Download as pdf or txt
Download as pdf or txt
You are on page 1of 139

RIFTVALLEY INSTITUTE OF

SCIENCE AND TECHNOLOGY

INFORMATION TECHNOLOGY
DEPARTMENT

SUBJECT
INFORMATION COMMUNICATION
TECHNOLOGY

COURSE OUTLINE
CLASSES: DIPLOMA IN ELECTRICAL & ELECTRONICS ENGINEERING AND AUTOMOTIVE ENGINEERING
TOPIC SUB TOPIC

I. INTRODUCTION TO ICT - Concept of ICT


- Functions of ICT
- History of Computers
- Classification of computers
- Components of a computer
II. COMPUTER HARDWARE - Input devices
- Output devices
-Central Processing Unit
-Peripherals
-Storage Media
III. COMPUTER SOFTWARE - Software concept
- Types of software
- Functions of computer software
IV. OPERATING SYSTEM - Operating Systems
- Functions of Operating Systems
- Operating systems commands
- Managing discs
V. WORD PROCESSING - Concepts of word processing
- Functions of word processing
- Document creation and manipulation
- Tables creation and manipulation
- Mail merging
- Application of word processing utilities
VI. SPREAD SHEETS - Meaning of spread sheets
- Uses of spread sheets
- Preparing worksheet layout
- Building worksheet
- Manipulating data on worksheet
- Data application to cells
- Formulae and function
- Charts
VII. PRESENTATION PACKAGES - Types of presentation packages
- Creating slides
- Formatting slides
- Running slides
- Editing objects
- Printing slides and handouts
VIII. NETWORKING AND INTERNET - Meaning of networks
- Functions of networks
- Networks configuration
- Meaning and uses of internet
- Electronic mail (e-mail)
IX. DESKTOP PUBLISHING - Functions of DP
- Tools used
- Manipulations
- Enhancement of typeset work
- Printing of documents
X. DATABASE - Meaning of database
- Database design
- Data manipulation
- Data sorting and indexing
- Data storage
- Data retrieval
XI. DATA SECURITY AND CONTROL - Definition of data
- Security and Privacy
- Security threats and control measures
- Computer crimes
- Detection and protection against computer crimes
- Laws governing protection of ICT
XII. EMERGING TRENDS AND ISSUES - Emerging trends and issues in ICT
IN ICT - Challenges posed by the emerging issues in ICT
- Coping with challenges posed by the emerging issues in
ICT

INFORMATION COMMUNICATION TECHNOLOGY


a) Concepts of ICT – Terminologies
i) Computer
This is an electro-magnetic device that can be programmed to accept data (input), process it into
useful information (output) and store for later reuse (retrieve).

ii) Computer system


A system is a group of two or more interrelated components or subsystems that serve a common
purpose. A computer system comprises of input, processing, storage and output devices.

iii) Data
This refers to a collection of disorganized figures, facts, statistics, opinions or predictions that are
not useful for decision making.
-Also refers to the raw facts which have not been processed

iv) Information
This is processed data which is in a form that is meaningful for decision making

v) Information Communication Technology


Is an integration of computers, communication and other technologies applied to the collection and
storage of data that is subsequently processed and transmitted with the intention of providing
information to the recipient or decision makers?

vi) Computer- Based Information Communication System (CBIS)


This comprises of computer hardware, computer software, data/information, people/users,
procedures and communication devices (network)

b) Functions of ICT
i) Functions of ICT in an organization
- It increases operational efficiency
- Enhances employee productivity
- Improves customer service
- Increases customer satisfaction
- Promote effective decision making
- Enables development of competitive products
- Enables Strategic Planning for future expansion

ii) Advantages of computer systems


- High speed processing
A super computer can process one trillion arithmetic operations in one second.
- Handle large volume of repetitive tasks
It can prepare a payroll by calculating hours worked, rate per hour, total wages, various
deductions and net wages for thousands of employees without getting bored.
- Has logical ability
Able to distinguish between numbers and decide which one is greater, negative or positive

- Remote processing
Through time sharing and telecommunication, many persons at different locations can use the
same computer at one location for information processing eg ATM banking or air-time top up.
- Enhance productivity
Productivity increase once workers learn to use computers to perform their duties better and
faster
- Accelerate decision making
Managers can sort issues faster and make better decisions
- Reduce operation costs
Computers help to hold down the costs of labour, energy and paper work
- Reduce storage space
Information can be stored in computer components which occupy smaller space unlike paper
iii) Disadvantages of computers
- High initial costs-requires high initial cost to purchase and install the computers
- Require skilled operators-Training needs to be done for the computer operators
- Cause health problems-use of computers causes health related problems such as neck ache,
eyes
- Reduce employment opportunities-one computer can perform several tasks that could have
been performed by several people hence causes unemployment
- Greater loss of data in case of breakage or system failure

c) Classification of computers
i) Classification by purpose
Analog Computers
These are computers that perform logical operations by measuring changes in physical magnitudes
and convert them to numeric values. These computers process data that is in a continuous form or
measurable quantities/units. Analog data includes physical variables like temperature, pressure,
length, weight, electrical voltages and resistance.
-Analog computers include thermometers, weighing scales, voltmeters and speedometers.
-These computers are used mainly for scientific and engineering purposes because they deal with
quantities that vary constantly.
-They give approximate results and are applied in industries, post office and weather stations
-Handles small volume of data.

Digital Computers
. These computers process data that is represented in the form of discrete or individually distinct
form usually in a binary or two state formats/digits 0 and 1. In the binary system, each 0 and 1 is
called a bit and a group of 8 bits is 1 byte.
Example of these devices include digital clock.
-handles high volume of data and gives accurate information

Hybrid Computers
These are computers that have the combined features of both the digital and analog computers.
Example is where patient’s vital signs like temperature, heart functions etc are measured and
converted to numbers and supplied to the digital components that monitor the patient’s vital signs.
A fluctuation can thus be noticed immediately.

ii) Classification by size


- Super computers
These are the most powerful, fastest and most expensive computers. Only a few of these are
manufactured each year because only a few organizations need and can afford their processing
capabilities. They have large memories and high processing speeds so fast that they can process nearly
a billion transactions per second and nearly a trillion arithmetic operations at the same time. They apply
parallel processing.
Application
 Worldwide weather forecasting and analysis of weather phenomena
 Produce images that can be incorporated into movies
 Aircraft design
 Mathematical research

- Main frames
These are large, general purpose computers which can serve 100 or more end users.
They are fast with large storage capacities.
Application
 Processing of high-volume batch applications eg in banks
 Management of very large centralized databases
 To control access, interpret queries and retrieve & update records
 Ideal for transaction processing, financial applications, payroll calculations and airline reservations.
- Mini computers
 These are computers which are neither too big nor too small in size
 They are designed to accommodate more than one user
 The are a bit costly than micro computers
 Their processing speed is a bit faster than micro computers
 They have a large storage capacity than microcomputers and lesser than mainframe computer

- Micro computers
 These are computers that are small in size
 They are designed for single user
 They have low processing speed
 They are less costly compared to others
 They have small processors
 They have small storage capacity

- Desktops
 These are a type of microcomputers also called Personal Computers (PCs).
 They are compact, powerful and versatile machines
 They generally serve a single user
 The desktop type may be one integral unit having monitor and CPU or may be separate ( Tower units)

- Laptops
 These are powerful portable computers
 They are designed for single user
 They have low processing speed
 They are less costly compared to others
 They have small processors
 They have small storage capacity
 They use battery when not connected to main electricity
- Palm tops/microcontrollers/
 Also called hidden, embedded, dedicated computers
 They are restricted to perform a restricted number of tasks e.g. calculator
iii) Computer Generations

The history of computer development is often referred to in reference to the different generations of
computing devices. A generation refers to the state of improvement in the product development process.
This term is also used in the different advancements of new computer technology. With each new
generation, the circuitry has gotten smaller and more advanced than the previous generation before it. As a
result of the miniaturization, speed, power, and computer memory has proportionally increased. New
discoveries are constantly being developed that affect the way we live, work and play.
Each generation of computers is characterized by major technological development that fundamentally
changed the way computers operate, resulting in increasingly smaller, cheaper, and more powerful and
more efficient and reliable devices.

First Generation - 1940-1956: Vacuum Tubes

 The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often
enormous, taking up entire rooms.
 A magnetic drum, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on
which data and programs can be stored.
 The tracks on a magnetic drum are assigned to channels located around the circumference of the drum,
forming adjacent circular bands that wind around the drum. A single drum can have up to 200 tracks. As
the drum rotates at a speed of up to 3,000 rpm, the device's read/write heads deposit magnetized spots on
the drum during the write operation and sense these spots during a read operation. This action is similar to
that of a magnetic tape or disk drive.
 They were very expensive to operate
 They used a great deal of electricity,
 Generated a lot of heat, which was often the cause of malfunctions.
 First generation computers relied on machine language to perform operations, and they could only solve
one problem at a time. Machine languages are the only languages understood by computers. While easily
understood by computers, machine languages are almost impossible for humans to use because they consist
entirely of numbers. Computer Programmers, therefore, use either high level programming languages or
an assembly language programming. An assembly language contains the same instructions as a machine
language, but the instructions and variables have names instead of being just numbers.
 Acronym for Electronic Numerical Integrator and Computer, the world's first operational electronic digital
computer, developed by Army Ordnance to compute World War II ballistic firing tables. The ENIAC,
weighing 30 tons, using 200 kilowatts of electric power and consisting of 18,000 vacuum tubes, 1,500
relays, and hundreds of thousands of resistors, capacitors, and inductors, was completed in 1945.
 They had maintenance problems
 They had limited primary memory

Second Generation - 1956-1963: Transistors

 Transistors replaced vacuum tubes and ushered in the second generation computer. Transistor is a device
composed of semiconductor material that amplifies a signal or opens or closes a circuit. Invented in 1947 at
Bell Labs, transistors have become the key ingredient of all digital circuits, including computers. Today's
latest microprocessor contains tens of millions of microscopic transistors
 They were smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation
predecessors.
 Second-generation computers still relied on punched cards for input and printouts for output.
 Second-generation computers moved from cryptic binary machine language to symbolic, or assembly,
languages, which allowed programmers to specify instructions in words. High-level programming
languages were also being developed at this time, such as early versions of COBOL and FORTRAN.
 These were also the first computers that stored their instructions in their memory, which moved from a
magnetic drum to magnetic core technology.
 The first computers of this generation were developed for the atomic energy industry.

Third Generation - 1964-1971: Integrated Circuits

 The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically
increased the speed and efficiency of computers. Silicon is the basic material used to make computer chips,
transistors, silicon diodes and other electronic circuits and switching devices because its atomic structure
makes the element an ideal semiconductor. Silicon is commonly doped, or mixed, with other elements,
such as boron, phosphorous and arsenic, to alter its conductive properties.
 A chip is a small piece of semi conducting material (usually silicon) on which an integrated circuit is
embedded. A typical chip is less than ¼-square inches and can contain millions of electronic components
(transistors). Computers consist of many chips placed on electronic boards called printed circuit boards.
There are different types of chips. For example, CPU chips (also called microprocessors) contain an entire
processing unit, whereas memory chips contain blank memory.

Computer chips, both for CPU and memory, are composed of semiconductor materials. Semiconductors
make it possible to miniaturize electronic components, such as transistors. Not only does miniaturization
mean that the components take up less space, it also means that they are faster and require less energy.

 Instead of punched cards and printouts, users interacted with third generation computers through keyboards
and monitors and interfaced with an operating system, which allowed the device to run many different
applications at one time with a central program that monitored the memory.
 Computers for the first time became accessible to a mass audience because they were smaller and cheaper
than their predecessors.
 High reliability
 Smaller size
 Use parallel processing
 Introduction of simpler programming language eg BASIC

Fourth Generation - 1971-Present: Microprocessors

 The microprocessor brought the fourth generation of computers, as thousands of integrated circuits we
rebuilt onto a single silicon chip. A silicon chip that contains a CPU. In the world of personal computers,
the terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and
most workstations sits a microprocessor. Microprocessors also control the logic of almost all digital
devices, from clock radios to fuel-injection systems for automobiles.

Three basic characteristics differentiate microprocessors:


Instruction Set: The set of instructions that the microprocessor can execute.

Bandwidth: The number of bits processed in a single instruction.

Clock Speed: Given in megahertz (MHz), the clock speed determines how many instructions per second
the processor can execute.

 As these small computers became more powerful, they could be linked together to form networks, which
eventually led to the development of the Internet.
 Fourth generation computers also saw the development of GUI's, the mouse and handheld devices
 Introduction of a wide variety of software
 They became cheap enough for schools and homes to purchase them

Fifth Generation - Present and Beyond: Artificial Intelligence

 Fifth generation computing devices, based on artificial intelligence, are still in development, though there
are some applications, such as voice recognition, that are being used today.

Artificial Intelligence is the branch of computer science concerned with making computers behave like
humans. The term was coined in 1956 by John McCarthy at the Massachusetts Institute of Technology.
Artificial intelligence includes:

 Games Playing: programming computers to play games such as chess and checkers
 Expert Systems: programming computers to make decisions in real-life situations (for example, some
expert systems help doctors diagnose diseases based on symptoms)
 Natural Language: programming computers to understand natural human languages
 Neural Networks: Systems that simulate intelligence by attempting to reproduce the types of physical
connections that occur in animal brains
 Robotics: programming computers to see and hear and react to other sensory stimuli

Currently, no computers exhibit full artificial intelligence (that is, are able to simulate human behavior).
The greatest advances have occurred in the field of games playing. In the area of robotics, computers are
now widely used in assembly plants, but they are capable only of very limited tasks. Robots have great
difficulty identifying objects based on appearance or feel, and they still move and handle objects clumsily.

Natural-language processing offers the greatest potential rewards because it would allow people to interact
with computers without needing any specialized knowledge. You could simply walk up to a computer and
talk to it. Unfortunately, programming computers to understand natural languages has proved to be more
difficult than originally thought. Some rudimentary translation systems that translate from one human
language to another are in existence, but they are not nearly as good as human translators.
There are also voice recognition systems that can convert spoken sounds into written words, but they do
not understand what they are writing; they simply take dictation. Even these systems are
quite limited -- you must speak slowly and distinctly.

In the early 1980s, expert systems were believed to represent the future of artificial intelligence and of
computers in general. To date, however, they have not lived up to expectations. Many expert systems help
human experts in such fields as medicine and engineering, but they are very expensive to produce and are
helpful only in special situations.

Today, the hottest area of artificial intelligence is neural networks, which are proving successful in a
number of disciplines such as voice recognition and natural-language processing.

Computer Construction

There are at least ten major categories of requirements which must be addressed by the
analysis and design process:
- Function
- Performance
- Usability
- Reliability, Availability, Serviceability
- Localization
- Portability
- Maintainability
- Security
- Testability
- Extendibility
i) Functional requirements define what data the system must produce and what transformations of
that data the system must be able to do.
ii) Performance requirements describe how fast it must do the transformations, how many it must do
and any limitations on the amount of utilization of the agents used to support the transformation
(e.g., amount of machine time, amount of disk space).
iii) Usability requirements describe the ergonomics of the system (e.g., ease of correctly interpreting
the information on a screen).
iv) Reliability defines the degree of accuracy required in the transforms. In billing this be 100%. In
weather forecasting it could be plus or minus 5% for a short term forecast.
v) Availability defines the amount of time the system is actually up during the time periods it is
supposed to be up. This is usually defined as a percentage, qualified with standard deviations. Mean
time to failure, by type of failure, further defines system availability.
vi) Serviceability addresses how quickly the system can be corrected when it is discovered to be
unreliable or unavailable. This might be expressed as the mean time to fix. Mean time to fix is
usually qualified by the type and severity of the failures.

ERGONOMICS

Ergonomics is the science of fitting workplace conditions and job demands to the capabilities of the
working population. Effective and successful "fits" assure high productivity, avoidance of illness and
injury risks, and increased satisfaction among the workforce. Although the scope of ergonomics is much
broader, the term here refers to assessing those work-related factors that may pose a risk of
musculoskeletal disorders and recommendations to alleviate them. Common examples of ergonomic risk
factors are found in jobs requiring repetitive, forceful, or prolonged exertions of the hands; frequent or
heavy lifting, pushing, pulling, or carrying of heavy objects; and prolonged awkward postures. Vibration
and cold may add risk to these work conditions. Jobs or working conditions presenting multiple risk
factors will have a higher probability of causing a musculoskeletal problem. The level of risk depends on
the intensity, frequency, and duration of the exposure to these conditions and the individuals' capacity to
meet the force of other job demands that might be involved.

is about making things better. The better the ergonomics the more efficient the tool, task or system is.
That makes for a happier, healthier user, a streamlined system and a lower bottom line. Who doesn't
want some of that?

1. Better Comfort

A core benefit of ergonomics is an increase in the user's comfort. Most often user comfort is seen as the
focus of ergonomics but it is actually a result of improving the ergonomics through a more intuitive design
that supports natural .

2.

Clear communication between the user and whatever is being used is another benefit of ergonomics.

3. Reduce Skill Level


Another benefit of ergonomics is that with better ergonomics the amount of training needed for proper
operation is reduced. If you never need to read the owner's manual then it has good ergonomics.
4.
Ergonomics is about making things more efficient. And one of the benefits of ergonomics is that by
increasing the efficiency of a tool or a task, you tend to shorten the length of time it takes to accomplish
your goal.

5. Reduce Fatigue

With increased comfort and easier to understand usage come reduction in , another benefit of ergonomics.

6. Increase Accuracy

Ergonomics also benefit your by lessoning the chance of errors. From a system perspective this is one of
the greatest benefits from ergonomics.

7. Lessen Chance of Injury


A great benefit of ergonomics if that there is less of a chance to injure yourself or someone else. When
you spend less time performing a task with tools that are intuitive to use, don't require special mental or
physical skill, and do not fatigue you then a lot of causes of injuries are removed.

8. Lower Cost

The cost of an individual tool may not be lowered. In the case of most specially designed "Ergonomic"
tools they are actually much higher. But the overall cost in terms of time, labor and other inputs (blood,
sweat and tears) come down.

Benefits of ergonomics
1. Increased savings
• Fewer injuries
• More productive and sustainable employees
• Fewer workers’ compensation claims
– The average direct cost of a workers compensation claim.
– The indirect costs involved bring the total average claim cost to well over $32,000
2. Fewer employees experiencing pain
• Implementing ergonomic improvements can reduce the risk factors that lead to discomfort.
3. Increased productivity
• Ergonomic improvements can reduce the primary risk factors for MSDs, so workers are more efficient,
productive, and have greater job satisfaction.

4. Increased morale
• Attention to ergonomics can make employees feel valued because they know their employer is making
their workplace safer.
5. Reduced absenteeism
• Ergonomics leads to healthy and pain-free workers who are more likely to be engaged and productive.

SAFETY PRECAUTIONS AND PRACTICES IN THE COMPUTER LABORATORY


a) Behaviour in the computer laboratory
The following rules must be followed in and around a computer laboratory;
i) Avoid smoking and exposing computers to dust
ii) Avoid carrying food and beverages to the computer room
iii) Avoid unnecessary movements because you may accidentally knock down peripheral devices
iv) At all times follow correct procedure for starting and shutting down the computer to avoid
loss of data and damage to computer programs
v) Do not open up the metallic covers of computers or peripheral devices without permission
and particularly when the computer power is still on.
b) Protection against fire
A computer room should have carbon dioxide type of fire extinguishers
c) Cables insulation
All power cables should be insulated and laid away from busy pathways
d) Stable power supply
To protect the computer from being damaged due to power instabilities, avoid connecting it directly
to the main supply. Instead, connect it to a special device called Uninterruptible Power Supply
(UPS). This device performs two main functions
i) It regulates power from unstable source to the required clean stable voltage by eliminating
surges and burnouts.
ii) It temporarily provides power to the computer in case of a sudden power failure hence
allowing the user to save his/her work and shut down the computer using the right procedure.
e) Burglar proofing
This deter unauthorized entry into the computer room by use of metal grills and alarm systems
f) Ventilation
This is necessary to avoid suffocation and overheating
g) Dust and dump control
Dust covers need to be in place when computers are not in use and installing dehumidifiers in the
room to control high humidity
h) Lighting
i) Well lit room prevents eyestrain that eventually leads to headache, stress and fatigue
ii) Users should ensure screen brightness is well adjusted before use
iii) It is recommended to use tinted screens or those fitted with radiation filter
iv) Avoid flickering monitor because it can damage eyesight
i) Standard furniture
The table must be high and wide enough to accommodate all peripherals. The seat should be high
enough to enable comfortable use of hands on the key board and the eyes must be at the same level
as the top of the screen when the user is seated upright. The seat must have a straight backrest that
allows someone to sit upright to avoid muscle pains and backaches caused by poor sitting posture.

Components of a computer system

COMPUTER HARDWARE
The system Unit
This is the part that houses the brain of the computer called the Central Processing Unit (CPU) and other
devices called drives. Drives are used to store, record and read data.
a) Input devices
i) Keyboard - Keyboard layout

 A standard QWERTY keyboard has about 102 keys grouped into categories;
- Functional keys
- Alphabetic keys
- Special keys
- Cursor movement keys
- Numeric keypad
The following are some functions of important keys on the keyboard
2) The Function Keys (F1- F12)
These keys are used to perform specific tasks eg F1 to activate help menu in MS-Word
3) Alphabetic keys
These are keys with alphabetical letters used for typing letters and words.
4) Special keys
These are keys used either alone or in combination with others to perform a function. Eg
i) Control Keys (Ctrl)
Used as a shortcut to activate task when held down while taping another key eg
Ctrl + C = Copy
Ctrl + S = Save
Ctrl + V = paste
Ctrl + A = Select all
Ctrl + P = Print
Ctrl + Z = Undo
Ctrl + Y = Redo
Ctrl + U = Underline
Ctrl + X = cut
Ctrl + B = Bold
Ctrl + I = italic
Ctrl + N = New window
ii) Alternate Keys (Alt)
They are used as a shortcut to activate a menu or task when held down when typing another key
e.g.
 Alt + I = Inset Alt +O = Format
 Alt + A = Table
 Alt + W = Window
 Alt +H = Help
 Alt + Y = Yes
 Alt + N = No
 Alt + F4 = Close window
 Alt + F = File
 Alt + E = Edit
 Alt + V = View

iii) Shift Keys (Shift)


Used as a shortcut to activate task when held down while typing another key e.g.
 To change case lower to upper or vice versa (Shift + A = a)
 To activate a character on upper part of a key eg (Shift + 2 = @, Shift + / =?)
iv) Num lock;
Used to change the numeric keypad to number entry mode or to directional arrow keys
v) Page up (pg up)
Used to move the insertion point (cursor) to the top of the page
vi) page down(pg dn)
Used to move the insertion point (cursor) to the bottom of the page
vii) home
Used to move the insertion point (cursor) to the beginning of a line
viii) end
Used to move the insertion point (cursor) to the end of a line
ix) insert keys
 it turns on the typeover or insert mode
 when insert mode is on, existing text is pushed to the right as new text is being typed, and
when typeover mode is on, existing text is over-written as new text is being typed over it.
x) delete key (Del)
 it is used to erase a character, space, or any code that is to the right of the cursor
 it can also erase selected (highlighted) text, file or folder
xi) Back space
It is used to erase a character, space, or any code that is to the left of the cursor

xii) Caps Lock


 It is used to change the keyboard mode from upper case to lower case and vice versa.
 If this button has been pressed, a light will appear on the right hand side of the keyboard
xiii) Space bar
Adds blank spaces between words, letters, figures etc.

xiv) Enter key


Also referred to as Return key used to
 accept a selection/action
 insert a blank line between paragraphs, lines etc
 start a new line
 end a line

xv) Tab Key


It is used to indent text to the next tab setting
xvi) Escape Key
It is used to cancel dialog box or task being performed
5) Navigation Keys (Directional arrow keys)
They are used to move the cursor (insertion point) as per the direction that is on the key ie, up,
down, left, right

6) Numeric keypad
Enter numbers 0-9

ii) Mouse
It is an input device which lets user move the cursor around the screen. It has at least two buttons.
The left button select icons and commands. The right button brings up a menu.
A mechanical mouse has a rubber or metal ball on it’s under side. When the ball rolls in a certain
direction, electronic circuits in the mouse translated the movement of the mouse into signals that
the computer can process. A mouse pad is a rectangular rubber or a foam pad that provides a better
traction than the top of a desk.
An optical mouse, by contrast, has no moving mechanical parts inside. Instead, it uses devices that
emit and sense light to detect the mouse movement.
A mouse contacts the computer in several ways. Many are attached to a serial port, mouse port or
USB port and system.

Terms used in mouse action.

a) Point. Moving the mouse pointer to a desired spot on the screen such as over a particular word or
object.

b) Click. Used to select or highlight an object or icon on the screen. Also click is used to position the
cursor for instance in a word processor to indicate where to start inserting text, numbers, pictures or
images. This is done by pressing and releasing quickly, the left mouse button once.

c) Double click is used to open icons on the desktop. This is done by, pressing the left mouse button in
two quick successive clicks.

d) Drag & drop is used to change the position of icons on the desktop. It’s also used to move an icon
from one location to another. This is done by pressing and holding down the left mouse button over an
icon; the mouse pointer is used to move the object to a new location or position and then release it.

e) Right click is used to access shortcut menu. This is done by, pressing the right mouse button once, and
then a pop-up menu appears.
f) Scrolling
This is the process of moving the open window content either upward or downward using vertical
scroll bar or to the left or right using horizontal scroll bar.

iii) Magnetic card input


It reads odd-shaped numbers printed with magnetic ink on cheques and is used in the banks.

iv) TOUCH SCREEN


It responds when the user points to or touches different screen regions. Computers with touch
screen are frequently used in the airport, public libraries and shopping malls.

v) Voice input devices (Voice Recognition device)


One of the latest input devices is the voice recognition device, which recognizes spoken words.
However, this only implies that the computer can take dictation, not that it understands what is
being said. However, they generally require an extended training session during which the
computer system becomes accustomed to a particular voice and accent. Such systems are said to be
speaker dependent. Many systems also require that the speaker speak slowly and distinctly and
separate each word with a short pause. These systems are called discrete speech systems.
Examples of where it is used include high security areas like in nuclear reactors where individual
voice is used as password to open doors to allow staff get to the plant.
vi) Trackball is a movable ball on top of a stationary device that is rotated with fingers or palm of the
hand. It’s like an upside down mouse with a protruding ball on top.

vii) Pointing stick looks like a pencil eraser protruding from the keyboard between letters G, H and B.
Trackball
It is commonly found in laptops.

viii) Joystick is a pointing device that consists of a vertical handle like gearshift lever mounted on a
base with one or two buttons. Joysticks are used in video and computer games.

ix) Touch pad is a small, flat surface which you slide your finger to move the cursor. Touch pads
have sensors used to detect finger movement. They’re also found in laptops.

x) Light pen contains a light sensitive cell on its tip. Light pen is a light-sensitive stylus, or pen like
device connected by a wire to the computer terminal. The user brings the pen to a desired point on
the display screen and presses the pen button, which identifies that screen location to the computer.
Engineers and illustrators use light pens.
xi) The other device is a microphone

Advantages & disadvantages of the following pointing devices.


Advantages. Devices. Disadvantages.

- Relatively inexpensive - When gripped too tightly can cause


muscle strain
Mouse
- Very little finger movement - Uses more desk space than other
needed to reach buttons pointing devices

- Must be cleaned regularly

- Requires less arm movement - Wrist is bent during use


than mouse
Trackball - More finger movement needed to
reach buttons than with other pointing
devices

- Small footprint - Places more stress on index finger


than other pointing devices do
Touch pad
- Least prone to dust - Small active area makes precise
cursor control difficult

Optical readers and scanning devices.

Optical readers are input devices used in data processing, which read the data directly from source of
information.

Scanning devices use laser beam and reflected light to translate images, text, drawings, photos and
symbols into digital form.

The following are examples of optical readers and scanning devices: -

i). Barcodes are vertical zebra stripped marks that you can see on most manufactured products. For
instance in supermarkets, barcodes are used for the stock control. Barcode readers works on the
principle that a narrow beam light from the reader is reflected back from the patterns of black lines
of various widths on the barcode; and changed into a series of electrical pulses. This enables the
computer to identify the item.

Bar code reader


-It uses light to read universal product codes (UPCs), inventory goods, and other goods
created from patterns of variable width bars. It is used in super- markets and some
libraries.
-Uses the principle of light to scan the data

ii). Magnetic ink character recognition (MICR) used by banks for handling cheques. Some of the
characters are printed in special magnetic ink.

A barcode & barcode number


A sample cheque

iii). Optical mark reader (OMR) works on the principle that a beam light is used to read and detect
marks on specially prepared documents e.g. answer sheets for multiple choice in an examination.

iv). Optical character reader (OCR). This is a device used to read printed characters (letters & figures)
in a particular font and concerts them into a digital code. It is used in preparation of gas and
electricity bills.

v). Scanner is a device that translates photos, images, drawings and text into digital form.

A flatbed scanner

It an input device that can create a digital representation of a printed image.

b) Output hardware/Devices.

These are devices that translate information processed by the computers into a form that
humans can understand.

The two types of outputs are soft copy such as the one shown on the display screen, and the
hard copy, which is a printout from a printer.

Soft copy refers to data that is shown on the monitor, audio or voice form. This kind of output
is not tangible.

Hard copy is a printout from a printer and these are tangible output.

i) Monitor (Visual display unit)


The display screen are also called monitors which serve as a one way window between
the computer user and the machine. Most displays fold into one of the two classes:
television –style cathode-ray tube (CRT) monitors and flat-panel liquid crystal display
(LCD) displays. Overhead projection panels and video projectors also use LCDs to
project computer screen images for meetings and classes.

ii) Printer
A printer can produce a hard copy on paper of any static information that can be
displayed on the computer screen. Printer come in several varieties, but they all fit into
two basic groups: impact printers and nonimpact printers.

iii) Sound output devices


Most modern PCs include sound cards. A sound card enables the PC to accept
microphone input, play music and other sounds through the speakers or headphones and
process sound in a variety of ways.

iv) Fax machine and fax modem


A fax machine is a fast and convenient tool for transmitting information stored on
paper. In a sense, when combined, fax machines and telephone lines serve as a long
distance photocopy machine.
The fax modem translates the document into signals that can be sent over the phone
wires and decoded by the receiving fax machine.

v) Display screens.

Display systems convert computer signals into text and pictures and display them on a
television like screen. Display screens use either cathode ray tube (CRT), liquid crystal display
(LCD), plasma or flat panel display.

An example of CRT is a monitor. A monitor is a specialized high-resolution screen similar to


high quality television set. The video card sends the contents of the system memory via the
video RAM on the VGA card into the monitor.

vi) Speakers.

Speakers are output devices that communicate sound to the user. Speakers produce soft copy output.

viii) Printers.

A printer is an output device that prints characters, symbols and graphics on a paper or any other hard
copy medium.

There are two classes of printers: -

1. Impact printers.

2. Non-impact printers.

1) Impact printer forms characters or images by striking on the paper with “hammers” when printing
against an inked ribbon. Therefore the printing head comes into contact with the printing media.

Impact printers can be further subdivided into: -

i). Line printers.

ii).Character printers.

i). Line printers print one line of characters at a time. It prints at a rate of 300 to 3000 lines per
minute.

Examples of line printers are drum printers and chain printers.

ii). Character printers. They print one character at a time. They are much slower than the line
printers.

Examples of character printers include daisy wheel and dot matrix printers.
2. Non-impact printers don’t have “hammers”. The printing head does not come into contact with the
printing media. Instead it uses laser beam to produce a printout. Non-impact printers print a page at a
time.

Examples of non-impact printers are laser and inkjet printers.

a) Laser printers use a laser beam to create a page printout. It is a high quality printer, which operates at
a high speed.

b) Ink jet printers use the concept of spraying ink onto the paper. Ink is sprayed from tiny holes on the
ink cartridge onto the paper. Print quality is better than impact printers but not as good as laser
printers.

Advantages and disadvantages of both laser and ink jet printers.

Laser printers. Ink jet printers.

Advantages. Advantages.

 They are quiet and fast when printing.  They are also quiet & fast when printing.

 Produces excellent quality printout.  Less expensive to buy compared to laser


printers.

 Produce coloured printout.

Disadvantages. Disadvantages.

 They are expensive in terms of price They are routinely slow when printing a
and maintenance. coloured document.

 Most of them are single colour printers.

Comparison between impact & non-impact printers.

Impact printers. Non-impact printers.

 Cheap to buy.  Expensive to buy.

 Slow when printing.  Fast when printing.

 Relatively poor quality printout.  Produces high quality printout.


 Noisy when printing.  Quiet when printing.

Plotters are used for producing technical drawings or even marketing materials such as posters. They can
print on architectural size paper.

Central Processing Unit (CPU) / Microprocessor architecture.

The central processing unit is the electronic circuitry that controls the interpretation and execution of
instructions. The computer’s control centre is made up of the processing and main memory devices,
housed in the computer’s system unit. The system unit houses the part of electronic circuitry that does the
actual processing and the main memory that supports processing, which together are called processing
hardware. This is made up of the central processing unit (CPU), the arithmetic logic unit (ALU) and the
control unit (CU).

A motherboard is the central (PCB) in many modern and holds many of the crucial components of the
system, while providing connectors for other peripherals. The motherboard is sometimes alternatively
known as the main board, or system board

A motherboard, like a , provides the electrical connections by which the other components of the system
communicate, but unlike a backplane, it also connects the central processing unit and hosts other
subsystems and devices

The term main board is archaically applied to devices with a single board and no additional expansions or
capability. In modern terms this would include and controlling boards in televisions, washing machines,
etc. A motherboard specifically refers to a printed circuit with the capability to add/extend its
performance.

computers generally use highly integrated, miniaturized and customized motherboards. This is one of the
reasons that laptop computers are difficult to upgrade and expensive to repair. Often the failure of one
laptop component requires the replacement of the entire motherboard, which is usually more expensive
than a desktop motherboard due to the large number of integrated components.

Prior to the advent of the , a computer was usually built in a card-cage case or with components
connected by a consisting of a set of slots themselves connected with wires; in very old designs the wires
were discrete connections between card connector pins, but printed circuit boards soon became the
standard practice. The , memory and were housed on individual printed circuit boards which plugged into
the backplane.

A typical has its , , and other essential components connected to the motherboard. Other components such
as , controllers for display and , and devices may be attached to the motherboard as plug-in cards or via
cables, although in modern computers it is increasingly common to integrate some of these peripherals
into the motherboard itself.

There are four major functional elements or units in a microprocessor system/CPU, namely: -

1) The arithmetic logic units


This unit performs the fundamental arithmetic operations and it’s composed of two sections.

i) Arithmetic unit – this performs the calculations such as addition, multiplication, division and
subtraction.
ii) The logic unit – this performs the comparisons such as true or false, greater than, equal to,
less than, etc.

CPU

MAIN MEMORY

INPUT CONTROL UNIT


OUTPUT

External bus
ARITHMETIC LOGIC UNIT

2) The control unit. It directs the movement of electronic signals between main memory and the
arithmetic logic unit. It also directs these electronic signals between main memory and the
input/output devices. It processes the instructions and data stored in the computer and transfers
them to the arithmetic logic unit. For every instruction, the control unit carries out four basic
operations known as the- machine cycle. In the machine cycle the CPU (i). Fetches an instruction
(ii). Decodes the instruction (iii). Executes the instruction (iv). Stores the results.

CPU Operation
The fundamental operation of most CPUs, regardless of the physical form they take, is to execute
a sequence of stored instructions called a program. The program is represented by a series of
numbers that are kept in some kind of . There are four steps that nearly all CPUs use in their
operation: fetch, decode, execute, and writeback.
i. The first step, fetch, involves retrieving an (which is represented by a number or sequence of
numbers) from program memory. The location in program memory is determined by a (PC),
which stores a number that identifies the current position in the program. In other words, the
program counter keeps track of the CPU's place in the program.
The instruction that the CPU fetches from memory is used to determine what the CPU is to do.
ii. In the decode step, the instruction is broken up into parts that have significance to other portions
of the CPU. The way in which the numerical instruction value is interpreted is defined by the
CPU's instruction set architecture (ISA).
However, in more abstract and complicated CPUs and ISAs, a micro-program is often used to
assist in translating instructions into various configuration signals for the CPU. This micro-
program is sometimes rewritable so that it can be modified to change the way the CPU decodes
instructions even after it has been manufactured.
iii. After the fetch and decode steps, the execute step is performed. During this step, various portions
of the CPU are connected so they can perform the desired operation. If, for instance, an addition
operation was requested, an (ALU) will be connected to a set of inputs and a set of outputs. The
inputs provide the numbers to be added, and the outputs will contain the final sum. The ALU
contains the circuitry to perform simple arithmetic and logical operations on the inputs.
iv. The final step, writeback, simply "writes back" the results of the execute step to some form of
memory. Very often the results are written to some internal CPU register for quick access by
subsequent instructions. In other cases results may be written to slower, but cheaper and larger, .
Some types of instructions manipulate the program counter rather than directly produce result
data. These are generally called "jumps" and facilitate behavior like , conditional program
execution (through the use of a conditional jump), and in programs.
After the execution of the instruction and writeback of the resulting data, the entire process
repeats, with the next instruction cycle normally fetching the next-in-sequence instruction because
of the incremented value in the program counter. If the completed instruction was a jump, the
program counter will be modified to contain the address of the instruction that was jumped to,
and program execution continues normally. In more complex CPUs than the one described here,
multiple instructions can be fetched, decoded, and executed simultaneously.

3) Registers are special high-speed storage areas. The control unit and the ALU also use registers,
special areas that enhance the computer’s performance. Therefore, registers are high-speed storage
areas that temporarily store data during processing.

They may store program instructions while it is being decoded; stores data while it is being
processed by the ALU or store the results of a calculation.

4) Computer bus. A bus is a set of parallel wires or electronic pathway used to transmit data,
commands/instructions and power between the CPU and other components of the motherboard.

A bus resembles a multilane highway. The more bus lines it has, the faster the data bits can be
transferred.

A bus is a path between components of a computer. There are two main buses in a computer; the
internal (or system) bus and the external (or expansion) bus. The system bus connects all the
internal computer components to the CPU ankind main memory.

When a word or data is transferred between units, all the bits are transferred in parallel over a set
of lines called bus. In addition to the lines that carry the data, the bus must have lines for address
and control progress.

All buses consist of two parts; an address bus and a data bus.

The data bus transfers information about the data whereas the address bus transfers information
about where the data should go. The size of a bus determines how much data can be transmitted at
a time.

Every bus has a clock speed measured in Mhz. A fast bus allows the data to be transferred faster.
This makes applications run faster on PCs.

Characteristics of a bus

A bus is characterized by the amount of information that can be transmitted at once. This amount,
expressed in bits, corresponds to the number of physical lines over which data is sent
simultaneously. A 32-wire ribbon cable can transmit 32 bits in parallel. The term “width” is used
to refer to the number of bits that a bus can transmit at once.

Additionally, the bus speed is also defined by its frequency (ranging from 100-133 Hertz), the
number of data packets sent or received per second. Each time that data is sent or received is called
a cycle. This way, it is possible to find the maximum transfer speed of the bus.

Bus Categories

In reality, each bus is generally constituted of 50 to 100 distinct physical lines, divided into three
subcategories.
i). Address bus

The address bus (sometimes called the memory bus) transports memory addresses which the
processor wants to access in order to read or write data. It is a unidirectional bus. It connects only
the CPU and RAM and carries only memory address (Note- each byte in RAM is associated with a
number which is its memory address.

ii). Data bus

The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.
Actually it is a group of parallel wires.

iii). Control bus

The control bus or (command bus) transfers orders and synchronization signals coming from the
control unit and travelling to all other hardware components. It is a bidirectional bus, as it also
transmits response signals from the hardware.

The primary buses

There are generally two buses within a computer;

i). System (internal) bus – sometimes called the front-side bus, or FSB for short. Cables from disc
drives and other internal devices are plugged into the bus. The internal bus allows the processor to
communicate with the system’s central memory the RAM. It enables various motherboard
components (USB, serial and parallel ports, cards inserted in PCI connectors, hard drives, CD-
ROM and CD- RW drive etc) to communicate with one another.

ii) External (Expansion) bus

This connects external devices such as keyboard, mouse, modem, printer and so on to the CPU.
However, it is mainly used to add new devices using what are called expansion slots connected to
the Central Processing Unit.

Other classification of buses

a) Universal Serial Bus (USB) and IEEE 1394 (firewire)

It has enabled each USB port to support upto 127 different devices. USB or firewire
compliant devices such as key boards, mice, printers and modems can all be plugged into a
single USB port. This has therefore eliminated the need for expansion slots and boards.

b) The Industry Standard Architecture (ISA) bus

It is a 16-bit data bus used in many computers to attach slower devices such as input
devices and modems to the CPU

c) The Accelerated Graphics Port (AGP) bus


These buses incorporate a special architecture that allows the video card to access the
system RAM directly, greatly increasing the speed of graphic performance.

d) Local Bus

It is an internal system bus that runs between components on the motherboard and is mostly
coupled with one or more kinds of expansion buses.

e) The Periphery Component Interconnect(PCI) bus

It is a type of local bus designed for easier integration of new data types such as video, audio
and graphics.

Advantages of using buses

a) Reduce computer weight due to fewer wires


b) Easy to install
c) Cost effective(only single cable is required)
d) Easy identification of cable faults
e) Well suited for temporary or small networks not requiring high speed (quick set up), resulting
in faster network.
f) Cheaper than other topologies

5)Peripherals
These are attachments to the system unit and include keyboard, mouse, speakers etc

6)Storage Media/Storage hardware.

A storage device reads and records information on storage media. The computer uses information
stored on the storage media to perform tasks. Popular examples of storage devices includes a
hard disk, floppy drive, CD-Recordable drive and tape drive.

i) Primary (Main memory) storage


The memory unit stores information inform of instruction and data. Computer memory is
contained on memory chips mounted on the motherboard.
There are two types of main memory in use today: Random Access Memory (RAM) and the
Read Only Memory (ROM).

Random Access Memory (RAM)


It is the most common computer memory which can be used by programs to perform
necessary tasks while the computer is on, an integrated circuit memory chip allows
information to be stored or accessed in any order and all storage locations are equally
accessible.

The RAM is the place in a computer where the operating system, application programs, and
data in current use are kept so that they can be quickly reached by the computer’s processor.
RAM is much faster to read from and write to than the other kinds of storage in a computer,
the hard disc, floppy disc, and CD-ROM. However, the data in RAM stays there only as long
as your computer is running. When you turn off your computer, RAM loses its data. When
you turn on your computer again, your operating system and other files are once again loaded
into RAM usually from the hard disc.

There are two technologies used for RAM memories; static and dynamic.
STATIC RAM
It stores a bit of information with a flip-flop i.e. the contents of a static RAM remains stable
forever, as long as power is available.

DYNAMIC RAM
It stores a bit of information as a charge. Due to the way in which the information is stored
here, the packing density is much higher than for static RAM.

READ ONLY MEMORY


On the other hand, ROM provides permanent or semi permanent storage only, its content can
be read but cannot be re-written during normal computer operations (is non-volatile). It stores
some standard processing programmes supplied by the manufactures to operate the personal
computer (PC). The basic input/output program is stored in the ROM that examines and
initializes various equipment attached to the PC, when the switch is made ON.
One important reason a computer needs ROM is that it must know what to do when the
power is first turned on. Among other things, ROM stores a set of start-up instructions, which
ensures that the rest of memory is functioning properly, checks for hardware devices and
checks for an operating system on the computer hard disc.

Special purpose memories


Apart from ROM and RAM there are several types of special purpose memories found inside the
CPU or in the input/output devices. These memories are vital because they increase the overall
performance of data and instructions moving in and out of the CPU. These are;
a) Buffers
This is a temporary holding place that may be part of CPU or built in an input or output
device. Because the CPU is very fast compared to the I/O devices, buffers provide
temporary storage so that the CPU is set free to carry out other activities instead of waiting
for all data to be entered or information to be output. A printer buffer temporarily holds the
output to be printed hence freeing the CPU to perform other functions. Buffers can hold
more than one piece of data at a time
b) Registers
As opposed to buffers, registers hold one piece of data at a time and are inside the CPU.
Examples of registers are;
i) An Accumulator
This temporarily holds the results of the last processing step of an ALU
ii) Instruction register
This temporarily holds an instruction just before it is interpreted into a form that
CPU can understand it.
iii) An address register
This temporarily holds next piece of data waiting to be processed
iv) Storage register
This temporarily holds a piece of data that is on its way to and from the CPU
and the main memory
c) Cache Memory
Most modern processors incorporate small high-speed type of Static RAM (SRAM)
called cache memory. Its purpose is to allow the processor to access data and
instructions even more faster than it would have taken to fetch it from the relatively
slow Dynamic RAM.

ii) Secondary storage devices

Hard Discs
A hard disc is a metal platter coated with magnetic oxide that can be magnetized to represent data.
Hard discs come in a variety of sizes.
- Hard disc for mainframes and minicomputers may be as large as 14 inches in diameter. Several discs
can be assembled into a disc pack. There are different types of disc packs, with the number of platters
varying by model. Each disc in the pack has top and bottom surfaces on which to record data. Many
disc devices, however, do not record data on the top of the top platter or on the bottom of the bottom
platter.
The mechanism for reading or writing data on a disc is an access arm; it moves a read/write head into
position over a particular track. The read/write head on the end of the access arm hovers just above the
track but does not actually touch the surface. When a read/write head does accidentally touch the disc
surface, this is called a head crash and all data is destroyed. Data can also be destroyed if a read/write
head encounters even minuscule foreign matter on the disc surface.

- Tapes
- The amount of data on a tape is expressed in terms of density, which is the number of characters per
inch (CPI) or bytes per inch (bpi) that can be stored on the tape.

The highest-capacity tape is the digital audio tape, or DAT, which uses a different method of recording
data. Using a method called helical scan recording, DAT wraps around a rotating read/write head that
spins vertically as it moves. This places the data in diagonal bands that run across the tape rather than
down its length. This method produces high density and faster access to data.

Two reels are used, a supply reel and a take-up reel. The supply reel, which has the tape with data on it
or on which data will be recorded, is the reel that is changed. The take-up reel always stays with the
magnetic tape unit. Many cartridges and cassettes have the supply and take-up reels built into the same
case.

Tape now has a limited role because disc has proved the superior storage medium. Disc data is quite
reliable, especially within a sealed module. Furthermore, as we will see, disc data can be accessed
directly, as opposed to data on tape, which can be accessed only by passing by all the data ahead of it
on the tape. Consequently, the primary role of tape today is as an inexpensive backup medium.

- Diskettes

Made of flexible Mylar, a diskette can record data as magnetized spots on tracks on its surface.
Diskettes became popular along with the personal computer.

The older diskette, 5-1/4 inches in diameter, is still in use, but newer computers use the 3-1/2 inch
diskette (Figure 1). The 3-1/2 inch diskette has the protection of a hard plastic jacket, a size to fit
conveniently in a shirt pocket or purse, and the capacity to hold significantly more data than a 5-1/4
inch diskette.

- Flash discs
Personal computer users, who never seem to have enough hard disc storage space, may turn to a
removable hard disc cartridge. Once full, a removable hard disc cartridge can be replaced with a fresh
one. In effect, a removable cartridge is as portable as a diskette, but the disc cartridge holds much
more data. Removable units also are important to businesses concerned with security, because the
units can be used during business hours but hidden away during off hours. A disadvantage of a
removable hard disc is that it takes longer to access data than a built-in hard drive. Also it can be
infected with viruses which delete files.

- Optical Disc Storage


The technology works like this: A laser hits a layer of metallic material spread over the surface of a
disc. When data is being entered, heat from the laser produces tiny spots on the disc surface. To read
the data, the laser scans the disc, and a lens picks up different light reflections from the various spots.

Optical storage technology is categorized according to its read/write capability. Read-only media are
recorded on by the manufacturer and can be read from but not written to by the user. Such a disc
cannot, obviously, be used for your files, but manufacturers can use it to supply software. Applications
software packages sometimes include a dozen diskettes or more; all these could fit on one optical disc
with plenty of room to spare. The most prominent optical technology is the CD-ROM, for compact
disc read-only memory.
 The Compact Disc Read-Only Memory (CD-ROM)
The most prominent optical technology is the CD-ROM, for CD-ROM has a major advantage over
other optical disc designs: The disc format is identical to that of audio compact discs, so the same dust-
free manufacturing plants that are now stamping out digital versions of Mozart or Mary Chapin
Carpenter can easily convert to producing anything from software to an encyclopedia. Furthermore,
CD-ROM storage is large -up to 660 megabytes per disc, the equivalent of over 400 3-1/2 inch
diskettes.

 Digital Versatile Disc (DVDs)


Digital Versatile Disc (DVD) is a flat disc, the size of a CD - 4.7 inches diameter and .05 inches thick.
Data are stored in a small indentation in a spiral track, just like in the CD. DVD discs are read by a
laser beam of shorter wave-length than used by the CD ROM drives. This allows for smaller
indentations and increased storage capacity. The data layer is only half as thick as in the CD-ROM.
This opens the possibility to write data in two layers. The outer gold layer is semi transparent, to allow
reading of the underlying silver layer. The laser beam is set to two different intensities, strongest for
reading the underlying silver layer.

A 4.7 GB side of a DVD can hold 135 minutes top quality video with 6 track stereo. This requires a
transmission rate of 4692 bits per second. The 17 GB disc holds 200 hours top quality music
recording.

Units of measuring storage hardware.

Most computer systems use digital or binary system where two voltages low & high are used, 0volts &
+5volts. This voltages are denoted as “0” & “1” respectively.

A computer system’ data/information storage capacity is represented by bytes, kilobytes (KB), megabytes
(MB), gigabytes (GB), and terabytes (TB).

Roughly a byte = 1 character of data, Kilobyte = 1000 bytes, megabyte = 1 million bytes, gigabyte = 1
billion bytes and terabyte = 1 trillion bytes.

Letters, numbers and special characters are represented within a computer by means of binary coding
schemes. That is, the off and on or “0” and “1” are arranged in such a way that they can be made to
represent characters, digits or other values.

A bit is one of the binary digits either “0” or “1”.

Byte. A group of eight bits forms one byte or one byte consists of eight bits. Bytes are used to measure the
amounts of information a device can store.

A character can be a number, letter or symbol. Therefore, a bit is the smallest unit of information a
computer can process.

Kilobyte (K). This is approximately equal to one page of a double spaced text.

Megabyte (MB). This is approximately equal to one book.

Gigabyte (GB) is approximately equal to 1000 books or a study lined with bookshelves.

Terabytes (TB) is approximately equal to one entire library of books.


Binary coding schemes.

There are two common coding schemes namely: -

1. ASCII. It is pronounced “Ask-ee”. ASCII stands for American Standard Code for Information
Interchange and is the binary code most widely used with microcomputers. Besides more conventional
characters, ASCII includes such characters as math symbols and Greek letters.

2. EBCDIC. It is pronounced “Eb-see-dick”. EBCDIC stands for Extended Binary Code Decimal
Interchange Code and is a binary code used with large computers such as mainframes.

Number systems & representations.

Computers do not use a decimal numbers system which humans are used to. There are other number
systems apart from decimal number system namely: -

i). Octal number system.

ii). Hexadecimal number system.

iii). Decimal number system consists of 0-9 digits that a human can understand.

iv). Binary number system is the number system used in digital computers and other digital
applications.

Decimal-binary equivalence.

NB:
Decimal. Binary.
 The subscript (2) is used for the binary system.
 The subscript (10) is used for the decimal system.
0 0 Binary operations.

To perform binary operations, the following sets of rules are


1 1 used.

i). 0+0=0
2 10 ii). 0+1=1
iii). 1+0=1

3 11

100
4 Therefore, 910 = 10012

5 101

6 110

7 111
8 1000

9 1001

Conversion of decimal to binary & vice versa.

The binary number system is a weighted code where the value of a digit depends on its position.

The most significant bit is at the left while the least significant bit is at the right. The decimal value of a
binary digit “1” is given by 2k-1 where “K” is the position of the bit counting from right to left.

 Binary to decimal conversion.

Example 1.

i). Convert binary number 1100102 to decimal.

To convert the above binary number to decimal, we compute it as follows: -

(1×25) + (1×24) + (0×23) + (0×22) + (1×21) + (0×20)

32 + 16 + 0 + 0 + 2 + 0 = 5010

Therefore, 1100102 = 5010

 Decimal to binary conversion.

When converting from decimal to binary, the decimal number is continuously divided by two (2). The
remainder of each subsequent division is written down sequentially. Therefore, the reverse order of
this sequence gives the binary equivalent.

Example 1.

Convert decimal number 1910 to binary. Therefore, 1910 = 100112

Remainder.
Subscript. Decimal
number.

2 19 1

2 9 1

2 4 0

2 2 0

2 1 1
0

 Converting decimal fraction to binary.

Example 1.

i). Convert decimal fraction 548.35610 to binary.

Subscript. Decimal Remainder.


number.

0
2 548

2 274 0

2 137 1

2 68 0

2 34 0

2 17 1

2 8 0

Decimal Remainder
2 4 0 fraction.

0.356*2=0.712 0
2 2 0
0.712*2=1.424 1

0.424*2=0.848 0
2 1 1

Therefore, 548.35610 = 1000100100.0102


POWER AND INTERFACE CABLES
Inside the system unit is a special power supply unit that supplies power to the motherboard and other
internal devices. In order to connect the computer to the mains power outlet, one needs power cables
that link the power supply to the outlet.
a) Interface cables
An interface cable is connected to the device at one end and to the motherboard via ports on
the other end. The interface cable transmits data signals.
b) Parallel cables and ports
These cables transmit information simultaneously using a set of many conductors (wires) over
a short distance e.g. to printers and removable storage drives like the zip drive/flash disc. For
example if a cable uses 8 conductors to transmit data at the same time, it is said to be an 8-bit
parallel cable. 25 pin parallel female ports can be found in computers.
c) Serial cables and ports
Unlike the parallel cables, serial cables transmit one bit at a time. Although they are slow, they
are much more reliable than the parallel ports and therefore, their connector cable can be as
long as 15m. Serial cables are generally used to connect devices such as mouse and some serial
printers. There can be 9 pin and 25 pin serial male ports can be found in computers.
d) Universal Serial Bus(USB) cable and port
USB is a new standard serial interface that is set to replace the conventional parallel and serial
cables and ports. It has enabled each USB port to support up to 127 different devices. Although
it transmits only 1-bit at a time, it provides a very high-speed and quality data transmission
over distances of approximately 5m.
e) Small Computer Systems interface (SCSI) cables and ports
This port and interface cables transmit data in parallel but are faster than the parallel cables.
Another advantage of the SCSI port is that one SCSI port allows us to connect up to 8
peripheral devices.

f) Other ports and connectors


i) 5-pin DIN and 6-pin (PS/2) ports
Initially most computers used the 5-pin DIN but this has been replaced with the smaller
6-pin DIN to connect mouse and keyboard.
ii) Monitor ports
The most common connectors used for monitors are the 9-pin and the 15-pin hi-D
connectors called D-ports as they resemble letter D.
iii) Audio connectors
These are jack plugs found on a sound interface adapter used to connect speakers,
microphones and other portable audio equipment.
COMPUTER SOFTWARE
a) Software concept
Computer software is a set of programs, documents, step-by-step instructions (procedures) and
routines associated with the operation of a computer system that makes the hardware capable of its
various activities.
b) Software classification
i) System software
1. Operating Software
2. System Utilities
ii) Application software
a) Application packages ( offshelf)
b) User programs ( Tailor made)
iii) Programming Languages
a) Machine language
b) Assembly language
c) High level language
d) Very-High level language
e) Natural language

1) SYSTEM SOFTWARE
These are programs that start up the computer and function as the principal coordinator of all
hardware components and applications software programs. This is first loaded into the RAM of
the computer before loading the application software. It is developed and installed in the
computer system for the purpose of developing other programs. The software is developed and
installed by the manufacturer of the system hardware.

Functions of system software


1. Booting the computer and ensuring that all the hardware elements are working properly.
2. Performing operations such as retrieving, loading, executing and storing application
programs.
3. Storing and retrieving files
4. Performing a variety of system utility programs
System software is divided into:-

i) Operating System-programs used start up a computer. Examples include MSDOS,


Windows 2000, Linux, UNIX
ii) Firmware
iii) Utility software
iv) Networking software

Firmware (Stored logic)


This is a combination of both the software and hardware recorded permanently on
electronic (memory) chips that is mounted /plugged into the motherboard. Firmware
may hold an operating system, utility programmes, language processors etc.

Utility software
This is a special program that makes certain aspects of the computer to go on more
smoothly and support the development of the application programs and render services
by performing the common processing requirements.
Such services include sorting, copying, file handling and disc management.
The two basic types of utility software are;
i) System-level utility software
These help the user to work with the operating system and its functions. For example,
a utility software tells the user when she/he enters a wrong command and gives
suggestions how the error can be corrected.
ii) Application-utility software
These make the use of an application program smoother and efficient. These utility
programs are commonly purchased separately or may be part of an operating system.

Examples of utility programs are usually available.


Examples
i) Virus protection – the anti-virus utility program scans hard discs, diskettes,
and memory to detect and delete viruses. Example – Norton, NOD32,
Kaspersky, McAfee, Avira etc
ii) Backup – this utility make automatic backup or duplicate copy of
information on the hard disc
iii) Data recovery – it is used to restore data that has been physically damaged
or corrupted.

Common service programs


a) Text editors
b) Language translators
c) Linker
d) Loader
e) Sort utility
f) Merge utility
g) Copy utility
h) Dump utility
i) Database Management System (DBMS)

2) APPLICATION SOFTWARE

Application packages are programs that are designed to help the user accomplish specific tasks.

SOFTWARE USES EXAMPLES


1. Word processor Typing and manipulating text, Ms word, Lotus, WordPad, WordStar
characters, words, sentences to
look attractive eg in production
of letters and reports
2. Spreadsheet Manipulating text, numbers and Ms Excel, Lotus 123
formulae eg in budgeting,
financial analysis
3. Desktop Designing publications like Adobe PageMaker, Ms Publisher
Publishing newsletters, newspapers, books
4. Computer Aided Technical drawing AutoCAD, ArchiCAD,
Design CAD
5. Database Used to organize, store & Ms Access, Dbase
retrieve information (files) from
a large body of data
6. Graphic software Creating and manipulating CorelDraw, Adobe Photoshop
pictures
7. Presentation Create professional quality Ms power point
software slideshows presentations.

Classification according to acquisition


i) Offshelf(packaged)
ii) Tailor made(customized)

Standard software (Off shelf)


These consist of computer programs designed to satisfy a user’s specific needs. They are
developed by software engineers, packaged and then made available for purchase through vendors.
A developer may bundle more than one but closely related software into one package to form a
suite or integrated software. Examples – Lotus suite, Microsoft office 2003,

Advantages of offshelf software


a) They are less expensive to acquire than the in-house software
b) They are readily available for almost any task
c) Most of the packages are user friendly.
d) Saves development time and cost of developing programs.
e) The packages are generally portable
f) They can easily be installed and run

Disadvantages of offshelf software


1. The user cannot modify the program to meet his/her needs.
2. The package may not meet the organization needs.

Tailor made (in-house)


These are programs that are uniquely designed and tailored to meet user’s needs. For example,
a bank may decide to manage its operations using a unique program developed by the
programmer.
These software are developed using specific program language. These programs are not
available in the shops and once developed for one company or user may not address needs of
other users.

Advantages of in-house software


1. Handles specific needs of the user
2. They can easily be modified to suit the needs of the user

Disadvantages of in-house software


1. Expensive to develop
2. Cannot be used to solve several tasks

c) Installation of basic computer software


When a program is to be installed in the computer, the program CD is inserted in the CD drive and
further systematic instructions will be displayed on the desktop. Once all the steps have been
completed, a dialog box indicating that the program has been successfully installed will be
displayed. Usually it is recommended to restart the computer for the new program to function.
Additional hardware such as printers usually comes with installation software for that particular
printer.

3) Programming languages
A programming language is a set of rules that provide a way of telling the computer what
operations to perform.

Levels of languages
ii. Lower Level language – are close or similar to the language computer itself uses or
understand or machine understandable language ie 0s &1s
iii. Higher level language- are closer or similar to language people use or human
understandable language like English

GENERATION OF LAGUAGES
There are five levels of language corresponding to generations.
1) Machine languages
Represents data and program instructions as 0s and 1s ie binary digits that correspond to the on/
off electrical states in the computer. It is composed of numbers.
2) Assembly languages
To replace the 0s and 1s in machine language, assembly language use mnemonic codes,
which are abbreviations that are easy to remember eg A for Add, C for Compare, MP for
Multiply etc?
Since machine language is the only language that the computer can actually execute, a
translator called Assembly Program is required to convert the assembly language program
into machine language
3) High-level languages
Programs were written in an English-like manner, thus making them more easy and a
programmer could accomplish more with less effort.
A translator is needed to translate the symbolic statements of a high-level language into
computer executable machine language and this translator is a compiler. There are many
compilers for each language and at least one for each type of computer eg FORTRAN
FORmula TRANslator.
4) Very High-level languages
These are shorthand programming languages. They are often known by their generation
number ie fourth generation languages or 4GLs.
An operation that requires hundreds of lines in the 3rd GL typically requires only 5-10
lines in 4GL. These are difficult to describe because there are so many types eg COBOL
& Query Language for database.
5) Natural languages
These resemble the ‘natural’ spoken English language ie they are similar to human
understandable language. They are the latest 5th GL and most ill-defined than 4th GLs. A
user of one of these languages can say the same thing in a number of ways.
The compiler translate this natural language to machine language and when it is not sure
what the user has in mind, it politely as for further explanation.
OPERATING SYSTEMS
a) Operating Systems
Definition: An operating system refers to the computer software that provides the interface
between the hardware, the user and the application software. It governs and manages the computer
resources and activities.

Categories of operating systems


i) Resident components
ii) Non-resident

Resident component
These are programs of OS that must remain in the RAM at all times. Such programs are loaded
from the disk as soon as the computer is switched on. These include:
a) Task manager
b) Device drivers
c) File manager
The process of loading the OS from the disc into main memory is called booting the computer.
Booting refers to the process of starting up a computer.

There are two ways of booting up a computer;


a) Cold booting – done using the power button on the computer’s system unit. Normally done
when the computer is initially off.
b) Warm booting – this is done when the computer hangs (it temporarily stops to receive
instructions). It is done by use of the reset/restart button on system unit or by a combination
of the following keys from the keyboard; CTRL + ALT +DEL.
NB:
a. During booting, a small program known as bootstrap which is stored in ROM is executed.
b. During execution, the program checks:-
i) Mouse, keyboard and monitor, discs are functioning well
ii) Carries out diagnostic check of the CPU, RAM, ROM to confirm that none of them is has
a fault.
iii) If all items are working well, the bootstrap loads program of the memory resident portion
of the OS from the disk into the memory.
iv) The bootstrap then passes control to the OS by causing the first instruction of OS to be
executed.
v) The OS then display on the screen an interface through which one can interact with the
computer.
c) Shut Down Computer
Shut Down Procedure
 Click on the start button from task bar
 Click on shut down or turn off computer from the pull up menu
 Click on shut down or turn off from the dialog box that appears
 Wait as the computer goes off or prompts you to safely turn it off. This depends on
the type of the computer’s processor.

Non-resident OS
They are only loaded into a RAM as and when it is needed. These include:-
i) Program development tools
ii) House-keeping utilities
iii) Sorting programs that manage data into some required order
iv) Special maths programs
TYPES OF OPERATING SYSTEMS
a) OS is classified into;-
i) Number of tasks handled concurrently
ii) Number of users
iii) Human-computer Interface (HCI)
b) Classification according to tasks handled concurrently
i) Single program OS
ii) Multitasking OS

Single program
It allows processing of only one user program in the main memory at a time. User can only run one
interface program at a time. The user must exit from the program before loading and running another
program. Example Ms-DOS

Multitasking OS
It allows single CPU to execute what appears to be more than one program at the same time. The CPU
switches its attention between programs as it receives requests for processing, executing instructions from
one program and then from another using the concept of giving a time slices to each application.

c) Classification according to the number of users.


i) Single user
ii) Multi-user/multi access

Single user
Supports only one person and runs only one user application at a time.

Multi-user/multi access
It allows more than one user to interactively use the computer. It can be installed on a computer that is
accessed by many people at the same time.
Examples – UNIX, Novell, Windows NT/2000, Linux

d) Classification according to the interface


i) Command line user interface(CLUI)
ii) Menu driven interface
iii) Graphical user interface(GUI) e.g. windows operating systems

CRITERIA FOR SELECTING A COMPUTER SYSTEM


Requirements analysis for selecting a computer system should cover;
1. Identifying all user requirements
2. Evaluating hardware requirements that will meet the user needs
3. Evaluating software requirements that will meet the user needs

a) Hardware considerations
Some factors considered when selecting computer hardware are;
i) Processor speed
It is important to buy a processor that suits ones needs and not necessarily the fastest

ii) Memory capacity


A computer with at least 128MB of RAM is recommended for most contemporary
applications. RAM is packaged as either Dual in-line Memory Module (DIMM) or
Single in-line Memory Module (SIMM)
iii) Warranty
A warranty is an agreement between the buyer and the seller that spells out terms and
conditions of, after selling a product in case of failure or malfunction.
iv) Cost
The cost of a computer depends on its processing capability, whether it is branded or
cloned and its size.
v) Upgradability and compatibility
It is important to get one which is easy to be upgraded to accommodate emergent
technologies.
vi) Portability
The size of electronic devices including computers has become a major consideration
because smaller devices enhance mobility.
vii) User needs
The unique needs of a user should be considered for example those with vision
problems may require use of Braille keyboard and speakers or those with inability to
use their hands can have input devices that capture data through voice recognition
device.
b) Software considerations
i) Authenticity
This refers to genuineness, validity and or legitimacy of an item. The seller must ensure
it is original copy from the developer accompanied by a license and certificate of
authenticity. This is to prevent software piracy which is an offence.
ii) Documentation
It refers to the manual prepared by the developer having details on how to install, use
and maintain the software.
iii) User needs
A good example is software used in mobile phones to store voice and allow user to
make a call by just calling the name instead of keying in the number.
iv) Reliability and security
People are more comfortable with software that offers good security to confidential and
private information
v) User friendliness
The ease of use of a program will most likely influence whether the user will prefer it
or not.
vi) Cost
One cannot just go for software because it is cheap. In case the off-the-shelf software
does not meet the needs of the users, it may be advisable to develop in-house software
solutions even though they may be a bit more expensive.
vii) Compatibility and system configuration
Software compatibility refers to the ability of the computer to run the software
depending on the system setup (configuration). For example, some software may only
run on a computer that has 32MB of RAM and above.
viii) Portability
This refers to whether a program can be copied or installed in more than one computer.
Some can only be installed in one computer only thus the need to buy a license for as
many computers as are there in the company. However, open-source software has no
restrictions, for example LINUX.

Factors to consider when choosing an Operating System


1. Hardware configuration or provision of the computer e.g. memory size, hard disc capacity,
type of processor etc
2. Basic design of the computer e.g. is it an IBM-Compatible or an Apple computer
3. Applications intended for the computer
4. User friendliness or human computer interface i.e. is it command-line based, menu driven
or graphical user interface based?
5. Availability in the market e.g. Microsoft Windows based operating systems are very
common.
6. Cost – how expensive is the operating system
7. Reliability i.e. can it run without crushing or hanging i.e. stop responding to commands
The Windows Operating System
 This is operating system software developed and marketed by Microsoft Inc. It is a Graphic User
Interface (GUI) OS and has the WIMP (Window Icon Menu and Pointing device) features that
make it more user friendly.
 The are different version of Ms – windows e.g. Window 95, 98, 2000, NT, ME, 2003, XP, and
Vista

b) Functions of Operating Systems


The functions of the operating system are;
 Job scheduling – includes preparing, scheduling and monitoring jobs for continuous
processing by the computer.
 Resource control – includes controlling the use of computer resources by other system
software and application programs being executed.
 Input/output handling – it controls the allocation of i/o devices and resolves an conflicts
that may occur if more than one application program or users request the same device at the
same time.
 Memory management –it determines how much memory is allocated to user programs.
 Error handling – it deals with errors which are produced during program execution and
keep the computer running when errors do occur.
 Example of operating system:
Ms DOS, PC DOS, UNIX, Linux, Windows etc.

Terms used in Windows OS


 Desktop – work area on the computer’s screen. It is analogous to the ordinary table top where one
can place different objects.
 Window – area on the desktop covered by an opened program.
 Icon - An icon is a small graphical picture that represents files, program, and folders e.t.c. on the
desktop.
 Active Window - It is the window that the user is working in. If lots of windows open, one of
them will have a different colour on title bar at the top. This is the active window.
 File – any collection of related information that is given a name and stored on a disk so that it can
be retrieved when needed. Can be a data file, system file or application program file
 Folder – a ‘container’ or storage location that contains files and other folders.
 Drive – refers to secondary storage locations in the computer normally labelled by letters of
alphabet e.g. C: / for hard disk, A: / for floppy disk etc. store information organised in files and
folders.

c) Operating systems commands

Directories/folders/files management
i) Creating folders/files
Creating a file or folder on the desktop
a) Right click an empty location on the desktop
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft Word.
To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
e) Press enter
Creating a file or folder in another folder window
a) Click on the file menu
b) Point at New from the pop - up menu
c) To create a file, select the name of the program to create the file by e.g. Microsoft Word.
To create a folder, click on folder from the side kick menu
d) Type the name of the file or the folder
e) Press enter
NB: A folder in another folder is called a subfolder.

ii) Copying files and folders


 Duplicating the file or the folder in the same storage location or another.
Steps
a) Select the file/folder to copy
b) Click on the edit menu
c) Click on copy from the pull down menu
d) Open the new location to copy the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu
Assignment
 Locate the shortcut commands from the standard toolbar used for copying and pasting
files and folders.

iii) Moving/copying folders/files


 Relocating the file or the folder to same storage location or another location.
Steps
a) Select the file/folder to move
b) Click on the edit menu
c) Click on cut from the pull down menu
d) Open the new location to move the folder to
e) Click on edit menu again
f) Click on paste from the pull down menu

Assignment
 Locate the shortcut commands from the standard toolbar used for moving and pasting files
and folders.

iv) Renaming files/folders


 File and folder names can be changed
Steps
a) Select the file/folder to rename
b) Click on the file menu
c) Click on rename from the pull down menu
d) Type the new name and then press enter from the keyboard
Or
Right click the file or the folder to rename
Click on rename from the popup menu
Type the name then press enter key from the keyboard

v) Deleting files/folders
 Folders stored in drive c: / are temporary send to the recycle bin when deleted and can
be later deleted permanently or restored to their original locations.
 Those stored in removable media like floppy disks and flash disks are not sent to the
recycle bin and may not be recovered.
Steps
a) Select the file/folder to delete
b) Click on the file menu
c) Click on delete and confirm deletion
OR
 Select the file/folder, press delete key form keyboard the confirm deletion

vi) File security and protection


 There are different methods used to ensure that files and folders are free from
unauthorized access. This may include
a) Assigning passwords to open and write files
b) Assigning log-in user names and password for the computers containing the files
c) Applying the read-only attributes to ensure that new data cannot be accidentally
written in the file
d) Write protecting storage media like the floppy disks
e) Applying hide attributes to ensure that the files are not visible to the unauthorised
access
f) Encrypting data/information in the file

vii) Drive/file/folder properties


Relocating the file or the folder to same storage location or another location.
Steps
a) Select the drive/file/folder to view its properties
b) Click on the file menu
c) Click on properties from the pull down menu. The properties dialog box appears.
d) Properties window appears. Using the properties you be able to ascertain the size and
attributes of the drive/file/folder etc

d) Managing discs
i) Assigning a volume label
ii) Checking disc storage status
iii) Formatting a disc
Formatting is the process of preparing a new disc for use by imprinting empty sectors and
tracks on the surface of the disc so that the operating system can recognize and be able to
access it. To format a flash disc;
1. Put the flash disc on the port in the computer
2. Double click My Computer icon to display the storage devices installed on the
computer
3. Right click a drive icon e.g. Drive E
4. From the shortcut menu, click format, then click quick format in the format options
5. Then click start
6. A prompt appears warning the user that formatting will erase ALL data on the disc.
Hence to format the disc, click OK, to quit, click CANCEL.
7. Clicking OK enables formatting to proceed and a prompt will appear when
formatting is completed
iv) Scanning a disc
Windows has a disk management tool called the scandisk that helps the user check up and
repair minor storage problems, such as lost storage locations, or damaged surface. To scan a
storage device the following is done;
1) Double click My Computer icon to display the storage devices installed on the
computer
2) Right click a drive icon e.g. Drive C
3) From the shortcut menu, click properties, then click tools tab, to display a dialog
box
4) Click the check now button
5) A prompt appears requesting the user to specify scandisk options like whether
errors found should be corrected automatically. Other programs must be closed for
this task to proceed.
6) Once scandisk is complete, Windows will give a summary statistics on errors
encountered if any

To scan for viruses

a) Double click My Computer icon to display the storage devices installed on the computer
b) Right click a drive icon e.g. Flash disc
c) From the shortcut menu, select the name of the anti-virus program e.g. Scan with Norton
antivirus
d) Follow the instructions displayed by the antivirus program to start scanning

WORD PROCESSING
1. Word processing: This is the process of manipulating text, characters, words, and sentences in
such a manners as to make the final document free of errors and attractive to look at.

2.Word processor: An application software that enables the user to create, save, edit, format and
print text-rich documents. Microsoft word is one of the products in the Microsoft office programs
suit. There several versions of Microsoft word determined by every release of the Microsoft office
programs suite e.g. Ms Word 97, 2000, XP, 2003, 2007.

Advantages of Electronic Word Processor programs


 Easier to use due to automated features such as Word-wrap, autocorrect and auto complete.
 They have superior editing tools such as spelling checker, the Thesaurus etc. hence making
editing easier.
 Can store documents for future retrieval
 They have superior formatting features that make a document more appealing to the reader.
 The user can produce multiple copies more easily
 Copy and move (cut) operation make it easier to manipulate a document.

a) Concepts of word processing


i) File
Any collection of related information that is given a name and stored on a disk so that it
can be retrieved when needed. Can be a data file, system file or application program file
ii) Save
To save a word processor document follow the procedure below;
i) From the File menu, click the Save As command to save the document the first time
or with a new name (Save command is used when you want to save changes in the
document)
ii) In the Save As dialog box that appears, select the location (drive/folder) from the
“Save in” list box
iii) Type in the name of the file in the File name box
iv) Click the save button or press the Enter key

PASSWORD PROTECTING A DOCUMENT


• To protect a document from unauthorized access or modification, use password. Since
password is case sensitive, avoid mixed case, preferably use lower case. To create a
password:
a) On the Tools menu, click Options, and then click the Security tab.
b) Type in a password in the Password to open box or the Password to modify box
c) Set other security options
d) Click OK.

iii) Word wrap


A word processor provides the user with a blank screen in which he/she can enter text or
pictorial objects such as a pictures and drawings.
As you type, the cursor flows automatically to the next line when it reaches the right end of
the page. This is referred to as word wrap.
At the end of the page, Word automatically inserts a new page and scrolls up the screen.
iv) Delete
To delete a character, a word or a block of text:
1. Highlight the text to delete
2. Press the Delete or the backspace key.
NB: Delete key erases characters to the right of the cursor while the backspace deletes
characters to the left of the cursor.
NB: Use the type over mode to replace characters to the right of text or insert mode to
insert a character(s) by pushing the rest of the characters to the right.

b) Functions of word processing


Features of a word window
i) Title bar - Title bar indicates the name of the application program in use the currently open file,
minimizes, and restore and the close buttons.
ii) Menu bar - The menu bar provides the user with group of commands in drop down list used to
create and manipulate a document.
iii) Standard Toolbar – this comprises many buttons of commands that provide shortcut to the same
commands available in the menu bar. These buttons relate to frequently performed activities, which
are performed while typing the text. To know which button perform which activity, rest the mouse
pointer on the button for a while. When you do so, a message, called tool tip will get displayed. For
example, when the “save” button is clicked, typed text will be saved.
iv) Document window/Work Area - This is the work area where you create your document. It resembles
an ordinary piece of paper.
v) Status bar - The status bar is the communication point between the user and the application
program. For example in Microsoft Word, when saving a document the status bar may indicate
“Word is saving ……”
vi) Vertical and horizontal scroll bars/Arrows - Used to view the hidden parts of the document. E.g.
one can view text hidden at the top of the page by scrolling down and view hidden at the bottom by
scrolling down the document using the scroll bars or the arrows.
vii) View buttons - Used to switch between different document views e.g. normal view.
viii) Cursor/Insertion pointer – Shows where the next character will appear as you type.
Document Views
• Microsoft word provides different views for viewing the document that include;
a) Normal
b) Web layout
c) Print layout
d) Outline
To change from one view to another, follow the steps below;
1) Click on view menu
2) Click on the type of view that you want to display
QS: What is the difference between the different views of the Microsoft word document?

c) Document creation and manipulation (Editing)


Editing refers to the making of necessary changes or modification to an existing document
 Create a document
 Save a document
 Format a document – character formatting, bold, italics, underlining, fonts (size, style, colour)

a. Fonts
To format text font:
1. Highlight the text
2. From the Format menu, click Font
3. In the font dialog box, select the font type, style, size and colour and any other attribute.
4. Click OK.

Paragraph formatting
A paragraph is a separate block of text dealing with a single theme and starting on a new line or
indent. Some of the formatting features you can apply onto a paragraph include
 Alignment
Alignment is the arrangement of text relative to the left margin, centre of page or the right
margin. The five major alignment options available are the left, centre, right and justified
and force justified.
To align text:
1. Highlight the text
2. From the Format menu, click Paragraph.
3. In the paragraph dialog box, select the alignment option from the alignment list box
then click the OK.
NB: You can apply alignment by simply clicking any of the five alignment buttons on the
formatting toolbar

 Setting tabs and Indentation


• Tabs refer to definite stops when the tab key is pressed while indenting is moving a line or a
block of text away from the margin using the tab key.
To set tabs:
1. From the Format menu, click Tabs
2. In the Tab dialog box, set the tab stop positions, alignment and leading then click the onset.
2. Repeat the same steps for all other tab stops then lastly click ok.
3. Select the paragraph that you want to indent
4. Click on the format menu
5. Click on paragraph from the pull down menu. The paragraph dialog box appears
6. Select the indent option to use e.g. left, right or special indent such as first line indent or
hanging indent.

 Spacing
You can set the space between lines, paragraphs or blocks text.
To space lines:
1) Highlight the lines of text
2) From the Format menu, click Paragraph
3) In the paragraph dialog box, select the line spacing option from the line spacing list box
4) Click the OK button.

 Superscript and Subscript


• A superscript appears just above the rest of the characters as in cm2 while a subscript
appears just below other characters as in H2O.
a) To make text superscript or subscript:
b) Highlight the character(s)
c) From the Format menu, click font
d) From the font dialog box check superscript or subscript
e) Click Ok to close the font dialog box

Drop caps
• A drop cap is a large character in a paragraph that occupies more than one line down.
• To create a dropped cap:
1) Highlight the paragraph you want to begin with drop cap
2) Click on format menu
3) Click Drop Cap. Drop cap dialog box appears
4) Click Dropped or In Margin.
5) Specify the number of lines and other options
6) Click OK.

 Bullets and numbers are used to create ordered lists.


 To add bullets or numbers to a list:
 Highlight the text
 Click on the format menu
 Click on bullets and numbering from the pull down menu
 From dialog box displayed, click Bullets or Numbered tab.
 Click the bullet or numbering thumbnail you want to apply.
 Click Ok.
 Page setup
• Page set up options let you define the paper size, margins and operations.
• To set up a page:
1. Click on File menu
2. Click Page Setup from the pull down menu
In the page setup dialog box, click either of the following:
– Margins tab to set up page margins
– Paper tab to specify the paper type and orientation
– Layout tab to specify the page content layout relative to the margins
3. Click OK to apply the settings.

 Page breaks
• Page, section and column breaks are used to force the cursor to move from a new page,
section or column even before the end of the current.
• To insert a break:
1. Position the insertion pointer where you want to break
2. Click on the insert menu
3. Click on Break from the pull down menu
4. In the break dialog box, set the break type
E.g. page break, column break etc
5. Click OK.

 Creating multi-columns and column widths


a) Inserting columns
• Columns subdivide a page into several vertical sections.
• To set columns:
a) Highlight the text or click at the point from where to set the columns
b) Click on format menu
c) Click columns from the pull down menu. The columns dialog box appears
d) In the columns dialog box enter the number of columns, set the column width, a line
between if need be and any other option to apply
e) Specify where to apply the columns e.g. the whole document, this section, selected text or
this point forward
f) Click OK.

 Change case
The cases applied to text are; lowercase, UPPERCASE, Sentence case, Title Case and
tOGGLE cASE. To change case:
1. Highlight the text
2. From the Format menu, click Change Case
3. From change case dialog box, select the case option you want to apply.
4. Click OK.
NB: The use of case in this sentence is deliberate.

 Page numbering
i) Page numbers are used to organize a large document for ease of reference.
ii) To insert page numbers:
iii) Click Insert menu
iv) Click on page numbers the insert page numbers dialog box appears
v) In the position box, specify whether to place the page numbers at the top of page
(header) or at the bottom of the page (footer).
vi) In the Alignment box, specify whether to align page numbers to the left, centre or right
of page.
vii) If you don’t want a number on the first page, clear the “Show number on first page”
check box
viii) Click OK.
 Headers and footers
• Headers are lines of text that appears at the top margin of every page or selected pages
while footers appears at the bottom margin.
• To insert a header or footer:
a) Click on the View menu
b) Click Header and Footer from the pull down menu
c) To create a header, enter text or pictorial object in the header area.
d) Click on switch between header and footer command button from the header and footer
toolbar to create footer.
e) Click inside the footer area and enter the text or pictorial object.
f) Click Close on the header and footer toolbar.

 Foot notes and end notes


Using the mouse pointer,
i) select the point to insert footnote/endnote
ii) Select references.
iii) From the drop down menu, select either – insert footnote, insert end not or next
footnote.
iv) Type the footnote/endnote at desired point
v) Click ok
d) Tables creation and manipulation
i) Tables – insert rows and columns
• A table is made up of rows and columns of cells that you can fill with text and graphics.
Tables are often used to organize and present information.
• Columns are the vertical divisions while rows are the horizontal divisions of the table.
• Intersections between columns and rows form cells which are the units for holding data.

Creating a table
a) Click where you want to create a table.
b) On the Table menu, point to Insert, and then click Table.
c) Under Table size, select the number of columns and rows.
d) Under AutoFit behaviour, choose options to adjust table size.
e) To use a built-in table format, click AutoFormat.
f) Click ok

Column
Column
Row Row Row Row Column

ii) Create cells and resize


Add a cell, row, or column to a table
• Select the same number of cells, rows, or columns as the number of rows or columns you want to
insert. .
• Click on the Table menu
• Point to Insert
• Click an option from the sidekick menu e.g. rows above etc
NB:
• You can also use the Draw Table tool to draw the row or column where you want.
• To quickly add a row at the end of a table, click the last cell of the last row, and then press the
TAB key.
• To add a column to the right of the last column in a table, click in the last column. On the Table
menu, point to Insert, and then click Columns to the Right.

• Resizing cells, rows, columns and the table


• To change column width
• Rest the pointer on the column boundary you want to move until it becomes a plus with two sided
arrows and then drag the boundary until the column is the width you want.
• NB:
• To change a column width to a specific measurement, click a cell in the column. On the Table
menu, click Table Properties, and then click the Column tab. Select the options you want.
• To make the columns in a table automatically fit the contents, click a table, point to AutoFit on the
Table menu, and then click AutoFit to Contents.
• To display column width measurements, click a cell and then hold down ALT as you drag the
markers on the ruler.
To change row height
• Rest the pointer on the row boundary you want to move until it becomes a vertical two sided arrow
and then drag the boundary.
• NB:
a) To change a row height to a specific measurement, click a cell in the row. On the Table menu,
click Table Properties, and then click the Row tab. Select the options you want.
b) To display row height measurements, click a cell, hold down ALT as you drag the markers on the
vertical ruler.
To resize an entire table
 In Print Layout view, rest the pointer on the table until the table resize handle appears on the
lower-right corner of the table.
 Rest the pointer on the table resize handle until a double-headed arrow appears.
 Drag the table boundary until the table is the size you want.
Merge cells into one cell in a table
• You can combine two or more cells in the same row or column into a single cell. For example, you
can merge several cells horizontally to create a table heading that spans several columns.
Steps:
a) Select the cells you want to merge.
b) On the Table menu, click Merge Cells.
2) Split a cell into multiple cells in a table
a) Click in a cell, or select multiple cells that you want to split.
b) On the Table menu, click Split Cells.
c) Select the number of columns or rows you want to split the selected cells into.

iii) Entering text and formatting


To type the data in the cell, click the mouse in the desired cell and start typing the data
from keyboard. Using arrow keys, you can move within the cell. Pressing Tab key moves
insertion pointer ahead by 1 cell, while Shift and Tab keys pressed together take the
insertion point back one cell.

iv) Borders and shading


Perform the following to introduce borders around the selected text and shading it
a) Select the text, around which the border is to be introduced.
b) Select format option or page layout.
c) Select page borders from drop down menu
d) Select page border from dialog box.
e) Select the border type, mentioned under “setting” section of the dialog box.
Somehow, if the border is to be removed, select “none” option.
f) To shade, select shading in the dialog box.
g) Select the color in which the background is to be shaded. If shading is to be
removed, select “no fill” option.
h) Click ok
v) Lines and drawing
a) Using the mouse pointer, select where to insert the drawing or lines.
b) From the menu, select “insert” option
c) Select “shapes” option
d) From the drop down menu, select the type of line or drawing
e) Using mouse pointer, draw the line or shape as required
f) Click outside the drawing to complete.

e) Calculations
i) Insert table
ii) Fill data
iii) Select layout
iv) To multiply, put cursor in the required row and select formula = PRODUCT(LEFT)
v) To add, put cursor in the required column and select formula = SUM(ABOVE)

Kg Ksh FORMULA
(fx)
Tea leaves 1 320 ** Expression
is faulty **
Sugar 2 120 ** Expression
is faulty **
TOTAL 0
f) Mail merging
i) Creating a main document
•A feature that enables one to create a standard document e.g. forms letters to be received b many
recipients.
•One can use the Mail Merge Wizard to create form letters, mailing labels, envelopes, directories,
and mass e-mail and fax distributions.
• This is done in four basic steps:
a) Open or create a main document
•Main document: In a mail-merge operation in Word, the document that contains the text and
graphics that are the same for each version of the merged document, for example, the return
address or salutation in a form letter.

b) Open or create a data source


•Data source: A file that contains the information to be merged into a document. For example, the
list of names and addresses you want to use in a mail merge.

ii) Add or customize merge fields


iii) Merge Field: A placeholder that you insert in the main document. For example, insert the
merge field «City» to have Word insert a city name, such as “Nairobi," that's stored in the
City data field in the main document.
iv) Merge data from the data source into the main document to create a new, merged
document.
v) Exercise:
vi) Using mail merge feature in a word processor, write letters to all parents/guardians of the
students in your school inviting them for a parent’s day.

g) Application of word processing utilities


i) Search and replace
• This is a feature used to locate for a word or a phrase and replace it with another.
To find and replace a word or phrase:
1. From Edit menu, click Find or Replace
The find and replace dialog box

2) In the “Find what” box, type the word or phrase to find.


Click the Replace tab and in the “Replace With” type the word or phrase to replace the
found word or phrase.

Proof – Reading a Document


Spelling and grammar checker
Spelling and grammar checker lets you automatically locate for misspelled words and
grammatical problems.
To spell check a document:
1. From Tools menu click Spelling and Grammar or press F7
In the displayed dialog box, misspelled words are shown in red while grammatically
incorrect phrases are in green. 3.
From the suggestion list, select the correct spelling or grammar.
Click on change to correct the word or click on change (All) button to correct all instances
of the misspelled word. To ignore the error once, click on ignore or click the ignore all to
ignore every instance of such a word.
Ms- Word prompts you when the spelling and grammar checking is complete.
The Spelling and Grammar dialog box is shown below;

Autocorrect and Auto text:


• Autocorrect and AutoText make are used to automatically correct a commonly misspelled
word and insert a predefined text when creating a document.
To create an autocorrect or auto text:
a) Click on the insert menu
b) Point to auto text, then click auto text from the side
c) Click the Auto text or Autocorrect tab and type the autocorrect or Auto text
d) Click OK to apply and close the dialog box.
d) Auto complete
• This is a feature that displays a complete word when the user types the first few characters
of the word. This enables the user to type faster by simply accepting the suggested word if
he/she intends to type it by pressing enter.
Printing a document
Print individualized document – printer set up, selecting a printer, print settings, printer
connection, print preview print options, printer status, print range, copies, close
• To print a document:
a) First preview it by clicking Print preview on the File menu.
b) To print, On the File menu click Print
c) Select the printer, range, number of copies and other options from the dialog box.
d) Click OK.
Troubleshooting Printing Problems
• Some of the printing problems you may encounter are:
a) Lack of two-way communication due to poor installation of the printer software (drivers), if
the printer is off or not connected.
b) Paper jams due to use of poor quality of paper or paper folds.
c) Poor quality print due to poor quality ink or toner used.
NETWORKING AND INTERNET
a) Meaning of networks
Computer Network

• Definition: A computer network refers to a set of computers connected to one another using a
modem and other communication links for the purpose of sharing resources which include
hardware, software, data and information.

• The network operating system/network software contains instructions that enable the hardware to
work as a network.

• Computer networks can be classified into different categories. E.g. according to geographical
coverage, ownership etc.

A network is a logical extension of a data communication system. In a computer network, two or


more processors or computers are linked together with carriers and data communication devices
for the purpose of communicating data and sharing . The term "topology" in the context of a
communications network determines the data paths that may be used between any pair of stations
of the network. A network consists of multiple computers connected using some type of interface,
each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial
device for networking. Each computer is supported by network software that provides the server
or client functionality. The hardware used to transmit data across the network is called the media.
It may include copper cable, fiber optic, or wireless transmission.

In a server based network, there are computers set up to be primary providers of services such as
file service or mail service. The computers providing the service are called servers and the
computers that request and use the service are called client computers.

Classification of computer network according to geographical coverage:

In this case, computer networks can be classified in to:

1. Local Area Network (LAN) - Defined as a communication network that provides interconnection
of a variety of data communication devices within a small area e.g. same office, on the same floor
or in the same building. LANs are typically owned by small organizations, companies, schools etc.

2. Metropolitan Area Network (MAN)

• This covers a slightly a large area e.g. an entire city.

3. Wide Area Network (WAN)

• This is a network that covers a very large area e.g. at several countries, a whole country, a
continent or several continents. It involves interconnection of LANS and MANS to cover a wide
range of distance.

An example of WAN is the Internet.

b) Functions of networks
i) All users can easily share or exchange information

ii) The computers in a network can share resources such as printers and scanners

iii) Software can be shared hence using same license

iv) Data backup can be achieved easily

c) Networks configuration/Topology

In communication networks, a topology is a usually schematic description of the arrangement of a


network, including its nodes and connecting lines. There are two ways of defining network
geometry: the physical topology and the logical (or signal) topology.

The physical topology of a network is the actual geometric layout of workstations. There are several
common physical topologies, as described below and as shown in the illustration.

In the topology, every is connected to a main cable called the . Therefore, in effect, each
workstation is directly connected to every other workstation in the network.

In the topology, there is a central computer or server to which all the workstations are directly
connected. Every workstation is indirectly connected to every other through the central computer.

In the topology, the workstations are connected in a closed loop configuration. Adjacent pairs of
workstations are directly connected. Other pairs of workstations are indirectly connected, the data
passing through one or more intermediate nodes.

If a protocol is used in a star or ring topology, the signal travels in only one direction, carried by a
so-called from node to node.
The topology employs either of two schemes, called full mesh and partial mesh. In the full mesh
topology, each workstation is connected directly to each of the others. In the partial mesh topology,
some workstations are connected to all the others, and some are connected only to those other nodes
with which they exchange the most data.

The topology uses two or more star networks connected together. The central computers of the star
networks are connected to a main bus. Thus, a tree network is a bus network of star networks.

Logical (or signal) topology refers to the nature of the paths the signals follow from node to node.
In many instances, the logical topology is the same as the physical topology. But this is not always
the case. For example, some networks are physically laid out in a star configuration, but they
operate logically as bus or ring networks.

Topology can be understood as the shape or structure of a network. This shape does not necessarily
correspond to the actual physical design of the devices on the computer network. The computers on
a home network can be arranged in a circle but it does not necessarily mean that it represents a .

Advantages of Bus Topology

i It is easy to handle and implement.


ii It is best suited for small networks.
iii Easy to connect a computer or peripheral to a linear bus.
iv Requires less cable length than a star topology.

Disadvantages of Bus Topology

i The cable length is limited. This limits the number of stations that can be connected.
ii This network topology can perform well only for a limited number of nodes.
iii Entire network shuts down if there is a break in the main cable.
iv Terminators are required at both ends of the backbone cable.
v Difficult to identify the problem if the entire network shuts down.
vi Not meant to be used as a stand-alone solution in a large building.

Star

Advantages of a Star Topology

i Easy to install and wire.


ii No disruptions to the network when connecting or removing devices.
iii Easy to detect faults and to remove parts.
iv Due to its centralized nature, the topology offers simplicity of operation.
v It also achieves an isolation of each device in the network.

Disadvantages of a Star Topology

i Requires more cable length than a linear topology.


ii If the hub, switch, or concentrator fails, nodes attached are disabled.
iii More expensive than linear bus topologies because of the cost of the hubs, etc.
iv The network operation depends on the functioning of the central hub. Hence, the failure of the
central hub leads to the failure of the entire network.

Mesh

Advantage of Mesh Topology


 The arrangement of the network nodes is such that it is possible to transmit data from one
node to many other nodes at the same time.
 System provides increased redundancy and reliability as well as ease of troubleshooting.
 This type of network is very reliable, as any line breakdown will affects only
communication between the connected computers.
 Communication is very fast between any two nodes.

Disadvantage of Mesh Topology


 The arrangement wherein every network node is connected to every other node of
the network, many of the connections serve no major purpose. This leads to the redundancy of
many of the network connections.
 System is expensive to install because it uses a lot of cabling.
 It is most expensive system from the point of view of line cost. If there are (n)
nodes in the network, then n (n-1)/2 links are required. Thus the cost of linking the system grows
with the square of the numbers of the nodes.
 An addition of the new nodes to the network is difficult.

i) Tree topology

Advantages of a Tree Topology

 Point-to-point wiring for individual segments.


 Supported by several hardware and software venders.

Disadvantages of a Tree Topology

 Overall length of each segment is limited by the type of cabling used.


 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies.

WHAT IS INTERNET?

Definition:

• The term Internet is an acronym that stands for International Network.

• It is defined as a world-wide computer network linking countless thousands of computer networks,


through a mixture of private and public data and telephone lines.

• Internet is just like a wide highway in a cyber space (space of electronic movement of data) that
moves data and information. Therefore, the terms Cyber Space and Information Super Highway
are frequently used to refer to Internet.

Administration of Internet - Who owns Internet?


• It is good to note that no single person is in charge of Internet. Each company/organization
manages its own network/s but there are agreed rules/protocols for connecting the networks e.g. all
networks should use TCP/IP protocols.

• The technical management of internet protocol is carried out by an Internet Society and the
International Standards for Organization (ISO). Internet has no political borders or boundaries on
the exchange of data and information.

Internet Connectivity

• To access and use Internet you must get connected.

Requirements:

– A computer, a PDA or WAP enabled mobile phones) – It is worthwhile to note that with the
dynamic growth of telephone and wireless technologies, it is now possible to use cellular
phones and Personal Digital Assistance (PDAs) to access information on Internet just as
you would use a computer.

– Transmission media – This is a physical (telephone line) or wireless (radio e.g. GPRS –
General Package Radio Service) pathway used to the medium for transferring
data/information from one computer to another.

– Internet Service Provider - These are licensed commercial or non-commercial


organizations that provide access to internet. Examples are Access Kenya, Swift Kenya,
Nairobi net, Africa online, Wananchi, Airtel, Safaricom etc.

Assignment: What are the factors to consider when choosing an ISP?

• MODEM (Modular-Demodulator) - Transforms digital data signals from a computer into analog
data signals (a form that can travel over the transmission media) and vice versa.

NB: Modern communication devices may not require the use of MODEMS.

• Software – The main categories of internet software are:

– Browser Software - This lets you access the Internet resources examples are Internet
explorer, Netscape Navigator, Opera, Mozilla Firefox, Mosaic etc.

– Email Software enables you to receive, compose and send emails e.g. Outlook express,
Eudora Light, Pegasus Mail, Yahoo mail etc.

– Search Engines – These are search agent programs that enable one to quickly search and
access internet resources. They provide a catalogue of all information available over the
internet for quick access. They all provide a search form where one types key words of the
information he/she wants to access. Examples are: Yahoo, Google, Inforseek, Alta Vista,
Lycos etc.

INTERNET CONNECTIVITY

The purpose of networking is to connect friends, business people, corporations, information and research
centers, entertainment and enrichment resources with the whole world. Computers can connect to the
Internet in a variety of ways; such as through a university or business LAN that can connect directly to the
internet, or directly through an ISP.
DATA TERMINAL EQUIPMENT (DTE)

Data terminal equipment (DTE) is an instrument that converts user information into signals and/or
reconverts received signals back into the original data. Data terminal Equipment is on both ends of the
transmission circuit, i.e. at the senders end and at the receivers end.

Data terminal equipment (DTE) can be a computer, a terminal, a router, an access server

1. SERVER AND CLIENT

A server is a computer program or a series of computers that provides essential services to other
computers across a network. Servers provide unique capabilities that can be shared by all other devices
in a network. There are several types of servers such as;

File servers; it allows all users to share one or more large capacity disk drives

Print servers; provides access to one or more printers

Communication servers; provides access to other LAN and host computers.

Application servers; which provide processing capacity for applications that are shared by many
people/computers.

Web servers; which allows websites that can be accessed over a corporate intranet or one that gives
access to the www.

A server function can be performed by a computer that is used as a normal workstation or by a


dedicated computer that has the sole purpose of providing server functions to other users on a network.

When a network has server(s) the other workstations are called clients. This introduces the concept of
client/server computing. In this system, a client request data from a server which then provides the
requested data or information back to the client. Therefore we can say that a client is an application or
system that accesses a remote service on another computer system, known as a server, over a network.

The client can be a dumb terminal i.e. it has no processing capabilities, or it can be a fully functioning
terminal with processing and storage capabilities. Today there are very few dumb terminals existing.
An example of how a client server system works

PORTS

A port is a virtual/logical data connection that can be used by programs to exchange data directly. The
most common of these are TCP and UDP ports, which are used to exchange data between computers
on the Internet.

These ports allow software applications to share hardware resources without interfering with each
other. Computers and routers automatically manage network traffic traveling via their virtual ports.

INTERNET SERVICE PROVIDERS (ISP)

Is a company that offers its customers access to the Internet through its own internet connected
servers, providing a gateway to the internet. ISPs can also provide email accounts, web-hosting etc to
its clientele. The services the ISP offers are charged or billed as per an agreed system.

ISPs may use a range of technologies to enable consumers to connect to their network. For personal
users and small businesses, the most popular options include dial-up, DSL, broadband wireless, cable
modem and Integrated Services Digital Network (ISDN)
DOMAIN NAME SYSTEM (DNS)

The domain name system (DNS) is the way that Internet domain names are located and translated into
Internet Protocol addresses. A domain name is a meaningful and easy-to-remember name for an
Internet address.

The Domain Name System (DNS) helps users to find their way around the Internet. Every computer
on the Internet has a unique address called the IP Address such as 192.168.11.80. But it is hard to
remember everyone's IP address. The DNS makes it easier by allowing a familiar string of letters (the
"domain name") to be used instead of the IP address. So instead of typing 192.0.34.65, you can type .

Translating the name like . into the IP address is called "resolving the domain name." The goal of the
DNS is for any Internet user any place in the world to reach a specific website IP address by entering
its domain name. Domain names are also used for reaching e-mail addresses and for other Internet
applications.

DNS SERVER

A DNS server is any computer registered to join the Domain Name System. A DNS server runs
special-purpose networking software and contains a database of network names and addresses for
other Internet hosts.

DNS server is responsible for turning domain names to IP addresses and locating them on one of the
millions of hosting servers.

DNS servers are organized in a hierarchical order and communicate with each other through private
network protocols. The master DNS servers, known as root servers, store the whole database of the
Internet domain names and their corresponding IP addresses. They are owned by various independent
agencies based in the United States, Japan, the UK and Sweden.

The other lower-level DNS servers maintain only parts of the total database of the domains/addresses
and are owned by businesses or ISPs (Internet Server Providers).

A DNS server can be any computer registered in the DNS system, running special DNS software,
which helps it resolve domain names to their appropriate hosts. Each DNS server features a public IP
address and includes a database of network names/addresses of other Internet hosts.

How do DNS Servers work?

The communication between users' computers and DNS servers is initiated as soon as you type a
website address (domain name) into a web browser. Then the browser, acting as a DNS client, sends
an immediate request to your ISP's DNS server(s), which search for the matching IP address in
its/their database. If no match is found, the DNS server automatically passes the request to another
lower-level DNS server or even to a root server, if necessary. As soon as the matching domain name
and IP address are located - the request’s response is transmitted back to your browser through the
DNS server network. This process is called forward DNS.

TYPES OF INTERNET ACCOUNTS

When you choose to use an ISP to get you connected to the internet, you will probably be given a
connection through a modem. Because IP was not designed to be used over dial-up lines, you will
require another protocol a) SLIP & b) PPP.
SLIP & PPP both allow IP data to be sent over dial-up modems. They work by taking IP data and
package it so that it can be sent over a modem.

SLIP (serial line protocol)

Serial line protocol (SLIP) is an older protocol (older than PPP) used to handle TCP/IP traffic over a
dial-up or other serial connection. SLIP is a physical layer protocol that doesn't provide error
checking. Such as modem error checking. It only supports the transmission of one protocol, TCP/IP.

SLIP modifies a standard TCP/IP datagram by appending a special "SLIP END" character to it, which
distinguishes datagram boundaries in the byte stream. SLIP does not provide error detection and relay
on upper layer protocols for this. Therefore SLIP on its own is not satisfactory over an error-prone
dial-up connection.

PPP – POINT TO POINT PROTOCOL

It is a data link (layer) protocol commonly used to establish a direct connection i.e. send IP over dial
up lines between two networking nodes. Unlike SLIP it can provide connection authentication,
transmission encryption and data compression, Error detection or correction and packet sequencing

UNIX SHELL ACCOUNT

Before PPP and SLIP accounts most internet accounts were text only (Not graphical) you used a
terminal emulation program on your PC to connect to the Internet host computer. This customer
account with an ISP allows the subscriber to enter UNIX commands to send and receive files and mail.
Basically a shell account gives you access to the ISP servers that have connection to the internet.

ONLINE SERVICES

An online service is a commercial service that enables you to connect and access its proprietary
information system. Most online services also provide an internet connection, email, web access and
other internet services. Online services usually require special programs to connect to and use your
account. The two most common online services in the USA are America online and CompuServe.

Internet Connection Types

There are two principal ways of connecting to the Internet, that is; Direct and Dial – up connection

1. Direct/leased line

– In this, the user has a fixed or dedicated link (physical line/wireless)to the ISP.

– Direct connections provide continuous, “always on” access to the Internet.

– A direct connection can be obtained in many ways e.g. Local Area Network (LAN) – A
LAN can be connected to the Internet through a special hardware component called a
router which is connected to another router at the ISP by a high-speed line.

Advantages:

– High speed connection

– You do not need a modem but a router

– It is convenient as one does not have to keep on dialing up.


Disadvantage:

– It is expensive to maintain the connection

– Only economical for large corporation/organizations.

2. Dial-up

– In this you connect your computer by use of a modem and/or phone line/wireless only
when you want to use Internet.

– The user gains Internet access when he/she contact the ISP and the ISP transfers him/her to
Internet. When he/she finishes, they disconnect from the ISP. The speed with which you
can access the Internet is determined primarily by the speed of your modem.

– To gain faster dial-up connections, you can install an Integrated Service Digital Network
(ISDN) line which is a digital line provided by the local phone company.

Advantage:

– Initial connection fee is less as compared to direct connection

– Cost can be controlled by reducing connection time

– Connection done only when there is a need

Disadvantages:

– May be disappointing in case of resource contention/traffic jam during dial up process as


one has to keep on dialing up.

Transfer Process and Address System of Internet

• Internet Transfer Process - A common communication protocol/rule is used worldwide for


convenient interchange of information between a computer and another over the Internet. This
Protocol is known as TCP/IP (Transmission Control Protocol/Internet Protocol) protocol. This was
established by the U.S department of Defense and later became the standard protocol for transfer
of data over the Internet.

• Internet Address System - Every computer on the Internet has a unique address (IP address) that
identifies the computer sending or receiving data. An example of an IP address is 192.168.11.70.

Domain Name System - IP address is composed of digits making it difficult for users to
remember. The IP addresses can therefore be translated into a domain (host) name address which
is easier to remember e.g. The above IP address may have its domain name equivalent as:

The World Wide Web (WWW)


Definition: This refers to the interconnected set of hypertext and hypermedia documents available
via the internet. It is viewed as a vast virtual space on the Internet where information pages called
web pages are installed.
NB. Do not confuse the www with the internet. The internet is a global system of interconnected
computer network and the www is a service of the internet, which is a collection of interconnected
document and other resources linked by hyperlinks. Basically the www is an application running
on the internet.
Hypertext – This refers to text documents that contain links to other text documents liked together
forming a spider like web. Hypertext is basically the same as regular text that can be stored, read,
searched or edited.
Hypermedia – It is interconnected documents which contain links to not only text documents but
also linked to multimedia documents e.g. audio, movies/video, images/graphics etc.
Web Pages - This refers to hypertext and hypermedia documents containing information about an
individual or organization. A web page can be seen as a single screen of information which may
contain text, images, animation, sound, movies/video etc. Web pages are created using a
programming language called Hypertext Mark-UP Language (HTML) and viewed by use of web
browser programs e.g. Internet explorer.
Website: A collection of web pages containing related information about an individual
organization or institution stored as a file in special computer referred to as a Web Server.
These web pages are linked together by use of hyperlinks
Hyperlink – A hyperlink refers to part of the web page (either text or graphic/picture) that when
clicked causes another web page to open. The web page opened could be one of the web pages in
the same web site or in a different web site. A hyperlink is usually underlined, blue in color and
when pointed using the mouse pointer, it causes the mouse pointer to change to a palm/hand.
All WWW resources or website have a unique address known as the Uniform Resource Locator
(URL). URL is a standard way of referencing WWW resources e.g. web pages.
Generation of the WWW
A. Web 1.0
This refers to the first stage of the www linking WebPages with hyperlinks. This
began with the release of the www to the public in 1993.

WEB 1.0 DESIGN ELEMENTS


Some of the element of design of web 1.0 was
1. static pages instead of dynamic user generated content
2. it used framesets
3. It used tables to position and aligns elements on the page.
4. HTML form was sent via email.
B. Web 2.0
The term suggests a newer version of the www, it doesn’t refer to an update to any technical
specification but rather to cumulative changes in the ways software developers and users use the web. The
term web 2.0 was coined in the year 1999. it is associated with bed applications that facilitate participatory
information sharing, interoperability, user centered design and collaboration on the www. A web 2.0 site
allows users to interact and collaborate with each other in a social media dialog as creators of user
generated content in contrast to websites where users were limited to passive viewing of content that was
created for them.
Examples of web 2.0 include social networking sites, blogs, wikis, video sharing sites etc
CHARACTERISTICS
 Rich user experience
 User participation
 Dynamic content
 Metadata (is data providing information about one or more aspects of data such as means
of creation of the data, purpose of the data, time and data, creator/author) &
 Scalability (ability of a system, network or a process to handle growing amounts of work
in a graceful manner, or its ability to be enlarged to accommodate that growth)

Concepts
Web 2.0 can be described in three parts;
1. Rich internet application – it defines the experience brought from desktop to browser.
2. service oriented architecture(SOA) it defines how web 2.0 applications expose its functionality so
that other application can use and integrate the functionality.
3. social web – it defines how web 2.0 tend to interact much more with the user and making the end
user an important part.
Features of Web 2.0
 Search, find information through keyword search
 Links, connects information together.
 Authoring; the ability to create and update content leads to collaborative work of many
rather than just a few web authors. Such as in wikis and blogs
 Tags - ccategorization of content by users adding "tags" which are short, usually one-word
descriptions - to facilitate searching

WORLD WIDE WEB COMPONENTS


The Structural Components of the www are:
 Clients/browsers
 Servers
 Internet – the global infrastructure which facilitates data transfer
The Semantic Components of the www are:
 Hyper Text Transfer Protocol (HTTP)
 Hyper Text Markup Language (HTML)
 Uniform Resource Locator (URI/L)
UNIFORM RESOURCE LOCATORS - (URL)
It is an address through which one can access any site or documents distributed throughout the www. It is
a standard for specifying any kind of information on the internet. The URL defines four things; protocol,
host computer, port and path. Such as;
Protocol://Host:port/path e.g.
http://www.ruthwanjiru.com/notes/class.html
The protocol is the client or server program used to retrieve a document such FTP or HTTP.
The host is the computer on which the information is located
The URL can optionally contain the port number of the server. If the port is included it is inserted between
the host and the path. And is separated from the host by a colon (:)
Path is the pathname of the file where the information is located.
WEB BROWSER
A web browser or Internet browser is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.
An information resource is identified by a Uniform Resource Identifier/locator (URI/L) and may be a web
page, image, video, or other piece of content. Hyperlinks present in resources enable users to easily
navigate their browsers to related resources.

Although browsers are primarily intended to access the World Wide Web, they can also be used to access
information provided by Web servers in private networks or files in file systems.

The primary purpose of a web browser is to bring information resources to the user.

Examples of web browsers: Internet Explorer, Mozilla, Firefox, Google Chrome, Opera, Safari.

Features of web browsers

All major web browsers allow the user to open multiple information resources at the same time, either in
different browser windows or in different tabs of the same window.

Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without
the user's consent.

Most web browsers can display a list of web pages that the user has so that the user can quickly return to
them. Bookmarks are also called "Favorites"

In addition, all major web browsers have some form of built-in web feed aggregator. In Mozilla Firefox,
web feeds are formatted as "live bookmarks" and behave like a folder of bookmarks corresponding to
recent entries in the feed.

User interface

Most major web browsers have these user interface elements in common:
-Back and forward buttons to go back to the previous resource and forward again.
-A history list, showing resources previously visited in a list
-A refresh or reload button to reload the current resource. -A
stop button to cancel loading the resource.
-A home button to return to the user's home page -
An address bar to input the Uniform Resource Identifier (URI) of the desired resource and display it.
-A search bar to input terms into a search engine
-A status bar to display progress in loading the resource and also the URI of links when the cursor hovers
over them.

WEB SERVER

A web server can be referred to as either the hardware (the computer) or the software (the computer
application) that helps to deliver content that can be accessed through the Internet. The most common use
of Web servers is to host Web sites, but there are other uses like data storage or for running business
applications.

The primary function of a web server is to deliver web pages on the request to clients. This means delivery
of HTML documents and any additional content that may be included by a document, such as images,
style sheets and Java Scripts.

A client, commonly a web browser, initiates communication by making a request for a specific resource
using HTTP and the server responds with the content of that resource or an error message if unable to do
so. The resource is typically a real file on the server's secondary memory.
EXAMPLES OF WEB SERVERS

1. Apache

Apache, otherwise known as Apache HTTP Server, is an open-source web server platform. The
Apache Web server provides a full range of Web server features, including CGI, SSL, and virtual
domains. Apache also supports plug-in modules for extensibility. Apache is reliable, free, and
relatively easy to configure.

Internet Information Server (IIS)

It is Microsoft's business-class Web server application. It is the most common web server after
apache.

IIS has the following features or modules; HTTP module, security module, content module,
compression module, caching module, diagnostic module

Structure of URL Address


Consists of two parts;
– A portion that specify the method of file access
– A portion that specify the Internet location of the file to be accessed;
E.g.
http:// - this part tells the type of file access that is permitted from the Internet. Http stands for
Hypertext Transfer Protocol – a protocol/rule that tells how the information in www is to be
transmitted.
Other protocols are FTP://, GOPHER:// etc.
gives the address of the computer/host in the Internet containing the website and the directory of
the location of the file in the computer.
ACCESSING THE INTERNET
• Accessing Internet the is done through browsing the net/web
• Browsing/surfing refers to the process of accessing Internet resources from the WWW websites.
This can be done basically in three ways:
• Typing a website URL address in the address bar on a browser window.
• Clicking on a hyperlink in an opened webpage to connect to another web page.
• Using a search engine agent program to quickly search for any information on the web/net.
In our case, we will use the Internet Explorer (IE) browser window.
Loading IE Browser Window
Steps:
– Double click the Internet Explorer shortcut icon from the desktop
Or:
– Click on start menu from the desktop
– Point at programs from the pull up menu
– Click on Internet Explorer from the sidekick menu
The Internet Explorer browser window is displayed.

IE Browser Window Features

1. Title Bar - Shows the title of the visited website.

2. Menu Bar - Provides menu options for manipulating the browser window and the web page
contents.

3. Navigation Bar - Provides commands for navigating the website.

4. Address Bar - Where the URL address of a website is typed.

5. Hyperlinks - When clicked, a hyperlink causes another web page to open.

6. Status Bar - Shows the opening progress of a web page.

7. Task Bar - Shows other programs running in your computer.

Loading a Website Using the URL Address

Steps:

• Click in Address bar. Type the URL address of the website to visit e.g. For the Ministry of
Education website type the following URL address in the address bar: www.education.go.ke.

• Press Enter key from the keyboard or click on the ‘Go’ command from the Navigation Bar.

• Wait as the home page is loaded. Look for the connection progress from the status bar.

NB: One must know the correct URL address to successfully load the intended website.

Using Hyperlinks While Browsing/Surfing


From the home page of a loaded website, one can access more information through hyperlink that
connects to the web page containing the required information.

Steps:

• Point at an hyperlink - Mouse pointer changes to a hand/palm

• Click and wait as the web page is displayed. In the status bar, see the loading progress e.g. to read
about the ICT Trust from the Ministry of Education website point & click on the ‘ICT Trust’
hyperlink from the home page & wait to display web page on the left.

Using Search Engines to Search for Information from the Web/Net

Searching for information from the web may be tedious, frustrating and time wasting if one does
not know the techniques for quick search.

Steps:

• Type URL address of the Search Engine in the address bar. Press enter key from the keyboard or
click on ‘Go’ from the navigation toolbar e.g. for google search engine.

• Type the keyword on the search form text box on the homepage and then click on search/find. See
win 1 on left.

• Click the hyperlink that closely describes information you want from the list displayed. See win 2
on left.

Search Tips

• By default the search engine tries to locate pages which have exact matches for all of the words
entered in your search form. If that fails, it then tries to locate pages which contain any words in
your search query. If that happens a short message is displayed at the top of the search results
indicating this has been done.

• In addition, there are several ways to modify the default search behavior.

1. Phrase Search
The search engine supports three types of phrase search.

• To match an exact phrase, use quotes around the phrase


Example: "free search engine“

• To match a near (within a couple of words) phrase, use square brackets [around the words]
Example: [free search engine]

• To match a far (within several words) phrase, use braces { around the words }
Example: {free search engine}

2. + and - qualifiers
If you precede a word with + that word is required to be on the page.
If you precede a word with - that word is required to not be on the page.
Example: +always, - never

3. * wildcard
If the word typed ends with a * all words on a page which start the same way as that form word
will match.
Example: gift*

4. ? wildcard
If the word typed contains a ? any character will match that position.
Example: b?g

5. Boolean search
You can use the following Boolean operators in your search: AND, OR, NOT. These operators
MUST be in capital letters.
Example: (contact AND us) OR (about AND us)

• All of these techniques can be combined: +alway* -ne??r*

Downloading/Saving/Printing Website Documents

• Downloading refers to the process of transferring information from a remote computer to a local
storage in your computer. This helps you to save the information for future retrieval.

• To download & save a web content, follow the steps below:

 Right click the hyperlink to the file

 Click on ‘Save Target AS’ command from the shortcut menu that appears

 Save as dialog box is displayed. Specify the folder/drive where to save the contents and
type a unique file name in the name box.

 Click on ‘Save’ command button. The download progress dialog box appears & prompts
you when through with the contents are fully downloaded.

• The download process may take some time depending on some factors like; the internet download
speed (band width) at that time, size of the document downloaded, your computer’s specifications,
internet ‘traffic jam’ etc.

• Downloaded web contents will require some application programs to have been installed in your
computer e.g. PDF files will require programs like Acrobat Reader to be installed in your computer
for you to read their contents.

To print web contents, open the file/web page and then send it for printing. Your computer must be
connected to a working printer. To Print, click on file menu – print – choose printer – specify the
number of copies to print – then click on print command button.

d) Electronic Mail (E-mail)

• Electronic Mail refers to the sending and receiving of electronic letters and documents on the
Internet.

Advantages Over the Traditional Paper Mail/‘Snail Mail’

– It is fast

– It is cheap

– It is convenient

– Easy to send one mail to many recipients by use of carbon copies


– Mail can be saved for future retrieval

– Easy to reply mails

– Mails can easily be forwarded to another recipient

– Document created using other application can easily be attached to the mail etc.

– Reliable if all email etiquette and netiquette is observed.

Disadvantages

– Security of message may not be guaranteed – due to tapping while on transit.

– Not yet accessible to everybody due to the connectivity limitations

– Requires some ICT literacy to use and enjoy

– It is boring to read ‘junk mails’

E-mail Address

• For one to send and receive an email, he/she must have an email address.

• Email address directs the computers on the Internet on where to deliver the email message.

• A typical email address has this format: e.g. pekyalo@yahoo.com i.e. the email parts are:

– Pekyalo – This is the user name that identifies the owner of the email address.

– @ - Separates the username from the rest of the address parts

– Yahoo – The name of the host computer on the Internet in to which the email account is
hosted.

– The period (.) – read as dot. Separates different parts of the email address.

– Com – The domain. Identifies the type of Institution that owns the host computer.

Commonly Used Domains

– .com – commercial organizations ( )

– .co – company/commercial organization ( )

– .org – NGOs ( )

– .go – government ( )

– .edu – educational institution ( )

– .ac – academic/educational institution etc (( )

– Country Domains are:

– .ke – Kenya – .tz – Tanzania


– .uk – United Kingdom – .ug - Uganda

LOG ON/SIGN IN

• Load the e-mail program that you are using e.g. for yahoo mail account holders, type
‘www.mail.yahoo.com’ in address bar of your browser to load the mail program.

• In the username text box, type your user name .e.g. jepkemboi

• In the password text box, type the password. The password appears encrypted for security.

• Click on Sign in command button and wait as your mails window is opened

Composing and sending Email

Steps:

• Load email application program/Email Editor

• Log in/Sign in if required by typing your user name and password.

• Click on compose command button – mail editor window appears as shown on the left.

• Type email address of the recipient in the TO: text box.

• To send Carbon Copies (Cc) & Blind Carbon Copies (Bcc) type the addresses in the Cc: & Bcc:
textboxes respectively. Separate two or more addresses by commas. Bcc recipients don’t see the
identity of other recipients.

• Type the subject/title of your message in the Subject: text box.

• Type the message and format it as you want in the message text area.

• Click on send command button to send mail.

• The computer confirms on sending the mail.

Receiving/Replying/Forwarding mail

Steps:

• Load email application program/Email Editor

• Log/sign in if required to access your email account by supplying your username and password.

• Click on ‘check mail’ command button

• Click on Inbox to view the mails received as shown on the left.

• To read a mail, click on its subject/title from the list of received mails. To read an attachment, click
on the attachment icon & follow the instructions that follow.

• To reply the mail, simply click on Reply tab/command and type the reply message then click on
send command to send it.

• To forward the mail, click on ‘Forward’ tab, type the address of the person whom you want to
forward the mail to, click on send.

File Attachment
Steps:

• Load email application program/Email Editor

• Log in or sign in as expected to access your account by supplying your username and password.

• Compose your mail as usual.

• Click on Attach Files command button.

• From the dialog box that appears, browse to specify the file/s to attach from your computer.

• Click on Open command button from the ‘Choose file’ dialog box after choosing the file to attach.

• The attachment progress bar appears. Wait as the file/s is/are attached to you mail.

• An attachment bar is inserted in the mail window with the name of the attached file.

• Click on send command to send the mail.

Saving an E-mail

a) With the mail window opened, click on file menu

b) Click on save as from the pull down menu

c) Select the location to save the mail and type the file name

d) Click on save

Deleting and Spamming mails

a) From the inbox window, select the mail to delete or spam

b) Click on the delete or spam command button to delete or spam the mail

NB: For deleting, confirm the deletion

Printing Mails

a) Open the mail that you want to print

b) Click on the file menu

c) Click on print from the pull down menu

d) Specify the printer and the number of copies

e) Click on print.

Sign Out/Log Off

• Once you have read your mail, it is advisable to sign out or log off to ensure that unauthorized
users do not read the mail.

• To sign out or log off, click on the sign out or log off command button.
e) Uses/benefits of internet
1) Speedy Communication

Internet communication is instantaneous. The speed at which e-mail is sent depends on the
slowest link, which is determined by the speed of the modem and the amount of traffic on the
telephone line.

2) Inexpensive Communication

The greatest benefit of the internet is the cost involved. A modem is inexpensive to buy and set
up. The cost is significant when lots of mail is send during marketing.

3) Convenient Communication

Unlike telephones, e-mail message can be sent even when the addressee is absent. The addressee
can pick up their mail at any convenient time. E-mail can be ‘broadcast’ to a group of people or
addressed to individuals.

4) Communication Services

i) E-mail

It is a quick, convenient, efficient and cheap way to communicate with both individual groups.

ii) Chat

Real-time one-to-one or group conversations, with discussions in typed form. One needs to be
connected to the internet and join a channel to be able to chat.

iii) Conferencing

Conferencing on the web is the dynamic exchange of all kinds of information-text, graphics,
HTML links to information, audio, video etc a context of structured conversations organized by
item and allowing a participant to contribute spontaneous responses to any item in the
conversation.

5) Health

In rural areas, telemedicine is now effectively used by assistant clinical Officers to seek expert
assistance from their experienced colleagues or doctors in the urban areas.

6) News and Information

Internet allows one to get in-depth stories, weather around the globe, travel information and
tourist guides, entertainment and much more

7) Job Opportunities

Employers use internet to advertise jobs, thus job seekers can post their curriculum vitae to
potential employers.

8) Finding people and organizations

There are various Search Engines on the internet that can be used to search email addresses. For
instance, Yahoo Search Engine has a facility: Yahoo! People Search.
9) Linking to traditional communications

i) Telephone

It is possible to transmit voice over the internet. Thus, international phone calls are made through
the internet.

ii) Short Message Service (SMS)

SMS can be sent through the internet to any network globally, unlike the trend where local
networks can only reach a limited number of networks.

iii) Banking

Banks allows customers to access their accounts using mobile phones. The banks also allow the
customers to make electronic payment for bills straight from their mobile phones.

iv) Radio/TV

Some radio and television stations have looped their channels into the internet, to give a more
global audience access to their live programmes.

10) Commerce and Industry

a) Electronic commerce

Electronic commerce, commonly known as e-commerce, e-Commerce or e-comm, refers to the


buying and selling of or over electronic systems such as the and other . However, the term may
refer to more than just buying and selling products online. It also includes the entire online process
of developing, marketing, selling, delivering, servicing and paying for products and services. The
amount of trade conducted electronically has grown extraordinarily with widespread Internet usage.
The use of commerce is conducted in this way, spurring and drawing on innovations in , , , and
(EDI)

Basically, electronic commerce (EC) is the process of buying, transferring, or exchanging products,
services, and/or information by businesses, individuals, organizations, governments, via computer
networks, including the internet. Contemporary electronic commerce involves everything from
ordering "digital" content for immediate online consumption, to ordering conventional goods and
services, to "meta" services to facilitate other types of electronic commerce.

Advantages of e-commerce

i) The predominant advantage of e-Commerce over the other means of commerce is that it
overcomes the barriers of time and distance thus making it a hit over the global market. One
can log on to the Internet at any point of time, be it day or night and purchase or sell anything
one desires at a single click of the mouse.
ii) The cost of having commerce over the electronic media is comparatively lesser than the other
ways of business promotion. This is the same for the inventory management, marketing,
promotion and customer care too. These are possible with the efficient e-Commerce software
that, to a great extent aids in elevating the standard of trade overseas. This cost efficiency
makes it a boon for the merchants and vendors. This, for the consumers is more befitting when
they find less time for shopping. It is the cheapest means of doing business.
iii) As for the business entrepreneurs, the e-Commerce solutions provide real time communication
with the consumers and the facility of data exchange with the internal departments thus
increasing the efficiency of supply chain process.
iv) There is a better visibility of the supply chain and the supplies being more predictable, the
inventory levels of the company can be vastly reduced. This again results in the decreased
costs.
v) There is a great flexibility in the target market segmentation. This permits the companies to
concentrate on a particular group of customers and thereby concentrate on the satisfaction of
that group of customers by tending to their unique needs.
vi) With the development of e-Commerce websites, the exchanging of information between
different organizations becomes simpler and easier.
vii) There is much saving of time with the e-Commerce software and e-Commerce websites as
there is not much to maintain unlike the real time shops and also in the adjudication of the
invoices and orders.
viii) E-Commerce is one of the most important facets of the Internet to have emerged in the recent
times. E-Commerce or electronic commerce involves carrying out business over the Internet
with the assistance of computers, which are linked to each other forming a network. To be
specific e-Commerce would be buying and selling of goods and services and transfer of funds
through digital communications.
ix) The direct cost-of-sale for an order taken from a web site is lower than through traditional
means (retail, paper based), as there is no human interaction during the on-line electronic
purchase order process. Also, electronic selling virtually eliminates processing errors, as well
as being faster and more convenient for the visitor.
x) The day-to-day pressures of the marketplace have played their part in reducing the
opportunities for companies to invest in improving their competitive position. A mature
market, increased competitions have all reduced the amount of money available to invest. If the
selling price cannot be increased and the manufactured cost cannot be decreased then the
difference can be in the way the business is carried out. E-Commerce has provided the solution
by decimating the costs, which are incurred.

Disadvantages of e-Commerce

Though e-Commerce solutions and e-Commerce websites are found beneficial, there is a fair share
of disadvantages too. Before one enters the e-Commerce business, it is important to understand the
disadvantages of the e-Commerce business along with the benefits.

i) The time of delivery of the products plays an important part in the disadvantages of the e-
Commerce solutions. It is unlike walking out of the store with the desired product and it takes a lot
of time to get delivered and in some cases also needs a special amount for the delivery.

ii) The e-Commerce business functions purely on trust. You don't know the exact kind of item you
are purchasing and the quality of the item and the condition as well. The consumers don't even
know if the e-Commerce businesses they are involved in are legitimate.

iii) There is a limitation in the things you order online. For example you cannot think of ordering a
plate of pasta from Italy staying in Japan. Thus the perishable goods are better avoided while
buying things through the e-Commerce websites.
iv) Though there is a certain amount of interaction between the consumer and the merchant that takes
place through the e-Commerce websites, there is a lack of personal service that makes the
consumer feel more comfortable.

v) While the payment comes into question, the consumer is deprived of the security of the
information regarding the credit cards. This may give rise to the theft along with other ways of
misusing them

Electronic Business

Electronic business commonly referred to as "eBusiness" or "e-business", or an internet business,


may be defined as the application of information and communication technologies in support of all
the activities of business. Electronic commerce focuses on the use of ICT to enable the external
activities and relationships of the business with other businesses (B2B).

Advantages of E-Business

i) Worldwide Presence: This is the biggest advantage of conducting business online. A firm engaging
in e-business can have a nationwide or a worldwide presence. IBM was one of the first companies
to use the term e-business to refer to servicing customers and collaborating with business partners
from all over the world. Dell Inc. too had a flourishing business selling PCs throughout the US,
only via telephone and the Internet till the year 2007. Amazon.com is another success story that
helps people buy internationally from third parties. Hence, worldwide presence is ensured if
companies rethink their business in terms of the Internet.

ii) Cost Effective Marketing and Promotions: Using the web to market products guarantees
worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure
that the advertiser only pays for the advertisements that are actually viewed. Affiliate marketing,
where customers are directed to a business portal because of the efforts of the affiliate who in turn
receive a compensation for their efforts meeting with success, has emerged on account of e-
business. Affiliate marketing has helped both the business and the affiliates. Firms engaging in e-
business have managed to use cost effective online advertising strategies to their advantage.

iii) Developing a Competitive Strategy: Firms need to have a competitive strategy in order to ensure a
competitive advantage. Without an effective strategy, they will find it impossible to maintain the
advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a
differentiation strategy. For instance, till the year 2007, Dell Inc. was selling computers only via
the Internet and the phone. It adopted a differentiation strategy by selling its computers online and
customizing its laptops to suit the requirements of the clients. Thus, e-business resulted in Dell Inc.
managing to capture a vast segment of the market using the differentiation strategy.

iv) Better Customer Service: E-Business has resulted in improved customer service. Many a times, on
visiting a website, the customer is greeted by a pop-up chat window. Readily available customer
service may help in encouraging the customer to know more about the product or service.
Moreover, payments can be made online, products can be shipped to the customer without the
customer having to leave the house.

Disadvantages of E-Business

i) Sectoral Limitations: The main disadvantage of e-business is the lack of growth in some sectors
on account of product or sector limitations. The food sector has not benefited in terms of growth of
sales and consequent revenue generation because of a number of practical reasons like food
products being perishable items. Consumers do not look for food products on the Internet since
they prefer going to the supermarket to buy the necessary items as and when the need arises.

ii) Costly E-Business Solutions for Optimization: Substantial resources are required for redefining
product lines in order to sell online. Upgrading computer systems, training personnel, and updating
websites requires substantial resources. Moreover, Electronic Data Management (EDM) and
Enterprise Resource Planning (ERP) necessary for ensuring optimal internal business processes
may be looked upon, by some firms, as one of the disadvantages of e-business.

11) Education

E-LEARNING

E-learning comprises all forms of electronically supported and . The and , whether or not, serve
as specific media to implement the learning process. The term will still most likely be utilized to
reference out-of-classroom and in-classroom educational experiences via technology, even as
advances continue in regard to devices and curriculum.

E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-
learning applications and processes include Web-based learning, computer-based learning,
opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet,
audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes
media in the form of text, image, animation, streaming video and audio.

Benefits of E-Learning

i) Class work can be scheduled around family, personal and professional work, resulting in flexible
learning.

ii) Reduces travel cost and time to and from school for off-campus students

iii) Learners may have the option to select learning materials that meets their level of knowledge and
interest

iv) Learners can study wherever they have access to a computer and Internet connection

v) Self-paced learning modules allow learners to work at their own pace

vi) Flexibility to join discussions in the bulletin board threaded discussion areas at any hour, or visit
with classmates and instructors remotely in chat rooms

vii) eLearning can accommodate different learning styles and facilitate learning through a variety of
activities

viii) Instructors and students both report eLearning fosters more interaction among students and
instructors than in large lecture courses
ix) Develops knowledge of the Internet and computers skills that will help learners throughout their
lives and careers
x) Successfully completing online or computer-based courses builds self-knowledge and self-
confidence and encourages students to take responsibility for their learning

xi) Learners can test out of or skim over materials already mastered and concentrate efforts in
mastering areas containing new information and/or skills

xii) E-learning is beneficial to education, corporations and to all types of learners. It is affordable,
saves time, and produces measurable results. E-learning is more cost effective than traditional
learning because less time and money is spent traveling. Since e-learning can be done in any
geographic location and there are no travel expenses, this type of learning is much less costly than
doing learning at a traditional institute.

xiii) Flexibility is a major benefit of e-learning. E-learning has the advantage of taking class anytime
anywhere. Education is available when and where it is needed. E-learning can be done at the
office, at home, on the road, 24 hours a day, and seven days a week. . E-learning also has
measurable assessments which can be created so the both the instructors and students will know
what the students have learned, when they've completed courses, and how they have performed.

xiv) Students like e-learning because it accommodates different types of learning styles. Students have
the advantage of learning at their own pace. Students can also learn through a variety of activities
that apply to many different learning styles learners have. Learners can fit e-learning into their
busy schedule. If they hold a job, they can still be working with e-learning. If the learner needs to
do the learning at night, then this option is available. Learners can sit in their home in their
pajamas and do the learning if they desire.

xv) E-learning encourages students to peruse through information by using hyperlinks and sites on the
worldwide Web. Students are able to find information relevant to their personal situations and
interest. E-learning allows students to select learning materials that meet their level of knowledge,
interest and what they need to know to perform more effectively in an activity. E-learning is more
focused on the learner and it is more interesting for the learner because it is information that they
want to learn. E-learning is flexible and can be customized to meet the individual needs of the
learners.

xvi) E-learning helps students develop knowledge of the Internet. This knowledge will help learners
throughout their careers. E-learning encourages students to take personal responsibility for their
own learning. When learners succeed, it builds self-knowledge and self-confidence in them.

xvii) Educators and corporations really benefit from e-learning. Learners enjoy having the opportunity
to learn at their own pace, on their own time, and have it less costly.

DISADVANTAGES OF E-LEARNING

 Slow Internet connections or older computers may make accessing course materials frustrating
 Managing computer files and online learning software can sometimes seem complex for students
with beginner-level computer skills
 Hands-on or lab work is difficult to simulate in a virtual classroom

 One disadvantage of e-learning is that learners need to have access to a computer as well as the
Internet. They also need to have computer skills with programs such as word processing, Internet
browsers, and e-mail. Without these skills and software it is not possible for the student to succeed
in e-learning. E-learners need to be very comfortable using a computer. Slow Internet connections
or older computers may make accessing course materials difficult. This may cause the learners to
get frustrated and give up. Another disadvantage of e-learning is managing computer files and
online learning software. For learners with beginner-level computer skills it can sometimes seem
complex to keep their computer files organized. Without good computer organizational skills
learners may lose or misplace reports causing them to be late in submitting assignments. Some of
the students also may have trouble installing software that is required for the class.

 E-learning also requires just as much time for attending class and completing assignments as any
traditional classroom course. This means that students have to be highly motivated and responsible
because all the work they do is on their own. Learners with low motivation or bad study habits
may fall behind. Another disadvantage of e-learning is that without the routine structures of a
traditional class, students may get lost or confused about course activities and deadlines causing
the student to fail or do poorly.

 Students may feel isolated from the instructor. Instructions are not always available to help the
learner so learners need to have discipline to work independently without the instructor's
assistance. E-learners also need to have good writing and communication skills. When instructors
and other learners aren't meeting face-to-face it is possible to misinterpret what was meant.

 Unmotivated learners or those with poor study habits may fall behind
 Lack of familiar structure and routine may take time getting used to
 Instructor may not always be available on demand
 Slow or unreliable Internet connections can be frustrating

SPREAD SHEETS
a) Meaning of spread sheets
Spreadsheet is software used to organize and present data in easy-to understand forms like tables,
graphs and charts for easy analysis. Ms-Excel is one such software-tool designed and developed by
Microsoft Corporation of USA.
Workbook software comprises of multiple worksheets with data editing facilities and inbuilt
calculation abilities. When formulae are defined in a worksheet, automatic calculations are done
and results are generated.

Create a New Worksheet.


A worksheet is a tool that is used for maintaining predominantly numeric data
in a tabular form, simplifying numerous calculations and presenting numerical
data graphically. Instances where it is useful include:
1. Company Sales Report showing the sales for each item over the year.
2. Employees Payroll to calculate the employees’ salaries for each month.
3. Students Progress to store information on students’ marks and monitor
their progress.
4. Personal Expenses to maintain a budget of your monthly expenses.
5. Mortgage Repayment Calculations to calculate the monthly repayment
amount on a mortgage loan.

Step-by-Step.
1. Click the mouse on “start ‘button
2. Selet “all programs’
3. Select” Microsoft Excel” and Ms-Excel window will appear
4. Decide on the items to be included in the worksheet.
5. Decide on the layout of the worksheet. (That is, which items
should appear in which columns, etc.)
Parts of the Excel Screen

Name Description
i Active cell indicator
This dark outline indicates the currently active cell (one of the 17,179,869,184 cells on
each worksheet).
ii Application Close button - Clicking this button closes Excel.
iii Application Minimize button - Clicking this button minimizes the Excel window.
iv Column letters - Letters range from A to XFD — one for each of the 16,384 columns in the
worksheet. You can click a column heading to select an entire column of cells, or drag a column
border to change its width.
v File button - Click this button to open Back Stage view, which contains many options for
working with your document (including printing), and setting Excel options.
vi Formula bar - When you enter information or formulas into a cell, it appears in this line.
vii Help button - Clicking this button displays the Excel Help system window.
viii Horizontal scrollbar - Use this tool to scroll the sheet horizontally.
ix Minimize Ribbon button - Clicking this button hides the Ribbon, giving you a bit more space
onscreen. When you click a tab, the Ribbon reappears.
x Name box - This field displays the active cell address or the name of the selected cell, range, or
object.
xi Page View buttons - Change the way the worksheet is displayed by clicking one of these buttons.
xii Quick Access toolbar - This customizable toolbar holds commonly used commands. The Quick
Access toolbar is always visible, regardless of which tab is selected.
xiii Ribbon - This is the main location for Excel commands. Clicking an item in the tab list changes the
Ribbon that displays.
xiv Row numbers - Numbers range from 1 to 1,048,576 — one for each row in the worksheet. You can
click a row number to select an entire row of cells.
xv Sheet tabs - Each of these notebook-like tabs represents a different sheet in the workbook. A
workbook can have any number of sheets, and each sheet has its name displayed in a sheet tab.
xvi Insert Sheet button - By default, each new workbook that you create contains three sheets. Add a
new sheet by clicking the Insert Worksheet button (which is displayed after the last sheet tab).
xvii Sheet tab scroll buttons - Use these buttons to scroll the sheet tabs to display tabs that aren’t
visible.
xviiiStatus bar - This bar displays various messages as well as the status of the Num Lock, Caps Lock,
and Scroll Lock keys on your keyboard. It also shows summary information about the range of cells
that is selected. Right-click the status bar to change the information that’s displayed.
xix Tab list - Use these commands to display a different Ribbon, similar to a menu.
xx Title bar - This displays the name of the program and the name of the current workbook, and also
holds some control buttons that you can use to modify the window.
xxi Vertical scrollbar - Use this to scroll the sheet vertically.
xxii Window Close button - Clicking this button closes the active workbook window.
xxiii Window Maximize/Restore button - Clicking this button increases the workbook window’s size to
fill Excel’s complete workspace. If the window is already maximized, clicking this button
“unmaximizes” Excel’s window so that it no longer fills the entire screen.
xxiv Window Minimize button - Clicking this button minimizes the workbook window, and it displays
as an icon.
xxv Zoom control - Use this scroller to zoom your worksheet in and out.

Excel Worksheet Movement Keys


Key Action
 Up arrow (↑) Moves the active cell up one row.
 Down arrow (↓) Moves the active cell down one row.
 Left arrow (←) or Shift+Tab Moves the active cell one column to the left.
 Right arrow (→) or Tab Moves the active cell one column to the right.
 PgUp Moves the active cell up one screen.
 PgDn Moves the active cell down one screen.
 Alt+PgDn Moves the active cell right one screen.
 Alt+PgUp Moves the active cell left one screen.
 Ctrl+Backspace Scrolls the screen so that the active cell is visible.
 ↑* Scrolls the screen up one row (active cell does not change).
 ↓* Scrolls the screen down one row (active cell does not change).
 ←* Scrolls the screen left one column (active cell does not change).
 →* Scrolls the screen right one column (active cell does not change).

Ribbon tabs
The commands available in the Ribbon vary, depending upon which tab is selected. The Ribbon is
arranged into groups of related commands. Here’s a quick overview of Excel’s tabs.
i) Home: You’ll probably spend most of your time with the Home tab selected. This tab contains the
basic Clipboard commands, formatting commands, style commands, and commands to insert and
delete rows or columns, plus an assortment of worksheet editing commands.
ii) Insert: Select this tab when you need to insert something in a worksheet — a table, a diagram, a
chart, a symbol, and so on.
iii) Page Layout: This tab contains commands that affect the overall appearance of your worksheet,
including some settings that deal with printing.
iv) Formulas: Use this tab to insert a formula, name a cell or a range, access the formula auditing
tools, or control how Excel performs calculations.
v) Data: Excel’s data-related commands are on this tab.
vi) Review: This tab contains tools to check spelling, translate words, add comments, or protect
sheets.
vii) View: The View tab contains commands that control various aspects of how a sheet is viewed.
Some commands on this tab are also available in the status bar.
viii) Developer: This tab isn’t visible by default. It contains commands that are useful for
programmers. To display the Developer tab, choose File ➪ Options and then select Customize
Ribbon. In the Customize the Ribbon section on the right, place a check mark next to Developer
and then click OK.
ix) Add-Ins: This tab is visible only if you loaded an older workbook or add-in that customizes the
menu or toolbars

b) Uses of spread sheets


 Number crunching: Create budgets, analyze survey results, and perform just about any
type of financial analysis you can think of.
 Creating charts: Create a wide variety of highly customizable charts.
 Organizing lists: Use the row-and-column layout to store lists efficiently.
 Accessing other data: Import data from a wide variety of sources.
 Creating graphical dashboards: Summarize a large amount of business information in a
concise format.
 Creating graphics and diagrams: Use Shapes and the new Smart Art to create
professional-looking diagrams.
 Automating complex tasks: Perform a tedious task with a single mouse click with Excel’s
macro capabilities.

c) Preparing worksheet layout


Creating Your First Excel Worksheet
This section presents an introductory hands-on session with Excel. If you haven’t used Excel, you may
want to follow along on your computer to get a feel for how this software works.
In this example, you create a simple monthly sales projection table along with a chart.

Getting started on your worksheet


Start Excel and make sure that you have an empty workbook displayed. To create a new, blank
workbook, press Ctrl+N (the shortcut key for File ➪ New ➪ Blank Workbook ➪ Create).

Step-by-Step.
To Enter Data in a Worksheet1. Point the mouse pointer at the cell
(intersection of a row and column) and click the left mouse button. The cell
pointer moves to the cell in which you want to enter data.
2. Type in the data using the keyboard.
3. Press the Enter key.
Filling in the month names
In this step, you enter the month names in column A.
1. Move the cell pointer to A2 and type Jan (an abbreviation for January). At this point, you
can enter the other month name abbreviations manually, but you can let Excel do some of the work
by taking advantage of the AutoFill feature.
2. Make sure that cell A2 is selected. Notice that the active cell is displayed with a heavy outline.
At the bottom-right corner of the outline, you’ll see a small square known as the fill handle. Move
your mouse pointer over the fill handle, click, and drag down until you’ve highlighted from A2
down to A13.
3. Release the mouse button, and Excel automatically fill in the month names.
Your worksheet should resemble the one shown in Figure 1.16.

d) Building worksheet

Entering the sales data


Next, you provide the sales projection numbers in column B. Assume that January’s sales are
projected to be $50,000, and those sales will increase by 3.5 percent in each subsequent month.
1. Move the cell pointer to B2 and type 50000, the projected sales for January. You could
type a dollar sign and comma to make the number more legible, but you do the number
formatting a bit later.
2. To enter a formula to calculate the projected sales for February, move to cell B3 and
enter the following: =B2*103.5%. When you press Enter, the cell displays 51750. The formula
returns the contents of cell B2, multiplied by 103.5%. In other words, February sales are
projected to be 3.5% greater than January sales.
3. The projected sales for subsequent months use a similar formula. But rather than retype
the formula for each cell in column B, once again take advantage of the AutoFill feature. Make
sure that cell B3 is selected. Click the cell’s fill handle, drag down to cell B13, and release the
mouse button.

At this point, your worksheet should resemble the one shown in below. Keep in mind that
except for cell B2, the values in column B are calculated with formulas. To demonstrate, try
changing
the projected sales value for the initial month, January (in cell B2). You’ll find that the formulas
recalculate and return different values. These formulas all depend on the initial value in cell B2,
though.

Your worksheet, after creating the formulas.


e) Manipulating data on worksheet

Formatting the numbers


The values in the worksheet are difficult to read because they aren’t formatted. In this step, you
apply a number format to make the numbers easier to read and more consistent in appearance:
1. Select the numbers by clicking cell B2 and dragging down to cell B13.
2. Choose Home ➪ Number, click the drop-down Number Format control (it initially
displays General), and select Currency from the list. The numbers now display with a
currency symbol and two decimal places. Much better!
Making your worksheet look a bit fancier
At this point, you have a functional worksheet, but it could use some help in the appearance
department. Converting this range to an “official” (and attractive) Excel table is a snap:
1. Move to any cell within the range.
2. Choose Insert ➪ Tables ➪ Table. Excel displays its Create Table dialog box to make
sure that it guessed the range properly.

3. Click OK to close the Create Table dialog box. Excel applies its default table formatting
and also displays its Table Tools ➪ Design contextual tab. Your worksheet should
look like Figure 1.18.
4. If you don’t like the default table style, just select another one from the Table
Tools ➪ Design ➪ Table Styles group. Notice that you can get a preview of different
table styles by moving your mouse over the Ribbon. When you find one you like, click it, and
style will be applied to your table.

Your worksheet, after converting the range to a table.


Editing the contents of a cell
If the cell contains only a few characters, replacing its contents by typing new data usually is
easiest.
However, if the cell contains lengthy text or a complex formula and you need to make only a slight
modification, you probably want to edit the cell rather than re-enter information.
When you want to edit the contents of a cell, you can use one of the following ways to enter cell
edit mode.
 Double-click the cell to edit the cell contents directly in the cell.
 Select the cell and press F2 to edit the cell contents directly in the cell.
 Select the cell that you want to edit and then click inside the Formula bar to edit the cell
contents in the Formula bar.
You can use whichever method you prefer. Some people find editing directly in the cell easier;
others prefer to use the Formula bar to edit a cell.

Attempt the following tasks:


Add new characters at the location of the insertion point. Move the insertion point by
 Using the navigation keys to move within the cell
 Pressing Home to move the insertion point to the beginning of the cell
 Pressing End to move the insertion point to the end of the cell
 Select multiple characters. Press Shift while you use the navigation keys.
 Select characters while you’re editing a cell. Use the mouse. Just click and drag the mouse
pointer over the characters that you want to select.
To Edit Data in a Worksheet
1. Double-click on the cell that contains the data.
2. Use the left or right arrow key to move the cursor (the vertical
blinking line) to the position of the correction.
3a. If you had left out a character (letter, word or digit) just type it in.
The character will be inserted on the immediate right of the cursor.
3b. If you had typed a wrong character, you can delete it by positioning
the cursor on the left of the character and pressing the Delete key on
the keyboard.

Summing the values


The worksheet displays the monthly projected sales, but what about the total projected sales for the
year? Because this range is a table, it’s simple.

1. Activate any cell in the table


2. Choose Table Tools ➪ Design ➪ Table Style Options ➪ Total Row. Excel automatically
adds a new row to the bottom of your table, including a formula that calculated the
total of the Projected Sales column.
3. If you’d prefer to see a different summary formula (for example, average), click cell
B14 and choose a different summary formula from the drop-down list.

f) Data application to cells

Exploring the types of data you can use

An Excel workbook can hold any number of worksheets, and each worksheet is made up of more
than 17 billion cells. A cell can hold any of three basic types of data:
 A numeric value
 Text
 A formula
A worksheet can also hold charts, diagrams, pictures, buttons, and other objects. These objects
aren’t contained in cells. Rather, they reside on the worksheet’s draw layer, which is an invisible
layer on top of each worksheet.

Entering text and values into your worksheets


To enter a numeric value into a cell, move the cell pointer to the appropriate cell, type the value,
and then press Enter or one of the navigation keys. The value is displayed in the cell and also
appears in the Formula bar when the cell is selected. You can include decimal points and currency
symbols when entering values, along with plus signs, minus signs, and commas (to separate
thousands).
Entering text into a cell is just as easy as entering a value: Activate the cell, type the text, and then
press Enter or a navigation key. A cell can contain a maximum of about 32,000 characters —
more than enough to hold a typical chapter in this book. Even though a cell can hold a huge
number of characters, you’ll find that it’s not possible to actually display all these characters.
g) Formulae and function
 A formula can consist of any of these elements:
 l Mathematical operators, such as + (for addition) and * (for
 multiplication)
 l Cell references (including named cells and ranges)
 l Values or text
 Worksheet functions (such as SUM or AVERAGE)
After you enter a formula, the cell displays the calculated result of the formula. The
formula itself appears in the Formula bar when you select the cell, however.
Here are a few examples of formulas:
i) =150*.05 - Multiplies 150 times 0.05. This formula uses only values, and it
always returns the same result. You could just enter the value 7.5 into the cell.

ii) =A1+A2 - Adds the values in cells A1 and A2.


iii) =Income–Expenses - Subtracts the value in the cell named Expenses from the value in
the cell named Income.
iv) =SUM(A1:A12) - Adds the values in the range A1:A12.
v) =A1=C12 - Compares cell A1 with cell C12. If the cells are identical, the formula
returns TRUE; otherwise, it returns FALSE.

h) Charts

Creating a chart
How about a chart that shows the projected sales for each month?
1. Activate any cell in the table.
2. Choose Insert ➪ Charts ➪ Column and then select one of the 2-D column charts
types. Excel inserts the chart in the center of your screen.
Create a Simple Chart.
Charts are used to present data effectively; they make relationships among
numbers easy to see because they turn numbers into shapes that can be
compared to one another.
Step-by-Step.
1. Select the range containing the information you want to be represented in
chart form.
2. Click on the ChartWizard button and the following dialog box appears.

The ChartWizard button.


In the dialog box you can select the type of chart from the list on
the left and the sub-type on the right. A brief description of the
chart selected appears below the sub-types. This helps you decide
whether the type suits the data you have selected. You may also
view a sample of the chart that will be produced. Click on Next to
proceed to Step 2, and the following dialog box appears.

Keeping the titles in view by freezing panes


If you set up a worksheet with row or column headings, these headings will not be visible when
you scroll down or to the right. Excel provides a handy solution to this problem: freezing panes.

Freezing panes keeps the headings visible while you’re scrolling through the worksheet.
To freeze panes, start by moving the cell pointer to the cell below the row that you want to
remain
visible while you scroll vertically, and to the right of the column that you want to remain visible
while you scroll horizontally. Then, choose View ➪ Window ➪ Freeze Panes and select the
Freeze Panes option from the drop-down list. Excel inserts dark lines to indicate the frozen rows
and columns. The frozen row and column remain visible while you scroll throughout the
worksheet.
To remove the frozen panes, choose View ➪ Window ➪ Freeze Panes, and select the
Unfreeze Panes option from the drop-down list.
Figure 3.8 shows a worksheet with frozen panes. In this case, rows 1:4 and column A are frozen
in place. This technique allows you to scroll down and to the right to locate some information
while keeping the column titles and the column A entries visible.

The figure below shows a worksheet with frozen panes. In this case, rows 1:4 and column A are
frozen in place. This technique allows you to scroll down and to the right to locate some
information while keeping the column titles and the column A entries visible.

KAIBOI TECHNICAL TRAINING INSTITUTE


TIME TABLE
TERM 3 - 2012
DAY MONDAY TUESDAY
SESSIO
N 0730 0930 1000 1200 12 13 1400 1600 1700 0730 0930 1000 12-1 13 1300
CLASS
TIME

TP 42 13 4 35
MM
MED 12 LS EP EEP MA T
TP 42 22 4 35

MVD 12 LS EP EPT MA ICT

36 71 37 36 14
TPUT/ ME IMP
AGD 12 P EP S T ES

20 43 53 68 35
AN
ELD 12 LS EIT E MA ICT

The vast majority of the time, you’ll want to freeze either the first row or the first column. The
View ➪ Window ➪ Freeze Panes drop-down list has two additional options: Freeze Top Row and
Freeze First Column. Using these commands eliminates the need to position the cell pointer before
freezing panes.

Inserting rows and columns


Although the number of rows and columns in a worksheet is fixed, you can still insert and delete
rows and columns if you need to make room for additional information. These operations don’t
change the number of rows or columns. Rather, inserting a new row moves down the other rows to
accommodate the new row. The last row is simply removed from the worksheet if it’s empty.
Inserting a new column shifts the columns to the right, and the last column is removed if it’s empty.

To insert a new row or rows, you can use any of these techniques:
 Select an entire row or multiple rows by clicking the row numbers in the worksheet border.
 Right-click and choose Insert from the shortcut menu.
 Move the cell pointer to the row that you want to insert and then choose Home ➪Cells ➪ Insert
➪ Insert Sheet Rows.
 If you select multiple cells in the column, Excel inserts additional rows that correspond to the
number of cells selected in the column and moves the rows below the insertion down.

Deleting rows and columns


You may also want to delete rows or columns in a worksheet. For example, your sheet may contain
old data that is no longer needed.
To delete a row or rows, use either of these methods:
 Select an entire row or multiple rows by clicking the row numbers in the worksheet border.
 Right-click and choose Delete from the shortcut menu.
 Move the cell pointer to the row that you want to delete and then choose Home ➪
 Cells ➪ Delete Sheet Rows. If you select multiple cells in the column, Excel deletes all
rows in the selection.
Deleting columns works in a similar way. If you discover that you accidentally deleted a row or
column, select Undo from the Quick Access toolbar (or press Ctrl+Z) to undo the action.

Hiding rows and columns


In some cases, you may want to hide particular rows or columns. Hiding rows and columns may
be useful if you don’t want users to see particular information, or if you need to print a report that
summarizes the information in the worksheet without showing all the details.

Changing column widths and row heights


Often, you’ll want to change the width of a column or the height of a row. For example, you can
make columns narrower to accommodate more information on a printed page. Or you may want
to increase row height to create a “double-spaced” effect.
Excel provides several different ways to change the widths of columns and the height of rows.
Changing column widths
Column width is measured in terms of the number of characters of a fixed pitch font that will fit
into the cell’s width. By default, each column’s width is 8.43 units, which equates to 64 pixels
(px).

Creating a Table
Most of the time, you’ll create a table from an existing range of data. However, Excel also allows
you to create a table from an empty range so that you can fill in the details later. The following
instructions assume that you already have a range of data that’s suitable for a table.
1. Make sure that the range doesn’t contain any completely blank rows or columns;
otherwise, Excel will not guess the table range correctly.
2. Select any cell within the range.
3. Choose Insert ➪ Tables ➪ Table (or press Ctrl+T). Excel responds with its Create
Table dialog box, shown in Figure 5.4. Excel tries to guess the range as well as whether
the table has a header row. Most of the time, it guesses correctly. If not, make your corrections
before you click OK.

Selecting parts of a table


When you move your mouse around in a table, you may notice that the pointer changes shapes.
These shapes help you select various parts of the table.
 To select an entire column: Move the mouse to the top of a cell in the header row, and the
mouse pointer changes to a down-pointing arrow. Click to select the data in the column.
Click a second time to select the entire table column (including the Header Row and the
Total Row, if it has one). You can also press Ctrl+spacebar (once or twice) to select a
column.
 To select an entire row: Move the mouse to the left of a cell in the first column, and the
mouse pointer changes to a right-pointing arrow. Click to select the entire table row. You
can also press Shift+spacebar to select a table row.
 To select the entire table: Move the mouse to the upper-left part of the upper-left cell.
When the mouse pointer turns into a diagonal arrow, click to select the data area of the
table. Click a second time to select the entire table (including the Header Row and the Total
Row). You can also press Ctrl+A (once or twice) to select the entire table.

Adding new rows or columns


To add a new column to the end of a table, select a cell in the column to the right of the table and
start entering the data. Excel automatically extends the table horizontally.
 To add rows or columns within the table, right-click and choose Insert from the shortcut
menu.
 The Insert shortcut menu command displays additional menu items:
 Table Columns to the Left
 Table Columns to the Right
 Table Rows Above
 Table Rows Below

Deleting rows or columns


To delete a row (or column) in a table, select any cell in the row (or column) to be deleted. To
delete multiple rows or columns, select a range of cells. Then right-click and choose Delete ➪
Table Rows (or Delete ➪ Table Columns).

Moving a table
To move a table to a new location in the same worksheet, move the mouse pointer to any of its
borders. When the mouse pointer turns into a cross with four arrows, click and drag the table to
its new location.
To move a table to a different worksheet (which could be in a different workbook), you can drag
and drop it as well — as long as the destination worksheet is visible onscreen.

Sorting and filtering a table


The Header Row of a table contains a drop-down arrow that, when clicked, displays sorting and
filtering options

Sorting a table
Sorting a table rearranges the rows based on the contents of a particular column. You may want to
sort a table to put names in alphabetical order. Or, maybe you want to sort your sales staff by the
totals sales made.
To sort a table by a particular column, click the drop-down in the column header and choose one of
the sort commands. The exact command varies, depending on the type of data in the column.
You can also select Sort by Color to sort the rows based on the background or text color of the
data.
This option is relevant only if you’ve overridden the table style colors with custom formatting.
You can sort on any number of columns. The trick is to sort the least significant column first and
then proceed until the most significant column is sorted lasted. For example, in the real estate
table, you may want to sort the list by agent. And within each agent’s group, sort the rows by area.
And within each area, sort the rows by list price. For this type of sort, first sort by the List Price
column, then sort by the Area column, and then sort by the Agent column.

Filtering a table
Filtering a table refers to displaying only the rows that meet certain conditions. (The other rows
are
hidden.)
Using the real estate table, assume that you’re only interested in the data for the N. County area.
Click the drop-down arrow in the Area Row Header and remove the check mark from Select All,
which unselects everything. Then, place a check mark next to N. County and click OK. The table,
shown in Figure 5.12, is now filtered to display only the listings in the N. County area. Notice that
some of the row numbers are missing; these rows contain the filtered (hidden) data.
Also notice that the drop-down arrow in the Area column now shows a different graphic — an icon
that indicates the column is filtered.

FORMATING WORKSHEET

The Excel formatting tools are available in three locations:


 On the Home tab of the Ribbon

The Home tab of the Ribbon provides quick access to the most commonly used formatting options.
Start by selecting the cell or range; then use the appropriate tool in the Font, Alignment, or
Number groups.
Using these tools is very intuitive, and the best way to familiarize yourself with them is to
experiment.
Enter some data, select some cells, and then click the controls to change the appearance.
Note that some of these controls are actually drop-down lists. Click the small arrow on the button,
and the button expands to display your choices.

 On the Mini toolbar that appears when you right-click a range or a cell

When you right-click a cell or a range selection, you get a shortcut menu. In addition, the Mini
toolbar appears above the shortcut menu.
 l From the Format Cells dialog box
The formatting controls available on the Home tab of the Ribbon are sufficient most of the time,
but some types of formatting require that you use the Format Cells dialog box. This tabbed dialog
box lets you apply nearly any type of stylistic formatting, as well as number formatting. The
formats that you choose in the Format Cells dialog box apply to the cells that you have selected at
the time. Later sections in this chapter cover the tabs of the Format Cells dialog box.
In addition, many common formatting commands have keyboard shortcuts that you can use.

Format numbers in a worksheet.


Plain numbers on a worksheet will do the job of presenting figures, but additional formatting can
make your worksheet much more presentable.
There are many ways in which you can be able to format the numbers in your worksheet for better
readability.
For example, when you have too many uneven decimal places in a worksheet, it makes it difficult
to compare figures. Again, long numbers without commas are difficult to read.
You can format the numbers in a cell by using the Currency Style, Percent Style, and Comma Style
buttons on the toolbar. Each of these styles has a default number of decimal points that you can
change with the Increase Decimal and Decrease Decimal buttons.
Step-by-Step.
1. Select the range containing the numbers whose format you want to change.
2. Click on the Comma Style button. All numbers in the selected range are displayed with
commas separating thousands and with two decimal points e.g. 7,375.00.
The Comma Style button.
3. To add the number of decimal places, click on the Increase Decimal button. In the same way, to
remove the number of decimal places, click the Decrease Decimal button.
4. If you want the range to be formatted as percentages, click on the Percent Style button.
The Percent Style button
5. To format a range as currency, click on the Currency Style button.
The Currency Style button
Insert a formula in a worksheet.
When you need to perform a calculation in Excel, you use a formula. You can create simple
formulas that can be used to say, add the values in two cells, or you can create complex formulas
that can calculate the standard deviation of certain values.
The automatic recalculation feature is best appreciated when formulas have been incorporated in a
worksheet.
Step by Step.
1. Before you write your formula in Excel, it is best to do the following away from the computer
first:
i) Decide what you want calculated e.g. the Total Cost of items.
ii) Note down the values in the worksheet required for the calculation and use these to write
down the formula e.g. Quantity*Price.
iii) Substitute these values with their cell references e.g. B3*D3
2. Select the cell where the result of the formula will be displayed.
3. To tell Microsoft Excel that you are entering a formula in a cell, you must begin with the equal
sign (=).
Note: You can also type +, -, or @ to begin a formula, Microsoft
Excel will convert these into an equal sign.
A simple formula like adding, subtracting or dividing cells requires at least one cell reference.
4. When you create formulas that perform calculations, or when you use formulas that generate
information from your data, you need to tell Microsoft Excel where to find the data. To do this,
you either type a cell reference or a range name.
Example.
1. Suppose you want to calculate the cost of milk using the values shown in the worksheet below:
A B C D
1 Item Quantity Price Cost
2 Milk 268 6 15.50
3 Sugar 190 7 48.90
2. The cost of milk depends on the quantity and the price and is calculated by the formula Quantity
* Price gives us the cost. (The asterisk (*) is used as the multiplication sign.)
3. The cell references for Quantity and Price are B2 and C2 respectively, hence we write B2*C2.
4. In cell D2 we type the formula =B2*C2.
If you omit the ‘=’ symbol before B2, Excel will not recognize it as a formula and what you have
typed will literally appear as ‘B2*C2’ which will not yield the expected result.
5. Press the Enter key. Excel immediately calculates and shows the result in the cell, while the
formula is displayed on the Formula bar.
Copy formulas in a worksheet.
You can copy (or fill) formulas into a range of cells. Generally this reduces the time and effort
taken to insert similar formulas in other cells -especially in a large worksheet.
For instance, in the previous example, the formula to calculate the cost of sugar is similar to the
formula for milk, therefore, all that is needed is to replicate the same formula into the other cells.
Step-by-Step.
1. Select the cell that has the formula you want to copy to other cells.
2. Drag the fill handle up to the last cell in the range (which you want to copy the same formula to)
and release the mouse button.
OR
1. Select the range starting with the cell that has the formula.
2. From the Edit menu, the Fill submenu has Up, Down, Left and Right as some of the options.
Select one of these as appropriate.
Relative Referencing
1. A relative reference describes the location of a cell in terms of its distance, in rows and columns,
from another cell.
Relative references are like giving directions, such as 'one street over and two houses down."
2. When you enter a formula like =B2*C2 in cell D2 of your worksheet, the formula in cell D2
multiplies the value in cell B2 and the value in cell C2. (=B2*C2)
3. Because B2 and C2 are relative references, the formula in D2 is actually multiplying the cell two
steps to the left of D2 times the cell one step to the left of D2.
If you copy that formula to D3, the formula will subtract cell two steps to the left of D3 minus the
cell one step to the left of D3.
~ References that change automatically when you copy them are called relative references.
~ When you copy a formula containing relative references, the references are adjusted to reflect the
new location of the formula.

Use AutoFill to enter a series.


You can enter a series of data, either numbers or text, into several cells by using AutoFill. This can
save time involved in typing common series like days of the week, months of the year and
numbers that follow a pattern or series like 2, 4, 6, 8, 10, 12 etc.
To enter a set series, such as months of the year, or days of the week, you can type the first item in
the series without typing anything else. For example, if you want to enter the days of the week into
a row, you simply type ‘Monday’ in the first cell and then use AutoFill to fill in the rest.
To enter a series of numbers, you must type the first two numbers of the series, and then use
AutoFill to enter the rest of the series.
For example, if you want to enter the series 10,15,20,25,30 etc., you can type ‘10’ into the first
cell, and ‘15’ in the second cell, and then use AutoFill to quickly fill in the rest.
Step-by-Step.
1. Type in the first text item in the series or the first two numbers of the series.
2. Select the cell(s) containing the information and then move the mouse pointer to the bottom
right corner of the cell until the pointer changes to a solid plus sign.
3. Drag the AutoFill handle across the cells in which you want to fill the rest of the series.
Note:
When you copy a formula using this method Excel indicates to you what will be entered into the
cell even before you release the mouse.
Tip:
You can enter month or day names either in full (January) or in short (Jan) form.
When you fill the series into the other cells, the rest of the series will either be in full (February) or
short (Feb) form as well.

2.6. Adjust column width.


Occasionally, your data will not fit within the standard column width. This happens especially
when you are working with long labels, or large font sizes, or with data that has been formatted as
currency.
When a cell entry exceeds the width of the cell and overflows into the next column preventing you
from you seeing the other cell contents, this is known as ‘overflow’.
Step-by-Step.
1. Position the mouse pointer at the right border between column headers so that the pointer
changes to a two-headed arrow.
2. Double click. This will adjust the column width to fit the widest data in the column. This is
known as the “Best Fit” method.
3. You can also change the column width to any size you want by dragging the column header
border to the desired width.

2.7. Insert and delete rows and columns.


1. You can insert a row or column, to make room for additional information in the worksheet. This
may be necessary when some extra information, which was not anticipated earlier, needs to be
included.
For example, in a worksheet detailing different expense items and expenditure, you may have
omitted ‘Transport’. You can insert a row in the worksheet in which the item ‘Transport’ and its
corresponding
expenditure can be added.
2. You can also delete the contents of a row or column to clear the information contained in them.
Step-by-Step.
1. When you insert a column or row, you need to select the column or row immediately to the right
or below where you want the new column or row to appear.
For example, to insert a new column between columns A and B, click the column header for
column B.
To insert a row between rows 9 and 10, click row header for row 10.
Inserting a column between column A and B:
Step 1 Double-click or drag
2. From the Insert menu, choose Rows or Columns depending on what action you were taking.
To insert or delete several rows or columns at the same time
1. Select the number of rows or columns you want to insert or delete using the left mouse button in
combination with the Shift key.
2. From the Insert menu, choose Rows or Columns to insert the selected number of rows or
columns.
OR
2. Click on the Edit menu and choose Rows or Columns to delete the selected number of rows or
columns.
2.8. Use Shortcut menus in Excel.
A shortcut menu is a menu that appears when you click on the right mouse button while pointing
to any of several areas on screen. You can display shortcut menus from cells, columns, rows, or
even buttons,
charts, or toolbars.
Microsoft Excel has several shortcut menus that you can use when you click with your right mouse
button over different areas of the screen.
You see one menu when you click on a cell, another when you click over the toolbars and another
when you click over the title bar of your window.
These shortcut menus enable one to access commands quickly.
Step-by-Step.
1. Position your mouse pointer on the appropriate position on the screen.
2. Click the right mouse button. A shortcut menu appears, listing the commands that you can be
able to perform for the selected cell.
3. Click another cell outside of the shortcut menu. The shortcut menu closes.
Example.
1. To use a shortcut menu to insert a column between column A and B, position your mouse
pointer on the column header B.
2. Click on the right mouse button. This produces the following shortcut menu, from which you
would select Insert.

Choosing vertical alignment options


Vertical alignment options typically aren’t used as often as the horizontal alignment options. In
fact, these settings are useful only if you’ve adjusted row heights so that they’re considerably taller
than normal.
Vertical alignment options available in the Format Cells dialog box are
Top: Aligns the cell contents to the top of the cell. Also available on the Ribbon.
Center: Centers the cell contents vertically in the cell. Also available on the Ribbon.
Bottom: Aligns the cell contents to the bottom of the cell. Also available on the Ribbon.
Justify: Justifies the text vertically in the cell; this option is applicable only if the cell is formatted
as wrapped text and uses more than one line. This setting can be used to increase the line spacing.
Distributed: Distributes the text evenly vertically in the cell. This setting seems to have the same
effect as Justify.
Wrapping or shrinking text to fit the cell
If you have text too wide to fit the column width but don’t want that text to spill over into adjacent
cells, you can use either the Wrap Text option or the Shrink to Fit option to accommodate that text.
The Wrap Text control is also available on the Ribbon.
The Wrap Text option displays the text on multiple lines in the cell, if necessary. Use this option to
display lengthy headings without having to make the columns too wide, and without reducing the
size of the text.
The Shrink to Fit option reduces the size of the text so that it fits into the cell without spilling over
to the next cell. Usually, it’s easier to make this adjustment manually.

1. Move to cell A2.


2. Type Text too long to fit.
3. Press Enter.

4. Return to cell A2.


5. Choose the Home tab.
6. Click the Wrap Text button . Excel wraps the text in the cell.

Merging worksheet cells to create


additional text space

You can merge any number of cells occupying any number of rows and columns. In fact, you can
merge all 17,179,869,184 cells in a worksheet into a single cell — although I can’t think of any
good reason to do so, except maybe to play a trick on a co-worker.
The range that you intend to merge should be empty, except for the upper-left cell. If any of the
other cells that you intend to merge are not empty, Excel displays a warning. If you continue, all
the data (except in the upper-left cell) will be deleted. To avoid deleting data, click Cancel in
response to the warning.
The Home ➪ Alignment ➪ Merge & Center control contains a drop-down list with these
additional options:
Merge Across: When a multirow range is selected, this command creates multiple merged
cells — one for each row.
Merge Cells: Merges the selected cells without applying the Center attribute.
Unmerge Cells: Unmerges the selected cells.

Displaying text at an angle


In some cases, you may want to create more visual impact by displaying text at an angle within a
cell. You can display text , vertically, or at an angle between 90 degrees up and 90
degrees down.

Adding Borders and Lines


Borders (and lines within the borders) are another visual enhancement that you can add around
groups of cells. Borders are often used to group a range of similar cells or to delineate rows or
columns.
Excel offers 13 preset styles of borders, as you can see in the Home ➪ Font ➪ Borders dropdown.
This control works with the selected cell or range and enables you to specify which, if any, border
style to use for each border of the selection.

Printing your worksheet


Printing your worksheet is very easy (assuming that you have a printer attached and that it works
properly).
1. Make sure that the chart isn’t selected. If a chart is selected, it will print on a page by itself.
To deselect the chart, just press Esc or click any cell.
2. To make use of Excel’s handy page layout view, click the Page Layout View button
on the right side of the status bar. Excel then displays the worksheet page by page so that you
can easily see how your printed output will look. In Page Layout view, you can tell immediately
whether the chart is too wide to fit on one page. If the chart is too wide, click and drag a corner to
resize it. Or, you can just move the chart below the table of numbers.

3. When you’re ready to print, choose File ➪ Print.


At this point, you can change some print settings. For example, you can choose to print in
landscape rather than portrait orientation. Make the change, and you see the result in the preview
window. When you’re satisfied, click the Print button in the upper-left corner.
The page is printed, and you’re returned to your workbook.
Saving your workbook
Until now, everything that you’ve done has occurred in your computer’s memory. If the power
should fail, all may be lost — unless Excel’s Auto Recover feature happened to kick in. It’s time to
save your work to a file on your hard drive.
1. Click the Save button on the Quick Access toolbar. (This button looks like an old fashioned
floppy disk, popular in the previous century.) Because the workbook hasn’t been saved yet and still
has its default name, Excel responds with the Save As dialog box.
2. In the box labeled File Name, enter a name (such as Monthly Sales Projection), and
then click Save or press Enter. Excel saves the workbook as a file. The workbook remains open
so that you can work with it some more.

DATABASE MANAGEMENT SYSTEM (DBMS)


A database management system (DBMS) is a collection of programs that enables one to store
modify and extract information form a database.
This is a software system that enables users to define, create, maintain and control access to
database. This is in contrast to filed-based system;- which is a collection of application programs
that perform services for the end user e.g. reports. Each program defines and manages its own data
e.g. – bursar –student name, no, fees payable, paid, balance or Library- student name, no, book
borrowed, date of return.

a) Meaning of database
Database is a shared collection of logically related data and a description of this data designed to
meet the information needs of an organization
Examples of application of database
ATM card, mobile phone, Super-market, Library, School Management Information System
TERMINOLOGIES
i Entity
-Is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant, student, book
ii Attribute
-Refers to the property of an entity, i.e. entities have attributes e.g. name, reg no, book no, title
iii Schema
The structure of a database is called a schema (tables, property of tables, relationships –names
iv Relationship
-Refers to the association between entities e.g. borrows, returns
v Relation
-Is a table with columns and rows
vi Tupule
-Is a row of a relation
vii Domain
-is the set of allowable values for one or more attributes
viii View
- A view is named relation corresponding to an entity in conceptual schema, whose
tuples are physically stored in database. Contents of a view are defined as a query on
one or more base relations.
b) Database design
Database design has the following conceptual steps
1) Build local conceptual data model for each user view
2) Build and validate local data model for each user view
3) Build and validate global logical data model
4) Translate global data model for targets DBMS
5) Design physical representation
6) Design security mechanism
7) Monitor and tune the operational system
CHARACTERISTICS OF DBMS
c) Data manipulation
- Data is arranged in columns (fields) and rows (records)
- Each column has similar items or entries
- Each row contains information pertaining (belonging) to the single individual
d) Data sorting and indexing
This involves arranging the records into a predefined sequence or way and this requires one to
identify certain fields to be key fields so as to sort either in ascending/descending order or
alphabetically.

e) Data retrieval/searching
This involves the ability to extract information from a database- either entire content, specific
record or a set of records.

DATABASE ELEMENTS
 A database consists of four elements as given,
i) Data
ii) Relationships
iii) Constraints
iv) Schema
Data items

Relationships
Data base Constraints
i) Data
 Data are binary computer representations of stored logical entities.
 Software is divided into two general categories-data and programs.
 A program is a collection of instruction for manipulating data.
 Data exist is various forms- as numbers or texts on pieces of paper, as bits and bytes stored
in electronic memory or as facts stored in a person’s mind.
ii) Relationships
Relationships explain the correspondence between various data elements.
iii) Constraints
 Are predicates that define correct database states.
iv) Schema
 Schema describes the organization of data and relationships within the database.
 Schema defines various views of the database for the use of various system components of the
database management system and for the application’s security.
 A schema separates physical aspects of data storage form the logical aspects of data
representation.
Types of schema
a)Internal schema: defines how and where the data are organized in physical data storage.
b)Conceptual schema: defines the stored data structures in terms of the database model used.
c)External schema: defines a view (or) views of the database for particular uses.
 In database management systems data files are the files that store the database information whereas
offer files, such as index files and data dictionaries, store administrative information known as
metadata (data about data).
 Data base are organized by fields, records and files.
i) Fields: is a single piece of information.
ii) Record: is one complete set of fields.
iii) File: is a collection of records.
Advantage of Data in database
 Database system provides the organization with centralized control of its data
1) Redundancy can be reduced:
 In non-database systems, each application (or) department has its own private file
resulting in considerable amount of redundancy (or) the stored data. Thus storage space is
wasted. By having centralized database most of this can be avoided

2) Inconsistency can be avoided:


 When the same data is duplicated and changes are made at one site, which is not
propagated to the other sites, it gives rise to inconsistency.
 If the redundancy is removed chances of having inconsistent data is removed.
3) Data can be saved:
 The existing application can save the data in a database.
4) Standards can be enforced:
 With the central control of the database, the database administrator can
Enforce standards.
5) Integrity can be maintained
 Integrity means that the data in the database is accurate. Centralized control of the data
helps in permitting to define integrity constraints to the data in the database.
Characteristics of Data in a Database
The data in a database should have the following features:
1. Shared – Data in a database are shamed among different users and applications.
2. Persistence – Data in a database exist permanently in the sense the data can live beyond the scope
of the process that created it.
3. Validity / Integrity / Correctness – Data should be correct with Respect to the real world’s entity
that they represent.
4. Security – Data should be protected from unauthorized access.
5. Consistency- whenever more than are database represents related real – world values, the values
should be consistent with respect to the relationship.
6. Non –redundancy – No two data items in a database should represent the same real world entity.
7. Independence – The three levels in the schema (internal, conceptual and external) should be
independent of each other so that the changes in the schema at one level should not affect the other
levels.
The following are the examples of database application
1. Computerized library systems
2. Automated teller machines
3. Flight reservation systems
4. Computerized parts inventory systems.

Components of a DBMS

Data Catalog

Management Application

Transaction
Management

Concurrency Control

Recovery Management

Security Management

Language Interface

Database Data Access


Storage Management
Functions of DBMS
i) Transaction Management
A transaction is a sequence of database operations that represents a logical unit of work and
that accesses a database and transforms it from one state to another.
A transition can update a record, delete (or) modify a set of records etc.
ii) Concurrency control
Concurrency control is the database management activity of co-coordinating the actions of
database manipulating process that separate concurrently that access shared data and can
potentially interfere with one another.

iii) Recovery Management


The recovery management system in a database ensures that the aborted or failed
transactions create non adverse effect on the database or the other transitions.
iv) Security Management
Security refers to the protection of data against unauthorized access. Security mechanism
of a DBMS makes sure that only authorized users are given access to the data in the database
v) Language Interface
The DBMS provides support languages used for the definition and manipulation of data in
the database. The data structures are created using the data definition language commands. The
data manipulation is done using the data manipulation commands.
vi) Storage Management
The DBMS provides a mechanism for management of permanent storage of the data. The
internal schema defines how the data should be stored by the storage management mechanism and
this storage manager interface with the operating system to access the physical storage.
vii) Data Catalog Management
Data catalog or Data Dictionary is a system database that contains descriptions of the data
in the database (metadata). If contains information about data, relationships, constraints and the
entire schema that organize these features in to a unified database.
Transaction Management
 A transaction is a collection of operations that performs a single logical function in a database
application.
 Each transaction is a unit of both atomicity and consistency. Thus, we require that transactions do
not violate any database consistency constraints.
 That is, if the database was consistent when a transaction started, the database must be consistent
when the transaction successfully terminates.
i) Database planning vi) Application design
ii) System definition vii) Prototyping
iii) Requirements collection and analysis viii) Implementation
iv) Database design ix) Data conversion and loading
v) DBMS selection x) Testing
xi) Operation & maintenance
Data Modeling
 The two main purposes of data modeling are,
i) To assist in the understanding of the meaning (or) semantic of the data.
ii) To facilitate communication about the information requirements.
 A data model makes it easier to understand the meaning of the data and thus we model data to
ensure that we understand:
i) Each user’s perspective of the data
ii) The nature of the data itself, independent of its physical representations.
iii) The use of data across application areas.
An optimal data model should satisfy the criteria listed below:
i) Structural validity – consistency with the way the organization defines and organizes
information.
ii) Simplicity – Ease of understanding by information system professionals and non-technical
users.
iii) Expansibility – Ability to distinguish between different data, relationships between data
and constraints.
iv) Non-redundancy-Exclusion of extraneous information,
v) Sharability-Not specific to any particular application or technology and thereby usable by
many.
vi) Extensibility – Ability to evolve to support new requirements with minimal effect on
existing users.
vii) Integrity – consistency with the way the organization uses and manages information.
 Four database model:
i) Hierarchical Model
ii) Network model
iii) Relational model
iv) Object – oriented.
v) Object relational model
vi) Deductive /
Inference Model
Comparison between the Database Models

Model Data Element Relationship Identity Access


Organization Organization Language

Hierarchical Files, Records Logical Proximity in a Record based Procedural


Linearized tree

Network Files, Records Intersecting Networks Record based Procedural

Relational Tables Identifiers of rows in Value based Non-Procedural


one table are embedded
as attribute values in
another table

Object-Oriented Objects Logical Containment – Record based Procedural


Related objects are
found within a given
object by recursively
examining attributes of
an object that are
themselves objects

Object- Object- Relational extenders Value based Non-Procedural


Relational Infrastructure to that support specialized
the database applications such as
system itself- image retrieval,
user-defined advanced text searching
data types and geographic
functions, and applications.
rules

Deductive Facts, Rules Inference rules that Value based Non-Procedural


permit related facts to
be generated on
demand

i) Hierarchical Model:
It uses a structure in which records are divided into segments. A record contains one root
segment (which also becomes a key) and a variable number of subordinate segments that
define a field within a record.
Hierarchical Model is one of the oldest database model, dating from late 1950s. First
Hierarchical database model – was Information Management system (IMS). IMS
become the world’s leaching mainframe hierarchical database system in the 1970’s and
early 1980’s.
The hierarchical model represents relationships with the notion of logical adjacency or
more accurately with ‘logical proximity’ in a linearized tree.
Advantages:
i) Simplicity: The relationship b/w the various layers are logically simple. Thus the
design of a hierarchical database is simple.
ii) Data security: Hierarchical model was the first database model that offered the
data security that is provided and enforced by the DBMS.
iii) Data Integrity: Since the hierarchical model is based on the parent /child
relationship, there is always a link between the parents segment and the child segments
under it.
iv) Efficiency – The hierarchical database model is a very efficient one when the
database contains a large number of 1: n relationships.
Disadvantage:
i) Implementation Complexity
Even though it is simple and Easy to design it is quite complex to implement.
The database designers should have very good knowledge of the physical date storage
characteristics.

ii) Database Management problems:


If we make any change in the database then we should make the necessary
changes in all application programs that access the database.
iii) Lack of structural independence:
Hierarchical database systems use physical storage paths to navigate to the
different data segments. So the application programmer should have a good knowledge
of the relevant access paths to access the data. So if the physical structure is changed the
applications will also have to be modified.
2. Network Model (online database)
 This approach use a ‘linked’ structure. It combines records with links which are
technically called pointers. The pointers physically establish the relationships between
records.
 The Network model replaces the hierarchical tree with a graph this allowing more general
connections among the modes.
 The main difference of the network model from the hierarchical model is its ability to
handle many-to many (n: n) relationship.
 In n/w database terminology, a relationship is a set, Each set is made of at least two types
of records: an owner record (parent) and a member record (child).

Advantages:
i) Conceptual simplicity: It is simple and easy to design.
ii) Capability to handle more relationship types. If can handle the one-to-many (I: n)
and many to many (n: n) relationship.
iii) Ease of data access: The data access is easier than and flexible than in the hierarchical
model.
iv) Data independence – the network model is easy to isolating the programs from the
complex physical storage details.
v) Data integrity. The network model does not allow a member to exist without an
owner
Disadvantages:
i) System complexity
ii) Absence of structural independence.

3. Relation model:
 Relational model stores the data is the form of a table.
 A single database can be spread across several tables.
 A relational model uses tables to organize data elements.
 Each table corresponds to an application entity and each row represents an instance of
that entity.
Advantage:
i) Structural independence:
The relational model does not depend on the navigational data access system thus
freeing the database designers, programmers and uses form learning the details about the
data storage.

ii) Conceptual simplicity:


Since the relational data model free the designer from the physical data storage
details, the designer can concentrate on the logical view of the database.
iii) Design, implementation, maintenance and usage ease – It is easier than other two
models.
Disadvantages:
i) Hardware over heads:
Relational database systems hide the implementation complexities and the physical data
storage details from the users.
ii) Ease of design can lead to bad design:
 It is easy to design; the users need not know the complex details of physical data storage.
EXAMPLE
NB;
i) A record is a set of entire data items in a row. A single record represents a horizontal row in a
table
ii) Field – a set of entire similar data items in a column e.g. individual names, sex, adm no, marks

ADMIN CA ATTENDANC
NO NAME SEX T EXAMS TOTAL E
4818 Julius M 17 46 63 85
4490 Elijah M 20 55 75 95
4826 Nickson M 14 37 51 90
4821 James M 24 53 77 85
4853 Naum F 20 50 70 91
4833 Stellah F 22 45 67 96

iii) Field types- specify the way specific data items are stored. MS Access support up to 10
different field types e.g. text, memo, number, date/time, currency, Y/N, OLE object,
auto-number, look-up, hyperlink.
Type
Auto-number A number is automatically incrementally &
never changes again
Currency A numeric field automatically assigned with a
currency sign e.g. £
Date/Time A date or time data type & can change
appearance of each from general type
Text Any character not needed for calculation
Number Any figure needed for calculation
Yes/No A logical field that needs yes or no
Memo A whole sentence e.g. comments/remarks
OLE object Any linked object e.g. picture
Hyperlink Stores data that are internet address e.g.
Link-up Values from external table

Relational Keys
i) Candidate key
It is a unique identifier of each record in a table. A table can have number of
candidate keys and out of these, one candidate key is designed as the primary key
and it is by this value that records can be sorted in a table unless otherwise, e.g.
admission number.
ii) Primary key
Is a field or a set of fields whose content, is unique to one record and can
therefore be used to identify that record while sorting.
iii) Foreign key
This is the attribute or set of attributes within one relation that matches candidate
key of some other relation.

iv) Super key


An attribute or a set of attributes that uniquely identifies a tuple within a relation
v) Alternate key
This is a candidate key which has not been selected to be primary key
vi) Cardinality of a relationship
Cardinality expresses the specific number of entity occurrences associated with
one occurrence of the related entity. The actual number of associated entities is
governed by the organization rules. E.g. marks in an examination can be between
0-100%, i.e. not more than 100%.

4. Object oriented Model:


 Object – oriented Model represents an entity as a class.
 A class represents both object attributes as well as behaviour of the entity
Advantage
i) Capability to handle large number of different data types
The other three data model limited in their capability to store the different types of
data. But the object-oriented data base can store any type of data including text,
numbers, pictures, voice and video.
Object – oriented features improve productivity:
a) Inheritance: We can develop solutions to complex problems incrementally by
defining new objects in terms of previously defined objects.
b) Polymorphism: allow one to define operations for one object and then to share the
specification of the operation with other object.
c) Dynamic binding: Determines at runtime which of these operation is actually
executed, depending on the class of the object requested to perform the operation.
Disadvantage:
i) Difficult to maintain.
ii) Not suited for all application

5. Entity-Relationship Model
 A database can be modeled as:
o a collection of entities,
o relationship among entities.
 An entity is an object that exists and is distinguishable from other objects.
o Example: specific person, company, event, plant
 Entities have attributes
o Example: people have names and addresses
 An entity set is a set of entities of the same type that share the same properties.
o Example: set of all persons, companies, trees, holidays

 Rectangles represent entity sets.


 Diamonds represent relationship sets.
 Lines link attributes to entity sets and entity sets to relationship sets.
 Ellipses represent attributes
o Double ellipses represent multivalve attributes.
o Dashed ellipses denote derived attributes.
 Underline indicates primary key attributes

Relationship among Data


A relationship is an association among entities. Several relationships can exist between
the same entities. The three different types of relationships recognized among various
data stored in a database are;
i) One-to-One
ii) One-to Many (or Many – to – One)
iii) Mant – to- Many

One-to-One
Consider for example a set of students in a class. Each student can have only
one admission number. Similarly each adm. No. can be associated with only
one student. This is a case of one-to-one relationship

AA

Assigned
STUDENT 1 Adm. No. 001

STUDENT 2 Adm. No. 002

Many to One
A student can register for only one particular course at a time, whereas many
students could register for that particular course

Student 1

Student 2 COURSE

Student 3

Many – to- Many


A shop dealer can sell many items and many dealers can sell a particular item.

Dealer 1
Item 1

Dealer 2
Item 2
6. FLAT FILES
In a flat file, a database holds only one set of data and is not any different from
the manual files. For example the cards in a library books catalogue. The cards are
arranged sequentially for easy access e.g. alphabetically using book’s title or by author’s
names.
CREATING DATABASE
To create and manage database, we use Database Management System (DBMS)
software. This software facilitates the creation, organization and maintenance of
databases. Examples of DBMS software are Microsoft Access (MS Access), Microsoft
SQL Server, Oracle, FoxPro, DbaseIV, Lotus Approach and MySQL.
The functions of a database management software are to;
a) Allow the user add or delete records
b) Update or modify existing records
c) Organize data for easy access, retrieval and manipulation of records.
d) Ensure security for the data in the database by safeguarding it against
unauthorized access and corruption (damage).
e) Keep statistics of data items in a database

 FEATURES OF A DATABASE MANAGEMENT SOFTWARE


Most database software contains a collection of features that provides the user
with a means to manipulate data in a database. These features include Tables,
Queries, Reports generators, Form interface and a computer programming
language within it.

Tables/file structure
This is a database structure that is used to hold related records. Tables are
organized in rows and columns with each row representing a record while each
column represents common fields in each record.

Queries
A query is a statement use to extract, change, analyze or request for specific data
from one or more tables. Because a query is a question posed to the database, it
returns a result for the user.
Query statements are written using a special language called Structured Query
Language (SQL). The user creates a query by writing Structure query language
statement such as;
Select student admission number,
From
Admission table
Where
Class = year of admission

Forms/Input screen
A form is a graphical interface that resembles an ordinary paper form. Enter into
or view data from database. However, a database form enables the user to view
and enter data into a table. Form interface is a more convenient and easy way of
entering and viewing records from a table.

Reports
Most database systems provide the user with a tool for generating reports from
underlying tables o queries. It is the report generator that provides the user with a
means to specify the output layout and what is to be output or printed on a report.

Macros
In most DBMS software, it is possible to automate frequently performed
procedures or tasks using database components known as a macro. For example,
if you frequently use a particular form when you start a database program, you
need to create a macro that automates the opening of the form.

Creating a database using Microsoft Access


To create a new database;( Microsoft Office 2003)
1) Click start, point to programs, Microsoft Office, then Access 2003
2) On the New File, click create New
3) On the new file pane, click blank database
4) Select the location where the database will be created, type the database name then click
create.
The new database dialog box appears. This lets you specify the name and
location where your database will be stored. Click create.
5) Microsoft Access database objects window is displayed, from which you can choose the
type of object you wish to create such as tables, forms, queries etc.

Creating a table structure


To define a table structure
In Ms Access objects window, click the Tables tab then New.
6) In new table dialog box, select Design view.
7) Select blank database, click ok. A window prompting you to type and save name of the
database is displayed. NB: in Ms Access, you first give the name to the database since
you are creating it.
8) In the filename text box, type the name “students’ and click on create button on the blank
database structure or an Application window containing six panels/Tables, Queries,
Forms, Reports, Macros and Modules is opened as follows:

Students database
Tables Queries Forms Reports Macros Modules
Open
Design
view
New
Ok
Assuming the “students database is open;

9) Click on the Tables tab and click on the New button to create a new table. Access
displays a New Table dialog box with various options of creating the table
10) Select Design view and click ok. A blank data table structure is displayed.
11) Using the grid displayed, enter a unique name for each field in the table. A field name
must start with a letter and can be up to a maximum of 64 characters including letters,
numbers, spaces and punctuation.
12) Choose appropriate data type before adding the next field. By default, Ms Access inserts
text as a data type. To specify the data type, click on the box besides Text and select the
required data type from the drop-down menu.
13) The field size and Formats are entered automatically on the General Tab table structure.
However, you can change the field sizes and Formats accordingly. Note that when a field
is empty, information in the general tab is not visibly displayed immediately until you
click in the data type column.
14) To save the table, click the save button on the standard tool bar or save from the file
menu and save as (e.g. Students Table and click ok).
15) Access will ask you whether you want to create a Primary Key, click yes.
16) Click on the View menu and select Datasheet View to see results of the structure. At this
point, you can enter a few records just to check that the table structure designed will be
suitable for the data.
17) Click on File and select Close to complete the table structure design. A new table is
complete and ready for the data entry.
A data table showing defined fields (complete table ready for data entry)

FIELD NAME FIELD TYPE(DATA FIELD SIZE


TYPE) (FORMAT)
1 Number Auto number Long integer
2 Names Text 20
3 Registration number Number Long integer
4 Birth Date Date/Time Short date
5 Sex Yes/No Yes/No
6 Marks Number Short integer

ADDING DATA TO A DATABASE


After defining the database structure like the one above, you can add data to it
and it appears like below;
N NAMES REG. NO BIRTH DATE SEX MARKS
O
1 JOHN MARK 202/10 24/7/82 M 67
2 SARAH JANE 376/11 01/11/80 F 84
3 SHARRIF BII 190/10 25/12/81 M 80

CREATING A FORM IN MICROSOFT ACCESS


A form is used to enter records in a table. A form is designed to help in entering
data properly in a table. A form can have a graphical background, colour, e.t.c.
forms facilitate the entering of images/objects, used to customize the screen
displayed and make data entry easier.
To create a form, follow the following steps;
i) Click on the Forms tab and select New. A new form dialog box appears
ii) From the options given, select Form Wizard. Click on the ok. A new form wizard
starts.
iii) Under the Tables/Queries drop down list box, select Students table.
iv) Click on » (double arrow) button to move all the fields in the available Fields box to
the Selected Fields box.
v) Click on the next button to continue. The form wizard asks you to select the type of
layout you like for the form
vi) Click on Columnar layout and click on the next button to continue. The form
wizard now displays a list of various styles for you to make a choice.
vii) Select the Standard style and click on the next to continue. Finally, the form wizard
request you for an appropriate title for your form.
viii) For the title, type in Students Form and click on the Finish button. A new standard
form will be displayed with details of the first record if there was any entry.

ADDING NEW RECORDS


In the Forms design screen,
1. Click on the Insert Menu
Select New Record. A blank form design screen appears where you enter data.
2. From the list, select Report Wizard and click ok. A report wizard starts,
3. Click on the Table/Query drop down list box and select Students table that contains the
data that you want to base your report on. A list of fields will be displayed in the
Available Fields list box.
4. Click on the » (Select All) button to transfer all fields in the Available Fields list box to
the Selected Fields list box.
5. The Report Wizard will now prompt you to specify any grouping levels. Since we do not
want any grouping level, click on the next button to continue. The Report Wizard prompts
you to specify fields you want to appear sorted on.
6. In the First field sort text box, click the drop down list box and select the Names field
label. This is because we want the names to appear in alphabetical order, click on the next
button to continue. The report wizard now displays a list of various Reports Layouts you
can choose from.
7. From the list, select Tabular layout and click on the next button to continue. The report
wizard will now display a list of various Report styles to choose from.
8. Select the Corporate style and click next to continue. The report wizard now displays a
text box and prompts you to specify any desired Title for the report.
9. In the text box, type Students Reports and click on the Finish button to continue. The
report wizard starts creating a report according to the specified details. After setting up the
report, it displays it and terminates.

DESKTOP PUBLISHING

a) Functions of DP
Publishing is a way in which information and experiences shared by individuals, groups,
or broadcast to a wide audience. Some examples of publishing media are;
- Printing material such as books, magazines, newsletters, flyers, posters,
banners, greeting cards etc
- Radio, tape and digital music
- Television, satellite TV, cable TV, Teletext
- Cinema and Video
- Telephone, mobile phones and pagers
- Computers, laptop and handheld devices
- The internet
Desktop generally refers to the display on the computer screen. Desktop Publishing (DTP)
software is essentially an enhanced combination of word processing and graphics software
that allows manipulation of text, graphics and typeface on screen before finally printing the
design on paper.
In brief DTP enables the user to perform the following
i) Type text
ii) Insert and manipulate graphics
iii) Create page layout
iv) Print or publish to the web

b) Tools used
Types of DTP Software
i) Layout based software
ii) Print and draw software

Layout based software


The main purpose of page layout software is to make it easy to combine text and graphics
to create publication. The typical projects for page layout tools include ads, flyers,
brochures, newsletters, posters and business cards.
Features of the software are extensive typographic control and graphics capabilities. In
the software, the pasteboard (a single broadsheet) contains all features combined into a
single working area, which include the page itself and an area off page where one can
work on.
The pasteboard is drawn to scale and the user can zoom in or out. All features appear
with all details as they would in the final print. Examples of the software are Microsoft
Publisher and Adobe PageMaker.
Print and draw Software
This provide an environment for drawing and manipulating graphics. Examples of
packages are Adobe Illustrator, CorelDraw and Macromedia Freehand. There are 2 types
of software:
i) Bitmap graphics
ii) Vector graphics
The difference between these two is in how they are created.
Bitmap images (raster image) are made up of pixels. Pixels, which are picture
elements, are tiny dots of individual colour that make up what is seen on the
screen. Examples are Joint Photographic Experts Group (JPG/JPEG), Bitmap
(BMP), Graphics Interface Format (GIF) and Tag Image File Format (TIFF).
Vector images are made up individual scalable objects. These objects are defined
by mathematical equations rather than pixels, so they always render the highest
clarity. Objects consist of lines, curves and shapes with editable attributes such as
colour, fill and outline. Examples are Encapsulated Postscript (EP), Adobe
Illustrator (AI) and Windows Metafile (WMF).
c) Designing a publishing
1. Click on the start button, select all programs and click on Microsoft Publisher
2. Click on the Ms Publisher to open automatically
3. There are a number of ways to create a publication with publisher:
i) Blank Publication
ii) Publication by design
iii) Publication by Wizard.

Creating a Blank Publication


1. On the file menu, click New
2. On the new publication task pane, under new, click blank print publication. A
blank publication will appear
Creating a Publication by Design
1. In the New p
print. A drop down list of several types of publications appear
2. Select a type
3. Click on the
Creating a Publication by Wizard
1. In the New publication task pane, under new from a design, click Design sets.
A list of types of design sets will appear.
2. Click on the type of set you want and select the layout you desire

d) Enhancement of typeset work


Layout Guides and ruler Guides
Ruler Guides
Ruler guides are used to mark precise positioning of objects – a very important aspect of
publishing. Objects will snap to position as you move closer to the guides

Margin Guides
Margin guides are on top, bottom and left sides of the page. They are used to define page margins
and are represented by a blue dotted line. Contents of a apge are within the margin guides
Column Guides
These are vertical green dotted that are used to divide a publication page into two or more

Row Guides
These are represented by blue dotted lines. They are used to divide a page into two or more
sections to help structure the layout of the page.

PRESENTATION SOFTWARE
Definition
Presentation software is an application software designed to help design layout and produce
visual aids to help further communication of ideas during presentation of information to an
audience.
A presentation is a collection of slides, hand outs, speaker’s notes and outlines in a single file. A
slide is an individual page in a presentation. Slide shows are normally employed during meetings
or seminars to enhance speaker’s ideas graphically.
NATURE AND CHARACTERISTICS OF PRESENTATION SOFTWARE
1) They contain templates which define what the presentation will look like, where the slide
and other objects will appear and which foreground and background colors will be used
2) They contain wizards which lead the user step-by-step through creating different styles of
presentation (for quick editing and re-organizing of slides)
3) They have the ability to add sound, transitions, graphics and animation effects

a) Types of presentation packages


Examples of presentation software/packages
4. Microsoft PowerPoint
5. Harvard Graphics
6. Lotus Freelance
7. Macromedia Director

b) Functions of Presentation Software


i) It helps to organize and present information to an audience
ii) It provides tools that helps presenter to outline his thoughts using professionally
designed templates
iii) It is used to enhance presentations with pictures, charts, sound and video

c) Designing/Creating slides
In creating a presentation, it is important to have a clear understanding of the presentation
objectives and verbalize the information to be presented to the audience.
The following steps provide an overview of the process for creating a presentation using
Microsoft PowerPoint.
1) Select the starting point of the presentation
There are a number of ways which appear in the start-up dialog box when PowerPoint
is loaded. These are
 Auto Content Wizard
 Template
 Blank Presentation
Using auto content wizard
A wizard is a special feature that displays a series of dialog boxes that ask
questions on design and content. The wizard uses the answers to create the design
as per instructions. When finished, there will be a standardized group of slides, all
with similar look or feel, for a particular situation.
2) The auto content wizard is launched and presents an initial Auto Content Wizard screen.
3) To proceed to next screen, click next button
4) Select the category of presentation – PowerPoint has seven categories, e.g. select

DATA SECURITY AND CONTROL

Data exist is various forms- as numbers or texts on pieces of paper, as bits and bytes
stored in electronic memory or as facts stored in a person’s mind.

Information security is the process of protecting information. It protects its availability,


privacy and integrity. Access to stored information on databases has increased greatly.
More companies store business and individual information on computer than ever before.
Much of the information stored is highly confidential and not for public viewing.

Data/information security means protecting information and from unauthorized access,


use, disclosure, disruption, modification, perusal, inspection, recording or destruction,
disclosure or transfer, whether accidental or intentional.
Data control is the measure taken to enforce the security of the program and data. Data
may be lost in various ways such as virus, user errors, computer crushes, hacking, etc.

Many businesses are solely based on information stored in computers. Personal staff
details, client lists, salaries, bank account details, marketing and sales information may all
be stored on a database. Without this information, it would often be very hard for a
business to operate. Information security systems need to be implemented to protect this
information.

Effective information security systems incorporate a range of policies, security products,


technologies and procedures. Software applications which provide firewall information
security and virus scanners are not enough on their own to protect information. A set of
procedures and systems needs to be applied to effectively deter access to information.

The terms information security, and are frequently incorrectly used interchangeably.
These fields are interrelated often and share the common goals of protecting the , and of
information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used,
and the areas of concentration. Information security is concerned with the confidentiality,
integrity and availability of regardless of the form the data may take: electronic, print, or
other forms.

Computer security can focus on ensuring the availability and correct operation of a
without concern for the information stored or processed by the computer.

a) Security and Privacy

Security is about well-being (integrity) and about protecting property or interests from
intrusions, stealing or wire-tapping (privacy - the right to keep a secret can also be
stolen). In order to do that, in a hostile environment, we need to restrict access to our
assets. To grant access to a few, we need to know whom we can trust and we need to
verify the credentials (authenticate) of those we allow to come near us.

Security is thus based on the following independent issues:

 Privacy - the ability to keep things private/confidential


 Trust - do we trust data from an individual or a host? Could they be used against us?
 Authenticity - are security credentials in order? Are we talking to whom we think we are
talking to, privately or not.
 Integrity - has the system been compromised/altered already?

Environments can be hostile because of


 Physical threats - weather, natural disaster, bombs, power failures, etc.
 Human threats - stealing, trickery, bribery, spying, sabotage, accidents.
 Software threats - viruses, Trojan horses, logic bombs, denial of service.

What are we afraid of?

 Losing the ability to use the system.


 Losing important data or files
 Losing face/reputation
 Losing money
 Spreading private information about people.

b) Security threats and control measures

There are people who make a living from or breaking through information security
systems. They use their technological skills to break into computer systems and access
private information. Firewalls, which are designed to prevent access to a computer's
network, can be bypassed by a with the right hardware. This could result in the loss of
vital information, or a virus could be planted and erase all information. A computer
hacker can gain access to a network if a firewall is shut down for only a minute.

One of the biggest potential threats to information security is the people who operate the
computers. A workplace may have excellent information security systems in place, but
security can be easily compromised. If a worker gives out or resets passwords without
verifying who the information is for, then anyone can easily gain access to the system.
Computer operators should be made fully aware of the importance of security.

Simple security measures can be used by everyone to keep data secure. Changing
passwords on your computer, and using combinations of letters and numbers, makes it
harder for to gain access. Also, do not keep a note of your where it can be easily
accessed. This is the same idea as not keeping your and PIN number together. You
would not want anyone to have access to the information or funds in your bank account,
and it is the same with your computer.

COMPUTER VIRUS

Computer Virus is a malicious software program written intentionally to enter a computer


without the user's permission or knowledge. It has the ability to replicate itself, thus continues to
spread. Some viruses do little but replicate, while others can cause severe harm or adversely
affect program and performance of the system. A virus should never be assumed harmless and
left on a system.

It can be a code segment that replicates by attaching copies of itself to existing executable files.
The new copy of the virus is executed when a user executes the new host program. The virus
may include an additional code that triggers when specific conditions are met. For example,
some viruses display a text string on a particular date. There are many types of viruses, including
variants, overwriting, resident, stealth, and polymorphic.

a) TYPES OF COMPUTER VIRUSES

There are different types of computer viruses which can be classified according to their origin,
techniques, types of files they infect, where they hide, the kind of damage they cause, the type of
operating system or platform they attack as follows;

Boot Sector Virus


This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk,
in which information of the disk itself is stored along with a program that makes it possible to
boot (start) the computer from the disk. The best way of avoiding boot sector viruses is to ensure
that floppy disks are write-protected and never starting your computer with an unknown floppy
disk in the disk drive.
Examples: Polyboot.B, AntiEXE.

Companion Viruses
Companion viruses can be considered as a type of file infector viruses like resident or direct
action types. They are known as companion viruses because once they get into the system they
'accompany' the other files that already exist. In other words, in order to carry out their infection
routines, companion viruses can wait in memory until a program is run (resident virus) or act
immediately by making copies of themselves (direct action virus).
Some examples include: Stator, Asimov.1539 and Terrax.1069

Resident Virus
This type of virus is permanent as it dwells in the Random Access Memory so as it can
overcome and interrupt all the operations executed by the system. It can corrupt files and
programs that are opened, closed, copied, renamed etc.
Examples: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or folder
that it is in as well as directories that are specified in the AUTOEXEC.BAT file path. This batch
file is always located in the root directory of the hard disk and carries out certain operations
when the computer is booted.
Examples: Vienna virus.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files
that it infects, rendering them partially or totally useless once they have been infected. The only
way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the
original content.
Examples: Way, Trj.Reboot, Trivial.88.D.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain
macros. These mini-programs make it possible to automate series of operations so that they are
performed as a single action, thereby saving the user from having to carry them out one by one.
Examples: Relax Melissa.A, Bablas, O97M/Y2K.

Directory Virus
Directory viruses change the path that indicate the location of a file. When you execute a
program file with an extension .EXE or .COM that has been infected by a virus, you are
unknowingly running the virus program, while the original file and program is previously moved
by the virus. Once infected it becomes impossible to locate the original files.
Examples: Dir-2 virus.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms
and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to
find them using string or signature searches (because they are different in each encryption). The
virus then goes on creating a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg.

File Infector Virus


This type of virus infects programs or executable files (files with .EXE or .COM extension).
When one of these programs is run, directly or indirectly, the virus is activated, producing the
damaging effects it is programmed to carry out. The majority of existing viruses belong to this
category, and can be classified depending on the actions that they carry out.
Examples: Cleevix and Cascade.
FAT Virus
The file allocation table or FAT is the part of a disk used to store all the information about the
location of files, available space, unusable space etc. FAT virus attacks the FAT section and may
damage crucial information. It can be especially dangerous as it prevents access to certain
sections of the disk where important files are stored. Damage caused can result in information
losses from individual files or even entire directories.

Multipartite Virus
These viruses spread in multiple ways possible. It may vary in its action depending upon the
operating system installed and the presence of certain files.
Examples: Invader, Flip and Tequila

Web Scripting Virus


Many web pages include complex code in order to create an interesting and interactive content.
This code is often exploited to bring about certain undesirable actions.

Trojans or Trojan Horses


Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do
not reproduce by infecting other files, nor do they self-replicate like worms. In fact, it is program
which disguises itself as a useful program or application. They perform a desired task, but that
also includes unexpected (and undesirable) functions. Consider as an example an editing
program for a multiuser system. This program could be modified to randomly delete one of the
users' files each time they perform a useful function (editing), but the deletions are unexpected
and definitely undesired!

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in
their own right but rather camouflaged segments of other programs. They are only executed
when a certain predefined condition is met. Their objective is to destroy data on the computer
once certain conditions have been met. Logic bombs go undetected until launched and the results
can be destructive.

Besides, there are many other computer viruses that have a potential to infect digital data. Hence,
it is a must that data is protected by installing a genuine quality anti-virus software.

Worms
Worms are programs that replicate and spread, often opening a back door to allow hackers to
gain access to the computers that they infect.

Worms can spread over the Internet by exploiting security flaws in the software of computers
that are connected to the Internet. Worms can also spread by copying themselves from disk to
disk or by email. A self-replicating program that is self-contained and does not require a host
program. The program creates a copy of itself and causes it to execute; no user intervention is
required. Worms commonly use network services to propagate to other host systems. A worm is
a program very similar to a virus; it has the ability to self-replicate and can lead to negative
effects on your system. But they can be detected and eliminated by anti-viruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Stealth virus

A form of a virus that hide itself from detection by anti-virus software

Companion virus

This virus does not actually inject a program but gets a run when the program is supposed to run

How computers can be protected from viruses


1. Set up a software firewall. If you don't have a software firewall built in, upgrade your
Operating System and make sure everyone on your LAN is set up with the same firewall.
2. Install reliable antivirus software. Antivirus software scans files regularly for unusual
changes in file size, programs that match the software's database of known viruses,
suspicious email attachments, and other warning signs. It's the most important step you
can take towards keeping your computer clean of viruses. Norton AntiVirus is the world's
leading antivirus software. It runs continuously in the background of your computer,
providing constant protection from viruses, Trojan horses, worms, and other malicious
code. To stay up-to-date on the latest online threats, Norton AntiVirus automatically
updates its virus definitions whenever you're online.
3. Take time and make the effort to understand how viruses and worms get onto your
computer and you can virtually stop them all in their tracks.
4. Don't automatically open attachments. Be sure your email program doesn't
automatically download attachments. This will ensure that you can examine and scan
attachments before they run. Refer to your email program's safety options or preferences
menu for instructions.
5. Scan all incoming email attachments. Be sure to run each attachment you plan to open
through the anti-virus check. Do this even if you recognize and trust the sender;
malicious code, like Trojan horses, can slip into your system by appearing to be from a
friendly source.
6. Get immediate protection. Configure your antivirus software to boot automatically on
start-up and run at all times. This will provide you back-up protection in case you forget
to scan an attachment, or decide not to. And in case you forget to boot up your antivirus
software, configuring it to start by itself will ensure you get immediate protection
anyway.
7. Update your anti-virus software frequently. An program is only as good as the
frequency with which it is updated. New viruses, worms, and Trojan horses are born
daily, and variations of them can slip by software that is not current. has a feature that
searches for new virus definitions every time you go online, so you are always up to date.
8. Don't download programs from the Web. Unreliable sources such as Internet
newsgroups or Web sites that you haven't heard of may be willing providers of viruses
for your computer. Avoid downloading files you can't be sure are safe. This includes
freeware, screensavers, games, and any other executable program—any files with an
".exe" or "".com" extension, such as "coolgame.exe." Check to see if the site has anti-
virus software running on their side. If you do have to download from the Internet, be
sure to scan each program before running it. Save all downloads to one folder, then run
virus checks on everything in the folder before using it.
9. Don't boot from an unknown data CD. Data CDs are one of the most common
ways viruses are transmitted. If you are using a data CD while working on your
computer, remove it when you shut the machine off or the computer may automatically
try to boot from the disc, perhaps launching or installing bad programs or files on your
computer.
10. Don't share data CDs. Even a well-meaning friend may unknowingly pass along a
virus, Trojan horse, or worm. Label your discs clearly so you know they're yours and
don't loan them out. If a friend passes you a foreign disc, suggest an alternative method of
file sharing.
11. Scan files for viruses before using them. This is always important, but especially
if you are using a disc or flash memory to carry information between one computer and
another. You could easily pick up a virus from a corrupted file and introduce it into your
system. Running a virus scan before launching any of new files will prevent infection.
12. Use common sense. It's always better to err on the side of safety. If you're unsure
about an attachment, delete it. Especially if it's from a source you don't recognize. If there
are tempting animations on a site that look highly unprofessional, don't download them.
13. Don't download anything from anyone you don't know or aren't expecting...
EVER. For all you VAs, and publishers and whoever else out there is trading files back
and forth with your clients... Stop and make sure that your client has a safe system
before you start trading files with them. It's worth the time.

Conclusion

Information security is the ongoing process of exercising due care and due diligence to
protect information, and information systems, from unauthorized access, use,
disclosure, destruction, modification, or disruption or distribution. The never ending
process of information security involves ongoing training, assessment, protection,
monitoring & detection, incident response & repair, documentation, and review. This
makes information security an indispensable part of all the business operations across
different domains.

c) Computer crimes
d)
Hacking

Hacking is when an individual gets unauthorized access into a computer


where they may; -look at the data, copy the data, modify or erase the data.

Phishing

A Phishing attack is when you are sent an email that asks you to click on a
link and re-enter your bank or credit card details. These emails can pretend
to be from banks, Internet service providers, on-line stores and so on, and
both the email and the web site it links to appear genuine. When you enter
your bank or credit card details they are then used fraudulently.

Zombies

A Zombie is a dormant program that lies inactive on a computer. It can be activated


remotely to aid a collective attack on another computer. Zombies don’t normally
damage the computer on which they reside but can damage other computers.

Zombies often arrive as email attachments and when the attachment is opened they
install themselves secretly and then wait to be activated.

Internet Based Attacks

While your computer is connected to the Internet it can be subject to attack through
your network communications. Some of the most common attacks include:

Bonk – An attack on the Microsoft TCP/IP stack that can crash the attacked computer.
RDS_Shell – A method of exploiting the Remote Data Services component of the
Microsoft Data Access Components that lets a remote attacker run commands with
system privileges.
WinNuke – An exploit that can use NetBIOS to crash older Windows computers.

Viral Web Sites


Users can be enticed, often by email messages, to visit web sites that contain viruses or
Trojans. These sites are known as viral web sites and are often made to look like well
known web sites and can have similar web addresses to the sites they are imitating.
Users who visit these sites often inadvertently download and run a virus or Trojan and
can then become infected or the subject of hacker attacks.

Spyware, Adware and Advertising Trojans

Spyware, Adware and Advertising Trojans are often installed with other programs,
usually without your knowledge. They record your behaviour on the Internet,
display targeted ads to you and can even download other malicious software on to
your computer. They are often included within programs that you can download free
from the Internet or that are on CDs given away free by magazines.

Spyware doesn’t usually carry viruses but it can use your system resources and slow
down your Internet connection with the display of ads. If the Spyware contains bugs
(faults) it can make your computer unstable but the main concern is your privacy.
These programs record every step that you take on the Internet and forward it to an
Ad Management Centre which reviews your searches and downloads to determine
your shopping preferences. The Ad Management Centre will build up a detailed
profile of you, without your knowledge, and can pass this on to third parties, again
without your knowledge. Some Spyware can download more serious threats on to
your computer, such as Trojan Horses.

Virus Hoaxes

Virus hoaxes are messages, usually sent by email, that amount to little more than
chain letters. They pretend to alert you to the latest "undetectable" virus and simply
waste your time and Internet bandwidth. The best course of action is to delete these
hoaxes - they can cause genuine fear and alarm in the disabled, elderly and other
vulnerable groups.

Unsecured Wireless Access Points

If a wireless access point, e.g. an ADSL (Broadband) Router, hasn't been secured
then anyone with a wireless device (laptop, PDA, etc) will be able to connect to it
and thereby access the Internet and all the other computers on the wireless network.

Bluesnarfing

The act of stealing personal data, specifically calendar and contact information, from
a Bluetooth enabled device.

Social Engineering
Tricking computer users into revealing computer security or private information, e.g.
passwords, email addresses, etc, by exploiting the natural tendency of a person to trust
and/or by exploiting a person's emotional response.
Example 1: Spammers send out an email about victims of child abuse and provide a link
to click in the email for further information or to help the victims. When the link is
clicked the spammers know the email address is "live" and add it to their live list which
they then use to target their spam.

Example 2: A company computer user is tricked into revealing the network password
by someone on the telephone who is impersonating the voice of an employee in
authority and who has a story of distress.

Worms

Worms are programs that replicate and spread, often opening a back door to allow
hackers to gain access to the computers that they infect.
Worms can spread over the Internet by exploiting security flaws in the software of
computers that are connected to the Internet. Worms can also spread by copying
themselves from disk to disk or by email.

e) Detection and protection against computer crimes

Trespass

This is when someone is able to connect to your computer and control it in some form.
This can range from being able to view or access your files, to actually running programs
on your computer

Some programs have special features that allow for remote access. Others contain bugs
that allow a backdoor or hidden access, that provides some level of control of the
program, and trespassers will make use of this to gain access to your computer.

Tracking

Tracking is when someone is able to monitor what you are doing on your computer
system. This applies mainly to tracking Internet usage, where someone may monitor what
sites you visited and what links you clicked on so that they can determine your interests,
and use that information for future marketing.

Tapping

Tapping is when someone gains access to information that is being transmitted via
communication links. Any information that is transmitted across a network is at risk of
being intercepted, if appropriate security measures are not in place

Cracking

Cracking is similar to hacking, but with one major distinction. In hacking, someone feels
the need to understand how the computer or network system of an organization works,
but without the intent of causing damage. In cracking, someone uses his or her
knowledge of information systems to literally to illegally or unethically penetrate
computers system for personal gain.

Privacy and Fraud

Trespassing, tapping and cracking all violate privacy of information and leave systems
open to fraud. Any compromised system can potentially leak personal information –such
as medical information, credit card details, etc.
Sabotage

Sabotage occurs when a malicious user renders a system unusable by other users.
Sabotage takes different forms;

i) ‘Denial of service’ is common on the internet. A hacker using his/her


computer, but mimicking different computers, sends many requests to
connect to the web server. The server attempts, unsuccessfully, to establish
communication with each one of this ‘computers’. These attempts create
much activity (traffic) that slows down the server to crawl and may
eventually cause it to crash. Genuine users will then have been denied
service.

ii) Release of viruses is also another form of sabotage

Spam

By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail,
called spam to thousands of users. This is done quite often by redirecting the email
through the mail server of an unsuspecting host, making the actual sender of the spam
difficult to track.

Alterations

When a system is compromised, the data stored in it can be altered. Typical examples of
data alteration are when students break into a system to alter exam results, or someone
breaks into a banking system to change account details or divert money.

Confidentiality

is the term used to prevent the disclosure of information to unauthorized individuals or


systems. For example, a on the Internet requires the to be transmitted from the buyer to the
merchant and from the merchant to a network. The system attempts to enforce
confidentiality by encrypting the card number during transmission, by limiting the places
where it might appear (in databases, log files, backups, printed receipts, and so on), and by
restricting access to the places where it is stored. If an unauthorized party obtains the card
number in any way, a breach of confidentiality has occurred.

Confidentiality is necessary (but not sufficient) for maintaining the of the people whose
personal information a system holds.

Integrity

In information security, integrity means that data cannot be modified undetectably. Integrity
is violated when a message is actively modified in transit. Information security systems
typically provide message integrity in addition to data confidentiality.
Availability

For any information system to serve its purpose, the information must be when it is needed.
This means that the computing systems used to store and process the information, the
security controls used to protect it, and the communication channels used to access it must be
functioning correctly

Authenticity

In computing, and information security it is necessary to ensure that the data, transactions,
communications or documents (electronic or physical) are genuine. It is also important for
authenticity to validate that both parties involved are who they claim they are.

DATA SECURITY/PROTECTION TECHNIQUES

1) Audit trail/checks
Audit trail help to detect trespassing and alteration. It is used to keep a record of who has
accessed a computer system and what operations he/she has performed during a given period
of time. In case a system is broken into by a hacker, an audit trail enables their activities to be
tracked. Any unauthorized alterations can be rolled back to take the system back to the state it
was in before the alterations were done.

2) Secured waste

Paper shredders are used to destroy printed information so that it is not accessed by persons
who are not supposed to.

3) Internal controls

The system has transaction log which is a record/file for all those who accessed or attempted
to access.

4) Applicant screening

This is meant to weed out dishonest job applicants

5) Password

This is use of secret word or number or combination of both on a keyboard to access


computer or its database

6) Built-in software

This is where the system matches use of numbers against numbers already assigned to the
data being accessed
7) Data/information encryption

Information security uses to transform usable information into a form that renders it
unusable by anyone other than an authorized user; this process is called . Information
that has been encrypted (rendered unusable) can be transformed back into its original
usable form by an authorized user, who possesses the , through the process of
decryption. Cryptography is used in information security to protect information from
unauthorized or accidental disclosure while the is in transit (either electronically or
physically) and while information is in storage.

Cryptography provides information security with other useful applications as well


including improved authentication methods, message digests, digital signatures, , and
encrypted network communications.

Cryptography can introduce security problems when it is not implemented correctly.


Cryptographic solutions need to be implemented using industry accepted solutions that
have undergone rigorous peer review by independent experts in cryptography. The of
the encryption key is also an important consideration. A key that is or too short will
produce weak encryption. The keys used for encryption and decryption must be
protected with the same degree of rigor as any other confidential information. They must
be protected from unauthorized disclosure and destruction and they must be available
when needed. solutions address many of the problems that surround .

8) Hacking

To prevent or stop such;

-log off correctly from the computer when leaving the machine

-Chose passwords that are not obvious, with at least 6 characters and a mixture of
numbers and both upper and lower case letters

-Keeping passwords confidential and not writing them down anywhere

- Changing passwords regularly

- Encrypting data that is transmitted using the telecommunications network


or wireless communication

9) Firewalls

A physical firewall keeps a fire from spreading from one area to the next.
Similarly, a firewall is a program or hardware that filters information coming
through the internet and connections into your personal computer or network.
Firewalls can prevent unauthorized remote logins, limit or stop Spam, and
filter the content that is downloaded from the internet. Some firewalls offer
virus protection but it is worth the investment to install Anti-virus software on
each computer.

When Management chooses to mitigate a risk, they will do so by implementing one or more
of three different types of controls.

10) Administrative

Administrative controls (also called procedural controls) consist of approved written policies,
procedures, standards and guidelines. Administrative controls form the framework for running
the business and managing people. They inform people on how the business is to be run and
how day to day operations are to be conducted. Laws and regulations created by government
bodies are also a type of administrative control because they inform the business. Some
industry sectors have policies, procedures, standards and guidelines that must be followed -
the Payment Card Industry (PCI) Data Security Standard required by and is such an example.
Other examples of administrative controls include the corporate security policy, , hiring
policies, and disciplinary policies.

Administrative controls form the basis for the selection and implementation of logical and
physical controls. Logical and physical controls are manifestations of administrative controls.
Administrative controls are of paramount importance.

Logical

Logical controls (also called technical controls) use software and data to monitor and control
access to information and computing systems. For example: passwords, network and host
based firewalls, network systems, , and data encryption are logical controls.

An important logical control that is frequently overlooked is the principle of least privilege.
The requires that an individual, program or system process is not granted any more access
privileges than are necessary to perform the task. A blatant example of the failure to adhere to
the principle of least privilege is logging into Windows as user Administrator to read Email
and surf the Web. Violations of this principle can also occur when an individual collects
additional access privileges over time. This happens when employees' job duties change, or
they are promoted to a new position, or they transfer to another department. The access
privileges required by their new duties are frequently added onto their already existing access
privileges which may no longer be necessary or appropriate.

Physical
i) Physical controls monitor and control the environment of the work place and
computing facilities. They also monitor and control access to and from such facilities.
For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire
suppression systems, cameras, barricades, fencing, security guards, cable locks, etc.
Separating the network and work place into functional areas are also physical controls.
To prevent loss of hardware (theft), computers should be kept in strong rooms and data
back-up should be done regularly. An important physical control that is frequently
overlooked is the separation of duties. Separation of duties ensures that an individual
can not complete a critical task by himself. For example: an employee who submits a
request for reimbursement should not also be able to authorize payment or print the
check. An applications programmer should not also be the or the - these roles and
responsibilities must be separated from one another.

ii) Restricting access to areas with computers, so that only authorized personnel are
allowed to use the system

iii) Keeping computer rooms locked after working hours

iv) Installing alarm systems and other security devices

Security classification of information

An important aspect of information security and risk management is recognizing the


value of information and defining appropriate procedures and protection requirements
for the information. Not all information is equal and so not all information requires the
same degree of protection. This requires information to be assigned a .

The first step in information classification is to identify a member of senior management


as the owner of the particular information to be classified. Next, develop a classification
policy. The policy should describe the different classification labels, define the criteria
for information to be assigned a particular label, and list the required security controls
for each classification.

The type of information security classification labels selected and used will depend on
the nature of the organization, with examples being:

 In the business sector, labels such as: Public, Sensitive, Private, Confidential.
 In the government sector, labels such as: Unclassified, Sensitive But Unclassified,
Restricted, Confidential, Secret, Top Secret and their non-English equivalents.
 In cross-sectoral formations, the , this consists of: White, Green, Amber and Red.

All employees in the organization, as well as business partners, must be trained on the
classification schema and understand the required security controls and handling procedures
for each classification. The classification a particular information asset has been assigned
should be reviewed periodically to ensure the classification is still appropriate for the
information and to ensure the security controls required by the classification are in place.
11) Access control

Access to protected information must be restricted to people who are authorized to


access the information. The computer programs, and in many cases the computers that
process the information, must also be authorized. This requires that mechanisms be in
place to control the access to protected information. The sophistication of the access
control mechanisms should be in parity with the value of the information being
protected - the more sensitive or valuable the information the stronger the control
mechanisms need to be. The foundation on which access control mechanisms are built
start with identification and authentication.

ix) Identification is an assertion of who someone is or what something is. If a person


makes the statement "Hello, my name is John Doe" they are making a claim of who
they are. However, their claim may or may not be true. Before John Doe can be
granted access to protected information it will be necessary to verify that the person
claiming to be John Doe really is John Doe.

ii) Authentication is the act of verifying a claim of identity. When John Doe goes into a
bank to make a withdrawal, he tells the bank teller he is John Doe (a claim of
identity). The bank teller asks to see a photo ID, so he hands the teller his driver's
license. The bank teller checks the license to make sure it has John Doe printed on it
and compares the photograph on the license against the person claiming to be John
Doe. If the photo and name match the person, then the teller has authenticated that
John Doe is who he claimed to be.

There are three different types of information that can be used for authentication:

i something you know,

Examples of something you know include such things as a PIN, a password, or


your mother's maiden name.

ii something you have,

Examples of something you have include a driver's license or a magnetic

iii Something you are.

Something you are refers to biometrics. Examples of biometrics include palm


prints, finger prints, voice recognition and retina (eye) scans.

Strong authentication requires providing information from two of the three


different types of authentication information. For example, something you know plus
something you have. This is called two factor authentication.
On computer systems in use today, the Username is the most common form of
identification and the Password is the most common form of authentication. Usernames
and passwords have served their purpose but in our modern world they are no longer
adequate. Usernames and passwords are slowly being replaced with more sophisticated
authentication mechanisms.

After a person, program or computer has successfully been identified and authenticated
then it must be determined what informational resources they are permitted to access and
what actions they will be allowed to perform (run, view, create, delete, or change). This
is called authorization.

Authorization to access information and other computing services begins with


administrative policies and procedures. The policies prescribe what information and
computing services can be accessed, by whom, and under what conditions. The access
control mechanisms are then configured to enforce these policies.

Different computing systems are equipped with different kinds of access control
mechanisms - some may even offer a choice of different access control mechanisms.
The access control mechanism a system offers will be based upon one of three
approaches to access control or it may be derived from a combination of the three
approaches.

The non-discretionary approach consolidates all access control under a centralized


administration. The access to information and other resources is usually based on the
individuals function (role) in the organization or the tasks the individual must perform.
The discretionary approach gives the creator or owner of the information resource the
ability to control access to those resources. In the Mandatory access control approach,
access is granted or denied basing upon the security classification assigned to the
information resource.

Defense in depth

Information security must protect information throughout the life span of the
information, from the initial creation of the information on through to the final disposal
of the information. The information must be protected while in motion and while at rest.
During its life time, information may pass through many different information
processing systems and through many different parts of information processing systems.
There are many different ways the information and information systems can be
threatened. To fully protect the information during its lifetime, each component of the
information processing system must have its own protection mechanisms. The building
up, layering on and overlapping of security measures is called defense in depth. The
strength of any system is no greater than its weakest link. Using a defense in depth
strategy, should one defensive measure fail there are other defensive measures in place
that continue to provide protection.
Process

The terms reasonable and prudent person, due care and due diligence have been used
in the fields of Finance, Securities, and Law for many years.

In the field of Information Security, Harris offers the following definitions of due care
and due diligence:

"Due care are steps that are taken to show that a company has taken responsibility for
the activities that take place within the corporation and has taken the necessary steps to
help protect the company, its resources, and employees." And, [Due diligence are the]
"continual activities that make sure the protection mechanisms are continually
maintained and operational."

Attention should be made to two important points in these definitions. First, in due care,
steps are taken to show - this means that the steps can be verified, measured, or even
produce tangible artifacts. Second, in due diligence, there are continual activities - this
means that people are actually doing things to monitor and maintain the protection
mechanisms, and these activities are ongoing.

Disaster recovery planning

While a business continuity plan (BCP) takes a broad approach to dealing with
organizational-wide effects of a disaster, a disaster recovery plan (DRP), which is a
subset of the business continuity plan, is instead focused on taking the necessary steps to
resume normal business operations as quickly as possible. A disaster recovery plan is
executed immediately after the disaster occurs and details what steps are to be taken in
order to recover critical information technology infrastructure. There are a number of
approaches;

a) Manual Services

Temporarily used while computer services are not available

b) Service bureau

Buy time at a service bureau

c) Aid package

Mutual aid pact done in advance

d) Computer facility

Consortium of assistance assuming data back-up has been kept somewhere in


advance
f) Laws governing protection of ICT

Laws and regulations

Computer crime is a growing industry. Some of the issues addressed by ICT legislation are;

i) To protect the confidentiality of information kept about an individual

ii) To provide legal backing so that it is possible to seek redress if rights are violated

iii) To minimize the effects of exposure to uncensored materials

iv) To observe copyright for those who create original work

In Kenya, the Copyright Act was amended in 1996 to include protection for computer programs
and software copyright. In addition to copyright protection, there are other laws in force in other
countries. Some examples are listed below with a description of what the legislations entails.

Legislations Description

Privacy Laws Non-disclosure of private data to persons than those to whom it


was given

Data Protection A safeguard to protect personal data. It basically ensures that


holders of personal data do not misuse data

Computer Misuse To prevent misuse of both hardware and software, including


computer viruses, hacking, etc

Health and Safety An explanation of what employers must do and what the
equipment must be like to safeguard the health and safety of
employees

Prohibited Publication To prevent undesirable publication being published and


distributed electronically, for example pornography and hate mail
Sources of standards

(ISO) is a consortium of national standards institutes from 157 countries, coordinated


through a secretariat in Geneva, Switzerland. ISO is the world's largest developer of
standards. ISO 15443: "Information technology - Security techniques - A framework for
IT security assurance", : "Information technology - Security techniques - Code of practice
for information security management", : "Information technology - Service management",
and : "Information technology - Security techniques - Information security management
systems - Requirements" are of particular interest to information security professionals.

The USA () is a non-regulatory federal agency within the . The NIST Computer Security
Division develops standards, metrics, tests and validation programs as well as publishes
standards and guidelines to increase secure IT planning, implementation, management and
operation. NIST is also the custodian of the USA publications (FIPS).

is a professional membership society with more than 100 organization and over 20,000
individual members in over 180 countries. It provides leadership in addressing issues that
confront the future of the Internet, and is the organization home for the groups responsible
for Internet infrastructure standards, including the (IETF) and the (IAB). The ISOC hosts
the Requests for Comments (RFCs) which includes the Official Internet Protocol
Standards and the RFC-2196 .

Professionalism

Information security professionalism is the set of knowledge that people working in


Information security and similar fields ( and ) should have and eventually demonstrate
through from well respected organizations. It also encompasses the education process
required to accomplish different tasks in these fields.

adoption is always increasing and spread to vital infrastructure for civil and military
organizations. Everybody can get involved in the . It is crucial that a nation can have
skilled professional to defend its vital interests.

Conclusion

Information security is the ongoing process of exercising due care and due diligence to
protect information, and information systems, from unauthorized access, use, disclosure,
destruction, modification, or disruption or distribution. The never ending process of
information security involves ongoing training, assessment, protection, monitoring &
detection, incident response & repair, documentation, and review. This makes information
security an indispensable part of all the business operations across different domains.

EMERGING TRENDS AND ISSUES IN ICT

a) Emerging trends and issues in ICT


b) Challenges posed by the emerging issues in ICT
c)Coping with challenges posed by the emerging issues in ICT

MULTIMEDIA

Definition

Multimedia, defined, is the combination of various digital media types such as text,
images, sound and video, into an integrated multi-sensory interactive application or
presentation to convey a message or information to an audience. In other words,
multimedia means “an individual or a small group using a computer to interact with
information that is represented in several media, by repeatedly selecting what to see and
hear next” (Agnew et. al, 1996).

Multimedia can best be defined as various combinations of text, graphics, sound, video,
and animation that are controlled, coordinated, and delivered on the computer screen.
Multimedia also implies interactivity, where the user is actively engaged in the
presentation of information, and is not just a passive observer of a fixed procession of
sights and sounds.

Components of a Multimedia System

i) Capture devices
- Video Camera, Video Recorder, Audio Microphone, Keyboards, mice, graphics
tablets, 3D input devices, tactile sensors, VR devices. Digitizing/Sampling
Hardware
ii) Storage Devices
- Hard disks, CD-ROMs, Jazz/Zip drives, DVD, etc
iii) Communication Networks
- Ethernet, Token Ring, FDDI, ATM, Intranets, Internets.
iv) Computer Systems
- Multimedia Desktop machines, Workstations, MPEG/VIDEO/DSP Hardware
v) Display Devices
- CD-quality speakers, HDTV,SVGA, Hi-Res monitors, Colour printers etc.

Characteristics of a Multimedia System

A Multimedia system has four basic characteristics:

 Multimedia systems must be computer controlled.


 Multimedia systems are integrated.
 The information they handle must be represented digitally.
 The interface to the final presentation of media is usually interactive.

The difference between hyperlink and hypermedia

 Hypertext - Hypertext is basically the same as regular text - it can be stored, read,
searched, or edited - with an important exception: hypertext is text with pointers to other
text. The browsers let you deal with the pointers in a transparent way -- select the pointer,
and you are presented with the text that is pointed to.
 Hypermedia - Hypermedia is a superset of hypertext. Hypermedia documents contain
links not only to other pieces of text, but also to other forms of media - sounds, images,
and movies. Images themselves can be selected to link to sounds or documents. This
means that browsers might not display a text file, but might display images or sound or
animations. Hypermedia simply combines hypertext and multimedia.

Hypertext is an innovation to the paradigms of computing user interfaces that attempts to


overcome the limitations of written text. Hypertext, instead of remaining static like
traditional text, will dynamically "branch or perform on request" (Nelson 1970). Thus
hypertext makes possible the organization of material in ways that partially overcome the
linearity inherent in written text. The prefix hyper- (Modern Greek term for over or
beyond) signifies the overcoming of such constraints. The most frequently discussed form
of hypertext document contains automated cross-references to other documents called
hyperlinks. Selecting a hyperlink causes the computer to load and display the linked
document.

Documents referenced by hypertext can themselves be static (prepared and stored in


advance) or dynamically generated (in response to user input). Therefore a well-
constructed system using hypertext can encompass, incorporate or supersede other
conventions of user-interface paradigms, such as menus and command lines, and can be
used to access both static collections of cross-referenced documents and interactive
applications. The documents and applications can be local or can come from anywhere
with the assistance of a computer network like the Internet. The most famous
implementation of hypertext is the World Wide Web.
The term "hypertext" is often used where the term hypermedia might seem appropriate; the
two have always been synonymous but "hypertext" is grammatically simpler.

The World Wide Web is a classic example of hypermedia, whereas a non-interactive


cinema presentation is an example of standard multimedia due to the absence of hyperlinks.

The first hypermedia system was the Aspen Movie Map, while the first truly universal
hypermedia was Hypercard. Most modern hypermedia is delivered via electronic pages
from a variety of systems. Audio hypermedia is emerging with voice command devices and
voice browsing.

Desirable Features for a Multimedia System

i) Very High Processing Power


needed to deal with large data processing and real time delivery of media. Special
hardware commonplace.
ii) Multimedia Capable File System
needed to deliver real-time media e.g. Video/Audio Streaming. Special Hardware/
Software needed e.g. RAID technology.
iii) Data Representations/File Formats that support multimedia
Data representations/file formats should be easy to handle yet allow for
compression/decompression in real-time.
iv) Efficient and High I/O
input and output to the file subsystem needs to be efficient and fast. Needs to
allow for real-time recording as well as playback of data. e.g. Direct to Disk
recording systems.
v) Special Operating System
to allow access to file system and process data efficiently and quickly. Needs to
support direct transfers to disk, real-time scheduling, fast interrupt processing, I/O
streaming etc.
vi) Storage and Memory
large storage units (of the order of 50 -100 Gb or more) and large memory (50 -
100 Mb or more). Large Caches also required and frequently of Level 2 and 3
hierarchy for efficient management.
vii) Network Support
Client-server systems common as distributed systems common.
viii) Software Tools
user friendly tools needed to handle media, design and develop applications,
deliver media.

Multimedia in the Classroom


Now that multimedia technology is steadily filtering into most institutions of higher
education, we should focus on how best to apply this powerful new educational tool in our
laboratories and lecture halls.

The three principal ways in which multimedia technology is used in higher education
include:

i) at the front of the classroom as a more flexible and versatile update of traditional
audiovisual media,
ii) in student groups for collaborative learning, and
iii) in individual student use for independent learning.

Components of Multimedia
i) Educational multimedia projects may incorporate interactive audio and video from a
videodisc player, digital audio or digital video clips stored on a hard disk, or audio
playback from a CD player controlled by a Macintosh computer.
ii) Some presentations combine visual media on a single computer screen, but many
interactive videodisc projects use two screens; one for the computer, and a separate
video screen for a videodisc player. All Macintosh computers come with a built-in
speaker; in multimedia presentations, this is often supplemented by larger speakers for
better sound quality.
Uses of Multimedia /Applications
Exciting and entertaining products are developed using multimedia. They include
standalone applications or fun supplements such as enhanced music CDs with
information about the artist, instruments, trivia and music videos or clips of the
recordings.

Other applications include on-line games and other supplemental content to make the on-
line experience more enjoyable and easier Presentations for tradeshows, conferences,
annual meetings and other uses are best done with multimedia. The rich and involving
multimedia experience ensures information stands out and is communicated effectively.
Multimedia presentations can also be used for promotional applications such as product
or company information delivered via interactive CDROM or website.

The web is ideal to facilitate online presentations, meetings and information exchange.
Multimedia enhances these applications with rich content and individual media tools,
making communication more effective. On-line multimedia products are integrated with
existing systems to make use of database applications, providing custom, on
demand/dynamic content.

Multimedia products are effective for many reasons. Applications developed using
multimedia are adaptable for presentation across many different mediums. The
information presented is updated or customized to reach specific individuals.

The technology behind multimedia development is advanced and superior to traditional


mediums such as video and PowerPoint slideshows. This allows the application to
include exclusive features and communicate the content more effectively. Stimulating
graphics and animation make multimedia products usually stunning and attention
grabbing. Your message will not be lost; it will be exciting, convincing and powerful.
Sound and music also complement the presentation, drawing the audience into a
stimulating experience.

Because multimedia development is flexible, content is optionally custom-tailored on-


the-fly or easily altered to suit specific audiences or other needs. Presenters customize
content and deliver different versions depending on their needs. Multimedia is also time-
sensitive; making last-minute changes in content simple and quicker than other mediums.
Now you can include information you may not have obtained until the day before the
presentations.

d) Formatting slides
e) Running slides
f) Editing objects
g) Printing slides and handouts

You might also like