ICT TG Grade-9 Final J.B. Dixit 12-08-2011 (For Printing)
ICT TG Grade-9 Final J.B. Dixit 12-08-2011 (For Printing)
GRADE 9
Authors
Dixit J.B.
Saurabh Gupta
Evaluators
Gelan Tulu
Genene Tadesse
Zekarias Kebede
The development, printing and distribution of this teacher guide has been funded through the General education
Quality Improvement Project (GeQIP), which aims to improve the quality of education for Grades 1-12 students in
government schools throughout ethiopia.
The Federal Democratic Republic of ethiopia received funding for GeQIP through credit/financing from the
International Development Associations (IDA), the Fast Track Initiative Catalytic Fund (FTICF) and other development
partners—Finland, Italian Development Cooperation, the Netherlands and UK aid from the Department for
International Development (DFID).
The Ministry of education wishes to thank the many individuals, groups and other bodies involved—directly and
indirectly—in publishing the teacher guide and accompanying textbook.
Developed, printed and distributed for the Federal Democratic Republic of ethiopia, Ministry of education by Laxmi
Publications Pvt. Ltd., India under GeQIP Contract No. eT-Moe/GeQIP/IDA/ICB/G-02/09-D
All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written
permission of the copyright owner or a licence permitting restricted copying in ethiopia by the Federal Democratic
Republic of ethiopia, Federal Negarit Gazeta, Proclamation No. 410/2004 Copyright and Neighboring Rights Protection
Proclamation, 10th year, No. 55, Addis Ababa, 19 July 2004.
Disclaimer
every effort has been made to trace the copyright owners of material used in this document. We apologise in advance
for any unintentional omissions. We would be pleased to insert the appropriate acknowledgement in any future
edition.
Printed in India.
CONTENTS
Unit 1: Introduction to ICT ....................................................................................................................................... 1
Syllabus ........................................................................................................................................................... 49
Glossary ........................................................................................................................................................ 63
References ...................................................................................................................................................... 68
introduction to the teacher guide
A perfect guide for an ICT teacher is one that provides support to the teacher to engage the students
in joyful learning. Information and Communication Technologies (ICTs) refer to the possibilities
offered by the convergence of data processing techniques, electronic media, and telecommunications,
a convergence that has become evident over the past few years.
ICTs are grouped under two categories: traditional and new. Traditional ICTs are radio, television,
and fixed line telephones etc., which have been gradually ingrained in the daily habits and lives of
people and communities. New ICTs consist of computers and specific data processing applications
accessible through those computers (e-mail, Internet, Word processing, and other data processing
applications).
New ICTs are now found on the development agenda of African countries like ethiopia, and
strategies have been gradually implemented to integrate them into the development process. Many
countries have initiated significant reforms in the telecommunications sector: privatizing companies,
liberalizing and ending national monopolies in this sector.
This Teacher Guide will help the teachers to:
l explain how Information and Communication Technology (ICT) has the potential to make a real
improvement to teaching and learning in schools.
l demonstrate a wide variety of ways in which ICT can be used to enhance learning, offering a
fresh burst of inspiration for them i.e., the busy school teachers.
l take a structured approach, ensuring that the students can be guided progressively through all
the contents in order to achieve the required standards for achieving Qualified Teacher Status,
and also to continue their development in ICT to an advanced level.
l analyze all the common ICT tools and explain how they can exploit these tools for effective
learning.
l explore how students can learn with ICT, how their skills develop, and how these skills can aid
their learning.
l provide a framework for planning, analyzing and evaluating teaching with ICT.
l use Internet, educational trips and other aids to support classroom teaching.
l prepare additional activities and assessments for the students.
l offer a range of innovative tasks, resources and methods of assessment.
l use key ideas, skills and techniques of ICT in other curriculum areas.
The guide also provides some suggested websites that have additional content for the teacher.
INTRODUCTION
unit 1 TO ICT
(18 PERIODS)
UNIT OUTCOME
Students will be able to:
l know the term data, information, technology and the sources of information;
l understand the differences between computers of one generation from the other;
l recognize the types of computers used today and their difference;
l understand the computer system.
l All the data that is entered into a computer The second method requires a table of powers of 2
is first converted into the binary form and as shown below:
after processing, it is again converted to human n 2n
readable form.
0 1
l There are different types of number systems 1 2
(binary, octal, hexadecimal) that are used to
2 4
represent data.
3 8
l We can convert a number in one system to the
4 16
other system by following rules specified by the
number system. 5 32
l Software can be classified as systems and Because of this restriction, it is more useful for small
application software. numbers where these powers have been memorized.
Starting with the decimal number to be converted,
l Operating system is a bridge between the n
obtain the largest power of 2 i.e., 2 from the table
computer hardware and the user.
without exceeding the given number. Record 1 at
the (n + 1)th position (MSB). Then subtract the table
Important facts and formulae, obtained number from the original number. Repeat
tables, charts, etc. the process for the remainder, and continue until the
Conversion of Numbers from Decimal to remainder is 0. Fill 0s at those positions which have
Binary not been recorded with 1s. Finally read the binary
digits i.e., bits to get the result.
There are two methods for converting (integers) from
Example 1. Convert 2310 to binary.
decimal to binary.
Solution. From the table, 16 is the largest number
The first method of converting decimal to binary without exceeding 23.
is repeated-division method. In this method, the 4
2 = 16 i.e., put 1 at (4 + 1)th position (MSB).
number is successively divided by 2 until it becomes 0
5th 4th 3rd 2nd 1st
and its remainders recorded. The final binary result is
1
obtained by assembling all the remainders, with the last
23 – 16 = 7
remainder being the Most Significant Bit (MSB). This
From the table, 4 is the largest number without
method has been explained in the Student Textbook.
exceeding 7.
22 = 4 i.e., put 1 at (2 + 1)rd position. From the table, 2 is the largest number without
5th 4th 3rd 2nd 1st exceeding 3.
1
1 1 2 = 2 i.e., put 1 at the (1 + 1)nd position.
7–4=3 8th 7th 6th 5th 4th 3rd 2nd 1st
From the table, 2 is the largest number without 1 1 1 1
exceeding 3. 3–2=1
1
2 = 2 i.e., put 1 at (1 + 1)nd position.
From the table, 1 is the largest number without
5th 4th 3rd 2nd 1st exceeding 1.
1 1 1 0
2 = 1 i.e., put 1 at (0 + 1)st position.
3–2=1
8th 7th 6th 5th 4th 3rd 2nd 1st
From the table, 1 is the largest number without
1 1 1 1 1
exceeding 1.
0
2 = 1 i.e., put 1 at (0 + 1)st position. 1 – 1 = 0.
5th 4th 3rd 2nd 1st Now, the remainder is 0. Fill 0s at the 7th, 5th
and 4th positions, where 1 was not recorded. So, the
1 1 1 1
various 1s and 0s obtained from the above process are
1–1=0
shown below:
Now, the remainder is 0. Fill 0 at the 4th position,
where 1 was not recorded. So, the various 1s and 0s 8th 7th 6th 5th 4th 3rd 2nd 1st
obtained from the above process are as follows: 1 0 1 0 0 1 1 1
5th 4th 3rd 2nd 1st Thus, 16710 = 101001112
1 0 1 1 1
Thus, 2310 = 101112 Role of the students
Example 2. Convert 16710 to binary. In this unit, the students are supposed to have an
Solution. From the table, 128 is the largest number introduction to ICT. The activity based method should
without exceeding 167. be followed to understand the subject matter which
7 is the best way of better understanding of the subject
2 = 128 i.e., put 1 at (7 + 1)th position (MSB).
8th 7th 6th 5th 4th 3rd 2nd 1st matter.
1 ICT has the potential to transform learning in and
beyond the classroom. Some of the perceived benefits
167 – 128 = 39
to learners are:
From the table, 32 is the largest number without
exceeding 39. l They can access enormous amounts of information
5 quickly;
2 = 32 i.e., put 1 at (5 + 1)th position.
l They can work at their own pace;
8th 7th 6th 5th 4th 3rd 2nd 1st
1 1 l Special needs, both remedial and extension, can
be offered during the same lesson;
39 – 32 = 7
l Course material can be offered simultaneously
From the table, 4 is the largest number without
in different languages;
exceeding 7.
2
2 = 4 i.e., put 1 at (2 + 1)rd position. l They can access quality material irrespective of
their geographical location;
8th 7th 6th 5th 4th 3rd 2nd 1st
l Academic courses can be offered
1 1 1
asynchronously;
7–4=3
4 n Information Communication Technology — Grade 9 Teacher Guide
Unit 1 – Introduction to ICT
l They can interact with peers and experts outside l ICT offers a host of different tools to demonstrate
the classroom, town, and/or country; learning, suitable for divergent and different
l ICT can offer simulations where the student can intelligences; and,
experiment by changing the variables; l Young students can easily accept the
technology.
Administrators
School administrators use computers to communicate electronically (e.g., e-mails) with other staff members
and parents, and they also use computers to generate letters and documents for parents, staff and education
department.
Webmasters
Computers are also used in schools in order to maintain websites. School webmasters upload important
documents to electronic document files, update calendars and important school information and provide
helpful links to parents and teachers.
Information Communication Technology — Grade 9 Teacher Guide n 5
Unit 1 – Introduction to ICT
Teachers
Teachers use computers for a variety of reasons. They use computers to keep electronic grade books; maintain
and update personal websites to share information with families; communicate with other teachers, parents
and administrators and use software to create classroom newsletters.
Students
In schools, students use computers to learn both with and from technology. Computers enable students to
research a variety of subjects. Students can also use computers to view assignment guidelines and requirements
at home and communicate with teachers about assignments.
Binary Code
Do you remember the power supply that is inside your computer and how it
sends electricity to all of the components? That electricity is what creates an
on signal. The memory chips inside your computer are divided into thousands
of tiny compartments called bits. Each bit has an electronic switch or gate.
On means the gate is open and letting electricity go through. The computer
reads on or open switches as a number 1. Closed gates are off because
the electricity is blocked and cannot get through. The computer reads off bits Fig. 1.2: Binary code
as 0. It is by grouping these bits together to form a series of 1/0 commands, that
data is formed. Eight bits are grouped together to form a byte. In this group of
eight, there are 256 possible combinations of 1/0. The grouping of 1/0 within a
byte is called Binary Code.
For example, when you type the letter A on your keyboard, electrical signals
are sent from the keyboard to the CPU. The CPU turns the signals into binary
code. Then, the computer reads the code and sends it on to the monitor to
display the letter A (see Fig. 1.3). Fig. 1.3: Conversion of a letter
into binary code and back
Suggested Activity
The computer mainly consists of hardware disk drive, hard-disk drive and CD or DVD
and software components. Both of these work drive.
together to process data. Figure 1.9 illustrates 3. System Software: Software that helps the
these two components: computer perform essential operating tasks.
It consists of several programs. The most
important is the operating system, the
master program that runs the computer.
For example, Windows XP, Windows 7, Unix,
Linux and the Macintosh operating system.
Fig. 1.9: Hardware and Software Application software cannot run without system
Hardware consists of all machinery and equipment software.
in a computer system. Hardware runs under the Application Software: Software that has been
control of software and is useless without it. developed to solve a particular problem, perform
However, hardware contains the circuitry that useful work on general-purpose tasks, or provide
allows processing. entertainment.
The hardware components are: input devices, Application software such as word processing,
output devices and system unit. Software also spreadsheet, presentation, desktop publishing,
called programs are step-by-step electronically database management, graphics and
encoded instructions that tell the computer how communications packages are commonly used
to perform a task. Without software, hardware is tools for increasing user’s productivity.
useless.
4. Operating system is the master control program
Software is divided into two main categories: that runs the computer. For example, Windows
System software and Application software. XP. The features of an operating system are:
2. The major hardware components of a computer (i) Manipulates the files and folders on a
system are listed below: computer.
Input Devices: Keyboard and mouse. (ii) Transfers files from one folder to another.
Output Devices: Monitor, printer and sound (iii) Finds a file or folders using a ‘search’
speakers. facility.
System Unit: CPU, memory chips, motherboard
(iv) Customizes the computer desktop.
and some secondary storage devices—floppy-
Suggested Activities
Refer to sub-unit 1.5 of the Student Texbook for doing Activity 2
Computer
A computer is an electronic device that can accept, store and process data under the control of set of instructions
(see Fig. 1.10).
As computer pioneer John Von Neumann has said, the device should not be called the computer but rather
the “all-purpose machine”. It is not just a calculating machine but it can be put to any number of uses.
The computer mainly consists of hardware and software components. Both of these work together to process
data.
Hardware
It refers to the devices you can physically see and touch in and on the computer. The hardware components
are:
Input Devices: These allow people to put data into the computer in a form that the computer can use, for
example, keyboard, mouse, and microphone (see Fig. 1.11).
Useful Tip
To identify the processor, clock speed and amount of RAM (Random Access Memory) in a computer system
having Windows XP operating system:
Click Start → Control Panel → Performance and Maintenance System
UNIT OUTCOME
Students will be able to:
l understand how to open word processing software, and create, and save a document;
l recognize how to format a document in a desired way;
l apply any of formatting features in their document;
l understand how to open presentation software, and create and save a document;
l recognize how to create a slide show using animation and sound.
l Text can be entered anywhere in a document l The slide layout in PowerPoint is the arrangement
area by placing the cursor at that place. of all the items that make up your slide, such as
l The Undo option is used to undo the previous title, graphics or text boxes.
action and the Redo option will repeat the ROLE OF THE STUDENTS
previous Undo action.
In this unit, the students are supposed to learn the basic
l Formatting means changing the appearance of concepts of Word Processing, Presentation Software
text. and Techniques. The activity-based method should be
l Presentation software is a tool used to create followed by understanding the subject matter which
visual presentations. is the best way of better understanding of the subject
l A presentation package helps both: the speaker matter.
with an easier access to his/her ideas and the Different type of technologies can be used by the
participants with visual information. students to support and enhance learning. There are
l We can make slides using features such as creating many resources which can help schools to plan for
slides, inserting text, formatting text, inserting technology that will have a positive impact on student
clipart, formatting background, inserting slides, achievement. Various technologies deliver different
deleting slides and inserting images from other kinds of content and serve different purposes in the
files. classroom. For example, word processing promotes
communication skills and presentation software
l Presenting a slide show is the most useful view
promotes presentation skills of students. So, it is
of PowerPoint. It is used to display the slides in
important to consider how these electronic technologies
a desired sequence.
differ and what characteristics make them important
as vehicles for learning ICT.
Useful Tip
With the Calendar Wizard, you can create a calendar from scratch. Under Templates, click Calendars. In the
center pane, click Other Calendars, click Calendar Wizard, and then click Download. A new document opens and
the wizard starts. Move through the pages of the wizard, and select a style, the print orientation, whether to
leave room for a picture, and a date range. The wizard is added to your Templates folder.
Slide 1 Slide 2
Slide 3 Slide 4
Slide 5 Slide 6
Slide 7 Slide 8
20 n Information Communication Technology — Grade 9 Teacher Guide
Unit 2 – Application Software
Slide 9
Fig. 2.4: Slide Show
7. Press Esc to exit the Slide Show.
The new presentation will default to the name (iii) Click the More button located at the right side
of Presentation1, Presentation2, Presentation3 of the Themes icons.
etc. (the number increments each time you create (iv) Click desired themes at drop-down gallery.
one).
(v) For adding slide(s), click Home tab and then
To rename it click the Office Button. Click Save, click New Slide button.
and type in the desired name into the File
(vi) Save the presentation using the Save button
Name box. Click Save or Press (Ctrl + S) on the
on Quick Access toolbar.
keyboard.
4. Steps to change the layout of a slide:
Now, you are ready to start adding to your
presentation. To change the layout of a slide, perform the
following steps:
2. Preparing and presenting a slide show:
(i) Open PowerPoint.
For preparing a presentation keep in mind the
following basic guidelines: (ii) Make the desired slide active.
(i) Determine the main purpose of the (iii) Click Home tab.
presentation. (iv) Click Layout button.
(ii) Determine the output. (v) Click desired layout at drop-down list.
(iii) Show one idea per slide. (vi) Click Save.
(iv) Maintain a consistent design.
Suggested Activities
(v) Keep slides easy to read and uncluttered.
Refer to sub-unit 2.2 of the Student Textbook for
(vi) Determine printing needs. doing the activities.
Let us assume that you have already created a
presentation. To present a slide show, perform
the following steps:
ALTERNATIVE TEACHING APPROACHES,
(i) Click the Open Button on the Quick Access
ENRICHMENT MATERIAL
Toolbar. If the Open button does not display The ICT teachers can use Internet, charts, worksheets,
on the Quick Access Toolbar, click the models, go for educational field trips and subject experts
Customize Quick Access Toolbar button that can be called for seminars to enrich the teaching level
displays at the right side of the toolbar and and in turn help the students in learning Application
then click Open at the drop-down list. Software.
(ii) At Open dialog box, double-click on the
desired presentation. Additional Questions
(iii) Click Slide Show tab.
1. What is the difference between Save and Save As
(iv) Click From Beginning button or From Current
commands in MS-Word?
Slide button.
2. How will you apply bullets and numbers to
(v) Run the presentation by clicking the left mouse
display ordered or unordered list in MS-Word?
button at each slide. At the black screen, click
the left mouse button again. 3. How will you insert and delete a page break and
page number in a document?
(vi) Press Esc to exit the slide show.
4. What are the main uses of presentation
3. Creating a presentation using design techniques:
software?
To create a presentation using design techniques,
5. What kind of help is available with a presentation
perform the following steps:
software?
(i) Open PowerPoint.
6. How will you create a slide show using animation
(ii) At the PowerPoint window, click the Design and sound?
tab.
Information Communication Technology — Grade 9 Teacher Guide n 23
INFORMATION AND
unit 3 COMPUTER SECURITY
(3 PERIODS)
UNIT OUTCOME
Students will be able to:
l understand the responsible behaviour in the computer laboratory;
l recognize the nature of computer virus and measures to protect.
suggested lesson plan l School ICT policy means rules prepared by the
school and students must live with it.
Sub-unit Number of
Periods l Computer viruses are software programs which
3.1 Information and Computer 3 are proving to be main cause of crashing computer
Security system. The best way to protect computer viruses
is installing antivirus software.
structure of the unit
role of the students
3.1 Information and Computer Security
In this sub-unit, we will learn about basic concepts In this unit, the students are supposed to learn the
of Information and Computer Security. The topics basic concepts of Information and Computer Security.
to be learnt are: The activity-based method should be followed to
l Responsible behaviour in the computer lab
understand the subject matter which is the best way
of better understanding of the subject matter.
l School ICT policy
Information and computer security plays a vital
l Nature of computer viruses
role in most of the organizations. Students are the one
Measures to protect
of the groups most targetted by identity thieves and
review of the unit computer hackers. Students work in many different
computing environments and are often among the least
l Security of information and related computer protected against intrusions. They also frequently lack
systems is a big concern for the computer users. the knowledge that would help keep them safe. So, the
l Computer laboratory contains delicate and
students must know that Information and Computer
expensive equipment.
Security is an important issue to protect themselves,
l In computer lab; students must behave in a
even after completion of their education.
calm manner and not damage any machines
or furniture; they must not touch any electrical note: Computer and information systems managers
connections for any reason. oversee a variety of workers, including systems
analysts, support specialists, and software engineers. They may advance to progressively higher leadership
They are aware of the latest ICT developments to positions in an ICT department or non-technical areas
ensure that the organization remains competitive. such as marketing, human resources and sales, etc.
viruses), stay informed about recent threats, and follow a few basic rules when you surf the Internet, download
files, and open attachments.
Once a virus is on your computer, its type or the method used to get there is not as important as removing
it and preventing further infection. One important thing you can easily do is back up your files regularly (make
sure they are not infected).
A good antivirus software comes with features like a built-in firewall and usually offers an access to online
data backup. Firewalls are systems which help protect computers and computer networks from attack and
subsequent intrusion. Visit the website www.mobrien.com for more information on Firewalls.
Figure 3.2 shows Kaspersky Antivirus website.
grammatical errors. However, do not criticize software. Antivirus software consists of computer
these same errors in others’ messages. (As they programs that attempt to identify, thwart and
may not have English as a native language.) eliminate computer viruses and other malicious
Use the spell-checking capability of the e-mail software (malware).
software. A good antivirus software comes with features
(vi) Do not send huge file attachments, unless like a built-in firewall and usually offers an access
requested as it may take a long time to to online data backup. This antivirus software has
download a massive file. Also, the receipent the option to deactivate the malicious viruses.
must have the appropriate software to open Firewalls are systems which help protect
your attachment. computers and computer networks from attack
(vii) When replying, quote only the relevant and subsequent intrusion.
portion. The computer users should follow these safety
(viii) Do not “over forward,” that is, check the e-mail rules to protect against viruses:
contents before using automatic forwarding.
(i) Do not open unsolicited e-mails.
3. School ICT Policy: The school ICT policy means the
(ii) Never download an attachment of an e-mail
rules prepared by the school to use ICT. When
without scanning it for viruses first.
deciding on the school’s aims for ICT, internal,
local and national factors should be considered. (iii) Make sure you also use a firewall.
The school’s overall aim for ICT is to enrich (iv) Do not download free software or music.
learning for all students. The school management (v) Do not use free antivirus software.
must ensure that ICT Co-ordinator and computer (vi) Search on Internet for antivirus reviews and
teachers develop confidence and competence to analyse yourself for best antivirus software.
use ICT as a tool aiding effective teaching across
the curriculum. Suggested Activities
The school ICT policy must identify the important Refer to sub-unit 3.1 of the Student Textbook for
issues and guide the students to live with it. doing the activities.
Some of these include:
(i) A statement defining ICT capability. ALTERNATIVE TEACHING APPROACHES,
(ii) The aims for ICT in the school. ENRICHMENT MATERIAL
(iii) Guidance on record-keeping, assessment.
The ICT teachers can use Internet, charts, worksheets,
(iv) Guidance on health and safety. models, go for educational field trips or subject experts
(v) Specific rules for the use of Internet and can be called for seminars to enrich the teaching level
e-mail. and in turn help the students in learning Information
(vi) Statement of the school’s position on and Computer Security.
copyright, data protection.
(vii) Information regarding maintenance/repair/ Additional Questions
viruses.
1. What do you mean by security of a computer
(viii) Date for review.
system?
4. Computer Virus: A computer virus is a malicious
2. What is the importance of responsible behaviour
program that is designed to corrupt or delete the
in the Computer Laboratory?
information stored in the computer. Computer
viruses are spread through transportable 3. What does online mean?
secondary storage devices and networks. 4. Discuss the importance of school ICT policy.
Measures to Protect Computer Virus: The best way 5. How does a virus affect a computer system?
to protect computer viruses is installing antivirus 6. How does firewall work?
28 n Information Communication Technology — Grade 9 Teacher Guide
APPLICATION
unit 4 SOFTWARE
(15 PERIODS)
UNIT OUTCOME
Students will be able to:
l recognize the uses of spreadsheets;
l understand the screen elements in the spreadsheet window;
l recognize how to create and use simple spreadsheet using text and numbers;
l understand how to format worksheets;
l recognize to use built in functions and create custom formula.
ROLE OF THE STUDENTS in that they contain large amounts of data that can
be summarized or displayed in many user-friendly
In this unit, the students are supposed to learn the
formats. Creating a well-designed spreadsheet is often
basic concepts of Spreadsheets. The activity based
as much an art as science. The students generally have
method should be followed to understand the subject
matter which is the best way of better understanding different levels of understanding for various topics. By
of the subject matter. the end of this unit, every student is expected to create
user-friendly spreadsheets. Students having more
Perhaps the most used software in accounting
applications is an electronic spreadsheet, such as advanced knowledge are expected to learn new skills
Microsoft Excel. Spreadsheets are extremely powerful as well as help their less-experienced classmates.
Go to Specific Cell
To go to specific cell in a worksheet, perform the following steps:
(i) Start Excel and open a workbook.
(ii) Click the Home tab.
(iii) Click the Find & Select button in the Editing group (see Fig. 4.2)
(iv) Click Go To at the drop-down list.
(v) The Go To dialog box appears (see Fig. 4.3).
Fig. 4.2: Clicking Find and Replace Fig. 4.3: Go To dialog box
(vi) Type cell address in the Reference text box.
(vii) Click OK or press Enter key.
(viii) Click the Office Button. A menu will appear.
(ix) Click Close.
(i) Double-click on the MS-Excel 2007 icon on (iii) Click the Home tab.
the desktop. (iv) Click the Delete button arrow in the Cells
OR group.
Click Start → All Programs → Microsoft Office (v) Click Delete Sheet Rows or Delete Sheet
→ Microsoft Office Excel 2007 Columns.
A workbook named Book1 will be created. Inserting and deleting cells in Excel: We can insert
A workbook can contain several worksheets. new blank cells or delete a range of cells within
Now, you can enter the data as per your the worksheet area.
requirement. To insert cells in Excel 2007, perform the following
(ii) Click Office Button. steps:
(iii) Click Save As. (i) Open the worksheet.
(iv) Type new workbook name. (ii) Select the range of cells you need to add.
(iii) Click the Home tab.
(v) Click Save or press Enter key. Excel
automatically adds the file extension .xlsx to (iv) Click the Insert button in the Cells group or
the end of a workbook name. click the Insert button arrow and then click
3. Inserting rows or columns in Excel: We can insert Insert Cells at the drop-down list to open the
rows or columns using options from the Insert Insert dialog box.
button in the Home tab or from the context (v) Using the dialog box, choose to shift the
sensitive shortcut menu that displays on right- existing cells right or down.
clicking a selected area. Inserted rows are placed To delete cells in Excel 2007, perform the
above the active cell or selected rows and existing following steps:
rows are shifted down. Columns are inserted left (i) Open the worksheet.
of the active cell or selected columns and existing
columns are shifted right. (ii) Select the range of cells you need to delete.
To insert rows or columns in Excel 2007, perform (iii) Click the Home tab.
the following steps: (iv) Click the Delete button in the Cells Group or
(i) Open the worksheet. click the Delete button arrow and then click
(ii) Select required number of rows or columns. Delete Cells at the drop-down list to open the
Delete dialog box.
(iii) Click the Home tab.
(v) Using the dialog box, delete the selected range
(iv) Click the Insert button arrow in the Cells
of cells to shift up the cells below the deleted
group.
range.
(v) Click Insert Sheet Rows or Insert Sheet
4. Built-in functions in Excel: A function is a built-in
Columns.
formula that performs calculations on a range of
Deleting rows or columns in Excel: We can delete values. It allows you to perform mathematical,
rows or columns using options from the Delete statistical and date-time functions. For example,
button in the Home tab or from the context Sum, Average, Count, Max, Min etc.
sensitive shortcut menu that displays on right-
The syntax of writing a function in Excel is:
clicking a selected area. When rows or columns
are deleted, data automatically is shifted up or = <Function name>(<List of arguments>)
left to fill space and references in formulas are SUM( ): Adds all the numbers in a range of cells.
updated. The syntax of SUM( ) function is:
To delete rows or columns in Excel 2007, perform SUM(number1, number2, ...)
the following steps: Here,
(i) Open the worksheet. number1, number2, ... are 1 to 255 arguments
(ii) Select rows or columns to be deleted. for which you want the total value or sum.
Cell Reference
A cell reference consists of the column letter and row number that intersect at the cell’s location (the column
letter is always used first). It identifies a cell or a range of cells on a worksheet and tells Excel, about where
to look for the values or data that you want to use in a formula. With references, you can use data contained
in different parts of a worksheet in one formula or use the value from one cell in several formulas.
We can refer to a cell or range of cells in formulae in three ways: relative reference, absolute reference and
mixed reference (a mixture of relative and mixed reference).
Relative reference
In Excel and other spreadsheets, a relative cell reference identifies the location of a cell or group of cells. The
cell references are used in formulas, functions, charts, and other Excel commands. By default, a spreadsheet
cell reference is relative. This means that as a formula or function is copied and pasted to other cells, the cell
references in the formula or function change to reflect the function’s new location, that is, Excel updates the
cell references. For example,
1. Start Excel to start a new blank workbook
2. In cell D1, D2, enter 30, and 25 respectively.
3. In cell E1, enter = D1*2.
4. Press Enter.
Cell E1 now returns the value 60.
5. If E1 is not the active cell, click it once.
6. Press Ctrl + C, or click the Copy button on the Home tab.
7. Click cell E2.
8. Press Ctrl + V, or click the Paste button on the Home tab.
9. If you see a moving marquee around cell E1, press the Esc key.
Cell E2 should be the active cell, but if it is not, just click it once. Look at the Formula bar. The contents
of cell E2 are = D2*2 (see Fig. 4.4) and not the = D1*2 that you copied.
Information Communication Technology — Grade 9 Teacher Guide n 33
Unit 4 – Application Software
Use shortcut keys to toggle through the dollar-sign permutations. Specifically, highlight the cell reference
that you want to change in the formula bar. Press the F4 function key to toggle through the different possible
placements of $.
UNIT OUTCOME
Students will be able to:
l understand the Internet as a global network;
l recognize the meaning of some basic terms related to the Internet;
l recognize the work with a search engine to search for items;
l understand hotspots and hyperlinks;
l comprehend the meaning of some common e-mail terms.
l A web browser, or simply browser, is software should be followed to understand the subject matter
that enables users to locate and view web which is the best way of better understanding of the
pages and to jump from one page to another. subject matter.
For example, Internet Explorer, Mozilla Firefox,
Google Chrome etc. The Internet is an extremely useful resource for
l Screen elements of Internet Explorer are: Menu students. There is a lot of information that can save
bar, Address bar, Standard toolbar, Workspace, a student from a trip to the library. There are many
Content window, Status bar etc. reputed websites with information about all sorts of
l Examples of search engines are AltaVista, Lycos, subjects. Students must be very careful when searching
Google and Yahoo. information from the Internet, however, especially for
l E-mail is the exchange of messages stored on work in a school assignment.
computers, through a communication channel. The Internet can be a resource in many other ways.
l To send and receive e-mail, you need to create Many ICT and other subject teachers will actually use
an account with an e-mail service provider. the Internet for their classes. They may post information
l Composing of an e-mail message is done very or assignments for their students on the Internet.
much like a paper letter.
Some of them will post marks/grades on the Internet
l All e-mail systems have the ability to send, or communicate with their students. Some important
receive and discard mail.
topics are taught by the ICT teachers on the Internet.
l Auto Reply feature is useful when you are on
In this way, the Internet can also be a good resource
holidays and want to inform people that you
would not be checking your e-mail for a few for students.
days. Using Internet, the students will be able to
communicate effectively, that is, they will have a
ROLE OF THE STUDENTS range of skills to express themselves through new
environments (e-mail, websites, etc.).
In this unit, the students are supposed to learn the
basic concepts of Internet. The activity based method
information, take part in online text, audio or browser makes it easy to navigate (or “surf”)
video conversation or can share the information the web and to download items. For example,
with the other users of the Internet. Internet Explorer.
WWW or World Wide Web has changed the 4. Types of Browsers: Browser is software that
picture of the Internet after its creation. Earlier, enables users to locate and view web pages and
Internet was used to share textual information to jump from one page to another. More than
only. There were no graphics, no animations and one web browser can also be installed on a single
no links as you see in today’s Internet. All credit computer. Some of the best-known browsers
goes to WWW which provides easy and effective are:
way of storing and accessing information on the (i) Internet Explorer: Internet Explorer is the most
Internet. The e-mail is used to send and receive widely-used web browser by people around the
messages instantly. world. It is commonly known as IE. The latest
3. Website: A computer with a domain name is version is Internet Explorer 8.
called a website (site). The top-level domains are (ii) Mozilla Firefox: Mozilla Firefox browser is coming
.com, .edu, .org, and .net. For example, www. up very fast i.e., its users are increasing every
google.com, www.microsoft.com. day. It is the second-most famous browser after
Webpage: A web page is a document on the World Internet Explorer.
Wide Web that can include text, pictures, sound (iii) Google Chrome: This web browser was developed
and video. The first page you see on a website is by Google. Google Chrome is providing a tough
like the title page of a book. This is the home page, fight to other web browsers and is very popular
or welcome page, which identifies the website among users.
and contains links to other pages at the site.
Browser: A web browser, or simply browser, is Suggested Activities
software that enables users to locate and view Refer to sub-unit 5.1 of the Student Textbook for
web pages and to jump from one page to another. doing Activity 1.
It is what you use to get around the web. A web
ACTIVITY 2: Explain that Each Website has a Unique Address; a Website Holds Information;
Creation of Websites Briefly; there may be a few or many Pages on the
Website
In groups the students will explain that each website has a unique address; a website holds information; creation
of websites briefly; there may be a few or many pages on the website.
Website
A computer with a domain name is called a website (site). Figure 5.2 shows a website.
ACTIVITY 3: Explain and Demonstrate some Hyperlinks, and Returning Back to the Original
Web Page
In groups, the students will explain and demonstrate some hyperlinks, and returning back to the original web
page.
Hyperlink
A hyperlink (link) is a word, group of words, or image that you can click on to jump to a new web page or a
new section within the current web page.
Using hyperlinks
Connect to the Internet using a browser. Here, we have used Mozilla Firefox. Using Google search engine
(www.google.com) type “ethiopian food” in the Search box and press Enter key. The websites having information
on the search topic are displayed in the Search results tab (see Fig. 5.4).
Hyperlink
When you move the cursor over a hyperlink in a Web page, the arrow will turn into a little hand.
Clicking the left mouse button on underlined or color term transfers you to another web page
(see Fig. 5.5).
To return back to the original web page click the Navigation button (see Fig. 5.6)
So, you can use a hyperlink to connect to another page within the website or to another site on the Internet.
Use the browser Toolbar for navigational aids.
Close the web browser when your work is over.
(vii) Click the Send button. Most systems have a reply facility, although some
(viii) Close the e-mail program. of these do not always work as expected. A great
3. Steps to receive and open an e-mail: Perform the care should be taken when using this facility in
following steps to receive and open an e-mail: e-mail, as replies do not always go back to the
(i) Connect to the Internet. sender.
(ii) Go to the e-mail program.
Suggested Activities
(iii) In Inbox, look for the received mail(s).
Refer to sub-unit 5.2 of the Student Textbook for
(iv) Click on the desired mail in the list to open
and read the e-mail message. doing the activities.
UNIT OUTCOME
Students will be able to:
l understand the LOGO language;
l recognize to produce a variety of diagrams using the LOGO language.
suggested lesson plan l Procedures are small programs that can be called
on again and again through one word without
Sub-unit Number of typing them all out.
Periods l The file saved in LoGo will have an extension
LGo.
6.1 Control and Learning with 7
LoGo l BYe primitive closes the LoGo.
to programmatically produce line graphics. It is be represented by any icon). The students can
traditionally and most often represented pictorially easily produce a variety of diagrams using the
either as a triangle or a turtle icon (though it can LOGO language. They will also write procedures
using Random.
ACTIVITY 6.1: Give Some MSW LOGO Primitives, their Purpose and Short Versions (if any)
In groups, the students will prepare a table of some MSW LOGO primitives, their purpose and short versions
(if any) and explain these in the class.
Table 6.1 gives some MSW LOGO primitives, their purpose and short versions.
Table 6.1: MSW Logo Commands (Primitives)
LOGO Command Purpose Short Version
BACK 100 Turtle moves back the specified number of units. BK 100
CLEARSCREEN Erases the screen and returns the Turtle to its “home” position CS
in the centre of the drawing screen.
HOME Returns the Turtle to the “home” position without erasing HOME
the screen. (Issue a PU command before HOME to prevent it
drawing its return path as it goes.)
Match the Following designed for its ease of use and graphics
1. (d) 2. (c) capabilities. LOGO was developed in 1967 by
3. (b) 4. (a) Seymour Papert and a team at Massachusetts
Answer the Following Institute of Technology (MIT) in United States.
1. LOGO (Logic Oriented, Graphics Oriented) is a 2. The LOGO window is labeled as shown below:
high level programming language specifically
3. LOGO Primitives: LOGO commands are known in backward direction, type the following
as the ‘Primitives’. The primitives are typed in command in the Command Input Box and
the white space at the bottom left corner of the press the Enter key:
screen known as the Command Input Box. For BK 60
example, FD, BK, RT, LT, BYE etc. or
Four LOGO primitives to draw shapes are BACK 60
explained below: (iii) Right (RT): The RT primitive turns the Turtle in
(i) Forward (FD): The FD primitive moves the right or clockwise direction. It needs number of
turtle in the forward direction with the degree to know the angle of turn. For example,
number of steps mentioned with the primitive. to turn the Turtle in right direction by 90 degrees,
The turtle draws a line while moving. For type the following command in the Command
example, to draw a line of 100 steps type the Input Box and press the Enter key:
following command in the Command Input RT 90
Box and press the Enter key:
(iv) Left (LT): The LT primitive turns the Turtle
FD 100 in left or anti-clockwise direction. It needs
or number of degree to know the angle of turn.
For example, to turn the Turtle in left direction
FORWARD 100
by 90 degrees, type the following command in
(ii) Back (BK): The BK primitive moves the turtle
the Command Input Box and press the Enter
in the backward direction (where it has its
key:
back) and draws a line of specified number of
steps. For example, to draw a line of 60 steps LT 90
4. The following procedure draws circles randomly REPEAT 5 [CIRCLE RANDOM 80]
using RANDOM command. HT ; Hide Turtle
TO DRAWCIR END
; Procedure DRAWCIR to draw circles Suggested Activities
CS ; Clear Screen
Refer to sub-unit 6.1 of the Student Textbook for
doing Activities 1 and 3.
The ICT teachers can use Internet, charts, worksheets, (i) FD (ii) RT (iii) CS (iv) PU
models, and subject experts can be called for seminars 4. Draw an equilateral triangle of side 200 steps,
to enrich the teaching level and in turn help the students using the LOGO primitives.
in learning “Control and learning with LOGO”. 5. Write a LOGO procedure to draw a square of 70
steps using REPEAT.
Additional Questions
6. What is the extension of LOGO files?
1. What is the use of LOGO language?
7. Write a LOGO procedure to draw the following
2. Who developed LOGO and when?
figure:
6. Control and Learning with • Use the logo primitives to draw a variety of shapes
logo • Write procedures to include repeat and RND
INTRODUCTION
In the long term, the students entering Grade 9 will have good practical IT skills. They will be familiar with
the major facilities of the most widely used applications, and be able to decide which application to use to fit
a certain purpose.
In Grade 9, the students will briefly cover the development of computers and communications technology.
Then they will study three areas in greater depth: desktop publishing, database application and finally networks
and communications. By the end of Grade 9, students will be able to use a desktop publishing package effectively
to produce a variety of documents such as brochures, visiting cards and newsletters.
In Grade 10, they will continue the work on databases and will be able to interrogate a database and produce
reports.
The assessments for both Grades 9 and 10 will be more complex and longer than previous assessments, and
they will require more time spent in the computer laboratory.
After finishing Grade 10 the students will take the National Examinations. Those who pass the examination
will either join a Preparatory School or will follow the Technical and Vocational stream of their choice. This
could be Information Technology. In either case, students who have completed Grade 10 will have excellent
IT skills which will serve them well in their future studies.
In the short term, the Grade 9 syllabus will be taught in the first year of implementation, followed by the
Grade 10 syllabus a year later. After 4 years, new Grade 9 students will have covered Grades 5–8.
(18 periods)
Unit Outcome: Students will be able to:
• know the term data, information, technology and the source of information;
• understand the differences between computers of one generation from the other;
• recognize the types of computers used today and their difference;
• understand the computer system.
• Describe the computer 1.5 Computer System • Demonstrate and explain in brief that a computer system consists
system. • Hardware of hardware components and software components (diagram).
• Software • Define hardware and software in simple and understandable
words.
• Define hardware: The physical parts of the computer that can
be seen and touched.
• Define software: The sets of instructions that instruct the
computer to do different tasks for example: word processing,
games, painting, e-mail, spreadsheets.
• List major hardware • Hardware components • Use diagram to show the linkage between hardware components;
components. Input devices explain each part of the diagram.
Output devices • Students name all the input, output and storage devices that
they know.
System unit
• Explain that some secondary storage devices are also input and
Secondary storage
output devices. Demonstrate some of these examples.
devices
• System unit contains the motherboard, power supply, hard
– Compact disk CD
disk. The motherboard contains the ‘Central Processing Unit’,
or CPU, the ‘brain’ of the computer, and RAM.
• Define systems software •Types of software • Explain that Systems Software keep the computer system
and applications software. Systems software working.
• Classify software as – Operating system SW • Explain that Applications Software allow the user to perform
Systems or Applications specific tasks.
Language SW
software. • Define and explain the difference between Systems Software
– Low level language
• List and explain the uses and Applications Software. (Use diagram – see resources).
of systems software. – High level language
• Give broad definitions and outlines of the function of each of these:
– Compilers and Operating system is a bridge between the computer hardware
interpreters and the user; Program utilities carry out general tasks such as
Others formatting disks, storing files, virus checking; Device drivers are
– Program utilities programs which allow hardware devices such as the keyboard,
– Device drivers printers to interface with the computer.
• Give examples and explain • Applications software • Demonstrate some of the features of as many of the applications
uses of some Applications n General purpose (e.g. software packages mentioned as possible. Such as word
software. Microsoft word) processing package, spreadsheet package, database package,
desktop publishing package, e-mail package and presentation
n Speciality SW (e.g.
package.
Peachtree)
n Entertainment or
Educational SW
• Manipulate their files and • Features of Operating • Organize a logical filing system on a personal computer or
(15 periods)
Unit Outcome: Students will be able to:
• understand how to open word processing software, and create, and save a document;
• recognize how to format a document in a desired way;
• apply any of formatting features in their document;
• understand how to open presentation software, and create and save a document;
• recognize how to create a slide show using animation and sound.
56
Syllabus
The teacher should assess each student’s work continuously over the whole unit and compare it with the following description, based
on the specific objectives, to determine whether the student has achieved the minimum required level.
Assessment
The teacher should assess each student’s work continuously over the whole unit and compare it with the following description, based
on the specific objectives, to determine whether the student has achieved the minimum required level.
Students At Minimum Requirement Level
A student working at the minimum requirement level will be able to: Identify responsible behavior in the Computer Laboratory,
Identify safe online behavior, Identify the school ICT policy and live with it, describe computer virus and identify the measure to
protect from computer virus.
Students Above Minimum Requirement Level
Students working above the minimum requirement level should be praised and their achievements recognized. They should be
encouraged to continue working hard and not become complacent.
Students Below Minimum Requirement Level
57
Syllabus
58
Unit 4: application software
Syllabus
(15 periods)
Unit Outcome: Students will be able to:
• recognize the uses of spreadsheets;
• understand the screen elements in the spreadsheet window;
• recognize how to create and use simple spreadsheet using text and numbers;
• understand how to format worksheets;
• recognize to use built in functions and create custom formula.
Assessment
The teacher should assess each student’s work continuously over the whole unit and compare it with the following description, based
on the specific objectives, to determine whether the student has achieved the minimum required level.
(10 periods)
Unit Outcome: Students will be able to:
• understand the internet as a global network;
• recognize the meaning of some basic terms related to the Internet;
• recognize the work with a search engine to search for items;
• understand hotspots and hyperlinks;
• comprehend the meaning of some common e-mail terms.
(7 periods)
Unit Outcome: Students will be able to:
• understand the logo language;
• recognize to produce a variety of diagrams using the logo language.
Assessment
The teacher should assess each student’s work continuously over the whole unit and compare it with the following description, based
on the specific objectives, to determine whether the student has achieved the minimum required level.
a c
Absolute Reference: Commonly used in Cell: Intersection of a row and column in a
spreadsheet applications, it is a formulated cell worksheet.
reference that will not adjust when used to calculate CD-RoM (Compact Disc Read-only Memory):
the sum of specific cells. A durable and low cost circular optical storage device
AI (Artificial Intelligence): It is the branch of widely used to store large amounts of information.
computer science concerned with making computers Computer: A computer is an electronic device
behave like humans. that accepts, process, stores and outputs data under
Analog: It is any fluctuating, evolving, or the control of a set of instructions.
continually changing process that represents data by CPU (Central Processing Unit): A processor on
measurement of a continuous physical variable. an IC chip (called a microprocessor) that serves as the
Application Software: A program that is designed ‘brain’ of the computer.
to perform specific tasks. Cursor: A movable, blinking symbol that indicates
ASCII: American Standard Code for Information the position on a computer screen where user action
Interchange. It is pronounced (as-kee). is needed.
b d
Backup: To copy files or data to a second source or Data: A collection of raw facts and figures or a
media so as to safeguard it. raw input which when processed or arranged makes
Bandwidth: A measurement of how much data meaningful output.
(bits per second) can be sent through a connection. Data Communications: The moving or sharing
BCD: Binary Coded Decimal. of encoded information between two or more data
BIT (Binary DigIT): It is the smallest unit of sources using an electronic medium.
processing of computerized data in terms of 1s Digital: A system that defines data in a discrete,
or 0s. non-fluctuating (i.e., non-analogue), numerical digits,
Blog: (Slang term for a Weblog) A blog is a personal specially 1s or 0s.
journal that can be accessed publicly and allow people Directory: An organizing unit in a computer’s file
to comment on the previously posted comments. system for storing and locating files. In a hierarchical
BMP (pronounced “bimp”): Microsoft Windows file system, directories can contain subdirectories as
image file format is the only graphics format where well as files.
compression actually enlarges the file. Distribution List: Also called a mailing list, is
Byte: A combination of 8 bits to represent computer a collection of e-mail addresses that allows you to
data transfer or data storage measurement. e-mail multiple people at one time.
intranet is usually protected from external access by a to large computers or to other small computers on a
firewall. network.
ISP (Internet Service Provider): A company that Microprocessor: An integrated computer circuit
provides access to the Internet. that performs all the functions of a CPU.
MODEM: Stands for MOdulator and DEModulator.
J It is a device that changes data from digital (computer
JAVA: A high-level programming language language) to analog (phone line language) and then
developed by Sun Microsystems. back again.
JPEG (pronounced “J-Peg”, stands for Joint Motherboard: The main circuit board of a
Photographic Experts Group): It is an image format microcomputer.
that allows for compression when stored. MPEG (Motion Picture Experts Group): A format
to make, view, and transfer both digital audio and
K digital video files.
Kilobyte (KB): This is about a thousand bytes of MS-Excel: Spreadsheet application software,
space. In reality, it is two to the 10th power or 1,024 provided by Microsoft.
bytes. MS-PowerPoint: Presentation software, provided
by Microsoft.
L MS-Word: Word processing application software,
LAN (Local Area Network): A network that provided by Microsoft.
links together computers and peripheral equipment
within a limited area, such as a building or a group of N
buildings.
Language Processor: Software that converts a Nanosecond: A billionth of a second. Many
high level language or assembly language code into computer operations, such as the speed of memory
machine understandable form. chips, are measured in nanoseconds. Nanosecond is
often abbreviated as ns.
LCD (Liquid Crystal Display): A method of
displaying readings continuously using a liquid- Netiquette: The rules of etiquette that apply when
crystal film, sealed between glass plates that changes communicating over computer networks, especially
its optical properties when a voltage is applied. the Internet.
Login: To attach to a computer using the user’s Newsgroup: An online discussion community found
ID. on the USENET system. These groups cover thousands
LOGO (Logic Oriented, Graphics Oriented): A of different topics of information and are offered free of
high level programming language specifically designed charge.
for its ease of use and graphics capabilities. Node: In networks, a processing location. A node
can be a computer or some other device, such as a
M printer.
Mainframe: Second largest computer available
after the supercomputer. O
Megabyte (MB): About a million bytes of space.
Operating System: A system software program
Actually it is 2 raised to the 20th power or 1,048,576
bytes of space. that works as a bridge between computer hardware
and the user. Operating systems perform basic tasks,
Memory: Internal storage areas in the computer.
such as recognizing input from the keyboard, sending
Microcomputer: A category of computer that is output to the display screen, keeping track of files
generally used for personal computing, for small and directories on the disk, and controlling peripheral
business computing, and as a workstation attached devices such as disk drives and printers.
Information Communication Technology — Grade 9 Teacher Guide n 65
Glossary
Output Device: A device that translates information ROM (Read-Only Memory): A memory in which
processed by the computer into a form that humans program instructions, operating procedures, or other
can understand. data are permanently stored, generally on electronic
chips during manufacture, and that ordinarily cannot
P be changed by the user or when power is switched
off.
PDF (Portable Document Format): A technology
developed by Adobe and was designed to capture all Router: A device in a network that handles message
of the elements of a printed document and place it in transfers between computers.
a single image file.
Pen Drive: A secondary storage device that can be S
used to easily transfer files between USB-compatible
systems. Scroll Bar: A widget found in graphical user
interface and used to show and control which portion
Pixel: The smallest element of an image that can be
of a document is currently visible in a window. A
individually processed in a video display system.
window may have a horizontal or, vertical scroll bar,
Plotter: A computer output device that draws or both.
images on paper using a pen.
Screen Saver: A moving picture or pattern that
Primitives: The LOGO commands are known as
appears on the screen when you have not used the
‘Primitives’.
mouse or keyboard for a specified period of time.
Procedure: The sequence of actions or instructions
Serial Port: A port or interface that can be used for
to be followed in solving a problem or accomplishing
a task. It may be used at one or more points in a serial communication, in which only 1 bit is transmitted
computer program. at a time. Most serial ports on personal computers
conform to the RS-232C or RS-422 standards.
Processor: A device that processes programmed
instructions and performs tasks. The speed at which Server: This is a mainframe computer that serves
the CPU processes information internally is measured the other computers attached to it.
in MegaHertz (MHz) and GigaHertz (GHz). 1 GHz is Sheet Tab: In spreadsheet applications, this refers
equal to 1,000 MHz. to a tab at the bottom of a worksheet that acts as a
Programmable Read-Only Memory (PROM): means to identify or access different sheets within a
A special memory chip that is blank when first workbook.
purchased. It can be written to by the user by using a Slide Show: Used to display the slides in a desired
special hardware program. Once the data is written to sequence.
it, it cannot be erased or changed.
SMS (Short Message Service): A popular wireless
Protocol: A set of rules governing the format of service that is used for sending and receiving short
messages that are exchanged between computers.
messages up to a maximum of 160 characters. The
service is used for text messaging between cell
Q phones that are on a GSM (Global System for Mobile)
Query: Used to retrieve information on a certain network.
condition from a database. Source Code: Program code written in a high level
language.
R Software: The set of instructions used to direct
the operation of a computer, as well a documentation
RAM (Random Access Memory): A volatile
giving instructions on how to use them.
computer memory available to the user for the
temporary storage and manipulation of data. Spam: The disruptive unwanted messages,
especially commercial messages posted on a computer
Relative Reference: The default reference in a
network or sent as e-mail.
spreadsheet package.
Spreadsheet: A document which helps to organize Utility Program: A program developed to run
data in rows and columns that intersect to form cells. within an Operating System to perform a specific
Supercomputer: High-capacity computer with service.
thousands of processors that is the fastest calculating
device ever invented. V
Switch: In networks, a device that filters and
forwards packets between LAN segments. Virus: A program or piece of code that is loaded
onto your computer without your knowledge and
System: A combination of the hardware, software,
runs against your wishes.
and firmware. A system typically consists of components
(or elements) which are connected together in order to
accomplish a specific function or set of functions. W
System Software: It is a set of master programs WAN (Wide Area Network): A network in
that keeps the computer system working. which computers are connected to each other over
a long distance, using telephone lines and satellite
T communications.
Task bar: The bar that contains the start button WAV: Stands for WAVeform sound format.
and appears by default at the bottom of the desktop. Microsoft’s format for encoding sound files.
TCP/IP: Acronym for Transmission Control Web page: A single, usually hypertext document
Protocol/Internet Protocol, the suite of communications on the World Wide Web that can incorporate text,
protocols used to connect hosts on the Internet. graphics, sounds, etc.
Terabyte (TB): 2 to the 40th power (1,099,511,627,776) Web server: A computer that runs specific software
bytes. to serve web pages to the Internet.
Toolbar: A row or rows of buttons on a display Website: A connected group of pages on the
screen that are clicked on to select various functions World Wide Web regarded as a single entity, usually
in a software application or web browser. maintained by one person or organization and
Topology: In networking, this refers to the physical developed to a single topic or several closely related
or logical arrangement of a network. topics.
Trojan: A type of computer virus that is loaded Wizard: A utility that provides guided sequence to
into an unsuspecting users system via a host program perform complex task easily and quickly.
such as a free game.
Word Processor: Software that processes textual
Turtle: A triangular shape pointer used in LOGO matter and creates organized documents.
that helps in drawing figures.
WWW (World Wide Web): Series of servers or
computers that are interconnected through hypertext.
U
WYSIWYG: What You Say Is What You Get.
UNICODE: Binary coding scheme that uses 2
bytes (16 bits) for each character. It allows almost all X
the written languages of the world to be represented
using a single character set. XML (eXtensible Markup Language): It is a
Uploading: It means transmitting data from a local markup language, not limited to Web documents.
computer to a remote computer, as from your PC to a
website you are constructing. Z
UPS (Uninterruptible Power Supply): It is a
backup power unit that provides continuous power Zip Disks: The disks with a special high-quality
when the normal power supply is interrupted. magnetic coating that have a capacity of 100, 250 or
750 megabytes.
User: Someone attached to a server or host.
books l tutor2u.et
l www.techniwarehouse.com
1. Brian K. Williams, Stacey C. Sawyer, “Using
Information Technology”, The McGraw-Hill l www.microsoft.com
Companies, Inc. l www.computerworld.com
2. Dennis P. Curtin, Kim Foley, Kunal Sen, l www.baycongroup.com
Cathleen Morin, “Information Technology”, l www.mcafee.com
The McGraw-Hill Companies, Inc. l www.onguardonline.gov
3. Dixit J.B., “excel with Information and l www.computersecurity.net
Communication Technology”, Firewall Media.
l www. securiour.com
4. Rutkosky Nita, Seguin Denise, Roggenkamp
l www.contemposervices.com
Rutkosky Andrey, “Microsoft Office 2007”,
l www.homeandlearn.co.uk
Paradigm Publishing, Inc.
l www.inpics.net
5. Muller Jim, “The Great Logo Adventure:
l www.isoc.org
Discovering Logo on and off the Computer”,
l mail.yahoo.com
Doone Publications.
l www.google.com
6. Watt Molly, Watt Daniel, “Teaching With
l www.hotmail.com
Logo: Building Blocks for Learning”, Addison
Wesley Publishing Company. l www.ehow.com
l www.softronix.com
websites l www.amblesideprimary.com
l www.ecawa.asn.au
l www.scribd.com
l www.atschool.eduweb.co.uk
l www.computersciencelab.com
l www.jonhoff.net
l www.slideshare.net
l www.crystal-objects.com
l www.math.uaa.alaska.edu