Core-Computers in Education
Core-Computers in Education
ISBN 978-9988-8468-0-0
This course book of thirty-six (36) sessions has been structured to reflect the weekly
three-hour lecture for this course in the University. Thus, each session is equivalent
to a one-hour lecture on campus. As a distance learner, however, you are expected
to spend a minimum of three hours and a maximum of five hours on each session.
To help you do this effectively, a Study Guide has been particularly designed to
show you how this book can be used. In this study guide, your weekly schedules
are clearly spelt out as well as dates for quizzes, assignments and examinations.
Also included in this book is a list of all symbols and their meanings. They are
meant to draw your attention to vital issues of concern and activities you are
expected to perform.
Blank sheets have been also inserted for your comments on topics that you may find
difficult. Remember to bring these to the attention of your course tutor during your
face-to-face meetings.
It has become a tradition in academic circles to acknowledge the assistance one received from
colleagues in the writing of an academic document. Those who contributed in diverse ways
toward the production of this particular course book merit more than mere acknowledgement
for two main reasons. First, they worked beyond their normal limits in writing, editing and
providing constant support and encouragement without which the likelihood of giving up the
task was very high. Second, the time span for the writing and editing of this particular course
book was so short that their exceptional commitment and dedication were the major factors
that contributed to its accomplishment.
It is in the foregoing context that the names of Mr. Daniel Obuobi and Mr. John K.E.
Edumadzi of University of Cape Coast, who wrote and edited the content of this course book
for CoDEUCC, will ever remain in the annals of the College.
I wish to thank the Vice-Chancellor, Prof. Joseph Ghartey-Ampiah and the Pro-Vice-
Chancellor, Prof. Dora Edu-Buandoh and all the staff of the University’s Administration
without whose diverse support this course book would not have been completed.
Finally, I am greatly indebted to the entire staff of CoDEUCC, especially Mrs. Cecilia
Nkrumah for formatting the scripts.
Any limitations in this course book, however, are exclusively mine. But the good comments
must be shared among those named above.
PAGE
About This Book … … … ... … i
Table of Content … … … … … ii
Symbols and Their Meanings … … … vi
Acknowledgement … … … … … vii
1.6 Log off / Switch User; Standby / Turn off / Restart … 148
1.7 The Window … … … … … … 150
1.8 Creating/Renaming Folders … … … … 152
1.9 Copy/Cut and Paste and Delete … … … 154
Session 2: Word Processing Software … … … … … 159
2.1 The Basics of Word Processor … … … 159
2.2 Common Features of Word Processing Software … 260
2.3 Starting and Exiting Microsoft Word … … 261
2.4 Screen Elements and their Descriptions … … 162
2.5 The meaning of the icons in Formatting and Standard
toolbars … … … … … … 164
2.6 Inserting Page Numbers … … … … 166
2.7 Working with an opened but new document … … 166
2.8 Inserting a Table … … … … … 175
2.9 Inserting Picture into document … … … 176
2.10 Spell Checking Your Document … … … 177
2.11 Printing … … … … … … 149
Session 3: Spreadsheet Software … … … … … 181
3.1 What is Spreadsheet Software? … … … 181
3.2 Common Features of Spreadsheet … … … 182
3.3 Launching and Exiting Microsoft Excel … … 183
3.4 Some Elements of Microsoft Excel … … … 184
3.5 Entering data in the worksheet … … … 187
3.6 Modifying a Worksheet … … … … 189
3.7 Formulas and Functions … … … … 191
3.8 Formatting Cells … … … … … 199
3.9 Page Properties and Printing … … … … 204
3.10 Printing a Worksheet … … … … … 207
3.11 Linking Worksheets … … … … … 208
3.12 Charts … … … … … … 208
Session 4: Database Software … … … … … … 217
4.1 Database software? … … … … … 218
4.2 Using Microsoft Access … … … … 218
4.3 Basic Elements in Access … … … … 220
4.4 Creation of Tables … … … … … 225
4.5 Populating your Table with Data … … … 230
4.6 Queries … … … … … … 232
4.7 Using the Query Wizard … … … … 229
4.8 Eliminating Duplicates in Query … … … 241
4.9 Working with Forms … … … … 244
4.10 Reports … … … … … … 245
4.11 Table Relationship … … … … … 252
Session 5: Presentation Software … … … … … … 261
5.1 What is Presentation software? … … … 261
5.2 Using Microsoft PowerPoint Application … … 262
5.3 The Elements of The PowerPoint Window … … 263
INTRODUCTION
OVERVIEW
UNIT OBJECTIVES
SESSION OBJECTIVES
DO AN ACTIVITY
REFER TO
READ OR LOOK AT
SUMMARY
ASSIGNMENT
Unit Outline
Session 1: What is a Computer?
Session 2: What does a Computer do?
Session 3: Data and Information
Session 4: The Information Processing Cycle
Session 5: Computer Literacy
Session 6: Why are Computers so powerful?
The unit has been divided into sessions and each session is further divided into sub-
sessions. This will make the use of this book very easy.
Unit Objectives
After studying this unit, you should be able to:
1. define the term “computer”
2. explain the function of computers.
3. list the differences between data and information.
4. dentify the major steps involved in converting data into information.
5. Give reasons why computer literacy is important.
6. List the attributes that make computers powerful.
Objectives
At the end of this session, you should be able to:
(a) explain what is computer
(b) list devices of a computer that can be found at home
(c) list the five (5) basic activities that computers can perform
(d) explain the parameters used to classify computers
(e) list the various computers that fall within each of the major categories
Now read on …
1.4.1 By Purpose
Depending on the flexibility of operations or ease of adaptability, computers are divided
1.4.4 By Capacity
In the earliest stages of electronic computer development, capacity was sometimes
measured in terms of physical size. Today physical size is not a good measure of
capacity because late models of computers have achieved compactness as a result of
development of integrated circuits (ICs). Because of the ability of computer scientists
and engineers to fit more computer power into less and less space, modern desktop
computers have as much power as or more than the room-size computers built several
decades ago. Capacity is now therefore expressed in terms of the volume of work that
the computer can handle, the speed of processing it and functional units of the CPU.
Computers under capacity are classified as microcontrollers, microcomputers,
minicomputers, mainframe and supercomputers.
Most homes in Ghana in almost all countries in Africa may not have a general-purpose
microprocessors but somewhere one and two dozen microcontrollers. They can be
found in almost any Hi-Tech or Intelligent electronic devices such Digital or
programmeable TVs, Sound Systems, Washing machines, Dish washers, microwave
ovens, telephones etc.
1.4.6 Microcomputers
Microcomputers are the smallest and cheapest systems. The part of a microcomputer
that does the actual computing is the tiny silicon chip, the symbol of 'Hi-Tech'. The
economy and small size of the microcomputer have made possible the spread of
individual owned and operated personal computers. They have a memory access times
are about 100 nanoseconds and handle 8-bit, 16-bit or 32-bit words. The original ones
handle 4-bit words. Types of microcomputer include desktop, notebook, and personal
digital assistants. Desktops sit on top or alongside a desk yet are too big and heavy to
carry around. Notebook computers are portable, weigh between 4 and 10 pounds, and fit
into most briefcases. Personal digital assistants (PDAs), which are also known as known
as palmtop computers or handheld computers, combine pen input, writing recognition,
personal organizational tools, and communications capabilities in a very small package.
1.4.7 Minicomputers
Minicomputers make up the middle class of computer size and power. They are
physically bigger than micros.
Minicomputer, also known as mini is a largely obsolete term for a class of multi-user
computers which make up the middle range of the computing spectrum, in between the
largest multi-user systems (traditionally, super and mainframe computers) and the
smallest single-user systems (microcomputers or personal computers). More modern
terms for such machines include midrange systems (common in IBM terminilogy),
workstations (common in Sun Microsystems and general UNIX/Linux terminilogy),
and server.
They also require a high-speed line printer and can support more terminals such as 20
or more at a time.
Examples are:
IBM System 36(S/36), Advance system 400 (AS/400).
DEC PDP - 8 and PDP – 11
Vax-11/780, Vax-11/750, Vax-11/782, Vax-11/730.
Minicomputer systems are usually larger and more powerful than microcomputer
systems and smaller and less powerful than mainframes. However, this is not always the
case. There are micros more powerful than the smallest minis and large minis that are
more powerful than smaller mainframes.
1.4.8 Mainframes
1.4.9 Supercomputers
The largest and most powerful of the mainframes, used primarily by government and by
scientists are called supercomputers. They are used when organizations require
extraordinary amounts of computing power like the weather service, airline
reservations. In these organizations, vast amount of information must be processed in a
short time to provide fast response to users. It can process great quantities of data
extremely quickly and can do in several hours, the work that normally takes weeks on
conventional large mainframes.
Examples are Cyber 205, Cray X-MP Cray 2 and Cray 1 (this was for several years the
fastest computer in the world). Cray X-MP is five to eight times faster than Cray 1.
1.5 By Type
Basically there are three types of computers under this classification, and these are
Analog, Digital and Hybrid. This classification is done using the manner in which the
data are computed.
Although computers are basically of analog and digital, there is a third type being
marketed. This is known as hybrid computer. Hybrid computers combine analog and
digital capabilities in the same computer system. This type of computer usually finds
application in the industries.
Self-Assessment Questions
Exercise 1.1
1. List any device at home that you think is a computer.
2. Give other definition(s) of computer you know apart from the one given above?
3. What are the similarities and differences between the definitions you
gave and the one stated in this book
4. Give examples of situations that computers can not be applied.
5. What activity can a computer undertake concerning data?
6. The Computers are used to type letters, memos, reports etc in most
offices is Digital, Micro and General-purpose computer. True/False?____
7. A hybrid Computer has ………………computers features or capabilities.
(a) Special- and General-purpose (b) Micro- and mini-
(c) Digital- and Analogue (d) desktop- and floor-
8) The main classifications of computers according to how data is computed are
(a) Analog, digital and hybrid (b) Special and Dedicated computers.
(c) Desktop and Windows (d) None of the above.
9) What is Microcontrollers unit?
(a) Is the largest and most powerful of the mainframes?
(b) It is a computer-on-a-chip used to control electronic devices.
(c) It is a computer designed to solve a wide range of problems.
(d) It is a computer which uses remote controllers.
10. According to the Oxford English Dictionary, the word "computer" was
first used to describe a mechanical calculating device in …..
(a) 1897 (b) 1840 (c) 1982 (d) 2000
In this session you will learn about the basic operations of the
computer namely input operation, processing operation, output
operation, storage operation and communication operation.
Objectives
At the end of the session, you should be able to:
(a) explain input, processing, output, storage, and communication
operations of a computer with an illustration.
(b) distinguish between the arithmetic and logic operations.
(c) draw the Truth table for AND, OR, and NOT operators
Now read on …
Even though we can apply computers to do anything imaginable provided that thing can
be written in a way the computer can execute, computers can do a restricted number of
basic operations.
At this point in our discussion, let me illustrate how the computer performs the
preceding five tasks. Assuming I want to know the composition of this class: how many
ladies are in this class, whether or not all regions in Ghana are represented or not. In
order to achieve the above-mentioned objectives, the following activities would be
performed:
1. Install and open a Statistical package such as SPSS (Statistical Package for
Social Scientist), which is a program.
2. With the SPSS opened, I then prepare a template with all the appropriate data
items (also called field) such as gender, region to mention just a few.
3. I will enter each student’s biographical data in the template and save the entered
data on completion.
4. I will choose a simple statistics tool that counts the data entered by gender and
region.
5. The result can be displayed in chart on the computer’s screen or printed using a
printer.
6. I can send the result to the appropriate quarters for the relevant decision to be
made through either email or fax.
Comparing the above mentioned six activities performed above with the five operations
listed:
1. In activity 1, the computer performed both input operation (installing SPSS) and
storage operation (the installed SPSS is stored on the hard disk of the computer).
2. For activity 3, the computer again performed both input operation (entering the
data items for each student) and storage operation (saving the entered data).
3. For activity 4, the computer performed processing operation (counting the data
entered by gender and region).
4. For activity 5, the computer performed both processing operation (chart
produced out of the entered data) and output operation (displaying the result on the
computer’s screen and printing the result on the printer).
5. For activity 6, the computer performed communication operation (sending email
and fax).
6. What about activity 2?
.
2.2 Computers can Perform Input Operations
Through this operation, the computer accepts data from the outside world. This is done
with the help of the input devices such as the keyboard, mouse, microphone, scanners
and the like. The computers understand two things: on and off hence data are
represented in binary form (0s and 1s) corresponding to the two states of on and off.
Therefore any data that is inputted it text (a combination of alphabets, numbers, and
other special characters), pictures, audio or video must be converted to a unique series
of 0s and 1s using certain agreed coding schemes or standard. We shall have an in-depth
discussion of input devices in section 2 of Unit 2.
A B C D E F
Homework Quiz Exams
Name (20%) (20%) (60%) Total Position
Gaga 14 16 51
Caca 12 13 50
Haha 15 15 45
Baba 12 18 45
Kaka 12 19 53
Mama 17 20 57
Jaja 10 17 30
Fafa 10 19 49
Lala 16 19 48
Dada 20 20 55
Fig 1.1: Unprocessed Score sheet
A B C D E F
Homework Quiz Exams
Name (20%) (20%) (60%) Total Position
Baba 12 18 45 75 9th
Caca 12 13 50 75 7th
Dada 20 20 55 95 1st
Fafa 10 19 49 78 6th
Gaga 14 16 51 81 5th
Haha 15 15 45 75 8th
Jaja 10 17 30 57 10th
Kaka 12 19 53 84 3rd
Lala 16 19 48 83 4th
Mama 17 20 57 94 2nd
Fig 1.2: Processed Score sheet
For example, the computer can add the numbers in columns B, C, and D together and
the result is stored in column E. Again, the computer can arrange the names in column
A in alphabetical order. These are some of the processing operations that computer can
perform. The information we can obtain from the processed score sheet in figure 1.2 is
that the student called Dada scored the highest mark with Jaja scoring the least mark.
The processing operation can be divided in two groups: Arithmetic and logical
operations.
The Arithmetic operation involves the usage of basic arithmetic operators such as
addition (+), subtraction (-), multiplication (*) and division (/) in performing
calculations on data. An expression or operation with any of the arithmetic operators is
known as arithmetic expression (operation) thus Sales-Cost is an arithmetic expression
whilst Profit = Sales-Cost is an arithmetic equation. Sales and Cost are known as
operands.
With the logical operation, the computer is able to compare two or more data and
determines whether or not they are equal to (=) or not equal to (! = or <>). The = or
<> operators are known as relational operators. If the two data items to be compared are
different, then the computer can use these other relational operators: greater than (<),
greater or equal to (=<), less than (>), less than or equal to (>=), to perform the
comparison operation. Examples of logical expressions are Age >= 18, A-357 <> B/60.
The result of a logical expression can take one of two possible values at any time. The
two values are “True” and “False”, which are known as Boolean values. Hence logical
expressions are also known as Boolean expressions, named after a French logician
called George Boole, who is the father of logic algebra.
The computer uses these two logical operators (and (Λ) operator / or (ν) operator) to
concatenate or join two or more logical expressions together so that they form one
logical expression. The result of the relational operators is a Boolean value. The other
relation operator is “is not (!)” for negation. The Truth tables for these operators are
shown in figure 1.2.
Assuming that P and Q are two logical expressions with the outcomes of P and Q being
True and False respectively, the following Truth Tables is possible.
For the Λ Truth Table: True (P) from column 1 and False (Q) from row 1 results in
False. That is P Λ Q is false. We can conclude that to get the result to be true for the Λ
operator is that both expressions must be true.
For the ν Truth Table: True (P) from column 1 or False (Q) from row 1 results in true.
That is P ν Q is true. We can conclude that to get the result of a ν operator to be true is
that at least one of the expressions should be true.
The computer uses logical expression for decision-making. For example, the computer
will assign grade of A to students whose total marks is between 100-80 inclusive else it
assigns either B+, B, C+, C, D+, D or F depending the total marks.
copy of it is send to the secondary memory. When you print a document, it is send to
the print queue for the printer to print.
2. From one computer to another computer. This usually occurs when you
download or upload files from one computer to another. For example, Microsoft
Automatic Updates when activated on your computer will check an appropriate server
from Microsoft Corporation for whether or not a recommended security updates, critical
updates, and services packs exist. If any dres exist, it will automatically be downloaded
unto your computer and installed. During the checking and downloading, there is a
communication between your computer and another computer at Microsoft Corporation
in Redmond, Washington, USA. Similar communication occurs for most Antivirus
updates such as Norton Live Update. Again anytime, you open a browser (e.g.
Netscape, Internet Explorer, Opera, etc) to view a webpage, it fetches the requested web
page from a particular Web server.
3. From one user to another user. You can use communication programs for
emailing, chatting and telephoning or video conferencing with people. This can be
either online or offline. When you want to chat with a friend on the Internet using
Yahoo Messenger for example, both of you should be connected to the Internet at the
same time using computers that has already configured for such activity. This is online
communication since both parties must be on the net at the same time for this
communication to be effected. When you send an email, the recipient reads it at his or
her own convenient time. This is an offline communication since immediate response is
not need for the communication to be effected.
Before we end this section, we must say that there are certain things that computers
cannot do. These are:
Things that cannot be described by an algorithm
Things that are not part of the program installed in the computer.
Self-Assessment Questions
Exercise 2.1
1. State the basic operations the computer performs and explain how it carries out
these operations.
2. Considering the following activities, indicate the type of computer operations
(stated in Q1) that are involved.
Installing and opening an office package such as Microsoft Word.
Opening a statistical Package such as SPSS and preparing a template with all
the appropriate data items such as age, gender and region.
Printing and sending results of students via fax.
Objectives
At the end of the session you should be able to:
(a) explain the difference between data and information.
(b) state and explain the criteria that are used to classify data and information.
(c) state and explain the criteria used to assess the goodness of information.
Now read on …
Data is the plural form of datum. The singular form is rarely used hence you can’t hear
anyone saying, “Please give me one datum to test the computer program”. The word
data has become common that it is now treated as either singular or plural. Datum
comes from Latin, which is originally meant “something given”. Therefore anytime you
give anything to a computer for processing that something is data.
1. Data, which is the raw material for producing information, can be considered as
groups of non-random symbols that represent quantities, actions, objects etc. The
non-randomness mentioned is because we used specific symbols to depict the
quantity of the data collected. For example, in order to say that the age of the
youngest person in this class is twenty-five, I don’t use any random symbol but
rather the one that has been agreed upon so that it is recognised. Therefore, we can
use the Arabic number 25 or the Roman number XXV and so on to represent the
age. Data is numbers, words, or pictures without context. For example "42",
"rabbits", "4.00", "76", "mangoes", "04230859", "40000", "Cape Coast", and
“Accra”. Without the situation or circumstance under which the above data were
derived, it becomes meaningless or difficult to comprehend. For example, what is
“42” or does it represent? Is it 42 hours, or 42 meters or 42 something? Even with
these qualifiers, it is still difficult to understand what that data actually is.
Another example of the meaningless nature of data is how you interpret 110110. It
may be interpreted as date, a house number, a telephone extension number, a
postcode or a binary number. However once you are made aware that it is the
default password for UCC students’ email account it becomes meaningful and
hence information.
3 In fact all the events or things that had happened in the past or are happening
now or would happen in the future and are of interest to us can be considered as
data. This is because we can process it to extract pattern from it, which may
enhance decision-making and therefore an action could be taken from it.
On the other hand, information is derived from data that has been processed and is
useful or meaningful to the intended recipient. The usefulness or meaningfulness of
information versa vice that of data is that information has a context. That is information
is derived within a context. We shall use the tables in figure 1.3 to explain how
meaningless data within its context is transform into meaningful information.
22
CoDEUCC/Post-Diploma in Basic Education
UNIT 1
COMPUTERS FUNDAMENTALS SESSION 3
In figure 1.3(a), the two zeros in columns C and D for Dada’s details have the same
value but are meaningless since we don’t know what they represent. Again, the fact that
they are in different columns make them different even though both are zero. Likewise
the two fours, the two eights, the two ones and the two zeros for the details of Fafa,
Jaja, Kaka and Mama respectively are all difficult to explain without the context.
Table headings make values to be meaningful since they serves as the context within
which the values are evaluated. From figure 1.3(b) we know that the two fours in
columns C and D for Fafa indicates that Fafa was absence from classes on four
difference occasions and each occasion Fafa didn’t asked for permission.. The headings
make the values to be meaningful, which is information. This is because; we can make
decision out of the tabulation in figure 1.3 (b). One decision we can make on the fly
(which is not conclusive) is that Baba is a truant student since he never ask permission
for his absence in class.
One thing we should not forget is that data and information can be used interchangeably
since information to one person may be data to another person especially when that
information needs to be processed further. The diagram in figure 1.4 is use to illustrate
this fact.
In figure 1.4, the output from computer 1, which is information, became the input of
computer 2, which is data. The diagram above shows how data and information can be
used interchangeable since information from computer 1 becomes data for computer 2.
24
CoDEUCC/Post-Diploma in Basic Education
UNIT 1
COMPUTERS FUNDAMENTALS SESSION 3
Self-Assessment Questions
Exercise 3.1
1. Write short notes on the differences between Data and Information.
2. State and explain the criteria used to classify Data and Information.
3. Match the following criteria used to classify information with their
examples.
Classification Example
1. By source Decision-making
2. By level: Historical
3. By frequency Written
4. By form Present
5. By nature On demand
6. By time Continuous
7. By use Quarterly
8. By type Summarized,
9. By source Operational
Occasional
Aggregated
Formal
External
26
CoDEUCC/Post-Diploma in Basic Education
UNIT 1
THE INFORMATION PROCESSING CYCLE SESSION 4
Objectives
At the end of the section you should be able to:
(a) explain the steps involved in the process of collecting data
(b) develop an ability to analyse the accuracy and validity of data
(c) develop an understanding of how data is changed into information
(d) state and explain all the stages of the Information Processing cycle
Now read on …
Payroll staff collecting the allowances, overtime claims and others so that staff
salaries may be computed.
Conducting a survey of customer's opinions on which products or services to be
introduced or rating of staff performances
Using a form on a website to collect visitors' opinions
A lecturer’s gathering of students’ marks for assignment, quizzes, and exams for
the computation of grades.
For a questionnaire, to code the gender of respondents, it could be agreed to used 1 for
male and 2 for female or vice versa. Likewise to record the region of one’s birth we can
use the numbers 1-10 to represent the ten regions in Ghana. A closed-ended question
implies that only a fixed number of predetermined responses are allowed, and these
responses can have codes affixed on the form. An open-ended question implies that any
response is allowed and making subsequent coding may sometime is more difficult.
You can go around this difficulty by selecting a sample of responses, and design a code
structure which captures and categorises most of these.
Some editing processes that could be employed are Validation or Validity check,
verification check and consistence check.
by one stating divorced. Likewise a male who attended a female only school may be
impossible.
Examples:
1. Finding the average ages of male and females in this class. Which group is
older?
2. Counting the number of male and female responding to the survey
3. Finding the different religious groups being represented in this class.
Processing data provides useful information called output. Computer output may be
used in a variety of ways. It may be saved in storage for later retrieval and use. It may
be printed on paper as tables or charts, put on a transparent slide for overhead projector
use, saved on flash disk for portable use in other computers, or sent as an electronic file
via the Internet to others.=
Types of output are limited only by the available output devices, but their form is
usually governed by the need to communicate information to someone. For whom is
output being produced? How will they best understand it? The answers to these
questions help determine one’s output type.
Self-Assessment Questions
Exercise 4.1
1. State the steps involved in converting data into information spelling out the
differences between each step.
2. Explain why raw data has to be coded before entered into a computer.
3. At what state of the information processing cycle is data converted to information.
Complete the following sentence
4. Data Manipulation is also known as …………………
5. Provide the Information processing step and that is related to the following activities
a. Using a form on a website to collect visitors' opinions
b. For a questionnaire, the gender of respondents used are1 for male and 2 for female or
vice versa.
c. Bar code readers used in shops, supermarkets or libraries
d. Validation or Validity check, verification check and consistence check.
e. Checking of the accuracy of entered data by entering it again and comparing the two
results
f. Checking the logical consistency of related answers
h. Counting the number of male and female responding to the survey
Objective
At the end of this session, students should be able:
(a) explain what computer literacy is
(b) list the various views on computer literacy
(c) specify the need for computer literacy
(d) identify the computer skill set a computer literate should exhibit
Now read on …
The term has been attributed to Andrew Molnar in the early 1970s. He was director of
the Office of Computing Activities at the National Science Foundation.
In 1976 John Nevison coined the term computer literacy, when he wrote: “Because of
the widespread use of elementary computing skill, there should be an appropriate term
of this skill. It should suggest an acquaintance with the rudiments of computer
programming, much as the term literacy connotes a familiarity with the fundamentals of
reading and writing, and it should have a precise definition that all can agree on. It is
reasonable to suggest that a person who has written a computer program should be
called literate in computing.”
One aspect of the above definition that we don’t support is the emphasis on computer
programming, which is one of the ways people interact with the computer.
Before we proceed on the definition of computer literacy, it is worth noting what the
word literacy means. Literacy is the ability to read and write at some minimum level.
The minimum level mentioned here is for the literate person to interact and participate
meaningfully in the society. Hence being illiterate is considered as a handicap
warranting other members of the society to offer a helping hand.
Computer literacy is being aware of the value of the computer and having the minimum
knowledge, know-how, familiarity, capabilities, and abilities about computers that is
necessary for an individual to interact with the computer so as to function well in this
Information Age or Technological-oriented society.
The three things that should be part the definition computer literacy are awareness,
knowledge and interaction.
2. Knowledge: This is requisite know-how as what computers are and what they
are not, what they can do and what they cannot do. Some people think
computers can do all things while others are of the opinion that computers are
bad. Therefore in other for a person to become computer literate that person
should learn what they are and how they work.
3. Interaction: This is the ability to use the computer with all confidence to
perform tasks that the computer is the best tool for it. Whether or not these tasks
are simple or complex is not the issue but rather one’s ability to recognize that
computers can be used to solve the problem or perform the task at hand is
important. In view of this, computer literacy course should emphasis the usage
of computers to perform real-life tasks. This will enable student to know to a
large extent when to apply computers and when not to apply computers.
5.3 The Necessity of Computer Literacy
With computers pervading our lives in a significant way, it is becoming imperative that
each and every person be computer literate. One IT education organization NIIT-a
global leader in IT Profession Education from India has dedicated December 2 as World
Computer Literacy Day (WCLD). Since 2001, when WCLD, was launched, NITT has
trained Hundreds of Thousands of hitherto computer illiterates in ICT.
Narrowing the “Digital Divide”: There are billions people, who are living in smaller
towns and villages and in the lower socio-economic sections of our Hi-Tech world who
have been left behind in the IT revolution engulfing us like an uncontrolled fire. The
“Digital Divide” has created a world with a small proportion of “Haves” who know
computers and a huge section of “Have-nots” who are not equipped with even basic
computer literacy skills. Therefore computer literacy is one of the means for reducing
this “Digital Gap” since those computer literate may acquire computers, which is
becoming increasingly cheaper and cheaper. The two factors that has contributed to the
Digital Divide are:
Low penetration of PCs and Internet in major parts of our world.
Computer literacy is confined to a smaller part of the world-majority of the First
or Developed countries and some educated elite in the Third world-Developing
and Under-developed countries.
1. To better the lives of future generation: Almost all students today will
use computers during their lifetime or will be affected by them.
Therefore they need to know about the computer as an effective tool for their future
activities.
From our point of view, this seemly disagreement in what constitute computer literacy
is so because of the reasons stated below:
Computer literacy is subject-dependent
People in the same profession may use the computer differently
Computer literacy is future-oriented
Different people may desire different level of computing knowledge
One way that computer literacy differs to other literacy such as mathematics literacy,
Science literacy; English literacy and so on is that it is much more subject-dependent.
That is different fields of study may require different skill set that a computer literate in
that field should display. Hence the computer literacy content for a person studying
mathematics should be different from that for social sciences, Arts, Agriculture and so.
This is in line with the different mathematics knowledge requirement for various fields
of studies. Therefore we have books with titles such as:” Essential mathematics for
Physics”,”Mathematics for Biology”, “Mathematics for Social Sciences” and so on.
Another reason that makes computer literacy to differ from other literacy is that
computer literacy is to prepare students for their future job. Hence by the time these
students of computer literacy programmes complete schooling, what they were taught in
the computer literacy programme might be obsolete. Some ways to minimize this
problem are:
The very latest software packages should be taught. At the time of writing in
2006, one institution in Ghana is still teaching Microsoft Office 95 on a Pentium
1 machine. While their student will use Microsoft Office 2000, XP or 2003 on
Pentium III, IV or Celeron M after school.
More computer laboratory exercises should be given so they become use to the
computer.
They should be taught how to use the Help features of software packages so that
they can search for information by themselves.
The computer is an essential tool that when employed effectively enhances the work of
the individual. The software aspect of the computer system enables the computer to be
adapted to every situation. While others want to rely on computer professional to solve
their computing problems, others also want to be in full control when it comes to the
use of their computers. The later users want to be computer proficient while the former
are computer literate. In view of this, we should be mindful of these two categories of
students in the class so that computer literacy courses are designed in such a manner
that both are satisfied. That is it should not be too much for those who desire to be
computer literate and at the same time not too little for those who aim at becoming
computer proficient. It difficult to have a single computer literacy course that is satisfies
these two desires. One way around this is letting those who want to become computer
proficient register for other elective computing courses being offered by the computer
Science Department if it exists in their school or design an appropriate computer
literacy course for them.
5. Internet skills
Reading, replying, and sending Email messages
Using search engines to find useful information on the net starting your email
client program
Receiving, reading and replying to emails
Attaching files and opening attachments
Dealing with spam
Using address books
Starting web browsers and entering Uniform Resource Locators (URLs)
Navigating hyperlinks
Using bookmarks
Participating in chat rooms and discussion forums
Self-Assessment Questions
Exercise 5.1
1. Which two people are credited with the coining of the original term
“computer literacy”?
2. “Knowing how to use a computer will be relevant as reading and writing” who
said this
3. What are the three ingredients of the definition of computer literacy?
4. List some of the reasons that necessitate computer literacy.
5. What is your opinion on the notion that a computer literate people should
understand how to write a computer program?
6. After going through a computer literacy programme what skills do you hope to
acquire?
Objectives
At the end of this session, students should be able to:
(a) list the characteristics that make computer a super machine.
(b) explain the meaning of some units of measure in computing
such as
Hertz (Hz), byte and its higher units like Kilobyte (KB), Gigabyte (GB)
etc.
Now read on …
When we look at the things that computers are capable of doing, we can consider
computers as “powerful devices” or super machines. From our point of view, the things
that make the computer to be powerful may be defined in these terms:
Storage
Reliability
Consistency
Speed
Accuracy
Communication
In other words, the power of computers is derived from their capability of processing
and communicating information with high speed, unquestionable reliability, higher
percentage of accuracy and having huge storage capacity.
6.2 Speed
Computers are the fastest devices we have. The time required to execute an instruction
can be measured in a fraction of a second.
For example, it may take you about three minutes to find the location of a book in the
library by searching the index cards. However, if you use a computerized library system
to search for a book’s location, it may only take you about a few seconds, depending on
how fast you can type. Normally, the computer only takes less than a second to process
your request.
The units of time the computer can used are tabulated below:
6.3 Reliability
You want to access your emails at www.yahoo.com or www.hotmail.com at anytime.
Hence these email servers have to work at all times to serve not only people living in
the place these servers are located but all people from all time zones. In actual fact,
computers such as Servers, ATM, and the like are expected to be operational 24 hours
in a day, 7 days in a week and 52 weeks in a year. They do so with a very low failure
rate. They have in-built self-check that enables them to detect impending failures way
before they actual occur so that Computer Technician attend to them before they come
to pass.
6.4 Accuracy
Computers can generate accurate results, provided that the input data is correct and the
instructions that constitute the program are free from errors. If the inputted data is not
error-free the result of instructions will definitely inaccurate. Remember the popular
acronym GIGO implying Garbage In, Garbage Out. The implication is that all things
being equal, the accuracy of the output depends solely on that of the input.
Research has found that source-data or automates devices produce more accurate results
that when entered manually by human beings. For example, the item prices determined
and recorded by scanning the bar-codes at the point-of-sale terminals in supermarkets
are far more accurate than those typed in by cashiers. There have being instance where a
cashier was apprehended for under-pricing items bought in a supermarket for customers
who are relatives or friends. Similar we have heard instances of fictitious data entry
made by staff that entered wrong times for reporting for work and leave the work. For
the computer once the time is set by System Administrator who has the right
authorization, the time cannot be reset by another person.
6.5 Consistency
The Consistency of the computer tells us that the computer will produce the same
output for the same input at all time and if possible in all conditions, provided all things
are working as expected or planned. We stand by this assertion because the computers
are not affected by emotion and do what they are programmed to do. We know that the
same issues may be viewed by different people differently and hence may be interpreted
differently. This is not so with computers. Most of the "computer errors" can be
attributed to human errors such as incorrect input data and unreliable programs.
6.6 Storage
In the University of Cape Coast just like any other Educational institutions, the
Student’s Record Section has a room full of Students record stores. If the Students
information has been computerized, they will be contained on computer storage media
such as DVDs, CDs, tapes, zips and so on, which conserved space since these media
could be store in a container less may be of the size of cabinet at most. At time due to
the stuffy nature of the Record room, staff, who have been asked to check on a
particular student’s record feel reluctant to go into this room because they are afraid of
getting Catarrh. The wastage of room space and the associated health hazard could be
avoided if the Student’s Record system is computerized. Computers have the capability
to store huge volumes of data on a tiny or miniature storage medium, whose size is
much smaller that a book. For instance, take the 32 full-volumes of Encyclopedia
Britannica, which usually occupies a whole row of Bookshelf in a library, has a digital
version, which is fully multimedia and for that matter is made up of text, pictures, audio
and video on a single DVD.
The computer stores data as binary such as 0111 1001 0011 1111. In actual fact, the
basic unit of storing data in the computer is Zeros and Ones each of which is referred to
as Binary unIT or Binary digIT. Therefore the acronym bit, which comes from the
binary unit or digit. One is therefore a bit likewise zero.
Bit is therefore the basic storage unit for computers. Eight bits called a Byte is usually
used to store a character. Characters are formed from the following:
Alphabetic such as A-Z or a-z
Numbers such as 0-9
Special symbols such as ^,!, @, &, %,
Previously, some computers used four bits to store characters. This is called nibble.
Higher units of computer storage are tabulated below.
It is important to note that, the numbers of different or unique characters a computer can
represent depends on the numbers of bits used to store a character. If we use n-bits to
form characters then the total number of different character that can be derived is given
by 2n. When n= 8, we have 28=256, likewise for n=16, we have 216=65,536.
Self-Assessment Questions
Exercise 6.1
(1) What makes the computer different from other electronic
machines?
(2) What does it mean to say that the speed of a computer is
(i) Microsecond (µs)
(ii) Nanosecond (ns)
(3) List and explain the factors that make the computer powerful.
(4) The ability of using the computer 24×7×365 is an indication of it Reliability.
True / False? ______
(5) How many different characters could be form from a system that uses 10 bits to
form a character?
(a) 10 (b) 1000 (c) 1024 (d) None of these
(6) Which of these is a unit for measuring the capacity of computer’s storage?
(a) Petabyte (b) Exabyte (c) Brontobyte (d) All of these
(7) A byte is twice the size of nibble. True / False? ______
Unit Objectives
At the end of the session you should be able to:
1. list the various Input devices attached to the Computer
2. list the various devices that are used to output information to end user
3. explain the characteristics of the different types of storage devices
4. list the three wares of the computer system
5. mention at least four devices inside the system unit
6. identify some key component of the computer such as RAM, CPU,
BUS, Port, CMOS battery etc.
Objectives
At the end of this session, students should be able to:
1. describe the three (3) main wares of the computer system
2. Differentiate between warm booting and cold booting
3. Outline the function of the BIOS
4. Outline the various means of classifying computers
5. List the two (2) major divisions of computer software
Now read on …
With regard to hardware and software, we can say that they are of equal import once.
You cannot make full use of the software without the hardware likewise the software
enables users to use the capabilities of the hardware. From the above deliberation we
can say that most of the credit and discredit of the computer system should fall at the
door step of the liveware.
Before you can do these and many more, you need a computer software application or
application software such as an Office suit, a Web-browser, media player and the like.
These application software need to be installed on the hardware before you can used
them. When you want to use these software applications, you need the hardware system
such as the keyboard, the display screen and the like.
When all the components of the computer are connected to each other correcting
including connecting it to the main electric supply, then we are ready to start the
computer to use it. The process of starting the computer is called Booting. This is done
through the process listed below:
Step 1: Power on both the System Unit and the Monitor. Look for the location of
on/off button on both the System Unit and the Monitor. The power supply takes some
time until it can generate reliable power for the rest of the computer.
Step 2: The Basic Input/Output System (BIOS) is located. The computer has a set of
built-in programs called ROM-BIOS (Read Only Memory - Basic Input/Output
System), which is executed once you switch it on. Because of its importance to the
operation of the computer, the BIOS is usually located in a memory that is read only
hence it is known as Read Only Memory (ROM). The BIOS will activate the bootstrap
program, which initializes the booting process. The boot strap includes the following:
Power On Self Test (POST)
Hardware Initialisation
Disk boot
Step 3: The POST process. The POST is a built-in diagnostic program that checks
your hardware to ensure that everything is present and functioning properly, before the
actual boot begins. It later continues with additional tests (such as the memory test that
you see printed on the screen) as the boot process is proceeding. The POST runs very
quickly, and you will normally not observe what is going on unless it finds a problem.
Anytime an error occurs, a beeping sound is heard and then stopped without booting up.
The POST routine, which determines:
Step 4: Initial Start-up Process. After the POST, the system BIOS attempts to locate
the start-up disk. The first sector (also known as sector 0 or boot sector) on the start-up
disk is critical to the start-up process. This sector contains the following:
Most BIOS versions enable the user to reconfigure the order in which it checks the
secondary disks for the start-up disk.
The early PCs boots firstly from the floppies, which were two then hence we have
drive A and B. If these floppies are empty, then the system checks the hard disk (also
known as drive C) for the start-up disk. Now we can boot from even CD/DVD.
When the start-up disk is located, the following sequence of events takes place:
(a) The system BIOS reads the Master Boot Record, and loads it into memory.
(b) After which execution is transferred to the Master Boot Record. The code in the
Master Boot Record scans the Partition Table for the system partition.
(c) The system therefore loads the code in the system 0 of the partition into memory,
and executes it. This code is a utility or diagnostic program, or a Partition Boot Sector
that contains start-up code for the operating system.
(d) The Partition Boot Sector code starts the operating system in a manner defined by
the operating system. When everything is successfully done, the desktop such as the one
below is displayed indicating that the system is ready for instruction from you.
The above proceeding process is called a "cold boot" (since the machine was off, or
cold, when it started). A "warm boot" is the same thing except it occurs when the
machine is rebooted pressing and holding down the following keys Ctrl +Alt+ Delete
or after pressing the Reset button for a computer is already on. In this case the POST is
skipped and the boot process continues. You normally warm boot a computer when it
freezes, which is shown by non-responsiveness of any key press. This makes the
computer system not to response as it should.
Self-Assessment Questions
Exercise 1.1
1. Even though all the components of the computer system are important, which of
these two-hardware or software- has contributed to people using more computers these
days?
2. Why is warm booting of a computer necessary?
3. The POST is responsible for different devices of the Computer System to
communicate. True / False
4. Which of the following is not considered as a floor computer?
(a) Microcomputer (b) Minicomputer (c) Mainframe
(d) Supercomputer
5. The program that initializes the Booting process is known as………..
(a) POST (b) BIOS (c) bootstrap (d) the partition
boot sector
6. The operating system must be located into memory before one can
use the computer. True / False
In this session, we shall look at what an input is and what devices are
available for inputting. We shall also look at how they are use to make the
utilization of the computer very easy and comfortable for users.
Objectives
At the end of this session, you should be able to:
(a) explain what constitute an input to the Computer system?
(b) explain the main purpose of the input devices;
(c) define what is an input device;
(d) list some of the common input devices;
(e) explain the functionalities of some of the input devices;
It important to emphasis that the computer is not a magic box to give you what is not having.
Therefore whatever result you want the computer to produce must be either be entered or stored
in the computer. Again we should not give that correctness of the result that the computer
produces depends on the correctness of what was entered. Hence the popular saying Gi Go –
Garbage In, Garbage Out. Meaning that of whatever we enter is wrong then the result will also
be wrong.
The keyboard is one of the peripherals that is connected to computer system and is the most
common input device. The keyboard converts the alphabets, numbers and special characters
entered, which is commonly known as alphanumeric characters into electronic signals of zeros
and ones (bits). A computer keyboard is an array of switches, each of which sends to the
computer a unique signal when pressed. The present keyboard that comes with computer
emerged several generations (types) of keyboards. These are:
1. 83-key PC and XT keyboard
2. 84- key AT keyboard
3. 101-key enhanced keyboard
4. 103-key Windows keyboard
The difference among the four types of keyboards mentioned above is the positioning and the
number of the function keys, the Control key, the Return, key Alt key, the Shift keys and
additional keys.
We can say that it is only the keyboard part of the computer where the better and the latest option
are not being used.
ENTER key ( ): This is sometimes called the Return key, and is used to tell the computer to
execute typed commands for Command-line (Text-based) operating systems. It is also used to
send the cursor to the beginning of a new line in a word processing system.
Cursor-movement keys (←↑→↓): The cursor, also called the insertion point, is the symbol on
the display screen (monitor) that shows where next character you enter will be placed. The
cursor-movement keys or arrow keys are used to move the cursor around the text on the screen.
These keys move the cursor to the direction indicated on the key. Whiles the left (←)and right
(→) keys respectively move the cursor one space or character to the left and right, the up (↑), and
down (↓) keys move the cursor one line above and below the current line.
Numeric keys: On a standard 101-key keyboard, a separate set of keys, 0 through 9, known as
the numeric keypad, is laid out like the keys on a calculator. The numeric keypad has two
purposes:
1. Whenever the Num Lock key is off, the numeric keys may be used as arrow keys for
cursor movement and for other purposes such as Pg Up, Pg Dn.
2. When the Num Lock key is on, the keys may be used for entering numbers, as on a
calculator.
A light is illuminated on the keyboard when the Num Lock key is pressed once and goes off
when the Num Lock key is pressed again. For space reasons, portable computers often lack a
separate numeric keypad or the numeric keys may be superimposed on the typewriter letter keys
and activated by the Num Lock key.
Function Keys: These are labeled F1 to F12. They send signals to the computer that have no
constant or same meaning. Each software designer might assignment a specific meaning to them.
For example, in Word Perfect 9, pressing Ctrl+F7 will check the spelling in your document
whereas the same feature will be activated in Microsoft Word 2000 by pressing F7. The
documentation manual that comes with the software tells you the functionality of the function
keys. Some software manufacturers are trying to standardized the function of these function
keys. For example, for software coming from Microsoft Corporation, when you want the online
documentation that accompanies the software or the HELP feature, press F1.
The Ctrl and Alt are modifier keys in that they modify the behavior of other keys when they are
use together. When use alone, the modifier keys cause nothing to happen. When you hold down
a modifier key while pressing another key, the combination makes that other key behave
differently.
The Alt key: This is normally used to activate the menu bar. For example pressing the Alt key,
will cause the menus area to receive focus or be active. When you press the Alt key whilst using
Microsoft Word, it will cause the file menu to receive focus hence you will see the File menu
being highlighted. In order to display the content of the File menu, press the either down or up
arrow key while pressing the either the left or right arrow key will move the focus to the other
menu i.e. at the left or right of the current menu respectively. A typical menu bar for Microsoft
Word is made up of the following:
To activate any of the menus, you hold down the Alt key while pressing the underlined character.
For instance to activate the Table menu, hold down the Alt key whilst pressing the A-key, which
is the underline character in table. This function of the Alt key is handy when your mouse is not
working properly.
The Alt key when used with a combination of numbers on the Numeric keys will produce certain
symbols. For example, holding down the Alt key whilst pressing 155 on the numeric key will
display the cedis sign(¢). We should note that the ¢ sign resulting from Alt +155 is sign
originally the cent sign but accidentally similar to our cedis sign.
When you holding down the Ctrl key while press the G key will cause the ‘find and replace’
dialog box shown below to be displayed.
Fig 2.3: You activate the Find and Replace menu from Ctrl+ g shortcut
The capability of using the either the Alt or Ctrl key with other keys to activate menu or other
functionality quickly without using the mouse is known as the hot key or shortcut key.
As computers have become more widespread, so has the incidence of various hand and wrist
injuries. One injury associated with prolonged usage the keyboard (that is not ergonomically
friendly) is repetitive strain injury (RSI), also known as cumulative trauma disorder (CTD). RSI
In this regard, keyboard manufacturers are now producing keyboards that prevent or minimize
these injuries. These keyboards are known as ergonomics keyboard. The term “ergonomics” is
derived from two Greek words: “ergon”, meaning work and “nomoi”, meaning natural laws.
Ergonomics is the science of designing machines, tools, computers, and physical work areas so
that people find them easy and healthful to use. These Keyboards can also be used physically
challenged individuals.
Microsoft Natural and Kinesis keyboards are examples of ergonomic keyboard where some keys
are angled away from the centre, while others are put in pits into which a naturally curved hand
can fit.
Notwithstanding the availability and benefit of ergonomic keyboards, it is proper that people
who work with the computer or uses computers for most of the daily work engaged themselves
in the following activities:
Exercise such as Walking, swimming, jogging
Desk Stretching: this should be done after every 15 to 20 minutes working with the
computer
Relaxation such as massaging
2.3.1 Mouse
A mouse is a device which allows the user to control the position of:
the cursor to manipulate data
the pointer to select menus, icons and toolbars
The mouse was invented by Douglas Englebart in 1963-64, as part of an experiment to find
better ways to point and click on a display screen. Englebart was at that time was working at the
Stanford Research Institute, which was sponsored by Stanford University. The casing was
carved out of wood. The mouse had only one button. The Mouse was originally referred to as an
X-Y Position Indicator for a Display System. Xerox later applied the mouse to its revolutionary
Alto computer system in 1973. In 1984, Apple Computers introduced the mouse with their
Macintosh computers. Today the mouse is now found on every computer and it is the means
through which users interact with the computer graphically.
A mouse contains a least one button and sometimes as many as many as three, which have
different functions depending on what program is running.
Mechanical mouse: This requires that the mouse be set on a flat surface. The mechanical
sensors within the mouse detect the direction the ball is rolling and move the screen pointer
according.
Optical mouse: Originally this requires a special mouse pad which has a grid pattern so that the
optical mechanism has a frame of reference. A sensor inside the mouse determines the
movement by reading the grid as the mouse passes over it while emitting a light from an LED or
sometimes a laser. The latest optical mouse is capable of being on any surface.
Optical-Mechanical: The optical-mechanical hybrid consists of a ball which rolls a wheel inside
the mouse but uses an optical sensors to detect the motion and hence the position of the ball.
2.3.3 Interfaces
The interface deals with the means by which the mouse connects to the system unit of the
computer. In this regard, the mouse is connected to the computer through the following:
Bluetooth, Infrared, PS/2 Port, Serial Port, and USB
Cordless: This uses infrared or radio waves, rather than a cord, to connect to computer. There
should not be any obstacle between this mouse and the computer since movement may not be
detected.
Fig 2.8: Types of mice – (a) Cordless mouse, (b) Footmouse, and (c) IntelliMouse
Footmouse: The foot mouse is a fully functional toe-controlled input device. It gives the users
the ability to move the cursor and click the buttons with their feet. It is primarily used by users
with disabilities or with high-back or neck problems. It could also be used as a way to prevent
the problems listed above in the future and as a means to increase productivity by not having to
move one's hand between the keyboard and mouse.
IntelliMouse: This is an optical mouse with enhanced ergonomic design that helps you work
longer without discomfort. Helps you to navigate with better speed, accuracy and reliability.
b) The right button is use to pop-up context-sensitive menu. This is because the menu that
will be displayed depends on what is being done or where the pointer is located.
c) The centre or scrolling wheel is use to scroll through the current screen if the content is
made up of more than one page or screen-full of information.
b) For clicking: This is pressing and releasing the left button. Clicking is used to select
menu, toolbar, icons and buttons in dialog box
c) For double clicking: this is quickly pressing and releasing the left button twice in rapid
succession. There should not be any time elapse between the two clicks. For novice
double clicking may be very difficult hence they can click the object after which they
press the enter key. Double clicking is normally used to launch or activate a program or
d) To drag and drop objects: As the name implies, this operation is in twofold; dragging
and dropping. Collectively, they are used to relocate the position of an object. To drag
and drop, you press and hold down the left button whiles moving the mouse and hence
the pointer to where you want to place the object and then release the button.
Because of the speed at which it works OMR can be used to score the grade of very large
numbers of students within the short possible time. Apart from grading students’ grade from
multiple choice tests, OMR is also for processing result from questionnaire and survey.
Optical character recognition abbreviated as OCR is like reversing the process of printing. This
is because instead of retyping back into the computer information that has already been printed
by the computer, you can use OCR to scan the information. The information can be edited and
saved in the format you like. As the name implies, OCR uses light source to read these
characters. Usually OCR readers can read OCR-font such as OCR-A, which is a type of standard
typeface established by the American National Standards Institute (ANSI). The handheld wand
reader is used for reading OCR-A tags on items in supermarkets, libraries, and factories.
There are several different types of bar code systems in place such as:
The European Article Number (EAN), which is used by European countries and
Universal Product Code (UPC) used in USA and Canada. These use eleven digits for bar
coding general products.
POSNET bar code developed by the United States Postal Services is used to automate the
sorting of mails.
Bar-code readers translate the bar code symbols into digital code (ASCII or EBCDIC). The basic
information of items such as price, name, type, amount- in- stock is stored in the store’s database
with the barcode as a unique identifier. In modernize supermarket such as A-Life etc. Whenever
a customer comes to the salesperson to pay for item bought, the barcode reader is used to read
the barcode on each item. Immediately the prices are displayed on the salesclerk’s point-of-sale
(POS) terminal, which is printed as receipt to the customer. The benefits of POS terminals in a
departmental store are as follows:
1. Daily sales are recorded and used to determine the total sales made of the various items
2. Taking stock of items is done automatically without closing the store, which used to be
the case in the 1980s when most Departmental Stores in Ghana such as GNTC, UTC,
Kingsway close on every Wednesday after lunch.
3. Weeding out products that don’t sell well.
4. Elimination of price tagging each item in the store.
The bar coding technology is being used to record the each runner that finished a race. For this
to be effected, each runner must wear a bar coded T-shirt, and at the finished line, Officials
holding handheld bar-code readers record their time.
Self-Assessment Question
Exercise 2.1
Exercise 2.2
1. What is an input?
2. What is an input device?
3. Name two types of PC keyboard.
4. Explain the basic function of the alt key on a key board.
5. Holding of the shift key whiles pressing h, n, g would capitalize them to H, N, G. True /
False?
6. What does RSI stands for with respect to Ergonomic Keyboards?
7. How would you explain Ergonomic Keyboard in your own words?
8. Give one function of the mouse.
9. What is MICR?
10. Microphone is an input device. True / False?
11. The default letter – case for the CAPS Lock is lower case. True / False
12. A part from the CAPS Lock, what other key is a Toggle key?
Objectives
At the end of this Session, you should be able to:
(a) define what an Output Device is?
(b) distinguish between Softcopy and Hardcopy?
(c) briefly explain the factors that will affect the speed of printing?
(d) mention some advantages disadvantages of of a Cathode Ray Tube and Flat –
Screen Monitor
(e) define various acronyms such as VRAM, VGA, VDU, TFT, LCD as used with
regards to monitors
(f) list at least (two) 2 differences between impact and Non – impact Printers
In certain situations or applications, the time interval between input and output is
instantaneous whiles in others there is a lengthy time delay in between.
Examples of instant output from input are:
Items scanned at supermarket
Produce item name and price at counter
Sales rep enters an order on a pad
Characters displayed as “typed” text and stored in pad
Produce weekly paychecks and management reports
3.2 Printers
Printers are peripherals since they are attached to the system unit of the computer. The
printed output is generally referred to as hardcopy because it is in relatively permanent
form. The physical print media on which the printer dumps its contents are paper or
transparencies.
A Printer could be attached to the Computer system in any of the following manners:
1. The printer is directly attached to a system unit. To print using this printer; user
should come to the local printer and login into computer before issuing the print
command. The queuing of the print job is done with the help of the operating system on
the local computer. The printer is a attached to the computer via USB cable, parallel
cable or infrared.
2. The printer is attached to a server called the print server, which is part of a
Workgroup or Domain. All print requests from this qualified user are routed to the print
server, which intend send them to the printer for printing to be effected. After the
printing is done users have to physically collect the print out.
3. A printer with an IP address known as Network printer is attached to the
network. (All users who request to print with this printer must firstly be granted access
to it before printing is effected.) Same as above except that Network printer is not
attached directly to any printer.
This printer is a shared one implying that it can be accessed by multiple computers.
Before one is able to print the user must satisfy the following conditions:
a. Must have login account in the Workgroup or Domain
b. Must be authenticated user in the Workgroup or Domain
c. Must be granted the permission to print using the said print server.
for draft copies of letters or documents produced in the office or at home or for printing
internal reports.
Letter -quality Print: This is a print that is about equal to clear, solid typed copy. It
can be produced on daisy - wheel printer. It is required for business correspondence,
report, payroll checks, customer invoices, and tax-returns.
Typeset quality print: This is a print that is better than letter-quality. This can be
produced by special electronic typesetting devices or laser printers. It is usually required
for the printing of magazines, books, newsletters, advertisements, and special business
reports.
(near letter-quality type). Dot-matrix printers print about 50 to over 500 characters per
second (cps) and can print graphics, although the reproduction quality is poor. Colour
ribbons are available for limited use of colour. Dot-matrix printers are noisy,
inexpensive, and they can print through multipart forms, creating several copies of a
page at the same time, which non-impact printers cannot do. They can also print to
continuous forms, something laser and inkjet printers cannot do. Examples are
Panasonic KXP1131 and Epson FX890.
Daisy-wheel printer: It has a pinwheel like print unit called daisy wheel and the
characters are located at the end of it. It is usually slower than a dot -matrix printer, but
the quality is better since it produces a letter-quality print. Daisy wheel printers were
fairly common in the 1980s, but were always less popular than dot matrix printers due
to the latter's ability to print graphics and different fonts. With the introduction of high
quality laser printers and inkjet printers in the later 1980s daisy wheel systems quickly
disappeared.
Band and Chain Printers: They is a high-speed printer usually used in the
minicomputers and mainframes environment. They are called high-speed printer
because they print a whole line of characters at once rather than a single character at a
time. Their print quality is good. Speeds of up to 3000 lines a minute may be possible
with these machines. The band printer has a flexible rotating steel band that contains the
characters used for the printing. The chain printer also has a rotating chain that contains
the characters to be printed.
Laser printer: Like a dot-matrix printer, a laser printer creates images with dots.
However, as in a photocopying machine, these images are created on a drum, treated
with a magnetically charged ink-like toner (powder), and then transferred from drum to
paper. There are good reasons why laser printers are popular. They produce sharp,
crisp images of both text and graphics, providing resolutions from 300 dpi up to 1200
dpi, which is near-typeset quality (NTQ). They are quiet and fast. They can print 4-32
pages of text per minute for individual microcomputers, and more than 120 pages of
text per minutes for mainframes (pages with graphics print more slowly). They can print
in many fonts (type styles and sizes). The laser printers that print colours are more
expensive than ones that can print only Black-and-white. Laser printers have built-in
RAM chips to store documents output from the computer. If you are working in
desktop publishing and printing complicated documents with colour and many graphics,
you will need a printer with a lot of RAM. Laser printers also have their own ROM
chips to store fonts and their own small dedicated processor.
Ink-jet printer: Like laser and dot-matrix printers, ink-jet printers also form images
with little dots. Ink-jet printers spray small, electrically charged droplets of ink from
nozzles through holes in a matrix at high speed onto paper. Ink-jet printers can print in
colour and are quieter and much less expensive than a colour laser printer. However,
they are slower (about 1-4pages of text- per minute) and print in a somewhat lower
resolution (300-720 dpi) than laser printers. Some new, expensive ink-jet printers print
up to 1200 or 1400 dpi. And if you are printing colour graphics at high resolution on an
ink-jet printer, it may take more time for a single page to finish printing. Inkjet
printers are the most common type of computer printer for the general consumer due to
their low cost, high quality of output, capability of printing in vivid color, and ease of
use. The three main technologies used for Ink jet printers are thermal, piezoelectric, and
continuous.
Bubble-jet printers: These are a variation on ink-jet technology and uses miniature
heating elements to force specially formulated inks through print heads with 128 tiny
nozzles print fine images at high speeds. This technology is commonly used in portable
printers.
Exercise 3.1
a. List three differences between Impact and Non-Impact printers
b. If you have the option to chose between Impact and Non-Impact printers for your
office, which one will you opt for and why
c. Do you think there is the need for impact printers in the world today?
3.3 Plotters
A plotter is a vector graphics printing device which operates by moving a pen over the
surface of paper to produce high-quality graphic in a variety of colours. They are used
for creating large hard copy items, such as maps, and architectural drawings. Such
items are usually too large to be printed on regular printers. Ink-jet and Electrostatic
plotters are the two main types of plotters.
1. Ink-jet plotter: These are less expensive and slower than the electrostatic
plotters. It uses ink-jets technology (just like that of an ink-jet printer) and the paper is
output over a drum, enabling continuous output.
2. Electrostatic plotter: These plotters are designed so that the paper lies partially
flat on a table-like surface. These plotters use toner in a manner similar to a
photocopier.
3.4 Monitor
This equipment is also generic known variously as Visual Display Unit (VDU), Visual
Display Terminal (VDT), and Display Screen Equipment (DSE). Some people use
Video to represent the V part of the above name. There isn’t one. All these terms mean
the same thing - a display screen that forms part of a computer and shows text, numbers
or graphics. It is the default output – device.
The monitor is the part of the computer system that enables you to view either
immediately whatever you are typing or to see the response of your input request. The
monitor enables use to view photographic images, animation and video. Externally,
some monitors include:
The screen for viewing
The plastic case that houses the electrical and electronic part
The stand that can be tilted or swiveled
Monitors run under the control of a graphics display adapter card plugged into an
expansion slot on the system board. The adapter allows information to leave the
computer and appear on the monitor. This card will also have a graphics coprocessor,
accelerator circuitry and video support. The display adapter has its own memory
(RAM), called VRAM, or video RAM, which is used to hold video images. VRAM
controls the resolution of images displayed on the monitor, as well as the number of
colours and the speed at which the images are displayed. More video memory results in
the following:
The more picture detail is displayed
The higher the resolution, which enhances the clarity of the image
The more colours that can be displayed, making it possible to see more shades
for each colour
The faster 3D graphics can be processed
A video display adapter with 1MB of VRAM can support 16.7 million colours. The size
of a screen is measured diagonally from corner to corner in inches just like television
screens.
Microcomputers can have a screen size between 14 to 21 inches but 15inches screens
are common.
power, use a lot of space and are relatively heavy. The average weight of a CRT’s
screen is around 25-pound (12- kilogram).
3.4.3 Flat Panel Displays
These display screens are used by lightweight note books and pocket PCs. Compared to
CRTs, flat panel displays are much thinner, light-weight, and consume less power. They
have been used for years in portable computers, and now they are available for desktop
computers. Flat panel displays for a desktop microcomputer are expensive than their
equivalent monitor based on CRT technology although the price is dropping. Flat panel
monitors are wider than traditional monitors are; in fact a 15-inch. flat panel monitor
has almost the same viewing area as a 17-inch traditional monitor. Also, flat panel
displayed images are not always as good as CRT images, and flat panel images cannot
be clearly viewed from an angle. Flat panel displays consist of two plates of glass
separated by a substance. The two things that can be used to differential Flat panel
displays are:
1. The substance that is used to fill the space between the plates of glass. The
substances between the plates are either liquid-crystal display (LCD) or
electroluminescent (EL).
a) LCD: This consists of a substance called liquid crystal, the molecules of
LCD line up in a particular way. Under an applied voltage, the molecular alignment is
disturbed, which changes the optical properties of the liquid crystal in the affected area
to create an image.
b) EL: This display contains a substance that glows when it is charged by an
electric current. A pixel is formed on the screen when current is sent to the intersection
of the appropriate row and column. The combined voltages from the row and column
cause the screen to glow at that point.
2. The arrangement of the transistors in the screens. The way transistors are
arranged in the screen of flat panel display gives rise to either active-matrix or dual-scan
displays.
a) Active-matrix display: Also called thin-film transistor (TFT) display, or TFT
LCD. The LCD is made from a large array of liquid crystal cell with one cell per pixel.
Each pixel on the screen has TFT. Voltage applied selectively to these cells produces
the viewable image. They are much brighter and sharper than dual-scan screens. They
are viewable from wider angles than images produced by most dual-scan screens, which
is difficult to view from any angle other than straight on. They are more complicated
and thus more expensive.
b) Dual-scan display: Also called passive-matrix display. Where one transistor
controls a whole row or column of pixels. They have good contrast for monochrome
(one-colour) screens but the resolution is weaker for colour screen. The advantage is
that dual-scan displays are less expensive and use less power than active-matrix
displays.
c)
2. Dot pitch: This refers to the distance between each pixel or dot on the screen,
and is measured in millimeters (mm). The smaller the dot pitch, the closer the dots, and
the sharper or crisper the image is. If you’re in the market for a monitor try to find one
with a 0.28 mm or less. A 0.28mm dot pitch means dots are 28/100ths of a millimetre
apart. Generally, a dot pitch of less than 0.31 will provide clear images. A display’s dot
pitch is an integral part the monitor’s design and so cannot be altered. Multimedia and
desktop publishing users typically use .25 mm dot pitch monitors.
3. Refresh rate: Refresh rate is the number of times per second that the pixels are
recharged so their glow remains bright. Refresh is necessary because the phosphors
hold their glow for just a fraction of a second. The higher the refresh rate, the more
solid the image looks on the screen that is, it doesn’t flicker. The refresh rate should be
at least 72 Hertz (Hz).
4. Colour depth: This is also known as bit depth. Colour depth means:
The number of distinct colours that can be displayed on the monitor at one
time.
The number of bits used to store information about each pixel
Assigning 8 bits of VRAM to represent each pixel results in 28=256 different colours
hence a 8-bit colour has a colour depth of 256.
Colour: This display screens, also called RGB monitors (for red, green, blue),
can display between 16 colours and 16.7 million colours, depending on their type.
Super video graphics array (SVGA): This supports 256 colours at higher
resolution than VGA. SVGA has two graphics modes: 800 × 600, pixels and 1024 ×
768. SVGA is called 8-bit colour. Most new computer systems offer SVGA.
Super XGA (SXGA): This widely used de facto 32-bit, True color standard.
The resolution is 1280×1024. Some manufacturers, who think that the de facto industry
standard was Video Graphics Array (VGA), termed SXGA as the Extended Video
Graphics Array (XVGA).
Ultra XGA (UXGA): is also a 32-bit True color standard with a resolution of
1600×1200.
The more colours and the higher the refresh rate and the resolution, the harder the
display adapter has to work, and the more expensive it is. And the higher the setting,
the slower the adapter may operate. Also for a display to work, video display adapters
and monitors must be compatible. The software of your computer and the video display
adapter must also be compatible. Thus, if you are changing your monitor or your video
display adapter, be sure the new one will still work with the old. Most monitors today
can accommodate resolutions greater than SVGA, depending on the video card
connected to them.
The heat generated by computers and other equipment can make the air seem drier, and
some contact lens wearers find this uncomfortable. If you have this problem but don’t
want to change to spectacles, you can try blinking more often or using tear substitute
drops. Where the air is dry try to increase the humidity.
Headaches may result from several things that occur with VDU work, such as: screen
glare, poor image quality, a need for different spectacles, stress from the pace of
work, anxiety about new technology, reading the screen for long periods without a
break, poor posture, or a combination of these.
Monitors emit both visible light, which enables us to see the screen, and other forms of
electromagnetic radiation which can be harmful above certain levels. However, the
levels of radiation emitted from monitors are well below the safe levels set out in
international recommendations.
Self-Assessment Question
Exercise 3.1
1) An Output Device converts………………into……………………
2) Explain the term Refresh Rate?
3) State two (2) factors that affect the speed of printing?
4) Mention 3 advantages of a Flat panel display over a Cathode Ray Tube?
5) What distinguishes impact printers from non-impact printers?
6) Mrs. Broni has just bought a new printer for her company, state the various ways
through which she can connect this printer to computer system?
7) Define the following acronyms: TFT, VDU, VGA, and LCD?
Objectives
At the end of the section, you should be able to:
(a) differentiate between the System Unit and the Central Processing
Unit (CPU);
(b) describe a system unit and the mode of connection of external
devices;
(c) identify and describe the various components housed by the system unit;
(d) list the differences between RAM and ROM.
(e) list the component of the CPU
(f) list the three principal power protection devices that can be
connected to the PC
(g) explain the process the CPU goes through before processing data
that via register, cache, RAM etc.
(h) list the various kinds of memory Register, cache, RAM, ROM
and CMOS
Now read on ..
Every component in the system unit connects directly to the system board. It is wealth
noting that, this board contains the processor, main memory, support circuitry, bus
controller, connectors, etc. The motherboard defines the computer's limits of speed,
memory, and expandability.
The power supply is the device that converts power from AC (220-240volts) to lower
DC voltages (typically 5-12 volts) to run the computer. The power supplies to PC are
rated by wattage. The more devices attached to the computer, the greater the amount of
watts the power supply should provide. The typical PC has a power supply rated at 150
or 220 watts. More powerful systems may require a power supply of 220 or 250 watts.
Because electricity can generate a lot of heat, there is a fan inside the power supply,
which keeps it and other component from becoming too hot. This fan is responsible for
the noise you hear when the computer is running. The power supply is design to blows
when too much power is supply into it. This is to ensure that the rest of the system is
not damage. Because the AC outlet can be quite uneven, the computer system should
be connected to a power protection device, which is in turn plugged into the wall outlet.
The three principal types are surge protectors and UPS (uninterruptible power supply)
units and voltage Regulator
In microcomputers, the central processing unit (CPU), also called processor is contained
on a single chip called the microprocessor. Because of its importance it has been
described as the “heart”, or the “brain” or the “engine” of the computer.
Microprocessors contain transistors which are electric switches that either allow or
prevent the passage of electric current.
The CPU is the part of a computer in which arithmetic and logical operations are
performed and instructions are decoded and executed.
The CPU controls and directs the operations of the computer using both external and
internal buses. The processor contains the electronic circuits that actually cause
processing to occur by interpreting (decoding) and executing the instructions to the
computer, and controlling the input, output and storage operation of the computer. The
processor is contained within a cartridge that plugs in to the system board. The CPU
consists of the Arithmetic and logic Unit (ALU) and the control unit.
Most personal computers today use microprocessors of two kinds i.e. those based on the
model made by Intel and those made by Motorola. Motorola-type chips are made for
Apple Macintosh computers whilst Intel-type chips are used by manufactures such as
Compaq, Dell, Gateway, Hewlett-Packard and IBM.
Intel created the first microprocessor in 1971 with the introduction of a chip called
4004. Intel-Compatible processors come from manufacturers such as Advanced Micro
Devices (AMD) and Cyrix.
Other variations of the above operations are Not Equal to (<> or !=), Less than or
Equal to ( <=), and Greater than or Equal to (>=).
In actual fact CU directs the step-by-step operation of the entire computer system.
4.4.3 Coprocessors
Modern computers may have a number of processors in addition to the main processor
called coprocessors. Each of these coprocessors is dedicated to a special job thus speed
up the operation of the computer. Two common examples are math and graphics
coprocessor chips.
4.5 Memory
The system memory is the internal storage areas in the computer. We use term memory
for data storage that comes in the form of chips, whiles the word storage usually refers
to memory that exists on tapes and disks. The memory accepts data from an input
device during processing, supplies instructions to the CPU, and sends the computed data
to an output device. Because of the important role the system memory plays in the
processing of information in the computer, more memory is needed.
The Main memory is attached to the processor via its address and data buses. Each bus
consists of a number of electrical circuits. Each transaction between the CPU and
Any software, program and data should be loaded into RAM before it can be used. The
RAM is used for the following:
To hold data for processing
To hold instructions (program) for processing the data
To hold data that has been processed and waiting to be sent to a peripheral
device.
Different computer programs have different RAM requirement, which means different
RAM capacity or size. Therefore it is important to know the capacity of your RAM
before you install and use the software for optimal performance. To increase the
memory capacity to your computer, you simply add more RAM modules to the
motherboard. The common RAM technologies used in the modern PC are Static
Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
SRAM: SRAM is made of transistors. It is used primarily for cache. SRAM is more
expensive and requires about four times the amount of space for a given amount of data
than DRAM, but, unlike DRAM, does not need its power to be refreshed and is
therefore faster to access the data it is holding. A typical access time for SRAM could
be 25 nanoseconds while that for DRAM could be about 60 nanoseconds for dynamic
RAM.
SRAM is used mainly for the level-1 and level-2 caches that the microprocessor looks
in first before looking in DRAM. The original PC and XT, as well as some notebook
computers, use SRAM chips for their memory.
DRAM: DRAM stores information as charges in very small capacitors. DRAM is less
complex and cheaper to manufacture than SRAM. Because DRAM uses capacitors
instead of transistors, it needs to use a constant refresh of electrical signal to keep the
information in memory and hence the dynamic. A DRAM must be refreshed about
every 15 microseconds. Because of the need to refresh DRAM, it makes them to be less
reliable SRAM. DRAM requires more power than SRAM for refresh signals, and
therefore is mostly found in desktop computers. The DRAM technology allows several
memory units, called cells to be packed with very high density. Therefore, these chips
can hold very large amounts of information.
Other variations of DRAM are:
1. Synchronized DRAM (SDRAM) is an enhanced memory that is replacing
traditional DRAM. The memory access cycle is synchronized with the main
processor clock, thereby eliminating wait time between memory operations.
giving the processor a small amount of register to used, and then having it read in and
write to main memory in "spare" time, the processor can operate at full speed most of
the time. If anytime the processor wants to process data it has to locate that data in
RAM then the processor will be idle. Therefore, the cache was implemented to act as a
temporary high-speed holding area between the RAM and the CPU. The computer has
been designed is such a way that anytime the processor wants to work on data in
memory location say A it will read the block of data that include A. This block of data
read would be dumped in the cache from which the processor will pick A for
processing. Assuming the next data to be processed is B, which happens to be in the
same block as A, then this data would already be in the cache. This is because the block
that include A also has B and was read into the cache when the processor processing A.
Hence the cache is referred to as the memory that is used to store the most frequently
accessed information. If the processor finds the data it wants in the cache it is known as
“cache hit” else it is known as “cache miss”. Whenever, there is cache miss, the
processor looks for the data in this order: RAM, disk cache, hard disk and removable
disks if any.
When data is loaded from main memory to the cache, it will have to replace something
that is already in the cache. But before this happens, the cache determines if the
memory that is going to be replaced has changed. If it has, it first saves the changes to
main memory, and then loads the new data.
Virtually all general-purpose computers use a larger amount of RAM and a smaller
amount of ROM. On most PCs, the ROM normally contains the BIOS (Basic
Input/Output System). The BIOS is codes required to control the keyboard, display
screen, disk drives and other peripherals. Therefore some people refer to the ROM as
ROMBIOS.
It is very inconvenient to remove a ROM every time it needs to have the software that it
contains to be the upgraded. It is difficult and can be dangerous. Therefore, these
various types of ROM are very useful.
Hence CMOS can store information that is permanent but changeable. This makes
CMOS to have a property that lies in between RAM (which is temporal but changeable)
and ROM (which is permanent but unchangeable). In other words the content CMOS is
more permanent than RAM but less permanent that ROM.
The CMOS chips can store about 64 KB of data. However, to store the data needed to
boot a computer requires only a very small amount of memory about 128 bytes. If the
data stored on the CMOS is different from the hardware it is keeping track of, the
computer, or part of it will probably not work. For example, if the hard disk drive
information is incorrect, the computer can be booted from a floppy disk, but the hard
disk drive might not be accessible. The technician or owner will have to reset the
CMOS value of any device to the correct value before that device of the computer can
be used if it is not properly defined in the CMOS registry. If anytime you switch on the
computer, you have to manually enter the CMOS values for each of its components;
then the CMOS battery needs to be changed. The information contained in a CMOS
chip will depend on the manufacturer. Typically, CMOS contains at least the following
information:
Floppy disk and hard disk drive types,
CPU
RAM size
Date and time, which is updated by a Real Time
Serial and parallel port information
Plug and Play information
Power Saving settings
To access the CMOS setup program, you have to consult the User manual that came
with your computer or look carefully for it when the computer is being booted. For
some computer you press the Del key immediately you boot it whilst other you press
certain key or keys.
4.8.1 Bus
The bus, also known as bus line in a computer is like a highway for bits transfer within
the computer. It is the pathway that connects the various system components within the
computer. It can also be defined as the collection of wires through which data is
transmitted from one part of the computer to another. The CPU and other components
on the motherboard are linked by the bus lines. When you look at the motherboard you
will be able to recognize the bus by all the golden lines of wires running all over it. A
64-bit bus is described as 64 wires or lines in the motherboard.
Bus lines consist of three parts:
Data bus, which is used to transfer the actual data.
Address bus, which is used to transfer information concerning the
location of the data in memory (which is the address).
Control bus, which is used by the CPU to control which operations the
devices attached should perform, that is either read or write.
Bus lines have different capacities and the capacity of a bus is measured using two
parameters such as speed and size. The speed of a bus is how much data it can carry in
a second. This is usually measured in Megahertz (MHz). The greater the speed the more
powerful and faster it moves data along the path, which will result in applications
running faster.
The size or width of a bus is how many bits it carries in parallel or simultaneously.
Common bus sizes are: 4-, 8-, 12-, 16-, 24-, 32-, 64-, 80-, 96-, and 128-bits. The size of
a bus will determine the number of separate steps that a data can be transmitted from
one part of the computer to another. For example, an 8 bytes (64 bits) number (such as
98765432 or and of 8 numbers) in memory can be transmitted in using different number
of separate steps such as eight steps, four steps, two steps and one step when using an 8-
, 16-, 32-, and 64-bits bus respectively. Hence the wider the bus, the fewer number of
transfer steps required and the faster the transfer of data. Most PCs today use a 64-bits
bus.
From the above definition, we can say that if a bus has a speed of 100 MHz and a width
of 32 bits then the bus can transfer 3,200,000,000( i.e. 32 ×100, 000,000) bits of data
per second.
components or units of the processor such as ALU and CU. The size of the
Internal bus is the same as CPU’s word size or word.
2. An external bus is a bus outside of the processor (but inside the
computer), moving data, addresses, and other information between the processor
and main memory.
A computer comes with several types of I/O bus, also known as Expansion bus or Bus
Standards. Peripherals are connected to the I/O buses in either of two ways:
1. Through a port on an adapter card that is inserted into an expansion slot
such as Network Card, Internal Modem, TB Card etc.
2. Through a port that does not need an expansion slot such as Mouse,
Keyboard, Video adaptor, parallel serial, USB and firewire etc.
Industry Standard Architecture (ISA) bus: The ISA bus originated in the early 1980s
at an IBM development lab in Boca Raton, Florida but is currently used for IBM PCs
and PC clones. The original IBM Personal Computer introduced in 1981 included the 8-
bit ISA bus that ran at 4.77 MHz. In 1984, with the introduction of the IBM AT
computer (which used the 80286 processor, introduced by Intel in 1982), ISA bus was
expanded to a 16 bit bus that ran at 8.3 MHz. Examples of devices that are connect to
ISA bus are mouse, internal MODEM, sound card, and low-speed network card.
Micro Channel Architecture (MCA) bus: The MCA bus is a 32-bit bus introduced in
1987 by IBM with the PS/2 computer that used the Intel 80386 processor. IBM
attempted to license MCA bus to other manufacturers, but they rejected it. IBM
continues to use a modern variation of MCA in some of its upper end of its PS/2 line,
the RS/6000 workstations, the AS/400 series and in the 370 architecture machines. This
bus architecture covers an entire line of computing products, from PCs to mainframes.
Peripheral Component Interconnect (PCI) bus: The PCI bus is a bus created by Intel
in 1993. PCI is available in both a 32-bit version running at 33 MHz and a 64 bit
version running at 66 MHz. PCI supports automatic configuration (for “plug and play”).
It was developed to meet the video demand of graphical user interfaces. PCI is a high
speed bus that is over 29 times faster than the ISA buses. The PCI bus has all the signals
of the ISA bus. This allows a PCI adapter card to emulate older equipment. It is
gradually replacing the ISA architecture and is widely used to connect the CPU,
memory and the expansion boards.
Accelerated Graphics Port (AGP) bus: This bus was designed by Intel and is about 2
to 4 times as fast as the PCI bus. The AGP is dedicated to the acceleration of graphic
performance and widely used for graphics and 3-D animations. It is gradually replacing
the PCI architecture.
Universal Serial Bus (USB): This is a serial bus standard that does not need devices to
be connected to the system unit through the Expansion slot. It was designed in Jan 1996
to replace all older serial and parallel ports on personal computers since these were not
properly standardized. Since it is a serial bus, it width is 1-bit with speed up to 480
Mbit/s.
IEEE 1394: Originally created by Apple and standardized in 1995 as the specification
IEEE 1394 High Performance Serial Bus, IEEE 1394 is very similar to Universal Serial
Bus (USB). Other popular proprietary names for IEEE 1394 are Sony iLink and Apple’s
Firewire. Even though this bus is commonly known as Firewire, IEEE 1394 is the
official name for the standard.
PCI Express: This bus expands on and doubles the data transfer rates of original PCI.
Initial bit rates for PCI Express about 200MB/s (Megabytes). PCI Express was
developed so that high-speed interconnects such as IEEE 1394b, USB 2.0, InfiniBand
and Gigabit Ethernet would have an I/O architecture suitable for their transfer high
speeds. PCI Express, also known as 3GIO (for third-generation Input/Output) is
compatible with existing PCI systems.
A port is a connecting socket on the outside of the system unit. Cables connect input
and output devices to ports. In computer hardware, a port serves as an interface between
the computer and other computers or devices. Physically, a port is a specialized outlet
on a piece of equipment to which a plug or cable connects. Hardware ports may be
physically male (contains protruding pins easily break if matching cable ends does not
fit correctly) or female (contains holes to which the pins from the end of the cable
enter).
Some ports, like the mouse and keyboard ports are for specific devices. Others, like
those listed below, can be used for a variety of different devices.
Serial ports are used for a wide variety of purposes. They are used to
connect a mouse, keyboard, modem, and many other devices to the system unit.
Serial ports send data one bit at a time and are very good for sending information
over a long distance
Parallel ports are used to connect external devices that need to send or receive a
lot of data over a short distance. These ports typically send eight bits of data
simultaneously across eight parallel wires. Parallel ports are mostly used to connect
printers to the system unit.
Accelerated graphics ports (AGPs) are used to connect monitors. They are able
to support high-speed graphics and other video input.
Universal serial bus (USB) ports are expected to gradually replace serial and
parallel ports. They are faster, and one USB port can be used to connect about 127
devices such as mice, modem, keyboard, etc to the system unit.
Fire Wire ports are the newest type. They are even faster than USB ports and
are used to connect high-speed printers and video cameras to the system unit.
Currently 63 devices can connect to the system unit through this port.
Self-Assessment Questions
1. The System Unit is also known as Base Unit or Central
Processing Unit (CPU). True / False.
2. List the main components housed in the System Unit.
3. The motherboard defines the __________, __________ and __________
limits of the computer.
4. What is the purpose of the fan inside the power supply?
5. Briefly describe the Microprocessor.
6. Classify the following under temporal/volatile OR permanent memory:
i. RAM
ii. CMOS
iii. SRAM
iv. DRAM
v. Cache
vi. ROM
7. Explain the term “cache miss”. What happens when a “cache miss”
occurs?
8. The Arithmetic and Logic Unit and the Control Unit are main
components of the motherboard. True / False.
9. Differentiate between the following:
i. Serial port
ii. Parallel port
iii. AGP
iv. USB
v. Fire wire
10. Which bus can be found in computers ranging from microcomputers to
mainframes?
11. Why did MCA not used in non – IBM computers (or IBM compatibles)?
Objectives
At the end of this session, you should be able to:
1. explain the purpose of secondary storage medium;
2. identify the two primary types of magnetic disk systems and
describe how they work.
3. list the various types of secondary storage media available;
4. discuss the various types of optical disc systems available and how they differ
from each other and from magnetic systems.
5. explain why some modern microcomputers do not include a floppy drive.
6. list the various types of Removable disks.
The following are the characteristics of some magnetic tapes used in computers:
1. Magnetic Tape Reels: Magnetic tape reels are used with minicomputer and
mainframe systems. They are ½-inch wide and ½-mile long and stores 1,600 to
64,000 characters to the inch. Such tapes are run on magnetic tape drives or
magnetic tape units.
2. Magnetic Tape streamers: This is also called backup tape cartridge unit. A
cartridge tape unit using ¼-inch cassettes (QIC or Quarter-Inch Cartridge
Standard) can store up to 20 GB. Another form called digital audio tape (DAT),
which uses 2-inch by 3-inch cassette and can store 2 to 24 GB of information.
DATs are used for very high-quality audio recording and data backup. More
expensive digital linear tape (DLT) provides capacities from 10 to 70 GB.
The early floppy disks were 8 inch or 5 1 4 inch, and stored a relatively low volume of
data. Nowadays, the most common size of diskette is the 1.44 MB 3 ½-inch disk. These
disks are typically labeled 2HD, which means “two-sided, high density”. On a floppy
disk, data is recorded on a disk in rings called tracks, which are closed concentric
circles. Each track is divided into sections known as sectors. Tracks and sectors are used
to locate data stored on a floppy disk. The data on magnetic disks can be destroyed by
external magnetic fields at room temperature. Some disks are manufactured without
tracks and sectors in place. They must be adapted to the type of microcomputer and disk
drive by a process called formatting or initializing. (Both tracks and sectors of the disk
are invisible.)
1
American Standard Code for Information Interchange
2
Extended Binary-Coded Decimal Interchange Code.
Modern floppy disk drives are double-sided drive since they have two read/write heads.
If one head of the disk drive uses the disk's top surface, while the other head uses the
disk's button, so that the drive can use both sided of the disk simultaneously. This kind
of drive is called a double-sided disk drive. The drive puts information onto the disk by
first using track 0 of the main side (bottom), then track 0 of the flip side after which
track 1 of the main side is used then track 1 of the flip side and so on. If the disk drive
has just one read-write head only one side of the disk is usable. This kind of drive is
called a single-sided disk drive.
To read and write to a disk properly, the heads must be in direct contact with this media.
Therefore very small particle such as dust, smoke, fingerprints, or hair can cause
problems with reading and writing the disk.
The normal speed of rotation of the spindle meter of a floppy disk drive is between 300
to 360 rpm. The longest retrieval time is governed by a single rotation of the disk such
that the desired data is underneath the head. If a rotational speed of 360 revolutions per
minute (rpm), which is typical, (6rev/sec) then 1/6 the second would be the worst time
needed to find the data and the average time (called rotational latency) is half of 1/6th
sec. The actual time for performing the read and write known as the access time is
made of a combination of the seek time (moving the head to the data), the rotational
latency3 (the head getting its act together) and the read/write time (the time taken for
the data transfer to take place).
Floppy drives are of two types, which are Internal and External floppies.
Internal Floppy drive comes with the Computer and is located inside the System unit.
Most old computers have this drive. Due to the low capacity of the floppy disk, most
modern computers do not come with internal floppy drive but you can buy an External
floppy drive and attach it to a port behind the System unit.
3
also known as rotational delay. The time taken for a disc to rotate from the current position (on the
required track) to the position containing the first required data block.
tracks, because there are ten heads. Therefore, another method which is used to locate
data stored on the computer is cylinder.
(A picture of Cylinder)
The read/writ head of the hard disk is permitted to fly about 10 to 25 millionths of an
inch above the surface of a platter rotating at 3600 to 7200 rpm. [Hard disks are
expensive, faster and more reliable and have greater storage capacity than the floppy
disk.]
Since the read-write head rides on a cushion of air about 0.000001 inch thick and when
they come into contact with obstacles such as smoke particle; fingerprint, dust, or
human hair., they could cause what is known as a head crash. Head crash is a hard disk
failure in which a read/write head comes into contact with the surface of the platters,
damaging the magnetic coating in which data is recorded. More damage occurs when
the head picks up materials on the surface. A head crash can also be caused by
mechanical failure or heavy shaking of the disk drive. If the crash occurs on a directory
track, the whole disk may become unreadable instantly. Head crash means some or all
of the data on the disk is destroyed.
The track length on the outside of the disk is considerably longer than those on the
inside, but there are the same numbers of sectors in a track. Therefore the packing
density of data varied making the inner tracks to be packed much more densely than the
outer tracks. This is wasteful of space on the outer edges, but it makes the system
considerably simpler to operate because each sector regardless of its position on the
disk is always under the head for the same length of time. This makes the data transfer
rate to be constant regardless of the sector’s position. As the disk rotates with constant
speed, the data transfer rates at the outer edges would be much greater if this variable-
packing density system were not to be used. On CD – ROMs, the data packing density
is the same and the rotational speed of the CD is varied.
Hard disk packs: They are removable storage devices used to store massive
amounts of information. Their capacity far exceeds the other types of hard
disks. Hard disk packs consist of several platters aligned one above the other.
There is space between the disks to allow the access arms to move in and out.
Each access arm has two read-write heads with one head reading the disk
surface above it while the other reads the disk surface below it. A disk pack
with 11 disks provides 20 recording disk surfaces. This is because the top and
bottom outside surfaces of the disk pack are not used. Hard disk packs are
primarily used with minicomputers and mainframes. All the access arms move
in and out together. However, only one of the read-write heads is activated at a
given moment.
Hard disk cartridge: They are easy to remove just like cassette from a VCR.
The amount of storage available to a computer system is limited only by the
number of cartridges. They are particularly useful to protect or secure sensitive
information. Other uses include backing up the contents of the internal hard
disk and providing additional hard disk capacity. Some well-known hard disk
cartridges are Jazz from Iomega and SparQ from SyQuest.
Disk caching: This improves hard disk performance by anticipating data needs.
It requires a combination of hardware and software. This is a portion of a
computer’s RAM set aside for temporarily holding information read from disk.
A disk cache is used to hold information that either has recently been requested
from disk or has previously been written to disk. If the required information
remains in a disk cache, access time is considerably faster than if the program
must wait for the disk drive mechanism to fetch the information from disk. The
overall system performance is often increased by as much as 30 percent.
To increase the life span of an Optical disc, the guideline must be followed:
Handle it only at the hub or outer edge and don't touch the shiny surface with
your fingers.
Store in a protective case when not in use.
Don't bend the disc when taking it out of the case, and be careful not to scratch
the disc when placing it in the case or in the player tray.
Make certain the disc is properly seated in the player tray before you close it.
Keep discs away from radiators, heaters, hot equipment surfaces, direct sunlight
(near a window or in a car during hot weather), and other destructive forces.
The DVD specification recommends that discs be stored at a temperature
between -20 to 50 °C (-4 to 122 °F) with less than 15 °C (27 °F) variation per
hour, at relative humidity of 5 to 90 percent.
Write on the top surface with special markers only.
Artificial light and indirect sunlight have no effect on replicated DVDs since they are
made of polycarbonate, polymer adhesives, and metal (usually aluminum or gold), none
of which are significantly affected by exposure to light. Exposure to bright sunlight may
affect recordable DVDs, specifically write-once DVDs (DVD-R and DVD+R) that use
light-sensitive dyes. Magnetic fields have no effect on DVDs, hence it is alright to leave
them sitting on your speakers.
The figure below is a list of common data transfer speeds for CDs.
The x is the original speed of transferring data on CD, which is 150 kilobytes per
second (kb/s).
CD-ROM: This stands for Compact Disc-Read Only Memory. Read-Only means it
cannot be written on or erased by the user. Therefore the user has access only to the
data copied into it by the creator of the content. CD-ROMs are used to distribute large
databases, references and large software application packages. Microsoft Windows 95
for example was supplied on a single CD-ROM or on 38 floppies. Installing software
on a hard disk from a CD-ROM is much faster and easier than doing that from floppies.
The user simply starts it up, enters any required information, and comes back later; it's
no longer necessary to feed disk after disk into the computer. A CD-ROM drive can
only read CD-ROMs, CD-Rs and CD-RWs.
CD-R: This stands for CD-Recordable and is also known as WORM meaning Write
Once, Read Many times. It is the type of CD that allows users with CD recorders (CD-
R drives) to write data, only once, onto this specially manufactured disk that can then be
read by a standard CD-ROM drive. Once the data is recorded; it can not be written over
(changed) again the CD-R disc to become a CD-ROM. A CD-R drive can read/write on
CD-Rs but can only read CD-ROMs
CD-RW: This stands for Compact Disk Re-Write and also known as erasable optical
disks. This format allows users to erase data so that the disk can be used over and over
again. Therefore, unlike the disk surface of CD-R that of CD-RW is not permanently
altered when data is recorded. Because they can be changed, CD-RWs are often used to
create and edit multimedia presentations. CD-RW drives can also accept CD-R disks
and CD-ROMs. CD-RW comes with three different speed ratings:
1. One speed for write-once operations
2. Another speed for re-write operations
3. Still another speed for read-only operations.
The speeds are typically listed in the order mentioned above such as Write Speed/Re-
write Speed/Read Speed. Hence when you see CD-RW disk or drive with the
inscription such as 12x/10x/32x CD drive it means the system can write to CD-R disks
at 12x speed, re-write to CD-RW discs at 10x speed, and read from CD discs at 32x
speed.
The DVD format uses one of three storage techniques to store huge amount of data.
These techniques are:
1. The packing of the pits of DVD disc is closer together making it denser.
2. Using two layers of pits. For this technique to work, the lower layer of pits is
semitransparent so the laser can read through it to the upper layer. This
technique doubles the capacity of the disc.
3. Using both sides of the disc for some DVDs hence they are known as double-
sided. This means you must remove the DVD-ROM and turn it over to read the
other side.
The figure below shows how the DVD storage capacity of 4.7 to 17 GB comes about.
DVD-ROM: This was the first DVD standard to hit the market and is a read-only
format. The video or game content is burned onto the DVD once and the DVD will run
on any DVD-ROM-equipped device.
DVD-R: Is a DVD recordable format. A DVD-R has a larger storage capacity than a
CD-R, typically 4.7 GB instead of 700 MB, although the capacity of the original
standard developed by DVD Forum (among which Pioneer Corporation, played a leading
role) was 3.95 GB. Pioneer has also developed an 8.54 GB dual layer version, which
appeared on the market in 2005. A DVD-R can be written to only once but read infinite
number of times.
DVD+R: is a writable optical disc with 4.7 GB of storage capacity. The format was
developed by a coalition of corporations, known as the DVD+RW Alliance(which
includes Philips), in mid 2002. There is no much difference between DVD-R and
DVD+R. hence some DVDs from Philip can have DVD+R or DVD-R inscription on it
such as the below.
DVD-RW/ DVD+RW: These are the rewritable optical disc with equal storage
capacity to a DVD-R/DVD+R respectively. Both DVD-RW and DVD+RW discs can be
rewritten about 1,000 times hence commonly used for non-permanent data, such as
backups. DVD+RW support random write access, which means that data can be added
and removed without erasing the whole disc and starting over. This means that
DVD+RWs can almost be treated like removable hard disks. On the other hand, DVD-
RW is more like CD-RW since any time there is the need to change data, one must
erase the whole disc and start over again. Due to the way rewrite is done it is best to
used DVD+RW drive to rewrite on DVD+RW disc likewise DVD-RW drive to rewrite
DVD-RW disc. A hybrid drive known as DVD±RW can handle both DVD+RW and
DVD-RW disc at the same time.
advantages over other portable storage devices, particularly the floppy disk. They are
more compact, generally faster, hold more data, and may be more reliable (due to their
lack of moving parts) than floppy disks. These types of drives use the USB mass storage
standard, supported natively by modern operating systems such as Linux, Mac OS X,
and Windows.
Fig: 5.11: Different types of pen drives; (b) A pen drive in use
Self-Assessment Questions
Exercise 2.5
1. Distinguish between magnetic and optical storage devices
2. List five means of prolonging the life span of an Optical disc.
3. If you have an option to choose between DVD-RW and DVD+RW, which
one will use pick and why?
4. Compare and contrast floppy and hard disk.
5. Compare and contrast CD and DVD.
6. Which of the following is needed in order to locate a data on a hard disk?
I. Sector Number II. Track Number III. Surface Number
IV. Cylinder Number
(a) All the above (b) I, II, III (c) I, II, IV
(d) II, III, IV
7. You can enhance the performance of your hard disk through ……………......
(a) Disk Caching (b) File compressing (c) Defragmention
(d) All the above
8. Which of the following uses flash memory?
(a) Digital Camera (b) Smart phones (c) All the above
(d) None of the above
9. The Life span of all storage media are the same. True / False? ______________
10. Zip drives are the newest storage medium that would eventually replace pen drive
in the near future. True / False? ______________
In this session, we shall look at system software and the programs that
constitute the system software. We shall also look at how they are used
to make the use of the computer, very easy and comfortable for the
user.
Objectives
At the end of this session, you should be able to:
(a) define what a system software is
(b) list the constituents of the system software
(c) explain the tasks of the operating system
(d) list and explain the classification of Operating systems
(e) explain what utility programs are and list examples
(f) explain how an antivirus works.
As we mentioned earlier, we buy computers mainly because of what we can run on it.
But before we can utilize any application on the computer or use the computer
efficiently, the system software must be in place. The system software consists of the
following:
Operating System
Utilities
Device drivers
Now read on …
Single user with single tasking: This operating system is designed to manage the
computer so that one user can effectively do one thing at a time. The Palm OS for Palm
handheld computers is a good example of a modern single-user, single-task operating
system.
Single user with multi-tasking: As the name implies, the single user can perform
multiple tasking or activities at the same time. All desktop operating system such as
windows, Unix/Linux, Mac OX etc can do this.
Multi-users
This is also known as time sharing. With this operating system, a single computer
processes the tasks of several users at different stations in round-robin fashion. The
computer will first work on one user’s task for a fraction of a second, then go on to the
next user’s task, and so on. Each user is allotted a slice of the computer’s time hence at
each time slice the processing capability of the computer is dedicated to each user. The
computer may rapidly switch back and forth among different tasks. The users are
generally unaware of the switching process. All minicomputers, mainframes, and
supercomputers are multi-user but most personal computers are not. A multi-user
system must clearly be multi-tasking.
Multitasking
This is the execution of two or more programs by one user concurrently on the same
computer with one central processor. You may be writing a report with a word-
processor, printing spreadsheet charts and playing music on the CD using CD player or
Windows Media player. The OS directs the processor to spend a predetermined amount
of time executing the instructions for each program one at a time. In essence, a small
amount of each program is processed, and then the processor moves to the remaining
programs, one at a time, processing small parts of each. This cycle is repeated until
processing is complete. The processor speed is usually so fast that it may seem as if all
the programs are being executed at the same time. Because processors work so much
faster than peripheral devices, it can accomplish several processing tasks while waiting
for, say, a printer to finish outputting a document. Microcomputer users working on a
system with multitasking capabilities will become familiar with the terms foreground
and background. If, for example, your computer is printing out your Advance Calculus
assignment while you are creating some graphs for your Data Analysis report, the
printing will occur in the background; that is, the processor will allocate less time to it
than what is in the foreground-the current application you are working in. Background
processing is non-interactive, low-priority processing; foreground processing is
interactive, high-priority processing. This is the type of operating system most people
use on their desktop and laptop computers today.
Multiprocessing
This is the processing done by two or more computers or processors linked together to
perform work simultaneously-that is, at precisely the same time. This can entail
processing instructions from different programs or different instructions within the same
program at the same time. Multiprocessing can be done in several ways. One is by co-
processing, whereby the controlling processor works together with coprocessors, each
of which handles a particular task, such as creating display screen graphics or
performing high-speed mathematical calculations. Many microcomputer systems have
co-processing capabilities. Another way to perform multiprocessing is by parallel
processing, whereby several full-fledged processors work together on the same tasks,
sharing the same memory. Parallel processing is often used in large computer systems
which are designed to keep running even if one of the processors fails. These systems
are called fault-tolerant system; they have many processors and redundant components
such as memory and input, output, and storage devices. Fault-tolerant systems are used,
for example, in airline reservation systems.
Server
This system is used to provide services, usually over a network, to potentially many
clients. Example, services are Web servers, file, mail, Domain Name System (DNS),
Dynamic Host Configuration Protocol (DHCP) and print servers.
Exercise
List the operating systems for these categories of computers Palm tops,
Desktops/Laptops, Minicomputers, Mainframes and Supercomputers.
Increase the size of virtual memory so that the operating system uses part of the
hard disk as primary memory. The effect is that more applications can be
accommodated in memory including those already in memory and the new one.
In the above-mentioned example four tasks are being performed at seemingly the same
time. But the processor, can execute one task at a time hence the operating system must
be able to schedule which task to perform at any given time using any of the scheduling
algorithms so as to simulate a situation that all the tasks are being executed
concurrently.
3. Facilitating Networking
Networking here is simply connecting computers together to share resources such as
computers, files (data and programs), printers etc. Each computer should have a unique
identifier such as Internet Protocol (IP) address so that information would be sent or
routed to the right machine. In the same vein, each user must be identified using a
unique identifier such as user id and a form of access controlling mechanism be
implemented so that each user know which resources he can access and which he
cannot.
4. Managing Files
The programs we want to run or the data we want to store are all in the form of files.
Through file management, we can copy files, delete files, sort files , move files, create
shortcuts to files , group files in folders, determine who has access to which file and
what kind of operation that can be performed on the file.
A CLI can generally be considered as processing the syntax of commands, which is the
grammar that all commands must follow. User enters the command in the prompt
displayed by the CLI. In most CLI, there is a history feature that enables you to view
and re-issue previous commands. This is done by pressing the up or down arrow keys.
Fig. 6.1: A
Windows XP’s
Command
Prompt
Graphical
User Interface
Graphical User
Interface
(GUI) is a way
by which users
interact with
the computer
system through images (icons, menus and windows) with the aid of the mouse. With the
mouse, the user points to icons (pictures) that may be files, folders and disks. The effect
of this could be the running (execution) of a program which may open a dialog box so
that the user enters some values and click an appropriate button (such as OK).
of which sectors of the disk are bad so that it will not store file there. Examples are
Scandisk, and Norton Disk Doctor.
Furthermore, enclosing an archive in another archive will not reduce but increase its
size. There are many compressing formats and hence if you used a file compression
program that uses a certain compression format to compress a file, you may need the
same program to uncompress it. Some archive formats are ZIP, RAR, LZH, ARJ, ZOO,
ARC, TAR, PAK, SQZ, HYP, WAD, GRP, CAB, ACE. UltimateZip, WinRAR,
PKWARE, Info-ZIP, Camunzip, EnZip, Winzip and ZipGenius are examples of file
compression and decompression programs.
Backup Utility
A backup utility allows users to make a copy of your entire disk or selected files on
your disk unto another storage medium for safe keeping. One of the rules in safe
computing is to have a regular back up your files. Even the most reliable computer has
the possibility to break down someday hence your data files which is very difficult to
come by in the event of accidental erasure or corruption must be duplicated if not
triplicated. Experts in Computer and Information security not only recommend that you
make two, or even three, backups of all your files but also you should keep these
multiple backups on On-site and Off-site. On-site backups are kept in the same location
as where the backup was made while Off-site backups are kept in different locations
from where the backup was made. You can back up files using operating system
commands, or you can buy a special-purpose backup utility. Backup programs often
compress the data so that backups require fewer disks. Most backup utilities have dual
usage: for backing up files and Restoring files when needed.
The three types of backup methods used are Full backup, Differential backup and
Incremental backup.
Full Backup
Full backups are also called Archival backup. Full backup is the starting point for all
other backups, and contains all the data in the folders and files that are selected to be
backed up. Because the full backup stores all files and folders, frequent full backups
result in faster and simpler restore operations. Remember that when you choose other
backup types, restore jobs may take longer.
It would be ideal to make full backups all the time, because they are the most
comprehensive and are self-contained. However, the amount of time it takes to run full
backups often prevents us from using this backup type.
A full backup should be performed weekly or monthly on production systems, along
with daily differential backups. A full backup should also be performed before any
major planned changes to a system. With increasing speed and capacity of backup
media, making overnight full backups is achievable. Full backups, if you have the time
to perform them, offer the best solution in data protection. Each full backup contains an
entire copy of the data. If the backup media were to be illegally accessed or stolen, the
hacker or thief would then have access to an entire
copy of your data.
The main advantage is that restoration of data is the fastest. The disadvantages are (1)
Backing up of data is the slowest, and (2) The storage space requirements are the
highest.
Differential Backup
A differential backup contains all files that have changed since the last full backup. That
is where it gets its name: it backs up everything that's different since the last full
backup.
In other words, if a full backup was done on Monday, Tuesday's differential will backup
all changed files since Monday's full backup Wednesday's differential will backup all
changed files since Monday's full backup including the files that have changed on
Tuesday.
If you perform the differential backup too many times, the size of the differential
backup might grow to be larger than the baseline full backup.
Use differential backup if you have a reasonable amount of time to perform backups.
The upside is that only two backup container files are needed to perform a complete
restore. The downside is if you run multiple differential backups after your full backup,
you're probably including some files in each differential backup that were already
included in earlier differential backups, but haven't been recently modified.
The advantages are (1) Restoration is faster than restoring from incremental backup, (2)
Backing up is faster than a full backup, and (3) The storage space requirements are
lower than for full backup.
The disadvantages are (1) Restoration is slower than restoring from full backup, (2)
Backing up is slower than incremental backup, and (3) The storage space requirements
are higher than for incremental backup
Incremental Backup
An incremental backup stores all files that have changed since the last backup (which
could be FULL, DIFFERENTIAL OR INCREMENTAL). When making an
incremental backup, only the files that have changed since the most recent backup are
included for backing up. That is where it gets its name: each backup is an increment
since the most recent backup. In other words, if a full backup was done on Monday,
Tuesday's incremental will backup all changed files since Monday's backup. However,
Wednesday's incremental will only backup files that have changed since Tuesday's
incremental backup. When restoring from incremental backup, you need the most recent
full backup as well as EVERY incremental backups made since the last full backup.
The Advantages are: (1) Backing up is the fastest and (2) The storage space
requirements are the lowest.
Scenarios
If you perform a full backup on Sunday and a differential every night, and the system
crashes on Thursday, you will only need to restore the full backup from Sunday and the
differential backup on Wednesday. In contrast, if you perform a full backup on Sunday
and incremental backups every night, when the system crashes on Thursday, you will
need to restore the full backup from Sunday along with the incremental backups from
Monday, Tuesday, and Wednesday.
Anti-virus
Malicious programs are any computer programs that act without user’s knowledge and
intentionally change the computer’s operation. Examples are viruses, worms, and
Trojan horses.
Antivirus software consists of computer programs that attempt to identify, prevent and
eliminate computer viruses and other malicious software (malware). Examples are
Norton Anti-Virus, Mcafee Anti-Virus, AVG Anti-Virus, Command Anti-Virus, PC-
cillin, Panda, Avast and so on.
1. Real-Time Scanning: This means the software will automatically run in the
background continuously until the system is shut down, monitoring and checking files
as they are opened or executed, and in some cases, checking e-mail as it is downloaded.
Some products check files and directories when they are opened through Windows
Explorer.
2. Virus Updates: The only good anti-virus program is the one that is up-to-date in
its viral definition. A good anti-virus should offer daily updates. Users should only buy
anti-virus products whose vendors offer free updates from their web-sites. Users may
also find that while some vendors include updates and/or upgrades as part of the
purchase price, others will charge a monthly or yearly license fee for the service.
3.
Self-Assessment Question
Unit Outline
Session 1: Introduction to Windows
Session 2: Word Processing Software
Session 3: Spreadsheet Software
Session 4: Database Software
Session 5: Presentation Software
Unit Objectives
At the end of this Unit, you should be able to:
1. Explain Word Processing Software and list examples
2. Identify common features of Word Processing software
3. Use Microsoft Word
4. Explain what spreadsheet software is with examples
5. Identify common features of spreadsheet software
6. Use Microsoft Excel
7. Explain database and functionalities of database applications
8. List examples of database application software
9. Use Microsoft Access
10. Explain what a Presentation Software is
11. Identify the basic Presentation Software features
12. Use Microsoft powerpoint
13. Explain desktop publishing, multimedia and webpage authoring
14. Use Microsoft frontpage
15. Explain educational software packages
16. State some examples of software packages
17. Explain the importance of educational software in the world today.
The most widely used operating system for desktop and laptop computers is the
Windows operating system. Developed by Microsoft, Windows provides a
graphical user interface (GUI) and desktop environment in which applications
are displayed in resizable, movable windows on screen to make it easier for
people to use their computers.
The first version was released in 1985. Since then, it has grown significantly, and it now
dominates the market.
Please be with us as we journey through the world of the Windows operating system.
Objectives
At the end of this section, you should be able to:
(a) switch a computer on and off
(b) log in to a computer with or without a password and log out of the computer
(c) identify common features of a Windows desktop
(d) know how to navigate through Windows using the mouse pointer; clicking, double
clicking, right clicking and scrolling.
(e) run programs on the computer
(f) open a window from the desktop or the start menu
(g) create and name folders on the computer
(h) delete objects from the computer temporarily and permanently.
One power cable connects the System Unit to the main power outlet (socket) on the wall while
another connects the Monitor also to the outlet. If the System Unit and
Monitor connect to a UPS (Uninterruptible Power Supply), the UPS is
required to be switched on before the computer receives power.
To power the UPS, the System Unit and the Monitor, Power Cable press on the power
button located on each of the devices.
Booting (also “Booting up”) is the process where a computer loads an operating system into the
computer's main memory or random access memory (RAM). Once the operating system is
loaded (and, for example, on a PC, you see the initial Windows desktop screen), it's ready for
users to run applications. Sometimes you'll see an instruction to "reboot" the operating system.
This simply means to restart the computer which leads to reloading the operating system.
The Welcome Screen shows immediately after booting if more than one user account is found on
the computer or the single account on the computer requires some authentication in the form of a
password before the user can use the computer.
A user would usually select the preferred user by clicking on the small picture next to the
username. If a password is required, the user must key (type) in the password in the correct case
(upper case or lower case) to use the computer. This entire process is generally referred to as
logging in.
Drives
Drives are devices used to store data. Most computers have at least two drives: a hard drive C:
(Which is the main means of storage) and a floppy drive A: (which stores smaller volumes of
data (1.44 Mb) on 3.5" disks - floppy disks). The hard drive is typically designated the C: drive
and the floppy drive is typically designated the A: drive. If you have an additional floppy drive,
it is typically designated the B: drive. Drives are lettered as and when they are identified by the
computer with A:, B:, and C:, usually reserved.
Please take note that drives can also be labelled in addition to the drive letters. The default label
is usually “local disk” but can be renamed.
Folders
Folders are used to organize the data stored on your drives. Think of your drives as filing
cabinets. You want to sort your filing cabinets with folders that store different files. The files that
make up a program are stored together in their own set of folders. You will want to organize the
files you create in folders. You will probably want to store files of a like kind in a single folder.
Directory
A Directory is the path given to a folder on a drive. For example a text file called PhoneNumbers
is located in the My Documents directory on the C: drive. It would therefore read "C:\My
Documents\PhoneNumbers.txt"
Icon
An Icon is a graphic image. Icons help you execute commands quickly. Commands tell the
computer what you want the computer to do. To execute a command by using an icon, double-
click on the icon.
Hierarchy
Windows organizes folders and files in a hierarchical system. The drive is the highest level of the
hierarchy. You can put all of your files on the drive without creating any folders, but that is like
putting all of your papers in a file cabinet without organizing them into folders. It works fine if
you have only a few files, but as the number of files increases, there comes a point at which
things become very difficult to find. So you create folders and put related material together in
folders.
1. A diagram of typical drive organization is shown here.
2. At the highest level, you have some folders and perhaps some files. You can open any of
the folders and put additional files and folders into them. This creates a hierarchy.
The left mouse button is used to open programs and to select items
The right mouse button is used to open a sub menu to get other options
The middle mouse button is a wheel which can be used to scroll and can be clicked as
well for additional purposes.
Mouse Operations
Click: The mouse pointer (also known as cursor) is moved onto the desired object (such
as a menu, a button) and usually the left mouse button is pressed once and released.
Double click: As in clicking, but the mouse button is pressed twice quickly without
moving the mouse.
Drag-and-drop: The mouse pointer is moved on the desired object and the left mouse
button is pressed down without releasing the button. After this the object is dragged or
moved to the desired location and dropped by releasing the mouse button.
Right click: Point the mouse to the desired object and then click or press on the right
mouse button. This displays a short-cut menu for that item.
To start a program:
1. Click the Start button, located in the lower
left corner of your screen.
2. Highlight All Programs. The Programs menu will appear.
3. Move to the Program menu and highlight the program you want to start. If you see a right
pointer next to your selection, a submenu will appear. Refine your choice by highlighting
the appropriate selection on the submenu. Continue until you get to the final submenu.
4. Click on the program name to start the program.
Note: A chevron at the bottom of the list of options means that there are additional options.
To view the additional options, click the chevron.
1. Following the right procedure, switch on a computer and log in to the desktop if
required
2. Open the Internet Explorer program
a. From the desktop
b. From the start menu
To Log Off (also log out) means to terminate your current session and to subsequently leave your
desktop but not turn off the computer. After a user logs off, all programs that were running are
terminated and the welcome screen is displayed.
To Turn Off or Shutdown the computer means all running processes are closed and the computer
is finally put off completely. This is the proper way to put off a computer and ensures no data
loss. Take note that you would have to switch off the UPS or sockets once the computer has shut
down.
The Restart button allows a user to reboot the computer. In simple terms, this means the
computer goes off and back on.
“Hibernate”
In the My Computer window, you can identify hard disks, the floppy drive and CD-Rom drive
that are attached to the computer. Other windows have other contents such as files and folders
and may even be empty as in an empty folder.
The structure of the My Computer window is similar to that of many others such as My
Documents, My Network Places and even the folders found on the Desktop on in other locations
on the computer.
At this juncture, let us do a quick survey of the various elements of a window. These are the key
features that can be found in all windows.
The Maximise button has a square on it and is in the middle of the other two buttons. Clicking on
this will expand your window to cover as much of the screen as is possible. The button will now
have changed to a button with two squares on it - the Restore button. Clicking on this button will
restore the window size to what it was before you clicked the maximise button.
The Close button has a cross on it. It closes the window, document or program currently active.
The Toolbar
The Toolbar usually sits directly below the menu bar. It usually has buttons which you click on
to perform some specific action. You can have different types of tool bars; the most common
being the Standard Toolbar.
The Taskbar
The taskbar is usually positioned at the bottom part of the window. Every window that is opened
is shown on the taskbar. It is also houses icons of some programs so that they can be launch
quickly. At the both extreme ends of the taskbar you see the Start and Time/Calendar icons
respectively. You can relocate the position of the taskbar to the left or right or upper part of the
screen.
To do so follow the steps below:
Click on any part of the taskbar where there is no icon;
Hold down the left button and drag it to the new position;
Release the mouse.
D. To rename a folder
1. Locate the folder; either on the desktop or in a drive or in a folder.
2. Right-click on the target folder
3. Select “Rename” from options provided by the popup menu that appears.
Note that this procedure is the same for renaming files, folders, drives, icons, etc.
1. Minimise one of the Internet Explorer windows opened in the previous self-assessment
question and Close the other.
2. Create a folder on the desktop named “My Practice”. In this folder, create another folder
this time named “practice 01”.
3. Rename the folder “practice 01” to “exercise 1”
4. Log off the current user and return to the welcome screen.
This action, referred to as copy-and-paste can be performed by right-clicking on the item and
selecting copy. Next is to locate where you want to place the duplicated, right-click again and
this time select paste.
Note that if an item with the same name exists in the destination, you would be asked if you
really want to replace the object existing in that location.
Alternatively, you can right-click on the item and while still pressing on the right mouse button,
drag the object to the location where you want to make a copy to.
Select “Copy here” from the menu that appears to create a duplicate in that location.
This action, referred to as cut-and-paste can be performed by right-clicking on the item and
selecting cut. Next is to find the new location, right-click again and this time select paste.
Note that if an item with the same name exists in the destination, you would be asked if you
really want to replace the object existing in that location. If you opt for “no” the original object
remains in its position
Alternatively, you can right-click on the item and while still pressing on the right mouse button,
drag the object to the new location where you want to move it to.
Select “Move here” from the menu that appears to move the object to that location.
1.9.3 Delete
To delete an object means to remove the item from its current location into the recycle bin.
Likened to a trash can, the recycle bin stores deleted items temporarily on the
computer until final deletion.
The recycle bin shows a slightly different icon when it contains at least one
deleted item.
To delete an item, right-click on the item and select “Delete”. Next is to confirm deletion by
clicking “Yes” on the confirm deletion dialog.
The contents if any of the object are deleted as well. The object would not be deleted if you
select “no”.
Alternatively, simply click on the object once to select it and then press “Delete” or “Del” on
keyboard to delete.
Alternatively you can hold down the shift key while pressing the delete key to permanently
delete a file.
Self-Assessment Questions
Do you want to use the computer to type the report of your research or
assignment? You will need to learn a word processing package in order
to do this. Typing your own report is better that giving to someone in a
communication centre. This is because that person may not understand
the document to know that a paragraph needs to be reworded.
Objectives
At the end of this section, you should be able to:
(a) explain Word Processing Software and list examples
(b) identify common features of Word Processing software
(c) use Microsoft Word
(d) identify Microsoft word’s screen elements, their functions and icons
(e) create a new document and format it
(f) insert table, pictures, page number and date; and
(g) use the spell-checker to check spellings in your work.
Read on …
Microsoft Word is the most widely used computer word processing package. Microsoft
estimates over five hundred million people use the Office suite. There are also many
other commercial word processing applications, available such as:
WordPerfect.
AppleWorks Word Processing - Windows and Mac
Applix Word - Linux
Ashampoo Office TextMaker
Atlantis Word Processor – Windows
Easiwriter – Risc OS
EasyWord
Evermore Integrated Office Word Processor - Windows
FrameMaker
Gobe Productive Word Processor
Han/Gul
IntelliTalk
Lotus Word Pro
Mariner Write - Mac
Mellel
Microsoft Works Word Processor
Open Office Writer
KWord
Among those stated in the above, most word processing packages will enable users to
perform the following tasks:
Creating of customize mails using a form letter template and an address database
(also called mail merging);
Creating of indices of keywords and their page numbers;
Creating of tables of contents with section titles and their page numbers;
Creating tables of figures with caption titles and their page numbers;
Checking of spellings " (actually checks against wordlists);
Checking of grammar (checks for what seem to be simple grammar errors);
Using the thesaurus" function (finds words with similar or opposite meanings).
In most languages grammar is very complex, so grammar checkers tend to be
unreliable.
Almost all word processors enable users to employ styles, of which are used to format
the document. Styles are the key to managing the formatting of large documents, since
changing a style automatically changes all text that the style has been applied to. Even
in shorter documents styles can save a lot of time instead of formatting the various part
of the document yourself. However, most help files refer to styles as an 'advanced
feature' of the word processor, which often discourages users from using styles
regularly and also not all the font, font size, colours etc that comes with a particular
style appeal to user hence they prefer formatting the document themselves.
Starting Word
There are basically two ways to activate Microsoft Word.
1. Double clicking on the Microsoft Word icon on the desktop. This can only be
done if and only if a shortcut for Microsoft Word has be created on the desktop.
Fig 1.1: Picture indicating the steps in starting the word application.
Exiting Word
In a live situation, before you quit Microsoft Word, you have completed save your
work. To exit Word, do the following:
5. Give
an
appro
priate
or
meani
ngful
name
to
your
docum
ent by
typing
it in
the File Name field. Why appropriate name?
6. Click Save.
Title bar: Identifies the program and other window oriented buttons such as
maximize or restore, minimize and close. Side whiles window oriented buttons
such as minimize, maximize (or restore) and close are found on the right hand
side.
Control menu buttons: It is used to size and close the word window and
document.
Insertion Pointer: It tells you where the next character you type would be
placed. It position can be changed by moving the mouse follow by clicking.
Status bar: The Status bar appears at the very bottom of the screen and
provides information about the document. The information that is displays
include: the current page number, current section, total number of pages,
inches from the top of the page, current line number, and current column
number, typing modes (Insert or Overtype) default dictionary, the Spelling and
Grammar check etc.
Scroll bars: Enable you to display different parts of a file on the screen
horizontally (top to bottom) and vertically (left to right).
Toolbar: This consists of icons of some commands that are commonly used.
There are many different toolbars among which standard and formatting
toolbars are default. These two toolbars are merged as one by default (see Fig
1.3 (a) ) but can be separated into (see Fig 1.3 (b) ).
(a)
(b)
The toolbars in Microsoft Word provide easy access and functionality to the user. There
are many shortcuts that can be taken by using the toolbar. First, make sure that the
proper toolbars are visible on the screen.
1. Click View
2. Select Toolbars
3. Select Standard, Formatting, and Drawing
4. Other toolbars can be selected if you wish
By default the document you create has no page numbers. Page numbers are use to refer
to pages within your document. To add page numbers do the following:.
Fig 1.6: Pictures indicating the steps involved in inserting page numbers.
Normally, once you activate Microsoft Word, a new document is open for you.
Here a text is whatever you want to type, which may be a sentence, paragraph or a page
or more. It is made up of characters.
To enter text, just simply type the needed text , which would be in small
letters(lowercases) but to capitalize a , hold down the Shift key while pressing (typing)
the letter. You press the spacebar key whenever you want to create a space between the
current text and the next text.
When you get to the extreme right margin of the document, you do not need to press
Enter to start a new line. This is because Microsoft Word will automatically move the
text if it is more than the remaining space left for the text. This is known as wraps at the
end of the line. You press Enter whenever you want to start a new paragraph.
Two situations can arise, which text is currently being entered and already entered.
When you make a mistake in the text that you are current typing, press
the Backspace key. The backspace key will delete a character at a time
and the character to be deleted must be at the left of the cursor (the
blinking – or |).
When you find an error in the text that is already typed, move the
pointer to the space before the text and press the Delete key. The delete
key deletes a character at a time. To delete the whole text, highlight the
text first then press the delete key.
(We shall teach you how to highlight very soon).
You can insert a text in between two text already typed. To insert text, you must be in
the Insert mode. To check to see whether you are in the Insert mode, look at the Status
bar, located at the very bottom of the screen. If the letters "OVR" are grey, you are in
the Insert mode. If the letters "OVR" are black, you are in the Overtype mode. You
can only insert a text when you are in insert mode. To insert a text in between two text
insert mode, you must do the following:
If you are in Overtype mode the any character you type will replace an existing one
except there is no character at the right of the cursor.
You can type over the current text (replace the current text with new text). However,
you must be in the Overtype mode. Do the following to change to the Overtype mode.
Highlighting text is very important especially when you want the same format to apply
to more than one character or text.
I. By the Mouse: This is done when you drag your mouse over while holding down
the left mouse button. The process is as follows:
a. Move the pointer to one end of the text that you would like to format and
click (i.e. press the left button).
b. Press and hold down the left button whiles dragging mouse to the other
end of the text.
c. Release the button. You will observe that the selected text have different
colour over it.
Alignment
Change Change font size Font colour
font style Make bold,
Italic,
Underline
This box is used to change the font, font style, size, colour and etc of text in your
document. The box is displayed by the following Choose Format > Font from the
menu.
2.7.7 Bolding, underlined and italicized using the font dialog box
In the exercise that follows, you will learn three different methods for bolding,
italicizing, or underlining when using Word. You will learn to bold, italicize, or
underline by using the menu, an icon, or the keys.
Line 0: This is line shows a text that is BOLDED, UNDERLINED, and ITALICIZED.
Line 1: This is line shows a text that is BOLDED.
Line 2: This is line shows a text that is UNDERLINED.
Line 3: This is line shows a text that is ITALICIZED.
Note: You can see the effect of your selection in the Preview window. To turn off
the bold, click Regular.
I) By Using an Icon
In Microsoft Word, you can either copy or cut (delete) text from one area of a document
and paste it in another area in the document or different document. When you either
copy or cut text, it is stored on the Clipboard. Information stored on the Clipboard stays
there until the Clipboard is full or you exit the document. With Microsoft Word 2002,
Clipboard can save up twenty-four (24) different information that was either copied or
cut into it. The twenty-fifth copy or cut text could replace the first text.
Cutting
Pasting
a) Place the cursor after the period in the sentence. “This is the second sentence. “
b) Press the spacebar to leave a space.
c) Choose Edit > Paste from the menu.
d) Your text should now read
“This is the second sentence. This is the first sentence “
Cutting
Pasting
Cutting
Pasting
a) Place the cursor after the period in the sentence: “This is the second sentence."
b) Press the spacebar to leave a space.
c) Press Ctrl-v.
d) Your text should now read.
“This is the second sentence. This is the first sentence "
If you need to find a particular word or piece of text, you can use the Find command. If
you want to search the entire document, simply execute the Find command. If you want
to limit your search to a selected area, highlight that area and then execute the Find
command.
After you have found the word or piece of text you are searching for, you can replace it
with new text by executing the Replace command.
k) Click Close.
l) Your text should now read,
" I know that Ato had his Basic School at Airport Police Middle School,
Accra. This school is located closer to the Kotoka Airport, Accra.
Alternatively you can replace a text by using the Replace menu instead the procedure.
We shall use this method to repeat the above replacement.
Self-Assignment Question
1. Use the Alternate methods to underline and italicized Line 2: and Line 3
respectively. Again try to all the three using the Bold icon on the Formatting
toolbar and also the keys
2. Use the above mentioned steps of cutting and pasting to copy and paste a
text. What is the difference between copying and cutting
3. Try to change the Font style, size a and colour of a text using the appropriate
icon on the Formatting toolbar
To enter text into a table, simply type as you normally would. Press Tab to move to the
next cell. Enter the text shown below into your table.
1. Type A in the first cell in the first column. Press the Tab key.
2. Type B in the first cell in the second column. Press the Tab key.
3. Continue until you have entered all of the text.
Use the skill learnt earlier to format you work as shown the table below:
A B C D E F
Homework Quiz Exams
Name (20%) (20%) (60%) Total Position
Gaga 14 16 51
Caca 12 13 50
Haha 15 15 45
Baba 12 18 45
Kaka 12 19 53
Mama 17 20 57
Jaja 10 17 30
Fafa 10 19 49
Lala 16 19 48
Dada 20 20 55
Word checks your spelling and grammar as you type. Spelling errors display with a red
wavy line under the word. Grammar errors display with a green wavy line under the
error.
To check the spellings of word in your document, you can do any of the following:
a) Press F7 key, OR
To check the spellings of a particular area of your document, highlight that area you
want to spell check and use any of the above methods.
Any word that is not found in the Dictionary of Word would be highlighted.
Fig 1.12: Pictures indicating the steps involved in checking spellings and
grammar.
2.10 Pri
nti
ng
You save
document
is softcopy,
which can
be read
only when
the
computer is
on. What
how can
you read
this document when there is no light. The only way out is to have a hardcopy of the
document i.e. to have a printout copy of it. To print your documents do the following:
a) Choose File > Print from the menu. The print dialog box is displayed. This
enables you the change the default settings.
b) Check whether or not the print’s name is selected in the Print name section.
Under the print range section select of the appropriate range. If you want a
multiple copy of the document then specify it under the Number of copies’
sections.
c) Click OK.
Alternatively you can print your document by clicking the Print icon on the
Standard toolbar. This will not display the Print dialog box.
Self-Assignment Questions
Using the help in Microsoft word, briefly describe the process involved in
performing the following task
Inserting headers and footers to documents
Inserting Bullets, and Date to your document
To change the case of a selected text.
Exercises: 3.1
1. What is the relationship between a word processor and a typewriter?
2. The white space that appears when Ms Word is opened is called____.
3. The mouse icon stands for
(a) Select text
(b) Busy
(c) Text Area
(d) Scroll Area
4. View ca be found on the
(a) View toolbar
(b) Standard toolbar
(c) Menu bar
(d) Scroll bar
5. ‘New Times Roman’ is an example of a
(a) Toolbar
(b) Mouse action
(c) Font Size
(d) Font Type
We learnt how to create and enter information in Table in our last lesson. How did you
find the calculation exercise? Is your answer Easy or confusing? Well never mind you
answer. Spreadsheet is the deal software for manipulating of values entered in columns
and rows (tables). It is very difficult to type letter using spreadsheet since that is not
what it design was for.
With spreadsheet, the Teacher can enter his/her students’ scores and rank the in
descending order of Total marks (indicating Position in class for the first to the last).
The Accounting Office can use the spreadsheet to enter his/her Try balance, receipts,
Invoices, Payroll etc.
Gird you loins and let us take another flight in the world of Technology.
Read on ……
Objectives
Microsoft Excel
OpenOffice.org Calc
Lotus 123
Quattro Pro from Corel WordPerfect Office
SuperCalc
VisiCalc
Ability Office Spreadsheet
Ashampoo Office PlanMaker
EasySpreadsheet from EasyOffice
Microsoft works
Apple works
Claris Works
The three commonly used spreadsheets are Excel, Lotus 123, and Quattro Pro.
Spreadsheet files normally have 256 columns and 65,536 rows. A letter identifies each
column, and a number identifies each row. The column letters begin with A whiles row
numbers begin with 1.
Only a small fraction of these columns and rows display on the screen at one time.
To view different parts of a worksheet, you can scroll to display it on your screen.
The intersection of a column and a row is called a cell. Cells are identified by the
column letter followed by row number. For example, the intersection of column C and
row 5 form a cell whose reference number or cell address is C5.
Cells may contain three types of data: labels (text), values (numbers), and formulas. The
text or label, entered in a cell is used to identify the data and help organize the
spreadsheet. Using descriptive labels, such as Room and Board, Tuition and books, and
clothes, helps make a spreadsheet more meaningful.
Spreadsheet cells may contain a number, a value or formulas that are used to generate
values.
Fig. 1.1:
Picture
indicating the
steps in
starting the
excel
application.
Alternatively
you can also
launch EXCEL
from the
shortcut icon
created on the
desktop by
Workbook
An Excel file is called a Workbook and can one or more worksheets. You can link data
from one worksheet in a workbook to other worksheets in the same workbook.
Worksheet Area
The entire worksheet and all its elements, including cells, gridlines, row and column
headings, scroll bars, and sheet tabs.
Fig
1.2 (b): Other elements of Excel worksheet.
Microsoft Excel consists of worksheets. Each worksheet contains columns and rows.
The columns are lettered A to IV; the rows are numbered 1 to 65536. The combination
of a column coordinate and a row coordinate make up a cell address. The addresses of
cells highlighted above are B10, D6, F6, and I9.
Formula Bar
This displays the constant value or formula used in the active cell. Also it is used to
enter or edit values or formulas. If the Formula bar is turned on, the cell address
displays in the Name box on the left side of the Formula bar. Cell entries display on the
right side of the Formula bar.
Sheet Tabs:
This displays the name of a sheet. You can click the sheet tab to make that sheet the
active sheet.
Active Cell
The cell currently in use is the active cell, which contains the pointer and whose cell
address is displayed in the formula bar. The active cell receives any thing that is type
data.
Status Bar
This displays information about a selected command or an operation in the progress.
The right side of the status bar shows whether keys such as CAPS LOCK, SCROLL
LOCK or NUM LOCK are turned on. If the Status bar is turned on, it appears at the
very bottom of the screen.
Status Bar
Use the mouse to select a cell you want to begin adding data to and use the keyboard
strokes listed in the table below to move through the cells of a worksheet.
Selecting Cells
Before a cell can be modified or formatted, it must first be selected (highlighted). Refer
to the table below for selecting groups of cells.
You create an excel worksheet by entering data into specific cells. The kind of data you
enter into a cell depends upon whether the entry will act as a label, as a number used in
a calculation, or as an expression that will perform a calculation. In this regard the kinds
of data that can be entered in a cell of a worksheet are Text, Numbers, Formulas, and
Functions.
Text
Text is any combination of letters, symbols, numbers, and spaces. You normally enter
text as a label that describes the data within the worksheet. The numerical value of a
text is zero (0).
To enter text in a worksheet
a) Select the cell in which you want to enter the text by clicking the cell to select it,
b) Type the text. Excel automatically aligns the text on the left side in the cell.
Numbers
Number in excel are the values you will use to perform calculations. A number can
contain only the following characters: 0-9+-( ), / $ %. E e
Excel ignores leading plus signs (+) and treats a single period as a decimal. Numbers
are entered according to the text labels that define the overall worksheet structure. The
numerical value of an empty cell is zero (0). Numbers can be formatted with leading
characters, as currency, dates, percentages, or in a number of other standard formats.
Excel treats a telephone number (233-42- 30859) or a Social Security number (123-98-
7654) as text hence it cannot be used for calculations.
To enter text in a worksheet
a) Select the cell in which you want to enter the text by clicking the cell to select it,
b) Type the text. Excel automatically aligns the numbers on the right-side in the
cell.
In some situations such having zeros before a number, you will want to treat numbers as
text. Else you can have the zeros before the number. If you want display 0001234, you
must make it a text.
To display a number as text, append a single quote (') to its left. For example, to display
0001234 as text do the following:
a) Place the pointer in the cell where you want the number to be;
b) Press the single quote symbol (‘ )
c) Type the 0001234 and enter. The single quote will not display and will not print,
but the number, treated as text, will be left aligned.
Formulas
Formulas are what give an electronic worksheet its power. (Detailed discussion of
formulas would be done later in the next section)
Functions
A function is a predefined or built-in formula that’s a shortcut for commonly used
calculations. (Detailed discussion of functions would be done later in the next section)
3.6 Modifying a Worksheet
1. Resize a row by dragging the line below the label of the row you would like to
resize. Resize a column in a similar manner by dragging the line to the right of
the label corresponding to the column you want to resize.
- OR -
2. Click the row or column label and select Format| Row| Height or Format|
Column| Width from the menu bar to enter a numerical value for the height of
the row or width of the column.
Moving Cells
To cut cell contents that will be moved to another cell select Edit|Cut from the
menu bar or click the Cut button on the standard toolbar.
Copying Cells
To copy the cell contents select Edit|Copy from the menu bar or click the Copy
button on the standard toolbar.
If you have a large worksheet with column and row headings, those headings will
disappear as the worksheet is scrolled past the first screen. By using the Freeze Panes
feature, the headings can be visible at all times.
If you want the first or the topmost row (i.e. row 1) to be frozen do the following:
a) Click the label of the row below the row that should remain frozen at the top of
the worksheet ( i.e. any cell in row 2 such as A2-IV2)
b) Select Window|Freeze Panes from the menu bar.
c) Now is can scroll downwards or upwards and the headings will not disappear.
In the above diagram (Fig 1.5), the heading in row 1 is frozen that is why you could see
Row 6 next to Row 1 or appearing to have no data for Class 1 to class 4.
To freeze the row containing the Months just like the one in the diagram, the pointer
should firstly be in Row 2.
If you want to freeze the first or the leftmost column or column A as in the diagram
above (i.e. freezing column containing the Class), the pointer should be in any cell in
the second column or column B. What about freezing both the Column A and Row 1 at
the same time? The pointer should be in cell A2.
The distinguishing feature of a spreadsheet program such as Excel is that it allows you
to create mathematical formulas and execute functions. Otherwise, it is not much more
than a large table for displaying text. In this section, we shall show you how to create
these calculations.
3.7.1 Formulas
A formula is the arithmetic used to calculate values appearing in a worksheet. You can
take advantage of the power of Excel by using formulas in worksheets. If you change
one number in a worksheet, excel recalculates any formula affected by the change. The
result of the formula appears in the cell where you entered the formula.
To view the formula that has been entered in a cell, you must first select the cell, and
then look at the formula bar.
Formulas, which always begin with an equal sign (=), can include one or more of
Excel’s functions. Formulas can also include conditional statements (IF – THEN) and
Boolean logic (GREATER THAN OR EQUAL TO, LESS THAN, and so on).
After the formula is typed into the cell, the calculation executes immediately and the
formula itself is visible in the formula bar.
Four general categories of operators are use in Microsoft Excel. These are arithmetic,
comparison, text, and reference. We shall not consider the text operators.
We assumed that the contents of the cells are A1= 23 and A2=12.
b) Comparison operators: These are used to compare the values of two operands.
When two values are compared by using these operators, the result is a logical
value, which is either TRUE or FALSE. Operators that fall within this category
are: = (equal sign), <> (not equal to sign), > (greater than sign), <
(less than sign), >= (greater than or equal to sign), and <= (less than or equal to
sign) .
parentheses are executed first. For nested a parenthesis that is parentheses within
another parentheses, the innermost parentheses are executed before the outermost
parentheses.
See the example below to view the formula for calculating the sub total for a number of
textbooks. The formula multiplies the quantity and price of each textbook and adds the
subtotal for each book.
Another method of achieving the same result is to label the cell D1 as Amount and the
in D2 you enter the formula =B2*C2. This formula is copied from D3 to D5. After
which you find the Amounts in the range D2 through D5. Try out this method. Which
is easier? There may be alternative approaches to the same problem.
Calling cells by just their column and row labels (such as "A1") is called relative
referencing. When a formula contains relative cell referencing or addressing and it is
copied from one cell to another, Excel does not create an exact copy of the formula. It
will change cell addresses relative to the row and column they are moved to. For
example, if a simple addition formula in cell C1 "=(A1+B1)" is copied to cell C2, the
formula would change to "=(A2+B2)" to reflect the new row.
If you want the column part of formula containing a cell address not to change, you
should have $ before letter part of the cell address such as $A1. The implication is that
the row number of the cell when copied will change but the column letter. Therefore we
can have $A2, $A3, $A10, and so on.
On the hand, If you want the row part of formula containing a cell address not to
change, you should have $ before number part of the cell address such as A$1. The
implication is that the column letter of the cell when copied will change but the column
letter. Therefore we can have B$1, C$1, H$1 and so on
Note that $A34 or A$34 is known as mixed cell referencing and can be used where
only the row OR column need not to change.
Therefore to achieve the result of Fig 1.6 (C), the formula in C1 should be
$A$8*B1+29.67.
Note that relative references automatically adjust when you copy them whilst those of
absolute references do not.
What could have happened if A9:A18 had had values in them when the copying was
done? Be very careful when copying formula in Excel.
Sometimes there may be the need to specify a range of cells in a function. A range is a
group of cells, either a single cell or a rectangular block of cells. To specify a range of
cells do the following:
1. Specify the first cell in the range
2. Press the colon (: ) symbol
3. Specify the cell which is diagonally opposite to the first cell specified (i.e. in
step 1 above)
Figure 1: 7 shows several examples of ranges. Do you think A15:A1, G2:C2, and
D11:G2 respectively refer to the same as A1: A15, C2:G2
D5:G11 respectively?
Fig. 1.7:
Illustrations
of range
specifications in Excel
Assignment: 2.2
Use the Help facility of Excel to learn functions under these general categories Date and
Time, Financial, Logical Maths and Trigonometry, and Statistical.
3.7.8 Autosum
You can use the Autosum function to add the contents of a cluster of adjacent cells. In
our example below, we want to use the Autosum A2 and B2 at C2. The steps are as
follows:
a) Select the cell that the sum will appear. This should not include cluster of
cells whose values will be added. This is Cell C2 in our example;
b) Click the Autosum button (Greek letter sigma) on the standard toolbar;
c) Highlight the group of cells that will be summed (cells A2 through B2 in this
example);
d) Press the ENTER key on the keyboard or click the green check mark button
on the formula bar .
For a complete list of formatting options, right-click on the highlighted cells and choose
Format Cells from the shortcut menu or select Format|Cells from the menu bar.
Number tab - The data type can be selected from the options on this tab. Select
General if the cell contains text and number, or another numerical category if the
cell is a number that will be included in functions or formulas.
Alignment tab - These options allow you to change the position and alignment
of the data with the cell.
Font tab - The entire font attributes are displayed in this tab including font face,
size, style, and effects.
Border and Pattern tabs - These tabs allow you to add borders, shading, and
background colours to a cell.
If you enter the date "January 1, 2001" into a cell on the worksheet, Excel will
automatically recognize the text as a date and change the format to "1-Jan-01". To
change the date format, do the following:
. If the field is a time, select "Time" from the Category box and select the type in the
right box. Date and time combinations are also listed.
3.8.4 Styles
The use of styles in Excel allows you to quickly format your worksheet, provide
consistency, and create a professional look. Select the Styles drop-down box from the
formatting toolbar (it can be added by customizing the toolbar). Excel provides several
preset styles:
Comma – This adds commas to the number and two digits beyond a decimal
point.
Comma [0] - This comma styles that round to a whole number.
Currency – This formats the number as currency with a dollar sign, commas,
and two digits beyond the decimal point.
Currency [0] – This currency styles that round to a whole number.
You can create your own styles from the Style Dialog Box.
A handy feature on the standard toolbar for formatting text is the Format Painter. If you
have formatted a cell with a certain font style, date format, border, and other formatting
options, and you want to format another cell or group of cells the same way, follow the
steps below:
a) Place the cursor within the cell containing the formatting you want to copy.
b) Click the Format Painter button in the standard toolbar (notice that your pointer
now has a paintbrush beside it).
c) And highlight the cells you want to add the same formatting to. You will see that
the new cell also have the same format as the previous one.
To copy the formatting to many groups of cells, double-click the Format Painter button.
The format painter remains active until you press the ESC key to turn it off.
3.8.6 AutoFormat
Excel has many preset table formatting options that when included in your workbook
gives a professional outlook.
(a) (b)
Fig. 1.14: using AutoFormat to change the appearance of (a) to (b)
To set page breaks within the worksheet, select the row you want to appear just below
the page break by clicking the row's label. Then choose Insert|Page Break from the
menu bar. You may need to click the double down arrow at the bottom of the menu list
to view this option.
Select File|Page Setup from the menu bar to format the page, set margins, and add
headers and footers.
Page: Select the Orientation under the Page tab in the Page Setup window to
make the page Landscape or Portrait. The size of the worksheet on the page can
also be formatting under Scaling. To force a worksheet to print only one page so
all the columns appear on the same page, select Fit to 1 page(s) wide.
Margins: You can change the top, bottom, left, and right margins under the
Margins tab. Enter values in the desired margin fields, which indicates how far
from the edge of the page the data in the sheet should appear. Check the boxes
for centring horizontally or vertically on the page.
Header/Footer: Add preset headers and footers to the page by clicking the
drop-down menus under the Header/Footer tab.
Sheet: Check Gridlines if you want the gridlines dividing the cells to be printed
on the page. If the worksheet is several pages long and only the first page
includes titles for the columns, select Rows to repeat at top to choose a title row
that will be printed at the top of each page.
Sometimes the printed sheet may not be exactly it was on the screen. Hence it is
important to preview the worksheet before it is printed. Preview is WYSIWYG (What
You See Is What You Get) view, which is the same as when it is printed.
You may want to use the value from a cell in another worksheet within the same
workbook in a formula. For example, the value of cell A1 in the current worksheet and
cell A2 in the second worksheet can be added using the format "sheetname!cell
address". The formula for this example would be "=A1+Sheet2! A2" where the value
of cell A1 in the current worksheet is added to the value of cell A2 in the worksheet
named "Sheet2".
3.12 Charts
Charts allow you to present data entered into the worksheet in a visual format using a
variety of graph types. Before you can make a chart you must first enter data into a
worksheet. This page explains how you can create simple charts from the data.
The Chart Wizard brings you through the process of creating a chart by displaying a
series of dialog boxes.
a) Enter the data into the worksheet and highlight all the cells that will be included
in the chart including headers.
b) Click the Chart Wizard button on the standard toolbar to view the first Chart
Wizard dialog box. ( You will see Fig. 1:20)
c) Choose the Chart type and the Chart sub-type if necessary.
d) Click Next. ( You will see Fig. 1:21)
e) In the Data range section, specify the range where the data whose chart you
want is found (if this is different from the area highlighted in step a). You must
also specify how the data to be charted were entered by selecting either Rows or
Columns
f) Click Next. ( You will see Fig. 1:22)
g)
h) Enter the title for the chart (Class size in our example) and titles for the X- axis
(Courses) and Y-axis (Number of Students). Other options for the axes, grid
lines, legend, data labels, and data table can be changed by clicking on the tabs.
i) Click Next to move to the next set of options. ( You will see Fig. 1:23)
j) Click As new sheet if the chart should be placed on a new, blank worksheet or
select As object in if the chart should be embedded in an existing sheet and
select the worksheet from the drop-down menu.
Fig 1.24: The chart embed into the Spreadsheet containing its data
To resize the chart, click on its border and drag any of the nine black handles to change
the size. Handles on the corners will resize the chart proportionally while handles along
the lines will stretch the chart.
Select the border of the chart, hold down the left mouse button, and drag the chart to a
new location. Elements within the chart such as the title and labels may also be moved
within the chart. Click on the element to activate it, and use the mouse to drag the
element to move it.
The Chart formatting toolbar is used to format the chart drawn. It is usually displayed
when you click on the chart. Below is a brief description of the various icons of the
Chart formatting toolbar.
Objects List - To select an object on the chart to format, click the object on the
chart or select the object from the Chart Objects List and click the Format
button. A window containing the properties of that object will then appear to
make formatting changes.
Chart Type - Click the arrowhead on the chart type button to select a different
type of chart.
Legend Toggle
- Show or hide
the chart legend
by clicking this
toggle button.
Table view - Display the data table instead of the chart by clicking the Data
Table toggle button.
Display Data by Column or Row - Charts the data by columns or rows
according to the data sheet.
Angle Text - Select the category or value axis and click the Angle Downward or
Angle Upward button to angle the selected by +/- 45 degrees.
Fig 1.26: A chart with its X-axis text displayed in Angle Text.
A finished chart can be copied into a Microsoft Word document. Select the chart and
click Copy. Open the destination document in Word and click Paste.
Assignment: 2.2
Create an Assessment form for a class with Quiz1, Quiz2 and Exams
marks. After the input of the marks, the formula bar to compute the totals
of both Quizzes and that of the quiz and exams
After, use the ‘IF’ statement to grade the marks for you.
Self-Assessment Questions
Exercise: 2.2
1. Spreadsheets are often used for the following except
(a) Cash Flow Analysis
(b) Decision Making
(c) Financial Report
(d) Job Financing
2. You can start Ms Excel in how many ways?
a. 1
b. 2
c. 3
d. 4
3. Horizontally grouped cells are called ______ whiles vertically
grouped ones are called ______.
In certain Department Stores in some countries where only members are allowed to buy,
the computer has to read your membership card (which is simply to scratch cards we
use in Ghana for phones) as you items are scanned, the store's computer compiles a list
of what you buy, and uniquely linked them to you by the ID number of your card. By so
doing they could your purchasing habit, give deduct when you buy up to a certain
amount, etc.
Again, the ATM card for each back in Ghana can be used to redraw money in any of
that bank’s branch that has an ATM all over the country. Apart of the usage of ATM
cards, some banks like the Ghana Commercial Bank, it is possible to withdraw money
in your Saving Account everywhere provided that particular bank in networked and
connected to their WAN.
All these and many others are possible firstly due to database stored in computers. In
session, we shall discuss the fundamentals of database and how to design a simple one.
Read on…
Objectives
At the end of this section, you should be able to:
Fig 1.1(a): A picture indicating the steps in starting the access application.
The access window contains the task Pane that allows you to create a new database or to
open an existing database. You can click the “Blank Database” option in the “New”
section of the Task Pane to create a new database on your own, or you can click the
“The General Templates” option in the “New from Template” section of the Task Pane
to let Access guide you through the steps for creating one of the standard databases
provided by Microsoft.
a) Make sure you have created your copy of the Access Data Disk, and then place
your Data Disk in your appropriate drive.
b) In the “Open a file” section of the Task Pane, click the more files option. The
open dialog box is displayed. See the diagram below.
c) Click the Look in list arrow, and then click the drive that contains your Data
Disk.
d) Click The Folder’s in the list box (if necessary) and then click the Open button
to display a list of the files in the tutorials folder.
e) Click the database name in the list box and then click on Open button. The
seasonal database opens in the Access windows.
f) In the database window, click on the name of the database to select it.
g) Click the Open button in the database window. The table opens in the datasheet
view on top of the database and Access windows.
Unlike other applications in the Office suite, only one database file can be opened at a
time.
When you name the database and select its location, you create a "container" to hold all
the database objects you will create as you progress. Unlike in some database programs,
every object you create here—every table, form, query, and report—becomes part of the
same file, neatly held and listed for your convenience in the database window. Once
you open the database, there is no need to open other files. The following are the
database objects, also known as "pieces" of your database:
Table: The Table tab is where your actual data that you will store and
manipulate resides.
Query: The Query tab accesses the query storage area. A query is a carefully
structured question that asks for specific data from one or more database tables.
You can use the queries to perform calculations, delete multiple records, or
retrieve data.
Form: A form is a "window" in which you can enter, edit, or view data in
neatly defined areas. You can use the Form tab to create a data-entry form, even
one that carries out certain actions after the data is input.
Report: The Report tab enables you to have access to reports, which are
presentation-ready designs for compiled database data. This is the most effective
way to present your data in a hard-copy format.
Macro: A macro is a set of instructions that executes a series of commands.
You can create macros to automate commonly used tasks: one action or a
sequence of actions.
Module: A modules is an event procedure written in the Visual Basic
programming language that controls the behavior of forms and reports, available
in your database. Modules let you automate tasks using Visual Basic.
A database could also be defined as a collection of related tables. The things that can be
found in a University database include Lecturers, Students, Courses, Halls,
Departments, Programmes etc. Information on each of these things or technically
known as entities are kept in a single table. Again one entity could be linked to another
entity forming a relationship. For example a Department has many lectures and may
have many programmes ( BSc. Computer science, Information Technology etc). One
must have at least a past grades in certain courses for he/she in awarded a degree in a
certain Programme. A lecturer teaches certain Courses and advises certain Students. A
Student resides in a hall and is admitted to pursue certain degree programme. A Course
in taught in a semester in a particular Room. These are many more are condition that
much be captured in the database. Therefore tables in a database must form relationship.
Therefore a table is to store information about a single thing or a relationship.
Each table is made up of a numbers of related fields. The fields are description or
properties of the thing whose information is to be stored. A student can be described by
name, Age, programme studied, department and hall he/she belongs among others. All
these information about a student are kept in the fields. Therefore some of the fields in
the Student table could be Index- Nos, First_Name, Last_Name, Birthdate, Postal-
Address, Phone, Programme, Level, etc
Each field must store a particular type of information, which could be a number, text,
picture, etc. You tell Microsoft Access the information to be stored in a field by using
datatype. Some of the datatypes in Access are:
The information concerning a particular student is called a record for that student.
Therefore the record for Haha will have the following particulars:
Index Number= Sc/csc/02/002
Surname = Haha
Birthdate =12-09-1970
Level =500
PID =CS
Whilst it is possible to have no value for some of the fields, other fields should have
values in them always. The values of some fields within a particular record may be
unknown or may not apply to apply to that record. In Database parlance a field without
value contains a specialized value called null. For a field to contain null value, it should
be designed to accept null.
Null could have any of these implications:
Value unknown
Value exists but not available
Attribute does not apply to this record
Hence if you don not know the date of birth of a particular student and that the birthday
field has be design to accept null then you can leave it blank.
In a Relational Database |Management system such as Access, each row in a table must
be unique. A unique key or primary key is a candidate key to uniquely identify each
row in a table. A unique key or primary key comprises a single column or set of
columns. No two distinct rows in a table can have the same value (or combination of
values) in those columns. Depending on its design, a table may have arbitrarily many
unique keys but at most one primary key.
A unique key must uniquely identify all possible rows that exist in a table and not only
the currently existing rows.
Examples of unique keys are Social Security numbers (associated with a specific
person) or ISBNs (associated with a specific book) or employee’s identification number
(associated with a particular employee) or student’s identification number (associated
with a particular student) or car registration number (associated with a particular car). A
primary key is a special case of unique keys
For the table in Fig. 1.2, the Index_Nos field is the primary key hence it cannot be
duplicated or be null. By assigning a primary key to that data, you tell Access to alert
you when you inadvertently enter a duplicate. Basically, you tell Access that no two
Students can have the same index number (Index_Nos), and Access makes sure they
don't.
Because the field that contains the primary key cannot contain duplicate data, it is the
field most often used to link two tables together. When you designate a field as a
primary key field, the words Yes (No Duplicates) appear in the field properties box next
to Indexed.
Sometimes it requires more than one attribute to uniquely identify an entity. A primary
key that made up of more than one attribute is known as a composite key. Below shows
an example of a composite key. Each instance of the entity Work can be uniquely
identified only by a composite key composed of Employee ID and Project ID.
Foreign key is therefore a column or a set of columns in one (referencing) table that
refers to a column or set of columns in another (referenced) table. A foreign key
completes a relationship two tables by identifying the parent entity.
The values in one row of the referencing columns must occur in a single row in the
referenced table. Thus, a row in the referencing table cannot contain values that don't
exist in the referenced table. This way references can be made to link information
together. Multiple rows in the referencing table may refer to the same row in the
referenced table.
The referencing and referenced table may be the same table, i.e. the foreign key refers
back to the same table. Such a foreign key is known as self-referencing or recursive
foreign key.
A table may have multiple foreign keys, and each foreign key can have a different
referenced table. Every relationship in the must be supported by a foreign key.
1. From the database table, click on Tables in the Object Pane and click on
New to pop up the New Table dialog box.
2. On this box click Design View to create your own table. (You can also click on
Design directly on the Database window). The table window opens.
3. The table window has three columns; Field Name, Data Type and
Description.
4. Beneath them is the Field Property, which displays properties of selected
fields. Below a brief explanation of the elements in the Field property pane:
Field Size The Field Size property enables you to specify the maximum size of data
stored in the field. Refer to Table 2.1 for the maximum field size values.
Format The Format property controls how data appears when displayed. This
property enables you to customize how numbers, currency, text, and date-time data
appear.
Input Mask The Input Mask property provides a mechanism for making data entry
easier. For example, with a telephone number, an input mask of (____) - ___ - ___
makes entering the various components of a phone number easier. Access provides a
wizard to create values for this property.
Caption The Caption property specifies the contents of the descriptive label that is
used on a form or report in which the field is used. The Caption property also specifies
the contents of the column header for a field in the Datalist View. (Refer to Figure 2.1
for an illustration of the Datalist View.)
Default Value The Default Value property specifies the value that is automatically
entered into the field when a new record is created. For example, a number type field
might have a default value of 0, and a date-time type field might have a default value of
the current date-time value.
Validation Rule The Validation Rule property specifies a condition that an entered
value must satisfy. For example, a number type value must be >= 0. Validation rules
help preserve data integrity.
Validation Text The Validation Text property specifies the message text displayed
to the user when the validation rule fails. The maximum size of a validation text
property is 255 characters.
Required The Required property specifies whether a data value is required for the
field.
Allow Zero Length The Allow Zero Length property specifies whether a zero-length
string is a valid entry. This property applies only to text, memo, and hyperlink fields.
Indexed The Indexed property specifies whether an index is created for the field. Two
types of indexes can be created. One allows duplicate field entries, and the other type
does not allow duplicates.
Unicode Compression
Access supports Unicode character representation, which means characters are
represented by two bytes instead of one. With two bytes, multiple language code pages
can be supported. With one byte, on the other hand, a single code page is supported and
a smaller disk storage requirement exists.
5. Using student table for example, type in the field name registration number.
6. Click in the Data Type column to pop up a list of possible data types.
7. Look through and select Text.
8. In the description column, briefly describe the field name.
9. Continue with the next Field Name, Data Types and Description.
10. The Data Type for the Field Names fname, lname, mname, gender,
programme, hall of affiliation and permanent address is Text.
11. That for the Field Names date of birth and year of admission is Date/Time.
12. Lastly, that of Field Name phone number is Number.
13. Apart from the Field Names phone number and mname, all fields require
some value hence in their Required space in the Field Properties, select Yes.
1. Select the entire row for a particular field name, which you consider appropriate,
be a primary key (A field that unique identifies a Entity or Student) in this case,
the Field Name registration number is best.
2. Click on the Primary Key icon on the database toolbar.
3. When done correctly, a small key symbol appears just beside the field name.
4. Click on the Save button to pop up a dialog box for table name.
5. Type in the student and click OK.
6. After naming and saving the table properly, the table name appears in the
Database windows as shown below.
Switching Views
To switch views form the datasheet (spreadsheet view) and the design view, simply
click the button in the top-left hand corner of the Access program.
Displays the view, which allows you Displays the view, which allows you to enter
to enter raw data into your database fields, data-types, and descriptions into your
table. database table.
3. You can now populate your table with the necessary data.
4. To populate a new record, press the Enter key to go to the next
NOTE: Before starting a new record, the registration number field must have
something in it, because it is the Primary Key. If you did not set a Primary Key then it is
OK.
Manipulating Data
3. To paste a copied data, click the row selector for a particular row.
4. Click the Paste button. The pasted record remains highlighted.
1. Click the right arrow button in the horizontal scroll bar a few times to scroll to
the right and view the remaining fields in the table.
2. Drag the scroll box in the horizontal bar back to the left to return to the previous
display of the datasheet.
3. Click the Next Record navigation button .The second record is now the
current record, as indicated by the current record symbol in the second record
selector.
4. Click the Last Record navigation button The last record in the table is now
the current record.
5. Click the Previous Record navigation button to view a previous record.
6. Click the First Record navigation button to view the very first record.
Shortcuts:
To print a table:
1. Click the print button on the table datasheet toolbar. The table will print on
two pages if the can’t fit on a single page.
To exit Access:
1. Click the Close button on the Access window title bar. The tables and the
whole database close and Access closes.
4.6 Queries
The purpose of a query is to organize the data in a table. This could mean sorting a table
alphabetically by last names. This could also mean looking for records that contained a
certain piece of information that every record may not have. By using queries you can
organize your data to fit your needs. Queries select records from one or more tables in a
database so they can be viewed, analyzed, and sorted on a common datasheet. The
resulting collection of records, called a dynaset (short for dynamic subset), is saved as a
database object and can therefore be easily used in the future. The query will be updated
whenever the original tables are updated. Types of queries are select queries that extract
data from tables based on specified values, find duplicate queries that display records
with duplicate values for one or more of the specified fields, and find unmatched
queries display records from one table that do not have corresponding values in a
second table.
Create a Query in Design View
1. In Access window, click the query button on the left hand side of the window as
shown
2. From the Queries page on the Database Window, click the New button
Click Close when all of the tables and queries have been selected.
Suppose we want to retrieve all the particulars of a student with the registration
number “SC/CSC/02/0001”,then follow the following steps
5. Add all fields from the STUDENT table to the new query by double-clicking the
field name in the table boxes or selecting the field from the Field: and Table:
drop-down menus on the query form. Specify sort orders if necessary.
7. The following table provides examples for some of the wildcard symbols and
arithmetic operators that may be used. The Expression Builder can also be used
to assist in writing the expressions.
8. After you have selected all of the fields and tables, click the Run button on the
toolbar.
Suppose we want to retrieve the first name, family name and date of birth of all
students student whose first begins with ‘A’ then follow the following steps
10. From the first field select STUDENT for table and FIRST_NAME for the for
field. Then in the second and third field, select STUDENT for table and
FAMIL_NAME and DATE_OF_BIRTH for fields respectively.
With Query Wizard of Access, you can easily in creating queries. To do that , we must
follow the steps below:
a) Click the Create query by using wizard icon in the database window to have
Access step you through the process of creating a query.
b) From the first window, select fields that will be included in the query by first
selecting the table from the drop-down Tables/Queries menu. Select the fields
by clicking the > button to move the field from the Available Fields list to
Selected Fields. Click the double arrow button >> to move all of the fields to
Selected Fields. Select another table or query to choose from more fields and
repeat the process of moving them to the Selected Fields box. Click Next >
when all of the fields have been selected.
Sometimes there may be the need to weed out all duplicates results in a query and not in
the database or table itself. You can use Find Duplicate Query Wizard filter out records
in a single table that contain duplicate values in a field. To arrive that this results, do
the following:
c) Select the table or query that the find duplicates query will be applied to from
the list provided and click Next >
Fig 1.22: Selecting tables for the Find Duplicates Query Wizard
d) Select the fields that may contain duplicate values by highlighting the names in
the Available fields list and clicking the > button to individually move the fields
to the Duplicate-value fields list or >> to move all of the fields. Click Next >
when all fields have been selected.
Fig 1.23(a): Selecting field(s) for the Find Duplicates Query Wizard
e) Select the fields that should appear in the new query along with the fields
selected on the previous screen and click Next >
Fig 1.23(b): Selecting tables for the Find Duplicates Query Wizard
Forms provide those working in the database with a user-friendly look. You could have
people enter information into the database using the open table view which means that
could see all the finds. But most databases, not all tables are accessible everybody and
even for the table(s) that one can use, not all fields at he/she have access.
Using a form allows you to place all of the fields for a particular application or
transaction in one place.
Forms link you to the table fields. You can look through all of the information in
various records using the form view. Depending how the form is designed, you may
only get to look at one record at a time.
There are 2 ways to create a form in Microsoft Access. These are:
1. Create a Form in the Design View. This option requires that you know how to
insert form elements, understand how they link to table fields and use the design
tools.
2. Create a Form by using a Form Wizard. This method is good for creating quick
forms or for those who are inexperienced with using Microsoft Access.
Getting Help
You can simply press F1 to get help. For vivid help topics, you can click on the Office
Assistant button on the database toolbar.
4.10 Reports
Reports are used to provide a summary and review of the contents of the database. This
report can be as simple as a brief outline of the data or as complex as identifying each
field in each record. Your report should answer the series of questions asked earlier
about what information do you want to gather and why you are gathering it.
2. By using “Design View”: You use this when you want to create the report from
scratch. This is for those that are familiar with creating a report. You will use the
“Design View” toolbar to insert the desired fields, set their font characteristics
and size and position them. You can also add your own graphics and other
effects to the report to make it stand out.
d) Then, select the fields that should be displayed in the report by transferring them
from the Available Fields menu to the Selected Fields window using the single
right arrow button > to move fields one at a time or the double arrow button >>
to move all of the fields at once. Click the Next > button to move to the next
screen.(See Fig 1.26)
e) Select fields from the list that the records should be grouped by and click the
right arrow button > to add those fields to the diagram. Use the Priority buttons
to change the order of the grouped fields if more than one field is selected. Click
Next > to continue. .(See Fig 1.27)
f) If the records should be sorted, identify a sort order here. Select the first
field that records should be sorted by and click the A-Z sort button to
choose from ascending or descending order. Click Next > to continue.
Fig 1.28: Specifying the sort oder for the Report Wizard
g) Select a layout and page orientation for the report and click Next >
h) Select a color and graphics style for the report and click Next >
i) On the final screen, name the report and select to open it in either Print
Preview or Design View mode. Click the Finish button to create the
report.
Select File|Page Setup to modify the page margins, size, orientation, and column setup.
After all changes have been made, print the report by selecting File|Print from the
menu bar or click the Print button on the toolbar.
4. Click the OK button and the report wizard creates the report and displays it in Print
Preview which shows exactly how the report will look when printed.
5. Click the Maximize button on the report window, click the Zoom list arrow and
choose 100% then Fit to view the entire window.
6. You can select the particular record using the Next, Previous, First and Last
Record buttons.
The following steps are used to show the relationship between tables.
1. In the database window view, at the top, click on Tools ---> Relationships or
click the Relationships button on the toolbar.
2. From the Show Table window (click the Show Table button on the toolbar to
make it appear), double click on the names of the tables you would like to
include in the relationships. When you have finished adding tables, click Close.
Fig. 3.20 Picture showing the steps involved in displaying the tables in the database.
To link fields in two different tables, click and drag the primary key of the Parent table,
and drop it into the same field (foreign key) in the Child table and release the mouse
button.
The Edit Relationships window will appear. From this window, select different fields
if necessary and select an option from Enforce Referential Integrity if necessary. These
options give Access permission to automatically make changes to referential tables if
key records in one of the table are deleted. Check the Enforce Referential Integrity
box to ensure that the relationships are valid and that the data is not accidentally deleted
when data is added, edited, or deleted. Click Create to create the link.
Fig 3.22 Picture indicating the procedure in creating relationships between tables.
A line now connects the fields of the tables in the Relationships window.
Fig 3.23 Picture indicating the relationship between tables of the database.
Assignment: 3.3
1. Use Microsoft Access to Create the Following tables and show all
relationships that exist between them.
STUDENTS TABLE
Field Name Data Type Field Required Primary Foreign
Size Key Key
registration_number Text 20 Yes Yes No
fname Text 20 Yes No No
mname Text 20 No No No
lname Text 20 Yes No No
date_of_birth Date Yes No No
gender Text 6 Yes No No
programme Text 20 Yes No No
year_of_admission Date Yes No No
hall_of_affiliation Text 20 Yes No No
address Text 30 Yes No No
DEPARTMENT
Field Name Data Type Field Size Required Primary Key Foreign Key
dept_id Text 20 Yes Yes No
dept_name Text 20 Yes No No
dept_location Text 20 No No No
faculty Text 20 Yes No No
Head_id Text 20 yes No Yes
HALL TABLE
COURSES TABLE
Field Name Data Type Field Required Primary Foreign
Size Key Key
course_code Text 10 Yes Yes No
course_name Text 20 Yes No No SE
SSI
dept_id Text 20 Yes No Yes
ON
credit_hours Text 5 Yes No No
year Date N/A Yes No No
semester Number 1 Yes No No
Field Name Data Type Field Required Primary Foreign
Size Key Key
course_code Text 20 Yes Yes Yes
registration_number Text 20 Yes Yes Yes
staff_id Text 20 Yes Yes Yes
Day Date Yes No No
Time Date/time Yes No No
Venue Text 20 Yes No No
TRANSCRIPT
Self-Assessment Questions
Exercise 3.4
a. SyBase
b. MySQL
c. SQL
d. DatabaseS
2. In Access the following is an example of a datatype?
a. Fname
b. Date/time
c. Field name
d. Description
3. When Yes option is selected it means the field should not be Null True/
False.
Well done for traveling this far; the road from Database software to
presentation software has not been easy but you are here. The next
powerful productivity software we will discuss is mostly used for
presentations.
Even though this tool was developed for business presentations, its usefulness cut
across several activities. Teachers can prepare their teaching lessons with this package
because it can accommodate audio and images of all your teaching aids. Nowadays IT
inclined preachers use presentation software to present their sermons, resource speakers
for conferences and seminars also present their talk using presentation software.
Objectives
At the end of this section you should be able to:
(a) explain what a Presentation Software is
(b) identify the basic Presentation Software features; and
(c) use Microsoft PowerPoint
(d) open an existing presentation
(e) use normal view and view slide show
(f) create a working folder and save your work
(g) use AutoContent Wizard and edit slides
(h) use slide sorter view create speaker note, preview and print
Now read on …
Presentation programs can either supplement or replace the use of older visual aid
technology, such as Pamphlets, handouts, chalk boards, flip charts, posters, slides and
overhead transparencies.
The "slide" analogy is a reference to the slide projector, a device which has become
somewhat obsolete due to the use of presentation software. Slides can be printed, or
(more usually) displayed on-screen and navigated through at the command of the
presenter. Transitions between slides can be animated in a variety of ways, as can the
emergence of elements on a slide itself.
Microsoft is by far the most commonly used presentation software. It basic features are:
1. Make sure Windows 98/200/XP is running on your computer and that the
Windows desktop appears on your screen.
2. Click the Start button on the task bar, point to ‘All programs’ and then point to
Microsoft PowerPoint. (Microsoft Office then to Microsoft PowerPoint 2003 )
3. Click the Microsoft PowerPoint to start PowerPoint and after a short while the
PowerPoint windows opens.
4. If necessary click on the Maximize button so that the PowerPoint window fills
the entire screen.
Fig 1.1: Picture indicating the steps in starting the power point application.
The PowerPoint Window has toolbars and panes to help you quickly create
presentations. Most of the toolbars are common in Office applications but may feature
options unique to PowerPoint.
Fig 1.2:
Opened
window of
the
PowerPoin
t
application
Vie
w
but
ton
s- These buttons allow you to
Change the way you view a slide presentation. The first is the Normal view.
Followed by the slide Sorter view; This changes the view to miniature images of all
the slides at once and let you reorder the slides or set special features for your slide
show. Finally to present your slide show you click on the slide show button (the
third button)
The default view for PowerPoint 2003 is the Tri-Pane View. This view, which opens
when you launch PowerPoint, allows you to see multiple parts of a presentation at once.
1. Make sure the New Presentation Task Pane appears on the right side of the
PowerPoint window. If no task Pane appears, click View on the menu bar and
then click Task Pane list arrow and then click on New Presentation.
2. Under Open a presentation, click More Presentations. The Open dialog box
appears on the screen.
3. Click the Look in list arrow to display the list of drives on your computer and
then select the drive that contains your work.
4. Double-click the presentation folder, select the presentation and click on Open
button to display the presentation.
5. If necessary click on the Normal View button near the lowest lower left
corner of the screen.
6. To view the slide show, click the Slide Show button on the view toolbar
and the slide show begins by filling the entire viewing area of the screen with
the first slide.
Fig 1.4: an arrow showing the Position of Normal View and Slide View buttons.
7. Pressing the Spacebar, moves the current slide show to the next.
8. To save, click the Save button on the standard toolbar. The save dialog
box opens
9. Click the Save in list arrow and then click the drive that contains your
presentation folder.
10. You can also create a new folder by clicking the Create New Folder button on
the Save As dialog box toolbar.
2. Read the information in the AutoContent Wizard dialog box and then click the
Next button to display the nest dialog box of the Wizard. This one allows you to
select the type of presentation.
3. Click the Sales/ Marketing button and if necessary on Selling your Product and
services. See diagrams below.
4. Click the Next button to display the dialog box with the question “What type of
output will you use?”
5. If necessary, click the On-Screen presentation option button to select it and then
click the Next button. In this dialog box you will specify the title and footer of
the presentation.
6. Click the Next button after the entry and the final AutoContent Wizard dialog
box opens letting you to know that you have completed the AutoContent
Wizard.
7. Click the Finish button and PowerPoint displays the AutoContent outline in the
outline tab and the title slide in the slide pane as slide 1.
1. With slide 1 in the slide pane click the Next slide button.
2. Select the title text so that the text box becomes active and any text in it
becomes highlighted. You may now edit by typing in the text box.
3. Within the main text box, select the text of the first bulleted item. This is the
main point in the presentation. To get the next level of importance you press the
tab key on your keyboard.
4. Press the enter key to get to the next line.
5. To insert a new slide, click the New Slide button on the formatting toolbar and
the new slide appears in the slide Pane.
6. You can also increase or decrease the indent using the Increase Indent and
Decrease Indent buttons on the formatting toolbar.
Assignment 3.4
Make your presentation of this particular section using only the subtitles
of this section. Apply speaker notes for your slides. Also, try printing the
‘black and white’ copy.
Self-Assessment Questions
Exercise 3.4
4. Speaker notes help the one making the presentation during the
presentation, True/ False.
5. The stage where we can arrange and rearrange our slide is called?
i. Notes pane
ii. Slide sorter view
iii. Slide show
iv Task pane
Unit Outline
This unit takes you through some basic multimedia applications; describe various media
components used in multimedia application and finally discuses the educational
applications of the multimedia technology. It is going to be very interesting and I am
sure you will enjoy it.
Unit four will also take us through the different types and uses of multimedia
applications. The unit has been divided into section and each session is further divided
into sub-sessions to make the book easy to read and understand.
Unit Objectives
After studying this unit, you should be able to:
1. define multimedia
2. identify types of media used in multimedia applications
3. describe the different uses of multimedia applications
4. create simple multimedia applications
Objectives
At the end of this session, you should be able to:
(a) define multimedia
(b) know about interactive multimedia
Interactivity make the student part of the learning adventures and give them the ability
to explore in many visual and interactive ways. This implies the ability to accept input
from the user through the keyboard, voice or a pointing device. Everything we do today
is being changed by interactive multimedia technology. The classroom today is being
revolutionized through effective use of interactive multimedia. Interactivity is the most
unique and importance features of multimedia.
In multimedia applications most objects are clickable. Hence any clickable objects such
as text, graphic, animation and video can function just like the links on web pages.
Self-Assessment Questions
Exercise 4.1
1. What is Multimedia?
2. What is meant by interactive multimedia?
3. What are the multimedia elements?
4. What is multimedia software?
Objectives
At the end of this session, you should be able to:
(a) define multimedia application
(b) describe some examples of multimedia applications
(c) describe the important of multimedia application
Self-Assessment Questions
Exercise 4.2
Objectives
At the end of this session, you should be able to:
(a) list the media elements.
(b) differentiate between Text, Graphics, animation, audio and video
(c) understand the important of compression and MPEG standard
3.1.1 Text
Texts are characters used to create words, sentences, and paragraphs. When we speak,
we use words and when we write we use words. Text is used in multimedia applications
to convey information. They are also given different colour, style and font size to
emphasize certain words or phrases. Some multimedia applications used text-based
menus.
3.2 Graphics
These are digital representation of information other than text. For example drawing,
chart, photograph, pictures or image. Some of these contain no movements or
animation.
Graphics can illustrate certain concepts more vividly than text and therefore play an
important role in teaching and learning. Most people retain a higher percentage of
materials they see graphically. Most software applications used today are graphic based.
3.2.1 Animation
An animation is a graphic that has the illusion of motion. They can convey information
more vividly than text. It is achieved by displaying a series of still graphics. They range
from basic graphic with simple motion to a detailed image with complex movements.
They are used to provide better illustration about how certain devices, equipment,
system and many phenomena work more than text can do. It is used in a variety of ways
to improve the quality and make both educational software and website more
fascinating.
3.3 Audio
Digitized music, speech or sound that is produced by computer is called Audio. It
provides information in a form that is not possible within the computer environment.
Vibrations are hard to convey without sound. The use of audio together with text and
graphics enhances the understanding of concepts. Sounds are captures using
microphones, tape or CD players etc. Audio can be stored as files and used over and
over again. Audio files can be edited and altered to produce an entirely new sound.
They can also be downloaded from the web and stored on CDROM.
3.4 Video
Photographic images that can be played back at speed between 15 to 30 frames per
second to provide a full motion in real time are called Video. In multimedia application,
video are captured, digitized and edited using special video production hardware and
software. The capturing is done using VCR or video cameras. Video files are often very
large and occupy a lot of space. A video compression program is used to reduce the file
while maintaining the quality. This is decompression prior to viewing. A standard has
been defined by the Moving Picture Experts Group for compression and decompression
called MPEG. The standard method reduces picture up to 95%.
Self-Assessment Questions
Exercise 4.3
Objectives
At the end of this session, you should be able to:
(a) understand the concept of Computer Assisted Instruction
(CAI)
(b) describe other terms related to CAI such as integrated learning
(c) identify the barriers to students with disabilities and the role play
by technology
CAI software teaches specific skills and knowledge based on specific content area and
level. This is difference from productivity software that can be used in general to help
students through problem processing at any level and in any content area, such as: word
processors, spreadsheets, databases, audio-video editors, Powerpoint, web browsers etc.
As all of these instructional software categories are frequently mixed together, one of
these categories, gaming, deserves further consideration. Drill and practice assumes that
the skills have previously been presented and that further practice is necessary for
mastery.
Gaming is too often seen as problem by educators, as activity that unless tightly
restricted, is ultimately distracting and even harmful to sound learning practices.
Consequently, software and other titles that clearly indicate a game format or include
game formats are somewhat suspect and purchase is often avoided. Game software
creates a contest to achieve the high test score and either beat others or beat the
computer or both. Discovery software provides a large database of information specific
to a course or content area and challenges the learner to analyze, compare, infer and
evaluate based on their explorations of the data Educational Simulation software can
provide an approximation of reality that does not require the expense of real life or its
risks.
Tutorial activity includes both the presentation of information and its extension into
different forms of work, including drill and practice, games and simulation.
Some of the specific products, and approaches to using them, are described below.
Self-Assessment Questions
Exercise 4.4
Objectives
At the end of this session, you should be able to:
(a) how to create multimedia applications
(b) identify the relationship between media elements
(c) learn ways of using graphics and multimedia software
Graphics are visual presentations for information and illustration purposes. It is a digital
representation of non-textual information such are drawing, chart or photographs but
contains no movement or animation. A graphic is also called an image or picture.
There are many ways of obtaining graphics. Depending on the subject matter, you may
need to develop your own. You can create your own using software for drawing and
painting, using photo cameras and then scanning or using digital cameras and
transferring them unto the computer. Again one can easily obtain graphics from the web
by saving any graphics that you see in your browser on your disk. Obtaining graphics can be
a very time intensive process.
There are facilities for a wide variety of multimedia file formats including images,
video, and sound, but not for clip-art and sound as compared to some of the other
multimedia software programs.
Some products allow you to author in a WYSIWYG environment (what you see is what
you get), while others use a timeline-based environment. Although it's not required for
all software in this category, much of it involves learning advanced programming and
scripting languages to utilize its full capabilities.
Authoring tools typically require less technical knowledge than programming tools.
Other names are Authoring Software, Authoring Tools, and Author ware. For classroom
presentation, a large monitor or large screen television will be ideal if data projectors or
electronic whiteboard are not available.
Self-Assessment Questions
Exercise 5.5
1. What are graphics?
2. Identify and describe two techniques which can be used in web
authoring
Objectives
At the end of this session, you should be able to:
(a) highlight the importance of multimedia
(b) know the uses of multimedia software
(c) list the advantages of multimedia software
Multimedia appeals to a variety of learning styles and therefore all students can learn in
their own way and become active learners thereby increasing retention. Most students
motivated to learn and even to create their own multimedia application.
The advantage of multimedia for users with different learning styles is only part of the
total equation. Multimedia can also assist educators in overcoming linguistic, cultural,
and physical barriers; in addressing different learning levels; in providing the unique
experiences of students; in presenting materials in different formats and from different
perspectives; in providing feedback and decision-making resources; and in tailoring and
customizing information to the needs of individual student.
Again, Multimedia software can be used as productivity tools and an instructional tool.
By using this in the classroom, students also learn how to use this multimedia
effectively. Obviously, there is a much greater need to evaluate multimedia applications
before for contents and appropriateness before being used in the classroom.
Self-Assessment Questions
Exercise 4.6
UNIT OUTLINE
This unit takes you through communication. The unit explores the use of computers in
communication, networking and the Internet. We shall cover how the Internet work and
the services available on the Internet as well as how to search for information on the
Internet. It is going to be very interesting and I am sure you will enjoy it.
The unit has been divided into section and each session is further divided into sub-
sessions to make the book easy to read and understand.
Unit Objectives
After studying this unit, you should be able to:
1. define communication
2. identify communication network
3. list the most basic communication system setup
4. identify 5 communication channels
Objectives
At the end of this session, you should be able to:
(a) define Communication
(b) list, identify and describe the basic component of communication
(c) give examples of some of the devices used in communication
Communications Networks
A communications network is a collection of computers and other equipment put
together so as to share data, information, hardware and software. The most basic
communications system setup consists of the following equipment:
One computer to send data.
Communications devices that send and receive data.
A communications channel over which data is sent.
One computer to receive data
A communication software that manages the transmission
Self-Assessment Questions
Exercise 5.1
1. What is communication?
2. What is communication network?
3. What are the most basic communication system setup?
4. Identify 5 communication channels
Objectives
At the end of this session, you should be able to:
(a) define networking
(b) what is the advantage of installing a school network?
(c) list the disadvantages of a school network.
2.1.1 Network
A LAN connects two or types Networks can be large or small. more computers
together, regardless of whether those computers are in the same room or on the same
floor of a building. This would include networks where the computers are relatively
close together. So
LANs would be within the same office, a single building, or several buildings close
together. Hence we can have a school LAN. Many computer users operate small, local
area networks (LANs) within their own home. A LAN is a Local Area Network.
Hubs are used to concentrate a series of computer connections into one location. They
are used with twisted pair wiring systems to interconnect the systems. Hubs can be
passive or active. A passive hub simply splits the incoming signal among all of the ports
in the device. Active hubs retransmit the received signal into the other access ports.
A hub
Repeaters retransmit the signal on one network segment to another segment with the
same signal strength. This allows for very long networks when the actual maximum
distance associated with a particular transmission medium is not.
Routers are more sophisticated tools for steering data between networks. They use the
information in the network protocol (e.g. IP) packet to determine where the packet is to
be routed. They are capable of collecting and storing information on where to send
packets, based on defined configurations or information that they receive through
routing protocols. Many routers are only capable of two network connections, while
larger scale routers can handle hundreds of connections to different media types.
A CISCO ROUTER
Switches allow for the connection of multiple networks for a certain length of time.
Two, and only two, networks are connected together for the required time period.
However, today’s switches not only incorporate this functionality, but also include
routing intelligence to enhance their capacity.
The star pattern connects everything to one host, which is the computer that handles
the network tasks and holds the data. All communications between computers go
through the host. This configuration is good for businesses that have large amounts
of rapidly changing data, like banks and airline reservation offices.
The star pattern connects everything to one host, which is the computer that handles the
network tasks and holds the data. All communications between computers go through
the host. This configuration is good for businesses that have large amounts of rapidly
changing data, like banks and airline reservation offices. The arrangement permits close
control of data. Each computer sees all the data and user sees up-to-date data always. If
a computer other than the host fails, no other computer is affected but if the host
computer or its software goes down, the whole network is down.
Star Topology
The bus pattern connects the computer to the same communications line.
Communications goes both directions along the line. All the computers can
communicate with each other without having to go through the server. The main
advantage is that any one computer or device being down does not affect the others. The
main disadvantage is that a large number of computers cannot be connected this way.
It's physically difficult to run the one communications line over a whole building.
Bus Topology
The ring pattern connects the computers and other devices one to the other in a circle.
There is no central host computer that holds all the data. Communication flows in one
direction around the ring. This configuration is good when the processing of data can be
done on the local PC.
Ring networks tend to be inefficient when compared to Star Networks because data
must travel through more points before reaching its destination. For example, if a given
ring network has eight computers on it, to get from computer one to computer four, data
must travel from computer one, through computers two and three, and to its destination
at computer four. It could also go from computer one through eight, seven, six, and five
until reaching four, but this method is slower because it travels through more
computers.
The disadvantage is that if host computer or its software goes down, the whole
network is down.
Star Topology
Advantages of a Star Topology
The bus pattern connects the computer to the same communications line.
Communications goes both directions along the line. All the computers can
communicate with each other without having to go through the server. The main
advantage is that any one computer or device being down does not affect the others. The
main disadvantage is that a large number of computers cannot be connected this way.
It's physically difficult to run the one communications line over a whole building.
Bus Topology
The ring pattern connects the computers and other devices one to the other in a circle.
There is no central host computer that holds all the data.
Communication flows in one direction around the ring. This configuration is good
Advantages of a Linear Bus Topology when the processing of data can be done on the
local PC.
1. What is a server?
2. What is advantage the advantage of having a school network?
3. Differentiate between LAN and WAN
In this session we shall look at what the Internet is and how it works.
The unit also covers the TCP/IP protocol, a very important so far as
the Internet is concern.
Objectives
At the end of this session, you should be able to:
(a) explain the term Internet
(b) explain how the Internet work
(c) define TCP/IP
In general the networks that make up the internet can be classified as a local area
network (LAN), a wide area network (WAN) or even a regional area network (RAN).
The smaller networks that make up the Internet are either public or private network.
They are therefore owned, controlled and managed by their owners. Unlike these
smaller networks, no single organisation or person owns the Internet. The Internet
Society (ISOC) serves as the international organization for global coordination and
Why do people use the Internet? There are several reasons why people access the
Internet. The uses of the Internet are indicated below. In other words people use the
Internet to:
Find general information about a subject, research educational materials and
learn
Access information not easily available elsewhere
Correspond with far away friends, meet friends and have funs (eg games etc)
Discuss their interests with like-minded people
Send messages and receive messages from across the Internet
Read the news, download or watch movies and also download or listen to
music
Access other computers to exchange files and download software
Do business and shop for goods and services such as airline reservation,
vacation
Take online courses for certification
This is made possible through the services such as the World Wide Web, electronic
mail, file transfer protocol, newsgroups, mailing lists and chat rooms.
The technique of breaking the packets, sending the packets along the best route
available, and reassembling the data is called packet switching. The packets travel along
the fastest route or path available to the recipient’s computer via hardware devices
called routers.
An alternate route or path is used if the most direct path to the destination is overloaded
or not operating.
All communication over the Internet is done through networks and communication lines
owned, operated and maintained by large communication companies called the Internet
Service provider (ISP).
Self-Assessment Questions?
Exercise 5.3
In this session we shall look at how one can connect to the Internet.
There are a number of ways of doing this but time will not allow us
to cover all of them.
Objectives
At the end of this session, you should be able to:
(a) describe how one can connect to the Internet
(b) identify the components needed to connect to the Internet
(c) define factors that affect Internet access
Factors that affect the Internet access are the speed of the connection and the
bandwidth. 56Kbps modem is faster than 28.8kbps modern when accessing the Internet.
Bandwidth is the amount of data transferred through the network.
There are two types of ISPs the service providers and the content providers. The service
providers are companies that provide Internet access and services. The content
providers provide online services for a fee.
Self-Assessment Questions
Exercise 5.4
Objectives
At the end of this session, you should be able to:
(a) know some services on the Internet
(b) know about Internet Conferences
(c) define file transfer protocols and how it works
Your Internet Service Provider (ISP) usually creates an account for you on a mail
server. On this mail server is your personal mailbox which is just a storage location
allocated to you for mails. Your mails are stored in this mailbox automatically as they
are received by the ISP. A mail server is therefore a server that contains user mailboxes
and associated e-mail messages.
Usenet: - (also called Internet News) is a huge network of discussion groups. There are
over 18,000 different 'newsgroups' where people discuss everything imaginable. The
groups are ordered hierarchically - with broad categories such as sci (science), biz
(business), comp (computers), soc (society) and alt (alternate). Once a message has
been posted to a newsgroup, anyone can read it. This makes it a very public discussion
and anyone can join in. Newsgroup sometimes generate a lot of 'noise' - messages that
have little or nothing to do with the subject being discussed. To read newsgroups you
need to have access to a news server. Most ISPs do not provide newsgroups.
A mailing list: - (also called a listserv) is a discussion forum based on email. You don't
have to have any special software to join a mailing list. All the forum discussion will
come straight to your email inbox.
When you subscribe to a mailing list, your email address gets added to a list of the other
subscribers' email addresses. When anyone sends email to the mailing list, that email is
distributed to everyone on the list. Depending on how the mailing list is set up, you
might find that replying to a message automatically means it will be distributed to
everyone on the mailing list. This can be the cause of embarrassing situations, so be
careful and always check the To: address on your email before you press "send".
Chatting is a synchronous form of communication. You don't have to wait for someone
to reply to you - the conversation is in real-time, just like a normal conversation except
typing on a keyboard instead of spoken words. MSN Messenger is a popular, free chat
program from Microsoft. You can add contacts, and the software will inform you when
your contacts have come online so you can start chatting.
Voice Chat - The PC can be used like a phone, with real-time voice conversations. All
you need is a microphone and headphones (or speakers) and some free software such as
Skype. The quality is often better than a phone conversation.
Internet Conferencing
Conferencing involves 2 or more people interacting with each other in multiple ways.
These could be video, audio, text chat or virtual whiteboard. A virtual whiteboard is a
window that appears on the screen of each person in the conference. Anyone can type
text or draw pictures into the whiteboard for everyone else to see.
FTP (File Transfer Protocol) is the transfer files from computer to computer on the
Internet. It can be use it to transfer a Web page from your computer (where you are
writing it) to a Web server so it can be accessed by the world, or you may use it to
download a file from a public archive. An FTP server is a computer that allows users to
upload and download files using FTP.
In order to transfer a file to or from a computer you usually have to have an account (a
login name and password) on that computer. For instance you may have an account on
your ISP's computer so you can put Web pages on it.
Anonymous FTP means that you can access the files on a computer without having to
have an account on it. You can't transfer files (put files) to the computer, but you can
get files from it. For instance you may want to download a program, picture, song lyric,
or a research paper.
Self-Assessment Questions
Exercise 5.5
Objectives
At the end of this session, you should be able to:
(a) know how to use the ‘search engine’ on the Internet
(b) learn ways of searching for information on the Internet
(c) learn about multimedia on the web
Search engines usually search an index or database of Internet sites to locate files and
documents. It does not search the entire Internet as this may take too long a time. The
databases are therefore kept up-to-date all the time. Different search engines also scan
different parts of the Internet and therefore produce different result for the same search.
Another technique is to use subject directories. A subject directory is a search tool that
allows users to navigate to areas of interest without having to enter keywords. Using
subject directories is a simple matter of following the links to the specific topic you are
interested in. They are usually organized in categories such as education, sports,
entertainment, or business.
Self-Assessment Questions
Exercise 5.6
1. What is the use of the “search engines” on the Internet?
2. What make web pages more exciting today?
Unit Outline
This unit takes you through some of the issues in computer security as listed above. It is
going to be very interesting and I am sure you will enjoy it. Unit one will also take you
through common computer security, risks and safeguards.
The unit has been divided into section and each session is further divided into sub-
sessions to make the book easy to read and understand.
Unit Objectives
After studying this unit, you should be able to:
1. define Computer Security and risk management
2. identify types of Electronic infection and theft
3. identify different ways of making system backups
4. define Information privacy
Objectives
At the end of this session, you should be able to:
(a) learn about computer security, risks and safeguards
(b) learn about Information security
(c) define risk management
The threats to the security of your information are varied – from computer hackers to
disgruntled employees to simple carelessness. While protecting computer systems is an
important aspect of information security, it is only part of the process. Here are some
points to consider – and resources to help – as you design and implement your
information security plan.
Sound security for businesses means regular risk assessment, effective coordination and
oversight, and prompt response to new developments. Basic steps in information
security planning include:
periodically monitoring and testing the safeguards to be sure they are working
effectively;
When setting up a security program, your business should consider all the relevant areas
of its operations, including employee management and training; information systems,
including network and software design, and information processing, storage,
transmission and disposal, and contingencies, including preventing, detecting and
responding to a system failure. Although the security planning process is universal,
there’s no “one size fits all” security plan. Every business faces its own special risks.
The administrative, technical, and physical safeguards that are appropriate really depend
on the size and complexity of the business, the nature and scope of the business and the
sensitivity of the consumer information it keeps.
Risks are the possibility of suffering harm or loss. It is a factor, thing, element, or
course involving uncertain danger.
Risk management can be defined as the culture, processes, and structures that are
directed towards the effective management of potential opportunities and adverse
effects. This is a broad definition that can quite rightly apply in nearly all fields of
management from financial and human resources management through to
environmental management. However in the context of contaminated sites, risk
management can be taken to mean the process of gathering information to make
informed decisions to minimise the risk of adverse effects to people and the
environment.
Risk assessment involves estimating the level of risk – estimating the probability of an
event occurring and the magnitude of effects if the event does occur. Essentially risk
assessment lies at the heart of risk management, because it assists in providing the
information required to respond to a potential risk.
Self-Assessment Questions
Exercise 6.1
Objectives
At the end of this session, you should be able to:
(a) define electronic infections
(b) learn about protection from electronic infections
When you listen to the news, you hear about many different forms of electronic
infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs.
For example, a virus might attach itself to a program such as a spreadsheet
program. Each time the spreadsheet program runs, the virus runs, too, and it has
the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses - e-mail virus moves around in e-mail messages, and usually
replicates itself by automatically mailing itself to dozens of people in the
victim's e-mail address book.
Worms - A worm is a small piece of software that uses computer network and
security holes to replicate itself. A copy of the worm scans the network for
another machine that has a specific security hole. It copies itself to the new
machine using the security hole, and then starts replicating from there, as well.
Worms use up computer time and network bandwidth when they are replicating.
Experts predicted that this worm could clog the Internet so effectively that
things would completely grind to a halt.
Trojan horses - A Trojan horse is simply a computer program. The program
claims to do one thing (it may claim to be a game) but instead does damage
when you run it (it may erase your hard disk). Trojan horses have no way to
replicate automatically.
The anti-virus program can be made to run when the system is booted. Another can scan
floppy disks for viruses, and a third program cleans the infected disks.
You can protect yourself against viruses with a few simple steps:
If you are truly worried about traditional (as opposed to e-mail) viruses, you
should be running a more secure operating system like UNIX. You never hear
about viruses on these operating systems because the security features keep
viruses (and unwanted human visitors) away from your hard disk.
If you are using an unsecured operating system, then buying virus protection
software is a nice safeguard.
If you simply avoid programs from unknown sources (like the Internet), and
instead stick with commercial software purchased on CDs, you eliminate almost
all of the risk from traditional viruses. In addition, you should disable floppy
disk booting -- most computers now allow you to do this, and that will
eliminate the risk of a boot sector virus coming in from a floppy disk
accidentally left in the drive.
You should make sure that Macro Virus Protection is enabled in all Microsoft
applications, and you should NEVER run macros in a document unless you
know what they do. There is seldom a good reason to add macros to a document,
so avoiding all macros is a great policy.
You should never double-click on an attachment that contains an executable
that arrives as an e-mail attachment. Attachments that come in as Word files
(.DOC), spreadsheets (.XLS), images (.GIF and .JPG), etc., are data files and
they can do no damage (noting the macro virus problem in Word and Excel
documents mentioned above). A file with an extension like EXE, COM or VBS
is an executable, and an executable can do any sort of damage it wants.
Once you run it, you have given it permission to do anything on your machine. The only
defense is to never run executables that arrive via e-mail.
Self-Assessment Questions
Exercise 6.2
Objectives
At the end of this session, you should be able to:
(a) understand the issue of unauthorized access and use
(b) differentiate between good and bad password
(c) learn about firewall as a way of preventing access
Security measures such as access controls which defines who access a computer, when
they can access it and what actions are allowed is one way of preventing unauthorized
access. Different levels and types of access controls (user ID and password) can be
implemented to prevent unauthorized access and use. In this case users have access only
facilities they are allowed to access. The user may be requested to select a user ID and
password at the time of setup.
3.3 Firewall
A Firewall is a security system, consisting of hardware and/or software that prevents
unauthorized access to data and information usually on the network. It is designed to
prevent unauthorized access to or from a private network. Firewalls can be implemented
in both hardware and software, or a combination of both. Most frequently, Firewalls
are used to prevent unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those that
do not meet the specified security criteria. It is considered a first line of defense for
protecting privacy.
Packet filter: Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. It is fairly effective and
transparent to users, but it is difficult to configure. In addition, it is susceptible
to IP spoofing.
Application gateway: Applies security mechanisms to specific applications,
such as FTP and Telnet servers. It is very effective, but can result in
performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP
connection is established. Packets can flow between the hosts without further
checking once the connection has been made.
Proxy server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
Self-Assessment Questions
Exercise 6.3
Objectives
At the end of this session, you should be able to:
(a) learn about the different types of thefts
(b) learn how to avoid thefts
(c) define computer vandalism
Biometric Systems
Some laptop manufacturers offer laptops with biometric systems build-in. These are
however top shelf models and you would not find such feature in cheap refurbished
laptops. However, there are some solutions, which allow you to add biometric
fingerprint system to your laptop. They usually work as USB or PC Card hardware.
Because of this, they have to function with operating system. This makes bypassing
them quite easy. Combining them with data encryption makes them very effective.
USB Keys
You don't leave your car or house unlocked. So why not also lock your laptop with USB
key? They are small and easy-carrying so you can keep them for example together with
your car keys. All of them have also at least 128MB of memory, which you can use to
store sensitive data. But their main usage is making thief unable to run your laptop
without USB key device. They are relatively cheap and good anti-theft solutions.
Software theft is the unauthorised duplication and/or use of computer software. This
usually means unauthorised copying, either by individuals for use by themselves or
their friends or, less commonly, by companies who then sell the illegal copies to users.
Many kinds of software protection have been invented to try to reduce software theft
but, with sufficient effort it is always possible to bypass or "crack" the protection, and
software protection is often annoying for legitimate users.
It is illegal to:
Copy or distribute software or its documentation without the permission or licence of
the copyright owner.
Run purchased software on two or more computers simultaneously unless the licence
specifically allows it.
Knowingly or unknowingly allow, encourage or pressure employees to make or use
illegal copies sources within the organisation.
When software is upgraded it is generally the case that the licence accompanying the
new version revokes the old version. This means that it is illegal to run both the old and
new versions as only the new version is licensed.
Information theft
A person is guilty of the offense of computer information theft when he/she purposely
or knowingly and without authorization:
(1) Directly or indirectly accesses, or causes to be accessed, any computer, computer
system, computer network, or any of its parts and causes information to be;
Copied for his/her own use, for his/her own benefit, or for the benefit of another,
whether the benefit is known or unknown; or
Deleted from any computer, computer system, computer network or any of its
parts and taken for his/her own use, for his/her own benefit or for the benefit of
another, whether such benefit is known or unknown.
(2) Directly or indirectly causes information intended to be sent or received by another,
to be diverted for his/her own use, for his/her own benefit, or for the known benefit or
use of another, either by;
Copying the information, or
Denying the intended recipient of receiving the information.
(3) Uses information, which he/she knows, or should reasonably know, is stolen
information, for his/her own use, for his/her own benefit, or for the benefit of another.
Self-Assessment Questions
Exercise 6.4
Objectives
At the end of this session, you should be able to:
(a) identify the effect of system failure
(b) know the importance of backup procedures
If you perform regular backups, preferably on a daily basis (at least for user files which
are updated often), you will hopefully reduce the possibility of, and increase your
recovery from, such file loss.
The safest method of doing backups is to record them on separate media, such as tape,
removable drive, writeable CD, etc., and then store your backup sets in a location
separate from your system.
Unarguably, one thing that is more important than performing regular backups is having
them available when the time comes to recover an important file! The procedures for
performing a restore will differ depending on your choice of a backup solution.
Self-Assessment Questions
Exercise 6.5
In the electronic age, raw data has become a valuable commodity—and the protection
of personal information has become increasingly important to our sense of privacy. This
section explains how new technologies have created challenges for the protection of
personal information, and provides an overview of the ways in which it affects privacy.
Privacy is a fundamental human right and a cornerstone of a democratic society. It lies
at the foundation of the rule of law, the secret ballot, doctor-patient confidentiality,
lawyer-client privilege, the notion of private property, and the value our society places
on the autonomy of the individual. This section provides information about the subject.
Objectives
At the end of this session, you should be able to:
(a) define information Privacy
(b) identify how information privacy is related to security
(c) learn about electronic tracking devices
Information privacy is also defined as "the right of individuals, groups and institutions
to determine for themselves, when, how and to what extent information about them is
communicated to others."
A lot of people are unaware that when they go online, we leave an electronic record of
our movements—and we can unconsciously provide personal information to people and
organizations that track such data.
Electronic tracking devices such as cookies, Web bugs and "spyware" are common
means of tracking our online behaviour. These devices collect information such as ISP
addresses, Web sites visited, purchases made, and emails sent.
Self-Assessment Questions
Exercise 6.6