0% found this document useful (0 votes)
139 views20 pages

Gns 312 Summary by Diamond

This document provides an overview of computer fundamentals and digital skills acquisition. It defines a computer, classifies computers by nature of data, size, generation, and purpose. It describes the elements of a computer including hardware, software, and humanware. It discusses computer memory types including primary/main memory and secondary/auxiliary memory. It also covers computer networks and the benefits of sharing information over a network.

Uploaded by

Toheeb Badmus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views20 pages

Gns 312 Summary by Diamond

This document provides an overview of computer fundamentals and digital skills acquisition. It defines a computer, classifies computers by nature of data, size, generation, and purpose. It describes the elements of a computer including hardware, software, and humanware. It discusses computer memory types including primary/main memory and secondary/auxiliary memory. It also covers computer networks and the benefits of sharing information over a network.

Uploaded by

Toheeb Badmus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

UNIVERSITY OF ILORIN

GNS 312

DIGITAL SKILL ACQUISITION

THE CONTENT OF THIS SUMMARY IS TO GIVE A


SIMPLE CLEAR SUMMARRY OF GNS 312 FOR
BETTER UNDERSTANDING WHICH IS ONLY
BASED ON JUST THE POINTS IN THE TEXTBOOK.
THANK YOU.

COMPILED BY DIAMOND

2020 EDITION

COMPILED BY DIAMOND
Page 1
CHAPTER ONE
COMPUTER FUNDERMENTALS
WHAT IS COMPUTER?
A computer is an electronic device that accepts data as inputs processes the data and generates
results as output.
The data given to the computer as input are processed using a set of instructions called program.
COMPUTER CLASSIFICATION
Computers are classified by: nature of data, size, generation and purpose.
CLASSIFICATION BY NATURE OF DATA
Computer can be classified into three:
- Analogue Computer: deals with quantities and it measures changes in current,
temperature or pressure and translates these data into electrical pulses for processing.
- Digital Computer: operates on data representation in form of discrete values of digits.
- Hybrid Computer: combines the features of both analogue and digital computers. They
handle data in both discrete quantity and variable quantities.
CLASSIFICATION BY SIZE
Computer classifications based on size are as follows:
- Super Computers: They are extraordinarily powerful computers and they are the largest
and fastest computer systems. It occupies a whole hall or theater. Ex. Cyber Series,Cray-
1, Fujistu, ETA-10 System etc.
- Mainframe Computer: This is a system that has a very powerful Central Processing
Unit (CPU) linked by cables to hundreds or thousands of terminals. Ex. ICL 1900, IBM
704. IBM 360/370 series etc.
- Minicomputer: This type of computer share similar features with mainframe computers
but it is smaller in physical size, generates lower heat, has less instruction set and is less
expensive. Ex. IBM AS 400, NCR Tower 32 etc.
- Microcomputer: This type of computer is much smaller in size compared to mini and
mainframe computers. The integrated circuits are replaced by a single integrated circuit
called ‘chip’. Microcomputer was first developed by companies like Apple Computers
and later by IBM PC In 1981. It is also called personal computer.

COMPILED BY DIAMOND
Page 2
CLASSIFICATION BY GENERATION
There are five basic generations to which computer can be classified:
1. First Generation Computer: These were early computers that were manufactured in
1940’s and last till 1950’s. They were characterized with the use of vacuum tubes as its
major components. Ex. UNIVAC, ENIAC etc.
2. Second Generation Computer: They succeeded the first generation computers. Their
advent was in early 1950’s and lasted until late 1950’s. They were built around
transistors which replaces the vacuum tube in the first generation. Ex. ATLAS etc.
3. Third Generation Computer: The advent of this generation was between early 1960’s
to late 1960’s. The major component that characterized the third generation computer is
the Integrated Circuitry (IC). Programming was made easier by the use of high level
languages. Ex. ICL 1900 Series, IBM 360/370 Series etc.
4. Fourth Generation Computer: They were developed having in mind the above
assertions, less expensive, more portable and highly reliable. They were built around
Very Large-Scale Integrated Circuitry (VLSI) in which over ten thousand flip-flops
were placed in a single silicon chip. The system came into being in the early 1970’s and
still in existence till date. Ex. IBM, Dell Series, Toshiba etc.
5. Fifth Generation Computer: The development of the fifth generation computers started
in the 1980’s and classical researches are still going on in this generation of computers.
This objective is achieved through the implementation of Artificial Intelligence and
Expert Systems development.
CLASSIFICATION BY PURPOSE
According to their usage or function, they are classified into Special purpose and General
purpose Computers.
- Special Purpose Computer: This type of computer is specially developed to perform
only one task. It is highly efficient and economical but lacks flexibility. The program is
built permanently into the machine.
- General Purpose Computer: These computers have the ability to handle a wide variety
of programs and to solve many problems. It makes use of stored program for switching
from one application to another.

COMPILED BY DIAMOND
Page 3
ELEMENTS OF A COMPUTER
A computer system can be divided into three main components: Hardware, Software and
Human ware
1. THE HARDWARE
The hardware refers to the physical components and the devices which make up the visible
computer. It can be divided into Central Processing Unit (CPU) and the peripheral.
The CPU is responsible for all processing that the computer does while the peripheral are
responsible for feeding data into the system and for collecting information from the system.
The CPU consists of Main Storage, Arithmetic and Logic Unit (ALU) and Control Unit while the
peripheral consists of Input devices, Output devices and Auxiliary Storage devices.
2. THE SOFTWARE
This is basically a computer program. A program consists of sequence of instructions required to
accomplish a well-defined task. It is the software that drives the hardware to accomplish a given
task. There are two main categories of software: they are System Software and Application
Software.
System software are programs commonly written by computer manufacturers, which have direct
effect on the control, performance and ease of usage of the computer system. While Application
software are programs written by a user to solve specific task(s) not directly tied to the system
hardware.
3. THE HUMAN WARE
The components of human ware in a computer system include the system analyst, the
programmer, data entry operator, end users etc. The computer system requires human
intervention before it can operate.
CHARACTERISTICS OF A COMPUTER
1. Electronic in nature
2. Speed
3. High degree of accuracy
4. Consistency
5. Iterative
6. Storage
7. Automatic control
COMPILED BY DIAMOND
Page 4
COMPUTER MEMORY
A Computer memory is the store in which data and information and computer instructions can be
temporarily or permanently kept for processing or future use. Each element is referred to as bit.
Bit stands for Binary Digit. Bits are organized into 8-bit addressable units called bytes.
The storage capacity of computer memories is most often measured in unit of byte.
The following shows the various memory sizes and their equivalent in number of byte:
i. 1 Kilobyte (KB) = 1,024 bytes
ii. 1 Megabyte (MB) = 1,048,576 bytes = 1024 KB
iii. 1 Gigabyte (GB) = 1,073,741,824 bytes = 1024 MB
iv. 1 Terabyte (TB) = 1,099,511,627,776 bytes – 1024 GB
v. 1 Petabyte (PB) = 1,125,899,906,842,624 bytes = 1024 TB
TYPES OF COMPUTER MEMORY
1. Primary or Main Memory: is the memory that resides inside the computers central
processing unit (CPU). This memory is often referred to as RAM (Random Access
Memory). It is volatile.
2. Secondary or Auxiliary Memory: is an external memory used to store data and
information permanently for future use. It is non-volatile. This memory is slower than the
main memory. Ex. Hard Disk, Optical Disk, Pen Drive, Zip Drive, Floppy Disk, Memory
Cards etc.
- Cache Memory (Kash): is a memory that serves as a buffer between the primary
memory between the CPU and main memory.
- Input and Output Devices: Data and Information’s are fed into the computer through
input devices. The input device translates data and instruction into the form the computer
can process, and information is received from the computer through the output devices.
The output device translates information into the form users can understand.
Ex of input devices: Mouse, Scanner, Digital Camera, Web Camera, Joy Stick, Track
Ball, Touch Pad, Light Pen, Bar Code Reader, Microphone, Graphics Tablets etc.
Ex of output devices: Printers, Visual Display Unit, Projector, Plotter, Speaker etc.

COMPILED BY DIAMOND
Page 5
COMPUTER NETWORKS AND INFORMATION SHARING
A computer network is a system of computers interconnected to share data and resources with
each other.
TYPES OF COMPUTER NETWORKS
A network can be small or large, depending on the number of computers and user requirements.
Generally, the following are the types of computer networks available:
1. Local Area Network (LAN): is a computer network that interconnects computers within
a limited area and has its network equipment locally managed.
2. Metropolitan Area Network (MAN): is a computer network that connects computers in
a geographical area larger than that covered by LAN but smaller than area covered by
WAN
3. Wide Area Network (WAN): is a computer network that extends over a large
geographical distance.
BENEFITS OF COMPUTER NETWORK
- Share files stored in one location (network) by multiple users
- Share devices such as printers or access the internet
- Company information organized in one central area for storage, maintenance and backup.
HARDWARE COMPONENTS OF A COMPUTER NETWORK
They include: Network cables, Distributors, Routers, Internal Network Cards, External Network
Cards.
TROUBLESHOOTING TECHNIQUES
Computer troubleshooting is the act of identifying and correcting faults in a computer system. It
involves a logical and systematic search for the source of faults in order to fix it and make the
computer work properly as expected.

COMPILED BY DIAMOND
Page 6
CHAPTER TWO
OPERATING SYSTEM
OPERATING SYSTEM SOFTWARE
An OS is a system software that manages computer hardware and software resources and
provides common services for computer programs. Various kinds of OS includes: DOS,
Windows, and Linux etc.
DOS: is an acronym for Microsoft Disk Operating System which was developed by Microsoft
for IBM-compatible personal computers. The term DOS refers to any operating system. (Read
more on it on your textbook and practice it on a computer system).
To use DOS use the following steps:
Step 1: Click on window start button
Step 2: Type command
Step 3: Press the enter key
Windows: Microsoft windows are a family of graphical based operating systems developed by
Microsoft in 1995.
Versions of Windows OS:
Windows OS Year
Windows 1.0 1985
Windows 2.0-2.11 1987
Windows 3.0 1990
Windows NT 1993
Windows 95 1995
Windows 98 1998
Windows ME 2000
Windows XP 2001
Windows Vista 2006
Windows 7 2009
Windows 8 2012
Windows 10 2015
Some of the basic windows are desktop, start menu, icons, taskbar, title bar etc.

COMPILED BY DIAMOND
Page 7
Desktop: The desktop is the general work area of your computer. It gives you access to the
programs, folders and documents that you use frequently.

Start Menu: is located at the lower left corner of the screen. It is indicated by window icon with
or without the word start. By clicking it, It gives you access to settings, help, other programs and
documents and many other features.

Icon: is a symbol or picture in a windows environment which acts as a button in order to open up
application, document, folder, or other object.
There are three different types of icons which are: Application Icons, Folder Icons, and
Document Icons.

The Taskbar: is what you see at the very bottom of your screen.

System Tray: Systray is at the lower right corner of the desktop on the taskbar which is used to
display the clock and the icons of certain programs running so that a user is continually reminded
that they are there and can easily click one of them.

Title Bar: is at the top of the window containing the following items such as Minimize,
Maximize, Restore and Close.

Menu bar: allows access to feature within the particular program.

Scroll Bars: when there is more content than a window can contain, the scroll bars appear at the
bottom and even more often on the right hand side of a window.

TYPES OF WINDOWS
- Program Windows: Are used to open applications like Word, Internet Explorer etc.
- Document Windows: open a specific document within the applicable program window.
- Folder Windows: open folders that contain other folders, documents, programs etc.

COMPILED BY DIAMOND
Page 8
CHAPTER THREE
OFFICE APPLICATIONS
WORD PROCESSING
Microsoft is one of the most popular word processing software supported by both Mac and PC
platform used to create documents, brochure, leaflets, outlines, resumes, lists, and simple web
pages.
GETTING STARTED (MICROSOFT WORD)
- Opening Microsoft Word on a PC
- Saving documents
- Saving initially
- Saving Later
- Toolbar and Tabs (Home, Insert, Design, Reference, Mailing, Review, View, Acrobat)
- Formatting Documents
- Formatting paragraphs
- Formatting text
- Numbered and Bulleted lists
- Adding columns
- Headers and Footers
(Read more on it on your textbook, then check it out and practice it on your PC)
INSERTING AND ADDING OBJECTS
- Clip Art
- Drawing
- Word Art
- Word Wrap
- Inserting from a previously created file
- Creating a table
- Flow Chart
(Read more on it on your textbook, then check it out and practice it on your PC)

COMPILED BY DIAMOND
Page 9
PRINTING
- Saving as a PDF
Other helpful functions
- Undo and Redo
- Word count
- Quitting
(Read more on it on your textbook, then check it out and practice it on your PC)

SHORTCUT KEYS FROM MICROSOFT OFFICE


They can be of great help when using your PC especially on Microsoft Office product. Not only
are they quick and easy, they are also amazing time savers.
CTRL+K= Create a hyperlink, CTRL+/= Display HTML Tags, CTRL+T= Create an auto
thumbnail of the selected picture, CTRL+SHIFT+B= Preview a page in a web browser,
SHIFT+ALT+F11= Display the Microsoft script editor, CTRN+N= Create a new page,
CRTL+B= Bold, CRTL+I= Italic, CRTL+U= Underline, CRTL+C= Copy, CTRL+V= Paste,
CTRL+Z= Undo, CTRL+S= Save, CTRL+P=Print, CTRL+O= Open.
SPREADSHEET: is a type of application program which manipulates numerical and string data
in rows and columns of cells.
GETTING STARTED (MICROSOFT EXCEL)
- Opening Microsoft Excel on PC
- File tab >New
SAVING DOCUMENTS
- Saving Initially
- Saving Later
TOOLBAR
- Three Commonly Used Toolbars (Home, Insert, Page Layout Tab)
FORMATTING
- Working with cells
- Changing and entry within a cell
- Formatting cells
- Formatting rows and columns
COMPILED BY DIAMOND
Page 10
- Adding rows and columns
- Working with charts
- Chart design
- Chart Options
INSERTING SMART ART GRAPHICS
- Pictures
- Inserting clipart
- Creating Functions
(Read more on it on your textbook, then check it out and practice it on your PC)
PRINTING: To print your document, go to file tab > Print and press OK or use CTRL+P.
POWER POINT PRESENTATION
PRESENTATIONS: collection of data and information that is to be delivered to a specific
audience.
FILE MENU TAB: allow you to create a new presentation.
RIBBON: is the panel at the top portion of the document.
QUICK ACCESS TOOLBAR: is a customizable toolbar that contains commands that you may
want to use.
MINI TOOLBAR: is a floating toolbar that is displayed when you select text or right-click text.
NAVIGATION: displays an outline of the entire slides in the presentation.
SLIDE VIEWS: can be viewed in a variety of manners.
CREATING PRESENTATIONS
- New presentation
- Save a presentation
- Add slides
- Themes
- Entering text
- Select text
- Copy and paste
- Undo and redo
- Change font type face and size
- Font styles and effects
COMPILED BY DIAMOND
Page 11
- Change text colour
- Word Art
- Change Paragraph Alignment
- Text Direction
- Graphics
- Adding Clip Art
- Adding a shape
- Adding smart art
- Adding tables
- Adding charts
- Slide effects
- Slide Animation
- Slide setup and slide show
- Record slide show
- Rehearse timing
(Read more on it on your textbook, then check it out and practice it on your PC)

POWERPOINT 2013
- Printing
- Create Speaker Note
- Print a presentation
- Package a presentation
(Read more on it on your textbook, then check it out and practice it on your PC)

ONCE YOU GO THROUGH YOUR TEXTBOOK ON THIS CHAPTER AND PRACTICE IT


ON YOUR PC THE YOU WILL GET MORE UNDERSTANDING ON THIS CHAPTER
THRE

COMPILED BY DIAMOND
Page 12
CHAPTER FOUR
INTRODUCTION TO DATABASE
A Database is most often electronic which can be saved on the computer memory, retrieved and
sorted or processed electronically.
Collection of field make up of records and collection of records make up of tables.
DATABASE COMPONENTS
MS Access contains four components:
1. Tables: are the stores in which data are kept in the database. There are two views of
tables which are: the data view and the design view.
2. Queries: are commands or instructions designed to retrieve data from one or more tables
in the database. They can be accessed both in design and data view.
3. Forms: are well organized medium for entering data into a database.
4. Reports: are the outputs of data in an organized form for human consumption.
CREATING MS ACCESS DATABASE
The Database will be named BusinessDB
- Creating the DB
- Designing table
- Primary key: is a field in a table that is unique in value for each of the records in the
table.
- Foreign key: is simply one or more fields in a given table that a primary key in another
table.
- Designing forms: These are the interface through which data can be entered into database
tables.
- Creating query: a query pulls required data from one or more tables in a database.
- Creating reports: it is the same with creating query except that the report interface has
designated header and footer sections.
CHAPTER FIVE
INTERNET AND THE WEB
- The internet is often referred to as the net. This is the means of connecting a computer to
any other computer anywhere in the world via dedicated routers and servers.

COMPILED BY DIAMOND
Page 13
- Information that travels over the internet does so via a variety of languages known as
protocols.
- The World Wide Web (WWW) is a way of accessing information over the medium of
the internet.
- The WWW uses the Hyper Text Transfer Protocol (HTTP) to transmit data.
INTERNET PROVIDERS
An Internet Service Provider (ISP) is an organization that provides services for accessing,
using, or participating in the internet.
The most widely used ISPs are national and wireless.
ISP can be categorized into the following:
1. Access providers ISP
2. Edge providers
3. Mailbox providers
4. Hosting ISPs
5. Transit ISPs
6. Virtual ISPs
7. Free ISPs
8. Wireless ISPs
ISP serves as the main entry or gateway access to the world largest network of computers,
the internet.
Below is the list of some ISP companies in Nigeria:
1. NETCOM Africa
2. SWIFT
3. IPNX Nigeria
4. ETISALAT
5. SPECTRANET
6. SMILES
7. GLOBACOM
8. VDT Communications
9. MTN Nigeria
10. VISAFONE
COMPILED BY DIAMOND
Page 14
CONNECTIONS AND PROTOCOLS
A connection is a successful completion of necessary arrangements so that two or more
parties can communicate at a long distance.
A protocol is a set of rules about exactly how information will be transferred between
computers on the internet.
- The two important protocols that allows network to cooperate with one another and
exchange information are called TCP (Transmission Control Protocol) and IP
(Internet Protocol).
Others are:
- FTP: File Transfer Protocol
- HTTP: Hypertext Transfer Protocol
- RTP: Real Time Transport Protocol
- TFTP: Trivial File Transfer Protocol
- UDP: User Datagram Protocol
- PPP: Point to Point Protocol
PURPOSE OF THE INTERNET PROTOCOL
1. The IP protocol defines the basic unit of data transfer.
2. IP software performs the routing function.
MAILING SYSTEM
At the sender, data is broken into packets and sent to the nearest node (router). At each router,
it sends the packets to another router that is closer to the final destination and at the receiver;
packets are reassembled to get the original data.
E-MAIL
Electronic mail is most commonly called email or e-mail since around 1993.
It is a method of exchanging digital messages from an author to one or more recipients.
INTERNET SERVICES
1. Electronic mail
2. Remote terminal
3. File transfer
4. Newsgroup
5. File sharing
COMPILED BY DIAMOND
Page 15
6. Resource distribution
7. World Wide Web
8. Video conferencing
9. Games
E-COMMERCE
Electronic commerce is the buying and selling of goods and services, or transmitting of funds or
data, over an electronic network, primarily the internet.
Three basic types of e-commerce are business-to-consumer, business-to-business and consumer-
consumer.
BROWSERS AND SEARCH TOOLS
- A web browser is a client program that request services from a web server.
- Web sites are hosted on dedicated computers known as web servers.
Some related terms are: URL, HTML, Applets.
A popular and most likely used web browser include internet explorer, others are Opera mini,
Firefox, Google Chrome etc.
- There are three basic search tools that people use to find what they are looking for on the
web and they are:
1. Search Engines
2. Subject Directorates
3. Meta Search Tools
WEB UTILITIES
They are special utility programs that make using the internet and the web easier and safer.
There are two categories of web utilities:
1. Plug-ins
2. Helper Applications (add-ons)
Helper application has four types which are:
- Off-line browsers
- Information pushers
- Off-line search utilities
- Filters

COMPILED BY DIAMOND
Page 16
FILE TRANSFER UTILITIES: copies files to (downloading) and from (uploading) your
computer.
INTRANET: is a computer network that uses internet protocol technology to share information,
operational systems, or computing services within an organization.
EXTRANET: is a private network that uses internet technology and public telecommunication
system to securely share part of business information or operations with suppliers, vendors,
partners, customers, or other businesses.
FIREWALL: is a network security system that monitors and controls the incoming and
outgoing network traffic based on predetermined security rules.

CHAPTER SIX
COMPUTER SECURITY AND PRIVACY
Generally security means freedom from risk or danger.
- So it can be stated that security is the ability of a system to protect information and
system resources with respect to confidentiality and integrity.
- Computer Security is the application of protective mechanisms to computing devices
such as computers and smartphones, as well as computer networks such as private and
public networks, including the whole internet.
Computer security is frequently associated with three core areas, which are: Confidentiality,
Integrity and Availability, and they can be conveniently summarized by the acronym (CIA).
OTHER SECURITY CONCEPTSS
- Privacy: is used in numerous contexts differently, like prevention of and freedom from
unauthorized access.
- Identification: is about claiming to be somebody. It is a process by which a subject
professes an identity and accountability is initiated.
- Authentication: The process of verifying or testing that the claimed identity is valid.
- Authorization: It ensures that the requested activity or access to an object is possible
given the rights and privileges assigned to the authenticated identity.
- Auditing: is the programmatic means by which subjects are held accountable for their
actions while authenticated on a system.

COMPILED BY DIAMOND
Page 17
- Accountability: is established by linking a human to the activities of an online identity
through the security services and mechanisms of auditing, authorization, authentication,
and identification.
- Non-repudiation: ensures that the subject of an activity or event cannot deny that the
event occurred.
PROTECTION MECHANISMS
- Layering: also known as defense in depth is simply the use of multiple controls in a
series.
- Abstraction: is used when classifying objects or assigning roles to subjects for
efficiency.
- Data Hiding: means preventing the data from being discovered or accessed by a subject.
- Encryption: is the art and science of hiding the meaning or intent of a communication
from unintended recipients.
THREATS AND VULNERABILITIES
A computer system can be divided into three parts: hardware, software and the data on the
system itself.
Vulnerability is a weakness which allows an attacker to reduce a systems information
assurance.
Threat on the other hand is a set of circumstances that has the potential to cause loss or
harm.
These are the common or well-known classes or attacks methodologies:
- Brute force and dictionary attacks
- Denial of service
- Spoofing attacks
- Man-in-the-middle attacks
- Sniffer attacks
- Computer hackers
- Malicious code
- Viruses
- Logic bomb
- Trojan horse
COMPILED BY DIAMOND
Page 18
- Worms
COMPUTER SECURITY COUNTERMEASURES
The solution to computer security threats are grouped into two parts: the active protection and
the preventive measures.
The cornerstone of any security program is education.
The primary means of defense against malicious code is the use of antivirus filtering software.
It is wise to consider implementing antivirus filters in at least three key areas:
1. Client systems
2. Server systems
3. Contents filters
CYBERCRIME
Cybercrime is defined as crimes committed on the internet using computer as either a tool or a
targeted victim.
Cybercriminal is an individual who commits cybercrimes, where he/she makes use of the
computer either as a tool or as a target or as both.
The following are categories of cybercriminals:
- Children and adolescents between the age group of 6-18 years
- Organized hackers
- Professional hackers/crackers
- Discontented employees
PREVENTION OF CYBERCRIME
1. By avoiding disclosure of any information pertaining to one self
2. Always avoid sending photograph online particularly to strangers
3. Always use latest and updated antivirus software
4. Always keep back up volumes in case of data loss
5. Never send your credit card number to any site that is not secured, to guard against fraud
6. Always keep a watch on sites that your children are assessing
7. Use a good security program
8. Web site owners should watch traffic and check irregularity on the site.
9. Use of firewalls and other malware protective mechanisms
10. Web servers running public sites must be physically separated and protected
COMPILED BY DIAMOND
Page 19
THE END

I HOPE THIS SUMMARY IS VERY HELPFUL


AND BENEFICIAL TO ALL OUR 300 LEVEL
STUDENTS

THANK YOU
SUCCESS AHEAD

DIAMOND CARES

COMPILED BY DIAMOND
Page 20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy