Download as pdf or txt
Download as pdf or txt
You are on page 1of 78

II

In honour of
THE KING OF KINGS & THE LION OF JUDAH

III
KingLion ICT Simplified Notes for JHS 1, 2 & 3
(2nd Edition)
ISBN: 978 – 9988 – 2 – 3976 – 3

Copyright © 2019 – EMMANUEL DZOTEPEH

Edited by:
Mr. Raphael Affun, BSc. D. B. E.
Mr. Raphael Ahenkorah, D. B. E. (First Class Hons)

Cover Design, Typesetting and Illustrations By:


Emmanuel Dzotepeh
(+233244992386; emmadzot@yahoo.com)

All Rights Reserved

Content and/or cover may not be reproduced in whole or in


part in any form whatsoever without the express written
permission of the copyright owner.

KingLion Books
Be More… Do More…

Contact:
Call/WhatsApp: (+233) 024 811 3311

Email: kinglionbooks@gmail.com

FB/IG/Twitter/YouTube: KingLion Books

IV
V
VI
ACKNOWLEDGEMENTS

Ultimate thanks and gratitude be unto my God Almighty,


for his ability and excellence that is at work in me.

I also acknowledge the Ghana Education Service for the


curriculum and all their educational resources, upon
which this book is based.

My Pastor and mentor, Pastor Chris Oyakhilome PhD,


DSc, DD, has also been a great coach in my journey
through life.

Special gratitude goes out to all teachers, students and


parents who have patronized this book series over the
years. Further appreciation to the hardworking
distributors and partners of KingLion Books: Messrs.
Raph, Gideon, Francis, Osman, Yusuf, Bright, Robert,
Evans, Mustapha et al.

Mr. Quansah, Bernard and John of Qaiser Press also


deserve special mention for their strong commitment
and excellent work.

To everybody who contributed in diverse ways to make


this book a success, I remain eternally grateful to you all.

May God continue to shower you with goodness and


mercies.

VII
DEDICATION

To My Dear Mum,
GRACE DZOTEPEH

VIII
INTRODUCTION
This is a well-researched and carefully written book that serves as a
supplementary textbook for Junior High Schools (JHS) in Ghana.
The simplicity of language and clarity of expression used in the
book make it easy to understand the basic concepts of Information
& Communications Technology (ICT).

It contains concise notes covering every topic of the current ICT


Syllabus for JHS of the Ghana Education Service. There are exciting
practical exercises at the end of most topics to enable students
practice whatever they study with little/no assistance.

This second edition features sample topic-based B. E. C. E. questions


to make revision for examinations more effective.

Teachers find great relief in using the book for their lesson
preparation and delivery. Also, students who have used this book
since its first edition testify that it is a sure guide for passing the
Basic education certificate examination (B. E. c. E) in flying colours.

Special Message to the Student


Many thanks for choosing KingLion ICT Simplified Notes!

I want to especially congratulate you for making the decision to be a


student of ICT.

In today’s world, most of the Billionaires and richest men such as


Bill Gates (founder of Microsoft Corporation) and Mark Zuckerberg
(founder of Facebook) among others, made their fortunes from ICT.
So, you see, ICT is one of the subjects that can make you very
successful in life if you pursue it diligently.

Interestingly, it is the most practical and easiest to pass among all


the subjects. Never allow anybody to deceive you into thinking ICT
is difficult. Instead, always tell yourself that “ICT IS MY BEST
SUBJECT”, and it shall be so for you. I wish you the best!
The Author

IX
INFORMATION PROCESSING
JHS 1 - TERM ONE

What is a computer?
A computer is an electronic device that accepts data as input,
processes the data, stores and gives out information as output.

From the definition above we can identify four (4) main or basic tasks
(underlined in the definition) performed by the computer which
together make up information processing.

What is Information Processing?


Information Processing is the process by which the computer
accepts data and manipulates the data to give out information.

What is Information Processing Cycle?


Information Processing Cycle is the sequence of events that the
computer goes through in converting raw data into meaningful
information.

STAGES OF THE INFORMATION PROCESSING CYCLE


There are three (3) major stages involved in the information
processing cycle. These are:
1. Data/Input stage: This is the stage where data is entered into
the computer through input devices.

2. Processing stage: This is where the computer manipulates


and performs operations on the data in the Central Processing
Unit. (C.P.U.) This is considered to be the most important stage
in the cycle.

3. Information stage: This stage is where the data has finally


been processed into useful information.

The information stage is also divided into two (2) separate


stages, which are
a) Storage stage: This is the stage where the processed data
is stored for future use in the main memory and other
storage devices.
b) Output stage: This is where the computer gives out
information to the user through output devices.
1
IMPORTANT POINT TO TAKE NOTE
❖ Sometimes, the storage and output stages are considered as
separate stages in place of the information stage, which make
FOUR stages.
i. e. Data stage; Processing stage; Storage stage and Output
stage.
(Note that, Storage stage + Output stage = Information stage).

❖ Furthermore, a 5th Stage known as the Distribution stage can


also be added. This is the stage where the information is
shared among computer users on storage media such as
compact disks.

The stages are usually illustrated in the diagram below as;

OR

DATA
Data is the collection of raw unorganized facts.
Examples of data are; texts, numbers, symbols, images, video, sound,
etc.

INFORMATION
Information is a processed data that is meaningful and useful to the
user.
Examples of information include; music, movies, invitation cards, word
documents, etc.

Sources of Information
1. Newspapers 2. People 3. Magazines
4. Radio 5. Television

Characteristics of a Valuable Information


1. It is accessible. 3. It is reliable.
2. It is meaningful. 4. It is useful.

2
Differences between Data and Information

Data Information
1. It has no meaning 1. It is meaningful
2. It involves input devices 2. It involves output devices
3. It is not organized 3. It is well organized

DEVICES USED AT EACH STAGE OF


THE INFORMATION PROCESSING CYCLE.

STAGE DEVICES USED


Data/ Input 1. Mouse 7. Web cam
Stage 2. Keyboard 8. Scanner
3. Microphone 9. Barcode Reader
4. Joystick 10. Trackball
5. Game pad 11. Light Pen
6. Digital camera 12. Touchpad

Processing Central Processing Unit (C. P. U.)


Stage

Storage 1. Hard Disk Drive (HDD)


Stage 2. Compact Disk (CD)
3. Digital Versatile Disk/ Digital Video Display (DVD)
4. Floppy Disk (Diskette)
5. Pen Drive (USB stick/ Flash memory/ Flash drive)
6. Zip drive
7. Blu Ray disc

Output 1. Speaker 5. Plotter


Stage 2. Projector 6. Headphones
3. Monitor 7. Public Address System
4. Printer

3
Below is a diagram showing various devices used at each of the
stages of the Information Processing Cycle.

(COMPUTER PERIPHERALS)

4
PARTS OF A PERSONAL COMPUTER
JHS 1 - TERM ONE

What is a Personal Computer (PC)?


It is any multipurpose computer that has features suitable for use
by one person at a time.
Examples are: laptops, notebooks and desktop computers.

MAIN COMPONENTS OF A PERSONAL COMPUTER


There are two (2) main components of a personal computer namely:
1. Hardware and 2. Software.

HARDWARE: This is the physical components that make up the


computer system which can be seen and touched.

SOFTWARE: It is a series of instructions that tell the computer what


to do. It cannot be seen or touched.
Another name for software is Program.

MAIN HARDWARE COMPONENTS


There are four (4) main hardware components, which are:
1. System Unit 2. Monitor 3. Keyboard 4. Mouse

SYSTEM UNIT
Functions:
1. It contains the Central Processing Unit (C. P. U.) which performs
and controls all operations of the computer.
2. It controls all the peripheral devices that are connected to it.

Description: The System Unit is the rectangular case that contains


several important components such as the motherboard, power
supply, system fan, memory and microprocessor.
It is therefore the brain and heart of the computer and it is considered
as the most important hardware component of the personal computer.

NOTE: The System unit is not the same as the Central Processing Unit.
The C. P. U. or microprocessor is just one of the components found
inside the System Unit.

5
Components Found Inside the System Unit
There are several components in a system unit, but the major ones
include the following:
1. Motherboard – It is the main circuit board to which all the internal
components are connected and held together.

2. Processor: The Central Processing Unit (CPU), simply known as the


‘Processor’ mainly consists of:
Control Unit (C.U.) – This regulates the flow of data and
manages the components of the computer;
Arithmetic Logic Unit (A.L.U.) – It interprets and performs
basic calculations.

3. Power Supply: This component provides electrical power for all


parts of the computer.

4. Random Access Memory: This is the main memory that keeps


information while working with the computer.
It is also called the working memory.

5. Hard Disk Drive (HDD): This is the permanent and default


secondary storage of the computer on which the operating system is
stored.

MOUSE
Functions:
1. It is used for clicking, double-clicking and right-clicking.
2. It is used for dragging and dropping items.
3. It is used to give some commands to the computer.
4. It is used for playing some computer games.
5. It is used to open applications.
6. It is used for selecting and pointing to objects on the
desktop.
7. It is used to direct the cursor in some applications.
8. It is used for scrolling and zooming in some applications.

6
Description: The mouse is a handheld pointing device that looks like a
rodent mouse. It usually has a plastic case.

NOTE: Laptops and notebook computers have a touchpad


which performs the functions of a mouse

MONITOR
Function: It displays information from the computer to the user.

Description: It is the hardware device with a screen that looks like a


television. It is also known as Visual Display Unit (V. D. U.)

KEYBOARD
Function: It is used to enter data and some commands into the
computer.

Description: The keyboard is the hardware device with keys that look
like a typewriter. The keyboard can be used in place of the mouse since
it can perform most operations of the mouse.

Diagram Showing Main Hardware Components


(of the desktop computer)

TYPES OF MAIN SOFTWARE


There are two (2) main types of computer software. These are:
1. System software 2. Application software

SYSTEM SOFTWARE
This is the software that manages the computer resources and
provides a platform for other programs to run.

7
There are several examples of system software which consist of:
1. Basic Input/Output System (BIOS) 4. Utility Programs
2. Language Translator 5. Boot Programs
3. Operating System (OS) 6. Device Drivers

What is an Operating System (OS)?


It is the software that controls the basic operations of the
hardware, applications and other peripherals connected to the
computer.

When the computer is turned on, the operating system must first be
loaded by a boot program. Therefore, the computer cannot work
without an operating system installed on it.
Different kinds of operating systems can be installed onto the same
computer, but only one is required to function at a time.

Examples of Operating System Software


1. Microsoft Disk Operating System (MS DOS)
2. Macintosh Operating System (Mac OS)
3. Microsoft Windows
(This has various versions such as: Windows 2000, Windows XP,
Windows Vista, Windows 7, Windows 8, Windows 10, etc.)
4. Linux (e.g. Red Hat and Ubuntu)
5. UNIX

NB: The most common operating system used in the world for
personal computers is Microsoft Windows.

Android and iOS are also examples of operating system software,


but they are used in smartphones.

Functions of the Operating System


1. It controls all the hardware devices of the computer.
2. It organizes files stored on storage devices.
3. It manages errors and loss of data.
4. It also controls applications installed on the computer.

APPLICATION SOFTWARE
This is the type of software that is used to perform a specific task on
the computer.

8
There are different types or categories of application software based
on the specific task they are used to perform.

Types of Application Software, Their Uses & Common Examples

TYPE OF USE COMMON


APPLICATION EXAMPLE(S)
Word For creating, editing and 1. Microsoft Word
Processing formatting text – based 2. Notepad
documents such as letters. 3. WordPad

Spreadsheet For creating number – based 1. Microsoft Excel


documents and charts. 2. Lotus 1-2-3

Education Contains resources which can 1. Microsoft


be used for teaching and Encarta
learning. 2. Britannica

Games For playing computer games. Mario, Pinball,


Solitaire, Chess,
Scrabble, FIFA 18

Media Player For playing music and videos. 1. VLC


2. AIMP
3. Windows Media
player

Graphic For drawing and designing 1. Microsoft Paint,


Designing posters, calendars, invitation 2. Corel Draw
cards, etc. 3. Photoshop

Database For storing, sorting and Microsoft Access


retrieving large amount of
data.
Anti-virus For preventing and removing Avast, Avira,
computer viruses from the Smadav, A.V.G.,
computer. Dr. Solomon’s
Norton’s

Typing Tutor For typing lessons and Mavis Beacon


practice. Teaches Typing

9
NOTE:
Microsoft Office suite is a special software package that
contains several applications which include:
MS Word MS Excel MS PowerPoint
MS Access MS Outlook MS One Note
MS Publisher

▪ MS stands for Microsoft.

PERIPHERAL DEVICES
In learning about the parts of a personal computer, it is important to
understand the meaning of certain terminologies. One of such is the
term, ‘computer peripherals’ or ‘peripheral devices’.

What is a Peripheral Device?


A peripheral device is any hardware that is connected to the main
computer system for an additional function.

Note that the main computer system refers to the major components
inside the system unit which we have already identified. This means
that all the other hardware components are peripheral devices.
A peripheral device can either be internal (i.e. found inside the system
unit) or external (i.e. connected outside the system unit).

Types of Computer Peripherals


➢ Input devices, e. g. mouse, keyboard, scanner, joystick, game
pad, microphone, etc.
➢ Output devices, e. g. Monitor, printer, projector, speaker,
headphone, plotter, etc.
➢ Storage devices, e. g. pen drive, hard disk, floppy disk, etc.

REFERENCE:
Refer to page 4 for the diagram showing the various computer
peripherals under the topic ‘INFORMATION PROCESSING’

10
KEYBOARDING AND MOUSE SKILLS
JHS 1 – TERM ONE

In the previous topic, we learnt that the mouse and the keyboard are
part of the main hardware components. These two (2) devices (mouse
and keyboard) are the minimum input devices required by the
computer to operate fully.

It is therefore necessary to acquire the necessary skills in using them,


and that is what this topic is all about.

❖ KEYBOARDING SKILLS

IMPROVING SPEED IN TYPING USING TYPING SOFTWARE


The keyboard is the most frequently used input device and it is
basically used for typing. Hence improving upon typing skills is very
important.
To improve upon your typing skill, you need an application known as a
Typing Tutor Software.

What is a Typing Software?


A typing tutor software is a program that is used to practice typing
and improve upon typing speed.

Examples of Typing Software


1. Rapid Typing Tutor 5. Klavaro Touch Typing Tutor
2. TypingMaster Pro 6. Letter Chase Typing Tutor
3. TypeSmart typing tutor 7. Analytical Eye Typing Tutor
4. Mavis Beacon Teaches Typing 8. Mac typing software.

NB: The most popular typing tutor used especially in Ghanaian schools
is ‘Mavis Beacon Teaches Typing’, so we will use that for our lessons.

What is Typing Speed?


Typing Speed refers to the average number of words that a person
can type in one minute.

Typing speed is measured in Words Per Minute (wpm).


Therefore, if your typing speed is said to be 40WPM, it means that the
average number of words that you can type in one minute is 40 words.
11
TYPING 30 – 35 WPM USING MAVIS BEACON TYPING SOFTWARE
At this level, your typing speed has to develop to an average of 30 to 35
words per minute. It means that, you should be able to type an average
of 30 to 35 words in one minute.

You can practice this with the ‘Mavis Beacon Teaches Typing’ software.

How to Launch the Mavis Beacon Teaches Typing Software


1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ on the start menu.
3. Click on Broderbund on the all programs menu.
4. Click on Mavis Beacon teaches Typing in the menu that appears, to
launch the program.
6. Click on Run on the starting page to enter the class sign in page.
7. Register by filling in the required fields to start using the program.

The diagram below shows the Home page after signing in as a user.

The home page consists of various options, all of which can be used to
practice typing.
Since we are practicing typing to develop our typing speed, you have to
click on ‘Take a Lesson’ from the options.

12
The lesson area is shown below. Simply follow the step-by-step
instructions that appear to take your lesson.

To return to the home page for other options, you can click on the ‘Home’
tab on top of the window above.

NOTE: By default, the fingers are rested on the home row keys
and can be moved up and down to type the other keys.

The eight (8) home row keys are; A S D F J K L ;

The diagram below shows the ten (10) fingers used in typing and
each of the keys they are used to type on the QWERTY keyboard
layout.

13
What is Keyboard Layout?
Keyboard Layout refers to the arrangement of the individual keys
on the keyboard.

There are different kinds of keyboard layouts. The common types of


English keyboard layout are:
1. QWERTY layout.
2. Colemak layout
3. Dvorak Simplified layout.

Points to Note:
➢ The QWERTY keyboard layout is the most common and widely
used keyboard layout.
It is also regarded as the standard keyboard layout.

➢ The name QWERTY was derived from the combination of the


first six (6) characters of the top row of the alphabet keys.

➢ A standard QWERTY keyboard has a total number of 104 keys.


(There are however different number of keys for other special
devices such as laptops and notebooks which also make use of
the QWERTY keyboard layout)

14
❖ MOUSE SKILLS
In order to acquire skills in using the mouse, you need to learn the
basic operations of the mouse.

Some Basic Mouse Operations.


a) Clicking: This is the process of pressing the left button of the
mouse once using the index finger.

It is also called left clicking, or single clicking.


Left Click is performed for the following purposes:
- To select items such as texts, icons, files and folders.
- To give or select a command in a menu.

b) Right clicking: This is the process of pressing the right button of


the mouse once using the middle finger.

Right click action is performed for the following purpose:


- To open contextual or shortcut menus.

c) Double Clicking: This action is performed by pressing the left


button of the mouse twice successively and quickly, using the
index finger.

We perform double click action for the following reasons:


- Double click is used to launch an application from its
icon.
- For selecting text in a document.
- To open files and folders.

d) Triple clicking: It is the process of pressing the mouse button


three times quickly in succession.

This mouse action is performed for the following purpose:


- To select a paragraph in a word document.

e) Dragging-and-dropping: Drag – and – drop is done by pressing


and holding down the left button of the mouse on a selected item
and moving it to a different location before releasing it.

We perform a drag – and - drop action for the following


reasons:

15
- To move an item such as a file, folder or icon from one
location to another.

f) Pointing: This is the process of moving the mouse pointer or


cursor onto an item.

- Pointing is done first before a major mouse action such


as clicking or dragging is performed.

g) Scrolling: This is the process of moving the scroll button of the


mouse upwards or downwards.

We perform scrolling in the following cases:


- To move the displayed page up and down in order to
view.
- To zoom the displayed page in some applications.

How to Hold the Mouse in Position for Effective Use


➢ Place your right palm over the mouse body.
➢ Place your index finger on the left button and the middle finger
on the right button.
➢ Use the index finger for clicking, right clicking, double clicking,
triple clicking and dragging.
➢ For right-clicking, use the middle finger to press the right
button once.
➢ For pointing, use your palm to move the body in the direction
of where you want to move the cursor.

USING MOUSE SKILLS IN DOCUMENT CREATION


We can make use of the basic mouse operations to create a document
by following the procedure below:

How to Create a New Document Using the Mouse.


1. Right-click on an empty space on the desktop.
2. Click to select ‘New’ from the menu that appears.
3. Click on ‘Microsoft Word/Text Document’ to launch the
program.
4. You can now begin typing to create the document.

As you can see from the procedure above, we made use of the left - click
and right – click operations in creating the document.

16
What is a Mouse Pad?
A mouse pad is a special material on which we place and move the
computer mouse.
It enhances speed, precision and comfort for the user.
It also reduces collection of dust under the mouse.

PRACTICAL WORK
WE HAVE LEARNT SO MUCH UNDER THIS TOPIC.
NOW IT IS TIME TO DO SOME PRACTICE.
Go over your notes once more, and do the following:

➢ KEYBOARDING SKILLS:
Launch the Mavis Beacon Teaches Typing software and practice some
typing lessons and record the progress in your typing speed till you
can type up to 35 wpm or more.

You can let your instructor assist you with this.

➢ MOUSE SKILLS:
Practice the following mouse skills on the desktop;
- Click on any icon to select it
- Double click on a program icon to open or launch it
- Point the mouse cursor to any icon on the desktop
- Drag and drop an icon from one location to the other.

IF YOU WERE ABLE TO PERFORM THE ACTIVITY ABOVE


SUCCESSFULLY, KUDOS! YOUR TEACHER MUST BE PROUD OF YOU, BUT
DON’T FORGET TO KEEP PRACTICING, BECAUSE PRACTICE WILL MAKE
YOU PERFECT.

17
TURNING ON AND OFF THE COMPUTER
JHS 1 – TERM ONE

TURNING ON A COMPUTER
What is BOOTING?
Booting is the process of turning on or starting up a computer
system.

Kinds of Booting
There are two (2) kinds of booting, namely:
a. Cold Booting: This is the process of turning on or starting a
computer which has been turned off completely.
b. Warm Booting: This is the process of restarting a computer
which has already been turned on.

How to Turn on A Computer (By Cold Booting)


The following are the steps involved in turning on a personal computer:
1. Check and connect all device cables to the system unit.
2. Check and connect the plugs of the monitor and system unit to
the main socket.
3. Remove all removable storage devices (if any) from the system
unit.
4. Switch on the power supply from the main socket.
5. Press on the power button of the system unit.
6. Press on the power button of the monitor.

NB: It is advisable to remove all removable storage devices before


turning on the computer in order to allow the computer to boot properly.

OPENING APPLICATIONS
After turning on the computer successfully, we can start using it to
perform various tasks by opening the applications we want to use.

How to Open/ Launch an Application


The steps involved in opening an application from the start menu are:
1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ in the start menu to show the All
Programs menu.
3. Move to the application you want in the programs menu.
4. Click on the application to open it.

18
NB: When answering an exam question, use the right name of the given
application you are to open (e.g. Internet Explorer) in place of the
application you want, in the steps outlined above.

Also, some applications are contained in a folder on the programs


menu. Therefore, step 3 could change to click on the folder in which the
application is, before clicking on the specific application you want.
For instance, to launch Calculator, there are five steps, which are:
1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ on the start menu.
3. Click on ‘Accessories’ on the all programs menu.
4. Move the cursor to ‘Calculator’ in the Accessories menu.
5. Click on the ‘Calculator’ to launch it.

TURNING OFF A COMPUTER

How to Turn Off A Computer


(Note: the steps outlined below are applicable to all versions of
Windows)
1. Close all running applications and windows.
2. Click on the start button to display the start menu.
3. Click turn off computer/ shut down on the start menu.
4. Click Turn Off in case another dialog box appears.
5. Wait for the system to shut down.
6. Press the power button of the monitor to turn it off.
7. Unplug from the main power supply and disconnect all cables.

The diagram below is the ‘Turn Off Computer’ dialog box


(For Windows XP)

19
NOTE: It is not always advisable to turn off the computer directly at the
power button because; it could destroy some programs on the computer.

The symbol for the power button is also and can be found on
both the monitor and system unit.

Other Options for Turning Off and Restarting a Computer


Apart from turning off a computer completely, other options can be
used to put the computer off and also to restart it. These include:
➢ Stand by: This option puts the computer into energy-saving
mode where it uses little power. (This option is only available
for Windows XP, and not on the newer versions)

➢ Sleep: The sleep mode initially puts the computer on stand-by


but changes to hibernate when it remains on stand-by for too
long, usually after three (3) hours but in the case of laptops, it
happens when the battery goes too low.

➢ Hibernate: This option saves all your opened windows for you
and then turns the computer off. With this option it takes a
longer time to wake the computer from hibernation, and so it
is not a convenient option to use.
(This option is not available for all versions of Windows, but for Windows
XP you have to press down the shift key for the Stand by option to change
to Hibernate.)

➢ Restart: This option is used when you want to perform a


warm boot after using the computer for some time. This
refreshes the computer system for better performance.

PRACTICAL WORK
FOLLOW THE PROCEDURES TO PRACTICE ON YOUR PERSONAL
COMPUTER THE FOLLOWING, WITH THE HELP OF YOUR TEACHER:

❖ How to turn on the computer by cold booting


❖ How to restart the computer (warm booting)
❖ How to open applications e.g. WordPad, Mavis Beacon, etc.
❖ How to turn off the computer

IF YOU WERE ABLE TO PRACTICE ALL OF THE ABOVE ACTIVITIES,


CONGRATULATIONS… YOU ARE A GOOD ICT STUDENT!

20
HEALTH AND SAFETY IN USING ICT TOOLS
JHS 1 – TERM ONE

What are ICT Tools?


ICT tools are devices that are used for transmitting and sharing of
information.

Examples of ICT tools:


1. Mobile Phones 4. Public Address System
2. Radio 5. Computer
3. Television

POSSIBLE HEALTH HAZARDS ASSOCIATED


WITH LONG TERM EXPOSURE TO ICT TOOLS

What is a Health Hazard?


Health hazard is any threat posed by long term exposure to ICT
tools that may be harmful to our health.

Some health hazards associated with the use of ICT tools:


ICT Tool Hazard Effect of the hazard
Mobile Loud ringing tone Damages the ear drum
phones (causes hearing impairment)
Radiations Can cause cancer

Television Sitting close to the Causes eye problems (affects


TV for long hours vision)

Radio, High volumes Can destroy the eardrum


Loud Speaker, (causes hearing impairment)
PA System
Prolonged use of Causes wrist pain
Computer the keyboard
Watching the Can cause poor vision/ eye
monitor screen for irritation
long hours
Sitting behind the Causes back ache and
computer for long posture problems
hours
Also causes neck pains
21
DEFINITION OF SOME GENERAL TERMS

What is Repetitive Strain Injury (R. S. I)?


Repetitive Strain Injury refers to the pains experienced in parts of
the body as a result of prolonged use of devices.

What is Ergonomics?
Ergonomics refers to the factors in the design of an equipment or
workplace that ensure comfort, safety, efficiency and productivity.

Ways by Which Computers Can be Damaged


1. Computer virus infection
2. Excessive heat
3. Power fluctuations
4. Rodents action
5. Exposure to moisture and dust.

In order to prevent the health hazards and damages to the computer, it


is advisable to observe safety precautions.

SAFETY PRECAUTIONS FOR THE USE OF ICT TOOLS


1. Do not receive or make calls when charging mobile phone.
2. Sit in correct body position when using the computer.
3. Avoid plugging ICT tools in damaged sockets.
4. Do not overload sockets.
5. Turn down the volume of sound devices to moderate level.
6. Do not sit too close to a television when watching.
7. Use screen filters on your monitors.
8. Take regular breaks during typing sessions.
9. Avoid the use of loud ringing tones.
10. Make use of Uninterruptible Power Supply (UPS) with ICT tools.

What is an Uninterruptible Power Supply (UPS)?


UPS is a device used to ensure constant supply of power to the
computer system.

It also provides power for the computer to use for a while in case of
power outage which prevents damage to the computer.

22
Diagram of Some ICT Tools

PRACTICAL WORK
LET’S DO TWO (2) SETS OF PRACTICAL WORK ON THIS TOPIC:

➢ Proper sitting position


a) Let your teacher show you how to sit in the right sitting
position behind a personal computer and practice it.
b) Draw in your jotter a person using a computer in the
correct sitting position

➢ Copy and complete the following table with the correct


examples:
ICT Where they Possible Effects of How to
tool are used Hazards the hazard prevent
the hazard

23
INTRODUCTION TO MANIPULATIVE KEYS
JHS 1 – TERM ONE

SOME COMMONLY USED MANIPULATIVE KEYS


Manipulative keys are keys on the keyboard that are not used to type
any specific character but are used to manipulate documents. They
include:
Shift, Tab, Enter, Insert, Backspace, Delete and Caps Lock keys.

SHIFT KEY:
The keyboard has two shift keys which perform the same functions.
There is one at the left side and the other at the right side.
Functions of the Shift Key
1. It is used together with the alphabet keys to type uppercase
(capital) letters.
2. It is used in combination with other keys to type top row
characters.

TAB KEY
It is the key at the left-hand side of the keyboard with two opposite
arrows on it.
Functions of the Tab key:
1. It is used to move/ jump the insertion point to a given position
when typing.
2. It is also used for indenting paragraphs and aligning columns
in a document.

ENTER KEY
The enter key is also known as Return key. It has a symbol of a bent
arrow pointing backwards.
Functions of the Enter/Return key
1. It is used to move the cursor to the next line in a document.
2. It is used to select commands in dialog boxes and windows.

Insert INSERT KEY


It is usually found at the top right row of the keyboard. It can be put in
either on/off mode.
Functions of the Insert Key
1. It is used to insert text within an existing text when it is
pressed on.
24
BACKSPACE KEY:
The backspace key is a long key located at the right-hand side of the
keyboard, with a symbol of an arrow pointing backward.
Functions of the Backspace Key
1. It is used to remove characters towards the left of the insertion
point in creating a document.

DELETE KEY:
The delete key is also usually found at the top right-hand side of the
keyboard with the word ‘Del’ or ‘Delete’ written on it.
Functions of the Delete Key:
1. It is used to remove characters towards the right of the
insertion point in a document.
2. It is used to remove items such as pictures and drawings from
a document.

CAPS LOCK KEY


The Caps Lock is found on the first column at the left-hand side of the
keyboard.
Functions of the Caps Lock key:
1. It is pressed on to type capital (uppercase) letters.

NOTE: The difference between the Delete key and backspace key is that,
the delete key removes characters towards the right while the
backspace key removes characters towards the left of the insertion
point.

PRACTICAL WORK
NOW LET’S MAKE USE OF THESE MANIPULATIVE KEYS IN TYPING.
➢ With your teacher’s assistance, open a document and type the
following passage:

I love I. C. T. lessons so much. This is because they are very practical and
interesting. So far, our teacher has taught us how to use manipulative keys
when typing on the keyboard.

It is just a matter of time, and I will be the best I. C. T. student in the world! I
only have to take it as a serious subject and that is all.

IF YOU WERE ABLE TO TYPE THE PASSAGE ABOVE EXACTLY AS IT IS,


BRAVO! YOU ARE A GENIUS. YOUR TEACHER MUST BE VERY GOOD. YOU
NOW KNOW HOW TO USE MANIPULATIVE KEYS.

25
LEARNING WITH ICT TOOLS
JHS 1 – TERM ONE

HOW ICT TOOLS ARE USED TO SUPPORT LEARNING


Some of the ways by which we can learn with ICT tools are:
1. Accessing information
2. Sharing ideas
3. Making Calculations
4. Illustrations
5. Distance Learning/ E – learning

ACCESSING INFORMATION:
With a computer, we can use educational software such as Encarta and
Encyclopaedia to find out information in several subjects. Also, we can
make use of search engines such as Google to learn so many things on
the internet.

SHARING IDEAS:
We can use ICT tools such as mobile phones to share ideas through
phone calls. We can also share ideas through e-mailing and online chat
rooms.

MAKING CALCULATIONS:
Electronic calculators can be used to solve complex calculations when
learning mathematics or science. Special software such as Spreadsheet
can be used to calculate large numerical data.

ILLUSTRATIONS
We can make use of graphics and designing software such as Corel
Draw to make illustrations of pictures and diagrams which help to
make teaching and learning lively.

DISTANCE LEARNING (E – LEARNING)


Through the use of mobile tablets and computers with internet
connections, we can take a course on line at the comfort of your home
or office without being in a formal classroom setting. This is an
electronic means of learning and is therefore referred to as e –
learning.

26
COMMON KEYBOARD SYMBOLS
JHS 1 – TERM TWO

PUNCTUATION KEYS WHICH DO NOT INVOLVE THE SHIFT KEY


TO CREATE DOCUMENTS
The punctuation keys which do not involve the shift key to create
documents are the punctuations that are found on the keyboard as
down row characters. These punctuation keys are:

I. Comma , IV. Semi-Colon ;


II. Full stop . V. Apostrophe ‘
III. Forward Slash / VI. Backslash \

Uses of the Punctuation Keys


1. Comma:
It is used to separate words and to make a pause in a sentence.
2. Forward slash:
It is used as a word substitute for ‘or’, in creating a document.
3. Full Stop:
It is used to mark the end of a sentence.
4. Semi-Colon:
It is used to connect two related sentences without a
conjunction.
5. Apostrophe:
It is used to mark omissions and possessives of nouns or
pronouns.
6. Backslash
It is used only in programming/coding as an escape character.

PRACTICAL WORK
Activity: OPEN TO ANY PAGE OF THIS BOOK AND PRACTICE TYPING
A SHORT PARAGRAPH, WHICH MAKES USE OF THE PUNCTUATION
KEYS YOU HAVE LEARNT SO FAR UNDER THIS TOPIC.

CONGRATS IF YOU WERE ABLE TO DO THE ACTIVITY ABOVE


SUCCESSFULLY.
27
INTRODUCTION TO THE DESKTOP
JHS 1 – TERM TWO

What is a User Interface (UI)?


A User Interface is the means through which a computer user
interacts with the computer system.

The user interface could comprise of a set of commands or menus


designed to help the user to easily interact with the software or
hardware components of the computer. User Interface is sometimes
also called human – computer interface.

There are several types of user interface that have been designed for
computer users. Some of the common examples are;
a) Command Line Interface (CLI): This type consists of a set of
commands by which the user interacts with the computer.
This is the user interface that worked with the Microsoft Disk
Operating System (MS DOS), which is no longer in use since it
is difficult to operate.

b) Menu Driven Interface: This type consists of set of menus by


which the user operates the computer system.
This is the interface used by cash machines (Automated Teller
Machines [ATM]) and ticket machines.

c) Graphical User Interface (GUI): This is a visual way of


interacting with computers using items such as pictures,
windows, pointers and menus.
This is the most popular user interface found in modern
operating systems such as Microsoft Windows, Android, etc.

We will therefore focus on the Graphical User Interface which is used


by the Microsoft Windows operating system. One important aspect of
the GUI of Microsoft Windows is the Desktop.

What is the Desktop?


Desktop is the graphical interface and working area on the
computer screen which displays the icons, wallpaper, taskbar and
the mouse pointer.

The desktop is what appears first after turning on the computer


successfully, before you start working with the computer.
28
FEATURES OF THE DESKTOP
The main features of the desktop are:
1. Wallpaper 3. Taskbar
2. Icons 4. Mouse Pointer

Diagram Showing main Desktop Features

WALLPAPER/ DESKTOP BACKGROUND:


Definition: Wallpaper is the picture that appears on the background
of the computer screen.

Function: The wallpaper is used to decorate the background of the


Graphical User Interface.

How to Change the Wallpaper/ Desktop Background


(The procedures outlined below are for Windows 7, 8, 10, etc.)
Procedure 1 (Through the Desktop)
1. Right-click on a blank space on the desktop.
2. Click on ‘Personalize’.
3. Click on ‘Desktop Background’.
4. Click on the picture you want from the ‘Background’ list.
5. Click on your preferred display option.
6. Click on the ‘Save Changes’ button to finish.

Procedure 2 (Using an Image Directly)


1. Navigate to the image you wish to use.
2. Right click on the image of your choice.
3. Click on ‘Set as Desktop Background’.

29
Procedure 3 (Through Control Panel)
1. Click on the ‘Start’ button to display the start menu.
2. Click on ‘Control Panel’.
3. Click on ‘Appearance and Personalization’.
4. Click on ‘Change desktop background’
5. Click on the background you want to use.
6. Click on your preferred display option/picture position.
7. Click on the ‘Save Changes button’ to finish.

ICONS:
Definition: An icon is a small picture on the computer screen that
represents a file, folder or program.

Function: An icon helps the user to navigate through a computer


system easily.

Types of Icons Found on Every Computer Desktop


(i) Folder icons: It is a yellowish container in which files and
other folders are kept.
Some special folders that are usually found on the desktop
are
a. My Computer icon: This icon is used to open and view
all the drives connected to the computer
b. My Documents icon: This icon is used to open the ‘My
Documents’ folder which contains all documents on the
computer.
c. Recycle bin icon: This contains all items which have
been deleted from the computer.

(ii) File icons: A file is any item stored on the computer that
contains information.

Diagram of Some Common Types of Icons

30
How to Open an Icon
Procedure 1
❖ Right-click on the icon and then click on ‘Open’ on the menu
that appears.

Procedure 2
❖ Double-click on the icon to open it.

TASKBAR
Definition: It is the long horizontal bar usually at the bottom edge of
the desktop.

FUNCTION: The taskbar allows quick access to current and favourite


programs.

Sections/ Components of the Taskbar


The taskbar is divided into four (4) main sections namely:
1. Start button: It is clicked to display the start menu.

2. Quick Launch area: This area has programs pinned to the


taskbar for quick access to them.

3. Opened Programs area: This section displays programs that


are currently opened.

4. Notification area: This area displays the date and time, volume
control, network, antivirus settings, etc.
The notification area is also known as the System Tray.

Diagram of The Taskbar showing the various Sections

How to Adjust the Volume of the Computer System


1. Move the mouse pointer to the notification area and click on
the volume control icon.
2. Click on the slider and drag it up to increase or down to
decrease the volume.

31
How to Change the System Date and Time
1. Move the mouse pointer to the notification area and double-
click on the time and date.
2. Set the correct time and date in the dialog box that appears.
3. Click on ‘Apply’ to apply the changes made.
4. Click on OK to finish.

MOUSE POINTER/ CURSOR


Definition: The mouse pointer is a small arrow on the computer
screen which shows the direction and movement of the mouse.

Types of Mouse Cursor and Their Functions:


Symbol Name Function
Normal select/ It is used for selection or activation
Left pointer of objects.
Right arrow/ Right It enables users to select a row, text
pointer or cells in a document.
Hour glass/ Wait It informs users that the operating
cursor system is busy loading another disk
I-Beam/ I-Cursor/ It is used to indicate a point of
Insertion Pointer editing text in a document.
Harrow cursor/ It is used to select shortcuts or links
Link selector/ to webpages.
Hand pointer

PRACTICAL WORK
NAVIGATING THROUGH FEATURES OF THE DESKTOP

LET YOUR TUTOR GUIDE YOU TO PRACTICE NAVIGATING THROUGH


THE DESKTOP FEATURES BY FOLLOWING THE PROCEDURES
DISCUSSED ABOVE.

➢ Changing the Wallpaper/ Desktop Background


➢ Opening an Icon
➢ Changing the System Date and Time
➢ Adjusting the Volume of The Computer

WOW! I HOPE YOU SURE WERE ABLE TO PERFORM THE ACTIVITIES


WITHOUT ANY DIFFICULTY. IF YOU COULDN’T DO ANY, TRY AGAIN.
THAT IS HOW TO BECOME AN EXPERT IN ICT. NEVER GIVE UP!
32
LAUNCHING APPLICATIONS
JHS 1 – TERM TWO
There are many ways by which an application can be launched or
opened on the computer. Two (2) of the ways commonly used are:
❖ By using the start menu button
❖ By using desktop icons

LAUNCHING AN APPLICATION USING THE START MENU BUTTON

Steps Involved in Launching an Application


Using the Start Menu button
(e.g. WordPad/ Calculator/ Notepad)
1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ on the start menu to display the All
programs menu.
3. Click on Accessories on the All programs menu
4. Click on the program you want, (i.e. WordPad/ Calculator/
Notepad) to launch it.

LAUNCHING AN APPLICATION USING DESKTOP ICONS


Procedure 1
1. Move the mouse pointer to the icon and double –click on it, to
launch the application.

Procedure 2
1. Move the mouse pointer to icon of the application you want to
open and right-click on it.
2. Click on ‘Open’ on the menu that appears, to launch the
application.

PRACTICAL WORK
IT IS ALWAYS GOOD TO PRACTICE WHATEVER YOU LEARN.
NOW, LET YOUR TEACHER ASSIST YOU TO PRACTICE THE FOLLOWING
ON YOUR COMPUTER:
Follow the procedure in the notes above to launch the
following applications:
❖ Microsoft Word
❖ Encarta
❖ Calculator
❖ Mavis Beacon teaches typing
a. Using Desktop icons b. From the start menu

33
WINDOWS MANAGEMENT
TERM 2

What is a Window?
A window is a rectangular working area on the computer screen in
which an opened program is displayed.

One important feature of every window is the title bar.

What is the Title Bar?


The title bar is the horizontal bar at the topmost part of every
window.

FEATURES OF THE TITLE BAR


The title bar has the following main features:
1. Window Icon.

2. Window title
It shows the name of the application and the title name of the
window.

3. The Control box/ Control buttons


➢ Minimize button: It is used to drop the window onto
the taskbar when clicked.
➢ Maximize button: It is used to enlarge the window.

➢ Restore button: It is used to resize a window to its


original size.
➢ Close button: It is used to close the opened window
and exit the application.

NB: The Maximize and Restore buttons are found at the same location,
the name switches after clicking on one, to the other.

Diagram Showing Features of the Title Bar.

34
PRACTICAL WORK
USING FEATURES OF THE TITLE BAR
TO NAVIGATE THROUGH A WINDOW
LET YOUR TEACHER GUIDE YOU TO PRACTICE THE FOLLOWING:

❖ Using the Close button


1. Launch any application, by following the steps treated
earlier under the topic, ‘Launching Applications’.
(This will open a window for you)
2. Move the mouse cursor to the close button in the control
box and click on it.
(This will close the window and exit the opened
application)

❖ Using the Minimize Button


a. Launch an application to open a window.
b. Move the pointer to the minimize button and click on it.
c. This will drop the window down onto the taskbar.

NB: To bring the window back from the taskbar;


Move the cursor to the opened programs area on the taskbar
and click on the window title you want to bring it back.

❖ Using the Maximize Button


a. Launch an application to open in a window.
b. Move the mouse pointer to the maximize button in the
control box and click on it.
c. This will enlarge the current opened window to its
maximum size.
NB: After clicking on the maximize button to enlarge the
window, the maximize button automatically changes to the
‘restore button’

❖ Using the Restore Button


a. Launch an application to open in a window and maximize
it.
b. Move the mouse pointer to the restore button in the
control box, and then click on it.
c. This will resize the window to its original shape.
NB: The ‘restore’ and ‘maximize’ buttons are both found at the same
position (in the middle) of the control box. When you click on one, the
symbol then changes to the other one.

35
CREATING WORD PROCESSING DOCUMENT
JHS 1 – TERM TWO

What is a Word Processor?


A word processor (or word processing application) is a program that
is used to create, edit and format text-based documents.

Some of the documents that can be created using a Word processor


are; Newsletters, Memos, Journals, Reports and Fax cover sheets.

Examples of Word Processing Application


1. Microsoft Word 5. Lotus Word Pro.
2. WordPad 6. Word Star
3. Notepad 7. Writer
4. Corel WordPerfect 8. Calligra Words

How to Launch a Word Processing Application


E.g. I – Microsoft Word
1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ on the start menu.
3. Click on ‘Microsoft Office’ in the all programs menu.
4. Click on ‘Microsoft Word’ in the office menu to launch it.

E.g. II – WordPad
1. Click on the start button to display the start menu.
2. Click on ‘All Programs’ on the start menu.
3. Click on ‘Accessories’ in the all programs menu.
4. Click on ‘WordPad’ in the accessories menu.

COMMONLY USED FEATURES OF A WORD PROCESSING WINDOW


The commonly used features of a word processing window are as
follows. (NB: Each lettered feature corresponds with the labeled part in
the diagram that follows)

A – Title bar B – Menu bar


C – Standard toolbar D – Formatting toolbar
E – Horizontal ruler F – Control box
G – Insertion point H – Vertical ruler
I – Document page J – Vertical scroll bar
K – Task pane L – Horizontal scroll Bar
M – Status bar N – Drawing toolbar
O – Mouse cursor (I-Beam)
36
Features of a word processing window
(refer to names of labeled parts on the previous page)

Functions of the Features of a Word Processing Application


Window
➢ Title Bar: It displays the name of the application and the file
name of the document.
➢ Control Box: This consists of the control buttons (close,
minimize, restore, maximize and close buttons) which are used
for managing the window.
➢ Menu bar: It consists of various command buttons used for
performing particular tasks.
The command buttons available on the menu bar include;
File, View, Edit, Insert, Format, Tools, Help, etc.
➢ Insertion point: It shows where the text will begin to appear
when typing.
➢ Document page: It is where the current document text is
displayed.
➢ Horizontal ruler: It controls the horizontal spacing of
paragraph margins, tables, columns and tabs.
➢ Vertical ruler: It controls the vertical spacing of paragraph
margins, tables, columns and tabs.
➢ Status bar: It displays information about the current
document including the page numbers, current page and
number of words.
37
➢ Horizontal scrollbar: It is used to move the document page
from left to right.
➢ Vertical scrollbar: It is used to move the document page up
and down.
➢ Task pane: This is a dialog box that provides easy access to
commonly used features in manipulating a document.
➢ Mouse Cursor: It is a pointer that can be moved and positioned
at where a task is to be performed.
In word processing, the mouse cursor is also known as I – beam.
➢ Drawing toolbar: It contains buttons used for drawing shapes
and objects in a document.
➢ Standard toolbar: It consists of buttons that are used to edit,
save and print a document.

Diagram of a Standard Toolbar

Some of the buttons on the standard toolbar are;


(referring to labeled parts in the diagram above).

A – New button B – Open button


C - Save button D – Print button
E – Print preview F – Spelling and grammar checker
G – Cut button H – Copy button
I – Paste button J - Format painter
K – Undo button L – Redo button
M – Zoom

Function of commonly used buttons on the Standard Toolbar


New – It creates a new blank document.

Open – It is used to open or find an existing file.

Save: Used to save the active file with its current file name,
location and format.

Print: It is used to print the current document.

Print preview: It shows how the document will look like when
you print it.

38
Spelling and grammar checker: It is used to check for spelling
and grammatical errors in the document.

Cut: It removes a selected item from the document and places


it on the clipboard.

Copy: It copies the selected item to the clipboard.

Paste: It places the copied or cut item on the clipboard at the


insertion point in the document.

Format painter: It copies the format from a selected item and


applies to other objects or text.

Undo: It reverses the last command action in the document.

Redo: It is used to reverse the action of the Undo button.

Zoom: It is used to enlarge or reduce the display of the current


document.

➢ Formatting toolbar: This has buttons used for applying


changes to the appearance of a document.

Diagram of the formatting toolbar

Tools found on the formatting toolbar (refer to labeled parts above)


A – Font style button B – Font button
C - Font size button D – Bold button
E – Italics button F – Underline button
G – Align left button H – Centre align
I – Align Right button J – Justify button
K – Numbering button L – Bulleting button
M – Decrease indent N – Increase indent
O – Border button P – Text highlight colour button
Q – Font colour button

NOTE: You will learn about the functions of the tools found on
the formatting toolbar under different topics as you move on.

39
TYPING AND SAVING A SHORT PASSAGE
IN WORD PROCESSING
This involves practical activity. You have to get a computer to do it.

PRACTICAL WORK
WITH YOUR ICT TEACHER’S ASSISTANCE, PERFORM THE
FOLLOWING ACTIVITY:
❖ Typing a New Word Processing document.
1. Launch a new Microsoft Word application.
2. On the document page, type the following:

Most of the world’s Billionaires in this 21st century are all


IT experts. This underscores the fact that ICT is a very
lucrative subject of study.

Mark Zuckerberg, the founder of Facebook; Bill Gates, the


founder of Microsoft; and Steve Jobs, who founded Apple
Inc. are all some of the world’s Billionaires. Since they
made their fortunes from computing, one can say that,
they are all role models for the ICT student.

NB: While typing, you need to make use of the manipulative keys in
order to type in the same format like the one above.

❖ Saving a New Word Processing Document Using ‘Save As’


Now, follow the steps below to save your newly created document:
1. Click on the ‘File’ button on the menu bar.
2. Click on ‘Save As’ on the File menu to open the Save As dialog
box.
3. Select the location where you want to save the document (e. g.
My Documents), in the Save in box at the top of the dialog box.
4. Double –click on the existing file name in the File name box and
press the delete key to delete it.
5. Type the file name you want, (e. g. My Passage) in the File
name box.
6. Click on the Save button to finish saving.

IF YOU WERE ABLE TO TYPE AND SAVE THE PASSAGE IN THE


ACTIVITY ABOVE, GOOD JOB! THIS IS YOUR BEGINNING OF A FUN –
FILLED JOURNEY WITH WORD PROCESSING!

40
EDITING WORD PROCESSING DOCUMENTS
JHS 1 – TERM TWO

What is Editing a Document?


Editing a document is the process of making changes to correct
errors and ensure accuracy in a document.

Importance of Editing a document.


1. It helps to correct mistakes.
2. It saves cost of printing out wrong documents.
3. It ensures accuracy in a document.

Some of the features used in editing a document in Word Processing are:


➢ Spelling and Grammar check
➢ Undo and Redo commands.

NOTE: All the tools used in editing can be found on the Standard
toolbar.

OPENING AND EDITING AN EXISTING DOCUMENT

❖ OPENING A DOCUMENT
Any previously saved document can be opened again for editing. The
steps involved in opening an existing document previously saved are
as follows

Procedure 1
Opening the document from the ‘File’ menu on the menu bar
1. Launch the word document window from the start menu.
2. Click on ‘File’ button on the menu bar.
3. Click on ‘Open’ in the file menu.
4. Click on the ‘My documents’ folder in the open dialog box.
5. Click on the File name in the documents menu.
6. Click on ‘Open’ to launch it.

Procedure 2
Opening the Document From its Location.
1. Go to the location of the document. (e. g. My documents)
2. Double click on the file in the documents list to open it.

41
❖ EDITING A DOCUMENT

Spelling and Grammar Check


The spelling and grammar check ensures that there is no spelling
mistake and grammatical error in the document.

NOTE:
➢ If there is a spelling mistake in the document, the word is
underlined by a red wavy (crimped) line.
Also, when the word is underlined by a red wavy line, it could
also mean that the Word is correct but cannot be found in the
American English dictionary.

➢ If it is a grammatical error in the document, the phrase or


sentence is underlined by a green wavy (crimped) line.

How to Do a Spelling and Grammar Check in A Document.


Doing a spelling and grammar check can be done in two (2) ways.
➢ Checking for spelling and grammar in the whole document.
➢ Checking for spelling a grammar for a single word or phrase.

Checking for Spelling and Grammar in the Whole Document.


1. Click on the ‘Tools’ button on the menu bar to open the tools
menu.
2. Click on ‘Spelling and Grammar’ on the tools menu.
3. On the appropriate button on the spelling and grammar dialog
box, to correct the spelling and grammar mistakes one after
the other.
4. After editing a message will pop up saying, ‘The spelling and
grammar check is complete.’

Checking for Spelling and Grammar for a Single Word or phrase


1. Move the cursor onto the underlined word or phrase showing
an error.
2. Right click on the word or phrase.
3. On the menu that opens, select the correct word or phrase
from the suggestions listed.

If you still want to maintain the initial spellings, click on ‘Ignore All’ on
the menu that appears.

42
The Spelling and Grammar Dialog Box

The Spelling and grammar dialog box has some buttons used for
editing spellings and grammar, as shown below:

Here are the functions or uses of each of the buttons shown on the
spelling and grammar dialog box:

Error box: This displays the text with the spelling mistake or
grammatical errors.
Suggestions box: This gives you possible corrections that relate to the
text in the error box, for you to choose from.
Ignore Once: This is clicked to overlook a reported error only one
time. This means, the program will report an error when it detects that
word again.
Ignore All: This button is clicked to overlook the error reported once
and for all throughout the document. This means that, when that word
can be repeated over and over again without any indication of an error.
Add to Dictionary: This button is clicked to add a reported error to the
Word program dictionary as a new vocabulary; so that it will not be
reported as an error the next time it is typed.
Change: This button is clicked to change the particular error in the
Error box to the correct one that you pick from the Suggestion box.
Change All: This button is clicked to change all errors that are the
same as the one reported to the correct one that you will pick from the
suggestion box.
AutoCorrect: This button is clicked to allow the Word Application to
choose one of the suggested items to replace the reported error
automatically.

43
(It is not advisable to use the AutoCorrect option because the program
might choose an inappropriate word for you).
Check Grammar: This box is ticked to allow the program to check the
grammar together with the spellings.

NB: The shortcut keyboard command for checking Spelling and


Grammar is F7.

Undo and Redo Commands


Undo: This button is clicked in order to reverse commands that are
performed in a document.

Redo: The redo button is clicked to change a reverse action done by the
undo command back to its previous state.

RE-SAVING AN EDITED DOCUMENT WITH


THE SAME FILE NAME USING THE ‘SAVE’ COMMAND

After editing, it is important to save the changes effected in the


document. If you want to maintain the same file name, use any of the
following procedures:
Procedure 1: Using the File menu option
1. Click on File on the menu bar to show the file menu.
2. Click on ‘Save’ on the file menu to finish saving.

Procedure 2: Using the save button on the standard toolbar


❖ Click on the ‘Save icon’ button on the standard toolbar.

Procedure 3: Using keyboard shortcuts


❖ Press the Ctrl and S keys together on the keyboard to save.

Difference between the ‘Save’ command and ‘Save As’ command


The Save command is used to re-save an existing document with the
same file name, while the Save As is used to save a new document with
a new file name or to re-save an existing file with a different file name.

NB: Both the Save and Save As commands have the same shortcut
command, which is Ctrl + S.
44
FORMATTING TEXT IN
WORD PROCESSING DOCUMENT
JHS 1 – TERM THREE

What is Formatting a Text?


Formatting a text is the process of applying certain features to
change the appearance of the text in a document.

Differences between Formatting a text and Editing a text.


FORMATTING A TEXT EDITING A TEXT
1. It does not change any part of 1. It changes some part of the
the text. text.
2. It changes the appearance of 2. It does not change the
the text in the document. appearance of the text.
3. It does not correct errors in 3. It corrects errors and ensures
the text document. accuracy in the document.

FORMATTING TEXT USING COMMON FORMATTING TOOLS


Before you can go ahead to format a text, you first have to open the
existing document.
(Refer to the previous topic for the steps involved in opening an existing
document).

The tools used for formatting a text can be found on the formatting
toolbar in the word processing application window. Some of these
tools are:
- Font style - Font - Font size

- Bold - Italic - Underline

Functions of Commonly Used Formatting Buttons


➢ Font box: it is used to select the font
➢ Font size: It is used to increase or decrease the size of selected
text in the documents
➢ Bold button: It is used to deepen or make font style of the
selected text bold.
➢ Italics button: It is used to change the style of the selected text
to italics (makes it slanted).
➢ Underline button: It is used to place a straight line under the
selected text

45
What is a Font?
A font is a collection of letters, numbers and symbols that share a
particular unified design.

There are several examples of fonts. Some of the most commonly used
ones are as follows:
1. Times New Roman 7. Lucida Calligraphy
2. Arial 8. Cooper Black
3. Arial Black 9. Algerian
4. Comic Sans MS 10. Berlin Sans FB
5. Calibri (Body) 11. Broadway
6. Cambria 12. Brush Script MT

NOTE: Observe the difference in the designs of the examples above.

CHANGING THE FONT, FONT SIZE AND FONT COLOUR


When creating any document, you can change the font, the font colour
and the font size. It is advisable to finish typing in the default settings,
before applying the changes in formatting.

How to Change the Font


1. Select the text you want to change.
2. Click on the arrow beside the font box on the formatting toolbar
to display the font list.
3. Scroll through the list to find the font you want. (e.g. Arial.)
4. Click on the font type you want from the list.

How to Change the Font Size


1. Select the text you want to change.
2. Click on the arrow beside the font size tool on the formatting
toolbar to display the list of font sizes.
3. Scroll through the list to find ‘the font size you want.’ (e.g. 14)
4. Click on the font size you want from the list.

How to Change the Font Colour


1. Select the text you want to change.
2. Click on the arrow beside the font colour tool on the formatting
toolbar to display the different font colours.
3. Click on the font colour you want from the list to replace the
default colour.
46
NB: The default font colour in Microsoft Word is Black

BOLD, ITALICS AND UNDERLINE TOOLS


The Bold, Italics and Underline tools are mainly used to lay emphasis
on certain portions of the text.
We usually use these tools for headings, key words and important
points.

You can apply only one, any two or all three tools to a selected text in
formatting. For example, consider the text below:

Normal text - ICT Bible is the best book in the world.

We can apply the bold, italics or underline tools to the normal text above
and then change it into any of the following:

Bold KingLion is the best series in the world!


Italics KingLion is the best series in the world!
Underline KingLion is the best series in the world!
Bold & Italics KingLion is the best series in the world!
Bold & Underline KingLion is the best series in the world!
Italics & Underline KingLion is the best series in the world!
Bold, Italics & Underline KingLion is the best series in the world!

How to change Normal Text to Bold


1. Select the text you want to change.
2. Click on the Bold button on the formatting toolbar to make the
selected text bold.

How to Change Normal Text to Italics


1. Select the text you want to change.
2. Click on the Italics button on the formatting toolbar, to change the
text.

How to Underline a Text


1. Select the text you want to underline.
2. Click on the Underline button on the formatting toolbar to underline
the selected text.

47
RE – NAMING FORMATTED DOCUMENT
USING THE ‘SAVE AS’ COMMAND IN THE FILE MENU.
After formatting an already existing document, we can re-name/ re-
save it with a different name using the ‘Save As’ command.

How to Re-save a Document Using the File Menu option.


1. Click on the ‘File’ button on the menu bar.
2. Click on ‘Save As’ from the file menu.
3. Delete the old file name from the file name box in the dialog box that
appears.
4. Type the New file name you want in the file name box.
5. Click on ‘Save’ on the dialog box, to finish.

TAKE NOTE: Whenever you re-save an already existing document with a


different name using the Save As command, both the old document and
the new document will exist as different files in the My documents folder.

PRACTICAL WORK
BY THIS TIME, YOU SHOULD KNOW THAT, THE MOST IMPORTANT
LESSON IN THE ICT COURSE IS THE PRACTICAL ASPECT. BRACE
YOURSELF FOR ANOTHER EXCITING PRACTICAL EXERCISE.

Follow the steps in the notes above to do the following activity:


❖ Open one of the saved documents you created in the previous
activities. (If you cannot find any saved document, you need to
create a new one, using any of the passages in this book and then
save it.)
❖ Practice changing the font and the font sizes of portions of the
text.
❖ Also, practice laying emphasis on some of the major points by
applying the Bold, Italics and Underline tools.
❖ Now, re-save the formatted document with a new name using
the ‘Save As’ command in the file menu.
(You can refer to the procedures in the notes above.)

WOW, IF YOU WERE ABLE TO DO THIS EXERCISE VERY WELL,


KUDOS!

48
MANAGING FILES
JHS 1 – TERM THREE

RENAMING AND DELETING/REMOVING OF FILES

❖ RENAMING OF FILES
What is Renaming?
Renaming is the process of changing the name of an existing file.

How to Rename a File


The following are the steps involved in renaming/ changing the name
of a file:
(e. g. Changing the name of a document called ‘Kofi’ to ‘Ama’)
1. Go to the location of the target file.
(e.g. my documents, my pictures, etc.)
2. Move the cursor to the file you want to rename and right click
on it. (e. g. ‘Kofi’)
3. Click on ‘Rename’ on the menu that appears.
4. Type the new name on the keyboard to replace the current
one. (i.e. ‘Ama’)
5. Press ‘Enter’ on the keyboard to finish the renaming process.

❖ DELETING/ REMOVING OF FILES


What is Deleting?
Deleting is the process of getting rid of an unwanted file from the
computer.

Reasons for Deleting a File


1. To free up and allow space for other applications or files.
2. To get rid of an unwanted file or program.

How to Delete a File


Procedure 1
1. Right click on the target file.
2. Click on ‘Delete’ on the menu that appears.
3. Click on ‘OK’ on the dialog box that appears to finish.

Procedure 2
1. Click on the target file to select it.
2. Press on ‘Delete’ on the keyboard.
3. Click on ‘Yes’ on the dialog box which appears to finish.
49
NOTE:
When an item is deleted once on the computer, it does not get
lost completely. It is moved into the Recycle Bin, and still
occupies space on the hard disk.

RESTORING AND EMPTYING FILES FROM THE RECYCLE BIN


After deleting a file, it goes into the recycle bin and still occupies space
on the hard disk of the computer. However, you can get it back to
where it was when you are in need of it later. Also, you can empty the
recycle bin to get rid of the items completely from the computer.

❖ RESTORING FILES FROM THE RECYCLE BIN

What Does It Mean to Restore a File?


Restoring a file is the process of getting a deleted file from the
recycle bin back to its original location.

How to Restore a File from the Recycle Bin


1. Double click on the Recycle Bin icon on the desktop to open it.
2. Locate the file you want to restore and right-click on it.
3. Click on ‘Restore’ on the menu that appears, to finish.

❖ EMPTYING THE RECYCLE BIN

What Does It Mean to Empty the Recycle Bin?


Emptying the recycle bin is the process of permanently removing or
getting rid of deleted files in the recycle bin from the computer.

How to Empty the recycle Bin.


1. Right click on the Recycle Bin icon on the desktop.
2. Click on ‘Empty Recycle Bin’ on the menu that appears, to
finish the process.

REMOVING A SPECIFIC FILE PERMANENTLY FROM THE RECYCLE BIN


NOTE:
This procedure is used when you don’t want to empty the entire recycle
bin but only want to remove some specific files permanently from the
computer.

50
How to Permanently Remove ‘A Specific File’ From The Computer
1. Double click on the Recycle Bin icon on the desktop to open it.
2. Locate the specific file you want and right-click on it.
3. Click on ‘Delete’ on the popup menu that appears.
4. Click on ‘Yes’ on the dialog box that appears to finish the
process.

PRACTICAL WORK
DEAR BRILLIANT ICT STUDENT, IT IS TIME TO PUT WHAT WE HAVE
STUDIED SO FAR TO WORK. YOU NEED THE SUPERVISION OF YOUR
TEACHER TO DO THIS.
❖ Renaming of Files
➢ Go through the procedures for renaming a file above, and let
your teacher show you a particular file on the computer to
rename.
➢ You can write down the original name, so that after renaming
the file, you will rename it again with the original name.

❖ Deleting of Files
Once again, your teacher will show you a file. Be sure that the
file is an unwanted one.
➢ Now, follow the procedures outlined above to practice deleting
the unwanted file.
(The deleted file will go into the Recycle Bin. If you want to be
sure about this, you can open the recycle bin by double clicking
on its icon on the desktop to check if the deleted file is in it.)

❖ Restoring of deleted Files from the Recycle Bin


➢ Go through the steps for performing this activity, and then
follow the procedure to restore the file you deleted in the
previous activity back to its location.
(You can always let your teacher or a friend help you if you need
an assistance.)

❖ Emptying the Recycle Bin


NB: Before you perform this activity, make sure that you no
longer need the contents of the recycle bin. Now, you can follow
the steps already discussed to empty the recycle bin.

I HOPE THESE ACTIVITIES WERE EXCITING.


YOU ARE REALLY GOOD!

51
COMPUTER VIRUSES
JHS 1 – TERM THREE

What is a Computer Virus?


A computer virus is a malicious software that can copy itself onto a
computer and cause damage to it without the user’s knowledge.

NB: You must bear in mind that computer viruses are also programs.
They are intentionally designed by some people just to cause havoc to
computers around the world, and for their own pleasure.

Types of Computer Viruses


There are so many different types of computer viruses. Some of the
common types include;
➢ Boot sector virus: This type of virus attacks the boot sector of
the hard disk and destroys the operating system of your
computer. This makes it difficult for the computer to boot
properly.
➢ File infector viruses: This type of virus infects the files and
programs on the computer.
➢ E-mail virus: This virus spreads through e-mail attachments
and infects the computer once the attachment is opened.
➢ Macro virus: This kind of virus also infects files created by
programs that contain macros (such as word documents, excel
documents, etc.)
➢ Memory resident virus: This type fixes itself inside the
computer memory and end up infecting any opened file.
➢ FAT Virus: This kind of virus affect the file allocation table
(FAT) of a disk which is used to store information.
➢ Overwrite Virus: This type of virus deletes any information in a
file they infect, making the file useless.

SOURCES OF COMPUTER VIRUSES


1. Internet; through viewing and downloading of infected files
from untrusted websites.
2. Sharing of removable infected storage devices such as pen
drive, diskettes and compact disks.
3. Through a computer network. If one computer gets infected,
all other ones in the network will be affected as well.
4. By copying or transferring files from an infected computer.

52
EFFECTS (DISADVANTAGES) OF COMPUTER VIRUSES
1. Corruption of the operating system.
2. Causing the computer to restart on its own several times.
3. Slowing down and freezing the computer system.
4. Deletion and corruption of files and programs.
5. Viruses can make the disk drives inaccessible and therefore
cannot be opened.
6. Formatting the hard disk by itself.
7. Breaking down the computer system completely.

PREVENTION OF COMPUTER VIRUSES


FROM INFECTING THE COMPUTER
If you do not want your computer to be infected by a virus, the
following measures can be put in place to prevent virus infection.

Ways to Prevent Computer Virus Infection


1. Install and run an antivirus on your computer.
The antivirus will stop the virus from having access to your
computer.
2. Avoid sharing removable storage devices if you do not have an
anti-virus installed on your computer.
3. Scan all removable storage devices connected to the computer
before use.
4. Update your antivirus program regularly.
5. Do not transfer files from an infected computer.

REMOVING COMPUTER VIRUS FROM AN INFECTED COMPUTER


If your computer is mistakenly infected by virus, you can follow any of
the two (2) procedures below to remove it:

Ways of Removing Virus from an Infected Computer


1. By formatting the hard disk.
Formatting a disk will erase all the information stored on it,
including any virus.
2. By scanning the system with the antivirus software to delete it.

What is ‘Formatting a disk’?


Formatting a disk is the process of organizing a storage device by
erasing all previously saved data, in such a way that new data can
be saved on it.

53
What is a ‘Virus Scan’?
A virus scan is a security process of searching the computer system
with an antivirus software to identify and remove viruses and other
hidden threats.

How to Perform Virus Scan/ How to Remove Computer Virus Using an


Antivirus Software;
1. Make sure an antivirus program is installed on your computer.
2. Launch the antivirus program.
3. Click on ‘scan’ on the antivirus window to scan the computer
system for viruses.
4. Click to Delete or remove all infected files found on the
computer.

What is an Antivirus Software?


An anti-virus is a program that protects the computer from virus
infection and can be used to remove virus from an infected
computer.

Examples of Antivirus Software


1. Avast antivirus 6. AVG antivirus
2. McAfee antivirus 7. Avira antivirus
3. Kaspersky antivirus 8. Dr. Solomon’s antivirus
4. Norton antivirus 9. Bitdefender antivirus
5. Panda antivirus 10. Smadav antivirus.

NB: There are so many kinds of anti-virus software available.


You can research from the internet to know about some other examples.

UPDATING YOUR ANTIVIRUS SOFTWARE


Updating antivirus software is the process of getting the latest
version of the antivirus program to replace the previous one.

Why is it Important to Update Your Antivirus Software?


It is important because, new viruses are always being created and
therefore the antivirus must be updated to the latest version in order
to deal with the latest viruses.

The previous antivirus may not have the ability to deal with the latest
viruses.

54
OTHER KINDS OF MALICIOUS SOFTWARE

What is a Malicious Software (Malware)?


Malicious software is a general term for programs that are
designed to disrupt and damage a computer system.

Types of malicious software (malware)


Apart from computer viruses, there are other types of malware which
include;
1. Worms 2. Trojan horse 3. Spyware

Worms: This type of malware makes several copies of itself and causes
the computer to slow down.

Trojan horse (Trojans): This type of malware does not replicate itself
but is usually attached to other files. It can cause damage and trace
your personal account details.

Spyware: This type of malware can secretly monitor your activities and
detect your passwords.

NOTE: The malware mentioned above are not computer viruses, but
they behave like viruses.

PRACTICAL WORK
THIS IS ONE OF THE MOST CRITICAL PRACTICALS.
LET’S PRACTICE HOW TO PERFORM A VIRUS SCAN WITH THE
ANTIVIRUS ON A COMPUTER
➢ Make sure you have an antivirus installed on your computer.
If you do not have it, let your teacher assist you to get the set
up of an antivirus software and install it.

➢ Go back to revise the notes on the steps involved in scanning


the computer with an antivirus.

➢ Follow the steps to scan and remove any identified virus.

➢ Did you find any virus or hidden threat on the computer? If


you did, I hope you have successfully removed all.

GOOD JOB! YOUR COMPUTER IS NOW SAFE TO USE

55
COPYRIGHT ETHICS
JHS 1 – TERM THREE

What is Copyright?
Copyright is a legal property right that protects the original works
of authors from being reproduced without their permission.

The institution that issues copyright protection in Ghana is the


Copyright Office of Ghana, which is headed by the Copyright
Administrator.
The symbol for copyright is ©

IMPORTANCE/USES OF COPYRIGHT
1. It promotes the progress of science, technology and arts.
2. It is used to encourage the creation of new intellectual works.
3. It is used to protect the intellectual property of authors or
creators.
4. It helps to prevent the unlawful duplication of creative works.

COPYRIGHT INFRINGEMENT

What is Copyright Infringement?


Copyright infringement is the act of reproducing an original work
without permission from the copyright owner.

Who is a Copyright Owner?


Copyright owner refers to the person to whom the work in a
copyright belongs.

Examples of Copyright Infringement:


1. Public display or exhibition of someone’s copyrighted item
(such as videos) without permission.
2. Reproducing identical copies of someone’s original work (e.g.
DVDs, clothing) without permission. This is known as piracy.
3. Removing or altering any information in a copyright work.
4. Distributing illegal copies of an original work.
5. Translating of an original work into another language without
permission.
6. Manufacturing, importing and exporting of someone’s work.
7. Renting of a copyright work without authorization.
8. Plagiarism.
56
What is Plagiarism?
This is the act of copying/stealing an author’s work and
representing it as your own original work.

Who is an author/creator?
An author is the person who creates an original work.

REASONS FOR COPYRIGHT PROTECTION


1. To protect the original works of authors from being reproduced
illegally.
2. To encourage people to feel secure in creating new things.
3. To ensure that original creators enjoy the full benefits of their
works.
4. To punish those who are found guilty of copyright infringement.

COPYRIGHT LAWS IN GHANA


The Copyright Laws of Ghana can be found in the Copyright Act, 2005
(Act 690). It was enacted on 17th May 2005.

Some of the critical points in the Copyright Laws of Ghana include;


➢ Works that qualify for copyright protection are:
(i) Literary work, (such as textbooks, poems and novels).
(ii) Artistic work (e.g. paintings, photography, sculptures).
(iii) Musical works
(iv) Audio-visuals, (such as movies.)
(v) Sound recordings
(vi) Computer software
(vii) Choreography (such as dance patterns or styles)

➢ Ideas, concepts and procedures do not qualify for copyright


protection.

➢ To qualify for copyright protection, the work must be:


(i) The work must be original.
(ii) The work must be expressed in material form (such as
written in a book or stored on storage media).
(iii) It should be created by a citizen of Ghana.

➢ The rights of an author are protected for the duration of


his/her life span and seventy (70) years after his/her death.

57
Other Laws of Ghana Relating to ICT

❖ PATENT LAWS:
A patent is a title granted to protect an invention.

What is an Invention?
An invention is an idea or product that provides solutions to a
specific product in the field of technology).

The patent laws of Ghana can be found in the Patent Act, 2003 (Act
657)

❖ TRADEMARK LAWS:
A trademark (™) is any sign or symbol that distinguishes one
undertaking of goods or services from the others

The trademark laws protect trademarks of goods and services from


being copied or used by other people. For example, OMO, Pepsodent,
Coca Cola, etc. are all examples of registered trademarks.

The trademark laws of Ghana can be found in the Trademark Act, 2004
(Act 664).

❖ MUSICIANS UNION OF GHANA (MUSIGA):


This is an association of musicians in Ghana that helps the government
to enforce copyright laws. MUSIGA helps to protect the musical works
of its members from being copied illegally.

EFFECTS OF COPYRIGHT INFRINGEMENT


(PUNISHMENT FOR BREAKING COPYRIGHT LAWS)
Under the copyright laws of Ghana, anyone who is found guilty of
copyright infringement will be punished. The penalties include:
1. Fines.
2. Imprisonment.
3. Confiscation and destruction of illegal items.

NOTICE:
This book, ‘KingLion ICT Simplified Notes for JHS 1,2 &3 – 2nd Edition is
also registered under the copyright laws. Those who reproduce it
illegally will face the penalties of copyright infringement!

58
THE INTERNET AND WORLD WIDE WEB
JHS 1 – TERM THREE

COMPUTER NETWORK:

What is a Network?
A computer network is a group of two or more computers
connected together for communication and sharing of information.

Types of Networks:
There are so many types of networks based on size. Some of these are:
1. Local Area Network (LAN): This is connection of few computers
in a small site, such as an office building.
This type of network can be found in schools, churches, local
community centers, etc.

2. Wide Area Network (WAN): This is the connection of several


computers or local area networks over a very large area, such as
an entire country.
WAN can be found in banks with branches across the country,
etc. It can consist of multiple LANs.

3. Metropolitan Area Network (MAN): This consists of computer


networks across an entire city or region.

4. Personal Area Network (PAN): This is the connection of


computers organized around an individual in a single building.

NB: The best example and largest form of Wide Area Network is
the internet because it covers the whole world.

CONCEPT OF THE INTERNET AND THE WORLD WIDE WEB

What is the Internet?


The internet is a global (worldwide) network of computers that
allows communication and sharing of information.

The internet can be simply called the ‘Net’

59
What is the World Wide Web(www)?
The World Wide Web is an internet service made up of
interconnected system of pages that contain information which can
be accessed through the internet.

The ‘World Wide Web’ is also simply known as the ‘Web’.

NOTE: The Internet and the World Wide Web are not the same. The
World Wide Web is only a small portion of the internet.

What is the Difference between the Internet and the World Wide
Web?
The internet is a large global network of networks of computers while
the World Wide Web is just one of several services that run on the
internet and also one of the means by which data can be transmitted
through the internet.

In other words, the World Wide Web is a subset of the internet.

OTHER SERVICES OF THE INTERNET

What are internet services?


Internet Services are the various means by which data is
transmitted through the internet.

The World Wide Web is one of the services provided by the internet.
There are other services that the internet offers which include:
➢ Electronic mail (e-mail): This is an internet service that
allows you to compose, send and receive messages from one
computer to another.
➢ File Transfer Protocol (FTP): This is the service that allows
you to transfer files from one computer to another directly
through the internet.
➢ Instant Messaging: This service allows you to use the internet
to chat with other internet services online.
➢ Internet Telephony: This service allows users to make voice
calls from one computer to another through the internet.
This service is also known as Voice-over-Internet Protocol
(VoIP).

60
FEATURES OF A WEB BROWSER
What is a Web Browser?
A Web Browser is the application program used to access
information on the World Wide Web through the internet.

Examples of Web browsers:


1. Google Chrome 6. Netscape Navigator
2. Mozilla Firefox 7. Maxthon
3. Microsoft Internet Explorer 8. Torch
4. Opera 9. K – Meleon
5. Apple Safari 10. UC Browser (for mobile)

Diagram Showing Main Features of a Web browser


(i.e. Internet Explorer)

A – Back button B – Forward button


C – Address bar D – Refresh/ Reload button
E – Stop button X F – Print button
G – Displayed Webpage H – Status bar

61
Functions of the Features of a Web Browser
Back button: It is used to return to the previously opened page.

Forward button: It is used to go forward again to a previously opened


page. (Note: This button is only activated to be used after the back
button has been used.)

Address Bar: This is where the website address is entered.

Refresh/Reload button: This button is used to reload in order to fetch


the latest content of the current page.

Stop button: This is clicked to stop loading the current web page.

Print button: It is used to print out the current displayed page.

LAUNCHING AND EXITING A WEB PAGE

How to Launch/ Open A Web Browser (e.g. Internet Explorer)


1. Make sure you have internet connectivity.
2. Click on the Start button to display the start menu.
3. Click on ‘All Programs’ on the start menu.
4. Click on Microsoft Internet Explorer on the programs menu, to
launch it.

How to Launch/ Open A Web Page.


(e.g. Webpage of government of Ghana: www.ghana.gov.gh )
1. Make sure you have internet connectivity.
2. Launch your web browser.
3. Type the web address in the address bar of the browser (e. g.
www.ghana.gov.gh) and Press Enter.

How to Exit (Close) a Webpage


1. Click on the 'Close button’ on the Web browser to exit.

ADVANTAGES AND DISADVANTAGES OF THE INTERNET


The internet is a very important tool. However, there are certain
problems associated with using it.

Advantages (Positive Uses) of the Internet


1. It gives access to more information in teaching and learning.

62
2. It helps individuals to communicate with each other faster and
easier. E.g. through e-mail.
3. It helps the government in international relations to learn about
other countries.
4. It helps businesses to advertise their products.
5. It helps the global community to buy and sell items through online
shopping.
6. It serves as a source of entertainment.
E.g. By playing music and watching videos on YouTube.
7. It helps in staying connected with others through social
networking.

Disadvantages (Negative Uses) of The Internet


1. It is a major source of spreading computer virus.
2. It is used to practice computer/internet fraud and cybercrimes.
3. Internet subscription and connectivity is expensive.
4. It is a source of pornography which promotes immorality.
5. It has no barriers; therefore confidential (secret) information
can be tapped.
6. It can lead to addiction and social isolation.
7. Excessive browsing of the internet is a waste of time.

What are Cybercrimes?


Cybercrimes are the criminal activities that are carried out by
means of computers or internet.

Those who are involved in cybercrimes do so through hacking,


computer viruses, spywares and other malwares.

Examples of cybercrimes are


1. Internet fraud 2. Cyberbullying 3. Identity theft

➢ Internet fraud: It is the act of scamming and stealing from


other people through the internet.

➢ Cyberbullying: It is the act of using the internet and social


media to harass or intimidate another person.

➢ Identity Theft: This involves stealing other people’s personal


information, then using that information to use their financial
resources without their consent.

63
INTERNET CONNECTIVITY
What is Internet Connectivity?
Internet connectivity refers to the means through which we can get
access to the internet.

In order to get internet access, the following must be available:


1. Devices:
a) Computer b) Modem or c) Router
2. Internet Service Provider (for internet connection settings)

What is a Modem?
A modem is a device that allows a computer to transmit data over
an internet technology such as telephone line or cable.

The full expression of modem is modulator – demodulator.

What Is an Internet Service Provider (ISP)?


An Internet service Provider (ISP) is an organization that provides
internet access to computer users at a subscribed fee.

Examples of Internet Service Providers in Ghana:


1. Vodafone Ghana 4. Surfline
2. Africa Online 5. MTN Ghana
3. Internet Ghana. 6. Busy Internet

NOTE:
➢ Smartphones do not always require separate devices like a
modem or router for connectivity.
➢ Also, we can connect directly over Wi-Fi (Wireless Fidelity)
when it is available.

Who Invented the World Wide Web?


The World Wide Web was invented by Sir Tim Berners – Lee, a British
computer scientist. He proposed the idea on 12th March 1989.
The first web page was then served on the internet in 1990.

Who Owns or Controls the Internet?


The internet is not owned by any particular person or organization.

However, it is guided by certain principles for using it effectively,


which are proposed by some organizations such as the World Wide
Web Consortium (W3C), and the Internet Society.

64
OTHER COMMON TERMINOLOGIES IN THE USE OF THE INTERNET
➢ Webpage: A webpage is a hypertext document that is
connected to the World Wide Web, which can be accessed
using the internet.
➢ Website: This is a location on the internet that consists of
several Webpages, which represent an individual or
organization.
The various web pages on a website are connected together
through hyperlinks.
➢ Hyperlink: A hyperlink is a text or image on a webpage that
sends you to another webpage when activated by clicking.
➢ Downloading: This is the process of transferring information
from a remote network (the internet) onto your local
computer.
➢ Uploading: This is the process of transferring information
from a local computer to a remote network (the internet).
➢ Hypertext Markup Language (HTML): This is the formatting
language used to create web pages on the World Wide Web.
➢ Uniform Resource Locator (URL): This is a special address by
which a web page is identified.
It is also called Uniform Resource Identifier (URI) or a website
(web) address.
➢ Hypertext Transfer Protocol (HTTP): It is the set of rules (or
protocol) used for formatting and transferring files on the
World Wide Web.

PRACTICAL WORK
RELAX FOR A BRIEF MOMENT AND GET READY TO DO SOME
ACTIVITIES ON THE INTERNET AND THE WORLD WIDE WEB.

Follow the systematic procedures above to practice the following:


I) Launch the Microsoft Internet Explorer web browser and
navigate through its features. You can practice testing
some of the features of the web browser as discussed
above.
II) Practice launching a given web page such as the web page
for the government of Ghana. i.e. www.ghana.gov.gh
III) Exit the web page.

Do this over and over again until you become well conversant
with the concept.

65
TECHNOLOGIES USED TO
ACCESS THE INTERNET
JHS 1 – TERM THREE

DEVICES USED TO ACCESS THE INTERNET


The main devices that can be used to access the internet are mainly;
a) A computer
b) Mobile devices, such as mobile phones, smart phones, tablets,
and personal digital assistants (PDA)
c) Modems (Modulator-demodulator)
d) Routers

These devices cannot connect to the internet by themselves unless


they are connected through certain technologies before we can use
them to access the internet.

That is why not all mobile phones can be used for browsing because;
they may not be having the required technology to access the internet.

TECHNOLOGIES USED TO ACCESS THE INTERNET

Some of the technologies by which we can have access to the internet


are as follows:
1. Satellite
This technology allows you to connect your computer to the internet
via a satellite that has been launched into space. To use this
technology, you have to buy a satellite dish and subscribe to get the
internet connection.

2. Telephone Lines
This involves the use of a live telephone line together with a modem.
With this, you create an account with an internet service provider (ISP)
who then gives you the settings to create the internet connection.

3. General Packet Radio Service (GPRS)


This is a wireless form of technology which is usually used by mobile
devices and computers to connect to the internet at a faster rate. This
technology is based on the Global System for Mobile communication
(GSM).

66
4. Enhanced Data rates for GSM Evolution (EDGE)
This technology is an enhanced form of the GPRS and so it allows you
to send and receive data on mobile devices at a faster rate than the
GPRS. It is therefore also referred to as Enhanced GPRS (EGPRS).

5. Cable Internet
This technology allows you to connect to the internet using the cable
that carries television signals. It makes use of a cable modem and an
Ethernet card.

6. Web TV
The web TV is a technology that provides access to the Web and E-mail
service through a television set. It also requires a special modem and
subscription to be able to connect to the internet.

What is the Difference between a Modem and a Router?


The modem is a device which allows transmission of data which
creates the internet connection while the router is a device that allows
you to share the internet connection among several devices.

67
THIS IS AN EXCERPT OF THE BESTSELLING
KINGLION ICT SIMPLIFIED NOTES
FOR JHS 1, 2, & 3 (2ND EDITION)

THE FULL BOOK IS UP TO 208 PAGES


COMPRISING ALL TOPICS IN THE CURRENT
GES ICT SYLLABUS FOR JUNIOR HIGH
SCHOOLS

YOU CAN ORDER FOR BULK COPIES FOR


YOUR PUPILS AND GET A COMMISSION
PLUS FREE TLMs

YOU CAN ALSO BECOME ONE OF OUR


PARTNERING DISTRIBUTORS IN YOUR
REGION. YOU CAN DO THIS AS A PART
TIME FRANCHISE BUSINESS.

FOR FURTHER DETAILS,


DO NOT HESITATE TO CONTACT THE
PUBLISHERS; CALL/ WHATSAPP:

0248113311
68
69

You might also like