Professional Documents
Culture Documents
Ict Notes Final Copy Introduction To Ict
Ict Notes Final Copy Introduction To Ict
Knowledge is power
ICT
NOTES
Authored by: Mr KIHEMBE GITONGA
Course Outline
INTRODUCTION TO COMPUTERS........................................................................................................4
Definition of Computer...........................................................................................................................4
Historical development of computers....................................................................................................11
Classification of computers...................................................................................................................13
Role of ICT in a business environment..................................................................................................15
Role of computers..................................................................................................................................16
COMPUTER SYSTEM COMPONENTS.................................................................................................19
Computer hardware...............................................................................................................................19
Computer hardware selection criteria....................................................................................................24
Computer software................................................................................................................................27
OPERATING SYSTEM AND COMPUTER APPLICATION SOFTWARE.............................................33
Features of an operating system.............................................................................................................37
Features of application software............................................................................................................47
Choice of appropriate software..............................................................................................................48
WORD PROCESSING(form 2 longhorn secondary computer studies).....................................................49
Word processor......................................................................................................................................49
Creating a word document.....................................................................................................................57
Editing Word documents.......................................................................................................................62
Formatting a document..........................................................................................................................70
Creating columns...................................................................................................................................78
Creating tables.......................................................................................................................................84
Using mail merge...................................................................................................................................87
Using graphics.......................................................................................................................................91
Printing documents................................................................................................................................94
SPREADSHEETS(form 2 longhorn secondary computer studies)............................................................96
Meaning of a spreadsheet......................................................................................................................96
Areas where spreadsheets are used........................................................................................................96
Worksheet layout...................................................................................................................................96
Building and saving a worksheet...........................................................................................................96
Data manipulation on spreadsheet.........................................................................................................96
Using formulae and functions on a spreadsheet.....................................................................................96
1|Page
2|Page
3|Page
INTRODUCTION TO COMPUTERS
Introduction
Information communication technology plays an important role in our day to day activities. It is
common practice to find ICT systems in banks, supermarkets, government agencies,
entertainment industries , media industries ,schools, hospitals and at home. To adapt to the ever
changing technological world, one needs to be knowledgeable and competent user of computer
based technologies.
Definition of Computer
A computer is an electronic device that processes a user’s input, usually referred to as data to a
desired output also known as information. This is made possible by a set of instructions called
computer programs stored in a computer.
Data can be defined as raw facts that do not have much meaning to the user and include
numbers, letters and symbols. Information is processed data that meaningful to the user. A
computer is said to be electronic because it utilizes electronic signals to process information.
Together with other telecommunication devices computers have also become one of the fastest,
reliable means of communication.
The integration of computers and telecommunication facilities for the purpose of communication
is what is referred to as Information and communication technology (ICT).Computers come in
many forms but the most common is the Personal computer(PC). It is mostly used in offices,
schools, businesses and in homes.
CHARACTERISTICS OF COMPUTERS
The characteristics of computers that have made them so powerful and universally useful are;
speed, accuracy, diligence, versatility and storage capacity.
Speed
Computers work at an incredible speed. A powerful computer is capable of performing about 3-4
million simple instructions per second.
Accuracy
In addition to being fast, computers are also accurate. Errors that may occur can almost always
be attributed to human error(inaccurate data, poorly designed system or faulty instructions or
programs written by the programmer)
4|Page
Diligence
Unlike human beings, computers are highly consistent. They do not suffer from human
traits/characteristics of boredom and tiredness resulting in lack of concentration. Computers,
therefore, are better than human beings in performing voluminous and repetitive jobs.
Versatility
Computers are versatile machines and are capable of performing any task as long as it can be
broken down into a series of logical steps. The presence of computers can be seen in almost
every area of life – Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
Storage Capacity
Today’s computers can store large volumes of data. Information once recorded (or stored) in
the computer, can never be forgotten and can be retrieved almost instantaneously.
COMPUTER ORGANIZATION
A computer system consists of mainly four basic units; namely input unit, storage unit, central
processing unit and output unit. Central Processing unit further includes Arithmetic logic unit
and control unit.
A computer performs five major operations or functions irrespective of its size and make. These
functionalities of a computer include:
Functional Units:
a. Input Unit: This unit is used for entering data and programs into the computer system
by the user for processing.
b. Storage Unit: The storage unit is used for storing data and instructions before and after
processing.
c. Output Unit: The output unit is used for storing the result as output produced by the
computer after processing.
5|Page
d. Processing: The task of performing operations like arithmetic and logical operations is called
processing. The Central Processing Unit(CPU) takes data and instructions from the storage unit
and makes all sorts of calculations based on the instructions given and the type of data provided.
It is then sent back to the storage unit. CPU is the brain of the computer. It is responsible for all
functions and processes.
1. Arithmetic Logic Unit (ALU): Executes all arithmetic and logical operations.
Arithmetic calculations like as addition, subtraction, multiplication and division. Logical
operation like greater-than, less than and equal to.
2. Control Unit (CU): Controls all operations like input, processing and output are
performed by control unit. It takes care of step by step processing of all operations inside
the computer controls and co-ordinates computer components. It achieves step by step
processing by:
o Reading the code for the next instruction to be executed.
o Incrementing the program counter so it points to the next instruction.
o Reading whatever data the instruction requires from cells in memory.
o Providing the necessary data to an ALU or register.
o If the instruction requires an ALU or specialized hardware to complete, instruct the
hardware to perform the requested operation.
3. Registers :Stores the data that is to be executed next, "very fast storage area"
Speed measurement: The speed of Central Processing Unit (CPU) is measured by Hertz (Hz),
Which represent a CPU cycle. The speed of CPU is known as Computer Speed.
6|Page
COMPUTER MEMORY
Computer’s memory can be classified into two types;
o Primary memory
o Secondary memory
Primary memory
Primary Memory can be further classified as
o RAM
o ROM.
It is memory within the computer system that is responsible for storing data on a temporary
basis, so that it can be promptly accessed by the processor as and when needed. It is the place in
a computer where the operating system, application programs and the data in current use are kept
temporarily so that they can be accessed by the computer’s processor. It is said to be ‘volatile’
since its contents are accessible only as long as the computer is on. The contents of RAM are no
more available once the computer is turned off. RAM is considered “random access” because
you can access memory cell directly if you know the row and column.
7|Page
Secondary Memory
Secondary/auxiliary memory is storage other than the RAM. These include devices that are
peripheral and are connected and controlled by the computer to enable permanent storage of
programs and data. Secondary storage devices are of two types; magnetic and optical. Magnetic
devices include hard disks and optical storage devices are CDs, DVDs, Pen drive, Zip drive etc.
Hard Disk
Hard disks are made up of rigid material and are usually a stack of metal disks sealed in a box.
The hard disk and the hard disk drive exist together as a unit and is a permanent part of the
computer where data and programs are saved. These disks have storage capacities ranging from
1GB to 1000 GB and more. Hard disks are rewritable.
Optical Disk
An optical disc drive (ODD) is a disk drive that uses laser light as part of the process of reading
or writing data to or from optical discs. Some drives can only read from discs, but recent drives
are commonly both readers and recorders, also called burners or writers. Compact discs, DVDs,
and Blu-ray discs are common types of optical media which can be read and recorded by such
drives. Optical drive is the generic name; drives are usually described as "CD" "DVD", or
"Bluray", followed by "drive", "writer", etc. There are three main types of optical media: CD,
DVD, and Blu-ray disc. CDs can store up to 700 megabytes (MB) of data and DVDs can store up
to 8.4 GB of data. Blu-ray discs, which are the newest type of optical media, can store up to 50
8|Page
GB of data. This storage capacity is a clear advantage over the floppy disk storage media
(a magnetic media), which only has a capacity of 1.44 MB.
Compact Disk
Compact Disk (CD) is portable disk having data storage capacity between 650-700 MB. It can
hold large amount of information such as music, full-motion videos, and text etc. CDs can be m
either read only or read write type.
Flash Disk
A storage module made of flash memory chips. Flash disks have no mechanical platters or access
arms, but the term "disk" is used because the data are accessed as if they were on a hard drive.
The disk storage structure is emulated.
9|Page
SYSTEM UNIT
This is the part that houses the brain if the computer called the central processing unit (CPU)
The system unit also houses other devices called drives. Drives are used to store record and read
data. The two common types of system units are tower and desktop type
PERIPHERAL DEVICESo
Peripheral devices are connected to the system unit using special cables called interface cables
that transmit data and information to and from the devices. The cables are attached to the system
unit through connectors called ports
Peripherals devices may be arranged with the monitor resting on top of the system unit or as a
stand-alone if connected to a tower type system unit.
Keyboard
It’s the most common peripheral device that enables the user to enter data and instructions in a
computer.
Monitor
A monitor is simply the screen or television like device used for displaying information. It is
called a monitor because it enables the user to monitor what is going on in the computer.
Mouse
A mouse is a pointing device that enables the user to execute commands. It is used to control an
arrow displayed on the screen. To execute a command, the user moves the mouse which
consequently moves the mouse which consequently moves the pointer on the screen. Once the
pointer is on the icon(a small pictorial representation of a command)
11 | P a g e
2 Second Generation
The period of second generation: 1959-1965: Transistor based.
3 Third Generation
The period of third generation 1965 -1971: Integrated circuit based.
4 Fourth Generation
The period of fourth generation 1971-1980: VLSI microprocessor based.
5 Fifth Generation
The period of fifth generation: 1980 – onwards. ULSI microprocessor based.
FIRST GENERATION COMPUTERS (1940s to 1958)
First generation computers were very large physically and used thousands of electronic gadgets
called vacuum tubes or thermionic valves. These computers also consumed a lot of power,
emitted a lot of heat and constantly broke down. Examples of first generation computers include
Electronic Numeric Integrator and calculator (ENIAC) and the Electronic Discrete variable
Automatic Computer(EDVAC).
Computers in this generation operated using tiny solid-state electronic devices called transistors
that were much smaller than the vacuum tubes. These computers produced less heat, were much
faster, smaller in size and more reliable than those made of vacuum tubes. Examples of second
generation computers include IBM 1401 and 707, UNIVAC 1107, ATLAS LEO Mark III and
Honeywell 200.
The third generation of computers used electronic devices called integrated circuits (ICs). An
integrated circuit consists of thousands of smaller transistor circuits etched on a semiconductor
called a silicon chip. Third generation computers emitted less heat, were smaller in size and were
12 | P a g e
easier to program, use and maintain compared to their predecessors. Examples of third
generation computers include smaller and less expensive minicomputers such as the IBM 360
and ICL 19000 series.
From 1970, further technological improvement was done on the silicon chip design by
compressing more tiny circuits and transistors into even smaller space. This design produced
what is called large scale integrated (LSI) and Very Large Scale Integrated (VLSI) circuits which
were used in the innovation and technological development of the brain of the computer called
the microprocessor. Fourth generation computers are characterized by very low emission of heat,
are small in size and easier to use and maintain. Examples of fourth generation computers
include IBM 370 and 4300, Honeywell DPS-88 and Burroughs 7700.
Today’s computers fall in this generation. They have very high processing power and speed than
their predecessors, whose size is increasingly becoming smaller. These computers have special
instruction sets that allow them to support complex programs that mimic human intelligence
often referred to as artificial intelligence.
Fifth generation computers are characterized by connectivity to internet, superior hardware and
software and are very small in size.
A lot of research is being done to try and come up with computers that can work without human
intervention. One of the most successful developments in this field has been the invention of
computer that can help managers to make decisions and those that can offer critical expert
services to users instead of relying on human professionals.
CLASSIFICATION OF COMPUTERS
Classification of computers
Physical size,
Purpose
Functionality
13 | P a g e
Based on physical size, computers can be classified into four main groups namely,
supercomputers, mainframe computers, minicomputers and microcomputers.
SUPERCOMPUTERS
Supercomputers are the fastest, largest, most expensive and powerful computers available. They are able
to perform many complex operations in a fraction of a second. Because of its weight a supercomputer is
kept in a special room. Due to their huge processing power, supercomputers generate a lot of heat. Special
cooling systems are therefore required. Sometimes the whole CPU is immersed in an aquarium like
container containing liquids fluorocarbon to provide cooling.
Supercomputers are mainly used for scientific research, which requires enormous calculations.
Applications that justify use of supercomputers include aerodynamic design and simulation, petroleum
research, defense and weapon analysis among others. Supercomputers are mainly found in developed
countries.
MAINFRAME COMPUTERS
Mainframes are less powerful and less expensive than supercomputers. They are used for processing data
and performing complex mathematical calculations. They have a larger storage capacity and can support a
variety of peripherals. They handle all kinds of problems whether scientific or commercial. They are
mostly found in government agencies, big organizations and companies such as banks, hospitals, airports
etc. Which have large information processing needs.
MINICOMPUTERS
A minicomputer resembles the mainframe but is much smaller. It was developed as the cheaper
alternative to the mainframe. They are used mainly in scientific laboratories research institutions,
engineering plants and places where processing automation is required. They are well adapted for
functions such as accounting, word processing, database management and specific industry applications.
MICROCOMPUTER
A microcomputer is the smallest, cheap and relatively least powerful type of computer. It is called a
microcomputer because its CPU is called a microprocessor which is very small compared to that of
minicomputers, mainframe and supercomputers.
Technological advancements have seen the development of smaller microcomputers. The following are
the various types of microcomputers in operation today arranged in descending order according to size.
14 | P a g e
Computers can be classified according to the tasks they perform either as general or special purpose
computers.
General purpose computers have been designed to be able to perform a variety of tasks when loaded with
appropriate programs. They are the most common type of computers in use today. Their flexibility allows
them to be used in a wide range of applications like document processing, performing calculations,
accounting data and information management among others.
Special purpose computers are designed to serve a specific purpose or to accomplish one particular task.
Such computers can perform no other task except the one they were meant to do. This means that the set
of instructions, which drive a special purpose computer are limited in number at the time of manufacture.
Example of such computers include ; robots used in manufacturing industries, mobile phones for
communication only and electronic calculators that carry out calculations only. Since special purpose
computers are dedicated to a single task, they can perform the task quickly and very efficiently.
Computers can be classified into three types according to the type of data they process. Data can either be
in discrete or in continuous form.
Digital Computers
Digital computers process data that is discrete in nature. Discrete data also known as digital data is
usually represented using two-state square waveform.
15 | P a g e
Analog Computers
This refers to computers that process data that is continuous in nature. Continuous data also known as
analog data is usually represented using a continuous waveform such as the one below.
Analog computers are used in manufacturing process like monitoring and regulating furnace temperature,
pressure etc. They are also used in other applications like in weather stations to record and process
physical quantities eg wind, cloud speed , temperature
16 | P a g e
Role of computers
APPLICATION AREAS OF COMPUTERS/AREAS WHERE COMPUTERS ARE USED
o Supermarkets
Most computers used in supermarkets help in management of daily activities such as stock
control. The stock control system keeps account of what is in the stock, what is sold and what is
out of stock. The management is automatically alerted whenever a particular item or items are
running out of stock that need reordering.
o Offices
Computers have increased the efficiency in offices by reducing the time and effort needed to
access and receive information. Most modern office functions have been automated for faster
information distribution and document processing.
o Banks
Special cash dispensing machines called automated teller machines (ATM) have enabled
automation of cash deposits and withdrawal services. Efficiency has also been increased due to
better record keeping and document processing brought about by use of computers.
o Industries
Computers are being used to monitor and control industrial processes. Computers in the form of
robots have been used in industries to perform tasks that are considered too unpleasant,
dangerous, or complex and tedious to assign to human beings.
o Hospitals
Computers are used to keep patient records in order to provide easy access to a patient’s
treatment and diagnosis history.
Computerized medical devices are now being used to get a cross sectional view of the patient’s
body that enables physicians to get proper diagnosis of the affected body parts with high levels of
accuracy. Computers also control life support machines in intensive Care Units(ICU).
o Transport
Computers are used to monitor vehicle traffic in busy towns, in aircraft navigation and in making
reservations.
o Communication
Integration of computers and telecommunication facilities has made message transmission and
reception to be very fast and efficient. Because of the speed with which information can be
transmitted around the world using computers, the world is said to have become a Global village.
o Law enforcement agencies
Information stored in computers such as fingerprints, images and other identification details help
police officers carry out criminal investigations.
17 | P a g e
o Education
Computers are used widely in teaching and learning processes. Learning and teaching using
computers is referred to as Computer aided learning(CAL) and Computer Aided instruction(CAI).
For example, Experiments in subjects like chemistry or physics may be demonstrated using
special computer programs that depict them on the screen through a process called simulation.
o Library services
In a computerized library, a computer enables library personnel to easily access and keep updated
records of books and other library materials. Library users can also use computers to search for
titles instead of using the manual card catalogue.
18 | P a g e
Review Questions
Review Questions.
1. What is a Computer?
a). Data.
b). Programs.
d). Information.
19 | P a g e
Computer hardware is the collection of physical elements that constitute a computer system. Computer
hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard,
computer data storage, hard drive disk(HDD), system unit(graphics cards, sound cards, memory,
motherboard and chips) etc, all of which are physical objects that can be touched.
20 | P a g e
INPUT DEVICES
Input device is any peripheral (piece of computer hardware equipment) used to provide data
and control signals to an information processing system such as a computer or other information
appliances.
Input devices translate data from a form that humans understand to one that the computer
can work with. Most common input devices are keyboard and mouse.
Keyboard:
The keyboard is very much like a standard typewriter keyboard with a few additional keys. The
basic QWERTY layout of characters is maintained to make it easy to use the system. The
additional keys are included to perform certain special functions. These are known as function
keys that vary in number from keyboard to keyboard.
Mouse:
It is a device that controls the movement of the cursor or pointer on a display screen. A mouse is
a small object you can roll along a hard and flat surface. Its name is derived from its shape,
which looks a bit like a mouse. As you move the mouse, the pointer on the display screen moves
in the same direction.
21 | P a g e
Trackball:
A trackball is an input device used to enter motion data into computers or other electronic
devices. It serves the same purpose as a mouse, but is designed with a moveable ball on the top,
which can be rolled in any direction.
Touchpad:
A touch pad is a device for pointing (controlling input positioning) on a computer display screen.
It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also
being made for use with desktop computers. A touch pad works by sensing the user’s finger
movement and downward pressure.
Touch Screen:
It allows the user to operate/make selections by simply touching the display screen. A display
screen that is sensitive to the touch of a finger or stylus. Widely used on ATM machines, retail
point-of-sale terminals, car navigation systems, medical monitors and industrial control panels.
22 | P a g e
Light Pen:
Light pen is an input device that utilizes a light-sensitive detector to select objects on a display
23 | P a g e
Scanner:
Scanner is an input device that can read text or illustration printed on paper and translates
the information into a form that the computer can use. A scanner works by digitizing an image.
24 | P a g e
Output devices
Monitor:
It is also referred to as computer screen or display. Monitor is an output device that resembles the
television screen. It may use a Cathode Ray Tube (CRT) to display information. The monitor is
associated with a keyboard for manual input of characters and displays the information as it is
keyed in. It also displays the program or application output. Like the television, monitors are
also available in different sizes.
Printer: Printers are used to produce paper (commonly known as hardcopy) output. Based on
the technology used, they can be classified as Impact or Non-impact printers. Impact printers use
the typewriting printing mechanism wherein a hammer strikes the paper through a ribbon in
order to produce output. Dot-matrix and Character printers fall under this category. Non-impact
printers do not touch the paper while printing. They use chemical, heat or electrical signals to
etch(imprint) the symbols on paper. Inkjet, Deskjet, Laser, Thermal printers fall under this
category of printers.
25 | P a g e
Plotter: Plotters are used to print graphical output on paper. It interprets computer commands
and makes line drawings on paper using multi colored automated pens. It is capable of producing
graphs, drawings, charts, maps etc.
Facsimile (FAX): Facsimile machine, a device that can send or receive pictures and text over
a telephone line. Fax machines work by digitizing an image.
Sound cards and Speaker(s): An expansion board that enables a computer to manipulate and
output sounds. Sound cards are necessary for nearly all CD-ROMs and have become common
place on modern personal computers. Sound cards enable the computer to output sound through
speakers connected to the board, to record sound input from a microphone connected to the
computer, and manipulate sound stored on a disk.
26 | P a g e
The following factors should be put into consideration before acquiring a computer or hardware
accessories.
Therefore purchasing computer or memory module for upgrade; consider the following:
The type of memory package e.g DDR, DDR II
Whether there is an empty memory slot
Compatibility with other modules if upgrading
Capacity of the module
27 | P a g e
o Warranty
A warranty is an agreement between the buyer and the seller that spells out terms and
conditions of, after selling a product in case of failure or malfunction.
The most important consideration to make is whether the seller is ready to actually
provide after sale services. On top of the actual cost of the item, most manufacturers and
suppliers include a certain percentage charge to cover the warranty.
A good warranty should cover the following points:
Scope of cover, e.g. six months, a year
Callout response and liability agreement. For example, how long should the
supplier take to repair a fault or replace the product and if he/she delays, who
bears the cost.
Preventive maintenance for example regularity of service at intervals.
o Cost
The cost of a computer system depends on:
It’s processing capability
Whether it is branded or a clone. Branded computers are more expensive than
their equivalents because of the superior technology involved to manufacture
smaller components without losing performance abilities. It is important to do a
market survey from magazines, newspapers and electronic media or visit or
o Portability
Portable computers such as laptops PDA’s are ideal for people who do not spend most of
their time in the office
o Monitor
Depending on preference, choice of a monitor may depend on size, resolution and the
technology used on it. Currently, flat panel displays are replacing CRT’s.
o Multimedia capability
28 | P a g e
Multimedia capability refers to the ability for a computer to process and output text,
sound, video and pictures. A multimedia system consists of speakers, CD/DVD drive,
sound card and a SVGA monitor.
o Other considerations
Other considerations include available ports, wireless connectivity and system unit form
factor whether tower type or Desktop
29 | P a g e
Computer software
COMPUTER SOFTWARE
Software is a term that refers to organized collections of computer data and instructions,
often broken into two major categories:
o System software: Provides the basic non-task-specific functions of the computer
o Application software: Used by users to accomplish specific tasks.
Software types
1. System software
It is responsible for controlling, integrating, and managing the
individual hardware components of a computer system so that other software and
the users of the system see it as a functional unit without having to be concerned
with the low-level details such as transferring data from memory to disk, or
rendering text onto a display. Generally, system software consists of an operating
system and some fundamental utilities such as disk formatters, file managers,
display managers, text editors, user authentication (login) and management tools,
and networking and device control software.
2. Application software:
Is used to accomplish specific tasks other than just running the computer system.
Application software may consist of a single program, such as an image viewer; a
small collection of programs (often called a software package) that work closely
together to accomplish a task, such as a spreadsheet or text processing system; a larger
collection (often called a software suite) of related but independent programs and
packages that have a common user interface or shared data format, such as Microsoft
Office, which consists of closely integrated word processor, spreadsheet, database, etc.;
or a software system, such as a database management system, which is a collection of
fundamental programs that may provide some service to a variety of other independent
applications.
30 | P a g e
o According to purpose
o According to Acquisition
o End-user-license(EUL)
Computer software may primarily be designed to manage the hardware resources or to help the
user to accomplish specific tasks. Therefore, software may be classified as either system software
or application software.
System software
It performs a variety of fundamental operations that avails computer resources to the user. These
functions include:
1) Booting the computer and making sure that all hardware elements are working properly.
2) Performing operations such as retrieving, loading, executing and storing application
programs.
3) Storing and retrieving files
4) Performing a variety of system utility functions
31 | P a g e
1) Operating systems
2) Firmware
3) Utility software
4) Networking software
Operating systems
An operating system consists of a set of complex programs that work together to control
execution of user programs called applications and act as a go between(Interface) between the
application and the computer hardware. It manages input, output and storage operations in a
computer. Examples of common operating systems are Microsoft windows (2000,xp,vista,7 ,8 ,
10), Unix, Linux and Macintosh(MacOs).
Firmware
Also referred to as stored logic is a combination of both the software and hardware recorded
permanently on electronic chips. Usually, a firmware is a read only memory chip that is mounted
or plugged into the motherboard. Firmware may also hold an operating system, utility programs,
language processors etc.
Utility software
Utility software is a special program that performs commonly used services that make certain
aspects of computing go on smoothly. Such services include sorting, copying, file handling, disk
management etc. The two basic types of utility software are:
1. System-level Utility: These help the users to work with the operating system and its
functions. For example, a utility software tells the user when he/she enters a wrong
command and gives suggestions how the error can be corrected.
2. Application level Utility: These make application programs run more smoothly and
efficiently. Such utility programs are commonly purchased separately or may be part of
an operating system.
32 | P a g e
Networking software
This type of software is mostly used to establish communication between two or more computers
by linking them using communication channel like cables to create a computer network.
Networking software enables the exchange of data in a network as well as providing data
security. Network software may come as independent software or integrated in an operating
system. An example of networking software is novel netware.
Application software
Application software also known as application packages are programs that are designed to help
the user accomplish specific tasks. Example and uses of common application packages.
o in-house developed
o vendor off-the-shelf software
These are programs that are uniquely designed and tailored to meet a particular user’s needs.
For example, a bank may decide to manage its banking operations using a unique program
developed by hired programmers. These programs are not available in shops and once
developed for one company or user they may not address the needs of other users.
33 | P a g e
Vendor off-the-shelf software developed by software engineers, packaged and then made
available for purchase through a vendor, distributor or directly from the developer. A
developer may bundle more than one but closely related software into one package to form a
suite or integrated software as opposed to single purpose software. Examples of such suites
are Microsoft-office and Corel WordPerfect while those of single of single purpose are
QuickBooks and Sage Pastel.
The term package is sometimes used to refer to these types of software that are packaged and
sold by vendors.
1. They may have some features not needed by the user which may take extra storage
2. They may require the user to change processes and hardware for compatibility which
may in turn be expensive.
3. They may lack some features required by the user
o Open Source
o Proprietary
o Freeware
Open source
Open source software refers to software whose source code(Programmed set of instructions) is
freely made available to users. The users are encouraged to use, modify and distribute the
modified product. Most distributions of Linux operating systems and Open Office are open
source software which are made available to users under General Public Licence(GPL)
34 | P a g e
Proprietary software
Are those software whose source code is hidden from users. Modifications are only made by the
software manufacturer. Proprietary software may be licensed to users at a fee applied or applied
freely. Microsoft Windows operating systems and Office are examples of proprietary software.
Freeware
Are software products that are freely made available to the user. However, beware of freeware
because some may be malicious software. An example freeware is Grisoft antivirus software
known as AVG Free Edition. Examples of proprietary software that a user is required to pay for
license fee include Microsoft Windows operating system, Microsoft Office, Adobe PageMaker
and CorelDraw suite.
35 | P a g e
An operating system basically consists of two main parts namely; Shell and Kernel. Shell is the
outer part of the operating system use to interact with the operating system. Kernel is the core of
the operating system regarded as the operating system. It is the kernel that is responsible for
managing and controlling computer resources such as the processor, main memory, storage
devices, input devices, output devices and communication devices.
Processor scheduling
Process scheduling refers to the allocating each job waiting for execution processor time at each
given interval. Since a computer may have concurrent processes ready for execution, it is the
36 | P a g e
operating system that determines which task will be processed first. The operating system
schedules jobs according to priorities. The higher the priority, the higher the likelihood of being
allocated CPU time.
Resource allocation
Each available resource in a computer is given a unique identification number called interrupt
request(IRQ). The operating system uses the IRQ number to identify the resource being
requested. Poor resource allocation would result to an undesirable condition referred to as
deadlock. Deadlock is a situation where a particular job holds a requested resource and fails to
release it, yet it is requesting for a resource held by another job.
Memory management
Data and instructions entered into the computer are temporarily held in the main memory before
and after processing. However, since RAM is a scarce resource, the operating system determines
which task remains in memory awaiting for execution and which one will be kicked out back to
secondary storage.
The operating system may organize the main memory into blocks of sizes called page frames.
Processes are equally divided into pieces that can fit into the frames called pages. To manage
memory the operating system swaps pages between the main memory and secondary storage.
37 | P a g e
Therefore, in terms of memory management, the hard disk where pages are held, is referred to as
virtual memory.
Input/Output management
The operating system coordinates between the various I/O and other peripheral devices such as
auxiliary storage devices, making sure that data is transmitted securely. For example when
printing, the CPU directs its attention to the printing function. The operating system searches for
a printer, chooses the correct one, translates the name of the CPU and finally the CPU sends the
document to the printer. This makes the CPU available for other activities.
Error handling
The operating system has many ways of alerting the user of errors that may arise out of illegal
operations, hardware or software failure. Most operating systems express what the error is, and
where possible make suggestions on how to correct the error. The operating system does this by
monitoring the status of the computer system and performing audit checks on users, hardware
and software.
Interrupt handling
An interrupt is a break from the normal sequential processing of instructions in a program. A
critical request causes the processor to stop executing and attend to it, before returning control
back to the process that was initially interrupted.
38 | P a g e
39 | P a g e
For example, if you are using MS DOS operating system, you can copy a file
called Fruits.Dat from a hard disk C to floppy disk A as follows. Copy
C:\Fruits.Dat A:\
NB: The user must press enter key for every command to be executed.
Command-line operating systems have become unpopular because it is difficult to
remember the commands, cannot process complex graphics and hardly make use
of emerging hardware and software technologies.
1. Kernel
40 | P a g e
With the aid of the firmware and device drivers, the kernel provides the most basic level of
control over all of the computer's hardware devices. It manages memory access for programs in
the RAM, it determines which programs get access to which hardware resources, it sets up or
resets the CPU's operating states for optimal operation at all times, and it organizes the data for
long-term non-volatile storage with file systems on such media as disks, tapes and flash memory.
1. Program execution
The operating system provides an interface between an application program and the computer
hardware, so that an application program can interact with the hardware only by obeying rules
and procedures programmed into the operating system. The operating system develops and
executes application programs. Executing an application program involves the creation of a
process by the operating system kernel which assigns memory space and other resources,
establishes a priority for the process in multi-tasking systems, loads program binary code into
memory, and initiates execution of the application program which then interacts with the user
and with hardware devices.
2. Interrupts
Interrupts provide an efficient way for the operating system to interact with and react to its
environment. Interrupt-based programming is directly supported by most modern CPUs.
Interrupts provide a computer with a way of automatically saving local register contexts, and
running specific code in response to events. Even very basic computers support hardware
interrupts, and allow the programmer to specify code which may be run when that event takes
place.
When an interrupt is received, the computer's hardware automatically suspends whatever
program is currently running, saves its status, and runs computer code previously associated with
the interrupt. In modern operating systems, interrupts are handled by the operating
system's kernel. Interrupts may come from either the computer's hardware or the running
program.
When a hardware device triggers an interrupt, the operating system's kernel decides how to deal
with this event, generally by running some processing code. The amount of code being run
depends on the priority of the interrupt (for example: a person usually responds to a smoke
detector alarm before answering the phone). The processing of hardware interrupts is a task that
is usually delegated to software called a device driver, which may be part of the operating
system's kernel, part of another program, or both. Device drivers may then relay information to a
running program by various means.
A program may also trigger an interrupt to the operating system. If a program wishes to access
hardware, for example, it may interrupt the operating system's kernel, which causes control to be
passed back to the kernel. The kernel then processes the request. If a program wishes additional
resources (or wishes to shed resources) such as memory, it triggers an interrupt to get the kernel's
attention.
41 | P a g e
3. Modes
Privilege rings for the x86 microprocessor architecture available in protected mode. Operating
systems determine which processes run in each mode.
Modern microprocessors support multiple modes of operation. CPUs with this capability offer at
least two modes: user mode and supervisor mode. Supervisor mode operation allows unrestricted
access to all machine resources, including all MPU(Microprocessor unit) instructions. User mode
operation sets limits on instruction use and typically disallows direct access to machine
resources. CPUs might have other modes similar to user mode as well, such as the virtual modes
in order to emulate older processor types, such as 16-bit processors on a 32-bit one, or 32-bit
processors on a 64-bit one.
At power-on or reset, the system begins in supervisor mode. Once an operating system kernel has
been loaded and started, the boundary between user mode and supervisor mode (also known as
kernel mode) can be established.
Supervisor mode is used by the kernel for low level tasks that need unrestricted access to
hardware, such as controlling how memory is accessed, and communicating with devices such as
disk drives and video display devices. User mode, in contrast, is used for almost everything else.
Application programs, such as word processors and database managers, operate within user
mode, and can only access machine resources by turning control over to the kernel, a process
which causes a switch to supervisor mode. Typically, the transfer of control to the kernel is
achieved by executing a software interrupt instruction. The software interrupt causes the
microprocessor to switch from user mode to supervisor mode and begin executing code that
allows the kernel to take control.
In user mode, programs usually have access to a restricted set of microprocessor instructions, and
generally cannot execute any instructions that could cause disruption to the system's operation. In
supervisor mode, instruction execution restrictions are typically removed, allowing the kernel
unrestricted access to all machine resources.
The term "user mode resource" generally refers to one or more CPU registers, which contain
information that the running program isn't allowed to change. Attempts to change these resources
generally causes a switch to supervisor mode, where the operating system can deal with the
42 | P a g e
illegal operation the program was attempting, for example, by forcefully terminating ("killing")
the program.
4. Memory management
Among other things, a multiprogramming operating system kernel must be responsible for
managing all system memory which is currently in use by programs. This ensures that a program
does not interfere with memory already in use by another program. Since programs time share,
each program must have independent access to memory.
Cooperative memory management, used by many early operating systems, assumes that all
programs make voluntary use of the kernel's memory manager, and do not exceed their allocated
memory. This system of memory management is almost never seen any more, since programs
often contain bugs which can cause them to exceed their allocated memory. If a program fails, it
may cause memory used by one or more other programs to be affected or overwritten. Malicious
programs or viruses may purposefully alter another program's memory, or may affect the
operation of the operating system itself. With cooperative memory management, it takes only
one misbehaved program to crash the system.
Memory protection enables the kernel to limit a process' access to the computer's memory.
Various methods of memory protection exist, including memory segmentation and paging. All
methods require some level of hardware support (such as the 80286 MMU), which doesn't exist
in all computers.
In both segmentation and paging, certain protected mode registers specify to the CPU what
memory address it should allow a running program to access. Attempts to access other addresses
trigger an interrupt which cause the CPU to re-enter supervisor mode, placing the kernel in
charge. This is called a segmentation violation (Seg-V), and since it is both difficult to assign a
meaningful result to such an operation, and because it is usually a sign of a misbehaving
program, the kernel generally resorts to terminating the offending program, and reports the error.
Windows versions 3.1 through ME had some level of memory protection, but programs could
easily circumvent the need to use it. A general protection fault would be produced, indicating a
segmentation violation had occurred; however, the system would often crash anyway.
5. Virtual memory
43 | P a g e
Many operating systems can "trick" programs into using memory scattered around the hard disk
and RAM as if it is one continuous chunk of memory, called virtual memory.
The use of virtual memory addressing (such as paging or segmentation) means that the kernel
can choose what memory each program may use at any given time, allowing the operating
system to use the same memory locations for multiple tasks.
If a program tries to access memory that isn't in its current range of accessible memory, but
nonetheless has been allocated to it, the kernel is interrupted in the same way as it would if the
program were to exceed its allocated memory. (See section on memory management.) Under
UNIX this kind of interrupt is referred to as a Page fault.
When the kernel detects a page fault it generally adjusts the virtual memory range of the program
which triggered it, granting it access to the memory requested.
In modern operating systems, memory which is accessed less frequently can be temporarily
stored on disk or other media to make that space available for use by other programs. This is
called swapping, as an area of memory can be used by multiple programs, and what that memory
area contains can be swapped or exchanged on demand.
"Virtual memory" provides the programmer or the user with the perception that there is a much
larger amount of RAM in the computer than is really there.
6. Multitasking
Multitasking refers to the running of multiple independent computer programs on the same
computer; giving the appearance that it is performing the tasks at the same time. Since most
computers can do at most one or two things at one time, this is generally done via time-sharing,
which means that each program uses a share of the computer's time to execute.
An operating system Kernel contains a scheduling program which determines how much time
each process spends executing, and in which order execution control should be passed to
programs. Control is passed to a process by the kernel, which allows the program access to the
CPU and memory. Later, control is returned to the kernel through some mechanism, so that
another program may be allowed to use the CPU. This so-called passing of control between the
kernel and applications is called a context switch.
Modern operating systems extend the concepts of application preemption to device drivers and
kernel code, so that the operating system has preemptive control over internal run-times as well.
The philosophy governing preemptive multitasking is that of ensuring that all programs are given
regular time on the CPU. This implies that all programs must be limited in how much time they
are allowed to spend on the CPU without being interrupted. To accomplish this, modern
operating system kernels make use of a timed interrupt. A protected mode timer is set by the
kernel which triggers a return to supervisor mode after the specified time has elapsed.
On many single user operating systems cooperative multitasking is enough, as home computers
generally run a small number of well tested programs. The AmigaOS is an exception, having
preemptive multitasking from its very first version. Windows NT was the first version of
Microsoft Windows which enforced preemptive multitasking, but it didn't reach the home user
market until Windows XP (since Windows NT was targeted at professionals).
44 | P a g e
File systems allow users and programs to organize and sort files on a computer, often through the
use of directories (or "folders").
Access to data stored on disks is a central feature of all operating systems. Computers store data
on disks using files, which are structured in specific ways in order to allow for faster access,
higher reliability, and to make better use of the drive's available space. The specific way in which
files are stored on a disk is called a file system, and enables files to have names and attributes. It
also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.
Early operating systems generally supported a single type of disk drive and only one kind of file
system. Early file systems were limited in their capacity, speed, and in the kinds of file names
and directory structures they could use. These limitations often reflected limitations in the
operating systems they were designed for, making it very difficult for an operating system to
support more than one file system.
While many simpler operating systems support a limited range of options for accessing storage
systems, operating systems like Unix and Linux support a technology known as a virtual file
system or VFS. An operating system such as UNIX supports a wide array of storage devices,
regardless of their design or file systems, allowing them to be accessed through a
common application programming interface (API).
This makes it unnecessary for programs to have any knowledge about the device they are
accessing. A VFS allows the operating system to provide programs with access to an unlimited
number of devices with an infinite variety of file systems installed on them, through the use of
specific device drivers and file system drivers.
A connected storage device, such as a hard drive, is accessed through a device driver. The device
driver understands the specific language of the drive and is able to translate that language into a
standard language used by the operating system to access all disk drives. On UNIX, this is the
language of block devices.
When the kernel has an appropriate device driver in place, it can then access the contents of the
disk drive in raw format, which may contain one or more file systems. A file system driver is
used to translate the commands used to access each specific file system into a standard set of
commands that the operating system can use to talk to all file systems. Programs can then deal
with these file systems on the basis of filenames, and directories/folders, contained within a
hierarchical structure. They can create, delete, open, and close files, as well as gather various
45 | P a g e
information about them, including access permissions, size, free space, and creation and
modification dates.
Various differences between file systems make supporting all file systems difficult. Allowed
characters in file names, case sensitivity, and the presence of various kinds of file
attributes makes the implementation of a single interface for every file system a challenging task.
Operating systems tend to recommend using file systems specifically designed for them; for
example, NTFS in Windows and ext3 and ReiserFS in Linux. However, in practice, third party
drivers are usually available to give support for the most widely used file systems in most
general-purpose operating systems (for example, NTFS is available in Linux through NTFS-3g,
and ext2/3 and ReiserFS are available in Windows through third-party software).
Support for file systems is highly varied among modern operating systems, although there are
several common file systems which almost all operating systems include support and drivers for.
Operating systems vary on file system support and on the disk formats they may be installed on.
Under Windows, each file system is usually limited in application to certain media; for example,
CDs must use ISO 9660 or UDF, and as of Windows Vista, NTFS is the only file system which
the operating system can be installed on. It is possible to install Linux onto many types of file
systems. Unlike other operating systems, Linux and UNIX allow any file system to be used
regardless of the media it is stored in, whether it is a hard drive, a disc (CD, DVD...), a USB
flash drive, or even contained within a file located on another file system.
8. Device drivers
A device driver is a specific type of computer software developed to allow interaction with
hardware devices. A device driver is made up of an interface for communicating with the device,
through the specific computer bus or communications subsystem that the hardware is connected
to, providing commands to and/or receiving data from the device, and on the other end, the
required interfaces to the operating system and software applications. It is a specialized
hardware-dependent computer program which is also operating system specific that enables
another program, typically an operating system or applications software package or computer
program running under the operating system kernel, to interact transparently with a hardware
device, and usually provides the requisite interrupt handling necessary for any necessary
asynchronous time-dependent hardware interfacing needs.
The key design goal of device drivers is abstraction. Every model of hardware (even within the
same class of device) is different. Newer models also are released by manufacturers that provide
more reliable or better performance and these newer models are often controlled differently.
Computers and their operating systems cannot be expected to know how to control every device,
both now and in the future. To solve this problem, operating systems dictate how every type of
device should be controlled. The function of the device driver is then to translate these operating
system mandated function calls into device specific calls. In theory a new device, which is
controlled in a new manner, should function correctly if a suitable driver is available. This new
driver ensures that the device appears to operate as usual from the operating system's point of
view.
Under versions of Windows before Vista and versions of Linux before 2.6, all driver execution
was co-operative, meaning that if a driver entered an infinite loop it would freeze the system.
More recent revisions of these operating systems incorporate kernel preemption, where the
46 | P a g e
kernel interrupts the driver to give it tasks, and then separates itself from the process until it
receives a response from the device driver, or gives it more tasks to do.
9. Networking
Currently most operating systems support a variety of networking protocols, hardware, and
applications for using them. This means that computers running dissimilar operating systems can
participate in a common network for sharing resources such as computing, files, printers, and
scanners using either wired or wireless connections. Networks can essentially allow a computer's
operating system to access the resources of a remote computer to support the same functions as it
could if those resources were connected directly to the local computer. This includes everything
from simple communication, to using networked file systems or even sharing another computer's
graphics or sound hardware. Some network services allow the resources of a computer to be
accessed transparently, such as SSH which allows networked users direct access to a computer's
command line interface.
Client/server networking allows a program on a computer, called a client, to connect via a
network to another computer, called a server. Servers offer (or host) various services to other
network computers and users. These services are usually provided through ports or numbered
access points beyond the server's IP address. Each port number is usually associated with a
maximum of one running program, which is responsible for handling requests to that port. A
daemon, being a user program, can in turn access the local hardware resources of that computer
by passing requests to the operating system kernel.
Many operating systems support one or more vendor-specific or open networking protocols as
well, for example, SNA on IBM systems, DECnet on systems from Digital Equipment
Corporation, and Microsoft-specific protocols (SMB) on Windows. Specific protocols for
specific tasks may also be supported such as NFS for file access. Protocols like ESound or esd
can be easily extended over the network to provide sound from local applications, on a remote
system's sound hardware.
10. Security
47 | P a g e
In addition to the allow or disallow model of security, a system with a high level of security also
offers auditing options. These would allow tracking of requests for access to resources (such as,
"who has been reading this file?"). Internal security, or security from an already running program
is only possible if all possibly harmful requests must be carried out through interrupts to the
operating system kernel. If programs can directly access hardware and resources, they cannot be
secured.
External security involves a request from outside the computer, such as a login at a connected
console or some kind of network connection. External requests are often passed through device
drivers to the operating system's kernel, where they can be passed onto applications, or carried
out directly. Security of operating systems has long been a concern because of highly sensitive
data held on computers, both of a commercial and military nature. The United States
Government Department of Defense (DoD) created the Trusted Computer System Evaluation
Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness
of security.
This became of vital importance to operating system makers, because the TCSEC was used to
evaluate, classify and select trusted operating systems being considered for the processing,
storage and retrieval of sensitive or classified Information (Secret information).
Network services include offerings such as file sharing, print services, email, web sites, and file
system protocols (FTP), most of which can have compromised security. At the front line of
security are hardware devices known as firewalls or intrusion detection/prevention systems. At
the operating system level, there are a number of software firewalls available, as well as
intrusion detection/prevention systems. Most modern operating systems include a software
firewall, which is enabled by default. A software firewall can be configured to allow or deny
network traffic to or from a service or application running on the operating system. Therefore,
one can install and be running an insecure service, such as Telnet or FTP, and not have to be
threatened by a security breach because the firewall would deny all traffic trying to connect to
the service on that port.
Internal security is especially relevant for multi-user systems; it allows each user of the system to
have private files that the other users cannot interfere with or read. Internal security is also
important if auditing is to be of any use, since a program can potentially bypass the operating
system, inclusive of bypassing auditing.
48 | P a g e
Command-line interface(above)
Every computer that is to be operated by an individual requires a user interface. The user interface is
usually referred to as a shell and is necessary if human interaction is to be supported. The user interface
views the directory structure and requests services from the operating system that will acquire data
from input hardware devices, such as a keyboard, mouse or credit card reader, and requests
operating system services to display prompts, status messages and such on output hardware devices,
such as video monitor or pr. The two most common forms of a user interface have historically been the
Command-line interface, where computer commands are typed out line-by-line, and the Graphical user
interface, where a visual environment is present.
A screenshot of the KDE Plasma 5 graphical user interface. Programs take the form of images on
the screen, and the files, folders (directories), and applications take the form of icons and
symbols. A mouse is used to navigate the computer.
49 | P a g e
Most of the modern computer systems support graphical user interfaces (GUI), and often
include them. In some computer systems, such as the original implementation of the classical
Mac OS, the GUI is integrated into the Kernel.
Many computer operating systems allow the user to install or create any user interface they
desire. The X Window System in conjunction with GNOME or KDE Plasma 5 is a commonly
found setup on most Unix and Unix-like (BSD, Linux, Solaris) systems. A number of Windows
shell replacements have been released for Microsoft Windows, which offer alternatives to the
included Windows shell, but the shell itself cannot be separated from Windows.
Numerous Unix-based GUIs have existed over time, most derived from X11. Competition
among the various vendors of Unix (HP, IBM, Sun) led to much fragmentation, though an effort
to standardize in the 1990s to COSE and CDE failed for various reasons, and were eventually
eclipsed by the widespread adoption of GNOME and K Desktop Environment. Prior to free
software-based toolkits and desktop environments, Motif was the prevalent toolkit/desktop
combination (and was the basis upon which CDE was developed).
Graphical user interfaces evolve over time. For example, Windows has modified its user
interface almost every time a new major version of Windows is released, and the Mac OS GUI
changed dramatically with the introduction of Mac OS X in 1999.
50 | P a g e
51 | P a g e
WORD PROCESSING
Word processor
Traditionally, typewriters have been used in offices to create official documents such as Letters,
reports and minutes. However with the prices of computers coming down, most offices and
individuals prefer creating their documents using electronic word processors.
Word processing is the art of creating, saving, editing, formatting and printing text and graphic
documents using an electronic word processor. An electronic word processor is an application
software that enables the user to create, edit, format and print text documents. Examples of
common word processors include Microsoft Word, Corel WordPerfect, Lotus WordPro, Apple
works and open office.
Although traditional word processors were generally used to handle text-based documents only,
modern Graphic User Interface(GUI) word processors support other functions such as graphic
design and manipulation, e-mailing, mail merging among others.
A document can be stored for future use unlike in typewriting where the same document may
require retyping if required in future.
Typing using a word processor is easier and more efficient due to automated features such as
word wrap, auto-text and autocomplete. Thesaurus helps to find a word with similar meanings.
Most word processors have superior editing tools such as thesaurus, autocorrect, spelling and
grammar checkers.
Electronic word processors provide predefined features for generating headers, footers, indexes,
footnotes and references.
1. Word processors have superior document formatting features. Formatting refers to the art
of making the document more attractive and appealing to the eye. Such features include,
underlining, boldfacing, italicization, applying different colors.
2. Most word processors have ability to create and import tables, text and graphics from
other programs.
3. With electronic word processing, it is possible to print multiple copies once.
4. Allows Mail merging (combining of several documents)
52 | P a g e
5. Most word processors have Insert and Type over modes. Therefore, one can easily insert
or replace a word or a phrase without affecting the structure and neatness of the
document.
6. A Word processor enables one to produce many copies of a document through printing;
whereas, a typewriter may require retying of the entire document when we want many
copies.
7. Provides secrecy in writing documents through Passwords.
8. Allow simple arithmetic operations such as additions, multiplications, etc.
9. Word processor has Cut, Copy and Paste commands that enable the user to incorporate
other text without having to retype it
They allow the user to create a file, save it, and retrieve (recover/open) it when required for
reuse, printing, editing or formatting.
Has Text- editing features, such as: -
(i). Copy & Paste, which allows a marked block of text to be moved to another part of the
document.
(ii). Find, which allows the user to search for words or phrases within the document.
(iii). Search & Replace, which allows replacement of every occurrence of a certain
combination of characters with another set of characters.
(iv). Undo, which allows actions that have been performed to be reversed, such that if some
text was accidentally deleted, then the action can be undone.
Has different Fonts (lettering/typescripts), Character sizes & Styles such as Bold, Italic,
Underline, etc.
53 | P a g e
Enables creation of Tables, which can be used to perform certain calculations & sorting on a
given text.
Contains Tools such as Spelling and grammar checkers, Bookmarks & Thesaurus (which
provides alternative words – synonyms).
Typing errors can be corrected and the text modified before printing the final version.
Enables the use of document templates, which can be used to quickly create the most
frequently used documents once the format has been set.
Allows Mail merging, which makes it possible to combine several letters. This is very useful
when similar letters has to be sent to several people. The names and addresses of each
person can be merged with one single standard document and printed out.
Enables creation of Newspaper layouts, which can be used for manipulation of Column text.
Contain Macros, which can be used to automate the most frequent & repetitive tasks.
Have the ability to create and import tables, text and graphics from other programs.
All Word processors have similar document windows with the following features:
(a).They are designed to look like a piece of paper with a few electronic improvements.
(b).The screen is blank before typing of text.
(c). There is a Cursor, which blinks at the position where you can begin entering text.
(d).There is a Status bar that provides the user with information about current status such as
saving operation, the name of the file in use, the current page, and column cursor
position.
(e). Word wrap: A facility/feature that automatically moves a word or cursor to the beginning
of the next line if there is insufficient room at the end of the current line.
(f). Scrolling: This is the vertical movement of text document on the screen, either using the
Up or Down arrow keys, Page Up or Page Down keys, or using the Mouse in Windows
based word processors.
(g).Help: Contains instructions, tips, pointers, explanations and guidance on how to use an
application.
54 | P a g e
(h).Editing modes: Word processors have two editing modes; Insert mode and Type over
mode.
In Insert mode, every character typed between words, lines or characters is placed at the
cursor position. This pushes all the text in front of the cursor away without deleting it.
In Type over mode, every character typed deletes what was there before and replaces it
with new text at the cursor position.
55 | P a g e
Review Questions
56 | P a g e
NB: There exists various versions of Microsoft Word (2003,2007,2010,2013 etc).For this topic we will be
dealing with Word 2003. There are a number of ways in which you can start Microsoft Word; Launch
Word 2003 from the start menu. Proceed as follows:
Toolbars
These are the rows of buttons or icon that represent commands. The command buttons are
shortcuts to the same commands you can access from the menu bar. There are various
toolbars available in Microsoft Word but the most common are the Standard toolbar and
the formatting toolbars.
57 | P a g e
Standard toolbar
Standard toolbar contains commands used to carry out common tasks such as launching a
new document window, opening a file, saving, spelling and grammar checking etc. To see
what the other commands are, just point to the icon on the toolbar and a text tip will be
displayed showing the function of the icon.
Formatting toolbar
The formatting toolbar is used to make the document more appealing. Most of the
commands will be discussed later in the topic.
58 | P a g e
View menu
Rulers
Microsoft Word provides the user with vertical and horizontal onscreen rulers that helps the user
set tabs and indents as well as position text and objects. If the ruler is not visible on the screen,
then display it using the proper procedure.
1. Click the View menu option
2. On the drop down menu that appears, click ruler, a checkmark or tick will appear next to
it showing that the ruler is displayed on the screen.
Task pane
Once you launch Word XP or Word 2003, a task pane is automatically displayed docked on the
right of the window. This pane contains shortcuts to commonly performed tasks such as opening
recently used documents. You can close the pane by clicking the mouse button on its top right
corner.
Status bar
This is an interactive strip at the bottom of the screen that acts as a communication link between
the user and the program. It displays interactive activities like saving, opening, Background
printing, cursor position etc.
59 | P a g e
60 | P a g e
Saving a document
Before you can create the document there is need to save it even before you finish so that you do
not lose substantial amount of work in case of power failure. To save a new document, use Save
As dialog box. Save as follows the user to save a new document and give it a name and
specifying the storage location. Once you save the document you subsequently use Save to save
changes made to the document. To save a document for the first time
1. On the File menu, Click Save A. Alternatively press Ctrl + S or click the save button on
the standard toolbar. Save As dialog is shown below
2. In the File name box, type a unique name for the document.
3. Select a location or drive you want to save in, by clicking the down arrow on the right of
save in list box.
61 | P a g e
4. To save the file in a different format or type such as Word document, PDF, Word 97
-2003 Document etc. Click the down arrow on the right of Save As type lit box and
choose a file type.
5. Click the Save button. The file will automatically be saved as a Microsoft Word
Document.
62 | P a g e
You can also open file from a recently used file list on the File menu. Word keeps a list of recently used
files on the file drop down menu. If the list of recently used documents is not displayed, you can
configure Word by clicking Tools then options. On the General tab, select the recently used file list check
box
63 | P a g e
Review Questions
2. What is a toolbar?
3. Explain how you can protect a document from unauthorized opening or altering
64 | P a g e
Block operations
Highlighting a block of text
The purpose of selecting or highlighting text is to enable the user to manipulate the selected
block of text. You can either select a block of text using the mouse or keyboard.
Editing modes
There are two editing modes in a Word processor that help the user in editing individual
characters in a text document. These are the insert and Typeover modes.
Insert mode
This is the default mode in most processors. In this case when text is inserted between words or
characters, it pushes the existing text to the right as you type.
Typeover mode
In Typeover mode known as overtype in Word, when text is typed between existing words or
characters, the new text automatically replaces the characters on the right of the insertion pointer
as you type. To switch between Typeover and insert modes, simply press the insert key on the
keyboard or double click the OVR label on the status bar.
65 | P a g e
Deleting text
To delete a character or a word from the right to the left
1. Place the insertion pointer on the right of the word.
2. Press the backspace key.
To delete a character to the right of the cursor position:
1. Place the insertion pointer on the left of the word
2. Press the Delete key.
To delete a block of text
1. Highlight the text to be deleted
2. Press the Delete/Del key
Copying means creating a duplicate of text or an object, while moving means changing the
position of text or an object in a document. In Microsoft word, you can copy or move a block of
text. To copy a block of text
NB: To use the keyboard shortcut keys, press Ctrl + C to copy then, Ctrl + V to paste.
66 | P a g e
4. Click Edit, then paste or click Paste button on the standard toolbar.
NB: To use keyboard shortcut keys, press Ctrl + X to cut, then Ctrl + V to paste.
4. Use the buttons replace, ReplaceAll or find next to navigate through the search replace
proeess.
Proofreading
67 | P a g e
Proofreading refers to checking whether the document has typographical or grammatical errors.
Microsoft word has proofing tools such as spelling and grammar checker and autocorrect.
Autocorrect
The autocorrect automatically detects wrongly spelled or capitalized words and replaces them
with the correct word. However, the settings for autocorrect are user defined e.g. if a person
68 | P a g e
keeps on trying the word certain as certain, set the autocorrect feature to replace the later with
the former. To turn autocorrect on/off
1. Click Tools menu, them Autocorrect options
2. To turn on auto correction, select the “Replace text as you type”.
3. In the replace box, type the commonly misspelled word.
4. In the With box, type the correct spelling for the word.
5. Click OK to close the dialog box.
69 | P a g e
70 | P a g e
3. Select or clear the show Autocomplete tip for Auto text and dates checkbox.
4. Type in text in the Enter Auto text entries here then click Add
5. Click close.
71 | P a g e
Review Questions
4. What is a wildcard? How can it be used to search for a word that starts with the letter “O”
in a document.
5. What is the difference between just searching for a particular word in a document and
8. Give two types of dictionaries that are used by a spell checker program. Which one is
13. Distinguish between the autocomplete and autocorrect feature in word processing
14. Hassan has a problem when typing; every time he wishes to type the word Good, he
mistakenly types God. What can he do to continue typing without worrying about having
72 | P a g e
Formatting a document
Formatting a Word document
Formatting refers to enhancing the appearance of a document. You format text, paragraphs, pages
or the entire document.
Text formatting refers to features such as changing fonts (type, style and size of characters),
Changing text color, underlining, bolding, italicizing, making a character superscript or
subscript. To format text, use the formatting toolbars, Format menu or keyboard shortcuts.
To format existing text using format menu:
1. Highlight the text to be formatted.
2. On the Format menu, click the Font command, a dialog box with all text formatting
features is displayed as shown below.
3. To change font type and size where ecesssary scroll down the ont list box and select a
font type. For example verdana font. To increase the font size, where necessary, scroll
down the size list box and select the required size. E.g. 20 points. A point is a fraction of
an inch . 72 points is equivalent to 1 inch.
73 | P a g e
4. Bolding text: Bolding makes the selected text appear darker than the rest of the text. To
bold text:
a. Activate the font dialog box
b. From the font dialog box, select Bold
5. Underline text: Underlining refers to placing a line at the base or bottom of a word or
phrase. To underline:
a. Activate the font dialog box
b. Click the down rrow on the right of underline and select the underline style e.g.
Single, Double, Dashed.
6. Italicising text:To italicise is to make the text slant forward.
a. To Italicise, activate the font dialog box
b. Under font style, Click Italic.
7. Changing Font Colour: In most cses, the font default colour is black. However you can
change the font colour for example red, green, blue etc. To change Font Colour:
a. Activate the Font dialog box.
b. Click the down arrow at the right of Font Colour list box and then select the
colour of your choice
Formatting toolbar
Paragraph Formatting
75 | P a g e
A paragraph is a separate block of text dealing with a single theme and starting on a new line or
indent. Some of the formatting features you can apply onto a paragraph include alignment, drop
cap, indenting, line spacing and setting breaks.
Alignment
Alignment is the arrangement of text relative to the left margin, center of page or the right
margin. The five major alignment options available are the left, right, Center, Justified and
Distributed (Force justified).
Left Alignment
Lines of text are lined up evenly along the left margin but unevenly at the right margin. This is
the default alignment. To align left:
1. Highlight the paragraph.
2. On the Format menu, select paragraph.
3. Select Left from the list box.
Right alignment
This is the opposite of let alignment. Lines of text re lined up evenly along the right margin but
unevenly at the left margin. To align right:
1. Highlight the paragraph.
2. On the Format menu, select paragraph.
3. Select right from the list box.
76 | P a g e
Center alignment
The lines of text are centered unevenly between the right and left margins. To align center
1. Highlight the paragraph.
2. On the format menu, select paragraph.
3. Select Centered on the list box.
Justification
Lines of text are arranged evenly along the left and right margin. To justify a paragraph:
1. Highlight the paragraph.
2. On the format menu, select paragraph.
3. Select justified on the list box.
Distributed
A distributes or force justified paragraph is force justified evenly along the left and right margin
even if a line has only one word, To force justify a paragraph.
1. Highlight the paragraph.
2. On the format menu, select paragraph.
3. Select distributed on the list box.
Drop caps
There are times when you wish to attract the reader’s attention by making the first character in a
sentence large, taking more space in the next line. Such kind of a character is said to be
“dropped”. To apply drop cap:
1. Highlight the first character of the sentence.
2. On the format menu, click Drop cap. Drop cap dialog box appears.
3. Click Dropped or In Margin.
4. Select the font in case you wish to apply a certain font to the dropped cap.
5. Specify the number of lines to drop then click Ok.
77 | P a g e
Indenting paragraphs
Indentation refers to moving text away from the margin. You can indent the first sentence in a
paragraph (First line indent), the whole paragraph (full indent) or the rest of the text except the
first line (hanging indents).
78 | P a g e
Hanging indent
Full indent
1. Select the paragraph to be indented or position the cursor anywhere in the paragraph.
2. From the formatting toolbar, click the Increase or Decrease indent button.
Setting tabs
Tabs stops refers to constant intervals for insertion pointer when the tab key is pressed. Tabs are
used to create data in column form. By default the tabs stop is set at 0.5 of an inch. To change the
default settings:
1. On the format menu, click Tabs.
2. In the Tabs dialog box, enter a new value for tab stop position.
3. Choose the type of tab, either left, center or right.
4. If need be specify the Tab leader option.
5. Click the set button then click OK.
79 | P a g e
80 | P a g e
Creating columns
Columns
Columns subdivide a page into several vertical sections. To set columns:
1. Highlight the paragraph.
2. On the format menu, click Columns.
3. In the columns dialog box enter the number of columns, set the column width then click
OK.
Setting column and section break
Column and section are used to force the insertion pointer to move to a new column or section in
a page. This allows the user to apply more than one format to the same document. To insert a
column or section break:
1. Position the text cursor in the document where the break is to be inserted.
2. Click the insert menu then Break.
3. From the break dialog box, select the type of break then click OK.
Page setup options let the user specify the size of the margins, paper size and layout. To setup a
page:
81 | P a g e
Setting margins
Margins are blank spaces around the edges of the page. To set up margins:
1. On the File menu click page setup. Page setup dialog box appears.
2. Click the margins tab.
3. Enter the values for the left, right, top and bottom margins in the respective boxes.
4. Click OK.
Setting the paper size
By default, the paper size may be either letter (216 mm x 279mm) or A4(210mm x 297mm).
To specify a paper size:
1. In the page setup dialog box, click the paper size tab.
2. Select the size of paper required from the paper size list. If your size is different from the
ones provided, click Custom size, then enter dimensions.
3. Click OK.
82 | P a g e
83 | P a g e
84 | P a g e
85 | P a g e
Review Questions
a. Page numbers
Practical activity
Open an existing document of not less than ten pages perform the following operations:
a. Change Title Font to Tahoma, bold, 18 points size and center it on the page,
underlined.
b. Drop the first character of the first paragraph to occupy three lines below it.
c. Insert page numbers at the bottom right and footers at the center of page.
86 | P a g e
Creating tables
To create a table:
1. Click where you want to insert the table.
2. On the table menu, point to Insert, and click Table.
3. In the Insert table dialog box, set the number of columns and rows.
4. Specify the auto format option if need be.
NB: You can insert a table by clicking the table button on the standard toolbar, then drag to select
the number or rows and columns.
To create a table using the drawing tool:
1. Click Tables menu, then Draw table or simply click Draw table button from the standard
toolbar. The mouse pointer changes to a pencil symbol.
2. Drag the pointer to draw the outline of the table.
3. Fill in the table with rows and columns by dragging the pointer as you would draw using
an ordinary pencil.
87 | P a g e
To insert a column:
1. Place the cursor where you want to insert a column.
2. Click Table, point to Insert, then click Column to left or Column to the right.
Table conversions
With convert feature in Microsoft Word you can convert a table to lines of text and vice versa.
To convert a table to text:
1. Select the entire table or row and columns you want to convert to text.
2. On table menu, point to Convert, then click Table To Text. A dialog box is displayed that
requires you to specify how the text will be separated after conversion.
3. In the Separate text with box, enter or select the character to be used as a separator.
88 | P a g e
4. Click OK.
Importing tables
Microsoft word allows you to import tables from other applications or from an existing file. To
import a table:
1. Click the Insert menu, then Objects. A dialog box appears.
2. On the object type select the type of object to insert e.g. Adobe table.
3. The program in which the table was created in starts and lets you choose a table from it
and return back to Microsoft Word. Alternatively click Create from file. This lets you
browse for a file that contains the table you wish to insert.
4. Click OK to insert the table.
A1 B1 C1 D1 E1
A2 B2 C2 D2 E2
A3 B3 C3 D3 E3
A4 B4 C4 D4 E4
To perform calculations in a Word table:
1. Click in the cell the result is to be displayed.
2. On the table menu, Click Formula.
3. Type a formula e.g. = SUM(A1:E1) as shown.
4. Click OK
89 | P a g e
SUBJECT SCORE
Mathematics 60
English 90
Geography 79
Religious Education 68
French 90
Total 387
Sorting text
In Microsoft Word you can sort a list of text, numbers and dates in ascending or descending
order. To sort a list or table:
1. Highlight the text list or table you want to sort.
2. On the Table menu, click sort. Sort dialog box.
3. Select the type of data to be used when sorting i.e. Text, Number or Date.
4. Click either Ascending or Descending order then click OK.
90 | P a g e
3. Select document type then click Next arrow at the bottom of the page. In this case select a
form letter.
4. Select starting document in this case the current document.
5. Select recipients, in this case select “Type a new list”.
6. On the data form displayed, customize button to add, remove or rename fields.
91 | P a g e
8. A merge toolbar is added onto the data source. Move the mouse pointer to get the tool tip
for each button.
9. Edit data source to type recipient’s data.
10. On the mail merge task pane, click more items to display merge fields.
11. From the list, insert each field as desired.
Once you finish inserting merge fields from the data source in the main document, you are now
ready to merge. There are several merge options.
Merge to E-mail
92 | P a g e
Review Questions
5. Explain how you can convert some typed text into a table using Microsoft Word.
6. What would happen to the cursor in a table when the following actions are done:
a. A form letter
b. A data source
c. Mail merge
93 | P a g e
Using graphics
Inserting graphics and special symbols
The term graphics refers to non-text images generated by a computer. These incudes
photographs, drawings and graphs. Graphics presents information in a way that is easy to
understand. You can insert a graphical object from Microsoft Clip Gallery, a scanner or by using
drawing tools available in Microsoft word.
Inserting a clip art or a picture from gallery
94 | P a g e
6. When the image appears on the screen you can edit and format it as required, the same
way you would with a clipart.
95 | P a g e
Inserting symbols
A symbol is a special character that is not included on the standard keyboard. E.g. theta
To insert a special symbol:
96 | P a g e
1. Move the text cursor to the position where the new symbol will be inserted.
2. Click Insert menu then symbol command on the menu.
3. In the symbol dialog box select the appropriate symbol and click the Insert button.
4. Click Close button.
Printing documents
The main purpose of any word document is to create documents for distribution. A document can
be distributed electronically via e-mail or as printed hard copy. To get a hardcopy, your computer
must be connected to the printer directly or through a shared network(network printer).
97 | P a g e
To print:
1. From File menu, click on print, Print dialog box is displayed
98 | P a g e
SPREADSHEETS
Introduction
Meaning of a spreadsheet
A spreadsheet is made up of sheets of paper divided into rows and columns on which various
numerical data is entered manually. For a long time, spreadsheets have been used in accounting
for book keeping However, these spreadsheets are being replaced by specialized accounting
packages and electronic packages.
Electronic spreadsheets
An electronic spreadsheet, simply referred to as a spreadsheet, is an application software used to
calculate, organize and analyze numerical data. It consists of rows and columns similar to the
ones of the manual spreadsheet. Examples of electronic spreadsheets are Microsoft Excel,
OpenOffice Calc, Lotus 1-2-3 and Corel Quattro Pro
1. Utilizes the powerful aspects of the computer such as speed, accuracy and efficiency to
enable the user quickly accomplish their tasks.
2. Offers a large Virtual sheet for data entry and manipulation.Fr example, the largest paper
ledger you can get is one that does not exceed 30 columns and 51 rows, while with an
electronic spreadsheet the least ledger has 255 columns and 255 rows.
3. Utilizes the large storage space on computer storage devices to save and retrieve
documents.
4. Enables the user to produce neat work because the traditional paper, pencil, rubber and
calculator are put aside. All the work is edited on the screen and the final clean copy I
printed. With a manual spreadsheet, neatness and reliability depend on the writer’s
handwriting.
5. Have better document formatting capabilities
6. Have inbuilt formula called functions that enable the user to quickly manipulate
mathematical data.
7. Automatically adjusts the result of a formula if the values in a worksheet are changed.
This is called automatic recalculation feature. For a manual spreadsheet, changing one
value means erasing the result and writing the correct one again.
99 | P a g e
Components of a spreadsheet
A spreadsheet has three main components namely: worksheets, database and charts.
WorkSheet
A worksheet is the work area made up of rows and columns where data is entered. Each row is
labelled using a number while each column is labelled using a letter as show below.
A Worksheet
A worksheet is the work area made up of rows and columns where data is entered. Each row is
labelled with a letter. The intersection between a row and a column is called a cell. In an
electronic spreadsheet, a horizontal arrangement of cells constitutes a column. Each cell is
referenced using the column label followed by row label. Example in the above diagram the
active cell is A1.
Database
A database is collection of related data items organized so as to provide a consistent and
controlled access to items. In spreadsheets, a worksheet list may contain related data, organized
into rows that can be manipulated using database functions that enable the user to perform
functions such as sorting, filtering, validation, subtotaling, pivot tables and consolidation.
100 | P a g e
Worksheet list
Graphs
A graph is a pictorial reference of the base data on a worksheet. Most spreadsheets refer to
graphs as charts. A chart enables the user to present complex data elements from a worksheet in
a simple and easy to understand format. Examples of charts are pie charts, line charts and bar
charts.
Sample graph
101 | P a g e
Statistical Analysis: Spreadsheets provide a set of data analysis tools that can be used to
perform simple analysis such as computing mean, mode standard deviation as well as
complex statistical analysis. However, some of these statistical functions are quite
complex and requires a deeper understanding of knowledge in statistics.
Accounting: Accountants find spreadsheets useful tools for analyzing financial
transactions such as computing totals, consolidating financial records, as well as
predicting future business trends. Most spreadsheet packages have inbuilt functions used
to analyze financial data.
Mathematics and scientific problems: Spreadsheets are used to solve mathematical and
scientific problems such as arithmetic and trigonometry.
Forecasting: A feature known as “what if” analysis is used to make future prediction. For
example, a sales manager in a company may want to find out whether raising the cost of
an item would result to increased or reduced profits. Forecasting is an important function
used for predicting economic trends budgeting, stock portfolio analysis. Cost analysis and
cash flow analysis.
102 | P a g e
Cell address
The cell address is a combination of a column header and a row header that indicates the specific
location of a specific cell. Example S2.
Worksheet tabs
Worksheet tabs are located at the bottom of a spreadsheet. They show the number of worksheets
in a workbook. A workbook is a spreadsheet file that consists of one or more related worksheets.
One worksheet may consist of one or several pages.
103 | P a g e
7. Press the left arrow key on the keyboard. Notice that the cell pointer moves one column
to the left on the same row. Pressing shift + tab gives the same results.
8. Press the up arrow key on the keyboard. Notice that the cell pointer moves one row up on
the same column.
9. Press the down arrow key on the keyboard. Notice that the pointer moves one row down
on the same column.
10. Press the End key. The status bar will display the massage “END”. If you press the right
arrow key, the cell pointer will move right to the last cell on the row. If the left, up or
down keys were to be pressed instead, the cell pointer would move to the last cell to the
left, top or bottom respectively.
11. Pressing Ctrl + Home moves the cell pointer to the first cell of the worksheet i.e. cell A1.
Creating worksheets
At its simplest level, creating a worksheet consists of starting the spreadsheet program and
entering data in the cells of the current worksheet. However, a person can decide to create a
worksheet either using the general format or from a specially preformatted spreadsheet document
called a template.
Using a template
To create a workbook based on a predefined template:
1. On the File menu click New
2. On the task pane under templates, click on my computer
3. In the templates dialog box click spreadsheet solutions tab.
4. On the spreadsheets solutions tab, double click the template that you wish to create.
5. Replace the general tab with your own data.
NB If a template is already installed, it will be displayed as a new worksheet with all the
preformatted features present allowing the user to enter some data. However, some templates
may require the original installation disk if they are to be able to useable because they may not
have been copied to the hard disk during program installation.
104 | P a g e
Saving a workbook
The procedure for saving a workbook is similar to that of saving a word document.
1. Click File menu option, then select Save as command. Alternatively, click the save
command on the standard toolbar. The save as dialog box is displayed.
2. Select the location in which your workbook will be saved in the save in box, then type a
unique name for the workbook in the file name box. Make sure that the option Microsoft
Excel workbook is selected under the Save as type box.
3. Click the Save button to save.
105 | P a g e
Retrieving a workbook
To retrieve an existing workbook, the procedure is similar to what we learnt earlier in word
processing.
1. On the File menu or standard toolbar, click Open.
2. Click the Look in drop down list arrow and select the drive or folder where the workbook
was saved.
3. Double click the workbook icon that you want and the worksheet.
Close a workbook and exit
On the File menu click Close. This closes the current workbook but does not close the
application. To Exit from Excel, on the File menu click Exit or press Alt + F4.
Review Questions
1. Define a spreadsheet.
2. What is an electronic spreadsheet?
3. State four advantages of an electronic spreadsheet over
a. Manual spreadsheet
b. Electronic calculator
4. Explain three components of a spreadsheet.
5. State five application areas of spreadsheets.
6. What is forecasting? How can a spreadsheet help a person to do this?
7. Match the following statements with the correct answers.
Statements Answers
a) Click this to reduce the Microsoft Excel window A. Name box
size to an icon on the task bar. B. Save command
b) Display the current/active cell address C. Save as command
c) Saves the file without changing its current address D. Minimize button
and name E. The row
d) Location where you can edit the contents of a cell. F. Formula bar
8. Give any two methods you can use to start Microsoft excel.
9. Differentiate between a formula and function.
10. Write the following formula as absolute =F10+G20.
11. The formula =A1 +C2 is initially typed in cell D1. What will it be when copied to cell
E1?
12. Differentiate between a worksheet and a workbook.
13. State the effects of pressing each of the following key combinations on the cell pointer:
(a)Right arrow key (b)Shift + tab (C)Ctrl + Home
14. Define each of the following:
106 | P a g e
Block operations
Performing calculations on a worksheet data involves block operations. A block of selected cells
in a worksheet is referred to as range. A range is specified by the address of its top left and
bottom right cells or using a name. To select a range of continuous cells:
107 | P a g e
3. Click the bottom right cell of the range. Ctrl selects individually clicked rows, columns or
cells
Arithmetic operations
Arithmetic operations mostly follow the rule similar to mathematical concept of BODMAS.this
means that whatever is in parenthesis is evaluated first. Multiplication and division are evaluated
from the left to right while addition and subtraction are evaluated last. Table 2.1 shows a
summary of operators used to create the formulae.
Relational operators
A relational operator returns either true or false depending on the magnitude of the value being
evaluated. Table 2.2 is summary of a relational operator.
= Equal to =A2=B2
> Greater than =A2>B2
< Less than =A2<B2
<> Not equal to =B2<>A2
<= Less than or equal to =A2<=B2
>= Greater than or equal to =A2>=B2
Table 2.2
Operator Precedence
108 | P a g e
If several operators are used in a single formula, Microsoft Excel perform the operations in the
order shown in table 2.3. a formula with operators that have same precedence i.e. if a formula
contains both multiplication and division, operators are evaluated from left to right. Enclosing
part of the formula to be calculated in the parenthesis or brackets makes that part to be calculated
first.
Table 2.3
Cell referencing
There are three types of cell refencing used when creating a formulae and manipulating cell(s)
content.
Relative referencing
When you copy a formula that contains cell references, says A3, the references adjust to their
new location. For example, if C1 containing a formula =A1+B1 is copied to C2, the reference to
A2+B2.
Absolute referencing
The reference is made to a specific address and does not change even if the formula is copied to
another cell.in Excel an absolute cell reference is made by placing a dollar sign before the
reference e.g. $A$2.For example if the result in C1 is 170, if absolute reference is used,170 will
be copied to C2.
This is a combination of relative and absolute reference e.g. $A3 or A$.in the first case the
column reference is absolute while the row is relative, in the second case the column reference is
relative while the row reference is absolute.
109 | P a g e
A function must start with an (=) sign followed by the function name and arguments. Arguments
are numeric, logical values or text enclosed in parenthesis. For example, in =SUM (A3:F3),
SUM is the function that adds the range A3 to F3 which is the argument.
In Microsoft Excel, functions are categorized according to the nature of problems they work on.
We shall look at the following categories of in-built functions:
Mathematical
Statistical
Logical
Date and time
1. On the Insert menu, click Function. Alternatively, click the fx button on the standard
toolbar
2. In the function dialog box displayed (figure 2.6), select the category.
3. In the function list box, select a function.
4. Specify the function argument ten click OK.
110 | P a g e
Mathematical functions
SUM () adds all the value in the selected range of cells. For example, if A3, B3 and C3 contains
20,50,80 respectively, =SUM (A3:C3) returns 150.
ROUND () rounds a number to a specified number of decimal places. Zero rounds off to the
number to the nearest integer. For example, =ROUND (49.769,1) returns 49.8 while =ROUND
(49.769,0) returns 50.
SUMIF () conditionally adds the specified cells according to the set criteria. =SUMIF
(A3:A10,”>=1000”) return a value if, and only if, the sum is greater than or equal to 1000.
PRODUCT () multiplies all the values in the argument. For example, =PRODUCT (40,3,2)
returns 240.
Statistical functions
AVERAGE () returns the arithmetic mean of its arguments. For example, if A3, B3 and C3
contains 20,50,80 respectively, =AVERAGE (A3:C3) returns 75.
COUNT () counts the number of cells that contain numbers within a range for example =COUNT
(A3:C3) returns 3.
COUNTIF () conditionally counts the number of the cells within a range that meets the given
condition. For example, if A3, B3, C3, D3, and E3, contains 20,50,80,60 and 45 respectively then
COUNTIF (A3:E3,”>50”) returns 2.
MAX () returns the largest value in a set of values or within a range for example =MAX (A3:E3)
for all values above returns 80.
MIN () returns the smallest value in a set of values or within a range for example =MIN (A3:E3)
for all values above returns 20.
RANK () returns the position or rank of a number from a list of values. For example, =RANK
(A2, $A$3: $A$8,1) returns the position of A2 as if the list was sorted in ascending order.
Logical functions
IF () returns a value or label if a condition you specify is evaluated to TRUE and another is
evaluated to FALSE. For example, if A3, B3, C3, D3, E3 contained a set of marks 35, 50, 80, 60
and 45, grades are to be awarded as follows:
80 to 100 A
60 to 79 B
40 to 59 C
0 to 39 D
AND () returns true if all its statements are true or false and if any argument is false. For
example, =AND (3+2=5,2+2=4) returns true.
OR () returns true if any of its statements is true or false and if both argument are false. For
example, =OR (3+2=5,2+2=4) returns true.
NOT () negates the unary operand. For example, =NOT (3+2=5) returns false.
111 | P a g e
TODAY () returns a number that represents today’s date. The function takes no arguments. For
example, by the time of writing this book, =TODAY () returned 19/02/2007.
NOW () returns the current date and time formatted as date and time.it takes no arguments. For
example, =NOW () returned 19/02/2007 00:02.
DATE () function returns a serial number that represents a particular date. MS Excel uses year
1900 serial number 1.for example, = DATE (107,1,4) returns January 4, 2007. Year =
(1900+107), month-=1, day=4.
HOUR (), MINUTE () or SECOND () function returns the current hour as number 0 to 23, minute
from 0 to 59 and seconds from 0 to 59 respectively.
112 | P a g e
Review Questions
113 | P a g e
Editing refers to making necessary modification and proof reading a worksheet or workbook. On the
other hand, formatting refers to enhancing the appearance of the worksheet to make it more readable
and appealing to the reader.
Editing worksheets
Editing worksheets involves deleting entries, copying, moving, finding and replace as well a as spell
checking. Since most of these operations are similar to those discussed in word processing, we are
only going to outline steps of performing the same in excel.
Using the formula bar- click the cell to display its content on the formula bar. Delete or insert
required word or text.
Double click the cell to place the insertion pointer in it and then type or modify the entry.
NB: use shortcut keys Ctrl+C to copy Ctrl+X to cut and Ctrl+V to paste.
1. Position the pointer where the new row or column will appear.
2. On the insert menu, click Rows and Columns.
114 | P a g e
1. On the Insert menu; click Worksheet. A new worksheet is added into your workbook.
To delete a worksheet:
1. On the Edit menu, click Find, type the text to search for.
2. To replace, choose Replace from the dialog box.
3. In the Find What box, type the word or phrase to find.
4. Click the Replace tab and in the Replace With, type the word or phrase to replace the found
word or phrase.
Formatting worksheets
Worksheet formatting refers to enhancing the appearance of the worksheet to make it more attractive
and appealing to the reader. Appropriate formatting should be used to make lay emphasis, attract
attention and bring out the hidden details of the worksheet.
The golden rule of formatting is to use simple clear formats.it essentially consists of changing text
color, typeface(font), size, style and alignment. In Ms Excel, format the cells whether empty or not
and their contents will acquire the set format automatically.
To format a single cell, make it the current cell the click Format menu option and select the cells
command. In the format cells dialog box, make the formatting specifications they you wish, then click
OK button to apply. If it’s a range of cells, they must be highlighted first before formatting them as a
block of cells.
Formatting labels
115 | P a g e
4. Select the Font type e.g. times new roman. Other font formatting feature like style, size,
underline and color are available and can be selected.
5. Click OK button to apply.
NB: alternatively, use the formatting toolbar to accomplish all your text formatting needs. Notice that
the options in the font dialog box are commands on the formatting toolbar.
Formatting numbers
Number meaning
Currency for displaying general monetary values e.g. $1000, ksh. 10.
Text formats the cell to be treated as text even when numbers are entered.
Custom for a number format not predefined in Microsoft Excel, select custom then define
the pattern.
116 | P a g e
Formatting borders
You may need to put a printable boarder around your worksheet or in a range of cells to make it more
attractive and appealing. To put a boarder:
1. Highlight the range you wish to insert boarders. From the Format menu, click cells command.
2. Click the boarders and specify the boarder options for left, right, top and bottom.
3. From the style options, select the type of line thickness and style. Also select the preset options.
4. Click the OK button. The selected range will have a boarder around it.
Formatting rows and columns
Sometimes, the information entered in the spreadsheet may not fit neatly in the cell set with the default
height and width. It therefore becomes necessarily to adjust the height of a row or the width of a column.
The standard width of a column in Microsoft Excel in 8.43 characters but can be adjusted to any value
between 0 to 255. to change the column width:
1. Move the mouse pointer to the right hand side line that separates the column headers for instance,
the line between A and B.
2. Notice that the mouse pointer changes from a cross to a double arrow.
3. Click the mouse button and hold it down so that you can now resize the width of the column by
dragging it to the size you wish. After dragging to the required point release the mouse button.
The column will have a new size.
To resize a column using the Format menu:
1. On Format menu, point to Column, then click the Width.
2. Type a width in the column width dialog box(figure 2.8), and then click OK button to apply.
117 | P a g e
Using Autoformat
It allows the user to apply one of sixteen sets of formatting to a selected range on the worksheet. This
quickly creates tables that are easy to read and that are attractive to look at.
1. Select range e.g. B1: G7 to make it active
2. Click format then select the Autoformat command on the menu that appears. Select a format from
the autoformat dialog box shown below.
3. Click OK button to apply the format to the selected range.
118 | P a g e
PRACTICAL ACTIVITY
Financial comparison for October 1999
MIWANI ENTERPRISES
1. Save the worksheet As miwani
2. Add the totals for
a. Income
b. Expenses on the budget
3. Get the surplus(profit or loss)in both columns by subtracting the Total Expenses from the Total
Income
4. What is the difference between Actual transaction and the plan(Budget). Get the difference by
subtracting budget surplus from Actual Surplus.
119 | P a g e
Sorting
To carry out sorting proceed as follows:
1. Highlight the range that you wish to sort by clicking its column header letter.
2. Click Data, then sort to display the dialog box below. Notice that the sort by field is already
reading the field that you selected. This field is called the criteria field
3. Select the field to be used as the key for sorting and the sort order as either descending or
ascending, then click OK button to apply.
120 | P a g e
Autofiltering a list
Autofiltering can be applied to only one list on a worksheet at a time.
To autofilter a list:
1. Click a cell in the list that is to be filtered; usually the list is in a column.
2. On the data menu, point to Filter, and then click AutoFilter.
3. To display only the rows that contain a specific value, click the arrow in the column that contains
the data you want to display. Figure 2.12 shows an illustration of an Autofilter dialog box.
4. Click the value that is to be displayed by the filter from the drop-down list. E.g. in the example
below , the selected value is 73.25.
Missing Autofilter dialog box
Subtotals and grand totals
Subtotals function is used to summarize a worksheet list to display grouped subtotals and a grand
subtotal. The list is grouped using a preferred field.in Microsoft Excel t insert subtotals, you first
sort the list so that the rows you want to subtotal are grouped together. Figure 2.13 shows a
subtotaled list.
Missing subtotals and grand totals
To generate subtotals:
1. Sort the data in ascending or descending order.
2. Click a cell in the list, then from Data menu click Subtotals.
3. In the At Each Change In box, select the field to use for grouping. (see figure 2.14).
4. In the Use Function Box, select a function you want to use.
5. In the Add Subtotals To box, check the columns that contains values you want to subtotal.
6. Click OK. Microsoft Excel automatically summarizes the list by calculating subtotal and
grand total values of the list.
Missing subtotal dialog box
Input validation
To ensure that a user does not enter invalid data, set the validation criteria.an error message is
displayed when the data that violates this rule is entered.
To set data validation:
1. Highlight the range of cells to validate.
2. On the Data menu, click Validation. Validation dialog box (figure 2.15) is displayed.
3. Click the Settings tab and select the validation criteria.
4. To display an input message, click the Input message tab, type the message to be
displayed and check “show input message when the cell is selected”.
5. Set the error alert then click ok.
Missing data validation dialog box
Generating charts
A chart is known as graph, is visually appealing diagram or diagrams generated from numerical
data on a worksheet. Charts make it easy for users to see comparisons, patterns, and trends in
data. For example instead of analyzing the sales figures on a worksheet, you can use line chart to
see at a glance whether the sales figures are on an upward or downward trend and how actual
sales compare to the projected sales.
121 | P a g e
A chart is inked to the worksheet dat. Its created from and whenever data on the work sheet is
modified, the chart is updated automatically.
Types of charts
Some types of charts available in Microsoft Excel to generate a chart include column chart, bar
charts, pie charts, line graph, scatter diagram, and area graph. Figure 2.16 shows more types of
charts available in Microsoft Excel.
1. Line chart-represents data as lines with markers at each data value in the x-y plane.
2. Column chart-represents data as lusters of columns comparing values across categories.
3. Bar chart-data values arranged horizontally as clustered bars. Compares values across
categories.
4. Pie chart-displays the contribution of each value to a grand total.
5. Scatter chart-compares pairs of values on the same axis.
Missing Microsoft excel charts
To generate a chart:
1. Select the range of values for which you want to create a chart. In charts, a data range is
referenced as an absolute range. For example =sheet1 !B$2:$C$8 means that the base
data is referenced from Worksheet 1 and the selected range is B2 to C8.
2. Click the Chart Wizard button on the standard tool bar and the chart wizard dialog box is
displayed.
3. Click the type of chart that you wish to create. If the office assistant appears, close it.
The chart sub-type preview will show several style of the selected chart type.
4. Click the next button.
5. Click the Series tab to specify data series properties. Data series refers to relate data
points plotted on a chart, each represented by unique color or pattern.
6. Click the expand dialog button to bring the full dialog box into view then click the next
button. In step 3 of the wizard, use the appropriate tabs to the title of the chart, show a
legend, select whether to display gridlines or not etc. After all these functions click the
Next button.
7. In step 4 determine whether the chart will be inserted in the current worksheet or in a new
worksheet, then click Finish button.
122 | P a g e
123 | P a g e
c) Draw a bar graph that compares values for the week starting 15th march and save it on a
separate worksheet.
d) Create a pie chart that compares the sales for all the three Wednesdays.
Printing workbooks
Printing in spreadsheets is almost the same as printing in word processing. However, most
spreadsheets allows the user to print an entire workbook, worksheet, chart or a selected range.
Before sending the work to a printer you need to preview it so that you make any necessary
adjustments.
Print review
Print review displays the worksheet, chart or selected range exactly the way it would appear
when printed.
To display worksheet, chart or selected range:
1. Click the Print review button on the standard toolbar.
2. The worksheet will be displayed in the print review window with the status bar
reading preview.
3. To make any adjustments, click the Setup button to setup the following:
a) Page orientation and scaling
b) Margins
c) Headers and footers
d) Select options such as row and column headings, gridlines and page
order are used to specify how multiple sheets are to be printed. See
figure 2.18.
Missing sheet print options
4. To print, click the Print option to display Print dialog box (see figure 2.19).
5. Select printer-the name box in this dialog box enables a person to select the
printer that will be used to print the document. All the printer that are installed
on the computer will be available here.
Missing print dialog box
6. The print what options are:
a) Selection-this prints the selected worksheet area.
b) Workbook-prints all the worksheets in the workbook.
c) Selected chart-prints the selected chart only.
7. Specify the number of copies, then click OK to start printing the job.
124 | P a g e
125 | P a g e
COMPUTER NETWORKS
DEFINITION
a network can be defined as a collection of independent entities that are arranged in such a
manner as to exchange data, information or resources. A simple example can be a
interconnection of roads in a country, continent or throughout the world.
Transmission media refers to any physical or non-physical link between two or more computers
in which a signal can be made to flow from source to destination. Some of the shared resources
include, application programs, printers, fax machines, modems, storage devices etc.
Network terminologies
Data communication- refers to the process of transmitting data signal from one point to another
through the network. Computer networking is the most recent, efficient and reliable means of
transmitting data.
Data signal-a data signal is a voltage level in a circuit which represents the flow of data. Data
signal can either be digital or analog. Analog data is made up of continuous varying waveform
while digital is made up of non-continuous discrete signal.
Signal modulation and demodulation-this is the process of converting data signals to and from a
form that is suitable for transmission over a transmission medium. e.g. a modem converts a data
signal by superimposing it on an analog carrier signal which can be transmitted over analog
telephone lines. This process is called modulation. A modem at the receiving end coverts the
analog signal into digital form, a process known as demodulation.
Multiplexing-process of sending multiple data signals over the same medium.eg a wire conductor
can carry several data signals either simultaneously or at different times. Demultiplexing is the
process of separating the multiplexed signals at the receiving end.
Example a situation where 100 computers in town A want to communicate with others of equal
number at town B. if multiplexing is not used, each of the computers in town A will need a direct
cable linking it to its partner in town B! however, with multiplexing, the computers can be made
to share a single cable laid between the two towns hence save cost. Figure 1.1 shows a
multiplexed link. The different data signals are made to have different frequencies on the cable
hence they do not interfere with each other. The different frequencies create what is called
different logical channels in the medium.
Bandwidth-a bandwidth is the maximum amount of data that a transmission medium can carry at
any one time. For example, a certain cable may have a bandwidth of 100mbps.
Baseband signal- base band signal is a digital signal that is generated and applied to the
transmission medium directly without modulation. The signal takes the form of voltages of
different magnitude applied to the medium. The baseband signal utilizes the full capacity of the
transmission medium, hence at any one time, only one signal can be sent. However, signals can
be sent at different times if they are multiplexed.
Broadband transmission-in broadband transmission, any analog signal is sent over the
transmission medium using the transmission medium using a particular frequency. This means
that several data signals can simultaneously be sent through the same medium but st different
frequencies. Frequency bands between these data signals prevent them from overlapping.
Attenuation-this is the decrease in magnitude and energy as a signal progressively moves along a
transmission medium. If the signal is not boosted, it will totally be lost along the way and may
never reach the destination. Attenuation or signal loss is usually corrected by placing signal
amplifiers also called repeater stations along the medium appropriate distances in order to
receive the weak signal, clean it, amplify it then retransmit it.
There are there modes of data communication namely: simplex, half duplex and full duplex
Simple transmission refers to the communication in only one direction. E.g. A radio broadcast.
The listener cannot communicate back through the radio receiver.
Half duplex refers to communication in both directions but one direction at a time. E.g., a sender
must first send the data before the recipient can reply. E.g. police officers communicating over a
radio call.
Types of networks
127 | P a g e
Local area network is a computer that spans a relatively small geographical area like in one
building or a school. A local area network is usually owned by one organization. However, one
local area network can be connected to other local area networks over any distance via
transmission lines or electromagnetic waves.
Most LAN connect personal computers and server computers small network.
Most LANs are configured such that each workstation has its own central processing unit with
which it executes programs, but it is also able to access data and devices anywhere on the local
network. LANs enable many users to share expensive devices e.g. printers as well as data. Users
can also use LAN to communicate with each other, by sending messages or engaging in chat
sessions.
They are capable of transmitting data at very fast rates, much faster than transmitting over
telephone lines.
A metropolitan area network is a network that covers a metropolitan area like a town or city. The
network covers a size of a radius of about 5 to 50km. the MAN infrastructure may be owned by a
single company that has many offices across a metropolitan area or by a service provider who
provides network services to subscribers in the area. In essence, a metropolitan area network is
made up of many local area network in a metropolitan area.
A wide area network is bigger than a metropolitan area network and covers a large geographical
area such as a country, a continent or the whole world. It consists of many local area networks
and metropolitan network connected together to form one large network such as the internet.
Network components
A computer network is made up of several components which can be classified into four major
categories namely:
128 | P a g e
A data signal cannot be sent from one place to another without a medium of communication. A
data communication medium is a pathway used for carrying data and information from one point
to another. The communication medium will more often than not dictate the type of signal that
will be used to transmit a message. In essence, data communication media can be divided into
two:
The main distinguishing characteristics of bounded media is that data signals are transmitted
from the source through a restricted pathway such as through a cable. For example, if the cable is
a copper conductor, the data signal which may be inform of an electrical signal id propagated
through the cable from the source to the destination. Any radiation from the guided medium is
regarded as signal loss.
There are several types of bounded transmission media but the most common ones are:
Two wire open lines are made up of two parallel copper wires separated by a plastic insulator as
shown in figure 1.3. they are used in telecommunication network to transmit voice signal.
Although the plastic is meant to reduce inter-line interference called crosstalks their linear nature
allows an electromagnetic field to build around them during heavy data transmission which may
cause interference to the signal. The wires also capture environmental frequencies e.g. radio
waves hence causing noise in the transmission channel. In data communications, the word noise
refers to random unwanted signals picked up by the channel.
A twisted pair cable is made up of two solid copper wire strands wound around each other in a
double helix manner (Figure 1.4(a)). The winding of the wires is meant to reduce the
development of an electromagnetic field around the two wires as they transmit data. These cables
are mostly used to transmit both voice and data signals.
129 | P a g e
Two most common types of twisted pair cables are the unshielded twisted pair (UTP)(Figure
1.4(a)) and shielded twisted pair (STP)(Figure 1.4(b)).
Unshielded twisted pair (UTP) cables do not have a shied that prevents electromagnetic
interference (EMI) also called “electric noise” from the environment. The cable is therefore
susceptible to noise and signal interference. Noise may come from lightening sparks, radio signal
and even the radiations from spark plugs in motor vehicles. Unshielded twisted pair is therefore
not suitable for environments that are electronically “noisy”.
Shielded twisted pair(STP) is similar to unshielded twisted pair except that a braided shield is
wrapped around the wires to shield or protect them from noise.
Table 1.1
Example 1.1
A student typed an email to send over the internet at a speed of 100Mbps. Calculate the
maximum number of characters that can be sent per second if each character can be sent per
second if each character consists 8 bits.
Solution
8 8
130 | P a g e
Most companies today use category 5 twisted pair cables to set up their local area networks.
Although they hold a high data rate,they suffer from attenuation. For every cable length of 90m,
a device for restoring the signal called a repeater is needed to amplify the signal.
1. Telephone systems use UTP which is present in most buildings. This means that it is
easier to set up network media because connection is readily available.
2. Installation equipment is cheap and readily available.
3. It is cheap because of mass production for telephone use.
Disadvantages
1. It suffers attenuation.
2. It is sensitive to electromagnetic interference and eavesdropping.
3. It has low data transmission rates compared to other cables.
Coaxial cables
A coaxial cable resembles the cable that is used to connect television antenna to a television set.
This cable has a central copper core which may be of solid or stranded wires surrounded by a
dielectric material(insulator). The dielectric material is then surrounded by a hollow mesh
conductor which is covered by a shield making the cable more resistant to electromagnetic
interference than the twisted pair cable.
The braid(or mesh conductor) is made up of copper or aluminium and serves as ground for a
carrier wire. Together with the insulation and any foil shield, the braid shield protects the carrier
wire from radio frequency interference(RFI) and electromagnetic interference(EMI). However,
although the cable has better protection against electrical interference than the twisted pair
cables, it has moderate protection against magnetic interference. The diameter of the center core
or conductor determines the attenuation rate. The thinner the core, the higher the attenuation rate.
Data is carried on this cable using direct current(dc).
Coaxial cables have bandwidths of up to 1 Gbps. Hence, they are installed in a network to form
the network backbone (a link that connects two or more separate LANs). A good example where
these cables are used in connecting different networks between buildings and routing trunk calls
in telecommunications companies. There are two types of coaxial cables:
It is important to note that today, coaxial cables have been pushed to obsolence in the installation
of local area networks because of their physical characteristics that make them hard to handle.the
twisted pair have become the default media but this may not be for long due to he dynamic
nature of networking. Probably, soon the default network will be using wireless media.
This is one of the latest types of bounded transmission media to be developed. Instead of
carrying or transmitting data signals using electronic signals, the fibre optic cables utilizes light
to transmit data from one point to another on the network. The electrical signals from the source
are converted to light signals, then propagated along the fibre optic cable. To convert an electric
signal to light, you need a Light Emitting Diode (LED) at the transmitter. At the receiving end, a
photosensitive device can be used to convert the light signals back to electric signals that ca be
processed by the computer.
The fibre optic cable is made up of the core, cladding, buffer, strength members and jacket.
The core: the core is the central part of the cable and is made up of a hollow transparent plastic
or glass.
Cladding: this is a single protective layer surrounding the core. It has some light bending
characteristic such that, when the light tries to travel from the core to the cladding, It is restricted
back to the core. This is why even if a fibre optic cable is bent into coils and a light signal is
inserted at one end it will still be seen coming from the other end.
Buffer: the buffer surrounds the cladding and its main function is to strengthen the cable.
The single mode fiber has a very narrow center core (Figure 1.6(a)).
132 | P a g e
The light in the cable can therefore take only one path through it. Because of this, it has a very
low attenuation rate and is preferred foe long distance transmission. It ahs a bandwidth of 50
Gbps which is higher than that of the twisted pair. Single mode fibre is very expensive and
requires very careful handling during installation.
A multimode fibre has a thicker core than the single mode (Figure 1.6(b)). It allows several light
rays to be fed in the cable at an angle. Because of multiple light signals navigating the cable at
the same time, distortion of the signal is possible. Multimode cables have a high attenuation rate
and are usually used for shorter distances than single mode.
Wireless or unbounded media is a type of media that is used to transmit dat from one point to
another without us8ing physical connections. In this case transmitting antenna and receiver
aerial facilitate the communication. Examples of wireless transmission media include
133 | P a g e
microwaves, satellites, radio waves and infrared transmission all which use different frequencies
of the electromagnetic spectrum.
Microwave frequencies range fro0m about 3GHz to 40GHz on the electromagnetic spectrum.
Due to their small wavelength, they easily release their energy in water as heat hence they are
also used in mak8ing microwave ovens used as domestic kitchen appliances. However, in
networking microwaves are very suitable for point to point transmissions. This means that a
signal is directed through a focused beam from transmitter to the receiver station. Figure 1.10
shows an illustration of point to point transmission in microwave transmission linking two local
area networks in different buildings.
Satellite communication
A satellite is a microwave relay station. The microwave earth stations have parabolic dishes with
an antenna fixed on them in order to focus a narrow beam towards the satellite space. A satellite
transmission system has three main components:
1. Transmitter earth station that would set up an uplink to the satellite in order to transmit
data. The uplink will have a unique frequency.
2. A satellite that is somewhere in an orbit that receives, amplifies and retransmits the signal
to a receiving earth station via a downward frequency that is different from that of the
uplink so as to avoid interference with the uplink signal.
3. Receiving earth station that would receive the dent signal on the other side of the globe.
Figure 1.11 shows an illustration of a satellite system.
A communication satellite is usually launched into space about 36000km above the earth in such
a manner that its speed will be relatively equal to the rotation of the earth. An observer on earth
will therefore, see as if they satellite is stationary in space. These types of satellite are called
geostationary satellites. They are convenient because they eliminate the need to keep on moving
the parabolic dish in a bid to track the line of sight. A geostationary satellite offers a large
constant line of sight to earth stations. The area where the line of sight can be easily located is
called the satellites footprint. The satellite transmits the signal to many recipient earth stations to
form a point to multipoint transmission. In multipoint transmission the transmitted signal spreads
out in all directions forming a cell of access radius.
134 | P a g e
The satellite produces strong signal that can be received by a satellite dish antenna of only about
2 meters in diameter. The signals are decoded using a decoder which is plugged directly to a
television set or a computer.
Radio communication
Radio waves travel just like surface water waves, i.e. they are omnidirectional that is they start
from a central point and spreads outwards in all directions. As they travel outwards, their energy
spreads outwards over the covered area. The waves are radiated into the atmosphere by a radio
frequency antenna at constant velocity. Radio waves are not visible to the human eye. Figure
1.13 shows a typical radio wave link between two separate geographical locations.
Bluetooth technology
One of the latest radio transmission technologies is called Bluetooth technology. It is a world
wide and shortrange radio technology that enables people to use hand held communication
devices such as cell phones and personal digital assistants to access the internet. The main idea
behind Bluetooth communication is to try and define one standard that will allow all personal
communication devices regardless of their differences or size to be able to communicate with
each other and through wireless technology. The main component of a Bluetooth is a small low
power two-way radio trans receiver, small enough to be inserted in small devices. A network of
Bluetooth enabled devices is called a wireless personal area network(WPAN).or piconet. This is
because Bluetooth networks are best suited for personal or handheld devices. This has made
135 | P a g e
radio transmission has become very popular in mobile communication and internet connectivity.
Figure 1.15 shows a piconet between a mobile phone and a portable computer.
Infrared waves fall just below the visible light on the electromagnetic spectrum. Just like the
radio waves, infrared waves are not visible to the human eye. Communication through this
medium is achieved by having infrared transmitters and receivers(transceivers). Transceivers of
infrared signals must be within a line of sight in the same room. This is because unlike radio
signals, infrared signals cannot penetrate obstacles like walls. However, the signal can be
reflected off surfaces like walls and ceiling until they reach their destination.
An example of an infrared device is the infrared transceiver on most mobile devices. Once
activated two people in the same room can send messages to each other using infrared
technology on their mobiles without going through the mobile service provider hence avoid
being charged.
In computer networking environment, the technology can be used to connect devices in the same
room to each other without need for cables e.g. a computer to a printer. The computers infrared
transceiver must maintain a line of sight with one for the printer.
Wireless communication offers numerous advantages which justify the cost of laying down the
network. Some of the advantages include:
1. Wireless medium is flexible in operation as compared to bounded media i.e. devices can
be moved around without losing access to the network.
2. Wireless networks can span large geographical areas easily.
3. Wireless communication can take place via satellite even in very remote areas that do not
have high cost physical infrastructure like telephone lines.
Communication devices
136 | P a g e
Network security
Impact of security
137 | P a g e
Network components
Types of network
Network terminologies
Network security
Impact of networks
PRESENTATION PACKAGES
Types of presentation packages
Creating slides
Formatting slides
Running slides
Editing objects
Internet applications
Internet security
138 | P a g e
139 | P a g e
DEFINITION OF TERMS
140 | P a g e
REFERENCES
1. Internet
2. Stephen Mburu, Geoffrey Chemwa(2004) Longhorn Computer studies form 1 . Longhorn
Publishers , Nairobi.
3. James Ndegwa and others (2011) Logon Computer Studies form 2, Kenya Literature
Bureau.
4. Stephen Mburu, Geoffrey Chemwa(2004) Longhorn Computer studies form 2 . Longhorn
Publishers , Nairobi.
141 | P a g e