Complete Elective ICT SHS - New
Complete Elective ICT SHS - New
1st EDITION
Contact:
Dunyo Hans Kwaku Richard
+233 247329855
P.O. Box 191, Akatsi V/R
dunyofontata@gmail.com
dunyohans
1
ACKNOWLEDGEMENT
Hans Series Elective ICT for West African Senior High Schools is based on research conducted on the
internet, articles, journals, books and libraries. We are very grateful for the supports from our colleagues,
friends and students for encouraging us to start, preserve and finally published this book.
We cannot do without recounting on certain personalities who have contributed to the success of this
project. Our first and most acknowledgement go to the Almighty God for granting me the wisdom, good
health and the necessary strength for this project.
We also appreciate the efforts of Mr. Agyeman (my HOD at Akroso SHTS) and Mr. Patrick a.k.a Bone (ICT
Teacher at Akroso SHTS).
Lastly, this book could not have been completed without the efforts of Blinks for his unfailing support,
ideas and encouragement.
Copyright 2021 Hans Series ©. All Rights Reserved. May not be copied, scanned, or duplicate, in whole or
in part.
2
DEDICATION
This book is dedicated to all the elective ICT students and teachers.
3
TABLBE OF CONTENT
ACKNOWLEDGEMENT ............................................................................................................................................2
DEDICATION...........................................................................................................................................................3
CHAPTER ONE (1) .................................................................................................................................................11
INTRODUCTION TO INFORMATION SYSTEMS .......................................................................................................11
LESSON OBJECTIVES .................................................................................................................................................. 11
INFORMATION vs DATA ............................................................................................................................................. 11
QUALITIES OF A GOOD INFORMATION ..................................................................................................................... 11
CLASSIFICATION OF INFORMATION .......................................................................................................................... 12
PROCESSES (BUILDING BLOCKS) FOR THE DEVELOPMENT AND PRESENTATION OF INFORMATION ....................... 13
THE ROLES OF INFORMATION IN THE SOCIETY ......................................................................................................... 13
MEDIA TYPES USED IN PRESENTING INFORMATION ................................................................................................. 14
SYSTEM ...................................................................................................................................................................... 16
INFORMATION SYSTEM ............................................................................................................................................. 16
MAJOR COMPONENTS OF AN INFORMATION SYSTEM ............................................................................................. 16
FORMS OF INFORMATION SYSTEM ........................................................................................................................... 18
TYPES OF INFORMATION SYSTEM ............................................................................................................................. 21
REASONS WHY BUSINESS USE INFORMATION SYSTEMS .......................................................................................... 22
FACTORS THAT INFLUENCE THE MATCHING OF AN INFORMATION SYSTEM TO AN ORGANIZATION INFORMATION
REQUIREMENT ........................................................................................................................................................... 23
ATTRIBUTES OF A GOOD INFORMATION SYSTEM ..................................................................................................... 23
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) ............................................................................................................... 24
LESSON ASSESSMENT ................................................................................................................................................ 24
CHAPTER TWO (2) ................................................................................................................................................27
INTRODUCTION TO DIGITAL TECHNOLOGY CULTURE ............................................................................................27
LESSON OBJECTIVES .................................................................................................................................................. 27
DIGITAL CULTURE ...................................................................................................................................................... 27
GENERAL ISSUES OF THE DIGITAL CULTURE .............................................................................................................. 27
THE INTERNET ............................................................................................................................................................ 27
COMPUTER CRIME..................................................................................................................................................... 28
INFORMATION TECHNOLOGY.................................................................................................................................... 29
THE ROLE AND IMPACT OF INFORMATION TECHNOLOGY ON; ................................................................................ 29
LESSON ASSSESSMENT .............................................................................................................................................. 32
CHAPTER THREE (3) ..............................................................................................................................................34
INTRODUCTION TO COMPUTER HARDWARE ........................................................................................................34
4
LESSON OBJECTIVES .................................................................................................................................................. 34
COMPUTER HARDWARE ............................................................................................................................................ 34
INPUT DEVICES .......................................................................................................................................................... 34
PROCESSING DEVICES ................................................................................................................................................ 36
OUTPUT DEVICE ......................................................................................................................................................... 41
STORAGE DEVICES ..................................................................................................................................................... 43
COMMUNICATION DEVICES ...................................................................................................................................... 50
SYSTEM UNIT ............................................................................................................................................................. 50
BOTH INPUT AND OUTPUT DEVICES (DUAL DEVICES) ............................................................................................... 53
LESSON ASSESSMENT ................................................................................................................................................ 54
CHAPTER FOUR (4) ...............................................................................................................................................57
COMPUTER DATA REPRESENTATION ....................................................................................................................57
LESSON OBJECTIVES .................................................................................................................................................. 57
DATA REPRESENTATION ............................................................................................................................................ 57
DATA TYPE ................................................................................................................................................................. 57
DATA ORGANIZATION AND BIT PATTERN ................................................................................................................. 58
HOW CHARACTERS ARE REPRESENTED ..................................................................................................................... 58
UNIT OF DATA STORAGE ........................................................................................................................................... 58
CHARACTER CODES (CODING SCHEMES) .................................................................................................................. 59
BIT PATTERN REPRESENTATION (4-BIT REPRESENTATION)....................................................................................... 59
BINARY ARITHMETIC .................................................................................................................................................. 59
NUMBER SYSTEM ...................................................................................................................................................... 61
LESSON ASSESSMENT ................................................................................................................................................ 64
CHAPTER FIVE (5) .................................................................................................................................................67
INTRODUCTION TO COMPUTER SOFTWARE .........................................................................................................67
LESSON OBJECTIVES .................................................................................................................................................. 67
COMPUTER SOFTWARE ............................................................................................................................................. 67
CLASSIFICATION (TYPES) OF COMPUTER SOFTWARE................................................................................................ 67
SYSTEM SOFTWARE ................................................................................................................................................... 68
APPLICATION SOFTWARE .......................................................................................................................................... 72
LESSON ASSESSMENT ................................................................................................................................................ 73
CHAPTER SIX (6) ...................................................................................................................................................76
PERSONAL COMPUTER, HARDWARE MAINTENANCE AND SOFTWARE INSTALLATION ..........................................76
LESSON OBJECTIVES .................................................................................................................................................. 76
PC DIAGNOSTIC.......................................................................................................................................................... 76
5
COMMON PROBLEMS ............................................................................................................................................... 76
TYPICAL HARDWARE PROBLEMS ............................................................................................................................... 76
SYSTEM TROUBLESHOOTING SKILLS ......................................................................................................................... 77
TYPES OF TROUBLESHOOTING .................................................................................................................................. 78
HARDWARE TROUBLESHOOTING .............................................................................................................................. 78
SOFTWARE TROUBLESHOOTING ............................................................................................................................... 81
PC MAINTENANCE ..................................................................................................................................................... 82
SETTING UP A COMPUTER ......................................................................................................................................... 84
INSTALLATION AND UPGRADING OF COMPUTER SOFTWARE .................................................................................. 86
BOOT DRIVE OR DISK ................................................................................................................................................. 88
CMD ........................................................................................................................................................................... 90
LESSON ASSESSMENT ................................................................................................................................................ 90
CHAPTER SEVEN (7) ..............................................................................................................................................93
INFORMATION AND COMMUNICATION TECHNOLOGY IN EDUCATION .................................................................93
LESSON OBJECTIVES .................................................................................................................................................. 93
ICT IN EDUCATION ..................................................................................................................................................... 93
ICT INTEGRATION INTO EDUCATION ......................................................................................................................... 93
COMPUTER BASED INSTRUCTION ............................................................................................................................. 93
EDUCATIONAL MULTIMEDIA ..................................................................................................................................... 93
INSTRUCTIONAL DESIGN ........................................................................................................................................... 94
MULTIMEDIA ............................................................................................................................................................. 94
LEARNING TECHNOLOGIES INCLUDE THE FOLLOWING ............................................................................................ 96
APPLICATION PACKAGES USED FOR TEACHING AND LEARNING. ............................................................................. 96
FACTORS TO CONSIDER WHEN INTRODUCING MULTIMEDIA IN INSTRUCTIONAL DESIGN ...................................... 96
ADVANTAGES AND DISADVANTAGES OF MULTIMEDIA IN EDUCATION ................................................................... 97
LESSON ASSESSMENT ................................................................................................................................................ 98
CHAPTER EIGHT (8).............................................................................................................................................100
SPREADSHEET APPLICATION .............................................................................................................................. 100
LESSON OBJECTIVES ................................................................................................................................................ 100
SPREADSHEET .......................................................................................................................................................... 100
EXCEL 2010 ─ EXPLORE WINDOW ........................................................................................................................... 100
EDITING WORKSHEET .............................................................................................................................................. 105
FORMATTING WORKSHEET ..................................................................................................................................... 109
DATA HANDLING...................................................................................................................................................... 110
USING FUNCTIONS & FORMULAS............................................................................................................................ 114
6
THE IMPORTANCE OF AN ELECTRONIC SPREADSHEET APPLICATION ..................................................................... 125
LESSON ASSESSMENT .............................................................................................................................................. 125
CHAPTER NINE (9) ..............................................................................................................................................130
INTRODUCTION TO DATA PROCESSING SYSTEMS ............................................................................................... 130
LESSON OBJECTIVES ................................................................................................................................................ 130
DATA ........................................................................................................................................................................ 130
DATABASE ................................................................................................................................................................ 130
DATA INTEGRITY ...................................................................................................................................................... 130
DATABASE MANAGEMENT SYSTEM (DBMS) ........................................................................................................... 131
DATABASE CONCEPTS AND TERMINOLOGIES ......................................................................................................... 131
DATABASE DESIGN................................................................................................................................................... 134
DATABASE DEVELOPMENT LIFE CYCLE .................................................................................................................... 135
CREATING A DATABASE ........................................................................................................................................... 136
MANAGING DATA IN A DATABASE .......................................................................................................................... 160
WORKING WITH REPORTS ....................................................................................................................................... 161
RELEVANCE OF MICROSOFT ACCESS ....................................................................................................................... 161
LESSON ASSESSMENT .............................................................................................................................................. 161
CHAPTER TEN (10) ..............................................................................................................................................166
INTRODUCTION TO PROGRAMMING LANGUAGES.............................................................................................. 166
LESSON OBJECTIVES ................................................................................................................................................ 166
COMPUTER PROGRAMMING (CODING) .................................................................................................................. 166
COMPUTER PROGRAM ............................................................................................................................................ 166
PROGRAMMING LANGUAGE ................................................................................................................................... 166
HOW DOES A COMPUTER PROGRAM WORK? ........................................................................................................ 167
HISTORY OF PROGRAMMING LANGUAGE ............................................................................................................... 167
CATEGORIES OF PROGRAMMING LANGUAGE ........................................................................................................ 167
DIFFERENCES BETWEEN LOW-LEVEL LANGUAGE AND HIGH-LEVEL LANGUAGE .................................................... 171
GENERATIONS OF COMPUTER LANGUAGE ............................................................................................................. 171
FEATURES OF PROGRAMMING LANGUAGES .......................................................................................................... 172
TERMINOLOGIES USED IN PROGRAMMING ............................................................................................................ 174
PROGRAM DEVELOPMENT LIFE CYCLE .................................................................................................................... 175
ALGORITHMS ........................................................................................................................................................... 176
TECHNIQUES FOR REPRESENTING ALGORITHMS .................................................................................................... 177
ALGORITHM BUILDING BLOCKS............................................................................................................................... 179
LESSON ASSESSMENT .............................................................................................................................................. 186
7
CHAPTER ELEVEN (11) ........................................................................................................................................190
INTRODUCTION TO DESKTOP PUBLISHING APLPLICATION .................................................................................. 190
LESSON OBJECTIVES ................................................................................................................................................ 190
DESKTOP PUBLISHING (DTP).................................................................................................................................... 190
TYPES OF DTP CONTENT .......................................................................................................................................... 190
EXAMPLES OF DESKTOP PUBLISHING APPLICATIONS ............................................................................................. 190
THINGS YOU CAN DO WITH DESKTOP PUBLISHING ................................................................................................ 191
FEATURES OF THE DESKTOP PUBLISHING APPLICATION ......................................................................................... 191
DESIGNING PUBLICATIONS ...................................................................................................................................... 192
PLANNING A PUBLICATION FOR DESIGNING ........................................................................................................... 193
DESIGNING PUBLICATION ........................................................................................................................................ 193
EDITING PUBLICATION............................................................................................................................................. 193
FORMATTING BACKGROUND OF PUBLICATION ...................................................................................................... 193
FORMATTING TEXT IN A PUBLICATION. .................................................................................................................. 193
PRINTING A PUBLICATION ....................................................................................................................................... 193
WHY IS DESKTOP PUBLISHING IMPORTANT? .......................................................................................................... 193
PRACTICAL ASPECT .................................................................................................................................................. 194
TRIALS ...................................................................................................................................................................... 199
LESSON ASSESSMENT .............................................................................................................................................. 199
CHAPTER TWELVE (12) .......................................................................................................................................202
INTRODUCTION TO COMPUTER NETWORKING ................................................................................................... 202
LESSON OBJECTIVES ................................................................................................................................................ 202
COMPUTER NETWORK ............................................................................................................................................ 202
REASONS FOR USING A NETWORK .......................................................................................................................... 203
TERMINOLOGIES ASSOCIATED WITH NETWORKING ............................................................................................... 203
NETWORK DEVICES .................................................................................................................................................. 204
TYPES OF NETWORKS .............................................................................................................................................. 206
NETWORK TOPOLOGY ............................................................................................................................................. 210
NETWORK ARCHITECTURE ...................................................................................................................................... 214
NETWORK TRANSMISSION MEDIA .......................................................................................................................... 216
TYPES OF NETWORK TRANSMISSION MEDIA .......................................................................................................... 216
OSI & TCP/IP MODELS ............................................................................................................................................. 219
NETWORK PROTOCOLS ........................................................................................................................................... 222
IP ADDRESSES .......................................................................................................................................................... 224
NETWORK CONFIGURATION ................................................................................................................................... 225
8
DATA COMMUNICATION ......................................................................................................................................... 226
DATA TRANSMISSION MODE/DIRECTIONS ............................................................................................................. 227
DATA TRANSMISSION SIGNALS ............................................................................................................................... 227
DATA SECURITY AND CONTROL ............................................................................................................................... 228
LESSON ASSESSMENT .............................................................................................................................................. 229
CHAPTER THIRTEEN (13) .....................................................................................................................................235
INTRODUCTION TO WEBSITE DESIGNING ........................................................................................................... 235
LESSON OBJECTIVES ................................................................................................................................................ 235
WEBSITE................................................................................................................................................................... 235
WEB PAGE................................................................................................................................................................ 235
WEBSITE DESIGN ..................................................................................................................................................... 235
HTML ....................................................................................................................................................................... 235
BRIEF HISTORY OF HTML ......................................................................................................................................... 236
BASIC STRUCTURE OF HTML CODDING ................................................................................................................... 236
HTML TAGS .............................................................................................................................................................. 236
WEB BROWSERS ...................................................................................................................................................... 237
HTML PAGE STRUCTURE .......................................................................................................................................... 237
HTML EDITORS......................................................................................................................................................... 238
HTML COMMENTS ................................................................................................................................................... 238
USING BASIC HTML TAGS ........................................................................................................................................ 239
CREATING TABLES .................................................................................................................................................... 240
ORDERED AND UNORDERED LIST TAGS .................................................................................................................. 242
IMAGE AND HYPERLINKS ......................................................................................................................................... 242
HTML STYLES ........................................................................................................................................................... 243
HTML FORMS ........................................................................................................................................................... 244
RADIO BUTTON INPUT ............................................................................................................................................. 246
SUBMIT BUTTON INPUT .......................................................................................................................................... 246
SIMPLE BASIC WESITE .............................................................................................................................................. 247
LESSON SUMMARY .................................................................................................................................................. 250
LESSON ASSESSMENT .............................................................................................................................................. 256
CHAPTER FOURTEEN (14) ................................................................................................................................... 260
COMPUTER PROGRAMMING IN QBASIC ............................................................................................................. 260
LESSON OBJECTIVES ................................................................................................................................................ 260
PROGRAMMING ...................................................................................................................................................... 260
INTRODUCTION TO QBASIC ..................................................................................................................................... 260
9
VARIABLES, CONSTANTS, ASSIGNMENTS, OPERATORS & OPERANDS .................................................................... 261
DATA TYPES IN QBASIC ............................................................................................................................................ 263
SEQUENCIAL PROGRAMMING ................................................................................................................................. 263
LOOPS ...................................................................................................................................................................... 265
IF … THEN … ELSE Statement ................................................................................................................................... 269
SELECT CASE ............................................................................................................................................................ 271
STRING MANIPULATION .......................................................................................................................................... 274
USING PROCEDURES ................................................................................................................................................ 276
WRITING A MATH PROGRAM .................................................................................................................................. 277
WRITING A GUESS GAME ........................................................................................................................................ 280
LESSON ASSESSMENT .............................................................................................................................................. 281
CHAPTER FIFTEEN (15) ........................................................................................................................................284
PROJECT-BASED ACTIVITIES ................................................................................................................................ 284
- Spreadsheet........................................................................................................................................................... 284
- Desktop Publishing ................................................................................................................................................ 284
- Database ................................................................................................................................................................ 284
-SQL.......................................................................................................................................................................... 284
- QBasic Programming ............................................................................................................................................. 284
- Website Designing ................................................................................................................................................. 284
- CD Burning ............................................................................................................................................................. 284
- Solve Practical Past Questions............................................................................................................................... 284
ANSWERS TO OBJECTIVE LESSON ASSESSMENTS ................................................................................................ 285
REFERENCES .......................................................................................................................................................287
10
CHAPTER ONE (1)
INTRODUCTION TO INFORMATION SYSTEMS
LESSON OBJECTIVES
The student will be able to:
• Explain the term Information system.
• Discuss the media types in presenting Information
• Distinguish between manual and computerised Information.
• Discuss the types of information systems.
• Describe the attributes of a good information system.
• Outline the processes (building blocks) for the development of Information.
• Distinguish among different types of Information.
• Indicate the role of Information in society.
• State the System Development Life Cycle.
INFORMATION vs DATA
Data are plain facts. The word data is plural for datum. Data is the raw material that can be processed by
any computing device. Information is data that has been processed in such a way that it meaningful to the
person who receives it.
When data are processed, organised, structured or presented in a given context so as to make them
useful, they are called information. This means that information always gives some idea to the user and
therefore is an important asset to an organisation.
• Timeliness: The information must reach the recipients within the given period. The information
should be available when needed.
• Current: The information should reflect current circumstances when provided. The information
should be up-to-date.
• Accuracy: The information is free from mistakes and errors, is clear and accurately reflects the
meaning of data on which it’s based.
• Relevance: The information supplied should be related to a particular situation and should meet
the information needs of the recipient. It must have logical connection to issues at hand.
• Completeness: The information must be whole and should meet all it needs.
• Conciseness: The information needs of the recipient should be provided in the most summarised
form possible.
• Verifiable: The information must be confirmable and approvable.
• Reliable: It must be dependable, unfailing and trustworthy.
• Meaningful: The recipient must easily understand the information.
11
CLASSIFICATION OF INFORMATION
GRAPHICS
A graphic is a photo, painting, sketch, or other image that provides a detailed representation of
something. The representation can be an object, scenario, person, animal, chart or graph among other
things.
14
Two types of graphics:
• Bitmap graphics (paint graphics, [raster graphics]) are real images that can be captured from
devices such as cameras or scanners (as in a digital photograph).
• Vector graphics (draw graphics) are drawn on the computer where mathematical formulas are
used to draw lines and shapes.
SOUND
Sounds are vibrations that travel through the air or another medium and can be heard when they reach a
person’s or animal’s ear.
• WAV - a Waveform Audio Format (One of the oldest and most common formats).
• MP3 - Moving Picture Experts Group (MPEG).
• MP4 - file formats can hold audio data and video data as well.
• AIFF - Audio Interchange File Format files, (this file format is used most often on Apple systems)
ANIMATION
Animation is defined as a simulation or movement created by displaying a series of pictures or frames.
Cartoons on television is one example of animation. To “animate” means to bring to life. Thus, when a
multimedia developer wants to bring an image to life, animation is used Animation can be categorised
into two broad area:
• 2D (2-Dimension) and
• 3D (3-Dimension).
VIDEO
Video is a recording, reproducing or broadcasting of moving pictures and sound, especially as a digital file,
DVD, or Video tape. The technology of capturing, recording, processing, transmitting, and reconstructing
moving pictures. It takes a lot of storage space.
All these media types can be combined (multimedia) in the presentation of quality information.
15
SYSTEM
A system is any interrelated components that coordinate to each other with the idea of achieving a
specific goal or objective.
INFORMATION SYSTEM
Information system is any formalised set of procedures that is capable of accepting data or information
from any source, processing these data or information, and making the results available to users.
An information System is hardware, software, data, people, and procedures that work together to
provide quality information by;
I. Collecting the Information
II. Processing the information
III. Storing the Information
IV. Retrieving the Information
V. Disseminating or Sharing the Information
Institutions such as the banks, hospitals, schools, health insurance schemes, insurance companies, airlines,
telecommunication companies, shopping malls, restaurants, etc. need this quality information t plan and
make decisions.
16
SOFTWARES
These are the Instructions that ell the hardware what to do. They are normally packaged on Compact
Discs (CD) and Digital Versatile Discs (DVD). They are represented by a graphical image on the desktop
after installation.
DATABASES
Software that consists of systematically arranged collection of computer data, structured so that it can be
automatically retrieved or manipulated.
NETWORKS
It’s a connected system of objects or people. A computer network is a collection of computers and other
hardware devices connected together through communication devices and transmission media.
17
PEOPLE
People are the most important component in most computer base information system. These are users
who combine the hardware, software, data, networks with procedures to produce quality information.
PROCEDURES
Procedures are the strategies, policies, methods and rules for using computer base information system.
18
MANUAL INFORMATION SYSTEM
A manual information system is a system where records are maintained by hand, without using a
computer system. Instead, records are written on paper, books, journals, etc.
An example of a manual information system is a telephone directory, our class register and any record on
paper kept in file.
Advantages
• Time Consuming – all data entries need to be verified before filing, this is a time-consuming task
when done by humans. Retrieving data from the filing system also takes a considerable amount of
time.
• Prone to Error - the accuracy of the data when verified and validated by human beings is more
prone to errors compared to validation done by computerized systems.
19
• Lack of Security – the security of manual information systems is implemented by restricting access
to the file room. Experience shows unauthorized people can easily gain access to the room.
• Duplication of data – most departments in an organization need to have access to the same data.
In manual system, it is common to duplicate this data to make it easy to accessible to all
authorized users. The challenge comes in when the same data needs to be updated.
• Lack of Backups – if the file gets lost or mishandled, the chances of recovering the data are almost
zero.
20
Disadvantages
• High Capital Expenditure – the amount of money required to invest in a computerized system can
be millions of Ghana Cedis, which is expensive to individuals and smaller companies.
• Worker lay off – computerized systems take the place of some workers.
• System Failure – if something happens to the network, hardware or software that makes it stop
functioning, then the information cannot be accessed until the problem is fixed.
• Computer Crime – computer hackers and unauthorized users can use illegal means of getting
access to secure information.
In order to support these three levels of managers, organizations use different types of information
systems, which include;
• Transaction Processing System (TPS): TPS is an operational level system that performs and record
the daily routine transactions (operations) necessary to conduct business, such as sales order
21
entry, hotel reservations, payroll, employee record keeping, and shipping. Example is the
Automated Teller Machine (ATM) systems.
• Management Information System (MIS): MIS is a managerial level system that provides
information needed to manage organizations effectively. Information Systems at management
level of organization serve the functions of planning, controlling, and decision making by providing
routine summary and exception reports. MIS generates three basic types of information namely,
detailed, summary and exceptional. Moreover, it mainly use for making managerial decisions. MIS
tend to produce high volumes of printed output leading to what has been termed ‘Information
Overload’.
• Decision Support System (DSS): DSS is a managerial level system that combines data and
sophisticated analytical models and tools to support business decisions. DSS does not make
decisions: rather it is a powerful tool that is used to support decision-making. DSS helps managers
“do the right thing”.
• Executive Support System (ESS): ESS is a strategic level system that facilitates and supports senior
executive information and decision-making needs. They address non-routine decisions requiring
judgement, evaluation, and insight because there is no agreed-on procedure for arriving at a
solution. EIS emphasis graphical displays and easy-to-use user interfaces. Decisions that seek to
upgrade the operations of the whole organization is taken by the ESS.
• Office Automated System (AOS): is an all-level system that uses hardware, software and networks
(LAN) to enhance work flow and facilitate communications among employees. The backbone of
OAS is a LAN, which allows users to transfer data, mail, and even voice across the network.
Example is the Point of Sale (POS) systems.
• Knowledge Work System (KWS): KWS aid knowledge workers (lawyers, accountants, management
consultant, etc.) to create information in their area of expertise. KWS such as scientific or
engineering design workstations, promote the creation of new knowledge and ensure that new
knowledge and technical expertise are properly integrated into the business.
• It simplifies and automates complex tasks hence saves time and resources.
• It provides competitive advantage over other organizations (makes a business do things better
than their competitors do).
• It enhances personal thinking and decision making to organizational decision makers.
• For operational excellence (improves the efficiency of their operations in order to achieve higher
profitability).
• Acts a major tool for firms to create new products and services, and an entirely new business
model.
• For customer/supplier Intimacy (it helps an organisation to serve its customers/suppliers well).
• For day-to-day survival, since they are one of the main necessities of doing business.
22
FACTORS THAT INFLUENCE THE MATCHING OF AN INFORMATION SYSTEM TO AN ORGANIZATION
INFORMATION REQUIREMENT
• The organizational structure - the structure of the organization will have an influence on the type
and volume of information required and, therefore, provided by the information system.
• The management style of the firm - if it is the directive style, information should be made
available only to those who need it. While for the participative style, anyone who needs some
information should have ready access to it.
• The information intensity of the operations of the business - the intensity is low if managers do
not need too much information to enable them carry out their functions. In such a situation, the
information system should not provide more information than is necessary in order to prevent
information overload with its attendant high cost.
• The importance of a dynamic environmental response to the organization - the need for
management to have information readily available for use anytime any of the environmental
factors change and the organization has to react or adapt to the change.
• Completeness – An effective Information System presents all the most relevant and useful
information for a particular decision. An incomplete or partial presentation of information can lead
to decisions that don’t have the anticipated effects.
• Timeliness – An Information System must be current. The more recent the data the more these
decisions will reflect present reality and correctly anticipate their effects on the institution.
• Accuracy – An Information System should be error free in terms of presenting an information to an
organization or the user.
• Clarity and Concise – Too much information is a big burden on systems and cannot be processed in
time and accurately due to “bounded rationality”. Accordingly, information should be to the point
and just enough – no more, no less.
• Relevance – Information should be fit for the purpose for which it is required. This means that it
should be pertinent and meaningful to the decision maker and should be in his area of
responsibility.
• Reliable – The system should provide an information that can be depended upon with confident
certainty. Meaning the information should be trustworthy.
• Cost Effective – Information should be available within set cost levels that may vary dependent on
situation. I f cost are too high to obtain information an organization may decide to seek slightly less
comprehensive information elsewhere.
23
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
System Development is a set of activities used to build an information system. System Development
activities often are grouped into larger categories called phases. They are;
1. Planning – It identifies whether or not there is the need for a new system to achieve a business’s
objectives. This is a preliminary plan (or feasibility study) for a company’s business initiative. The
purpose of this step is to find out the scope of the problem and determine solutions.
2. System Analysis and Requirements – The business will work on the source of their problem or the
need for a change. In the event of a problem, possible solutions are submitted and analysed to
identify the best fit for the ultimate goal(s) of the project.
3. System Design – The necessary specifications, features and operations that will satisfy the
functional requirements of the proposed system will be in place. It’s during this phase that they
will consider the essential components for the system to accomplish its objectives.
4. Development – The real work begins at this phase, a programmer, network engineer and/or
database developer are brought on to do the major work on the project. This involves algorithm
and flowchart development and the coding of the project.
5. Integration and Testing – This phase is normally carried out by a Quality Assurance (QA)
professional – to determine if the proposed design meets the initial set of business goals. Testing
may be repeated, specifically to check for errors, bugs and interoperability.
6. Implementation – Is when the majority of the code for the program is written. Additionally, this
phase involves the actual installation of the newly developed system. This step puts the project
into production by moving the data and components from the old system and placing them in the
new system.
7. Operation and Maintenance – This phase is when the end users can fine-tune the system. It also
involves the maintenance and regular required updates of the system.
NB: The SDLC aims to produce a high-quality software that meets or exceeds customer expectations,
reaches completion within times and cost estimates.
LESSON ASSESSMENT
OBJECTIVES
1. All the following are attribute of a good information system except ………………….
A. Trustworthiness
B. Friendliness
C. Accuracy
D. Relevance
2. Which of the following is not a component of a decision support system?
A. Corporate Database
B. Decision Database
C. Model Database
D. Planning Language
24
3. Which of the following is not an attribute of useful information?
A. Accurate
B. Neat
C. Precise
D. Reliable
4. The technology that presents information in more than one medium including text, graphics,
animations, video, music and voice is known as
A. Computer animation
B. Computer graphics
C. Multimedia
D. Information technology
5. Multimedia help students because;
I. It replaces direct textbook reading
II. It allows students to control their learning
III. It enhances the teacher’s lesson
A. I and II only
B. I and III only
C. II and III only
D. I, II and III
6. Which of the following statements is a difference between data and information?
A. Data is numeric while information is text
B. Data is raw facts while information is processed facts
C. Information is raw facts while data is processed facts
D. Data is electronic while information in non-electronic
7. A multimedia program is made up of ……………………….
A. Text and audio
B. Images and text
C. Combination of text and images on a television
D. Integration of images, text and sound using computer technology
8. Management Information Systems (MIS) refers to
A. Processing business transactions
B. Capturing and reproducing the knowledge of an expert programmer
C. Creating and sharing document that support day-to-day office activities
D. Using transaction data to produce information needed by managers to run a business
9. The ability of an individual to be a student of a school without being physically present in that
school through the use of Information Technology is known as ………………….
A. Distance learning
B. Collaborative school
C. Satellite campuses
D. Part time studies
10. Management information systems tend to produce a high volume of printed output leading to
what has been termed ……………………
A. Information Overboard
25
B. Information reload
C. Information Overload
D. Information Outboard
SUBJECTIVES
26
CHAPTER TWO (2)
INTRODUCTION TO DIGITAL TECHNOLOGY CULTURE
LESSON OBJECTIVES
The student will be able to:
• Explain general issues concerning Information Technology.
• Analyse the role and impact of Information Technology on everyday life.
DIGITAL CULTURE
Digital Culture is a way of life, which involves the use of information technology tools to carry out various
activities in everyday life. Examples of such activities are listening to music, playing video games,
communicating with others, buying and selling, etc.
Simply Digital Culture is defined as the use of various technologies to shape the behaviour of a society.
THE INTERNET
This is a vital component of the Digital Culture as it allows devices to communicate with each other. This
as a result has made the world a smaller place.
The internet is a worldwide collection of computer networks, cooperating with each other to exchange
data using a common software standard. It is a network of networks; it can be an intranet, extranet, or
worldwide etc.
• Intranet: It is private network accessible only to an organizational staff.
• Extranet: It a controlled private network that allows access to partners, vendors and supplies or an
authorized set of customers outside the organization.
Requirements for internet connectivity
Before you can connect to the Internet and access the World Wide Web (is a collection of internet sites
that can be accessed by using a hypertext interface), you need to have certain equipment.
27
1. Hardware
a. Computer is an electronic device that accepts, processes, stores, and outputs data at high
speeds according to programmed instructions.
b. Modem is an electronic device that connects computers via a telephone line, allowing the
exchange of information.
2. Software
a. Operating System is a system software that manages computer hardware and software
resources and provides common services for computer programs.
b. Browser is an application software that allows that allows users to access and view web pages
or web services. Examples are Opera, Firefox, Google Chrome, Windows Explorer, etc.
Features of a Browser
3. Internet Service Provider is a company that provide access to the internet to customers for a fee
or free. The most common way to access, the internet is through a provider. Example MTN,
Vodafone, Glo, etc.
COMPUTER CRIME
The Digital Culture has come up with new ways of deception and theft basically known as computer
crime. Typical example: 419 or fraud.
Computer Crime is any criminal act that involves the computer and a network. I can also be referred as to
the use of information technology for illegal purpose or for unauthorized access of a computer system.
Types of Computer Crime
1. Theft: May refer to either unauthorized removal of physical items such as hardware or
unauthorized removal or copying of data or information.
2. Fraud: Manipulating data. E.g., Bank Account fraud, Credit/Debit fraud, Business deceit,
Recruitment deceit, Counterfeit cheque scam, Advance free fraud, Non delivery of goods/Service
fraud, etc.
3. Phishing: Deceiving individuals to gain private or personal information about that person. Phishing
is carried out through e-mails or by luring; the users to enter personal information through fake
website that makes the user fells safe to enter their details there.
4. Hacking: The act of defeating the security capabilities of a computer system in order to obtain an
illegal access to the information stored on the computer system. A hacker is a highly skilled
28
computer user who gains unauthorized access to a computer system or data belonging to
somebody or an organization.
5. Creating malwares: Writing, creating, or distributing malware (Virus and Spyware) to harm or steal
from a computer system.
6. Denial of Service: It is an attempt to make a machine or network resource unavailable to its
intended users, by overloading a system with so many requests so it cannot serve normal requests.
7. Copyright Infringement: Occurs when someone other than the copyright holder copies the
“expression” of a work.
8. Plagiarism: Is the act of taking another person’s writing, conversation, song, or even idea and
passing it off as your own.
9. Cyber Terrorism: Is the use of the internet to conduct violet acts that result in, or threaten, loss of
life or significant bodily harm, in order to achieve political or ideological gains through threat or
intimidation.
10. Cyber Stalking: Using the internet or other electronic means to stalk or harass an individual, group,
or organization. It may include false accusations, defamation, slander and libel.
11. Scam: A fraudulent or deceptive act or operation. Like tricking people into believing something
that are not true.
12. Spoofing: Deceiving a system into thinking you are someone you really are not.
13. Pharming: Is a cyber-attack intended to redirect a website's traffic to another, fake site.
14. Salami Slicing: Stealing tiny amounts of money from each transaction. Salami Slicing is a form of
financial cyber-attack where the criminal takes an amount of money that is so insignificant that a
single case is completely unnoticed.
15. Child pornography - Making or distributing child pornography.
INFORMATION TECHNOLOGY
IT is the application of computers and telecommunication technology to obtain, process, store, retrieve &
transmit data, in the form of voice, pictures or text or often in the context of a business or other
enterprise.
IT can do at least three things:
1. It can process raw data into useful information.
2. It can recycle processed information & use it as data in another processing step.
3. It can pack information in a new form so it is easier to understand, more attractive, or more useful.
30
HEALTH (E-HEALTH)
E-Health is the application of ICTs to health, and a means of improving health services access, efficiency
and quality. Example is the Health Care Assistant App (Android). It encompasses three main areas:
• The delivery of health information, for health professionals and health consumers, through the
internet and telecommunications.
• Using the power of IT and e-commence to improve public health services, e.g., through the
education and training of health workers.
• IT is used for testing of Deoxyribonucleic acid (DNA), creating DNA database and genetic
information about population. Medical records and finger print which are used by investigating
agencies to identify missing persons and criminals.
GOVERNMENT
E-Government is the application of Information and Communication Technology for delivery;
• Government services
• Exchange of information
• Communication and transactions
Example is the Government Integrated Financial Management Information System (GIFMIS).
TRANSPORT
• Online traffic updates & Information about the schedule of Trains, Buses and airlines are now
easily available on the internet, thus making passengers comfortable about their journey. E.g., M-
indicator.
• Online Railway, Car, and Airline Booking. E.g., Indianrailway.gov.in, Yatra.com, uber.com,
abctransport.com, Stc.oyawego.com etc.
COMMUNICATION
IT allows us to communicate almost instantaneously.
• E-mail: A system that allows text-based messages to be exchanged electronically, e.g., between
computers or cell phones.
• Fax: A document or image that is transmitted in digitized electronic form over telephone lines and
reproduced in its original form on the receiving end.
• Social Media: Are interactive computer mediated technologies that facilitate the creation and
sharing of information, ideas, career interests and other forms of expression via virtual
communities and networks. E.g., WhatsApping, Skyping, Facebooking, etc.
• Phones: A portable telephone operated through a cellular radio network purposely for
communication. E.g., Telephone, Smart phone, etc.
31
LESSON ASSSESSMENT
OBJECTIVES
1. A collection of computers used by business organizations to interact with allies across the world
through telecommunication link is known as
A. Extranet
B. Intranet
C. Internet
D. Web
2. Which of the following tool do architecture designers use?
A. Computer Assisted Learning
B. Computer Assisted Manufacturing
C. Computer Aid Design
D. Computer Based Testing
3. The following are computer crimes except
A. Hacking
B. Kidnapping
C. Cyber terrorism
D. Child pornography
4. A modem converts incoming analogue data to
A. Analogue signal
B. Digital signal
C. Parallel signal
D. Serial signal
5. Which of the following is not an example of an information technology crime? Theft of
A. E-book
B. Hardware
C. Information
D. Software
6. E-commerce is an integral part of
A. E-business
B. E-governance
C. E-learning
D. E-mail
7. Deceiving a system into thinking you are someone you really are not is called
A. Phishing
B. Scamming
C. Sniffing
D. Spoofing
8. The act of gaining unauthorized access to a restricted computer facility is called
A. Flaming
B. Hacking
C. Hijacking
32
D. Spamming
9. Social media platforms include the following options except
A. Facebook
B. Olx
C. YouTube
D. Twitter
10. The ability of an individual to be a student of a school without being physically present in that
school through the use of Information Technology is known as
A. Distance learning
B. Satellite campuses
C. Collaborative school
D. Part time studies
SUBJECTIVES
1. A) Define the term Digital Culture.
B) State two (2) main impacts of IT on each of the following areas;
I. Education
II. Business
C) State the main requirements needed for internet connectivity.
2. A) What is E-Learning?
B) List five (5) learning technologies used in the classroom.
C) List four examples of browsers.
3. A) What is
i. Computer Assisted Learning (CAL).
ii. Web Based Learning (WBL).
B) State three advantages of computer assisted learning over internet-based learning.
4. A) Explain e-business
B) State three benefit of e-business.
C) List three:
i. hardware digital resources used for teaching and learning.
ii. application packages used for teaching and learning.
33
CHAPTER THREE (3)
INTRODUCTION TO COMPUTER HARDWARE
LESSON OBJECTIVES
The student will be able to:
• Describe functions of hardware components of a computer system.
• Identify the types of Input and Output devices
• Identify the main parts of the CPU.
• Describe the processes involved in the machine cycle
• Define the terms associated with the workings of the CPU.
• Identify the main and backup storage media and their devices.
• Discuss the functions of the primary and secondary storage media and their devices
• Distinguish between the primary and secondary storage media.
• Describe the disk filing system and hierarchical directory structure.
COMPUTER HARDWARE
It is the physical, electrical components and devices of the computer system that you can see and touch.
For example, keyboard, mouse, printer, system units, speaker, monitor, cables that connect the devices
etc.
Classification of Computer Hardware
1. Input Devices
2. Processing Devices
3. Output Devices
4. Storage Devices
5. Communication Devices
6. System Unit
INPUT DEVICES
Input Devices are any hardware components that allow users to enter data and instructions into a
computer system for processing. Input devices convert data e.g., text, image, drawings into a form that a
computer can understand and use. Keyboard and Mouse are the most popular input unit devices.
EXAMPLES OF INPUT DEVICES
Keyboard
A device that converts letters, numbers, and other characters into electronic signals that are machine-
readable by the computer’s processor. The keyboard has a direct link with the central processing unit
(CPU). The most common English-language key pattern for typewriters and keyboards is called QWERTY.
Computer keyboards comes in either QWERTY or DVORAK keyboard layout.
34
Mouse
A mouse is a handheld pointing device for computers, involving a small
object fitted with one or more buttons and shaped to sit naturally under
the hand. It is used to open and close files, navigate web sites, and click
on commands (to tell the computer what to do) when using different
applications.
The types of mouse are Wireless, Trackball, Optical, G-stick and
Mechanical.
Digital Camera
It can be used to take pictures. It can be hooked up to a computer to
transfer the pictures from the camera to the computer. Some digital
cameras hold a memory card that can be taken out of the camera and
put directly into the computer’s memory card reader.
Scanners
It uses laser beams and reflected light to translate images of text, drawings, photo and like into digital
form. The types of Scanners are
35
Joystick
It used to move the cursor from place to place, and to click on various items in
programs. A joystick is used mostly for computer games.
Microphone (mic)
Is a transducer that converts sound into electrical signals. Microphones
are used in many applications such as telephones, hearing aids, public
address systems, etc.
PROCESSING DEVICES
When a computer receives data from an input device (e.g., keyboard or mouse), the data must go through
an intermediate stage before it can be sent to an output device (e.g., monitor or printer). A processing
device is any device in a computer that handles this intermediate stage. For example, the Central
Processing Unit.
CENTRAL PROCESSING UNIT (CPU)
CPU is the electronic circuitry within a computer
that carries out the instructions of a computer
program by performing the basic arithmetic,
logical, control and input/output (I/O) operations
specified by the instructions.
36
conditions, Less-than (<) conditions, Greater-than (>) conditions, which is usually a comparison of
letters, numbers or special characters.
2. Control Unit (CU): CU extracts instructions from memory, decodes, and executes them, calling on
the ALU when necessary. Control Unit controls the fetching (from memory) and execution of
instructions by directing the coordinated operations of the ALU, registers and other components.
3. Register: Registers are temporary storage areas for instructions or data. They are not a part of
memory; rather they are special additional storage locations that offer the advantage of speed.
Registers work under the direction of the CU to accept, hold, and transfer instructions or data.
The are many registers including;
• Memory Address Register (MAR): Holds the address of a location in memory.
• Memory Data Register (MDR): Holds data just read or written to memory.
• Program Counter (PC): Holds the address of the next instructions to be fetched.
• Instruction Register (IR): Holds the current instruction being executed.
• General Purpose Registers: Can be used by programmers.
NB: The more registers a CPU has available, the faster it works.
4. Memory Unit: the area of storage in a computer that maintains information for instant retrieval
and processing, as distinct from disk storage. The Memory buffer that temporarily stores data the
processor needs, allowing the processor to retrieve the data faster than if it came from
main memory.
It holds random data, usually on first in first out, or first in last out basis.
MACHINE CYCLE
Machine Cycle is a series of steps CPU takes to execute an instruction. The machine cycle is a 4-process
cycle that includes reading and interpreting the machine language, executing the code and then storing
that code.
37
Four steps of Machine cycle:
1. Fetch: Retrieve an instruction from the memory. Before the CPU can execute an instruction, the
control unit must retrieve or fetch a command or data from the computer's memory.
2. Decode: Translate the retrieved instruction into a series of computer commands. Before a
command can be executed, the control unit must decode the command into instruction set into
form the ALU can understand.
3. Execute: Execute the computer commands. When the command is executed, the CPU carried out
the instructions in order by converting them into macrocode.
4. Store: Send and write the results back in memory. The CPU may be required to store the result of
an instruction in memory.
Simplified
Control Unit fetches the data from the RAM and places it in the data registers, and fetches the
instruction and places it in an instruction register.
Control Unit decodes the instruction to determine what needs to happen and tells the ALU.
ALU executes the instruction and places the result in a result register (accumulator).
Control Unit orders the data in the result register to exit the CPU, where it is stored in memory.
WHEN YOU DOUBLE CLICK ON AN ICON TO RUN A PROGRAM, HERE IS WHAT HAPPENS:
1. The program, which is stored inside the hard disk drive, is transferred to the RAM memory.
2. The CPU, using a circuit called memory controller, loads the program data from the RAM memory.
3. The data, now inside the CPU, decoded and given to the ALU to work on (processing).
4. The CPU could continue to load and executing the program, depending on the program
(instructions).
5. It is then sent back to the main memory for temporal storage before giving it out as information
(displaying something on the screen).
NB: A program is a series of instructions to the CPU.
38
HOW STORED DATA IS TRANSFERRED TO THE CPU
39
a person's physical address, the address space would be a combination of locations, such as a
neighbourhood, town, city, or country.
Data Bus: A data bus simply carries data. The same data bus is used for both read/write operations. The
data bus consists of 8, 16, or 32 parallel lines. The data bus is bidirectional bus, means the data can be
transferred from CPU to main memory and vice versa.
NB: A data bus carries data while an address bus carries instructions.
Word length: Refers to the maximum number of bits it can take as input. Word length is also the number
of bits a computer can process in a single operation. The computer further takes this input for process and
gives the output.
Instruction Set: is a group of commands for a CPU in machine language. The instruction set provides
commands to the processor, to tell it what it needs to do. The instruction set, also called instruction set
architecture (ISA).
Examples of instruction set
40
32-BIT vs. 64-BIT PROCESSORS
In computing, there exist two type processor i.e., 32-bit and 64-bit. This processor tells us how much
memory a processor can have access from a CPU register. For instance,
• A 32-bit system can access 232 memory addresses, i.e., 4 GB of RAM or physical memory.
• A 64-bit system can access 264 memory addresses, i.e., actually 18-Quintillion GB of RAM. In short,
any amount of memory greater than 4 GB can be easily handled by it.
• Using 64-bit one can do a lot in multi-tasking, user can easily switch between various applications
without any windows hanging problems.
• Gamers can easily play High graphical games like Modern Warfare, GTA V, or use high-end
software like Photoshop or CAD, which takes a lot of memory, since it makes multi-tasking with big
software easy and efficient for users. However, upgrading the video card instead of getting a 64-bit
processor would be more beneficial.
• A computer with a 64-bit processor can have a 64-bit or 32-bit version of an operating system
installed. However, with a 32-bit operating system, the 64-bit processor would not run at its full
capability.
• On a computer with a 64-bit processor, we can’t run a 16-bit legacy program. Many 32-bit
programs will work with a 64-bit processor and operating system, but some older 32-bit programs
may not function properly, or at all, due to limited or no compatibility.
OUTPUT DEVICE
Output Device is any hardware component that sends information out of the computer or provides the
result of processing from the computer to the user. This device receives information from CPU and
converts into suitable human readable form. Example of output devices are Monitor, Printer, Plotter,
Projector, Speaker, etc.
EXAMPLES OF OUTPUT DEVICES
Monitor
A monitor displays information that is user readable (user-language) such as words, numbers, graphics,
etc.
41
Three (3) main qualities that affect the screen clarity of the monitor:
1. Resolution, 2. Dot pitch 3. Refresh Rate.
There are basically two (2) types of computer monitor
1. Cathode Ray Tube (CRT): Cathode ray tubes are glass tubes that are narrow at one end, and open
up to a wide screen at another.
2. Flat Panel: Flat panel displays are made up of two plates of glass with a substance in between
them, which is activate in different way. The substance between the plates is either
• LCD (Liquid crystal display): It consist of liquid crystal display the molecules which line up in a
way that alters their optional properties and as a result backlighting behind the screen is
blocked to create an image
• ELs (Electroluminescent display): It consist of a substance that grows when it is charged by an
electric current
• Gas plasma: It’s displays uses a gas that emits light in the presence of an electric current
• Light-emitting diodes (LED). Is a semiconductor light source that emits light when current
flows through it.
Printer
A printer is an external output device that takes data from a computer
or other device and generates output in the form of graphics / text on
a paper (hardcopy).
42
Projector
A Projector is an output device that can take images
generated by a computer and reproduce them onto a
screen, wall or other surface. The surface projected onto
is large, flat and lightly coloured. Projector can produce
either still (slides) or moving picture (videos).
Plotter
A plotter is a computer hardware device that is used for printing vector
graphics on a large format while maintaining high resolution. Plotter
prints on wide variety of flat materials such as plywood, aluminium,
sheet steel, cardboard and plastic. It is quite large as compared to the
traditional printer.
STORAGE DEVICES
Storage devices are any hardware components that enables a user to store data, information or an
instruction. Examples CD ROM Drive, Floppy Disk Drive, Flash Drive, Hard Disk, RAM, etc.
• Writing is the process of transferring data, information, and instructions from a computer’s
memory to a storage medium.
• Reading is the process of transferring data, information, and instructions from a storage medium
into a computer’s memory.
43
Types of Primary storage
1. Random Access Memory (RAM)
2. Read Only Memory (ROM)
3. Cache memory
Random Access Memory (RAM)
A computer writes and reads (i.e., storing and retrieving)
information to and from the RAM, for processing by the
CPU and the results are returned to RAM. RAM derives its
name for the fact that any of its memory cells can be
accessed directly. It is a volatile memory that is the data
vanishes when the power supply is cut off. The amount of
RAM determines how many programs can be executed at
one time and how much data can be readily available to a
program.
There are two (2) types of RAM
1. SRAM (Static Random Access Memory): It is faster than the DRAM as it uses a six-transistor
configuration. In this, the direction of current depicts the value 0 or 1. SRAM holds data in a static
form, as long as the memory has power. It is expensive than DRAM. This memory need not to be
refreshed frequently.
2. DRAM (Dynamic Random Access Memory): This is Dynamic Random Access Memory that stores
each bit of data in separate capacitor. The capacitor can be either charged or discharged; these
two states are taken to represent the two values of bit that are 0 and 1. This memory needs to be
refreshed periodically.
Read Only Memory (ROM)
ROM is “built-in” computer memory containing data that
normally can only be read, not written to. ROM is one in
which information are stored permanently. It is non-
volatile memory that is it does not loss data when the
power is cut off.
44
possible to reprogram the memory. It was used in the old IBM PCs and XTs for storing the BIOS
information.
3. EEPROM (Electrically Erasable Programmable Read Only Memory): It is a special type of PROM
that can be erased by exposing it to an electric charge. Like other RAM, it retains its memory even
if the power is switched off. Data is written or erased one byte at a time. EEPROM chip is often
referred to as the CMOS BIOS chip in computer.
4. EAROM (Electrically Alterable Read Only Memory): Memory can be programmed and erased by
electrical signals. It does not require exposure to ultraviolet light to erase its contents. It provides
easy means to load and store temporary or permanent information in a form of ROM memory.
This memory can be retained for many years without any power supplied. It is a backup to RAM
memory.
ROM RAM
Used primarily in the start-up process of a Used in the normal processing in a computer
computer
Permanent storage memory Temporary storage
Is non-volatile Is volatile
Can hold data even without electricity Needs electricity to hold data
ROM chip can only store several megabytes of RAM chip can store multiple Gigabytes of data
data
Cache Memory
The cache is a smaller, faster memory, which stores copies of the data from the most frequently, used
main memory locations (RAM). It acts as buffer between the CPU and main memory.
Computer microprocessor can access cache memory more quickly than it can access regular RAM. The
CPU uses cache memory to store instructions that are repeatedly required to run programs, improving
overall system speed.
The advantage of cache memory is that the CPU
does not have to use the motherboard’s system bus
for data transfer. Whenever data must be passed
through the system bus, the data transfer speed
slows to the motherboard’s capability. The CPU can
process data much faster by avoiding the bottleneck
created by the system bus.
NOTE: A computer cannot run without a RAM Chip. Memory chip is an integrated circuit (IC) made up of
millions of transistors and capacitors.
45
SECONDARY STORAGE MEDIA
Secondary storage media does not lose data when the device is powered down, means it is non-volatile.
Secondary storage also known as external memory or auxiliary storage not directly accessible by the CPU.
Three types of Secondary storage media:
There are three (3) types of secondary storage media. These types are based on the technology they used
to store data;
1. Magnetic Storage Media: e.g., floppy disk (diskette), HDD, Zip disc, Magnetic Tape, Flash drive.
2. Optical Storage Media: e.g., DVD-ROM, CD-ROM, CD-R, CD-RW, Blu-ray disk, HD DVDs.
3. Solid-State Storage: e.g., SSC, SSD, SSM.
MAGNETIC STORAGE MEDIA
A magnetic disk is a storage device that uses a magnetization process to write, rewrite and access data.
They are type of backup storage that store data, instructions and in formation in a form of magnetic
particles on their disk surfaces. Examples are magnetic disks (floppy disk/diskette, hard disk, zip disk) and
magnetic tape.
• Diskette/Floppy disk: a small flexible magnetically coated disk in a rigid plastic case on which data
can be stored or retrieved by a computer.
• Hard Disk Drive (HDD): an electro-mechanical data storage device that uses magnetic storage to
store and retrieve digital information using one or more rigid rapidly rotating disks (platters)
coated with magnetic material.
46
• Magnetic Tape: a thin ribbon of material, usually plastic,
coated with iron oxide and used to record sounds, images,
or data. It is the tape used in audio and video cassettes, and
on computers with tape drives. The main advantage of using
magnetic tape as backing storage is that it is relatively cheap
and can store large amounts of data.
• Digital Video Disc or Digital Versatile Disc”: DVD is a 5-inch optically readable digital disk that
looks like an audio compact disk but can store about 4.7gigabytes of data on a side. Single layer
DVDs can hold 4,.7 GB, and double sided is 9.4GB. Dual layered
DVDs can hold 8.5GB and double sided is 17GB
• Compact Disc: CD is an audio disk that uses digital code and that
looks like a miniature phonograph record. A CD holds up to 80
minutes of high-fidelity stereo sound. Although some discs are
used strictly for digital data storage, many others combine text,
visuals and sound. The CD can store 700 MB of data.
47
• Compact Disc-Read Only Memory: CD-ROM is an optical-disk format that is used to hold
rerecorded data such as graphics, sound, etc.
• Compact Disc-Recordable: CD-R is a CD format that allows you to write data onto a specially
manufactured disk that can be read by a standard CD-ROM drive. CD-R cannot be erased.
• Compact Disc-Rewritable: CD-RW is a compact disc that can written, read arbitrary many times,
erased and written again. CD-RW is a form of CD with the same capacity.
• Blu-ray Disc: BD is an optical disc storage medium designed to replace the DVD format. The
standard physical medium is a 12 cm plastic optical disc, the same size as DVDs and CDs. Blu-Ray
Discs contain 25 GB per layer, with dual layer discs (50 GB) the norm for feature-length video discs
and additional layers possible later.
• HD DVD-ROM, HD DVD-R and HD DVD-RW: have a single-layer capacity of 15 GB, and a dual-layer
capacity of 30 GB. HD DVD-RAM has a single-layer capacity of 20 GB. All HD DVD players are
backward compatible with DVD and CD.
48
Hierarchical File System
Is how drives, folders, and files are displayed on an operating system. In a hierarchical file system, the
drives, folders and files are displayed in groups, which allow the user to see only the files they are
interested in seeing (In terms of the Operating System’s GUI).
Types of File Systems
a. FAT
b. FAT32
c. NTFS
a. THE FAT FILE SYSTEM
File Allocation Table (FAT) is an old general-purpose file system that is compatible with all major operating
systems (Windows, Mac OS X, and Linux/Unix). It has relatively simple technical underpinnings, and was
the default for all Windows Operating Systems prior to Windows 2000. Because of its overly simplistic
structure FAT suffers from issues such as over-fragmentation, file corruption, and limits to file names and
sizes.
b. THE FAT32 FILE SYSTEM
FAT32 is an advanced version of FAT file system. It can be used on drives from 512 MB to 2TB in size. One
of the most important features of FAT and FAT32 is that they offer compatibility with operating systems
other than Windows 2000 and above.
c. THE NTFS FILE SYSTEM
New Technology File System (NTFS) is a modern, well-formed file system that is most commonly used by
Windows Vista, 7, 8, and 10. It has a rich feature, yet simple organization that allows to be used on very
large volumes. It is recommended that NTFS be used on all media whose primarily with modern Windows
Systems.
STORAGE BLOCK
A storage block is a physical sector on the surface of a disk or diskette. It is the smallest unit of
transference between the main memory and a given disk drive.
A block is a sequence of bytes or bits, having a fixed length (a block size). Data thus structured are said to
be blocked. The process of putting data into blocks is called blocking while deblocking is the process of
extracting data from blocks.
Blocking is used to facilitate the handling of the data-stream by the computer program receiving the data.
Blocked data is normally read a whole block at a time.
ACCESS TIME (Latency)
The total time it takes the computer to read from a storage device such as computer memory, hard drive
CD-ROM or other mechanism. Computer access time is measured in nanoseconds or milliseconds and the
49
lower the access time the better. For example, when a computer reading a 100MB of data an access time
of 10ns is a lot faster than 50ns.
COMMUNICATION DEVICES
Is a hardware component that enables a computer to send (transmit) and receive data, instructions and
information to and from one or more computers. A widely used communication device is the modem.
Communications occur over cables, telephone lines, cellular radio networks, satellites, modem and other
transmission media. Other Communication devices include a network interface card (NIC), Wi-Fi devices,
External Storage devices, and an access point.
SYSTEM UNIT
SYSTEM UNIT
The computer System Unit is the enclosure for all the other main interior components of a computer. It is
also called the case, or computer tower. System Units are available in a variety of shapes and sizes. Almost
every other part of your computer connects to the system unit using cables. The cables plug into specific
ports (openings), typically on the back of the system unit.
50
FUNCTIONS OF THE SYSTEM UNIT COMPONENTS
MOTHERBOARD
Motherboard is the main component of a computer with integrated circuitry that connects the other
parts of the computer including the CPU, the RAM, disk drive (CD, DVD, Hard disk) as well as any
peripherals connected via the ports.
CHIPSETS
Integrated Circuits are set of microchips that allow PC components to communicate with each other.
COMPUTER PORT
A computer port is a socket on the outside of the system unit that is connected to the motherboard on
the inside of the system unit. It allows users to connect devices such as a monitor, printer, modem, etc. so
that it can communicate with the computer.
Computer ports include:
1. PS/2 port,
2. HDMI port,
3. Parallel port,
4. Serial port,
5. Game port,
6. Video adapter port,
7. SCSI port,
8. Infrared port,
9. USB port,
51
10. Ethernet/Network port,
11. Power connector port,
COMPLEMENTARY METAL OXIDE SEMI-CONDUCTOR (CMOS) BATTERY
The CMOS battery powers the memory for date and time in the BIOS chip. This battery is generally a
watch battery.
MEMORY
Memory is the physical storage space in computer where data is processed and instructions required for
processing are stored. The three main types of internal memory in a computer system are RAM, ROM and
cache.
CENTRAL PROCESSING UNIT
CPU is a piece of hardware that carries out the instructions of a computer program. It performs basic
arithmetical, logical, and input/output operations of a computer system. The basic function of CPU is to
fetch, decode and execute instructions held in RAM or ROM.
SYSTEM FAN
The fan is used in a computer system to suck hot air out of the system to make sure that it does not
overheat. Most processors also have a fan connected to them to draw the heat away from them and
ensure that it operates at the best speed possible.
HEAT SINK
The heat sink is used to keep systems cool by drawing the heat away from it. Heat sink is made from
materials that draw heat away such as aluminium and copper and is placed on top of a processor.
INTEGRATED DRIVE ELECTRONICS
IDE is an electronic interface used between computers motherboard’s data path or bus and storage
devices.
ADVANCE TECHNOLOGY ATTACHMENT
ATA interface is used to connect hard drives and optical drives. Two drives can be attached on the same
ribbon, one master and the other slave, and it supports almost all modern hard drives storage capacities.
SERIAL ADVANCE TECHNOLOGY ATTACHMENT
S-ATA is a computer bus interface that connect host bus to mass storage devices such as hard disk drives,
optical drives and solid-state drives.
SERIAL CONNECTOR
It is used to connect peripherals in a serial communication interface through which information transfers
in or out one bit at a time.
52
PARALLEL CONNECTORS
It is a type of interface found on computers connecting peripherals, which send multiple bits of data at
once, in parallel communication.
POWER SUPPLY UNITS
PSU converts alternating current (AC) electric power to low-voltage DC power for the internal components
of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours.
UNIVERSAL SERIAL BUS (USB)
Computer interface for peripherals: an external interface standard designed for communication between
a computer and attached low- to mid-speed peripheral devices such as printers, scanners, and keyboards.
NOTE: A Universal Serial BUS (USB) can connect up to 127 different peripheral devices with a single
connector type. Peripheral Device is a piece of computer hardware such as a printer or a disk drive that is
external to but controlled by a computer's central processing unit/system unit.
FRONT VIEW AND BACK VIEW OF THE SYSTEM UNIT
53
EXAMPLES OF DUAL-PURPOSE DEVICES
MODEM
A modem is considered an input/output device because a modem sends and receives data at the same
time. For example, whenever you are surfing, you send a webpage request that its info out, or output.
When you receive or access webpages, which would entail input device.
TOUCH SCREEN
One is touch and the other is screen which displays the content in the
computer. Therefore, touch is basically embedded with the sensors and the
screen of the device. So, in this manner touchscreen combined is an input and
output device both.
It a computer display screen that allows user to interact with the computer by
touching pictures, icons or words etc. on the screen. Examples of touch screens
include smart board, ATM, microwave, dishwasher.
HEADSET
Headset consists of speaker and microphone. The speaker act as output device and microphone act as
input device.
FACSIMILE (FAX)
FAX has scanner to scan the document and also have printer to print the document. Therefore, it
combines both input and output function.
AUDIO/SOUND CARD
A sound card is an internal expansion card that provides input and output of audio signals to and form a
computer under the control of computer programs.
LESSON ASSESSMENT
OBJECTIVES
1. A device used within the computer that conducts and draws heat away from the processor is
called
A. Radiator
B. Thermostat
C. Heatsink
D. Air conditioner
2. Which of the following can be found on the motherboard?
A. USB Drive
B. CMOS battery
54
C. Hard disk drive
D. Underlying circuitry
3. Which of the following printers uses the striking mechanism in printing?
A. Dot matrix
B. Laser
C. Inkjet
D. Thermal
4. Which of the following parts of a computer performs calculations?
A. Cache
B. Hard disk
C. Random Access Memory
D. Central Processing Unit
5. The following are types of file management system except
A. NTFS
B. FAT
C. NTFS32
D. FAT32
6. The device that converts AC to DC to run the computer is called
A. Motherboard
B. Power converter
C. Power supply unit
D. Uninterruptible power supply
7. Which of the following depicts that a CMOS battery is going down? The computer
A. Fails to boot properly
B. Gives a long beep sound
C. Starts losing information in memory
D. Starts showing incorrect date and times
8. The part of the computer that temporarily stores data and programs for immediate processing is
the
A. Hard disk
B. System unit
C. Read only memory
D. Random access memory
9. The central processing unit consists of control unit,
A. Arithmetic unit and logic unit
B. Arithmetic unit and processing unit
C. Primary storage and secondary storage
D. Arithmetic logic unit and basic memory
10. The hard disk space that the CPU uses as RAM when there is not enough RAM is called
A. Cache memory
B. Flash memory
C. Main memory
D. Virtual memory
55
SUBJECTIVES
1. A) What is;
i. Computer port
ii. Computer bus
iii. Clock speed of a CPU
B) State one difference between;
i. Data bus and Address bus
ii. Magnetic disk and Optical disk
2. A) What is a computer monitor?
B) List;
i. three types of computer monitors
ii. three ports on the system unit that the computer monitor can be connected to
iii. two colours of light generated by a computer monitor
3. A) What is a machine cycle?
B) With the help of a diagram describe the machine cycle.
C) Machine A: 1.3 GHz Pentium 4 with 4gigs of ram | Machine B: 2.2 GHz Core 2 duo with 2gigs of ram.
Which of the machine will run faster?
4. A) What is Storage System?
B) State the types of File Systems.
C) In terms of Storage Media, differentiate between Writing and Reading.
56
CHAPTER FOUR (4)
COMPUTER DATA REPRESENTATION
LESSON OBJECTIVES
The student will be able to:
• Identify data types.
• Explain units of storage.
• Explain how characters are represented.
• Explain coding information using a bit pattern.
• Perform binary arithmetic.
• Convert from decimals to binary coded decimal and vice versa.
• Convert octal and hexadecimal numbers to binary, and vice versa.
DATA REPRESENTATION
Refers to the methods used internally to represent information stored in a computer. Computers can
store many different types of information: numbers, text, graphics of many varieties (animation, video,
and stills), sound, etc.
All the types of information stored in a computer are stored in the same simple format: a sequence of 0’s
and 1’s. Computers use numeric codes to represent all the information they store. Computers use a
variety of different codes, and they are all based on the binary number system (base 2).
DATA TYPE
It is an attribute of data, which tells the compiler, or interpreter how the programmer intends to use the
data. Most programming languages support various types of data, such as integer, string, Boolean,
floating point/real numbers, character/char, date, tiny-text, text, blob, varchar, etc.
• Integer - data types: Integer is a data type that represent some range of mathematical integers.
For example, 193, -2, 24, 466 etc. The width and ranges of these integer types vary widely:
• Boolean-data types: Boolean data simply refers to the logical structure of how the language is
interpreted to the machine language. Thus, Boolean is used for logical values. Boolean type
represents the values true (1/one) and false (0/zero).
• Strings - data types: Strings is a sequence of character that is alphanumeric character (alphabet,
digit, blank space, punctuation mark, etc.). For example, Blinks, Dela123, $Abi, $!12D, etc.
• Floating point - data types: Floating-point numbers, also known as real numbers, are used when
evaluating expressions that require fractional precision. For example, calculations such as square
root, or transcendental such as sine and cosine, result in a value whose precision requires a
floating-point type. There are two kinds of floating-point types, float (single-precision numbers)
and double (double-precision numbers).
57
• Character (char) – data type: The data type used to store characters is char. Character is used for
encoding text numerically. Char in C/C++ programming language, is an integer type that is 8 bits
wide and in Java programming language is 16-bit type.
58
CHARACTER CODES (CODING SCHEMES)
Representation of alphanumeric characters in bits 0’s and 1’s is done by character codes. There are three
widely used character codes:
• Binary Coded Decimal (BCD) – In this code, a 4-bit binary number represents each digit. BCD is a
way to express each of the decimal digits with a binary code.
• Extended Binary Coded Decimal Interchange Code (EBCDIC) – It is an 8-bit code. In this coding
system, 256 different characters can be represented inside the computer.
• American Standard Code for Information Technology (ASCII) – It is a standard code to represent
alphanumeric data. The first ASCII was a 7-bit code. It was then extended to 8-bits code. The 7-bits
code system can represent 128 characters. The 8-bits code system can represent 256 characters.
BINARY ARITHMETIC
Binary arithmetic is essential part of all the digital computers and many other digital systems.
BINARY ADDITION
It is a key for binary subtraction, multiplication, division. There four
rules of the binary addition. In fourth case, a binary addition is
creating a sum of (1+1=10) i.e., 0 is write in the given column and a
carry of 1 over to the next column. Example;
59
BINARY SUBTRACTION
BINARY MULTIPLICATION
Binary multiplication is similar to decimal multiplication. It is simpler than decimal multiplication because
only 0s and 1s are involved. There four rules of the binary multiplication. Example;
60
BINARY DIVISION
Binary division is similar to decimal division. It is called as the long division procedure.
NUMBER SYSTEM
61
Step 3 101012 2110
Note: 101012 is normally written as 10101.
62
CONVERT FROM OCTAL TO BINARY
Octal Number: 125708
Calculating Decimal Equivalent:
Step Octal Number Decimal Number
Step 1 125708 ((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80)) 10
Step 2 125708 (4096 + 1024 + 320 + 56 + 0)10
Step 3 125708 549610
Step 1 - Convert each octal digit to a 3-digit binary number (the octal digits may be treated as decimal for
this conversion).
Step 2 - Combine all the resulting binary groups (of 3 digits each) into a single binary number.
63
Hexadecimal Number: 1516 = Binary Number: 101012
Step 1 - Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits may be treated
as decimal for this conversion).
Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single binary number.
LESSON ASSESSMENT
OBJECTIVES
1. Humans interpret words and pictures; computers interpret only patterns of ………………….
A. Byte
B. Bit
C. Nibble
D. Binary
2. The number of characters that ASCII-8 coding system scheme represents is
A. 8
B. 16
C. 128
D. 256
3. The binary equivalent of the decimal number 17 is
A. 11112
B. 11102
C. 110002
D. 100012
4. The following are data types except
A. Date
B. Field
64
C. Number
D. Text
5. The acronym EBCDIC refers to
A. External Bit Code Decimal Internal Code
B. Extra Byte Coding Decimal Interchange Code
C. Extreme Binary Code Decimal Interchange Code
D. Extended Binary Coded Decimal Interchange Code
6. The decimal equivalent of 10102 is
A. 10
B. 11
C. 15
D. 20
7. The binary number 11.1012 converts to decimal as
A. 3.256
B. 3.625
C. 3.652
D. 4.652
8. The octal fraction 0.65 converts to binary as
A. 0.110011
B. 0.110101
C. 101101.0
D. 101110.0
9. The binary representation of hexadecimal C3 is
A. 1111
B. 1100011
C. 1110011
D. 11000011
10. The addition of 1111012 and 101112 is ………………….
A. 11011002
B. 10101102
C. 11101002
D. 10101002
SUBJECTIVES
1. Construct a hexadecimal addition table.
2. Convert the hexadecimal fractions to binary;
A) 0.3B
B) 0.4DE
C) 0.5C8
65
3. A) Convert 10101010102 to octal base (Show working)
B) Convert 4B9E16 to binary base (show working)
4. A) What is data representation?
B) How many bits/bytes makes up;
i. nibbles
ii. bytes
iii. words
66
CHAPTER FIVE (5)
INTRODUCTION TO COMPUTER SOFTWARE
LESSON OBJECTIVES
The student will be able to:
• Distinguish among the various types of computer software
• Discuss the types of Operating System
• Explain the functions of the Operating System (OS)
• Identify and state the uses of Utility Programs.
• Distinguish among the different types of Application software.
• Discuss the functions of the Application software
COMPUTER SOFTWARE
Computer software (otherwise, software) is a collection of computer instructions and related data that
tells the computer how to perform a task.
Computer software is also a collection of instructions that enable the user to interact with a computer, its
hardware, or perform tasks.
Software is the general name given to all the programs (sets of instructions) that computers use to
perform different task.
67
SYSTEM SOFTWARE
System Software is a set of programs that help run the computer and coordinate instructions between
application software and the computer’s hardware devices.
System Software is designed to provide a platform to other software. Examples of System Software are:
• Operating Systems
• Utility Programs
• Device Drivers
• Language Translators
Operating System (OS)
OS is the main software that controls how a computer system functions and manages the computer’s
hardware including processor, memory, and storage devices as well as peripheral devices.
OS provides a consistent means for applications software to work with the CPU and it is responsible for
the management, scheduling, and coordination of tasks as well as system maintenance.
Without a computer operating system, a computer and software programs would be useless.
Examples of Operating Systems
68
c. Network Operating System (N.O.S)
N.O.S runs on a server and provides the server the capability to manage data, users, groups, security,
applications, and other networking functions. N.O.S primary purpose is allow communicating and sharing
resources such as files, printers, etc. among multiple computers. E.g., NetWare, Windows Server
2003/2008, Solaris, UNIX, Linux, Mac OS X, etc.
d. Single programming O.S
SPOS allows only one program to run at a time.
e. Multi-programming O.S
MPOS execute multiple programs on the system at a time. The CPU in MPOS never get idle, because
multiple programs. It executes on the system and users can interact with the system.
f. Distributed O.S
Distributed OS manages a group of distinct computers and makes them appear to be a single computer.
The development of networked computers that could be linked and communicate with each other gave
rise to distributed computing.
g. Real-Time O.S
RTOS is defined as data processing system in which the time interval required to process and respond to
inputs is so small that it controls the environment. RTOS must have well-defined, fixed time constraints,
otherwise the system will fail. E.g., scientific experiments, medical imaging systems, industrial control
systems, robots, air traffic control, etc.
70
Utility Software
Utility software is a kind of system software designed to help analyse, configure, optimize and maintain
the computer.
A single piece of utility software is usually called a utility or tool. Utility software has long been integrated
into most major operating systems. Utility Programs are used for the management of computer systems
and also perform maintenance types tasks.
Device Driver
A device driver is a software or program that links a peripheral device (hardware) to the operating system.
It acts like a translator between a device and the applications that use it. In other words, device driver is a
program that controls a particular type of device that is attached to your computer. There are device
drivers for printers, displays, CD-ROM readers, diskette drives, video adapters, network cards, sound cards
and modems, etc.
NB: OS can include device drivers for basic components, like the mouse and keyboard, while peripheral
manufacturers often provide discs with drivers for users to install with their hardware.
Language Translator
It is another system software which convert the high-level language to machine level language for the
purpose of machine understanding.
The Machine can only understand the machine level language or binary language 0's & 1’s. The language
translator rectifies the errors within the program through different ways.
71
There are 3 types of language translator:
a. Compiler - a computer program that converts another program from a high-level language into
machine language.
b. Interpreter - a computer program that translates instructions in a program written in a high-level
computer language into machine language and executes them.
c. Assembler - a computer program that converts assembly language into machine language.
APPLICATION SOFTWARE
An application software (app or application for short) is a computer software designed to perform a
group of coordinated functions tasks, or activities for the benefit of the user.
Application software is also known as end user software. They are normally designed to solve a particular
problem, to perform useful work on specific tasks or to provide entertainment.
Examples include
LESSON ASSESSMENT
OBJECTIVES
SUBJECTS
1. A) Explain system software.
B) What is an operating system?
C) State two functions of an operating system.
D) List three examples of an operating system.
2. A) Define the following;
i. Device drivers
ii. Language Translator
iii. Utility Programs
B) Differentiate between System Software & Application Software.
75
CHAPTER SIX (6)
PERSONAL COMPUTER, HARDWARE MAINTENANCE AND SOFTWARE INSTALLATION
LESSON OBJECTIVES
The student will be able to:
• Identify common problems associated with PCs and their suggested solutions.
• Perform routine PC maintenances.
• Perform basic computer system Trouble Shooting.
• Mount and set up a computer.
• Install and/upgrade software on a computer
PC DIAGNOSTIC
It is the method of testing a computer hardware device or software device to ensure it working as it
should be. This testing is mostly performed before a computer or computer related product is released to
the public.
COMMON PROBLEMS
Problems associated to the Personal Computer can be classified as a;
Hardware Problem
Software Problem
TYPICAL HARDWARE PROBLEMS
Common problems and their symptoms;
CD/DVD: Does not read discs or will not work.
Display Problems: Cracked/smashed screen, dim screen.
Keyboard Issues: Missing keys, keyboard not working, stuck key.
Case Issues: Case cracked or broken or not fitting together.
Socket/Port Issues: Smashed, broken or loose.
Mouse Pad: not working, working intermittently or is physically damaged.
Hard drive: does not work at all or making a grinding noise when Pc is turned on.
Power: Pc does not power on, power is intermittently.
PC restarts or runs hot: randomly restarts or freezes.
Wrong timing/dating Issues: bad CMOS battery.
Pinter Issues: refuse to print.
76
SYSTEM TROUBLESHOOTING SKILLS
The more you know about why things go wrong, the better you can prepare yourself for that eventuality.
The root of all PC trouble is CHANGE. The goal isn’t to avoid change, but rather to be aware of its
consequences. It easier to troubleshoot and find the source of what’s going wrong. When you recall what
change. Those changes can be;
77
POST Errors
BIOS beeps – Single beep means POST completed perfectly and everything is ok. More than a single beep
and the system shut down means they is a problem (Check with the manufacture of the MOBO, check
their manuals and identify the problem. It can be memory, CPU, or power issue, etc.).
Hardware Errors – Not able to detect a basic essential hardware device (processor, memory, video, etc.).
This mostly shows on the screen specifying the specific issue.
SMART – Self Monitoring Analysis and Reporting Technology.
TYPES OF TROUBLESHOOTING
1. Hardware Troubleshooting
2. Software Troubleshooting
HARDWARE TROUBLESHOOTING
The process of diagnostics is usually carried out by a process of elimination.
NB: In troubleshooting, you have to keep this in mind;
Function keys: can be used to switched on and off the following; mouse pad, screen, number pad,
wireless card, sound, etc. Therefore, always keep function keys in mind when starting to
troubleshoot a PC as it can save you hours of time.
78
You can bypass parts to test them: The keyboard, mouse and monitor can all be bypassed by
inserting a USB Mouse or Keyboard. You can also put an external monitor into the video port and
this will bypass your laptop screen display.
Always Test parts with other known good parts: This is the absolute basis of troubleshooting and
whenever possible you should do this before ordering a replacement.
Troubleshooting Memory
Symptom: May see the BSoD.
79
Cause: Memory not well installed, Bad memory module, Application requesting more than the memory
space, Damage memory, etc.
Solution: Properly install Memory, fix memory module, Upgrade memory, Replace the bad memory, Run a
diagnostic tool, etc.
Troubleshooting Motherboard
Power – Not getting the right power to the motherboard.
Temperature – Too hot CPU, hence leading to consistent shutdown or restarting of the system.
BIOS – Upgrade the BIOS of the motherboard.
Solution: Check and fix the heat sink, Not Repairable (Integrated Motherboard), hence have to be replace.
PC CD/DVD drives.
Does not read discs or won’t work: Check the connection, by removing the drive out of the PC and
re-inserting it again. If it still does not work, replace it.
CD/DVD stuck in drive: Poke a very thin screwdriver or paperclip into the small hole found on the
drive face. This will manually eject the discs.
80
Printer Issues
Is it plugged in and turned on?
Are you connected to the correct printer?
Is it connected to the computer?
Does it have toner/paper?
Are there any messages on the display?
Unplug, wait 5 minutes, plug back in
Check printer settings to make sure it is online and not paused - start- control panel - printers &
faxes.
SOFTWARE TROUBLESHOOTING
It is the process of scanning, identifying, diagnosing and resolving problems, errors and bugs in software.
Software problems can stem from a conflict with other
programs or simply from difficulties the software encountered
when starting up. Shutting the program down and restarting it
can sometimes resolve issues.
• General Troubleshooting
• Your first line of defence
81
BASIC SOFTWARE TROUBLESHOOTING
Unable to install a software program – Is the CD Readable? Does the computer meet the
minimum requirements of the software?
Error during Installation – Verify the computer meets the requirements.
Program or Utility does not load or has an error when it attempts to load – Make sure all other
applications are closed before installing. Verify your computer has the correct date. Make sure the
computer has been rebooted at least once after the program installation.
Peripheral Device not working – Check the device drivers and make surely it installed and up to
date.
• Task Manager
• Event Viewer
• Windows Reporting/ Error Reporting
• MSCONFIG
PC MAINTENANCE
It is the practice of keeping computers in a good state of repair. It describes various steps to keep your
computer functioning at an optimal performance level from a software and a hardware point of view.
PC MAINTENANCE ROUTINE
1. Clean your computer. Literally!
Static electricity makes computers a magnet for dust, dirt, and debris, and it may gather for months
before you even notice a problem. These particles clog up your cooling fans and keyboard.
HERE’S HOW:
82
Each month, spray the compressed air making sure you blow away EVERYTHING that is not screwed down.
2. Do a full scan for malware
One of the easiest ways to take care of your system is to run conventional virus protection and spyware
detection software.
HERE’S HOW:
Every week, you should open up your virus protection software and manually run a full scan for viruses
and spyware.
3. Uninstall any programs you do not use
All of the programs installed on your computer, each one of them, is taking up memory and processing
time, so cleaning out your system will make some room for new programs and speed up your computer
too.
HERE’S HOW:
To uninstall programs, go to Control Panel and select Programs and Features to show a list of all programs
installed on your computer.
4. Create a system restore point.
A System Restore Point helps you restore your computer’s system files to an earlier point in time when
your system was working well.
It’s a safe way to undo system changes to your computer without affecting your personal files, such as
e-mail, documents or photos. Having a system restore point can significantly reduce your downtime.
HERE’S HOW
To create a system restore point, go to Control Panel and select Backup and Restore. Windows 7 users
click “Recover system settings or your computer”. Vista users select “Create a restore point or change
settings.”
5. Defragment your Hard drive.
Over the course of regular use, your files get fragmented or spread out all over your hard drive. So while
an MP3 or WMV file appears as a single file to you in Windows Explorer, small pieces of the file could
literally be spread across the entire hard drive.
Gathering all of these distant pieces back together into a single contiguous file makes file access faster.
Depending on how fragmented the data on your drive is, defragmenting it could make your system
noticeably faster.
HERE’S HOW:
Windows has a built-in defragmenter and check-disk utility. To access either of them just open Windows
Explorer and right-click on the drive you want to examine. Select Properties and then click on the Tools
83
tab. To defragment your HDD, go to the Defragmentation section and press the Defragment now button.
To perform a check disk, go to the Error-checking section and press the Check now button.
SETTING UP A COMPUTER
STEPS INVOLVED SETTING UP A NEW COMPUTER
1. Unpack your components
CPU tower (System Unit)
Monitor
Mouse and keyboard
Speakers - These are sometimes built into
monitor.
Printer - Some systems come packaged with a
printer, though typically this is purchased
separately.
2. Place the tower and the monitor
Place your CPU tower (System Unit) and the monitor near its intended location with enough room for all
of the fans to move air. Avoid placing the tower between sets of drawers or inside of a cabinet.
3. Connect the monitor to the tower.
Plug the monitor into one of the monitor ports on the back of the tower. Monitors typically use DVI or
HDMI connections, but some older ones use VGA.
The monitor will also need to be plugged into a power outlet.
84
4. Plug in the mouse and keyboard.
Virtually all mice and keyboards plug in via USB. If you are setting up an exceptionally old PC, you may
need to connect the mouse and keyboard via the PS/2 connectors. These are typically located at the top
of the back of the tower, and are colour coded to match the keyboard and mouse plugs.
5. Connect any speakers.
Plug your speakers into the back of the computer using the colour codes as guides. Ensure that all the
channels are placed on the correct sides, and that the speakers are plugged into an outlet if necessary.
6. Plug the tower and the monitor into an outlet.
If you can, plug it into a surge protector or uninterruptible power supply (UPS). This will help protect the
computer in the event of a power surge or power loss.
7. Turn on the computer.
Press the Power button on the front of the computer to turn it on. If you bought the computer with an
operating system such as Windows or Linux preinstalled, you will be guided through the first-time setup
process for the operating system. Follow the prompts on the screen to enter your location and create
your user account. If your computer did not come with an operating system preinstalled (this is rare), you
will need to install it yourself.
8. Connect to a network.
Before you can download any programs or start using the internet, you will need to connect your
computer to a network. You can either connect wirelessly if your computer has a wireless network card,
or you can connect to your router or modem via Ethernet.
9. Download any updates.
Chances are that your installed operating system and programs have been updated since the computer
was built. You may be prompted to download and install updates, which is essential for keeping your
computer secure and stable.
10. Install your essential programs.
Now that you are connected to the internet and Windows has been updated, you can start installing your
essential programs.
Antivirus - This should be the first program that you install, no matter what. An antivirus helps
protect your computer against malware and other malicious software, and is essential if your
computer is connected to the internet.
Favourite browser - Windows comes installed with Internet Explorer, but many people prefer
other browsers. There are a variety to choose from, including Chrome, Firefox, and Opera.
85
Word processor/productivity - Most people use their computers as a home office, which includes
installing a word processor and possibly a spreadsheet program. Microsoft Office is designed to
integrate into Windows, and you may have a trial already installed on your computer.
Games - Everyone likes to relax once in a while, so consider installing a game or two!
11. Personalize the computer.
Once all the boring stuff is out of the way, you can start making your new computer yours. You can change
your desktop background, install new cursors, change the fonts, or even completely change the way
Windows is organized using special software.
86
Either turn off the computer by choosing the shutdown option in your current operating system, or hold
the power button until the computer powers off.
6. Insert the bootable drive into the computer and power on the PC.
7. Start your computer from the drive.
8. Choose your Windows Setup options.
Once Windows Setup loads, you'll be presented with a window. Select your preferred language, keyboard
type, and time/currency format, then click Next.
9. Click the Install Now button.
10. Accept the License Terms.
Read over the Microsoft Software License Terms, check I accept the license terms, and click next.
11. Select the Custom installation.
12. Decide on which hard drive and partition you want to install Windows on.
A hard drive is a physical part of your computer that stores data, and partitions "divide" hard drives into
separate parts.
If the hard drive has data on it, delete the data off of it, or format it.
Select the hard drive from the list of hard drives.
Click Drive options (advanced).
Click Format from Drive options.
If your computer doesn't have any partitions yet, create one to install Windows on it.
Select the hard drive from the list of hard drives.
Click Drive options (advanced).
Select New from Drive options.
Select the size, and click OK.
UPGRADE
An Upgrade installation upgrades an older version of Windows on your computer (E.G. Windows Vista to
Windows 7.)
1. Start your computer normally into your current operating system.
2. Check to see if your computer is compatible with Windows 7.
The Windows 7 Upgrade Advisor scans your computer to see if you can upgrade it to Windows 7.
87
3. Prepare your computer to install Windows.
Scan your computer for malware. Malware can prevent Windows from installing correctly.
Disable or uninstall any antivirus software because they may interfere with the Windows
installation.
Uninstall some unnecessary programs to speed up the upgrade. You can install them after
Windows 7 has finished.
Update Windows with Windows Update.
Delete some unnecessary files to speed up the upgrade.
Back up your hard drive in-case the installation fails and you lose your files. (optional).
4. Insert your Windows 7 installation disc into the computer at this point.
5. Start Windows Setup.
After the disc has loaded, click Start →Computer, double click the disc drive that Windows 7 Setup was
placed in, and double-click setup.exe on the disc. Allow Setup to start.
6. Click Install Now.
7. Decide whether to install updates for Windows Setup.
The updates are intended to fix known problems with Windows Setup and installing updates makes your
installation smoother and more stable. To get updates, click Go Online to get the latest updates for
installation (recommended). To skip updates, click Do not get the latest updates for installation.
8. Accept the License Terms.
Read over the Microsoft Software License Terms, check I accept the license terms, and click Next.
9. Select the Upgrade installation.
• Start-up disk/drive
• Boot disk/drive
88
What do we mean by bootable?
A CD-ROM, CD-ROM, or USB Drive that contains its own operating system ready to load.
Bootable Disk/Drive
It contains special files required for the computer to boot into an operating system.
If the bootable disk/drive is removable media like a USB drive or CD-ROM, it usually bypasses the hard
drive depending on the settings in the BIOS.
How To Create a Bootable Drive
1. Command Prompt
2. Third Party Software (E.g., Rufus, PowerISO, etc.)
How to create a bootable USB flash drive using CMD
1. Insert a USB flash drive into a running computer.
3. Type DISKPART
4. In the new command line window that opens, to determine the USB flash drive number or drive
letter, at the command prompt, type list disk, and then click ENTER. The list disk command
displays all the disks on the computer. Note the drive number or drive letter of the USB flash drive.
5. At the command prompt, type select disk <X>, where X is the drive number or drive letter of the
USB flash drive, and then click ENTER.
6. Type clean, and the click ENTER. This command deletes all data from the USB flash drive.
7. To create a new primary partition on the USB flash drive, type create partition primary, and then
click ENTER.
8. To select the partition that you just created, type select partition 1, and then click ENTER.
9. To format the partition, type format fs=ntfs quick, and then click ENTER.
10. If your server platform supports Unified Extensible Firmware Interface (UEFI), you should format
the USB flash drive as FAT32 rather than as NTFS. To format the partition as FAT32, type format
fs=fat32 quick, and then click ENTER.
13. When you finish preparing your custom image, save it to the root of the USB flash drive.
89
CMD
What is Command Prompt?
CMD, cmd.exe or Command Prompt is a command line interpreter application available in most Windows
operating systems.
Command Line Interpreter
Any program allows the entering of commands and then executes those commands to the operating
system.
What is the use of a command prompt?
It is used to execute entered commands. Most of those commands automate tasks via scripts and batch
files, perform advanced administrative functions, and troubleshoot or solve certain kinds of Windows
issues.
How do I access the command prompt?
1. Open the Start Menu,
• CHKDSK - verifies the file system integrity of a volume and fixes logical file system errors.
LESSON ASSESSMENT
OBJECTIVE
1. The process of reducing the size of data on a disk in order to save space, can be carried out by
A. Scanning the disk
B. Compressing data on the disk
C. Applying antivirus software
90
D. Deleting the data on the disk
2. The following information are stored on a computer’s CMOS chip except
A. Date and time
B. Memory information
C. Printer configuration
D. Hard drive configuration
3. Which of the following depicts that a CMOS battery is going down? The computer
A. Fails to boot properly
B. Gives a long beep sound
C. Starts losing information in memory
D. Starts showing incorrect date and times
4. The best way to prevent damaging personal computer with static electricity is to
A. Wear a rubber shoe
B. Wear an electrostatic discharge wrist strap
C. Place the personal computer on a rubber mat
D. Periodically touch the personal computer to discharge electrons
5. Your best insurance policy against data loss ………………………………
A. backing up your files
B. defragmenting your hard drive
C. updating insurance for theft and loss of equipment
D. installing software updates
6. You are installing an additional drive into a working computer. The computer wont power up at all,
no lights, no spinning drives, nothing. What’s most likely the problem?
A. Dead hard drive
B. Insufficient DC wattage provided by the power supply
C. Insufficient AC wattage provided by the electrical outlet
D. Dead power supply
E. Corrupted driver
7. You are explaining to Jim that if you don’t ……………………………………. it can cause PC parts to
overheat.
A. Clean the keyboard
B. Keep the humidity high
C. Use liquid inside a computer
D. Remove the dust inside the PC
8. When troubleshooting, what is the first step?
A. Check the obvious
B. Turn the computer on
C. Make assumption
D. Analyse the problem without making an initial determination
9. Your new laptop has built-in wireless but it isn’t connecting to the access point. Which of the
following could be the cause?
A. The NIC driver is incorrect
B. The NIC is turned off
91
C. The NIC’s encryption is not enabled
D. The NIC has shorted out
10. What is the first step in troubleshooting a printer or scanner?
A. Check the network
B. Go to the manufacturer’s website
C. Interview the user
D. Open the printer/scanner
SUBJECTIVES
1. A) What is PC Diagnostics?
B) Define the following terminologies;
I. BIOS
II. POST
III. BSoD
2. A) What is PC Troubleshooting?
B) State and define the types of PC Troubleshooting.
3. A) What is PC Maintenance?
B) State four PC Maintenance Routines.
4. A) What is a bootable drive?
B) State the processes involved in creating a bootable drive.
5. Accordingly, state all the steps involved setting up a new computer.
92
CHAPTER SEVEN (7)
INFORMATION AND COMMUNICATION TECHNOLOGY IN EDUCATION
LESSON OBJECTIVES
The student will be able to:
• Explain concepts associated with ICT in education.
• Define multimedia in education.
• Explain Instructional Design.
• State the types of Multimedia in terms of Instructional Design.
• List the advantages of using multimedia in education.
ICT IN EDUCATION
It is the mode of education that use Information and Communications Technology to support, enhance,
and optimise the delivery of information or instructions.
Worldwide research has shown that ICT can lead to an improved student learning and better teaching
methods.
EDUCATIONAL MULTIMEDIA
Educational Multimedia applications are used to improve learning effectiveness. A multimedia learning
environment involves numbers of elements in order to enable learning process taking places. Teachers
must choose to use the multimedia approach to education.
93
INSTRUCTIONAL DESIGN
It is the analysis of learning needs and systematic development and delivery of instructions. It includes
development of instructional materials and activities; and try-out and evaluation of all instruction and
learner activities.
In terms of using multimedia to create and deliver an instruction, we have two kinds of Multimedia.
• Linear Multimedia
• Non-Linear Multimedia
MULTIMEDIA
It is the use of text, graphics, animation, pictures, video, and sound (multiple media) to present
information or instructions.
Elements of Multimedia
LINEAR MULTIMEDIA
It is a type of a multimedia that is designed to be presented in a sequential manner. It has a distinct
beginning and end. It goes on a logical flow from a starting point to a conclusion.
Linear Multimedia may also be referred to as “Passive Multimedia”.
94
Multimedia project is classified as Linear when:
• It is not interactive.
• User have no control over the content that is being showed to them.
In this kind of presentation, the creator of the multimedia is in control.
This kind of media is preferential if interaction is not necessary in the presentation.
Main goals include: to entertain, to transmit knowledge, and to make people familiar on a certain topic
WITHOUT any form of diversion.
Examples may be:
• A PowerPoint presentation
• A slideshow of pictures that goes on with a specific direction
• A storyline/ A movie
• An anime episode
• A television news
Advantages:
• Audience gets to focus and concentrate on a specific topic.
• There is logical order in the presentation. Organized.
• Presenter controls the flow of the presentation.
• Effective when we need our audience to absorb the information well.
Disadvantages:
• Minimal interactivity, or none at all.
• Audience has no say on the topic they want to dwell into.
NON-LINEAR MULTIMEDIA
It is a non-sequential type of multimedia where the person’s participation is crucial. In this type of media,
the person needs to interact with a computer program, thus making him in control of the experience.
With the presence of an interface, the person and the computer interact with each other.
From a starting point, the person using a non-linear multimedia is given a range of options that, according
to his own preferences, will lead him to a new information.
95
Multimedia project is classified as Non-Linear when:
• It is interactive
• Users have control over the content that is being showed to them.
• Users are given navigational control.
Examples may include:
• A Website
• A search engine’s home page
• A DVD menu screen
• A YouTube Channel
• Games
• Courseware
• Interactive CD
Advantages:
• The person is in control and may use the multimedia according to his preferences and needs.
Disadvantages:
• Requires a level of computer literacy from the user
• May be unorganized if not used well.
96
When introducing students to a new field or discipline, they may require additional support. It may be
helpful to represent new concepts in a variety of ways to meet the needs of different learning
preferences.
2. Technology should not dictate instructional design.
It should only be used when it is supportive of course content and student learning. Used inappropriately,
multimedia can distract, mislead or confuse students. Course goals and instructional objectives should
drive the design of course content, not simply the availability of technology.
3. Use technology to support and not distract.
Multimedia can greatly enhance learning, but it can also lead to distraction that decreases learning.
Similarly, incorporating images whose relationship to on-screen text or an accompanying narration
remains unclear, can result in cognitive dissonance, causing students to struggle while they try to make
sense of a perceived uncertainty.
4. Introduce media incrementally.
Trying to incorporate too much too quickly can overwhelm faculty who are new to multimedia.
5. Solicit advice from other faculty who have had success using digital multimedia content.
Experienced users can provide a reference point for the beginner.
6. Investigate existing multimedia sources/archives with content that is in your goal/objective
domain.
Through open education resource (OER) initiatives, appropriate, accurate/credible and vetted content is
widely available. While it is essential to acknowledge and adhere to the parameters of ‘Fair Use’ when
using material that are under copyright.
7. Solicit feedback in the course evaluation to determine what multimedia components were
successful.
Students can greatly assist in identifying which multimedia items they perceived to be useful in enhancing
the learning experience.
97
4. Multimedia guide learners to peer learning.
5. Multimedia provides teachers with a new educational style & encourage curiosity
6. Multimedia help teachers & learners look into topics from a broader perspective as each topic
comprises excessive information.
7. Using different presentations like video clips along with maps or other kinds of presentations help
to get the information closer to reality. Adding music makes the idea clearer and it attracts the
attention of the learners.
LESSON ASSESSMENT
OBJECTIVES
1. Computer based training refers to a
A. Video game
B. Method of training a computer to reject virus
C. Method of training the computer to perform routine tasks
D. Method of education that allows people to learn at their own pace using a software
2. To integrate multimedia in education, one needs appropriate
A. Payments
B. Registration
C. Resources
D. Tutorials
3. In a district having fifteen secondary schools, there is only one information and communication
technology tutor. What type of technology will the tutor deploy to effectively teach the fifteen
schools at the same time?
A. Bluetooth
B. Voice over internet
C. Video conferencing
98
D. Gather the students in one school
4. The main goal of …………....... is to entertain, to transmit knowledge, and to make people familiar
on a certain topic WITHOUT any form of diversion.
A. Linear Multimedia
B. Non-Linear Multimedia
C. Multimedia
D. Instructional Design
5. The purpose of integrating ICT in education is to ………….......
A. dictate instructional design for teaching and learning
B. support and distract teaching and learning
C. just support, enhance, and optimize the delivery of information
D. improve the quality of teaching and learning
6. All the following are dynamic multimedia except ………….......
A. Animation
B. Graphics
C. Audio
D. Video
SUBJECTIVES
1. A) What is an Instructional Design?
Use the statement below to answer b) and c)
In terms of using multimedia to create and deliver an instruction, we have two kinds of Multimedia.
B) State them?
C) Differentiate between them?
2. A) What is;
I. Computer Assisted Learning (CAL)
II. Web Based Learning (WBL)
B) State three advantages of computer assisted learning over internet-based learning.
3. A) What is multimedia as used in education.
99
CHAPTER EIGHT (8)
SPREADSHEET APPLICATION
LESSON OBJECTIVES
The student will be able to:
• Enter and save data.
• Edit data.
• Demonstrate the various ways of displaying data.
• Apply protection techniques to data.
• Format numbers, decimal points, dates, times.
• Highlighting values that meet specified conditions.
• Merge and split cell
• Sort and query for information.
• Create graphs and charts to represent data.
• Edit and format charts.
• Protect data and worksheets.
• Work with functions in spreadsheet applications.
• State the importance of the “Help Facility” in Spreadsheet Application.
• Analyse data in a worksheet using pivot tables/dynamic crosstab.
SPREADSHEET
It is an interactive computer application for organisation, analysis and storage of data in a tabular form.
Example Microsoft Excel.
Microsoft Excel is a commercial spreadsheet application written and distributed by Microsoft for
Microsoft Windows and Mac OS X. It mostly used for;
- Tracking sells or expenses (revenue).
- Maintaining large list of data (Student Assessment)
100
101
A. Ribbon
Ribbon contains commands organized in three components:
- Tabs: They appear across the top of the Ribbon and contain groups of related commands. Home,
Insert, Page Layout are the examples of ribbon tabs.
- Groups: They organize related commands; each group name appears below the group on the
Ribbon. For example, group of commands related to fonts or group of commands related to
alignment etc.
- Commands: Commands appear within each group as mentioned above.
102
You can configure the status bar by right-clicking anywhere on it and by selecting or deselecting options
from the provided list.
J. Worksheet Tab
It used to display the worksheet that a user is currently editing. Every Excel File may have multiple
Worksheets. Worksheet is a single page in a workbook file that consists of cells where data is kept and
manipulated. Workbook is the collection of one or more worksheets in a single Excel file.
K. Cell
A cell is the intersection of a column letter and a row number. The cell address can be found in the Name
Box just above column A. There are over 17 billion cells in each worksheet!!!!
L. Active Cell
Is a cell in Excel spreadsheet that is currently selected by clicking mouse pointer or keyboard keys. An
active cell is bounded by a heavy border around it. A spreadsheet cell in which values or formulas may be
entered.
M. View Buttons
The group of three buttons located to the left of the Zoom control, near the bottom of the screen, lets you
switch among excels various sheet views.
- Normal Layout view: This displays the page in normal view.
- Page Layout view: This displays pages exactly as they will appear when printed. This gives a full
screen look of the document.
- Page Break view: This shows a preview of where pages will break when printed.
N. Zoom Control
Zoom control lets you zoom in for a closer look at your text. The zoom control consists of a slider that you
can slide left or right to zoom in or out. The + buttons can be clicked to increase or decrease the zoom
factor.
O. File Tab
The File tab replaces the Office button from Excel 2007. You can click it to check the backstage view,
where you come to open or save files, create new sheets, print a sheet, and do other file-related
operations.
First column of the backstage view will have the following options:
OPTION DESCRIPTION
Save If an existing sheet is opened, it would be saved as is, otherwise it will display a
dialogue box asking for the sheet name.
Save As A dialogue box will be displayed asking for sheet name and sheet type. By default,
it will save in sheet 2010 format with extension .xlsx
103
Open This option is used to open an existing excel sheet.
Close This option is used to close an opened sheet.
Info This option displays the information about the opened sheet.
Recent This option lists down all the recently opened sheets.
New This option is used to open a new sheet.
Print This option is used to print an opened sheet.
Save & Send This option saves an opened sheet and displays options to send the sheet using
email etc.
Help You can use this option to get the required help about excel 2010.
Options Use this option to set various option related to excel 2010.
Exit Use this option to close the sheet and exit.
104
EDITING WORKSHEET
Entering data
Entering text or a number in a cell:
Conditional Formatting
Conditional Formatting (CF) is a tool that allows you to apply formats to a cell or range of cells, and have
that formatting change depending on the value of the cell or the value of a formula.
The simplest Conditional Formatting uses the Cell Value Is option in the CF dialog box, and uses one of the
pre-set comparison operations.
Editing Data
Activities to perform on data
• Conditional formatting
• Custom number format
• Import text file
• Paste special option etc.
105
Conditional formatting
To apply a format condition to a cell or range of cells:
1. Select the range to which you want to apply the format condition
2. Click the Format button on the dialog box. You will see the standard cell-formatting dialog.
3. Select the format type you want to apply
Custom number format
Excel has many built-in formats that you can use: Currency, Accounting, Date, Time, Percentage, etc. If
you cannot find the right format, you can create a custom number format.
Steps to use Number format
1. Select a cell you want to work in.
2. Go to Number format on the ribbon. OR right click and select format cell.
3. Select the format you want from the format cell (e.g., currency, date, time, percentage,
Accounting, etc.)
4. Click ok
5. Type the number format selected
6. Press the enter key or tab button.
106
Import text file
Setting up which file (type) to import
First, select the sheet where your data needs to appear. Note that the following steps differ for the
various Excel versions.
1. On the ribbon, click the data tab and then click the "From Text" button on the "Get External data"
group.
107
Activities to perform on data
To Unfreeze:
1. To unfreeze rows or column
2. Click on freeze pane
3. Click unfreeze pane
What-if Analysis
1. Go to the data tab, click what if analysis
2. Click scenario manager
• Add a scenario by clicking on add
• Type a name (e.g., 60% highest), select cell (e.g., C4) (% sold for the highest price) for changing
cells and click ok.
• Enter corresponding values (0.6) and click on ok again
• Next add 4 other scenarios (70%, 80%, 90% and 100%)
3. Goal Seek
• On the data tab, in the forecast group, click what-if Analysis
108
• Click goal seek
• Select the cell (e.g., D10)
• Click in the ‘to value’ box and type (e.g., 4700)
• Click in the ‘By changing cell box and select cell (e.g., C4)
• Click ok
4. Data table
• Select the entire matrix area. (let’s say B6:F15)
• Be sure to select the cell that contains the formula or function. (Say B6)
• Click the data tab.
• From the What if Analysis drop-down, choose data table
• The row input cell is the term value (enter C4 original input value)
• The column input cell is the interest rate (enter B4)
• Click ok to generate the data Table
Data Protection
Adding password to protect data (Protecting sheet):
5. Go to Home tab
6. Click format at cell column on the ribbon to open dropdown list
7. Click on protect sheet
8. Check and uncheck the desired options
9. Enter password desire, re-enter the same password
10. Click ok to protect the sheet
Locking cell
1. Select the cell desire to lock
2. Go to home tab on the ribbon
3. Click format at cell column to open dropdown list
4. Click on lock sheet
Removing password (Unprotecting sheet):
1. Go to Home tab
2. Click format on the ribbon to open dropdown list
3. Click on unprotect sheet
4. Enter the password
5. Worksheet is done unprotected
FORMATTING WORKSHEET
Format Numbers, Decimal Points, Dates & Time
DATA HANDLING
Sort in Excel
Sorting data is an integral part of data analysis
Sorting can be done ascending or descending order, numerically, alphabetically or chronologically (order
of time), compile a list of product inventory levels from highest to lowest etc. To sort:
1. Select a cell in the column you want to sort
2. On the Home tab, Click sort & filter in Editing panel
3. Select the option you want to apply e.g., custom sort, filter, A to Z, Z to A
4. Click to apply
Using custom Sort
1. Select the columns you want to sort
2. On the ribbon, click data then sort
3. Dialog box appear, select the column you want to sort by
4. From the order dropdown, select custom list
5. In custom list tab, select the list you want and then click ok to sort the worksheet.
110
Query in Excel
A query is a request for data or information from a database table or combination of tables.
Using Excel Query, you can extract data from various source such as:
Excel Files – you can extract data from External Excel files as well as run a SELECT query on your current
workbook.
Access – you can extract data from Access Database files.
MS SQL Server – you can extract data from Microsoft SQL Server tables.
How to Create a Microsoft Query in Excel
1. Open the MS Query (from Other Sources) wizard. Go to the DATA Ribbon Tab and click From Other
Sources. ...
2. Select the Data Source. Next, we need to specify the Data Source for our Microsoft Query. ...
3. Select Excel Source File. ...
4. Select Columns for your MS Query. ...
5. Return Query or Edit Query. ...
6. Optional: Edit Query. ...
7. Import Data.
• Add, remove or change chart elements such as chart title, data table, data labels, axes title,
Legend, gridlines etc.
Chart Style
112
4. On design, go to add elements and click to select the desire elements
(chart title, data table, data labels, axes title, Legend, gridlines etc.)
5. Quick Edit of Chart title
o Click the Chart title in the chart
o Click to bring the insertion cursor to edit title
Chart Style
Steps
1. Click to select the chart in the worksheet
2. Click chart tools tab and click on design
3. Click the chart style or the colour scheme desire
Chart Filter
Steps
1. Click to select the chart in the worksheet
2. Click the filter icon
3. Select and deselect which categories and values to be visible
4. Click apply to effect change
113
USING FUNCTIONS & FORMULAS
Formulas and Functions
Formula is a self-defined instruction for performing calculations. Formula can be combination of values
(number of cell references) and mathematical operators in algebraic expressions.
Mathematical Operators:
• + (addition)
- (subtraction)
• (multiplication)
• / (division)
• % (percentage)
• ^ (exponents)
Functions
Function is a pre-defined formulas in excel that is intended to carry out a specific calculation, logic tests,
formats, etc. in cell which is located.
Functions perform calculations by using specific values, called arguments, in a particular order called
syntax.
The most logical solution would be to type ’=AVERAGE(B2, C2)’ into cell.
114
• The equal sign begins the function.
• AVERAGE is the name of the function.
• B2, and C2 are the arguments.
• Parentheses enclose all of the arguments.
• Commas separate each of the arguments.
Components of Functions
115
Using insert function
1. Go to the formulas tab
2. Click the insert function icon ‘fx’ in the formula bar
3. Insert function dialog box appears
4. Select a category and the function. e.g., IF and click ok
5. Input the function argument by clicking to select the first cell range(number 1) and second cell
range (number 2)
NB: Number of cell range depends on the function
6. Click ok
Built-in-functions
Mathematical Calculations
116
Sum If Adds the cells specified by one or many given
criteria
Round
E.g., Rounding up to 2 decimal places 4.125 in cell B,
=Round(B2,2) returns 4.13
Trunc
E.g. 2.2 or 2.7 in cell A, =trunc(A1,0), returns 2
Mod
E.g. =Mod(32,6), returns 2 because you have 5 times 6 in 30 and the remainder is 2.
Sqrt & Power
E.g., =sqrt (16) returns 4, OR =Sqrt (C1) return 4 if the cell value in C1 is 16.
Power (4,2) returns 16 (4 times 4) OR =Power(C1,2), returns 16, if the cell value in C1 is 4.
Conditional Calculations
117
IF function is a logical function that is one of the two possibilities (true or False).
The syntax is =IF (logical-test, value-if-true, value-if-false)
E.g., =IF(B6>=50, “Pass”, “Fail”)
True False
Comparison Operators
Symbols Used
• = equal to
> greater than
VLOOKUP
VLOOKUP function searches vertically (top to bottom) the leftmost column of a table (either in the same
sheet, another sheet or another workbook) until a value that matches or exceeds the one you are looking
up is found.
Syntax
=VLOOKUP(lookup_value,table_array,col_index_num,[range_lookup])
OR
=VLOOKUP(lookup value,lookup table range, volume column)
An example of the formula is: =VLOOKUP(E2,D2:M3,2,TRUE)
• The English translation is using the value found in the cell E2, look in the range of D2 to M3 row by
row.
• If you find a value that matches or exceeds the value in E2, using that row, go over 2 columns to
the right, grab the value there and bring it back.
• There are two range lookup argument options; TRUE (1) or FALSE (0)
o True: looks for approximate value within the column, but not larger
o False: looks for exact match and uses that row to access the desired information.
118
Inserting VLOOKUP function in a table
119
120
Pivot Tables/Crosstab
Pivot table is used to summarise, analyse, explore and present your data with ease.
121
122
123
Display data in a pivot table / crosstab by a defined criterion
Features available in crosstab tables that are not available in PivotTables.
• In a crosstab table, you can use the same field for both your row heading and your column
heading. Pivot table will not use the same field for both headings; if you attempt to do this, the
column heading will be ignored.
124
• When a criteria range is defined on a worksheet, the crosstab table will include only the data that
meets the criteria. A Pivot table will use all of the data in a list, ignoring any ranges named ‘criteria’
or the result of an AutoFilter.
o To create a Pivot table from selected records in database, use the Advanced Filter to copy
the result set to a different location and specify a criteria range. Then, create the Pivot
table from the result.
LESSON ASSESSMENT
OBJECTIVES
1. To select multiple non-adjacent cells in a worksheet, click the cells while holding down the
A. ALT key
125
B. CTRL Key
C. CTRL + ALT keys
D. SHIFT key
2. Which of the following displays the content of an active cell in a worksheet?
A. Formula bar
B. Menu bar
C. Name box
D. Status bar
3. The process of identifying specific rows and columns so that these rows and columns are always
visible on the screen is called
A. Fixing
B. Freezing
C. Locking
D. Selecting
4. In spreadsheet, which of the following is a text function?
A. COUNT()
B. DMAX()
C. ROUND()
D. UPPER()
5. A red triangle at the right corner of a cell in a spreadsheet program indicates that
A. The value in the cell is incorrect
B. The cell cannot accept formula
C. There is a comment associated with the cell
D. The formula entered into the cell has an error
6. Which of the following symbols is required when inserting a formula/function in a spreadsheet
application?
A. //
B. #
C. *
D. =
7. Spreadsheet applications are designed to
A. Create QBasic programs for display
B. Generate slides for presentation
C. Store, edit and format graphics and other images
D. Enter and store data organised in rows and columns
8. Which of the following symbols can be used to concatenate in a spreadsheet application?
A. & and ?
B. + and ^
C. , and –
D. + and &
9. When a user creates two or more separate windows containing part of the spreadsheet that can
be viewed, such a user has created
A. Panes
126
B. Sections
C. Subsets
D. Views
10. The function key F12 in a spreadsheet application opens the
A. Close dialogue box
B. Font dialogue box
C. Open dialogue box
D. Save as dialogue box
11. In spreadsheet, a user can create a relationship between two cells using
A. Formula
B. Numbers
C. Parentheses
D. Text
12. To view headers and footers information in a spreadsheet application, use the
A. Web layout button
B. Print layout view
C. Normal view button
D. Outline layout button
13. Which of the following formulas will spreadsheet not be able to compute?
A. = SUM(Sales) – A3
B. = SUM(A1:A5)*5
C. = SUM(A1:A5)/(10-10)
D. = SUM(A1:A5) – 10
14. Ms. Excel files have the default extension
A. .doc
B. .ppt
C. .txt
D. .xls
15. Which of the following terms is not a valid data type in a spreadsheet application?
A. Character
B. Date
C. Number
D. Text
SUBJECTIVE
127
MARKS GRADES
From 80 – 100 A
From 70 – 79 B
From 60 – 69 C
From 40 to 59 D
Below 40 F
2. A) What is electronic spreadsheet application?
B) State four benefits of using an electronic spreadsheet application.
PRACTICAL
1. A) Use an appropriate spreadsheet application to enter the following data:
2. A) Use spreadsheet application to create the table below and save as RESULTS in the folder created.
129
CHAPTER NINE (9)
INTRODUCTION TO DATA PROCESSING SYSTEMS
LESSON OBJECTIVES
The student will be able to:
• Explain concepts and terminologies associated with databases.
• Design and create a database using a variety of ways.
• Administer a database.
• Create and use a query.
• Create and use forms.
• Design and manage reports.
• Relevance of Using Microsoft Access.
DATA
Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video.
Computers process data in a database into information.
By itself, data might not mean very much. In order to understand it, it needs to be interpreted (or
processed) to become information.
DATABASE
A systematically arranged collection of computer data, structured so that it can be automatically retrieved
or manipulated.
Simply put, a database is just a collection of related data organized into tables stored in a computer
system.
There are two main types of databases;
1. Relational Database:
RDB is a collective set of multiple data sets organized by tables, records and columns.
A well-defined relationship between database tables.
Relational Databases uses Structured Query Language, which is a standard user application that
provides an easy programming interface for database interaction.
2. Flat File Database:
FFD is a database that consists of a simple list and may have duplication of data much like a simple
record card.
So-called flat database consisting of a single table does not require much knowledge of database
theory.
DATA INTEGRITY
Identifies the quality of the data. The more errors the data contains, the lower its integrity.
130
GIGO
Garbage In, Garbage Out is a computing phrase that points out the accuracy of a computer’s output
depends on the accuracy of the input.
• Customer List
• Product List
RECORD:
An element or row in a database/file that contains a collection of data about an item. Information about a
single entity or item. it is a group of details about one specific item of the
table. It could contain a customer's name, his phone number, his member
ID, his work number, his marital status, etc.
• Customer Record
• Product Record
FIELD:
An element or column in a database table/file that contains a specific item or information. A single item of
data common to all records or the individual data items held for each record.
131
TABLE:
A table is made of rows and columns in which data is organized. A row is considered a Record.
QUERY:
It is a set of instructions passed to a database to retrieve particular data. E.g. SELECT firstName,
LastName, Age FROM STUDENT. A question/request about the data stored in a database.
FORMS:
Forms allow you to view data stored in your tables. It also allows you to enter data into fields.
132
REPORTS:
Reports allow you to print data based on queries or tables that you have created.
PRIMARY KEY:
The Primary Key is the unique identifier for each record in a table. Access will not allow duplicate entries
in a Primary Key field. By default, Access sets the first field in the table as the Primary Key field. The
primary key is vital for establishing relationships with other tables.
RELATIONSHIP;
133
A relationship in Access helps you combine data from two different tables. Each relationship consists of
fields in two tables with corresponding data.
Types of relationship
• One-to-Many relationship
• Many-to-Many relationship
• One-to-One relationship
VIEWS:
A database view is a searchable object in a database that is defined by a query. Though a view doesn't
store data, some refer to a view as “virtual tables,” you can query a view like you can a table. A view can
combine data from two or more table, using joins, and also just contain a subset of information.
DATABASE DESIGN
Is a collection of processes that facilitate the designing, development, implementation and maintenance
of enterprise data management systems. It helps produce database systems
1. That meet the requirements of the users
134
2. Have high performance.
The main objectives of database designing are to produce logical and physical designs models of the
proposed database system.
The steps in the development life cycle do not necessarily have to be followed religiously in a sequential
manner.
Requirement analysis
• Planning - This stage concerns with planning of entire Database Development Life Cycle. It takes
into consideration the Information Systems strategy of the organization.
• System definition - This stage defines the scope and boundaries of the proposed database system.
Database designing
• Logical model - This stage is concerned with developing a database model based on requirements.
The entire design is on paper without any physical implementations or specific DBMS
considerations.
• Physical model - This stage implements the logical model of the database taking into account the
DBMS and physical implementation factors.
Implementation
• Data conversion and loading - this stage is concerned with importing and converting data from the
old system into the new database.
• Testing - this stage is concerned with the identification of errors in the newly implemented system.
It checks the database against requirement specifications.
Microsoft access
Ms. Access is a Database Management System (DBMS) from Microsoft that combines the relational
database system with a graphical user interface and software development tools.
Microsoft Access can be used for;
135
• personal information management,
• in a small business to organize and manage all data, or
• in an enterprise to communicate with servers.
Relational Database
RDB is a collective set of multiple data sets organized by tables, records and columns.
A well-defined relationship between database tables.
Relational Databases uses Structured Query Language, which is a standard user application that provides
an easy programming interface for database interaction.
CREATING A DATABASE
Create Database
1. To create a database, we first need to open MS Access.
2. Select Blank desktop database.
3. Enter a name in the File name field and specify the location for your file to be saved.
4. Now, press the Create option. Access will create a new blank database and will open up the table
which is also completely blank.
We know this database is blank because it only contains one table (called Table1) and that table only has
one column (called ID). So we need to add some more columns to the table and give the table a name.
136
Create a Table
With database management systems, you need to create your tables before you can enter data.
Using our blank database, we are going to rename Table1 to Customers. This table will have 4 columns:
CustomerId, FirstName, LastName, and DateCreated.
1. Rename the ID field to CustomerId. To do this, Right-click on the ID column and select Rename
Field. Enter CustomerId when prompted.
2. On the next field, click on Click to Add (unless Access has already opened the menu for you) and
select Short Text.
3. At this point, Access will conveniently highlight/select the field name (currently Field1) so that you
can name the field. Call it FirstName.
4. Do the same again for the next field (LastName) and select data type Short Text.
5. In the next field, select the Date & Time data type and name the field DateCreated.
What we just did was create the column names and specify the type of data that can be entered into
them. Restricting the data type for each column is very important and helps maintain data integrity. It can
ensure that the user enters the data in the intended format. It can also guard against accidents like for
example, inadvertently entering an email address into a field for storing the current date.
Your database table should now look like this:
137
NB: Don't worry if you accidentally entered the wrong data type. You can change the datatype in the
Ribbon toolbar by adjusting the data type under the Data Type dropdown (top right area of the toolbar).
We have just created a database table. We did this in Datasheet view. Next, we will see how it appears in
Design view.
Design View
Design View is a database window in which tables are designed for a database. Design view enables you to
design and set up your database (kind of a "behind the scenes" view of your database). This is where you
set up and configure your tables, forms, reports, etc.
As you continue working with MS Access, you will find yourself switching between Design view and
Datasheet view (or in the case of forms, Layout view) often.
Switch to Design View
The following steps demonstrate how to switch to Design view.
1. Click on the View icon at the top left (just under the File menu). The View icon currently looks like
this:
2. At this point, Access will ask you to name and save the table you just created. Type Customers and
click OK.
3. You are now looking at your Customers table in Design view. Click on the DateCreated field, then in
the bottom pane, enter =Now() in the Default Value field. Also click in the Format field and select
General Date from the contextual menu.
138
We have just set a default value for the DateCreated field. This means that, whenever a new record is
entered, this field will automatically be populated with the current date and time. We have also specified
a format for all dates that are stored in this field.
Note: Primary Key - You might have noticed the little "key" icon to the left of the CustomerId field. This
indicates that the field is a primary key.
Switch Back to Datasheet View
Now that we're in Design view, you might have noticed that the View icon looks different - it has changed
from a Design view icon into a Datasheet view icon. It now looks like this:
Click the View icon to return to Datasheet view, and we'll look at the options for adding data to our table.
Adding Data
In Microsoft Access, there are many ways to add data to your database. Which method you choose will
depend largely on how much data you need to add and whether the data already exists outside of Access.
139
The main methods of adding data to a database;
1. Datasheet View
A database window that displays data from a table, form, report or query for changes (e.g., editing,
viewing, addition, deletion and searching) to be affected.
You can type directly into the table while it's in Datasheet view. While this is fine for smaller tables with a
small number of records that are rarely updated, it's not suitable if you plan to maintain a lot of records.
It's also not really suitable if there will be non-technical users maintaining the database. For non-technical
users, it's better to create a nice user-friendly form.
2. Form
You can set up a form, so that non-technical users can enter data into the form. Once they submit the
form, the data is automatically inserted into the database. One of the great things about forms is that they
can insert into many tables - saving you from having to open up each table to manually insert the data.
3. SQL View
You can use SQL view to insert data into your database. You can also use SQL view to do many other
things with your database (including creating tables). SQL (which stands for Structured Query Language) is
the standard programming language for working with databases.
4. External Data
There may be times when you need to load your database with data that already exists. For example, you
might have data in an Excel spreadsheet or even a .csv file that you want to transfer to an Access
database. This can be done!
Access 2013 allows you to import data from the following file types: Microsoft Excel, Microsoft Access,
ODBC Databases (such as SQL Server), Text or comma-separated value (CSV) files, SharePoint List, XML,
Data Services, HTML Document, Outlook folder
To import data from any of these file types, select EXTERNAL DATA from the Ribbon, select the file type,
then follow the prompts.
For now, we will create a form to enter data into our Customers table.
Create a Form:
As mentioned, Access forms provide non-technical users the ability to add data to your database. Forms
also make it easier to insert data across multiple tables.
There are several methods to create a form, options include using the;
• Form Wizard,
• Design view, and
• even starting with a blank form
Here's the quickest way to create a form in Access.
140
1. Ensuring that the Customers table is selected (in the left navigation pane), from the Ribbon, select
CREATE > Form
2. Access has just created a brand new form in Layout view, based on the fields in the Customers
table. Click on the inverted triangle under the View icon and select Form View:
3. This is how the user will see the form. Go ahead and enter data into the FirstName and LastName
fields. Be sure to hit Enter after you've entered the last name. Then hit enter again to add another
record.
141
4. Now let's check our table. Click Customers in the left navigation, then click Refresh All on the
Ribbon. You should now see your newly created record in the table:
You might notice that the DateCreated field is full of hashes symbols ######. This is because the
column is currently too narrow to display the data. You can resize the column to fit the data by
double clicking at the side of the column header. First, move the cursor to the edge of the column
header until it changes appearance into a resize tool, then double click. The column should now be
wide enough to display the data.
Now let's switch back to the form and save it.
1. Click on the second tab called Customers (the first one is for the Customers table), then click the
Save icon in the top left (above the Ribbon):
142
2. Rename your form Customers Form when prompted:
The form will now appear in the left navigation column under the heading Forms.
Next, we will switch to Design view and modify our form.
Modify Form
Here, we'll give the form a fresh new look and we'll also prevent users from modifying the DateCreated
field.
Design View
1. Click the Design view icon at the bottom right corner of Access (you can also use the icon at the
top left of the Ribbon if you prefer):
143
2. Click on the DateCreated field, then click Property Sheet. The Property Sheet will appear to the
right of the form:
144
3. On the Property Sheet, scroll down until you see the Locked option. Change its value to Yes using
the drop-down control.
We have just "locked" the DateCreated field so that users can't change it. This field is intended to store the
date that each record was first entered into the system.
4. Next, select the CustomerId label (the label is the one on the left - don't touch the ones on the
right), and add a space so that it becomes Customer Id. Do the same for the other fields. This just
makes the form a bit more readable and more presentable, as the labels are what the user sees. It
should look like this:
145
5. Now close the Property Sheet and switch to Layout view.
Layout View
It's time to give our form a new look.
1. In Layout view, click in a blank part of the form (i.e., away from the fields). This should select the
form detail area.
2. From the Ribbon, select a background colour for the form:
3. Now feel free to format some of the other elements on the page. For example, background colours
on each field, change the border colour of each field, bold the labels, etc. If you want to select
multiple fields, hold the Shift key down while you select them. You can even move fields around by
clicking and dragging them. And you can resize the fields by clicking and dragging their edges (you
can also do it via the Property Sheet). Don't forget to save the form once you're happy with it.
Here's an example of how a form can look by doing just that:
146
Form View
Now switch back to Form view and see how the form looks and works. Enter in a few records. And a few
more. You can also slide the Navigation Pane back to make more room for the form (you can do this in any
view).
147
Done. Next, we'll create a relationship.
Create a Relationship
A primary feature of relational databases is that they contain multiple tables, each of which can have a
relationship with any of the other tables.
Our database needs more than one table anyway, because we need to be able to track not only
customers, but also products, as well as the products the customers actually purchase.
So, let's create two more tables and establish a relationship between them. One table will hold product
information; the other will hold order information.
Create the Related Tables
Go ahead and create two tables as follows.
Be sure to set a format and default value for the DateCreated fields on both tables (the user shouldn't
need to enter this field - the system can do that).
148
Primary Key
Remember that the key icon indicates that the field is a primary key. A primary key ensures that the data in
this field is unique - no two values can be the same. A table must have a primary key before a relationship
can be established with another table. Access automatically sets the ID field as a primary key, so as long as
you simply rename ID to ProductId (or OrderId as the case may be) it will already be a primary key.
Establish the Relationship
Now that you've created two extra tables, our database has three tables. Now it's time to create the
relationship between all three tables.
1. While viewing a table in Design view, and ensuring that the DESIGN tab is selected, click
Relationships from the Ribbon:
2. A Show Table dialog box will pop up, displaying all three tables. Select all of them and click Add:
149
3. Click Close to close the dialog box.
4. You will now see three boxes, which represent your three tables. Click and drag the CustomerId
from the Customers table across to the corresponding CustomerId field on the Orders table:
5. The Edit Relationships dialog will pop up. Click Enforce Referential Integrity so that it is checked.
Check that the values are the same as the following screenshot and click OK:
150
You will now see a line established between the CustomerId field on the Customers table and the
CustomerId on the Orders table.
6. Now do the same for the Products table. That is, click and drag the ProductId from the Products
table across to the corresponding ProductId field on the Orders table. Your table relationships
should look like the ones in the following screenshot:
Relationship Types
We just established a many-to-many relationship. There are three (3) types of relationships that you can
establish between tables. These are as follows:
1. Many-T-Many Relationship* - This is an association between tables in which one record in either
table relates to many records in the other table.
2. One-To-Many Relationship – This is an association between two tables in which the primary key
value in each record in the primary table (i.e., the one side of this relationship) corresponds to the
value in the matching field or fields of many records in the related table.
3. One-To-One Relationship – This is an association between two tables in which each record in the
first table contains a field value that corresponds to the field value of one record in the other table.
NB: A relationship establishes an association between common fields in two tables. The type of
relationship that you use depends on the table structure and how the fields are defined.
Junction Table
In the above relationship, the Orders table is known as a junction table. A junction table is one that
contains common fields from two or more other tables within the same database. It is used as a reference
table in a many-to-many relationship (such as we are doing in our example).
Junction tables are known under many different names. Here are some: cross-reference table, bridge table,
join table, map table, intersection table, linking table, many-to-many resolver, link table, pairing table,
pivot table, transition table, or association table.
151
Foreign Key
A foreign key is simply the primary key's corresponding field in the related table. So, in our example, the
CustomerId field in the Orders table is a foreign key, while the CustomerId field in the Customers table is a
primary key. Likewise, the others.
Relationships and Queries
Creating relationships like the one above can assist in building queries against the database. Next, we're
going to use our newly created relationship to help us create a query against the tables in our database.
Create a Query
A query refers to the action of instructing the database to return some (or all) of the data in your
database. In other words, you are "querying" the database for some data that matches a given criteria.
The queries are run against one or more tables to return only the data that you're interested in. For
example, you might like to see a list of all individuals whose last name is "Griffin". And so on and so on.
Sample Data
Before we start querying the database, we should probably make sure we've got enough data in there
first. Otherwise, it doesn't matter how good our queries are - they will all return zero results if there's zero
data. So, let's add some data.
Remember, the ID columns and DateCreated columns are automatically generated, so you only need to
enter data into two columns in each table.
Feel free to make up your own data. Here's mine:
Customer
152
Products
Order
Referential Integrity
When you create a relationship, you also have the option to Enforce Referential Integrity (which we
selected when we created our relationship). This prevents foreign key values from having no corresponding
primary key value in the referenced table.
153
Create the Query
Now let's create a query that returns the names of all customers who have ordered a product.
1. Ensuring you have the CREATE tab open on the Ribbon, click Query Design.
2. The Show Table dialog box will appear with all of our tables listed. Select all three tables and click
Add, then click Close:
3. The three tables are now represented in the top pane (beneath the Ribbon). Choose the fields
you'd like to be presented in the results of your query. You can either double click on the field
name or click and drag it down to a column in the bottom pane. Select the fields as follows:
154
4. Click the Run button at the top-left part of the Ribbon:
5. You should now see the result of the query. Here's mine:
155
6. Save the query by right-clicking on the Query1 tab and giving it a name. Call it Customer Orders:
Our query successfully returns all customers who ordered at least one product and it includes the product
and its price next to their name. You can also see that some customers have ordered more than one
product. The query has automatically joined the three tables using the relationship that we created and
returned the matching data.
This query will only return those customers who have ordered at least one product. If a customer is in the
Customers table but does not order a product, that customer's record will not be displayed in the results
of this query. If you look back at the Customers table (near the top of this page), you'll see that Marge
Simpson is a customer but she hasn't ordered any products yet (i.e., she doesn't have a corresponding
record in the Orders table).
Next, we're going to modify our query so we can look at some of the other things we can do with queries.
156
Modify a Query
OK so we just created a query to return all customers in our database who have ordered a product. Now
we'll see if we can tweak the query a little bit here and there to see what other results we can return.
Product Name
The marketing department wants to see who, if anyone, ordered their most expensive space ship. So, let's
return a list of all customers who purchased the most expensive space ship - the "Venus Carrera ET".
1. From Design view, in the bottom pane, enter "Venus Carrera ET" (double quotes included) into the
Criteria field of the ProductName field:
2. Click the Run button in the Ribbon to view the results of the query. Alternatively, you can just click
the Datasheet View icon. And here's the result:
3. Once you're satisfied with the results, return to Design view and remove your modification (i.e.,
remove "Venus Carrera ET" from the Criteria field).
Price
You could also modify your query so that it returns customers who purchased a product worth over a
certain price.
So, let's construct a query that returns all customers who purchased any product with a price over
$80,000.
1. From Design view, in the bottom pane, add (>80000) into the Criteria field of the Price field:
157
2. Click the Run button in the Ribbon to view the results of the query. Alternatively, you can just click
the Datasheet View icon. And here are the results:
You could spend a lot of time tweaking this one simple query. For example, here's some ideas:
158
3. Click OK to save the file at the default location. Alternatively, change the location and/or a file
name. You can also select any other options you wish to include:
159
4. Click Close. Alternatively, you could select Save Export Steps before clicking Close.
You now have an Excel spreadsheet containing the data from your query that you can send to anyone you
like.
As you can see from the Ribbon, you can export to other file types such as XML, text file, and even PDF
documents. The steps are similar to the above.
160
WORKING WITH REPORTS
Designing and Managing Reports
LESSON ASSESSMENT
OBJECTIVE
1. The code that is stored with a form or report is called
A. Class module
B. Form module
C. General module
D. Standard module
2. The maximum length of a text in a database is
A. 75
B. 120
C. 255
D. 265
3. The SQL statement used to read data from a table is
A. GET
B. QUERY
C. READ
D. SELECT
4. Which of the following data types would be appropriate to use to store the name of a customer in a
database?
A. DATE
B. MEMO
C. NUMBER
D. TEXT
5. Which of the following fields in a database application can help speed up data retrieval?
A. Data
B. Key
C. Program
161
D. Record
6. In order to add a new row to an existing table, the SQL statement to use is
A. CREATE
B. INSERT
C. UPDATE
D. WHERE
7. One-to-many relationship between student and class tables means
A. One class may have many students
B. One student may have many classes
C. Many classes may have many students
D. Many students may have many classes
8. A database that informs database management system about the whole data structure is called
A. Data control language
B. Dynamic link library
C. Data definition language
D. Data manipulation language
9. Which of the following options is not a data type in a database application?
A. Date/Time
B. Number
C. Picture
D. Text
10. In a datasheet, each column represents a
A. Database
B. Field
C. Record
D. Table
11. Checking input data against specified criteria is referred to as data
A. Check
B. Control
C. Validation
D. Verification
12. The object that stores commands to retrieve data from a created database is called a
A. Form
B. Query
C. Report
D. Table
13. In order to sort or arrange rows in a table based on one or more columns in SQL, the statement use is
A. ARRANGE BY
B. GROUP BY
162
C. ORDER BY
D. SORT BY
14. The following terms represent database objects except
A. Queries
B. Reports
C. Relationships
D. Tables
15. The correct order of keywords used in an SQL statement is
A. FROM, SELECT, WHERE
B. SELECT, FROM, WHERE
C. SELECT, WHERE, FROM
D. WHERE, SELECT, FROM
SUBJECTIVES
1. A) What is;
I. Relationship, as used in database;
II. Lookup field?
B) Explain the following database relationship types;
I. one-to-one
II. one-to-many
III. many-t- many
2. A) What is a database?
B) Define the following terms as used in Database;
I. File
II. Field
III. Record
IV. Table
V. Query
PRACTICALS
1. Create a database application and save it as MOCK in the folder created.
163
2 210099 34 55 76
3 210022 88 75 66
2 210077 45 53 55
1 210064 89 55 43
TABLE 1
A) Create:
I. the structure for table 1 using ST_ID as the primary key and save as EXAMS.
II. a form that will enable users to enter data into EXAMS and save as EFORM.
B) Use the from in 2 (a)(ii) to enter data as shown in table 1.
C) Create a query to sort the table EXAMS by LEVEL and MATHS in ascending order. Save as SRTEXAMS.
2. At a recent Parent Teachers Association meeting in a certain Senior High School, the school authorities
expressed their concern about the health of the students. Towards this, some data of the students were
collected as shown below.
STUDENTDETAIL
SUBJECT
SUBJECTSELECTION
165
CHAPTER TEN (10)
INTRODUCTION TO PROGRAMMING LANGUAGES
LESSON OBJECTIVES
The student will be able to:
• Explain Programming Language.
• Trace the development of programming languages from 1954 to date.
• Identify the categories of programming of languages.
• State the differences between the categories of Programming Language.
• Describe the features of particular Programming Languages.
• Explain common terminologies associated with programming.
• State the basic steps involved in the development of a computer program.
• Explain the concept of Algorithms.
• Explain the techniques used for representing them.
• State the Algorithm building blocks.
• Explain the concept of flow chart.
• Explain the factors to consider in constructing flowcharts.
• Construct a flow chart.
• Identify flowchart symbols.
• Identify types of flowcharts.
COMPUTER PROGRAM
A computer program is a step-by-step set of instructions that a computer has to work through in a logical
sequence in order to carry out a particular task.
PROGRAMMING LANGUAGE
Programming languages are the vocabulary and set of grammatical rules for instructing a computer to
perform specific tasks. Programming Language is an artificial language used to write a sequence of
instructions (a computer program) that can be run by a computer. Similar to natural languages, such as
English, programming languages have a vocabulary, grammar, and syntax.
166
HOW DOES A COMPUTER PROGRAM WORK?
Computers don’t do anything without someone telling them what to do, much like the average teenager.
To make the computer do something useful, you must give it instructions in either of the following two
ways:
• Write a program, which tells a computer what to do, step-by-step, much as you write out a recipe.
• Buy a program that someone else has already written that tells the computer what to do.
Ultimately, to get a computer to do something useful, you (or somebody else) must write a program.
A program does nothing more than tell the computer how to accept some type of input, manipulate that
input, and spit it back out again in some form that humans find useful.
LOW-LEVEL LANGUAGE
A low-level language is a programming language that provides little or no abstraction of programming
concepts and is very close to writing actual machine instructions. Low-Level languages are used to write
programs that relate to the specific architecture and hardware of a particular type of computer.
167
Examples of low-level language:
1. Machine Code
2. Assembly Language
Machine Language (ML)
This is the lowest-level programming language. It is a set of instructions executed directly by a computer’s
central processing unit. Machine Languages are the only language understood by computers. While easily
understood by computers, machine languages are almost impossible for humans to use because they
consist entirely of binary numbers (0s and 1s).
Advantages of Machine Language
1. Fast execution speed.
2. Programmer’s full control of the computer and its capability.
Disadvantages of Machine Language
1. Difficult to learn
2. Highly prone to errors
3. Totally machine-dependent (Programs written in ML will only execute on the specific machine they
were written).
Assembly Language
Assembly Languages are between machine languages and high-level languages. Assembly Languages are
similar to machine languages, but they are much easier to program in because they allow a programmer
to substitute names for numbers. It uses symbolic names or mnemonic codes to refer to machine code
instructions, rather than using the instructions’ numeric values.
Though assembly language is very close to machine language, computer cannot execute it directly. The
Language Translator that can create machine codes out of assembly language is called Assembler.
168
Disadvantages of Assembly Language
1. It is cumbersome in usage.
2. It has one-to-one relationship with machine language, hence has to be translated into ML
instruction. This process leads t long program preparation time.
3. Assembly Language is machine-dependent like Machine Language.
HIGH-LEVEL LANGUAGE
High-level languages are relatively sophisticated sets of statements utilizing words and syntax from human
language. They are more similar to normal human languages than assembly or machine languages and are
therefore easier to use for writing complicated programs.
However, high-level languages must be translated into machine language by another program called a
Compiler or Interpreter before a computer can understand them. High-level languages are often called
problem-oriented languages or business-oriented language.
Types of High-level Languages
Many Languages have been developed for achieving a variety of different tasks. Some are fairly
specialised, and others are quite general. These languages, categorized according to their use, are;
Categorisation of High-level programming languages;
1. Categorisation based on Application
On the basis of application area, the high-level language can be divided into the following types:
i) Commercial languages
These programming languages are dedicated to the commercial domain and are specially designed for
solving business-related problems. These languages can be used in organization for processing handling
the data related to payroll, accounts payable and tax building applications. COBOL is the best example of
the commercial based high-level programming language employed in the business domain.
ii) Scientific languages
These programming languages are dedicated to the scientific domain and are specially designed for
solving different scientific and mathematical problems. These languages can be used to develop programs
169
for performing complex calculation during scientific research. FORTRAN is the best example of scientific
based language.
iii) Special purpose languages
These programming languages are specially designed for performing some dedicated functions. For
example, SQL is a high-level language specially designed to interact with the database programs only.
Therefore, we can say that the special purpose high-level language is designed to support a particular
domain area only.
iv) General purpose languages
These programming languages are used for developing different types of software application regardless
of their application area. The various examples of general-purpose high-level programming languages are
BASIC, C, C++, and java.
2. Categorisation based on Design paradigm
On the basis of design paradigms, the high-level programming languages can be categorised into the
following types:
i) Procedure-oriented languages
These programming languages are also called an imperative programming language. In this language, a
program is written as a sequence of procedures. Each procedure contains a series of instruction for
performing a specific task. Each procedure can be called by the other procedures during the program
execution. In this type of programming paradigms, a code once written in the form of a procedure can be
used any number of times in the program by only specifying the corresponding procedure name.
Therefore, the procedure-oriented language allows the data to move freely around the system. The
various examples of procedure-oriented language are FORTRAN, ALGOL, C, BASIC, and ADA.
ii) Logic-oriented languages
These languages use logic programming paradigms as the design approach for solving various
computational problems. In this programming paradigms predicate logic is used to describe the nature of
a problem by defining the relationship between rules and facts. Prolog is the best example of the logic-
oriented programming language.
iii) Object-oriented languages
These languages use object-oriented programming paradigms as the design approach for solving a given
problem. In this programming language, a problem is divided into a number of objects, which can interact
by passing messages to each other. Java, C++ and C# are the examples of object-oriented programming
language.
170
DIFFERENCES BETWEEN LOW-LEVEL LANGUAGE AND HIGH-LEVEL LANGUAGE
NOTE
Assembler is a computer program for translating assembly language – essentially, a mnemonic
representation of machine language – into machine language.
Interpreter reads each code converts it to machine code and executes it line by line until the end of the
program.
Compiler- the source code (in text format) will be converted into machine code which is a file consisting of
binary machine code that can be executed on a computer.
171
FEATURES OF PROGRAMMING LANGUAGES
1. Data Types
A data type represents a type of the data which you can process using your computer program. It can be
numeric, alphanumeric, decimal, etc. It can be thought of as a way of giving stored data a description.
2. Variables
Variables are the names you give to computer memory locations which are used to store values in a
computer program.
For example, assume you want to store two values 10 and 20 in your program and at later stage you want
to use these two values. Let's see how you will do it, here are the following three simple steps:
172
• INPUT Statement – allows the user to enter a value for the variable while running the program.
Examples of input statement INPUT X , INPUT name , READ X ,etc.
• OUTPUT Statement (PRINT Statement) – is used to display the results on the screen. To send an
output to a printer, you use PRINT Statement. Examples are: PRINT X , PRINT name,
etc.
8. Built in Functions
Is a function that is built into an application and can be accessed by end-users. Examples of built-in
functions are SQR, MOD, SUM, AVERAGE, MIN, MAX, SIN, COS, etc.
9. Sequential Execution
Programs start by executing the first statement and continue by executing statements in sequence. The
idea of sequential execution is this:
Executes a statement or sequence of statements only if some condition holds. The simplest form of
conditional statement involves only one possible action. For example, printing out a message when the
value of a variable is positive.
If x > 0
Print ‘x is positive
11. Looping constructs
A loop is a sequence of instruction(s) that is continually repeated until a certain condition is reached.
Typically, a certain process is done, such as getting an item of data and changing it, and then some
condition is checked such as whether a counter has reached a prescribed number. Example (C
Programming)
#include <stdio.h>
main()
{
int i = 0;
while ( i < 5 )
{
printf( "Hello, World!\n");
i = i + 1;
}
}
12. Nested Loops
You can create code that embeds one loop inside another loop. This is called a nested loop.
173
13. Arrays
An array is a data structure, which can store a fixed-size collection of elements of the same data type. An
array is used to store a collection of data, but it is often more useful to think of an array as a collection of
variables of the same data type. Example (C programming)
type arrayName [ arraySize ];
int number[5] = {10, 20, 30, 40, 50}
174
7. Comment
Comments are used in a programming language to document the program and remind programmers of
what tricky things they just did with the code. Comments are text notes added to the program to provide
explanatory information about the source code.
8. Debugging
Bug is an error in a program that prevents the program from running as expected. Debugging is the
routine process of locating and removing computer program bugs, errors or abnormalities, which is
methodically handled by software programmers via debugging tools.
9. Programming Errors
There are basically three (3) types of errors that you must contend with when writing computer programs;
• Syntax Errors – represent grammar errors in the use of the programming language. Examples
misspelled variable and function names, missing semicolons, etc.
• Runtime Errors – occurs when a program with np syntax error asks the computer to do
something that computer is unable to reliable do. Runtime error is a program error that occurs
while the program is running, and mostly indicates bugs. Examples trying to open a file that
doesn’t exist, etc.
• Logic Errors – is a mistake in a program’s source code that results in incorrect or unexpected
behaviour. For example, assigning a value to the wrong variable may cause a series of
unexpected program errors.
10. Instruction
A single action that can be performed by a computer processor.
175
Software Development Model helps developer to select a strategy to develop the software. These are few
software development paradigms or process models water fall, iterative model, spiral model, v-model, big
bang model, etc.
3. Algorithm Development (Phase 3)
The developer develops a systematic procedure to solve the problem using the specification given in the
previous phase. The algorithm can be developed using:
4. Coding (Phase 4)
This phase uses a programming language (like C, C++, Java, PHP, etc.) to write or implement actual
programming instructions for the steps defined in the previous phase.
5. Testing & Debugging (Phase 5)
The developer checks whether the code written in previous step is solving the specified problem or not.
The developer also tests whether it is producing the desired output or not.
6. Documentation, Implementation and Maintenance (Phase 6)
During this phase (documentation), the programmer makes a detailed description on how the program
was created. It contains a brief narrative process undergone by a program. In these steps (maintenance),
the users actively use the program. If any enhancements found in this phase, all the phases are to be
repeated again to make the enhancements. That means in this phase, the end user uses the solution
(program).
NB: It can be in order of five stages as follows: (1) Define and analyse the problem, (2) Design a method of
solution using flowchart and or pseudocode, (3) Write the programme in a suitable programming
language, (4) Test and Debug the program, (5) Document, implement and maintain the programme.
ALGORITHMS
In programming, algorithm is a set of well-defined instructions in sequence to solve the problem.
Algorithm is a logical sequence of steps for solving a problem, often written out as a flow chart that can be
translated into a computer program. It can also be defined as a step-by-step procedure to solve a given
problem. A recipe in a cookbook is an excellent example of an algorithm.
Characteristics of an Algorithm
176
• An algorithm shouldn't have computer code. Instead, the algorithm should be written in such a
way that, it can be used in similar programming languages.
177
Symbol Name Function
Indicates any type of internal operation
Process inside the Processor or Memory like data
transformation, data movement, logic
operation, etc.
Used for any Input/Output operation.
Input/Output Indicates that the computer is to obtain
data or output result.
179
Types of Flowcharts
1. Data Flow Diagram (DFD)
DFD reveal relationships among and between the various components in a program or system. DFDs
consists of four major components: entities, processes, data stores, and data flows.
2. System Flowcharts
System flowcharts are a way of displaying how data flows in a system and how decisions are made to
control events.
A: First Number
B: Second Number
Algorithm
Step 1: Start
Step 3: SUM = A + B
Step 5: Stop
180
2. Algorithm & Flowchart to convert temperature from Celsius to
Fahrenheit.
C: Temperature in Celsius
F: Temperature in Fahrenheit
Algorithm
Step 1: Start
Step 2: Input C
Step 3: F = (9.0/5.0 * C) + 32
Stop 5: Stop
Algorithm
Step 1: Start
Step 2: Input L
Step 3: Area = L * L
Step 4: Perimeter = 4 * L
Step 6: Stop
181
4. Algorithm & Flowchart to find Simple Interest.
P: Principal Amount
N: Time in Years
Algorithm
Step 1: Start
Step 3: SI = (P x N x R)/100.0
Step 6: Stop
Algorithm
Step 1: Start
NUM1, NUM2
Algorithm
Step 1: Start
ELSE
ENDIF
Step 6: Stop
183
7. Algorithm & Flowchart to find Even number between 1 to 50.
Algorithm
Step 1: Start
Step 2: I = 1
Step 7: Stop
184
TRIALS
185
LESSON ASSESSMENT
OBJECTIVES
1. One of the characteristics of machine language is that
A. It uses mnemonic code
B. Each computer has its own machine language
C. It uses simple words that are easy to remember
D. It uses complex words that are difficult to remember
2. The first compiled programming language was
A. C++
B. FORTRAN
C. Pascal
D. Visual Basic
3. The rules of a programming language is called
A. Documentation
B. Source code
C. Pseudocode
D. Syntax
4. Keywords used in pseudocode programming include:
I. DO UNTIL
II. SELECT
III. END IF
IV. IF
A. I, II and III only
B. I, III and IV only
C. II, III and IV only
D. I, II, III and V
5. Examples of object-oriented programming languages include:
I. COBOL
II. JAVA
III. BASIC
IV. C++
Which of the following options are correct?
A. I and III only
B. II and III only
C. II and IV only
D. III and IV only
6. Which of the following options contains computer instructions?
A. Audio
B. Data
186
C. Program
D. Video
The following below shows an algorithm for printing the numbers inclusive. Certain statements of the
algorithm have been represented with the letters P and Q.
Use the flowchart below to answer questions 7 to 10.
SUBJECTIVES
2. A) What is an algorithm?
B) Write an algorithm to convert a temperature in Celsius (C) scale to Fahrenheit (F) scale.
188
3. A) Write an algorithm to find the largest of three numbers.
189
CHAPTER ELEVEN (11)
INTRODUCTION TO DESKTOP PUBLISHING APLPLICATION
LESSON OBJECTIVES
The student will be able to:
• Identify the types of Desktop Publishing application Package.
• Identify the features of the Desktop Publishing application.
• Explain the terminologies in Desktop Publishing application.
• Explain the principles of designing publications.
• Plan a publication for designing.
• Design publications.
• Edit publication.
• Format background of publication.
• Format text in a publication.
• Print publication.
190
3. QuarkXPress – is a desktop publishing software that runs on MacOS and Windows. It was first
released by Quark, Inc. in 1987 and is still owned and published by them.
4. Adobe InDesign – is a desktop publishing and typesetting software application produced by Adobe
Systems. It can be used to create works such as posters, flyers, brochures, magazines, newspapers,
presentations, books and eBooks.
5. Serif PagePlus – is a desktop publishing (page layout) program developed by Serif for Microsoft
Windows.
6. Corel Draw – is best known for its graphics suite that includes Corel DRAW and Corel Photo-Paint.
7. Apple Page 2
191
TERMINOLOGIES IN DESKTOP
• Publication gallery - task pane that display all the designs available for publication type.
• Design checker – a tool that checks publications for design consistency and alerts the user to a
potential problem.
• Frames - holds objects such as text, pictures and graphics.
• Colour scheme - Pane which displays colours.
DESIGNING PUBLICATIONS
The elements and principles of design are the building blocks of publications.
Elements of Deign
The Elements of Design are the things that make up a design.
• Line – the linear marks made or created when two shapes meet.
• Shape – is a self-contained defined area of geometric (squares, circles, free formed shapes or
natural shapes).
• Direction – all lines have direction (horizontal, oblique, or vertical).
• Size – is simply the relationship of the area occupied by one shape to that of another.
• Texture – is the surface quality of a shape (rough, smooth, soft, hard glossy, etc.).
• Colour – is light reflected off objects. Colour has three main characteristics: hue/name, value and it
intensity.
Principles of Design
The Principles of Design are what we do to those elements.
How we apply the principles of design determines how successful the design is.
192
PLANNING A PUBLICATION FOR DESIGNING
• Design – create detailed plan of something: to make a detailed plan of the form or structure of
something, emphasizing features such as its appearance, convenience, and efficient functioning.
NB: You need to create the design grid (A system of guidelines, borders, and columns into which
elements are placed and to which they are aligned).
• Paper size – the background area the publication will occupy.
• Format - the layout and presentation of a publication, including its size and the paper and type
used.
• Colours - the property of objects that depends on the light that they reflect and is perceived as red,
blue, green, or other shades.
• Etc.
DESIGNING PUBLICATION
Greeting cards, Invitation Cards, Posters, Business Cards, Letterheads, Certificates Banners, Brochures,
Post card, etc.
EDITING PUBLICATION
Fonts, typefaces and images, adjust point sizes, headings, and alignment, etc.
PRINTING A PUBLICATION
Production of copies: the process or business of producing copies of documents, publications, or images.
• Desktop publishing and graphic design can make documents look better or prettier.
• Desktop publishing, used properly, enhances visual communication by simplifying the process of
disseminating information of all kinds.
• Desktop Publishing Software allows the user to rearrange text and graphics on screen, change
typefaces easily and also resize graphics before finally committing a design to paper.
193
PRACTICAL ASPECT
GETTING STARTED WITH MICROSOFT PUBLISHER
MS Publisher deals with all kinds of layouts, objects, formats and content, it doesn’t work exactly like
you’re used to in MS Word. Below is a quick guide on how to go about the basic stuff.
It used primarily for page layouts and designs. It also created with small business users in mind. You can
create publications from scratch or use a template. Each file you create in publisher is called a publication.
The publications you create can be saved in publisher’s default extension: .pub.
• Template – are publications built into Publisher for you to use. They have elements already added
to them. Yours is to only customize it to suit your purpose.
• Blank – are publication pages with no or less inbuilt elements. Selecting the blank template, means
you’re starting from scratch.
o Blank Templates
o Templates with built-in elements
Working with Objects
You will notice that in Publisher, everything will be formatted into movable “boxes”. These are known as
objects, and are outlined with a border with four white circles and four white squares.
This may seem weird at first, but these frame-like boxes allow you to group, edit, manipulate and move
content around on the page more easily. Here are some ways you’ll be working with objects frequently:
Adding text – To add text to your project, you work within the text boxes and can edit the text within the
object directly. You can also add your own by going to the Insert tab and clicking on the Draw Text Box
command, which lets you click and drag to create your own text object where you want it.
194
Adding pictures – Adding pictures to your content is as easy as clicking on Home > Pictures. You’ll have
options to insert pictures from a file, OneDrive or from a search on Bing. In addition, you have a number
of options to format your picture in your publication.
Just head over to the Format tab when your picture is selected and you can start tailoring your images.
By exploring a few customizations, you can easily select an element you want and then click and drag to
reposition and resize the element accordingly. It’s an easy way to apply and manipulate reusable pieces of
content.
195
You’ll find this coming in handy when you want to add headings, borders, sections, accents, and
advertisements. Microsoft Publisher has these building blocks built right in, but you can also create your
own.
196
The Design Checker reviews your content for a variety of design and layout problems, allowing you to
catch and fix them before you finalize a print job.
And don’t worry if you aren’t a designer, the tool will provide you with explanations and suggestions on
how to fix the problems it detects.
You can also specify the types of problems the tool will look for by clicking on the Design Checker Options
dialog box.
197
Printing up your Project
As an application geared towards creating digital content meant to be printed up, this will be another
basic task you’ll need to be familiar with. To print up your project, Microsoft Publisher has a few methods
to help print your content.
CTRL + P
In addition to your usual PDF and common file types, there is also the Pack and Go Wizard via
File>Export>Pack and Go.
This method will give you options on how to save your file for different printing purposes – even for a
commercial printer – so you don’t have to worry about the technical details of formatting and settings.
The Wizard will do that for you. You simply decide which option is best for your needs:
198
TRIALS
Now that you know a bit more about how Microsoft Publisher works, it’s time to try your hand at it. In
addition to some templates, we collected a few Microsoft Publisher tutorials to help you quickly get
started:
LESSON ASSESSMENT
OBJECTIVES
1. The software that is used to arrange text and graphics into professional-looking document is called?
A. Image editor
B. Spreadsheet programme
C. Desktop publishing programs
D. Database management programs
6. Which of the following alignments generally gives a more formal appearance to a text in desktop
publishing?
A. Centred
B. Fully Justified
C. Left Aligned
D. Ragged Right
SUBJECTIVES
COMPUTER NETWORK
A computer network is a system of interconnected devices that can communicate using some common
standard (called protocol). These devices communicate to exchange resources (e.g., files and printers) and
services. Here is an example network consisting of two computers connected together:
In the example above, the two computers are directly connected using a cable. This small network can be
used to exchange data between just these two computers.
What if we want to expand our network? Then we can use a
network device, either a switch or a hub, to connect more
than two computers together: Now all of the devices on the
network can communicate with each other.
Networking
The act of linking computers so that users can exchange
information or share access to a central store of information.
202
REASONS FOR USING A NETWORK
1. Communication – When connected to the internet, network users can communicate with people
around the word. Example, talking or chatting with your brother outside your country.
2. File Sharing – Networks offer a quick and easy way to share files directly, instead of using disk or
USB. Example, using Xender App to share files on phones.
3. Sharing Resources – It easy to share resources such as printers. More than one computer in an
office could share one printer.
4. Sharing Software – it possible to stream software using web applications. Example, using google
doc, etc.
• Server – is a computer hardware or software that provides resources, data, services, or programs
to other computers known as clients, over a network.
• Client – is a computer hardware or software that accesses a service made available by a server.
• Connection – is a term that describes the link between a plug into a port or jack. This generally
infers that a connection is built before the data transfer and then deconstructed at the end of the
data transfer.
• Packet – is a data unit in computer network. Meaning is a message or part of a message packaged
as a fixed-size segment of data for transmission through a computer network.
• Network Interface – is any kind of software interface to networking hardware. It may be
associated with a physical device, or it may be a representation of virtual interface.
• Protocol – is a set of rules and standards that basically define a language that devices can use to
communicate. Some level protocols are TCP, UDP, IP, and ICMP.
• Port – is an endpoint to a logical connection. It is an address on a single machine that can be tied
to a specific piece of software.
• Firewall – is a system designed to prevent unauthorized access to or from a private network. You
can implement firewall in either hardware or software form, or a combination of both.
• Gateway – is a hardware device that acts as a ‘gate’ between two networks. It may be a router,
firewall, server, or other device that enables traffic to flow in and out of the network. While a
gateway protects the nodes within network, it is also a node itself.
• Node – is a connection that can receive, create, store, or send data along distributed network
routes. It either a redistribution point or communication endpoint.
• Network Address Translation (NAT) – is a process of changing the source and destination IP
addresses and ports. Address translation reduces the need for IPv4 public addresses and hides
private network address ranges. Routers or firewalls usually do the process.
• Virtual Private Network (VPN) – is an encrypted connection over the internet from a device to a
network. Hence, a means of connecting separate LANs through the internet, while maintaining
privacy.
• Domain Name Server (DNS) – translates internet address (such as www.ashts.com) to IP address
(such as 208.215.179.146) so routers can find websites on the internet.
203
• Dynamic Host Configuration Protocol (DHCP) – is a network protocol that automatically assigns IP
addresses to the devices on your network.
• Ethernet - is a networking standard.
• Internet Protocol (IP) Address – is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication.
• Internet Service Provider (ISP) - is a company that provides individuals and other companies’
access to the Internet and other related services for a fee.
• Wi-Fi Protected Access (WPA and WPA2) – are wireless security standards for protecting your
wireless network and the data on your wireless network.
• Sneaker-net – is a slang term that refers to the transfer of data and electronic files between
computers through removable media (like hard drives, flash drives, etc.) which are physically
transported between computers and on foot.
NETWORK DEVICES
HUBS
A hub serves as a central point to which all of the hosts in a network connect to. It receives a signal from
one port and sends it out to all other ports. Sometimes it is called a multiport repeater.
SWITCHES
Like hubs, a switch is used to connect multiple hosts together, but it has many advantages over a hub.
Each port on a switch is a separate collision domain and can run in a full duplex mode.
ROUTERS
A router is a device that routes packets from one network to another. It connected to at least two
networks, commonly to LAN’s or WAN’s or a LAN and its ISP’s network.
204
REPEATER
A network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to
regenerate analog or digital signals distorted by transmission loss.
BRIDGE
A network bridge is a device that divides a network into segments. Each segment represents a separate
collision domain, so the number of collisions on the network is reduced.
205
TYPES OF NETWORKS
There are various types of computer networks available. We can categorize them according to their size as
well as their purpose.
206
PERSONAL AREA NETWORK (PAN)
PAN is a computer network formed around a person. It generally consists of a computer, mobile, or
personal digital assistant. PAN can be used for establishing communication among these personal devices
for connecting to a digital network and the internet.
Characteristics of PAN
• It may establish a bad connection to other networks at the same radio bands.
• Distance limits.
Characteristics of LAN
207
Advantages of LAN
• Computer resources like hard disks, DVD-ROM, and printers can share local area networks. This
significantly reduces the cost of hardware purchases.
• You can use the same software over the network instead of purchasing the licensed software for
each client in the network.
• Data of all network users can be stored on a single hard disk of the server computer.
• You can easily transfer data and messages over networked computers.
• It will be easy to manage data at only one place, which makes data more secure.
• Local Area Network offers the facility to share a single internet connection among all the LAN
users.
Disadvantages of LAN
• LAN will indeed save cost because of shared computer resources, but the initial cost of installing
Local Area Networks is quite high.
• The LAN admin can check personal data files of every LAN user, so it does not offer good privacy.
• Unauthorized users can access critical data of an organization in case LAN admin is not able to
secure centralized data repository.
• Local Area Network requires a constant LAN administration as there are issues related to software
setup and hardware failures.
Characteristics of MAN
208
Advantages of MAN
• It offers fast communication using high-speed carriers, like fibre optic cables.
• It provides excellent support for an extensive size network and greater access to WANs.
• The dual bus in MAN network provides support to transmit data in both directions concurrently.
• A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
• You need more cable to establish MAN connection from one place to another.
• In MAN network it is tough to make the system secure from hackers
Characteristics of LAN:
• WAN helps you to cover a larger geographical area. Therefore, business offices situated at longer
distances can easily communicate.
• Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
• WLAN connections work using radio transmitters and receivers built into client devices.
Disadvantage of WAN
209
• It requires more time to resolve issues because of the involvement of multiple wired and wireless
technologies.
• Offers lower security compared to other types of networks.
NETWORK TOPOLOGY
A network topology refers to the layout of a network and how different nodes in a network are connected
to each other and how they communicate. Topology can be physical or logical.
• Physical Topology – is the physical layout of nodes, workstations, and cables in the network.
• Logical Topology – is the way, information flows between different components.
Five (5) commonly used network topologies are;
Most networks, including the Internet, use combinations of these topologies.
STAR TOPOLOGY
On a star network topology, all of the computers and devices (nodes) on the network connect to a central
device, thus forming a star. It consists of one central node, typically a switch or hub, which acts as a
conduct to transmit messages. In star topology, every node is connected to a central node.
A star network contains a single, centralized hub or
switch through which all the devices in the network
communicate.
Advantages of a Star Topology
BUS TOPOLOGY
Bus topology is the physical arrangement of computers or nodes in a network such that each
computer/node in the network is connected to a common shared transmission medium.
210
A bus network topology consists of a single central cable, to which all computers and other devices
connected. The bus is the physical cable that connects the computers and other devices. In a bus network
transmission data, instructions, and information in both directions.
Advantages of a Bus Topology
RING TOPOLOGY
In a ring topology, all devices in the network are connected via a cable that loops in a logical ring or circle.
In ring topology, the data circulates in a logical ring shape within the network. When a computer or device
sends data, the data travels to each computer on the ring until it reaches its destination. Ring topologies
are used in both local area network (LAN) and wide area network (WAN) setups.
211
On a ring network, all connected devices form a continuous loop.
Advantages of a Ring Topology
• Each packet of data must pass through all the computers between source and destination. This
makes it slower than Star Topology.
• If one workstation or port goes down, the entire network gets affected.
• Network is highly dependent on the wire, which connects different components.
MESH TOPOLOGY
Is a network set up where each computer and network device is interconnected with one another,
allowing most transmissions to be distributed, even if one of the connections goes down. Mesh
technology comes into two types:
Full Mesh – Every computer in the network has a connection to each of the other computers in that
network. The number of connections in this network can be calculated using this formula: n(n-1)/2 (n is
the number of computers in the network).
Partial Mesh – Not all hosts have point-to-point connection to every other host. This topology exists
where we need to provide reliability to some hosts out of all.
Advantages of a Mesh Topology
212
HYBRID TOPOLOGY
Hybrid topology is a type of network topology, which is made of two or more different topologies. Hybrid
topology is the combination of two or more of the primary topologies (i.e., bus, star, ring and mesh) to
form a new network.
A hybrid network topology can be made of different network topologies. Hybrid topologies are often
made using combination of bus topology, star topology, mesh topology (full-mesh topology or partial-
mesh topology), ring topology or wireless topology as per the requirement of the organization.
An example of hybrid topology is star-bus topology. Below image shows a star-bus hybrid network
topology.
Another example of hybrid topology is star-ring topology. Below image shows a star-ring hybrid network
topology.
NETWORK ARCHITECTURE
Every component of the network must be planned very well so that information can travel fast from one
point of a network node to the other. The components of a network are;
• Peer-to-peer (P2P)
• Client – server.
• File – Sever.
PEER-TO-PEER ARCHITECTURE
A peer-to-peer (P2P) network is a simple, inexpensive network architecture that typically connects fewer
than 10 computers. Each computer or mobile device, called a peer, has equal access shared resources
found on other computers on the network.
214
For example, you might set up a P2P network between an Android tablet and a Windows Laptop so that
they can share files using Bluetooth or so that you can print from the tablet to a printer accessible to all
devices on the network.
Both wired and wireless networks can be configured as a peer-to-peer network. Connections can be wired
or wireless and may occur through a communications device.
CLIENT-SERVER ARCHITECTURE
On a client/server network, one or more computers acts as a server, and the other computers on the
network request services from the server.
For example, a server might store an organisation’s information system. Client on the network, which
include any user connected computers or mobile devices, access the information system’s database on
the server.
Both wired and wireless networks can be configured as a client/server network. Most client/server
networks required a person to serve as a network administrator because of the large size of the network.
215
NETWORK TRANSMISSION MEDIA
Networking systems deliver data using a number of different transmission media, including copper wires,
fibre-optic cables, communication satellites, Bluetooth and microwave radio, etc.
TYPES OF NETWORK TRANSMISSION MEDIA
Transmission medium is a physical connection or an interface between the transmitter and the receiver.
There are two major categories of transmission media, namely;
1. Guided Transmission Medium (Cabling system) – twisted pair, coaxial cable. Fibre optic etc.
2. Unguided Transmission Medium (Wireless system) – Bluetooth, infrared, Wireless Fidelity (Wi-Fi),
satellite etc.
GUIDED MEDIA
Guided means those that provide a conductor from one device to the other device. A signal travelling by
this media means is directed and contained by the physical limits of the medium.
216
Twisted Pair Cable
A twisted-pair cable has four pair of wires. These wires are twisted around each other to reduce crosstalk
and outside interference (noise/electro-magnetic interference). This type of cabling is common in most
current LANs.
Twisted-pair cabling can be used for telephone and network cabling. It comes in two versions,
1. UTP (Unshielded Twisted-Pair) and
2. STP (Shielded Twisted-Pair)
The difference between these two is that an STP cable has an additional layer of insulation that protects
data from outside interferences.
Coaxial cable
Coaxial cable has an inner conductor that runs down the middle of the cable. The conductor is
surrounded by a layer of insulation which is then surrounded by another conducting shield, which makes
this type of cabling resistant to the outside interference.
This type of cabling comes in two types,
1. Thinnet.
2. Thicknet.
Both types have a maximum transmission speed of
10 Mbps. Coaxial cabling was used for computer
networks, but today are largely replaced by twisted-
pair cabling.
217
Fibre-optic cabling
This type of cabling uses optical fibres to transmit data in the form of light signals. The cables have strands
of glass surrounded by a cladding material.
UNGUIDED MEDIA
Unguided transmission transmits the electromagnetic waves without using any physical medium. In
unguided media, air is the media through which the signal flows.
Radio Waves
Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are normally called radio waves.
Radio waves are omnidirectional. When an antenna transmits radio waves, they are propagated in all
directions. The omnidirectional characteristics of radio waves make them useful for multicasting in which
there is one sender but many receivers.
Micro Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves. Microwaves
are unidirectional. When an antenna transmits microwaves, they can be narrowly focused.
218
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for short-range communication.
Infrared waves, having high frequencies, cannot penetrate walls.
The layers are usually numbered from the last one, meaning that the Physical layer is consider to be the
first layer. Most people learn the mnemonic “Please Do Not Throw Sausage Pizza Away”
219
Purpose of The Layers
Vendors most commonly use them. They enable them to implement some functionality into a networking
device, which then enables easier interoperability with devices from other vendors. It mainly describes
general guidelines for designing and implementing computer protocols.
Brief Description of Each of The Layers
Physical
Defines how to move bits from one device to another. It details how cables, connectors and network
interface cards are going to work and how to send and receive bits.
Data Link
Encapsulates a packet in a frame. A frame contains a header and a trailer that enable devices to
communicate. A header, most commonly, contains a source and a destination MAC address. A trailer
contains the Frame Check Sequence field, which is used to detect transmission errors. The data link layer
has two sublayers:
1. Logical Link Control – used for flow control and error detection.
2. Media Access Control – used for hardware addressing and controlling the access method.
Network
Defines device addressing, routing, and path determination. Device (logical) addressing is used to identify
a host on a network (e.g., by its IP address).
Transport
Segments great chunks of data received from the upper layer protocols. Establishes and terminates
connections between two computers. Used for flow control and data recovery.
Session
Defines how to establish and terminate a session between the two systems.
Presentation
Defines data formats. Compression and encryption are defined at this layer.
Application
This layer is the closest to the user. It enables network applications to communicate with other network
applications.
220
The table shows which Data Name, Network Devices and Mnemonic reside on which layer:
TCP/IP MODEL
Défense Advance Research Project Agency (DARPA) created the TCP/IP model in the 1970s. Like the OSI
model, it describes general guidelines for designing and implementing computer protocols.
It consists of four layers: Network Access, Internet, Transport, and Application.
221
The table below shows the comparison between the TCP/IP model and OSI model:
NETWORK PROTOCOLS
Protocol is a set of rules and standards that basically define a language that devices can use to
communicate. Some level protocols are TCP, UDP, IP, and ICMP.
TCP is a connection-oriented protocol that facilitates the exchange of data between computing devices in
network. NB: It guarantees the delivery of data.
UDB is a connectionless oriented protocol that facilitates the exchange of data between computing
devices in network. NB: It does not guarantee the delivery of data, hence faster than TCP.
FTP is a standard protocol use by web users to upload and download files between computers through the
internet. NB: It mainly uses the TCP for file transfer.
222
Trivial File Transfer Protocol
TFTP is a simple protocol that is use to transfer files within the same network. NB: It connectionless
protocol that uses UDP.
SFTP is just like FTP it just adds a layer of security. Data is encrypted using secure shell during transfer.
POP3 is a protocol use for receiving email. It only downloads the email. NB: No copy is left on the Mail
Server after downloading using POP3 protocol.
HTTP is the protocol that is use to view web pages on the internet. It the most commonly use protocol.
Telnet
Telnet is a terminal emulation program that is use to access remote servers. Due to it insecurity it mostly
use to access to access devices within a LAN and not on the internet.
Secure Shell
SSH is a better alternative to Telnet. It adds up a security layer around the passage and protects it from
potential threats.
223
Address Resolution Protocol
ARP is a protocol that is use to resolve IP addresses to MAC addresses. Computers use MAC addresses for
communication between each other.
Computers search their ARP cache first to find the target MAC address. If the MAC address is not in the
ARP Cache, the computer will broadcast a message asking for it.
IP ADDRESSES
Network Address
Host Address
Types of IP Address
IPv4
IPv6
IPv4
IPv4 is the current version of IP addresses. It’s a 32bit numeric address written as four numbers separated
by periods.
224
IPv6
IPv6 is the next generation of IP addresses. It’s a 128bit hexadecimal address. Hexadecimal uses both
numbers and alphabets.
76DC:4F59:34CF:71CD:9DCD:45D6:
Reserved IP Addresses
NETWORK CONFIGURATION
225
• Home Wireless Networks – use Wi-Fi and are quick and easy to install, but generally slower than
wired networks.
• Home Wired Networks – use Ethernet over UTP cable and tend to be faster than wireless
networks.
DATA COMMUNICATION
Data communications are the exchange of data between two devices via some form of transmission
medium such as a wire cable. For data communications to occur, the communicating devices must be part
of a communication system made up of a combination of hardware (physical equipment) and software
(programs).
The effectiveness of a data communications system depends on these fundamental characteristics:
• Delivery – The system must deliver data to the correct destination. Data must be received by the
intended device or user and only that device or user.
• Accuracy – The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
• Timeliness – The system must deliver data in a timely manner. Data deliver late are useless.
There are five components of the data communications system, these are;
226
Forms of Data Communication
• Information Services
• Electronic Funds Transfer
• Telecommuting
• The Internet services
• E-mail (Electronic Mail)
227
DATA SECURITY AND CONTROL
Unfortunately, many companies do not deal with data security and network management problems until
there is a crack in the network. To protect vital information, the companies must set up a sound security
system before the network is intruded. This involves;
• Hardware
• Software
• Data
• Information, or
• Processing capability
While some breaches to computer security are accidental, many are intentional. Any illegal act involving a
computer generally is referred to as a computer crime.
The term cybercrime refers to online or internet-based illegal acts. Software used by cybercriminals
sometimes called crime ware.
Some examples of computer security risks.
DATA SECURITY
Data Security is a practice of keeping data protected from unauthorized access and corruption. The focus
behind data security is to ensure privacy while protecting personal or corporate data.
Computer Systems pose four main securities:
1. Password Protection
2. Destination Code
3. Error Code
4. Encryption
228
Password Protection
Password protection is a security process protects information accessible via computers that needs to be
protected from certain users. Password protection allows only those with authorized password to gain
access to certain information.
Passwords are used commonly to gain entry to networks and into various internet accounts in order to
authenticate the user accessing the website.
Destination Code
The destination code feature provides destination codes for basic telephone service. The destination code
will be used for a call if dialled or modified (in PAC) digits and Nature of Address are matching. This field
specifies the number configured for this Destination Code. Destination Code can be of length 1-15.
Encryption
To encrypt a file or other information stored in a computer means to convert it into a secret code so that
it can’t be used or understood until it is decoded or decrypted.
This is a process of encrypting data to prevent unauthorized person from viewing or modifying it. The
main features of data encryption are:
1. Prevents unwanted access to documents and email messages.
2. Strongest levels of encryption are very difficult to break.
The Process of Data Encryption consists of certain steps. The data passes through a mathematical formula
called an algorithm, which converts it into encrypted data called cipher-text. These algorithms create a
key and then encapsulate the message with this key.
LESSON ASSESSMENT
OBJECTIVES
1. The form of data transmission that sends start signal, followed by a group of message bits for a
character of data, followed by a stop signal is called
A. Asynchronous
B. Character based
C. Multiplexing
D. Synchronous
2. Local Area Networks are intended to:
I. Restrict physical movement of personnel
II. Share programs among connected computers
III. Share data among connected computers
IV. Share peripheral devices among connected computers
A. I and II only
B. II and III only
229
C. III and IV only
D. I, II, III and IV
3. Which of the following is the same as http://127.0.0.1 in the address bar of a web client?
A. http://hostip
B. http://local
C. http://localhost
D. http://www.local.com
4. Which of the following is not a factor to be considered when selecting network type for an organisation
to implement?
A. Size of the organisation
B. Amount of network traffic
C. Location of the organization
D. Level of administrative support available
5. The OSI model, repeaters operate at the
A. Data link layer
B. Network layer
C. Physical layer
D. Transport layer
6. Which of the following cables transmit data at the least speed?
A. Category 2 UTP
B. Category 3 UTP
C. Category 4 UTP
D. Category 5 UTP
7. The cable that is best suitable for implementing a bus topology is
A. Coaxial
B. Fibre optic
C. Shielded twisted pair
D. Unshielded twisted pair
8. Communication media such as copper wire, coaxial cables or wireless systems that are used to
interconnect the other components of telecommunication network are referred to as
A. Channels
B. Modem
C. Processors
D. Servers
9. The following are examples of wireless technology except
A. Bluetooth
B. Infrared
C. Fibre optics
D. Communication satellites
230
10. The following are network resources except
A. Applications
B. Cache
C. Files
D. Printers
11. BNC-T connector is associated with which type of cable?
A. Coaxial
B. Ethernet
C. Fibre-optic
D. Twisted-pair
12. Which of the following reasons justifies the use of a layered approach to networking?
A. Allows for large networking
B. Makes creation of networks easy
C. Allows many programmers to implement a network
D. Permits computer on different platforms to communicate
13. The internet service that allows users to connect to remote computers and run applications is referred
to as
A. Gopher
B. Hypertext
C. Switching
D. Telnet
14. A system of connected computers, telephones or other communications devices that communicate
with one another is called a
A. Closed network
B. Circuit network
C. Packet switching
D. Communications network
15. The layer responsible for dialogue in the OSI model is the
A. Data link layer
B. Network layer
C. Physical layer
D. Session layer
16. Networks that use different communications architecture are interconnected by using
A. Bridge
B. Gateway
C. Hub
D. Protocol
17. To prevent intruders from tapping into a network, it is advisable to use
A. Coaxial cable
231
B. Twisted pair
C. Optical fibre cable
D. Untwisted pair cable
18. Which of the following protocols uploads files to a host machine?
A. FTP
B. PGP
C. POP
D. TCP
19. The following network media are for guided communications except
A. Coaxial cable
B. Fibre optic
C. Satellites
D. Twittered pair cable
20. A bridge is used in a computer network to
A. Control the network speed
B. Connect local area networks
C. Separate local area networks
D. Fluctuate network communications
21. Which of the following media is immune to electromagnetic signals?
A. Coaxial cabling
B. Fibre optic cabling
C. Shielded twisted pair
D. Unshielded twisted pair
22. Which of the following offers the longest possible segment length?
A. Coaxial cabling
B. Fibre optic cabling
C. Shielded twisted pair
D. Unshielded twisted pair
23. Computer networking can achieve all the following except
A. Reduce cost
B. Increase efficiency
C. Centralize administration and support
D. Increase the number of computers in the organisation
24. Logical topology describes how computer networks
A. Message travel
B. Cables are run
C. Resources are arranged
D. Run faster or slower
25. A physical star topology consists of several workstations connected to a central device called
232
A. Bridge
B. Hub
C. Modem
D. Repeater
SUBJECTIVE
1. A) State one function each of the following computer network devices:
I. Bridge
II. Repeater
III. Router
B) Name the layer of the OSI model at which each of the devices listed in 1(a) operates.
C) List two types of network transmission media.
233
II.
234
CHAPTER THIRTEEN (13)
INTRODUCTION TO WEBSITE DESIGNING
LESSON OBJECTIVES
The student will be able to:
• Explain the term HTML.
• State the basic structure for HTML coding.
• Use basic HTML tags.
• Explain some best practices in website designing.
• Create Tables using HTML code
• Format tables (width, height, cell padding, and boarder).
• Insert text into table.
• Format text using HTML code.
• Create an ordered and unordered list.
• Insert images.
• Insert hyperlinks.
• Create a basic website.
WEBSITE
Is a collection of related web resources, such as web pages, multimedia content, which are typically
identified with a common domain name, and published on at least one web server.
WEB PAGE
Is a single unit of information, often called a document, which is available via the World Wide Web.
WEBSITE DESIGN
Is the process of creating websites. It encompasses several different aspects, including webpage layout,
content production, and graphic design. Technically, HTML is not a programming language, but rather a
markup language used for creating websites.
HTML
What is HTML?
Stands for HyperText Markup Language. HTML consist of standardized codes or tags that are used to
define the structure of information on a web page.
HTML is a markup language for describing web documents (web pages).
235
• A markup language is a set of markup tags
• HTML documents are described by HTML tags
• Each HTML tag describes different document content
HTML TAGS
HTML tags are keywords (tag names) surrounded by angle brackets:
<tagname>content</tagname>
HTML tags normally come in pairs like <p> and </p>
The first tag in a pair is the start tag, the second tag is the end tag
The end tag is written like the start tag, but with a slash before the tag name
236
Note: The start tag is often called the opening tag. The end tag is often called the closing tag.
WEB BROWSERS
The purpose of a web browser (Chrome, IE, Firefox, and Safari) is to read HTML documents and display
them.
The browser does not display the HTML tags, but uses them to determine how to display the document:
237
HTML EDITORS
HTML can be created and edited by using professional HTML editors like:
• Notepad++
• Microsoft WebMatrix
• Sublime Text
• Notepad
However, for learning HTML we recommend a text editor like Notepad (PC).
We believe using a simple text editor is a good way to learn HTML.
Follow the four (4) steps below to create your first web page with Notepad.
Step 1: Open Notepad++
To open Notepad in Windows 7 or earlier:
Open the Start Screen (the window symbol at the bottom left on your screen). Type Notepad and single
click on it.
Step 2: Write Some HTML
Write or copy some HTML into Notepad (E.g., Refer to Basic of HTML Codding).
Step 3: Save the HTML Page
Save the file on your computer.
Select File > Save as in the Notepad menu.
Name the file "index.html" or any other name ending with html.
Step 4: View HTML Page in Your Browser
Open the saved HTML file in your favourite browser.
NB: To open a file in a browser, double click on the file, or right-click, and choose open with.
HTML COMMENTS
Comment is a piece of code which is ignored by any web browser. Comments help you and others
understand your code and increases code readability.
You can add comments to your HTML source by using the following syntax (HTML comment tag):
<!-- Write your comments here -->
Note: There is an exclamation point (!) in the opening tag, but not in the closing tag.
The browser does not display comments, but they can help document your HTML.
238
USING BASIC HTML TAGS
This contains the Heading, Paragraph, Horizontal line, Break, Bold, Italic, and Underline Tags.
<!DOCTYPE html>
<html>
<head>
<title>Basic HTML</title>
</head>
<body>
<!--Heading Tags-->
<h1>This is heading 1</h1>
<h2>This is heading 2</h2>
<!--Paragraph Tag-->
<p>This is a paragraph.</p>
<p>This is a paragraph.</p>
<p>This is a paragraph.</p>
<!--horizontal rule-->
<hr>
<p>The hr tag defines a horizontal rule:</p>
<hr>
<!--Break Tag-->
<p>This is<br>a para<br>graph with line breaks</p>
<!--Bold Tag-->
<p>This text is normal.</p>
<p><b>This text is bold.</b></p>
<!--Italic Tag-->
<p>This text is normal.</p>
<p><i>This text is italic.</i></p>
<!--Underline Tag-->
<p>This text is normal.</p>
<p><u>This text is underlined.</u></p>
</body>
</html>
239
CREATING TABLES
<!DOCTYPE html>
<html>
<head>
<title>Table Creation</title>
<style>
table, th, td {
border: 1px solid black;
border-collapse: collapse;
}
th, td {
padding: 5px;
text-align: left;
}
</style>
</head>
<body>
<!--Tables with Horizontal Heading-->
<h2>Horizontal Headings:</h2>
<table style="width:100%">
240
<tr>
<th>Name</th>
<th>Telephone</th>
<th>Telephone</th>
</tr>
<tr>
<td>Bill Gates</td>
<td>555 77 854</td>
<td>555 77 855</td>
</tr>
</table>
<table style="width:100%">
<tr>
<th>Name:</th>
<td>Bill Gates</td>
</tr>
<tr>
<th>Telephone:</th>
<td>555 77 854</td>
</tr>
<tr>
<th>Telephone:</th>
<td>555 77 855</td>
</tr>
</table>
</body>
</html>
241
ORDERED AND UNORDERED LIST TAGS
<!DOCTYPE html>
<html>
<head>
<title>Ordered & Unordered List</title>
</head>
<body>
<!--Ordered List Tag-->
<h2>Ordered List</h2>
<ol>
<li>Coffee</li>
<li>Tea</li>
<li>Milk</li>
</ol>
<hr>
<!--Unordered Lisr-->
<h2>Unordered List with Default Bullets</h2>
<ul>
<li>Coffee</li>
<li>Tea</li>
<li>Milk</li>
</ul>
</body>
</html>
242
<!--Links Tags-->
<!--Internal Link-->
<a href="phrbuibr.html">This is an internal link</a>
<br>
<!--External Link-->
<a href="http://www.google.com">This is an external link</a>
<br>
<hr>
<!--Image Tag-->
<img src="WEB.JPG" alt="Browser Content" width="300" height="200">
</body>
</html>
HTML STYLES
<!DOCTYPE html>
<html>
<head>
<title>Colour & Font</title>
</head>
<!--Background Colour-->
<body style="background-color:lightgrey">
<h1>This is a heading</h1>
<p>This is a paragraph.</p>
<!--Text Colour-->
<h1 style="color:blue">This is a heading</h1>
<p style="color:red">This is a paragraph.</p>
<!--Text Font-->
<h1 style="font-family:verdana">This is a heading</h1>
<p style="font-family:courier">This is a paragraph.</p>
243
<!--Text Font-->
<h1 style="font-size:300%">This is a heading</h1>
<p style="font-size:160%">This is a paragraph.</p>
<!--Text Alignment-->
<h1 style="text-align:center">Centered heading</h1>
<p>This is a paragraph.</p>
</body>
</html>
HTML FORMS
HTML forms are used to collect user input. The <form> element defines an HTML form:
<form>
.
form elements
.
</form>
HTML forms contain form elements.
Form elements are different types of input elements, checkboxes, radio buttons, submit buttons, and
more.
The <input> Element
The <input> element is the most important form element.
The <input> element has many variations, depending on the type attribute.
244
Here are the types used in this chapter:
Type Description
Text Input
<input type="text"> defines a one-line input field for text input:
Example
<!DOCTYPE html>
<html>
<head>
<title>Text Input Form</title>
</head>
<body>
<form>
First name:<br>
<input type="text" name="firstname">
<br>
Last name:<br>
<input type="text" name="lastname">
</form>
</body>
</html>
245
RADIO BUTTON INPUT
<input type="radio"> defines a radio button.
Radio buttons let a user select ONE of a limited number of choices:
Example
<!DOCTYPE html>
<html>
<head>
<title>Radio Button Input Form</title>
</head>
<body>
<form>
<input type="radio" name="sex" value="male" checked>Male
<br>
<input type="radio" name="sex" value="female">Female
</form>
</body>
</html>
246
<input type="submit" value="Submit">
</form>
</body>
</html>
li {
float: left;
}
li a {
display: block;
padding: 8px;
}
</style>
</head>
247
<body>
<h1>Akroso News Platform</h1>
<hr>
<ul>
<li><a href="index.html">Home</a><li>
<li><a href="news.html">News</a><li>
<li><a href="contact.html">Contact Us</a><li>
<li><a href="about.html">About Us</a><li>
</ul>
<h1>Home</h1>
<p>
Akroso Senior High Technical School is a government School located at Akroso. A
town in the middle of three
different Cities known as Oda, Asamankese and Swedru.
<br/>
This is a news platform the feed you with news information about what goes on in
the school and outside the
school in as fa as education is concerned.
</p>
</body>
</html>
li a {
display: block;
padding: 8px 16px;
}
</style>
</head>
<body>
<h1>Akroso News Platform</h1>
<hr>
<ul>
<li><a href="index.html">Home</a><li>
<li><a href="news.html">News</a><li>
<li><a href="contact.html">Contact Us</a><li>
<li><a href="about.html">About Us</a><li>
</ul>
<h1>Home</h1>
<p>
Akroso Senior High Technical School is a government School located at Akroso. A
town in the middle of three
different Cities known as Oda, Asamankese and Swedru.
<br/>
This is a news platform the feed you with news information about what goes on in
the school and outside the
school in as fa as education is concerned.
</p>
</body>
</html>
249
LESSON SUMMARY
<!DOCTYPE html>
<html>
<head>
<title>HTML</title>
</head>
<body>
<!--Basic Tags, Lists, Hyperlinks & Image-->
<h1><u><center>Storage Devices</center></u></h1>
<p><b>Storage devices</b> are any <i>hardware components</i> that enables a user to
store data, information or an
instruction. Examples;</p>
<ul type="square">
<li>CD ROM Drive</li>
<li>Floppy Disk Drive</li>
<li>Flash Drive</li>
<li>Hard Disk</li>
<li>RAM</li>
<img src="RAM.JPG" width="200" height="100">
</ul>
<!--Table Tags-->
<p>Table 1 describes three different storage devices. Study it below;<p>
<h3><center>Table 1</center></h3>
<table border="1px" width="100%" bgcolor=”lightgrey” style=”border-collapse:collapse”>
<tr bgcolor=”grey”>
<th>1</th>
<th>2</th>
<th>3</th>
<th>4</th>
<th>5</th>
<tr>
<tr>
<th rowspan="2">Description of Storage Device</th>
<th rowspan="2">Name of Storage Device</th>
<th colspan="3">Category of Storage Device</th>
</tr>
<tr>
<th>Primary Storage</th>
<th>Secondary Storage</th>
<th>Cloud Storage</th>
</tr>
<tr>
<td>A small flexible magnetically coated disk in a square rigid plastic case on which
data can be
stored or retrieved by a computer.</td>
<td>Diskette</td>
<td></td>
251
<td>✓</td>
<td></td>
</tr>
<tr>
<td>Optical media which uses one spiral track, red lasers are used to read and write
data on the media surface, makes use of dual-layering technology to increase the storage capacity to over
1GB</td>
<td>DVD</td>
<td></td>
<td>✓</td>
<td></td>
</tr>
<tr>
<td>Non-volatile memory chip; contents of the chip cannot be altered. It is often
used to store
start-up routines in a computer (e.g. BIOS)</td>
<td>ROM</td>
<td>✓</td>
<td></td>
<td></td>
</tr>
</table>
<br/>
<hr/>
<!--Form Tags-->
<h1>Personal Information</h1>
<form>
<b>First Name:</b> <input type="text" name="firstname"> <br/> <br/>
<b>Last Name:</b> <input type="text" name="lastname"> <br/> <br/>
<b>Gender:</b> <input type="radio" name="gender">Male <input type="radio"
name="gender">Female <br/> <br/>
<b>Date Of Birth:</b> <input type="date" name="DOB"> <br/> <br/>
<b>Religion:</b>
<select name="Religion">
<option value="Christian">Christian</option>
<option value="Muslim">Muslim</option>
<option value="Traditional">Traditional</option>
</select> <br/> <br/>
<input type="submit" value="Submit">
</form>
<br/><br/>
<hr/>
252
<!--Legend Tags-->
<form>
<fieldset>
<legend><h1>Personal Information:</h1></legend>
<b>First name:</b><br>
<input type="text" name="firstname">
<br>
<b>Last name:</b><br>
<input type="text" name="lastname">
<br><br>
<input type="submit" value="Submit">
</fieldset>
</form>
</body>
</html>
253
254
255
LESSON ASSESSMENT
OBJECTIVES
1. Which of the following HTML tags displays the name of the page in the caption bar of a browser?
A. <link>
B. <meta>
C. <style>
D. <title>
2. To create a hyperlink in HTML, use
A. <a href=”http://www.waecgh.org”></a>
B. <b href=”http://www.waecgh.org”></b>
C. <c href=”http://www.waecgh.org”></c>
D. <d href=”http://www.waecgh.org”></d>
PRACTICALS
1. A) With the help of an appropriate text editor, create the HTML codes to produce the page below:
1. Mathematics
2. English Language
3. Life Skills
257
B) Set the title of the page to your full name and index number. The program codes must be properly
indented.
Eg:
<p>
<u>item</u>
</p>
2. A) With the help of an appropriate text editor, create the HTML codes to produce the page below:
Name
Comment
Submit
B) Set the title of the page to your full name and index number. The program codes must be properly
indented.
Eg:
<p>
<u>item</u>
</p>
258
A) Three web pages named WEB1.html, WEB2.html and WEB3.html as shown in the figure 1 in the
folder created. Set the tile of the web pages with your full name and index number.
I. WEB1.html to WEB2.html
Further Information:
Display your date of birth (e.g. September 21, 1909) on WEB1, surname on WEB2, and hometown on
WEB3 using header 1, header 2, and header 3, respectively.
259
CHAPTER FOURTEEN (14)
COMPUTER PROGRAMMING IN QBASIC
LESSON OBJECTIVES
The student will be able to:
• Programming
• Explain the concept of QBasic.
• Introduction to QBasic Programming
• Variables, Constants, Assignments, Operators, Operands.
• Data Types in QBasic
• Sequential Programs in QBasic
• Using Procedures
PROGRAMMING
Every program, every game you run on your computer, has been written by someone using special
software development tool called a programming Language.
By Definition, A program is a set of instructions that makes the computer work. The instructions
constitute of keywords, sometimes called reserved words, that have special functions such as:
260
QBASIC
It a high-level language that stands for Quick Beginners All-purpose Symbolic Instruction Code, developed
in 1987.
QBasic IDE
It is an Integrated Development Environment (IDE) and Interpreter where QBasic coding is done. It has
predefined commands like CLS, PRINT, INPUT, REM, END and a function library.
261
Declaring Variables
BASIC has received many critics because of its ability of creating & declaring variables on the fly. QBasic
allow you to declare variables.
The DIM statement is used to specify a data type for a variable. Variables declared should not end with a
suffix.
The syntax is as follows:
DIM variable AS type
Example: The code example is equivalent to
DIM username AS STRING username$ = "John Smith"
DIM age AS INTEGER age% = 23
username = "John Smith"
age = 23
CONSTANT
A fixed value that cannot change during the program execution. Examples
A = 50
50 and 10.50 are constants
B = 10.5
OPERATORS
Are the symbols that perform any operation on the operands.
Arithmetic Operators (+ , - , * , / , MOD )
Types Relational Operators (< , > , <= , >= , <> , = )
Logical Operators (NOT, AND, OR)
OPERANDS
Are the variables and the constants on which any operation is performed by the operator. Examples
A=B+C
In mathematics we say it’s a formula. So, in the above formula A, B and C are the Operands whereas + and
= are the operators.
262
DATA TYPES IN QBASIC
Data Type is an attribute of data which tells the compiler or interpreter how the programmer intends to
use the data. QBasic has five (5) built-in types:
• INTEGER (%) – do not use decimal point values but will round those off to the nearest even whole
number.
• LONG (&) – for larger integer values.
• SINGLE (!) – can handle numbers with a decimal point.
• DOUBLE ( ) – can represent fractional as well as whole values.
• STRING ($) – holds any sequence of letters, digits, punctuation, and other valid characters.
SEQUENCIAL PROGRAMMING
1. Launch QB64
2. Type your code
3. Run your program (F5)
NOTE
We mostly use CLS first to clear the screen.
You can use REM to document the codes. It functions as an explanatory remark or comments.
NB:
Clearing the screen. CLS
Writing data to screen. PRINT
Getting user input. INPUT
Executing a decision. LOOP, IF-ELSE
Solving mathematical problems.
EXAMPLE 1
WAP in QBasic to accept marks in 3 subjects then print the sum and the average marks obtained.
CODE
CLS
REM ‘Calculating sum and average
PRINT “Enter marks in 3 subjects”
INPUT a!, b!, c!
s! = a + b + c
avg! = s/3
263
PRINT “Sum = “ ; s
PRINT “Average = “ ; avg
END
EXAMPLE 2
WAP in QBasic to accept the cost price and selling price of any item then print the profit.
[profit = selling price – cost price]
CODE
CLS
REM ‘Profit Calculator
PRINT “Enter Cost Price”
INPUT cp!
PRINT “Enter Selling Price”
INPUT sp!
p! = sp -cp
PRINT “Profit = ”; p
END
EXAMPLE 3
WAP in QBasic to accept the monthly salary of any employee then calculate and display the following;
Yearly salary = monthly salary * 12
Tax = 10% of yearly salary
Net salary = yearly salary – tax
Print the net salary.
CODE
CLS
REM ‘Net Salary Calculator
PRINT “Enter Monthly Salary”
INPUT ms!
ys! = ms * 12
tx! = 0.10 * ys
ns! = ys – tx
PRINT “Your yearly salary is “; ys
PRINT “Your tax is “; tx
PRINT
PRINT “**************************”
PRINT “Your Net Salary = “; ns
264
END
EXAMPLE 4 (TRIAL)
WAP in QBasic to accept the no. of units consumed and rate per unit then calculate the following;
total bill = no. of units * rate per unit
surcharge = 2% of total bill
new bill = total bill + surcharge
subsidy = 10% of new bill
pay = new bill – subsidy
Print the pay.
CODE
CLS
REM ‘Light Bill Calculator
PRINT “Enter no. of units”
INPUT nu!
PRINT “Enter rate per unit”
INPUT rpu!
tb! = nu * rpu
sc! = 0.02 * tb
nb! = tb + sc
ss! = 0.10 * nb
pay! = nb – ss
PRINT “You’re to pay = ”; pay
END
LOOPS
It’s part of any program which runs one or more times as per some given condition. It is use for iteration
in any program, hence help to educe the size of the program.
TYPES
1. FOR … NEXT LOOP
2. WHILE … WEND LOOP
3. DO … LOOP
EXAMPLE 6
WAP in QBasic to print numbers 1 to 5.
CODE
FOR i = 1 TO 5 STEP 1
PRINT i ; “ ” ;
NEXT i
END
EXAMPLE 7
WAP in QBasic to print numbers 10 to 0.
CODE
FOR i = 10 TO 0 STEP -1
PRINT I ; “ “ ;
NEXT i
END
EXAMPLE 8
WAP in QBasic to print odd numbers from 1 to 9.
CODE
FOR i = 1 TO 9 STEP 2
PRINT i ; “ “ ;
NEXT i
END
266
EXAMPLE 9
WAP in QBasic to print numbers 1 to N.
CODE
PRINT “Enter N”
INPUT N
FOR i = 1 TO N
PRINT i ; “ “ ;
NEXT i
END
EXAMPLE 10
WAP in QBasic to accept a message then print it N times using a loop.
CODE
CLS
PRINT “Enter the message”
INPUT m$
PRINT “Enter N”
INPUT N
FOR i = 1 TO N
PRINT M$
NEXT i
END
EXAMPLE 11
WAP in QBasic to print the following series up to the nth term.
1, 2, 4, 8, 16, 32, … nth term.
CODE
PRINT “Enter number of terms”
INPUT n
a=1
FOR i = 1 TO n
PRINT a; “ ” ;
a=a*2
NEXT i
END
267
WHILE … WEND Loop
Syntax: Initial Value FOR <condition> STEP Value
WHILE <condition> vs. Statements
Statements NEXT Value
Value update
WEND
EXAMPLE
A=1
WHILE A <= 5 FOR A = 1 TO 5 STEP 1
PRINT A; vs. PRINT A
A=A+1 NEXT A
WEND
EXAMPLE 12
WAP in QBasic to print 1 to 10.
CODE
CLS
REM ‘Printing 1 to 10
A=1
WHILE A <= 10
PRINT A
A=A+1
WEND
EXAMPLE 13
WAP in QBasic to print even numbers from 0 to 20.
CODE
a=0
WHILE a <= 20
PRINT a
a=a+2
WEND
268
IF … THEN … ELSE Statement
Executes a statement or statement block depending on specified conditions.
TYPES
1. IF STATEMENT
2. IF … ELSE STATEMENT
3. IF … ELSEIF STATEMENT
IF Statement Example
Syntax: IF (condition) THEN IF (marks > 40) THEN
Statement PRINT “Pass”
END IF END IF
269
EXAMPLE 14
WAP in QBasic to accept three angles of any triangle then check if triangle formation is possible or not.
CODE
CLS
PRINT “Enter three angles”
INPUT a%, b%, c%
IF (a + b + c = 180) THEN
PRINT “Triangle formation is possible”
ELSE
PRINT “Triangle formation is not possible”
END IF
END
EXAMPLE 15
WAP in QBasic to accept three numbers then find out the smallest between them.
CODE
270
SELECT CASE
Its primarily used to make menu base/menu driven program. Menu Program are programs that contains
one or more subprograms and the user need to input a choice out of the given options.
EXAMPLE 16
Write a menu-based program suing SELECT CASE to perform the following task.
CODE
EXAMPLE 17
Write a menu-based program using SELECT CASE to perform the following task:
CODE
CLS
PRINT “*******************************”
PRINT “1. Area of a Circle”
PRINT “2. Area of a rectangle”
272
PRINT “3. Area of a square”
PRINT “*******************************”
PRINT “Enter a Choice”
INPUT ch%
SELECT CASE ch
CASE 1
PRINT “Enter radius of the circle”
INPUT r!
ac! = 3.14 * r * r
PRINT “Area of the circle = “; ac
CASE 2
PRINT “Enter length and breadth of the rectangle”
INPUT l!, b!
ar! = l * b
PRINT “Area of the rectangle = “; ar
CASE 3
PRINT “Enter the length of a side of the square”
INPUT s!
as! = s * s
PRINT “Area of the square = “; as
CASE ELSE
PRINT “Invalid Choice”
END SELECT
END
EXAMPLE 18
Write a menu-based program using SELECT CASE to perform the following task;
1. Check if any number is even or odd
2. Check if any number is ending by 7 or not.
CODE
CLS
PRINT “1. Even/Odd number checker”
PRINT “2. Check if a number is ending with 7 or not”
PRINT “Enter Choice”
273
INPUT ch%
SELECT CASE ch
CASE 1
PRINT “Enter any number”
INPUT n%
IF n MOD 2 = 0 THEN
PRINT n; “ is an even number”
ELSE
PRINT n; “ is an odd number”
END IF
CASE 2
PRINT “Enter any number”
INPUT n%
IF n MOD 10 = 7 THEN
PRINT n; “ is ending with the number 7”
ELSE
PRINT n; “ is not ending with the number 7”
END IF
CASE ELSE
PRINT “Invalid Choice”
END SELECT
END
STRING MANIPULATION
STRING CONSTANT
A set of characters enclosed within double quotes.
Example
“Hello Ghana”
“1 2 3 4 5”
“%$!@&”
“Hello 12345 $3&”
STRING VARIABLE
A variable which stores sting constants. A string variable name ends with a dollar sign ($).
Example
A$ = “Hello Ghana”
B$ = “1 2 3 4 5”
274
C$ = “%$!@&”
STRING CONCATENATION
Means merge or join two or more stings or string variables together.
Example
A$ = “Hello Ghana”
B$ = “1 2 3 4 5”
C$ = A + B
D$ = A + “ ” + B Result
PRINT C$ Hello Ghana1 2 3 4 5
PRINT D$ Hello Ghana 1 2 3 4 5
STRING FUNCTIONS
1. LEN ()
It’s used to find the length of any string. Length means number of characters in any string.
Remember space is also counted.
Example
A$ = “My Ghana”
B = LEN(A$) Result
PRINT B 8
2. LCASE ()
It’s used to convert the alphabets present in any string to lowercase letters.
Example
A$ = “GHANA”
B$ = LCASE(A$) Result
PRINT B$ ghana
3. UCASE ()
It’s used to convert the alphabets present in any string to uppercase letters.
Example
A$ = “My Ghana”
B$ = UCASE(A$) Result
PRINT B$ MY GHANA
4. LEFT$ ()
It’s used to extract any number of characters from the extreme left of the string.
Example
275
A$ = “Welcome”
B$ = LEFT$(A$, 2) Result
PRINT B$ We
5. RIGHT$ ()
It’s used to extract any number of characters from the extreme right of the string.
Example
A$ = “Welcome”
B$ = RIGHT$(A$, 4) Result
PRINT B$ come
6. MID$ ()
It’s used to extract any characters from any position in the string.
MID$ (string variable, starting position, no. of characters)
Example
A$ = “Welcome”
B$ = MID$(A$, 4, 3) Result
PRINT B$ com
USING PROCEDURES
As you continue progressing in programming, your program may become bigger and more complex to
understand. The use of procedures will help you to simplify the code.
In QBasic, a programmer can name a block of code which can be executed by simply calling out that name.
These named blocks of code are called procedures. There are subroutine procedures and function
procedures.
Subroutine simply executes one of more statements. They do not return values.
Functions not only executes one or more statements, but also returns a value of a declared type.
QBasic provides several ways of declaring procedures and of executing procedures, as shown in the
following table of keywords.
Declare Procedure declare, sub, function, def fn
Using Procedure call, as, any
Exiting exit
Example
Write a program to check whether a supplied number is perfect square or not?
CLS
RANDOMIZE TIMER
'Displaying the menu
CALL menu
SUB addition
DIM number1 AS INTEGER
DIM number2 AS INTEGER
DIM answer AS INTEGER
277
number1 = INT (RND * 100) + 1
number2 = INT (RND * 100) + 1
answer = number1 + number2
PRINT "Addition"
PRINT number1; " + "; number2; " = "
SUB division
DIM number1 AS INTEGER
DIM number2 AS INTEGER
DIM answer AS INTEGER
number2 = INT(RND * 50) + 1
number1 = number2 * (INT(RND * 10) + 1)
END SUB
SUB menu
DO
DIM choice AS INTEGER
CLS
PRINT "Simple maths program"
PRINT
278
PRINT "1. Addition"
PRINT "2. Subtraction"
PRINT "3. Multiplication"
PRINT "4. Division"
PRINT "5. Exit"
INPUT "Enter your choice"; choice
SELECT CASE choice
CASE 1
CALL addition
CASE 2
CALL subtraction
CASE 3
CALL multiplication
CASE 4
CALL division
END SELECT
LOOP UNTIL choice = 5
END SUB
SUB multiplication
DIM number1 AS INTEGER
DIM number2 AS INTEGER
DIM answer AS INTEGER
number1 = INT(RND * 100) + 1
number2 = INT(RND * 100) + 1
END SUB
SUB subtraction
DIM number1 AS INTEGER
DIM number2 AS INTEGER
DIM answer AS INTEGER
number1 = INT(RND * 100) + 1
279
number2 = INT(RND * 100) + 1
IF number1 < number2 THEN
SWAP number1, number2
END IF
END SUB
280
LOOP UNTIL choice = tobefound
Tell user how much moves were needed to succeed
Program Code
'Clearing the screen
CLS
'Randomize is used to generate number
RANDOMIZE TIMER
'------------------------
'Defining the variables
DIM tobefound AS INTEGER
DIM choice AS INTEGER
DIM counter AS INTEGER
'------------------------
'Generating a random number between 1 and 100
tobefound = INT(RND * 100) + 1
'Setting the counter to 0. The variable counter is used to monitor the number of
'tries of the player.
counter = 0
PRINT "Try to guess the correct number"
'Using a loop to get user input until the correct number is found.
DO
INPUT "Enter your choice: ", choice
counter = counter + 1
'If the correct number is smaller than the guess then say "I am lower"
IF tobefound < choice THEN
PRINT "I am lower"
END IF
'If the correct number is greater than the guess then say "I am higher"
IF tobefound > choice THEN
PRINT "I am higher"
END IF
LOOP UNTIL choice = tobefound
PRINT "You succeeded in"; counter; "moves."
LESSON ASSESSMENT
OBJECTIVES
1. What will be the output of the following code?
10 REM Example of how a comma
20 REM affects the output
30 REM print statement
40 PRINT “4 + 7 =”,
281
50 RINT 4 + 7
60 END
A. 4+7
B. 4+7=
C. 11
D. 4 + 8 = 11
2. The QBasic code given below has an error. Select the line of instruction in the options provided that will
correct this error.
FOR C = 1 TO 3
READ N
PRINT N
NEXT C
DATA 11, “TWELVE”, 13
A. FOR N = 1 TO 3
B. READ C
C. PRINT “N$”
D. DATA 11,12,13
SUBJECTIVES
1. A) What is QBasic?
B) State four features of a QBasic Programming Language.
282
C) State the two basic reserved words used in QBasic programming Language.
PRACTICALS
1. Write a QBASIC program to accept student index number, subject and examination score over 100.
Your program should match the score to the grade letter.
Save the program as STGRADE in the folder created.
Print the subject, index number, score and grade on the computer screen. Save the output as GRADES in
the folder created.
The following letter is determined as follows:
283
CHAPTER FIFTEEN (15)
PROJECT-BASED ACTIVITIES
- Spreadsheet
- Desktop Publishing
- Database
-SQL
- QBasic Programming
- Website Designing
- CD Burning
- Solve Practical Past Questions
284
ANSWERS TO OBJECTIVE LESSON ASSESSMENTS
Introduction to Information System
1. B 2. 3. B 4. C 5. C 6. B 7. D 8. D 9. A 10. C
1. A 2. C 3. B 4. B 5. A 6. A 7. A 8. B 9. B 10. A
1. C 2. D 3. A 4. D 5. C 6. C 7. D 8. D 9. D 10. D
1. B 2. D 3. D 4. B 5. D 6. A 7. 8. 9. D 10.
1. C 2. C 3. C 4. D 5. B 6. D 7. C 8. A 9. D 10. A
11. B 12. B
1. B 2. B 3. D 4. B 5. A 6. D 7. D 8. A 9. B 10. C
1. D 2. C 3. C 4. A 5. D 6. B
Spreadsheet Application
1. B 2. A 3. B 4. D 5. C 6. D 7. D 8. D 9. 10. D
11. A 12. B 13. A 14. D 15. A
1. A 2. C 3. D 4. D 5. B 6. B 7. B 8. C 9. C 10. B
11. C 12. B 13. D 14. C 15. B
1. D 2. B 3. D 4. B 5. C 6. C 7. D 8. D 9. A 10. B
285
11. C 12. A 13. D 14. B 15. B
1. C 2. B 3. C 4. B 5. D 6. B 7. B 8. C 9. A 10. C
1. A 2. D 3. C 4. C 5. C 6. A 7. A 8. A 9. C 10. B
11. A 12. B 13. D 14. D 15. D 16. B 17. C 18. A 19. C 20. B
21. C 22. B 23. D 24. A 25. B
1. D 2. A 3. D 4. 5. B 6. B 7. C 8. D 9. A 10. A
1. D 2. 3. 4. 5. B
286
REFERENCES
Dinesh Thakur (2016). Information vs. Data. Retrieved October 14th 2019, from EComputer Notes Website:
http://www.ecomputernotes.com/fundamental/information-technology
https://www.ethicalhackersindia.blogspot/2016/01/what-is-mis-mis-difinition.html (2016). Types and
Forms of Information System. Retrieved November 15th 2019, from Ethical Hackers India.
Tutorials Point (n.d.) (2019). System Development Life Cycle. Retrieved November 24th 2020, from
Tutorials Point Website: https://www.tutorialspoint.com/sdlc/sdlc_overview.htm.
IGI Global. (n.d.). What is Digital Culture|IGI Global. Retrieved November 25th 2019, from IGI Global (Idea
Group Inc.): http://www.igi-global.com/dictionary/digital culture
Dinesh Thakur (2016). Information Technology. Retrieved November 26th 2019, from EComputer Notes
Website: http://www.ecomputernotes.com/fundamental/information-technology
Andrew Sutherland (2019). The Central Processing Unit. Retrieved November 28th 2019, from
quizlet.com/194494160/cnit-176-exam-2-flash-cards/
Rutendo Makaha (2016). RAM vs. ROM. Retrieved December 1th 2019, from Slideshare Website:
https://www.slideshare.net/rmakaha/computer-operations-packages-132719628/
Tutorials Point (n.d.) (2015). Data Representation. Retrieved December 8th 2019, from Tutorials Point
Website: https://www.tutorialspoint.com/computer_logical_organisation.html
http://www.computerhope.com/os.htm (2017). Types of Operating Systems. Retrieved December 14th
2019, from Computer Hope
Miller, M.V. (2009). Integrating Online Multimedia into College Course and Classroom: With application to
the Social Studies. MERLOT Journal of Online Learning and Teaching 5(2), 395-423
Tutorials Point (n.d.) (2015). Introduction to Spreadsheet Application. Retrieved January 12th 2020, from
Tutorials Point Website: https://www.tutorialspoint.com/excel/index.htm
Tutorials Point (n.d.) (2015). Introduction to Database Application. Retrieved January 25th 2020, from
Tutorials Point Website: https://www.tutorialspoint.com/access/index.htm
M. Hussein, F.S Dofour, K.A Prempeh & T.Arhin. (2018). Introduction to Programming Language,
Comprehensive Notes on Elective ICT.
Investintech (2019). Introduction to Desktop Publication. Retrieved February 2nd 2020, from
https://investintech.com/resources/blog/archives/9269-microsoft-publisher-beginners-guide.html
Christenson P. (2014). Network Terminologies. Retrieved February 10th 2020, from Techterm Website:
https://www.techterms.com/definition
Cisco Systems, Inc. (n.d.). Network Devices. Retrieved February 16th 2020, from Cisco Website:
https://www.cisco.com/c/en/us.html
287
Studytonight (2017). Line Configuration in Computer Networks| Computer Network Tutorial |
Studytonight. Retrieved February 22nd 2020, from studytonight: http://www.studytonight.com/computer
networks/line-configuration.html
Pershraw Wahid (2014). Wireless Communication Systems. Retrieved February 28th 2020, from Slideshare
Website: https://www.slideshare.net/pershraw1/wireless-communicationairport-seminar-25june2014
Refsness Data (2015). Introduction to HyperText Markup Language. Retrieved March 8th 2020, from
W3Schools Website: https://www.w3schools.com/html
http://www.pages.intnet.mu/jhbpage/program/qbasic/tutorial.htm (2016). Introduction to Qbasic
Programming. Retrieved March 18th 2020
Ravi K. Walia (2013). Programming Algorithm and Flowchart. Computer & Instrumentation Centre.
Prepared for students at Dr. Y. S. Parmar University of Horticulture & Forestry, Nauni, Solan (HP) India.
288