Professional Documents
Culture Documents
DES 1150 - Computer Skills Course Notes (Combined)
DES 1150 - Computer Skills Course Notes (Combined)
DES 1150 - Computer Skills Course Notes (Combined)
A datum is a fact that is accepted at face value. Data is the plural for datum though it is
accepted to use it even in singular terms as data. Data is unstructured, lacks context and may
not be relevant to the recipient. When data is correctly organized, filtered and presented with
context it can become information because it then has "value" to the recipient.
Data which is not information (i.e.: has not yet informed or been given a context) is often called
raw data. Raw data are numbers, characters, images or other outputs from devices to convert
physical quantities into symbols, in a very broad sense. Data happens to be raw facts and
figures that are meaningless until when processed, for example meter readings collected for a
water company, hours worked by employees in a factory, in a banking system, bank charges,
commission etc. Such data are typically further processed by a human or input into a computer,
stored and processed there, or output to another human or computer. This transforms it into
information. Note that data processed at one stage may be the input data for another stage.
The conversion of data into information is called data processing. The diagram in figure 2 below
depicts the most common representation of the computing model: inputs are taken in and
processed (manually or electronically) to produce outputs.
Information is a term with many meanings depending on context, but is as a rule closely related
to such concepts as meaning, knowledge, instruction, communication, representation, and
mental stimulus. Simply stated, Information is a message received and understood.
In computing terms, information can be defined as a collection of facts from which conclusions
may be drawn. It is the result of processing, manipulating and organizing data in a way that adds
to the knowledge of the person receiving it.
4
Information is raw facts and figures that are meaningless until when processed. Examples of
information based on the above data are; water bills, a pay slip and a bank statement.
In information processing, a logical data file is a collection of records with similar characteristics.
Examples of data files include the sales ledger, purchases ledger etc
A record in a file consists of data relating to one logically definable unit of business information.
A collection of similar records makes up a file. For example, the records for a sales ledger file
consists of customer reference number, balance owing and credit limit field
Records in files consist of fields of information, for example, a customers record on the sales
ledger file will include name, address, balance owing.
Records on a file should contain one key field. This is an item of data within the record by which
it can be uniquely identified, for example man number, account number, NRC number and
examination number
Files are conveniently classified into transaction files, and master files
• A transaction file contains latest activities of a business, and it’s the one that is used to
update the master file. Once updating has taken place the file is discarded. In batch
systems, transactions can be bundled up manually or kept in an electronic form but
would only be used on a certain date to update the electronic master file. Transaction
files are at times called by different names such as, changes file, movements file and
amendments files
• A master file is a semi permanent file that is periodically updated by a transaction file in
order for it to show its current status, for example a payroll master file and customers
master file. The updating times vary depending on the application, say weekly,
fortnightly or monthly. In the case of the cinema, this will happen immediately a
transaction occurs.
• Reference file, is also known as standing data file or table file. This contains data that is
“permanent” in nature because it usually changes after along periods of time such as a
5
year, for example tax table, price list and tariff tables. This file is usually referred to
when a transaction file is updating a master file.
• Sort file, these are temporal files that are used as an intermediary during file updating
• Planning: a forward looking application of information with a view to setting the long-
term objectives of the organisation and meeting long-term targets. Typically information
used in this role will focus on forecasting, historical analysis and will often be qualitative
and quantitative but may also be subjective. It is most likely to be used by senior
managers for strategic purposes
• Control: where the main focus is to ensure that the actual results and performance of
the organisation match the objectives and targets set at the planning phase. Such
information can be used to identify problems and performance that exceeds
expectations. This tactical application of information is the role of middle managers who
also act as the nerve centre of the company passing information up and down the
organisation. This information is characterised by standard summarised reports and
targeted or ad-hoc exception reports.
• Operating: a daily application of information to assist in the day to day running of the
organisation. This operational use of information, mainly by supervisors and junior
managers provides the basis for the information used for control and planning. It is also
this information that will be adjusted to react to or reinforce the problems or
exceptional performance identified by the control process.
Table 1 below summarises the characteristics of information in relation to its use at the various
levels of management within an organisation. What is clear is that information that is used
regularly must be accurate and as such is often acquired from a very narrow pre-defined source.
Information that is used infrequently tends to come from a wider external and undefined source
and this is likely to make far less accurate but nevertheless provides a more general view which
will help shape future decision-making. Such information is likely to be aggregated or
summarised before being presented to the users with irrelevant facts filtered out.
6
Interpreting Information
For information to be useful across the entire organisation, it is important to get a clear and
common understanding of what it means. This implies being able to classify and measure it.
Information can be classified as Qualitative and Quantitive:-
a) Qualitative information: is difficult to assign a numerical value to. It refers to things like
morale, attitude, likelihood, intention to buy and many other such things which are
subjective and may not necessarily result in the same answer for the same conditions at
a later date. Strategic planning however, must still take this information into account
despite the highly likely element of inaccuracy.
i. Quantifying qualitative information: is necessary if the entire organisation
wants to achieve a common interpretation. This can be done by applying a
grading scheme at the point of acquiring the information (e.g. using a scale of 1
to 5 did you enjoy the lecture 1 is did not 3 is neutral and 5 is very much).
ii. The problem with this approach is that it is possible to ask the same questions
later and get a different answer. It also assumes the questions asked are the
right ones and that all possible replies are included.
b) Quantitative information: on the other hand is that which can be expressed in
numerical terms. It is used across all the different management levels.
iv. Redundancy this can be a problem if there is too much redundancy or too little
redundancy
a. It may be intentional e.g. giving both a verbal and written warning to an
employee
v. Understandable: can it be read and interpreted correctly. This means addressing these
issues
a. practicality (do not present too much than is practical to absorb)
b. simplicity
c. minimization of perceptual errors
d. difficulty with encoding (does the reader understand spreadsheets)
vi. Freedom from Bias: information presented with accompanying text or verbal
explanation that is likely to encourage the reader making a supporting decision
vii. Reliability
a. are you sure the information is correct
b. verifiability (can we prove it is correct or at least reproduce it)
viii. Decision-Relevance
a. predictive power as in repeating monthly production figures
b. significance (e.g. exception reports showing large variances)
ix. Cost-efficiency
a. need to consider the change in the decision behaviour after obtaining the
information minus the cost of obtaining it
x. Comparability: last year vs. this year analysis is usually affected by this
a. consistency of format
b. Consistency of aggregation: e.g. are we comparing “like for like” sales or is there
another product or condition this year that we did not have last year that has
skewed the figures.
c. consistency of fields
xi. Appropriateness of format
a. medium of display and transmission e.g. VDU, email, printout
b. ordering of the information
c. graphical vs. tabular display
d. Quantity: more is not better!
Analogous to the data processing model of Figure 1, an organisation gathers inputs from the
environment, to which it adds value by using its employees or members and internal processes
to generate outputs back into the environment.
As Figure 2 illustrates, the organisation takes inputs from suppliers, governments, industry
regulators, customers and partners, the environment, the market and other exchanges and
transforms these into outputs. The inputs may be raw materials which then become products
but these inputs are also data and information which the organisation may gather, generate, use
or disseminate.
Consider something like the price of a product that a business sells. The cost information is
collected from the supplier. After adding its own value, the employees tag on a cost related to it.
The organisation then takes in prices from competitors and perhaps pricing guidelines from the
regulator before setting its own price. Government legislation means adding VAT to the price.
Finally the price is published to the market using advertising methods devised by its partners
such as an advertising agency. Later lobbyists might pressure the business to lower or increase
the price by demonstrating that doing so would reduce damage to the environment or help a
social cause.
What the pricing example demonstrates is that data and information come from the
environment in which an organisation is doing business and also from within the organisation
through its processes and employees. The very process of doing business provides the sources of
data and information that an organisation will typically use to create products from raw
materials.
9
The activities of an organization are split into functional roles of employees and business
processes which are the routines or tasks that the employees perform. More often than not
because of division of labour and specialization, groups of sequentially related tasks are grouped
together into specific functional units or departments. The split of tasks is essential for
efficiency. The value chain model (see Figure 3) as described by Michael Porter is one of the best
ways of looking at the activities of a business.
Inbound logistics concentrates on the supply side of the business including purchasing and
storage of goods or raw materials, production planning, quality and stock control.
Operations refer to all those processes and activities that take place in order to convert inputs
into outputs. Examples include manufacturing or assembly plants. In hospitals the process of
making appointments to see a doctor and scheduling and performing surgery would be classified
as operations.
Outbound Logistics refers to all the activities required to deliver the finished goods to
customers and include warehousing techniques, stock control and transportation.
Sales and marketing refers to the activities that a firm engages in so that it can: inform the
customers of its intent to trade its products in the market; match the needs of the customer to
the characteristics of its products or services; and capture and fulfil demand. Sales & marketing
10
is all about communication with the customers and setting strategy on issues such as what to
sell, where to sell and at what price. Services or after-sales service refers to the activities that an
organization engages in so that it can support the sale of goods in the market. It includes issues
such as reverse logistics (managing customer returns), selling parts over the lifetime of the
product and customer support (reaction to product failures or training).
The value chain model also lists a variety of support activities. These activities are necessary in
order to keep the organization running. These activities include:
• Human resource management: performs the tasks of hiring and managing the human
labour and developing the firm’s intellectual capital (e.g. promotion and training).
• Technology development: includes IT infrastructure, software, research and design
processes and information management
• Procurement: covers the finance and accounts department which ensures that the
organization has the cash required to run all the operations and the resources needed
to continue production. Typically procurement is concerned with inputs that are not raw
materials or directly related to the production process e.g. printer paper, pens, office
computers
The activities of an organization are split into functional roles as illustrated by the value chain
model. These functions or departments of organisations can often become information and
operation silos whose objectives can sometimes be in conflict with one another. To illustrate,
the inbound logistics team have as an objective the need to keep stock levels as low as possible
in order to avoid obsolescence and reduce costs. The sales team on the other hand need to
satisfy customers quickly and one of the best ways is by keeping a high level of stock. The sale of
stock must be recognised by logistics so as to replenish it on time in the warehouse. At the same
time, the arrival of stock in the warehouse must be recognised by the sales team to ensure that
they start selling it early to keep levels optimised. If both these departments were to operate in
“information silos” the organisation would experience excessive stock levels on some products
and stock-outs on others. Information is passed between departments both formally and
informally and even automatically by computer and machine systems. These department
linkages ensure process and resource optimisation (e.g. stock). To achieve this, the departments
must share information between one another and thus they become the sources and
destinations of information between one another.
Information Flows
11
The information from one department often forms the information inputs for another
department and if anything it is likely that information flows both ways between departments.
Studying organisation information flows is the key to developing good computer systems and
optimising the performance of an organisation.
Consider the workings of a complex organisation structure like the intellectual communities in
higher education. In this ecological structure, researchers, lecturers and teachers generate
intellectual output. Information is released as publications in peer reviewed journals while other
actors in the cycle perform the role information aggregators providing access to indexed
information which is used by the information generators to make new discoveries and improve
on older work by accessing past information provided by the aggregators. This cycle of
information flow has accelerated the advance of science allowing mankind to avoid having to re-
invent the wheel every step of the way and to use the knowledge of a vast number of people
past and present.
Definition of a computer, this is an electronic device that is made up of input devices such as
the keyboard and is used to capture data and instructions, with the help of sets of instructions it
will be able to produce results or output through devices such as printers or screens. A
computerised information system on the other hand is a business application of the computer.
It is made up of the database, application programs and manual and machine procedures. It also
encompasses the computer systems that do the processing.
The database stores the subjects of the business (master files) and its activities (transaction
files). The application programs provide the data entry, updating, query and report processing.
The manual procedures document how data are obtained for input and how the system's output
is distributed. Machine procedures instruct the computer how to perform scheduled activities, in
which the output of one program is automatically fed into another
a) Supercomputers
b) Mainframe computers
c) Minicomputers
d) Microcomputers, commonly called PCs
(a) A supercomputer is used to process very large amounts of data very quickly. They are
particularly useful for occasions where high volumes of calculations need to be
performed, for example in meteorological or astronomical applications.
(b) A mainframe computer system uses a powerful central computer, linked by cable or
telecommunications to terminals. A mainframe has many times more processing power
than a PC and offers extensive data storage facilities. Mainframes are used by
organisations such as banks that have very large volumes of processing to perform and
have special security needs. Many organisations have now replaced their old
mainframes with networked ‘client server systems of mid-range computers and PCs
because this approach is thought to be the cheaper and offer more flexibility
(c) A minicomputer is a computer whose size, speed and capabilities lie somewhere
between those of a mainframe and a PC. The term was originally used before PCs were
developed, to describe computers which were cheaper but less well-equipped than
mainframe computers. With the advent of PCs and of mainframes that are much smaller
14
than in the past, the definition of a minicomputer has become rather vague. There is
really no definition which distinguishes adequately between a PC and a minicomputer.
(d) Microcomputer or PCs are now the norm for small to medium-sized business computing
and for home computing, and most larger businesses now use them for day-to-day
needs such as word processing. Often they are linked together in a network to enable
sharing of information between users.
Portables
The original portable computers were heavy, weighing around five kilograms, and could only be
run from the mains electricity supply line. Subsequent developments allow true portability.
b) The palmtop or handheld is increasingly compatible with true PCs. Devices range
from basic models which are little more than electronic organizers to relatively
powerful processors running ‘cut-down’ versions of Windows and Microsoft Office,
and including communications features.
Many computers have been designed to achieve faster computational speeds, using different
architectures.
Maths co-processor and Graphics co-processor. Most processors may include specialized and
faster processors (a maths co-processor/graphics co-processor) can be used for applications
requiring high-speed mathematical or graphics computations. Such applications could be
spreadsheet calculations or complex computer-aided design (CAD) work. The maths co-
processor supports the main processor by performing the required calculations more rapidly
than the main processor. In the same way, the graphics co-processor is designed to perform
graphical functions, such as the construction and maintenance of images much faster than the
main processor. The co-processors are under the control of the main processor.
Pipeline machines. In the pipeline machine architecture each stage in the fetch-executive cycle
is handled by a separate machine hardware unit. The first unit fetches an instruction from
15
memory. At any one time there may be four or five instructions within the processor each at
different stages of execution in different units.
Array processor. In the array processor there is one control unit but multiple ALUs, which are
able to work in parallel with one another. They are particularly suited to applications in which
sets of values require the same operation to be performed on each value, e.g., converting every
value in a table to a percentage of the total.
Information Systems is the discipline concerned with the development, use, application and
influence of information systems. An information system, following a definition of Langefors is a
technologically implemented medium for recording, storing, and disseminating linguistic
expressions, as well as for drawing conclusions from such expressions.
The technology that implements an information system need not be a computer technology.
The term “information systems” means the computers, communications facilities, computer and
communications networks, and data and information that may be recorded, processed, stored,
shared, transmitted, or retrieved by them, including programs, specifications, and procedures
for their operation, use and maintenance.
Thus an accounting system will include the application e.g. SAGE Line 500 or SAP, the input
devices like bar code readers for scanning in electronic sales, output devices like printers and
the local area network that joins different parts of the system together.
Information systems and in particular business information systems have changed over the last
forty years from performing information processing tasks in the 1950s and 60’s into a strategic
planning and decision making role in the late 90’s and implementing new business models in the
21st century.
In the 1950s and early '60s computing was based around the mainframe computer. The
mainframe was itself a vast machine implemented across acres of space consuming large
quantities of electricity and initially implemented with valve-based technology. This meant that
only the largest organizations (government, big corporations) could afford to own and run them.
Information systems of this era were therefore specialized and typically used to tackle specific
number-crunching problems. Referred to as “electronic data processing systems”, they were
used to record and store accounting information such as ledger accounts. This was strictly an
operations support role.
The invention of the transistor by William Shockley is perhaps one of the greatest inventions of
modern history. This is because the transistor is cheap to build, small, flexible, and reliable and
can be integrated into other electronic circuits. Transistors replaced electronic tubes (valves)
and suddenly the cost and power consumption of computer equipment became affordable for
more organisations.
16
Thus the late 1960s saw the advent of the minicomputer. Cheaper than the mainframe, more
organizations could now afford computing power. In the 70’s new programming languages C
and improved operating systems with multi-tasking capabilities (UNIX, MVS for the IBM OS/360)
led to changes in the role of information systems. These machines could perform more than one
task at once and for multiple users (time sharing). More people now had access to information
systems and though they were costly they could now be applied to different problems like
generating a limited range of predefined reports accounting reports such as the profit and loss
accounts, balance sheets, cash flows and sales reports. The aim was specifically to help
management track their performance and make changes. This was the beginning of information
systems as decision support tool and they were called “management information systems”.
The Integrated circuit or IC was developed independently by Jack Kilby (Texas Instruments) and
Robert Noyce (Fairchild Semiconductor) in 1959. The integrated circuit allowed for multiple
transistors to be implemented on a single semiconductor wafer of chip. Early technology or
small-scale (SSI) to medium scale (MSI) integration meant that tens to thousands of transistors
could be placed on a single chip. In 1980 VLSI or Very Large Scale Integration enabled millions of
transistors to fit on a chip and for the first time a whole microprocessor, the computer could be
implemented on a single chip. VLSI led to the birth of the microcomputer and the introduction
of decentralized computing.
Prior to this point, an organization would have one large mainframe computer and users would
submit a job to the computer department for batch processing and waiting for job schedulers
and operators to perform the procedure. The advent of the personal computer, specifically the
IBM PC and its compatible rivals meant organizations could afford computing power for
individual users and these users could now process information for their own specific area or
purpose in the organization.
Decentralized computing led to the fragmentation of information. Not only did many users
generate a lot of different information about the company, many generated different
information about the same things. This information overload led to the introduction of
“executive information systems”. They streamlined the process, giving the executive exactly
what they wanted, and only what they wanted. If done properly the EIS worked and gave an
organization a clear picture of what was going on and what decisions to make.
The 1980s also saw the first commercial application of artificial intelligence techniques in the
form of “expert systems”. These programs could give advice within a very limited subject area.
Expert system were supposed to help decision making support, but in practice were limited by
the knowledge of the expert and the ability of the systems to capture the knowledge of the
expert and use it in the correct context.
In the 1990s strategy became an important business subject taught across universities and led
by luminaries such as Michael Porter, Prahalad and Hamel and Tom Peters. Using IT to gain
17
sustainable competitive advantage became a big issue and led to the introduction of “strategic
information systems”.
During the late 1980s and all the way through to the 1990s a new approach to computing was
developed based on placing the application at the server and getting users to access it from a
client. Termed client-server technology, it culminated in the development of a system in which
applications were accessed via a common interface called a browser which worked in exactly the
same way from whatever computer system was used. This development was to create a whole
new phenomenon called “The Internet”. What is less well-know is that the success of this new
computing model depended on several inventions: “Ethernet” developed in 1972 by Xerox;
“hypertext” developed by Tim Berners-Lee at CERN in 1992 and the “Internet Protocol”
developed in 1969 by the Defence Advanced Research Projects Agency (DARPA) in the USA.
Ethernet enabled computers to be connected together in a local area network or LAN. This
made it possible to coordinate information across many systems and made decentralized
computing workable. The Internet Protocol which is a communications standard, became the
de-facto standard and together with Ethernet allowed data exchange to occur smoothly
between organisations. The invention of hypertext and the “World Wide Web” (WWW) finally
brought the power of the internet to the masses and with it a whole range of new applications.
By the latter part of the 1990s and the new millennium, the role of business information
systems had now expanded. These systems no longer just supported business and helped make
strategic choices; the systems became business models in themselves and led to the
commercialization of the Internet, and the advent of intranets and extranets.
The future will see the rise of supply chain management systems which focus more on processes
than they do on functional units in order to achieve the aim of the process and hence the
company as opposed to the aims of department or functional “silos”. This development already
underway has led to the rise of topics such as “business process reengineering” championed by
the likes of Hammer and Champy and “total quality management”. Today’s management
information systems carry names like Customer Relationship Management (CRM) and Supply
Chain Management (SCM) systems.
Table 1summarises the relationship between management systems, information systems and
computer systems which when put together form a computerized information system.
18
Information System
Database Defines Data Structures
Applications Data entry, updating, queries and reporting
Procedures Define data flow
Computer System
CPU Processing
Peripherals Store, retrieve, display
Operation System Control the entire system
Both manual and computer information processing can be divided into two broad types; namely
batch and real time processing. Batch processing are becoming less common, periodically if the
process concerned have an impact on customers.
Batch processing system, this is a system where data is collected, accumulated for a certain
interval period of time such as weekly or month, and then these transactions are captured as a
unit in order to update the master file. Examples of systems that use batch are payroll, water
billing, and final accounts preparation and examination results production. Because data is not
input as soon as it is received the system will not always be up-to-date.
Real time processing occurs when data is collected and captured right away so that the results
of the processing are known right away. This type of processing is commonly used in banks,
cinema system and student registration.
Online processing involves transactions being input and processed immediately, in ‘real time’.
On-line refers to a machine which is under the direct control of the main processor for that
system. The term ‘on-line’ is also used to describe an active Internet connection. On-line, real-
time processing is appropriate when immediate processing is required and the delay implicit in
batch processing would not be acceptable. On-line systems are practically the norm in modern
business. Examples include the following
19
b) In banking and credit card systems whereby customer details are often maintained
in a real-time environment. There can be immediate access to customer balances,
credit position etc and authorization for withdrawals
c) Travel agents, airlines and theatre ticket agencies all use real-time systems. Once a
hotel room, plane seat or theatre seat is booked up everybody on the system must
know about it immediately so that they do not sell the same holiday or seat to two
or more different customers.
• Education
• Agriculture
• Business(Marketing, Sales)
• Mining
• Real Estate
• Robotics Science
Technological advances in society has had the following effects on society and businesses
a) The type of products or services that are made and sold. For example, consumer
markets have seen the emergence of home computers, compact discs and satellite
dishes for receiving satellite TV; industrial markets have seen the emergence of custom-
built microchips, robots and local area networks for office information systems.
20
b) The way in which products are made. There is continuing trend towards the use of
modern labour-saving production equipment, such as robots. The manufacturing
environment is undergoing rapid changes with the growth of advanced manufacturing
technology. These are changes in both apparatus and technique.
c) The way in which services are provided. High-street banks encourage customers to use
’hole-in-the-wall’ cash dispensers, or telephone or PC banking. Most large shops now
use computerised Point of Sale terminals as cash desks. Many organisations are starting
to use e-commerce: selling products and services over the Internet.
d) The way in which employees are identified. Database systems make it much easier to
analyse the market place.
g) The paperless office. There might be less paper in the office (but not necessarily so)
with more data-processing done by keyboard. Data handling is likely to shift from the
traditional movement of paper to the storing of data electronically.
h) Routine processing, the processing of routine data can be done in bigger volumes, at
greater speed and with greater accuracy than with non-automated, manual systems.
j) Organisation structure, the structure might change. PC networks give local office
managers a means of setting up a good local management information system and
localized data processing while retaining access to centrally held databases and
programs. Office automation can therefore encourage a tendency towards
decentralization of authority within an organisation. On the other hand, such systems
help head office to keep in touch with what is going on in local offices.
21
The way accounts personnel deal with invoices would affect the way they work in an
organisation. Instead of sending each other transactions in the form of invoices and
statements, details of inter-company transactions are sent via telecoms links avoiding
the need for output and paper at the sending end.
n) The Internet, the introduction of the Internet has allowed workers to search for
information as well as use email facilities in communicating with customers at a faster
and efficient rate. Attachments can be emailed.
o) Voice messaging systems, these systems answer and route telephone calls. Typically,
when a call is answered a recorded message tells the caller to dial the extension
required, or to hold if they want to speak to the operator. Sometimes other options are
offered, such as press 2 if you want to know about X service and 3 if you want to know
about Y.
This section defines a computer and looks at computer architecture, the components of
a computer and how it works. It also discusses how the peripherals attached to a
computer achieve the input, storage and output necessary to create and operate
computerised information systems.
The computer and all equipment attached to it are called hardware. The instructions
that tell it what to do are called "software." A set of instructions that perform a
particular task is called a "program" or "software program." The instructions in the
program direct the computer to input, process and output as follows:
• Input/Output The computer can selectively retrieve data into its main memory
(RAM) from any peripheral device (terminal, disk, tape, etc.) connected to it. After
processing the data internally, the computer can send a copy of the results from its
memory out to any peripheral device. The more memory it has, the more programs
and data it can work with at the same time.
• Storage By outputting data onto a magnetic disk or tape, the computer is able to
store data permanently and retrieve it when required. A system's size is based on
how much disk storage it has. The more disks, the more data are immediately
available.
• Processing The computer performs all processing by "calculating," "comparing" and
"copying" the data stored in its memory (RAM).
(a) Calculate: The computer can perform any mathematical operation
on data by adding, subtracting, multiplying and dividing one set with
another.
(b) Compare The computer can analyze and evaluate data by
matching it with sets of known data that are included in the program or
called in from storage.
(c) Copy: The computer can move data around to create any kind of
report or listing in any order.
By calculating, comparing and copying, the computer accomplishes all forms of data processing.
Most modern computers are based on an architecture created by IBM which they called the IBM
PC (Personal Computer) and licensed. Despite all the modern increases in power, memory and
speed, all modern machines are based on fourth generation microprocessor technology.
A. Computer Hardware
The CPU is composed of a control unit and arithmetic and logic unit and input/output registers.
The function of the control unit is to fetch and execute programming instructions. It fetches the
next instruction and loads it with associated data into the registers and either performs move,
modify, or store actions. If a computation is required, it instructs the Arithmetic and Logic Unit
(ALU) to perform the action and receives the results and places or outputs them to the correct
registers.
The von Neumann architecture (Figure 2) on which the CPU is based is limited by the speed of
the bus. The CPU is faster and can output more than the bus can carry. While connected
peripherals are even slower. This has led to a permanent quest to find ways to improve the
speed of the bus so that programs can load more instructions and data to utilise CPU speeds.
Thus there have had to be modifications to the von Neumann model.
Firstly there is a permanent request to increase the size of internal storage as in doing so more
of the program can be loaded there at once. Then there is the use of caching to hold instruction
data and results on the same chip as the control unit for extra speed and the implementation of
a faster front side bus for accessing registers (RAM) and separating it from the slower
peripheral bus.
Modern computers also use pipelining. This involves loading more than one instruction in the
instruction registers and beginning the execution process before it is required. This is because
most programs include if … then … else statements. 60% of the time the “then” part is executed
and this is the code in the pipeline. The net effect is to make the CPU operate faster.
All modern computers implement virtual memory techniques. When a program is being
executed, only the code that is currently in focus is required in the CPU. Thus it is possible to
26
load the instructions from more than one program in the CPU at the same time and have only
the code that is in focus with the rest stored on disk and called when required. Virtual memory
is what makes the computer behave as we know it today. It allows for an operating system like
DOS, Windows, UNIX or Linux to be in memory and control applications which are running
together with it making it easy for users who are not competent with computer programming to
run one or more applications at the same time by simply swapping them in and out of memory.
Another technique associated with the deficiencies of the von Neumann model is spooling or
buffering. Since the peripherals are slow, a program writing to a disk or waiting for printer
would hold up the CPU. Instead, the CPU can write the output for the printer to a spool file
which is actually a location on a disk and the printer would then pick up what to print form this
file without the CPU having to wait for the printer. This allows the CPU to process other jobs in
the pipeline.
All of the computer logic is implemented on a printed circuit board usually referred to as the
motherboard (see Figure 3).
Peripherals are connected to the CPU by the system bus and specific hardware ports (e.g. PCI
slots or device headers) which are placed on the motherboard. They allow the computer to
communicate with the outside world by taking inputs from devices like a mouse or keyboard
and display outputs to printers and visual display units e.g. a monitor or projector.
27
The processor
The processor is the brain of the computer. The processor may be defined as follows;
it’s the nerve centre of the entire computer system as it is in charge of all the operations
of the machine. It is divided into three elements namely:
The processing unit may have all its elements – arithmetic and logic unit, control unit,
and the input/ output interface on a single “chip”. A chip is a small piece of silicon upon
which is etched an integrated circuit, on an extremely small scale
The chip is mounted on a carrier unit which in turn is ‘plugged’ onto a circuit board –
called the motherboard – with other chips, each with their own functions.
28
The most common chips are those made by Intel Company. Each generation of Intel CPU
chip has been able to perform operations in fewer clock cycles than the previous
generation, and therefore works more quickly.
All chips containing circuitry that controls the computer and also the computer memory
chips are found on the system board. The motherboard, also called the main board, is a
circuit board whose task is to link all the other chips of the computer. Any expansion
boards that should be installed in the computer are fitted into expansion slots which
hold the boards in place. The slots also give the boards an electronic link to the
motherboard
The processor receives program instructions and sends signals to peripheral devices.
The signals are co-ordinated by a clock which sends out a “pulse’ – a sort of tick-tock
sequence called a cycle – at regular intervals
The number of cycles produced per second is usually in MegaHertz (MHz) or GigaHertz
(GHz)
29
Memory
The computers memory is also known as main store or internal store. The memory will
hold the following.
• Program instructions
• The input data that will be processed next
• The data that is ready for output to an output device
Memory address
Memory address. Memory address refers to storage locations that are found in
memory. Each computer memory has several memory locations which are used to store
data. Since the data needs to be retrieved at a later time so that it can be processed, a
way of finding it uniquely and quickly is needed. For this reason, each memory location
is allocated an identification number by which the memory location is uniquely
identified. This identification number is the address of the memory location. This
concept can be compared to that of our postal addresses.
Core store
Core store is the type of main memory that was used in computers in the early days of
computing. The core itself was a small ring of iron. A wire passed through the core.
Current should be passed in this wire in such a way that the core was magnetized, either
north or south. To represent data, for example, a core magnetized to be North Pole
would be holding a one (1) and the core magnetized as South Pole would be holding a
zero (0). An extra wire was made to go through the core. This wire was meant to sense
the magnetism of the core and so read the stored values from the core
30
Each individual storage element in the computers memory consists of a simple circuit
which can be switched on or off. These two states can be conveniently expressed by the
numbers 1 and 0 respectively
Each 1 or 0 is a bit. Bits are grouped together in groups of eight to form bytes. A byte
may be used to represent a character, for example a letter, a number or another symbol
Business PCs now make use of 2 bit processors. But simply, this means that data travels
around from one place to another in groups of 16 or 32 bits, and so modern PCs operate
considerably faster than the original old 8 bit models
The processing capacity of a computer is in part dictated by the capacity of its memory.
Capacity is calculated in kilobytes (1 kilobyte = 210 (1,024) bytes and megabytes (1
megabyte = 220 bytes) and gigabytes (230). These are abbreviated to Kb, Mb and Gb.
RAM
Random Access Memory is memory that is directly available to the processing unit. It
holds the data and programs in current use. RAM in microcomputers is ‘volatile’ which
means that the contents of the memory are erased when the computers power is
switched off.
RAM on a typical business PC is likely to have a capacity of 1 Gigabyte. The size of the
RAM is extremely important. A computer with 1 GHz clock speed and 512 megabytes of
RAM will not be as efficient as a 2 GHz PC with 1 Gigabyte of RAM
Most of the computer’s immediate access storage (IAS) is RAM (Random Access
Memory). RAM holds the data, information and instructions that the computer needs in
performing particular tasks. During the execution of any program (instructions), that
31
particular program or part of it has to reside in the RAM memory. The data which the
program is supposed to manipulate and transform into information is also stored in the
RAM memory during processing. The information and also the intermediate results of
processing will also be kept in the RAM before they are finally stored on disk, displayed
on screen or printed. A part of the operating system is also stored in RAM during the
time the computer is in operation. When your computer reads information from a disk,
it stores that information in RAM. In other words, RAM is that storage (memory) which
holds all data and instructions that the computer needs to carry out its current work. A
disadvantage of RAM is that it is temporary storage and when you turn the computer off
all the contents of RAM is lost (unless you have saved the contents to an external,
permanent storage medium). For this reason, RAM is referred to as being volatile
storage.
Cache
The cache is a small capacity but extremely fast part of the memory which saves a
second copy of the pieces of data most recently read from or written to main memory.
When the cache is full, older entries are flushed to make room for new ones.
Mostly, cache memory is used to hold data such as variables of executing programs and
also the parts of a program code that may be required too often for execution. The
main purpose of the cache memory is to bridge the speed imbalance between the
processor and the main memory. The data or program parts that will be required next
in the processing cycle are fetched well in advance from the main memory and placed in
the cache for the processor to find them quickly. In this way, data and program parts
are swapped back and forth between the main memory and cache memory. Although
expensive, the use of cache memory improves the performance of the computer
tremendously because access to cache memory is much faster than to main memory.
32
ROM
Read Only Memory is a memory chip into which fixed data is written permanently at the
time of its manufacture. When you turn on a PC you may see a reference to BIOS (Basic
Input/ Output System). This is part of the ROM chip containing all the programs needed
to control the keyboard, screen, disk and so on.
Read Only Memory (ROM) makes a smaller part of your computer’s immediate access
storage (IAS). ROM storage is permanent. As such, ROM holds that kind of data and
instructions that the computer needs regardless of the task it performs. The computer’s
basic instructions that tell a microprocessor chip how to perform its functional
operations are stored in ROM. Since ROM storage is permanent, its contents are also
not lost even when power is switched off. Consequently, you can not alter the contents
of ROM in any way other than destroying the ROM chip. ROM is therefore non-volatile.
Since ROM holds the basic instructions that the computer needs in order for it to
operate, it is important that ROM is non-volatile and its contents are non-alterable. This
is a vital safeguard to keep your computer operating properly.
ROM has got other variations. These are the PROM, EPROM and the EEPROM. PROM
(Programmable Read Only Memory) is a type of memory which can be programmed
only once. PROMs are bought without programs (empty). They are programmed by the
user special equipment but once they are programmed, the contents cannot be
changed. PROMs can only be programmed once. Of course, users would require chips
that can be erased and reprogrammed. This demand led to the development of
erasable PROMs. The erasable programmable read-only memory (EPROM) is usually not
programmed by the manufacturer. Once they are programmed, EPROMs require ultra-
violet light and some special equipment in order for their contents to be erased. This is
a vital safeguard against accidental erasure. An EEPROM is an electrically erasable
PROM.
Virtual memory
while the rest of the program is on some direct access secondary storage (e.g., disk).
When the next part of the program is needed for execution, it will be loaded into
memory and it will overwrite the previous part and continue being executed. This
technique gives the impression that the main memory is very large, when in actual fact
it is small. Hence he term virtual memory. Virtual memory makes efficient use of the
main memory.
The notable differences between the main memory and backing storage are shown
below:
Input Devices
Computers take inputs and process them into outputs. An input device is a peripheral device
that generates input for the computer such as a keyboard, scanner or mouse.
34
There are in general three classes of data input: online; offline; and task-specific. The type of
input device used depends entirely on the application and the urgency of the inputs.
• Online data input: This is the most common method. The user inputs data directly onto
a backing storage device. In many cases this is the preferred method of input with data
being captured in real-time as instances of it are generated or occur.
• Offline data input: is used when it may not necessarily be desirable (economic), practical
or possible to capture data online. It involves the gathering and preparation of data
away from the computer which is then converted into machine-readable format by a
device and finally the machine-readable format is input to backing store.
• Application-specific input: A computer or a specialised microprocessor can be used to
read specific pre-formatted information. This form of input is now becoming more
common particularly in reducing errors and costs as the machine being used to input the
information is faster than humans, will generate fewer errors and is likely to capture the
information at the earliest possible opportunity.
Online Input Devices are typically general purpose and can be used with more than one
application. They allow the user to issue instructions or enter data to a computer at their point
of choosing. Examples of online input devices include but are not limited to:
• Keyboards
• Pointing devices: Mouse, Stylus, Light Pen, Light Gun, Touch screens
Offline Input Devices are usually associated with batch processing and include but are not
limited to:
• Punched cards
• Key-storage systems
These systems are no longer in common use with online input being the preferred method.
Application-specific Input Devices are characterised by the fact that they work only in a specific
context and can not be applied in general situations. Examples include:
35
• Barcode readers
• Laser scanners
• Image scanners
Automatic number plate recognition (ANPR) systems for mass surveillance operations,
which use Optical Character Recognition (OCR) on images to read the licence plates on
vehicles
Video Image recognition systems are used by police or airport authorities to track progress
of passengers and trap criminal elements.
Magnetic Ink Character Recognition: Sometimes classed like bar codes as optical mark
recognition (OMR), MICR technology recognises the numbers or marks on a document
such as a cheque.
In choosing an input method and hence the type of input devices that can be used, several
criteria are important and apply to the situation as follows:
• Economy: the cost of data capture weighs heavily in the equation since if the input
method used is too expensive, the project or solution cannot be implemented. If
there are not enough volumes bar-coding is too expensive
• Accuracy: the error tolerance level that is acceptable also dictates the choice. If the
ease of detection of errors is good and the ability to correct them post-capture is
also easy then methods with high error rates but low cost are acceptable. In the
even that this is not the case or more expensive but less error prone solution is
necessary.
• Time: If it takes too long to capture the data then the value of the results may not
be useful. In real-time situations, the input methods must be instantaneous.
• Reliability: the cost of a unit being down (e.g. an ATM at a bank) can be high so the
chances of it breaking down and the speed with which it can be recovered as well as
backup routines influence choice.
• Flexibility: so methods are specific others are generic. If there are many purposes
then a generic device for delaing with different types of inputs must be selected.
36
• Volume: Large volumes of data may require methods that can collect it quickly. As
an example, computer readable forms and marked ballot papers are used for
elections because using people takes too long to collect and count in areas with big
populations
• Compatibility: the selected equipment must work with future as well as present
applications. Features such as network capability and multiplicity of interfaces and
connectors on the device affect the choice.
Input devices
Input devices are hardware components that facilitate the capture of data into the computer
systems through standard input ports. These ports can either be serial or USB.
A keyboard is derived from a standard keyboard; it’s used for the manual capture of data into
the computer system
• The person keying in the data can be in a remote location, away from the computer
itself. Data can be transmitted via a communications link
• The person keying in the data can check for keying errors on-screen.
• Keyboard input is convenient for small volumes of data when the time taken up by
data input is relatively short.
Originally a workstation was a computer used by one person, particularly for graphics and design
applications, and was used primarily in engineering. It had a fast and powerful central processor,
a high resolution monitor, and a large memory. This enabled complex designs to be easily
manipulated. Similarly it meant a terminal with limited processing power that was connected to
a mainframe computer and used by a user in a remote place for purposes of keyboard-console
37
data capture. These characteristics, however, are no longer unique to workstations. High
performance personal computers can offer very similar services; so the distribution is a historical
one. The term ‘workstation’ is often used to describe a person’s desk, chair and computer- their
immediate working environment.
In most cases Electronic Point of Sale systems (EPOS) take advantage of bar codes.
Data can be recorded in binary on documents, paper or plastic, using a code of alternating lines
and spaces. A special reading device might have a wand and by passing the wand over the lines,
the data stored in the bar codes can be extracted and used for input to a computer. These bar
codes which are normally contained on the packets or wrappers of goods are commonly used in
supermarkets and other shops,
When a customer buys some bar coded items and takes them to the checkout to pay, the shop
assistant will use a bar code reader (such as a wand or laser scanner), which is capable of
sensing the bar coded data and transmitting it to the central computer in the shop. The
computer then provides the price of the item being purchased (from the price on the price file)
and this is then output to the cashier’s check-out point. The total cost of all the purchases is
similarly calculated, and the customer sees what he or she must pay on a small display screen,
and receives a printed receipt for the goods purchased. Bar codes are often used in electronic
point of sale devices. In this case the data relating to the transaction would be captured by the
device and recorded on sales file or stock file as it occurred. Hence data is captured at the
source, that is, where the data is generated (the point of sale).
Electronic Funds Transfer at Point of Sale (EFTPOS) means that at the point of sale, when the
customer has brought up his goods to the checkout and the electronic point of sale has
calculated how much the customer has to pay for the transaction, no cash will be handled
physically. Instead, all the cash involved will be handled electronically. This may require the
shop or store to have a computer system that is linked to the customer’s bank.
When the amount to be paid by the customer is shown on the screen, the customer inserts his
bank card into a machine that will identify his account number and other details. The computer
at the shop will then inquire (electronically) from the bank’s account of the customer as to
whether the customer has enough money in his bank account to be able to pay for the goods. If
the money in the account is enough then the customer’s account will be debited by the amount
required to purchase the goods. The shop’s account will be credited by the same amount that
the goods bought by the customer cost.
38
In this way the goods will be bought without any hard cash being handled. All the cash that is
required has been transferred to the right accounts electronically. All this occurred at the point
where the goods were being sold (point of sale) as such this is called Electronic Funds Transfer at
Point of Sale (EFTPOS).
At the time the shop’s computer inquired about the availability of funds in the customer’s
account from the bank’s computer, the transaction would have been stopped if the customer
did not have enough money in his account to pay for the goods. No transfer of funds would
have taken place and the customer would not have been allowed to carry the goods. Instead
the goods would have been returned to the shelves of the shop.
To avoid such inconveniences, banks do issue credit cards to their trusted customers. The credit
card contains identification details and necessary bank details of the holder. With this card, the
customer can pay for goods and services on credit. When making payment the credit card will
be passed in a card reader that will extract the identification information from it and record it on
computer storage. The amount to be paid will be extracted from the card in the same way. The
store or shop can then send such data to the bank, where the funds will be transferred from the
customer’s account to the shop account. Some credit cards are so smart that they can be used
like electronic wallets. These are called smart cards.
(i) Stationery is saved. The paper and ink that was to be used for printing the price tags
would be saved. The money that was to be used for such stationery can then be used
for other ventures that will help to boost business.
(ii) Reduction on labour force with a consequent saving of money. The pricing of items
individually would attract a large manual labour force. This labour force would need to
be paid money. With the use of bar codes such a large labour force wouldn’t be
needed. This would be a saving for the store on funds that could then be channeled
back into business.
(iii) Quick service to customers. When a new consignment of goods comes to the store
then the consignment would wait until the individual items have been stuck with price
tags before customers could buy these items. This might lead to dissatisfaction of
customers who in turn might decide to go to another store where services are offered
quickly. With the use of bar codes, as long as the total number of items is known, the
items can straight away go to the shelves and customers can buy as soon as the items
come.
39
(iv) Price changes are catered for. In countries where prices are continually adjusted due to
inflation, this could lead to enormous loss of stationery needed to print new price tags.
This would also mean employing extra casual labour to cope up with the job of re-
pricing the individual commodities. The end result is that the store will spend a lot of
money on stationery and on this extra labour force.
Mark sensing. Mark sensing is a method used for data input into computer systems. This
method utilizes pre-printed forms or cards normally for selecting choices in appropriate boxes
on the forms. The selection is made by marking the choice with a line or a cross using a pencil or
pen. When the choices have been marked, the form is then fed into a reading device. The
reading device will then sense the boxes which have a mark on them and then translate these
into machine codes. These codes, in form of electrical signals, are then sent to the computer for
evaluation.
This method of input is called mark sensing because only the marks in the boxes are sensed. It
does not matter what character is in the box, but only the mark matters. This is the type of
system currently used for marking the Grade VII (Seven) examinations. Candidates mark their
answers with a pencil on the answer sheets. The answer sheets are then fed into a scanner that
senses the marks in the appropriate boxes and sends the appropriate signals to the computer
which then evaluates the answer. Mark sensing documents are an example of turn-around
documents.
It is clear that at Grade VII level, children are still at such an academic level that they cannot
write essays in good and readable handwriting. Therefore, the answer sheets of the Grade VIIs
are really appropriate for their level. Reading an essay written by a Grade VII candidate under
examination conditions might be quite difficult. Besides the largest number of candidates at any
examination level is at Grade VII. So it would be very taxing to have human beings mark their
examinations. As far as the current technology stands, mark sensing is the most appropriate
method for marking these exams.
Optical Character Recognition. Optical Character Recognition (OCR) is a method used for data
input into computer systems. This method utilizes pre-printed forms or cards. The user types in
the characters in particular positions on the form. The characters need to be in a particular
format or style. Such formats are normally used, for example, in big universities where new
students are required to fill in their details on pre-printed forms. These forms are then fed
directly into a computer peripheral (e.g. OCR reader) which then extracts the details of the
students and sends them to the computer for processing or for storage into a database. As can
be seen from this example, these methods of input reduce the involvement of the human being
40
in the process of data preparation and input. By so doing, errors are greatly reduced. OCR
documents are an example of turn-around documents.
If such computer readable forms like the OCR forms given to university students at registration
were not used, it would mean that the student would type his details on to a form (not
computer readable), and then a data preparation operator would extract the details from the
form into the computer. In this way, there are too many people involved in the data
preparation process. Clearly, there will be multiple errors. So the OCR forms help in reducing
errors in the data capture process.
The function of an optical character reader is to recognize characters encoded on OCR forms.
Optical Character Readers (OCR) use optical sensing methods to recognize characters, which are
normally written in stylized form. OCR can recognize characters that are printed by a
computer’s printer. They can also recognize characters that are block hand written. Optical
Character Readers are therefore used for the preparation of data for input to the computer.
Data prepared by Optical Character Readers can be entered on-line to the computer or saved on
storage media for off-line data entry later.
Advantages of OCR
(a) Computers can produce pre-printed OCR documents which can later be read by
computers (turn-around documents). This is cheaper since no special equipment is
involved.
(b) Data preparation errors are eliminated.
(c) OCR documents are visible records.
(d) A considerable range of OCR document size is catered for.
(e) OCR equipment can be on-line to the computer (but often data is written to magnetic
tape off-line for faster computer input, especially to mainframe).
(f) Source data entry can be automated.
(g) OCR contains data that can be read by human beings and so enabling visual inspection
of data.
(h) OCR has wide applicability
Disadvantages of OCR
a) OCR document must be treated with care so that characters still remain readable.
b) Special measures are required to replace spoilt or lost OCR documents.
c) OCR equipment can be expensive
d) Print quality may be crucial since unclear documents may distort the data
41
Advantages of MICR
a) The data can be read by human beings and so enabling visual inspection of documents.
b) MICR documents are relatively easy to sort.
c) MICR documents make forgery difficult
Disadvantages of MICR
Computer terminal
For each branch, each employee signs on (logs on) to the computer every morning when
reporting for work. The computer takes note of the time that the employee logs on. When
he/she knocks off, he/she logs off. Once again the computer takes note of the log-off time and
calculates the total number of hours each particular employee worked for the day. This process
is done locally and every day at each branch for the whole week. The details are kept on file by
the local computer in every branch. At the end of each week, the hours each employee worked
for each day in the week are added up together by the local computer and sent to the central
computer at headquarters. At the central computer, all employee details from all the branches
are consolidated into one file which then used as the input file for the payroll system.
This means that each branch should have a log on computer (terminal) and that the date and
time on this computer can only be changed by the system administrator who has a super
password. This will ensure that employees do not manipulate the time and date any how.
42
Further, this solution requires that the main office headquarters be networked with each of the
branches.
Since human beings easily make errors, this system should be set up in such a way that the
employee does not actually type in the time of logging in or logging off. Instead, the employee
just types, for example the user name and the words log on when signing on and again user
name and the words log off when signing off. The computer will automatically record the times
when the employee logs on and off.
Output devices
These hardware devices produce processed data or information in printed form or in softcopy.
Or An output device is a peripheral device that allows a computer to display or store results of
actions and/or processes (the outputs) for the computer such as a printers or monitors.
Output Methods
Output devices can be classified by the form that the output takes and whether it is machine
readable or human readable output. Human readable output can itself be classified as transient
(e.g. on monitors) or permanent (paper format from printers) or microfilm.
Machine-readable output devices are those to which data can be written to magnetic disk or
magnetic tape. Before this data can be read again, it must be read and processed by a device
like a disk or tape drive and a computer.
Human-readable output devices: This categorisation can be further broken down into devices
that once switched off do not keep the output and are transient and those devices whose
output is permanent. The most common transient output device is the visual display unit or
monitor. A monitor is typically based on cathode ray tube (CRT) or liquid crystal display (LCD)
technology. LCD technology takes up less space, uses less power and has become the dominant
computer display format. It is the only possible format in some cases like laptops and PDA
devices.
43
Printers
Printers generate their output on paper and this output is permanent. There are a variety of
printers the most common of which are discussed here:
Ink-jet printers: operate by guiding a high-speed stream of ink drops onto the paper. The ink
then dries and forms the image. Ink-jet printers with multiple cartridges can do colour
printing.
Laser printers: operate by electrostatic charging of a rotating drum using laser source. The
parts where no characters are required are left blank. The rotating drum then picks up
toner which is held in a cartridge. The toner sticks to the charged parts and as the drum
rolls the toner sticks to the paper. Laser printers print a page at the time and are quiet
and fast. They can print images and so do not need to use pre-printed paper.
Line printers: print one line at a time and are associated with mainframe computers
because of their speed and ability to print high volumes of output. Dot-matrix printers:
use a set of pins or needles (dots) which impact an ink ribbon to form a character. Each
character is built by a rectangular array of dots typically 9 rows by 7 columns.
Plotters: use pens with the ability to move horizontally and vertically across the printing
surface. The pens can be loaded with different inks allowing it to print in colour. Plotters
can print large documents like building plans or production drawings.
Printers are devices that produce printed images on paper. The image to be produced by the
printer is received in form of signals from the controlling device, usually, the central processing
unit. In the case of impact printers these signals activate print elements which are pressed
against the paper through the printer ribbon, to produce the required image. Non-impact
printers, on the other hand, do not require any impact on paper. The ink-jet printer for
instance, simply injects some ink onto the paper to produce the required image.
44
Using the bus system, the electronic components of the CPU exchange all their signals in
parallel. Peripheral devices like the printer are connected to the computer through ports. Some
ports are parallel, that means, all the 8 bits that make up a character, for example, are sent at
once from the CPU to the parallel port. On the other hand, other ports are serial, that means,
the 8 bits that make up a character, for example, are sent one after the other from the CPU to
the serial port. A printer that is connected to a parallel port and hence receives its data from the
CPU in parallel is a parallel printer. A printer that is connected to a serial port and hence
receives its data from the CPU in a serial manner, is a serial printer. Parallel printers are faster
than serial printers.
(a) Since they are not electromechanical, non-impact printers are generally much faster
than impact printers and they also print quietly.
(b) Non-impact printers offer a wide variety of type faces.
(c) Non-impact printers offer high and good quality resolutions (print images).
(d) Since they have fewer moving parts, non-impact printers are more reliable.
a) Non-impact printers may be expensive (although prices are slowly coming down due to
technological advancements).
b) Due to lack of impact on paper, non-impact printers can not produce carbon copies (multi-
part output).
c) Some non-impact printers may require special printing paper which might be expensive to
acquire.
Visual display terminals are well suited for applications that involve inquiry and response
without the need for permanent hard-copy records being stored. The terminals are also well
suited for use as graphic display devices in applications that use graphics, e.g., computer aided
design (CAD).
Types of Printers
Dot matrix printer. A dot matrix printer has a head containing a series of pins or needles held
up in form of a matrix. Some dot matrix printers have print heads with a matrix of 9x9, 9x7 or
7x5 pins. To have a character printed, the pins that are required to form the character are
pushed forward out of the matrix slightly and then pressed against the print ribbon, which also
presses against the paper. Thus an impact has to be made on the paper making this printer an
impact printer. The characters appear as consisting of small dots. Each character will depend
on a particular combination of pins. Some dot matrix printers are line printers while others are
character printers. Matrix printers are relatively cheap although they are slowly becoming
outdated. Figure 6 shows a 7x5 matrix print-head whose pins are ready to print the capital
letter A.
OOOOO
OOOOO
OOOOO
OOOOO
OOOOO
OOOOO
OOOOO
An ancillary machine is a machine that is off-line and is not in any way controlled by the
computer, yet it plays quite a role in the overall work done by the data processing department.
Such machines include the guillotine and the shredder, among others.
46
Plotter. Although certain printers are now available that can produce good quality drawings,
plotters are still very suitable for computer aided design (CAD) jobs since they are designed
specifically to handle sophisticated graphical output. A plotter produces high quality drawn,
rather than printed output. Plotters work on a co-ordinate principle, whereby drawing
movements are executed by pen. All movements are under software control. There are two
types of plotters, the drum plotter and the flatbed plotter. A drum plotter plots on paper that is
fixed to a drum. While the drum revolves back and forth, a bar suspended above the drum and
containing a drawing pen moves from side to side and so plotting the drawing. On the other
hand, the paper on a flatbed plotter is stationary so that only the pen moves up and down the
paper, thus plotting the drawing. While the flatbed plotter can plot larger drawings, the drum
plotter can plot longer drawings because it uses continuous paper.
The flatbed plotter, due to the wider sizes of paper it is capable of taking, would be more
suitable for producing the computer aided design (CAD) drawing on an A3 paper in our question.
Plotters may be operated on-line. If operated off-line, the drawings may be saved on to a tape.
The tape will then be mounted on an off-line drive that will read instructions from the tape and
then drive the plotter to draw the required work. Specialized devices can also be used that
enable designs to be etched and so form master plates for creating manufactured goods.
Due to the ever advancing technology, the distinction between plotters and printers is becoming
more and more blurred. There now exists low cost, high resolution laser printers which are
capable of processing the quality output needed for computer aided design (CAD) applications.
A laser printer does not make an impact on the print paper, hence it is a single-part output
device. Therefore, a laser printer would be unsuitable for this sort of job. Also computer output
on microform (COM) could be used for the archive of pay slips details to enhance transparency
and save storage space.
47
Connectors
In order to accept inputs and display or transfer outputs, computers need a mechanism for
transfer of the data. Connectors provide the conduit by which a peripheral talks to the
computer. They are typically implemented as hardware ports. The most common of which are
discussed here:
The PS/2 port is based on a standard used by IBM for the PS/2 PC. Most keyboards, mouse
and barcode readers use a PS/2 wedge cable.
Many devices that send communications in bits one after another (serial communication use
an RS-232 output port so that the decoded characters arrive at the computer via one of
its RS-232 connectors.
Universal Serial Bus (USB) is supported by almost all new types of devices and is quickly
becoming the defacto standard. This is manly because of the following advantages: it
can be used for multiple devices so reducing production costs; and it can use the
computer as the power source so requiring no separate power supply in cases where
this would be necessary.
48
Serial port: is supported by most computers for connecting devices that only send and
receive data in bits one at a time such as modems or WAN routers. The most common
device for use on a serial port is a monitor.
Parallel port: Parallel ports were originally developed by IBM as a way to connect a printer
to a PC. The parallel port uses a 25-pin connector or DB-25 used in conjunction with a
36-pin Centronics connector at the other end of the cable to connect printers to the
computer. Almost all printer manufacturers adopted the Centronics interface and the
parallel port became a de facto standard. When a PC sends data to a printer or other
device using a parallel port, it sends 8 bits of data (1 byte) at a time. These 8 bits are
transmitted parallel to each other, as opposed to the same eight bits being transmitted
serially (one after another) as in a serial port. The standard parallel port is capable of
sending 50 to 100 kilobytes of data per second. Through the same port the printer is
able to communicate with the computer acknowledging receipt of data, sending offline
notification or job ended instruction. Further enhancements were made to the parallel
port design allowing for bi-directional communication with half-duplex (sending in only
one direction at a time) and full duplex (sending in both directions at the same time)
capabilities. This is known as standard parallel port. An additional improvement was
made on the speed of the connectivity enabling it to operate at 500Kbps – 2Mbps and
hence the enhanced parallel port.
Video Graphics Array: or VGA is a computer display standard developed by IBM in 1987. It
was first implemented as a chip by Motorola and hence the reference to programmable
logic array. However it was later implemented as an adapter or graphics card in ISA and
now more commonly PCI standards. VGA has been enhanced in various forms of which
the most common is Super VGA (SVGA). The difference is mainly in response times, and
number of colours and text fonts supported
49
Storage Devices
Computers use two types of memory: high-cost fast access on-board or on-chip memory
containing data and programs currently being processed; and external storage held on
attached devices for long-term storage of data, programs and output.
There are several kinds of memory chips which can be classified as non-volatile (cannot be
erased) and volatile (do not hold contents when powered off):
• Read Only Memory (ROM) typically contains data and instructions (programs)
installed by the manufacturer typically required to start a device. The programs may
be referred to as firmware. ROM is non-volatile
• Erasable Programmable Read Only Memory (EPROM) is a ROM that can be erased
using ultra-violet light and re-programmed.
50
• EEPROM are EPROM that can be erased using electronic means allowing for
selective re-programming of only the programs and data required.
• Random Access Memory (RAM) is memory that can be used to store data and
programs only required for immediate use. RAM needs to be continuously powered
to keep the data and is thus volatile.
External Storage
External storage devices server the purpose of storing the input and output data
required to operate the computerised information systems. They also store the actual
application programs. External storage devices include:
• Hard disks generally accessed over one of a number of bus types, including
ATA (IDE, EIDE), SCSI, SAS, Firewire or IEEE 1394) USB and Fibre Channel.
• Floppy disks which are read and written by a floppy disk drive or FDD.
• Zip drives which are medium-capacity removable disk storage system, first
introduced by Iomega.
• Tape drives, also known as streamers, which are peripheral devices that read and
write data stored on a magnetic tape. They are typically used for archival storage of
data stored on hard drives. Tape drives are sequential-access, and must wind past
all preceding data to read any one particular piece of data.
Hard disk
Disks offer direct access to data. A modern business PC invariably has an internal hard disk. At
the time of writing the average new PC has a hard disk size of around 40 Gigabytes.
• Recording surfaces are made of metal platters and coated with magnetisable
material
• The metal platters are piled together on a spindle and so forming a disk pack. The
pack can be sealed in a case to protect recording surfaces against dust and other
damage
• The metal platters are not flexible since they are made of metal
• Tracks can be placed closer together leading to higher storage capacities
• Each track on each disk surface has its own read/ write head. Read/write/ heads are
fixed
• The outer-most surfaces of the disk pack are usually meant for protecting the disk
and are not used for recording.
51
Floppy disks
The floppy disk provides a cost-effective means of on-line storage for small amounts of
information. A 3½ disk can hold up to 1.44 Mb of data.
• Usually the disk surfaces are made of plastic material that is coated with magetisable
material
• The recording surfaces are divided into concentric circles which are further sub-divided
into sectors
• The disks are covered in a jacket for protection. A small opening is left to alow the
read/write heads access to the data on disk
• There is one read/write head for each disk surface
• Read/ write heads are movable
• Data is read or written by rotating the disk past read/write heads, which can write data
from the CPU onto disk, or can read data the disk for input to the CPU
• Floppy disks exist mainly as 3.5”.
ZIP disk
A Zip disk is a different type of removable disk, with much larger capacity (100 Mb) that requires
a special ZIP drive. A Zip disk is suitable for back-ups or for moving files between computers.
Files are zipped so that they are compressed into a logically smaller file. Some users ‘Zip’ the
contents of multiple file attachments into one Zip file to send via e-mail (some e-mail
programmes do this automatically). To open the Zipped files, you must first unzip (extract) the
zip file using software such as WinZip or PKZip. The extracted files will then show their file
extensions, and may be opened using the appropriate software.
Flash disks
This has been a recent breakthrough in ICT regarding the storage of large volume data onto a
stick that can be slotted into a USB port
• The CD format has started to be superseded by DVD. DVD development was encouraged
by the advent of multimedia files with video graphics and sound – requiring greater disk
capacity
• DVD technology can store almost 5 gigabytes of data on one disk. Access speeds are
improved as is sound and video quality. Many commentators believe DVD will not only
replace CD ROMs, but also VHS cassettes, audio CDs and laser discs and sound –
requiring greater disk capacity.
Storage Architectures
The magnetic disk is the most common form of storage but the implementation of this
depends on one of several architectures dictated by the application and the needs for
fast accessibility, redundancy and volume of data. There are three types of storage
architectures.
53
Figure 6: Storage ArchitectureNetwork Attached Storage (NAS) offers file-based storage to hosts
connected to an IP network. Consequently, NAS offloads the entire file system from the hosts to the file
server. In NAS architecture, multiple hosts can share files. Standard interfaces for requesting these files,
such as CIFS (Common Internet File System) and NFS (Network File System), enable file sharing across
different platforms. NAS is often chosen for applications with a need for cross-platform shared storage.
Good examples are a collection of Web servers in an enterprise, accessing HTML content stored as files,
or a network of workstations in a department.
Storage Area Networks (SAN) replaces the bus-based architecture of DAS with a
switched fabric. Both hosts and devices are then connected to the fabric, allowing for
scalable performance, capacity, and sharing devices among several hosts. SAN
architectures are often chosen for those applications with a need for highly scalable
performance from the storage devices. A good example is a distributed database
running on a cluster of workstations.
54
B: Computer Software
Software
The exact delineation between the operating system and application software is not
precise, however, and is occasionally subject to controversy. For example, one of the
key questions in the United States vs. Microsoft anti-trust trial was whether Microsoft's
Internet Explorer web browser was part of its Windows operating system or a separable
piece of application software.
The diagram below illustrates the relationship between application software and system
software.
Systems Software
Systems Software including operating systems and utilities Systems software refers to programs
or suites of programs that either operate in supervisor mode or control a function of group of
functions that have a direct access to the low-level hardware such as the computer itself or
computer peripherals.
Amongst the most well-known system software is the operating system, device drivers,
the basic/input output system (BIOS) and system utilities like language compliers.
56
Operating Systems
Nutt [1997] identifies four common types of operating system strategies on which
modern operating systems are built: batch, timesharing, personal computing, and
dedicated. According to Nutt, "the favoured strategy for any given computer depends
on how the computer is to be used, the cost-effectiveness of the strategy
implementation in the application environment, and the general state of the technology
at the time the operating system is developed." The table below summarizes the
characteristics of each operating system strategy as described by Nutt [1997].
Batch This strategy involves reading a series of jobs (called a batch) into
the machine and then executing the programs for each job in the
batch. This approach does not allow users to interact with
programs while they operate.
Timesharing This strategy supports multiple interactive users. Rather than
preparing a job for execution ahead of time, users establish an
interactive session with the computer and then provide
commands, programs and data as they are needed during the
session.
Personal Computing This strategy supports a single user running multiple programs on
a dedicated machine. Since only one person is using the machine,
more attention is given to establishing predictable response
times from the system. This strategy is quite common today
because of the popularity of personal computers.
Dedicated This strategy supports real-time and process control systems.
These are the types of systems which control satellites, robots,
58
A batch system is one in which jobs are bundled together with the instructions
necessary to allow them to be processed without intervention. Often jobs of a similar
nature can be bundled together to further increase economy
The basic physical layout of the memory of a batch job computer is shown below:
--------------------------------------
| |
| Monitor (permanently resident) |
| |
--------------------------------------
| |
| User Space |
| (compilers, programs, data, etc.) |
| |
--------------------------------------
The monitor is system software that is responsible for interpreting and carrying out the
instructions in the batch jobs. When the monitor started a job, it handed over control of
the entire computer to the job, which then controlled the computer until it finished.
Often magnetic tapes and drums were used to store intermediate data and compiled
programs.
• There is increased performance since it was possible for job to start as soon as the
previous job finished
As mentioned above, one of the major shortcomings of early batch systems was that
there was no protection scheme to prevent one job from adversely affecting other jobs.
The solution to this was a simple protection scheme, where certain memory (e.g. where
the monitor resides) were made off-limits to user programs. This prevented user
programs from corrupting the monitor.
To keep user programs from reading too many (or not enough) cards, the hardware was
changed to allow the computer to operate in one of two modes: one for the monitor
and one for the user programs. I/O could only be performed in monitor mode, so that
I/O requests from the user programs were passed to the monitor. In this way, the
monitor could keep a job from reading past it's on $EOJ card.
To prevent an infinite loop, a timer was added to the system and the $JOB card was
modified so that a maximum execution time for the job was passed to the monitor. The
computer would interrupt the job and return control to the monitor when this time was
exceeded.
One difficulty with simple batch systems is that the computer still needs to read the the
deck of cards before it can begin to execute the job. This means that the CPU is idle (or
nearly so) during these relatively slow operations.
Since it is faster to read from a magnetic tape than from a deck of cards, it became
common for computer centres to have one or more less powerful computers in addition
to the main computer. The smaller computers were used to read a deck of cards onto a
tape, so that the tape would contain many batch jobs. This tape was then loaded on the
main computer and the jobs on the tape were executed. The output from the jobs
would be written to another tape which would then be removed and loaded on a less
powerful computer to produce any hardcopy or other desired output.
60
It was a logical extension of the timer idea to have a timer that would only let jobs
execute for a short time before interrupting them so that the monitor could start an I/O
operation. Since the I/O operation could proceed while the CPU was crunching on a user
program, little degradation in performance was noticed.
Since the computer could now perform I/O in parallel with computation, it became
possible to have the computer read a deck of cards to a tape, drum or disk and to write
out to a tape printer while it was computing. This process is called SPOOLing:
Simultaneous Peripheral Operation OnLine. Spooling batch systems were the first and
are the simplest of the multiprogramming systems.
One advantage of spooling batch systems was that the output from jobs was available
as soon as the job completed, rather than only after all jobs in the current cycle were
finished.
As machines with more and more memory became available, it was possible to extend
the idea of multiprogramming (or multiprocessing) as used in spooling batch systems to
create systems that would load several jobs into memory at once and cycle through
them in some order, working on each one for a specified period of time.
--------------------------------------
| Monitor |
|(more like modern operating systems)|
--------------------------------------
| User program 1 |
--------------------------------------
| User program 2 |
--------------------------------------
| User program 3 |
--------------------------------------
| User program 4 |
--------------------------------------
At this point the monitor is growing to the point where it begins to resemble a modern
operating system. It is responsible for:
As a simple, yet common example, consider a machine that can run two jobs at once.
Further, suppose that one job is I/O intensive and that the other is CPU intensive. One
way for the monitor to allocate CPU time between these jobs would be to divide time
61
equally between them. However, the CPU would be idle much of the time the I/O bound
process was executing.
A good solution in this case is to allow the CPU bound process (the background job) to
execute until the IO bound process (the foreground job) needs some CPU time, at which
point the monitor permits it to run. Presumably it will soon need to do some I/O and the
monitor can return the CPU to the background job.
Back in the days of the "bare" computers without any operating system to speak of, the
programmer had complete access to the machine. As hardware and software was
developed to create monitors, simple and spooling batch systems and finally
multiprogrammed systems, the separation between the user and the computer became
more and more pronounced.
Users, and programmers in particular, longed to be able to "get to the machine" without
having to go through the batch process. In the 1970s and especially in the 1980s this
became possible in two different ways.
Interactive processes are given a higher priority so that when IO is requested (e.g. a key
is pressed), the associated process is quickly given control of the CPU so that it can
process it. This is usually done through the use of an interrupt that causes the computer
to realize that an IO event has occurred.
It should be mentioned that there are several different types of time sharing systems.
One type is represented by computers like VAX/VMS computers and UNIX workstations.
In these computers entire processes are in memory (albeit virtual memory) and the
computer switches between executing code in each of them. In other types of systems,
such as airline reservation systems, a single application may actually do much of the
timesharing between terminals. This way there does not need to be a different running
program associated with each terminal.
The second way that programmers and users got back at the machine was the advent of
personal computers around 1980. Finally computers became small enough and
62
inexpensive enough that an individual could own one, and hence have complete access
to it.
A real-time computer is one that executes programs that are guaranteed to have an
upper bound on tasks that they carry out. Usually it is desired that the upper bound be
very small. Examples included guided missile systems and medical monitoring
equipment. The operating system on real-time computers is severely constrained by the
timing requirements.
Dedicated computers are special purpose computers that are used to perform only one
or more tasks. Often these are real-time computers and include applications such as the
guided missile mentioned above and the computer in modern cars that controls the fuel
injection system.
A multiprocessor computer is one with more than one CPU. The category of
multiprocessor computers can be divided into the following sub-categories:
Shared memory multiprocessors have multiple CPUs, all with access to the same
memory. Communication between the processors is easy to implement, but care
must be taken so that memory accesses are synchronized.
Distributed memory multiprocessors also have multiple CPUs, but each CPU has its
own associated memory. Here, memory access synchronization is not a problem,
but communication between the processors is often slow and complicated.
As computers have progressed and developed so have the operating systems. Below is a
basic list of the different operating systems and a few examples of operating systems
that fall into each of the categories. Many computer operating systems will fall into
more than one of the below categories.
63
GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and
icons and is commonly navigated by using a computer mouse. See the GUI definition for
a complete definition. Below are some examples of GUI Operating Systems.
System 7.x
Windows 98
Windows CE
Multi-user - A multi-user operating system allows for multiple users to use the same
computer at the same time and different times. See the multi-user definition for a
complete definition for a complete definition. Below are some examples of multi-user
operating systems.
Linux
Unix
Windows 2000
Linux
Unix
Windows 2000
Unix
Windows 2000
Linux
Unix
Windows 2000
Troubleshooting
Common questions and answers to operating systems in general can be found on the
below operating system question and answers. All other questions relating to an
operating system in particular can be found through the operating system page.
64
Linux / Variants
MacOSMS-DOS
IBM OS/2 Warp
Unix / Variants
Windows CE
Windows 3.x
Windows 95
Windows 98
Windows 98 SE
Windows ME
Windows NT
Windows 2000
Windows XP
Windows Vista
Windows 7
Below is a listing of many of the different operating systems available today, the dates
they were released, the platforms they have been developed for and who developed
them.
Utilities
System utilities are usually associated with the operating system more because they are
often used in tandem with OS activity or may be invoked by the OS. They are not part of
the operating system though even though some of them may operate in supervisor
mode. They include:
Linkers and loaders: for loading programs and including (linking) libraries
68
There are other system programs like device drivers but they are far less important from
a system point of view in that they are specific to some device and will not cripple the
machine if they are missing. Example of device drivers include printer and monitor
drivers which if not installed may not necessarily stop the device from working but may
produce poor output or less than expected performance.
Utilities can be described as applications that help users to run other applications.
Application software
As defined earlier application software solves a specific user-defined task or set of tasks.
Such software may be acquired off-the-shelf or bespoke (implemented or developed
just for one custom user). Typical examples of software applications are word
processors, spreadsheets and media players.
User software tailors systems to meet the user's specific needs. User software includes
spreadsheet templates, word processor macros, scientific simulations and graphics and
animation scripts. Even email filters are a kind of user software. Users create this
software themselves and often overlook how important it is.
In some types of embedded systems, the application software and the operating system
software may be indistinguishable to the user, as in the case of software used to control
a DVD player.
69
Programming languages are used to write programs and hence software is the product
of programming languages.
The selection of the correct programming language for creating software is critical. If the
software is likely to interface with hardware then a low-level language with in-built
constructs for hardware support and control is important. For example most device
drivers are written in C because it can make system calls directly to the operating
system without the need to write special functions for it. If the software will be a web-
enabled database application, a language like PHP would be better as it has direct
support for accessing databases and support for HTML and cascading style sheets.
Programming Languages
Since a computer transfers data between memory locations and the CPU, it has been via the
system bus, it has been suggested in some circles that programming languages and programs
are simply a way of overcoming the von Neumann bottleneck.
A computer accepts machine code as input which it translates into actions performed by
the hardware. Thus machine code is the lowest level of programming possible and in the
beginning it was the only means available for programming a computer hence it is
considered as a 1st generation language.
Machine code is illegible to many people, difficult to understand and does not produce
easy code to debug when there are errors. It is difficult to follow jumps in code which
are executed as numbers. Assembly Language was developed to deal with these issues.
It allowed humans to use mnemonics such as ADD, SUB, MOV to describe actions. These
commands translated directly in to machine code and an assembler was used to put the
machine code together into a loader and create the program. Assembly Language made
it easier to write programs and follow code and even understand it later and is referred
to as a second generation language.
Machine code and assembly language are referred to as low-level languages because of
their closeness to the hardware.
70
Despite the progress made by third generation languages, applications were still
complex and took a long time to build. This led to the development of new
programming concepts and techniques which integrated many constructs into one
command and therefore allowed users to quickly implement code and actions.
All 4GLs are designed to reduce programming effort, the time it takes to develop
software, and the cost of software development. They are not always successful in this
task, often resulting in inelegant and difficult code. However, given the right problem,
the use of an appropriate 4GL can be spectacularly successful.
Report generators: take a description of the data format and the report to generate and
from that they either generate the required report directly or they generate a program
to generate the report.
Forms generators: manage online interactions with the application system users or
generate programs to do so.
71
• Data types
• Data Structures
• Instruction and control flow
• Design philosophy
• Compilation and interpretation
Those languages that are widely used – or have been used for a considerable period of
time – have standardization bodies that meet regularly to create and publish formal
definitions of the language and discuss the extension of existing definitions.
Data types
Internally, all data in modern digital computers are stored simply as zeros or ones
(binary). The data typically represent information in the real world such as names, bank
72
The particular system by which data are organized in a program is the type system of
the programming language; the design and study of type systems is known as type
theory. Of particular importance in programming is whether languages are strongly or
weakly typed.
Strongly typed languages do not permit the usage of values as different types; they are
rigorous about detecting incorrect type usage, either at runtime for dynamically typed
languages, or at compile time for statically typed languages. Ada, Java, ML and Oberon
are examples of strongly typed languages.
Weakly typed languages do not strictly enforce type rules or have an explicit type-
violation mechanism, often allowing for undefined behavior, segmentation violations, or
other unsafe behavior if types are assigned incorrectly. C, C++, Assembly Language and
Tcl are examples of weakly typed languages.
Note that strong vs. weak is a continuum; Java is a strongly typed language relative to C,
but is weakly typed relative to ML.
The importance of the distinction arises from the fact that software is error-prone and
one of the major causes of this is bad programming e.g. the use of a single variable to
represent both a number and text which are different data types. A strongly-typed
language would never allow this to happen and therefore is less likely to generate
errors. The issue of data types can be discussed further but this is beyond the scope of
this study guide.
Data structures
Most languages also provide ways to assemble complex data structures from built-in
types and to associate names with these new combined types (using arrays, lists, stacks,
files).
Once data has been specified, the machine must be instructed how to perform
operations on the data. Elementary statements may be specified using keywords or may
be indicated using some well-defined grammatical structure.
Each language takes units of these well-behaved statements and combines them using
some ordering system. Depending on the language, differing methods of grouping these
elementary statements exist. This allows one to write programs that are able to cover a
variety of input, instead of being limited to a small number of cases. Furthermore,
beyond the data manipulation instructions, other typical instructions in a language are
those used for control flow (branches, definitions by cases, loops, backtracking, and
functional composition).
Design philosophy
For the above-mentioned purposes, each language has been developed using a special
design or philosophy. Some aspect or another is particularly stressed by the way the
language uses data structures, or by which its special notation encourages certain ways
of solving problems or expressing their structure.
Since programming languages are artificial languages, they require a high degree of
discipline to accurately specify which operations are desired. Programming languages
are not error tolerant; however, the burden of recognizing and using the special
vocabulary is reduced by help messages generated by the programming language
implementation.
There are a few languages which offer a high degree of freedom in allowing self-
modification in which a program re-writes parts of itself to handle new cases. Typically,
only machine language, Prolog, Postscript and the members of the Lisp family provide
this capability. In MUMPS language this technique is called dynamic recompilation;
emulators and other virtual machines exploit this technique for greater performance.
There are, broadly, two approaches to execute a program written in a given language.
These approaches are known as compilation, done by a program known as a compiler;
and interpretation, done by an interpreter. Some programming language
implementations support both interpretation and compilation.
An interpreter parses a computer program and executes it directly. One can imagine this
as following the instructions of the program line-by-line. In contrast, a compiler
74
translates the program into machine code – the native instructions understood by the
computer's processor. The compiled program can then be run by itself.
Compiled programs usually run faster than interpreted ones, because the overhead of
understanding and translating the programming language syntax has already been done.
Compilers also allow modules to be developed and compiled separately. However,
interpreters are frequently easier to write than compilers, provide security and
portability and can more easily support interactive debugging of a program.
Many modern languages use a mixture of compilation and interpretation. For example, the
"compiler" for bytecode-based language translates the source code into a partially compiled
intermediate format, which is later run by a fast interpreter called a virtual machine. Some
"interpeters" actually use a just-in time compiler, which compiles the code to machine language
immediately before running it. These techniques are often combined. Like other aspects of
programming languages, "compiled" and "interpreted" may be best understood as opposite
ends of a spectrum, rather than the only two options.
Programming Languages are can be classified by several methods amongst which are the
paradigms that they follow, the intended use or purpose of the language and whether they are
low or high level languages.
• Imperative
• Functional
• Logic and
• Object-oriented
Other paradigms include dataflow, coordination, algebraic, graph-based and parallel computing.
In practice, the distinction is typically fuzzy with languages like Ada being both imperative and
object-oriented. It is important to note that techniques from another paradigm can be used in a
program implemented with a language built under a different paradigm.
The imperative or “command driven” paradigm is one in which programs are essentially a series
of commands that the computer must execute. Computation is expressed by repeated
modification of an implicit store (i.e., components command a store modification). Iteration or
75
looping provides control of the flow. Examples of these languages include Ada, ALGOL, FORTRAN
and COBOL.
The logic paradigm expresses computation by a proof search or through recursive definition of
relations. Again there is no implicit store, all intermediate results are stored in variables and
recursion is used for control.
The object-oriented paradigm is the most popular paradigm in use today. Computation is
expressed by the creation of a data structure (the object) and defining all the properties and
actions that can be performed on it. Many Object-oriented programming (OOP) languages are a
combination of imperative and OO techniques. Purely OOP languages like Miranda use objects
entirely, with all the results stored in object variables with recursion for control. One of the main
objectives of the OO paradigm is reusability. Objects can be created for one application but later
be re-used in a different application, saving on costs, time and errors.
General purpose languages were built with the idea that they will be used to solve many
different classes of problems. They are not tailored to one specific application area. Examples
include but are not limited to Ada, PL/1, Basic, Pascal, ALGOL and SNOBOL
Special-purpose languages on the other hand are designed to support a specific application.
They generally solve a particular problem and do it well. Examples include HTML for creating
web pages, SQL for creation and manipulation of databases, shell scripting for controlling
operating system activity and macros for extending the capabilities of off-the-shelf applications
like spreadsheets.
High level languages are general purpose and problem-oriented. One line of code translates into
multiple lines of machine code. They are portable (machine independent). Strictly speaking this
is not always true because they must be recompiled for different computer architectures and
operating systems. They are easy to learn and require less programming effort and skill than low
level languages. They also have the advantage of closely resembling a human language and so
are easy to read and understand.
76
Low level languages on the other hand are machine-oriented and produce one for one lines of
code with machine code. They are specific to the machine that the language was made for. They
produce fewer lines of code and use less space than high-level languages and though this code
may be complex, it is at least ten times faster.
77
The most popular computer operating system, particularly for PCs is Microsoft
Windows. As discussed previously, an operating system is executive software that
provides the bridge between applications software and the hardware. It facilitates
communication between the user and the computer and automatic loading of programs
into RAM in order to provide a continuous flow of operations
The most popular computer operating systems are Microsoft Windows, Linux and UNIX.
i) A desktop from which everything in the system branches out. Disk drives,
folders(directories), applications and files can all be placed on the desktop
ii) A taskbar which includes a start button and buttons representing every open
application
iv) There is a Recycle Bin for easy deletion and recovery of files
x) Reliability
79
• Windows can be set up to regularly test the users hard disk, system files,
and configuration information to increase the system reliability, and in
many cases fix problems automatically
• Enhanced backup and restore functions
xi) Graphics. Windows has graphics and video capabilities and support for
games hardware such as joysticks, it supports digital video disks (DVD)
xii) More manageable for businesses, tools such as Dr. Watson and System
Information utility make it easier for IT support staff to diagnose and correct
problems
a) Windows has graphics and video capabilities and support for games hardware
such as joysticks. It supports digital video disks (DVD)
i) GUI, this stands for Graphical User Interface. GUIs were designed to make
computers more user-friendly. A GUI involves the use of two design ideas and
two operating methods which can be remembered by the abbreviations WIMP
(Windows, Icons, Mouse and Pull-down menu. Most dialogue between the user
and software that uses WIMP features is conducted through the mouse and on-
screen images rather than typed text.
ii) The desktop, in Microsoft Windows, the initial screen is called the desktop. The
desktop screen typically contains icons that provide easy access to a range of
software programs. Programs may be started from the desktop using either an
icon or shortcut or by navigating through the menus that branch out from the
START button. Each active program or activity is launched in a separate window
iii) Task bar, as with many Microsoft Windows operations, there is more than one
way to switch between open applications. The popular method of switching
between applications is to simply click on the icon of the relevant open
application displayed on the Windows Taskbar. The Taskbar usually shows at the
bottom of the screen, although some systems are set-up to ‘hide’ the Taskbar
iv) Title bar, it’s shown in a strip at the top of the window. It comprises the default
menu items which when selected pulls down another menu that pertains to that
particular choice. The main menu items are File, Edit, View, Insert etc. This is
sometimes called a title.
80
v) Recycle bin, this is a folder or directory that keeps all files that are deleted from
the hard disk or fixed disk. Logically the files are deemed to have been deleted
but physically they are usually still on the disk. When the user selects an option
called empty the recycle bin that’s when the bin is emptied and the files are no
longer accessible
Directory or folder
This is a sub division of a disk. Users can create a folder or a directory so that files that
pertain to a common subject are stored in there for easy reference or location. Folders
such as My Pictures, My Documents etc are typical examples.
81
Application packages fall in the category of application software. The most common application
packages are word processing, spreadsheets, databases, presentations and desktop publishing.
Application software also includes electronic mail and browser software.
Word processors
They are descended from early text formatting tools (sometimes called text
justification tools, from their only real capability). Word processing was one of the
earliest applications for the personal computer in office productivity.
Although early word processors used tag-based markup for document formatting, most
modern word processors take advantage of a Graphical User Interface (GUI). Most are
powerful systems consisting of one or more programs which can produce any arbitrary
combination of images, graphics and text, the latter handled with full-blown type-
setting capability.
• batch mailing using a form letter template and an address database (aka mail merging);
• index of keywords and their page numbers;
• table of contents with section titles and their page numbers;
• table of figures with caption titles and their page numbers;
Page number and footnote information is extremely hard to maintain without a word
processor because addition or deleting of text can affect pagination; that is, page
numbers can change in each edition.
Other word processing functions include spelling and grammar checking. The word
processor has become a central component of the office suite and is increasingly only
available in this form, rather than as a standalone program.
To edit a document, users access the tool bar (usually at the top of the page) which
shows a range of editing facilities and features. Selecting text and clicking on a feature
causes the word processor to apply it to the selected text. An example is to make the
text in this paragraph partly bold, italicised and justified.
The advantages of word processors include but are not limited to:
• The ability to alter text or copy while typing without the need to physically rub it
out
• The ability to import text from many different sources (images, media) into the
document.
• This ability to export text to different people who use the same application or
can convert it to another application. With a typed document, this was not
possible. The other person would have to photocopy or receive a fax. If they
wished to edit it they would be forced to type the whole document.
• Another advantage is that it can be used to cheaply create common user
documents like application forms, invoices, sales orders, reference letters and
83
many others which are then stored in a common location as templates and
reused later simply by changing the details relevant to the specific situation and
leaving the rest of the document, the common part unchanged. This saves time
and increases productivity.
Desktop publishing (also known as DTP) combines a personal computer, page layout
software and a printer to create publications on a small economic scale. Users create
page layouts with text, graphics, photos and other visual elements using desktop
publishing software such as QuarkExpress, CorelDraw and Adobe Photoshop. For small
jobs a few copies of a publication might be printed on a local printer. For larger jobs a
computer file can be sent to a vendor for high-volume printing.
Desktop publishing began in 1985 with the introduction of Aldus Pagemaker software
and the Apple LaserWriter printer for the Apple Macintosh computer. The ability to
create WYSIWYG page layouts on screen and then print pages at crisp 300 ppi resolution
was revolutionary for a personal computer system. The term "desktop publishing" is
attributed to Aldus Corporation founder Paul Brainerd, who sought a marketing catch
phrase to describe the small size and relative affordability of this suite of products in
contrast to the expensive commercial phototypesetting equipment of the day.
In the modern day, virtually all publishing is "desktop publishing." The superior flexibility
and speed of desktop publishing systems has greatly reduced the lead time for magazine
publication and accommodates elaborate designs and layouts.
A media player is a piece of application software for playing back multimedia files. Most
media players support an array of media formats, including both audio and video files.
Some common media players include Apple QuickTime Player, Nullsoft Winamp,
84
MusicMatch Jukebox, Real Player and Microsoft Windows Media Player. Media players
work by decoding files using pre-determined formats and codes referred to as codecs.
So long as a media player can decode the format it will playback any audio or video files.
Most modern media players also perform encoding. This has led to digital rights issues
with copying and sharing of CD and DVD content.
Analytical Software
Some software was built purely to solve very specialised cases of user problems dealing
with large for example large volumes of data for which multiple and numerous
conclusions may be drawn and from which valuable information could be gleaned for
either better, more precise reaction to situations or simply to gain competitive
advantage.
People working in business intelligence have developed tools that ease the work,
especially when the intelligence task involves gathering and analyzing large quantities of
unstructured data
• Data Mining
• Data Warehouses
• Decision Support Systems
• Online Analytical Processing (OLAP) systems simply called "Analytics" (based on
dimensional analysis and the so-called "hypercube" or "cube")
There are many types of database but here concentrate on the relational database
whose development is attributed to E.F Codd, which is by far the most common
database system in use today.
The relational model stores data in tables which are composed of rows (records) and
columns (fields). These tables are split into a series of normalized tables, with optional
85
elements being moved out of the main table to where they would take up room only if
needed.
As a whole section was dedicated to database systems earlier the text will not dwell on this
subject within this section.
Business Software
Business software is generally any software program that helps business increase
productivity or measures their productivity. The term covers a large variation of uses
within the business environment, and can be categorized by using a small, medium and
large matrix:
• The small business market generally consists of home accounting software and office
suites like QuickBooks and Microsoft Office
• The medium size market has a broader range of software applications, ranging from
accounting, groupware, customer relationship management and HR applications like
payroll, and other productivity enhancing applications.
• The last segment covers enterprise level software applications, such as those in the
fields of Enterprise Resource Planning and Product Lifecycle Management. These
applications are extensive in scope, and often come with modules that either add native
functions, or incorporate the functionality of third-party software programs.
86
Examples of Business software also include accounting systems, customer relationship
management systems and sales orders processing systems. A new and growing area is
the e-commerce/e-business class of applications.
Spreadsheets
A spreadsheet appears as a grid or table divided into rows and columns. Each cell in the grid has
a cell address or reference, for example C5 means column C row 5. A range of cells can be
referred to as a single unit, for example E4:E12 means all the cells from E4 to E12 inclusive. Cells
can contain numbers, text or a formula.
A grocer uses a mobile shop to sell groceries to customers who live a long way from
the shops. He uses a spreadsheet to keep a record of the daily sales:
87
4. Column E contains a formula to work out the sales (the formulae are hidden - only the
results are displayed). For example, cell E4 contains the formula =C4×D4; cell E5
contains the formula =C5×D5 and so on.
5. Cell E12 contains a formula to add the numbers from E4 to E10. This could be entered
=SUM(E4:E10). It is much better to use this formula than =E4+E5+E6+E7+E8+E9+E10
which will give the same result but is difficult to read and it is easy to make a mistake.
Note that you should only use the =SUM function when adding a range of cells.
• It is easy to change the data and the spreadsheet instantly recalculates the totals for
you. For example, the builder can change his call-out charge and instantly recalculate
the totals of the bills.
• You can carry out "what if?" investigations. For example, the grocer could increase his
prices to see the effect on sales and the builder could increase his hourly charge to see
the effect on his daily total.
• The information can be presented in different ways. For example, the grocer could
produce a graph of fruit and vegetable sales by choosing the ranges A4:A10 and E4:E10
in order to make the graph.
• It is easy to make these changes, save your work and print it out again.
• You can alter column widths and easily delete or add columns and rows
• You can underline, embolden text and use different fonts and graphics
• You can justify your data to the left, centre or right
• You can control the types of numbers you enter - for example you can choose
percentage, currency or set the number of decimal places
A spreadsheet can be used as a modelling tool. The model is controlled by a set of rules
produced by the formulae. These rules can be changed easily to vary the model, and
provide information about, e.g., running costs and profit margins. In fact financial
modelling is the most common use of spreadsheet applications.
For example, suppose a company wants to know, "What if we reduce the price of our
product? What effect is this likely to have on our income from sales?" Using a
spreadsheet, you just vary the data in the Price column and the data in the Income from
Sales column will automatically be recalculated (downwards). And if the reduced price
makes sales go up - simply adjust the data in the Number of Sales column, and the
Income from Sales data will again be recalculated (upwards).
88
Being able to answer "What if?" questions like this is vital for enabling a company to
predict future trends in its income and outgoings. In spreadsheet terminology this is
referred to as scenario analysis.
As well as financial modelling, spreadsheet software can be used for many other kinds of
computer model, for example:
• Computer models are cheaper to set up than other methods of predicting what will
happen in a system - for example, building a prototype
89
Microsoft Word
Many people have learned the bare necessities for using Word without any outside
training. However, there are many benefits to becoming more familiar with Word,
whether for school, for business, or for fun. Word’s features make it easy to
organize complex documents containing vast amounts of textual and visual
information into an application type material. PowerPoint and Access, is easier to
learn once one knows Word because their interfaces are highly similar to the Word
interface. This manual aims to provide people of any experience level with clear,
detailed instruction in the fundamental aspects of Word, as well as in many of its
lesser-known but highly useful capabilities.
It is by far the most widely used computer application. It allows the user to key in text and to
manipulate the text until it is exactly as required before printing. The text can be stored for
later re-use. Word Processing is of significant value to an organisation where the typing
requirement consists of a high volume of work such as quotations, estimates, minutes or
standard letters where much of the document remains unchanged or can be constructed from
standard paragraphs.
1. The ability to make corrections to a document without the need to re-key the entire
document.
90
3. Documents need never have another spelling error! Spellcheckers are provided for
several languages as well as built-in-thesaurus for improving writing style.
In MS-Word, when a line is filled with text, the cursor automatically moves to the start of the
next line. This means that there is no need to press Enter at the end of each line.
To enter a capital letter, hold Shift down with one finger while the letter to be entered is typed.
Release Shift.
Starting MS-Word
91
Either
92
MS-Word screen is then started.
The following screen will appear. In some cases, the Tip of The Day is displayed.
93
Title Bar
Menu Bar
Standard Tool
Formatting Tool
Ruler
Document
Window
Status Bar
94
The MS Word work environment
1. The Title Bar displays the Application name and the current document name
3. The Standard Toolbar provides shortcut icons from frequently used tasks
5. The Ruler Bar provides icons for indenting text and setting tabs
7. The view Selector provides icons to view the document in different ways
8. The Status Bar displays the current page number, cursor position, current time and
keyboard status
The mouse is a hand-held device which is used for pointing to and selecting text in the
document. It is important that you understand the difference between the mouse pointer and
the insertion point
Mouse Pointer: An icon that moves as you move the mouse. The
95
shape of the mouse depends on its location. For example, it appears as an outline
arrow when you are selecting commands from a menu, and hourglass ( ) when
Word is processing a command, and an I-beam (I) when you are entering text.
Insertion Point: An icon that shows where you are currently positioned on the page. The
insertion point is always a blinking vertical bar <|> and works in the same way as a cursor in a
text based environment.
Scrolling means moving through the document window to bring different parts (i.e. pages) of
the document into view. It does not move the I-beam.
At the far right side of the screen you will see the vertical scroll bar with two arrows inside it. At
the bottom of the screen you will see the horizontal scroll bar.
To:
96
1. Scroll one line up or down: Click the up or down scroll arrows on the vertical scroll bar.
2. Scroll left or right: Click on the left or right scroll arrow on the horizontal scroll bar.
4. Scroll a percentage of the document length: Drag the scroll box up or down the scroll
bar.
97
Moving the insertion point
98
10. Go to a particular page: Ctrl G or F5 (Goto key) type page
No and click Go To
Point to the Menu option, Click the Left mouse button to display the menu choices
Hold down ALT and press the underlined letter of the required menu option
If the command is followed by an ellipses (three dots) this indicates that a further list of options
will be displayed. An arrow indicates further options available.
99
1. File menu:
2. Edit Menu
100
3. View Menu:
101
4. Insert Menu
102
5. Format Menu:
103
6. Tools Menu:
104
7. Table Menu:
105
Two other menu commands are available, the Window Menu and Help Menu commands.
These will be accessed in the same way, click the menu and a pull down menu appears.
A Dialog box is a window that displays all the available options for a selected command. A
dialog box usually has an OK and Cancel button
106
For example a print dialog Box will look as follows:
107
The box may or may not have other tabs which can be activated by clicking them.
The Shortcut menu is an abbreviated version of the main Menu where the most frequently used
commands are combined on one menu option. Shortcut menus are context sensitive and
contain commands related to the item you are currently working with
To activate the Shortcut Menu click the Right mouse button or press [Shift + F10]
108
Working with the Toolbar
MS-Word provides a Standard toolbar with icons to represent frequently used tasks. To invoke
a task, point the required icon and click the Left mouse button
To display more information about the toolbar icon point to the icon. The name of the icon
appears on the screen, and additional information about the function of the icon appears in the
Status Bar at the bottom of the screen.
Creating a document
109
Each time you load MS-Word you will be presented with a new document. The window title bar
will be documented as Document 1. At this point you are ready to start typing your document.
Saving a document
As Document 1 is not a legitimate name for the document, the first time you save the document
you need to give it a name with SAVE AS command.
2. Enter the filename in the File Name box. Unless you select or type another directory,
the document will be saved in the current directory.
3. Click on OK
The document stays on the screen after you save it so you can continue working on it. Notice
the title bar now displays the new document name.
e.g. filename.doc
MS-WORD Intro
If the document has already been saved, but you want to update the disk with any changes
which may have been made, you use the Save command.
110
1. Choose the Save command from the File Menu.
By using the above command, the dialog box will not be displayed.
Each time a document is saved, the on-screen information replaces the previously saved
document on disk.
Closing a document
This option is used when you are finished working on your document, have saved it and want to
remove it from your screen and create a new file.
If you try to close a document without first saving all the changes, the system will prompt you
that you have not saved the changes and give you the option now to save them.
2. Click Yes to save changes, No to discard changes, or Cancel to cancel the command.
1. Choose the Open command from the File Menu, or click the File Open Icon on the
Standard Toolbar
2. Ensure that correct drive and directory is currently selected. (If not, point to the
required drive name (eg. A: drive in the Open dialog, then the directory name and
double-click).
111
3. Locate the required file, you may have to use the vertical scroll bar on the right of the
list box
Note: When you open a file, MS-Word will always create an new window for the
selected file, this means that several file windows can be open simultaneously.
112
Word for Windows will open a new window for the document and assign the new sequential
document number to the window. If there are other documents open, they will not be lost.
MS-Word can hold up to 9 Document Windows.
113
TEXT ENHANCEMENT
Selecting text
Selecting text is a process of highlighting text that needs to be worked with. In Word for
windows you must always select text before applying any changes to it.
Text can be selected with a mouse or with the Shift and arrow keys
2. Click and hold the left mouse button, drag the mouse over the required text
114
Selection Method Effect
With the pointer in the Selects the current paragraph. (The selection bar is
selection bar Double-Click the white space to the left of the left margin
Text attributes are enhancements such as Bold, Underline, Italics, SMALL CAPS etc.
115
Using the formatting toolbar to apply enhancements
The Formatting Toolbar is displayed on screen each time you load MS-Word. This Toolbar is
designed to make formatting features more accessible when using a mouse.
I for italics
U for underline
3. Point and click on the Icon on the Formatting bar to turn it off
Note: Many enhancements can be applied to the text once it is selected, just point
and click on the required enhancement.
Enhancements can be applied using the Menu Bar also. Select the text in the usual manner and
when selected move the Pointer to the Menu bar and click on FORMAT. Next click on FONT.
Make sure that the FONT Sheet Tab is chosen. Click on the various enhancements you require
and then click on OK. Using this method you will be able to apply a large amount of
116
enhancements including Bold, Underline, Italics, Small Capitals, Strikethrough, Subscript,
Superscript, Fonts, Point Sizes and Colour.
Removing enhancements
If you wish to de-select any of these functions simply go through the same procedure one again.
TEXT ALIGNMENT
Text alignment refers to the positioning of the text between the left and right margins. Again,
alignment selections can be made from the Formatting toolbar or the Format menu.
117
2. Type the text and press <Enter>
3. Point and click the <Left align> icon to turn off the alignment and return to the left
margin
Text alignment can be applied using the Menu Bar also. Select the text in the usual manner and
when selected move the Pointer to the Menu bar and click on FORMAT. Next click on
PARAGRAPH. Make sure that the INDENTS AND SPACING Sheet Tab is chosen. Click on the
ALIGNMENT and choose the required alignment and then click on OK.
Font Attributes
Fonts
118
The fonts you have available for working with will be controlled by the version of Windows and
the type of printer you have currently selected.
Font Examples:
Font sizes:
This is size 12
This is size 14
This is size 16
This is size 18
This size 20
This is size 24
119
2. Click on the Down Arrow (to the right of the Box)
3. Scroll through the available fonts using the vertical scroll bar, click on the required font
4. Point and click on the Down arrow in the Font Size Box on the Formatting Toolbar
5. Click on the required Font Size for the current font
Note: Font selections can also be made from the Font option in the Format Menu
120
PRINTING
3. At the top of the dialog box the current printer is displayed, if you wish to change this
click on Printer
4. In the Page Range section you can specify which part of the document you wish to print.
5. In the Copies section you can specify the number of copies for printing
121
6. Once all the selections have been made, Click OK to print
The printer icon on the toolbar can also be selected for printing text
Point to the Printer Icon and click, the default print selections will be used for the printed text
Print Preview
or
The Print Preview screen will appear showing you the page on which your cursor is located. The
mouse pointer will now take the shape of a magnifying glass with a little + sign in it. Click once
with the left mouse button and a magnified view of the page will appear on your screen. If you
click once again you will zoom out to a full page view again.
You will only see one page in Print Preview. With the Multiple Pages button you can see up to
six pages at one time. When you click on the Multiple Pages button a menu will appear. Click
on the second page and this will display two pages of the document.
When you click on the Print button you will send the document to the Printer. The Printing
message box will appear. You can stop the printing by clicking on the Cancel Button. You must
wait until the Printing message box disappears before you can continue printing.
122
Click on Close Print Preview. You will return to the Normal View screen.
Multiple pages can also be view by clicking the multiple pages icon of the Print Preview toolbars.
The appearance of the multiple pages can be selected from the given option. Up to six pages can
be viewed at once and the result may appear as follows:
123
124
DELETING AND INSERTING TEXT
Inserting text
2. Type the text to be inserted. Word for Windows is automatically in insert mode, which
means that wherever you place your I-Beam and type the new text will be inserted
within the existing text without typing over anything.
Deleting Text
125
Character after the insertion point Delete
Note: Larger amounts of text can be deleted using the selection process
2. Press INSERT (the OVR flag will be displayed in the Status Bar)
You can also overtype text by first highlighting the text you wish to overwrite and just type the
new text. Word for Windows will automatically delete the old text and insert the new text.
126
To restore deleted text
1. Choose Undo from the Edit Menu or press the Undo Icon on the Toolbar.
Note: The Undo command from the Standard Toolbar stores the last One Hundred
commands and any of those commands can be undone by choosing the
command from the list box. However because several changes in sequence
often depend on preceding changes, you cannot select an individual action
without undoing all the actions that appear above it in the list.
127
TABS AND INDENTS
MS-Word has pre-set tabs at every .5" between the left and right margin. The default tabs can
be changed or individual tabs may be set.
Tab alignments
128
The following is a sample of the different tab alignment options available in Word for Windows:
Note: When you set an individual tab in MS-Word, all the default tabs up to that point
are cleared.
You can use your mouse to set tabs directly on the Ruler.
1. Point and Click on the required tab type on the extreme left of the ruler (L). (If you click
on this symbol it will change to different symbols representing the different kinds of
Tabs)
2. Point and Click on the required position in the Ruler area where you wish to set the tab
2. In the Tabs Stop Position Box enter the Tab position as a numeric value
129
3. Choose the Alignment option you require
4. Click on the SET button which will now enter this position on the Ruler Line.
2. Click and drag the icon into the document area of the window
2. To clear all of the current tabs point and click on the Clear All button
3. To clear individual tabs point and click on the tab you wish to clear
4. Click on Clear
1. Select the text which is currently being controlled by the tab settings.
130
3. Click and drag the tab stops around until you are happy with the layout of the text.
Note: It is very important to select all of the text being effect by the existing tabs
otherwise you may just change the text position of just a line in the group of
lines of text.
Indenting text
(1) Full Left Indent:- Where all of the text in the paragraph is indented from the left
margin.
This is an example of a full left indent because all of the text in this paragraph is
indented by .5"
(2) Hanging Indent:- Where the first line of text in the paragraph remains at the left
margin and the rest of the text in the paragraph is indented.
a) This is an example of a hanging indent where the first line of text starts at the left
margin (the letter a) and the rest of the text is indented by .5" Hanging indents are
usually associated with paragraph numbering
131
1. Choose Paragraph from the Format Menu
3. Click on OK.
1. Click the paragraph indent marker to the required position on the ruler line.
The paragraph indent marker is the little square under the triangles on the ruler line.
Both the bottom and the top triangles should move when you drag the square. If only
one triangle moves, it means the mouse pointer dragged a triangle instead of the
square.
1. Position the insertion point where you want to create the indented paragraph
2. Press CTRL + M
132
1. Choose Paragraph from the Format Menu.
2. Click on the down arrow underneath the heading Special and click on Hanging.
4. Click on IL.
1. Click the bottom triangle and drag it to the required position on the ruler line.
1. Position the insertion point where you want to create the hanging indent
2. Press CTRL + T (Notice that the bottom triangle on the ruler line moves in).
3. Type the first piece of text at the left margin (usually a paragraph number)
4. Press TAB
5. Type the remainder of the text for the paragraph. When you press Enter you will be
taken back to the left margin to type in your next point.
6. Repeat the above steps for the remainder of the points and paragraphs.
133
COPY AND CUT TEXT
Copy text
134
Note: The Clipboard is a temporary storage area for text which is being copied or
moved. When you use Copy or Cut, the selected text will replace anything
currently in the Clipboard, and will remain there until something else is copied
or cut
The copy text command enables you to repeat selected text within the document or paste it in
another document.
2. Click on the Copy Icon to copy the selected text to the Clipboard
3. Position the insertion point where you wish to copy the text to
4. Click on the Paste Icon to paste the text at the new location
Cut
The cut command enables you to move text from one location to another within a document or
to another document. However, it is not advisable to move text from one document to another,
text should always be copied between documents.
2. Click on the Cut Icon to cut the selected text to the clipboard
4. Click on the Paste icon to paste the text at the new location
135
Using drag & drop
Drag & Drop enables you to move and copy text using mouse actions.
3. Click and drag the mouse to the new location for the text (you should see an rectangular
symbol attached to the mouse pointer)
4. Release the mouse at the required location, the selected text should now be moved to
the mouse pointer location.
Note: To copy text using Drag & Drop, at step 3 above hold down the Ctrl key.
4. Click on the document you are copying from in the list of open documents
136
6. Choose the Window menu option
7. Click n the document you are copying to in the list of open documents
8. Position the insertion point where you want the copied text
137
MS-Word allows you to search within a document for any combination of characters. It also
allows you to replace this word with another word. It allows you to decide whether the replace
should be carried out automatically or by pausing for confirmation at each potential
replacement to allow the user to confirm whether it should be replaced or not.
Find
3. Type the text you wish to find in the Find What Text box
Replace
6. Choose Replace - By choosing this option Word for Windows asks for confirmation
before replacing each occurrence of the text.
138
Choose Replace All - By choosing this option Word for Windows automatically replaces
all occurrences of the text.
Speller
The Word for Windows Speller checks through the document for miss-spelt words. Word for
Windows will consider any word which it does not have in its dictionary to be a miss-spelt word.
It will also check for double words.
1. Choose Spelling from the Tools Menu or choose the Speller Icon from the toolbar.
2. Word for Windows will start spell checking the document, if it finds a miss-spelt word
the Spelling dialog box will appear
139
3. If Word for Windows suggests the correct spelling for the word, click on the correct
word and click on Change All
Using autocorrect
AutoCorrect is another way of capturing frequently used text or it can be used to pre-empt
typing mistakes that occur regularly. If you are in a habit of typing teh instead of the you can
store teh to be replaced with the in AutoCorrect, this means that every time you type the
followed by a space Word will automatically replace it with the. You should used AutoText if
you do not want text to be replaced automatically.
4. Choose Add
5. Choose Close
Activating autocorrect
140
The AutoCorrect option is activated each time you type and AutoCorrect Entry Name followed
by a space or a punctuation mark.
141
PAGE FEATURES
A page break can be inserted manually if you wish to end one page and begin another. The page
break is represented by a dotted line across the document window with the description Page
Break centred
142
1. Press <Ctrl + Enter> to break a page
Note: Shift F3 is a toggle key and will rotate between Upper / Lower and Combination
case each time you use it.
Line spacing
The default line spacing is single, to change the line spacing make one of the following
selections:
Selection Effect
1. Position the insertion point where you want to change the line spacing
2. Press <Ctrl + 2> for double spacing or <Ctrl + 5> for 1.5 spacing
If the text has already been typed, first select the text and repeat step 2 above
143
Note: You can have different line spacing in different parts of the document, if the text
has already been typed, just select the section and apply the new line spacing,
or select the line spacing before you start typing, and change it when ever you
require to do so.
3. To change the Left or Right Margins, point and click or relevant margin box and type the
new margin setting in inches
4. To change Top or Bottom Margins, point and click on the relevant margin box and type
the new margin setting in inches
5. If you want the new margin setting to be the default setting for every document you
create, point and click on Default
144
HEADERS AND FOOTERS
145
A Header is text that is repeated at the top of every page in a document.
4. Type the <Header Text? Using the <TAB> key to centre or right align the header text
4. Type the <Footer Text> using the <TAB> key to centre or right align the footer text
Automatic Page Numbering, Date and Time of Printing can be applied to Headers and Footers by
clicking on the relevant Icon on the Header/Footer Toolbar.
146
TABLES
The tables features enables you to work with columnar text, applying line drawing and creating
a word wrap effect within each column of the table.
With Tables you can arrange columns of numbers and text in a document without using tabs.
Tables also provide a convenient way to present text in side-by-side paragraphs.
Creating a table
A gridlike structure will appear on the screen. This grid structure will not print - Borders
and Gridlines must be added if you want the grid to print.
5. You can also create a Table by clicking on the Table Icon on the Toolbar and highlighting
the number of columns and rows you require.
147
Use the mouse to lace the Cursor in a cell and start typing. Move from cell to cell using the TAB
and Up/Down/Left/Right Arrow Keys.
* To jump back a cell within the table press Shift and Tab.
If you press the Return key in table you will add an extra line to the row you are in. If you do this
in error use the Backspace key to remove it.
You will notice that all inserted text and numbers in the table will automatically be left aligned.
You will often need to right Align numbers.
1. Using the left button on the mouse and dragging (in the same manner as you would
highlight a paragraph of text).
2. Bringing the mouse to the top grid like of the first column until the mouse pointer
resembles and down pointing arrow, then click to select the entire column and drag to
highlight the rest of the table.
1. Select the Column you want the tabs to take effect in.
3. To use the actual tab feature within a Table press CTRL and TAB.
148
By pressing TAB you will move from cell to cell by pressing CTRL and TAB you will stay
within the cell and just move to the Tab position. However if the first tab within the cell
is a Decimal Tab and you press Tab to move into this cell the cursor will position itself at
the Decimal Tab location.
Notice that the Ruler changes when the cursor is within the Table indicating the
different column boundaries (Small grid buttons).
2. Point to the Button icon in the Ruler area which represent the current column width
3. Click and drag the Button icon to increase or decrease the width of the required column.
3. Point and Click on the Grid option which will insert the default outline on you table and
internal gridlines.
4. You can choose from a selection of Line Styles for the border by clicking on the down
arrow under Line Style and choose a style of line.
149
Shading cells in a table
3. Choose Shading
5. Click OK
Borders and Shading can also be applied to the Table using the order Icon on the Toolbar and
immediately a new button bar appears at the top of your screen.
Merge cells combines the contents of adjacent cells into one single cell. This command is
available only when you select two or more cells in a row. You can only merge cells horizontally.
Word automatically inserts a return to increase the size of the row, you may deleted this return
by pressing the delete or backspace key.
1. Select the column to the right of where the new column is to be inserted
150
2. Choose Insert Columns from the Table Menu
1. Select the Row where you wish to insert the extra row.
3. Click OK.
Note: All of the Font, Enhancements and Alignment features covered in earlier
sections can be used when working with tables.
151
Calculating numeric data in a table
Word Table feature can be used as a mini-spreadsheet to carry out calculations. You can quickly
add numbers in a row or column, you can add, subtract, multiply, divide and average numbers.
You can calculate percentages and find the minimum and maximum value for a range of cells.
+ Addition
/ Division
- Subtraction
* Multiplication
as with Microsoft Excel, cells are referred to as A1, A23 B1, B2 and so on, with the letter
representing a column and the number representing a row.
A B C D
1. Position the insertion point where the result of the calculation should be placed
2. Choose Table from the menu bar and then choose Formula
152
3. To sum the cells above on to the right accept the prompt in the dialog box and choose
OK
Changing the numeric format
Paste function
Paste Function lists the functions e.g. Average, Min, Max, Count etc. you can use to calculate
numbers. If you select a function from this list it automatically appears in the formula box.
153
Microsoft Excel
Excel is a spreadsheet program that organizes and keeps track of data, which can be
used to create charts, worksheets, and databases. Excel is frequently used for its ability
to perform mathematical calculations with large volumes of data. It also produces
graphs and charts with ease. This manual aims to help people of any experience level
become
familiar with working in Excel and to provide direction in employing some of Excel’s
more sophisticated features.
Basics
To open Excel from the UM computer labs, click on the Start button in the lower-left
corner of the screen and select PROGRAMS > MS OFFICE > MICROSOFT EXCEL. You
should see a screen that looks similar to this:
154
The Excel Environment
At the top of the window is a blue bar called the title bar. The title bar contains the
name of the application, Microsoft Excel, and the name of the workbook you are
working in, which Excel automatically calls Book1 until you name it otherwise. A
workbook is the file in which you work and store your data. The title bar also contains
the minimize button, the maximize/restore button, and the close button.
The largest portion of the screen is taken up by a view of the worksheet area.
Worksheets are used to list and analyze data. At the bottom left of the screen are
worksheet tabs that indicate the active worksheet. By default, new workbooks
contain
At the bottom and right of the screen are scrollbars, which can be used to view parts
of the worksheet that are off screen.
155
Along the left and top of the worksheet area are row headings and column headings.
Rows are denoted by numbers and columns are denoted by letters.
The thick black rectangle indicates the selected cell. A cell is the intersection of a
row and a column. The selected cell’s reference, A1, appears in the name box. The
cell reference is composed of the column letter followed by the row number.
To the right of the name box is the formula bar, which is where text and formulas
are entered and edited for each cell.
Below the title bar is the menu bar, containing lists of commands you use to give Excel
instructions.
The standard toolbar resides below the menu bar, and contains buttons with images
that correspond to some frequently-used menu commands.
The formatting toolbar is usually located below or next to the standard toolbar. It
contains buttons that correspond to several commands for formatting cells.
Managing Workbooks
The most effective menu for managing your workbooks is the FILE menu,
under which you will find the following useful commands:
NEW – asks what type of new workbook you want to create
OPEN – brings up a dialog box so you can select an already-existing
workbook to work with CLOSE – closes the workbook you are currently working in SAVE
– saves current workbook under the name it has already been
given SAVE AS – brings up a dialog box so you can enter
a name and location for the workbook PAGE SETUP –
allows you to adjust page settings, margins, the header
and footer, titles, and other print options PRINT AREA –
sets the selected cells as the only area to be printed
PRINT PREVIEW – displays the workbook as it will
appear on paper PRINT – brings up a dialog box asking
which printer to send workbook to EXIT – closes all
workbooks and exits Excel
Although there are additional options under the FILE
menu, the ones discussed in this manual are those
which you will probably find yourself using the most.
156
Toolbars may be moved by clicking on their “handles” (located in their uppermost left
corner) and dragging them to other locations. If a toolbar is in its own window, it can
be relocated by clicking and dragging its title bar.
If the workbook has not been saved before, Excel automatically brings up the Save As
dialog box.
Entering Data
Cells can contain text, numerical values, formulas, or functions. To enter data into a cell,
select the cell by clicking on it, and begin typing. The text will appear in the formula bar.
When the entry is complete, press Enter. If the text does not fit in the cell, it will overlap
if the adjacent cells are empty. If the adjacent cells are not empty, part of the entry
remains covered, and the complete entry must be viewed from the formula bar. This
can be resolved by resizing the column width (see Cell Manipulation below). Text is
automatically left aligned, whereas numerical values are right aligned.
157
The EDIT menu contains commands that you may find helpful when changing
information in cells. UNDO – reverses your last command or deletes typing REPEAT –
repeats your last command, if possible CUT – removes selected text and temporarily
saves it on the clipboard COPY – places a copy of selected text on the clipboard PASTE –
inserts contents of clipboard at insertion point PASTE SPECIAL – pastes the contents of
clipboard in format you specify FILL – see AutoFill, below CLEAR – removes the specified
data without placing it on the clipboard DELETE – removes selected data DELETE SHEET
– removes entire spreadsheet from the workbook MOVE OR COPY SHEET –
moves/copies an entire spreadsheet within a workbook FIND – searches for
text/formatting you specify REPLACE – finds and replaces specified text/formatting
AutoFill: Excel can use initial values in a few cells to create a logical list of entries, like
numbers following a pattern, words (such as the days of the week), or alpha-numeric
entries. For example, if you wanted to create a list of even numbers, enter “2” in one
cell, “4” in the next cell, then select both cells. Click on the lower right-hand corner of
the selection rectangle. The pointer will become a black cross. Drag for as long as you
want your list. Excel will fill in the data it assumes you want.
Another feature that may be helpful when working with data is Sort. Cells can have their
158
values specifically sorted by selecting the group of cells to sort then choosing DATA >
SORT. This feature can be used to put lists into alphabetical, chronological, or numerical
order.
Modifying Workbooks
Excel allows you to alter the sizes and locations of rows, columns, and cells in a
spreadsheet. You can also add, remove, and reorganize worksheets in your
workbook to create an accommodating workbook.
Cell Manipulation
159
the screen while the rest of the worksheet scrolls. This is useful when you have a
long list and want to simultaneously view the headings and the values that are
toward the end of the list. To use Freeze Pane/Split Screen select the desired
row, column or cell(s) and then choose WINDOW > FREEZE PANE or WINDOW >
SPLIT. The difference between Freeze Pane and Split Screen is that Freeze Pane
keeps all the data in one window whereas Split Screen creates smaller separate
windows for each split data.
Worksheet Manipulation
Reorganizing: The order in which the worksheets are arranged can be changed by:
o Left-clicking on the desired worksheet tab and dragging it to the new
location in the worksheet order, or
o Right-clicking on the worksheet tab and selecting Move or Copy…,
then choose a location
160
Formatting Cells
The appearance of cells can be formatted to create an attractive workbook. Cells may
be formatted using various pre-defined options that Excel provides. To format cells,
first select the desired cells, then either:
• right-click on the selection and choose Format Cells… or
• choose FORMAT > CELLS from the menu bar.
The Format Cells dialog box contains options Excel provides for cell formatting are:
• Number: displays numerical values in a specific format using symbols, decimal
places or other commonly used formats.
• Alignment: controls the vertical and horizontal positioning of the text, as well as
the way text appears in cells
• Font: controls the font sizes, colors and styles cell(s).
• Borders: controls if borders will exist around the selected cell(s) and how the
borders will be displayed.
• Patterns: controls the background colors or for giving a background pattern to
the selected cell(s).
The formatting toolbar provides an easy way to apply some of the same formatting:
Font Size
BoldItalicsUnderline Left AlignCenter Align Right Align Merge and Center
Currency Style
Percent StyleComma Style Increase DecimalDecrease DecimalDecrease IndentIncrease IndentBorders
Fill Color
161
Font Color
Formulas
A formula can be used to calculate a value for a specific cell based on the values of any
other number of cells. All formulas begin with the equal sign (=). Formulas appear in the
formula bar, but their results are displayed in the cell. Formulas often refer to other
cells. For example, if the formula =A1+A2+A3 were entered into cell A4, then the value
“16” would be displayed in A4.
Cell References
To refer to a range of cells, enter the reference for the cell in the upper-left corner of
the range, a colon (:), and then the reference to the cell in the lower-right corner of the
range. In the diagram, the selected range can be referred to as B3:D5. When copying
and pasting cell references, it is helpful to recognize the difference between relative and
absolute references. If you were to paste the formula =A1+A2+A3 into cell B4, the
formula would be pasted as =B1+B2+B3 because the cell references are relative,
meaning Excel changes the cell references depending on their location. Because the
formula was pasted in column B, Excel changed the A’s in the formula to B’s.
162
The dollar sign ($) is used to indicate absolute references. The formula
=$A$1+$A$2+$A$3 would return the same value as =A1+A2+A3. The difference is that
it could be pasted anywhere in the worksheet and it would still be pasted as
=$A$1+$A$2+$A$3, because the dollar signs indicate that the row and column
references are absolute – they will not be changed by Excel.
To enter cell references in a formula, you can type them in manually or click on the
cells you want in the formula. That is, type an equals sign, then click on a cell and Excel
will enter the cell reference into the formula. You can even refer to cells in other
worksheets and other workbooks this way.
163
When creating formulas keep in mind:
• Excel performs the operations from left to right according to the order of operator
precedence.
• Use parentheses to control the order of operations by grouping operations you want
performed first.
• You may use arithmetic and logic operators from the “Calculation operators in
formulas” handout.
Functions
Functions are predefined formulas. The SUM function could be used to return the
same value as the formula =A1+A2+A3 by entering =SUM(A1,A2,A3). An abbreviated
way would be to use a range. So,
=SUM(A1:A3) would also return “16” in the cell that the function was entered into. Excel
already has a wide variety of functions. See if one of those will accomplish your task
before creating
your own formula. Choose INSERT > FUNCTION or click the function button on the
standard toolbar, and select the function you want to use. Excel will then ask you to fill
in information that you want used in its calculations. You can either enter cell references
or click on the cells you want to use, or type in additional information manually.
164
Here is a list of some common functions that you may find useful: AVERAGE displays the
arithmetic mean of the cells referred to in parentheses. COUNT displays the number of
numerical values in the cells referred to in parentheses. COUNTA displays the number of
non-empty cells among those referred to in parentheses. MAX displays the highest value
among the cells referred to in parentheses. MIN displays the lowest value among the
cells referred to in parentheses. RAND displays a random value that is at least zero but
less than 1. ROUND displays the value in cell D7 rounded to the number of decimal
places after the comma in the parentheses (4). SUM displays the sum of the values in
the cells referred to in parentheses. TODAY displays the current date.
Remember that functions, like formulas, must begin with an equals sign (=) and
must be followed by parentheses, even if no reference is required between the
parentheses (as in the RAND and TODAY functions). If you enter a function without
a preceding equals sign, Excel treats it as text and will not perform any calculations.
There are hundreds of other functions in Excel which may help you accomplish your
purpose, but if all else fails, you can just create your own formula from scratch.
165
Chart Wizard
A graphical depiction of a worksheet can be created using the Chart Wizard. To use the
chart wizard choose INSERT > CHART or left-click on the Chart Wizard button on the
toolbar.
166
Legend, Data Labels, table should appear
Data Table
Next > Go to the next step
Step 4 of 4 “Chart Location”
< Back Go back to the previous step
Place chart:
As a new sheet: As Place the chart into an its own separate sheet Place the chart into
object in: the selected sheet
Finish Inserts chart
Pictures
167
168
Headers and Footers
To add headers and footers (information that repeats at the top and bottom of every page),
choose either VIEW > HEADERS AND FOOTERS or FILE > PAGE SETUP and choose the
Header/Footer tab. You can select a preset one or customize your own. When customizing your
own headers and footers, text can be positioned on the left, center, and right of the page. Some
of the fields you can insert include page number, date, time,
Tools
There are a few options under the TOOLS menu which you may find useful under
certain circumstances. They include:
• Protection: Restricts others from changing values and formulas of selected cell(s) or
spreadsheet.
• Goal Seek: Determines what value a cell must be changed to in order to produce a
desired result in another cell. For example, if you spend $50 per week, your Excel chart
indicates that you will spend $300 before you go home for the semester. If you only
have $250 available for spending, you can use Goal Seek to figure out how much you
should spend per week before going into debt. It turns out you need to spend $42 per
week rather than $50.
• Scenarios: Allows you to change the values of several cells and save the results as a
scenario within the same workbook. Excel will ask you to enter the new values for the
changing cells. You can view other scenarios by selecting one and clicking Show.
169
170
Microsoft Access
171
have trouble finding your Access tables.
• The Microsoft Access database contains Tables, Queries, Forms, Reports, Macros, and
Modules. You will be using Tables, Queries, and Reports.
These are the standard data tables contained in PFM. ANY CHANGE TO THE DATA IN THE TABLES.
Double-click the table name to open it.
• AirplaneInfo=Aircraft database
Tables tab
• Airport2=Airport database
• AirportInfo=Primary airport database info
• Authorizers=Record keeping auth per leg
• ChargeAcctInfo=Pax database
• CrewData=Record keeping: crew per leg
• CrewRatings=Ratings from crew database
• Crewsched=Crew from scheduling
• Dispatch=Scheduling module
• FBO=Airport database
• Flightlog=Record keeping, front page, mostly
• Flitelog2=More record keeping
• Hotel=Airport database/hotels
• paxData=Pax data from record keeping (per leg)
• PaxInfo=Pax database
172
• PaxSched=Pax from scheduling
• Pilot=Crew database
• XtraPax=More pax database
• XtraPax2=Even more pax database
• Tables. The table is the basic data container in Microsoft Access. All data contained in the
PFM Access Interface is contained in tables. Each table contains information from a
specific section of PFM, such as FlightLog. However, as PFM has grown, we have created
additional tables to accommodate the extra data. Thus you will see not only a FlightLog
table, but also Flitelog2. Even so, each table contains unique data, with no overlap
between tables. It will most likely be necessary to consult with PFM about which table
contains the information you are looking for until you get more familiar with the table
structure.
• Fields. A field is a category of information such as tail number, trip number, or date.
Please note that the field names are generic and refer to specific parts of the internal
PFM code. Sometimes, you will find field names that are confusing, however, you can
usually determine what the field represents by just looking at the data in that field. If
you need further assistance, please call PFM.
• Record. A record is the set of fields for a specific item. Thus, reading from left to right
across the first record will tell you that the aircraft number is 3 (the PFM physical aircraft
number), the PFM pointer is 8 (the internal number PFM tracks unique records by), the
tail number is N46MW, the trip number is 8 (the eighth flight log of the year, for that
aircraft), the date is 1/14/2000 which is the first month (1), fourteenth day (14), etc. In
order to see all the data contained in the record, use the scroll bar at the bottom of the
screen.
Field caption
Records
Fields
173
Total number
of records
Selected record
• The first step is to decide what information you want to see. Next, you determine what
table or tables that data are stored in. In some instances, only a single table will be
necessary for the query. When two or more tables are necessary, the tables must be
related. The only requirement for relating two tables in a query is that they share unique
common data in fields with the same data type and size. In other words, a Tail number
would not be considered as unique data because you might have reused the same tail
number when you purchased a new aircraft. However, in PFM the physical aircraft
number is unique because as you enter a new aircraft into PFM, the system assigns it a
new physical aircraft number and that number is never reused by a different aircraft.
Refer to page 12 for a table of unique fields.
174
• The TRP# field has to be told that it has to actually COUNT the number of unique city
pairs, not just display the TRP# for each pair.
• Go to View and double-click on Totals. The Totals line is added to the QBE grid.
• Click in the Totals line, under TRP# (it probably says Group By). You will get a drop-down
box. Select Count by single-clicking.
• The final part of the query is to establish the required Date Parameters. (See p.14 for a
discussion of Parameters.)
• Click in the Totals line, under the Date field. From the drop-down box, select Where. (As
in “Where the desired date is between this year/month/day and that year/month/day.)
. • In the Criteria line, type the following exactly: Between [start date] And [end
date].
175
176
Your query design is now complete.
• To run your query, click the ! on the
toolbar.
Run
query a start date. Type in the desired Start date using mm/dd/yyyy format. Then click the OK
button.
• You will be prompted to type in
• You will now be prompted to enter the desired end date. Proceed as above and click OK.
• Your query will now run. Depending on the size of the date range you have chosen (and
thus the amount of data Access has to sort through) your query make take a few minutes
to run.
177
Reports
Reports are based on queries. The query contains only the details you want to show in
the report and the resulting report loads faster.
• Select the Reports tab, then click the New button. The New Report dialog box
will be displayed. Double-click Report Wizard. The Report Wizard starts and the
first step appears.
• In the Tables/Queries combo box, click the down arrow. Then, select Query:
CityPairs.
• The field names in the CityPairs query appear in the Available Fields list.
178
• Click the right double arrow to move all four fields into the Selected Fields list.
• Click the Next button.
• The second Report Wizard step appears.
• The CityPairs report will be grouped by Tail number. This makes the Tail number
display only once, with the corresponding City Pairs grouped under it.
Otherwise, the Tail number would be repeated for each city pair displayed on
the report..
• Double-click Tail number to move it into the Grouping box at the right.
• Click Next.
• The third Report Wizard step appears. In this step, you’re setting the sorting
protocol for the list: you will sort alphabetically by Origin. In box 1, click the
down arrow.
• Click ORG.
• The sort button next to ORG shows an ascending icon (A-Z) because that’s the
default sort order. If you click the button, the sort order is set to descending (Z-
A).
• Click the Next button
• The fourth Report Wizard appears and shows the report layout. The default
layout (stepped and portrait) is good for this report.
• Click the Next button.
• The fifth Report Wizard appears and gives you six styles to choose from.
• Click to display the various layout styles. Then click to select the one you like and
click the Next button.
• The sixth Report Wizard step asks you for a name for your report. It is best to
rename it CityPairs Report so that it has a name which differentiates it from the
query “CityPairs.”
• Click Finish
• The Wizard creates your report. See page 11 for the finished report.
• You may want to Modify the Layout of the report.
• Choose Modify the Reports Design
• Then click Finish.
• The report is displayed in Layout view.
• In order to add an additional label to the reports title, for instance a printed date
range, click the Aa button.
• Then move your mouse to where you want the new label and click and drag to
draw a box.
• You can then type the desired information into the box, i.e., Jan 1, 2000March 1,
2000.
• When you are satisfied with the layout of your report, click the Datasheet view
button.
• You will be prompted to specify the Start date, as we set up in the Query.
• Type in the Start date using mm/dd/yyyy format.
• Click the OK button.
• Type in the End date using mm/dd/yyyy format.
179
• Click the OK button.
• The finished report will be displayed. Click File/print to get a printed copy of the
report.
180
181
182
183
184
185
PFM Access Tables and Unique Field Identifiers
A unique Field Identifier, also known as a Primary Key, is the field that uniquely
identifies each record.
• Sometimes, there is only one Unique Field Identifier. An example of this would
be the PaxInfo table which stores the passenger database information. The only
Primary Key needed for this table is the PFM Account number (the PFM “S”
code.) As each “S” Code is used only once for each passenger in PFM, that is all
that is necessary to identify a passenger in the passenger database.
• HOWEVER, in the PaxSched table, which contains the data from the Scheduling
module, you need to use four Primary Keys to identify a unique record: Aircraft,
Tripdate, Leg, and Index. Aircraft is the physical aircraft number, Tripdate
represents the date of the trip, Leg is the leg number for that day, and Index is
the PFM S-code for the passenger. These four data fields will uniquely tell
Access that Mr. Smith (S-code SEQFQ) flew on aircraft #4 (N123CF), on
186
November 10, 2000, leg #3.
A criteria is a rule or filter that tells Access which records you want to see. (See the
table
on p. 15 for more information on criteria.) For example, you can set a criteria in your
query to display only records from specific destination airport identifiers. This would
answer the question: “How many times did we fly into Philadelphia (PHL) and Wings
airport (N67) over a specified date range.
• On the Queries Tab, single click the CityPairs query to select it.
• Click the Design button.
The CityPairs query opens in design view. You’ll set the criteria for Philadelphia (PHL)
and Wings (N67) in the DES (destination) field.
• In the Criteria row of the DES column, type PHL or N67.
• Click in a different cell. When you click in a different cell, the criteria you type is
surrounded by quotation marks.
"PHL" Or "N67"
187
• On the Toolbar click the View button
• The query switches to Datasheet view.
• Enter the Start and End dates as prompted, then click OK
• The records for N67 and PHL are displayed in the query datasheet. You can sort
the DES field by clicking in it and then clicking the AZ button from the toolbar.
The records will be sorted, with N67 displayed first.
• Close the query by clicking the X at the top right of the screen and save the query
when prompted.
188
Page |
189
Setting Parameters
It’s great to be able to set criteria to get specific records you want, but each time you change your criteria, you
have to open the query in Design view and set new criteria.
If you change criteria often (for example, if you want to see a new date range each time or a specific tail
number) you can set up Parameters which asks you for the criteria each time you run the query.
Using parameters is a more “user-friendly” way of displaying the desired information rather than redesigning
the query in Design view. You already have seen an example of parameters when we inserted a date field in
the City-Pairs query on pp. 5-6. We will set up a parameter that allows you to select the desired tail number
for the query.
• Now every time you run the query, a dialog box will ask you which tail number you want, as well as the
date range you want.
• On the toolbar, click the View button or the!
• In the Enter Parameter Value box, enter the desired dates and then the tail number and click OK. The
query will run and return the records you want.
• Click the X to close the query and save your changes when prompted.
Table of Common Criteria used by Queries
Between.. Criteria Records having a value Find all records with Zip Codes between 11434 and 22202
And between the two values Between "11434" And "22202"
you specify.
Is Null Criteria Records having no entry Find all records without an address.
in the field Is Null
= Criteria Equal to
Find all Zip Codes equal to 61701 ="61701"
<> Not equal to Find all Zip Codes except 61701 <>"61701"
> Greater than Find all Zip Codes greater that 61701 >"61701"
< Less than Find all Zip Codes less that 61701 <"61701"
Lesson 6: The Internet
Using the Internet & E-mail facilities
The Internet is the name given to the technology that allows any autonomous computers within a building or outside the
country with a telecommunications link to send, receive and access information from any other suitably equipped
computer via Internet Service Providers.
Internet Service Providers, these are organizations that allow several autonomous computers to be connected to them as
part of the Internet, for example in Zambia there is Zamtel, Zamnet, Coppernet and Microlink. Clients have to initially pay
for the connection fees and then monthly charges based on 40 hours per week access and an extra charge for hours
above 40 hours.
An extranet is an intranet that is accessible to authorised outsiders, using a valid username and password. Private
intranets that are extended to users outside the company are called extranets. For example, authorised buyers could link
to a portion of a company’s intranet from the public Internet to obtain information about the cost and features of its
products. The company can use firewalls to ensure that access to its internal data is limited, and remains secure; and to
authenticate users, making sure that only those who are authorised to access the site can be identified.
Extranets are especially useful for linking organisations with customers or business partners. They are often used for
providing product-availability, pricing and shipment data and electronic data interchange (EDI), or for collaborating with
other companies on joint development or training efforts.
An Intranet is like a mini version of the Internet. Organisation members use networked computers to access information
held on a server. The user interface is a browser that is similar to those used on the Internet. The intranet offers access to
information on a wide variety of topics, and often includes access to the Internet
i) Users access the Internet through interface programs called browsers. The most popular and best known is
Microsoft Internet Explorer, Firefox and Netscape Navigator. Browser software packages provide facility to
store Internet addresses so that users can access frequently-visited sites without having to go through long
search process. Thus in business use, workers who regularly need up-to-date information, say, on stock
market movements, or new government legislation, or the activities of a competitor, can simply click on the
appropriate entry in a personal ‘favorites directory and be taken straight to the relevant site.
Searching the net is done using a search engine. Popular search engines include Google, Lycos, AskJeeves,
WebCrawler, Yahoo! and AllTheWeb. These guide users to destinations throughout the web: the user simply
types in a word or phrase.
ii) The problems that are brought about by the introduction of the Internet in an accounting department are:
• Since the Internet has too much information it leaves much to be desired because the quality of the
information the accounts people will be producing will be compromised
• Speed is a major issue. Data only downloads onto the user’s PC at the speed of the slowest
telecommunications link – downloading data can be a painful slow procedure especially if there are
deadlines to be met
• The Internet has so much information and entertainment available such that employers worry that their
staff will spend too much time browsing through non-work related sites, this does happen and it affects
the company’s productivity
• Connecting an information system to the Internet exposes the system to numerous security issues such as
hackers, eaves droppers and spam mail.
• Pornographic materials can be accessed by accounting staff, by so doing cases of sexual harassments at
work places may increase
• Job searches, since some organisations advertise on the Internet, employees will spend and waste a lot of
valuable company time searching for better jobs on the net
• The organisation accounting information is venerable to Internet viruses during downloads of
attachments from emails.
• Spy ware, when accounting staff visit unauthorised sites, the site visited will store the computers address,
and then send a program to the server so that it can copy important information which will be sent back
to that site that was earlier visited. This program is called spy ware.
iii) Computer users may know the precise address of an Internet site that is to be visited, perhaps because you have
seen or heard it on TV or radio or read it in a newspaper or magazine. Typically the format is something like
‘http://www.bbc.co.uk’. The address is called a URL or Uniform Resource Locator as Uniform Resource Location
Communication software
Electronic mail or email is a method of composing, sending, and receiving messages over electronic
communication systems. The term e-mail applies both to the Internet e-mail system based on the Simple Mail
Transfer Protocol (SMTP) and to intranet systems allowing users within one company or organization to send
messages to each other. Often these workgroup collaboration systems natively use non-standard protocols but
have some form of gateway to allow them to send and receive Internet e-mail. Some organizations may use the
Internet protocols for internal e-mail service.
The diagram above shows a stereotypical sequence of events that takes place when Alice sends an e-mail to
Bob.
1. Alice composes a message using her mail user agent (MUA) like Outlook Express. She types in, or selects from an
address book, the e-mail address of her correspondent. She hits the "send" button. Her MUA formats the
message in Internet Email format and uses SMTP to send the message to the local mail transfer agent (MTA) for
example sendmail in UNIX systems in this case smtp.a.org, run by Alice's Internet Service Provider (ISP).
2. The MTA looks at the destination address provided in the SMTP protocol (not from the message header), in this
case bob@b.org. A modern Internet e-mail address is a string of the form localpart@domain.example. The part
before the @ sign is the local part of the address, often the username of the recipient, and the part after the @
sign is a domain name. The MTA looks up this domain name in the Domain Name System (DNS) to find the mail
exchange servers accepting messages for that domain.
3. The DNS Server for the b.org domain, ns.b.org, responds with a mail exchange or MX record listing the mail
exchange servers for that domain, in this case mx.b.org, a server run by Bob's ISP.
4. smtp.a.org sends the message to mx.b.org using SMTP, which delivers it to the mailbox of the user bob.
5. Bob presses the "get mail" button in his MUA, which picks up the message using the Post Office Protocol (POP3).
This sequence of events applies to the majority of e-mail users. However, there are many alternative
possibilities and complications to the e-mail system:
• Users may use a client connected to a corporate e-mail system, such as IBM’s Lotus Notes or Microsoft’s Exchange
Server. These systems often have their own internal e-mail format and their clients typically communicate with
the e-mail server using a vendor-specific, proprietary, protocol. The server sends or receives e-mail via the
Internet through the product's Internet mail gateway which also does any necessary reformatting. If users work
for the same company, the entire transaction may happen completely within a single corporate e-mail system.
• A user need not have a MUA on their computer but instead may connect to a web mail service.
• The user's computer may run its own MTA, so avoiding the transfer at step 1.
• Other users may pick up e-mail in many ways, for example using the Internet Message Access Protocol (IMAP), by
logging into mx.b.org and reading it directly, or by using a mail hosting service like Google Mail.
Domains usually have several mail exchange servers so that they can continue to accept mail when the main mail
exchange server is not available
Browsers
Web browsers are used to view web pages. However, browsers are capable of a lot more than just viewing Web pages
and they are not restricted to a computer - browsers can be used by TV and mobile phones. They can be customized
them to your preference (like setting text sizes), choose what type of information they do (or do not) display and you can
even use them to send e-mail.
Figure 6: The Mozilla Firefox web browser
When your Web browser reads a document, the hyperlinks to other Web pages or Web sites appear as text
highlighted in another colour or as a graphic. When you click on the highlighted text or the graphic with your
mouse, you are transported to that site (in reality, the data from the site is transported to you, not vice versa).
You never see the code. It merely acts as an instruction to your Web browser to go to another location on the
Web.
What actually happens is that hyperlinks are included in the Web document, as a computer code called HTML (Hyperlink
Text Mark-up Language). HTML uses the HTTP (Hyper Text Transfer Protocol) invented by Tim Berners-Lee [1992] and
allows the Web site operator to include cross-references to other documents within the site, and from there, to other
sites or documents within those sites. Using something called "Meta-tags" the Web site operator or designer can also
insert keywords to help search engines locate your site when someone is searching for information you provide at the
site.
To enter the page a user is looking for, an Internet or web address called a URL (Uniform Resource Locator) is
entered in the address bar of the browser." Each part of the URL means something different, and is separated
by dots from the other parts of the URL.
When you type a URL into your browser it breaks the URL into three parts: protocol (http), server name
(www.awebsite.com) and file name (index.html) as follows: http://www.website.com/index.html.
The protocol part simply refers to and identifies a Web transmission. The first part of an URL is the "scheme." It
tells you where on the Internet the information you are seeking is located. (Remember that there's more to the
Internet than the Web.) The most common scheme, since the development of the Web is HTTP. The letters
"http" in the URL tell you that it's a Web address.
Communicating with a domain name server, the browser translates the server name into an IP (Internet
Protocol) address (the code a machine uses to recognize domain names - we only see them written in words to
make it easy for users but you can type the IP address of a Web site - if you know it - into your browser and it
will still take you there) so that it can connect to that server machine on port 80 (the standard port for web
traffic).
Once connected, the browser sends what is termed a GET request for the file name specified in the URL (in other words, it
asks the server to send the information). The server sends the file's HTML to the browser; the browser reads the HTML
tags and translates them to what appears on your monitor.
A browser can also use the POST method to accept input form the user. This makes for two-way communication is what
makes browsers so attractive for use in web applications. Browsers provide a common interface for all users (you see the
same web page from whatever location). The net result is that when an application changes all users see the change at
once and no one needs to install changes on their computer.
The World Wide Web ("WWW" or simply the "Web") is a global, read-write information space. Text documents, images,
multimedia and many other items of information, referred to as resources, are identified by short, unique, global
identifiers called Uniform Resource Identifiers (URIs) so that each can be found, accessed and cross-referenced in the
simplest possible way.
The term is often mistakenly used as a synonym for the Internet, but the Web is actually something that is available via
the Internet, just like email and many other Internet services.
An internet is any network or collection of interconnected computer networks that transmit data by packet switching
using TCP/IP, or in short IP, the Internet Protocol.
The Internet is the worldwide, publicly accessible network of all such interconnected computer networks. It is a "network
of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together
carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages
and other documents of the World Wide Web.
On the World Wide Web, a client program called a web browser retrieves information resources, such as web
pages and other computer files, from web servers using their Uniform resource locators (URL) and displays
them, typically on a computer though many other network capable devices can be used (e.g. mobile phones
and PDA units). A user can then follow hyperlinks in each page to other resources on the World Wide Web
whose location is provided by these hyperlinks. It is also possible, for example by filling in and submitting forms,
to post (send) information back to a web server for it to save or process in some way. The act of following
hyperlinks is often called "browsing" or "surfing" the Web. Web pages are often arranged in collections of
related material called "websites."
1. A web server or group of servers that will host the intranet applications. This may require EAI tools to integrate
with existing applications which are not Internet ready.
2. Provide access to the web server using a TCP/IP network. For most firms this means having a local area network
(LAN) using Ethernet.
3. Installing the user programs on all required computers (usually a browser and for some applications Java or
ActiveX capability).
4. Finally, create a homepage in HTML for the system and web pages for all the applications and information that a
user will access.
1. Workforce productivity: Intranets can help employees to quickly find and view information and applications
relevant to their roles and responsibilities. Via a simple-to-use web browser interface, users can access data held
in any database the organization wants to make available, anytime and - subject to security provisions - from
anywhere, increasing employees' ability to perform their jobs faster, more accurately, and with confidence that
they have the right information.
2. Time: With intranets, organizations can make more information available to employees on a "pull" basis (i.e.:
employees can link to relevant information at a time which suits them) rather than being deluged indiscriminately
by emails.
3. Communication: Intranets can serve as powerful tools for communication within an organization, vertically and
horizontally.
4. Web publishing: The use of intranet, permits information to be published using hypermedia technologies.
5. Business operations and management: Intranets are also being used as a platform for developing and deploying
applications to support business operations and decisions across the enterprise.
6. Application Deployment: Intranets in general are a fast way of deploying a common application to the entire
organisation. As users access it using a browser, changes need only be made at the server level not to each
individual user.
An extranet is a private network that uses Internet technology and the public telecommunication system to securely
share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users outside the company. An extranet
extends a capability or function of the organisation to a partner or customer that would otherwise require them to either
physically come in to use or deliver it or send it by other means such as fax.
An extranet requires security and privacy. These can include firewall, server management, the issuance and use of digital
certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks
(VPN) that create a tunnel through the public network, enabling secure communication over the shared network between
the organisation and its partners.
Companies can use an extranet to:
Though typically not viewed as extranets, hosted email services (e.g. Hotmail) and electronic storefront applications
(eBay) are extranets. They provide customers with access to company resources without the need to physically be in a
location of the hosting organisation. Other examples of extranets are Internet banking applications which allow the end-
user to do their banking from home avoiding queuing or having to wait for a bank clerk to do things for them.
1. Extranets can improve organization productivity by automating processes that were previously done manually
(e.g.: reordering of inventory from suppliers). Automation can also reduce the margin of error of these processes.
2. Extranets allow organization or project information to be viewed at times convenient for business partners,
customers, employees, suppliers and other stake-holders. This cuts down on meeting times and is an advantage
when doing business with partners in different time zones.
3. Information on an extranet can be updated, edited and changed instantly. All authorised users therefore have
immediate access to the most up-to-date information. Extranets can improve relationships with key customers,
providing them with accurate and updated information
4. An extranet, extends the hours of operation of a company. Continuing with the banking example, an online bank
is accessible for 24-hours a day, 7 day a week. The same cannot be said of a physical bank.
1. They can be expensive to implement and maintain within an organisation (e.g.: hardware, software, employee
training costs).
2. Security of extranets can be a big concern when dealing with valuable information. System access needs to be
carefully controlled to avoid sensitive information falling into the wrong hands.
3. Extranets can reduce personal contact (face-to-face meetings) with customers and business partners. This could
cause a lack of connections made between people and a company, which hurts the business when it comes to
loyalty of its business partners and customers.
Figure 1 shows the infrastructure of both Intranets and Extranets, the type of devices that can be used to access them and
the types of users. The content management system (CMS) is used to deploy information to both the Intranet and
Extranet. Users access the information through a portal, which is a common web site that provides links to the available
information. Depending on the type of users, and the device they are using, the CMS uses profiling to display only relevant
links on the portal. The various end users access the portal using a variety of network capable devices.
Figure 7: Extranet, Devices and Users
Types of e-business
E-Business refers to implementation of any business process as an electronic transaction or series of transactions. E-
business can be split further into e-Commerce which refers to the buying and selling of goods using electronic means e.g.
a virtual storefront on the World Wide Web, electronic data interchange and enterprise application integration.
• B2B: as in a business selling to one or many other businesses electronically. B2B exploits Internet and other
technologies to change processes along the value chain resulting in lower costs, shorter lead times and order
cycles, improved efficiency and better customer service.
• B2C: as in a single business selling to one or many consumers. B2C potentially widens the market for a business
but correspondingly increases its exposure to competition while at the same time provide consumers more
choice, a better and more informed shopping experience but also greater exposure to mass marketing and fraud.
• C2C: as in consumers selling directly to other consumers. This is usually achieved through information
intermediaries like online auction sites e.g. EBay
• B2E: represent a business model where the employees access information and execute processes in their
workflow using an internet based technology like an Intranet.
Figure 8: E-business model
Figure2 shows that e-business simply replaces the normal processes of the business system with electronic equivalents.
Inputs (B2B, Extranets) are acquired from suppliers and partners, processed internally (B2E, Intranets) to generate outputs
that are sent or sold to customers (B2C, C2C, Extranets). E-business simply uses electronic forms to achieve these same
objectives.
B2B
B2B is typically associated with the supply side of business (inputs). Typical applications and infrastructure include:
• VPN links to supplier networks over which the organisation runs applications such as Electronic Data Interchange
(EDI) which automate procurement and improve delivery times and accuracy (logistics). EDI was popularised by
supermarkets to automate the stock ordering and shelf-replenishment process. Systems link directly into the
supplier application allowing the supermarket to see their stock levels and therefore decide what brands to place
on the shelf at what times. If the stock levels are known, there is no point of placing a purchase order for goods
that the supplier cannot deliver anyway. This improved availability and increased sales and profit.
• The other function of EDI was electronic supplier payment and automated returns management where damaged
goods are accounted for electronically resulting in automated credits.
• Extranets implemented as web portals which allow partners like advertising agents, resellers, part manufacturers
and others to exchange information using collaborative tools like Lotus Notes to pick up information,
communicate product schedules or create new designs. Resellers e.g. could use the portal to collect the latest
product brochures or software upgrades to products.
B2E
B2E is usually associated with the internal work practices of a business (processing). Typical applications and
infrastructure include:
• Intranets implemented as a web portal. Employees use the intranet to access common information and
documents such as expense claim forms, attendance forms and records and company information directories like
telephone numbers and locations of relevant employees. Intranets include communication systems like email that
employees use to communicate with customers.
B2C
B2C is usually associated with the selling side of a business (outputs). Typical applications and infrastructure include:
• Electronic Storefronts from which customers can order goods and services, make payments, track their order
status and even manage their returns if products have warranty associated with them should they fail.
• Portals which are web sites that the organisation uses to communicate product changes (e.g. software upgrades,
new models) and also to deliver product support (e.g. email facility for customer to talk to an expert)
.
Advantages of E-business
• Improved Internal & External communication: Technologies like email, web sites and file transfer are instant, can
reach many people at once, or at their convenience and at same time carry a higher payload. A person using ftp
can download an entire CD worth of data (700MB) for less than ZMK100 in less than 10 minutes on a reasonably
fast connection and as technology improves the payloads will increase while the times will shorten. The net effect
is that today’s organisation can deliver a lot of information in a very short time, to many different organisations or
individuals. Inside an organisation, these same communication systems together with new models like company
intranets, allow people to share and distribute company information across the entire organisation quickly making
issues like reorganisation simpler and quicker but also flattening company hierarchy in the process.
• Extended market reach and brand recognition: by simply having a web site, a company has a world wide market
reach. Not only that, a well-designed and managed web site can give a small third world company the same image
as a large multinational from a developed nation. With clever marketing techniques (such as strategic placement
of web search results, a company can get its brand recognises across the world by far more people than its
advertising budget warrants. In theory, a company’s reach will have extended to everyone who has access to the
Internet and the World Wide Web (estimated currently at 1 billion people).
• Improved revenue and customer service: A web site reaches many people at once but more importantly it
reaches them when they wish to be reached or at their convenience. One result of this is that a firm can operate a
24-hour shopping or after-sales service. This allows the firm to operate with very low costs and achieve massive
sales growth (world wide market shopping all the time). The best example of this is Amazon.com It has no physical
retails shops but customers order from all over the world throughout the entire day. But Amazon also allows the
users to register dissatisfaction with their service as and when they wish to do so in the knowledge that there are
systems in place to answer all their queries at all times. The other result is that businesses can also track what a
user does throughout the entire buying experience and use this to sell more to them and make the entire buying
experience a better-informed and more satisfying process. Once again Amazon provides a good example of this
mass customisation. Users are given accounts when they shop at Amazon and they can use these accounts to
place orders which they can hold until they are ready to order. When they choose an item they can see reviews
from others who purchased the item or can also see what other items people who purchased it also purchased.
Past purchases are also remembered and used to make purchasing suggestions to the customer at a future date.
Customers can also purchase gifts for other people with delivery handled by Amazon at their request. Mass
customisation is the future of business.
• Faster order cycles: The on-line computer retailer DELL sells computers by phone order or via their web sites. This
means that DELL already knows what their customers have ordered before making it. They can therefore order
the correct products from suppliers and build to the customer’s specification. This business model not only allows
them to keep inventory low but they can turn keep the time between a customer making an order to the time of
delivery to less than 7 days. It has allowed DELL to take advantage of lower supplier prices and newer components
before competitors can and consequently offer lower prices and better specifications and transformed the
company to the market leader that it is. E-business allows the company to recognise the customer requirements
at the earliest possible stage in the order cycle.
• Disintermediation: refers to the gradual elimination intermediaries (middlemen) from the value chain as
organisations rely on the potential of electronic networks to establish direct linkages with customers and
suppliers. Using network applications, such as middleware, and electronic markets, organisations can internalise
activities that in the past have been performed by intermediaries (such as wholesalers, retailers, agents,
distributors, brokers, warehousing operators, forwarders) and reduce the cost of the value chain. For
organizations in developing countries, disintermediation can finally increase their share in the profits of the
industry. They can finally market their products to the customers higher up in the value chain and therefore
extract a higher price while still delivering better value (lower cost) to their customers.
Consider an electronic storefront like Amazon.com. The user will access the web site for the first time and be served web
pages with images of products and their prices from the product catalogue. When the user decides to order a product,
they will be asked to create an account and enter their payment details (e.g. credit card information). Once this
information has been gathered, the order is taken and the user is given an order number. Later on the user returns to the
site and uses the tracking number to see the progress of their order. Once the order has been fulfilled, the order
information is place in history. When the user next makes an order, the details they first entered are used and this
information is the basis of their next order.
The application server runs the programs that perform account creation and order processing. The application also
controls how a product is added to the catalogue and how information is updated e.g. new prices. The database holds
product catalogue and information such as prices. It also holds the account information which the user first entered.
The web server displays the pages generated by the application and thus the end user can see how their order is
progressing and what they have ordered as well as enter information into the system. For such a system to work, the web
application server must be closely linked to a database management system.
The integration of database management systems with web applications has therefore become an industry in itself with
many enterprise application integration (EAI) tools in use today such as IBM Web Sphere whose sole purpose is to enable
web applications to integrate with legacy databases and database applications.
Figure 11: Web-database integration (Source: O’Reilly Associates)
These applications form a middle tier of programs or scripts. These scripts provide an access layer that enables the web
server to seamlessly and securely read and write data to and from a database system and capture data from users as well
as provide them with reports. This addresses several issues:
• Security: the users in the client tier do not connect directly to the database and need not know even what the
database management system is (or that there is indeed a database). Only the scripts on the web server access
the database.
• Application independence: the scripts also mean that the web server and any application running on it
(sometimes these may be distinct machines or server clusters) does not have to include database specific
information. This way the application database management system could be changed and the application need
not be re-written to accommodate the changes. Application independence also reduces complexity.
• Efficiency: more servers can be added at the application and database layers since these are separate from one
another. The result is a more efficient system that can adapt to system load changes and be more redundant.
Web-based Internet applications with HTML user interfaces are the most common new application type. Almost every
modern application built today is designed with a browser-based HTML user interface (web-enabled).
Web application integration has become a common practice. It is used to clip static data or snapshots of web sites. The
data or snapshots can then be combined with other data or snapshots to offer users access to more information in a
single Web or HTML page.
One of the main uses of web application integration is in providing access to legacy applications. Many of the most
powerful applications in use today were built in an era when the World Wide Web was not in common use and the
Internet did not exist. To rewrite these applications would be costly and time-consuming while adding no further value. A
better approach would be to provide access to these applications by using a web integration tool. This makes the
application accessible to users without the need to install it where they are and without paying for user licenses.
There are many examples of Web-enabled applications used to perform various functions such as: to order supplies, to
track shipments (DHL.com, FedEx.com), to book travel (expedia.com) or get to a map or driving directions
(multimap.com). These entire applications share one common thread, they are web-based applications providing access
to parts of systems that already existed and were used internally by the organisation but are now available to the public.
The best example is perhaps shipment tracking. Federal Express built a shipment tracking application for use within the
organisation. Soon customers began to ask where their shipments and packages where. Some of these customers were
big companies like car manufacturers and their part suppliers, so their shipments were critical. FedEx set up call centres
where clients could phone to ask for the location of their packages. The operators would use the FedEx system to check
where the package was using an airway bill (an order number) associated with the package.
FedEx found that they were spending a lot of money on call centre staff and operations just to tell customers what was on
their system. A better way would be to provide access to the tracking component of the system to customers. They began
to install the client side application on terminals at customer sites. Several issues immediately came to light: firstly it was
costly to implement thus only large customers could have it; secondly customers had different operating systems so
Fedex had to write several different client applications for UNIX, Windows and VAX/VMS systems using different
programming teams; and finally they had to physically deploy terminals throughout client sites which were in different
parts of the world.
FedEx dealt with this problem by creating a web application which used web integration to pick only the information from
the tracking part of the application to provide information. Customers simply entered their airway bills on a web page and
all the tracking information was immediately available to them at their convenience. There was no need to call an
operator. FedEx benefited because the web-enabling their application made the company savings worth US$2 million a
year. These savings arose because there was no need to have three teams of programmers creating client software; there
was no need to deploy terminals clients already had browsers by default on their computers and users including the very
small customers could now access the tracking system. Within a year DHL, UPS and many other shipping companies had
adapted web-enable tracking as a feature in their own web sites.
There are many tools used to achieve and create web-enabled applications. Amongst the most common are the
.NET and J2EE environments which support application integration directly in programs. These are development
environments that allow a programmer to include in their code, programming constructs that achieve
integration functions such as picking data from a database and displaying it to the screen in one line of code.
Web services are the latest in a wave of integration technologies. They are software systems designed to
support interoperable machine-to-machine interaction over a network. The term usually refers to those
services that use SOAP-formatted XML envelopes and have their interfaces described by WSDL. Core to web
services are the concepts of SOAP, WSDL, XML and UDDI.
• SOAP: is an XML-based, extensible message envelope format, with "bindings" to underlying protocols (e.g., HTTP,
SMTP and XMPP).
• Web Services Description Language (WSDL): An XML format that allows service interfaces to be described, along
with the details of their bindings to specific protocols. Typically used to generate server and client code, and for
configuration.
• Universal Description, Discovery, and Integration (UDDI): A protocol for publishing and discovering metadata
about Web services, to enable applications to find Web services, either at design time or runtime.
Web services are software components that can be accessed over the Web through standards-based protocols such as
HTTP or SMTP for use in other applications. They provide a fundamentally new framework and set of standards for a
computing environment that can include servers, workstations, desktop clients, and lightweight "pervasive" clients such
as phones and PDAs. Web services are not limited to the Internet; they supply a powerful architecture for all types of
distributed computing.
Figure 6 illustrates how web services function. The service consumer which is usually a web application requests the UDDI
registry for a service. The UDDI registry points the application to the correct web service which in turn begins
communication with the application using SOAP. The web service can function in many ways either collecting data from or
outputting information to the application. What a web service does is provided in a description held in a WSDL file.
The web services could be accessing legacy applications to extract information for display on a portal or web page. It could
just as well be collecting information such as order quantities from the web application to be used as input to a legacy
application or another web application.
Figure 7 is an example of the Jacada WebFuse (http://www.jacada.com) web application integration package. It shows
how web services and other integration tools can be used to provide access to backend legacy systems with all the
information presented in web pages to the end users. The non-invasive process optimisation platform is really just a set of
web integration tools that access legacy and other systems to create a series of web-based applications that provide users
with a view to these applications.
With one single login, users have access to all these different applications. If there was no application integration, the user
would have to logon to every single application individually and maintain different usernames and passwords for each of
them. Of course the advantages are immense for having such a system but security concerns should be very obvious.
Web applications provide various advantages to both implementers and users: To the implementers they:
• Provide a common and easy interface for the application to all users.
• Make changes applied to the application available at once to all users at the same time. There is no need to go
and make changes on each individual users machine
• They are easy to deploy; Users simply access the web site and they all have browsers. Thus deployment is faster
and less costly.
• Are easy to maintain because of the reasons given above. It has over 10 million users. Consider the upgrade of
the email client Outlook Users have to download it from the Internet first then apply it and then use it. They all do
not upgrade at the same time so there is a potential risk. Hotmail on the other hand, can upgrade their
application on the server and web site and in one stroke all the 10 million plus users will be using a new version.
• Increase security: Users only have access to what they are shown and can be made to follow specific rules even
without their knowledge. Hotmail as an example also scans email for viruses on behalf of users even if they do not
have anti-virus software. This is enforced by the application not the user.
For users web-based applications provide the following benefits: there is no need to install anything (browser is
usually already installed); and there is sometimes no need to buy anything e.g. search engines like Google, Yahoo
are free to use.
Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if
the door is closed, ensuring others do not prop the door open, keeping control of the keys, etc. is
the 90%. You need both parts for effective security.
Viruses have been around for almost as long as personal computers. By definition, a computer
virus is “a self-replicating program that spreads by inserting copies of itself into other executable
code or documents.” Very much like a real virus, a computer virus alters the code of an existing
program to “infect” it and begins to replicate itself. Often viruses have a separate function, such
as to delete certain files or cause various effects on a computer. There are actually many
different types of viruses. These types include:
Macro Viruses: Macro Viruses use commands (macros) embedded in other software to infect
and spread to other files viewed by that software. E.g. Word and Excel have macros, and macro
viruses can spread by exploiting these commands.
Worms: Worms duplicate themselves and use communications such as e-mail to spread. They
can look at your e-mail address book and send themselves to users in your address book.
File Viruses: File viruses attach themselves to other software. When the software is run, the virus
loads itself into memory so that it can further infect other files or begin damaging the computer.
Trojan Horses: Trojan Horses are programs that claim to perform a particular function but in fact
do something different. E.g. they could infect your computer with a virus or erase your files.
Backdoor Trojans: Backdoor Trojans are programs that allow other computer users to remotely
control your computer via a local area network or the Internet.
Boot Sector Viruses: Boot Sector Viruses are an older type of virus and not so common. They are
used to infect a computer's startup program so that the virus would become active as soon as
the computer started up.
The most common type of virus today is the Worm. Well known viruses such as the "I Love You"
virus and "Bagle" are worms. They spread themselves via e-mail attachments. When the user
opens the attachment, it infects the computer. It then sends an e-mail with itself as an
attachment to everyone in that computer’s e-mail address book. Worms are also often designed
to use up resources on that computer, such as memory and processing power. Once infected, a
computer will run considerably slower and often strange errors will appear. If infection is allowed
to go on long enough, a computer can become unusable.
Another very popular type of virus is the Backdoor Trojan. This is a virus, often disguised as
another useful program, that gives remote access to your computer to a malicious user. The
malicious user can then load programs on that computer, such as a keystroke logger, to obtain
passwords and credit card numbers. Obviously this is a very bad thing and why it is very
important to use an Anti Virus program on your computer.
4. How to Prevent Computer Security Threats
• Virus Scanners
Enterprise version 8. Other popular, though less well known, antivirus
programs include AVAST and NOD32. Because we use McAfee on
campus, and because we offer it for free on our ConnectWright website, I
will be covering how to update and run McAfee. Other antivirus
programs tend to be very similar, so if you use something else, this
should help you as well
• Use of Firewalls
Firewalls such as Microsoft ISA can also prevent threats in your network
• IT Policies and law
These may prevent hackers as well.
References
1. Association for Computing Machinery, Inc. Association for Computing Machinery: Code of Ethics.
2. Barlow, John Perry, "The Economy of Ideas". From Wired, Issue 2.03, March 1994.
3. Craig, J.J. (2005). Introduction to Robotics. Pearson Prentice Hall. Upper Saddle River, NJ.
6. Dessler, Gary, Cole, Nina & Sutherland, Virginia, Human Resources Management in Canada,
2005
8. Martin, C. Dianne and Weltz, Elaine Yale, "From Awareness to Action: Integrating Ethics and
Social Responsibility into the Computer Science Curriculum," Computers and Society, June 1999.
9. National Conference on Uniform State Laws. Uniform Computer Information Transactions Act.
10. Tsai, L.-W. (1999). Robot Analysis. Wiley. New York. War in the Age of Intelligent Machines.
11. Hirschheim, R., Klein, H. K. & Lyytinen, K. Information systems development and data modeling:
12. www.centerforinformationintegrityresearch.org
13. Mead, C. and Conway, L. (1980). Introduction to VLSI Systems. Addison-Wesley. ISBN 0-201-
04358-0.
14. http://www.computerhope.com/os.htm
15. Zambia Institute of Chartered Accountants (ZICA),( 2007), Information Technology and
Communications-Paper T-7, Zambia Institute of Chartered Accountants
16. Zambia Institute of Chartered Accountants (ZICA),( 2007), Management Information Systems-
Paper L-8, Zambia Institute of Chartered Accountants