Professional Documents
Culture Documents
Final ICT Book 1
Final ICT Book 1
Final ICT Book 1
C O M M U N I C AT I O N S
T ECHNOLOGY
SE C ON DA RY 1
I C 3 I N T E G R AT E D
CONSULTANT:
Christian Li Luen Ching
EDITED BY:
Alan Sullivann
Any suggestions are welcome and can be sent to the author at vsharma471@yahoo.co.uk
with cc to the Publisher.
Table of Contents
CHAPTER
1 Computer Systems
7
CHAPTER
2 Computer Operations
65
CHAPTER
3 Computer Software
107
CHAPTER
4 Electronic Communication
181
CHAPTER
221
Revision paper 1
241
Revision paper 2
247
Revision paper 3
254
CHAPTER
1
Computer Systems
OUTPUT
(MONITOR)
PROCESS
(CPU inside)
INPUT
(MOUSE)
INPUT
(KEYBOARD)
A computer is an electronic device where data can be input and then processed to
produce output.
Data Information
Storage
CHAPTER 1
10
DATA INFORMATION
letters (e.g., a, b, c, ...) words (e.g., apple, boy, cat)
words and symbols a report, a letter, an essay
numbers a mathematical formula
examination scores comments, grades
musical notes a piece of music, a song
1. INPUT involves entering data into the computer using devices such as keyboard,
mouse, scanner, etc.
4. STORAGE involves keeping the data or information in a digital store such as DVD,
CD, Pendrive and Hard Disk, for future use.
Example 1: A Toaster
CHAPTER 1
12
A teacher wants to have a list of the marks for his/her Form I Red students in Computer
Studies and s/he needs to know their average mark.
• S/he will type the name of the students and their corresponding marks so as to
have a class list. This is input.
• The computer adds all the marks. Then it divides the sum by the number of
students in Form 1 Red. This is process.
• The average mark is calculated by the computer. This is output.
• It will store its value in the memory for later use. This is storage.
53 + 68 + 49 + 73 + 81 + 67 + 51
=
442 / 7
=
Student name Marks 63.1
Nagi 53
Marday 68 Processing
Storage
Sarah Jane 49
Kissoon 73 Average =
63.1
Beeknoo 81
Thomas 67 Output
Sharma 51
Input
The INPUT, PROCESS, OUTPUT, and STORAGE operations are often called the Data
Processing Cycle.
Computer Systems 13
?
Describe in simple words how the following computer operations are
carried out:
1. Searching a book title in a library.
2. Operating a washing machine.
3. Calculating the area of a rectangle, with sides 8 cm by 5 cm, on
a computer.
Quick Test
1. Fill in the blanks.
(a) __________ is processed to produce information.
(b) The stage of converting data into information is referred as
__________________.
(c) Sorting is an example of a _______________.
(d) Data can be _______________ permanently or temporarily.
(e) Data is ______________ and figures.
2. Give any two uses of a computer.
3. Explain what you understand by the Data Processing Cycle.
4. Give one difference between data and information.
5. Indicate whether the following statements are True or False:
(a) A computer is like a calculator.
(b) A computer is a special machine, which helps people to remember things and
solve problems.
(c) The method of getting instructions and data into a computer is known
as output.
(d) Data is the result of processed information.
(e) The correct sequence of a computer operation is input-output-process-
storage.
6. Write down the words after filling the missing words
(a) P _ O _ _ S _
(b) _ _ M P _ _E _
(c) D_ T_
(d) ST _ R _ _E
(e) O _ T P _ T
CHAPTER 1
14
Mainframe
Types of
Computers
Minicomputer Supercomputer
Microcomputer
Desktop Tablet PC
MICROCOMPUTER
Microcomputer is a small computer designed for personal use.
Microcomputers are also known as Personal Computers or simply PCs. They are
small in size and are of low cost. They also have a low computing power compared to
other computers.
Personal Computers are usually found at home. They are designed to be used by one
person at a time and perform tasks such as Gaming (Playing games), Internet Access
(Internet surfing or searching) and Emailing.
1. DESKTOP COMPUTER
Mouse
Keyboard
Desktop computers are designed to be used at a desk or table. They are typically larger
than other types of personal computers.
The main component, called the system unit, is usually a rectangular case that sits on
or underneath a desk. Other components, such as the monitor, mouse and keyboard,
connect to the system unit.
CHAPTER 1
16
2. LAPTOP
Laptops are portable, light and compact computers. They can be carried easily due
to their small size. They have a built-in battery which can supply electrical power for
approximately 8 hours.
Modern laptops are as powerful as Desktop PC and are used for similar tasks and purposes.
They have LCD (Liquid Crystal Display) screens which use low power.
3. PALMTOP
Palmtops are usually not very powerful. Some palmtops have fast Central Processing
Units (CPUs).
A Personal Digital Assistant or PDA is similar in size to a Palmtop computer but it is more
compact. It typically has no keyboard. It uses a touchscreen for all data input.
Generally speaking, there is very little difference between a PDA and a modern
mobile phone.
CHAPTER 1
18
5. TABLET PCs
Stylus
Tablet PCs simply called tablets have a touch screen and either a stylus, digital pen or your
finger is used for all operations, eventually eliminating the keyboard.
Tablet PCs are changing the way we do business. They help professionals to work from
home. Tablets are light and portable.
Computer Systems 19
MINICOMPUTER
Minicomputers which are also known as mid-range servers can normally support up to
several hundred users at the same time.
MAINFRAME COMPUTER
CHAPTER 1
20
A mainframe is a large, expensive and powerful computer that can connect many users
simultaneously.
Typical users of mainframes include banks, insurance companies, and airlines with
sophisticated reservation systems.
SUPERCOMPUTER
A supercomputer is the fastest, most powerful and most expensive computer used for
applications that require complex and sophisticated processing.
?
exploratory projects and weapons research.
Quick Test
1. Indicate whether each of the following statements is True or False:
(a) A mainframe computer can handle vast amount of information at a time.
(b) Supercomputers are the only types of computers on which we can
play games.
(c) The minicomputer is much more powerful than the mainframe computer.
(d) A desktop computer is portable.
(e) All computers have the same basic components.
2. Fill in the blanks.
(a) The smallest computer is the _____________.
(b) The _________________ computer is the largest and powerful computer.
(c) A __________________ computer can do several different jobs at the
same time.
(d) Laptop computers are also called ______________computers.
(e) Minicomputers are commonly used as ___________ in network
environment.
3. Differentiate between a laptop and a desktop computer.
4. List the features required in classifying computers.
5. Make a table showing the differences between microcomputers, minicomputers,
mainframes and supercomputers.
CHAPTER 1
22
A computer system consists of physical parts and computer programs. The physical
parts are known as the hardware and the computer programs are known as
the software.
Computer system
Hardware Software
Processor Peripherals
HARDWARE
Hardware is the physical parts that we can see and touch such as the system unit and the
parts that are connected to it.
Monitor Printer
System Unit
Microphone
Hard Drive
Flash Memory
Floppy Disks Speakers Card reader
Let us see how the different pieces of hardware are organized in a computer system.
All devices connected to the Central Processing Unit are called Peripherals.
SOFTWARE
Software is the general term used to denote all programs in a computer.
A set of instructions that has been designed to perform a specific task is called
a program.
CHAPTER 1
24
Computers use microchips. Appliances containing microchips are widely used nowadays
at home, in office and in industries. For example, a microwave oven contains a microchip
which enables us to heat or cook our food automatically. There are also other devices
which use microchips.
Microchip
CPUs come in a variety of speeds known as 'clock rates'. It refers to the number of cycles
per second built into the processor chip.
Clock rates are measured in 'Hertz'. Generally, the faster the clock rate, the faster the
performance of the computer.
One Hz means 1 tick per second (or one cycle per second).
One kilohertz (kHz) means 1000 cycles per second.
One Megahertz (Mhz) means 1 million ticks per second.
A typical, modern, fast CPU runs at around 4.3 GHz. This means that it can perform almost
4 billion instructions every second.
MOTHERBOARD
The motherboard or system board is the main circuit board in the system unit.
Graphics Card
Slot
PCI Slot (Can
connect Sound
Cards etc) BackPanel with
connections for
peripherals and USB
Memory
Slots for Hand Disk
Drives and DVD-ROMS
CPU Slot
RAM (Memory)
Slots
The motherboard also contains expansion slots into which other circuit boards can be
inserted for the expansion of the computer system.
CHAPTER 1
26
EXPANSION CARD
EXPANSION SLOTS
MOTHERBOARD
MEMORY (RAM)
MAIN MEMORY
Main Memory is a temporary area for holding data, instructions and information.
A computer usually loads the data and instructions from storage into memory and then
executes them.
The size of memory is measured by the number of bytes available for use.
For example:
J O H N
0100 1010 0100 1111 0100 1000 0100 1110
Byte Bit
Figure 1.23: Using bit and Byte to show how 'JOHN' is stored
Another example:
I am happy contains 10 bytes
I space a m space h a p p y
CHAPTER 1
28
Computers rely on memory to run/execute software programs and perform most tasks.
The types of computer memory are:
So ROM chips contain programs stored permanently by the manufacturers which are
known as firmware.
An example of a firmware is the BIOS (Basic Input Output System). It contains the
computer's startup instructions. It is also known as the 'bootstrap' program.
Computer Systems 29
?
Can you guess the number of bytes required to store the following?
1. I love my mother.
2. Mauritius is a beautiful island. It is found in the Indian Ocean. It got its
independence in 1968.
Quick Test
1. Fill in the blanks.
(a) ________________, ________________ and ______________ are the parts
of the internal memory.
(b) A microprocessor is nothing but a ________________.
(c) A group of eight ____________ forms one ____________.
(d) _______________ is used to speed up the execution of the computer
programs.
(e) A ______________ is a set of instructions given to the computer.
CHAPTER 1
30
ROM RAM
CHAPTER 1
32
INPUT DEVICES
Entering data or instructions into a computer system is called input.
Computer
Input
Data In
Device
KEYBOARD
The most common input device is the Keyboard.
A keyboard contains keys that allow a user to enter data and instructions into
the computer.
Computer Systems 33
Most keyboards use the QWERTY layout. The name comes from the keys on the top row
which spells QWERTY.
MOUSE
A mouse is the most widely used pointing device on personal computers.
Pointing device (like a mouse) is used to move and control a pointer (cursor) on
the screen.
CHAPTER 1
34
Scroll Wheel
Right Button
Left Button
Menu
activated by
right click
A mouse is a pointing device which is more effective to use than the cursor key on
the keyboard.
Some modern mouse devices are now wireless (do not need a wire to connect to
the computer).
TRACKERBALL
A trackerball is a pointing device used to control the cursor on the screen. Users control
the pointers on the screen by rotating the ball with their hand.
A trackerball is appropriate when the desk space is limited. It can be used as an alternative
input device to the mouse.
JOYSTICK
A joystick is a pointing device which performs similar functions as a mouse
and trackerball.
Fire button
for Gaming
Control Stick
Control
Buttons
The pointer on the screen can be controlled by moving the stick and buttons are used to
make selections.
They are used in simulators to mimic actual controls (like flight simulators and driving
simulators). They can also be used to control machinery (like cranes).
DIGITAL CAMERA
A digital camera takes pictures and stores the images digitally in memory (or memory
card) and can be transferred to a computer via a Universal Serial Bus (USB) cable.
CHAPTER 1
36
WEB CAM
Webcam (web camera) is a very basic video camera used to feed live video into a
computer. It is connected to the computer through a USB cable.
It is used for video chats (for example, using a messenger application such as MSN
Messenger or Skype).
SCANNER
Scanners are used to enter information from hard copies, such as printouts or
photographs, into the computer. The hard copy is scanned by a light source and produces a
digital image.
A scanner converts printed text and graphics into a digital form that can be further
processed by the computer.
Many scanners also include Optical Character Recognition (OCR) software, which can
convert an image of text into a text file that can be edited.
Computer Systems 37
BARCODE READER
The black and white lines printed on certain products such as books and cans are called
barcodes or Universal Product Codes (UPC).
Bar codes represent numbers. The numbers are codes of information about each item like
country of origin, manufacturer code and item reference number of the product.
Barcode Reader Readable Barcode Barcode Reader reads barcode
A bar code reader is used to read barcodes using light which is reflected and translated
into digital information.
Bar code readers are widely used in supermarkets, department stores, bookshops, etc.
SENSOR
A sensor is an input device that can detect external changes in an environment.
External changes include levels of light, temperature, sound, position, pH value and humidity.
Sensors are used extensively in monitoring, automobiles, medicine, home and also in
computer control systems.
For example, in a washing machine there may be sensors monitoring water level, water
pressure, pH, temperature, alarm and so on.
CHAPTER 1
38
GRAPHICS TABLETS
Stylus
A Graphics Tablet (digitising tablet or graphics pad or drawing tablet) consists of a flat
pad (tablet). A special pen called stylus is used with the tablet.
Stylus and graphics tablet are mainly used for computer-aided design and drafting by
architects, mapmakers, artists and designers.
TOUCH SCREEN
Touch screens are often used in information kiosks located in department stores, hotels,
airports and museums.
Computer Systems 39
MICROPHONE
A microphone is an input device that can input sound or speech
into the computer.
CHAPTER 1
40
?
1. Can you suggest the most appropriate input devices to perform the
following activities?
(a) Typing a document.
(b) Playing solitaire.
(c) Capture of sales data in a shop.
(d) Inserting pictures in a school website.
2. A microprocessor-controlled sewing machine uses a touch sensitive pad
for input.
(a) What is a touch sensitive pad?
(b) Why is it an appropriate input device in this case?
(c) Give another device in the home where a touch sensitive pad may
be used.
Quick Test
OUTPUT DEVICES
Output is processed data called information.
CHAPTER 1
42
1. MONITOR
The monitor or visual display unit (VDU) is one of the most common output devices. It is
used to display text and pictures.
Screen resolution refers to the number of pixels that can be displayed on the screen. It is
often expressed in dots per inch (dpi).
The higher the resolution, the more pixels the monitor has and the better is the image
quality. A high-resolution picture takes up more storage space and it takes longer to process,
and requires a fast processor to animate smoothly.
1. MONOCHROME MONITOR
2. COLOUR MONITOR
Colour monitors display text and graphics in multiple
colours.
CHAPTER 1
44
CRT Monitor
Bulky and heavy
A cathode-ray tube (CRT) monitor is a type of monitor that has been around for years and
is large and boxy.
CRT monitors are bulky and heavy. They take up a lot of desk space.
A CRT monitor consumes a lot of power and is becoming rare as flat-screen monitors are
now taking over.
Nice to look at
and takes up TFT Monitor
minimum space
Flat screen monitors are becoming cheaper and these are taking over CRT monitors as
the main output device.
TFT and LCD are two of the technologies used in flat-screen monitors: TFT is Thin-Film-
Transistor, and LCD is Liquid-Crystal Display.
A multimedia (or video) projector receives signals from computers, televisions and DVD
players and projects the image onto a large screen.
They are used in situations where a very large viewing area is required, for example during
presentations, for advertising, or in your home for watching movies.
Multimedia Projector
Remote control
2. PRINTER
The printer is an output device. It prints information from the computer and the printed
paper is called a hard copy. There are several types of printers.
A higher number of pins on the print head means that more dots are printed, hence
resulting in a higher print quality (example, a 24-pin printer has better print quality than a
9-pin printer).
CHAPTER 1
46
The speed of a dot-matrix printer is in the range of 100 to 400 characters per
second (cps).
Continuous
paper
Dot-matrix
Printer
Print resolution means how closely the printer can print dots. Print resolution is measured
in terms of dots per inch (dpi).
So a low-resolution means fewer dots per inch while a high-resolution means more dots
per inch.
Printer Type Laser Low resolution dot matrix High resolution dot matrix
Ink-jet printers can produce Letter-Quality (LQ) text and graphics in both black-and-white
and colours.
3. LASER PRINTER
Laser printers are also known as page printers because they process and store the entire
page before they actually print it. Images are transferred onto a piece of paper with 'ink
powder' using a laser beam.
Most laser printers today can print text and graphics in very high quality resolutions,
ranging from 600 dpi to 1200 dpi.
Laser printers can print text at a speed of four to over thirty pages per minute (PPM). The
laser printer resolution is much better than dot matrix printer.
They are commonly used where quick and good quality printouts are needed. They are
quiet while printing.
CHAPTER 1
48
Toner
Laser Printer
Printout
3. PLOTTER
A plotter is a device used to produce high-quality drawings that can be quite large
(for example, with widths up to 1.5m).
Plotters draw images on the page using coloured pens which are moved around the paper
by a computer.
Plotters are often used by designers and architects to produce very large and accurate
documents such as blueprints for buildings.
Computer Systems 49
Quick Test
1. Fill in the blanks.
(a) The information we get from the computer is called_________.
(b) The speed of a laser printer is measured in _____________.
(c) A ____________ helps computers to output voice messages, music, and data
as sound.
(d) The quality of pictures displayed on the screen is dependent on the
____________________.
(e) A ______________ generates its output using pens.
2. The diagram shows a monitor.
(a) Name the type of monitor.
(b) State one advantage of using this monitor.
(c) What is a monochrome monitor.
(d) Name two types of colour monitor.
CHAPTER 1
50
STORAGE DEVICES
Data and information are stored in computer storage so that they can be retrieved
whenever they are needed later on.
Storage medium refers to the media on which data, instructions and information
are kept.
HARD DISK
A hard disk is a round metal disk coated with a magnetic material. The hard disks are
sealed in a metal frame.
Hard disks have very large storage capacity. They can be used to store vast amounts of
data, such as films, files, games and software.
CHAPTER 1
52
Fixed hard disk is found inside the CPU and is not portable.
Platters
Read/Writer
Head
Portable hard disk works in a similar way to fixed hard disk but is connected to the
computer externally using a USB cable.
Up to 3TB in capacity
Protective Casing
USB connectivity
Portable hard disk drives allow very large amounts of data to be transported from
computer to computer.
FLOPPY DISK
A 3½ Floppy disk is a removable, portable and cheap medium with has low-capacity
(1.44MB) storage.
Computer Systems 53
Floppy disks have become obsolete now. They have been replaced by higher capacity
technology such as CD-ROMs, DVDs and USB memory sticks.
A laser beam reads these dots, and the data is converted into an electrical signal which
is finally converted into the original data. This process is known as ‘burning’ data onto
a disc.
1. CD
2. DVD
3. Blu-ray
1. COMPACT DISC
Compact Disc (CD) is a very common storage medium. It uses light for reading and writing
information. It can hold 700 to 800 MB of data.
Compact Discs are used to distribute all sorts of data such as software (for example, office
applications or games), music, and electronic books (for example, an encyclopedia with
sound and video.)
CHAPTER 1
54
3. BLU-RAY
A Blu-Ray disc has the largest capacity of all the optical media. It can store up to 100 GB
of data.
Blu-Ray
Drive
Blu-Ray
Disc
They can be used to transfer or for backup data and files between computers.
The memory sticks use solid state technology and are usually connected to the computer
via USB ports.
Pendrive
USB Connectivity
5. FLASH MEMORY
A memory card or flash memory card is a solid-state electronic flash memory data
storage device used with digital cameras, mobile computers, telephones, music players,
video game consoles and other electronics.
The flash memory cards are also known as Secure Digital Cards (SD Cards).
These are known as solid state storage and have a storage capacity of up to 64 GB.
SD Card
(Flash Memory)
Micro SD Card
(Flash Memory)
?
Figure 1.57: Memory card
6. COMMUNICATION DEVICES
Communications devices enable two or more computers to exchange items such as data,
instructions and information with each other.
CHAPTER 1
56
Quick Test
1. List the principal advantages of each of the following types of secondary storage:
(a) Hard disk.
(b) Optical disk.
2. DVD is now used to store computer games. Give THREE advantages and ONE
disadvantage of supplying games on DVD.
3. Fill in the blanks.
(a) A ________________ is a small memory card that is plugged into the USB
port and functions as a portable hard drive.
(b) A ___________________ device allows us to save programs and data for
later use.
(c) A ___________________ is a communication device that connects the PC to
the Internet using a telephone line.
(d) A ___________________ is a device on which data can be written and erased
many times.
(e) __________________ stores data and programs that can be accessed directly
by the processor.
Computer Systems 57
CHAPTER 1
58
• The input devices which are used to enter data into the computer are
keyboard, mouse, etc.
• Output is what we receive after the computer processes the input.
• Soft copy and hard copy are the two types of output.
• Output devices are used to display information in different formats such
as printer, monitor, etc.
• The storage devices differ in terms of storage capacity and the common
examples are hard disk drive, DVD, CD, Blu-ray, etc.
Computer Systems 59
CHAPTER 1
60
CHAPTER 1
62
2. Indicate whether the following statements are True or False. [1 mark each]
(a) A sensor is an output device. ( )
(b) An automatic machine contains microchips. ( )
(c) The data in RAM will be lost once the computer is switched off. ( )
(d) A plotter is an input device. ( )
(e) Displaying a character on the screen is an example of a processing operation.
( )
(a) Processing
_______________________________________________________________
_______________________________________________________________
(d) Hardware
_______________________________________________________________
_______________________________________________________________
CHAPTER 1
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
CHAPTER
2
Computer Operations
a) Start a computer.
b) Shut down a computer.
c) Use a mouse and a keyboard.
d) Explore Microsoft Windows.
e) Use files and folders.
f) Search for help
66
Power Button
Turn on the computer by
pressing the Power Button.
If everything is alright, a menu with appropriate login dialog or a welcome screen will ask
you for a user name and a password.
After login is successful, a final screen showing the desktop and taskbar appears.
Desktop Icons
Desktop
Menu
To start a program, Microsoft Windows allows the user to access the program in three
different ways:
As you can see, the desktop has a number of small pictures known as icons. Each
icon represents a command, function or disk drive.
2. Click on the start button, select All Programs tab and then click the
appropriate program.
We will learn more about Windows Explorer later in the next lesson.
CHAPTER 2
68
Quick Test
1. What do you understand by booting a computer?
2. List the steps in starting a computer.
3. List the different ways to start a program in Microsoft Windows.
4. Label the different parts of a window.
After selecting a shutdown option, the computer may take some time to shut down
all the open applications and background processes. You will be prompted to save any
documents that have not been saved yet.
CHAPTER 2
70
Quick Test
1. What do you undertand by 'shut down' a computer?
2. List the steps involved in shutting down a computer.
3. Differentiate between Log off and Lock.
4. Brieftly discuss the different options for quitting the computer.
The following are the four basic operations a user can carry out using a mouse.
71
Computer Operations
Start with
With a quick motion, the mouse may accelerate faster than your hand moves. This is
especially helpful when moving all the way across large screens.
Mouse Cable
Mouse Cable
Right Button
Left Button
Scroll Button
Mouse
CHAPTER 2
72
1. Point the mouse on the start button and left click on it. The following
screen appears.
Point
• Double-Click: Click twice quickly on the left button. It will select and open files
from the icon on which the cursor is pointing.
73
Computer Operations
Paint Program
1
Click on
Start button
Figure 2.8: Double click of a mouse
Try this:
Before drag
After dragging
the location of
the icon changes
CHAPTER 2
74
Qwerty Keys
Function Keys
Numeric Keys
Cursor Keys
Special Keys
2. Function keys are numbered F1, F2, F3 ... and, when pressed, each one of them
performs a different function.
3. The keypad is on the right side of the keyboard and has the following keys:
• Ten numeric keys (0-9).
• Num Lock Key (must be switched on or else the numeric keys will not function).
• Some special and mathematical keys (/, *, +, -, etc...).
Number Lock
4. The cursor control keys are used to move the cursor on the screen.
• The cursor control keys consist of four arrow keys:
• These keys are used to move the cursor or the insertion point on the screen.
CHAPTER 2
76
Moves the cursor to the beginning of the current line you typed
5. The special keys have a fixed function or job in any application software. Special keys
are programmable and perform special functions when pressed. Examples of some
special keys are:
Print Screen Print Screen usually located at the upper right hand corner
of your keyboard. It copies the screen contents onto the
clipboard.
Delete/Del Erases the character to the right of the cursor.
CHAPTER 2
78
A word processing program is designed to make it as easy as possible for you to create the
document you want and to make it look the way you want. Most modern word processing
programs share a common approach. There are enough differences, however, to drive
?
users who are trying to decide what to buy just a bit crazy!
Use the internet or any reference books to suggest some keyboard short
cuts, the use of Alt keys and Windows keys.
79
Computer Operations
Quick Test
1. State whether the following statement is True or False.
(a) The escape key is used to cancel a command. ( )
(b) An icon is a cursor. ( )
(c) Arrow keys can be used in selecting options from a menu. ( )
(d) A mouse is a pointing device. ( )
(e) To drag an item, move the cursor without pressing any button. ( )
2. Match the following by writing the correct letter in each box on the right.
CHAPTER 2
80
Key Function
Num Lock
Page Up
End
Space Bar
Shift
Function Key
Print Screen
Alt
Home
Pause
Insert
Menu
Del
Page Down
Desktop
Taskbar
Microsoft Windows makes use of a graphical user interface (GUI). It consists of a window,
icon, mouse and pointer (WIMP) interface to allow a friendly environment.
The Desktop is the background screen picture on which different items are arranged.
The main purpose of the desktop is to hold shortcuts, documents and icons that will help
you work efficiently. At the bottom is the start button, taskbar, pinned application, open
application and notification area showing the time and date.
The table below gives you an overview of the common items found on a desktop.
Icon Icons are the small pictures which you can see on the desktop of a computer.
It gives you quick access to programs. For example, My Computer.
Start Button Clicking the Start button shows the main menu.
Pinned application Next to the Start Menu button, holds shortcuts to your frequently
used programs.
Open application Icon gains a border when a document is open in the application.
Notification area Notification area, or tray, at the far right of the Taskbar is used to show
icons for programs that are awake and hanging around in the background,
like the clock, anti-virus, and scheduling programs.
Shortcuts A shortcut points to the file that runs a program, like MS Word. A shortcut
may have a small arrow at the bottom left of the icon.
Document Files can actually be stored as part of the Desktop. This icon represents
a Word document rather than a shortcut to the application. There is no
arrow at the bottom left like there is for a shortcut.
CHAPTER 2
82
When a program such as Microsoft Word is launched, a window, as shown below, will
appear on the desktop.
Document Application
Title Name Minimize Maximise
Title Bar Close
Ribbon
Scroll Bar
Document
Scroll Bar
Icon Function
Minimise A minimised program window is one that takes up no space at all
on the desktop; only its taskbar button is visible.
Maximise When a program window is maximised, it covers the entire
desktop.
Restore button is visible when a window is already maximised.
Restore
Closes the current window or quits the current application.
Close
2. Click on the Minimise button on the right of the Title Bar on the Control
Panel window.
Where does the Control Panel go? It is minimised to a button on the taskbar.
3. Click on the taskbar button for the Control Panel. The window pops back
into view on the desktop as the active window. The color of the Title Bar is different
when a window is inactive. A good color scheme will make the difference obvious.
4. Click on the Maximise button on the right of the Title Bar. The window now
takes up the whole desktop. Notice that the Maximise button has changed to
the Restore button .
5. Click on the Restore button on the right of the Title Bar. Your Control Panel
reverts to its previous size.
CHAPTER 2
84
MENU
A menu is a list of choices presented to the user by an interactive program.
Menu bar
Menu
DIALOG BOX
A dialog box is a special purpose window which asks user for input.
For example, when you have chosen to save a file (in Microsoft Word) to disk.
In this dialog box, you just have to fill in the three variables as marked and select the
save button.
1. Save in: Refers to the location or name of the folder where you want to save
the file.
2. File name: Needs a short but descriptive name so that you can recognise later what
file it is.
3. Save as type: Actually refers to the type of file so that the computer can understand
which program to open later.
CHAPTER 2
86
Quick Test
1. Explain the following terms:
(a) Window
(b) Dialog Box
(c) GUI
(d) Menu
(e) Icon
2. Label the parts numbered 1 to 6 with the appropriate words given below.
Vertical Scroll Bar Minimise Button Title Bar
Close Button Maximise Button Horizontal Scroll Bar
1 2 3 4
6
87
Computer Operations
(a) There can be more than one window on the screen at the same time ( )
(c) A desktop is a special purpose window which asks user for input. ( )
(e) The ______________________is the first screen which appears when the
computer is switched on.
CHAPTER 2
88
The files you just saw are in paper-based form. In the computer, files/documents are kept
in electronic form.
Each document, whether it is a plain text file or a letter in Word , or music , or the
directions for a program , is called a file.
For example:
• Select the folder My Documents.
• When clicking on the icon, it opens to display all files and folders that are stored
in it.
folder folders
Files
To ease tracing of files, we group files in folders under the directory also called root
directory or root folder.
89
Computer Operations
For example,
• usually refers to floppy drive.
• usually refers to hard drive, if you only have one hard drive.
• usually refers to CD or DVD drive.
The folder My Documents contains different files where each file is given a name
which is referred to as the file name, like: Database1, navigation, Question 2
and website.
The File Extension gives an indication of the type or category of the file.
In Office 2007 onwards, 'x' is included in the extension. In the older versions no 'x' is in
the extension.
CHAPTER 2
90
Examples:
C:\My Documents\Letters\Mary.doc
The drive and folders that you must go through to get to the folder or file that you want
is called path.
?
A path always starts with a drive letter.
Draw a diagram to show how you would access the file Test
E:\Form1\MgssMoka\1Red\Computer\Group1\Test.pdf.
List the number of folders and subfolders available in the above example.
CREATING A FOLDER
To create a folder, follow the following steps:
Steps:
1. Right click on a blank space on the desktop.
2. A pop-up menu will appear and select the NEW option.
3. Select Folder.
91
Computer Operations
CHAPTER 2
92
2. DELETING A FOLDER
Deleting means erasing or removing a file or a folder. The different steps to delete
a folder:
CHAPTER 2
94
3. RENAMING A FOLDER
Select the folder to be renamed and follow the steps below.
1. Right click and choose Rename option from the menu.
2. Give the name you want and press ‘Enter’ on the keyboard.
95
Computer Operations
Choose Help and Support from the Start menu to open the Windows Help and Support
dialogue box.
CHAPTER 2
96
We navigate through the Windows Help and Support program the same way you would
through a browser or folder.
To move back one page, click the little blue Back arrow in the upper-left corner.
Quick Test
1. State whether these statements are True or False
CHAPTER 3
98
Write the number of the six tasks that are done by the following actions:
CHAPTER 2
100
CHAPTER 2
102
(b) Look carefully at the picture below and answer the questions that
follow.
103
Computer Operations
i. From the following list, underline the name of the bar that shows
the title: [1 mark]
Scroll bar, Menu bar, Status bar, Title bar
_______________________________________________________________
ii. From the following list, underline the name of the bar marked
number: [1 mark]
Title bar, Scroll bar, Menu bar, Address bar
_______________________________________________________________
iii. The number of objects contained in this window is:___________________
[1 mark]
iv. The icon number indicating the Standard Buttons toolbar is: ____________
______________________________________________ [1 mark]
v. The icon number indicating the Address bar is:_______________________
[1 mark]
vi. The number on the scroll bar that allows scrolling down is:
______________________________________________ [1 mark]
vii. Number shows how the mouse changes when it gets to this area
on the window. Write a brief description about what happens when you
press the mouse button and drag it. [1 mark]
____________________________________________________________
____________________________________________________________
viii. Write the letter assigned by the system to any one of the
hard disks? [1 mark]
____________________________________________________________
____________________________________________________________
ix. How many removable backing storage devices appear in the
picture? [1 mark]
____________________________________________________________
____________________________________________________________
x. Write down the name of a removable backing storage device which appears
in the window. [1 mark]
____________________________________________________________
____________________________________________________________
CHAPTER 2
104
ii. Write the full path of MyFish.bmp once it is saved as shown above.
[2 marks]
_________________________________________________________
_________________________________________________________
iii. Describe how Karen can completely remove the file Fish.txt from the
hard disk.
[2 marks]
_________________________________________________________
_________________________________________________________
CHAPTER 2
106
________________________
________________________
________________________
3
Computer Software
For example, some instructions direct the computer to allow you to input data from a
keyboard and store it in the memory.
A software bug is the common term used to describe an error, mistake, failure, or fault
in a computer program that produces an incorrect or unexpected result.
Writing user friendly and bug free software requires lots of programmers’ time, efforts
and costs. For this reason, good software is expensive.
Quick Test
1. Explain the following terms:
(a) Software
(b) Debugging
Computer Software 109
(c) Program
(d) Bug
2. Why is software expensive?
3. What are the features of a good software?
4. Why is it important to remove errors from a program?
CHAPTER 3
110
System software serves as the interface between the user, the application software and
the hardware.
?
Figure 3.3: System software interface
Make a list of some of the utility programs you use on your computer.
APPLICATION SOFTWARE
Application software refers to programs designed to perform specific tasks for users.
Application Software
(Tailor-made Software)
Ready-made software serves more general purposes and can be used by many
organisations. Ready-made software is also known as packaged software or
simply packages.
Big companies and government departments create their own application software. It
takes a lot of time and effort to create such specific application software.
CHAPTER 3
112
Quick Test
1. What type of system software would perform the following tasks?
(a) Clean an infected disk.
(b) Provides user name and password.
(c) Develop a program to monitor patient heart beat.
(d) Make backup copies.
2. Differentiate between
(a) System software and Application software.
(b) Tailor-made software and ready-made software.
3. State whether the following statements are True or False:
(a) Computers can function without software.
(b) Tailor-made software is readily available and can be installed quickly
and easily.
(c) A package is a collection of programs.
(d) Linux is an example of a utility software.
(e) A person must consider the type of operating system used in his computer
before selecting a package.
4. Fill in the blanks with the appropriate words.
(a) An ______________________ is an example of a system software.
(b) Spreadsheet is an example of ______________________.
(c) Application software provides _________________ so that user interacts
with the computer.
(d) ________________ is written to the specification of an organisation
or customer.
(e) ________________ languages are used to create software.
Computer Software 113
GRAPHICS PACKAGES
A graphics package allows you to create and edit drawings.
The main types of graphics packages are painting and image editing software.
• Paint software allows a user to draw pictures, shapes and other graphical
images using various tools such as pen, brush, and paint bucket which come with
the program.
Examples are Microsoft Paint, Paint Shop Pro.
CHAPTER 3
114
Colour Box
Toolbox (palette) Minimise Maximise/Restore
Close/Exit Button
Drawing Area
The tool box contains many tools which can be used for drawing pictures.
The colour box has different colours. This is just like your colouring pencil box. You can
select a colour from the colour box to colour the pictures that you have drawn.
CREATING A DRAWING
It is very easy to draw using Microsoft Paint and, if you are a beginner, the following
instructions will be very useful to make you a cartoonist or a graphic designer:
CHAPTER 3
116
2
3
4
1
Note: Drawing different shapes such as squares, rounded rectangles, circles and polygons
using the tool box will follow the same steps as above.
CHAPTER 3
118
Different tools are available in the tool box for colouring your drawing, such as: brush
tool and fill colour tool.
5. Class Activity
These are the following steps which show how to draw your famous Bugs
Bunny cartoon.
First step is to draw two circles. Second step is to draw a curve from
left circle edge to bottom middle.
Third step is to draw a curve from Fourth step is to erase the inner
right circle edge to bottom middle lines to make a heart Shape.
to join the other curve.
Note that you can just draw the heart
shape by selecting the heart shape from
the shape option in the ribbon.
CHAPTER 3
120
Fifth step is to draw lines from Sixth step is to draw the mouth with
middle to make moustaches. tongue and teeth.
?
Figure 3.12: Creating Pictures with Ms Paint
Draw a house.
CHAPTER 3
122
WORD PROCESSING
Word processing software, also known as a word processor, is used to create, any type of
document such as letters, reports, essays, textbooks, etc.
Before you can use any application software, you need to launch or run it.
Horizontal
and Vertical Insertion Point Document
Ruler
Horizontal
and
Vertical
Scroll
Status Bar
CHAPTER 3
124
The key for the various elements of the working screen is given as:
Element Function
Title Bar A Title Bar contains the word processor name and the document name.
Menu Bar The Menu Bar is generally found directly below the Title Bar. The Menu
bar displays the menu. It starts with the word File and clicking an option
will launch a pull down menu with related commands.
Ribbon A display of commands and features that are intended to make it easier
to find the tool or command that you want.
Horizontal They are used to measure and define the margins of the document.
and Vertical
Ruler
Document The rectangular area where text is typed or pictures inserted.
Insertion A vertical line blinks to indicate where the next letter typed will
Point be inserted.
Vertical and Use these to view hidden portions of large documents.
Horizontal
Scroll
Status Bar The Status Bar appears at the very bottom of the screen and provides
such information as the current page, current section, total number of
pages, inches from the top of the page, current line number and current
column number.
Figure 3.16: Key Elements of a Word Processing Screen
You have opened the MS Word software. Now type the following text:
CHAPTER 3
126
To Save a document
As you have seen, you have two options in Microsoft Word to save a document:
• Save
• Save As
3
Select location where you
want to save the file
Enter the name of the document
4
3. Select the location where you wish to save the document using the drop-down
menu.
4. Enter a name for the document, for example “Exercise 1”.
5. Click the Save button.
Using the Save command saves the document in its current location using the same
file name. If you are saving for the first time, select Save, the Save As dialog box
will appear.
CHAPTER 3
128
EDITING TEXT
January 2010 has been a profitable month and the company has shown growth
in many areas. Ad sales are up by 23% and capital expenditures have decreased
since 4th quarter in the Sales Department. The sales team hired a new design
specialist, the post of VP of sales was filled, a new Sales Chief position was
created, and the sales team accrued 14 new clients including one national chain.
Additionally, online ad sales doubled since July of last year. Statistics indicate
that sales in most markets with the use of online ads and our clients are reading
those statistics and responding to them. Marketing trends indicate that this
growth will continue.
TO INSERT TEXT
1. Move your mouse to the location you wish text to appear in the document.
For example, before “ The sales team hired…”.
CHAPTER 3
130
Insertion
Point
The Manager of the company has to review his strategies and has decided to hire an
experienced staff.
TO DELETE TEXT
Open an existing document, for example “Practical 1”.
From the above text, erase the words “a new design specialist, the role of VP of sales
was filled,”.
Backspace button
Computer Software 131
1. Put your cursor just after the character ',' as shown below.
2. Press Backspace to erase the characters in the sentence. Your sentence should
be as follows.
CHAPTER 3
132
Delete button
1. Put your cursor just before the letter “a” from the sentence “a new design
specialist, the role of VP of sales was filled,”.
2. Now press delete button to delete the characters. Your sentence should be as
shown below:
TO SELECT TEXT
1. Place the insertion point next to the text you wish to select.
2. Click the mouse and, while holding it down, drag your mouse over the text to
select it.
3. Release the mouse button. You have selected the text. A highlighted box will
appear over the selected text.
CHAPTER 3
134
Example: The sales team hired a new design specialist, the role of VP of sales was
filled, a new sales chief position was created, and the sales team accrued
14 new clients, including one national chain.
2. Click the Copy command on the Home tab. You can also right-click your document
and select Copy.
Computer Software 135
3. Place your insertion point where you wish the text to appear.
Example: At the end, after the words “will continue”.
4. Click the Paste command on the Home tab. This text will appear:
CHAPTER 3
136
Example: The sales team hired a new design specialist, the role of VP of sales was filled,
a new sales chief position was created, and the sales team accrued 14 new
clients, including one national chain.
2. Click the Cut command on the Home tab. You can also right-click your document
and select Cut.
3. Place your insertion point where you wish the text to appear.
4. Click the Paste command on the Home tab. The following text will appear:
FORMATTING TEXT
Changing the appearance of a document is known as formatting.
So formatting the character attributes means changing the shape, size, colour and so on
of the words, numbers, etc. in a document.
CHAPTER 3
138
The width of the characters depends on the font style; their height is determined by the
font size and is measured in points.
Computer 48 points
Example the sentence “a new design specialist, the role of VP of sales was filled,” from
the “Practical 1” document.
CHAPTER 3
140
Example of Underline
Computer
CHAPTER 3
142
Superscript
H2O 5th
Computer
A line is drawn through the middle of the selected word. This is known as strikethrough.
TO ALIGN PARAGRAPH
In Microsoft Word, you can position or align the paragraph’s edge relative to the left and
right margins of the document. There are four ways to align paragraphs:
1. Align Text Left: Aligns all the selected text to the left margin.
2. Center: Aligns text an equal distance from the left and right margins.
3. Align Text Right: Aligns all the selected text to the right margin.
4. Justify: Justified text is equal on both sides and lines up equally to the right and
left margins. Traditionally, many books, newsletters and newspapers use full-
justification.
CHAPTER 3
144
CHAPTER 3
146
CHAPTER 3
148
You can also click the drop-down arrow next to the image in the Clip Art pane to view
more options.
The header is a section of the document that appears in the top margin, while the footer
is a section of the document that appears in the bottom margin.
Headers and footers generally contain information such as the page number, date and
document name.
Computer Software 149
4. The Design tab will appear on the Ribbon, and the header or footer will appear
in the document.
5. Type the desired information into the header or footer.
6. When you have finished, click Close Header and Footer in the Design tab, or
press the Esc key.
CHAPTER 3
150
After you close the header or footer, it will still be visible, but it will be locked. To edit it
again, just double-click anywhere on the header or footer, and it will become unlocked.
4. Place a check mark in the Update Automatically box if you would like it to always
reflect the current date. Otherwise, it will not change when the document is
opened at a later date.
5. Click OK. The date and/or time now appear/s in the document.
CHAPTER 3
152
Note:
If you have already typed information into your header or footer, it is important to place
the page number at the Current Position to avoid losing anything. If you select a page
number from Top of Page or Bottom of Page, it will delete anything you have already
added to the header or footer.
4. Select the desired image file and click Insert to add it to your document.
To resize an image, click and drag one of the corner sizing handles. The image will change
size while keeping the same proportions. If you want to stretch it horizontally or vertically,
you can use the side sizing handles.
CHAPTER 3
154
DOCUMENT VIEWS
There are five views available in MS Word 2010:
1. Print Layout,
2. Full Screen Reading,
3. Web Layout,
4. Outline and
5. Draft
Click the View tab to have access to the five document views.
Outline view
View the document as an outline and shows the outlining tools.
Draft view
View the document as a draft to quickly edit the text.
Certain elements of the documents such as headers and footers will not be visible in
this view.
Computer Software 155
?
Activity 1
1. Type the following:
CHAPTER 3
156
Activity 2
A sample letter is given below. Type this letter in Word and save it as ‘Absent’.
Sir,
Letter of Absence
I am writing this letter to inform you that my daughter, Hemsika, was absent from school
on Monday 14th January 2013. I had to take her to the hospital.
Yours sincerely
Vinod Sharma
SPREADSHEET
Spreadsheet software is used to organize data in rows and columns, and perform
calculations on the data.
Examples of spreadsheet programs: MS Excel, Lotus 1-2-3, Quattro Pro and Open
Office Calc.
CHAPTER 3
158
You have opened the MS Excel software and the following screen will appear.
Title Bar
Ribbon
Formula
Bar Column
Headings
Row
Headings
The key for the various elements of the working screen is given as:
1. The workbook is the basic document for Excel. Its filename uses the extension
xls, from Excel spreadsheet. A workbook usually contains several worksheets.
Each column is identified by a letter (For example, A, B, C ...) and each row is
identified by a number (example, 1, 2, 3 ...).
An active cell has a dark border around it and the row and column headers are
coloured. This is the cell that receives your commands.
Each cell has a unique cell address (For example, A1) to define its location on
the worksheet.
A cell can be empty, or can contain a label or a value (For example, a number) or
a formula.
• Labels are texts that identify the data and help organise the worksheet.
• Values are numbers to be used for calculations.
• A formula performs calculations on the data in the worksheet, and displays
the resulting value in the cell that contains it.
CHAPTER 3
160
You have opened the MS Excel software. Now we are going to produce the
following worksheet:
(a) Position your mouse over the column line in the column heading so that
the white cross becomes a double arrow .
CHAPTER 3
162
(c) Release the mouse. The column width will change in your spreadsheet.
Note: the same steps are repeated for the row height.
Save the document as ‘Exercise 1’. (Similar to the steps of saving a word document).
One of the most useful features of Excel is its ability to calculate, using a cell address to
represent the value in a cell. This is called using a cell reference.
The key thing to remember when writing formulas for Excel is that all formulas must
begin with an equal sign (=).
Computer Software 163
CHAPTER 3
164
4. Press Enter. The formula will be calculated and the value will be displayed in
the cell D3.
PRESENTATION SOFTWARE
A presentation program, also known as presentation graphics, links together a sequence
of slides containing text and graphics.
The presentation can be viewed as a slide show which is usually displayed on a large
monitor or on a projection screen.
DATABASE
A database is an organised collection of information. It is used for producing reports as
well as for storing information.
Databases are used to store and handle data such as customer details for a business,
medical records at a surgery or stock items in a warehouse.
File
Both spreadsheets and databases can be used to handle almost the same information,
but each is optimized to handle a different type most efficiently. The larger the number
of records, the more important the differences are.
ACCOUNTING PACKAGES
Accounting software is application software that records and processes accounting
transactions within functional modules such as accounts payable, accounts receivable,
payroll and trial balance.
CHAPTER 3
166
GAMES PACKAGES
Games packages help people. Both children and adults derive much pleasure from
playing computer games which come in games packages:
• Maze
• Role playing
• Shooting
• Strategy
• Critical thinking
MULTIMEDIA PROGRAMS
Some of the more popular programs are from Macromedia, such as Flash, Authorware,
Director and Shockware.
SOFTWARE UPGRADE
A software upgrade is a new version of a software product designed to replace an
older version of the same product. For example, you may be running version 1.0.1 of a
program, version 1.0.2 is an upgrade, and version 2.0.0 is another update.
Some software upgrades are not free. However, most software updates are small and
almost always free because they fix bugs (program errors) with a program.
CHAPTER 3
168
Quick Test
1. Indicate whether the following statements are True or False.
(a) An accounting package is used for payroll calculation. ( )
(b) Each application software does a specific work. ( )
(c) Greeting cards can be created using the Paint program. ( )
(d) Open Office Impress is an example of a database software. ( )
(e) A painting application allows freehand drawing and photo editing with
a mouse. ( )
2. Fill in the blanks with the appropriate word.
(a) The most common package used in banks is__________________.
(b) Chess is an example of a __________________game that can be played with
a computer.
(c) The _______________ is the basic document for Excel.
(d) Open Office Writer is an example of a _________________ software.
(e) Images made with drawing packages consist of lines, shapes and
co-ordinates and are known as ______________________ packages.
(i) Which software is the most suitable choice for creating and editing large
amounts of text in a report?
A. Spreadsheet
B. Word processing
C. Database
D. Accounting package
Computer Software 169
A. QuickBooks
B. FoxPro
C. Corel Presentation
A. Airbrush
B. Magnifier
D. Colour picker
CHAPTER 3
170
8. Indicate the type of package used for each of the following applications:
(a) To keep track of daily household expenditure and compute total at the end of
the month.
9. Label the window on the next page with the words given.
10. Tonia buys some presents for her friends. She uses the spreadsheet to work out
the bill.
CHAPTER 3
172
• System software is a set of programs that manages and controls all the
hardware. An operating system such as Windows and Linux are examples of
system software.
• Application software is a group of programs used by the user to perform
specific tasks such as writing a letter, keeping accounts, printing
invoices, etc.
• There are two types of application software:
1. Ready-made software.
2. User-designed software
• Ready-made software or personal productivity tools is created for
general use.
• A package is a collection of programs designed for general use. Examples:
Word processing software, spreadsheet software, database software,
presentation software, graphics software, accounting package.
• Word processing is creating any type of document such as letters, reports,
essays, textbooks, etc, using a computer.
• A spreadsheet is the application used to enter data in rows and columns and
manipulated according to requirements.
• A database package allows users to create a database and to manage
data in many forms from basic lists (e.g. customer contacts through to
complex material).
• Presentation software is used to create presentations, quizzes, e-learning
packages, information points and many other multimedia products.
• Accounting package manages an organisation’s accounts including revenues/
sales, purchases, bank accounts, etc.
• Graphics packages can be used to create posters, perform image processing
in order to improve or alter photographs, or to create original artwork.
• A software upgrade generally refers to any major upgrade to the software
that adds significant changes to the program.
CHAPTER 3
174
1. Fill in the blanks with the appropriate words given in the box below.
User-designed, Design, software, database, spreadsheet, application software,
accounting package, drafting, animation, inventory package
(a) Computers can help engineers in___________________ and
_______________.
(b) Information on criminals is stored in a computer
___________________.
(c) __________________ software is specially designed to suit the specific
needs of the company.
(d) ___________________ is a group of programs that allows users to do a
wide variety of tasks on their computers.
(e) A _____________________ calculates the salary details of employees.
Treasure Island
Treasure Island is an adventure novel by Scottish author Robert Louis Stevenson.
The story is about pirates and a buried treasure. The book was first published in
1883. Although written more than a century ago, the book is still very popular
with young children. The story is also very popular for its characters and action.
Long John Silver1 is perhaps the most popular character in the story. It also
influenced other pirate stories where we find treasure maps marked with an “X”,
tropical islands and one-legged seamen with parrots on their shoulders.
1 Long John Silver was also known as ‘Barbecue’ and ‘Sea Cook’.
(a) The word processing features used to create the effects of the
title ‘Treasure Island’ are referred to as: _______________ and
____________________.
(b) A new paragraph needs to be created after “… young children.”
(in line 4). To do this, one has to place the blinking cursor at the end of
the sentence and hit the ______________ key on the keyboard.
(c) The word processing feature used to create the effect for the text Robert
Louis Stevenson in line 1 is referred to as ___________ .
6. This question is about Spreadsheets.
(a) Look carefully at the picture below and then answer the questions in
the space provided.
CHAPTER 3
176
(i) What is the formula that must be entered in cell B4 to find the
Grand Total?
(ii) What formula would you use to find the difference between the
Total Expenses of the years 2007 and 2008?
Computer Software 177
CHAPTER 3
178
2. Fill in the blanks in the paragraph below using the following words:
[1 mark each]
Cursor, backspace, highlighted, italics, bold, delete, school
3. Fill in the chart with the terms used in software. [1 mark each]
Computer Software
Application Software
Operating system
(c) List two differences between ready-made and tailor-made software.[2 marks]
__________________________________________________________________
__________________________________________________________________
(d) What is a good software? [2 marks]
__________________________________________________________________
__________________________________________________________________
5. Mark is using a spreadsheet to find the total amount of every month. Look carefully
at the picture below and complete the following:
(d) On the above picture, write the formula in cell D5 which finds the total of the
values in cells B5 and C5. [2 marks]
__________________________________________________________________
__________________________________________________________________
(e) Write a formula which can be used in cell E2 to divide cell D2 by 2. [2 marks]
__________________________________________________________________
__________________________________________________________________
(f) Which cell is the Active Cell? [1 mark]
__________________________________________________________________
__________________________________________________________________
6. (a) State four advantages of using a word processing program. [4 marks]
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
CHAPTER 3
180
4
Electronic Communication
The Internet spans the entire world. Computers that are part of the Internet are
spread worldwide.
An Internet Service Provider (also known as an ISP or even as an IAP, Internet Access
Provider) is a company that offers paid services for connections to the Internet.
Electronic Communication 183
There are several listed Internet Service Providers in Mauritius such as Orange,
Emtel, Mahanagar Telephone Mauritius Limited (MTML) and Data Communication
Limited (DCL).
ISP usually connects customers to the Internet using wireless or cable connections.
Telephone Line
Internet
Computer
Modem
A web page may contain text, images, videos and other multimedia as well as built-in
connections called hyperlinks to navigate between other documents.
CHAPTER 4
184
Site Search
Section
Navigation
Footer Navigation
Figure 4.3: Example of a Web Page
CHAPTER 4
186
Firstly, you need to evaluate whether the information you find on the Internet is true
and accurate. You should be cautious about which sites you get your information from.
In fact, it is a good idea to research a topic on several sites to get a full picture of what
people are saying about the topic.
Secondly you need to consider copyright matters so as you could use Web
information legally.
You need to cite information obtained from the Internet properly; otherwise you would
be committing plagiarism.
Plagiarism is the act of stealing and passing off the ideas, words, or other intellectual
property produced by another as one's own. For example, using someone else's words
in a research paper without citing the source is an act of plagiarism.
Lastly, you need to aware that slanderous (libel) postings and pranks are subject to
legal and ethical issues.
Slander (libel) is the action of publicly saying, printing or otherwise presenting false and
damaging information about a person or organisation. In so doing you could be faced
with legal pursuit.
?
1. Students at school use the Internet for various purposes. Name three
activities you can do on the Internet at school.
2. Discuss this statement with your friends and teachers and state whether
you agree with it. “It is claimed that the internet has created more
problems than benefits for home users.”
Electronic Communication 187
WEB BROWSER
A Web browser also known as Internet browser is a software program used to access
and view Web pages.
SEARCH ENGINE
To locate information on the internet, we use a search engine.
A search engine is a program that searches documents for specified keywords and
returns a list of documents where the keywords are found.
There are many search engines to choose from and they all perform a similar job;
examples of search engines are:
CHAPTER 4
188
Search engines take the words that you enter and try to match these to their database
of web pages.
Open a webpage with a search engine. In this case you are going to enter a search
string into http://www.google.co.uk.
NOTE: Words you enter in a search engine are known as a “Search String”.
1. To search for a topic enter the search sting into this box
You can see from the picture below that the Google search engine has found over 54
million possible web pages about scuba diving. Web pages located by a search engine
are known as hits.
CHAPTER 4
190
By adding some extra search string key words we can refine the search and narrow
down the number of hits. This helps us ensure that we can easily locate the page we are
looking for. In the screenshot below I have changed the search string to “learn to scuba
dive” and this has lowered the number of hits to about 24 million.
The search could be refined further by adding the name of your country into the search.
In this example I have changed the search string to “learn to scuba dive in Mauritius”.
This reduces the hits substantially to less than 800 thousand.
Electronic Communication 191
Further refined
search string
Much lower number of Hits
The Uniform Resource Locator (URL) is the unique address of a Web page. It is also
known as Internet address or Web address.
The URL tells the web browser where to locate the Web page.
URL http://www.google.com
Protocol http
Domain Name www.google.com
http stands for hypertext transfer protocol which is the standard that enables pages
to transfer on the Web.
CHAPTER 4
192
3. Location or country
?
Look at the URL name and then answer the following questions.
http://news.bbc.co.uk/sport2/hi/football/default.stm
Quick Test
CHAPTER 4
194
CHAPTER 4
196
The message can be simple text or can include an attachment such as a word processing
document, a graphical image, an audio clip or a video clip.
A user utilises an email program to create, send, receive, forward, store, print and delete
email messages.
Messages sent from one person will go to the 'mailbox' of the recipient. They will be
stored there until the person to whom the message has been
addressed logs on to retrieve his or her 'mail'.
Email Post
Advantages • Very quick and cheap • It does not require any special
delivery. equipment.
• Computer files can be • Packets and parcels can be
attached to an email. sent.
• Records and copies are kept
automatically.
• Can be accessed anywhere in
the world.
• Can be sent at any time to
suit the sender.
Disadvantages • A computer and other • It is slow.
hardware (example, a • It can be expensive.
modem) are required.
• It is not secure.
• It is easy to get on junk
mail lists.
• No guarantee the mail will be
read until the user logs on
and checks his/her email.
• There is always a risk of
virus.
Inbox Overflow
You may be so inundated with the number of e-mails that you receive – many of them
unnecessarily (junk e-mails or spams)–that you do not have the time to respond.
CHAPTER 4
198
It is insecure
Confidential business documents sent over e-mail are not confidential unless it is
encrypted. These documents can be read both inside and outside of your organization.
For example, your system administrator may read them.
EMAIL ADDRESS
An e-mail address is a combination of a user name and a domain name that identifies
a user who sends or receives e-mail.
vsharma@intnet.mu
User Name Domain Name
Often the user’s first initial and then the last
name It refers to the email server that temporarily
stores incoming and outgoing mail messages. It
is maintained by an Internet Service Provider.
Client-based email is used by business users. It involves the email being downloaded
from a server to an application (example Microsoft Outlook or Mozilla Thunderbird) on
the user’s computer.
Webmail can be accessed through a web browser via any computer with an Internet
connection. One of the earliest Webmail services was Hotmail. Other very popular
webmail providers include mail.com, Yahoo! Mail, Gmail and AOL.
Electronic Communication 199
CHAPTER 4
200
5. Click on the Create New Account link, a registration form will be shown
as below:
CHAPTER 4
202
6. Fill in with
all information
needed
7. Click to register
8. After clicking on the Create my account, the following screen will pop up.
9. After completion, the dialog box will appear, then click Get Started button to
start using the e-mail.
CHAPTER 4
204
2. Enter Password
COMPONENTS OF AN EMAIL
To send or compose messages, click on New icon.
The screen will look like the picture below. Fill in the boxes as follows:
BCC: (Blind Carbon Copy) Enter email address here if you
want to send a concealed copy of the email to another
recipient
An email message is made up of two parts: the header information and the body.
After writing down the message, click Send icon to send the message.
CHAPTER 4
206
Folders
Inbox Incoming messages
Draft All incomplete messages
Sent All messages already sent
Spam All messages that are not legitimate
Trash All deleted messages
After you have read the email, you have a few options:
In this example, the address used is the address for the homepage of Amazon
Shopping is : Website (amazon.co.uk).
If you know the URL for a particular page within the website, you can type the full
address into the browser to get to an exact page. For example if you wanted the phones
page on Amazon you would enter this URL:
CHAPTER 4
208
http://www.amazon.co.uk/mobile-phones-smartphones/b/ref=sa_menu_phones/280-
7108110-2046130?_encoding=UTF8&node=560820
To avoid having to retype long URLs, you can use the View Favorites icon to store
individual URLs into your web browser.
1. Click on
Favorites Icon.
2. Click on add
to Favorites.
3. Dialog box
appears. Click URL added
on add. to favorites.
Quick Test
1. Circle the correct answer.
(a) One big advantage that people find with the Internet is that they can
send and receive emails. What button (followed by send) is used to send a
copy of a received email to someone else?
A. Forward
B. Reply
C. Back
D. Reply all
(b) Which of the following folder is used when all messages are incomplete?
A. Drafts
B. Outlook
C. Trash
D. Spam
(c) What is an email attachment?
A. A forwarded email
B. A file sent with an email
C. A reply to an email
D. A deleted message
(d) How is an email that can be accessed from any computer with an Internet
connection and a web browser known as?
A. Internet mail
B. Email
C. Webmail
D. Client based mail
CHAPTER 4
210
7. List the two parts of an email message and differentiate between them.
CHAPTER 4
212
1. Fill in the blanks with the appropriate words given in the box below.
CHAPTER 4
214
http://www.cnn.com
http://www.google.com
http://www.facebook.com
http://www.yahoo.com
http://mca.edu.mu
http://www.askjeeves.com
Electronic Communication 215
CHAPTER 4
216
2. Many people use the Internet to play games online. Mention 3 other important
uses of the Internet. [3 marks]
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
3. (a) What do the following stand for? [1 mark each]
(i) ISP ________________________________________________________
(ii) LAN _______________________________________________________
(iii) URL _______________________________________________________
(b) Underline the correct answer: [1 mark each]
To have an Internet connection, one needs to first request the services of an [IP, WLAN,
ISP, PST]. When logged onto the Internet one needs a Web [Searcher, Surfer, Connection,
Browser] where to enter the [URL, ISP, LAN, CPU] of the page to visit, or one can just
click on a [page, hyperlink, popup, toolbar] present in the homepage.
CHAPTER 4
218
4. Explain the following terms with example where appropriate. [2 marks each]
(a) Internet
_______________________________________________________________
_______________________________________________________________
(b) Attachment
_______________________________________________________________
_______________________________________________________________
(c) Client-based email
_______________________________________________________________
_______________________________________________________________
5. (a) List the different parts of an email address. [2 marks]
_______________________________________________________________
_______________________________________________________________
Electronic Communication 219
(b) Look at the URL name and then answer the questions below.
[1 mark each]
http://www.mgss.ac.mu/departments/ict.htm
(c) What is the difference between typing an email address in the Cc field and
typing an email address in the Bcc field? [2 marks]
_______________________________________________________________
_______________________________________________________________
(d) List two disadvantages of web-based mail. [2 marks]
_______________________________________________________________
_______________________________________________________________
6. (a) What are the legal and ethical issues you need to consider when you are using
the Internet.
_______________________________________________________________
_______________________________________________________________
(b) E-mails use have brought along some problems. Discuss some of them.
_______________________________________________________________
_______________________________________________________________
CHAPTER 4
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
CHAPTER
5
Computer Ethics, Health
and Safety
The following topics are covered in this chapter:
5.1 Computer Ethics
5.2 Health Problems
5.3 Working Safely
5.4 Computer Laboratory Guidelines
5.5 Guidelines on the proper care of computer
equipment
Computer ethics are the moral guidelines that govern the use of computers.
Causes of RSI:
1. Typing on a computer for too long.
2. Using a mouse for a long period.
3. Holding the mouse incorrectly.
4. Working in a cramped workspace.
CHAPTER 5
224
They can be caused by sitting incorrectly or using poor quality chairs without back
rests. This gives rise to poor posture.
Causes of back and neck pain How to prevent back and neck pain
1. Working in a cramped workspace. 1. Take regular breaks to stretch your
2. Not sitting upright in your chair. body.
3. Incorrect positioning of the computer 2. Use adjustable chairs so you can sit in
screen. a position suitable for your height.
3. Sit upright against the back rest.
4. Tilt the computer screen so that it is
set just below your eye level.
5. Keep your feet flat on the floor.
Computer Ethics, Health and Safety 225
Viewing Distance
Monitor angle
Back angle Document holder
Seat
height
EYE STRAIN
Staring at a computer screen for too long can strain your eyes and cause headache.
Eye strain can cause your vision to blur.
Common causes of eye strain are screen flicker and having direct light causing
screen glare.
CHAPTER 5
226
?
Figure 5.5: Preventing eyestrain
• Always sit at right angle where the eyes, wrist and neck
are properly positioned in front of the computer.
keys ASDF and the right hand on the keys HJKL. This will prevent wrist, shoulder
and back pain.
WRONG RIGHT
• Your eyes must target the screen not your fingers when typing.
Feet on floor or
stable footrest
CHAPTER 5
228
1. ELECTROCUTION
Most ICT devices require an electrical power source.
Wherever you have electrical power sources, you run the risk
of electrocution.
Causes of Electrocution:
1. Faulty equipment (bare wires, etc.).
2. Spilling drinks over electrical equipment.
3. Opening up an electrical device when you do not
know what you are doing.
Equipment should be positioned securely on strong desks and tables well away from
the edge.
CHAPTER 5
230
4. FIRE RISKS
If too many devices are plugged into a single mains outlet at the same time, it might
overload the circuit and cause an electrical fire.
Causes of fire:
• Too many devices plugged into a single mains outlet.
• Leaving devices plugged in unattended for long periods.
• Covering air vents on devices like laptops.
5. POWER PROTECTION
Power protection guards your equipment against blackouts, brownouts, surges and
spikes. All these events are anomalies in the flow of the main power supply that can
damage not only your hard disks and other data stored in them but other components
as well.
A brownout is a decrease in voltage levels which can last for periods ranging from
fractions of a second to hours.
A spike is a tremendous increase in voltage over a very short period of time often caused
by a direct lightning strike on a power line or when power returns after a blackout.
There are three levels of power protection available to the home computer user. The
levels are:
1. Surge Suppressors
2. Power or Line Conditioners
3. Uninterruptible Power Supplies (UPS)
1. SURGE SUPPRESSORS
Surge suppressors provide a row of power outlets,
an on/off switch and sometimes a telephone jack.
CHAPTER 5
232
Example:
CHAPTER 5
234
?
1. What signs do you see in the lab? How are they important?
2. What are the things that you are allowed and not allowed to do once
you are in a lab?
• It is important to know and observe the rules and safety precautions when
using computers.
• A number of health and safety concerns related to vision, body aches and
pains have arisen with an increase in computer use.
• A properly adjusted chair should be used for users suffering from back and
neck pain.
• Repetitive Strain Injury (RSI) is caused by rapid keyboard movements and
arms in a static position over a long period of time. It can be prevented by
having a good posture, working at a steady rate and taking regular breaks
from the screen.
• Users suffer eye strain when staring at a computer screen for long hours.
They should take regular breaks.
• You must follow the rules on using the computers in your school
computer laboratory.
CHAPTER 5
236
ix. Pendrives and diskettes must be scanned for viruses before use.
x. Remove parts of computer.
5. There is a number of safety hazards that can arise from using ICT devices.
(a) Describe what is meant by ergonomics.
(b) State two causes of electrocution and two ways to prevent it.
(c) State two causes of falling ICT equipment and two ways to prevent it.
6. State five precautions which one should observe when using a computer in
a computer lab.
7. (a) State the three levels of power protection available to the home
computer User.
(b) Power protection guards your equipment against blackouts, brownouts,
surges and spikes. Differentiate between these four terms.
CHAPTER 5
238
(c) The use of anti-glare screen can help users to cut down on screen reflections
and can prevent
A. Head Ache
B. Repetitive Strain Injury
C. Eye Strain
D. Back Ache
(d) Why should you not eat and drink in a computer lab?
A. Liquids, if spilt can damage the computers in the lab.
B. Leftover food can attract ants and cockroaches.
C. The steam from the hot food can damage the floppy disks in the lab.
D. All of the above.
(e) Plugging too many power cables into a socket can result in
A. Cheap and reliable use of computer.
B. Health and safety issues.
C. Socket being overloaded, overheated, and cause a fire to start.
D. Increased performance by the computer.
4. List any two Computer Lab Safety Rules for protecting users. [2 marks]
___________________________________________________________________
___________________________________________________________________
5. List one safety issue for: [1 mark each]
(a) Cables trailing.
_______________________________________________________________
(b) Overloading of power sockets.
_______________________________________________________________
(c) Heavy objects falling.
_______________________________________________________________
CHAPTER 5
240
6. Indicate whether the following statements are True or False [1 mark each]
(a) Avoid exchange, floppy disk, pendrives, CD/DVD. ( )
(b) Defragment files and scan the hard drive occasionally help to protect
hard disk. ( )
(c) You should repeatedly turn the computer on and off. ( )
(d) We should not take breaks to change our position and stretch our muscles
when working on a computer. ( )
(e) Use wireless technology to eliminate the use of wires altogether. ( )
7. Describe the following health risks and identify at least 2 solutions for each:
REVISION PAPER 1
Question 1
(f) The _________________ key moves the cursor to the beginning of the current line
of typed characters.
A. Page Up C. Home
B. Page Down D. End
242
(h) The _________________ icon stores all the files or folders you delete and allows
you to recover them later.
A. My computer C. Internet Explorer
B. Recycle bin D. My documents
(l) A table has 6 rows and 4 columns and is therefore called a __________________.
A. 4 x 6 table C. 2 cell table
B. 10 cell table D. 6 x 4 table
(m) A section at the bottom of the page, for secondary information is known as
____________.
A. header C. landscape
B. footer D. portrait
Revision Paper 1 243
(n) Which one of the following is not necessary to access the internet?
A. A web browser C. A modem
B. A connection to an ISP D. A word processing software
Question 2
Fill in the blanks using the words given below. [1 mark each]
Question 3
State whether the following statements are True or False. [1 mark each]
Question 4
What does each of the following acronyms stand for? [2 marks each]
(a) ALU
(b) URL
(c) GU
(d) ROM
(e) LCD
(f) ISP
Question 5
What are the character attributes of each of the following words? Tick ( ) the attributes
that apply: [2 marks each]
Question 6
Give the definition of the following terms: [2 marks each]
(a) Application software ______________________________________________
_______________________________________________________________
(b) Computer Ethics _________________________________________________
_______________________________________________________________
(c) Peripheral ______________________________________________________
_______________________________________________________________
(d) Website _______________________________________________________
_______________________________________________________________
(e) Ergonomics _____________________________________________________
_______________________________________________________________
Question 7
Match the following by inserting the appropriate letters in the boxes provided. An
example is given to you. [1 mark each]
1 Ms Word 2007 A defines the location of a cell.
2 Cursor B web browser used to access web services.
3 Formatting C a cell that receives commands.
4 Clip Art D a database containing billions of pages of documents.
5 Active cell E a set of program that coordinates all activities among
hardware.
6 Computer network F Program that has no errors.
7 World Wide Web G indicates the next letter that is typed will be inserted.
8 Internet Explorer H an example of an advanced processor.
9 Cell address I a set of computers connected together.
10 Operating system J a collection of ready-to-use images available on your hard
disk.
11 Bug free K changing the appearance of your document.
Question 8
In the following table, six application packages are listed. Write the application type
next to it by using words from the list below: [2 marks each]
Question 9
(a) What is an email? [1 mark]
_______________________________________________________________
(b) To send and receive emails, three items are needed. Choose the appropriate
ones given in the list below.
Email account, Word Processing software, Internet access, Speakers, Email address
(i) ______________________________________
(ii) ______________________________________
(iii) ______________________________________ [3 marks]
(d) Give three reasons why most people prefer email over conventional
postal mail? [3 marks]
(i) ______________________________________
(ii) _______________________________________
(iii) _______________________________________
Revision Paper 2 247
REVISION PAPER 2
(e) Which of the following would you use to find information on the Internet?
A. E-mail program C. Search Engine
B. Word Processor D. Help menu
Hardware Software
(b) What is the item labeled X in the picture above, used for? [1 mark]
_______________________________________________________________
250
(c) What must the user do to the item labeled Y in the picture above, so that the
Window shown below appears on the screen? [1 mark]
(d) Look carefully at the Window above and then draw the buttons (in the squares
below) that she must click to do the following: [3 marks]
5. Tonia buys some presents for her friends. She uses the spreadsheet to work
out the bill.
REVISION PAPER 3
1. Circle the correct answer. [1 mark each]
(b) The ___________________ manages each of the steps the CPU makes as
it works.
A. Arithmetic and Logic Unit C. Memory Unit
B. Control Unit D. Read Only Memory
3. What does each of the following acronyms stand for? [1 mark each]
5. Alex is using Microsoft Excel to keep record of the results of a football league. He
uses spreadsheet functions to make automatic calculations for him.
In cell C3, he adds the values under W, D and L.
In cell I3, he deducts the value under A from F.
In cell J3, he calculates the number of points a team has. Teams receive 3 points for
each win and no points for losses. (Refer to Key when necessary)
Key:
Pd – Matches Played, W – Matches Won, D – Matches Draw, L – Matches Lost,
F – Goals in favour, A – Goals Against, GD – Goal Differences, Pts – Number of
Points
Revision Paper 3 257
(b) Insert one of the following in each of the blank spaces: [1 mark each]
column value formula label row
_______________________________________________________________
_______________________________________________________________
(d) List down three bad practices that are not allowed in a computer room.
[3 marks]
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
9. (a) List any three file operations which are allowed by Windows Explorer
[3 marks]
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
(b) Complete the diagram with the words given. [6 marks]
Application software Utility program Program translators
Ready-made software Computer software Operating system
260
10. Explain the following terms with appropriate examples: [2 marks each]
(a) Screen Resolution
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
(b) Internet Service Provider
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
(c) Formatting
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
(d) Formula
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
(e) Email
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
262
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Revision Paper 3 263
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
264
Notes
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________