Ict Advanced Notes
Ict Advanced Notes
W. SWALLEH
WASSWA SWALLEH
Information and Communication Technology-ICT
ACRONYMS
ALU – Arithmetic Logic Unit ASCII –American Standard Code for Information Interchange
BIOS – Basic Input Output System bps – Bits per Second
Bps – Bytes per Second CAD/M – Computer Aided Design/ Manufacturing
CAL – Computer Aided Learning
CAT 5 – 'Category 5' cable
CD – Compact Disc
CD-R – Compact Disc Recordable CD-ROM – Compact Disc Read Only Memory
CD-RW – Compact Disc Re- Writable
CPU – Central Processing Unit
CRT – Cathode Ray Tube
DBMS – Data Base Management System
DDR – Double Data Rate
DFD – Data Flow Diagrams
DOS – Disc Operating System
DSL – Digital Subscriber Line
DTP – Desktop publishing
DVD – Digital Versatile Disc
EFT – Electronic Funds Transfer
EULA – End User License Agreement
FAQ – Frequently Asked Questions
FIFO - First in First Out
FNF – First Normal Form
FTP – File Transfer Protocol
Gb – Gigabyte
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GPS – Global Positioning System
GUI – Graphical User Interface
GW – Gateway
HCI – Human Computer Interaction
HTML – Hyper Text Mark-up Language
HTTP – Hyper Text Transfer Protocol
IC – Integrated Circuit
ICT – Information and Communication Technology
IP – Internet Protocol
wasswaswalleh@gmail.com
1
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
2
Information and Communication Technology-ICT
INTRODUCTION
The education sector and the world of work require an individual to possess ICT knowledge
and skills. This is evidenced by the demand for computer literacy and computer skills for the
respective job vacancies being advertised today.
This book has been prepared to help the you acquire ICT knowledge and skills required to
meet the challenges of ICT applications in society.
Summative Assessment
This shall be done at the end of the two years of Advanced Level Education. Two papers will
be used to assess the subject as follows:
Lab care, 1
Troubleshooting and
Maintenance
File management 1 1 2
Computer Hardware 1 1 1 3
wasswaswalleh@gmail.com
3
Information and Communication Technology-ICT
Computer Software 1 1 1 3
Data 1 1 2
Table of Specifications
This will be a practical paper with five compulsory equally weighted questions each carrying
20 marks. The duration of the paper shall be 3 hours.
The questions will be drawn from the topics of word processing, electronic spreadsheet,
electronic presentation, electronic publication and databases. The paper will emphasize
application of ICT skills in the topics mentioned. Where applicable, support files will be
provided to supplement the set questions.
Table of Specifications
Content Area Know. Comp. Appl. Analy. Total
Topic 3 (Word 20% 30% 35% 15% 100%
processing)
Topic 6 20% 30% 35% 15% 100%
(electronic
Spreadsheets)
Topic 8 20% 30% 35% 15% 100%
(electronic
Presentation)
Topic 10 20% 30% 35% 15% 100%
(Databases)
Topic 11 20% 30% 35% 15% 100%
(electronic
AssessmentPublication)
Weighting
Paper one (theory paper) 40%
Paper two (Practical paper) 60%
Teaching Sequence
The teaching sequence should follow the order in which the topics have been arranged in
the teaching syllabus.
wasswaswalleh@gmail.com
4
Information and Communication Technology-ICT
File Management
Common Utilities
Print Management
Computer Laboratory Care and Computer Literacy
Maintenance Secure Laboratory Environment
Servicing and Maintenance
Computer Word Processing I Introduction to Word Processing
Working with Word Processing
Software
wasswaswalleh@gmail.com
5
Information and Communication Technology-ICT
Software
Developing a Presentation
Charts
Graphical Objects
Presentation Output
Slide Show
wasswaswalleh@gmail.com
6
Information and Communication Technology-ICT
Definition of computer
A computer can be defined as an electronic device that processes a user’s input (data), store,
and output (information) or retrieve information. The computer processes data by a set of
instructions called a computer program.
The characteristic of a computer
Speed: Computers work at very high speeds and are much faster than humans. A computer
can perform billions of calculations in a second. The time used by a computer to perform an
operation is called the processing speed. Computer speed is measured in Mega Hertz (MHz)
or Giga Hertz (GHz).
Accuracy: Computers can process large amounts of data precisely and exactly without
making any errors. Modern computers are capable of detecting mistakes and making
corrections once made by the user.
Diligence: Computers are diligent i.e. they have the ability to perform the similar task
without getting tired and bored e.g. in industrial robotics, like those in Car assembly lines.
Storage: A computer can store large amount of data permanently. A User can use this data
at any time. We can store any type of data in a computer. Text, graphics, pictures, audio and
video files can be stored easily. The storage capacity of the computer is increasing rapidly.
Processing: A computer can process the given instructions. It can perform different types of
processing like addition, subtraction, multiplication and division. It can also perform logical
functions like comparing two numbers to decide which one is the biggest etc.
Communication: Most computers today have the capability of communicating with other
computers. We can connect two or more computers by a communication device such as a
modem. These computers can share data, instructions, and information. When two or more
computers are connected, they form a network.
Versatility: Computers can do computations with all kinds of input (data) including
alphabets, pictures, sound images, voice, etc.
Automation: Computers can receive and work on instructions given on their own
(automatically),
wasswaswalleh@gmail.com
7
Information and Communication Technology-ICT
Artificial Intelligence (AI): Computers can respond to requests given to them and provide
solutions.
Basic Parts of a computer
The physical parts of a computer are made of a collection of different components that are
interconnected in order to function as a single entity. A typical desktop computer is basically
made up of a system unit and other devices connected to the system unit called peripheral
devices.
Peripheral devices are connected to the system unit using special cables called interface
cables that transmit data and information to and from the device. The cables are attached to
the system unit through connectors called ports. Examples of peripheral devices include;
Monitor/screen, keyboard, mouse.
System Unit: This is the part that houses the brain of the computer called the Central
Processing Unit (CPU). The system unit also houses other devices called drive. Drives are
used to store, record and read data.
Keyboard: The keyboard is the most common peripheral device that enables a user to enter
data and instructions in a computer.
Mouse: The mouse is a pointing device that enables the user to execute commands. It is
used to control an arrow displayed on the screen, the user moves the mouse which
consequently moves the pointer on the screen. Once the pointer is on the icon (Icon is a
small pictorial representation of a command), click one of the two mouse buttons.
Monitor: A monitor simply the screen is a television-like device used for displaying
information.
It is called a monitor because it enables the user to monitor or see what is going in the
computer.
CLASSIFICATION OF COMPUTERS
Computers can be classified according to the physical size, purpose and functionality.
wasswaswalleh@gmail.com
8
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
9
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
10
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
11
Information and Communication Technology-ICT
Models of e- commerce:
1) Business to consumer (B2C): This is a business transaction that occur over the internet
where a business sells goods to general public.
2) Consumer to consumer (C2C): This is where one consumer sells directly to another
consumer.
3) Business to business (B2B): This is where a business provides services & goods to
another business.
Education
Initially most educational institutions used computers for administrative tasks such as
compiling examinational reports, writing memos and accounting purposes. ICT plays an
increasingly important role in educational institutions by use of e-learning where lessons
and lectures are presented from a central site and presentation are transmitted to remote
conference terminal displayed on TV screen. Others include; educational research, computer
aided instructions (CAI), Computer aided learning (CAL) and computer-based simulations.
Health
Health professionals use ICT for diagnosis, keeping patients’ records, inventory control
etc. Computers are now being used in some health institutions where more specialized
computer systems referred to as expert systems have been developed to help medical
professionals diagnose illnesses more accurately in the absence of human expert.
Security
ICT is used greatly by law enforcement systems to carry out criminal investigations and
crucial crime detection by use of biometric analysis of the finger prints, voice, lips, facial
features like iris colors etc. some devices used are video CCTV cameras and biometric
scanners. ICT is used in security by military operations and space exploration science
through the Geographic positioning systems (GPS) to perform surveillance, enemy
position plotting and directing of missiles to targets in a precise manner.
Politics and governance
Politicians use ICT for soliciting of online votes and sending bulk SMS to voters. ICT is
used in governance for finance, planning, auditing, and monitor governments’ activities
like administrative work.
Entertainment, leisure and arts.
The advancement in ICT has promoted the use of multimedia technology in recreational
and entertainment. Some application areas of the computer in entertainment, leisure and
arts include:
- Playing computer games
- Watching movies and listening to audio
- Writing or composing music
- Used by the disk jockeys (DJs) to play, store and select music.
wasswaswalleh@gmail.com
12
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
13
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
14
Information and Communication Technology-ICT
BOOTING PROCESS
Booting is the process of starting a computer.
Types of computer booting
1) Cold booting is the initial process of turning on a computer after it has been powered off
completely.
2). Warm booting: This is the process of restarting a computer which is already on.
It is also called soft boot.
FILE MANAGEMENT
File management refers to the fundamental methods for naming, storing and handling files.
Folders
A folder is a named storage location where related files can be stored. A folder also known
as directory in some operating systems, all folders or directories originate from a special
directory called root directory or folder. The root directory is represented by a back slash (\).
A folder or directory may be created inside another folder or directory. Such a folder or
directory is in units called a subfolder or a subdirectory.
Creating a new
folder To create a
new folder:
Using my computer icon, on the folder tree on the left pane, select the location
(desktop) in which you want to create a new
folder. 1. On the File menu tab, Click new
folder
2. Type a new name for the folder to Replace
the temporary name, then press Enter key
or click the icon once.
Or Right Click on the free space on the desktop,
Point to New, click folder. Type a new name for the folder
Renaming a folder or file
Renaming refers to changing the previous name to a new name. To rename a file or folder
proceed as follows:
1. Using My Computer icon, display the Explorer window.
2. On the folder tree on the left pane, select the file or folder to be renamed.
3. On the File menu, click Rename.
wasswaswalleh@gmail.com
15
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
16
Information and Communication Technology-ICT
5. From the edit menu, click paste. Information or item is pasted to a new location. Copy
progress dialog will be displayed on the screen as shown below.
wasswaswalleh@gmail.com
17
Information and Communication Technology-ICT
Table below shows some file extension and whether it is a system, application or a data
file.
Extension File type Description
.doc Data Microsoft Word document file.
.xls Data Microsoft Excel document file.
.ppt Data Microsoft PowerPoint document file.
.pub Data Microsoft Publisher document file.
.accdb Data Microsoft Access document file.
.txt Data A plain text file created using note pad editor
.exe Application files The file that launches a particular application, e.g.
winword.exe
.bat System files Files containing a series of commands loaded
during boot up.
.sys System files System files that perform fundamental operations
in a computer.
Every file has the following details:
1. A unique name and an optional extension. The name and extension are separated by a
period (.) e.g. Jeff.doc. In this case, the file name is Jeff and the extension is doc.
Extension are used to identify the type of a file, for example:
doc is a word processor file;
txt is a plain text file;
sys is a system file;
2. The size, date, and time the file was created or modified.
Saving a file
After typing the content of the file in the work area, click file and then click save. Otherwise,
the file will be saved with a different name or
location then:
1. Click File menu and then Save As
2. From the Save As dialog box, select where the
document is to be saved then type its name.
3. Click the save button
wasswaswalleh@gmail.com
18
Information and Communication Technology-ICT
Deleting files
1. Using My computer icon, display the Explorer window.
2. On the folder tree on the left pane, select the Item that is to be deleted.
3. On the File menu, click Delete.
4. Confirm by clicking Yes.
Customizing the Desktop
Windows lets the user change desktop appearance, background and resolution. To
customize the desktop, right click the desktop to display properties dialog box as shown
below.
Make the appropriate changes by clicking each tab.
Theme and background. To apply a new theme or
wallpaper
1. Click the theme/background tab.
2. Select theme or wallpaper of your choice.
3. Click wallpaper when using windows 7,8
Setting the screen saver
If the screen saver is set, it starts displaying on the
screen if the computer is left idle for a period of
time without interrupting the keyboard or mouse.
Background is the workspace area on the monitor on which icons and running tasks are placed.
Windows lets the user to customize the desktop background by applying favorite themes and
wallpapers as seen above.
2. Select a screen saver style from the screen saver list. i.e. 3D Text, Blank, Bubbles, Mystify
etc.
3. Click apply to see the changes.
4. Click OK to close the dialog box.
wasswaswalleh@gmail.com
19
Information and Communication Technology-ICT
Task manager:
This is the band where the buttons of currently running task are displayed. For example, the
task manager shows the tasks currently running. You can switch between various tasks by
clicking their respective buttons on the task manager.
System tray/Notification area:
This is at the right part of the taskbar. It has icons of tasks running in the background but are
not displayed on the screen. Examples are, the time and calendar, an antivirus program,
volume control etc. to display such a task, simply click its icon in windows 7.
wasswaswalleh@gmail.com
20
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
21
Information and Communication Technology-ICT
Diagnostic utility
It compiles technical information about computer hardware and certain system software
programs.
Screen saver
It prevents CRT and plasma LCD from burnt out by blanking the screen. It is used
primarily for entertainment or security.
Disk partitions
Disk partitions divide drive into multiple logical drives, each with its own file system
which can be mounted by the operating system and treated as an individual drive.
Disk Cleanup
Disk cleanup is a computer maintenance utility designed to free up disk space on a
computer's hard drive. The utility first searches and analyzes the hard drive for files that
are no longer of any use, and then removes the unnecessary files.
Antivirus Program
Anti-virus program is a software used to prevent, detect, scan and remove malware, such as
computer viruses from storage devices and memory.
Examples of the antivirus program include: Kaspersky, Avast, AVG Anti-virus, Avira,
BitDefender, F-Secure, Norton Anti-virus, McAfee VirusScan, Panda security, Clam Anti-virus,
ESET nod32. etc.
Uses of anti-virus programs
Real-Time Scanning
Anti-virus programs provide real-time scanning, which means the program is always on and
checking for viruses as you perform tasks. This is important because a virus scanner works
after the fact and may not remove the virus completely which attach to websites, email,
storage device etc.
Protection
Antivirus software can provide real-time protection, meaning it can prevent unwanted
processes from accessing your computer while you surf the Internet.
Cleanup
Antivirus software allows you to scan your computer for viruses and other unwanted
programs, and provides you with the tools to get rid of them.
Alerts
Antivirus programs can alert you when something is trying to access your computer, or when
something in your computer is trying to access something on the Internet.
Updates
Antivirus programs can update themselves, keeping your computer's protection up to date
without you having to manually update it.
wasswaswalleh@gmail.com
22
Information and Communication Technology-ICT
Further Protection
If antivirus software finds an infected file that cannot be deleted, it can quarantine the file so
that it cannot infect other files or programs on your computer.
Print Management
Print management is to produce a printed copy of a document on a paper.
To print a document;
1. Click file or office button
2. Click print. This will bring the print menu
3. Select the printer name i.e. HP Laser jet P1102 series. And change the necessary details
A4 paper size, properties for advance setting.
Click OK
wasswaswalleh@gmail.com
23
Information and Communication Technology-ICT
Computer laboratory management refers to taking proper care of all hardware & software
installation in the computer laboratory.
Computers need special care & attention in order to perform properly and safely.
This is done through observation of computer ethics integrity
Computer ethics are the human values & moral conducts for the computer users.
It is also referred to as the right or wrong behavior exercised when using the computers.
Computer integrity refers to the loyalty/ faithfulness to the principled set of laws regarding
computer use.
COMPUTER LITERACY
Computer literacy refers to the ability and skills to use the computer. Computer literacy also
refers to having knowledge & understanding of computers & their uses.
Computer literacy involves having both the basic skills & intermediate skills.
Basic skills include;
1. Ability to start / switch on a computer (boot)
2. Ability to use the mouse & interact with screen objects
3. Being able to use the computer key board
4. Ability to open & locate files
5. Ability to shut down a computer properly. etc.
Intermediate skills include;
1. Functional knowledge of word processing
2. Functional knowledge of spreadsheets
3. Functional knowledge of presentation software.
4. Ability to use the email
5. Ability to use the internet
6. Ability to install and uninstall software.
wasswaswalleh@gmail.com
24
Information and Communication Technology-ICT
Booting process
Booting refers to the process of starting a computer for use. The computer is powered, then
it undergoes power on self-test (POST) and finally the operating system is loaded.
Types of booting
There are two types of computer booting namely: warm booting and cold booting.
Warm booting; refers to the process of restarting a computer that is currently on.
Cold booting; refers to starting a computer which initially is off.
The process of cold booting a computer
The system unit is switched on from the power button then the monitor. The computer goes
through power on self-test with the help of BIOS (Basic Input-Output system). The operating
system is then loaded.
The possible ways of warm booting a computer
Using the restart / reset button.
Press CTRL+ ALT + DEL on the keyboard
Using the operating system command
Application programs are the software programs used to solve specific end user needs.
Examples of application programs include;
word processors, database, presentation software, spreadsheets etc.
To open an application software;
Click start>all programs> Microsoft office> click at the desired application program
wasswaswalleh@gmail.com
25
Information and Communication Technology-ICT
By contrast, high level languages such as “C”, C++, Pascal, COBOL, FORTRAN, ADA and Java
are called “compiled languages”. In a compiled language, the programmer writes more
general instructions and a compiler (a special piece of software) automatically translates
these high-level instructions into machine language.
Difference between Low level and high-level programming languages
Low level High level
Machine-dependent Machine independent
They are executed faster by the CPU since They are not executed faster since their
their syntax is closer to Machine architecture. source code must be translated.
They are not easy to use and learn. They are user Friendly and are easy to use
and learn.
Debugging is not easy Debugging is easy
They are not portable They are portable
A large portion of software in use today is programmed in high level programming language.
A good programing language must have the characteristic of highly legible code, easy
maintenance of the code, re-usability of code, faster program development, easy
identification of errors and debugging. Debugging refers to identifying and removing errors
from the computer hardware and software.
Some popular interpreted languages include Basic, Visual Basic, Perl, Python, and shell
scripting languages such as those found in the UNIX, Linux and MacOS X environment.
Shutting down the computer
wasswaswalleh@gmail.com
26
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
27
Information and Communication Technology-ICT
Uninterruptible Powers Supply (UPS) than connecting it directly to the main electricity
supply.
• Security Cameras: to secure the facility in the computer lab, the use of CCTV
cameras for active detection of any removal of computer accessories such as mouse,
keyboard, hard disk, RAM can be secured from the control system which monitor and
store the video information hence increasing the security alertness.
• Fire prevention and control equipment: installing fire prevention equipment such
as smoke detectors, gas fire extinguishers for putting out fire in case of fire breakout due
to short circuit. The first aid boxes should be in place to reduce the risk.
• Air conditioning: To control dust, dampness and humidity, the computer laboratory
should be fitted with good window curtains and air conditioning system that filters dust
particles from the air entering the room. Also, computers should be covered with dust
covers when not in use.
wasswaswalleh@gmail.com
28
Information and Communication Technology-ICT
5. Do not copy, rename, change, examine or delete files and information belonging to
some other user.
6. Do not deliberately use-computing facilities to harass others, or to interfere with their
work for example to send obscene, abusive, threatening or repetitive messages to a
user(s).
7. Do not attempt to modify system facilities, illegally obtain extra resources, and
degrade the performance of any system.
8. Do not tamper with terminals, microcomputers or any other associated equipment,
all faults should be reported to the system administrator.
9. Do not eat or drink around terminals, microcomputers or another computer
equipment.
10. Always cover your computers and its peripherals to protect them from damage
caused especially by dust and moisture.
11. Always close all the tasks running before shutting down the computer and follow the
systematic procedure of shutting down the computer.
Servicing and maintenance of computer Systems
Computer maintenance refers to the special care & attention given to computers in order to
perform properly and safely.
It is very important to keep your Computers maintained to avoid downtime and the safety of
your data/information. The following are some of the ways to maintain your computer.
• Cleaning of the computers: physical removal of dirt, dust and debris from the
interior or exterior parts of computer peripherals such as keyboard, mouse, monitor and
system unit. This can be done by use of a clean soft clothing or compressed air to blow
out the debris from the intake slot and fan.
• Updating of software:
Provides bug fixes for features not working properly and minor software enhancements,
and sometimes include new drivers to support printers or DVD drives. A software update
is sometimes called a patch because it is installed over current software already in use.
This helps to improve performance and safeguard against malware by updating
programs e.g. anti-virus and computer programs.
• Upgrading software: Is a purchase of a newer version of software for current use.
This helps in replacement of older version to the current version which supports various
compatibility.
• Software installation:
Installation of a computer program is the act of making the program ready for execution.
Helps in creating more applications for use and improves the system performance of the
computer with various computer programs for use.
• Fine-tuning the system: Fine tuning refers to the circumstance where the parameter
of a model must be adjusted precisely to agree with the observation. Example adjusting
the screen resolution and appearance.
wasswaswalleh@gmail.com
29
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
30
Information and Communication Technology-ICT
3. Test, debug, install and maintain programs developed or customized for the
organization.
Web masters: this is a person who designs, creates and maintains websites.
Responsible for;
1. Developing and testing websites.
2. Updating & modifying information on the websites to meet new demands by the
users.
Monitoring the access & use of internet connection by enforcing security measures
Network administrators: this is a person in charge of a computer network.
He is responsible for installing, managing & controlling a network.
Database administrator: this is a person who manages, updates and supervises a
company’s database.
System analyst: The is a person responsible for analyzing a company’s needs then designs
& develops a computer-based information system.
wasswaswalleh@gmail.com
31
Information and Communication Technology-ICT
Word processing is the art of creating, saving, editing, formatting and printing text and
graphic documents using an electronic word processor.
An electronic word processor is application software that enables the user to create, edit
format and print text documents. Examples of common word processors include Microsoft
word, Corel WordPerfect, Lotus Word Pro, Apple Works 9, LibreOffice Writer, AbiWord, and
OpenOffice Writer.
Text editors are simple word processors that are generally used to type without any special
formatting.
• Text editors are mainly used to create small notes, memos and programs. Examples
of common text editors are: Notepad, Notepad++, Gedit etc.
Terms in relation to word processing
1. Cut and paste: This refers to removing an item like text from its original location and
inserting into a new location in a document.
2. Copy and paste. This refers to making a duplicate copy of an item into a new
location
3. I beam: This is the shape which the mouse pointer takes up when it reaches any text
entry area.
4. Header: This refers to text that appears in the top margin of all pages in a document.
5. A table: This is the arrangement of data in rows and columns
6. A cell: This is the intersection of a row and a column in a table.
7. Word Wrap: This is a word processing feature which automatically sends a word that
does not fit within the page margin settings onto the next line.
8. Clip board: This is a temporary storage location where items which are copied or cut
in a document are held before they are pasted to another location in a document.
9. Paragraph spacing: This is the vertical distance between one paragraph and the next
paragraph on a page. (It
10. is measured in points)
11. Drop cap: This is a word processing feature which creates a large letter at the
beginning of a paragraph falling over two or more lines of text.
12. Line Spacing: This refers to the vertical distance between two lines on a page
wasswaswalleh@gmail.com
32
Information and Communication Technology-ICT
13. Indent This is the amount of white space set in between the margin and the
beginning of text. examples of indents include the first line indent, hanging indent
and right indent.
Advantages of electronic word processor
• Store document for future which may not require retyping.
• Easier for typing text-based document and more efficient accurate.
• Most of word processors have superior editing tools such as thesaurus, autocorrect,
spelling and grammar checkers.
• Electronic word processors provide predefined features for generating headers,
footers, indexes, footnotes and references.
• Word processors have superior document formatting features. Formatting refers to
the art of making the document more attractive and appealing to the eye. Such features
include underlining, boldfacing, italicization, color etc.
• Most word processors have the ability to create and import tables, text and graphics
from other programs.
• It is possible to print multiple copies once.
Disadvantages of word processors
Word processors cannot be used without Electricity.
They have led to Unemployment of typists
Many people are Computer illiterate, and cannot use the program.
Computers have Viruses, which lead to loss of data in soft copies
Using word processors on light emitting computer monitors for long leads to eye
disorders, which isn’t the case with type writers
Word processors require purchase of hard ware like printers in order to obtain hard
copies yet with typewriters, whatever is typed is permanent and instantly available as
a hard copy: there is no delay for printing or risk of unintended file deletion
Word processors require purchase of hard ware like printers in order to obtain hard
copies yet with typewriters, whatever is typed is permanent and instantly available as
a hard copy: there is no delay for printing or risk of unintended file deletion.
wasswaswalleh@gmail.com
33
Information and Communication Technology-ICT
• Grammar checker: this reports grammatical errors, usually by a wavy green line, and
suggests ways to correct them.
• Thesaurus: suggests alternative words with the same meaning (synonyms) for use in
the document.
• Mail Merge: This is feature used to create similar letters to be sent to several people.
The names and addresses of each person can be merged with one single main
document.
• Automatic page numbering: numbers the pages automatically in a document
• Tables: allow users to organize information into rows and columns.
• Multi-columns: arranges text into two or more columns that look similar to
newspaper or magazine
• Drop cap – Formats the first letter in paragraph to be dropped across two or more
lines.
• Clip art: refers to pre-made images about various subjects used to illustrate concepts
in documents.
• Templates: establish the initial document layouts and formats for various document
types.
• Printing: allows a user to obtain a hard copy of a document from the printer.
• Word Count: Establishes the number of words, characters, paragraphs, etc. in a
document.
• Headers and Footers: Used to insert text in the top and bottom margin through the
document
• Footnotes and Endnotes are used as references that provide additional information
about a word or phrase within a document.
• Insert and Delete allows a user to add and remove portions of text while editing
document
•
Main features in word processors
Title bar- indicates the task currently running. On its right, it has a control button
Maximize/restore
Close
Menu bar- provides the user with group of commands. Each command has a drop-
down list with command used to create or manipulate a document.
wasswaswalleh@gmail.com
34
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
35
Information and Communication Technology-ICT
3. On the templates dialog box, click on the table that contains a template you wish to
use.
4. Select a template from templates window.
5. Replace the general content with your own content.
Saving a document
Saving refers to copying the data from a temporary area to a more permanent storage
medium.
To save a new document for the first time proceed as follows.
1. On the file menu, click Save As. Save As dialog box is displayed as shown below.
wasswaswalleh@gmail.com
36
Information and Communication Technology-ICT
2. In the File name box, type a unique name for the document.
3. Select a location or drive you want to save in by clicking the down arrow on the right
of save in list box.
4. To save the file to different format or type such as Word 97-2003 template, so that
any word can open. Click the down arrow on the right of Save as type list box and choose
a file type.
5. Click the Save button. The file will automatically be saved as Microsoft word
document.
Alternatively press Ctrl + S or F12, Click
Protecting a document with a password
A password is a combination of characters that prevents other users from opening and
changing a document without permission. If the document is protected by a password, only
the person who knows the password can open the document or edit it. However, in case you
forgot your password download is unshared password remover. To save a document with a
password:
1. Open the document you want to protect.
2. On the File menu, choose Save As.
3. Click the down arrow on the Tools button in the save as dialog box.
4. Click General option. Type in a password in the password to open. This prompts the
user to enter password when opening a document.
5. To protect against modification, type in a password in the password modify text box,
and the click OK.
wasswaswalleh@gmail.com
37
Information and Communication Technology-ICT
You can also open a file from recently used file list on the File menu. Word keeps a list of
recently used file drop down menu.
wasswaswalleh@gmail.com
38
Information and Communication Technology-ICT
The purpose of selecting or highlighting text is to enable the user to manipulate the selected
block of text. You can either select a block of text using the mouse or keyboard.
Deleting text
To delete a character or word from the right to the left:
1. Place the insert pointer on the right of the word.
2. Press the backspace key.
To delete a character to the right of the cursor position:
1. Place the insertion pointer on the left of the word.
2. Press the delete/Del key
To delete block of text:
1. Highlight the text to be deleted.
2. Press the delete/del key
wasswaswalleh@gmail.com
39
Information and Communication Technology-ICT
Proofreading
Proofreading refers to checking whether the document has typographical or grammatical
errors. Microsoft word has proofing tools such as spelling and grammar checker and
Autocorrect.
wasswaswalleh@gmail.com
40
Information and Communication Technology-ICT
Computer Hardware: are the physical or tangible components that make up a computer
system. They are classified into four categories namely input devices, output devices, storage
devices and processor components (processing devices).
INPUT DEVICES
Input devices convert user input which is in human readable form to machine language that
a computer can process. These devices are identified as basic input devices and they include;
wasswaswalleh@gmail.com
41
Information and Communication Technology-ICT
Keyboards, mouse, digital cameras, barcode readers, microphones, scanners, touchpad and
joystick;
Mouse: is a pointing device used for controlling a pointer cursor on the screen. Apart from
the mouse other pointing device include; trackball, joystick, and light pen. Mouse has three
types these include Standard or traditional mouse using a ball underneath, Optical mouse
and cordless mouse that uses infrared waves or wireless connection to the system unit.
Digital cameras: capture images and store in a digital form. Pictures are mostly stored on
a memory card instead of a film. The stored images can be edited, printed or uploaded to
the internet.
Barcode readers: are used to capture data coded lines of varying thickness known as bar
codes or Universal Product Code (UPC). Barcodes hold manufacturer’s details and the
product code but not the price details because prices vary from one place to another.
Microphones: is a voice input technology used to enter data inform of speech into the
computer. Voice input has limitations in that it does not fully support speech related aspects
such as accents, inflections and tones.
Touchpad: is a technology that allows the user to touch the screen using a finger or stylus in
order to write or select an item. The screen consists of infrared light crisscrossing behind it.
When the user touches a location on the screen, the finger interrupts the infrared light and
the output is displayed on the screen.
Joystick: is an input device that looks like a lever used to control a pointer on the screen. It is
purposely used for playing computer games. The user controls game actions by varying the
pressure, speed and direction of the joystick.
Interactive whiteboard: is a large interactive display that connects to a computer. It is also
known as a smart board. The computer display is projected onto the board’s surface, where
users control the computer and write using a pen or a finger. The board is typically mounted
to a wall or on the floor stand. Smart boards are used in places such as classrooms, seminars,
broadcasting studios and corporate board rooms.
Categories of input hardware
According to the type of data they input, input devices can be grouped into the following:
a) Text input devices
b) Pointing input Devices
c) Imaging input Devices
d) Gaming input Devices
e) Audio input Devices
f) Biometric input Devices and
wasswaswalleh@gmail.com
42
Information and Communication Technology-ICT
1. The keyboard,
2. Voice Recognition Equipment
3. Optical mark reader (OMR)
4. Barcode readers
5. Optical character reader (OCR)
6. Magnetic ink character readers (MICR) readers
7. RFID readers
8. Magnetic Strip Card Readers, etc.
Keyboard: is a keying device that converts typed numbers, letters and special characters into
machine readable form before processing takes place. The keyboard has many types such as
Traditional keyboard, flexible keyboard, Ergonomic keyboard and Braille keyboard.
Ergonomic keyboard is designed to provide comfort and alleviate wrist strain. Braille
keyboard is a keyboard designed for use by the blind
Voice Recognition Equipment: This is a device which converts spoken words to text.
Computers with Speech recognition do not actually understand speech, but they are
programmed to recognize a vocabulary of words, which can range from two words to
millions of words.
Optical mark recognition (OMR): Optical mark recognition (OMR) devices read hand-
drawn marks such as small circles or rectangles.
Barcode readers: A bar code reader is an input device that uses laser beams to read bar
codes that are printed on items usually in super markets.
A bar code is an identification code that normally consists of a set of vertical lines and spaces
of different widths.
Optical character recognition (OCR): Optical character recognition (OCR) is a technology
that involves reading typewritten, computer-printed, or handwritten characters from ordinary
documents and translating the images into a form that the computer can understand.
MICR readers: A magnetic-ink character recognition (MICR) reader is used to read text
printed with magnetized ink.
RFID readers: Radio-frequency identification (RFID) is a technology that uses radio waves
to transfer data from an electronic tag, attached to an object, through a reader for the
purpose of identifying & tracking the object.
Magnetic Strip Card Readers: This is a device that reads the magnetic stripe on the back of
credit cards, bank ATM cards, and other similar cards.
Pointing Devices:
A pointing device is an input device, which allows users to move a pointer and make
selections on the computer screen.
Pointing device input spatial data into a computer.
Examples of pointing devices:
1) Stylus pen & digitizing tablet
2) Cordless Mouse
wasswaswalleh@gmail.com
43
Information and Communication Technology-ICT
3) Trackball
4) Touchpad
5) Light pen
6) Touch Screen
7) A Track Point
Imaging Devices:
These are input devices used to enter images such as still photos, motion pictures, graphics
& video etc. into the computer for processing.
Examples of Imaging devices:
1. Image scanner
2. Digital Camera
3. Digital video (DV) camera
4. Camcorder
5. Web cam
Examples include;
1. Microphone
2. Dictaphone
3. Sound cards
4. MIDI devices
wasswaswalleh@gmail.com
44
Information and Communication Technology-ICT
PROCESSING DEVICES
The Central Processing Unit (CPU) is a physical component within the system case whose
major purpose is to process data. Hence the name processor
The CPU is also called the brain of the computer.
Being one of the most important components, a computer without a CPU is just like a
television set which cannot process data.
The process of turning data (raw facts) into information is called data processing.
The greatest company in the production of processors is Intel.
Types of processors
The higher the processing power, the better the computer.
– 80286
– 80386
Pentium I (80556)
– Pentium II
– Pentium III
– Dual core
– Quad core
– Core i 3
– Core i 7
Components of the CPU.
A CPU has 3 major parts namely;
1. The Control Unit,
2. The Arithmetic Logical Unit
3. The registers
wasswaswalleh@gmail.com
45
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
46
Information and Communication Technology-ICT
COMPUTER MEMORY
Computer memory refers to the storage location in a computer where files and programs
reside.
Computer memory is measured in bytes.
Types of computer memory
1. Primary memory:
2. Secondary memory
Primary memory
This is a temporally storage that holds data and program instructions waiting to be
processed by the computer.
Primary memory is the main computer storage area where data is stored for quick access by
the computer’s processor.
Primary memory can alternatively be called;
Main memory
Internal memory
Random access memory
Immediate Access Memory
Examples of Computers primary storage
1. Registers: These are primarily used by the processor to handle calculations used to
operate the program.
2. Cache Memory (CPU Memory): This is a high-speed memory which holds frequently
used instructions by the CPU.
3. RAM (Random Access Memory): This is a primary memory which stores information being
processed temporarily. Types of RAM;
1. Dynamic RAM
2. Static RAM.
3. Flash RAM / flash memory chip:
4. Magneto resistive RAM (MRAM)
4. Read Only Memory (ROM): This is a type of memory that can be read on by the computer
but not altered or changed by the computer processor. Types of ROM;
1) Programmable Read Only Memory (PROM);
2) Erasable Programmable Read Only Memory (EPROM)
3) Electrically Erasable programmable Read Only Memory. (EEPROM):
4) Electrically Altered Programmable Read Only Memory (EAPROM):
Secondary storage
Refers to as auxiliary storage, are devices that provide alternative long-term storage for
programs, data and information. They are regarded as secondary because unlike primary
storage, they are not directly accessible by the CPU. Secondary storage devices can be
classified according to:
wasswaswalleh@gmail.com
47
Information and Communication Technology-ICT
Removable storage
Removable storage media are those that are not housed inside the computer. Data is read
and written into the media using a device known as drive. Examples of removable storage
include magnetic tapes, floppy disk, optical disks and solid-state devices.
Magnetic tapes
A magnetic tape is made using a thin ribbon of Mylar coated with a thin layer of magnetic
material composed of iron oxide. The tape resembles the music cassette used in home tape
recorders. Data is read from or written using a tape drive. Examples of magnetic tapes
include: reel to reel tapes, cassette tapes and cartridge tapes.
Floppy disks
A floppy disk or simply a diskette is made up of small flexible round disk coated with
magnetic iron oxide. This disk is covered with a plastic protective case. However, it is
important to note that diskettes are becoming unpopular due to the entry into the market of
affordable mass storage media such as flash disks and memory cards.
Zip disk
A zip disk is a high capacity magnetic diskette that resembles a floppy disk. However,
compared to a 3.5 floppy disk, a zip disk has a higher storage capacity and is physically
thicker. A zip disk can hold as much as 250MB. Zip disk come with separate portable external
drives.
wasswaswalleh@gmail.com
48
Information and Communication Technology-ICT
Jaz disks
Jaz disks resemble zip disks in every sense only that they can hold as much as 2GB. Data is
read or written using internal or external jaz drives.
Compact disk-read only memory (CD-ROM): Compact disk read only memory contains data
that can only be read but cannot be written on. To record data the recording surface is made
wasswaswalleh@gmail.com
49
Information and Communication Technology-ICT
into pits and lands (bumps). When a laser beam falls on the land, this is interpreted as 1,
otherwise a zero is recorded.
Compact disk-recordable (CD-R): Compact disk recordable (CD-R) are coated with a special
dye which changes colour to represent data when burned using a laser beam. Once data is
burned on a CD-R it becomes read only.
NB. CD-ROMs and CD-Rs are referred to Write Once Read Only Many (WORM). Data is only
recorded once but can be read as many times as possible. CD-Rs can also allow adding of
data records on the Compact disk recordable but does not allow erasing of data.
Compact disk-rewritable (CD-RW): unlike the CD-Rs, these types of compact disk allow the
user to record, erase and rewrite new information just as one would with floppy disks.
Optical card
An optical card resembles an MICR card but data is read and written optically on a stripe.
These types of cards are mostly used in banking and other business organizations to record
customer details.
Optical tape
This is similar to magnetic tape only that data is stored y using optical technology.
wasswaswalleh@gmail.com
50
Information and Communication Technology-ICT
Most computer hard disk is connected to the motherboard via a channel called controller.
Some of these controllers are Integrated Drive Electronic (IDE), enhanced IDE or SATA (Serial
Advanced Technology Attachment).
OUTPUT DEVICES
Output devices are peripheral devices that a computer uses to give out information
produced after the processing operations. These devices can be classified into two categories
namely soft copy and hard copy output devices.
Softcopy refers to a readable form of data, information or instructions that can be seen or
heard; such as screen display and sound are intangible. Examples of such devices include
monitors, LCD projectors and speakers.
Hardcopy refers to a copy of data that has been printed on paper. Hardcopy is tangible.
Examples of hardcopy output include printers, plotters and facsimile (fax). Examples of
output devices such as visual display units, printers, analog devices for speech generation
and speakers are explained below.
Monitor
A monitor, also known as Visual Display Unit (VDU) or the screen, is used to display
information in the form of text, pictures and video, enabling the user to monitor what is
going on in the computer. There are three common types of monitors namely Cathode Ray
Tube (CRT), Liquid crystal Display (LCD) and Gas plasma Display (GPD) monitors. LCDs and
gas plasma display are generally referred to as flat panel displays.
wasswaswalleh@gmail.com
51
Information and Communication Technology-ICT
Data projectors
Projectors are used to display output from a computer on a plain white screen like a wall or
whiteboard. It is a creative way of presenting computer output to an audience. This
technology is gradually replacing the traditional overhead projectors.
Speakers
Speakers are sound output devices which produces sound such as beeps, audio or digital.
Some computers come with inbuilt speakers, hence eliminating the need to connect external
speakers.
Printers
Printers are primarily used to produce information on a piece of paper. The quality of a
hardcopy depends on the printer’s printing mechanism. Printers are classified according to
different printing mechanism. The two categories are impact and non-impact printers.
Impact printers
Impact printers print using striking mechanism. This means that they strike the paper in order
to form an imprint on it. Two examples of impact technologies are dot matrix and daisywheel
printers.
Dot matrix printers: Dot matrix printers have a set of pins on the printer’s head which
strikes on an ink ribbon placed over the paper.
Daisy wheel printers: Daisy wheel printers have a removable flower-like wheel consisting of
spokes with embossed characters. When printing, the wheel is rotated to align the required
character and the characters are hit with a hammer.
Although impact printers are cheaper to run and print for long periods without breaking,
they produce low quality printouts.
Non-impact printers
Non-impact printers are faster and quiet than the impact printers. They print using ink,
thermal or laser mechanisms. The four types of non-impact printers are inkjet, thermal, laser
and photo printers.
Inkjet printers: Inkjet printers print by spraying tiny ink droplets onto a paper to create an
image. A colour inkjet printer may have black and tricolor cartridges that contain cyan,
magenta and yellow (CMY) compartments. The cartridge has nozzles that do the actual
spraying of ink on the paper.
Although inkjet printers are cheaper to purchase and produce better quality printouts, they
are more expensive to run due to high cost of replacing the cartridges.
wasswaswalleh@gmail.com
52
Information and Communication Technology-ICT
Thermal printers: Thermal printers use thermal technology to heat ink which is normally in
wax or resin form to melting point before fusing it onto the paper. Thermal printers are
mostly used in point of sale terminals to print receipts and barcodes.
Although thermal printers produce high quality printouts, they are expensive to purchase
and run.
Laser printer: Laser printers operate by shining a laser beam to create an image on the
rotating drum. As the beam hits the drum, it ionizes some regions which attract ink toner
particles. The toner is fused onto a piece of paper through heating.
Laser printers are very fast compared to the inkjet and thermal printers. They are cheaper to
run and produce high quality printouts. However, they are expensive to purchase.
Photo printer: Photo printers are special purpose printers designed to print photos.
Plotters
A plotter is a large type of hardcopy output device. Plotters are mostly used for printing
geographical, architectural and engineering drawings e.g. maps, advertisement posters to be
placed on billboards, machine parts etc.
wasswaswalleh@gmail.com
53
Information and Communication Technology-ICT
parallel cable. The advantage of using such cable is that they transmit data faster over a short
distance.
A parallel cable connects to a parallel interface port commonly referred to as Line Printer
(LPT). Parallel cables are used to connect printers, optical scanners and some removable
storage drives such as zip drive.
Serial interface
Serial ports also known as COM or RS232 ports, support transmission of data one bit at a
time, hence it is slower than the parallel port. Although they are slower, they are more
reliable than parallel ports because they can support data transmission to devices connected
15m away. Serial cables are generally used to connect devices such as the mouse and some
printers.
Universal serial bus (USB) interface
Universal serial bus is a new standard serial interface that is set to replace the conventional
parallel and serial cables and ports. Currently, most peripheral devices from printers to
mobile phones are coming with USB as the default interface. Although it transmits only 1-bit
at a time, it provides high-speed and quality data transmission over distances of
approximately 5metres. The two types of USBs namely low speed USB (1.1) and a relatively
faster high-speed USB (2.0). A USB port can be used to connect as many as 127 peripheral
devices to a computer daisy chained to a single port known as the root hub.
Small Computer System Interface (SCSI)
Small computer system interface port and interface cables transmit data in parallel but are
faster than the parallel cables. Another advantage of the SCSI port is that one SCSI port
allows us to connect to multiple devices.
Personal system 2 (PS/2) interface
Originally, most computers use the 5-pin DIN to connect a keyboard to the system unit but
the smaller 6-pin mini-DIN also known as PS/2 interface has replaced this technology.
Currently most desktop computers come with two PS/2 ports, one for mouse and the other
for the keyboard.
wasswaswalleh@gmail.com
54
Information and Communication Technology-ICT
The table below shows summary of standard symbols used to denote an interface.
wasswaswalleh@gmail.com
55
Information and Communication Technology-ICT
Computer software. It is a collection of computer programs and related data that provides
instruction to computer hardware. Alternatively, computer software is a set of programs that
directs the operation of computer hardware.
Computer processes data and is guided by a set of instruction known as program. Software
and programs are used interchangeably, however the term software does not only mean
program but also user guides documentation.
Operating Systems
An operating system consists of set of complex programs that work together to control
execution of user programs called applications and act as an interface between application
and computer hardware.
Operating system manages input, output and storage operations in a computer. Examples of
common operating systems are Microsoft windows (2000, XP, Vista, 7 and 8), UNIX, Linux
and Macintosh (Mac OS), MS DOS.
O/S relies on device drivers to manage computer devices.
A device driver is a small program that tells the operating system how to communicate with
the computer devices.
wasswaswalleh@gmail.com
56
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
57
Information and Communication Technology-ICT
Utility software
Utility software is a special program that performs commonly used services that make certain
aspects of computing to go on smoothly Or These are general purpose programs that
enhance/ boost the performance of a computer.
Examples of utility programs
a) Backup utility
b) Antivirus utility
c) Data compression utility
d) Screen savers
j) Disk defragmenter
k) Disk repair utility
l) Computer language translators
m) Disk partitioning software
n) Disk compression utilities
o) File managers
Types of Utility software
1. System-level utility: This helps the user to work with the operating system and its
functions. For example, utility software tells the wrong command and gives suggestions
how the error can be corrected.
2. Application-level utility: These make application programs run more smoothly and
efficiently. Such utility programs are commonly purchased separately or be part of
operating system.
Programming Languages
A programming language is a set of commands used to write computer software. Computer
programmers use these languages to develop new software and controlling computers.
wasswaswalleh@gmail.com
58
Information and Communication Technology-ICT
In essence, programming languages are translators that take words and symbols and convert
them to binary codes that the CPU can understand.
Basically, programming languages are classified into two i.e. high-level programming
languages and low-level programming languages.
Application software
Application software is designed to help the user accomplish specific task. Examples of
common application packages include,
1. Word processor e.g. MS Word, Lotus WordPro, open Office writer
2. Spreadsheet e.g. MS Excel, Lotus 1-2-3, Open Office Calc, Libre Office Calc.
3. Desktop publishing e.g. MS Publisher Adobe PageMaker, Photoshop, CorelDraw,
Adobe InDesign.
4. Computer aided design e.g. AutoCAD.
5. Databases e.g. MS Access, MySQL, FoxBASE, Paradox
Computer aided design Used for drawing architectural building plans, car engine
wasswaswalleh@gmail.com
59
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
60
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
61
Information and Communication Technology-ICT
Cell is the intersection between a row and a column. Each cell is referenced using the column
header label followed by the row label. In the work sheet the active cell is A1.
Database
A database is a collection of related data items organized so as to provide a consistent and
controlled access to items. In spreadsheets, a worksheet list may contain related data,
organized into rows that can be manipulated using database functions that enable the user
perform functions such as sorting, filtering, validation subtotaling, pivot tables and
consolidation.
Graphs
A graph is a pictorial representation of the base data on a worksheet. Most spreadsheet
refers to graphs as charts. A chart enables the user to present complex data elements from a
worksheet in a simple easy to understand format. Examples of charts are pie charts, line
charts and bar charts and bar charts.
wasswaswalleh@gmail.com
62
Information and Communication Technology-ICT
Accounting
Accountants find electronic spreadsheets useful tools for analyzing financial transactions
such as computing totals, consolidating financial records, as well as predicting future
business trends. Most spreadsheet packages have inbuilt functions used to analyze financial
data.
Mathematical and scientific
Spreadsheets are used to solve mathematical and scientific problems such as arithmetic and
trigonometric.
Forecasting
A feature known as “What if” analysis, is used to make future predictions. Forecasting is an
import function used for predicting economic trends budgeting, stock portfolio analysis, cost
analysis and cash flow analysis.
wasswaswalleh@gmail.com
63
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
64
Information and Communication Technology-ICT
Labels
Any text or alphanumeric characters entered in cell are views as labels by the spreadsheet
program. Labels are used as row or column headings usually describe the contents of the
row or column.
Values
These are numbers that can be manipulated mathematically. They may include currency,
date, numbers (0-9), Special symbols or text that can be manipulated mathematically by the
spreadsheet.
Formulae
Formulae are mathematical expression that creates a relationship between cells to return a
new value. In Excel, a formula must start with an equal sign. For example, the formula
=A1+B1 adds the contents of B3 and D4 and returns the sum value in the current cell. Excel
formulae use cell addresses and arithmetical operators; addition (+), subtraction (-),
multiplication (*) and division (/).
Using cell address, called referencing, enables Microsoft excel to keep calculations accurate
and automatically recalculates results of a formula in case the value in a referenced cell is
changed. This is called automatic recalculation.
Functions
There are inbuilt predefined formulae that the user can quickly use instead of having to
create a new one each time a calculation has to be carried out. Microsoft excel has many of
these formulae that covers the most common types of calculations performed by
spreadsheets. For example, to add contents of cell B3+D3 type =Sum (B3:E3)
Saving a workbook
To save a workbook:
1. Click File menu option, then select save as command. Alternatively, click the save
command on the standard toolbar. The Save as dialog box is displayed.
2. Select the location in which your workbook will be saved in the save in box, then type
a unique name for the workbook is selected under the save as type box.
3. Click the save button to save.
Opening a workbook
1. On the file menu or standard toolbar, click Open.
2. Click the look in drop down list arrow and select the drive or folder where the
workbook was saved.
3. Double click the workbook icon that you want and the worksheet.
wasswaswalleh@gmail.com
65
Information and Communication Technology-ICT
Operators Precedence
If several operators are used in a single formula, Microsoft Excel performs the operations in
the order shown in table below. A formula with operators that have same precedence i.e. if a
formula contains both multiplication and division, operators are evaluated from left to right.
Enclosing part of the formula to be calculated in parentheses or brackets makes that part to
be calculated first.
Operator Name Precedence
- Negation as in -1 1
% Percent 2
^ Exponentiation 3
wasswaswalleh@gmail.com
66
Information and Communication Technology-ICT
There are three types of cell referencing used when creating formulae and manipulating
cell(s) content.
Relative referencing
When you copy a formula that contains cell references, say A3, the references adjust to their
new location. For example, if C1 containing a formula = A1+B1 is copied to C2, the reference
changes to A2+B2.
Absolute referencing
The reference is made to a specific address and does not change even if the formula is
copied to another cell. In Excel an absolute cell reference is made by placing a dollar sign
before the- reference e.g. $A$2. For Example, if the result in C1 is 170, if absolute reference is
used, 170 will be copied to C2.
Mixed cell referencing
This is a combination of relative and absolute references, e.g. $A3 or A$3. In the first case the
column reference is absolute while the row is relative, in the second case the column
reference is relative while the row reference is absolute.
wasswaswalleh@gmail.com
67
Information and Communication Technology-ICT
Mathematical functions
Some commonly used mathematical functions are:
• SUM () Adds all the value in the selected range of cells. For example, if A3, B3 and C3
contains 20,50, and 80 respectively, =SUM (A3:C3) Returns 150.
• ROUND () rounds a number to a specified number of decimal places. Zero rounds off
the number to the nearest integer. For example, =ROUND (79.969,2) returns 79.97 while
=ROUND (79.969,0) returns 50.
• SUMIF () Conditionally adds the specified cells according to the set criteria. =SUMIF
(A3:A10, “>=500”) returns a value is greater than or equal to 500.
• PRODUCT () Multiplies all the values in the argument. For example, =PRODUCT
(40,3,2) returns 240.
Statistical functions
Some commonly used statistical functions are:
• AVERAGE () Returns the arithmetic mean of its arguments. For example, =AVERAGE
(A2:D2).
• COUNT () Counts the number of cells
INTERNET
The term Internet refers to the global interconnection of computer networks for the purpose
of communication and resource sharing.
Computers within an office or building can be connected together using transmission media
such as cables to communicate with one another. Such interconnection of computers is
wasswaswalleh@gmail.com
68
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
69
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
70
Information and Communication Technology-ICT
2. Instant messaging; this is a more enhanced messaging service that allows two or
more people to communicate directly. To get the services you must first register with an
instant messenger such as Yahoo! Messenger.
3. Electronic commerce (e-commerce); many companies are increasing using the
internet to sell and buy goods and services. This new business strategy where goods and
services are sold over the internet is called electronic commerce (e-commerce). One
advantage of e-commerce is that, a company can access customers all over the world
and is not limited by space and time. Hence, they enjoy benefits of reduced operating
costs and increased sales like international vehicle dealers.
4. Electronic learning; lessons and lectures are presented from a central site and the
presentation is transmitted to remote conference terminals or displayed on the TV
screens. The learner can access learning materials made available on the internet, sit for
online examinations and received results through e-learning platform.
5. Newsgroups; newsgroups are organized group of internet users who wish to share
ideas and interests. Once you join a newsgroup, you can participate in discussion forum
and debates.
6. Chatting; chatting allows two or more people who are simultaneously connected to
the internet to hold a live interactive conversation. Examples include social media like
skype, Facebook, WhatsApp, Viber, Messenger, Yahoo messenger etc.
7. Searching; search engines are specialized programs that help the user easily search
for information on the internet. Examples are; Google, Bing, Alta vista, Excite and Yahoo.
E-mail services
E-mail is an electronic message sent from one computer to another. Messages can be sent
and received with attachment such as pictures or formatted document. To send and receive
an email, one must have an e-mail address/e-mail software, internet connectivity, data
terminal equipment, telecommunication line, browser etc.
An e-mail address determines the destination of the e-mail sent. A typical e-mail address has
five parts.
Jeff.geoff@outlook.com
1. Jeff.geoff is the user name and is usually coined by the user during e-mail account
registration.
2. @ is a symbol for “at” which separates the user name from the rest of the address.
3. outlook.com is the name of the host computer in the network i.e. the computer on
which the e-mail account is hosted.
4. The period “.” Is read as dot and is used to separate different parts of the e-mail
address.
5. Com identifies the type of organization offering particular services and is called the
domain, meaning it is a commercial institution.
wasswaswalleh@gmail.com
71
Information and Communication Technology-ICT
Carbon copy (Cc); in e-mail, the Cc commands is to enable copies of e-mail to be sent to a
third party while acknowledging other recipients.
Blind Carbon Copy (BCC); Enables copies of e-mail to be sent to a third party without
acknowledging any other recipients.
Concept of Netiquette
Netiquette is a combination of the words network and etiquette, and is defined as a set of
rules for acceptable online conduct and behavior. Similarly, online ethics focuses on the
acceptable use of online resources telephone or video in an online social environment. It is a
social code of network communication. Communicating with others on internet without
creating misunderstanding, therefore recommendations to safeguard against these
misunderstanding have been proposed.
wasswaswalleh@gmail.com
72
Information and Communication Technology-ICT
Web browsers
A web browser is a program that lets the user surf or browses the internet. Examples of web
browser include Microsoft internet explorer, Mozilla Firefox, Google chrome, opera, and
Netscape navigator.
Search engines
Search engines are web-based programs that allows the user to easily search and retrieve
information on the internet. Examples are; Google, Bing, Alta vista, excite, Ask Jeeves and
Yahoo.
How to search information on the internet
• Open a web browser i.e. Mozilla fire fox, Google chrome
• Identify a search engine
• Enter keywords in the search text box. Be precise and exact
• Use quotation marks to identify the keywords
• The search results are displayed in the links, identify the links that contains the
information you want.
Choosing search terms and syntax
• Enter keyword in the search box and be precise and exact.
• Use multiple operators like AND, NOT if a search engine allows.
• Use spacing, symbols and punctuation in your search syntax like +, “”. To be specific
to the information in the results
Websites
A website is a group of related web pages or other resources located on a web server. The
first page on a website is called a home page.
Types of a website
The types of websites depend on the organization offering particular services. The table
below shows the domain and the type of website.
Domain Type
.edu Educational institution
.gov Government institution
.org Non-profit making organization
.mil Military organization
wasswaswalleh@gmail.com
73
Information and Communication Technology-ICT
The letter extension is sometime added to the domain name to show where the site is
located e.g. www.cranehighschool.ac.ug
The domain .ug, meaning cranehighschool is an academic institution located in Uganda.
Other letter extension includes .uk (United Kingdom), .us (United States), .ke (Kenya), .tz
(Tanzania), .jp (Japan), .au (Australia) etc.
Web portals- offers specialized services such as searching, e-mail, sports updates, financial,
news and links to selected websites.
A Blog- a website that contains personal information which can easily be updated. Some
blogs act as resume, diary and may be used for business, advocacy and campaign purposes.
Multimedia- it is a site that contain photos, movies, music, web TV and internet radio. They
are meant for entertainment. Components of multimedia are text, sound, graphics,
animations and video.
To make the information available on the website, special languages of the web such as
Hypertext Markup Language (HTML), Extensible Hypertext markup language (XHTML), XML
(Extensible Markup Language), Hypertext Preprocessor (PHP) are used to prepare documents
on the web pages.
Uniform Resource Locator (URL)
The uniform Resource Locator (URL), simply referred to as the web address, connects the
user to a particular website. The URL has two basic parts.
1. Protocol- it is a set of rules that governs how two computers can send and receive data on
the network. For the internet, the protocol used is the Transmission Control Protocol and
internet protocol.
Transmission Control Protocol (TCP): it governs how data is transferred in the form
messages from one computer to another over the internet.
Internet Protocol (IP): determines the addressing system on the internet or a set of
standards that control communication over internet. IP address is the number assigned
to network and computer connected on the internet to enable sending and receiving of
data.
File Transfer Protocol (FTP): it is a method of transferring files between two internet
sites. FTP is the means of accessing repositories of materials from the internet sites by
sending and receiving files.
Hypertext transfer Protocol (HTTP): it is a set of rules for exchanging files (text,
graphic images, sound, video and other multimedia files) on the World Wide Web.
2. Domain name- name of the web server where the resource is located.
wasswaswalleh@gmail.com
74
Information and Communication Technology-ICT
Hyperlinks
Hyperlinks refer to links used to navigate from one web page to another.
• Secure Service
• Satisfying User Experience
• Lower Costs
• Multi-User Access
• Infinite Storage
wasswaswalleh@gmail.com
75
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
76
Information and Communication Technology-ICT
transmit a message. During transmission, no message can be received. At the end of the
transmission, a button has to be pressed to allow reception of incoming message.
Full duplex transmission communication occurs in both directions simultaneously. An
example of full duplex communication is computers sending and receiving data on a
network.
ELEMENTS OF DATA COMMUNICATION
The five elements of data communication are message, sender, receiver, transmission media
and protocol.
1. Message: is the information or data to be communicated. It consists of text,
numbers, pictures, sound or video.
2. Sender: is the device that sends the data message. It can be a computer, workstation
(node), telephone handset, video camera. Etc.
3. Receiver: it is the device that receives the message. It can be a computer,
workstation, telephone handset, television etc.
4. Transmission medium: is the physical pathway by which a message travels from
sender to receiver. Some example of transmission media includes twisted-pair wire,
coaxial cables, fiberoptic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communication. It represents
an agreement between the communicating devices. Without a protocol, two devices will
be connected but no communication is made.
Examples of protocols
1. UDPP (User Data Program protocol)
2. ICMP (Internet Control Massage Protocol)
3. SMTP (Simple Mail Transfer Protocol)
4. HTTP (Hyper Text Transfer Protocol)
5. FTP (File Transfer Protocol
Functions performed by protocols
1). Data sequencing: this refers to breaking a long massage into smaller packets of fixed
size. 2). Data routing: defines the most efficient path between the source and the
destination.
3). Data security: Protocols provide data security and privacy. It prevents access of data by
unauthorized users.
4) Connection establishment and termination: protocols define how connection are
established, maintained and terminated when two nodes of the network want to
communicate with each other.
5). Data formatting: Data formatting rules define which group of bits or characters within
packets constitute data, control, addressing or other information
wasswaswalleh@gmail.com
77
Information and Communication Technology-ICT
-Does not use power and it is slow -Quick and fastest especially over network.
-It does not support information digitally -Availability of data and information digitally
-It does not support sharing and it is expensive -Supports information sharing and
collaboration
-It does not require any skill to operate the -It requires literacy skills to use
drum
Data Transmission media
Data transmission medium is a pathway used for carrying data and information from one
point to another. A data signal cannot be sent from one place to another without a
medium of communication. In essence, data communication media can be divided into
two:
1. Physical transmission media/ communication using cable (bounded media)
2. Wireless transmission media/wireless communication (unbounded media)
Physical transmission media (bounded media)
The main distinguishing characteristic of bounded media is that data signals are
transmitted from the source to the destination through a restricted pathway such as
through a cable. For example, if the cable is a copper conductor, the data signal which
may be in form of an electrical signal is propagated through the cable from the source
to the destination. Any radiation from the guided medium is regarded as signal loss.
There are several types of bounded transmission media but the most common ones are:
1. Two wire open line cables.
2. Twisted pair cables.
3. Coaxial cables.
4. Fibre optic cables.
Two wire open lines cables
Two wire open lines cables are made up of two parallel copper wires separated by a plastic
insulator. They are used in telecommunication network to transmit voice signal. The wire
captures environmental frequencies which may cause interference to the signal e.g. radio
waves hence causing noise in the transmission channel. In data communications, the word
noise refers to random unwanted signals picked up by the channel.
Example
A student of subsidiary ICT typed an e-mail to be sent over the internet at a speed of
100Mbps. Calculate the maximum number of characters that can be sent per second if each
character consists of 8 bits.
Solution
wasswaswalleh@gmail.com
79
Information and Communication Technology-ICT
Revision Question
Geo’s network access speed is six megabytes per second. How many kilobytes does Geo’s
network receive or send per second?
Coaxial cables
Coaxial cables have two wires of copper. The core wire lies in center and is made of solid
conductor. Core is enclosed in an insulating sheath. The cable has a central copper core
which may be of solid or stranded wires. It is surrounded by hollow mesh conductor which is
covered by a shield making the cable more resistant to electromagnetic interference than the
twisted pair cable.
wasswaswalleh@gmail.com
80
Information and Communication Technology-ICT
Bluetooth technology
One of the latest radio transmission technologies is called Bluetooth technology. Bluetooth is
a worldwide and short-range radio technology that enables people to use hand held
communication devices such as cell phones and personal digital assistants to access the
internet. The main idea behind Bluetooth communication is to try to define one standard
that will allow all personal communication devices regardless of their differences or size to
be able to communicate with each other and through wireless technology. The main
component in Bluetooth is a small low power tow-way radio transceiver, small enough to be
inserted in small devices. A network of Bluetooth enabled devices called wireless personal
wasswaswalleh@gmail.com
81
Information and Communication Technology-ICT
area network (WPAN) or piconet. This is because Bluetooth networks are best suited for
personal hand-held devices. This has made radio transmission to become popular in mobile
communication and internet connectivity.
Microwaves transmission
Microwave frequencies range from about 3GHz to 40GHz on the electromagnetic spectrum.
Due to their wave length, they easily release their energy in water as heat hence they are also
used in making microwave ovens used as domestic kitchen appliances. However, in
networking, micro waves are very suitable for point to point transmissions. This means that a
signal is directed through a focused beam from transmitter to the receiver station.
Satellite communication
A satellite is a microwave relay station. The microwave earth stations have parabolic dishes
with an antenna fixed on them in order to focus a narrow beam towards the satellite in
space. A satellite transmission system has three main components: transmitter earth station,
satellite, and receiving earth station. The new trend in microwave transmission has seen the
use of very small aperture terminal (VSAT) technology dish used in data, radio and TV
communication.
Radio waves transmission
Radio waves travels just like surface of water waves, from a central point and spread
outwards all directions. The waves are radiated into the atmosphere by a radio frequency
antenna at constant velocity. Radio waves are not visible to the human eye. Radio waves are
used in radio and television broadcasts. Data can also be transmitted over radio waves
communication channels.
Infrared transmission
Infrared waves fall just below the visible light on the electromagnetic spectrum. Just like
radio waves, infrared waves are not visible to the human eye. Communication through this
medium is achieved by having infrared signals transmitters and receivers (transceivers).
Transceivers of infrared signals must be within a line of sight in the same room. This is
wasswaswalleh@gmail.com
82
Information and Communication Technology-ICT
because infrared signals unlike radio signals, infrared signals cannot penetrate obstacles like
walls. An example of infrared device is the infrared transceiver on most mobile phones.
wasswaswalleh@gmail.com
83
Information and Communication Technology-ICT
Instant messaging
This is a more enhanced messaging service that allows two or more people to communicate
directly. To get the services you must first register with an instant messenger such as Yahoo!
Messenger.
COMPUTER NETWORKS
Introduction to Computer Networks
A computer network is defined as a collection of computers linked together using
transmission media for the purpose of communication and resource sharing.
A network can be defined as a collection of independent entities that are arranged in such a
manner as to exchange data, information or resources.
The term transmission media refers to any physical or non-physical link between two or more
computers and in which a signal can be made to flow from source to destination. Some of
the shared resources include application programs, printers, fax machines, modem, storage
devices etc.
Elements of networking
A computer network is made up of several standard elements (Components) which can be
classified into four major categories namely:
• Data transmission media
• Communication devices
• Networking software
• Data signal
Computer Network Requirements (Communication Devices)
Computers and transmission media require communication devices for the network to be
fully operational. These devices are more or less used as interfaces or junctions between the
terminal equipment or devices at both ends of data communication devices which includes
Routers, transmission media, modems and codec’s, hubs, bridges, repeaters, gateways,
switches, network interface cards (NIC) and access point.
wasswaswalleh@gmail.com
84
Information and Communication Technology-ICT
Routers. The router interconnects different networks and redirects the transfer of data
packets from source to destination. Routing depends on network addresses. Each network
has a unique identifier or address called the network address.
Fig. Routers
Modem and codec’s
A modem converts a signal from digital to analog form for the purpose of transmission over
the analog media, while a codec covert an analog signal to digital form for transmission via a
digital medium. At the receiving end, the devices return the signal to its original form. A
modem can be external, an add-on card or built on the motherboard. Some modern routing
devices combine the functionality of bridge and a router. Such device is called router.
Fig. Modems
Hubs
A hub also called a concentrator, it is a component that connects computers on a network
and is able to relay signals from one computer to another on the same network. A hub
transmits signals by broadcasting them to all the computers on the network i.e. one that has
the same set of communication software usually called protocols. Protocols are set of rules
that govern the communication between devices on a network.
wasswaswalleh@gmail.com
85
Information and Communication Technology-ICT
Repeaters
A repeater receives a signal from one segment of a network, cleans it to remove any
distortion, boosts it and then sends it to another segment. Repeaters are the simplest way to
expand a
network because they broadcast the same message to other network segments.
Gateways
A gateway is any device that can be configured to provide access to wide area networks or
internet. One such device is the router in which the gateway software is installed. However, a
gateway may not be a router, it may be a computer configured to access the internet. A
gateway is the most powerful network and internet connectivity device because of its ability
to convert data across different network architectures and protocol.
Switches
A switch, unlike a hub forwards a packet to the address node without broadcasting. A node
refers to data terminal equipment such as a workstation or a computer on the network. The
switch does this by connecting two nodes point to point as if they were linked by direct
cables between them. This reduces the broadcast problems on the networks. Some hubs
incorporate the switching mechanism, hence referred to as a switching hub.
Switches are more expensive than hubs and one switch may be used as a bridge to connect
several hubs in order to reduce collision problems caused by broadcast.
wasswaswalleh@gmail.com
86
Information and Communication Technology-ICT
increases, it’s becoming cost effective for companies and individuals to extend the capability
of wired networks by integrating wireless segments into their communication.
Wireless antennae
The access point needs to have antennas in order to detect signals in the surrounding. The
waves may be radio waves, microwaves, or infrared waves in nature. In most cases, access
points will have two antennas so that the one that receives the best signal at any particular
time can be used.
Personal computer memory card international association (PCMCIA) cards
A personal computer memory card international association is an add-on card inserted into a
device such as personal digital assistants or laptop in order to enable wireless
communication between the devices and a wired network server.
wasswaswalleh@gmail.com
87
Information and Communication Technology-ICT
NETWORK SOFTWARE
Computers networks have evolved from the simple linking of computers on a common
transmission media to highly managed and optimized data and information transfer systems.
This means that apart from data communications, the focus is now squarely on how best to
utilize network resources. The issues of network security, interoperability and reliability have
taken center stage. Any network manager will be faced with question of network load
balancing and adoption of the best routing procedures.
These entire tasks would be impossible if network software was not available. Network
software can be classified into two main groups namely:
i). Network operating systems. E.g. Windows internet explorer
ii). Networking protocols.
wasswaswalleh@gmail.com
88
Information and Communication Technology-ICT
Protocol
Protocols are set of rules and procedures that govern communication between two different
devices. In computer networking, protocols refer to the rules and technical producers that
government communication between different computers.
Data signal
All messages that are sent and received through the network must be represented using a
data signal. Metallic media would require an electrical signal; wireless media need
electromagnetic signal while fiber optic cables need light signal. A signal can either be
analog or digital.
Implications of computer networks
The reasons for setting up computer network have resulted into purpose and limitations of
networking.
wasswaswalleh@gmail.com
89
Information and Communication Technology-ICT
Purpose of networking
Resource sharing
A resource in the network environment means data/information, files, printers, modems,
communication links, storage devices, fax machines, application programs and any other
component that can be attached to the network. Users do not need to transfer files via
removable storage but would send the work to a network printer. This centralized access to
data and information leads to less waste of time and hence greater productivity.
Remote communication
Remote communication refers to the transmission of data signal between two
communication devices located at different location. A computer that tries to access
resources from another computer on the network is called a remote client while the
computer accessed is called a remote host.
Remote communication has been made possible by use of wireless transmission media such
as radio waves, microwave and satellite. It is used to share ideas and send messages over the
internet.
Distributed processing facilities
Distributed processing refers to a type of arrangement where computers are located at
different geographical locations but on the same network. The model of data processing has
a number of advantages
1. The failure of central computer does not affect the operations of the other terminals.
2. Processing load is shared equally hence no time wastage
Cost effectiveness
Networks are cost effective in the organization. Although the initial purchase and laying
down of network computers may be expensive, the savings experienced and the value added
to service delivery.
One good thing about a network is that it greatly increases the efficient use of scarce
resources. Imagine a large organization that has standalone computers only. In such a case,
the management has to buy a printer for each computer.
However, with a network, only one printer is sufficient. The same applies to other resource
like fax machine, optical drives, files and applications.
Computer network have enhanced daily communication by providing paperless
communication environment. Users can send electronic messages and mail to each other
instead of bearing the cost of stamp duty or delivery charges.
Reliability
A computer network is reliable in two ways especially when communicating or accessing
information:
1. Data can be transferred with minimum error from source to destination.
2. In case one computer breaks down, user can still access data and information from
the other computer using other computers on the network.
wasswaswalleh@gmail.com
90
Information and Communication Technology-ICT
Limitations of networking
Although networking has many advantages it also offers many challenges that are associated
with implementation and human factors. Some of the limitations and disadvantages of
networking include security issues, high initial installation cost, moral and cultural effects,
spread of terrorism and drug trafficking and over reliance on networks among others.
Security issues
Data and information held on a network is prone to more illegal access threats than if the
computer was not on the network. For example, a standalone computer may be accessed by
only a few people at home or in the office environment. However, once the computer is
connected to the network, especially the internet, many people can access it physically or
virtually over the network. Apart from this, when information is sent over the network from
source to destination, it can be tapped or listened to by unauthorized parties.
Organizations find it very challenging to guard information systems from constant threats of
illegal access. One of the common methods of data protection in a networked environment
is encrypting. Encrypted data cannot be understood by people who illegally access it unless
they have the decryption key.
High initial cost
The initial cost of buying network hardware and software is very high. In fact, most
institutions that have not set up their networks will more often than not quote cost as
limiting factor Moral and cultural effects
Large networks like the internet have chat rooms and messaging services that enable under
age children to meet peers and adults on the net some of whom may have bad intentions.
Access to pornographic and other negative material has also made the fight against social
problems such as HIV/AIDS bad sexual behavior, drugs and substance abuse more
complicated.
Spread of terrorism and drug trafficking
The internet provides recruitment ground for all types of illegal activities such as terrorism
and drug trafficking. The easy flow of information from one place to another keeps even
those who are on the wrong side of the law communicating easily. Terrorists and drug
traffickers use information networks for their business communication. However, many
countries have come up with methods of policing the internet to try and break such
syndicates
Network security
Network security is like the security measures we implement in our homes. You should try
your best to protect your data and information from intruders. In networking there are
several ways of enforcing security one of them is share level and the other is user level
security.
Share Level security: Share level security is sample network security used in peer to peer
networks. The user can decide which resources to give for sharing.
wasswaswalleh@gmail.com
91
Information and Communication Technology-ICT
User-level security: User level security model is used on server-based networks. A network
administrator assigns accounts to users. This means that each user is provided with a unique
name and password which he or she can use to access network resources.
wasswaswalleh@gmail.com
92
Information and Communication Technology-ICT
connected. The client sends requests, run programs and access data or information that is
stored on the server. The server is a computer that processes request and respond to the
other clients on the network.
wasswaswalleh@gmail.com
93
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
94
Information and Communication Technology-ICT
Saving a Publication
To save a publication in publisher 2007:
Click File.
Click Save As.
Enter the File name e.g. Crystal Invitation-
Card Click Save button.
wasswaswalleh@gmail.com
95
Information and Communication Technology-ICT
Document Enhancement
To enhance the appearance of document like background colour, text colour scheme
and font size.
Changing background colour
Click Format.
Click Background.
Click More background colour.
wasswaswalleh@gmail.com
96
Information and Communication Technology-ICT
wasswaswalleh@gmail.com
97
Information and Communication Technology-ICT
Tables/file structure
This is a database structure that is used to hold related records.
Tables are organized in rows and columns with each row representing a record while each
column represents common fields in each record.
Queries
A query is a statement used to extract, change, analyze or request for specific data from one
or more tables. Query is a question posed to a database using special language called SQL.
Form/input screen
A form is a graphical interface that resembles an ordinary paper form. Forms enable the user
to view and enter data into a table.
Reports
Most database systems provide user with a tool for generating reports from underlying
tables or queries. It is the report generator that provides the user with a means to specify the
output layout and what is to be output or printed on a report.
Macros
In most DBMS software, it is possible to automate frequently performed procedures or task
using database component known as a macro. For example, if you frequently use a particular
form when you start a database program, you need to create a macro that automates the
opening of the form.
Programmable model
When a database becomes more complex, you may need a more powerful tool than the
macros to automate your database operations further. Ms Access comes with a language
called Visual Basic included as a module in the software.
wasswaswalleh@gmail.com
98
Information and Communication Technology-ICT
Fields
A field is a character or a logical combination of characters that represent data item. For
example, in a class list, the student name is a field.
Record
A record is a collection of related fields that represent a single entity. An example of a record
is the student report card that may contain the student’s name, admission number, class,
total marks and average grade
Table
A table is a collection of related records. For example, the student’s file in a school database
contains the details of all the students in the school.
Database
This is the highest in data organization hierarchy that holds all related files or tables. For
example, a school database may contain students and staff tables/files.
wasswaswalleh@gmail.com
99
Information and Communication Technology-ICT
Currency
Use to identify numeric values that have decimals or fractions. Use this data type especially
when dealing with monetary values such as fees balance, amount sold, etc.
Auto Number
This is a numeric value used if you wish MS Access to automatically increase the values in a
field. For example, when entering a list of forty students and you have a field labeled Stud
Number; the numbers will increase by one every time you enter a new record.
Yes/No
This is a logical field where an entry is either yes or no, true or false, for example, a field may
require you to answer whether you are male or female.
OLE Object
OLE stands for Object linking and Embedding. This type of field is mostly used with graphical
user interface applications for inserting graphical objects such as pictures, drawings, charts
etc.
Field properties
As you create more and more complex tables, you will find a need to use field properties to
specify find details related to fields and table entries expected. Field properties depend on
the type of field selected.
Field size
Field size property allows the user to set the number of characters in a field instead of the
default
50. For numeric fields we use properties such as integer, long integer, Byte, Single and
Double.
Format
Determine how information appears on the screen when printed. For example, you can
format a number to scientific, currency, percentage or general format. For date type
dd/mm/yyyy long date d, dd, for date m , mmmm for month y, yyyy for year
Decimal places
For number and currency fields, you can specify the number of decimal places.
Input mask
Input mask automatically formats the field entry into a specified format. This property is
mostly used to format phone and address entries.
Caption
This is more descriptive name for a field to be used in a table or a form display. For example,
the caption for Stud Name Could be Student Name.
Default value
This is a value that appears automatically in the datasheet or form if nothing is entered by
the user to change it. For example, =Date () automatically displays the current date in a date
field.
wasswaswalleh@gmail.com
100
Information and Communication Technology-ICT
Validation rule
Logical expression that restricts the values to be entered in a field. For example, if you want
to restrict marks entered in a field to values between zero and a hundred, type>=0
and<=100.
Validation text
This is a message that appears once the validation rule is violated. For example, you may
create a validation text for the above validation rule to display “Enter a number between 0
and 100” whenever the user enters a value outside this range.
Required
Determines if an entry must be made in the field before you proceed to the next field or
record.
For example, if a primary key is required, you must enter it before you proceed.
Indexed
An indexed facilitates the organization of records for easy search. A primary key is an
example of an index set to No duplicates.
Primary key and indexes
An index is a key(s) used to speed up searching and sorting records in a table, while a
primary key is an index that uniquely identifies each record stored in the table.
A primary key is an index that uniquely identifies each record stored in the table.
A primary key prevents the user from making null or double entries into a table. Access uses
the primary key to order records, and control redundancy. Once a field is set as primary key,
the datasheet is automatically indexed or sorted using the primary key.
Specifying search criteria
In order to search for a particular set of records, you have to enter a conditional statement in
the criteria row. For example, if I want a query to display Masaka only or employees who earn
more than 5,000. Type in criteria row, = “Masaka”,>5000
To define criteria, use either relational or logical operators. Less than (<), greater than (>),
less than or equal to (<=), not equal to (<>) and equal to (=). Logical operators include AND,
OR and NOT
Type: on criteria row e.g.>4000AND<6000 for values between 4000 and 6000
wasswaswalleh@gmail.com
101
Information and Communication Technology-ICT
Wildcard
Wildcards are special symbols (asterisk) and question mark use in other characters (J*).
Use Like and wildcard, in criteria type:
Like “J*” for dates Like */*/1993
Wild card displays all names with letter J and years in 1993
wasswaswalleh@gmail.com
102
Information and Communication Technology-ICT
Introduction
The rapid growth and widespread use of information and communication technologies,
internet services as well as numerous occurrences of international terrorism, demands
betters’ methods of protecting computers, data and information.
Confidentiality
Confidentiality means that sensitive data or information belonging to an organization or
government should not be accessed by or disclosed to unauthorized people. Such data
include employees’ details, classified military information, business financial records etc.
Integrity
Integrity means that data should not be modified without owner’s authority. Data integrity is
violated when a person accidentally or with malicious intentions erases or modifies
important files such as a payroll or a customer’s bank account file.
Availability
Information must be available on demand. This means that any information system and
communication link used to access it, must be efficient and functional. An information
system may be unavailable due to power outages, hardware failure, unplanned upgrades or
repairs.
wasswaswalleh@gmail.com
103
Information and Communication Technology-ICT
4. Natural disaster
5. Program failure
Control measures against hardware failure
Protect computers against brownout or blackout which may cause physical damages or data
loss by using surge protectors and Uninterruptible power supply (UPS). For critical systems,
most organizations have put into place fault tolerant systems.
A fault tolerant system has redundant or duplicate storage, peripherals devices and software
that provide a fail-over capability to backup components in the event of system failure.
Disaster recovery plans
Disaster recovery plan involves establishing offsite storage of an organization’s databases so
that in case of disaster or fire accidents, the company would have backup copies to
reconstruct lost data.
COMPUTER VIRUS
Computer virus is a destructive program that attaches itself on removable drives and cause
damage to a computer system such as deleting system file, data or application files.
How Virus spread on standalone and networked computers
Standalone computer is one which is not connected to any other computer. However
networked computer is the one which is connected to any other computer for the purpose of
wasswaswalleh@gmail.com
104
Information and Communication Technology-ICT
exchanging data, information or resources. The table below shows how virus spread on
standalone and networked computer.
There are various motivations for hacking. One is that some people like the challenge and
feel great after successfully hacking a system, while some do it commercially for software
manufactures test the security status of a new software system.
Data protection in computer systems
To safeguard data and information against unauthorized access, the following measures
should be put in place;
Firewall
A firewall is a device or software system that filters the data and information exchanged
between different networks by enforcing the host networks access control policy. The main
aim of a firewall is to monitor and control access to or from protected networks. People who
do not have permission (remote requests) cannot access firewall restricted sites outside their
network.
Data encryption
Data on transit over the network faces many dangers of being tapped, listened to or copied
to unauthorized destinations. Such data can be protected by mixing up into a form that only
the sender and receiver is able to understand. This is by reconstructing the original message
from the mix which is called data encryption.
wasswaswalleh@gmail.com
105
Information and Communication Technology-ICT
Security monitors
Security monitors are programs that monitor and keep a log file or record of computer
systems and protect them from unauthorized access.
Biometric security
Biometric security is a growing form of unauthorized control measure that takes the user’s
attributes such as voice, fingerprints and facial recognition. For example, you can log on by
swap a finger on a finger print swap window
Password and PIN (Personal Identification Number)
Access control can also be enhanced by implementing multilevel authentication policies such
as assigning users log on accounts, use of smart cards and personal identification number
(PIN).
COMPUTER CRIME
The following are some examples of computer-related crimes that compromise data,
information and computer.
Physical theft
The physical theft of computer hardware and software is the most widespread related crime
especially in developing countries.
The most common issues now, we hear cases of people breaking into an office or firm and
stealing computers, hard disks and other valuable computer accessories. In most cases such
theft can be done by untrustworthy employees of firm or by outsiders. The reason behind an
act may be commercial, destruction to sensitive information or sabotage.
Control measures against theft
1. Employ security agents to keep watch over information centers and restricted backup
sites.
2. Reinforce weak access points like windows, door and roofing with metallic grills and
strong padlocks.
3. Motivate workers so that they feel a sense of belonging in order to make them proud
and trusted custodians of the company resources.
4. Insure the hardware resources with a reputable insurance firm.
Piracy
Piracy is a form of intellectual property theft which means illegal copying of software,
information or data. Software, information and data are protected by copyright and patent
laws.
Control measures against piracy
There are several ways of reducing piracy
1. Enforce laws that protect the owners of data and information against piracy.
2. Make software cheap enough to increase affordability.
3. Use licenses and certificates to identify original software.
4. Set installation passwords that deter illegal installation of software.
wasswaswalleh@gmail.com
106
Information and Communication Technology-ICT
Fraud
Fraud is stealing by false pretense. Fraudsters can be either employees in a company, non-
existent company that purports to offer internet services such as selling vehicles etc. other
form of fraud may also involve computerized production and use of counterfeit documents.
This is due to the dynamic growth of internet and mobile computing, sophisticated
cybercrimes.
Sabotage
Sabotage refers to illegal destruction of data and information with the aim of crippling
services delivery, or causing great loss to an organization. Sabotage is usually carried out by
disgruntled employees or competitors with the intention of causing harm to an organization.
Eavesdropping
Eavesdropping refers to tapping into communication channels to get information. Hackers
mainly use eavesdropping to access private or confidential information from internet users
or from poorly secured information system.
Surveillance (monitoring)
Surveillance refers to monitoring use of computer system and networks using background
programs such as spyware and cookies. The information gathered may be used for one
reason or the other e.g. spreading sabotage.
Industrial espionage
Industrial espionage involves spying on a competitor to get information that can be used to
cripple the competitor.
Accidental access
Threats to data and information come from peoples unknowingly giving out information to
strangers is or unauthorized persons.
Alteration
Alteration is the illegal modification of private or confidential data and information with the
aim of misinforming users. Alteration is usually done by people who wish to cancel the truth
or sabotage certain operations.
Alteration comprises the integrity of data and information making it unreliable.
wasswaswalleh@gmail.com
107
Information and Communication Technology-ICT
EMERGING TECHNOLOGIES
Concepts of emerging technologies covers the rapid evolution of computers and information
technology with the future trends in computer and information and communication
technology which is characterized by artificial intelligence and digital forensics.
Artificial Intelligence (AI)
Artificial intelligence refers to a branch of computer science that is concerned with the
development of machines that emulate human-like qualities such as learning, reasoning,
communication seeing and hearing. Also, artificial intelligence refers to the ability of a
machine to perform tasks that normally require human intelligence.
Computer scientist and engineers are still working hard to come up with computer reality in
near future which can think and learn instead of relying on static programmed instructions.
wasswaswalleh@gmail.com
108
Information and Communication Technology-ICT
Digital forensics
Digital forensic refers to the forensic science encompassing the recovery and investigation of
material found in digital devices often in relation to computer crime. There are four main
application areas of digital forensic namely:
1. Legal consideration- use of digital evidence in court
2. Branches- perception of the computer forensic, mobile device forensic, network
forensic
3. Application of digital forensic such as electronic discovery, intrusion etc. 4. Forensic
process- analysis and reporting
ICT INDUSTRY
Information and communication technology (ICT) have created new job titles such as
computer operators, computer technicians, system analyst, computer programmers, software
engineer, information systems manager, data base administrator, computer trainer, web
administrator, computer graphics designers and network administrator. This section explains
some responsibilities of these professionals who are generally called information technology
workers.
Computer operator
Some of the responsibilities of a computer operator include;
1. Entering data into the computer for processing.
2. 2. Keeping up-to-date records (log files) of all information processing activities.
Computer technician
Given that computers require regular maintenance, upgrading as well as emergency repairs,
demand for computer technicians continues to grow as more people computerize their
workplaces and homes.
Some of the responsibilities of a computer technician are;
1. Troubleshooting computer hardware and software related problems.
2. Assembling and upgrading computers and their components.
3. Ensuring that all computer related accessories such as printers, modems, storage
media devices are in good working condition.
4. In developed countries, technicians help hardware engineers in designing and crating
some computer components such as storage devices, motherboards etc.
System analyst
This a person who is responsible for analyzing a company’s needs or problems then designs
and develops a computer-based information system.
A good analyst is one who has at least the following attributes;
1. Good problem-solving skills and creativity, ie. Must have wide experience in solving
problems.
wasswaswalleh@gmail.com
109
Information and Communication Technology-ICT
2. Good communication skills: The analyst must be able to communicate clearly and
precisely both in writing and in speech. He/she must be able to talk to different groups
of people e.g. managers, operators, attendant and general public.
3. Must have business knowledge: the analyst must clearly understand the environment
for which the system is being developed.
4. Technical knowledge: A system analyst must be well trained in relevant areas of
computer science such as hardware, software programing knowledge.
Computer programmer
Large organizations such as insurance companies, banks, manufacturing firms and
government agents hire programmers to work together with system analysts in order to:
1. Develop in house application programs or system programs.
2. Customize commercial application packages to suite the organization needs.
3. Install, test, debug, and maintain programs developed or customized for the
organization.
Computer engineer
Computer and electronic engineers are coming up with new and more efficient technologies
in information and communication technology almost daily. Since computers are electronic
devices, hardware designers must be good in electronic engineering in order to be able to:
1. Design and develop computer components such as storage devices, motherboards
and other electronic components.
2. Determine the electrical power requirement of each component.
3. Re-engineer computer components to enhance its functionality and efficiency.
4. Design and develop engineering and manufacturing computer-controlled devices
such as robots.
Web administrator/webmaster
Internet is one of the areas of information and communication technology that has drawn
the interest of most people. Thus, people are able to exchange messages, search for
information and do business through the internet.
A web administrator is responsible for:
1. Developing and testing websites.
2. Maintaining, updating and modifying information on the website to meet new
demands by the users.
wasswaswalleh@gmail.com
110
Information and Communication Technology-ICT
3. Monitoring the access and use of internet connection by enforcing the security
measures.
4. Downloading information needed by an organization or institution from internet
websites.
Computer graphics designers and typesetters
In publishing, skilled graphics designers and typesetters are required in order to design
graphical objects and professional publications. Such people may get employed in
publishing houses to typeset books, newspapers and magazines.
Self-employment
Self-employment can be achieved by using a computer or other ICT devices such as mobile
phones to start bureau services, internet services, consultancy services and computer
hardware and software vendor business.
Network administrator
A network administrator is a specialist whose responsibilities are to:
1. Set-up a computer network.
2. Maintain and enforce security measures on the network.
3. Monitor the use of network resources.
4. Maintain and troubleshoot network related problems.
Computer sales representatives
Computer sales representative should have good knowledge in information and
communication technology. This would help them to analyze customer needs and advice
accordingly. A good computer salesman needs to be self-confident, persuasive and
proficient in business communication.
WASSWA SWALLEH
wasswaswalleh@gmail.com
wasswaswalleh@gmail.com
111