Digital Literacy Notes
Digital Literacy Notes
4.1 Introduction
Demonstrate digital literacy unit of competency is among the seven basic competencies
units offered in all the TVET level 6 qualification. This unit covers the knowledge, skills,
and behaviours required to effectively use computer and other PCs, digital devices such
as smartphones, tablets, laptops and desktop. It entails identifying and using digital
devices for purposes of communication, work performance and management at the work
place. Digital literacy is siginificant to TVET level 6 curriculum due to the critical role
that technology plays in societal and industrial growth. Digital literacy has also gained
recognition as a valuable tool for lifelong learning and collaboration in this global
village.
Computer hardware: This is any tangible device in the computer environment. Some of
the hardware that maybe encountered in this topic are:
Monitor: This is the main output device of a computer. It is commonly known as
Visual Display Unit (VDU).
Printer: is used to print information of paper.
Storage devices: these include flash disks, hard disks and optical disks (e.g. CDs).
Input devices: such as the mouse and keyboard.
Internet: This is a global system of interconnected computer networks that use internet
protocol suite (TCP/IP) to link devices worldwide. The internet carries a vast range of
information, resources and services. Picture information is shared via the internet.
Digital literacy: While literacy is defined as the ability to read and write, digital literacy
is the ability to access, process, understand and create information in the digital
environment.
Content/Procedures/Methods/Illustrations
1.1 Concepts and Functions of ICT
Functions of ICT
Data capture: Process of compiling information e.g. Amazon uses internet
cookies to capture data about the customers’ purchases via the website. So, it use
the data to suggest items to a user related to the previous orders via the website.
Data processing: This involves converting, analyzing, computing and producing
all forms of data information. After capturing data, the system must reorganize
that data based on what the organization wants to use the information for.
Generation of information: Involves organizing information into a useful form.
Storage of information involves retaining information for future use e.g.
Facebook stores user registration details.
Retrieval of information: Process by which a computer device is used to find
and copy data for future distribution and processing. A good example is Google or
Yahoo who have data centers which store information which can be used at a later
stage by the end user to search for information online.
Software types
i. Operating system: This is the program which manages computer hardware e.g.
Linux, Windows, Mac OS X, etc.
ii. Application software (utility programs): These are all programs that users use to
perform different tasks or for problem solving. For example Microsoft word,
Microsoft excel and Microsoft PowerPoint.
iii. Computer networks: A computer network is comprised of at least two computers,
connected by wire or wirelessly that can exchange data.
Types of networks:
LAN (local Area Network): Covers a relatively small geographical area e.g. a
university campus or office building. Examples include Ethernet and Wi-Fi.
WLAN (Wireless Local Area Network): Links two or more devices using wireless
communication within a limited area such as a campus or office building. Some
WLANs exist to extend an existing wired network.
WAN (Wide Area Network): Covers a relatively large geographical area e.g.
cities or states. Connects a greater number of computers and local networks.
Classification of computers
Computers can be classified in the following basis:
Basis of size
Basis of functionality
Basis of data handling
Types of software
Application software: Uses the computer system to perform special functions or
provide entertainment functions beyond the basic operation of the computer itself.
System software: Software for managing computer hardware behavior so as to
provide basic functionalities that are required by users or other software to run
properly. Examples are operating system, device drivers and utility software.
Malicious software: Software developed to harm and disrupt computer e.g.
malware, viruses.
Further Reading
Computer basics by Rajaraman
People.bu.edu/briefcomputerhistory.html
4.3.2.3
4.3.2.4
Practical Assessment
Which one of the following is used to store programs installed on a computer?
a) DVD drive
b) Video card
c) CD drive
d) Hard drive
Project
1. Type the following in a word
document Students
Peter
James
John
Teachers
Lewis
Caleb
Melisa
2. I want to create a second copy of an open document under a different name. What
should I do?
i. copy and paste the text in a new document
ii. use ‘save as’
iii. press ctrl s
iv. open the file again
v. Which of the following methods can you not use to zoom in?
vi. holding ctlr key and scrolling the mouse wheel
vii. using the zoom button
viii. ctrl+ shift +z
ix. Using the zoom slider at the bottom right corner.
4.3.2.7
4.3.2.8
4.3.2.9 References
Mall, R. (2018). Fundamentals of software engineering. PHI Learning Pvt. Ltd.
People.bu.edu/briefcomputerhistory.html
Rajaraman, A. (1995). Introduction to computers. In Academic Library Automation (pp.
6- 16). New Delhi, Ess Ess Publications.
4.3.3 Learning Outcome No 2: Apply security measures to data, hardware,
software in automated environment
4.3.3.1 Learning Activities
Learning Outcome No 2: Apply security measures to data, hardware, software in
automated environment
2.1. Classify data security and privacy (confidentiality of data, Computer software
cloud computing) in accordance with the prevailing and hardware to be
technology. provided.
2.2. Apply security threats (cyber terrorism, hacking) and control
measures (counter measures against cyber terrorism, risk Activities may be
reduction, risk management, pass wording) in accordance with carried out in groups
laws governing protection of ICT. or individually.
2.3. Detect computer threats and crimes.
2.4. Undertake protection against computer crimes in accordance
with laws governing protection of ICT.
Introduction Data security is certainly a hot topic these days. Controlling access to
data helps ensure privacy and is required according to federal agency policies and
regulations. Data security is a process of making sure data are available only to those who
need to use it for a legitimate purpose. We have found that data security is not very
different from other forms of security. The same concepts used to design castles apply to
the construction of servers that offer access to a corporate database. The details are
different, and the technical pieces are quite different, but the same approaches, rules and
lessons apply. Below are some important maxims to keep in mind. Most of them have
stood the test of time for thousands of years:
i. There is no such thing as absolute security: We can raise the attacker’s cost of
breaching our data security to a very high level, but absolute guarantees are not
possible.
ii. Data security is always a question of economics: What is the value of what you
are protecting? How much time, effort, and money are your opponent’s willing to
spend to get through your defenses?
iii. An attacker doesn’t go through security, but around it: Their goal is to find and
exploit the weakest link.
iv. Don’t underestimate the value of your asset: Often common everyday data is
underestimated. Mundane data can be very important.
Definition of key terms Data security: This is the process of making sure data is
available only to those who need it for legitimate purpose.
Data: This is the information that has been translated into a form that is efficient for
movement or processing.
Data privacy /Information privacy: It is the aspect of information technology that deals
with the ability of an organization or individual to determine what data in a computer
system can be shared with third parties.
Security threats: This is the process of an illegal entity gaining access to a company’s
data or information.
Control measures: This is any measure taken to eliminate or reduce the risk of security
threats.
Cyber criminals: These are illegal users who use many different methods to lure you
into parting with your confidential personal or business information.
Content/Procedures/Methods/Illustrations
2.1 Data Security and Privacy Are Classified in Accordance with the Prevailing
Technology
As discussed earlier, data security is the process of making sure data is available only to
those who need to use it for legitimate use. Data security privacy on the other hand is the
aspect of information technology that deals with the ability of an organization or
individual to determine what data in a computer system can be shared with third parties.
As more of our daily lives go online and the data we share is used in new and innovative
ways, privacy and security have become important trust and reputation issues. The
growing volume and sensitivity of information being shared, stored and used is driving
demand for greater transparency about how such information is being protected (security)
and managed (privacy). As a result, data security and privacy have moved from the
backroom to the boardroom. Data breaches and privacy missteps now regularly make
headlines and are a focal point for discussions and legislation worldwide. Failure to
communicate on these important issues can damage business by eroding trust, tarnishing
brand and reputation as well as undermining competitiveness.
Data security ensures that the data is accurate and reliable, and it is available when those
with authorized access need it. A data security plan includes facets such as collecting only
the required information, keeping it safe, and destroying any information that is no longer
needed.
These steps will help any business meet the legal obligations of possessing sensitive data.
Companies need to enact data security policy for the sole purpose of ensuring data
privacy, or the privacy of their customers’ information. More so, companies must
ensure data
privacy because the information is an asset to the company. A data security policy is
simply the means to the desired end which is data privacy. However, no data security
policy can overcome the willing sale or soliciting of the consumer data that was entrusted
to an organization.
4.3.3.3
4.3.3.4
4.3.3.5 Self-Assessment
Written Assessment
1. A computer network consists of two or more computing or other devices
connected by a?
a) Wireless signal
b) Cable
c) Communication media
d) Wire
2. Which is not a method of protecting data from computer threats?
a) Pursuing
b) Rootkit
c) Spam
d) All the above
3. The process of an illegal entity to gain access to a company’s data or information
is?
a) Security threat
b) Data privacy
c) Data security
d) Data integrity.
4. Which one of the following is not a computer threat or crime?
a) Computer virus
b) Malware
c) Rootkit
d) None of the above
5. Which one of the following are categories of the risk of security threats?
a) Damage
b) Negligence
c) Affected user
d) Both a and c
6. Security threats can be classified as.
a) Physical damage
b) Technical failures
c) Compromise of functions
d) All the above
7. What does download from the internet mean?
a) Retrieving files from the internet
b) Lowering your game level on the internet
c) Viewing web pages on the internet.
8. What is data?
9. What is a computer virus?
10. What is data privacy?
11. What is data security?
12. What is a security threat?
Oral Assessment
1. What is a security threat and what are the types of a computer threats you know?
2. Briefly explain the concept of data security and privacy?
4.3.3.5 References
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet
security: repelling the wily hacker. Addison-Wesley Longman Publishing Co.,
Inc.
Panko, R. R. (2010). Corporate computer and network security, 2/e. Pearson Education
India.
Pfleeger, C. P. (2003). Data security.
4.3.4 Learning Outcome No 3: Apply computer software in solving tasks
4.3.4.1 Learning Activities
Learning Outcome No 3: Apply computer software in solving tasks
Learning Activities Special Instructions
4.3.4.2
4.3.4.3
In designing databases, there are a few rules to stick to. It is important to know what these
rules are, but more importantly to know why these rules exist, otherwise you will tend to
make mistakes. On the other hand, worksheets help you with your financial calculations.
Definition of key terms Word processor: This is a computer program or device that
provides for inputs, editing, formatting and output of text often with additional features.
Word documents: All items created using a word processing software.
Word Processing: A computerized method of writing, editing, saving, formatting and
printing texts.
Text: Consists solely of letters.
Characters: Anything typed from your keyboard.
Text wrap: In word processing programs, this occurs when you get to the end of the line
and the text wraps without you pressing the enter key.
Font: Size and style of writing.
Edit: To make changes to a document.
Table: Refers to data arranged in a series of rows and columns.
Word Processing Utilities: These are the software used to manipulate text and apply a
basic design to your pages.
Database: An organized collection of data, generally stored and accessed electronically
for a computer system.
Update: Insertion, modification and deleting of the actual data.
Spreadsheet: A user interface that resembles one or more paper accounting worksheets.
Content/Procedures/Methods/Illustrations
3.1 Word Processing Concepts Are Applied in Resolving Workplace Tasks, Report
Writing and Documentation
As we have seen, word processing is the production of typed documents (such as business
letters) with automated and usually computerized typing and text editing equipment. A
word processing program allows you to create, edit, format and print many types of
documents such as letters. Memos, CVs, etc. You can create World Wide Web pages with
some word processing programs.
Word Processing Concepts and Descriptions
a) Opening word processing package: Word processing package is mostly used in
offices on microcomputers. To open a new document, click on the “start” button
and go to “all programs” and click on “Microsoft word”
b) Opening and closing of documents: Word automatically starts with a blank page.
To open a new file, click on “new”.
c) Page set up: Page set up options are usually available on the “page layout menu”.
Parameters defined by the user help in determining how a printed page will
appear.
d) Print preview: This option is used to view the page or adjust before any document
gets printed.
e) Cut, copy, paste.
f) Table manipulation: Manipulation of table includes drawing a table, changing cell
width and height, alignment of text in the cell, deletion/insertion of rows and
columns and boarders and shading.
In summary, this topic provides us with a clear idea about components of word
processing basics, opening and closing the documents, text creation and manipulation,
formatting the text, table manipulation.
c) Hyphenating words.
Hyphenation allows words to break between the syllables of words. Books and magazines
hyphenate their texts in order to have more uniform spacing between words.
Under the page layout menu, select hyphenation from the page set up submenu and the
word processor will automatically hyphenate the text.
d) Getting word count and other document statistics.
Word count is finding out the numbers of words, characters, paragraphs and lines in the
document.
Under the review menu, click the word ‘count’ from the porting submenu. A popup box
will appear showing the document’s statistics which includes pages, words, characters
(with and without spacing), paragraphs and lines.
Functions: These are predetermined formulas in excel. They eliminate laborious manual
entry of formulas while giving them human friendly names. For example, = SUM
[A1:A3]. This function sums all the values from A1 to A3.
ii. AVERAGE
= AVERAGE {number 1, [number 2,}
iii. COUNT
This function counts all cells in a given range that contain only numeric values.
=COUNT {value 1, [value 2],}
iv. COUNTA
This function counts all cells in a given range regardless of the type i.e. it counts dates,
times, strings.
= COUNTA. {Value 1, [value2],}
v. IF
It is used when you want to sort your data accordingly to a given logic.
=IF {logical –test, [value –if-true], [value-if-false]}
vi. TRIM.
This function makes sure your functions do not return errors due to unruly spaces.
=TRIM [text]
i. Identifying Entities: Types of information that are stirred in a database are called
entities. These entities exist in four kinds: people, things, events and locations. If
the information you want to include doesn’t fit in these categories, then it is
probably not an entity but a property of an entity, an attribute.
ii. Identifying Relationships: Identify the relationship between entities and
determine the cardinality of each relationships. The relationship is the connection
between entities. Types of relationships include:
One to one
One to many
Many to one
Many too many
iii. Identifying attributes: The data elements that you want to save for each entity
are called attributes. For example, about the product that you sell, you may want
to know the price, name of the manufacturer, etc.
iv. Assigning keys
Primary keys: One or more data attributes that uniquely identify an entity. A key
that consists of two or more attributes is called a composite key. All attributes part
of a primary key must have a value in every record (which cannot be left empty)
and the combination of these attributes must be unique in the table.
Foreign keys: This is an entity in reference to the primary key of another entity. It
can also be part of a primary key, in that the attribute will be indicated primary
key behind its name.
Defining the attributes data type
The standard data types that every database knows and are most likely to be used are:
i. CHAR: Includes characters, numbers, and punctuations and has a characteristic
that is always saved as a fixed amount of positions e.g. CHAR 10.
ii. VARCHAR: same as CHAR but the difference is that VARCHAR only takes as
much space as necessary.
iii. TEXT: Contains large amounts of texts.
iv. INT: Contains a positive or negative whole number e.g. INT 10
v. FLOAT, DOUBLE: It can store floating point numbers.
3.7 Provides Data Sorting, Indexing, Storage, Retrieval and Security in Databases
Data storing in database is done by a process called Normalization.
Normalization
Normalization makes your data model flexible and reliable. It does generate some
overhead because you usually get more tables, but it enables you to do many things
without having to adjust it.
Normalization the first form: States that there may be no repeating groups of
columns in an entity.
Normalization the second form: States that all attributes of an entity should be
fully dependent overall primary key.
Normalization the third form: States that all attributes need to be directly
dependent on the primary key and not on other attributes.
Saving Databases
Access doesn’t require that you save your data. It automatically saves any edits you make
to the records in a table.
When you add or edit a database object, Access waits until you finish and close the object
at which it prompts you to save or discard your changes.
Conclusion The unit covered the application of computer software in solving tasks
in accordance with workplace procedures. We looked at word processing using Microsoft
word, preparing worksheets using Microsoft excel and designing databases using
Microsoft Access.
Further Reading
Schneider, G. M., & Gersting, J. (2018). Invitation to computer science. Cengage Learning.
4.3.4.3
4.3.4.4
4.3.4.5 Self-Assessment
Written Assessment
1. What stores information in databases?
a) Query
b) Report
c) Table
d) All the above
2. In a computer, a tool which is used to find a similar or alternative word in a
document is called?
a) Finder
b) Thesaurus
c) Dictionary
d) Style Cluster
3. Computer word processing includes process of?
a) Entering text
b) Editing text
c) Formatting document
d) All of the above
4. When starting word, default document window name is
a) Document 1
b) File 1
c) Word 1
d) Wpd 1
5. DBMS is a software
a) True
b) False
6. Database is generally
a) System centered
b) User centered
c) Company centered
d) Data centered
7. The restrictions placed on the data
a) Relation
b) Attribute
c) Parameter
d) Constant
8. What is a word processor?
9. What is a database?
10. What is a spreadsheet?
11. What is a function in MS Excel?
12. What do you understand by normalization?
Oral Assessment
1. What are some of the word processing concepts you understand?
2. What are some of the ways that one can insert data in Microsoft excel?
Practical Assessment
1. Type a word document using a word processing utility of your choice and explain
the importance of growing technology in the modern world.
2. Using Microsoft excel, come up with a spreadsheet that inputs all the marks in
your academic year and come up with the total marks. Generate a report.
3. Briefly explain the features of Microsoft word and excel.
Project
Using the knowledge on database design, come up with a database called class of year
2019.Create tables with your names, ID number, unit and date of admission as the fields.
Create another table called course, with course ID, course name and year as the fields.
Use the appropriate relationships to link these table then fill each with a maximum of 6
entries.
4.3.4.9 References
Hajek, D. W. (2017). Introduction to Computer Graphics.
Schneider, G. M., & Gersting, J. (2018). Invitation to computer science. Cengage
Learning. Wempen, F. (2014). Computing fundamentals: IC3 edition. John Wiley &
Sons.
4.3.5 Learning Outcome No 4: Apply internet and email in communication
at workplace
4.3.5.1 Learning Activities
Learning Outcome No 4: Apply internet and email in communication at workplace
Learning Activities Special Instructions
4.1. Open and apply electronic mail addresses in workplace Computer software
communication in accordance with office policy. and hardware to be
4.2. Define and execute office internet functions in accordance with provided.
office procedures.
4.3. Determine Network configuration (organizing and maintaining Activities may be
information on the components of a computer network) in carried out in groups
accordance with office operations procedures. or as individual.
4.4. Install and manage official World Wide Web according to
workplace procedures.
4.3.5.2
4.3.5.3
Email: This is a worldwide system for sending and receiving electronic messages from
one computer to another.
HTTP (Hyper Text Transfer Protocol): This is a standard protocol for communications
between a web browser and a web server.
Web browser: This is a program that lets the user browse through information in the
web. Intranet - Is an internal corporate network used in an organization to enable the
sharing of documents among coworkers.
Extranet: It works in the same manners as intranet but provides information to selected
users outside the organization.
Web pages: Documents published by organizations and individuals who are interested in
putting themselves on the web.
Network configuration: This is the process of setting network controls, flow, and
operation to support the network communication of an organization and or network
owner. It is also known as network set up.
World Wide Web (WWW): This is a global (international) system of connected web
pages containing information such as text, pictures, sound and video.
Content/Procedures/Methods/Illustrations
1.1 Opening and Applying Email Addresses in Workplace Communication
Electronic mail (email)
Email is a worldwide system for sending and receiving electronic messages from one
computer to another. Email refers to electronic messages sent over the internet or a
network. Email can contain both text and files. With email, users can create send
messages to one user, several users or all the users on a distribution list. Most email
software enables users to send text messages. Users can also attach files from word
processors, spreadsheets, reports, production data etc. and then send them via email.
Components Required
For one to be able to communicate using email, the following components are required:
A computer: Where you will send and receive email.
An email program: Programs that let you send, receive and manage email
messages. They include Microsoft outlook, outlook express, lotus notes and
Eudora.
Email addresses of the sender and the receiver.
An internet service provider (ISP): Company who will deliver your messages to
the receiver.
Email addresses
Each user has his/her own email address in form of computer storage space to receive
messages. The email address is accessed via a computer terminal within the system. In
addition, each user has a password to protect access.
Internet services
Electronic mail [email]
Online chatting
Downloading of programs
File transfer
Video conferencing
Uses of the internet
Buyers can do shopping online.
Salespeople can use the internet to keep in touch with their home offices.
Students can communicate and gather information.
Researchers can get information.
Web pages: Documents published by an organization and individuals who are interested
in putting themselves on the web.eg text, pictures, sound, video,
Website: Collection of web pages belonging to an organization or individual
Web browser: Program that lets the user surf on the web. Some of the common types of
web browsers are Internet Explorer, Firefox, Chrome, Microsoft Edge, Torch, etc.
Web hosting: A WWW server is a computer with programs that answers requests for
documents from clients [browsers] over the internet.
Web address: (Uniform Resource Locator URL) An address is a location of a file. Each
web page in the world has a unique internet address or location. The internet addresses
are called URLs. e.g. URL of Microsoft is http://www.microsoft.com
Conclusion The unit dealt with applying internet and email in communication. We
looked at how to open emails and applying them in workplace communication. We also
looked at the components of the email, its advantages and disadvantages. We looked at
the internet, its features and functions and we also looked at some of the network
configurations
Further Reading
4.3.5.7 Self-Assessment
Written Assessment
1. The program that lets the user browse through information on the web is called.
a) Intranet
b) Extranet
c) Web browser
d) Web pages
2. In internet technology IP means?
a) Internet provider
b) Internet protocol
c) Internet procedures
d) Internet processor.
3. A website’s front page/main page is called?
a) Browser page
b) Search page
c) Home page
d) Bookmark
4. Verification of a log in name and password is known as?
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
5. The process of transferring files from a computer on the internet to your computer
is called?
a) Uploading
b) Forwarding
c) FTP
d) Downloading.
6. Internet explorer falls under.
a) Operating system
b) Complier
c) Browser
d) IP address.
7. What is the full form of WWW in web address?
a) World Wide Web
b) Worldwide word
c) Worldwide wood
d) None of these.
8. What is an email?
9. What is an attachment?
10. What is Microsoft outlook?
11. What is the internet?
12. What is the World Wide Web?
Oral Assessment
1. What are some of the functions of the internet?
2. What are some of the advantages of the internet?
Practical Assessment
Open a web browsing application and go to address http://www.ecdl.org/mysampletestvs/
i. Name the second of the 2 logos displayed in the top of the screen that loads (not
the ECDL logo).
ii. Click on the social networking link. What is this person’s marital status?
iii. Copy and paste this person’s education information into the answer box.
4.3.5.9
4.3.5.10
4.3.5.11 References
LaMacchia, B. A., Lange, S., Lyons, M., Martin, R., & Price, K. T. (2002). NET framework
security. Reading: Addison-Wesley.
Northcutt, S., & Novak, J. (2002). Network intrusion detection. Sams Publishing.
Panko, R. R. (2010). Corporate computer and network security, 2/e. Pearson Education
India.
4.3.6 Learning Outcome No 5: Apply Desktop publishing in official assignments
4.3.6.1 Learning Activities
Learning Outcome No 5: Apply Desktop publishing in official assignments
Learning Activities Special Instructions
5.1. Identify desktop publishing functions and tools in accordance Computer software
with manufactures specifications. and hardware to be
5.2. Develop desktop publishing tools in accordance with work provided.
requirements.
5.3. Apply desktop publishing tools in accordance with workplace Activities may be
requirements. carried out in groups
5.4. Enhance typeset work in accordance with workplace standards. or as individual.
4.3.6.2
4.3.6.3
These five uses of desktop publishing software are only a few and after taking advantage
of desktop publishing you will soon realize there are many other uses of DTP software
that you didn’t realize before. Desktop publishing has proven beneficial to corporations,
the work at home and the starring artists. Some of the desktop publishing tools we will
discuss them below:
i. Adobe page maker
ii. Adobe Photoshop-mainly used for editing and formatting photographs
iii. Adobe illustrator-used for creating complex freehand artwork such as drawing and
logos
iv. Microsoft publisher
v. Harvard graphics
Graphic-based desktop publishers have superior capabilities for handling images such as
setting resolutions, brightness contrast, cropping and filling images with color.
5.4 Typesetting
Type setting is the composition of the text by means of arranging physical types or digital
equivalent. Stored letters and other symbols (called sorts in mechanical systems and
graphics in digital system) are retrieved and ordered according to a language orthography
for visual display. Typesetting is the process of arranging letters numbers and characters
on a printed or digital space. Typesetting is done to maximize print space, for graphic
design purposes and generally to facilitate a given result for the orientation of text on a
page. Typesetting began with the original printing presses, where this process was
profoundly a manual task. Workers had to struggle with bulky machines and manually
integrate letters and character, eventually sets of printed dies to set up typesetting for print
production. The typesetting processes of today are radically different. Early digital
typesetting information was stored on disk drives. Eventually tools like text markup
languages as well as solid taste media and modern networking, evolved typesetting to the
point where today processes rely on advanced algorithms that knows just to put and how
to position on each letter and character.
Further Reading
Toor, M. L. (1996). The Desktop Designer's Illustration Handbook. John Wiley & Sons.
4.3.6.5
4.3.6.6
4.3.6.7 Self-Assessment
Written Assessment
1. You have finished your travel brochures for social studies. How can you see what
your document will look like before printing?
a) View brochure
b) Print review
c) Open the brochure
d) You can’t you must print it first
2. Typing in ALL CAPS and small CAPS is the same thing?
a) True
b) False
3. Which photography file format is common printed documents?
a) TYEG
b) GIF
c) TIFF
d) AVL
4. All the following are design principles for desktop publishing EXCEPT
a) Alignment and write space
b) Random graphics and text
c) Proximity and unity
d) Consistency and contrast
5. Type of publication used to give out contract information usually printed on card
stock is.
a) Business card
b) Letter head
c) Brochure
d) Newsletter
6. Type of publication that includes the name and logo of the company or individual,
the address, phone number, email address and tax number is.
a) Business cards
b) Letter head
c) Brochure
d) None of these
7. What is using a computer and a software program to produce high quality, printed
documents that combine text and graphics?
a) Word processing software
b) Desktop publishing
c) Painting software
8. What is desktop pursing?
9. List two areas of DTP application
10. What is layering?
11. What is publishing?
12. List two examples of desktop publishing software.
Oral Assessment
1. Why is layering a very useful feature in a desktop publisher?
2. Why is a desktop publisher preferred in designing documents than a word
processor?
Practical Assessment
1. Contribute a desktop published article to a publication. The production will
include colour and graphics. It will be based on interview and other methods of
research.
2. Produce a desktop published color advertisement for web or magazine
publication. This will be based on a creative brief negotiated with a client and two
other methods of research.
Project
Write and desktop published a formal report or discursive paper on an issue of concern.
This production will use color and include graphics it will be based on an interview and
two other methods of research.
4.3.6.9 References
.
Blakey, S. Logging on for Desktop Publishing.
Covington, M. M. (1995). Barron's Dictionary of Desktop Publishing. Barron's
Educational Series Inc.
Toor, M. L. (1996). The Desktop Designer's Illustration Handbook. John Wiley & Sons.
4.3.7 Learning Outcome No 6: Prepare presentation packages
4.3.7.1 Learning Activities
Learning Outcome No 6: Prepare presentation packages
Learning Activities Special Instructions
6.1 Identify types of presentation packages in accordance with office Computer software
requirements and hardware to be
6.2 Create and formulate slides in accordance with workplace provided.
procedures
6.3 Edited and run slides in accordance with work procedures. Activities may be
6.4 Print slides and handouts according to work requirements. carried out in groups
or as individual.
4.3.7.2
4.3.7.3
Definition of key terms Presentation software: This is one of the application software
that is used to display information in the form of a slide show.
Presentation package: This is a software package suite that contains programs designed
to accompany the speaker when he makes a presentation. It is always in form of a slide.
a) Microsoft PowerPoint
This is one of the popular presentation software developed by Microsoft. It is available in
Microsoft office packages. You can prepare a slide by using PowerPoint. PowerPoint is
available in different versions such as Microsoft office PowerPoint 2000, 2003 2004,
2007, 2010, etc. All PowerPoint files have.pptx extensions
Advantages of Microsoft PowerPoint
The program is very easy to use.
We can prepare presentation slides within a short period of time.
We can insert images, videos etc.
Various themes are available in this program.
Many viewings options.
Opportunity of animation.
Slides can be printed.
You can make fancy transitions between your slides.
b) Impress
Created by Sun Microsystems Inc. Impress is part of a suite of programs offered as a free
download. It contains a word processor, a spreadsheet program and a drawing program.
c) Windows Moviemaker
This desktop video program was created by Microsoft and is pre-installed on every
windows computer. Windows Moviemaker allows you to create and edit movies to use to
accompany your presentation, although you can also add graphics, create a slideshow just
as in PowerPoint and Impress.
NOTE: In the following sub-topics, we will discuss Microsoft PowerPoint
6.2 Slides Are Created and Formulated in Accordance with Workplace Procedures
When using PowerPoint, start by:
i. Clicking the start button located on the task bar
ii. Clicking all programs
iii. Clicking Microsoft office
iv. Then clicking Microsoft PowerPoint
You will be prompted to use options such as open an existing presentation or create a new
presentation.
PowerPoint screen
The PowerPoint screen consists of:
The title bar: Contains the current presentation, name and also minimize, restore
and close button.
Menu bar: Contains the menu used to design presentation.
Standard toolbar: Commands icons to open, save, print, and spell check.
Formulating toolbar: Contains fonts, font size, bold, italic, underline, alignment,
font color etc.
Task pane: Has all common functions that you might need when designing your
presentation such as creating new project, new side etc.
6.3 Slides Are Edited and Run in Accordance with Work Procedures
i. Use of themes
A PowerPoint template is a pattern or blueprint of a slide or a group of slides that you can
save as a .pptx file. Templates contain layouts, theme colors, theme fonts, theme effects,
background styles and even new contents. We follow the following steps:
Click on design tab
Choose available themes or click on more button to search for other different
themes.
If the color of theme needs to be changed, then click on the drop-down arrow.
If you like to choose or make different colors, then create new theme colors.
Choose the color and click on save button.
If the background needs to be changed, then click on background styles.
Choose available backgrounds or click on format background to change the style
of pictures and colors. Finally click on the close button.
v. Slide animation
Slide animation effects are predefined special effects that you can add to objects on a
slide to apply an animation effect.
Select the object.
Click the custom animations from the animation tab. animation pane will appear
on the right side of the screen.
Click the add effect and choose the appropriate effect from the pane.
Further Reading
Lambert, J. (2016). MOS 2016 Study Guide for Microsoft PowerPoint: MOS Study Guide
Micro Power. Microsoft Press.
4.3.7.5
4.3.7.6
4.3.7.7 Self-Assessment
Multiple Choice Questions
1. Material consisting of text and numbers is best presented as
a) A table slides
b) A bullet slides
c) A title slides
d) None of the above
2. To start slide show of a presentation
a) Press f5 key
b) From slide show tab choose to start from beginning option
c) From slide show menu chose rehearse timing
d) Both(A) and (B)
3. The effect applied to display when slide changes in slide show view is
a) Slide transition
b) Slide animation
c) Custom transition
d) None of the above
4. When you delete a text box object from a slide in PowerPoint presentation
a) The text box and text both are deleted
b) The text box is deleted, and the text is posted on the slide
c) The object is deleted but text box and the text inside is left on the side
d) None of the above
5. In a PowerPoint presentation
a) Movie clips can be inserted but not sound clips
b) Sound clips can be inserted but not movie clips
c) Both can be inserted
d) Only movie clips can be inserted
6. From which tab can you access picture, textbox and chart etc.
a) Home
b) Insert
c) Transitions
d) None of the above
7. Which one of the following is not part of a slide design?
a) Design template
b) Color scheme
c) Slide layout
d) None of the above
8. What is publishing?
9. What is presentation package?
10. What is Microsoft PowerPoint?
11. What is the purpose of presentation?
12. What is type setting?
Practical Assessments
1. How do you know if you followed best practices for creating effective
PowerPoint presentations?
2. How do you show your presentation online in PowerPoint?
3. How do you record a slide show in PowerPoint 2013?
Project
Create a video using PowerPoint 2013
4.3.7.9
4.3.7.10
4.3.7.11 References
Barbara, B. (2016). Teach Yourself Visually PowerPoint 2016.
Lambert, J. (2016). MOS 2016 Study Guide for Microsoft PowerPoint: MOS
Study Guide Micro Power. Microsoft Press.
Lowe, D. (2018). PowerPoint 2019 for Dummies. John Wiley & Sons.