B Bold
Ctrl+U Underline
Ctrl+C Copy
Ctrl+V Paste
Ctrl+Esc Show start menu
Table 4.1: Special Operations
Alt key
The Alt key on a computer keyboard is used to change (alternate) the function of other pressed
keys. The Alt key is a modifier key, used in a similar fashion to the Shift key. For example,
simply pressing "A" will type the letter a, but if you hold down either Alt key while pressing A,
the computer will perform an "Alt-A" function, which varies from program to program.
Character keys
There are two types of character keys such as letters and symbols. Letters have their own
meaning. But there are several symbols. Table 4.2 shows some symbols and its meanings.
Symbol Explanation
66
~ Tilde
` Acute, Back quote, grave, grave accent, left quote, open quote
! Exclamation mark, Exclamation point, or Bang
@ At or At symbol
# Octothorpe, Number, Pound, sharp, or Hash
$ Dollar sign
% Percent
° Degree
^ Caret or Circumflex
& Ampersand or And
* Asterisk and sometimes referred to as "star".
( Open parenthesis
) Close parenthesis
- Hyphen, Minus or Dash
_ Underscore
+ Plus
= Equals
{ Open Brace
} Close Brace
[ Open bracket
] Close bracket
| Pipe, Or, or Vertical bar
\ Backslash or Reverse Solidus
/ Forward slash, Solidus, Virgule, or Whack
§ Section
: Colon
; Semicolon
" Quote, Quotation mark, or Inverted commas
' Apostrophe or Single Quote
< Less Than or Angle brackets
> Greater Than or Angle brackets
, Comma
. Period, dot or Full Stop
? Question Mark
Table4.2: Symbols
67
Example 1: Improve English typing speed by using Typing Master
Typing Master is a professional typing tutor that helps you to double your typing speed. You can
freely download typing Master in the following URL http://www.typingmaster.com/.This
program provides you to complete introduction about computer keyboard and how it work with
best performance.
In this course unit, we will be mainly working with MS Office 2007. Therefore, it is worth to
look at the features introduced / enhanced with MS Office 2007.
Features
There are number of new features in Microsoft office 2007 namely User interface, Smart Art,
new File formats, User Assistance System, Collaboration features and Themes, Quick Styles etc.
Some of these features are described below.
New user interface: The new result-oriented User Interface (UI) is featured in the core
Microsoft Office applications: Word, Excel, PowerPoint, Access and the item inspector are used
to create or edit individual items in Outlook. Also, the default font used in this edition. Some of
the new component are describes below.
Office 2007 button: The Office 2007 button, which is located on the top-left of the window. It
replaces the File menu (Office 2003) and provides access to functionality common across all
Office applications, including but not limited to Opening, Saving, Printing, and sharing a file.
Users can also choose colour schemes for the interface.
69
Figure 4.8: Office button in Microsoft power point
Ribbon: The Ribbon is a panel that houses the command buttons and icons, organizes commands
as a set of Tabs, each grouping relevant commands. Each application has a different set of tabs
which expose the functionality that application offers.
Contextual Tabs: Some tabs, called Contextual Tabs, appear only when certain objects are
selected. Contextual Tabs expose functionality specific only to the object with focus.
Live Preview: Microsoft Office 2007 also introduces a feature called "Live Preview", which
temporarily applies formatting on the focused text or object, when any formatting button is
moused-over. The temporary formatting is removed when the mouse pointer is moved from the
button. This allows users to have a preview of how the option would affect the appearance of the
object, without actually applying it.
Mini Toolbar: The new "Mini Toolbar" is a type of context menu that is automatically shown
(by default) when text is selected. The purpose of this feature is to provide easy access to the
most-used formatting commands without requiring a right-mouse-button click as necessary in
older versions of the software.
New File formats: Microsoft Office uses a new file format, called Office Open XML, as the
default file format. Word documents (without macro extensions) are now saved using a .docx
extension rather than the traditional .doc extension. Word 2007 can also save documents in the
old format so that they will still be usable in previous versions of Word. Open XML is based on
XML and uses the ZIP file container. According to Microsoft, documents created in this format
are up to 75% smaller than the same documents saved with previous Microsoft Office file
formats, owing to data compression. Also it will support to export the Portable Document Format
(PDF) in Office 2007.
User Assistance System: In Microsoft Office 2007, the “new help system” is the extensive use
of Super Tooltips which explains in about one paragraph what each function performs. Some of
them also use diagrams or pictures. These appear and disappear like normal tooltips, and replace
normal tooltips in many areas.
70
4.4.4 System requirements for Office 2007
Microsoft Office 2007 needs minimum of following system requirements,
1) Computer and processor: 500 megahertz (MHz) processor or higher
2) Memory: 256 megabyte (MB) RAM or higher
3) Hard disk: 1.5 gigabyte (GB); a portion of this disk space will be freed after installation
if the original download package is removed from the hard drive.
4) Drive: CD-ROM or DVD drive
5) Display: 1024x768 or higher resolution monitor
6) Operating system: Microsoft Windows(R) XP with Service Pack (SP), Windows Server
2003 with SP1, or later operating system
UNIT 5
71
Microsoft Word 2007
Introduction:
Having studied this UNIT you will be able to get an idea about:
Microsoft Office Word 2007 is one of the most sophisticated word-processing programs
available today. With Word 2007, it is easier than ever to efficiently create a wide range of
business and personal documents, from the simplest letter to the most complex report. Word
includes many desktop publishing features that you can use to enhance the appearance of
documents so that they are appealing and easy to read. In this lesson, we will be discussing about
MS Word 2007 to make you familiarized with it.
Click Start button → All Programs → Microsoft Office → Microsoft Office Word 2007 OR
• A new Word document will be created for you without a specific name. Rename/give
a name for the created new word document.
Now you can see the Microsoft Word 2007 user interface with a new document.
Before start working with Word 2007 you should be familiar with Microsoft Office 2007 user
Interface. Microsoft Word 2007 user interface is shown in figure 5.3. Word 2007 introduces
many new features and some of them were described in the previous UNIT. However this section
gives some of the useful tips that will be used to work with MS word 2007. Now you know that
ribbon is the most useful tool which is available in the Office 2007 package and it includes many
development tools with groups together. The „Text area‟ is the area you can enter your text.
Figure 5.3 shows some common tools and objects available in the Word 2007 user interface such
as Office button, Quick Access tool bar, Ribbon, Title bar and status bar etc.
73
MS Word
Control box Help
Text Area
Scroll bar
Control box
There are three buttons in the right top corner in your Word 2007 window. The minimize
button is used to minimize your window and maximize button is used to maximize and close
button is used to close your current window.
Using this New button you can create a new word document.
Using this Open button you can open an existing word document.
Using this Save button you can save your document. The save as button can
be used to save your document as a new copy.
Using this Close button you can close the currently opened document without
closing the Microsoft Word 2007.
74
Using this exit word button you can exit from your word program.
The Ribbon
The Ribbon contains all the tools available in the Word 2007. By default, the ribbon is consisting
of seven tabs namely Home, Insert, Page layout, References, Mailings, Review, and View. You
can click on each tab. Then the Ribbon will be appeared with the tools available under the
selected tab. The Figure 5.4 below shows the Ribbon in Home tab.
The MS Office suite provides assistance for using its all applications such as MS Word, Excel,
Access, PowerPoint, etc. with a comprehensive Help menu. In MS Word interface, right under
the three control buttons you can see the Help menu with the icon shown below.
Click on the above Help menu icon or press F1 key from the key board to open the Word Help
window. Figure 5.6 shows the Word Help window.
75
Type the key word
here to search for
help on that topic
Categories of
Help topics
Example: Imagine that you want to learn how to insert Page numbers into your document. So
you need to click on the help topic “Page Numbers” and then click on “Insert page numbers”.
Word Help will give you a very comprehensive description on how to insert page numbers with
some examples. From the same window, you can search for other related topics such as how to
remove page numbers, how to change the format of page numbers, etc. through the links given
there. See Figure 5.7.
76
Description
on How to
insert page
numbers
Other related
topics on Page
Numbering
Useful Hints:
• Type the Enter key to insert blank line within the two paragraphs.
• Use the Space key to insert spaces between two words.
• While you are entering data using the keyboard, use the Enter key only for inserting
paragraphs or to insert a new line.
• Use the Space Key only for Single spaces such as separating two words.
• Use the Tab key to set the position/indent of the text.
77
Computer hardware is the physical part of a computer, including the digital
circuitry, as distinguished from the computer software that executes within the
hardware. Most computer hardware is not seen by normal users. It is in
embedded systems in automobiles, microwave ovens, electrocardiograph
machines, compact disc players, and other devices. A typical personal computer
consists of a case or chassis in a tower shape (desktop) and the following parts:
Mother board
Processor
Memories
After entering the text into your Word document you must save your document. Otherwise the
inserted data can get lost. (However MS Office provides auto recovery and auto saving facilities
to save your document. But we encourage you to save your document then and there as you type
it or change it)
Right-click the status bar and then click Overtype to display the Insert mode status at the left
end of the status bar.
Insert mode
status
To change the Overtype mode again click on the insert button. Then it replaces the mode into
Overtype. When you click again on overtype then it changes into insert mode.
Save Option
5.4.4 Close already opened word document and exit from Microsoft Word
To close your opened document, perform the following steps,
1. Click Office button.
2. Click Close.
To exit from Microsoft word;
1. Click Office button.
2. Click Exit button.
By using the layout viewer (Bottom right hand on your MS Word window layout viewer will be
appeared). You can change the document view as you need. Click each view and see the
difference. Figure 5.10 shows the different views.
Print layout Out line view
80
Figure 5.11: Word 2007 Print options
There are three printing options available namely Print, Quick Print and print preview. Let us
see the differences among them briefly.
Print: if you click „Print‟ then the print dialog box will appear. (Screen shot in print dialog box
is given below; By using this dialog box you can select printer name, set number of copies and
set page range to print as you wish such as All : print all pages in your document Current: print
only the current page and Pages: range: 3 – 4 page range you wish to print. After selecting each
option click OK to print. Figure 5.12 shows print setup window.
Quick Print: you can directly print your document by using default print option. In this method
you can’t see the print dialog box.
Print Preview: Here the window's title bar indicates that the preview of the document and the
Print Preview tab appears on the Ribbon.
81
Click here to close
print preview option
By using Print preview you can preview your printout. Also it provides some facilities to change
your document as you wish.
You can exit from print preview option by clicking Close Print Preview button
82
Microsoft word provides several file formats. You may try saving your document using all file
formats available with Office 2007.
1. Click Office button.
2. Click Save As.
3. Enter file name „sample1‟.
4. Select save as type.
5. Click Save.
Following table shows file format and size of the sample files.
When you work with windows office, following operations will useful to create the document
easily.
To Show/Hide ruler
83
To insert a page break,
1. Go to the place where you want break the content into a new page.
2. Click Insert tab.
3. Select Pages group.
4. Click Page break.
The rest of the document will be available in a new page.
84
UNIT6
6.1 Introduction
This UNIT extends the student’s knowledge and skills in Microsoft Excel to a high level.
Microsoft Excel (Microsoft Office Excel) is a spread sheet application written and distributed by
Microsoft for Microsoft Windows and Mac OS. A spreadsheet is a rectangular table (grid) of
information, often financial information. Excel has some features namely calculation, graphing
tools, pivot tables and a macro programming language called VBA (Visual Basic for
Applications). Excel is one of the most popular microcomputer applications to date.
Earlier version of Excel contained the program's more than 1,000 commands in a series of
menus, toolbars, task panes, and dialog boxes. And, as it turns out, there were some functions
that didn't appear by default on any of the menus or toolbars. In Excel 2007, there is only one
place to look for the tools you need to use it; the user interface Ribbon at the top of the program
window.
Table 6.1 summarizes some of the expanded data storage and other capabilities found in Excel
2007.
Description Excel 2007
Columns in a worksheet 16,384
Rows in a worksheet 1,048,576
Number of different colors allowed in a work book 4.3 billion
Number of conditional format conditions applied to a cell Limited by available
memory
Number of sorting levels of a range or table 64
Number of items displayed in an AutoFilter list 32,768
Total number of characters displayed in a cell 32,768
Total number of characters per cell that Excel can print 32,768
Total number of unique cell styles in a workbook 65,536
Maximum length of a formula, in characters 8,192
Number of nested levels allowed in a formula 64
Maximum number of arguments in a formula 255
Number of characters that can be stored and displayed in a cell 32,768
with a text format
Number of columns allowed in a PivotTable 16,384
85
Number of fields displayed in the PivotTable Field List task pane 16,384
Table 6.1: Capabilities found in Excel 2007
Before start excel 2007 this is the best time to learn about office excel 2007 user interface. Figure
6.1 shows user interface of the excel 2007.
3 5
1 4
6 12
9 10
8
7
No Name
1 Office button
2 Quick Access tool bar
3 Work sheet title
4 Ribbon
5 Control keys (Close | resize | Minimize )
6 Name box
7 A cell
8 Work sheet
9 Formula bar
86
10 Scroll bars
11 Status bar
12 Insert Function Button
Table 6.2: Major components of the Excel 2007 user interface
1. Click Office button → click New (New document creation window is appeared).
Shortcut menu
5. Rename/give a name for the created new excel work sheet document.
87
The workbook can contain several work sheets. By default it has only three (3) work sheets
namely sheet1, sheet2 and shee3.
Now you are ready to work with work sheets. In this section we will discuss how to delete,
rename, or create a new work sheet in a work book.
88
Figure 6.3: Sample data for mysheet1
Entering the sequence January, February, March, and so on repeatedly can be handled by copying
and pasting the first occurrence of the sequence, but there's an easier way to do it: use AutoFill.
89
Click the Auto Fill Options button to display a list of several actions. Some options in the list are
summarized in the following table.
Option Action
Copy Cells Copies the contents of the selected cells to the cells indicated by the Fill
operation.
Fill Series Fills the cells indicated by the Fill operation with the next items in the series.
Fill Copies the format of the selected cell to the cells indicated by the Fill
Formatting operation, but does not place any values in the target cells.
Only
Fill Without Fills the cells indicated by the Fill operation with the next items in the series,
Formatting but ignores any formatting applied to the source cells.
Fill Days, Changes according to the series you extend. For example, if you extend the
Weekdays, etc. cells Wed, Thu, and Fri, Excel 2007 presents two options, Fill Days and Fill
Weekdays, and enables you to select which one you intended. If you do not use
a recognized sequence, the option does not appear.
Table 6.4: AutoFill Options
You can move a cell in a lot of ways, but the most direct method is to click the cell to which you
want to move. Then your selected cell becomes an active cell(s). (The active cell is the cell that
is currently selected and open for editing). Then copy it and paste it elsewhere in the workbook.
The Paste Options button appears next to data you copy from a cell and paste into another cell.
Clicking the Paste Options button displays a list of actions that Excel 2007 can take regarding
the pasted cells.
90
Figure 6.6: Paste Option button
91
Steps to follow:
1. On the “mysheet1” worksheet, select cells A1:C8.
2. On the Home tab, in the Clipboard group, click the Copy button. Excel 2007 copies the
contents of cells A1:C8 to the Clipboard.
3. On the tab bar, click the mysheet2 sheet tab. The „mysheet2‟ worksheet appears.
4. Select cell G5.
5. On the Home tab, in the Clipboard group, click Paste. Excel 2007 pastes the values into
cells G5:I12.
6. Click the Paste Options smart tag and then click Keep Source Formatting. Excel 2007
retains the cells' original formatting.
Excel has always enabled you to manage lists of data effectively, enabling you to sort your
worksheet data based on the values in one or more columns.
Example: Define a table
You will create a data table from existing data, add data to a table, add a Total row, change the
Total row's summary operation, and rename the table.
1. Select cell A1.
2. On the Home tab, in the Styles group, click Format as Table and then select a table style.
The Format as Table dialog box appears. Click Format as a table.
Here, some operations are described which are identified as useful to work with Excel 2007 more
easily.
6.8.1 Displaying Different Views of an Excel sheet
In Excel 2007, you can view a document in three ways namely normal view, print view and
page break preview. By using the layout viewer (appearing next to the status bar, right bottom
on your MS Excel window) you can change Excel document view as you need. Click each view
and see the difference. The layout viewer is shown below.
92
By using MS Excel you can use/open more than one work books and you can work with several
windows simultaneously. Some window operations that will be useful when working with
windows are described below;
Click the Close button, appearing at the right end of the Document window's title bar.
Click the Maximize button, appearing at the right end of the Document window's title bar.
Freezing/Unfreezing panes
Imagine that you have entered data into your worksheet under different column headings and the
number of data rows entered is too high, such that it goes beyond the limit of a visible single
page. Obviously, to refer the data in lower rows you need to scroll down the page. When
scrolling down to the 2 nd page and onwards, you will lose the titles appearing as the column
headings. So, it will be terrible for you to read the data in the rows as you can’t see what the
meaning of that data under a particular column as the heading is not visible and you will have to
scroll up again to view the headings, come back to the row reading. Obviously this is a difficult
task for you.
In such cases, you can freeze the top row of the work sheet by keeping the top row visible while
scrolling through the rest of the work sheet. You can do the similar operation for the left most
columns as well such that it keeps both rows and columns visible while scrolling. Follow the
steps below to freeze or unfreeze the panes as explained above.
93
6.9 Setting, Previewing, and Printing a document
Sometimes, though your worksheet is full of work done across the pages horizontally and
vertically you don’t need to have the entire working in the printout. It will reduce the paper
wastage as well. In such situations you can set the printing area by covering a particular number
of rows and columns. Follow the steps given below.
• Select the area to be printed by dragging and dropping the mouse over a rectangular area
across the rows and columns.
• Go to the Page Layout tab.
• Go to the Page Setup group.
• Select the options under Print area by clicking the down arrow.
94
Figure 6.9: Word 2007 Print options and printer setup window
There are three options available namely Print, Quick Print, and Print Preview
Print: if you click „Print‟ then the print dialog box will appear. (Screen shot in print dialog box
is given below) By using this dialog box you can select printer name, set number of copies and
set page range to print as you wish such as All : print all pages in your document Current: prints
only the current page and Pages: rage: 3 – 4 page range you wish to print. After selecting each
option click OK to print.
Quick Print: you can directly print your document by using default print option. In this method
you will not get the print dialog box as in the previous case.
Print Preview: Here the window's title bar indicates the preview of the document, and the print
preview tab appears on the Ribbon. The appearance of the document that will be in the printout is
displayed on the screen so that you can do the changes or give the command to proceed with
printing.
95
Click he re to close
print preview window
By using print preview you can see a preview of your printout. Also it provides some facilities to
change your document as you wish. You can exit from print preview option by clicking Close
Print Preview button.
96
UNIT 7
7.1 Introduction
In addition to the MS PowerPoint, there are so many other presentation programs which are
computer software packages which can display information normally in the form of a slide show.
Apple Keynote, Corel Presentations, Google Docs (web-based), OpenOffice.org Impress (open
source), Slide Rocket are some examples for them.
97
• If you are using My Computer or Windows Explorer, you can open the Program Files
folder, then Microsoft Office, then Office, and double-click power point icon.
• You can create an empty document on your desktop and use it to launch Microsoft power
point. To do that, you would right-click an empty area on the desktop, position the mouse
o n New→Microsoft Office power point presentation, type a name for the document,
and press Enter twice.
• Double-clicking the any power point file.
Click Start button → Click New (New document creation windows will appear)
98
1 2
4 6
No Name Description
1 Quick Access Tool The standard quick access tool bar (can customize
Bar its items)
2 Ribbon The Standard ribbon for PowerPoint
3 Tabs Heading Tabs in the Ribbon
4 Slide/Outline pane Shows slides one under the other with the content
outline
5 Notes section Section for adding speaker notes
6 New Slide Currently working slide selected from the slide pane
Table 7.1: MS PowerPoint User interface components
99
Place your cursor in the “Click to add title” box and click the left mouse button to start inserting
the text in this formatted text box, we simply enter (type-in) the title:
Example: “Introduction to Computers” assuming that you are going to present about Computers
to a group of students in a class.
Now, click in the second box “Click to add sub-title” and type the sub title to your presentation:
Example: Presented by: Mrs. C.M. CHITA
The Open University of Zambia
Now it’s time to create the next slide in your presentation. To do this, we need to find the New
Slide button. At the top left of the screen, in the Home Tab you will see a New Slide “button”
which looks like the Figure 7.4.
Example:
Now click “Click to add title” box and type: “Parts of a Computer”.
Click in the “Click to add text” box and type:
Processor (type Enter)
Motherboard (type Enter)
Hard Disk (type Enter)
RAM
100
Note that the items you type in the text area will be automatically displayed as a bulleted list. The
bullet can be customized as you wish. The Font properties also can be customized as you wish.
The steps will be same as what you followed to format your text in MS Word UNIT.
OR
Click the Microsoft Office Button and Open then select the power point presentation you
looked for then Click Open.
Normal View
Gives you a view of the entire slide as well as the “mini-previews” of each slide in the left area.
This is the one we have been using so far.
101
You can see small images of each slide. In this view you can left click-on a slide and, while
holding down the left mouse button, drag your slide to any position in your show that you
desire. This view assists you in arranging your slides in the order that you desire for your
presentation. This view is sort of like the old, round 35mm slide show trays where you pulled
out and stuck-in slides, in the order you desired.
You will be able to see a hidden mark in the hidden slides as indicated in the image below.
102
Figure 7.10: Hidden Mark
To show the slide which you have hidden earlier, right click and select „Hide Slide‟ again.
Let us start out with an example slide presentation to discuss more on components that can be
added into your slide.
103
Figure 7.11: New slide with Two Content layout
1. Click in the top text box, Click to add title and type: Processor types 2.
Click in the left Text or Content Box, Click to add text and type: Intel (tap
Enter)
AMD
3. Click in the right text box - Click insert picture from file.
4. Select a suitable picture saved in your computer and press insert. Now your Slide will
appear like this.
104
Figure 7.14: A sample completed slide
4. Click OK.
105
If the colour of the text has changed to blue and underlined then it means that it has worked
creating the link. Double check it by clicking the link.
In this section, we will briefly describe some operations that can be used to format your
presentation slides such as modifying the fonts and change the background.
Click Insert menu on the ribbon and click Text box on the Text group.
Place cursor to where you need to insert a new text box and type some text.
Note: You can format your inserted Text Box as similar to the steps you followed at MS Word.
7.6.2 Insert WordArt
To insert a WordArt, follow the steps given below.
Note: Formatting the fonts and paragraphs will be similar to what we have learnt in MS Word.
Further, you can follow the same methods we have used in MS Word, when working with
bullets and numbered lists. Refer to the relevant sections we learnt under MS Word.
Note: You can insert Date and Time too to your slides using the above dialog box.
The background is the colour, texture, pattern, or image that is applied to the entire slide (or
slide master), on which everything else sits. It's important to understand the distinction between a
background and a background graphic because even though most themes contain both, they are
set up differently, and making the change you want to the overall appearance of your slides often
involves changing both.
To Change the background, follow the steps given below,
1. Right click on the any slide (Shortcut menu will be appeared).
2. Click Format background (Format background window will be appeared).
You have two ways to fill your slide background, such as fill effect of picture. To add colour
effect select fill and change the background colour as you wish.
107
Figure 7.20: Background selection Window
3. If you need to apply this effect on the all slide click Apply to all otherwise click Close.
On the right side of the Design Tab/Ribbon you’ll see a Background Styles choice. Click the
down arrow to the right of Background Styles. The menu screen on the right will appear.
The structure of the slide including the background colours, artworks, fonts, text positions, etc.
will vary depending on the Theme you have applied in to your slide(s). For those who are
familiar with previous versions of PowerPoint, Themes are similar to the Design Templates. For
those using PowerPoint for the first time, we’ll show you how to use Design Templates on
individual slides, or on all of the slides in your presentation. If you are not on the Design
Tab/Ribbon, click the Design Tab. You will see the Themes Group.
Let's review the relationship one more time between slide masters and themes. A theme is a set of
formatting spaces. Themes are not applied directly to slides-they are applied to slide masters,
which are then in turn applied to slides. The slide masters exist within the presentation file itself.
You can change them by applying different themes, but they are essentially "built in" to the
presentation file. When you change to a different theme for all of the slides in the presentation,
your slide master changes its appearance. You can manage the changes to be done for the
appearance of all slides using the Slide Master View. As long as all of the slides in the
presentation use the same theme, you need only one slide master. However, if you apply a
different theme to some of your slides, you need another master, because a master can have only
one theme applied to it at a time. PowerPoint automatically creates the additional master(s) for
you, and they are all available for editing in Slide Master View.
109
If you later reapply a single theme to all of the slides in the presentation, you do not need
multiple masters anymore, so the unused one is automatically deleted. In addition to all this
automatic creation and deletion of slide masters, you can also manually create and delete slide
masters on your own. Any slide masters that you create manually are automatically preserved,
even if they aren't always in use. You must manually delete them if you don't want them
anymore. In the following sections, you will learn how to create and change slide masters
manually.
1 2 3 4 5 6 7 8 9
No Name Description
1 Insert Slide master To insert slide master click here
2 Insert layout To insert new layout click here
3 Insert placeholder To insert place holder click here there are several
types such as continents, text, picture, smart Art etc.
4 Insert title and footers Click here to insert title and footer
5 Themes Click here to insert new themes
6 Edit themes Click here to edit themes such as colors, Fonts and
effects
7 Background style Click here to change background style
8 Page setup Click here to change the page setup
9 Close Master view Click here to close slide master view
110
slide titles that are center-aligned instead of left-aligned, or an accent line under each slide title.
You can quickly make these changes and more by modifying the slide master.
Slide Master
Task Pane
10. Click the Slide Show View or Normal View command at the bottom of the window to
exit slide master.
11. View and see the changes in the presentation slides.
(You will see that the picture has been inserted into all slides in the same location)
Note: Similarly, you can do the changes with the text, images or any other component in
the slides using the slide master as described above.
112
7.6 How could you insert the date and time into your slides?
7.7 Describe the relationship between the slide masters and themes in PowerPoint?
7.8 How could you make a logo to appear on every slide in a presentation?
7.9 What is the default file extension for MS PowerPoint 2007 files?
UNIT 8
Introduction:
To provide an overview about Database Management Systems (DBMS) and introduce you to
one of DBMS: MS Access 2007
• What a database is
• What a Database Management System is
• Microsoft Access 2007
• Creating a database using MS Access
• Working with MS Access databases
113
Figure 8.1: Hierarchical Model
8.1.2 Network model
The network model tends to store records with links to other records. Each record in the database
can have multiple parents, i.e., the relationships among data elements can have a many to many
relationships. So this model is an expansion to the hierarchical structure, allowing many-to-many
relationships in a tree-like structure that allows multiple parents.
The network model provides greater advantage than the hierarchical model in that it promotes
greater flexibility and data accessibility.
We will be following the relational database model within this course and designing and using
such databases will be covered within the next two UNITs.
114
But object-oriented databases are more expensive to develop.
A Database Management System (DBMS) is computer software designed for the purpose of
managing databases based on a variety of data models. A DBMS is a complex set of software
programs that controls the organization, storage, management, and retrieval of data in a database.
DBMS are categorized according to their data structures or types, sometime DBMS is also
known as a Database Manager. Data management tasks fall into one of four general categories
as given below:
• Entering data into the database.
• Housekeeping tasks such as updating data, deleting obsolete records, and backing up the
database.
• Sorting the data: arranging or re-arranging the database’s records. Obtaining subsets
of data.
There are several advantages in DBMS such as reduced data redundancy and inconsistency,
enhanced data integrity, improved security etc.
These terms are used often in Database Management Systems, so you need to become familiar
with them before using the database management system, MS Access in this UNIT. A brief and a
simple description on some basic terms are given below.
8.3.1 Database
A database is an organized collection of the related information.
8.3.2 Object
An object is a component in the database such as a table, query, form, report, or macro, etc.
8.3.3 Table
A table is a group of related data organized in fields (columns) and records (rows) on a datasheet.
By using a common field in two tables, the data can be combined. Many tables can be stored in a
single database.
8.3.4 Field
A field is a column on a datasheet and defines a data type for a set of values in a table. For a
mailing list table might include fields for first name, last name, address, city, and telephone
number.
8.3.5 Record
A record is a row on a datasheet and do fields define a set of values. In a mailing list table, each
record would contain the data for one person as specified by the intersecting fields.
115
8.3.6 Primary key
A primary key is used to uniquely identify each row in a table. It can either be a part of the actual
record itself, or it can be an artificial field (one that has nothing to do with the actual record). A
primary key can consist of one or more fields on a table. When multiple fields are used as a
primary key, they are called as a composite key.
8.3.8 Relationships
Two tables/entities in a database may relate to each other using one or more common attribute.
There are three types of relationships among tables namely, One-to-one, one-to-many, many-to-
many.
For an example, think of a university database which maintains tables of data related to a
University. This database may contain tables as follows:
Consider the two entities, Faculty and the Dean in the above university database. The data item
comes under the attribute Dean ID of the Science faculty is found in only one place of the Dean
table under the attribute Dean ID. In other words, the table Faculty has one and only one
corresponding entry in table Dean. In simple words, one faculty has only one Dean and one dean
is holding the deanship in only one faculty. Therefore, we say that the relationship between the
two entities Faculty and Dean is of type One-to-one. This relationship can be illustrated by a
diagram as follows.
One-to-Many relationship
Table A has a relationship to table B such that many entries in B can refer to one entry in A.
Consider the above University database. Think of the relationship between the two entities
Faculty and Lecturer. Each faculty may have many lecturers but each lecturer is joined only in
one faculty. Therefore, we say that the relationship between the two entities Faculty and Lecturer
is of type One-to-many. This relationship can be illustrated by a diagram as follows.
Many-to-Many relationship
Table A has a relationship to table B such that many entries to A can map to many entries in B.
Consider the above University database. Think of the relationship between the two entities
Lecturer and Student. Each lecturer teaches many students and each student is taught by many
lecturers. Therefore, we say that the relationship between the two entities Lecturer and Student is
of type Many-to-many. This relationship can be illustrated by a diagram as follows.
117
8.4 Different Database Management Applications
There are several different database management applications which are not only meant for
entering and retrieving information but also they facilitate simultaneous updates and queries
from multiple users.
1. Oracle
2. MySQL/ SQL Server
3. Microsoft Access
4. IBM DB2
5. Sybase
Microsoft Office Access is a relational database management system which is a production from
Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user
interface and software development tools. It is a member of the Microsoft Office 2007 suit.
118
Figure 8.9: Create a Database
Office button
Navigation Pane
to navigate
among all objects:
Tables, Queries, Document window
Forms, Reports,
etc.
119
Figure 8.11: Local Templates
Tables: Tables are the core database objects. Their purpose is to store information. The purpose
of every other database object is to interact in some manner with one or more tables.
Queries: Queries are database objects that locate specific information stored in a table and allow
you to view and manipulate the results. The results of a query can be used as the basis for forms,
reports, and data access pages.
Reports: A database object used to display table information in a formatted, easily accessible
manner, either on the screen or on paper. It can include items from multiple tables and queries,
values calculated from information in the database, and formatting elements such as headers,
footers, titles, and headings.
Forms: A form is a way to pass data into your Access tables.
Every Access object has two or more views. For tables, the two most common views are the
Datasheet view, in which you can see and modify the table's data, and the Design view, in which
you can see and modify the table's structure.
After an object is opened, you can switch between views by clicking one of the View icons in the
lower-right corner of the program window, or by clicking the View arrow in the Views group on
the Home tab, and then selecting a view from the list. If you simply click the View button Access
switches between different views in a logical manner as it is not opting the user to select the
required view‟. If the current view is not the Design view, it switches to Design view. If you
click it again, the table switches to Datasheet view. When other database objects are active,
clicking the View switches between views in a similar manner.
You can locate specific information stored in a table, or in multiple tables, by creating a query
specifying the parameters of the information you want to find.
121
1. In the Navigation Pane, Right click Queries.
2. Click design view.
A form is essentially a window containing controls that either display information to people or
accept information that people enter. Access provides a collection of standard Windows controls,
such as labels, text boxes, option buttons, and check boxes. With a little ingenuity, you can create
forms that look and work much like the dialog boxes in all Windows applications.
A form acts as a friendly interface for a table. Through a form, you can display and edit the
records of the underlying table, or create new records. As with tables and queries, you can
display forms in several views.
The three most common views are:
• Form view, in which you enter data.
• Datasheet view, which looks essentially like a table.
• Design view, in which you work with the elements of the form to refine the way it looks
and works.
122
Figure 8.17: Design view of a Form
Note: More descriptive details on working with Forms are given in the UNIT 21.
The different sections of a report such as header, footer, details, titles... can be formatted as you
wish such that the report gives your information taken from table(s) in a more readable and
attractive manner.
You can look at reports in four views:
• Design View, in which you can manipulate the design of a report in the same way that
you manipulate a form.
• Report View, where you can scroll through the information in the report without the page
breaks inserted when it is printed.
• Print Preview, in which you see your report exactly as it will look when printed.
• Layout View, which displays the data in the report (similar to Print Preview) but enables
you to edit the layout.
8.9.1 Opening a Report in the Layout view
To open a Report, select a report and right click on the mouse then click open.
Microsoft 2007 basically supports with three database formats such as Access 2007 database
format, Access 2002-2003 database format, and Access 2000 database format.
To save Access database in other formats, follow the steps given below:
1. Click Office button.
2. Click Save As.
3. Select the suitable access database file format and Click.
123
Figure 8.19: Save Database in another format
You can secure your database by Encrypting with a password. Follow the steps given below.
1. Click Database tools.
2. Click Encrypt password (Set Database Password window will be appeared).
Once you encrypted your database, you can decrypt it by following the steps given below.
1. Open your database as exclusive mode.
2. Click Database tools.
3. Click Decrypt database (Unset Database Password window will be appeared as shown
here).
124
8.13 Self Assessment Questions
8.1 What is a Database? Briefly describe the four types of database models.
8.2 Briefly describe the following key components of relational database model.
a. Entity b. Attribute c. Relationship
8.3 What is Database Management System (DBMS)? State the advantages of it.
8.4 Give five examples for Database Management applications.
8.5 What is MS-Access? Briefly describe the objects available in MS-Access 2007.
8.6 What are the differences between a form and a report in MS Access?
8.7 When working with tables, what is the purpose of having “Datasheet view” and the “Design
view”?
8.8 Define the following terms.
a. Primary key b. Foreign key
8.9 Using suitable examples, define the possible types of relationships between two tables or
entities in a database?
8.10 What is the difference between the “Print Preview” and “Layout view” of an Access report?
125
UNIT 9
Introduction:
Each day the number of Internet users is increasing rapidly and the Internet has indeed become
an integral part of our day-to-day life. The Internet can be compared to an Aladdin’s magic lamp
which fulfills your requirements. If you are new to the Internet then it’s time to get your hands
dirty and learn how you can use the Internet and get things done within seconds.
The Internet is becoming the town square for the global village of tomorrow.
Bill Gates
The Internet could be a very positive step towards education, organization and participation in
meaningful society.
Noam Chomsky
A lot of things you want to do as part of daily life can now be done over the Internet.
Marc Andreessen
Whether you are a novice Internet user or an expert in handling the Internet services efficiently,
this would be an interesting learning experience.
Note: TCP/IP
TCP/IP is the communication protocol for the Internet. TCP/IP defines the rule
which computers must follow to communicate with each other over the
internet. Even though TCP/IP uses several protocols the two main protocols are
TCP and IP.
In other words, The Internet also can be described as massive data storage which is accessible to
anyone at any time which carries various information and services, such as electronic mail,
online chat, file transfer and the interlinked web pages and other resources of the World Wide
Web (WWW). Apart from these, there are some special features which are worth knowing
regarding the internet. Do you know who owns the Internet? The answer is that the Internet has
no owner. Another key fact is that the Internet is Multimedia-based and retrieving information
and giving information is cheap and fast. To accomplish these tasks, the Internet has large
number of servers.
To clearly understand the operations of the Internet, it’s essential to know the concept of
client/server. You have already learnt about this terminology under the UNIT on „Computer
Networks” within this course material. A client is an application or system that requests a service
from a server or access a service made available by a server. Apparently you may guess the
functionalities of the server from this. A server is a computer system which responds to the
requests made by the clients. Figure 9.1 shows the interaction between a client and a server.
Therefore in short, we can say that the internet is a client-server system which transmits data by
packet switching using the standard Internet Protocol (IP).
Do you know that the Internet has a fascinating story behind it? Let's look at some of the key
events which took place in the history of the Internet.
In the 1960s computers were situated in different locations and the information stored in one
computer that could not be retrieved from a computer which is in another location. Sharing data
amongst different Universities was considered as a tedious task by the scientists and some
researchers who were involved in researches from different locations. In the late 1960s, some of
the far-sighted experts in the U.S. Department of Defense predicted that this could be a serious
problem if they encounter a natural disaster or an enemy attack in a particular location. They
initiated a project named ARPANET with the intention of establishing a computer network
nationally, so that they could withstand any destruction in a particular location because they can
easily retrieve the data from other locations.
ARPANET served as a test-bed for the new networking technologies. The primary goal of this
project was to create a computer network with multiple paths using telephone lines. The next
thing which was taken into consideration was that to allow people to share the resources in their
computers from remote locations.
ARPANET started with connecting the computer systems and databases of most business
institutions, schools and Government organizations from faraway places. Starting with only a
handful of users ARPANET expanded rapidly and spread widely. A host is similar to a network
server and it provides services to all the computers which are connected to it. At the beginning
there were four primary host computers. The number of hosts increased and this lead to a rapid
growth in the usage of the ARPANET. In 1973, people began to use ARPANET in Europe and
the usage of this network grew even faster. The National Science Foundation joined the project
in the mid-1980s expecting that the supercomputers‟ users can use ARPANET to obtain access.
They discovered that the existing network could not handle the load and created a new network
with higher capacity as a counterpart to the ARPANET. This led to a concept called the Internet.
The connection between ARPANET, NSF net and other network were collectively called as the
“Networked network” – being internetworked and the name the Internet derived from this
concept.
The system which was initiated to survive the nuclear war evolved itself to cater individuals who
use computers from home and of course to the business. This brought an astounding expansion
in the usage of the Internet. Today we see online advertisements, online order processing, online
buying and these have not only made our lives easy going but also had improved the quality of
living to a greater extent.
128
9.1.3 Differences between Internet and World Wide Web
Although the Internet and www are blend with each other and we tend to use these two words
interchangeably in day to day life, they are technically different from each other.
Let’s imagine that we go to a restaurant to have a lunch. Usually every restaurant has a popular
dish which is popular and unique only to that particular restaurant. Sometimes we call that
restaurant by the dish name instead of the actual name of it . Wondering how is this related to the
Internet and the www! Let’s see the following explanations.
Internet Protocols
Internet Refers to Description Internet
Protocol Services
SMTP Simple Mail Transfer A protocol for sending email Email
Protocol messages between servers
HTTP Hyper Text Transfer Defines how messages are World Wide
Protocol formatted and transmitted, Web(www)
and what actions Web servers
and browsers should take in
response to the wide range of
commands.
129
VoIP Voice over Internet This enables people to use Online
Protocol the Internet as the chat(there are
transmission medium for exceptions)
telephone calls.
Internet is an interconnection of computer networks all around the world. In other words, it is the
hardware which forms the physical layer to these connections is what we refer to as the Internet.
Hence, the Internet comprises of network of computers, fiber-optic cables, copper wires and
wireless networks. But www is the software which is used to access the information from the
Internet. It consists of files, folders and the documents which are stored in different computers.
Now it is crystal clear to you that the www depends on the Internet to work.
Browser
A browser is a computer software which can be used to view documents on the Internet. Web
browsers interpret HTML code and display images and text.
Search Engine
Search engine is an automated web-site which is programmed to search specified keywords and
give the websites and Internet based documents as a result.
Client
A computer which is capable of receiving the information from the server in the Internet is called
a client. A home PC is an ideal example for this.
Server
Client computers download files in the Internet from the Server. These servers are directly linked
to the internet and consist of a lot of documents.
Domain
The Domain is the top level identification string for a particular server (yahoo.com). There are
various types of domains. It can be categorized using one or more extensions.
130
URL
URL stands for Uniform Resource Locator. This is a standard address format that constitutes a
reference to an Internet resource. Each URL starts with a protocol followed by a colon followed
by two slashes.
URLs are case sensitive and do not contain any spaces. URLs or web addresses can be broken
down into various components Access protocol, Service, Server, Domain and the country.
HTML
HTML is the abbreviation for Hyper Text Markup Language. The web pages are called hypertext
documents because when you click a word or a picture which is hyper linked you can go to
another location. From there you can jump to another webpage. This is made possible because
HTML allows the document’s author to embed hyperlinks.
HTTP
HTTP is the foundation of data communication for the World Wide Web. HTTP (Hypertext
Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and
other multimedia files) on the World Wide Web. When the browser user enters file requests by
either "opening" a Web file (typing in a Uniform Resource Locator or URL) or clicking on a
131
hypertext link, the browser builds an HTTP request and sends it to the Internet Protocol address
(IP address) indicated by the URL. The HTTP daemon in the destination server machine receives
the request and sends back the requested file or files associated with the request. Example
URL: http://www.yahoo.com
HTTPS
HTTPS stands for “Hyper Text Transfer Protocol Secure”. This means that the data transferred
electronically is encrypted and cannot be accessed by unauthorized people. HTTPS provides
authentication of the web-site and related web server which is interacting with thus protecting
against Man-in-the middle attacks.
The Internet provides a wide spectrum of services which supports us in many ways. We’ll
discuss these facilities in detail now. The Internet not only enables you to look at the documents
and images but also you may listen to sound files and watch videos. You are not limited to a
small circle of facilities like obtaining information from the massive collection of data but you
can go beyond that and publish your own creations and others will be able to acquire those
without any problem. Hence transferring files from one place to other had made things easier for
those who live in geographically dispersed locations. This kind of global distribution of the
Internet is certainly an advantage for international communication.
Now let’s have a brief look at the different facilities available in Internet.
9.2.1 WWW
You don’t have to go to the library situated miles away and exhausted. The Internet had brought
a revolution in accessing information. Accessing the information is made simple and easy, now.
By surfing the web browser users can acquire the necessary information quickly and accurately.
9.2.2 E-mail
This is one the most frequently used Internet services. A mail can be sent by directly typing the
e-mail message using the keyboard or by attaching the files in the disk. E-mail system is
included in most Main frames, Mini computers and computer networks. Refer UNIT 24 for
further details.
9.2.3 Chat
Users can send and respond to messages in real time that is there is no waiting period between
sending and receiving messages as in e-mail. Usually this communication takes place within two
people, but there can be groups as well.
9.2.4 Telnet
Telnet is a network protocol which provides a bidirectional interactive text oriented
communication facility. You will be able to control the server and interact with the other servers
on the network. A telnet UNIT is commenced by logging into a server using a username and
password. This is well known to control Web servers remotely.
9.2.5 VoIP
132
This is the abbreviation for Voice over Internet Protocol. VoIP systems allow voice data to travel
over the Internet thus by-passing the regular telephone service.
File transferring using the FTP and advertising are some other well-known benefits.
Internet which is accessed by many people and businesses has now become the aspiration in the
commercial world. People have enhanced facilities like they can work while they are at home. So
it is apparent that the Internet had made things simple.
If you are willing to enjoy the facilities in the Internet the first thing you need to do is that you
need to have an Internet connection. There are several ways to obtain access to the Internet. The
way by which the users connect to the Internet is called the Internet Access. Are you keen to
know the different methods to connect to the Internet? Let’s discuss about them.
133
Figure 9.4: Dial-up internet Connection
We can access Internet by using a modem and a telephone line. This type of Internet access
method is common in homes and small businesses. We can easily create this connection by
setting up an inexpensive account. Hence this type of connection saves money. More than that by
using the dial-up connection we can save a lot of time, and its quiet convenient. In addition dial-
up connections provides new services to the users.
9.3.2 Landline
This is also called as mainline or fixed line. The data is transferred through the solid medium
either through a metal wire or optic fiber. This has a significant difference from the mobile
cellular service. In a cellular line the medium used is air but the landline uses a solid medium.
Landline has some advantages when compared to a mobile cellular line. Landline cost less than
the mobile cellular line. Furthermore, landline has a better voice quality. We can use this in the
areas where we do not have the cellular service or where we need no mobility. Since the landline
cannot be interrupted without physical access, this is considered to be a more secure mode of
communication.
9.3.3 T-lines
134
T-lines are telephone lines comprised of either fiber optic or copper wires that offer 24 individual
channels. Each of these channels supports data and voice transmissions at speed of 64Kbits per
second.
Some of the telephone companies offer some of these lines called fractional T-1 access.
9.3.4 Wi-Fi
9.3.5 Satellite
135
surveying, providing emergency roadside assistance for automobiles and also for some
recreational activities. Most sophisticated system of GPS is that it shows your position in the
street map. The following figure shows an application of GPS, a vehicle tracking system.
You might have heard or used mobile phones with 2G, 3G, and 4G technologies. We can use
these phones to access the Internet. Mobile phones using 2G (Second Generation) technology for
data connection do not have an inbuilt modem. 3G which is more advanced finds
Application in wireless voice telephony, mobile Internet access, fixed wireless Internet access,
video calls and mobile TV. Some phones have a built-in dongle (using 3.2/7.2 HSPDA
technology) and you can find some basic functionalities of a computer in such phones. In
addition recent advancements in the mobile technology have made life easier. Today’s mobile
phones can have data connection with several other devices only by turning the phone into a
portable Wi-Fi hotspot.
The following table summarizes the different methods of Internet connectivity discussed above.
Method Advantage Disadvantage Best suited for
136
Landline • Low cost Can only be used in fixed Areas where
• better voice quality locations we do not have
• more secure mode of the cellular
communication service or
where we need
no mobility
UNIT 10
Introduction:
You might have used web browsers like Internet explorer, Google chrome, Mozilla Firefox and
Netscape Navigator etc. to browse the Internet. A web browser is a software application which is
enabled to find hypertext documents and is used for retrieving, presenting and traversing
information in the World Wide Web. This application is stored in your computer’s hard disk.
Although the web browsers with graphical user interface are popular among the general public it
138
is important to keep in mind that there are many text-based Web browsers too, which are used in
non-graphical operating systems.
The important feature of the Web is that they are created in a format known as hypertext which
enables them to be linked together. A large collection of data including text files, pictures,
sounds, movies and more can be accommodated by this Hypertext system.
Before launching your web browser you need to connect to the Internet. When you have
established the Internet connection, follow these steps to launch your browser.
1. Click the Start button on the Windows taskbar. You will see the start menu unveiled.
2. Click All Programs.
3. Click Internet Explorer or any other browser name installed in your computer.
Let’s see some examples of web browsers. See Figure 10.1 given below.
Check the system requirements to check whether your machine is compatible with the features in
the browser. You can check the system requirements in the Firefox website.
The System requirement for Firefox 20 is given below. We have only included the requirements
needed in a Windows operating system. If you are using any other operating system please visit
the following web link: http://www.mozilla.org/en-US/firefox/20.0/system-requirements/
• Windows XP SP2
• Windows Server 2003 SP1
• Windows Vista
139
• Windows 7
• Windows 8
Please note that while the 32-bit and 64-bit versions of Windows Vista and Windows 7 can be
used to run Firefox 20, only 32-bit builds of Firefox 20 are supported at this time.
Recommended Hardware
Now it is time to learn how we can install Mozilla Firefox to your computer.
Step 3: Double-click the file to start the Firefox install wizard and click Run (See Figure 10.3).
140
Figure 10.3: Firefox install wizard
Firefox setup will be downloaded to a temporary folder as shown in the Figure 10.4.
Step 5: Read the License agreement and click on “I accept the terms in the License agreement”
and click “Next”.
141
Figure 10.7: License Agreement
Step 6: The Setup Type screen appears. A "Standard" setup is selected by default (using the
custom option is only recommended for experienced users).
Step 7: Click on Finish. Now you will be able to see a Firefox shortcut button on your desktop.
Click on that and check whether it works.
142
Figure 10.10: Completing the Firefox setup
Most of the web browsers have common user interface elements. The following figure (Figure
10.11) shows you the common interface of Mozilla Firefox. The important components are
labeled and each labeled component is briefly described in Table 10.1 below.
1 2 3 4 5 6 7
8 9
143
No Name Description
144
Figure 10.12: User interface of Internet Explorer
Let’s see the following table to identify the functionality of each icon in the main menu.
Menu item Description
File The properties of the web pages can be opened, saved or printed using this
icon.
Edit Cut, copy, paste, undo and find icons are included in this.
View The different ways in which the website can be viewed are included inside
this.
Favorites You can include the websites you visit regularly in the Favorites and return to
those sites regularly.
Tools You can view the sites you have visited using History. Furthermore you have
filtering certain sites. Popup blockers and Internet option enhances the
security risk and gives more added facilities.
Help Provides online support to those who are new to Internet Explorer.
Table 10.2: Functions of icons
(Note: If the File menu is not visible in the version of IE you use, just press the ‘Alt’ key
to view it. To permanently enable it now click in the VIEW option and choose toolbars menu
bar).
2. Select “Save Page”.
3. Give the location where you want to save the particular file.
4. Click on Save.
We can browse images, audio files, video files and even more. Now let’s see how we are going to
download these different types of files from the Internet.
Some of the commonly downloaded file types are mentioned below.
1. A text document – tutorial, application form for a job/examination 2. A
Software
3. An audio – e.g.: music, speech
4. A video file – e.g.: movie, a TV programme
As shown in Figure 10.15, first go to the relevant page where you can find the text document.
147
Figure 10.15: Locating the required text file
When you place the cursor on the hyperlink you will see a hand sign. This indicates that if you
click on it you will be linked to another webpage. Click on the text “Programme Guide
20122013” to open the text document. You will see the following web-page as shown in Figure
10.16. Click on “Save a Copy”. This is pointed by the arrow at the bottom.
Save a Copy
Figure 10.16: The required text file will be opened with the relevant reader software
148
Then you need to give the location in your computer, where you want to save it and click “Save”
(Figure 10.17).
Downloading software is so much similar to downloading a text file. After downloading a file
you have to install it to start its performance. The installation process might vary for different
software. You need to pay attention to the instructions and proceed with it according to your
requirement.
We will show you how to download and install software, by using an example. AVG antivirus
software is freely downloadable and it prevents the computers from harmful virus attacks. Before
starting to download any software, prepare your computer to carry out the installation by reading
the installation guide carefully. The official web-site of AVG is shown in figure 10.18. You can
download the software by clicking the “Download” button.
149
Figure 10.19: Downloading a Software
After that the installer file will start to download. When it is fully downloaded locate the installer
file and double click on it to open. Authorize the installer by clicking “ Yes” or “Run”. Read the
instructions and tailor the software according to your requirements.
In a similar way we can download music files, animations and video files and save them in the
preferred location in your computer.
Play
Cancel
150
Retry
After installing double click on the file to open it. (Figure 10.22)
Double
click on
this to
open
the file
Search engines, as its name implies, search and present a list of web-sites which are closely
connected to the key word in which we were seeking. There are so many search engines in the
web. We are going to see some of the popular search engines now.
Google is a popular search engine. There are a lot of improved features in it. As you can see in
the Figure 10.23 given below, searching is made easy by categorizing type of document you are
searching. If you are searching for an image of a computer, you can click on the images and type
the key word and get the images you desire so quickly. You do not have to view each and every
document and waste your time on searching. You can even search a specific file using the
advanced features. This would save your precious time and money.
151
Figure 10.23: Interface of Google Search Engine
Yahoo (www.yahoo.com)
152
Figure 10.24: Interface of Yahoo Search Engine
AltaVista (www.altavista.com)
Ask (www.ask.com)
153
Bing (www.bing.com)
Step 1: Type www.google.lk in the address bar and search. The Google home page given in
figure 10.23 will appear.
Step 2: Type the key words you want to find. Suppose you want to know how to play chess, so
all what you need to do is you have to type “How to play chess” and click “Google Search” or
click the search button.
154
Now it is time to learn more about, or be reminded of, some of the best ways to get
exactly what you're looking for, and quickly.
1. Either/or
Google normally searches for pages that contain all the words you type in the search box, but if
you want pages that have one term or another (or both), use the OR operator -- or use the "|"
symbol.(Ex: Information | Technology.) this would search either information or technology or
both words together.
2. Quotes
If you want to search for an exact phrase, use quotes. [Information "communication technology"]
will only find that exact phrase. This will find pages that contain the word information and the
exact phrase "communication technology ".
3. Not
If you don't want a term or phrase, use the "-" symbol. Suppose you want to search information
about Mars which is one of the planets and you do not want to mix it up with Mars chocolate,
type as follows [Mars-chocolate] will return pages that contain only information regarding the
planet Mars (Note: Put a space before the minus sign but do not put a sign between the
minus sign and the word or phrase you want excluded).
4. Similar terms
Use the "~" symbol to return similar terms. [~flower -rose] will get you pages that contain
"flowers" but not "rose".
You can even use this as a mean of include as in this example:
Suppose you directly want to access Department of Mathematics and Computer Science
webpage in the Open University web site. Although you know the URL of the Open University,
you do not know the exact URL. What you can do is, type
www.ou.ac.lk~Mathematics and computer Science
Then see what happens. Yes, you will be directly given the web pages relevant to the Department
of Mathematics and Computer Science. Without wasting time by clicking links to access a
particular page, isn’t it easy to type the keywords in a website and search for it?
5. Wildcard
Google treats the asterisk (*) as a placeholder for 1 or more words – it can also be referred to as a
single or multiple word wildcard operator, because Google treats the asterisk as a placeholder for
any unknown term(s) for which it tries to find the best match(es).Google “fills in the blanks”
wherever there is an asterisk.
Here is an example:
You need to browse all the Power point presentations regarding the history of the Internet. You
can type,
“Internet History” * .ppt
155
in the search bar. Now you can see all the links to the Power point presentations related to the
history of the Internet
6. Advanced search
If you can't remember any of these operators, you can always use Google's advanced search.
Click on “Advanced Search” to use the advanced search options. (Figure 10.29)
You can use these options to optimize your search. (See Figure 10.30 below)
156
Figure 10.30: Advanced Search options
Suppose you want to have www.google.lk as your home page in Mozilla Firefox. Follow the
steps below:
1. Open Firefox, and click on Tools->Options.
157
2. Go to “General” tab and type http://www.google.lk/ (You can use any URL you like to be
the home page to visit)
3. Click OK.
Now you will be able to see this web site whenever you open up the browser (Mozilla Firefox).
158
Setting up a proxy for Firefox is pretty simple. Follow the procedure as mentioned below:
1. Open Firefox, and click on ToolsOptions.
2. Go to the Advanced Tab.
3. Under the „Advanced‟ tab section, click on Network.
4. Then under the “Connection” section, click „Settings‟ button – see Figure 10.31
5. Click on the “Manual Proxy Configuration” button in the „connection setting‟ dialog box
as shown in Figure 10.32 below.
6. Now copy/paste the proxy address and port in their respective sections.
159
Figure 10.32: Connection Setting Dialog Box
7. Click „OK‟.
If you are concerned about enabling JavaScript for security reasons, consider changing the
settings in the Advanced… consider the advanced Java Script Settings available as shown in
Figure 10.33 below.. Firefox allows you to disable some of the actions that JavaScript can
perform.
161
UNIT 11
Introduction:
11.1 E-mail
In the previous UNIT we dealt with one of the most important usage of the Internet. We are
going to discuss another here. It is all about the Electronic Mail or simply e-mail.
Anybody can post letters to a particular person if they know his/her postal address. But only the
relevant who belongs to that particular address will receive the mail. We call such a postal mail
as „snail mail‟ because it usually takes several days or even weeks to reach the specified
location. Since the technology has advanced rapidly and we expect things to happen with a
single click, the electronic mail is the choice of the most.
A person can exchange his/her messages digitally through e-mail. E-mail has so many
similarities with the postal mail. Similar to a postal mail, e-mail too can be sent from anyone but
the mail will be received by the person who owns a particular e-mail address. Of course, you
would have used e-mail to convey messages to a person living in another part of the world. Let’s
discuss this in detail.
11.1.2 How e-mail works in brief
162
The mails you send will be temporarily saved in your mail server. Email servers accept, forward,
deliver, and store messages. Neither the users nor their computers are required to be online
simultaneously; they need connect only to an e-mail server, to send or receive messages. Mail
server is also used to mean a computer acting as a Mail Transfer Agent (MTA) that is running
the appropriate software.
Sender
Mail Server
Internet
Receiver
Figure 11.2: Email operations across the Internet
Let us see a real world analogy to understand the basics of this connectivity. We have not dealt
the process in deep details here since it would be beyond the scope of this course.
Suppose John wants to send a mail to Caroline. He sends the mail to the MTA which is also can
be referred to the Mail Server. Then the message is routed from server to server through the
Internet. At last, Caroline receives the message from the Mail Server and reads it
(See Figure 24.3 below ).
SMTP POP3/IMAP
Amali Sanath
MTA MTA
Many internet service providers provide a webmail client as part of the email service included in
their internet service package.
When we send an email, our computer connects to our email service’s mail server. A server is a
centralized computer which manages a specific type of service. An email server for instance,
handles emails. The email server responsible for sending emails is called the SMTP (Simple
Mail Transfer Protocol) server. One SMTP server can pass on the mail to another SMTP server
and relay it to the destination through several hops.
Every email has the sender’s address (e.g. [email protected]) and the recipient’s in the To
Field (e.g. [email protected]). When an email is sent, the email client connects to the
SMTP server of the sender’s email service (e.g. mailserver.sendermail.com). The client transmits
the address of the sender, the address of the recipient and the content of the message.
The SMTP server goes to work at locating the whereabouts of the recipient. Using the recipient’s
mail ID (i.e. [email protected]) it locates the domain name – e.g.recipientmail.com.
Note: If the recipient’s mail ID had the same domain name as the sender, then the process would
be simpler. The SMTP server would have transferred the mail to its local outgoing mail server
(POP3 or IMAP).
Each domain name represents a unique Web address, called an Internet protocol (IP) address.
Think of it as postal addresses of the internet. The link between domain names to their IP
addresses is stored in the Domain Name Registry. The SMTP server then contacts the server
where the registry is kept (The DNS Server). The DNS server sends back the address to the
SMTP server.
The SMTP server then proceeds to hand over the email to the SMTP server of the recipient’s
email service (let’s call it mailserver.recipientmail.com). This SMTP server checks and confirms
that the mail addressed to [email protected] belongs to it and hands it over to its
counterpart, the POP3 server (or the IMAP server).
Post Office Protocol (POP3) servers are the servers that do the job of receiving mails. The
number ‘3’ is the version number of the protocol in use. POP3 servers have mail accounts (our
164
email IDs). Each mail account is mapped to a username-password combination. Once the
message is handed over to the POP3 server, it is kept and stored in the mail account till the
recipient logs in and checks the mail.
The Following Table 11.1 differentiates POP from IMAP in terms of their advantages and
disadvantages.
Advantage Disadvantage
• Configurability.
It has dozens of options based on all three mail
delivery models
165
11.3 Different e-mailing methods
First of all it is essential to know the anatomy of an email message. Basically email contains 2
parts: the header and the body.
In order to have a better understanding about the emails, let’s take a real life example. If you
want to send a letter to someone what will you do? Firstly, you’ll be writing the letter and then
put it into an envelope. Then you’ll write the recipient’s name and address on the envelope, and
then post it. The letter you write can be compared to the body and the envelope is comparable to
the header.
Sending an email is very much similar to this scenario but really with more advantages. You
don’t need a pen and a paper anymore. Documents are exchanged swiftly without any delays.
But you need a computer, internet connectivity and an email account and the recipient’s email
address to send an email.
We have already learnt that an email has two parts namely a header and a body. Let’s discuss this
in detail with the help of the following figure which shows a typical layout of an email.
You’ll be simply typing your message in the body of your email. It is possible to change the
colour and the type of the text you have typed. In addition you may include emoticons in the
body of the email.
166
11.4 Need of Email etiquettes
Do you know that similar to dining etiquette, we need to follow some etiquette when sending
emails which is important especially in business purposes?
Let’s have a look at the important email etiquettes which you can follow. The following table
11.2 shows the email etiquette and the reason for doing so.
Etiquette Reason
1. Message should be concise and to the Reading a long mail will give a boring
point. experience to the reader and it will be a
de-motivating fact too.
5. In order to make it clear break-up your Small chunks are better understood by
mails into paragraphs. the human brain than long paragraphs.
7. Before sending your mail read your mail Because there is a chance for
again and again. improvement always, isn’t it?
8. Make sure whether the reader to whom Abbreviations like BTW (By the way)
you are sending the mail will and LOL (Laugh Out Loud) are certainly
understand the abbreviations and easier for you to type but sometimes it
emoticons you have used. might be difficult for the person who is
reading it.
E.g.: username@hostname
167
1 2 3
Step 1: open your web browser (ex. Mozilla Firefox) and log on to the Yahoo web site
(www.yahoo.com)
168
Step 5: Now select two secret questions and answer them.
In case if you lose your password you can use these questions to login to your account with a
new password. Make sure that the password is memorable.
Step 6: Type the code which is displayed in the cage provided as shown in the figure below.
Then click on “Done”.
Click on Mail
Note: If you are interested in creating a Gmail account, please follow the link below:
http://www.wikihow.com/Create-a-Gmail-Account
170
Click here to
read the
email in full
1. You can see a button called “Compose” at the left hand-side after the Inbox. Please
locate the exact location of „compose‟ as shown by a „hand sign‟ in Figure 11.6 below.
You need to click on it to send mails. You will see the web-page shown in Figure 11.7
next.
171
2
5 3
Similarly forward the same message received from your friend to another friend by
clicking on
Forwardbutton
. Reply Forward
2. Select the file to be attached with the mail by locating the file correctly and click on
“Open” button.
3. You will see the selected file gets attached within few seconds or minutes. This depends
on the capacity and the speed of the Internet connection. Finally you can send your mail
along with the attachments by clicking on “send” button.
Number of
attachments
Size of the
attachment
Attached file
173
Do you send emails to more than one recipient often? Are the recipients often the same? Then
there is a more effective way to handle your tasks. Let us discuss how we can create a group for
list mailing from existing contacts in Yahoo:
1. Follow the Addresses link in the Yahoo! Mail Classic navigation bar.
2. Tick the checkboxes next to the address book entries you want to become members of
your mailing list.
3. Make sure Send Email is selected in the toolbar listing possible actions.
4. Click OK.
5. Under Add Contacts to a List, select Add contacts to a new list:
6. Enter a list name.
7. Click Compose.
Yahoo! Mail Classic automatically sets up a new mailing list containing the selected address
book entries.
With your groups set up and populated, you can now send messages to all members easily and
quickly.
We are well aware that people all around the world enjoy the benefits of the Internet. We can
never reject the fact that our lives are made easy by the Internet because we have all been given
access to information and we can obtain information which we want from anywhere in the
world. Communication is made very easy not only among individuals but also amongst groups.
Internet had paved a way to a new era in the business world by making commercial transactions
simple and swift.
Although there are numerous benefits of the Internet there are also a handful of issues associated
with the Internet. The issues associated with the Internet are not only a problem which is talked
in terms for technical ground it has to be considered as a legal, social and cultural problem
between different countries. Different countries take different actions to encounter this problem.
Pornography, defamation and spam are regarded as the three common issues encountered by the
professionals as well as the beginners of Internet users. Every country is governed by certain
laws and legislations which are unique to that particular country. An act which is legitimate in
one country can be considered as an offence in another country. Since internet crosses the
national boundaries it is not abide by the law of one particular country. So this increases the
chances of materials which violates the law and order of a country, to flow easily into the
country. The Internet Service Providers play a key role in addressing these issues. We have to
look at the problems in different legal systems in order to address the major issues related to
implementation of law in spite of accessing.
4. Change the security settings according to your usage and at the end click “OK”.
• The first basic precaution a user should take is to back up the important files. This will
not prevent a security incident or hardware failure or the data stored on your computer
would probably be lost if the machine was stolen or destroyed by fire, but it may reduce
the impact to a greater extent.
• You need to have the updated anti-virus software in your computer and you have to scan
your computer, frequently. Moreover it is essential to scan the files you download from
the Internet.
175
• Having a good password for the access controls to their network is considered to be more
important. Unlike backing up files, this action may prevent a security incident.
• Other types of information traveling across the Internet are sensitive user identifications,
and files whose content is sensitive to the user. Users should take one of two precautions,
either encrypt the information or don't send it across the Internet. Sensitive user
identifications such as address, phone number, personal data, and perhaps most sensitive
of all, credit card numbers should not be sent across the Internet unless they are encrypted
at the source before sending it to the Internet. For example if you are sending a sensitive
document containing personal information or sensitive work related information such as a
newly set examination paper, ensure whether this information is kept confidential, then it
must either be encrypted, or sent some other way.
176
UNIT 12
Introduction:
This unit provides an introduction about e-commerce and e-learning, and identifies the benefits
and the future trends of the Internet
12.1 Introduction
We are living in an era where we use computers to do major tasks quickly which took hours to
complete a couple of decades ago. Paper driven processes are replaced by electronic means.
Above all, the global access to information has made a revolution in all sectors. Information is
enriched and customized to serve target groups.
Here we are going to discuss about these current developments and the future trends of the
Internet.
Today, almost everything is reengineered into electronic means. The revolution in the Internet
had made an immense impact not only in our day-to-day life but also in the business process and
the learning environment. Businesses are transformed into e-businesses; learning is transformed
into e-learning etc. Because of this transformation, there is a significant change in the way we do
things. We are not doing different things but we are doing things in a different way, which is
more efficient and effective, aren’t we?
Now, let us see how we can use E-commerce and make our lives easy.
Electronic commerce or E-commerce is a type of industry. This consists of buying and selling of
products or services over electronic systems such as the Internet and other computer networks.
The quality of business transactions has improved with the usage of telecommunications and data
processing technology.
Before explaining what E-commerce is in detail, let us see some simple examples of how
Ecommerce is being used.
• Individual purchasing books on the Internet.
• Tourist booking a hotel room from another country over the Internet.
177
• An organization buying computers using the seller’s interactive online system.
• A firm buying office supplies through an online auction.
• An individual transferring money from his account to his friend’s account using Internet
banking.
Here are some E-commerce technologies used by most of the business organizations.
• Mobile commerce
• Electronic funds transfer
• Supply chain management
• Internet marketing
• Online transaction processing
• Electronic data interchange (EDI) Inventory management systems
• Automated data collection systems. etc.
Does e-commerce only mean buying and selling of goods and services over the
Internet?
No. It’s not limited to mere handling of business transactions. The e-commerce includes a
larger functionality consisting of a complete system of services which supports the sales
processes and provides total account management.
Modern E-commerce usually uses the World Wide Web at least at one point in the transaction's
life-cycle. It may also make use of a wider range of technologies such as e-mail, mobile devices,
social media, and telephones as well.
E-commerce is commonly considered to be the sales aspect of e-business. It mainly consist the
data to facilitate the financing and payment aspects of business transactions. If you want to start
up a business, E-commerce would be useful to carry out your transactions in an effective and
efficient way. Let us examine some of the benefits of e-commerce both for the buyer and seller.
It is apparent that there are numerous advantages of using E-commerce. Because of the
technological breakthrough the web had reached millions of people quicker when compared to
television, radio and telephone. Here, we are going to discuss some benefits of E-commerce to
the business worlds and to the consumers as well.
Some benefits of e-commerce are listed below.
Benefits to the Business organization/seller:
• Improved Productivity
• Streamlined Business Processes
• Opportunities for New Businesses
• Global market place
• Low start-up and running cost Benefits to the customer/buyer:
• 24/7 trading
• Search facilities Benefits to both:
178
• Cost Savings
• Better Customer Service
Improved Productivity
By using E-commerce we can save a great deal of time. We can create, transfer and process a
business transaction easily using the electronic medium. Quite a lot of time that was spent in
entering and re-entering the data in the earlier decades is minimized. Human errors and
redundancy are eliminated which has led to an accurate data retrieval in quick time, ultimately
resulting in high productivity.
Cost Savings
Since we can communicate efficiently and since the time taken between the submissions of a
program for execution is quicker, it’ll be cost effective. Moreover, the businesses can reach out
the market so easily and this would also cut down the cost to a great extent. The transaction cost
too had plummeted down because of the usage of e-commerce.
24/7 trading
You can purchase items at any time. Only what you have to do is to place an order and the
product will be delivered to your home within a couple of days/week. This will be beneficial to
those who are working because they can buy products from home or wherever they are and
during whenever they want. Moreover, a person from Zambia can buy a product from America
without any trouble. You can purchase from anywhere around the world and during anytime you
want.
179
Low start-up and running cost
You do not have to open a shop. Instead, all you have to do is to buy servers to build and
maintain your web-site online. This will cost less than the money that you would pay for rent
when you have a shop. Furthermore, it is not necessary to have a huge staff to maintain the
website. As a whole, it costs less than running a shop.
Search facilities
Most of the E-commerce web-sites have an efficient search facility where you can find the
required product without spending much time.
As shown in figure 12.1, there are numerous other benefits that can be gained by using
Ecommerce.
The most common participants in e-commerce are the businesses, consumers and the
government. Based on the nature of the participants e-commerce can be subdivided into the
following:
• B2C – Business to Consumer
• B2B – Business to Business
• B2G – Business to Government
• C2C – Consumer to Consumer
• C2B – Consumer to Business G2G – Government to Government G2C, G2B, C2G
etc.
Let us discuss the four major types in detail.
181
Figure 25.3: Amazon website (B2C)
A few E-commerce websites which are popular in Zambia are listed below
:
1. iBuy.lk
2. Tradenet.lk (B2B and C2C trading portal)
3. myTrader.lk
4. WoW.lk
5. Ikman.lk
6.
7.
8. www.me.lk
9. Anything.lk (Figure 25.4) etc.
E-banking includes Internet banking mobile banking etc. E-banking offers value added
services that you do not normally enjoy at the banking counters. Most of the popular banks in
Zambia have introduced many fascinating facilities to their customers. Online access to any
of the account, transfer of funds to the customer’s own accounts or to the preferred accounts
of other Zambian banks, ability to bank online especially when they hold a joint account,
balance inquiry, inquiry about cheque book or request for new cheque book or stop payments
online, acquire visa card settlements, transactions and balances, Interest
& exchange rates and the ability to make payments of utility bills/scheduling bill payment
and
transfers on future dates are some of such facilities offered by the banks.
Let’s look into the electronic commerce business model, in which consumers offer products and
services to companies and the companies pay them. Doesn’t it look like the reversal model to the
182
traditional business model where companies offer goods and services to consumers (business-to-
consumer - B2C)?
The following figure 12.5 shows an example of C2B website – Priceline.com.
(C2B)
183
Figure 12.7: Cisco website (B2B)
12.4.4 C2C – Consumer to Consumer
In this category, consumer sells directly to another consumer. E-bay is one good example for
such kind of web. You can see this category if a consumer, who purchases jewelry, wants to sell
to another consumer via the Web. The following figure depicts the process of C2C.
184
Figure 12.9: eBay website (C2C)
2. www.ikman.lk
ikman.lk is a website where you can buy and sell almost everything. The best deals are often
done with people who live in your own city or in your own street. Buying and selling local
products to the local consumers is made easy. Further, ikman.lk has a wide selection of popular
second hand items all over Zambia, which makes it easy to find exactly what you are looking for.
So if you're looking for a car, mobile phone, house, computer or maybe a pet, you will find the
best deal on ikman.lk.
185
Figure 25.10
: ikman.lk website )(C2C
Figure25.11
: E-commerce as a-se
sub
t ofe-business
186
12.5 Basic Functions in the E-Commerce Site
Here we are going to look at some features commonly seen in the e-commerce web-site taking
Dell as an example.
Catalog Display
Businesses use the product catalog to display and order products in the e-commerce website.
Products can be shown in a block view or list view, from which you can navigate to the product
details.
• Block View(B2C)
The block view format displays a detailed upfront presentation of catalog products. The
block view displays more information about a product at first glance for the customer
than the list view does. For example, you can display basic eye-catcher texts and
hyperlinks about product details, in the block view.
Let us assume that you want to buy a laptop from Dell for your personal use. So you need to
know the configuration of the laptops and you have to compare them with your requirements and
you can go for a machine which is within your budget. Here is how you can view such details. 1.
Go to www.dell.com (Figure 12.12)
187
Click here
3. If you want to buy you can select it and personalize it and follow the instructions to buy. See
the image given below.
188
Click here Click here
Shopping Cart
A shopping cart is a piece of e-commerce software on a web server that allows visitors to a web
site to select items for eventual purchase.
Shopping cart which is also named as the shopping bag or shopping basket keeps track of the
items you have selected and allows customers to view the content of it, add new items or remove
items. To order an item you need to simply click on that item. The required details of the item
(price, product number, other identifying information) are stored automatically in the cart. It is
also possible to remove the unwanted items by unselecting the items before completing the
transaction. When you are ready to conclude the shopping UNIT, click of a button executes the
purchase transaction. Then it displays a screen that asks shipping and billing information and that
confirm the order. Some shopping cart software allows you to fill a shopping cart with purchases,
put the cart in virtual storage, and come back days later to confirm and pay for the purchases.
(Figure 12.14)
189
the seller’s Web server switch into a secure state of the communication. Other calculation
complications such as provisions for coupons, special promotions, and time-sensitive offers can
be happen at this stage. Some shopping cart software designed for small and midsize companies
provide connections to accounting software so that Web sales can be entered simultaneously in
the company’s accounting system.
When you hear the word e-learning what comes first into your mind? You might be thinking of
an online learning process or a web-based learning. But e-learning comprises of distributed
learning, network or web-based learning.
Since the letter “e” stands for electronic, e-learning activities occur by electronic means. This can
be performed by individuals or groups, working online or offline.
There are plentiful value added services in the Internet. They are also called as the high level
services. All these services run on top of the basic protocols. E-learning is also a value added
service which contributes a lot to the education. E-learning can be described as any form of
technology enhanced learning mechanism.
E-leaning had paved a path to an easier way of teaching and learning. In the modern world
people give priority to jobs and don’t have much time to spend on education. Moreover, people
tend to choose their courses depending on their limited budgets. So the ultimate goal of
eLearning is to overcome the limitations such as time, distance and resources. Thus the
knowledge and skills are transferred via Internet, intranet, extranet, audio or video tape CD-
ROM or even it can be a satellite TV. The content can contain a text document, an image file or it
can be an animation, audio or video. It can be a self-paced learning or it can be led by an
instructor. As you can see there are different types of e-learning methods and we are going to talk
about this in the next topic.
E-learning can be categorized based on some criteria. Some of such criteria are listed below:
• Underlying pedagogical assumptions
• Content model employed
• Size
• Distribution and level of network
E-learning has evolved in many ways in order to support a variety of users‟ needs. We can
classify the types of e-learning as follows:
1. Traditional e-learning
2. Rapid e-learning
a. Asynchronous
b. Synchronous
1. Traditional e-learning
190
Traditional e-learning is described as a content which consists of an in-depth knowledge with a
great preparation and probably produced by an expert.
2. Rapid e-learning
This is classified into two.
a. Synchronous
In this type of e-learning, learner and the instructor have a set time where they have the internet
classroom. During this prescribed time, the students log in and they can contact and discuss
problems related to the subject.
b. Asynchronous
The content is based on one aspect which is liable to change. Users can log in whenever they
want to do so and can access information any time. Some of the examples of asynchronous
eLearning are CDs, DVDs, Networks, Intranet and Internet.
If we consider a student, e-learning is very flexible, convenient and more interactive. E-learning
is accessible from anywhere, during anytime and to anyone. This sort of availability is an added
advantage to the learners who are working. Furthermore, the E-learning materials make the
visualization easy and aid in delivering a better understanding. In the teacher’s perspective
updating the contents is made easier. If there is a change in the content he/she can modify it
immediately and changes will appear in all course contents all around the world. Both the learner
and the teacher need not have to spend time and money on travelling. Instead they can access
Internet from home and learn in a hassle-free environment.
Even though there are more advanced interactive animations and videos encompassed in the
ELearning activity some are of the opinion that there is no personal touch as in a classroom.
In a classroom learning the teacher will pay an individual attention towards each student. This
would motivate the students to a greater extent. Teachers too can observe the students‟ reaction
and assume whether they have understood what they have learnt. Students can get into groups
and do their activities as a team. Working in teams increases student engagement and this
collective work of committed individuals would ultimately give a completely different
experience to the students.
191
On the other hand, in a classroom there can be only limited participants and this requires a space
and regular time table.
E-Government is the digital interaction among the Government, citizens, and the commercial
institutions. We can say that E-Government is a generalized term for state sector
computerization. Information technology is applied to different public institutions with the
intention of improving the effectiveness and efficiency of their service.
Legislature, judiciary and administration are some of the public services which can be upgraded
using ICT. This would add quality to the service to the general citizens, government agencies and
businesses.
If we see the websites worldwide there is a huge demand for entertainment services by almost all
age groups. This urge for innovative ideas for the purpose of entertainment had resulted in
flourishing abilities and creativity. What is more, this is considered to be one of the largest
industries online, internationally.
We have mentioned some online entertainments below which would take new dimensions:
• Online Radio
• Online TV
• Online movies
• Computer games
• Online News
• Online magazines
As mentioned in the previous section, definitely, the e-entertainment is taking a new dimension
rapidly in the internet. In addition to that there are some other concepts which initiate and evolve
in the near future with the emergence of latest internet technologies. However, predicting of
internet is not an easy task. But for the sake of your knowledge and for the completion of this
UNIT some identified future trends in the internet as per the sources available on the web are
extracted for you as follows.
Source: http://readwrite.com/2007/09/05/10_future_web_trends
Take a minute to remember how different life was in 1991. If you wanted to call a friend you
would have to use a landline, because mobile technology was still many years away from hitting
the mainstream. If you wanted to send a written message to relatives overseas you would have to
use the post office. It will be quite a while before domain names like Hotmail become
synonymous with email technology. So much has changed in the last 20 years, but how will the
world be different in 2020?
You can guarantee that the most innovative and revolutionary changes will take place in the
digital sector. So what will the internet look like in 2020?
192
1. More Centralized
We can see this trend developing at the present moment. Facebook, Google and Microsoft are
becoming incredibly powerful on the internet. Every few months we hear the same story –
Microsoft has bought Skype, Google has acquired YouTube; and there is little sign of these
digital giants slowing down.
7. Personal ID Number
With growing security concerns regarding online behavior, many security analysts predict that by
2020 some nations will have implemented a personal ID number for online users.
8. Mobile Internet
Mobile internet technology is very new, but many feel that by 2020 it will be the most popular
way to browse the web. Many sites will be specifically catered towards mobile devices.
MODULE REFERENCES
1. Mrs. C.Y. Munasinghe B.Sc. (OUSL); M.Sc. (Colombo): ICT Skills; (2013); http://www.ou.ac.lk
2. Alan Eardley, David Marshall, Rob Ritchie (1995): "Information Analysis", ACCA Textbook,
Certified Accountants Education Projects Ltd, London.
3. Leavitt, H.J. and T.L. Whistler ‘Management in the 1980s’, Harvard Business Review
November/December 1958. This is available in the Online Library.
4. http://WWW.opentuition.com/acca-notes
194
195