OUP - Just Click For The Caribbean
OUP - Just Click For The Caribbean
,.
OXFORD
Oxford excellence for the Caribbean
Just Click
for the Caribbean
THIRD EDITION
Howard Lincoln
Alison Page
Jennylene
Smith-Drayton
Glenda Gay
Denzle Murray
Ramesh Outar
Janice Steele OXFORD
UNIVERSITY PRESS
Section 1 7
Unit 1 Using computers safe ly 8
1.1 Danger in the computer lab 8
1.2 Staying safe in the computer lab 10
Unit 2 The basics of computer systems 12
2.1 W hat is a computer? 12
2.2 Types of computer 14
2.3 Computer hardware 16
2.4 Computer software 18
2.5 Development of computers 20
2.6 How computers are changing ou r lives 22
2.7 The computer desktop 24
2.8 Using your keyboard and mouse 26
2.9 Ed iting a docu ment 28
2.10 Saving and printing a docu ment 30
Unit 3 Computers and communication 32
3.1 The technology of communication 32
3.2 Using computers to communicate 34
3.3 Computer networks 36
3.4 Find ing informat ion on the web 38
3.5 Send ing an email 40
Unit 4 Computer ethics 42
4.1 W hat is ethical behaviour? 42
4.2 Intellect ual pro perty rights 44
4.3 Find ing reliab le information 46
Unit 5 Careers in computing and IT 48
5.1 Computers and the world of wo rk 48
5.2 A creative career in computing 50
5.3 A techn ical career in computing 52
Unit 6 Introductio n to problem-solving 54
6.1 W hat is problem-solving? 54
6.2 Investigatio n and research 56
6.3 Developing solutions 58
6.4 Describing so lutions 60
Unit 7 Word processing 62
7.1 W hat is word processing? 62
7.2 Entering text 64
7.3 Moving text 66
. .
Section 2 103
Unit 9 Maintaining your computer 104
9.1 Maintaining you r computer 104
9.2 Determ ining systems requirements 106
Section 3 187
Unit 18 Basic IT troubleshooting 188
18.1 Basic computer maintenance 188
18.2 Solving basic network problems 190
Unit 19 Managing data files 192
19.1 Working w ith Ales 192
19.2 Using fi les and folders 194
19.3 Organizing files using folders 196
19.4 Advanced fi le organization 198
19.5 Adding in binary 200
. .
Talk about
Provides stimulus for Find out
further discussion
• more
and exploration.
Glossary
words
Key terms are
. - --·-··. '
Students are
presented with
opportunities
to use their
developing IT skills
to explore topics in
more depth.
included in bold,
with full definitions at
the back of the book.
Tutorials
Practical skills are
developed in point-
Online by-point tutorials,
Further learning with
online support at:
1111 =
~
· r--.·
which guide
students through
oxfordsecondary.com
/2ust-click-3e
• - "'''--
• given activities.
Environmental risks
Q
Computers and eq uipment such as printers are difficult to dispose
of Disposing of computers carelessly can cause serious damage to Why is it important to
the environment. dispose of computers
thoughtfully? What
• Most of the material used to make computers is non- are the risks to the
biodegradable. Plastics, metals and other materials that environment of not
make up the computer do not break down if computers are doing so? How could
sent to landfill. that affect you and
• Computers contain heavy metals like mercury and lead, along your family?
with toxic chemicals that can be dangerous if released into the
environment.
• Valuable metals that are used to make computers, such as gold,
copper, and even steel, are thrown away when they could be
recycled. This means more val uable metal m ust be mined and
processed.
Computer systems
A microprocessor is the brain of a computer, but it is not very useful
on its own. The microprocessor only becomes useful when it is part
of a larger system. We call this a computer system.
A computer system must be able to:
• capture data from the o utside world
• store the data until it is needed
• process the data, for example by organizing it or performing
calculations to create information
• retrieve the right information w hen needed by the user
• o utput information in a useful form.
Store
Figure 2.1.2 A computer system relies on inputs and Figure 2.1.3 The various devices that make up a
produces output, and stores data during the process computer system are called computer hardware
Computer software
A computer cannot work independently; it needs instructions. The
A computer system
instructions a computer follows come from computer programs. A
uses different parts
computer uses different programs for different jobs. For example, a
to carry o ut these
word processor is a program used to create documents. A graphics tasks. The parts of a
program is used to create images. Other programs control printing
computer system are
and make sure data is saved correctly.
called devices.
Different programs are used to instruct a computer to do many
different tasks. This makes the computer a powerful and flexible
tool. The programs used to control the work of a computer are
called software.
A computer system uses hardware and software together to
process data into information.
Personal computers
Personal computers {PCs) are designed to be used by individuals
to help in their work or learning. There are different types of
personal computer.
... ..
Desktop computers are used in offices, schools and the home.
-- - . 1:1 .. . ,.·, They are used for tasks like word processing, email, and playing
.
~.,_
.
"' - - i.! ==•
" " -"
. .. !I ... . . · "
"'!";l:"1 S1',' •
t.or•EIII•
8 -
' P. · _
• •
..
~ ., ". • ••
~ :._
games. The processor is stored in a metal case often kept on a desk.
Storage devices like disk drives are also stored in the case.
Input and o utput devices are separate components attached with
cables: devices can be chosen to suit the needs of individual users.
Figure 2.2.1 Laptops, For example, a person with disabilities can replace the keyboard
smartphones and tablets have a with a special input device.
variety of uses and functions
Laptop computers are as powerful as desktop computers and are
used for the same tasks.
The base of the case holds the processor, keyboard, storage devices,
and a trackpad. The lid holds a screen. A laptop also has a built-in
camera, microphone, and speakers. A battery allows the laptop to
be used without being pl ugged into an electrical supply. It is easy
to carry around and can be used almost anywhere. The cost of a
laptop computer is about the same as a desktop.
Tablet computers have all their components built into a thin
lightweight case. A tablet uses a touchscreen. A keyboard is
displayed on screen when you want to enter text. There is no need
for a mouse. You can start and control programs by tapping and
sliding a finger across the screen.
Figure 2.2.2 A touchscreen is Tablets are not as powerful as desktop computers, but they are
an input and an output device lighter, smaller, cheaper and more portable. A modern smartphone
combined. is a small tablet computer.
Figure 2.2.3 Supercomputers are used for important scientific, financial, and
government work
Mainframe computers
There are some processes that a business relies on. The process
must be available all the time. For example, an Internet shopping
site depends on its online ordering system.
Mainframe computers are used to run this type of system. Mainframes
are kept in special rooms and have large amounts of storage. The work
done is usually quite simple, so it does not have to be as powerful as a
supercomputer. It must be reliable and available 24 hours a day.
Portability * * * * *
Fact The first computer mouse was invented in
1964 by Dougla~ C Engelbart. lt was made of
wood. It was 20 years before his invention was
used on a desktop.
In this lesson you will learn about the physical components that
make up a working computer system. This is called the computer
hardware.
The processor
The processor is at the centre of a computer system. Modern
computer processors are very small. They are called
microprocessors. A microprocessor is a powerful device. It can
create 3D games that look like real life, and can be used in devices
that fly real spacecraft.
The world's first The basic component inside a microprocessor is a switch. Like the
portable computer was switches around yo ur house, switches in a computer can either
the Osborne 1. It was be on or off. There are millions of microscopic switches inside a
released in 1981. The microprocessor. They are turned on and off by electronic signals.
Osborne 1 was the first
Each time the switches inside the processor change, an instruction is
computer to have a
carried out. The switches change several million times every second.
keyboard, screen and
Processing speed is what makes a computer so powerful.
storage devices built
into a single case. The electronic signals used by a computer processor are called
digital data. A computer is a digital device.
The Osborne 1 had
a tiny 5- inch screen Input devices
and weighed 11 kg,
Input devices are used to capture data from the real world so that
but co uld easily be
it can be processed by a computer. Input devices convert data into
moved around and
digital data. Examples of input devices include:
transported in a car or
plane. • keyboard: turns the letters and numbers you type into digital data
• mouse: turns its movement into digital data
The Osborne company
was a fail ure, but • webcam or digital camera: turns a picture into digital data
its revol utionary • microphone: turns sound into digital data.
design inspired other
Output devices
companies to develop
the laptop computers O utput devices turn the digital data used by the processor into a
that are so popular format we can use. Examples of o utput devices include:
today. • monitor or screen: turns digital data into a visual display
• printer: turns digital data into a printed document
• speakers: turns digital data into sound.
Storage devices
Storage devices are the memory of a computer. The digital data
in the processor is lost when you close your work or switch your
computer off. Storage devices save your work so that you can use it
again. Work is saved to a storage device as digital data. It is not in a
form that people can read. Examples of storage devices include:
• hard disk: saves your work between lessons
• optical drive: can read data stored on DVDs and CDs
• USB flash memory stick: saves work so it can be transferred
from one computer to another.
What is software?
Software is the name given to the instructions that tell a computer
what to do. The instructions are grouped together in files called
programs. A computer program is a set of instructions that work
together to do a job.
An example of a computer program is a word processor. A word
processor is designed to allow us to create documents. A word
processor was used to create this book.
A computer program contains many instructions. For example, in a word
processor program there is an instruction to underline text or make it
bold. There are many thousands of small instructions in every program.
Types of software
The two main types of software are called system software and
application software.
System software makes the hardware in your computer system
work. For example, when you move your mouse, a cursor moves on
your screen. When you type letters on your keyboard, they appear
on your screen. It is system software that controls these actions.
System software:
• controls input to the computer from your keyboard and mouse
• controls o utput to your computer screen and printer
• allows you to save your work .
System software is usually installed on a computer when you buy
it. Most of the system software programs you use are part of your
computer operating system. Microsoft Windows is an example
of an operating system. An operating system is a collection of
system software that lets you give instructions to your computer.
Other operating systems you may have used incl ude iOS on Apple
computers and Android on tablets and smartphones. Figure 2.4.2 i0S and Android
Applications software is designed to help a person use a computer are popular smartphone
system to do work . A word processor helps you to create operating systems
documents. If you need to work with numbers and do calculations,
you use a software application called a spreadsheet. When you
need to find information on the Internet, you use a web browser.
Applications software:
• is written to help you to do your work
• uses system software to communicate with computer hardware.
Early calculators
Mechanical calculators were developed as long ago as the 17th
century. These were not computers as we know them today, but
they provided important lessons for the computer scientists who
came later.
• Blaise Pascal was 19 when he invented the 'Pascaline' in 1642. He
invented it to help his father to calculate taxes. The Pascaline only
performed addition.
• Gottfried Leibniz invented the 'Stepped Reckoner' in 1672. It
could perform addition, subtraction, m ultiplication and division.
• Charles Babbage invented the 'Calculating and Analytical Engines'
in the 19th century. Both engines were powered by steam so they
would work faster than other calcu lators. The machines could
also be programmed, but they were so complicated that they
could not be built.
• Herman Hollerith invented his electrical 'tabulating machine' in
the 1880s. The machine red uced the time it took to process the
US population census from eight years to one year. Hollerith
called his company International Business Machines {IBM). Years
later, IBM became an important computer manufacturer.
Figure 2.5.1 Valve computers
were very large and created a Electronic computers
lot of heat, so air-conditioned
The first 'true' computers were developed in the 1940s. True
rooms were built to house them
computers are electronic devices that can be programmed to carry
o ut different tasks.
Figure 2.5.2 Early computers were too large and expensive for home users
Valves and transistors
The first electronic computers were built in the 1940s using valves
(also called vacuum tubes). A valve looks like an electric lightbulb.
It acts like a switch and can turn the flow of electricity on and off.
Valves can be used to represent binary numbers in computers
(off = 0, on = 1).
Transistors replaced valves in the 1950s. A transistor does the same
work as a valve but generates less heat. Computers made with Figure 2.5.3 Computers using
transistors were smaller and more reliable than valve computers. integrated circuits were
Transistors were available to a few organizations, but they needed developed in the 1970s
specialist technical support.
Integrated circuits
An integrated circuit is a slip of silicon that holds millions of
microscopic transistors. It is usually called a silicon chip. As
integrated circuits became faster and more powerful, all the
processing power of a computer could be built on a single chip
called a microprocessor. Microprocessors are used to build smaller
portable computers like laptops and tablets.
Parallel processing
More computer power is generated when several microprocessors
work together. This is called parallel processing The extra computing
power is being used to develop computers that can learn and act with
independence. This is called artificial intelligence (Al}. Processors
have continued to get smaller. This allows embedded microprocessors
to be used in many more devices.
The car
Figure 2.6.1 Robot vacuum
cleaner A modern car can have as many as 60 computer processors. Each
processor does a special job. For example, one microprocessor will
manage how the car uses fuel. Others will operate the car radio or
apply emergency brakes if the car gets too close to another vehicle.
The car is made easier and safer to drive.
Robot cars are being developed. A robot car will not need a human
driver. They are called autonomous vehicles.
Computers at work
In lesson 5.1 you w ill learn how computers and the Internet have
changed the way office work is done. But technology is bringing
change to many other types of work.
Doctors
Doctors diagnose illnesses using machines that contain computer
processors. A magnetic resonance imaging (MRI) scanner creates a
3D picture of the inside of a patient. A doctor can use the picture to
see problems
When an illness is diagnosed, robotic medical instruments allow
doctors to carry o ut delicate surgery they could not do with their
own hands .
Technology helps patients to recover after treatment. Patient-
monitoring systems check blood pressure, temperature, and pulse
rate. N urses get an early warning if a patient needs attention.
Manufacturing
A modern factory is full of technology. Robots are used to assemble
cars. A car is moved automatically from one part of the factory to
another. At each stop, robots complete work on part of the car:
Robots are used to manufacture many other goods. They are used
for simple, repetitive jobs. Robots are also used to do jobs that
are dangerous for humans. For example, the police use robots to
investigate packages that might contain explosives.
Retail
Many people now use the Internet to do their shopping. High street
stores have set up Internet sites where people can buy goods. Some
retailers do not have physical shops at all. They only sell online.
Orders made on the Internet are processed quickly by computer
systems and robots. Some stores even have robot vehicles that can
deliver packages without needing a delivery driver. Some people
worry about the effect Internet shopping has on jobs in town
centres.
When you start up your computer, the first thing you see is the
desktop. The desktop is designed to make it easy for you to use the
software applications on your computer so that you can do your
work. Any system that helps you use your computer is called a user
interface.
Although there are different kinds of user interface, most modern
personal computer systems work in much the same way.
Desktop
Icons
Taskbar
Start button
Figure 2.7. 1 The main screen when you begin work is called the desktop
Icons
On the desktop there will be some small images called icons.
Icons are used to show the different items that are stored on yo ur
computer. You will see icons that represent:
• software applications that you can use, like a word processor or
a game
• computer files, used to store work that you do on the computer.
A file might contain a homework assignment you have completed
or a picture you took of your family on holiday
• folders, which are containers you can make on a computer
to store files in. You use folders to store your work neatly. For
example, you might make one folder to hold your science
assignments and another to store your maths homework.
There are several ways you can recognize an icon and understand
what it shows.
1. The icon uses an image. You will learn to recognize the icons that
you use most often simply from the image.
2. There is a label underneath the icon giving you more information.
3. If you point your mouse at the icon and hold it still, a box with Figure 2.7.3 Folder and
more information about the icon pops up. file icons
Figure 2.7.3 shows two icons. One shows a file, the other shows a
folder. The icons have labels j ust like the software application icons.
You give a file or a folder a name when you create it. That name is
used as the label for the icon.
Icons
At the bottom of the home page is the taskbar. It is the black bar
with small icons on it. The taskbar has two purposes:
1. It contains icons for software applications you use regularly - like
the desktop.
2. It shows you the documents you are currently working on. For
example, if you leave a document open in which you are writing
a letter, you can use the taskbar to get back to your document.
In the bottom left- hand corner is the Start button. From this button
you can start any software which is available on your computer.
Figure 2.8.3 Holding a mouse correctly will provide greater control and may
help to avoid RS/s
Keyboard layout
Having good mouse skills will help you to control your computer.
QWERTY isn't the
To do useful work on the computer you also need to use the
only type of keyboard
computer keyboard.
available. One
The computer keyboard is an input device. The keyboard alternative is the
allows you to send commands to the computer and to type text Dvorak keyboard. What
into documents. The standard keyboard is called the QWERTY is a Dvorak keyboard
(pronounced kwer-tee) keyboard. The name comes from the and how does it
first six letter keys on the keyboard . compare to a standard
QWERTY keyboard?
Function Keys Special Keys
Numeric
Keys
Figure 2.8.4 The keys on your keyboard are arranged in groups
Character keys: This is the most important set of keys. You use the
keys in this block to input data into your computer. You can type
letters, numbers, and punctuation characters using the keys in this
block.
Function keys, Direction keys and the Numeric keypad: The keys in
these blocks are designed for special purposes. With a few exceptions,
you won't need to use them much. For now, make sure you can find
them on your keyboard. If you are using a laptop, these keys may be
arranged differently, combined with other keys, or not included at all.
The most important block of keys is the character block. These are the
keys you will use most of the time. The next activity will help you learn
a little more about the character keys.
( oxfordsecondary.com/just-click-3e
Open Worksheet 2.8. The exercises in the file will help you learn
more about the character keys on your keyboard. Complete the
exercises in the file to practise using your mouse.
In this lesson you will learn how to use your keyboard to enter
text into a document.
Figure 2.9.1 You can help avoid RS/s by adopting the correct hand position
Raise your palms so that your hands are not resting on anything.
Hold your hands at a 10 to 30-degree angle when typing. Too great
an angle in your wrist causes stress and may lead to carpal tunnel
syndrome.
Entering text
The letter keys are arranged in a three-row block in the centre of
your keyboard. The QWERTY layout may seem a little unusual
at first The more practice you have, the faster your typing will
become.
Position your index fingers over the F and J keys so that you can see
G and H between your fingertips. Use your left hand to press keys
Figure 2.9.2 The Shift and Caps on the left of the keyboard. Use your right hand for keys on the
Lock keys right.
When you type a letter key, the letter appears on your screen in
lowercase. For example, as a 't' not a T.
To get uppercase (capital) letters, hold down the Shift key while
you press a letter. The Shift key is marked with an up arrow or the
word 'Shift'. There are two Shift keys on your keyboard: one on the
right and another on the left.
Above the Shift key on the left of the keyboard is the Caps lock key.
If you press Caps Lock, the letters you type all appear in uppercase
until you press Caps Lock again. There is a light either on the key or
elsewhere on the keyboard to remind you that Caps Lock is on.
Entering numbers
You can type numbers using the row of keys above the letters.
There is another block of numbers in a block on the right of your
keyboard.
Entering punctuation
Punctuation characters like the full stop and q uestion mark are
positioned around the edges of the keyboard. Most keys have two
characters on them. For example, the 5 key has'%' above it. If yo u
hold the Shift key and press the 5 key you get a% symbol.
Punctuation key
oxfordsecondary.com/just-click-3e
Open Worksheet 2.9 and complete the exercises. They will help
you improve your keyboard skills.
In t his lesson you w ill learn more about you r keyboard. You w ill
also learn how to save and print your wo rk.
Cursor keys
In lesson 2.8 you learned how to move your cu rsor around the
screen using a mouse. When you are using a keyboard, it is
sometimes easier to use the cursor keys to move around. The
cursor moves in the direction of the arrow on a cursor key.
Scrolling
Figure 2.10. 1 Cursor keys
When you create or edit large documents you will notice that only
part of the docu ment is shown on screen at any time. The way to
move around a big document is to use the scroll bar. The scroll bar
is on the right of the window.
Inside the scroll bar is a rectangle called the scroll box. If yo u
drag the scroll box up and down, your document will scroll inside
the window. You can make the document scroll one line at a
time by clicking on the scroll arrows at the top and bottom of the
scroll bar.
Fite ~ Insert Design Layout Refere, MaifinSij Review Vie-w Deveto Hetp .P Search tS O
Banking
Banks now carry out most of their business usinccomputer systems. Whether that Is p.oyias for
goods With a dtblt or credit c-ard, dr~wtng out cas.h from a b.lnk Automated Tltller Machine: (ATM),
,.. every tn1nsaction is recorded in a database. Banks keep transaction data for many years so the
amount of data that h~IJ9. be stored ,c.ross the world is hu.se. The dita is also very important so
systems must be re:llable and secure so that criminals ar• pravantad from haclun.g tham.
Scroll box
+ '""'
Figure 2. 10.2 Scrolling through a document helps you to find the information you need
Control keys
The Control key usually has 'Ori' written on it. Pressing the Control
key at the same time as a letter key makes the computer carry o ut
some useful functions. A function that will be useful to you in this
unit is called Undo.
If yo u hold down Ori and type Z at the same ti m e, you will
undo the last thing yo u did on the computer. This is a very useful
function if you make any sort of mistake when you are word
processing: j ust type Ori + Z . The mistake will be undone as if it
never happened.
Printing
If you are told to print your work, you can use a Control command:
Ctrl + P This will print your document. W hen you print a
document, you can use
When you send the command print, a pop- up box will appear on custom print settings
your screen. You will have to answer a few questions in the box to print only the pages
before you print. The answers you give will depend on how the you need. Enter the
printers in your school are set up. Your teacher will give you the page numbers for the
information you need.
pages yo u want to
Do not print pages unless you need to or are told to by your print, separated by
teacher. It wastes resources and costs your school money. commas, e.g. 1,4,6.
[ oxfordsecondary.com/ju st-click-3e ~
. emi:l-il. ..................... . transmitting device. This can be the computer you use to send an
email or a mobile phone yo u use to send a text message.
receiving device. This can also be a computer or phone, but cou ld
also be a digital radio receiver, for example.
transmission medium, i.e. a way to send the message. This might
be along a cable or by a wireless connection.
Data transmission
When you listen to the radio, you are receivi ng data from a radio
station. Here is an example that describes what happens when data
transmission takes place:
Sound Sound
capture r-1\. Radio Radio
broadcast
device L./ transmitter receiver
device
- -~ --+
David types a Message Data Message Mary read
message converted transmission converted the message
Real-time communication
When you have a face-to-face conversation with a friend you
comm unicate in real time. In real -time conversations you can
comm unicate information q uickly and get an immediate reply.
Real-time communication does not have to be face-to-face.
Telephones allow us to comm unicate in real -time with people in
other locations. The telephone was invented in 1876 and was the
only way to carry o ut long distance real -time comm unication for
more than 100 years.
The Internet has allowed new methods of real-time communication
to be developed. Teleconferencing allows several people in
different locations to take part in a real -time conversation.
Video conferencing means that those taking part in a real-time
conversations can also see each other, as they would in a face-to-
face meeting. Web conferencing allows people to share software
in order to create documents, and make presentations to each other:
The invention of the telephone allowed people in distant locations
to talk to each other. The Internet has made it possible for people to
work together in real-time as if they were in the same room.
~---------~
----------
~------~
-----------
---------
Figure 3.2. 1 Emails can be accessed on a range of devices
Unit 3 Computers and communication
Asynchronous communication
Not all comm unication takes place in real time. For example, if
you send a letter to someone, it takes time to reach its destination
and you wait several days for a reply. There is a gap between each
step. Another name for real-time communication is synchronous
communication. Sending letters is an example of asynchronous
communication.
Email is one of the most common methods of communicating by
computer. An email is the computer eq uivalent of a letter. An email
is often a long and formal comm unication, especially when used for
a business purpose. Other forms of asynchronous communication
take place over the Internet:
• Instant messaging (JM) allows short, informal messages to be
sent between friends and work colleagues. IM is asynchrono us More than 15 million
and there can be long gaps between replies. Where two people SMS messages are
are online at the same time IM is often used in place of a sent every minute of
synchronous telephone conversation. every day worldwide.
• Emails and instant messages are addressed to individuals or groups That does not include
of people. Other types of computer communication are shared more messages sent using
widely Newsgroups, bulletin boards, and discussion forums apps Ii ke Face book
share messages among large groups of people. They are normally and WhatsApp.
used for lengthy and detailed conversations over a long period.
What is a network?
In modern offices and schools, computers are usually connected.
When two or more computers are connected, they make a
computer network.
Types of network
There are two main types of network:
• A Local area network {LAN) joins computers in a single building.
A LAN lets people in a single place work together.
A school network is an example of a LAN.
• A Wide area network {WAN) joins computers that are far apart.
A company with offices in many cities will use a WAN to let their
people work together. The Internet is an exam pie of a WAN.
There are two other types of network you might hear about:
A metropolitan area network is a kind of WAN, but it only
covers a limited area, usually a city. Metropolitan area networks are
designed to provide reliable Internet service to local companies and
organizations.
A Personal Area Network {PAN) is a network that is designed to
connect all the devices in use by an individual person. A PAN is
designed to allow an individual to work with all the devices they use
including tablets, smartphones, and wearable devices.
Connecting to a network
Figure 3.3.2 Network equipment
Wired connection is stored in special cabinets
A network cable is used to connect a socket in the computer to an
identical socket on the wall of a room.
C ~ T ,...... wock X
... 91)
• sawy
OUT1NAT10NS > C.ARl88EAN
PLACU
a.homos
lk,nnud,1
Jamaic.a
I
I Puerto Ri<o
VllWAll +
GUIDE
What is a website?
Web pages are kept together on a website, like pages in a book.
A website is owned by a person or organization. Governments,
newspapers and lV channels also own websites. Anyone can own a
website.
Every web page contains we blinks. A web/ink can be a word, a
picture, or a button. Clicking a weblink takes you to another
web page. Weblinks are what makes the WWW special. You can
follow links to find new information. This is called browsing.
Unit 3 Computers and communication
Email tutorial
Click here to make
a new email The tutorial in this lesson uses examples
of email systems. You may use different
software, but you should still be able to
follow the examples given here.
Before you begin, find o ut what your
::i -
1otl•hM, . ,,. '
.:l email address is. Yo ur teacher will be
-·
r:i~'lllh...
"t)c1,cdt.-. , o..,..., I
~_j ..... .
fff...,IJOU, tta
hlMMOU- h i
J able to tell you.
u .... .
~-
,,. • .,.10u. 110
.., .....
.l .... u ..... ......,,,101,.a
,......,.,lOU.
lhl 'r
You will send an email to another
""' ..........
.) .... o Jt'.t
~..·
f'tloH.#!'1201.l. kl.J
A window will open where you can type your email. Whatever
system you use, there will be space to type the email address to
which you are sending the email, a subject Iine and a place for the
contents of the email.
4. Type your partner's email address in the 'To' field.
Unit 3 Computers and communication
5. Type a suitable subject line such as I; typ• th• ,ubj,ct lin• h,ro · M,ssag• (... -=""=-=I.ID
= -== =
'Hello there' or 'My first email'.
6. In the body of the emai I type a
--~ M•><ag•
Calibri (Bod~
B I J;l
Insert Options
• 11
:= "' j:;: "'
• A" A·
format Text
i~ i ~
R,voew a, Q
There are easy-to-find tools in all email Figure 3.S.3 Sending an email
packages that allow you to do these
things. Once you have pressed either
Reply or Forward, you will see a new email window. You can type
new text, enter a new email address (if req uired) and press Send to
send it.
Plagiarism
Plagiarism means taking the credit for someone else's work . If
someone commits plagiarism, they don't j ust steal another person's
work - they also steal the credit for the work too. A plagiarist steals
work and then pretends the work is their own.
This is taken very seriously in schools, universities and colleges.
Students who commit plagiarism can be removed from their
courses. In the workplace, journalists have lost their jobs for If someone bullies
plagiarism. or frightens you on
the Internet, it is
Social responsibility called cyberbullying.
It is important for everyone to behave responsibly when using Cyberbullying is
computers - especially if they are using the Internet. Here are some wrong and can be very
good rules to follow: damaging. If you think
• Be polite and respectfu I to both friends and strangers. you are being bullied,
report it to an ad ult
• Respect differences in politics, culture, and religion.
that you trust, like a
• Do not read or distribute offensive text or pictu res.
teacher, parent, or
• Respect the privacy of others. other family member.
• Treat other people as you would like to be treated. Yo u can read more
about cyberbu llyi ng
If you see bad things happening online, then tell a teacher or
and how to stay safe
another ad ult. If somebody talks to you online in a way that you
on line in Unit 21 of this
find upsetting or unsuitable, stop the conversation. If you and
book.
others are responsible and careful, using computers can be
enjoyable and safe.
Intellectual property
The idea of intellectual property is that you own anything you
have created using your mind. Intellectual property applies to:
• written work
• images and artwork
• m usic
• plans and designs
• computer software.
Creative commons
If you want to include images, videos, or m usic in your work, you
should look first at content that has a creative commons license.
Yo u can use a creative commons site such as Wikimedia or add the
words 'creative commons' to your search.
Creative commons content is published with a license attached. You
will often find a citation or attribution is provided for you to use.
You can simply cut and paste (see lesson 7.3) th is into your work.
Figure 4.2.2 Creative commons sites will often show you the information you
should include in a citation
When you search the web, you will find many web pages that
provide an answer to your q uestions. Some pages provide
information you can trust. Others will contain information that is
biased, o ut of date, or inaccurate. This lesson will help you to find
reliable information.
Howard Lincoln
Science editor
* Follow Howard Lincoln
Mon 10Jun 2019
0@@
Figure 4.3. 1 A news article's author details can tell you more about how reliable
the source is
When was the article written?
Always try to establish the date the article was written. If you are
researching information on technology, an article written five years
ago could be o ut of date and therefore misleading.
Some articles may provide the date the article was last updated. For
example, a website giving Internet statistics can be updated every
time a statistic is updated. Check what was included in the last
update.
Manufacturing
A modern car factory is full of technology. Robots are used to
assemble cars. A car is moved automatically from one part of the
factory to another. At each stop, robots complete a part of the car. A report in 2017 said
Robots do work that used to be done by humans. In the future that 800 million jobs
many people will work with robots. worldwide will be
replaced by robots
Robots are used to manufacture many other goods. Yo ur computer
by 2030. Robots and
and TV will contain many components assembled by robots.
automation will change
Robots are used for simple repetitive jobs. Robots are also used to
the way we work and
do jobs that are dangerous for humans. Police forces use robots to
live o ur lives.
investigate packages that might contain explosives
Retail
Supermarkets and other large shops depend on computer
technology. At the supermarket checkout, goods are scanned using
a barcode reader. This creates a detailed receipt for the customer.
Information gathered at the checkout is used by the stores to create
special offers based on the shopping habits of individual customers.
The offers are used to encourage customers to return to the store.
Shops use the information read from barcodes to alert them when
goods start to run low. The computer will prod uce a report listing
goods that need to be re-ordered. Shop staff will use a barcode
reader to update the computer as they restock shelves in the shop.
Choose one of the areas described in this lesson. For the area
you chose, search the Internet to find:
• relevant photographs of computers and other technology
eq uipment
• one or two interesting facts about the use of computers in
that area.
In this lesson you will learn about the jobs in IT that have a strong
creative emphasis.
Web designer
A web designer has the job of creating the web pages that make
up the World Wide Web (web). A web designer works with:
• a wide range of media including text, images, video and sound
• data from spreadsheets and databases
• apps that add interactivity.
Database administrator
A database is a collection of related
data or information stored on a Figure 5.2.3 Specialist software is designed by educational
computer system. If a database is large technologists and can help you learn about a new subject or skill
and has very important information
stored on it, there might be a specialist whose job it is to look after
the data, make sure it is stored safely, and to help people find the
information that they need.
A database administrator may have the job of keeping the
information up to date and free of errors. Their job will include
making regular backups of the data so that it is not lost if there is a
hardware fail ure.
Programmer
A programmer is a person who writes computer programs.
Writing computer programs is sometimes called 'coding '. They
usually specialize in using one or two programming languages.
Programmers work on new software but also work to fix existing
software and keep it up to date.
Software engineer
The job of a software engineer is to plan the software that needs
to be created for an application. Software engineers must have
good programming skills even though they do not write programs
themselves. They make plans and designs for programmers to follow.
Systems analyst
The job of a systems analyst is to work with a business to find o ut
what information the business needs. The systems analyst advises
software engineers and others responsible for designing or buying
software. The systems analyst makes recommendations about what
software to buy or develop and how to make it work well.
Software tester
Software is tested thoroughly before it is used in the real world. It is
important to check that the software does what it is designed to do, is
easy to use and will not harm the computer
systems on which it is used .
Computer engineer
Computer engineers research, design,
develop, and test computer hardware systems
and components. Sometimes a computer
engineer will build new systems. At other
times they will build or modify components
to improve existing systems.
Network engineer
A network engineer designs and plans Figure 5.3.2 Computer engineers design, develop, and
networks for companies. Most companies improve computer hardware systems
depend on networks to allow their staff to do
their jobs and to keep in touch with suppliers
and customers. It is vitally important that
the network runs properly 24 hours a day
A network engineer plans, upgrades, and
maintains the network.
Systems administrator
A systems administrator looks after a network and all the services
that run on the network. They ensure users can access the software
and files they need. In a small organization like a school, the
computer technician may also act as systems administrator. The
day-to-day tasks involved in running the system are often given to a
systems operator.
Creating solutions
Although all problems are different, there are some common
strategies that can help in all problem situations:
• understand the problem
• investigate ways of solving the problem
• develop a solution
• reflect and review.
1 SOLUTION
I'
) CJ
~(\
Figure 6. 1.1 Solving a problem is like completing a puzzfe!
• buy chairs without going into town, for example from a local
shop
• manage without buying chairs, for example by borrowing some
instead.
Investigating a problem
There are several good ways to find sol utions to problems:
1. Remember times that you have faced problems like this before -
what sol utions worked?
2. Ask other people for advice, particularly people who have
experienced this problem themselves.
3. Do research to investigate the problem.
4. Make up a new and creative sol ution.
As well as finding o ut about sol utions that have worked for you and
for other people, it is also useful to know about attempts that failed.
Here is an example:
1. A boy's older brother left his exam revision until the day before
the exam.
2. He did not have enough time to do his revision.
3. He failed his exam.
That failed attempt is a very useful thing to know about. It tells the
boy that he might need to spend more than one day on revision. It
is well known that you can learn from your mistakes. You can learn
from other people's mistakes too.
You can also ask ad ults for advice. Remember that some people
have specialist knowledge. People who have had special training
and those who have had a lot of experience of life are good people
Unit 6 Introduction to problem-solving
to turn to for advice. If you have an illness that you are worried
about, a doctor has special training that will make their advice more
reliable. You will find people with expertise who will help you with
whatever problem you are trying to solve.
Research sources
..
~~ C
IC +
Search
M•i
Figure 6.2.2 Not all the information you find on the Internet is reliable
You can investigate problems yourself. You can use books, manuals,
and the Internet. Use the skills you learned in lesson 4.3 to make
good j udgments about the information you find.
You have learned about two ways to give yourself the best chance
of finding a sol ution:
1. Understand the problem. What do you really want? What
would success look like?
2. Investigate approaches to the problem. What methods have
worked for others? What methods have failed?
Minimize risks
Think of what might go wrong in your plan and take precautions You have promised to
to avoid unnecessary risks. For instance, in a science experiment, cook dinner for a big
if the students are working with flames the teacher may have a fire group of people. You
extinguisher on hand. have never cooked
for so many people
Keep trying before. Answer these
Many people give up if the sol ution does not work. But you should q uestions:
treat every failure as a chance to learn more about the problem. Why 1. What is your goal?
didn't your sol ution work? What can you try differently next time?
2. Give two different
ways that you could
find helpful ideas
about what to cook.
3. What preparations
do you need to
make before you
start cooking? List as
many as you can.
4. Explain one thing
that cou Id go wrong.
How can you avoid
it happening?
Draw a storyboard to
describe how yo u will
prepare dinner.
Figure 6.3. 1 Storyboarding lets you explore a problem with words and pictures
In this lesson you will learn about the importance of getting your
plans in the right order. You will also learn about the importance
of learning lessons as you solve problems, so you will be better
prepared when you face problems in the future.
In lesson 6.3 you learned how to use key tasks and storyboarding
techniq ues to write o ut the steps needed to solve a problem. One
thing you must be aware of when creating a plan is that the steps in
a sol ution must be carried o ut in the right order or sequence.
Sequence
The seq uence of actions means the order that they go in. Sometimes
the order of the action does not matter. For example, when you go
home in the evening, you might make a drink, eat some food, and
watch TV. It does not matter what order you do those things.
Sometimes actions depend on the results of previous actions. For
example, think of these three actions:
Figure 6.4.1 Sometimes the
sequence of actions affects the 1. Wake up.
outcome 2. Make breakfast.
3. Eat breakfast.
These actions m ust go in that exact sequence. No other seq uence
will do. You cannot make breakfast before you wake up and you
cannot eat breakfast before you make it.
Here are some actions that you might take when you fix a
broken plate. The actions are in the wrong order:
• work out how the pieces fit together
• leave the plate in a safe place for the glue to dry
• find the broken pieces
• glue the pieces together.
Put these actions in the right order. Even if you have never fixed
a broken plate, you should be able to work it o ut. Just think
about which actions depend on the results of previous actions.
Unit 6 Introduction to problem-solving
After you have solved the problem you should take some time to
reflect on your experience. Ask yourself:
• What have you learned from this experience?
• What approaches did you try that worked well?
• What approaches did you try that did not work so well?
• What would you do differently next time?
Taking time to think about what happened will help you next time
you face a problem. Sometimes it is helpful to keep a record of
what problems you faced, what you did and what the result was.
In science, for example, it is very important to keep good records.
Scientists share their experiences and experimental results so that
other scientists can learn from their findings.
Think of the last big piece of work that you did. Perhaps it was a
piece of schoolwork or a job you did at home.
Answer these q uestions:
1. What was the res ult of your work? Was it a success?
2. Explain one thing that you did which worked well and you
wou Id try again.
3. Explain one thing that did not work o ut so well.
4. What would you do differently if you were to do the work again?
In this lesson you will learn what word processing is and what
features word processing software contains.
Word pro<?e~sin~
......... J.n .t.~is..t,1_n it y9.u wi11 deyelor. What is word processing?
yqur wqrq processi n_g . Word processing is used to create documents using a computer.
A word processor is software used to make documents that are
skills..You will l~~rnb9~ t9
correct and well presented. Word processing is one of the most
creilte..u~ef.ul a.od attr~0;i.v~ popular ways that computers are used .
.d.oc.urnerits. Before word processing, all documents had to be written by hand
or typed using a typewriter. It is difficult to make changes and
corrections to a typed or handwritten document. With a word
processor, it is m uch easier to make changes and improvements to
documents. A word -processed document can be saved and printed
o ut as many times as you like.
A word -processed document can be sent by email to reach its
destination almost instantly. Handwritten and typed documents
m ust be posted in an envelope and can take days to arrive.
Other functions, such as mail merge, which helps you to prod uce
letters, and change tracking are also found in word processing
software. All the functions in a word processor serve one purpose -
they make it easier to produce professional- looking documents.
The word processor window
A word processor has many functions. It can look complicated
and daunting. This diagram shows you the main parts of a word
processor screen. The screens used for examples in this unit use
Microsoft Word for Office 365. If you are using a different word
processor, your screen may look slightly different. You should be
able to see the main parts of the screen shown in the diagram.
Tabs
Explore the Home and Insert tabs of your word processor. Find
the icons to:
• insert a picture
• insert a table
• change font colour
• add a bulleted list.
In this section you will learn how to enter text and carry out basic
formatting and editing.
Making mistakes
As you learn to use a word processor, or any other piece of
software, you will make mistakes. Sometimes you will intend to
make a small deletion and find you have accidentally removed a big
block of text.
HEADLINE
Lo<,m I- dab ,11 amet,consede1ur adi)lsclngell Se<i ~bar1is m
., nee quam ,,..,.
maximus,MaeceRaSYltae'IMlrraart1e,lntegapo:sanerosQuispuMoarraciliSis.lnbbndilsemsit
amel mnod maxlnlJ~ arc! 1'1111s daplllls Ju~~ ooc 11,i:1c1,~ 11am ~bh ot amBI '°"'
Dooec
a:rwalliseleifmdodit).viberutrumlgulac001tmdawtae.~nec6beroest.maximuset laoreet r.!t.
ultricasnec1ectus1,ta,nstlooidunt11Ulsl.,..et>a'lus.
Correcting errors
Figure 7.2.2 The Undo button
As you type a document you will want to make changes to the text.
You might want to correct an error. You may change your mind
about a word you have used in a sentence and want to change it for
a better word.
There are two keys on the keyboard that let you delete text:
[ oxfordsecondary.com/just-click-3e
When you are creating a document, you will often want to move
text. Sometimes you will want to move text within the document
you are creating. In this case you are most likely to use Cut and
Paste.
Sometimes you will want to use text from another document. In
this case you will probably use Copy and Paste. You will want to
leave the text in its original document and make a copy in a new
document.
You can find the menu icons under the Home tab in the Clipboard
group on the far left of the ribbon. The icons also appear in a menu
if you right-click your mouse.
The Cut, Copy, and Paste buttons can only be used if you have text
highlighted.
Command Keyboard shortcut Menu buttons
~
table, you m ust select
Copy Ctrl+C Copy it by clicking the Select
table icon in the top-
'=i
left corner.
CT±~
- Command Keyboard shortcut Menu buttons
Cut Ctrl + X ~ Cut
1111 HOME INSERT DESIGN PAGE LAYO
Copy Ctrl + C ~ Copy .. l{,(ut
TimesNewRo • 12 • ,; ,,;
Paste O ri + V ~ Paste P.su li@lcopy
., Form.II p,.nta, 8 1 II • • x x· £
Figure 7.3. 1 Select table (hpbci.ltd font
Clipboard • X
[ oxfordsecondary.com/just-click-3e
Serif Sans-serif
Calibri (Body) v 12 v A A Aa.., P,~
B J !l v,39- )( X {A v .sJ.., ,a ..,
Font
Identifying fonts
If you are working in a document and would like to know what font is
Font size is generally being used in a piece of text, place your cursor somewhere in the text
measured in points. you are investigating. The font tool bar changes to show the font used.
The size of normal text
In figure 7.4.2 the cursor is positioned in the heading. The tool bar
is usually 10, 11 or
tells you the typeface is Arial. The font size is 16. The highlighted 'B'
12 points. Headings are
icon below the typeface name shows the text is bold.
14 points or more.
Home Insert Design Layout References
rd r; Font r.
Early calculators
Mechanical calculators were develo
computers as we know them today.
computer scientists who came later.
Av These tools are used to set the typeface and font size.
Calibri (Body) V 11 VA
Dro p-down menus Iist all the fonts and font sizes available.
-
This set of buttons is used to apply special effects and colou r
/A V .R V A V
to text. Dro p-down menus allow you to set t ext colour o r to
highlight .a piece of text.
~
f./ JJ
.,
[b
Pmt
B 1 ~ •,ii;
A· fl • ,a • Aa•
X JC
A
"
s1y1.. Ed,hng D,cutt
The West indles wlll play the follOWfng sides In the gr stage of the World a,p
P.ibstan
1.
Type 11st Items on separ.ite lines.
2. The Amazon 2 3
,.._ __ 31
•- - lll- -
3. The Yangtze 3 •- - e-- 01- -
•- - c-- CJ- -
You make a numbered list in the same way as a b ullet list, but click a- - ,- -
o- - ii - -
the numbered list icon instead of the bullet list icon. As with all c. - - Ii - -
1. Type text, then select the text and click an icon to switch the Figure 7.5.2 Numbered fist menu
formatting on or off.
2. Click an icon to turn formatting on before you type. Click the icon
to turn formatting off again when you have finished.
Drop-down menus
You will see a small 'down' arrow to the right of the bullet list and
the numbered list icons. The arrow shows that there is a menu for
the icon. Clicking on the icon opens the menu.
The bullet list menu lets you choose different characters to use as
the list bullet.
The numbered list menu lets you choose different numbering styles
for lists. You can use letters instead of numbers for a list.
[ oxfordsecondary.com/just-click-3e )
DDDDDDDDDD . 2 . 1
• How to create a t able
DDDDDDDDDD This is how you can create a table using the school timetable as an
DDDDDDDDDD
DDDDDDDDDD example.
DDDDDDDDDD
DDDDDDDDDD 1. Decide how many rows and columns your table needs. Count the
DDDDDDDDDD rows and col umns in the timetable, remembering to include the
DDDDDDDDDD
headers.
!:ff! Insert Table...
2. Create a table with that many columns and rows:
lffl Qraw Table
"8 r T
a. click on the Insert tab at the top of the screen
!ja E15:cel Spreadsheet b. find the Table icon and click on it to open a drop-down menu
!:ff! Quick Iables > c. click on Insert Table.
Figure 7.6.3 Table menu You will now see a window like the one in figure 7.6.3.
3. Type the number of rows and the number of columns that you lnsen T1ble 7 X
want in your table.
Tabltllzt
4. Click OK. llumbtr of i;o1ur1n1: 7
Numbtr of [OWS: fl
A blank table of the correct size will be created on your page. Autofit bt ha"1or
b. headers for the col umns, showing the periods of the day 0 Rtmt 1aber d1.,• n11on, tor MW toblu
c. content in each cell showing the lessons or other activities for OtC C.nul
Now you can format the text as col umns. Select the whole block of
text you have j ust typed. Do not include the headline. Select all the
text below the headline.
Figure 7.7.1 Newspaper
4. Select the Page Layout tab.
in columnar format
5. Select the Columns icon from the ribbon.
6. Select the number of columns you want.
7. Try different column layouts until you find the one you think
looks best. When you are happy, save your work .
• •
PtOt kh,. ,_ 1J1.Wh ""-lft9l
Ut!>!>Utl\N lttlil CUUIIUIJ&., HHU IIN.HH ytJOll'JHI, HIMJ NI ~IKJOt,
Classmales declined l o lhan 700 places, and our teachers showed
'il sr unung It's 1ncreas1ng us litns of plasllc 1n I/le
- - ~ - - - ~ - - ~ rymuc:h now, and ocean slaMng polar
rs VetY, very fun • bee~ and so oo I cned
• II [fill Ill
year ago, ltus was
imaginable Back
n. Thunberg was a
II
through alt the moV18S
My classmates ware
concerned when they
~ r of c:oluan11
Wdftan.cl~O
,... Wl«hc
J
_,, ,._
llMlffftt!n
mlully lnlroverted,
hlly 00111 nobody,
klng a1 6am 10
re for schOol end
watched the fim, blJt
when rt stopped, they
started thinking about
~
other things I couldn't
I 4..17m Lam, back home al dO that Those ptetums
m 'Nothing reaDy were stuck in my head '
.s hajlpemng 11 my She has come to
; she recalls ·1 have accept this as part of
./[QUal<OltMt"lwtdttl been lhat girl 1n who she IS - and made
baek who doesn'I Ha mo11va11ng force
~,o: SdteltdtCJII g r c anything I ltooughl Instead or a source of
Coi"=:J ,......
ouldn~ make a paralysmg depress10n,
erence because I which rt once was
"==::::::;:==--...........,........,~...,....--- ~100small " />J about the age of
by her, lace lo lace, She was never quite eigh~ when she first
Her ~ E I ! . Ilka lhe other kids, Her learned about clmate
//tW1al.el, (school stnke molhef, MAl!mD change, she was
for climate) banner has fDlmln.1soneof shocked that adults did
been translalecl snto Sweden's most nol aooear lo be takino
Figure 7.7.2 Columnar layout
Safety features
You are creating more files as your course progresses and you learn
new skills. Perhaps you are using IT to create schoolwork in other
subjects too. There are features in yo ur software applications that
are designed to keep your files safe:
Automatic save: In Word, this feature is called A uto- recover'.
Auto-recover is on and saves your document every ten minutes by
defau It. This means you should always have a recent version of your
file available if you lose your main file.
Backup: There is a 'Backup' option in most word processor
applications. If you switch it on, two copies of your work are saved.
One copy is for you to work on, and the other is a safe copy in
case anything goes w rong with the original. In Word, you find the
backup option in the File/ Options/ Advanced menu.
Password protection: You can password protect any Word file.
Once you have set a password for a file it m ust be entered each
time the file is opened.
These safety features are useful if your work is very important, o r
secret.
( oxfordsecondary.com/just-click-3e
Online Pictures
:> B<"9111>9"
,..
Mi·MWN
Figure 7.8.3 Online Pictures browser
[ oxfordsecon dary.com/just-click-3e
Rotating an image
When you click on an image you will see a
symbol above the picture, in the middle. The
symbol is a curved arrow. If you click on and hold
that symbol and move your mouse, the picture
will rotate. Rotating an image slightly can make a
Figure 7.9.1 Resize an image page look more fun.
Page layout
When you place an image in a page of text you can
tell the computer how you want the words and picture
to fit together. The way that pictures and words are
shown on a page is called layout.
Figure 7.9.2 Rotate an image
When you click an image to select it, you will see a box appear to
the top right of the picture. The box contains blue lines and a black
semi -circle. Clicking this icon opens the Layout menu. The Layout
lft J Llyout Options X
menu has two sections: In-line with text and Text wrapping. In Line with Text
When an image is in -line with text, it is placed on its own line in the
document. Text wrapping allows text to flow around the image. You
W"rth Text Wrapping
can see both effects in figure 7.9.4.
There is only one icon in the In- line with text section of the menu.
In -line layout always looks the same. There are six different icons
in the 'With text wrapping menu'. You can choose different ways of n
wrapping text around an image.
oxfordsecondary.com/just-click-3e
Open Worksheet 7.9. The file contains text about big cats. Find
two pictures to illustrate the text. Insert them into a document
and use the skills you have learned in this lesson to resize and
position the pictures. Save your finished document in your own
folder.
In this lesson you wi ll learn how to use tools to help you review
and improve your documents.
Spell checker
A spell checker reports any spelling errors that you make. It works in
three ways:
l. It automatically corrects common errors without asking you. For
example, if you type 'teh' instead of 'the', the spell checker will
correct your spel ling.
2. It marks spelling errors by underlining them in a document as you
type.
3. You can run a complete spell check when you finish your
document. The spell checker will give you a list of all the errors.
In figure 7.10.1 you will see two words are underlined in red and two
in bl ue. In Word, a red line shows a spelling error A blue line shows
a grammar error The blue line under the word 'check' tells you that
there is no full stop.
To correct an error, you place your
When you have finished wdritins and editing your cursor over an underlined word
document, you should give it a final check This is called and right-click. A box pops up to
proof reading. One off the most important checks is a spell tell you what the problem is with
check. Your word processor will normally chek your the word . It will also offer you some
spelling as you type and underline words with spelling
suggestions for the correct word.
mistakes in red
Yo u can see in the image that when
Figure 7.10. 1 Spell check error marks the mis-spelled word 'chek' is right-
clicked, spell checker gives three
suggestions: check, cheek, and chef.
When you have finished wdrlting and editing your
Click the word you want, and the document. you should give it a final check This Is called
change is made. proof read Ing. One off the most Important checks Is a spell
check. Your word processor will normally chdc your
spelling as you type and 5p,nmg > <"«k
Thesaurus mistakes in red >
I ,. fflffll,, b ff
The Find and replace icons are in the editing section of the ribbon Figure 7.10.3 The Thesaurus
in the Home tab.
1. Highlight the word you want to replace.
2. Click Replace.
3. A box pops up with the word you have chosen in the Find line.
4. Fill in the word you want to replace the chosen word with.
5. Click on 'Find nexf then 'Replace' if you want to replace the word .
~ ~ ~ ~ ~ ~
letters?
Q.
Start Mail Select Edrt Highlight Address Greetms
Merge.., Recipients .., cip1ent list Merge Fields Block I ,n.a.
When you click OK you are asked to save the file. Select a location
to save your file to and enter a filename. Use the filename 'mail_
merge_demo_datafile' so that you can find the file easily in the next
lesson.
You have created a simple data file. A data file is made up of records
and fields.
A record is all the information about one person or thing, so in the
data file you j ust created there were at least ten records, one for
each person.
Field is the name of a single item of information stored in a data
file. You used two fields in the data file you j ust created: first name
and last name.
In this lesson you will learn how to create a primary mail- merge
file and merge it with a data file.
Figure 7.12.1 Selecting the data source Use the navigation pane to select the file you saved
in the last tutorial.
You will now tell the computer where you want the fields you
added to yo ur data file to appear in the document. Move the cursor
to the place in the invitation where you want your friend's name to
appear.
To insert the name fields into your document:
6. Click on the down arrow below Insert Merge Field.
7. Click on First Name.
8. Press the spacebar.
9. Use the same method to insert the last names.
What is inserted in your document will look Click here
something like this: «First_Name». That is the
name of the field in your data source.
10. To complete your invitation, add a - 7Rules·
greeting that you would like to put [_, :,):: ~ M•tchflolds ,:j ;) •nt
Address GIIXlllng lnSll(I V.c>fge I J 1, I
before the name, such as 'Dear' or 'Hi'. " Slock Uno Flllld • ~ Chodc for Enors
iv.ii,,& " Title
Save your file.
FirstNome
Last_Nome
Your letter will now look something Insert Mc,il Merg~ f,cld
Cornp• ny_N..010
like this:
Addu,ss_Lne_l
Diversity Day
1:i:::.. !:-=ot,...c.et::aa"',1~~.. 0"~~ -·P::1:....1!
Nia'..;..,..",..*""""""~ ••:J•-=r•D"J'..:•
,....~~MM<llll'l.t.1'1;'\,+,~Ql'IClt • ..,,
~~ --~.... •02..~ f , ' " ' • • 0 e 1 1 ~
11!1)1',0•fl'IN<• 111'4t••...,ot,\
• - I • ~ ~
In this lesson you will use DTP software to create a flyer. You may
have seen flyers for concerts, events, or shop sales. The example
project in this unit is a flyer for a barbecue. You can either:
• follow the example given here, but make your own choices about
the images, text and colour scheme to use
• or you can choose a different template and create a flyer for an
event of your choice.
-···
uo .......
...........
illn119..,.....
Using templates
Y•AA7 "1..
Templates are readymade document structures, which have colours,
·--·
WU,l . . . . . . . . i
C - a d ~ U.UH \~t
-~-
pl.&a>d rnilih
styles, and content already set up for you to use. You will start by
opening a template. It will have words and pictures already in place.
=':".=::..'!
You can then change the words, the image, the colour scheme and
other features.
Figure 8.2. 1 A flyer is a small
Find and open a template
leaflet advertising a business or
an event Your teacher will tell you what software to use for your project.
n ~.'~-
template to create a flyer for a barbecue.
3. Select the template category 'Flyers'. A selection
of templates for flyers open. There are many
different types, including flyers for a range of
events.
4. Select the template called 'BBQ'. If you want to
try something different, or if your software does
not include this template, then choose another.
Figure 8.2.2 The templates menu
.
. ... . .. . ... .
Changing the template
to suit your project
A template is a flexible design.
You can make changes to the All Event
template to suit your project.
For example, there will be © Home > Flyers > All Event
[l
design stays the same, but the
colours change.
The colour schemes have been
designed by a graphic artist, so
they will look good together Ascent
Il
l BBQ Blackboard
Floral
Grove
Island
Garnet
Harbor
Ivy
Changing text
...... .....
~
.......
tMpu1fM4L
There are five text boxes in the BBQ flyer:
....,_,.._
~ -;
.........
. . . . , .. "'l'
• one box has large text giving the name of the event
• there is space to enter a date and time for the event
C•u.t.--1HJ Ut fflt
Sa.pa,,uJ.ad.t.u
a~le!
• there is a box to the right of the page for you to enter a description.
1. Click in each of these boxes and add the text you wrote in the
Figure 8.3. 1 Its easy to make activity in lesson 8.2.
changes to your template
You can delete any text box:
2. Click inside a text box to select it. An o utline will appear around
it. Press the Delete or Backspace key to delete the box.
You can use the squares in the corner of the text box to resize the
box. Click and hold the box to drag and move it. You can use the
circle at the top of the text box to rotate it.
3. Add a new text box to the flyer:
• select the 'Insert' tab
• choose the icon for 'Draw text box'
• drag the mouse pointer across the screen to draw a new text box
on the screen .
. ... . .. . ... .
4. When you are happy with the appearance of t he flyer save your
work .
• Complete yo ur flyer,
adding suitable text 1(Q tl? BON APPETU 11:100
and images to your
template. Don't
forget to save the
completed file .
• Find a template for a
menu. Create a menu
for the barbecue
adding pictures and
descriptions for a few of your favourite barbecue dishes.
In t his lesson you w ill learn w hat presentatio n software is and
how it can be used to present info rmatio n to an aud ience.
What is a presentation?
People are often asked to give presentations in school or as part of
their job. A computer application called presentation software has
been designed to help you give a presentation.
Presentation software helps you to:
• organize the ideas you want to comm unicate to an audience
• present your ideas clearly
• use different media to communicate your ideas (for example,
photographs and video).
Filo ~ lnson O.s,gn Transitions Animotions Slido Show Review vitw Help p St,rm d P
Clpbo1rd
Slide• El·
Slidts
1.e Fonl
"" I\,
hn19Bph
:r,
,.,Kf
Along the top of the screen is the tool bar or ribbon. You will be
familiar with using tabs and menu icons from yo ur work in word
processing and DTP applications. The various tools you will use to
make a presentation are grouped together in tabs. Each tab has a
different set of tools.
The main area of the screen shows the slide that you are working on.
Each slide is based on a template. You used templates in DTP Templates
help you to lay o ut your text and other content neatly on a slide.
To the left of the screen is an area called the slide sorter. You will
see a list of the slides you add to your presentation in this area. You
can use the slide sorter to move from slide to slide or to change the
order of your slides.
::>
will appear in the main area.
I
- - - - -·- - - - ' O .. 0 0
Slide sorter
As you add slides to your presentation you will see each new slide
appear in the slide sorter bar to the left of your screen. The slide
you are editing in the main part of the screen is highlighted with a
red box.
You can use the slide sorter to navigate between your slides. Click
on any slide in the sorter and it appears in the main screen so that
you can edit it. You can also use the sorter to change the order of
your slides. Click and hold your mouse on a slide and you can drag
it to a new position in your presentation.
Adding images
In lesson 8.5 we created a slide about the computer keyboard. The
placeholder on the left-hand side of the page was left empty. We
will now add an image of a keyboard to the placeholder.
In the centre of the placeholder there are six faint icons. These icons
can be used to add different types of image to a placeholder. One
of the icons is labelled Online Pictures.
You have used this method of inserting pictures into documents
before, in lesson 7.8. If you have an image that you want to use saved
on your computer, use the Pictures icon instead of Online Pictures.
You can use the Pictures and Online Pictures icons in the
PowerPoint menu ribbon to insert images anywhere on your page.
You will find them in the Images section on the Insert tab.
Themes
When you have finished the slides that you need for your
presentation yo u can apply a theme. A theme is a design for your
page. Themes combine backgro und graphics, a colour scheme and
fonts. The colours and images in a theme have been designed to
work well together. Themes have been made by a graphic designer
so that your presentations look professional.
Themes
Your slideshow will start from the title page. The slideshow fills the
whole screen. All menus are hidden until the slid eshow is over.
3. Click your left mouse button to move to the next slide.
4. To end your slideshow, press the escape (Esc) key.
Before you show your presentation to others you can add two more
features that will make your presentation look more professional
and make it easier to watch.
When you run your presentation, you click your mouse to show
the next slide. The screen changes very suddenly from one screen
to the next. Animations and transitions can make the change less
sudden. They can make the presentation easier to watch.
Transitions
Transitions are used to control how one screen changes to another.
For example, instead of a sudden change, you can select a transition
where one screen fades o ut before the next screen fades gently into
view. This kind of effect is sometimes used in films and TV, when
one scene in a movie changes to another.
Adding transitions
1. Select t he slide you want to add a transition to in the slide sorter.
You can select several slides at once by holding down the Control
(Ctrl) key and clicking the slides you want.
2. Click on the Transitions tab.
3. Add one of the transitions shown in the Transitions to this slide
section of the ribbon.
-
<10Soundi !NoSoul'ld) - Mv• nctSW.
D ,.... 0 0untion:: 02.00 ~ lid On ~ Click There are simple transitions
Motpll Wipe •
lii:1-"l>f'l)ITo AI O Mtn OOdl0.00 :
PYffltw l 111uno
such as fade and wipe.
·o
2 ~
The computer keyboard
There are some more
complicated transitions
that are designed to grab
The i..,,txw~ lun Input - ·
the attention of people
+ As you pres\ keys. The cha.rac.ten. watching your presentation.
.- . ...... . . - - - .. - . you type ~ ar on screen.
Th• ~ , d hM l•tt•n. numbttr'I
~ ~ : ! : • • . . . ¥Kf ch.lt'-'clc-rs . Complicated transitions
..
.; •
_...,.,'11 7·" ;- ;• .. • .
I •
'
•
--
• • •
Tho ~ d In the pkture, Is
COIied • QWERTY ~ rd. are useful on important
P'!-.•'11;-~-- .... : .
slides. They can signal
that the slide is important,
for example. However,
complicated transitions
Figure 8.7.1 Adding transitions can be harder to view and
lose thei r impact if they are
used on every slide.
. ... . .. . ... .
Adding animation
Transitions add effects when a new slide is shown on screen.
Animations are like transitions, but are used to add effects to items
of text or images on a slide.
1. Click in a text box or on an image.
2. Click the Animations tab.
3. Select an option from the Animations section on the ribbon.
None
0 0 - 00.;o
bullet point) at a time. Every time (='1),1,y, 00.00
.
-
2. What are the two types of list yo u 2. What are transitions used for in
can use in a word processor? Which presentation software?
wo uld you choose to list the five most 3. A picture you use in a presentation
popular word -processing programs slide has a creative commons licence.
and why? Explain what that means.
3. What two fi les are needed to do a
mail merge using a word processor?
What kind of information does each file ~ach .of. th~ foll.ovyi,:ig l;ri~.ar)sw~r. ..........
contain?
... que~t.iqns q:~rresp.onos .t o Q.n.e ~~-·t~e· . ····· .
Unit 8: Desktop publishing and . units you ha\:~ ~tud.i.ed this_yE;pr. Th~~.e . ·····
presentations q.t.Jes.tions r~quire ·a Jonger a.n~wer · · ··
...
1. How are templates useful in desktop f~o.m Y.OU. . ......•....
publishing software? Give an example. . ········ ······· ········ ······ ....
... have
' . learned in this
. ........ ,,.
un.it bot.h pn y,our .o.wn ,c;1n.d .i.n. a,g_r.9up... . ............
Afte.r
---- \,
----
1. Turn off your computer and unplug the monitor from the power.
If you are using a laptop, unplug it.
2. Wipe the screen with a soft cloth moistened with water.
3. Wipe the case of your computer with a moist cloth to remove
dust. Be careful to clean around any fan vents.
Data cables
There are many types of data cable. The two you will see most ofte
are network cables and USB cables .
USB is the most commonly used cable in modern computers. USB
Figure 9. 1.4 VGA is used for
stands for Universal Serial Bus. USB is used to connect almost many business computers
every type of peripheral except for computer screens. A USB mouse,
printer or keyboard can safely be connected and disconnected
without turning off the computer.
USB cables can be used to connect screens but are limited in
bandwidth so other cables tend to be used instead. The most
popular cables for monitors are Video Graphics Array {VGA),
Digital Visual Interface {DVI) and High-Definition Multimedia
Interface {HDMI}.
Installing software
There will be times when you need to install software on your
computer. You might want to install new graphics software to
process your photographs, or perhaps install a new word processor.
Before installing software you m ust find o ut if the software will run
on your computer.
Software compatibility
To find out if software will function on your computer you must
compare the system requirements of the software with the
system specification of your computer.
A system specification is a description of the minimum components
in your computer. For example, the system specification will tell you
how m uch memory your computer has.
System req uirements are a description of the components a piece
of software needs to run on a computer.
In Windows 10,
If the system specification of your computer matches the system
selecting System and
specification of a piece of software, we say the software is
clicking the About
compatible. You should check the system req uirements against the
menu gives you
components of your computer before installing it. This is for two
summary information
reasons:
about your computer's
system specification. 1. Running the software may affect the performance of your
Another way to get computer if the system requirements are too demanding.
system specification 2. You may waste money buying software that will not run on your
information is to search computer.
for 'System information'
in the search box on System requirements
the taskbar along the System req uirements are published by the software developer.
bottom of the screen. There are three places you can look for the specifications:
1. Printed documentation issued with the software.
2. The official website for the software.
3. The website of the company selling the software.
System specification
To find yo ur system specification:
1. Right-click on the Start button or Windows icon in the bottom
left of your screen.
2. Click on the settings icon.
3. In the menu that follows, click System.
4. Find About at the bottom of the menu.
5. Information about your computer will appear in the window on
the right. Figure 9.2. 1 The settings icon
6. If you need information on other parts of your computer system,
find and click the appropriate menu link. For example, Display
gives you information about your screen settings and Storage
gives information about your storage drives.
D X
Q Home About
Device specifications
V110·1SAST
0.-,ice nome TOP l M&
Process0< AMD A9-';4\0 AAD£0N RS 5 COMPUTE
Ql Tablet mode C0'5 2C • 3G 2.90 GJ<z
Jnsull<d RAM 00 GB (74 l GB u<.101<
DeY,ceJO • 1!9749-f4A144 t MAS-82(EA5
Product ID 01 325-80000-()()()00-AACf.M
,51 PIOJf<U/19 10 this PC
System type 6'-b t oP<'ltoog ,ys,..,,, •64 - . , proc....,.
Pen and touch No ~n °' tOuth mput 11 ,..,.,1 ble for th:s
ploy
Ren.me this PC
©About
Windows specifications
softwc;t,re
1.n this u_nit_you l(v'ill l~q.rn .... The processor is at the heart of any computer system. It takes data
from the input devices and processes it before sending the results
how the main p~rts of a. . to an o utput device. The processor carries o ut instructions held in
p_rocesso.r wor.~_togetber . .. .. computer software. Another name for the processor is the Central
.to p.roces~ .dati3. an.d . Processing Unit (CPU).
CPU
Control
ALU
unit
Buses
Registers
A B C D E
Buses
The parts of a CPU are joined together by fast connections called
buses. The buses also join the CPU to the computer's main memory.
Motherboard
The computer's CPU is mounted in the centre of a larger component
called the motherboard. The motherboard contains all the parts
needed to allow the CPU to work. It contains the computer's main
memory. It also contains sockets known as ports that allow the CPU
to connect to input and output devices.
Fetch next
instruction
/ from memory
-----
Return the
result to Decode the
instruction
memory
Execute
J
Fetch any
(carry out) data which is
the instruction needed
----~'11111---~-----
Figure 10. 1.3 The fetch-execute-decode cycle Draw a diagram of
the machine cycle
explaining in your own
Processing speed
words what happens at
The speed of the processor is measured in hertz (Hz). A hertz is each step in the cycle.
one cycle per second. Modern processor speeds are measured in
gigahertz. A gigahertz is one billion cycles per second. Personal Search the web for a
computer CPUs operate at around 3 gigahertz - three billion labelled picture of a
cycles per second. A faster clock speed means more instructions are motherboard. Where
carried o ut per second. is the CPU positioned?
Make a list of any ports
A core is a processor in the CPU. Instead of having one processor, you can see. Can you
a CPU will have two, four, or more processors ru nning side by side. see any memory?
M ultiple cores make a processor run faster.
In this lesson you will learn how the computer stores informat ion.
You will learn how to pick the right type of storage for your needs.
Primary storage
Primary storage is memory connected directly to the CPU. It is
memory used by the computer for its own operations. You cannot
save your work to primary storage. There are several types of
primary storage:
Secondary storage
Secondary storage is not directly connected to the CPU, so it takes
longer for the processor to access data and instructions held there.
Programs and data must be moved to RAM before the processor
can access them .
Secondary storage:
• has m uch greater capacity than primary storage
• is not volatile - data is not lost when you switch the computer off
• is sometimes portable.
Storage drives
There are two types of storage drive: a hard disk drive (HDD) and
a solid state drive (SSD).
Portable storage
An external device is portable and can be moved from one
computer to another. You can buy external HDD and SSD devices.
A flash memory drive is a small version of an SSD that is cheap
and very portable.
In this lesson you will learn about the many different types of
input device and what they are for.
Biometrics
Some features of your body are unique, for example your
fingerprint. The tiny marks of the iris of your eye and the precise
tone of your voice are other examples. These unique identifiers are
called biometrics.
Some modern input devices can read biometric data. They are
used for security checks. For example, you might have to press your
finger to a fingerprint detector to open a door.
Audio input
A microphone can capture sound and convert it into digital data.
The sound can be stored and edited as an audio file. Most m usic is
recorded and played digitally.
Modern computer systems can be programmed to recognize
speech. Voice recognition allows you to use audio input to give Figure 10.3.3 Fingerprint
scanner
commands to a computer or to dictate text to a word processor.
O utput devices turn digital data into a form that is useful to humans.
O utput devices typically display the results of a computer's work so
that we can see it, b ut there are other types of o utput device that
D
=
= Litl
have different functions.
B :,:::..--:-.:..--=
a -·- Screens and projectors
11
a The screen or monitor of your computer o utputs text and image.
Modern screens are flat and lightweight. This makes modern
computers more portable. Screens prod uce high-q uality images.
We can read text and watch video on devices as small as a
smartphone.
Figure 10.4.1 Interactive The two main types of screen used are light-emitting diode
w hiteboard {LED) and liquid crystal display {LCD). Both are fl at and light, and
produce high-q uality o utput. LED screens use less electricity and are
not as easily damaged as LCD screens.
A projectortakes the image from a computer and projects it so
it can be seen by a large group of people. Teachers use projectors
to give multimedia presentations to whole classes. Sometimes the
image is projected on to an interactive whiteboard, which acts
like a very large touchscreen.
Virtual reality
Virtual reality (VR) is a computer-created world that surrounds
the viewer. The virtual world is interactive - you can reach o ut and
touch things. A VR world is viewed through a VR headset, which
means all you see is the virtual world you are in. VR is mostly used
for games but can also be used to train people to complete difficult
or dangerous tasks, such as landing a plane.
In this lesson you w ill learn about system software.
System software
System software is software that controls the way your computer
works. It has four main tasks. It:
1. Makes sure that all the pieces of computer hardware
comm unicate with each other.
2. Takes care of the computer's memory and storage.
3. Loads application software packages.
4. Saves your work.
The software which takes care of all these system functions is called
the operating system (OS).
The OS starts up as soon as you turn on the computer, and keeps
running all the ti me you are using it. A lot of the ti me you do not
even notice it. For example, the OS makes sure that when you type
on the keyboard, the letters you type are sent to the processor:
1/ [I;J
/ 1'\
Keyboo, d ri/i}'J :s?.
Printer
Figure 10.5.1 Operating system Figure 10.5.2 User interfaces
Apps
Apps are small applications, usually written for use on tablet
computers or smartphones. They are application software, but are
usually written for a very limited task, like a calculator. Apps are
intended to be used on mobile devices and usually linked to the
Internet.
Software suites
A software suite is a set of software applications made by the
same supplier. Suites usually contain business applications for word
processing, spreadsheets, presentation design, and databases.
The advantage of a suite of software is that each separate piece of
software will behave in a similar way. The menus will be similar.
Some of the functions will be the same throughout, for example the
way that text is emphasized. The similarity makes it easier to learn
and use applications. Suites also make it easy to share data between
different applications.
Examples of software suites are Microsoft Office, Apple iWork and
Google Docs.
Latency is the measure of how fast a network is. l atency is the time
it takes a set of data to travel to its destination and back. Bandwidth
is one factor in deciding latency, but there are many more, like the
condition of the hardware and cables being used, and whether or
not you are connecting to the network via a wireless connection.
Communication methods
Data can be transmitted using a number of methods:
• Simplex communication sends signals in one direction only,
for example a public announcement (PA system , through which
you can receive information, but cannot send messages).
• Duplex communication sends signals in both directions (for
example a computer connected to the Internet that can receive
and send information).
• Ha/f-dup/ex comm unications work in both directions, but only
one at a time. An example is a walkie-tal kie, where only one
person can talk at any time.
• Point-to-point communication connects two fixed points,
and other users cannot hear the signal. An example is a phone
conversation.
• Broadcast comm unication is sent o ut from a central point, and
anyone who can pick up the signal can hear it. An example is a
radio station, which can be heard by anyone with a rad io.
Cable
There are two types of cable used to carry data in networks. Metal
cables are used to carry signals as electronic pulses. Fibre-optic
cables are also used in networks. Fibre-optic cables carry data
signals as pulses of light.
Copper cable
The cables used in networks are made from copper. Copper is
inexpensive and easy to install. Copper has a low resistance to
electricity, and is used for electrical cabling in your house.
Copper cables are vulnerable to electrical interference. They are
only used over relatively short distances. The copper cables used
in local area networks {LAN) are never used over distances of
more than 100 metres. Beyond 100 metres, the signal suffers from
interference and data transmission is unreliable.
There are two types of copper cable used in networks: twisted pair
and coaxial. Both cables can carry a two-way duplex signal.
The cables that carry data around a LAN are mostly twisted pair.
They are hidden away in plastic or metal casing. Each cable ends in
a network socket. The sockets allow computers and other devices
•
to be connected to the network. Data points are the sockets on the
wall you plug a computer into. The socket is called an RJ 45. The
cable you see connecting a computer to a wall socket is the same
twisted pair cable used throughout the network.
Coaxial cable
In a coaxial cable, the signals are carried by an inner cond uctor
Figure 11.2.2 RJ 45 connector
and an outer insulating layer which wraps round it. The signal is
carried in the space between the two layers. Coaxial cable is strong,
but more expensive than twisted pair cable. It is rarely used in
modern LANs since it has been replaced by fibre-optic cable for
most uses.
Fibre-optic cable
Fibre-optic cable is made of long clear strands of plastic wire
covered with a reflective interior coating. Light signals pass along
the inside of the fibre by bouncing off the reflective inside coating.
Optical fibres can be used for telecommunication and computer
networks because they are flexible and can be b undled as
cables. Fibre -optic cable is especially good for long-distance
communications because light does not lose energy as it passes
down the fibre, and it is not affected by electrical interference.
Fibre-optic cable is used to extend LANs over longer distances than
copper can.
+ +
People who live in areas where there are no cables in place can
connect to the Internet through a satellite connection Satellite
signals are sent as microwaves. Microwaves do not pass through
solid objects as easily as radio waves, but because the satellite is in
space, that is not a problem. However, bad weather and rain can
affect the connection.
Bluetooth
8/uetooth is a protocol used to let wireless devices communicate
with nearby computers, or with each other. For instance, Bl uetooth
will let you use a hands-free mobile headset or share files between
mobile phones. Like Wi -Fi, Bluetooth has a limited range.
In this lesson you will learn about some ways that computer
networks are used in communications.
Sending messages
Point-to-point communication systems allow us to send messages to
an individual or small group of people. Point-to-point messaging is
different from broadcasting, which goes out to anyone who is listening.
Short Messaging Service {SMS) carries short messages between
mobile phone users. Because a single text message is only 160
characters long, people often use 'text speak', which includes
abbreviations.
Instant messaging{IM) is a way of sending typed messages using
the Internet. Instant messages are usually read as soon as they
are sent. They are replied to q uickly. IM sometimes takes place
Figure 11.4.1 SMS is commonly
in chatrooms. Chatrooms are usually moderated, which means
called texting
threatening or unsuitable language is banned.
Email is used for longer, more formal comm unication than SMS
and IM. There is usually a delay between an email being sent and a
reply being received. Large documents and images can be attached
to emails. Business emails must be polite and professional. Emails
should be typed carefully, with high standards of spelling and grammar.
Business emails are often filed so there is a record of a communication.
Real-time communication
In real-time commu nication, people interact as if they are having a
Text messaging is
face-to-face conversation.
the most widely
used form of data Vo/P stands for'voice over Internet Protocol'. VoIP allows phone
comm unication. In conversations over the Internet, but needs high bandwidth to work
2018 it was estimated well. Vol P is cheaper than traditional phone systems.
that 16 million SMS
Video conferencing is like a phone conversation, but the people
messages were
taking part can see as well as hear each other. Webcams built
sent every minute
into computers and smartphones let us videoconference. Some
worldwide. Texting is
organizations set up special rooms with high-q uality video and
also the most effective
audio equipment for videoconferencing.
comm unication:
99 per cent of texts
are opened and read,
compared with only
25 per cent of emails .
communication and networks
Figure 11.4.2 A web conference lets people in distant locations hold meetings as
if they were in the same room together
A global conversation
Technology lets you take part in global conversations with a wide
range of people all over the world.
Weblogs {biogs) are personal web pages that you update regularly
like a diary. Biogs can be read by friends and by strangers. Readers
can add comments to a blog.
Newsgroups and forums share messages among a wide group of
people. They are used for more detailed conversations than SMS
and IM. Typically, discussion is about a particu lar topic, like science,
m usic or sport.
Use the Internet to search for at least three applications that can
be used for video conferencing. Compare the advantages and
disadvantages of each application in a list. Which one do you
think is best?
In t his lesson you w ill learn w hat protoco ls are and how t hey are
used to allow commu nicatio n over networks.
Network protocols
A network protocol is a set of rules that says how:
• data must be organized
• signals must be sent
• errors are detected and fixed.
Examples of protocols
There isn't a single network protocol. Different protocols are used
for different purposes.
Ethernet is the protocol that says how computers are linked
together in local area networks (LAN). Ethernet tells us what cables
and sockets can be used for LANs. Yo u learned about network
cables and sockets in lesson 3.3.
If network users send data at the same time, a data collision can
occur. Data is lost in a collision. Ethernet protocols make sure that
Figure 11.5.1 Ethernet socket data collisions are detected and data is recovered so that it gets
and cable safely to its destination.
communication and networks
TCP/IP is the protocol that says how data sent over the Internet will
get safely to its destination. The TCP/IP protocol has two parts:
1. Transmission Control Protocol {TCP): controls the way that
data is broken into small blocks (called packets) to be sent over
the Internet. Sending messages in small packets is more reliable
and faster than sending them as a large block of data.
2. Internet Protocol {IP} is a method of giving all devices on the
Internet an address so that messages are delivered to the correct
destination.
• simple Mail Transfer Protocol (SMTP) and POP3, which are used
for sending emails
• Wi -Fi, the protocol that provides wireless connection to a
network
• File Transfer Protocol (FTP), used to transfer large files between
computers
• Internet Relay Chat, the protocol that allows instant messaging to
take place.
Make a list of the things you have done in the last week using a
computer connected to a network. For example, have you sent
an email? For each activity, write the network protocol(s) that
you used.
In t his lesson you w ill learn w hat digital dat a is and w hy a
computer must use digital data in all its processes.
····· ·· Digital da~a ~nd
binary numbers What is digital data?
t:,.s_you f)aye st uqied t~i_s W hen we comm unicate, we use letters, numbers and punctuation.
We put characters together to make words and sentences. We
c9urs~_YOL! ":"fill -~_ave_..
communicate in other ways too. We create images, still and moving.
IE!arri~c;l aqq~t the term We create sounds - music, for example, helps us to communicate
_'qi_gita,1'. You may ha,v~ \JS\=q feelings.
it yqurself in ~0:iviti_es, . .. .. A computer uses a simpler language. A computer can only
ef")ts cJ.rn:J c;:J~ss .
. assignm_ comm unicate using numeric digits. That is where the term digital
comes from. In fact , computers only use two digits in their
di_~Cl.JS~i.Qf"\S. .l.r:i t.hi? L,Jnit you
language: zero (0) and one (1). The computer can combine digits to
. wil,I l~arn whi3-t d_i_gjta,I .d~ta,
make words, but it can only ever use O and 1 in those words.
rneans..You will learr:i why .
Data that is only made up of two digits is called digital data.
a.~om.pu.ter. pro_cfsso.c .r:rn,J$t.
.u.se d.ig(tal di3-ta,. and how Why computers use digital data
A microprocessor is made up of millions of tiny electronic switches.
. .i.t .manages..to stoce every.
A switch in a microprocessor is like any other type of switch. A switch
. p.iece of data as a.str.irig.of can be off or on. The off positions of the switches in a microprocessor
.. zeros.and on.es.. .............. . are shown as Os while the on positions are shown as 1s.
0- ~
- 0 - ~
- 0 - 0- ~
- 0 - 0-
-OFF
0
--'
,
ON
1
--'
,
ON
1
-
OFF
0
--'
,
ON
1
-
OFF
0
oxfordsecondary.com/just-click-3e
Decimal
The decimal number system uses 10 digits (Oto 9). The val ue of
each col umn in a decimal number is 10 times greater than the
previous col umn. Another name for decimal is Base 10.
2 5 4 3
Binary
The binary number system uses two digits (O and 1). The val ue
of each col umn in a binary number is two times greater than the
previous col umn. Another name for binary is Base 2.
1 1 0 1
The binary number used in the previous section used the binary
number 1101 . Here is an easy way to convert the number to
decimal:
1. Draw a table like the one in figure 12.2.2. It must have enough
col umns to hold the binary number you want to convert.
2. In the first row of the table write the val ue of each col umn. Start
with a 1 in the right-hand col umn then multiply by 2 as you
move from right to left.
8 4 2 1
oxfordsecondary.com/just-click-3e
3. Subtract the val ue of the column you have put a 1 in from the
number you are converting:
20 -16 = 4
• research or study
• using a short q uotation from a work
• writing a review of a piece of work
• reporting current affairs and news
Fair use allows you to use short q uotes or extracts from other
people's work in your school assignments without asking for
permission. If copyrighted work is used it should be acknowledged
with a citation. Fair use does not apply to video, film or broadcast
material such as TV and radio programs.
What copyright means to you
1
You can legally use someone else s content in yo ur own work
if you have:
Figure 13. 1. 1 Behaving
• purchased the content with a license that allows you to use it
responsibly online will
• been given permission by the owner of the work to use it. encourage others to behave
well toward you.
Many content owners on the Internet use a license called Creative
Commons. A license is published with content so that you don't
have to ask the owner for permission. Sites you can use include
Wikimedia Commons, Pixabay and Unsplash.
&
---·--~----
~
~ --- •
-·
w.. ..... i : - 1 1. . . &,gljl,,
WU:IPUDtA
Wikimedia Commons
.. on~..., ....... · - . , _ , . ,_ _
-
--
---- .
--
---
,_
Figure 13. 1.2 There are websites that help you to find Create Commons content
Copyright theft
Copyright theft is a crime. Criminals make copies of music, games
and films. They sell the copies on the Internet. This is called
software piracy. The person who created the work does not get
money from the copies. Downloading unofficial files that have been
pirated is illegal.
Local laws
Countries have become concerned at the levels of crime that take
place on the Internet. Local laws exist in most co untries to govern
behaviour on the Internet. The laws cover activities such as online
fraud, the publication of illegal and obscene material and copyright
theft. Laws may exist that limit what people can say about others
online. You need to be aware of laws that apply in your country.
[ oxfordsecondary.com/just-click-3e
You have had opportunities to practise the basic web search skills
you learned in lesson 3.4 while completing activities in this book. In
this lesson you will learn some advanced web search skills.
Advanced search
Most search engines have advanced tools you can use to improve
your web searching. In this lesson you will learn how Google's
advanced search works.
In the bottom right- hand corner of the main Google search page
are three links: Terms, Privacy and Settings.
1. Click Settings - a pop- up men u appears.
2. Select Advanced search from the men u.
The Google '.l\dvanced search' men u comes up on screen. The
advanced search box is in two parts. At the top there is a section
called 'Find pages with ...' Below that there is a section called 'Then
narrow your resu Its by. ..'
C i hnps;//www.google.com/advanced_search?hl=en-GB&fg=1
Go gle
Do the search yourself.
Advanced Search Add the information
to the search boxes
one at a time, and after
Find pages with completing each box
aII lhese words click the advanced
search button at the
lhis exact word or phrase
bottom of the page.
any of lhese words· Compare the res ults
none of lhese words.
you get at each step.
Choose a major news story you have heard about in the past
week. Use Google's advanced search tools to compare how the
story has been reported in your own country and in another
country.
In t his lesson you w ill learn how to judge w hether content you
find o n the web is reliable.
If you carry o ut the checks in this section, you will be able to test
Figure 13.3.1 Finding reliable whether information is reliable.
information is important if you
want to use the web effectively Who owns the site?
Can you trust the person or organization who has published the
information? Use sites that have been established for some time
and which are associated with organizations that have a record for
reliability and honesty.
Examples will include established newspapers and news sites,
government agencies, universities and large charities. Commercial
organizations can provide good information, but the information
they provide could be biased toward their own products.
Find out who owns the site and what its purpose is.
citation
Figure 13.4. 1 Citations make it clear what work is yours and what belongs to
someone else
Writing a citation
There are four pieces of information you should include in a citation:
1. The name of the person who created the work: the author.
2. The year the work was created .
3. The title of the work you are q uoting from or the name of a
picture you use.
4. The URL of the site you are taking the work from. If the work you
are using does not come from the Internet, use the title of the
book or newspaper you have taken the work from instead.
There will be times when you won't find some of the information
you need, but you should always use what you can find.
A citation for an article on a website will look like this:
Devon Campbell, 2020, 70 rules of netiquette you should know,
www.dailynewsforstudents.org
Or this:
Campbell, D. (2020) 10 rules of netiquette you should know.
Retrieved from www.dailynewsforstudents.org on July 28, 2019
Is stealing intellectual
Sometimes the owner of a piece of work will not provide a citation property through
for you to use. In that case you will have to write your own. Creative plagiarism as bad
Commons images often provide a citation for yo u to use. as stealing physical
property from a
Referencing person? How is it
Sometimes you will be asked to use a recognized method such as different?
Harvard referencing, to give citations. Two other methods used are:
Create a poster with the title 'Did you know...?' Search the web
to find a fascinating or fun fact about computers. Add a short
quote about the fact to your poster. Find an image to illustrate
your q uote. Add citations to your quote and image.
In t his lesson you w ill learn about t he role of t he IT department in
an o rganizatio n.
···· · ··· ·1T i.n the workplace
the impac.tJT.has an
. pe.o.ple ln. the.w.orkp.lace.
IT affe.cts..ever.yone, no.t Jus.t Data security
System
System support Service delivery
deve lopment
"-._./
Figure 14.1.1 The IT department performs three important roles
System development
~
System
development
System design
X
Syste m
develop ment
Testing
"-._./
Figure 14. 1.2 IT systems must change to meet new demands
Systems support
System support
Network
ad ministration
X
System
administration
Application
support
'--..._/ '--..._/
Figure 14.1.3 The job of the systems support team is to make sure the
organization's existing IT system works and is always available
New jobs
As old jobs have been lost because of technology, other jobs have
been created. Many jobs have been created in IT departments to
develop and maintain computer systems. Many people are employed
in new industries like robotics and automation, where they build,
install and maintain robots and automated production lines.
New jobs have been created in the mobile phone industry. Web
designers, game programmers and others work in media industries
such as television and m usic.
Retraining
Yo u have seen that computers in schools will help young people to
develop computer skills. You will need to keep your skills up to date
throughout your working life. As old jobs disappear or change, there
is a need for new skills. Online courses can help you to develop
technology skills. At other times you will learn on the job, adapting
to new ways of working that involve technology.
Telecommuting
In many parts of the world, people must travel long distances to
their jobs. Roads become very crowded. Traffic causes poll ution
and fuel is expensive. Travelling to work is called comm uting. An
alternative is telecommuting. This means that people work from
home, using computer comm unications.
Talk to a parent or
another adult you know
about their work and
the role of IT in it. What
do they use IT for and
how important is it? Do
they expect to change
jobs more or less often
in the future? How
often do they need to
learn new IT skills?
Share your findings with
your class or a small
group of classmates.
Figure 14.2.3 Telecommuting provides a way of working when there
are disasters or bad weather that stop people from being able to travel
In this lesson you will learn what the components of multimedia
content are. You will learn what multimedia is used for.
Multimedia
pr:esentatio.ll!:' ... What is multimedia authoring?
In this..unit y.o.u wlll leam .... M ultimedia content:
what .multimediaconter.it. • uses two or more digital media, for example images, video and
is and.what it is.used.foe . sound
• is graphical - information is shown in pictures not paragraphs
.You will cr.eate.a pie.c.e of..
• is often interactive. The user can influence how the content is
r:n ultj medla conten.t ...... shown.
Multimedia resources
M ultimedia systems consist of at least two, and perhaps all, of the
following types of media:
Text
Text is used alongside other media like images and video to give
information. A multimedia user will not read large blocks of text as
they do in a newspaper. Text is used to emphasize important points
or describe other media.
Common file formats include TXT DOC, DOCX, RTF and PDF.
Images
Images like photographs, drawings or diagrams give information
visually. The m ultimedia author can create images using tools like a
camera, graphics software or a spreadsheet, which can be used for
graphs and charts.
Common file formats include JPEG, PNG, TIFF and BMP
Audio
Audio files can be used to provide background music or
commentary. Audio can be added as a separate track to provide
commentary on a still image, or it can be part of a video clip you
include in your work.
Common file formats include MP3, WAV and WMA.
Video
Video presents moving pictures and combines images and audio
that can make multimedia engaging and interesting for the user.
Unit 15 Multimedia presentations
Other forms of moving image like GIF animation files are also used
to add movement to presentations. Animations are much smaller
than video files.
Common file formats include: AVI, WMV, MOV, MP4, FLV and GIF.
A multimedia team
Creating multimedia needs a wider range of tools than almost
any other creative activity that uses computers and other digital
technology. Professional m ultimedia prod uction is seldom carried
o ut by one person. It is an activity that brings together a wide range
of skills in a team.
A professional multimedia prod uction team can include:
• writers and editors
• graphic designers and artists
• video and sound engineers along with photographers
• programmers and testers - especially if interactivity is involved
• project managers.
Multimedia hardware
Digital camera
Cameras capture still images. All cameras work in the same way.
Light enters the device through a lens and is stored so that a
moment in time is captured . What has changed over the years is the
way that the image is captured. Early cameras captured images on
glass plates or plastic strips coated with special chemicals.
Modern digital cameras capture images as digital data. Digital
images can be processed using a computer and included in
documents or m ultimedia presentations.
Video camera
A video camera is like a digital still camera that captures moving
images. A video camera works by taking many photographs, one
after the other. Each image is called a frame. When played back
q uickly, the individual frames blend to form a lifelike moving image.
Most digital cameras can take video clips.
.
.
I
,.__
--
_ ·.
. "
\.·-:-· J . •, . '
Figure 15.2.1 Digital camera Figure 15.2.2 Video camera
Unit 15 Multimedia presentations
Audio recorder
An audio recorder uses a microphone to capture background
sounds, interviews and instructions. Audio fi les are stored digitally.
An audio recorder captures data in a similar way to a video recorder.
It captures slices of sounds at regular intervals. The slices are called
samples. Played back quickly the sound appears continuo us. Most
video cameras have so und recorders built in.
,..,, __ ,.,
8. Select Edit then Text to add text to your title screen. You can
select different styles and positions for the text using the options
in this screen.
- C •
....
--
T~s of computer ti ? n 11r..-,.._. d~"- ...
m •
..w Simple
Types of computer
. ~ -0-- Cl<lf I'
Eli CV<,!
When you add any resource to your library it must be in a format that
Microsoft Photos recognizes. MP4 and WMV are good formats to use.
When you use split or trim a new video clip is saved to your project
library. Your original video file is left in its original form.
"- - 0 'I(
. ... ..
Figure 15.4.1 Trimming a video file
...
-
Unit 15 Multimedia presentations
- Cl X
1. Click on the Custom audio button in the menu across the top of
the Photos window. A menu will open.
2. Add your files to the custom audio area on the right of the screen.
You can drag the files or click the Add files button.
Each audio file you add has a bl ue bar on the timeline at the
bottom of the screen. Slide each audio clip around on the timeline
until it is in the location you want. Preview your presentation to
make sure you have everything in the right place.
In t his lesson you w ill work in a small team to create a
multi media project. The lesson has some guidelines t hat are
important for your project to be a success.
1. Planning
Before you start any work make sure you have a plan. The q uestions
you need to answer before you start working on your project are:
1. What jobs will you research?
2. How will you present your work?
3. What information will you collect about each job?
4. Will you have a team leader? Who will it be?
5. How will you divide the work? Who will do what?
Write all your decisions down. You might need to check them later.
Write a project plan. A plan lists every piece of work that you need
to do. Put a name next to each item with the date the work is to be
completed.
2. Execution
This stage is where the work takes place As each piece of work
on your plan is completed, note this down. This can be the Job Meet your team to
of your team leader, if you have one. Once team members have review how well it
researched and collected the information on jobs, present it to worked on the project.
your teacher. How well do you think
you did as a team
member? Make notes
on things you did well.
What will you try to
do better in your next
project?
in_p_ut_)_I_9oc_e_s•_ _:-_o_ut_~uf
Figure 16. 1.1 The input-process-output model
Flowcharts
A flowchart is a method used to show an algorithm. A flowchart
uses boxes of various shapes to show inputs, processes and o utputs.
The sequence of events is shown by arrows that connect the boxes.
Flowcharts are used to:
• help when you are designing a new process
• document or describe a process so that another person can
understand it
. ..
• investigate a process if you want to make changes or
improvements
• analyse a proced ure and work o ut what the logical stages are.
A flowchart makes it easy for you to see how the parts of your
solution fit together. It is a good way to describe your ideas to
other people.
Variables
Whatever algorithm method you use, you will need to use
variables in your solution. A variable is a name for the data items
that you need to input, process or o utput in your algorithm.
It is important that you use meaningful names that remind you of
the purpose of the variable. Examples might be Age, FirstName or
Cost. Using meaningful names is a good idea because it makes it
easier:
• to re use the variable names when you write your program
• to remember how the program works
• for other people to understand the algorithm when they read it.
What is a flowchart?
A seq uence of actions can be represented by a diagram called
a flowchart. A flowchart consists of a series of boxes joined by
arrows.
1. The shape of the box tells you the type of action to be
carried out.
2. The words inside the box tell you the exact action to be
carried out.
3. The arrows that join the boxes tell you the order in which the
actions m ust be carried o ut.
Flowcharts typically start at the top of the page, and the arrows
point downwards. Occasionally they are drawn from left to right.
Flowchart symbols
Symbol Name Used for
c ) Termi nator Shows the start and end of the algori thm.
D Process box
The text inside the box explains what
process is to be carried out
I I
Used to show what data is input (e.g. typed
Input/output box in) o r output (e.g. to screen). The fi rst word
1
in the box must be either 'input' o r 'output •
5. An o utput box shows that the program will display the value of
the variable Pay.
6. The final box is a terminator with the word Stop in it.
® Output Pay
Assigning values
Three variables are used in this flowchart: they are called Hours,
© Stop
PayRate and Pay. In 16.1 you learned that values are assigned to Figure 16.2. 1 Example flowchart
variables by being input or by being calculated.
• The val ues of the variables Hours and PayRate are input.
• The val ue of the variable Pay is calculated.
The statement that calculates the variable Pay looks like this:
Pay = Hours* PayRate
This statement uses the arithmetic operator*, which means
'm ultiply'. The statement has this structure:
• first comes the name of the variable (Pay)
• then comes an equals sign = (this stands for assigning a val ue)
• after the eq uals sign comes a statement telling you what value is
to be assigned to the variable (Hours* PayRate).
All statements assigning a calculated val ue to a variable are shown
this way.
Connector
In most flowcharts, all events lead to a single terminator at the
bottom of the chart . Where there is a decision box in your flowchart
the seq uence of your algorithm splits in two possible directions. The
END two paths m ust join again at some point Where the arrows come
back together a small circle is used called a connector.
Figure 16.3.2 Connector
Here is a security proced ure for checking that all the people
entering a factory have a valid security pass:
• Ask to see the pass.
START • If the person has a valid pass, let them enter.
• If the person does not have a valid pass, turn them away.
Check security
pass
Using yes/no decisions
The decision boxes in a flowchart m ust use simple yes or no
decisions. To show more complex decisions you must break
the decision down into a series of simple decisions.
For example, think about the process for making a cup of
NO coffee. When you make someone a cu p of coffee, some of
your actions depend on their preferences:
Do not allow
Allow to enter
to enter What do you want in your coffee?
• Nothing?
• Milk only?
• Sugar only?
END • Milk and sugar?
No No Ask if wont
milk
No Yes
Yes No
Yes Yes
NO
Add milk
Logical tests
All conditional statements depend on logical tests. A logical test is
one that has the answer yes or no, or true or false.
'How old are you?' is not a logical test, because it can have many
different answers.
'Are you under 20?' is a logical test, because it has the answer yes or no.
In the previous lesson you turned a waiter's q uestion, 'Would you
like everything with your chicken sandwich?' into three separate
logical tests: add salad (yes or no); add mayonnaise (yes or no); add
chilli sauce (yes or no).
Conditional statements
Planning a computer program is no different to planning sol utions
to everyday problems. A program has inputs, processes and
o utputs like any other problem. Decisions in a computer program
are written in a more formal way. They are written as conditional
statements.
Start
0 Input
Exam Mark.
®
NO
® Output 'Student
has passed"
© Output 'Student
has not passed'
®
® Stop
Relational operators
The logical test in the decision box says:
'ExamMark > 49?'
This means 'Is the exam mark greater than 49?'
> is a relational operator. The next table shows the list of relational
operators you will find useful.
• Input age.
• If age is over 12, then o utput 'You may buy War Machine'.
• Otherwise, o utput 'You may not buy War Machine'.
In this lesson you will learn how to use pseudocode to describe
algorithms.
Output a value
In a flowchart, a val ue is o utput using figure 16.5.2. The val ue of the
variable 'Pay' will be printed or displayed for the user.
Output Pay
In pseudocode, the following command may be used:
output Pay Figure 16.5.2 Output Pay box
Sequence of commands
In a flowchart, the sequence of commands is shown using arrows.
In pseudocode the sequence is shown by the order in which the
lines are written. Start at the first line and read down the page:
read Hours
read PayRate
Pay ~ Hours* PayRate
print Pay
The word 'end if' marks the end of the conditional statement.
In this lesson you will learn what a spreadsheet is and what it is
used for.
Using
spre~dsheets A spreadsheet is a piece of software designed to help you work with
n umbers. You can enter text and numbers into a spreadsheet in the
In this uriit; you vyill lec).rr) .....
same way you can enter them into a word processor. What makes
what cJ..spr~adshr;:_et . a spreadsheet usefu l for working with n umbers is that you can also
is and .YJha,t it is w.s~d. enter form ulae. Formulae are used to do calcu lations automatically.
for. You \i'l(iJl.le.am how A spreadsheet is laid o ut as a grid of col umns and rows. A
)abe.ls., n.urnbecs and spreadsheet is a bit like a sheet of squared paper that you use to set
o ut your maths work. Using a spreadsheet is better than using paper
. formulae .are.c.o.mbjned
because it does the calculations for you.
in a.spre.adsheet.to ere.ate
. us.eful ap.pJications. for.. . . .... Who uses spreadsheets?
Jear.ning an.dwork. You Spreadsheets are used by:
w.i.11 also.learn how.to..use • scientists, who process data from their experiments to help make
new discoveries
a.spreadsheet to s.o.lve
• business people and accountants, who process financial data to
. a problems that. inv.o.1)./e
make their b usinesses successful
.calculatiori. .. ·········· · ····· • engineers, who need to make accurate calculations to ensure
their designs work efficiently and are safe.
Spreadsheet software
There are many good spreadsheet applications. They all look slightly
different, b ut they all work in very similar ways. Some examples are:
• Microsoft Excel
• Open O ffice Cale
• Apple N umber
• Google sheets.
Yo u can follow this unit no matter which software is installed on the
computers at your school. Yo ur teacher will advise you if there are
any major differences in the way the spreadsheet you use in your
school works.
Al
B
·~ C
iJ Beaconbury School
D E F
This is the formula bar; it
shows the contents of the
This is cell A 1 . This Schoo l selected cells
is the cell which is
currently selected 3 teacher boys girls
4 Mrs Adair 13 17
5 Miss Mulle n 15 23 Columns ore
6 Mr Tarrant 20 19 labelled with letters
7 Mr Fulma in 19 16
8 Mr Gregory 12 19
9 M iss Spall 15 22
Rows ore 10 M rs Chever 18 14
numbered 11 Mr Holde n 17 21
12
oxfordsecondary.com/just-click-3e
Editing data
Values and labels
In lesson 17.1 you learned how to enter and edit the contents of
any cell in a spreadsheet.
You can type either words or numbers into a cell:
• N umbers in spreadsheets are called values. You can carry out
calculations with val ues. You will find o ut how in lesson 17.3.
• Words are called labels. You cannot do calculations with labels.
The purpose of a label is to explain the meaning of the val ues.
Justification
When you type data into a spreadsheet it can be positioned on the
left, on the right or in the centre of a cell. This positioning of data in
a cell is called justification.
When you type data into a cell:
• values are right-justified (the numbers appear on the right of the
cell, and any blank space is on the left)
• labels are shown left-j ustified (the text appears on the left of the
cell, and any blank space is on the right).
The reason for j ustifying text and val ues in this way is that it makes
them easier to read. Look at the example in 17.2 2. The values in
the left col umn are left-j ustified. The val ues in the right col umn are
right-j ustified. The values on the right are easier to read because the
units, tens and hundreds columns are lined up with each other:
Font
--
~ V A V
r.
everything you have selected in the cell.
Figure 17.2.3 Format cell menu
To change the format of a cell, use the Font menu
in the Home tab on the ribbon. The Font tab is
like the Font menu in your word -processing software, but it usually
has fewer options. To make the contents of a cell bold:
1. Click a cell to select it.
2. Click the Bold menu button in the Font section of the Home tab.
You can use the same method to change the colour, size or font
of text.
[ oxfordsecondary.com/just-click-3e
Enter a formula
How many pupils are in Mrs Adair's class? To work this o ut you
m ust add together the number of boys in cell (4 and the number
of girls in cell D4. You could perform the addition yourself and type
the sum into cell E4.
If you complete the calculation yourself, you will have to do it
again every time the number of pupils in col umns C or D changes.
When using a spreadsheet, you can use a form ula to create the
calculation.
• A formula does the calculation for us automatically.
• If a value changes in col umn C or col umn D the form ula updates
the sum immediately.
I
1
A
E4
B
Beaconbury School
• (
I C
J;, =C4+o4
o o/:ri
,-------,
The formula
2
3 teacher boys girls
4 Mrs Adair 13 1~
5 MISS Mullen 15 23 The result
6 Mr Tarrant 20 19
The formula takes the val ue in cell (4 and adds the value in D4. The
sum would be placed in the cell where you typed the form ula .
In this example, you used the pl us sign to add two numbers
together. Yo u can also enter formulae to add, subtract, m ultiply or
divide val ues. The table shows you what signs to use for addition,
subtraction, m ultiplication and division.
boys girls
13 17 30
15
?n
23L....iil This dot is the
1q -
fill handle.
If you select cell E4, you will see a small sq uare in the bottom right
Open the file you
corner of the cell. This is called the fill handle.
saved in lesson 17.2.
1. Click on the cell E4. Complete the steps in
2. Move the cell pointer over the fill handle. Yo u will see the pointer this lesson. Check that
turn into a cross when you are in the right place. your formula is correct
3. Hold down the mouse button and drag the mouse down to by manually calculating
cell El 1. a few rows and checking
the answer your form ula
4. Let go of the mouse button.
produces. Save your fi le.
The form ula from cell E4 is copied into all the cells you selected. Yo u will use it again in
lesson 17.4.
Completing the worksheet
Finally, add a label for the new col umn you have made.
5. Select cell E3.
6. Enter the label 'all pupils' and make sure the text is bold.
Every spreadsheet has bu ilt - in fu nctio ns to help w it h calcu latio ns.
In t his lesson you w ill learn how to use f unctio ns.
Functions
You learned in lesson 17.3 how to write form ulae using simple
mathematical symbols like+ and - . If you have a more complicated
mathematical problem to solve you can use functions.
A function is a ready-made formula that you can use to do a
mathematical calculation without having to write formulae yo urself.
An example is the function AVERAGE. A set of numbers is input into
the AVERAG E function and the average of the numbers is o utput.
More functions
There are other useful functions shown in figure 17.4.1.
The four functions in the table all work in the same way as SUM.
Look at the completed spreadsheet in figure 17.4.2. The functions
in the table can be used to complete the spreadsheet. Use them to
calculate the: Open the file you
saved in lesson 17.3.
• number of classes in the school Complete the steps
• size of the smallest class (use MIN) in this lesson. Check
• size of the largest class ( use MAX) that your functions are
• average class size (use AVERAG E). working correctly.
Try changing some
A B C D E of the val ues in the
1 lseaco~bury School spreadsheet. You will
2 see that the values in
3 teacher boys girls all pupils
al I the formula and
4 Mrs Adair 13 17 30
5 Miss Mullen 15 23 38
function cells change
6 Mr Tarrant 20 19 39 automatically. This
7 Mr Fulmain 19 16 35 is one of the most
8 Mr Gregory 12 19 31 useful features of a
9 Miss Spall 15 22 37
spreadsheet.
10 Mrs Chever 18 14 32
11 Mr Holden 17 21 38 Once you have set
12
up the spreadsheet,
13 TOTAL PUPILS 280
14 NUMBER OF ClASSES 8
it will recalculate all
15 SM ALLEST ClASS SIZE 30 the answers for you
16 lARGEST ClASS SIZE 39 whenever you change
17 AVERAGE ClASS SIZE 35 the values. Save
•o
your file.
Figure 17.4.2 Completed spreadsheet
In t his lesson you w ill learn how to build a new spreadsheet.
You w ill learn some new formatting skills and make you r own
decisio ns o n how to use t hem.
A B C D E
1 ITraffic Suive:t! by AP
2
3 Day Cars Taxis Buses Trucks
4 Monday 20 7 2 5
5 Tuesday 21 12 1 8
6 Wednesday 13 10 2 7
7 Thursday 45 23 2 15
8 Friday 30 9 2 11
9
enough to hold the data you want to show: Figure 17.5.4 Traffic survey project spreadsheet
1. Move your cursor on to the col umn heading at the top of your
spreadsheet. That is the row that contains the col umn letters.
2. Position the cursor on the line that separates two col umns.
3. Click and hold your mouse.
4. You can now drag the line - moving it changes the width of the
left- hand col umn.
In t his lesson you w ill learn how to fo rmat values to show
percentages and numbers w it h a decimal po int .
So far in this unit you have only used integer numbers in your
spreadsheets. A spreadsheet can be formatted to display other types
of numbers, like percentages.
To learn how, you will use the traffic survey spreadsheet that
you created in lesson 17.5. Yo u will add an extra row to your
spreadsheet to show the percentage of cars, taxis, buses and trucks
that were recorded in the survey. The finished result should look
something Iike the spreadsheet in figure 17 .6.1.
A B C D E F ..TI
1 Traffic Survey: by AP
2
3 Oo Cor• Taxi• Bu.• • Truclcs All tro c
4 Monday 20 5 34
21 12 8 42
Cell B9:
13 10 2 7 32 Cell F9:
Number of cars
45 23 2 15 85 Total traffic
30 9
~ ~ - ~2~ - ~
11+-_......;;5;.;.
2 ~---~
129 61 9 46 245
Percentage of traffic
which is cars 41' 19%
·"
11 percentage 25"
12
We know that 129 of the 245 vehicles that passed the school were
cars. It is better to say 53 per cent of the vehicles that passed the
school were cars. You calculate the percentage by dividing the total
number of cars by the total number of vehicles. That is B9/F9. This
number can be formatted and shown as a percentage.
Calculating percentages
1. Select cell A 11 .
2. Enter a suitable label (for example, 'Percentage').
3. Select cell Bll .
4. Enter the form ula: =B9/F9
The result is now shown in the cell as a percentage, something like Kc ..., O/_o
/C ' +-eo
00 -+oo
O
53% or 52.6%.
Number Ii
Other number formats
Figure 17.6.2 Number menu
There are other useful formats you can use in the Number format
menu.
Sometimes a decimal or a percentage shows too many decimal
places. To red uce the number of decimal places, click on this button General ... '
on the toolbar. ~ 3 No specific format
N umber
If your spreadsheet contains large numbers, you may want to use 12
commas to make the numbers more readable. Clicking the button
with a comma changes a value like 172020 to 172,020.
• [0@ Currency
When you perform division, you can get results that have a lot of
~J
Accounting
decimal places. Yo u can set the number of decimal places you want
to show by using the buttons with left/ right arrows.
There are many other formats that allow you to format cells to show: El Short Date
You can see the full range of formats by clicking the down arrow
%
you see in the Number menu. To apply a number or text format, Fraction
select the range of cells the format will apply to then click the
½
format you want. Figure 17.6.3 Number format
menu
Pie chart
A pie chart shows how a total is divided up among different
categories. It makes sense to use a pie chart to show how the total
traffic is divided among buses, cars, taxis and trucks. Here is the data
that you will use to make the pie chart.
r A B C
1 Data for creating graphs
2
3 1) Traffic Survey: type of vehicle
4
5 Car• U9
6 Taxis 61 Cell range B5:C8
7 Bus•s gr-- This is the data
8 Trucks 46 for t he pie chart
q
Yo u will find the data you need to create the other example charts
in this lesson in Worksheet 17.7.
• cars
• T~is
• Bus~s
• Trucks
9
10 2) Traffic surv•y: daily traffic
11
12 Mondoy 34
13 Tu•sday 42
1. Using the data above, select the range of cells titled Traffic survey:
daily traffic in the example spreadsheet {812:C16).
2. Use the same method as before to create a graph, this time
selecting the column graph option.
3. Add the title 'Daily traffic'.
4. Find and use the command to hide the legend - you do not need
it in th is graph as it uses only one colour
17.7 Graphs and charts (continued)
Your finished col umn chart should look something like this:
Daily traffic
90 ~ - - - - - - - - - - - - - - - - - - - - -
80 +---------------
70 +---------------
60 - - - - - - - - - - - - - - -
50 - - - - - - - - - - - - - - -
40 - - - - - -
30
20
10
0
M onday Tuesday W ednesday Thursday Friday
Line graph
A line graph is used to show data that changes gradually over time.
In this example, you will show the growth of a plant. A pupil grew
two plants from seeds. One plant was grown in full light and one
in dim light. The student measured the plant every week. The data
looks like this:
The 'legend' of a graph
A ~I___s_ _ _ _c_ _ _o_ ~-~
is the key which tells 17
you what the different 18 3) Plant growth: height of plants
19
colours stand for.
20 date full light dim light
21 19th Jan 1.2 1.1
22 26th Jan 1.8 1.5
23 2nd Feb 2.9 2.1
24 9th Feb 4.2
25
26
16th Feb
23rd Feb
7.7
11.0
~ 5.4 ~
Cell range B20: D27
This is the data for
27 2nd March 13.5 6.6 this line graph
28
29
30 !height fs given in cm !
Fig ure 17. 7.5 Data for line graph
• Select the range of cells titled Plant growth: height of plants in the
example spreadsheet (B20:D27).
• Use the same method as before to create a graph, this time
selecting the line graph option.
• Add a suitable title.
Your line graph should look something like this:
Plant growth
16 ~ - - - - - - - - - - - - - - - - - - - -
14 +---------------------
12 +-------------------::,~ - - -
10 - 1 - - - - - - - - - - - - - - - - - - - ,,;c-- - - - -
8 + - - - - - - - - - - - - ------ - - - - - -
6 - 1 - - - - - - - - - - - ------,,.' ------------=...-=--- -
4
2 +--------===~~:::::::::=._ __
-1------------::- -- -~,-:;...- - - - - -
o --------~--~--~--~--~
19th Jan 26th Jan 2nd Feb 9th Feb 16th Feb 23rd Feb 2nd M arch
- fulllieht - dimlieht
Open the data file in Worksheet 17.7. Use the three sets of data
in the spreadsheet to create the graphs shown in this lesson.
These ~ag~?: pro~i.de; ~ou yy_1t~ q L!estio~s to te?t wh_
at yo_y h~Y'.~ le?rned d L! nng
· thi~ course. The first part C(?ntains a ?et 9f _sho0:.an.?yy~r_quest_ioris coveri ng_e.i?-ch .. .
_c;ii t.~~:~in:e·~~pi~; yo_
L:J hav.e stl.}9ie9. ! h~.~ec909 Pilrt contain? qu~stion? thi3-t_ ....
. .~ .k_yo_u to apply yq1,1 r knqwleqg~ t9 _ne""". challeng~s: ................................. .
Unit 10 Hardware and software 3. List the four items of information you
should include in a citation when using
1. What is the ALU in a computer
another person's work in a project.
processor? What tasks does it carry o ut?
2. What is a biometric reader and what is Unit 14 IT in the workplace
it used for? Give an example. 1. What is the difference between
3. What is a supercomputer? Give an customer-facing and system -facing
example of where supercomputers are roles in an IT department?
used. 2. What is the role of the helpdesk in an IT
Unit 11 Data communication and department?
networks 3. Janelle has a young family, so her
1. What are the two types of cable most employer has agreed that she can
commonly used in a modern computer telecomm ute for two days a week.
network? What is telecommuting and how will it
help Janelle?
2. Explain the difference between simplex,
duplex and half-d uplex transmission. Unit 15 Multimedia presentations
Give an example of each.
1. What is meant by the term
3. What does HTTP stand for? Why is 'm ultimedia'?
HTTP important when you are browsing
2. List four skills that are needed in a
the web?
m ultimedia development team.
Unit 12 Digital data and binary 3. Name two input devices that can be
numbers used to create media for a m ultimedia
1. Convert the binary number 0101 to presentation.
decimal.
End of Section 2 questions and activities
Unit 16 Problem solving with 2. List three things that you can type into a
algorithms spreadsheet cell.
1. What is a terminator used for in a 3. What kind of graph would you choose
flowchart? Draw the symbol used as a to show the increase in the number of
terminator. Internet users in the world from 2000 to
2. An algorithm asks a user to enter their the current year?
age. A conditional statement is needed to
check if the person is older than 16. Draw
a decision box that carries o ut this check. Each of the following long.aosw~r·_" · · ··
3. Draw a flowchart box to m ultiply N umA
q.uestions.cor.resp.onds to.one. of the units.
by N um8.
you hav.e studi.ed this y.ea[.These.questions.
Unit 17 Using spreadsheets require an exte11ded.answer.from you. . ....
1. Explain what a cell is in a spreadsheet.
... have
' . learned in this
. ........ ,,.
un.it,.both on,your 9wn.and .in agrpL,Jp.. . ............
Your teacher will help you decide which presentation to work on. Your presentation should
include a description of the main devices in the category you are working on along with an
illustration. Divide the work among your team members so that each is working on one or
two slides. Leave time to bring your slides together into a single presentation.
Choose a country in the world. It can be a country you have visited, or would like to visit.
Search the web to find facts for a tourist guide to that country. Your guide should include
information about:
• The geography of the country (e.g. longest river, highest mountain. Any features that are
tourist attractions)
• Three cities to visit
• Food and drink
• Facts about the people and traditions that might be of interest to tourists.
. are some simple pro~edwres. 1. Switch off power points at the wall before connecting or
disconnecting any mains electricity cable.
. ....... you .can follow.
2. Save files and close down your computer correctly before turning
off electrical power points.
3. Do not open the case of your computer or any other electronic
device.
4. Never use force when connecting or disconnecting a cable or
component.
5. Make sure all cables are disconnected before attempting to move
a device (e.g. a printer).
6. Do not lift heavy equipment on your own.
7. If in doubt, STOP and ask for help.
What to do if ...
Figure 18. 1.1 Computer power .. .your computer will not start when you switch it on
switch
1. Is the power cable connected securely to the socket in the
computer case and the wall socket? Check if the power socket is
•
switched on.
2. If the cable to your computer has a power supply box along its
length, check if there is a switch on the box. Is it switched on?
3. Turn off the socket, unplug the computer cable and pl ug in
another device to confirm it is live.
Once you have confirmed that the power cable is connected
properly and that the power socket is live:
4. Replace the power cable with one you know isn't faulty.
If the computer still won't start, report the fault to a
technician .
.
Unit 18 Basic IT troubleshooting
Laptops
Sometimes, the battery in a laptop is loose. Locate the battery and
press it firmly into place.
Why do you need to
pay attention to safety
when troubleshooting
Draw a flowchart that describes the checks to carry o ut if your computer problems?
computer will not power up when you press the 'power on' What can happen if
switch. you don't?
In this lesson you will learn how to solve problems affecting the
connection between your computer and the network.
Figure 19. 1.1 A storage drive can save a large amount of information
Network storage
Every network has storage drives that network users can save their
Figure 19. 1.2 A flash drive is a files to. That includes the Internet. Storage that is accessed over the
small portable storage device Internet is called cloud storage.
The advantage of using network storage is that you can access files
on any computer connected to the network. If you save your work
to the cloud, you can access your work on any computer connected
to the Internet.
Portable storage
Portable storage is connected to a computer using a USB port.
It can be used to transfer data from one computer to another Many software
computer or device. applications, like
Microsoft Word, have
Saving your work safely an autosave function.
Failing to save work correctly could mean: Autosave saves a
version of your work
• you could lose work
every few minutes
• you may not be able to find work when you need it again.
without you having
Rule 1: Use helpful file names to do anything. Using
autosave allows you to
When you save a file, you must give it a name. Choose a filename
go back to a previous
that describes the information in your file. If it helps, add some date
version of a file if you
information. For example: 'Science project research April 2020'.
need to.
Rule 2: Use folders to organize your work
Using folders to organize your files can help you to find your work.
For example, you could create a folder for video files, or a folder for
photographs.
Sometimes you will see a warning like the one in fi gure 19.1.3. OK !I Cancel
This is a warning that you are abo ut to overwrite a file you have
previously saved. If you are not sure what to Figure 19. 1.3 A file overwrite
warning means you could be
do, cancel and start again. If the problem continues, ask
about to lose important work
your teacher for help.
Work with a partner on this activity. How well does your partner
use file name and folders? Suggest how your partner can make
improvements to their file storage.
In this lesson you w ill learn how to perform basic file operations
such as save, copy and search.
Saving files
If you are using an application such as a word processor, there are
two ways to save a file. You can use the file menu or click the save
icon. If your file already has a name, it will be saved with the same
name. If it is a new fi le, you need to enter a filename before you
can save the file.
For example, you have j ust completed a science homework
assignment on big cats. The assignment is to be handed in on
24 April 2020. A good filename is: 'Sci hwork Big cats 24 Apr 20'.
UJ X Cut
[~ Copy
j Calibri (Body) ... , ,
Paste
<1 Format Painter B I ~ •-aa-
Clipboard
Figure 19.2. 1 Saving a file
V Example files
V Devon's folder
> Computing
Maths
Science
> Screen shots
Computing
,.__M
_ a_th
_s__, EJ the network is called 'Devon's files'. He created
folders for IT, Maths and Science.
Devon has created many files while studying
his computing course. He made subfolders
Projects for Homework, Programs and Projects. The
file structure Devon creates spreads o ut from
Figure 19.3.1 Devon's folder structure a single folder. This is called a tree structure,
because each level of folders spreads like the
branches of a tree.
File paths
Once Devon has created his folder structure, he is able to use it to
find files. For example, if he is looking for homework he created last
term for his computing class, he follows a path through his structure:
Devon's files ~ Computing ~ Homework
When he reaches the correct folder, he only has a few files to search
through to find the one he needs. As Devon clicks through his
folder structure in File Explorer, the route he takes is recorded in
the address bar, which is j ust below the ribbon. You can see this in
figure 19.3.2.
Folder views
You can change the way you see files in File Explorer. Different views
can be applied to show different levels of detail about the files that
are stored in a folder. To change the view:
1. Click the Views tab
2. Use the options in the Layout section of the ribbon to choose a
view.
Devon has chosen the Details view shown in figure 19.3.2. The
details view shows an icon displaying each file's type. The filename
follows, and then the date the file was last saved, a full description
of the file type and the file's size.
Another view, Medium icons, is shown in figure 19.3.3. The icons
view is useful if you are searching for an image. The icon shows a
small version of the image in the file. This is called a thumbnail.
rJ • bttl ,1,01 1<ons • lJrgt Kons 0 tt,,. dlt<t Don, •
• • Mt4n,m ,tons Small •cons l • ~ fMt Mae tl!tM40n,
l111 ~~ - D Hkklffl ltffl\l Hldt ~!"' Options
(Uf'ftffl'f1fW
o:_i Jobs III ll jlltSfflUbon OIIOi~l9 !US MkrOiOft p....,rPo,nt Pr.,.ntroon IJU8
0 Netwo<b hom- Ollll9J2019 c• 53 M OOICfl W0<d Oocumtnl 17 Kil
~ Program d...gn home,wrlt 07,mg ~19 lllJl , m,osc/1 V,o,d Oocum.,,t 18 kl!
o)Robatspo<ttf 2J.111&,201911l1 M,crOICh WO<d Documrnt 17 <B
Ii; Sp,ead,htfu he m - U<aosctr l,tdl'l0<•>htet 2U8
Organizing files
You can use File Explorer to organize your files in the folder
structure yo u have created. To organize your files:
1. Click the Home tab, then click on the file you want to work on.
2. Use the options in the Organize section of the ribbon to choose
an action.
Deleting files: Using this option will remove the selected file. Use
this option with care.
Rename: allows you to change the name of a fi le.
I 0 .- I Homework
. . Home Share View
~
~ LJ J, Cut
,,._ Copy path
., Move to • X Delete •
Pin to QIJ1<k Copy Paste ~ Copy to • Iaji Rename New Create a folder called
access [cl Paste shortcut folder
Clipboard Organize: New
'Backups' in your file
f- • 1' « D..von's folder > Computing > Homewori< area. Choose two or
three important fi les
"Q) I ~ I ~ ~ ~
Jobs in IT ~ Prog!am Robots Spreadshee
and copy them to the
folder that you have
presentabo ~ design poster ts
n homework homework created.
Figure 19.3.3 Renaming a file
In t his lesson you w ill learn how to use t he recycle bin to recover
any files you delete accidentally. You w ill also learn how t o
com press files before you send t hem by email.
Organizing folders
In lesson 19.3 you learned how the tools in File Explorer can be
used to move, copy and rename files. File Explorer can also be used
to organize folders. When you move a folder to a new location you
also move all the files and subfolders it contains.
Deleted files
Deleting a file should always be done with care. You must be sure
that you have the right file and that you will not need the file in
future. Deleting a folder needs even more care, as you may be
deleting many files and subfolders with a single click .
If you use the Delete button in the Organize
., Move t o • rX Delete ... M rti
section of the Home tab ribbon, you will be
given two options:
© Copy to • 'l tc Recycle
X Permanently delete 1. Recycle: deletes the file but places it in the
Organ
Show recycle confirmation :>~ recycle bin.
mputing > Homework v c, Se 2. Permanent ly delete: Removes the file but
Figure 19.4. 1 The Delete options in File Explorer does not put it in the recycle bin.
Deleted files that are placed in the recycle bin can be recovered
if you have made a mistake or changed your mind. Always
choose this option to delete. Most file delete options you use will
automatically place a file in the recycle bin. To recover a file:
•1MU9t R,q,cle8'n 0 X 1. Open the recycle bin - it is in
Sh.Mt ~ RHJ(k91nToott 0 the top left of your computer
0
... desktop.
I laoty Rtqdc llln Rulott Rutort U'tt
Rff1'dt8ln Pfot)t.l'tiU . . !lftl.S Hkdt.dd.clld
Pts.tor,
2. Click on the file you want to
.,. .., C, SuKh Ft It 8,n p restore to select it.
tht H!t<UCI IUIU lfOII tnt
..Iott
Rtqelt Bin to lf'ltu o , ~
tomlont on ,out COllltOUlt•
3. Click the 'Restore selected
items' button. The file will
be returned to its original
location.
Compressing files
File compression is a method
developed by computer scientists
Figure 19.4.2 Restoring a file from the recycle bin to red uce the size of a data
file. There are many forms of
compression. Most graphics, audio and video files are automatically
compressed when they are saved. At other times you can choose to
compress files. There are two advantages of compressing files:
1. Files take up less space on storage devices.
2. Files take less time to send over the Internet.
-
• T ltlract
Cornprt11fd foldu Tooll
D X
•
Shift [IM!f Zip
Stn<I
.,-..
.....
Ekimtocttsc
. H.,..,<IA.,.,.n
.a Sptahc. p~oplt... _ Ru,o-,t
• MU1J
[sl
Ad'Y&nctd
stCllfnJ
.
l/ -ohomc,,_rl< My home route
-
1 -- If__,·.. I log,n
To compress files:
1. Open the folder containing the files using File Explorer.
2. Click on the Share tab.
3. Hold the Ctrl key and click to select the files you want to include
in the zip file.
4. Click the zip button in the Save section of the ribbon.
5. Give the zip file a suitable name.
A zip file is created as a folder. You can recognize a zip folder by the
zip on the folder icon.
Number 1 0 Number 1 0
- -
Number2
carrv
-
I o
0
-n
Number 2
carrv
-
I o -~
1
sum 0/
- sum
-t /
Rule3:1 +1; 10 Rule 4: 1+1+1; 11
Number 1 1 Number 1 1
Number 2 - 1 Number 2 - 1
C.rTV
SUm
-
/ 1 -n
0/
-
C.rTV
sum
/ 1
---
r--..1
1 /
-
Example
In this example we wil l add the binary numbers 001 1 and 1011 . We
use the four rules to help us with binary addition.
1. N umber 1 and N umber 2 both contain a 1 in the first column.
step2 Mule 4: 1 .. 1• l • lJ f Rule 3 says 1 + 1 = 10. The 1 is entered in the 'carry' row of the
-.1
Nllmbe<2
D
1
D
0
1
1
I
I
next column. The O is entered in the 'sum' row of the col umn you
-
~ 0 ..... I 1
"-..,-.i) 1 0 the column you are working on.
stea,4 Ru1e2! f 3. In Col umn 3 N umber 1 and N umber 2 contain a 0. There is a 1 in
-.1
-2
0
1
0
0
l
1
1
1
the carry col umn. Rule 2 says O+ 1 = 01. It doesn't matter where
I 1 1 D
entered in the carry row of the next col umn. A 1 is entered in the
sum rowofthecol umnyou are working on.
Figure 19.5.2 Binary addition -
worked example 4. Rule 2 says O+ 101. A 1 is entered in the sum row of the
=
column you are working on .
The addition in the example is 0011 + 101 1 = 111 0.
Use the method you learned in lesson 12.2 to convert each of
the binary numbers in the calculation into decimal to check if
the addition is correct.
•••• • •
V V V V
V
not given names in
bi nary. In bi nary 11 is
called 'one-one', not
•• •• •• • •
V V V V
V
eleven. Eleven and
11 in binary are q uite
different.
Figure 20.1.1 A WAP is connected to the network by a cable, but computers can
connect to the WAP wirelessly, without a cable
Home network
An Internet signal reaches a home network via a telephone line,
or special broadband cables. The cables carrying a home Internet
signal are connected to a home router.
A home router combines four different network devices in a small
case . A home router contains:
1. Router: connects your home to the Internet.
2. Modem: converts the signals that pass along telephone or
broadband cables into digital data your home network can use.
3. Switch: makes sure that messages coming into your home are
sent to the correct computer.
4. WAP: lets you connect to the network wirelessly, from anywhere
in your home.
Look at figure 20.2.1. The yellow cable links the Internet to the
router. Three aerials are connected to the WAP to improve the
wireless signal. Fo ur sockets to the right of the case allow devices
to be connected by wire to the home router's switch.
Malware
You have learned that software is the name for the instructions that
make the computer work . Some people deliberately make software
that will harm your computer. The general name for this is 'malware'.
That is made from the words 'malicious' and 'software'.
Types of malware
Often people use the word 'virus' to mean any type of malware.
In fact, there are many types of malware that are not viruses. All
malware needs to stay hidden from the user. Otherwise the malware
would not be able to damage the data or software. The different
types of malware use different ways to stay hidden:
Effects of malware
Malware causes serious problems for the data on computers. It can:
• delete files or wipe entire storage devices
• alter your computer settings
• make your comp uter carry o ut unwanted actions (such as
sending emails).
Spyware
Spyware is a special kind of malware. Like
a virus, spyware cannot be seen on your
computer. Spyware records everything you
do with your computer. The person who
made the spyware can look at the record
of your computer use. That might tell them
every website you looked at, and what you
typed on your computer.
Spyware can be used by companies and
governments to monitor behaviour. Spyware
is used by criminals to find o ut passwords
and other personal details. Figure 20.3.1 Hackers
Hacking
A hacker uses someone else's computer system without permission
through a network connection. Some hackers break into computer
systems for both malicious and non- malicious reasons. Some companies
Malicious hackers break into computer systems to commit crimes. employ hackers to
For example, they steal money from bank accou nts, commit credit try to hack into the
card fraud, steal sensitive information or steal personal information. company's network
from o utside. That way,
Piracy the company can find
Software piracy is the illegal copying and distribution of software its weaknesses and fix
and media such as games and music. Piracy isn't always a security them before malicious
risk, but there is a risk that illegally copied software carries malware. hackers find them. A
hacker who works to
Here are some ways that criminals can make money from illegal
improve the security of
copies of software:
networks is called an
• counterfeiting: copying and selling of software ethical hacker.
• softlifting: buying one legal copy of software and installing it on
several machines
• hard -disk loading: selling computers with illegal software on them
• software rental: renting o ut illegal copies of software.
In lesson 20.3 you learned that malware and hackers pose a threat
to data security in a network. Organizations use a range of measures
to protect their data against such threats.
Physical measures
Physical security is used to prevent people from accessing network
eq uipment. Measures include locked doors, security passes and
security guards.
Biometric systems provide a high -tech way of controlling access
to network eq uipment. Two common types of biometric system are
fingerprint readers and iris scanners. Both use physical features to
create patterns that can be automatically read to authorize access.
Figure 20.4. 1 Using biometrics means people don't have to carry a security card
that might get lost or stolen
Software security
Most network systems use intrusion detection systems (JDS).
An IDS is software that monitors a network and warns when
unauthorized access has occurred. This allows action to be taken to
deal with the problem early.
Encryption is a way of converting data into a secret code. Most
data sent over the Internet is encrypted. Encrypted data cannot be
read even if it is intercepted by a criminal.
Ma/ware protection software searches any file saved on your
computer. Malware protection software places infected files in
quarantine so that they cannot damage the computer or its data .
A firewall is a filter. It allows authorized communications through
the filter into the network and it blocks comm unication from
unauthorized sources.
Think of a firewall as the walls of a castle. Every gate in the wall is
guarded. Guards let those who have passes into the castle. They turn
others away. The guards and walls act like a firewall.
Other soldiers patrol inside the castle wall. They are constantly on the
lookout for wrong-doers. When the patrols find a criminal, they lock
them in the castle dungeons. These patrols act like malware protection.
bing .
" ,. ·" / .,
Go gle~
Figure 20.5. 1 Search engines
words
Caribbean
This is one of ..._..,.,..,,........ m-,..--.. .......... ~ ,,~ - ·...
..... IJlt#itilMMIMN #ta<. . . * Wf'I N.....,NOO,OO-"'M~tlNIIIW ..... l '°"~""
the top 'hits' -...OOffN:M~ O'»MISllt~'1.,...,_.i,Ml.~0...... tt\Jt'-1 ~ . U « l!l'lb...'D•tl
-~-~--
e TI'IDCilfilibNn - P c ~
-
f'c:.-.Sallllltrffc lWllaU,,_0,,...,...lllt'$li.
,,._.,"""""',&:,,"'......
C~ • i . . -.1......w.o,~MM~
~(~~~
Adverts
Most search engines add adverts to the top of a list of sites. The adverts
are paid for by the advertiser. Adverts are not always relevant to a search
and may give biased information. Adverts are usually indicated with an
AD' symbol or the words 'sponsored link' in the title of the page.
It) ,. i;"
... 1~-
Trlnided
arid Tobago
Photo ,
~
<,>
-
·1fi f;.
.
• l- •- ~.._
Pqo,o
- '~°"'
G
_ o~ g"'-e- ~----'
OI)liI)~
lnJhis..u.njt.yo.u will le?.rxi. .... . What is cyberbullying
A person who uses the Internet or other electronic means to bully
about the risks tha.t .caci . . .. .
others is called a cyberbully. Cyberbullying can take place on
.0.ccu.cw.hen yo.u..use the . social media sites, but bullies will also use email and text messages .
.ln.ternet. .Y.o.u.wil.1.1eam how Cyberbullying is malicious and persistent. It can seem impossible to
to act.ta avoid .risks and . escape from a cyberbully. A bully can strike any time and anywhere,
using text messages and social media posts .
. cope with problems yo.u
A cyberbully has many ways to frighten a target. The bully will send
. ....... might eiperie.n.ce online.
threatening messages, often including physical threats. This is called
online harassment. A bully might impersonate their target and send
false messages that cause trouble between the target and their friends.
A cyberbully may post public messages showing disrespect to a
target, publicly humiliating them. One way a bully achieves this is
through exclusion, that is publicly excl uding their target from a
social group.
Many countries
are considering the
introduction of laws
to deal with the rise of
cyberbullying. In other
countries, existing
harassment laws have
been used to prosecute
cyberbu II ies.
Figure 21.1.1 A person who uses the Internet to bully others is called a
cyberbully
Staying safe
Most people using the Internet are friendly. However, there are
some people using the Internet with bad intentions. Young people
are particularly at risk . Some of the activities that carry the greatest
risks are discussed below.
• Chatting: Do not chat with strangers. It is safer to chat to people
you know well. It is safest if you chat to people you know in
You can make the real life. Don't accept friend req uests from strangers. If you feel
time you spend online uncomfortable about someone who sends you a message you
safer by carrying o ut can block them. Never arrange to meet a stranger.
regular checks on your
computer. Some people you meet online may ask you to send inappropriate
messages or texts. If the person you are talking to is trying to exploit
• Turn off location you then you should block them immediately.
sharing on your
phone and browser. • Sharing: Do not share your personal information or photographs
• Check your privacy with strangers. Never share your address, phone number or
setting on social which school you attend with strangers. Be careful that the
photographs you post online do not reveal your location, or the
media sites - do not
allow public access location of any other person in the picture.
to your private • Accepting: Do not accept pictures or other files from people
information. you don't know. The files could be infected with a virus or other
malware. If you receive a message or file by email from someone
• Check your lists of
friends on social you don't know, do not open it. If you are in doubt, ask an ad ult
media. Do yo u really you trust for help.
know everyone on • Settings: Social media and gaming sites allow you to set privacy
your friends list? levels. Privacy levels let you decide who can see what you share
Remove names you on line. If you are unsure how to use privacy settings, ask a family
aren't sure of. member or teacher to help you. Check your friends list. Make
sure you haven't added strangers by accident.
Digital footprint
Never type words online that you would not want family, police or
employers to see. Never share pictures that you might regret sharing.
Once information is posted online it can be hard to remove. This is
cal led the persistence of data or a digital footprint.
Unit 21 Staying safe online
Passwords
Many websites store content that is personal to you - for example
payment details or a personal profile. Nobody else should be able
to access that content. Websites will protect your personal details
with a password. By typing the password, you confirm your identity.
• Do not use obvious passwords such as '1234' or 'password'. Think
of a password that is hard to guess.
• Make sure yo u can remember the password.
• Do not use the same password on every website.
• Never tell anyone else your password.
Reporting problems
If something or someone frightens or upsets you online, tell an
ad ult. It can be scary, but you will feel better once the problem is
o ut in the open. Your school may have a teacher responsible for
dealing with online abuse and bullying.
Figure 21.2.1 If you encounter a problem online, tell someone you trust, like a
family member or a teacher.
Search the Internet to find one or more sites that provide good
information on how to stay safe online. Add the sites to your
bookmark list. Share your favourite site with your class.
In this lesson you will learn about t he skills you will need to be
successful in finding your first job and building a career.
...... ..
Planning
. . ..
a. career
.. .
Specialist IT jobs
Specialist IT jobs are those where computer skills are the focus of
the job. Examples of these roles include computer programmer and
IT technician. A range of specialist IT jobs were described in Unit 5.
If you are considering a career in IT or computing, there are many
non- IT skills that yo u will need .
Modern computer professionals use a range of skills:
• Problem-solving skills are important. There are constant
challenges in the world of IT, and you m ust be able to respond
rationally to overcome them.
• Good communication skills are needed by those who work with
computer users to find o ut their needs, and also train them to
make good use of computers.
• Writing and language skills are essential for those who create
computer manuals and websites.
• Maths and logic skills are used to design solutions and write
computer code for application software.
• Scient ific understand ing and knowledge is needed by those
who design and build computer hardware systems.
• Engineering and electronic skills are needed by technicians who
maintain, repair and improve computer systems.
Trending jobs
New industries emerge when new technologies are developed, or
new applications are found for existing technologies. Innovative
jobs and careers are created that can be rewarding and exciting.
These are called trending jobs. You might consider working in an
emerging industry in the future. Two examples include:
1. Media: the growth of digital media, the Internet and
smartphones capable of streaming multimedia has changed
the way people access entertainment and news. There has been
a growth in high-tech jobs in the media and entertainment
industries.
2. Robotics: many traditional jobs will be lost to robots and
automation in the coming years. At the same time, there will be
many new exciting jobs created in the robotics industry, building
and maintaining robots, as well as writing software applications
for mobile devices.
Hard skills
Hard skills are the technical skills you need to do a job. Hard skills
can be measured and demonstrated. An employer usually evaluates
skills by looking at a candidate's qualifications. The employer will
also want evidence that the candidate has the skills they are looking
for. They might ask to see previous work that you have done, or set
a test for you to complete.
Soft skills
Soft skills are the general skills that are needed to be successful in
the workplace. Some of the soft skills most val ued by employers are:
Communication: Good verbal and written comm unication is
important in every job. Clear comm unication is essential when
writing an email or report, making a training presentation or dealing
with a phone enq uiry.
Teamwork: Good teamwork involves cooperating and collaborating
with other team members. Good listening and negotiating skills are
important.
Adaptability means being able to cope well with change. An
adaptable person is self-confident and calm under pressure. They
have good organization and decision- making skills
Problem-solving: is one of the most important soft skills in IT and
computing. Solving problems req uires an analytical approach to
understanding a problem and a creative approach to finding a
solution. A problem solver must be able to make decisions. Figure 22.2.2 Teamwork can
be built in different ways
Creativity: Creativity is a skill that can help you develop new
solutions to problems. Creativity is important when designing new
systems or prod ucts. It is helpful to have team members who can
look at problems in a different way.
Interpersonal skills are the skills you need to interact and
communicate with the people you work with. You need to be polite
and respectful. You also need to be able to persuade people when
you have a valid point to make.
Web browser
We view content on the web using a web browser. A web browser
is a software application used to view web pages.
Website
A website is a collection of web pages on the same topic. The
pages in a website are usually hosted on a single web server
and have a similar design. The pages on the website are created,
controlled and maintained by the same person or organization.
Loco I
Links I
\ ~
1
""'"' ,..., . _ \ _ C•mnu, ....
OXFORD Academic
Srf"I,.. ltoiJ~"' I., a«,Q,llf'f: l•""C' rf' O .,.._
\TNlVBllSITY PUSS ,c.,,....ci AiAhot 1sdt. r , l:m:I
11:1111111
I Heading 1- - -Making an
Impact
Image
Text
Logos. Most websites use a logo. The logo tells you who owns the
website. The logo should be on every page in a website.
Text: text is used on a web page to give information. Text should be
clear and relevant to the subject of the page. Too much text makes a
page difficult to read.
Headings are short descriptions that tell you what a website or a
piece of text is about. A heading is larger than normal text so that it
stands o ut.
Images: Most websites use images as well as text. Images can be Open one of your
photographs, drawings or cartoons. Images make the content of a favourite web pages.
web page more attractive and easier to understand. Take a screenshot and
Links: W hen you click on a link on a web page, you are taken to a paste the image into
new page. You use links to find new information on a subject. Links a word processor or
are also called hyperlinks. A hyperlink can be a piece of text or an graphics package.
image. Label the web page to
show the features you
Menu: A menu helps you to find your way around the web pages learned about in this
that make up a website. Clicking on a menu option takes you lesson.
directly to another part of the website.
In this lesson you will learn what to consider when you plan your
website. You will learn a few simple techniques that will help you
plan a successful website.
Audience
When you design a website, you m ust think about who will view it -
its audience. The website design and content should be suitable for
that audience. Here are some things to think about :
• Use language that is suitable for your audience.
• Use images to make your content more interesting.
• Consider the colours and fonts you will use to appeal to your
audience.
Pages
The homepage is the page your audience sees when they first
connect to the website. You should design the homepage to make
people want to stay and visit other pages on your website. Before
you create the website, you should also decide how many pages it
will have, and what content will go on each page.
Navigation
You want your website users to be able to find content on the
site. You will use links and menus to guide people through your
site content. It is important that people can find their way around
the content on your site and always find their way back to the
homepage without feeling lost.
Design methods
There are methods you can use to help plan your website. They
will help you make important decisions about structure and design
before you start to create yo ur web pages.
Big cats
Home page
Endangered
Lions Tigers
species
Habitat
preservation
Illegal
hunting
Wireframe
A wireframe is a useful tool to help you think about how you will
lay o ut the various parts of a web page that you learned about in
lesson 23.1. A wireframe design does not include any content. You
use it to show where on your web page you will place the heading,
text, images, menus and other parts of your design.
Getting started
When you open yo ur web editor for the first time you will be asked
to create a new website. When you create the site, you will be asked
to select a template for your site. Select a blank template. Using a
blank template will make it easier for you to learn the basics of web
page design.
(i).
used to contain links to information about the site, as well as a list of
contents.
Header
a
-0 · - - - - - - - - - - - - - - - - - - - - - - ~·
..
.a
A
Body
'
Figure 23.3. 1 Web page editor
Adding text to your page WfX Paga: 0
When you start building your web page, the
first thing you will add is text. Text can be
paragraphs, or headings. When you are using
Add Text •
a web page editor, you place text in boxes. ThemedTexl
Once you have created a text box you can
move it around your web page to position it Add Heading 1
where you want it.
Add Heading 2
1. Choose the Add option from the toolbar on
the left of the screen. Add Heading 3
2. Choose text from the men u. Add Heading 4
3. Choose a paragraph style from the list if you Add Heading 5
want to add body text, or choose a heading Add Heading 6
style to add a heading. I'm a paragraph. Cllcl< here to add your own
text and ed,t me It's easy
4. A box will appear on your web page. Drag I'm o perogroph. CIICk ~r• 10 odd your own
text and ~drt me It's easy
the box to where you want it to appear on
your page.
5. To add text to the box, click the Edit text Fig ure 23.3.2 The Add Text tool
button above the box. You can type or paste
text into the box. A Text settings menu appears
when you select edit. Use this to add effects
WIX
0
- C
-
: c.ett l1t•~•.....,b-:icaras~11...a
! ff ,. 'f,oe-Wt<oC.,....ki• lN.,..,'l"II-..
Notice that the main heading, The Big Cat If! :"
: ~• -.. uc,qcal:~t!w-C~t...
Page is above the dotted line. It is in the page t
l-,\ff'l;C'1t<Oll'Util
header. The rest of the text is in the body of m iThe big 5 cats
: .......,11 ..iO'il>~D>'iJ .Al:fi n..'511'9C...
"'°"'
..
the page - below the dotted line. , ..,.,.._,~ M-'I 1,owo lt09t'lf
.
• ..-.cl11Q.11, ""•Mt,,ero-.0>11-v
:..,_,Vu-"V~••"o::1...a.-.w'l.lt
~,..... ,~,,
:OIMftflu. ~ UC~#l.-ldlr• " ~
Be safe :~d'l-.....·~·-..,,.,11.0
; ... ,1th't..,e""'1• • 1ft ....1 -·••I •-, . ...,.
-r~lfl.•JI.~..~ t~!C.,t~ . • •
When you publish a web page it can be read by
anyone in the world. Do not include personal Figure 23.3.3 Adding text to your web page
details in your web page. You must keep your
full name, address and phone number private. Do not include any
information that will allow someone to identify or locate you.
m
·-
Here are the steps to follow to insert an The Big Cat Page
image on your own web page: a
0 ·--····'· ···----·-··············· ...
1. Choose the Add Images option from :P \Welcome
the toolbar on the left of the screen. r., :"'C-10"'\lfloQ-C•c.QC.0,,.11'«
:~•1'9~-' Jt_._.,,~Jl,l"''(ID',i!;llr•
~~:.zec;:~;t-~~-~
2. Use the Free Wix Images option for •
~
l ~~; :
:•
l ..fr.,• .-. ,,.01rcr ,.,.... -
; P")rt.....-,:0!~
~ •-
Add an Image ? •
My Uploads
My Image Uploads
Upoao a'!o add yOJr own
,mages 10 your S-1e
Image Collections
WIX .... a ., ,.
•
CD
Your homepage
You will now see two pages listed. One is called 'Big cat gallery'
and the other is called 'Home'. You learned in lesson 23.2 that
a collection of web pages is called a website. You have now
Figure 23.5.2 The Add Page menu created a website. The first page you create is always called
'Home'. It is the homepage. The homepage is the page people
see first when they visit your site .
The page header
--
Addi MflH'IU
When you created the homepage in lesson 23.3
you added the name of the web page in the page
header. In lesson 23.4 you added a logo to the header.
When you create a new page, the information in the
homepage header is automatically inserted in the
header of the new page.
When you have completed the activities in this lesson, open the
website yo u created in lesson 23.4.
1. Create a new page. You can add a page from the plan you
created in lesson 23.2, or you can add a gallery page like the
one in the example.
2. Add a menu to your homepage that links your pages
together.
3. If you have time, add more pages from your website plan.
In this lesson you will learn about a loop and how it can be used
in problem -solving.
Writing afgori'thms ...
. . ..
········.
in. pseudo~o-
... ~ e _....... .. What is a loop?
Jn .th(s wn.it you. will In Unit 16 you learned about program seq uence, which is when
commands are carried o ut in order. You have learned about
develop your p.rob.l~m-.
program selection, which is when the computer uses a logical test
.solving and ps.eud.ocode to choose between different options. In this lesson, yo u will learn
.skU.l.s, Y.ou will.learn how about program repetition.
to.describe pr.oblerns . A loop is a section of an algorithm that is repeated . The algorithm
. where the solution ne.eds circles back on itself repeating the instructions that are contained
in the loop. Using loops makes algorithms much more useful in
. .. ... .. events to repeat,
describing real- life problems.
Exit condition
You will often find problems in real life where a series of events
m ust repeat. You will never find a sol ution where something needs
to repeat forever. Something m ust occur to make the loop end. The
loop m ust have an exit condition.
The exit condition is a logical test. It tells the algorithm when to stop
repeating the loop. When you are using a loop in an algorithm, it
is important that there is a way to stop the loop. You must make
sure that the exit condition can be met, otherwise the loop will
never stop.
Types of loop
There are two types of loop, and these two types of loop have
different exit conditions:
• Counter-controlled loop: In a counter-controlled loop, the
algorithm counts how many times the loop repeats. When
it reaches a set number, the loop stops. You use a counter-
controlled loop when you know exactly how many times to
repeat the section of the algorithm. A counter-controlled loop
uses a variable called the counter. The counter increases or
decreases every time the loop repeats. When it reaches a specific
value that you set, the loop stops
• Condition-controlled loop: In a condition-controlled loop, you
set a logical test. The result of the test tells the computer whether
or not to repeat the loop. The loop might repeat once, or a
million times. You use the condition-controlled loop when you
do not know how many times you need to repeat the loop.
Unit 24 Writing algorithms in pseudocode
St art
Repetition is
Output sometimes called
" 12+5 = " iteration. Iteration
means an event that
is repeated O or more
Output times.
Input Answer
" Try again"
Output
Stop
- -- --- ~= ~=
-- - =If (logical test, action 1, action 2)
r,, , Align The first comma in the statement is eq uivalent to the word 'TH EN'
you will see used in pseudocode. The second comma is the
=IF(D7>40, G7,G8)
eq uivalent of the word 'ELSE' in a pseudocode selection.
D
- - -E -- F
L
IF ... THEN ... ELSE ... ENDIF
Figure 24.2.1 Spreadsheet IF The structu re of a pseudocode selection statement looks like this:
statement
I F logical test THEN
commands
ELSE
commands
ENDI F
In your logical test, you will compare two values using a relational
operator like'=' or '>', j ust as in a programming language or
spreadsheet. You will see examples of logical tests used in the
pseudocode examples in this lesson.
Example 1
This sample of pseudocode is for a program people use to b uy
tickets for a roller coaster ride in a theme park. This piece of code
checks the age of the person b uying tickets:
READ Age
IF Age < 15 THEN
PRINT "sorry come back when you are older"
ELSE
PRINT "you can buy a ticket at your own
risk"
ENDIF
CASE
IF, TH EN, ELSE is used in pseudocode where there is a choice between
two courses of action. When there are many different possible actions
in a selection, a CASE statement is used in pseudocode.
Unit 24 Writing algorithms in pseudocode
Example 2
This example shows a simple calculator pseudocode program
written using the Case statement:
READ Numl
READ Num2
PRINT "choose the operator (+ - / *):"
INPUT Choice
CASE Choice OF
"+": answer ~ Numl + Num2
II - ,, :
answer ~ Numl - Num2
"*" : answer ~ Numl * Num2
"/": answer ~ Numl I Num2
OTHERWISE
PRINT "you didn't choose a valid operator"
answer ~ 0
ENDCASE
PRINT answer
Create the code for one scene from a computer game. The
user m ust type "north", "south", "east" or "west". The computer
displays an action for a different danger or challenge for each of
these four options.
In this lesson you will learn about pseudocode loop structures.
Loops allow you to make actions in your solution repeat.
FOR loop
A co unter-controlled loop in pseudocode has a similar structure to
Sometimes a loop is
Python. In this example, the counter variable is shown as i:
so badly written that
the condition in the FOR i +- start TO stop
test can never be true. Commands
When that happens NEXT i
a loop will contin ue
for ever - or until the Notice that:
program is closed • Command words are shown in upper case.
down. This is called an • An arrow is used to point to the counter variable. This assigns a
infinite loop. value to i.
Here is an example • The structure ends with NEXT i.
of an infinite loop. • In pse udocode the loop stops when it reaches the stop value.
Discuss in your group
To make a FOR loop you m ust use numbers in place of start and
why the loop is infinite
stop. Remember that in pseudocode the FOR loop counts to the
and what change
stop val ue. The final iteration uses the stop val ue. Indent the lines
you can make to the
that you want to repeat inside the loop. Here is an example:
algorithm to correct
the loop. READ Value
WHILE counter FOR i +- 1 TO 5
< 5 PRINT Value* i
counter +- 1 NEXT i
counter +- PRINT uThe loop has stopped"
counter+ 1 If the user entered the val ue 10, what o utput would be prod uced by
ENDWHILE this loop? Remember that in pseudocode, on the first iteration the
counter value will be 1, and on the final iteration it will be 5.
WHILE loop
A WHILE loop in pseudocode is written with a logical test at the
start of the loop. If the test resu It is 'True' the loop will contin ue:
WHILE test DO
commands
ENDWHILE
Unit 24 Writing algorithms in pseudocode
To use a WHILE loop in pse udocode, replace the word test with a
logical test. Enter commands inside the loop. The structure ends
with the word ENDWHI LE. Here is an example:
PRINT "You are stuck in a maze"
READ Direction
WHILE Direction<> "W" DO
PRINT "You are still in the maze"
READ Direction
ENDWHILE
PRINT "You have escaped!"
The test comes at the top of the loop, so you must set the value of
the test variable before the loop starts. If the test result is False the
commands inside the loop will not be carried out.
Here is the game "The Maze of Doom", made using a REPEAT loop:
REPEAT
PRINT "You are stuck in a maze"
READ Direction
UNTIL Direction= "W"
PRINT "You have escaped!"
The test comes at the bottom of the loop. You do not have to set
the test variable before the loop starts. The commands inside the
loop are carried o ut at least once before the test
Data types
The data type of a variable determines what type of data you can
store in that variable.
Clear outputs
An o utput command can be used to display a val ue. For example:
print Pay
It is good practice to include some explanatory text. In pseudocode,
the explanatory text is usually included in the same print command.
print "Total pay earned is $" Pay
In this example, a dollar sign has also been included to show that
the value is an amount of cu rrency. Here is an example of well -
written pseudocode:
declare Hours as integer
declare PayRate, Pay as real
print "Enter number of hours worked"
read Hours
print "Enter rate of pay"
read PayRate
Pay= Hours* PayRate
print "Total pay earned is $" Pay
Dry run
The way to test an algorithm is to perform a dry run. This means you
read through the algorithm, step by step, following the instructions in
order, noting the values stored in each variable at each stage of the
process. You m ust decide what values to use as input - this is the test
data The values of the variables are noted down using a trace table.
Test data
You should perform a range of tests, using different input data, to
make sure that the algorithm works as you want it to in a range of
circumstances. Your tests should include:
• 'Normal' data. This is the type of data you would input during
normal use of the planned computer program. The algorithm should
process this type of normal data to give you the answers you expect.
• 'Extreme' data. These are data at the extremes or boundaries of
what is acceptable in your design. For example, if 'age' is to be
input and the maximum acceptable age is 18, then the important
values to test are 18 and 19.
• Your tests should also include examples of 'impossible' or 'null'
data. For example, what happens if you enter a negative number,
or letters instead of numbers?
Make sure that in your tests you include a wide range of input data.
When testing an algorithm, you need to run many tests. Even if your
algorithm passes one test, that does not mean it will work correctly
every time!
Trace table
A trace table has a column for each variable used in the algorithm.
As you work your way through the dry run you use the trace table to
note down the value of each variable at each stage of the process.
In a very simple trace table (see Exam pie 1) you might have a row
for each line of the algorithm. If you are testing a slightly longer
algorithm, for example, one that includes a loop (see Example 2), then
typically there is one row in the table for each iteration of the loop.
Example 1: Simple algorithm
You have seen this algorithm earlier in this unit:
input Hours
input Rate
Unit 24 Writing algorithms in pseudocode
A B C D
1 Library Code Title Author Surname Author first name
,,
2 00230 Anna Kare nina Tolstoy Leo
3 00231
-----------t
W ar and Peace
t-------
Leo
4 00232 Les M iserables Hugo Victor
5 '00233 Crime and Punishment Dostoevsky Fyodor
6 "00234 Moby Dick M e lville He rman
7 "00235 Tevye the Milkman Ale iche m Sholem
Each col umn of the database shows one item of information. For
example, one column contains book 'Title', another the /\uthor
Surname'. This is cal led a field. Each field has a field name, shown
at the top of the col umn.
Every record (row) in the table has the same structure. That means
each record contains the same fields (columns). The same type of
information is stored for each record in the database.
A complete database might have more than one table in it. For
example, a library database might contain tables storing data about:
• books
• people who are members of the library
• which books have been lent to which people.
Each table stores different information and will contain different
records and fields.
The example database table is smaller than a real database, which
might have thousands of records in it. Each table may contain many
more fields than shown in the example. All tables are stored as a
single database file.
Primary key
Each record in a database table m ust be unique. That means it must
be different from every other record. Look back at the example
library table in figure 25.2.1. One of the fields is called 'Library code'.
This field is known as the primary key. The primary key is the field
which uniquely identifies each record in the database. Databases
almost always include a primary key made up of numbers, text, or
both. You cannot have two records with the same primary key.
A primary key is needed because the other fields might not be
unique. For example, a library could have two books with the same
author or the same title. To make sure the records do not get mixed
up, each book has its own unique code.
Data types
When you define the structure of a database you decide which
fields there will be. You give each field a name. This name appears
at the top of the col umn in a typical database table. You also define
the type of data that will be stored in the field. For example, it might
store:
• text
• number
• currency (money)
• a date or a time.
The examples in this unit use a DBMS called Microsoft Access. Your
school may use a different DB MS or an earlier version of Microsoft
Access. Your teacher will advise you of any difference in the way
your software works.
Blank database
You have created a blank database file. You are now ready to add
structure to your file. You will add a table and fields to your database.
Add a table
When you have created your new database the main Microsoft
Access window opens. The layout of the window is like other
applications you have used. There is a menu bar across the top of
the screen. Beneath the menu is a ribbon containing the tools you
need to create a database. Below the ribbon is your work area.
1. Select 'View' in the top left of ribbon and click 'Design View'.
2. A box opens asking for a name for the table you are going to
create. Type 'Books' and click on the OK button.
FIie Home create External O.ta Data~se Tools Help ~ s T1ble p Ttl me ... ~ you .,.,nt to do
AB 12 Cf:' o.i.&Ttm• b
Shon Nutnbot Cuntney w) Voo'No
Tert r:.., Mott fields •
----,
,_,
Acld&Dtltlt fom1tt1no fltld \lolld1hon
ID • Cid to Add •
(New) ~~~~
~ lnstrt Rows
D ~
View
Vit WS
''
Prirmay Bu,ldtt Te.t \
Key
All Access... 0 «
p
i:l
Ru!~
<1
Tools
t,on
11oo1cs
Field Name
:X Otlttt Rows
_,:i
o- Modify l ooku~
Proptrty Indexes
Shttt
Sho w/Mldt
x .___ _ _ __ _ _ _ _ _ __ _ _ _ _ _ _ _ _ __
Q
Create Dato Rename/
Ma<ros • Otlett ~<ro
fldd, Re<ord & Tablt Events
Data Type
Relationships Object
Oeptndtn<its
Relationships
Description
1 BookCode ffll'lffll Iv
~
_j SholrtText
Gentrill Lookup
.
long Text Flt ld Proptrtlts
1
1. Type Book code' in the first row of the 1Field name' col umn. Note:
1
replace the label 1D' that is in that eel I.
2. Open the drop-down box in the Data Type col umn and
1
select N umber' from the list.
Now add the other three fields needed for this table: Title, Author
Can you see the small 1
surname and Category Use the Short text' data type for each of these
picture of a key next to fields. Your table design should look like figure 25.3.4.
the Book code field? It
l
tells you that the Book
code is the primary key.
Remember that the
II
Cl Books
Field Name
BookCode
Title
Data Type
Number
Short Text
primary key database Author surname Short Text
is the field that holds Category Short Text
information which
uniquely identifies each
record in the table. The
Figure 25.3.4 Field list
first field in a table is
the primary key unless
you choose to use
another field .
Carry o ut the tasks in this activity to create you r own copy of
the library database. You will use this file in the next lesson.
Make sure you check your file before saving it.
~~ -
Pa
J(, cut
[~ Copy
Filter
T(2Ad ance
nt r gl F
View s, r,, Sort & Filter
l
Clipboard
~ I ~. . _o_o_u_b_le_-c_li_ck_h_e_re___.
Tables
'::J Books
Table views
There are two ways of looking at a table. They are called views.
There is a tool on the tool bar which lets you toggle between the
two views. You used Design view in lesson 25.3 when yo u added
fields to your Books table.
~
Datash eet
Design
View
View -~
Vie1N View
.... ...
Views Views
Figure 25.4.3 Table view
The Datasheet view allows you to enter data into the table. This is the
view you will use in this lesson.
1. Use the Views toggle to see the two ways of looking at a table.
2. Switch on Datasheet view.
1. Type the code nurmber and other details for the first book. You
can expand the size of the cells by dragging the cell borders.
2. Add the details of the other books in the list to your data table.
Enter each record on a new line.
File Home Create External Data Database Tools Help Fields Table J) Tell me what you want to do
T : ! Ascending T Selection •
z LDescending Tfl Advanced •
l@J ~New 2 Totals
p ~BeReplace
Filter Refresh ~ Save ~ Spelling
Find
-+ Go To•
A
2' Remove Sort All • · cl More• ~ Select•
Views
«
-----
:::I
r.
Books
Sort & Fllter Records Find
* 0
Investigating validation
Validation means checking that the input data is of the correct type.
If you try to enter data of the wrong type, a DBMS will display an
error message.
Yo u will look at two types of validation:
1. Data type
2. Primary key
;
-
Booti. c · TllM
•h•1L'._..:.111om the ~I Toll<
1202
• Author sum~ ·
Heml,..,•y
""',.
C.topv
Fiction
-I ad ro Add •
You will see an error message. When you created
the library database, you defined the Book code
1203 data type as 'n umber'. Microsoft Access recognizes
UOI
1205 when the data you are trying to enter is not a
1206 Ht"4p .di 1bu r.,pn Md fONNtJ.
1207 Lotts W•l-1e to ffffdom M10CS.J,1 Non--hctH>n number and puts an error message on screen.
0
3. Click on Enter new value. Retype the book code,
Figure 25.5.1 Validation message
this time using the correct numerical code.
When you enter a record that contains the same primary key as
another record, an error message is displayed. It says, 'The changes
you req uested to the table were not successful because they would
create d uplicate val ues ...'
The database has detected that there is already an entry '1201' in
the Book code field. You cannot enter the same val ue twice because
Book code is the primary key field .
Retype the book code using 1208.
. ... .
... ..
Automatic numbering
To make it easy for you to give every record a unique number,
DBMS software has a feature to automatically create unique code
numbers for each record.
In this tutorial, you will create a new table for you r database called
'Pupil records'. The table will contain records of students w ho can
borrow books from the library.
1. Open the 'Create' menu tab and click the 'Table design' button in
the ribbon. A new table opens in the work area.
2. Type the field name 'Pupil code' and set the data type to
AutoN umber:
3. Make the 'Pupil code' field the primary key by clicking on the key
symbol in the ribbon.
4. Add these fields to the table to complete the
1
Fit
design: 'Pupil first name (text), Pupil last
CJ
name (text), School year (number) and their
Class (text).
5. The table design looks like figure 25.5.2. All Access ... 0 " .,.,,"J
_,. p
,....
=-...,----.-::1...,=--
,.,-..-lt(.,-.-. --,
field Name
-
Propc,I)' lndo.,
1
~Hjctt
Dai.Type
CtUltO.t•
M,c_,o.• l
Fitld. Rc,cord ~
Matching conditions
The simplest kind of condition looks for a simple match. You select
a field, type in a word or number, and the database will find all the
records that exactly match. In most database systems the eq uals
sign(=) is used in the query to indicate an exact match. For example,
if you have a database of pupils, a q uery like Year = 10 will find all
pupils in year 10.
+I.,,..., ....
l ,.,.....,,n-..o--.- _,_ ~~ .... --"""'"'"
>w-- J l o - l -
1:: ••,.,...~
.,..,........., _
1
I:('_._.._.., - _,_ ..,__,,.
1. Now you m ust pick the 'Category' field from the - ... .Ma tlf""ftle,o.,.oo
1:-· ~:
-
A.ii A<cns ;, • r-;1-..... -c-.""
- ,.....,, ~-
Books table. That is the field that tells you if a book
is fiction . ?-_ : ::,._
Do"bk,-cl~k
Category
Field: Category
Table: Books
m
Books
V
Sort:
Show: 0 0 D
Criteria: "Fiction
or:
~
2. Click on the 'Save' icon and save the query. Cl Pupil records X ~ Action r.st
All Access ... 0 «
Category • Title
Give it a suitable name such as 'fiction Srorch_ P
Tables ~
11111 For Whom the Bell Tolls
books'. Fiction Beloved
Cl Books
Fiction White Teeth
3. Select 'Datasheet view'. You will see the :::l l'I.Jpil records
Fiction Bleak House
category and title fields for the records that Queries ~
Fiction Mansfield Park
match the criteria in your q uery. :§'.] fiction 11st
*
Open the database file you completed in lesson 25.5 and add the
fiction query described in this lesson. W hen you have finished
you will find more challenges in the online activity sheet.
In this lesson you wi ll learn how to use report formats to make the
output from your database file more attractive and easier to read.
Creating report
DBMS software like Microsoft Access allows you to produce reports
that present information neatly, in a way that is easy to read. Reports
use titles, headings and col umns to create an attractive layout.
1. Select the Books table from the list of tables on the left of the
screen.
2. Select the Create tab.
3. Click on the tool for Create Report.
Create
fole Homo CrNi. Elltom.11 om [)aQba.,. Tool> Holp flflds T•bi.
Report
~ ml~ C IQ trj
Appl,c,t,on Tabl• Table Sho,cP_ °""'I' Que,y
,.,... ~ u<t,· w....d o..,g..
labtu fol•• t.uc:ro1.&Codt
-
fcap&al.H Q,HrKI lhpofU
18 August 2019
Northside School . Library catalogue
[:] 13:4:i:19
Smith F1d1on
Dickens FICIJOn
Eyre F1cuon
Pagel o f l
L:l lhemes·
Colors •
0 Fonts•
Themes
Organizing a report
It is also possible to change the way that data is organized in the
report. For example, the books in the report on page 258 are shown
in the order they were input into the database. The report would be
C Office
---- r -· •••
Figure 25.7.5 The Group Yo u will see the list change. The Fiction and Non- fiction lists are
and Sort icon now in alphabetical o rder by author name.
Fiction
~ - - -1_2os][Mansfield Park
iNon-ftction
------~
1203 ] Dreams From My Father =11obama
~
Banking
Banks now carry o ut most of their business using computer systems.
Whether that is paying for goods with a debit or credit card or
drawing o ut cash from a bank Automated Teller Machine (ATM),
every transaction is recorded in a database. Banks keep transaction
data for many years, so the amount of data that has to be stored
across the world is huge. The data is also very important, so systems
must be reliable and secure so that criminals are prevented from
hacking them.
You often need to use the information you have created in one
software application in another application. For example, it can be
an advantage to export a report from Microsoft Access into a word
processor. That allows you to include a report as part of a larger
document or to attach a report to an email. One method you can
use is to export information from an application so that it can be
used elsewhere.
File Home Create External Data Database Tools Help p Tell me what '
c 'i.Saved Imports
~ ~ Linked Table Manager
~ G~~~ ~ @Access
New Data Saved Excel Text XML PDF Email Cl
Source• Exports File File or XPS E;' More•
Import & link Export
All Access Objects 0 « u Book, x t:1 Pupil record, x r.J Books "
5earch- j)
Tabf.,..
Cl Book,
U Northside School - Library
I::!! Pupil records
catalogue
Queri"" Category Book Coe
:§J Fiction li,t Fiction
Reports
t!I Books
In this lesson you will export the 'Books' report you created in lesson
You can use the fields 25.7 to Word.
in Access tables and 1. Open the Library database you created in this unit.
queries to create mail -
2. Double-click the 'Books' report in the Access objects list. The
merge documents.
report will open in your main work area.
Reports cannot be
used in mail -merge 3. Click the 'External data' tab in the Access menu.
operations. 4. Open the 'More' drop-down box in the 'Export' section of the
ri bbon.
. ... .
... ..
Books
Export
Qi Word
Export the selected object to Rich
0 « Text
p
Export to RTF file
~
Northside Schc J E
.rJ catalogue
e
Export selected obJect to a Rich Text
Format fil~
ODBt
tt I . . . . . MIJ,"7\f....U.•ru.nts.'-..,_ ....,_.,.,.,_,...1'1111nft11--.C,C8111.,.
merge documents in a word processor. In that ~ - N. . .~rt. .
[ oxfordsecondary.com/just-click-3e
Relational databases
A database typically has several tables in it. The one you have
Almost everything created has two tables so far - for pupils and for books. Modern
you do in the modern databases are typically relational. That means the different tables
world creates data. are linked together by 'relationships' between the tables. These links
The data you create is typically use the primary key of each table to link it into a different
stored in a database. table.
Buying goods online
or in -store, visiting In the library, when a pupil borrows a book, the librarian m ust
your doctor, voting record:
in elections: all these • the date of the loan
activities and many • which book was borrowed
more create data. • which pupil borrowed the book.
Large collections of
data have become Because details of books and pupils are already stored in the
known as big data. database, there is no need for the librarian to type the full title of the
People called data book or the name of the student. Instead, the librarian only needs
analysts process to input:
big data looking for • the code of the book
patterns. Patterns • the pupil code.
in data can provide
knowledge to help Automatic data entry
organizations to make In a real library, the librarian might input the book code by scanning
decisions. For example, a magnetic strip inside the book cover, or a barcode at the back
analyzing data about of the book. The librarian might input the pupil code by scanning
patients can help a barcode on the library ticket. Perhaps you have seen people
health services learn in shops or libraries input codes using handheld scanners. This
about the causes of greatly speeds up the work of the librarian or shop assistant.
illnesses like cancer.
If you see this happening, you will know that t here is a database
installed in the shop or library, and that the code that is scanned in
is a primary key that links to a database. In a typical computerized
library system, the computer will automatically add the date to each
loan record. This means that the job of the librarian is made much
quicker and simpler.
1. What is meant by the term 'digital b. What is the domain name in this
footprint'? How might your digital address?
footprint be harmful to you in the c. What is the meaning of HTIPS in the
future? address?
and activities
... have
' . learned in this
. ........ ,,.
un.it o.n y,qu r qwn ~nd ir:i a g~Qup... ...... . ............
Author Person responsible for w riting an item of Block prevent an individual fro m accessing public
content (e.g. web article). information published on the Internet, for exam ple,
on social med ia sites.
Autonomous vehicle a veh icle that uses com puter
and robotics technologies to t ravel w ithout human Blog short for 'web log'. A blog is an on line j ournal or
control. diary of an individual's opi nions and latest news. It is
updated regularly and displayed in chronological o rder.
Backspace keyboard key that deletes a single
character to the left of the cursor. Bluetooth a method of connecting devices to a
com puter w i relessly
Backup a copy of a file, usually stored in a different
physical location. A backup can be used if the Body the main area of a document (e.g. word-
original is lost o r damaged . processed docu ment o r web page) where text and
images are d isplayed.
Bandwidth the amount of data that can be
transmitted over a mediu m such as a data cable Bold a method of em phasizing text in a docu ment
over a fixed amount of t ime. using a strong, dark font.
..
Bookmark a record of a website address, saved so Case sensitive a com puter function in which letter
that the page can be found qu ickly in the futu re. characters, in a password for example, must be
typed using the correct case.
Border a blan k area around the edge of a
document to make it easier to read. Cell a spreadsheet is d ivided into horizontal rows
and vertical colum ns creating a grid of cells to hold a
Broadband a transmission med ium that has a high
single piece of data (e.g. a nu m ber, label o r formula).
bandwidth and can carry high volu mes of data.
Cell address the posit ion of a cell in a spreadsheet.
Broadcast a method of transmi tting data where For exam ple, the cell G34 w ill be found in colum n G
transmissions can be picked up by anyone w ith a of row 34.
receiver (e.g. rad io signals).
Cell border a line around the edges of a cell, used
Browsing searching the web for information using to separate it from su rround ing cells.
a web browser.
Citation a statement inform ing a reader that a
Bulleted list a list in a document in wh ich each list piece of content in the docu ment is fro m another
item starts w ith an icon, usually a dot. sou rce. A citation w ill describe the sou rce, e.g. who
Bulletin board a comm unication method on the w rote the information and when.
Internet. Users post messages called bulletins. Any Click the action of pressing and releasing a mouse
mem ber of the group can read and respond to the button to cause an action to take place in a software
message so that a conversation takes place over t ime. appl ication (e.g. make a menu selection).
Bus a fast link that is used to carry data between Click and hold the action of pressing and hold ing
the com ponents inside a com puter processor. a mouse button to cause an action to take place in a
software application (e.g. to select and move a piece
Bystander a term used for someone who stands
of text o r image in a docu ment).
by and does noth ing when they experi ence
cyberbullying. Clipboard an area where items that are copied o r
cut from a docu ment are stored te mporari ly before
Byte the basic unit of storage used by a com puter.
being pasted into a new location.
A byte is a group of eight binary digits (bits).
Cloud storage com puter storage that exists on the
Cable a w ire used to connect the com ponents of Internet.
a com puter system o r devices in a network. Cables
are usually made of copper though some fi bre- optic Coaxial cable a type of copper cable used for data
cable is used in networks. t ransmission. Rarely used in modern networks.
Carpal Tunnel Syndrome (CTS) a condition that Column A spreadsheet is div ided into horizontal
causes joint pain in the fingers and hands. CTS can rows and vertical colu m ns creating a grid of cells to
be caused by prolonged use of a com puter. hold data.
Command line interface a method of giving Copy a function used to place a repl ica of data
instruction to a com puter operating system that on a v irtual cli pboard (wh ile leaving the o riginal in
involves typing commands line- by- line. place) so it can be 'pasted'. often multiple times,
elsewhere.
Compatible when the com ponents of a com puter
system w ill work successfully together, they are said Copyright legal concept designed to provide
to be com patible. creators and owners of o riginal works w ith exclusive
rights to that work's use and d istribution.
Computer engineer an IT j ob that involves
researching, designing, developing and testing Creative Commons a method of licensing content
com puter systems. shared over the web. A Creative Commons licence
is published w ith the content so that permission
Computer ethics the mo ral pri nciples that gu ide
does not have to be sought to use the content.
how we use com puters; eth ical issues in computing
include obseNing intellectual property rights and Criterion a cond ition used to search for records in
behaving responsibly onl ine. a database, e.g. student_surname = 'Smith'.
Computer network com puters that are joined Cursor keys fou r arrow keys on the keyboard that
together so that they can share data, and resources move the cu rsor around a docu ment.
such as printers and storage devices.
Customer-facing any computer system o r j ob that
Computer system a set of com puter hardware and
is concerned w ith the needs of customers o r users.
software com ponents that can be used to com plete
a task. Cut a tool used to remove o r excise data from a fi le
o r document, retaining it on a virtual cl ipboard so it
Computer Vision Syndrome (CVS) a condition
can be 'pasted' elsewhere.
caused by strain on eye m uscles that can result from
viewing a com puter screen for long periods. Cyber bullying using the Internet and mobile
Condition A logical statement that can be j udged phone technology to bully and th reaten othe rs.
to be t rue o r false, e.g. age> 16. Data raw unprocessed facts.
Conditional statement a statement that says
Data file a collection of records holding the same
what action w ill be taken if a condition is true. For
type of information.
exam ple, if it is raining THEN put on hat.
Database administrator an IT role that
Connector a word used to link condit ional
involves creating and managing reports using an
statements together. AND and OR are commonly
o rganization's databases.
used connectors. For example, Age > 12 AND
Age< 18. Decision box a diamond- shaped box w ith one line
Control key a special key on a com puter keyboard in and two lines out, used to show where a decision
that is used together w ith letter keys to carry out is made in a flowchart .
commands. For exam ple, Control+ P can be used Delete a com puter key o r menu icon that deletes
to pri nt a document. highl ighted text in a docu ment. The delete key on
Control unit the com ponent in a com puter a keyboard deletes a character to the ri ght of the
processor that controls the work of all other cu rsor.
com ponents.
Desktop the working area of a com puter screen
Copper cable the most common type of cable used t hat contains all the files and links a user needs
to make a wired connection in a com puter network. when they start a com puter session.
..
Desktop computer a personal com puter system Domain name the name of the website on which
designed to be permanently located on a desktop. a resou rce may be found, e.g. oup.co.u k.
A desktop com puter consists of a case which houses
Double-click the action of pressing and releasing a
the com puter processor and main storage devices.
mouse button twice in qu ick succession to cause an
Other com ponents such as a keyboard and screen
action to take place on a computer (e.g. opening a
are connected using cables.
data file).
Desktop publishing (DTP} a software application
Dry run a method of testing a com puter algorithm
that helps a user create docu ments that com bine
using test data. A dry run is used so that problems
text and images in graph ical designs (e.g. magazines,
in the design can be el imi nated before ti me is spent
fliers, adverts).
w riting a com puter program.
Digital being made up of nu m bers. The word
Duplex a form of data communication where both
usually refers to data that is stored in the form of
parties can communicate at the same t ime using the
binary num bers, using the digits Oand 1.
same connection.
Digital camera a device that captu res images in
Email mail or messages t ransmitted electron ically
digital form as files that can be stored and processed by com puters via commun ication channels. It is
by a com puter usual for such messages to be held in a central store
Digital data data that is represented using the for retri eval at the user's conven ience.
binary digits O and 1. Digital data can be stored and Email address an add ress attached to an email
processed by a com puter. to ensu re it reaches the intended destination. For
Digital device any device that can store or process exam ple, DavidJones@gmail.com.
digital data, usually as part of a com puter system. Encryption a method of coding data so that it
Digital footprint the trail of activity a person leaves cannot be read if stolen o r lost.
in the publ ic domain as a result of their actions on Enter key the key on a com puter keyboard that is
social media and other Internet services. used to start a new line o r paragraph of text when
Digital media the ability to create, view, d istri bute, entering data.
mod ify and store data or music on d igital Ergonomics the science of designing j obs and
electron ics devices. equ ipment to suit the needs of people.
Digital recording the use of a com puter input Ethernet the rules that govern how devices
device to capture sound and convert it to a digital comm un icate w ith each other in a local area
file that can be stored on a com puter. network.
Digital Visual Interface (DVI} a type of socket Exclusion a method of harassing a person onli ne
and cable used to connect a com puter screen to a that involves publ icly rejecting the person from
com puter system. social groups and events.
Directional arrow one of four keyboard keys used Exit condition a condit ion in a logical statement
to move the cursor around a document on screen. which if true causes a loop to end.
Discussion forum a method of on line Export sending data from one software application
comm unication that involves leaving messages to be used in another. For exam ple, data from a
on a public online forum to be answered by any database may be exported to a word processor to
mem ber of the forum . be used in a mail merge.
Extreme data a term used in testing a program Flowchart a visual algorith m that uses vari ous
or algorith m that describes data that will test shapes of box to represent input, output and
the boundary of any conditional statement. For processing tasks.
example, extreme data for the cond ition x> 10 is x=9,
Folder a container used to group files of a similar
x= 10 and x= 11.
type or pu rpose together on a computer storage
Fibre- optic cable a type of cable used to connect device. Folders are used to organize fi les to make
network devices. Fibre-optic cable carri es data as them easier to manage and retrieve.
pulses of light. It can carry large amounts of data
Font the shape of a set of characters used in a
over long distances.
document. Different fonts are used to create a design
Field usually formi ng a column in a database or that suits the purpose of a document. The size and
spreadsheet table, a field is a data element that colou r of a font can be changed within a document.
occurs in the same format in every record of a table.
Footer an area at the bottom of each page in a
Field name a name describing the data held in a document. The footer is used to hold information
field. The field name may be used in queri es, and like the page number and date of a document.
calculations. Format the design featu res that have been appl ied
File a document, image or collection of data in to text, images and other content in a document.
digital format that may be saved and processed by a The format wi ll include the font, font size, font
computer colou r and any special effects.
File compression a method used to make a file Formula bar a section of a spreadsheet that shows
smaller Compressed fi les take up less space on the formula that is contained in the cu rrent cell.
storage devices and can be sent more quickly over Forum an on line area where members of a group
the Internet. Most image, aud io and video files are can contri bute to discussions on a subject over a
com pressed. long period.
File Explorer the file manager used in M icrosoft Function in a spreadsheet, a pre-defined form ula
Windows operating system. that carries out complex actions or calcu lations
File format the method used to store a data file. (e.g. AVERAGE function works out the average value
Different types of file are stored using different of a list of numbers).
methods. The file format is indicated by a code wh ich Graphical user interface (GUI} a method of using
follows the filename (e.g. myfileTXT is a text file). a computer operating system that uses icons and
File manager a software tool, usually part of a other graphics that are selected using mouse cl icks.
computer operating system, that allows you to find, Graphic design a job that is associated with the
browse and open files on a storage device. many IT tasks like the production of web pages and
Filename the name given a file by a user. game design.
A filename helps the user find the file when they Group putting items such as data and files together
need to retrieve it. so that a single process can be applied to them. For
Firewall system software that uses rules to decide exam pie, a group of fi les can be deleted.
which data may enter or leave a network. Half-duplex form of data comm unication
Flash memory drive a small portable storage where both parties can communicate using the
device; usually used to transfer files between same connection but only one party can use the
devices. connection at any time.
..
Handheld scanner a scanner that is held in the Image any graphical content used in a docu ment.
hand and passed over a docu ment to create a Images may include photographs, maps, diagrams
digital file. o r charts.
Hard skills the techn ical skills needed to do an Infrared sensor a sensor used in robots and other
IT j ob. com puter-controlled devices. The sensor uses
infrared light to detect the d istance of objects.
Hardware the physical com ponents of a com puter
system such as the CPU, memory, input, output and Inkjet printer a pri nter that sprays tiny dots of in k
storage devices. onto a sheet of paper to form words and images.
Header an area at the top of each page in a Input captu ri ng data from the outside world
document. The header is used to hold information and enteri ng it into a com puter to be stored and
like the title and author of a docu ment. processed.
Heading a short piece of text that is used to Input/output box a parallelogram (tilted
rectangle)- shaped box w ith one line in and one li ne
identify a section of text in a document. Headings
out, used to show where information is input o r
usually use a large font that stands out from the rest
of a document. output in a flowchart.
Hypertext Transfer Protocol Secure (HTIPS) a Internet Protocol (IP) rules that govern how data
secure version of HTIP. HTIPS uses ciphers when is sent across the Internet.
send ing information over the Internet so that
Intrusion detection system (IDS) software that
messages cannot be read if they are intercepted.
detects when unauthorized access to a network has
Icon a small image used to represent a fi le, occu rred so that measu res can be taken to prevent
program o r function on a com puter. fu rther access.
IPO model the Input- Process- Output model is Link a piece of text o r image in a web page that, when
used to describe any computer system o r function. clicked, takes the reader to another web location.
All systems m ust include input, process and output.
Liquid crystal display (LCD) a technology used in
The model usually includes storage as a fourth
modern computer and television screens.
element.
Local area network (LAN) a network of computers
Italic an effect added to a font that tilts letters to
connected in a small geographical area.
the right. Used to add emphasis to text so that it is
noticed by the reader. Logo a small image used to represent the owner of
a website o r docu ment.
IT department the department that is responsible
for an o rgan ization's computer equipment, software Lower case letters that are typed when using a
and data. computer keyboard w ithout using the Caps o r Caps
Lock keys.
Iteration a section of an algorith m o r computer
program that repeats Oo r mo re t imes until a pre- Mail merge word-processing tool that d raws
determined cond ition is met. Sometimes called information from a database, usual ly a mailing list,
a loop. to print multiple copies of a document. Each copy
contains some common text, but each w ill bear, for
Justification in software appl ications, the position
exam ple, different name and add ress details.
of text o r other content d isplayed on a Iine. Content
can be justified to the right, left o r centre of the line Main memory computer storage used by a
it is on. computer to carry out its operations.
Keyboard an input device that al lows a user to Malware protection software that is designed to
type messages and data into the computer system . prevent malware being installed onto a computer
system. It is sometimes called anti-virus software.
Label text used in a spreadsheet o r database to
indicate the meaning o r purpose of a set of data items. Menu a list of options available to a user from any
screen in a software application o r website. Users
Laptop computer see definit ion for Mobile
can choose a cou rse of action from a menu.
device. (Handheld device including laptops, tablets
and smartphones.) Metropolitan area network (MAN) a network
that is large enough to extend to an area like a city
Laser printer a common type of printer that uses
o r cam pus.
a laser to electrically charge areas of a metal drum
with an electric charge. The charged d rum attracts Microphone an input device that converts
a powder called toner wh ich is transferred from the sound into a digital format that can be stored and
drum to a sheet of paper. processed by a computer.
Licence a legal docu ment that gives permission for Microprocessor a small chip of silicon that contains
a program or item of content to be used. all the components of a computer processor.
Light- emitting diode (LED) an electrical Microwave a high- frequency wave used to
component that glows when an electrical charge t ransmit data between locations where there is a
is passed through it. A technology used in some clear line of sight w ith no physical obstruction in the
computer screens (LED screen). path of the transmission.
Line graph a type of graph that uses a line to show MMS messages sent between mobile phones that
how the q uantity of someth ing changes over t ime. may contain mu ltimed ia such as images and video.
..
Mobile communications network a network Network protocol a set of ru les that govern some
built to carry mobile phone data and voice aspect of data commu nication over a network.
messages. Examples include TCP/IP, HTIPS and W i- Fi.
Modem a device used in a network to convert data Network software software speci fically designed
fro m one format so that it can be t ransmitted in to ope rate over a network o r to manage the
another format; used to enable data to be sent from operation of a network. Most modern application
a LAN over the Internet, for example. software is designed to ru n over a network.
Motherboard a board in a computer that holds all Network storage storage devices that are available
the main components of a computer including the to authorized users of a local area network.
central processing unit and main memory.
Newsgroup a method of communicating
Mouse an input device designed to allow a user to information w ith a group of people who have
navigate and use a graphical user interface by simply shared concerns.
clicking mouse buttons.
Non- biodegradable waste waste that does not
Move relocating files, text, im ages and other decay naturally and creates an environmental
content items using application o r syste m hazard.
software.
Normal data data used in the testing of algorithms
Multimedia computer documents and programs and computer programs that represents the type of
that comm un icate using several forms of med ia data that w ill normally be processed.
(text, images, video and audio).
Number format a format used in application
Multimedia authoring software application software that is applied to nu mber data, e.g.
software that enables the user to create mu ltimedia cu rrency format, the nu m ber of decimal places
resources (e.g. presentation software). displayed.
Narrowband a method of t ransmitting data ove r Online harassment continual and prolonged
a network that is only capable of carrying a small bullying of a person using the Internet and m obile
amount of data over a fixed t ime. phones.
Navigation moving around a document, software Online shopping using the Internet to buy goods
application o r website using menus, mouse cl icks and services.
and other links.
Operating system software that controls the basic
Netiquette behaving cou rteously towards others operations of a computer (e.g. file storage, operation
when using the Internet. of peripherals Iike the keyboard and screen).
Network device a hardware device that is used to Output converting d igital data that is stored and
allow computers and their users to commu nicate processed by a computer into a form that can
with each other over a network. be understood by people (e.g. creating a printed
document).
Network engineer an IT j ob that involves
researching, designing, developi ng and testing Output device used to retrieve or generate
computer networks. processed information from a computer.
Overwrite existing text repIaced by text typed on a Plotter a type of printer that creates images by
keyboard when the insert key is pressed. moving pens over a sheet of paper; usu ally used to
create plans and technical d rawings.
Paragraph a block of text in a document that is
started and ended by pressing the enter key. Point-to-point a t ransmission method where
the receiver and sender are d irectly linked (e.g. a
Parallel processing a method of increasing the
telephone call).
power and speed of a computer by having two or
more processors worki ng together. Portable storage a storage device that can be
carried and connected to computers in different
Paste tool used to place cut o r copied data
locations. May be used to transfer data from one
elsewhere in a document.
location to another.
Patent a method used to protect the intellectual
Power cable a cable used to carry electri cal power
property rights of inventions.
to a computer o r other device.
Peripheral any hardware device connected to and
Presentation software application software used
control led by the Operating System (e.g. keyboard,
to create sl ideshow presentations.
screen, printer).
Primary file in mail merge, the file that contains
Persistence of data refers to the fact that images
the document that w ill be personal ized using data
and text posted on social media may remain visible
from a data fi le.
for a long time and are difficult to remove.
Process box a rectangu lar box w ith one line in and
Personal Area Network a computer network that
one line out; used to show where a process takes
connects all the devices an ind ivid ual uses to do
place in a flowchart.
their j ob (e.g. laptop, smartphone, tablet, printer).
A PAN mainly uses w ireless connections like Processor the component in a computer that
Bluetooth . carries o ut the calculations and logic operations
needed for a computer to complete tasks.
Personal computer (PC) a compu ter designed to
be used by an individual to carry out tasks such as Programmer an IT j o b that involves w riting the
word processing o r graphic design. code for computer software applications.
Physical security security measures that protect Project library a collection of media resou rces
impo rtant eq uipment using physical measu res such used to complete a mu lti media resource.
as locking it away in secure rooms.
Projector an output device that projects the
Pie chart a chart that uses a circle divided into content on the computer screen onto a large wh ite
segments to show relative size of items being board so that it can be presented to a group.
com pared w ith each other.
Pseudocode a method of creating algori thms
Pixel a picture element - a small dot of a single that uses a structu red language Iike that used in
colou r used w ith many others to make up a digital computer programmi ng languages.
image.
Publisher an indiv idual o r o rgan ization responsible
Placeholder an area defi ned in a template design for maki ng a piece of content available to be read
where a user will insert their own text o r image. in, for example, a document o r website.
Plagiarism copying the work of another person Quarantine The process of maki ng a malware
and claim ing it as you r own. infected file safe when detected by anti-virus software.
..
Query a search based on criteria carried out in a in a form ula depending on the row it is copied to.
database appl ication. For exam ple, if the form ula in cell B4 is =B2+B3, it
becomes =C2+C3 when copied to the cell C4.
QWERTY the standard keyboard used on all
com puters. The name comes fro m the fi rst six letters Rename to change the name of a file of folder.
on the top row of the keyboard.
Repetitive strain injury {RSI) pain about the body
Radio wave a method of transmitting a signal caused by, for exam ple, lengthy o r im proper use of
between a transmitting device and a receiving device. com puters.
Random-access memory (RAM) data storage Report an output document fro m a database
used by a com pute r processor to support its own appl ication that is well structu red and designed to
operations. RAM can be w ritten to and read from by be easy to read.
the com puter processor. Review to check a document fo r erro rs, using
Range in a spreadsheet appl ication, a gro up of cells software functions like spellcheck and by read ing
that a form ula o r function processes to provide an the document careful ly.
output. Ribbon a bar at the top of a software application
Read-only memory (ROM) memory used to store that shows the menu selections available in the
the basic commands a computer needs to operate. application.
ROM cannot be w ritten to o r changed. Robot a machine that can be programmed to carry
Receiving device in data transmission, the device out tasks w ithout hu man control.
that receives a signal fro m a transmi tting device.
Rotate to change the angle of an object (usually an
Record a collection of all the data abo ut a single image) on a page.
entity in a database (e.g. in an em ployee database,
Router connects a home o r local area network to
a record contains all the data abo ut a single person
the Internet.
worki ng for the o rgan ization).
Row a spreadsheet is div ided into horizontal rows
Recovery restoring com puter systems and data
and vertical colum ns creating a grid of cells to hold
to their o riginal state follow ing a serious hardware
data.
failure o r malware attack.
Sans serif a font that does not use seri f.
Recycle bin a folder in a com puter operating
system that is used to store files that have been Satellite connection using a satellite in space to
deleted so that a file deleted in erro r can be t ransmit data signals.
recovered.
Scroll bar bars to the side and below a docu ment
Register a small area of memory in a com puter used to navigate a large document.
processor that is used to hold data d uring the
Sensor any device that senses condit ions in the real
fetch- decode- execute cycle.
world and inputs them in d igital form to a com puter
Relational database a database in which data can system. Sensors are used in robots and contro l
be accessed and processed thro ugh relationsh ips systems, e.g. tem perature sensors in a com puter-
that exist between data tables. contro lled heating system.
Relative copying in a spreadsheet, relational Serif a small decorative proj ection in the shape of
copying changes the row (or colum n) references a font.
Server room a room at the centre of a network Software tester an IT j ob that involves testing
where impo rtant network equ ipment like servers are computer programs to make su re they work as they
stored secu rely. are designed to.
Short Messaging Service (SMS) a method of Software trainer An IT job that involves training
send ing short text messages using a mobile phone. people to use software applications and computer
systems effectively.
Simplex a form of data comm unication where
communication takes place in only one d irection Sort a function in software applications like
(e.g. a loudspeaker system). spreadsheets and databases that sorts data records
into al phabetic o r nu meri c o rder.
Slide sorter a function in a presentation
application that allows sl ides to be easily accessed Spacebar the keyboard key that inserts a space
and sorted into the desi red o rder. between words.
Smart device any mechanical device that is Spreadsheet a software application designed to
process nu m ber data.
control led by a m icroprocessor and is connected to
the Internet (e.g. a smart fridge). Start button a button in W indows that provides
q uick access to available appl ication programs and
Smartphone a mobile phone w ith bu ilt-in
utilit ies.
comput ing power, like that found in a tablet
computer. Storage device peripheral device used to store
user data fi les (e.g. digital photographs, word-
Social media web- based tools that help friends
processed docu ments).
and people w ith shared interests to commu nicate.
Storage drive a computer peripheral that is used
Soft skills non-techn ical ski lls required to be
to store documents and other data files.
successful in the workplace (e.g. team work,
communication ski lls). Storyboard a planning method that uses a comi c
book format to plan user interaction w ith a website,
Software collection of programs, procedu res and
game or application.
routines which direct the operations of a computer.
Custom-w ritten software is w ritten for use in specific Streaming service a service that streams media
organizations. Specialized software is w ri tten solely to customers over the Internet o r a phone
for one specific task. network. Streami ng supports al most instant access
to video and music w ithout the need for lengthy
Software application a computer program that is downloads.
designed to help people carry out a particular task
(e.g. word processor). Structure chart a chart w ith a t ree o r hierarchy
shape that is used to show the structu re of an
Software engineer an IT j ob that involves o rgan ization o r depart ment in an organ ization.
designing, developing and testing computer
software applications. Subscript a font effect that featu res small
text appearing below the Iine of the main text
Software piracy illegally copying and d istri buting (e.g. in Hp).
software w ithout the owner's permi ssion.
Supercomputer a very powerful computer that
Software suite a set of software appl ications is used to process large amounts of data at high
that are designed to work together (e.g. M icrosoft speed. Used for complex scientific and financial
Office). processing.
..
Superscript a font effect that featu res small text Taskbar A bar, usually found at the bottom of the
appeari ng above the line of the main text (e.g. in 32 ). computer screen that provides links to tasks that are
cu rrently o pen.
System development a team function in an IT
department responsible for planning, bu ilding and Telecommuting worki ng fro m home using the
testing new computer systems. Internet and email.
System-facing any com puting j ob that is Template a ready-made docu ment design that
concerned w ith the needs of an o rgan ization's includes styles and layout featu res.
IT systems. Terminator A rectangular box w ith rounded
System requirement a descript ion of com puter corners used to indicate the start and end of a
characteristics needed for a piece of software o r flowchart algori thm.
hardware to work successfully w ith the computer. Test data data created to test every expected action
System specification a description of the carried out in an algorith m o r com pute r program.
characteristics of a com puter. A specification will Text wrap a formatting option used to w rap text
include the processor type, amount of memory, around an image inserted in a docu ment.
and types of connector available.
Thumbnail a small image used in a graphical user
Systems administrator an IT job that involves interface to represent a larger docu ment o r graphic.
responsibility for the reliable o peration of com puter
Trace table a table used to record the inputs,
systems.
stored values and outputs when testing a program.
Systems analyst an IT j ob that involves analysing
Transistor an electrical component that acts like
the data and processing needs of an o rganization
a switch. Transistors replaced vacuum tubes in
before com puter systems are created. com puters in the 1950s, leading to smaller, mo re
Systems operator an IT j ob that involves carrying powerful and mo re rel iable com puters.
out day- to-day scheduled tasks that ensu re Transition in a presentation, the way one sl ide
computer systems continue to work efficiently. changes smoothly to the next slide.
System software computer programs that are Transmission Control Protocol (TCP} a set of
designed to make the com puter hardware, input rules that allow compu ters and other devices to
and output devices and application software work communicate w ith each othe r when connected
together. in a network.
Systems support a team in an IT department Transmission medium the med ium by
responsible for supporting system users through which messages are sent between two po ints
functions such as a helpdesk and training. (e.g. fibre- optic cable).
Table a design feature in a software application that Transmitting device in data transmission, the
is made up of rows and colum ns. Tables are used to device that sends a signal that is received by one o r
lay out structu red data (e.g. a timetable). mo re receiving devices (e.g. radio t ransmitter).
Tablet computer a portable com puter w ith all the Trip hazard a health and safety risk that can lead
peri phe ral components bu ilt into a slim lightweight to people tri pping and sustaining an injury. In a
case. A tablet usually has a touchscreen to replace computer room, carelessly positioned cables can be
the keyboard and mouse found on a standard PC. a t ri p hazard.
Troubleshooting investigating problems in a Variable a named memory location in a com puter
computer system program or application program. Variable names
can be used in calculations and logical statem ents.
True colour a method of storing colour as digital
data. True colou r uses three bytes to store mo re Video camera a camera that can captu re moving
than 16 mi ll ion shades of colour. images.
Twisted pair cable the type of copper cable Video conferencing to hold meetings between
typically used to connect devices in a network. The people in remote locations using the Internet and
cable consists of pairs of thin strands of copper so com puters equipped w ith video cameras and
that data can travel in both directions. The cables microphones.
are twisted to reduce interference.
Video Graphics Array (VGA} a standard used
Underline A method of em phasizing text in a to d isplay low- resolution graph ics to a com puter
document by adding a line beneath the text. screen. Also used to descri be the type of cable used
to connect a VGA screen to a com puter.
Undo a button available in most software
applications that reverses the last action performed Voice recognition analysis of a hum an voice by a
by a user. com puter that enables the sound to be converted
Unicode a code that allows letters and other into data input o r commands that control how the
keyboard characters used in many thousands com puter operates.
of languages to be stored and processed by a VoIP Voice Over Internet Protocol, a set of rules
com puter. that allow telephone voice messages to be carried
Uniform resource locator (URL} the address of a over the Internet
web page, used to find and d isplay the web page in VR headset an output device that com pletely
a web browser. covers the eyes creating a virtual 3-d imensional
Universal Serial Bus (USB} a type of socket and environ ment that the wearer can interact w ith.
cable used to connect many types of peri pheral Web browser a software appl ication used to read
device to a computer. web pages.
Uppercase (capitaJs} capital letters typed when Web camera (webcam} an input device that can
holding the Shift key on a com puter keyboard. be used to create digital video to be stored on a
Upstander a social media use r who acts posit ively com puter o r t ransmitted directly over the Internet.
in the face of negative o r threaten ing online
Web conferencing using a range of Internet
behaviour.
technologies to hold formal meetings where
User interface the way that a person uses software the participants are in remote locations. Web
and computer devices to operate a com puter system. conferences can use video conference equ ipment,
shared whiteboards, presentations and collaborative
Vacuum tube (vaJve} a large electrical com ponent
docu ments.
that looks like a light bulb. Used in early com puters
because it acts like a switch when electricity is Web designer a person whose j ob it is to design
passed th rough it websites, often for a nu m ber of different com panies
o r individuals.
Value num ber data in a com puter system that can
be used in arithmetic calculations.
..
Web page a single page w ritten in HTML that can Wireless connection a connection to a network
be accessed over the Internet and read using a web that does not use a cable to make the connection.
browser. Wi-Fi and Bluetooth are examples of w ireless
connection methods.
Web page editor application software that al lows
a user to create HTML pages for publication on Wireless network a form of network that does not
the web. req uire cabl ing.
Web server a network com puter that provides Word processing using a com puter to create text
a service to network users. For exam pie, a print documents such as letters and repo rts.
server allows users to pri nt documents to a network
Word processor a type of appl ication software
pri nter. used to create text documents such as letters and
Website set of interconnected web pages, usually repo rts.
located on the same server, and maintained Word wrap a feature that automatically starts
as a collection of information by a person o r a new line of text when the text entered into a
organization. document goes beyond the margins of a page.
Wide Area Network (WAN) a network of Worksheet a single worksheet in a spreadsheet
computers connected over a large geographical area. file. A spreadsheet file can contain several linked
devices like laptop com puters and tablets to make a World Wide Web (WWW or web) method of
wireless connection to a network. accessing information on the Internet using a web
browser
Wireframe a method used to design docu ments
that shows the position of im portant features like Zip a method of compressing data fi les to save
headings, men us and images. storage space.
Google 138-9, 253 web pages 223, 228- 9 letters, mail merge 82- 5
government databases 265 indexes, search engines 210- 11 library databases 242,253,264
GUI see graphical user interface inkjet printers 114 liquid crystal displays (LCDs) 114
input 242- 3 lists 70- 1
hackers 207 input devices 13, 14, 16, 27, 112- 13 local area network (LAN} 37, 122,
.
OXFORD
'UNIVERStrY PRESS
You must not circulate this work in any other form and you must
impose this same condition on any acquirer
978-1-38-200411-4
10 9 8 7 6 5 4 3 2 1
Acknowledgements
The publisher and authors would like to thank the following for
permission to use photographs and other copyright material:
Google and the Google logo are registered trademarks of Google LLC,
used with permission.
This third edition has been fully revised with scaffolded topics
that develop students' theoretical and practical knowledge in
Information Technology, encouraging independent learning and
providing a foundation for further study.
ISBN 978-1-382-00411·4
HI 11111111
9 781 382 004114