End User Computing (15 Credits)
End User Computing (15 Credits)
Module Guide
Copyright © 2024
MANCOSA
All rights reserved, no part of this book may be reproduced in any form or by any means, including photocopying machines,
without the written permission of the publisher.Please report all errors and omissions to the following email address:
[email protected]
This module guide,
End User Computing (15 Credits)(NQF Level 5)
will be used across the following programmes:
Table of Contents
Preface 2
Unit 1: Concepts of Information and Communication Technology 8
Unit 2: Using the Computer and Managing files 44
Unit 3: MS Word 2016 59
Unit 4: MS Excel 2016 85
Unit 5: MS Access 2016 114
Unit 6: MS PowerPoint 128
Unit 7: Internet and Email 146
Unit 8: ICT in Everyday Life 158
Bibliography 193
1
End User Computing (15 Credits)
Preface
A. Welcome
Dear Student
It is a great pleasure to welcome you to End User Computing (EUC515). To make sure that you
share our passion about this area of study, we encourage you to read this overview thoroughly. Refer
to it as often as you need to since it will certainly make studying this module a lot easier. The
intention of this module is to develop both your confidence and proficiency in this module.
The field of End User Computing is extremely dynamic and challenging. The learning content,
activities and self-study questions contained in this guide will therefore provide you with opportunities
to explore the latest developments in this field and help you to discover the field of End User
Computing as it is practiced today.
This is a distance-learning module. Since you do not have a tutor standing next to you while you
study, you need to apply self-discipline. You will have the opportunity to collaborate with each other
via social media tools. Your study skills will include self-direction and responsibility. However, you will
gain a lot from the experience! These study skills will contribute to your life skills, which will help you
to succeed in all areas of life.
Please note that some Activities, Think Points and Revision Questions may not have answers
available, where answers are not available this can be further discussed with your lecturer at
the webinars.
-------
MANCOSA does not own or purport to own, unless explicitly stated otherwise, any intellectual property
rights in or to multimedia used or provided in this module guide. Such multimedia is copyrighted by the
respective creators thereto and used by MANCOSA for educational purposes only. Should you wish to use
copyrighted material from this guide for purposes of your own that extend beyond fair dealing/use, you
must obtain permission from the copyright owner.
2
End User Computing (15 Credits)
B. Module Overview
End User Computing is an essential skill in any business today and is required in order for
businesses to meet local and global economic challenges and requirements of a digital world.
Additionally, End User Computing is foundational and generic, which allows for maximum mobility
between qualifications. Apart from the workplace needs End User Computing will address, it is also
designed as an entry-level module into further education and training fields.
3
End User Computing (15 Credits)
We suggest that you briefly skim read through the entire guide to get an overview of its contents. At
the beginning of each Unit, you will find a list of Learning Outcomes. This outlines the main points
that you should understand when you have completed the Unit/s. Do not attempt to read and study
everything at once. Each study session should be 90 minutes without a break.
This module should be studied using the prescribed and recommended textbooks/readings and the
relevant sections of this Module Guide. You must read about the topic that you intend to study in the
appropriate section before you start reading the textbook in detail. Ensure that you make your own
notes as you work through both the textbook and this module.
In the event that you do not have the prescribed and recommended textbooks/readings, you must
make use of any other source that deals with the sections in this module. If you want to do further
reading, and want to obtain publications that were used as source documents when we wrote this
4
End User Computing (15 Credits)
guide, you should look at the reference list and the bibliography at the end of the Module Guide. In
addition, at the end of each Unit there may be link to the PowerPoint presentation and other useful
reading.
E. Study Material
The study material for this module includes programme handbook, this Module Guide, a list of
prescribed and recommended textbooks/readings which may be supplemented by additional
readings.
F. Prescribed Textbook
The prescribed and recommended readings/textbooks presents a tremendous amount of material in
a simple, easy-to-learn format. You should read ahead during your course. Make a point of it to re-
read the learning content in your module textbook. This will increase your retention of important
concepts and skills. You may wish to read more widely than just the Module Guide and the
prescribed and recommended textbooks/readings, the Bibliography and Reference list provides you
with additional reading.
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide. Windows 11 Edition, Tenth
Edition. United States of America: Pearsons
Recommended Reading(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information Systems, Managing the Digital
Firm. Seventeenth Edition. New Jersey: Pearsons
Freund, S.M., Hoisington, C., Schmieder, E. and Last, M.Z. (2019). Microsoft Office 365 and
Office 2016: Introductory. Boston, Massachusetts: Cengage
G. Special Features
In the Module Guide, you will find the following icons together with a description. These are designed to
help you study. It is imperative that you work through them as they also provide guidelines for
examination purposes.
5
End User Computing (15 Credits)
~~~~~~~~~~~~~~
You may come across activities that ask you to carry out specific
tasks. In most cases, there are no right or wrong answers to
ACTIVITY
these activities. The aim of the activities is to give you an
opportunity to apply what you have learned.
At this point, you should read the reference supplied. If you are
unable to acquire the suggested readings, then you are
READINGS
welcome to consult any current source that deals with the
subject. This constitutes research.
PRACTICAL
Real examples or cases will be discussed to enhance
APPLICATION
understanding of this Module Guide.
OR EXAMPLES
6
End User Computing (15 Credits)
7
End User Computing (15 Credits)
Unit
1: Concepts of Information and
Communication Technology
8
End User Computing (15 Credits)
9
End User Computing (15 Credits)
Information is data processed for some purpose. Information can only be considered:
To be 'real Info’ if it meets certain criteria i.e. it must be communicated to the recipient
To be in a language that is understood
To be in a suitable form
To be relevant for achieving some purpose
1.2 Computer
A computer is an electronic device, operating under the control of instructions stored in its own
memory that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use.
Activity 1.1
10
End User Computing (15 Credits)
1. Personal computers: - This is the most common type found in homes, schools, business offices
etc., It is the most common type of desk top computers with processing and storage units along with
various input and output devices.
ii. Work stations: - These have high resolution input/output (I/O) graphics capability, but with same
dimensions as that of desktop computer. These are used in engineering applications of interactive
design work.
2. Minicomputers: - A minicomputer is a type of computer that possesses most of the features and
capabilities of a large computer but is smaller in physical size. Example mobile devices, PDAs.
A minicomputer fills the space between the mainframe and microcomputer, and is smaller than the
former but larger than the latter. Minicomputers are mainly used as small or mid-range servers
operating business and scientific applications. However, the use of the term minicomputer has
diminished and has merged with servers. A minicomputer may also be called a mid-range computer.
3. Super computers: - These are used for large scale numerical calculations required in the
applications like weather forecasting etc.
11
End User Computing (15 Credits)
Input device accepts the coded information as source program i.e. high level language. This is either
stored in the memory or immediately used by the processor to perform the desired operations. The
program stored in the memory determines the processing steps. Basically the computer converts
one source program to an object program. i.e. into machine language.
Finally, the results are sent to the outside world through output device. All of these actions are
coordinated by the control unit.
Input Unit: - The source program/high level language program/coded information or data is fed to a
computer through input devices of which the keyboard is a most common type. Whenever a key is
pressed, one corresponding word or number is translated into its equivalent binary code over a cable
and fed either to memory or processor. Joysticks, trackballs, mouse, scanners etc. are other input
devices.
Memory Unit: - Its function is to store programs and data. It is basically divided into two types:
Primary Memory
Secondary Memory
1. Primary Memory: - Is the one exclusively associated with the processor and programs must be
stored in this memory while they are being executed. The memory contains many semiconductor
storage cells. Each is capable of storing one bit of information. These are processed in a group of
fixed size called word.
To provide easy access to a word in memory, a distinct address is associated with each word
location. Addresses are numbers that identify memory location. Number of bits in each word is
called word length of the computer. Programs must reside in the memory during execution.
12
End User Computing (15 Credits)
Instructions and data can be written into the memory or read out under the control of processor.
Memory in which any location can be reached in a short and fixed amount of time after specifying its
address is called random-access memory (RAM). The time required to access one word is called
memory access time. Memory which is only readable by the user and contents of which can’t be
altered is called read only memory (ROM) and it is part of the operating system.
Caches are the small fast RAM units, which are coupled with the processor and are often contained
on the same integrated circuit (IC) chip to achieve high performance. Although primary storage is
essential, it tends to be expensive.
2. Secondary Memory: - Is used where large amounts of data and programs have to be stored,
particularly information that is accessed infrequently. Examples of secondary memory include,
magnetic disks and tapes, optical disks (i.e. CD-ROM’s), floppies etc.
Central Processing Unit
A Central Processing Unit (CPU) is the electronic circuitry within a computer that carries out the
instructions of a computer program by performing the basic arithmetic, logic, controlling and
input/output (I/O) operations specified by the instructions.
Arithmetic Logic Unit (ALU): - Most of the computer operations are executed in the ALU of the
processor like addition, subtraction, division, multiplication, etc. the operands are brought into the
ALU from memory and stored in high speed storage elements called registers. Then according to the
instructions the operation is performed in the required sequence.
The control unit and the ALU are many times faster than other devices connected to a computer
system. This enables a single processor to control a number of external devices such as keyboards,
displays, magnetic and optical disks, sensors and other mechanical controllers.””
Output Unit: - These actually are the counterparts of the input unit. Its basic function is to send the
processed results to the outside world. Examples: - Printer, speakers, monitor etc.
Control Unit: - It effectively is the nerve centre that sends signals to other units and senses their
states. The actual timing signals that govern the transfer of data between input unit, processor,
memory and output unit are generated by the control unit.
Activity 1.2
Describe the functions of the two main units found in the central processing
unit.
13
End User Computing (15 Credits)
Hardware
All the electronic and mechanical equipment in a computer is called the hardware.
Examples include:
”
Source: Urbach (2018)
Hardware
Hard Disk
RAM
Power Supply
Processor
Case
Monitor
Keyboard
Mouse
Software
The term software is used to describe computer programs that perform a task or tasks on a computer
system. Software can be grouped as follows:
14
End User Computing (15 Credits)
System Software
These are the programs that control the operation of the computer system. Operating systems (OS)
and utility programs are the most common. The Operating System starts the computer, provides a
user interface, manages the computer memory, manages storage, manages security and provides
networking and internet facilities to mention a few of its capabilities. There are many OS’s on the
market including Microsoft Windows XP, Microsoft Windows Vista, Apple OS X, Unix and
Linux. Windows is by far the most commonly used OS in the world, but Linux in particular, is making
inroads into this dominance.”
Utility programs perform maintenance tasks on the computer system. This includes file management
programs, uninstall programs, disk scanners and defragmenters, backup utilities, antivirus etc. These
can be included in the OS or purchased separately”.
15
End User Computing (15 Credits)
Application Software
This software is used to do non-system based tasks. Categories include business software,
engineering software, medical software, games etc.
1.7 PC Components
A computer system is a collection of electronic and mechanical devices operating as a unit. These
devices can be sorted according to the role they play in the computer system. The main device
categories are:
16
End User Computing (15 Credits)
Motherboard
CPU (Processor)
Memory
Disk Drives
Expansion Cards - sound card, graphics card, network card etc.
17
End User Computing (15 Credits)
Peripherals are devices that connect to the system unit using cables or wireless technologies.
Typical peripherals include:
Monitor
Keyboard
Mouse
Speakers
Printer
Plotter
Scanner
18
End User Computing (15 Credits)
Arithmetic Instructions - It carries out all the addition, subtraction, multiplication and division
requested by computer programs
Logical Instructions - It can make decisions by comparing data and acting in a particular way
depending on the result
Move Operations - It can move data from place to place within the computer system. This could
be from memory to the processor for addition or from memory to a printer or disk drive etc
The speed of a processor is measured in megahertz (MHz) or Gigahertz (GHz). This is the speed of
the system clock (clock speed) within the processor, and it controls how fast instructions can be
executed:
This means that if one instruction was executed every clock tick, a 3GHz processor could execute
three billion instructions every second.
The two main computer processor manufacturers are Intel and Advanced Micro Devices (AMD).
These two companies produce almost all the processors used in desktop and notebook computers.
The performance of these chips relative to each other is forever changing, and it would be difficult to
claim one is better than the other in the long term.”
19
End User Computing (15 Credits)
The latest trend in processor manufacture is to essentially put more than one processor on a silicon
chip. These multicore processors can have two, three or four processor cores on a single chip. This
obviously vastly increases the performance of the computer system as long as the programs run on
the systems can take advantage of the multi-cores.
RAM is made in the form of integrated circuits (IC’s) in the same manner as a processor. These IC’s
are placed on a circuit board to produce a memory module. The most common RAM technology is
dynamic random access memory (DRAM).”
In this technology, a transistor and a capacitor are paired to store one Bit (binary digit) of data. In
essence, if the capacitor is charged, a binary 1 is stored and if it is discharged, a binary 0 is
stored. The transistor acts as a switch to allow the capacitor’s state to be changed as required.”
Ports
Computer ports are interfaces between peripheral devices and the computer system. They are
hardware devices built into the motherboard or on expansion cards. They are often built into the front
of the computer chassis for easy access but will be cabled back to the motherboard.”
20
End User Computing (15 Credits)
Serial Port
Although more or less obsolete, they are still included in new systems. The serial port is a 9-pin port.
Windows call them Com ports - Com1, Com2 etc. Mice and external modems were connected to
these ports. They are turquoise in colour.”
21
End User Computing (15 Credits)
22
End User Computing (15 Credits)
USB 1: This is the original standard and can transfer data at 1.5MBps. This is too slow for
external hard disks with capacities of 500GB or more
USB 2: This is forty times faster than USB1 and has a data transfer rate of 60MBps. This is the
current standard
USB 3: this is ten times faster than USB2 and 400 times faster than the original USB1. It has a
data transfer rate of 600MBps and will be common on new computer systems in 2009
SECTION 2: HARDWARE “
Computer hardware is the collection of physical parts of a computer system. This includes the
computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer
case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is
what you can physically touch.”
Motherboard - The motherboard is the main circuit board of a microcomputer. It is also known as
the motherboard or system board
CPU - The CPU is the central electronic chip that determines the processing power of the
computer
Memory - Memory is a part of the computer that temporarily stores applications, documents, and
some operating information
Bus - A bus is an electronic line that allows 1s and 0s to move from one place to another
Expansion Slots - Expansion slots appear on the motherboard. They are sockets into which
adapters are connected
Ports and Connectors - A port is a connector located on the motherboard or on a separate
adapter
Bays - A bay is a space inside the computer case where a hard drive, floppy drive or CD-ROM
drive sits
23
End User Computing (15 Credits)
Power Supply - A power supply changes normal household electricity into electricity that a
computer can use
Sound Components - A sound card lets a computer play and record high quality sound
Logic operations involve Boolean logic: AND, OR, XOR and NOT. These can be useful both for
creating complicated conditional statements and processing Boolean logic.
Memory
A computer's memory can be viewed as a list of cells into which numbers can be placed or read.
Each cell has a numbered "address" and can store a single number. The computer can be instructed
to "put the number 123 into the cell numbered 1357" or to "add the number that is in cell 1357 to the
number that is in cell 2468 and put the answer into cell 1595". The information stored in memory may
represent practically anything. Letters, numbers, even computer instructions can be placed into
memory with equal ease. Since the CPU does not differentiate between different types of
information, it is up to the software to give significance to what the memory sees as a series of
numbers.
Computer main memory comes in two principal varieties: random access memory or RAM and read-
only memory or ROM. RAM can be read and written anytime the CPU commands it. But ROM is
preloaded with data and software that never changes, so the CPU can only read from it. ROM is
typically used to store the computer's initial start-up instructions.”
24
End User Computing (15 Credits)
Keyboard
The keyboard looks like the typewriter. A numeric keypad is located to the right of the keyboard.
Numeric keys have the same placement as a 10-key calculator, which allow the operator to enter
data rapidly.
Mouse - The mouse is a device that helps control the movement of the insertion point on the screen.
25
End User Computing (15 Credits)
The central processing unit or (CPU) is the "brain" of the computer. It contains the electronic circuits
that cause the computer to follow instructions from ROM (read only memory) or from a program in
RAM (random access memory).”
Output
Output devices such as a monitor or printer make information given as input available for use or to
view.”
speed.
Floppy Disks
Zip Disks
Compact Discs (CD) + RW
CD + R
Digital Video Disc (DVD) + RW
DVD + R
CD + RW Disc (Compact Disc Rewriteable) - This disc looks like a regular CD. The only difference is
that we can write data on this disc and erase it as many times as we want. It works just like a floppy
disk or a zip disk. A CD + RW disc holds about 650 MB.”CD + R Disc (Compact Disc Recordable) -
This one is a CD that can be used to record data. It’s mostly used to record audio. Once it's been
written on, it is not possible to rewrite or erase anything off it. This compact disc comes in different
sizes, but they are usually silver in colour. (Some CDs are black in colour and they actually don't get
as many scratches on them as the silver ones do. They are also a lot less fragile).”
27
End User Computing (15 Credits)
A DVD – R Disc (Digital Video Disc - Recordable) – These discs hold the space of about 4.7 GB and
are used to record movies.
A DVD + RW Disc (Digital Video Disc Rewriteable) - The primary advantage of DVD-RW over DVD-R
is the ability to erase and rewrite to a DVD-RW disc. According to Pioneer, DVD-RW discs may be
written to about 1,000 times before needing replacement. DVD-RW discs are commonly used for
volatile data, such as backups or collections of files. They are also increasingly used for home DVD
video recorders. One benefit of using a rewritable disc is, if there are writing errors when recording
data, the disc is not ruined and can still store data by erasing the faulty data.”
28
End User Computing (15 Credits)
Flash Drive - This a storage device that comes in many colours and has a stick shape to it. They are
very small, but they can hold anywhere between 256 MB and 8 GB of material on them.”
29
End User Computing (15 Credits)
This is a disk drive in which a plastic or metal case surrounds the hard drive. It can be inserted and
removed just like a floppy disk.
PC Card - This is a thin credit card size device that fits into a PC card slot, usually on a notebook
computer. This card simply adds storage to most notebooks.”
30
End User Computing (15 Credits)
Smart Cards - These are the size of an ATM card. When inserted into a smart card reader, they can
read and update data.
SECTION 3 SOFTWARE “
Software is a set of programs, which is designed to perform a well-defined function. A program is a
sequence of instructions written to solve a particular problem.
System Software
Application Software
Some examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
31
End User Computing (15 Credits)
Application software may consist of a single program, such as Microsoft's notepad for writing and
editing a simple text. It may also consist of a collection of programs, often called a software package,
which work together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following:
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
32
End User Computing (15 Credits)
Source:Sengers (2018)
Features of application software are as follows
Close to the user
Easy to design
More interactive
Slow in speed
Generally written in high-level language
Easy to understand
Easy to manipulate and use
Bigger in size and requires large storage space
A LAN is a network that is used for communicating among computer devices, usually within an office
building or home.
LAN’s enable the sharing of resources such as files or hardware devices that may be needed by
33
End User Computing (15 Credits)
multiple users
Is limited in size, typically spanning a few hundred meters, and no more than a mile
Is fast, with speeds from 10 Mbps to 10 Gbps
Requires little wiring, typically a single cable connecting to each device
Has lower cost compared to MAN’s or WAN’s
LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired
LAN’s.
Every LAN uses a protocol –a set of rules that governs how packets are configured and
transmitted.
Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus –
Ring – Star
LANs are capable of very high transmission rates (100s Mb/s to G b/s).
Advantages of LAN
Speed
Cost
Security
E-mail
Resource Sharing
Disadvantages of LAN
Expensive to Install
Requires administrative time
File Server may fail
Cables may break
34
End User Computing (15 Credits)
A metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus
A MAN is optimised for a larger geographical area than a LAN, ranging from several blocks of
buildings to entire cities
MAN might be owned and operated by a single organisation, but it will usually be used by many
individuals and organisations
A MAN often acts as a high speed network to allow sharing of regional resources
A MAN typically covers an area of between 5 and 50 km diameter
Examples of MAN: Telephone company network that provides a high speed Digital Subscriber
Line (DSL) to customers and cable TV network
35
End User Computing (15 Credits)
A WAN is two or more LANs connected together. The LANs can be many miles apart.
WAN covers a large geographic area such as country, continent or even whole of the world.
To cover great distances, WANs may transmit data over leased high-speed phone lines or
wireless links such as satellites.
Multiple LANs can be connected together using devices such as bridges, routers, or gateways,
which enable them to share data.
The world's most popular WAN is the Internet.”
36
End User Computing (15 Credits)
1.16 3D Printing
In 3D printing, it all starts with the creation of a 3D model in your computer. This digital design is for
instance a CAD (Computer Aided Design) file. A 3D model is either created from the ground up with
3D modelling software or based on data generated with a 3D scanner.
3D Scanners
Currently, prices of 3D scanners range from expensive industrial grade 3D scanners to DIY scanners
anyone can make at home. With a 3D scanner you’re able to create a digital copy of an object.
3D Modelling Software
3D modelling software come in many forms. There’s industrial grade software that costs thousands a
year per license, but also free open source software, like Blender, for instance.
3D modelling software are often made to suit the functions of the user’s industry. This has resulted in
the rise of software suited to specific niches. As a result, there are software applications on the
market that cater to aerospace or transportation, furniture design or fabrics and fashion amongst
many others.
37
End User Computing (15 Credits)
For this reason, when you are starting out, the amount of choices can be a bit overwhelming, we
recommend starting with Tinkercad. Tinkercad is available for free, and it works in browsers that
support WebGL, for instance Google Chrome. They offer beginner lessons and has a built-in option
to get your object printed via various 3D print services.
Now that you have a 3D model, the next step is to prepare it in order to make it 3D printable.
You will have to slice a 3D model in order to make it 3D printable. Slicing is dividing a 3D model into
hundreds or thousands of horizontal layers and is done with slicing software.
Sometimes it’s possible to slice a 3D file within a 3D modelling software or in the 3D printer itself. It is
also possible that you are forced to use a certain slicing tool for a certain 3D printer.
When your 3D model is sliced, you are ready to feed it to your 3D printer. This can be done via USB,
SD or Wi-Fi. It really depends on what 3D printer brand you work with. When a file is uploaded in a
3D printer, the object is ready to be 3D printed layer by layer.
Getting started with 3D printing means asking yourself what you would like to learn first. Are you
interested in the hardware, or do you want to focus on the end result – creating objects? Answering
this question could lead you to the decision if whether you should buy a pre-assembled 3D Printer or
a DIY 3D Printer kit.
When a manufacturer uses high quality parts (motors, frame, electronics), this will affect the price of
the end product. When the parts are of high quality it doesn’t automatically mean the prints will turn
out great – there are too many other factors that play a role as well.
When a manufacturer decides to go cheap on parts it can market the product for a good price. On
the other hand, it doesn’t automatically mean that a cheap 3D printer will give you bad print results.
But you’ll probably have to put in more time and effort to get to the same level.
Secondly there’s Research and Development. It can take years of groundwork and engineering
before the final product is a stable, high quality 3D printer. Manpower can become costly overtime
38
End User Computing (15 Credits)
The next element that influences the price of a 3D printer is: assembly. In general, it’s cheaper and
more efficient to ship just the parts compared to a fully assembled 3D printer. This can be in the form
of a DIY kit or a semi-assembled 3D printer. This doesn’t necessarily mean that all DIY kits or semi-
assembled 3d printers are cheap. Cause some DIY kits contain such high quality parts that even
though you have to assemble it yourself it’s still pretty expensive. Additionally, some brands that
market do-it-yourself kits put a lot of time and effort in making educational tutorials and focus on
customer service – which also doesn’t come cheap.
And this brings us to the last point that determines the 3D printer price: customer service and
warranty.
There’s a good chance you’ll run into problems when you buy a 3D printer. In case you’ve chosen a
3D printer from an established brand you’ll pay more, but you will have the reassurance that there’s
always support to back you up. Also, when for instance something breaks during shipping, you’ll be
glad you chose a product with warranty.
39
End User Computing (15 Credits)
40
End User Computing (15 Credits)
Revision Questions
41
End User Computing (15 Credits)
Answers
Activity 1.1
Using an example, explain the data-processing cycle.
A teacher needs to find the average of a student’s Mathematics and English scores. Input is typing
the two scores on the keyboard. Processing is adding the two scores and dividing the result by two to
get the average. Output is displaying the average on the screen or printing it on paper.
Activity 1.2
Describe the functions of the two main units found in the central processing unit.
The control unit (CU) directs and coordinates all the activities within the CPU. It determines the
sequence in which instructions are executed. It sends the data and instructions to the arithmetic and
logic unit (ALU) for processing. The arithmetic and logic unit (ALU) performs all the arithmetic and
logic functions in a computer. Arithmetic functions involve the use of mathematical operators such as
+ – / and ×. Logic functions involve comparisons between two values to determine if they are: equal
to, greater than, less than, greater than or equal to, less than or equal to, not equal to.
42
End User Computing (15 Credits)
43
End User Computing (15 Credits)
Unit
2: Using the Computer and Managing
files
44
End User Computing (15 Credits)
45
End User Computing (15 Credits)
Shortcuts are files that point to other programs, program files or folders found somewhere on the
computer. A double click on the shortcut icon will start either the appropriate program, or the
appropriate file and corresponding program, or appropriate folder.
Activity 2.1
46
End User Computing (15 Credits)
Position the cursor over the Start button, press the right mouse button and select the command
Open Windows Explorer, or
From the Start menu select All programs, in the folder Accessories, search and click Windows
Explorer, or
In the search box (within the Start menu) type "Windows Explorer" and click on it when it appears
in the results, or
Click on in the Taskbar, or
Click on the Windows Explorer shortcut on the desktop
The Document's library – this library is used for organising and saving documents (text files,
workbooks, presentations etc.)
The Picture's library – it is used for organising and saving pictures
The Music library – it is used for organising and saving music
The Video's library – it is used for organising and saving video materials
Each file and folder has its path – an address of its location
47
End User Computing (15 Credits)
Activity 2.2
When the hard disk is not divided into partitions and the DVD-ROM is connected When the hard disk
is not divided into partitions and the DVD-ROM and CD-RW are connected When the hard disk is
divided into two partitions and the DVDROM and CD-RW are connected.
Hard Disk Drive (first partition): D DVD-ROM D DVD-ROM D
Hard Disk Drive (second partition): E CD-RW E DVD-ROM F CD-RW
2.2 Desktop
A desktop can be contained in a window that is part of the total display area or can be a full screen,
taking up the total display area. Users can have multiple desktops for different projects or work
environments they have and can switch between them.
48
End User Computing (15 Credits)
Although Windows 8 included a desktop layout, it forced users to toggle back and forth between the
desktop interface and the Metro interface depending on which application they were using. The
hallmark of the Metro interface was live tiles, which were tiles that could display application data,
49
End User Computing (15 Credits)
such as weather information or stock market reports, as opposed to acting as static desktop icons.
In Windows 10, Microsoft brought back the Start menu, and it merged Metro and the legacy Windows
desktop into a single, blended desktop interface.
From a functional standpoint, there is no difference between a consumer desktop and an enterprise
desktop. Even so, enterprise desktops tend to be more tightly controlled. Enterprise desktops are
commonly branded with a wallpaper containing the organisation's' logo, and they typically include a
set of icons that the IT department has approved.
Let's take a look at the System tab, which is where you will find most of your computer's general
50
End User Computing (15 Credits)
Generally, the first thing to look for in a System tab is the actual system info, which you can find by
clicking About. Here you will see your computer's basic specs, including processor, memory, and
operating system info, as well as what edition of Windows you're currently running.
From this screen, you can quickly rename your computer by clicking Rename PC and following the
prompts to rename your computer for network identification purposes. (For a more detailed guide on
how to rename your computer, check out How to change your computer's name in Windows 10.)
Under Related settings, you will see a list of settings you may have been looking for when you
initially clicked on About: Additional administrative tools, Bitlocker settings, Device manager, and
System info. These links take you to Control Panel windows -- Microsoft hasn't completely scrapped
the Control Panel.
51
End User Computing (15 Credits)
To check how much hard-drive space your computer has, click Storage. This screen shows the
different drives (including partitions, external hard drives, and attached media) currently connected to
your PC, and also lets you choose default save locations for different file types (apps, documents,
music, pictures and videos). To choose a default save location for a file type, pick the location from
the drop-down menu and click Apply.
In Related settings, you'll see a link to Change where you store offline maps. This takes you to the
Offline maps section (which is also located directly under the Storage link).
52
End User Computing (15 Credits)
Storage only shows you how many space apps and other files are taking up on your computer -- if
you need to free up space, click Apps & features to see a list of installed apps sorted by name (you
can also sort them by size and date). Click on a non-native app, and you will see two options: Modify
and Uninstall. Modify lets you modify how the app is installed on your computer (including moving it
to a different partition or drive), while uninstall lets you uninstall it.
The Related settings feature a link to the Control Panel window Programs and Features, where you
can uninstall and change any programs that don't appear in the Apps & features section.
You can install software that you download from the Web or from a CD or DVD for use on the
Windows 10 desktop. (Windows 10 apps must be installed through the Microsoft Store.)
53
End User Computing (15 Credits)
54
End User Computing (15 Credits)
1. Which of the following is the safest and most efficient way to react to
a nonresponding program?
A. Turn off the computer by flipping the CPU's on/off switch
B. Unplug the CPU at the electrical source
C. Press Ctrl+Alt+Del, and choose Restart from the Shut Down menu
D. Click the Start button on the taskbar and choose Turn Off Computer
E. .mdb 5.undefined
55
End User Computing (15 Credits)
8. Where will you find the Windows Help and Support feature?
A. In the Control Panel window
B. On any menu
C. On the desktop
D. On the Start menu
56
End User Computing (15 Credits)
Revision Questions
57
End User Computing (15 Credits)
Answers
Think Point 2.1
Why are icons used?
As graphic symbols, computer icons help users quickly and easily identify what they need or want.
The use of icons also provides a more appealing visual representation, which makes them more
enjoyable to use than traditional text-based links.
Think Point 2.2
What Does GUI Stand for in Computer Terms?
A Graphical User Interface is a computer interface that allows users to interact with a device through
graphical elements such as pictures and animations, as opposed to text-based commands. GUIs are
widely used in both personal and business computing, as they offer an intuitive and eye-catching
method of controlling electronic devices.
Think Point 2.3
In your opinion, why is it essential to access the windows app store ?
Microsoft Store is the place to go when you want to purchase and download apps, games, and digital
content. The Store also helps keep apps up to date, unless otherwise noted by the app's product
page.
Knowledge Check Questions 2.1
1. C is correct
2. B and D
3. A, B, C, and E
4. A, B, and C
5. A to 3, B to 1, C to 2, D to 5, and E to 4
6. A and B are correct
7. D is correct.
8. C is correct.
9. A, B, and D are correct.
58
End User Computing (15 Credits)
Unit
3:
MS Word 2016
U n i t 3 : M S W o r d 2 0 1 6
59
End User Computing (15 Credits)
60
End User Computing (15 Credits)
To use the Ribbon, first click a tab. Then locate the command you need by scanning the group
names, and then hunting down the button. Click the button to activate the command or to display a
menu from which you can choose a command.
Some items on the Ribbon let you input text or values, or make other settings.
Galleries on the Ribbon display a smattering of tiles. To see them all, click the Show Gallery button in
the lower-right corner of the gallery, as illustrated.
Use the dialog box launcher icon in the lower-right corner of a group to open a dialog box relevant to
the group’s function. Not every group features a dialog box launcher.
The amazingly frustrating thing about the Ribbon is that it can change. Some tabs may appear and
disappear, depending on what you’re doing in Word.
Clicking the File tab replaces the contents of the Word window with a screen full of commands and
other information. To return to the Word window, click the Back button or press the Esc key.
61
End User Computing (15 Credits)
Each time you start Word, you can choose a template from the gallery, click a category to see more
templates, or search for more templates online.
For a closer look at any template, click it to open a large preview.
If you’d rather not use a template, click Blank document.
62
End User Computing (15 Credits)
If you’re already in Word, click File > Open and then browse to the file’s location.
When you open a document that was created in earlier versions of Word, you see Compatibility
Mode in the title bar of the document window. You can work in compatibility more, or you can
upgrade the document to use Word 2016.
Activity 3.1
Note: To save the document on your computer, choose a folder under This PC or click Browse.
3. To save your document online, choose an online location under Save As or click Add a Place.
When your files are online, you can share, give feedback and work together on them in real time.
4. Click Save
Note: Word automatically saves files in the .docx file format. To save your document in a format
other than .docx, click the Save as type list, and then select the file format that you want.
To save your document as you continue to work on it, click Save in the Quick Access Toolbar.
63
End User Computing (15 Credits)
3.2.3 Objects
A table is made up of rows and columns. The intersection of a row and column is called a cell. Tables
are often used to organise and present information, but they have a variety of uses as well. You can
use tables to align numbers and create interesting page layouts.
Creating a Table
1) Click the Insert tab on the Ribbon
2) Click on Table
3) Highlight the number of columns and rows you would like
OR
4) Click Insert Table
64
End User Computing (15 Credits)
Table Formatting
After you create a table, you can format the entire table by using Table Styles. By resting your pointer
over each of the preformatted table styles, you can preview what the table will look like.
.
Click the style to apply it to the table
In the Table Style Options group, select or clear the checkbox next to each the table element to
apply or remove the selected style
65
End User Computing (15 Credits)
Select the cells that you want, including their end-of-cell marks.
Mail Merge
A mail merge in Word will combine a pre-prepared letter with a mailing list, so that bulk mail is
personalised before it is sent out. For example, you might be part of an organisation that has a list of
members, and you want to let them know about an upcoming Annual General Meeting. Your mailing
list would be the list of members’ names and addresses, and the pre-prepared letter would be a letter
informing them of the AGM. Each letter produced will be identical, apart from the personalised
portions.
The three files involved in the mail merge process are:
66
End User Computing (15 Credits)
In our example, we have an Excel Spreadsheet, so navigate to where that is and select it. Select the
sheet that contains your data and click OK. If the first row in your spreadsheet is a header row, make
sure that you check the box to say so.
67
End User Computing (15 Credits)
Now that you have established the link between your document and mailing list, save the document.
We’re going to assume that you want to send your letter to everyone on your list, but if you want to,
you can select only certain entries from the list.
Insert Merge Fields
We now need to tell Word what personal details to add to the letter and where. To do this, we will
insert merge fields in the main document. We’re going to keep things very simple, and we’re just
going to insert the most basic information. In our example we will insert member names and
addresses.
Firstly, position the cursor where you want the address to appear on your letter. Then, on the
Mailings tab, in the Write & Insert Fields group, choose Address Block.
In the window that opens, you get the chance to review and amend the format of the address that will
be inserted when the merge is actually run.
Make any changes you need and click OK. You will ten see the <<AddressBlock>> placeholder
appear where you inserted it.
Let us add a greeting line: position the cursor where you want the greeting and in the Write & Insert
Fields group, click Greeting Line. Again, you get the chance to review and amend the greeting, so
make your changes and click OK. You will see the <<GreetingLine>> placeholder where you inserted
it.
68
End User Computing (15 Credits)
The address and greeting are standard items, that most people will want to use in their mail merges,
so they get their own special buttons in the ribbon. What if you want to insert data that is not in the
Write & Insert Fields group? You will need the Insert Merge Fields button for that.
In our example we have an email address column in the spreadsheet. We’ll add that now: click Insert
Merge Fields > email.
Word gets all the column headings in the spreadsheet and lists them for you to select from. An
<<email>> placeholder is inserted.
All the <<>> placeholders inserted will get populated with real data from your spreadsheet when the
merge is run.
Run the Mail Merge
The preparation is complete! All that is left to do is preview what the merged letter will look like, and
then run it. Click Preview Results, and then choose the Next record button or Previous record button
to make sure the names and addresses in the body of your letter look right.
69
End User Computing (15 Credits)
Make any changes you feel are necessary, and then, once happy, click Finish & Merge > Print
Documents to run the merge and print.
70
End User Computing (15 Credits)
Activity 3.2
71
End User Computing (15 Credits)
3. A drop-down menu will appear. Click either Portrait or Landscape to change the page orientation.
2. A drop-down menu will appear. The current page size is highlighted. Click the desired predefined
page size.
72
End User Computing (15 Credits)
73
End User Computing (15 Credits)
Activity 3.3
74
End User Computing (15 Credits)
2. A drop-down menu will appear. Click the predefined margin size you want.
75
End User Computing (15 Credits)
Activity 3.4
Word also allows you to customise the size of your margins in the Page Setup dialog box.
1. From the Layout tab, click Margins. Select Custom Margins from the drop-down menu.
76
End User Computing (15 Credits)
3.3 Formatting
Open your document in Read Mode to hide most of the buttons and tools so you can get absorbed in
your reading without distractions.
77
End User Computing (15 Credits)
Activity 3.5
Click the arrows on the left and right sides of the pages
Press page down and page up or the spacebar and backspace on the keyboard. You can also
use the arrow keys or the scroll wheel on your mouse
If you’re on a touch device, swipe left or right with your finger
Tip: Click View > Edit Document to edit the document again.
3.3.1 Track Changes
When you’re working on a document with other people or editing a document yourself, turn on Track
Changes to see every change. Word marks all additions, deletions, moves, and formatting changes.
Activity 3.6
78
End User Computing (15 Credits)
Activity 3.7
2. Do the following
Under Print, in the Copies box, enter the number of copies you want
Under Printer, make sure the printer you want is selected
Under Settings, the default print settings for your printer are selected for you. If you want to
change a setting, just click the setting you want to change and then select a new setting
79
End User Computing (15 Credits)
a) Open the Word Processing Application and type the text between the
words START and END below, exactly as it appears and perform the tasks set
below. Save the document as WordAssign.
b) Select all text in the word document and change the font type to Courier
New, and font size 12.
c) Change the page orientation to “Landscape”
d) Select all text in the word document and change the line spacing to 1.5’
e) Insert a Header entitled “E-Learning Explored” and a footer showing the
page number.
f) Replace the word “END” at the end with your Student number followed by
your First Name and
g) Surname.
h) Insert appropriate picture
How can you insert an online picture in your word document in word 2013?
1. Select which part of 'Word Window' lets you access common commands.
A. Home Tab
B. Dialog Box Launcher
C. Quick Access Toolbar
D. Format Tab
C. Tags
4. The keyboard key used to move the insertion point to the beginning of the
current line is ...
A. Start
B. Home
5. The Keyboard Key to move the insertion point down one screen is ...
A. End
B. Page Down
8. When you are editing an existing document, and you want to save the
changes, click on ...
A. Save
B. Save As
9. A template is a ...
A. Pre-designed Document
B. Saved Document
10. To quickly move right from word to word in a document use, click on ...
81
End User Computing (15 Credits)
Revision Questions
82
End User Computing (15 Credits)
Answers
Think Point 3.1
In your opinion, what are the main purposes of Microsoft Word in a business context?
Microsoft Word is a versatile and easy-to-use word processing tool that serves a variety of business
purposes, such as:
1. Create high-quality documents such as reports, memos, and promotional materials for internal
and external use
2. Check spelling, punctuation, and grammar of written content and correct mistakes
3. Present information clearly and compellingly using different formatting and design features
4. Create tables and charts for data visualization
5. Promote collaboration using file-sharing features
eLearning has turned to be one of the best modes of education for students who show interest in
continuing education despite various other commitments. It provides extra edge for those who wish
to improve their subject skills. It is also a known fact that when students are interested in what they
are learning, they gain better retention capabilities and work wonders in their courses. Same way, if a
student gains an opportunity to use technology to the best of his advantage, he also stands out well
with his interface with instructors and plentiful availability of resources with more productivity in the
learning process. (147032 Lita Tsoanyana)
Practical Application 3.2
How you can insert an online picture in your word document in word 2013?
To insert picture that is online, like you have picture on Facebook or Instagram and you want to insert
it in word document you can use this feature
1. E
2. B
3. B
4. B
5. B
6. B
7. A
8. A
9. A
10. B
84
End User Computing (15 Credits)
Unit
4:
MS Excel 2016
85
End User Computing (15 Credits)
86
End User Computing (15 Credits)
Activity 4.1
From the Excel Start Screen, locate and select Blank workbook to access the Excel interface
87
End User Computing (15 Credits)
The Ribbon
Excel 2016 uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains
multiple tabs, each with several groups of commands. You will use these tabs to perform the most
common tasks in Excel.
Each tab will have one or more groups
Some groups will have an arrow you can click for more options
88
End User Computing (15 Credits)
Activity 4.2
You can adjust how the Ribbon is displayed with the Ribbon Display Options
The Ribbon is designed to respond to your current task, but you can choose to minimise it if you find
that it takes up too much screen space. Click the Ribbon Display Options arrow in the upper-right
corner of the Ribbon to display the drop-down menu.
89
End User Computing (15 Credits)
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides
the Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain
visible. To show the Ribbon, simply click a tab.
Show Tabs and Commands: This option maximises the Ribbon. All the tabs and commands will
be visible. This option is selected by default when you open Excel for the first time.
90
End User Computing (15 Credits)
4.2 Cells
Whenever you work with Excel, you will enter information—or content—into cells. Cells are the
basic building blocks of a worksheet. You' will need to learn the basics of cells and cell content to
calculate, analyse, and organise data in Excel.
Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the
intersection of a row and a column—in other words, where a row and column meet.
Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3).Each cell
has its own name—or cell address—based on its column and row. In the example below, the
selected cell intersects column C and row 5, so the cell address is C5, this is called cell referencing
Note that the cell address also appears in the Name box in the top-left corner, and that a cell's
column and row headings are highlighted when the cell is selected.
You can also select multiple cells at the same time. A group of cells is known as a cell range.
Rather than a single cell address, you will refer to a cell range using the cell addresses of the first
and last cells in the cell range, separated by a colon. For example, a cell range that included cells
A1, A2, A3, A4, and A5 would be written as A1:A5. Take a look at the different cell ranges below:
Cell range A1:A8
91
End User Computing (15 Credits)
Activity 4.3
To select a cell:
To input or edit cell content, you'll first need to select the cell.
1. Click a cell to select it. In our example, we'll select cell D9.
2. A border will appear around the selected cell, and the column heading and row heading will be
highlighted. The cell will remain selected until you click another cell in the worksheet.
92
End User Computing (15 Credits)
Activity 4.4
1. Click and drag the mouse until all the adjoining cells you want to select are highlighted. In our
example, we'll select the cell range B5:C18.
2. Release the mouse to select the desired cell range. The cells will remain selected until you click
another cell in the worksheet.
93
End User Computing (15 Credits)
94
End User Computing (15 Credits)
To copy a worksheet:
If you need to duplicate the content of one worksheet to another, Excel allows you to copy an
existing worksheet.
1. 1. Right-click the worksheet you want to copy, then select Move or Copy from the worksheet
menu.
95
End User Computing (15 Credits)
2. The Move or Copy dialog box will appear. Choose where the sheet will appear in the Before
sheet: field. In our example, we'll choose (move to end) to place the worksheet to the right of the
existing worksheet.
4. The worksheet will be copied. It will have the same title as the original worksheet, as well as a
version number. In our example, we copied the November worksheet, so our new worksheet is
named November (2). All content from the November worksheet has also been copied to the new
worksheet.
To rename a worksheet:
1. Right-click the worksheet you want to rename, then select Rename from the worksheet menu.
96
End User Computing (15 Credits)
3. Click anywhere outside the worksheet tab, or press Enter on your keyboard. The worksheet will
be renamed.
To move a worksheet.
1. Click and drag the worksheet you want to move until a small black arrow appears above the
desired location.
97
End User Computing (15 Credits)
To delete a worksheet:
1. Right-click the worksheet you want to delete, then select Delete from the worksheet menu.
98
End User Computing (15 Credits)
A dialog box will appear with a list of all the sheets in your workbook. You can then double-click the
sheet you want to jump to.
For example, cell A3 below contains a formula which adds the value of cell A2 to the value of cell A1.
99
End User Computing (15 Credits)
For example, cell A3 below contains the SUM function which calculates the sum of the range A1:A2.
Enter a Formula
To enter a formula, execute the following steps.
Activity 4.5
1. Select a cell.
2. To let Excel know that you want to enter a formula, type an equal sign (=).
3. For example, type the formula A1+A2.
Tip: instead of typing A1 and A2, simply select cell A1 and cell A2.
4.Change the value of cell A1 to 3.
100
End User Computing (15 Credits)
Excel automatically recalculates the value of cell A3. This is one of Excel's most powerful features!
Edit a Formula
When you select a cell, Excel shows the value or formula of the cell in the formula bar.
1. To edit a formula, click in the formula bar and change the formula.
2. Press Enter
Operator Precedence
Excel uses a default order in which calculations occur. If a part of the formula is in parentheses, that
part will be calculated first. It then performs multiplication or division calculations. Once this is
complete, Excel will add and subtract the remainder of your formula. See the example below.
101
End User Computing (15 Credits)
First, Excel performs multiplication (A1 * A2). Next, Excel adds the value of cell A3 to this result.
Another example,
First, Excel calculates the part in parentheses (A2+A3). Next, it multiplies this result by the value of
cell A1.
Copy/Paste a Formula
When you copy a formula, Excel automatically adjusts the cell references for each new cell the
formula is copied to. To understand this, execute the following steps.
1. Enter the formula shown below into cell A4.
2a. Select cell A4, right click, and then click Copy (or press CTRL + c),
102
End User Computing (15 Credits)
Next select cell B4, right click, and then click Paste under 'Paste Options:' (or press CTRL + v).
2b. You can also drag the formula to cell B4. Select cell A4, click in the lower right corner of cell A4
and drag it across to cell B4. This is much easier and gives the exact same result!
Insert a Function
Every function has the same structure. For example, SUM (A1:A4). The name of this function is
SUM. The part between the brackets (arguments) means we give Excel the range A1:A4 as input.
This function adds the values in cells A1, A2, A3 and A4. It's not easy to remember which function
and which arguments to use for each task. Fortunately, the Insert Function feature in Excel helps you
with this.
103
End User Computing (15 Credits)
1. Select a cell.
2. Click the Insert Function button.
4. Click OK.
The 'Function Arguments' dialog box appears.
5. Click in the Range box and select the range A1:C2.
6. Click in the Criteria box and type >5.
7. Click OK.
104
End User Computing (15 Credits)
Result. The COUNTIF function counts the number of cells that are greater than 5.
Note: instead of using the Insert Function feature, simply type =COUNTIF (A1:C2,">5"). When you
arrive at:
=COUNTIF (instead of typing A1:C2, simply select the range A1:C2.
1. Type in the following spreadsheet, and format it to look like the sample
below. Save as ExcelAssign.
2. Using an appropriate formula, calculate the Student Average for each
student.
3. Using an appropriate formula, calculate the Exam Average for each exam
per column
105
End User Computing (15 Credits)
Is it possible to prevent someone from copying the cell from your worksheet?
1) Study the highlighted cells in the image below and identify which of the
following represents the correct cell address for these cells:
a) The cell reference for the selected cells is B:21, C:28, D:22, E:26 and F:25.
b) The cell reference for the selected cells is row 15, column F
c) The cell reference for the selected cells is F4:F5
d) The cell reference for the selected cells is B15:F15
2) What is the purpose of the Quick Access Toolbar (circled in orange in the
image below)?
a) It provides shortcuts to functions you may use frequently as well as
functions that may not be on the Ribbon.
b) You can only use it to save, redo and undo, create new documents, open
documents and print.
c) It displays functions you have recently used as well as frequently used
functions.
106
End User Computing (15 Credits)
3) Which of the following functions are you likely to find under the Insert tab
on the Ribbon?
a) Insert a page break
b) Insert a formula
c) Insert a table
d) Insert track changes
4) Study the orange circled area of the worksheet in the image below. Select
from the following those that best describe the function of this area.
a) The Name Box displays a name given to a cell or set of cells.
b) The Name Box reflects the contents of the first cell that is selected in a
range.
c) The Name Box gives you options for duplicating the selected cells.
d) All of the above options are correct.
5) The Formula Bar is the block located above the grid in a worksheet and
107
End User Computing (15 Credits)
preceded by the letters fx. Select the incorrect statements about the Formula
Bar.
a) The Formula Bar is only used to create formulas by pressing the fx located
to the left of the box.
b) The Formula Bar contains the contents of the cell you have selected.
c) You can type numbers or text directly into the formula bar.
d) You can edit words or numbers contained in selected cells in the Formula
Bar.
6) What happens when you press the icon circled in orange in the image
below?
a) It moves the worksheet up and hides rows.
b) It minimises the Ribbon.
c) It opens another part of the Ribbon.
d) It detaches the Ribbon from the worksheet and allow you to move it
around.
7) Study the image below this question and select what is the purpose of the
two words circled in orange.
a) These represent the names of the individual workbooks you have saved. If
you click on the "Sales 2" tab it will open this workbook.
b) These reflect a selected range of cells in the worksheet. If you click on
108
End User Computing (15 Credits)
8) Study the section of a worksheet in the image below. Select the cell
address of the cell containing the word "Qtr3".
a) The cell address is D:1
b) The cell address is D:E
c) The cell address is E:5
d) The cell address is D:5
9) Select which of the following functions is NOT associated with the Review
Tab on the Ribbon.
a) The spelling checker
b) The sort data function
c) The comment function
d) The track changes function
109
End User Computing (15 Credits)
10) Study the image below this question. The Quick Access Toolbar is
appearing below the Ribbon (circled in orange). You need to move it back to
its position above the Ribbon. Select the correct statement from those below:
a) This is a default setting with some versions of Excel. You need to reinstall
Excel to fix this issue.
b) You can move the toolbar back up to its position by holding down the left
mouse button and dragging it into position.
c) If you close the workbook and reopen it again, the toolbar will move back to
its original position.
d) If you right-click on it and select "Show Quick Access Toolbar above the
Ribbon" it will move back.
110
End User Computing (15 Credits)
Revision Questions
1. Using A1:A12 as your cell range, write down functions to calculate the
following:
a). Sum
b). Average
c). Minimum value
d). Maximum value
e). Number of blank entries
2. How many data formats are available in Excel? Name some of them.
3. Specify the order of operations used for evaluating formulas in Excel.
The order of operations in Microsoft Excel is same as in standard
mathematics. It’s defined by the term “PEMDAS” or “BEDMAS”.
111
End User Computing (15 Credits)
Answers
112
End User Computing (15 Credits)
3) A
4) A
5) B
6) B
7) C
8) D
9) B
10) D
113
End User Computing (15 Credits)
Unit
5:
MS Access 2016
114
End User Computing (15 Credits)
115
End User Computing (15 Credits)
Microsoft Access is just one part of Microsoft’s overall data management product strategy
It stores data in its own format based on the Access Jet Database Engine
Like relational databases, Microsoft Access also allows you to link related information easily. For
example, customer and order data. However, Access 2013 also complements other database
products because it has several powerful connectivity features
It can also import or link directly to data stored in other applications and databases
As its name implies, Access can work directly with data from other sources, including many
popular PC database programs, with many SQL (Structured Query Language) databases on the
desktop, on servers, on minicomputers, or on mainframes, and with data stored on Internet or
Intranet web servers
Access can also understand and use a wide variety of other data formats, including many other
database file structures
You can export data to and import data from word processing files, spreadsheets, or database
files directly
Access can work with most popular databases that support the Open Database Connectivity
(ODBC) standard, including SQL Server, Oracle, and DB2
Software developers can use Microsoft Access to develop application software
Microsoft Access stores information which is called a database. To use MS Access, you will need to
follow these four steps −
Database Creation − Create your Microsoft Access database and specify what kind of data you
will be storing
Data Input − After your database is created, the data of every business day can be entered into
the Access database
Query − This is a fancy term to basically describe the process of retrieving information from the
database
Report (optional) − Information from the database is organized in a nice presentation that can be
printed in an Access Report
116
End User Computing (15 Credits)
Architecture
Access calls anything that can have a name an object. Within an Access desktop database, the
main objects are tables, queries, forms, reports, macros, data macros, and modules
If you have worked with other database systems on desktop computers, you might have seen the
term database used to refer to only those files in which you store data
But, in Access, a desktop database (.accdb) also includes all the major objects related to the
stored data, including objects you define to automate the use of your data
Before MS Access 2007, the file extension was *.mdb, but in MS Access 2007 the extension has
been changed to *.accdb extension
Early versions of Access cannot read accdb extensions but MS Access 2007 and later versions
can read and change earlier versions of Access
An Access desktop database (.accdb or .mdb) is a fully functional Relational Database
Management System (RDBMS)
It provides all the data definition, data manipulation, and data control features that you need to
manage large volumes of data
You can use an Access desktop database (.accdb or .mdb) either as a standalone RDBMS on a
single workstation or in a shared client/server mode across a network
A desktop database can also act as the data source for data displayed on webpages on your
company intranet
When you build an application with an Access desktop database, Access is the RDBMS
117
End User Computing (15 Credits)
In a document or a spreadsheet, you generally have complete freedom to define the contents of
the document or each cell in the spreadsheet
In a document, you can include paragraphs of text, a table, a chart, or multiple columns of data
displayed with multiple fonts
In spreadsheet, you can have text data at the top to define a column header for printing or
display, and you might have various numeric formats within the same column, depending on the
function of the row
A RDBMS allows you to define the kind of data you have and how the data should be stored
You can also usually define rules that the RDBMS can use to ensure the integrity of your data
For example, a validation rule might ensure that the user can’t accidentally store alphabetic
characters in a field that should contain a number
In a word processing document, you can include tabular data and perform a limited set of
functions on the data in the document
You can also search for text strings in the original document and, with ActiveX controls, include
tables, charts, or pictures from other applications
In a spreadsheet, some cells contain functions that determine the result you want, and in other
cells, you enter the data that provides the source information for the functions
An RDBMS provides you many ways to work with your data. For example,
You can search a single table for information or request a complex search across several related
tables
You can update a single field or many records with a single command
You can write programs that use RDBMS commands to fetch data that you want to display and
allow the user to update the data
Access uses the powerful SQL database language to process data in your tables. Using SQL, you
can define the set of information that you need to solve a particular problem, including data from
perhaps many tables.
118
End User Computing (15 Credits)
When you need to share your information with others, RDBMS gives you the flexibility to allow
multiple users to read or update your data
An RDBMS that is designed to allow data sharing also provides features to ensure that no two
people can change the same data at the same time
The best systems also allow you to group changes (which is also known as transaction) so that
either all the changes or none of the changes appear in your data
You might also want to be sure that no one else can view any part of the order until you have
entered all of it
Because you can share your Access data with other users, you might need to set some
restrictions on what various users are allowed to see or update
Tables
Queries
Forms
Reports
Together, these objects allow you to enter, store, analyse, and compile your data. Here is a summary
of the major objects in an Access database;
5.7 Table
Table is an object that is used to define and store data. When you create a new table, Access asks
you to define fields which is also known as column headings.
119
End User Computing (15 Credits)
You can define a primary key, one or more fields that have a unique value for each record, and
one or more indexes on each table to help retrieve your data more quickly
5.8 Query
An object that provides a custom view of data from one or more tables. Queries are a way of
searching for and compiling data from one or more tables.
5.9 Form
Form is an object in a desktop database designed primarily for data input or display or for control of
application execution. You use forms to customize the presentation of data that your application
extracts from queries or tables.
5.10 Report
Report is an object in desktop databases designed for formatting, calculating, printing, and
summarising selected data.
If forms are for input purposes, then reports are for output
Anything you plan to print deserves a report, whether it is a list of names and addresses, a
financial summary for a period, or a set of mailing labels
Reports are useful because they allow you to present components of your database in an easy-
to-read format
You can even customise a report's appearance to make it visually appealing
Access offers you the ability to create a report from any table or query
You can include simple conditions in macros to specify when one or more actions in the macro
should be performed or skipped
You can use macros to open and execute queries, to open tables, or to print or view reports
You can also run other macros or Visual Basic procedures from within a macro
Data macros can be attached directly to table events such as inserting new records, editing
existing records, or deleting records
Data macros in web apps can also be stand-alone objects that can be called from other data
macros or macro objects
Module
Module is an object in desktop databases containing custom procedures that you code using Visual
Basic. Modules provide a more discrete flow of actions and allow you to trap errors.
Everything that can be done in a macro can also be done in a module, but you don't get the
macro interface that prompts you what is needed for each action
Modules are far more powerful, and are essential if you plan to write code for a multi-user
environment, because macros cannot include error handling
Modules can be standalone objects containing functions that can be called from anywhere in your
121
End User Computing (15 Credits)
application, or they can be directly associated with a form or a report to respond to events on the
associated form or report
122
End User Computing (15 Credits)
123
End User Computing (15 Credits)
1. Which field type will you select if you need to enter long text in that field?
A. Text
B. Memo
C. Currency
D. Hyperlink
4. In which method we don't need to specify the field type and size while
creating a new Table?
A. Design Vie
B. While using Wizard
C. Create Table by Entering Data
D. All of Above
124
End User Computing (15 Credits)
Revision Questions
125
End User Computing (15 Credits)
Answers
Think Point 5.1
In your opinion, do companies use Microsoft Access?
Microsoft Access is an information management tool that helps you store information for reference,
reporting, and analysis. Microsoft Access helps you analyse large amounts of information and
manage related data more efficiently than Microsoft Excel or other spreadsheet applications.
Think Point 5.2
What are the differences between a form and a report?
Forms are primarily used to edit overview data whereas reports are used primarily to print or view
data. In a form your usually navigate from one record to another, whereas in reports summarized
data are possible to present.
Think Point 5.3
In MS Access 2016 what are the different ways you can enter data?
Different methods you can enter data in MS Access are
a. Datasheet View
b. Form
c. SQL View
d. Import from External Data (XML, Data Services, HTML etc.)
126
End User Computing (15 Credits)
127
End User Computing (15 Credits)
Unit
6:
MS PowerPoint
Unit 6: MS PowerPoint
128
End User Computing (15 Credits)
129
End User Computing (15 Credits)
When you open PowerPoint for the first time, the Start Screen will appear. From here, you'll be able
to create a new presentation, choose a template, and access your recently edited presentations.
From the Start Screen, locate and select Blank Presentation to access the PowerPoint interface.
The Ribbon and Quick Access Toolbar are where you will find the commands to perform common
tasks in PowerPoint. Backstage view gives you various options for saving, opening a file, printing,
and sharing your document.
The Ribbon
PowerPoint uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains
multiple tabs, each with several groups of commands. For example, the Font group on the Home
tab contains commands for formatting text in your document.
130
End User Computing (15 Credits)
Some groups also have a small arrow in the bottom-right corner that you can click for even more
options.
131
End User Computing (15 Credits)
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides
the Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain
visible. To show the Ribbon, simply click a tab
Show Tabs and Commands: This option maximises the Ribbon. All the tabs and commands will
be visible. This option is selected by default when you open PowerPoint for the first time
132
End User Computing (15 Credits)
133
End User Computing (15 Credits)
Activity 6.1
2. Select New on the left side of the window, then click Blank Presentation.
134
End User Computing (15 Credits)
Activity 6.2
1. 1. Click the File tab to access Backstage view, then select New.
2. You can click a suggested search to find templates or use the search bar to find something more
specific. In our example, we'll search for the keyword chalkboard.
135
End User Computing (15 Credits)
4. A preview of the template will appear, along with additional information on how the template can
be used.
5.Click Create to use the selected template.
136
End User Computing (15 Credits)
Before you can move or arrange text, you will need to select it.
Click next to the text you want to select, drag the mouse over the text, then release your mouse.
The text will be selected.
PowerPoint allows you to copy text that is already on a slide and paste it elsewhere, which can save
you time. If you want to move text, you can cut and paste or drag and drop the text.
Activity 6.3
137
End User Computing (15 Credits)
2. Place the insertion point where you want the text to appear.
Activity 6.3
To Cut-and-Paste Text
1. Select the text you want to move, then click the Cut command.
138
End User Computing (15 Credits)
2. Place the insertion point where you want the text to appear, then click the Paste command
Which steps would you use to set up password protection for a presentation?
139
End User Computing (15 Credits)
2. In Microsoft PowerPoint two kind of sound effects files that can be added
to the presentation are
1. A. .wav files and .gif files
2. B. .jpg files and .gif files
3. C. .wav files and .jpg files
4. D. .wav files and .mid files
140
End User Computing (15 Credits)
6. Which of the following should you use if you want all the slide in the
presentation to have the same “look”?
1. A. The slid layout option
2. B. The add a slide option
3. C. Outline view
4. D. A presentation design template
8. If you have a PowerPoint show you created and want to send using email
to another teacher you can add the show to your email message as a (an)
________________
1. A. Inclusion
2. B. Attachment
3. C. Reply
4. D. Forward
141
End User Computing (15 Credits)
Revision Questions
142
End User Computing (15 Credits)
Answers
Think Point 6.1
In your opinion, what is PowerPoint and why is it used?
PowerPoint is a tool of Microsoft that is used to make presentations. It contains slides to present the
data. With the help of MS PowerPoint tool, you can represent your idea or plan virtually using text,
video, and images.
PowerPoint comes in MS Office Suite. It helps to represent the data in an attractive way by allowing
the user to add text, image, graphics, audio, and video in it. You can call it a presentation program.
Think Point 6.2
Which skills are required to use PowerPoint?
Attention to detail is a vital skill required to use PowerPoint? They may also mention that Microsoft
Office knowledge is critical for using PowerPoint efficiently.
Think Point 6.3
In your opinion, what are the main purposes of Microsoft PowerPoint in a business context?
MS PowerPoint can transform your business processes. PowerPoint presentations are much
cheaper than printouts. It will enable you to present your reports and charts on a screen instead of
printing several copies for your staff.
Practical Application or Examples 6.1
143
End User Computing (15 Credits)
144
End User Computing (15 Credits)
1. Navigate to File
2. Select the Passwords option
3. Select “Encrypt this presentation and require a password to open.”
4. Enter the chosen password
5. Enter the password again to verify it
6. Press Set Password.
145
End User Computing (15 Credits)
Unit
7:
Internet and Email
146
End User Computing (15 Credits)
147
End User Computing (15 Credits)
Before we begin learning how to use the Internet and email, we must get familiar with some of the
fundamental concepts. Internet is a huge network of computers. People connect their computers to
local networks, which in turn are connected to regional networks and these regional networks are
connected to a central structure called backbone.
7.1.1 TCP/IP
Just like two people can communicate easily if they talk in the same language and its rules. Similarly,
all computers connected to Internet follow same rules and procedures, also called protocols, to
communicate with each other. These protocols, or the common language, of the Internet are known
as Transmission Control Protocol/Internet Protocol or TCP/IP.
Every computer on the Internet has a unique address. This is a four-part numeric address called
Internet Protocol Address or IP address, and it contains information that identifies the location of this
computer. Some examples of IP addresses are 255.230.54.1, or 10.11.0.220. Therefore, we can see
that each part of IP address is a number ranging between 0 and 255.
7.1.2 DNS
Most computers also have an address called a Domain Name System address or DNS address. A
DNS address has two parts: a host name which stands for the name the computer; a domain name
that identifies the type of organisation from which the computer is connected. Some of the most used
domain names today are .com which is used by commercial organisations; .edu used by educational
institutions; .net used by network service providers; .org used by non-profit organisations; and .gov
used by government departments and organisations.
148
End User Computing (15 Credits)
web users can click any link on a web page to access more information about these links. A
collection of related web pages is called a website. The first page of a website is called its home
page. On the home page, links to various webpages of the website are listed.
7.1.4 Web Browsers
You need a web browser to access web pages on the web. A web browser is a software application
specially designed to look up and open web pages on the user's computer. The two most popular
web browsers are Microsoft Internet Explorer, and Netscape Navigator. For the purpose of this
tutorial we will refer to the Microsoft Internet Explorer 5.0 which is used by a vast majority of web
users.
7.1.5 URL
The World Wide Web is built on a set of rules called the Hypertext transfer protocol (HTTP). This
protocol requires the Internet addresses in a special format, called URL or Uniform Resource
Locator. A typical example of a URL is as follows:
http://www.enablingdimensions.com/home/home.html
Let us see what the various parts of a URL stand for:
a. http:// : stands for a server that uses the hypertext transfer protocol
b. www : means the website is on the World Wide Web
c. enablingdimensions : part of the Internet stands for the name of the service/company/organisation
d. home: whose website you are accessing refers to a web folder belonging to the website of
enabling dimensions
e. home.html: refers to the specific web page in the web folder named home.
Sometimes the name of the web page is not displayed in the URL. However, each web page on the
web has a unique URL. To access a website, you must know its URL and that URL should be typed
in the Address bar of the web browser used by you.
7.1.6. Emails
To send and receive mails in electronic format, an email account and an Internet connection are
required. There are email programs available to help you manage your emails on your computer.
Some of the most commonly used email programs are Microsoft Outlook Express and Netscape
Messenger. However, it is not essential to have an email program to be able to send and receive
emails. There are several free email service providers on the web, including Hotmail, Yahoo!,
Rediffmail and Indiatimes. You need to register with them and open an account with them to start
sending and receiving emails.
After you drop your letter in the post box, the post-man collects and takes it to the central post office.
From here it is dispatched to the recipient's city. Similarly, after an email is sent from a computer, it is
149
End User Computing (15 Credits)
sent to the nearest mail server. Here, depending on the recipient's domain and top-level domain
name, the mail is forwarded to the mail servers closest to the recipient.
To deliver a letter, a postman collects the recipient's mail from the central post office and delivers it to
the recipient's home. Similarly, whenever the recipient connects to his mail server, the email program
retrieves the mail from there and presents it to the recipient.
Irrespective of what time of the day you send a mail, and no matter how far your recipient is, the
whole process of sending and receiving mails takes a few seconds.
To be able to use Internet and email, you need to set up a connection with an Internet Service
150
End User Computing (15 Credits)
Provider (ISP). Internet connections are available over the telephone line through dial-up modems or
DSL; over cable through Cable T. V. wires; and through wireless. The most common way of
connecting to the Internet is over telephone line using a dial-up modem. However, lately Internet over
cable is also becoming quite popular. There are also many cybercafes in the country offering Internet
Access facility on hourly rental basis.
Before you begin, ensure that you have an Internet connection on your PC. If you are accessing from
home, you need to connect to the net using the software provided by your service provider. This
software can be launched from the Program sub-menu in Start Menu or from Desktop, if there is a
shortcut on the desktop.
Activity 7.1
1. Press the start button to open the start menu. Go to Programs and open the programs sub-menu.
2. Now use the down arrow direction key to reach the option labelled Internet Explorer, and press
Enter.
3. Alternatively, you can use the shortcut icon for Internet Explorer on the desktop.
1. Title Bar - It is the topmost part of the web browser, and is a thin rectangular strip. The left-hand
corner of Title bar displays, the icon of Internet Explorer, name of the website, and name of the
program i.e. Internet Explorer. On the right-hand corner the three buttons - Minimise, Maximise
and Close are displayed.
2. Menu Bar - This consists of a horizontal row of command options. These are File, Edit, View,
Favourites, Tools, and Help.
151
End User Computing (15 Credits)
3. Standard Tool Bar - It displays shortcut icons of some of the most frequently used commands on
the browser.
4. Shortcut links bar - This may or may not be present. It displays shortcuts to a few most preferred
links by the user.
5. Address Bar - It displays the URL of the website being accessed by the user.
6. Contents Pane - The contents of the web page will be displayed here.
7. Status Bar - It displays the status of download, connectivity and the URL of the link being
downloaded.
1. Ensure that you are connected to the Internet. Launch the Internet Explorer from the start menu,
programs sub-menu.
2. Go to file menu option of the Internet Explorer by pressing the Alt key. Open the file menu drop by
using the down arrow direction key. In this drop down, use the down arrow direction key to go to
the option labelled 'open'. This will open the 'Open' dialog box. Alternatively, you can press
Control key and O key. The cursor will be in an edit text box. Here type the URL of the website
you want to visit. We will take the example of Enabling Dimensions website. So, type
www.enablingdimensions.com in the open edit text box, and press Enter.
3. The browser will then look for the Enabling Dimensions website on the web. The status bar will
display "searching www.enablingdimensions.com". When it finds the website, the status bar will
display 'website found'. After this a process of displaying the website on your computer will begin,
this process is called downloading. The page that appears after downloading is complete is
called the home page of the website.
152
End User Computing (15 Credits)
popular search engines are Google, Altavista, and Hotbot. Usually search engines have a text box,
where the users have to enter the information they want to search on the web. On pressing Enter, the
search engine looks for a match to the words entered in the text box. After a few moments, a list of
search results is displayed on the screen. This list usually consists of a listing of links to various
websites containing and a brief description of each link. These results are arranged according to
their accuracy, i.e. the closer the match with the text entered by the user, the higher up the list it is
placed. The user, then has to browse through this list to find which results are relevant and open the
links by pressing Enter key on them.
Activity 7.2
Show how to conduct a search on Google.
2. What is a server?
A. A computer that is very big
B. A computer that provides/manages shared services
C. A system of connecting computers
D. A computer that is connected in a LAN
153
End User Computing (15 Credits)
6. From a web page, you cannot save pictures to your hard disk.
A. True
B. False
7. A small file put in your hard disk that contains information like user ID by
your web browser is called a ____________________
A. Certificate
B. Personal Data File
C. Secured Sockets Layer
D. Cookie
154
End User Computing (15 Credits)
Revision Questions
155
End User Computing (15 Credits)
Answers
Think Point 7.1
In your opinion, are emails important? Justify your answer
Email is important for communication because it allows users to send information in letter format, and
email can replace traditional mail options. Emails can be more beneficial for communication because
they can often include text, documents and multimedia, like photos and videos.
Think point 7.2
Are all websites secure and safe? motivate your answer?
It is unfortunate that not every website is trustworthy and secure, but do not let that keep you from
going online – just do it safely. Simply being able to recognize a safe website can go a long way to
help protect your personal data. A legitimate trust seal, “https,” a privacy policy, and contact
information are all good signs that a website is safe.
156
End User Computing (15 Credits)
1. A
2. B
3. Interface
4. A
5. A
6. B
7. D
8. A
9. C
10. A
157
End User Computing (15 Credits)
Unit
8:
ICT in Everyday Life
158
End User Computing (15 Credits)
159
End User Computing (15 Credits)
Teachers
Use computers to search for teaching materials, participate in online forums and online
conferences as well as to aid their teaching
Students
Use the computers as a reference tool. They use computers to browse the internet to look for
information
Researchers
School Administrators
Use computers for administrative purposes to make sure that the entire operation runs smoothly.
BANKING
In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
Customers
Can make any transactions at the 24-hour service centres or via online. These services allow
them to do transaction at anytime they want
Businessman
Can save their time by using the online services offered by banks. They can access company
accounts for loan applications, business transactions and update on their cash flow at any time
Bank Administrator
Can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT),
telegraphic transfer and others by referring to the banking system
160
End User Computing (15 Credits)
Industry
Computers are used to facilitate production planning and control systems, to support chain
management and to help in product design in the industrial sector. In the industrial sector, workers,
researchers and administrator benefits from the usage of ICT.
Workers
Use machines that are connected to computers to operate. In some productions, robots are used
to take over jobs that are dangerous to the workers
Researchers
Use computers to analyse and collect research data for future reference
Administrators
Use computers to oversee the entire operations in the plant or factory to detect specific errors or
defects that occurred in the process
The COVID-19 epidemic has expedited the shift to online labour for many areas of society. It would
be naive to dismiss multinational firms' growing interest in spending billions of dollars in established
and start-up enterprises delivering online education throughout the epidemic. The vast experiment of
millions of people shifting online by default has been embraced by corporations that see potential not
merely for profit but also for entrenching themselves in public life.
Activity 8.1
161
End User Computing (15 Credits)
Read the following case study and answer the questions that follow.
Naneetha, R., and Srihari. (2021) A Case Study of Information and
Communication Technology in Empowering the Visually Challenged Women
in Inclusive Education
Available at https://doi.org/10.34293/ education.v9i4.4208case_study_1.pdf
[Accessed 27 September 2023].
Brigham Young posits that ‘If you educate a man, you educate an individual,
but you educate a woman, you educate a nation. Even now, educating a
woman is challenging in cultural practices dominated by values and beliefs in
the social system. Women in developing countries face significant barriers in
accessing education, whereas gender inequality in communities, society, and
the workplace hinders economic and social development. Education as a
means of empowerment of women can bring changes socially, economically,
and politically. An American author, Helen Keller, says that ‘Education cannot
be created with ease, only through the experience of trial and sufferings it can
be strengthened, inspired and achieved. Women with visual impairment are
still receiving less schooling, denied social acceptance, and lack of access to
information also became an impediment added to their woes. Perhaps, ICT
has changed visually impaired women’s lives by giving them access to
mainstream and trying to be independent financially and socially.
Furthermore, ICT has allowed visually impaired women in accessing braille
materials, operating assistive devices and applications that build confidence,
recognition, self-expression, and acquire knowledge. This study explores how
inclusive education creates an opportunity for visually impaired women in
overcoming societal stigma by achieving personal, social, emotional, and
academic goals. ICT in education plays an essential role in developing
women and facilitates empowerment, calibrated to a new order of society’s
structure and functions
What is the role of ICT in Higher Education Institutions?
g
E-Commerce
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more
efficient and faster. For this application, computers, Internet and shared software are needed. In the
e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
162
End User Computing (15 Credits)
Customers
Use computers to be connected online with suppliers to purchase products. This method can
save time and cost as they do not have to go to any outlets
Suppliers
Use computers to keep track of their transactions. All products are bar-coded and can be read by
the computer scanner to help in determining prices and managing inventory
Employees
Use computers and telephones to communicate with their customers for any enquiries. The
system helps employees to get the latest updates on inventory to be informed to the customers
Activity 8.2
Other Sectors
Amongst other sectors that benefit from the usage of ICT are architecture, arts, career, government,
healthcare, home, law enforcement, transportation and travel.
8.2 Health
Information and communications technologies (ICTs) can play a critical role in improving health care
for individuals and communities. By providing new and more efficient ways of accessing,
communicating, and storing information, ICTs can help bridge the information divides that have
emerged in the health sector in developing countries—between health professionals and the
communities they serve and between the producers of health research and the practitioners who
163
End User Computing (15 Credits)
need it.
Through the development of databases and other applications, ICTs also provide the capacity to
improve health system efficiencies and prevent medical errors.
A physician in a remote rural hospital is initially unable to diagnose a patient with a complex array
of symptoms. However, using his MEDLINE search training and the hospital’s Internet
connection, he is able to diagnose and successfully treat the patient for a tropical disease the
patient picked up while travelling abroad
Another physician looks at her hospital’s prescription trends using the newly created electronic
health record system and finds that other physicians are not using the post-surgical antibiotic that
is shown to be most effective according to the current international guidelines. She speaks to the
administration about advocating a switch in antibiotics that will improve patient recovery
outcomes and thereby save the hospital money
A neonatologist, who transmits CT-scans and other medical images by e-mail to his network of
personal contacts around the world to help in diagnosing and treating premature newborns,
estimates that tele-consultations have helped him to save numerous lives during the past year
A young woman, too embarrassed to ask her physician about reproductive health issues and the
risks of sexually transmitted infections, anonymously contacts physicians at a woman’s health
clinic, where they’ve set up e-mail accounts for staff in order to support these types of physician-
patient interactions
Each of these examples demonstrates how information and communications technologies (ICTs) can
play a critical role in improving health care for individuals and communities. By providing new and
more efficient ways of accessing, communicating, and storing information, ICTs can help bridge the
information divides that have emerged in the health sector in developing countries—between health
professionals and the communities they serve and between the producers of health research and the
practitioners who need it. Through the development of databases and other applications, ICTs also
provide the capacity to improve health system efficiencies and prevent medical errors.
ICT for health (or e-health) programs are often considered to be expensive, time-consuming, risky,
and otherwise distracting from the primary focus and intent of health sector programs. In some
cases, these criticisms may be valid. There are, however, a wide range of low-cost and sustainable
ICT for health program components that can augment capacity and improve the overall effectiveness
of health development programs. These are the types of programs that HealthConnect International
is specialised to help deliver.
164
End User Computing (15 Credits)
8.3 Security
The meaning of the term computer security has evolved in recent years. Before the problem of data
security became widely publicised in the media, most people’s idea of computer security focused on
the physical machine. Traditionally, computer facilities have been physically protected for three
reasons:
Computer security is security applied to computing devices such as computers and smartphones, as
well as computer networks such as private and public networks, including the whole Internet.
The field covers all the processes and mechanisms by which digital equipment, information and
services are protected from unintended or unauthorised access, change or destruction, and are of
growing importance in line with the increasing reliance on computer systems of most societies
worldwide It includes physical security to prevent theft of equipment, and information security to
protect the data on that equipment. It is sometimes referred to as "cybersecurity" or "IT se.curity",
though these terms generally do not refer to physical security (locks and such). Some important
terms used in computer security are:
In this frame, vulnerability is also known as the attack surface. Vulnerability management is the
cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems. Backdoors A backdoor in a
computer system, is a method of bypassing normal authentication, securing remote access to a
computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a
modification to an existing program or hardware device. It may also fake information about disk and
memory usage. Denial-of-service attack Unlike other exploits, denials of service attacks are not used
165
End User Computing (15 Credits)
to gain unauthorised access or control of a system. They are instead designed to render it unusable.
Attackers can deny service to individual victims, such as by deliberately entering a wrong password
enough consecutive times to cause the victim account to be locked, or they may overload the
capabilities of a machine or network and block all users at once. These types of attack are, in
practice, very hard to prevent, because the behaviour of whole networks needs to be analysed, not
only the behaviour of small pieces of code.
Distributed denial of service (DDoS) attacks are common, where many compromised hosts
(commonly referred to as "zombie computers", used as part of a botnet with, for example; a worm,
Trojan horse, or backdoor exploit to control them) are used to flood a target system with network
requests, thus attempting to render it unusable through resource exhaustion.
Direct-access attacks an unauthorised user gaining physical access to a computer (or part thereof)
can perform many functions, install different types of devices to compromise security, including
operating system modifications, software worms, keyloggers, and covert listening devices. The
attacker can also easily download large quantities of data onto backup media, for instance CD-
R/DVD-R, tape; or portable devices such as key drives, digital cameras or digital audio players.
For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to
eavesdrop on the systems of internet service providers. Spoofing of user identity describes a
situation in which one person or program successfully masquerades as another by falsifying data
and thereby gaining an illegitimate advantage. Tampering describes an intentional modification of
products in a way that would make them harmful to the consumer. Repudiation describes a situation
where the authenticity of a signature is being challenged.
Information Disclosure (Privacy Breach or Data Leak) describes a situation where information,
thought as secure, is released in an untrusted environment. Elevation of privilege Elevation of
Privilege describes a situation where a person or a program want to gain elevated privileges or
access to resources that are normally restricted to him/it.
An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of
a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually computerised). This frequently
includes such things as gaining control of a computer system or allowing privilege escalation or a
166
End User Computing (15 Credits)
1. Use Strong Passwords Use different user ID / password combinations for different accounts and
avoid writing them down. Make the passwords more complicated by combining letters, numbers,
special characters (minimum 10 characters in total) and change them on a regular basis.
2. Secure your computer o Activate your firewall Firewalls are the first line of cyber defence; they
block connections to unknown or bogus sites and will keep out some types of viruses and
hackers. o Use antivirus/malware software Prevent viruses from infecting your computer by
installing and regularly updating antivirus software. o Block spyware attacks Prevent spyware
from infiltrating your computer by installing and updating anti-spyware software.
3. Be Social-Media Savvy Make sure your social networking profiles (e.g. Facebook, Twitter,
YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information
you post online. Once it is on the Internet, it is there forever!
4. Secure your Mobile Devices - Be aware that your mobile device is vulnerable to viruses and
hackers. Download applications from trusted sources.
5. Install the latest operating system updates Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to
prevent potential attacks on older software.
6. Protect your data Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in another location.
7. Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to intrusion if they
are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are
also vulnerable. Avoid conducting financial or corporate transactions on these networks.
8. Protect your e-identity Be cautious when giving out personal information such as your name,
address, phone number or financial information on the Internet. Make sure that websites are
secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when
accessing/using social networking sites).
9. Avoid being scammed Always think before you click on a link or file of unknown origin. Don’t feel
167
End User Computing (15 Credits)
pressured by any emails. Check the source of the message. When in doubt, verify the source.
Never reply to emails that ask you to verify your information or confirm your user ID or password.
10. Call the right person for help Don’t panic! If you are a victim, if you encounter illegal Internet
content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial
scam, report this to your local police. If you need help with maintenance or software installation
on your computer, consult with your service provider or a certified computer technician.
168
End User Computing (15 Credits)
author and not copied. As the name suggests, "work" (referred to in the case law as "effort") must be
expended by the author to create the "work" in which copyright subsists.
But what kind of "work" is required: creative effort, or slim effort? Some cases say that there must be
creativity. In the United States, some degree of creativity must be present; the arrangement of
names, addresses and phone numbers in a telephone directory was a non-original form which did
not protect the phone book by copyright. "Original" does not mean "novel". Different programmers
can write similar programs and have copyright in each, so long as they do not copy from one
another.
Combinations of old things in an original way can be protected as artistic works (e.g. a collage of
photographs). Dramatic works need not have a high degree of originality. The variation of an existing
work causing significant changes can result in an original work.
Authorship
The Copyright Act does not define the term "author", and there have been no amendments to the Act
to cover problems related to authorship which are peculiar to computer programs.
Thus questions of authorship which arise when the specifications for a computer program are
created by one person, or persons, and the code is created by another person or persons, are left for
the Courts to decide. Similarly, questions relating to authorship of computer-generated programs will
have to be considered by the Courts without reference to specific provisions of the Act.
169
End User Computing (15 Credits)
2. Which one of the following is a term for systems used to store, retrieve,
process and transmit data?
a) Internet & Communication Technology
b) Internet & Information Technology
c) Information & Communication Technology
d) Information & Computer Technology
4. Which one of the following is a term for an audio or video recording posted
on a web site that can be downloaded and played later?
a) Podcast
b) Blog
c) VoIP
d) RSS Feed
170
End User Computing (15 Credits)
Revision Questions
171
End User Computing (15 Credits)
Answers
Activity 8.1
How COVID-19 Accelerated Digital Transformation in the Retail Sector
Retail technology has transformed the purchasing experience by:
1. affording customers the convenience to make orders from the comfort of their home
2. enabling them to purchase products that are unavailable in nearby stores giving access to a
broader range of products
3. giving customers the ability to research products, match prices among retailers, and have overall
better bargaining power
4. providing more detailed product information to the customer than most in-store staff can offer
5. offering a more personalized shopping experience
Activity 8.2
Why product bar coding is very important in modern economy.
1. Efficiency
Modern supply chain and inventory management simply would not be possible without the use of
barcodes. Rather than manually entering inventory and shipment data for every item into a system,
employees can simply scan entire pallets, crates, and even shipping containers to instantly know
what contents they contain inside.
2. Error Reduction
Manual data entry is notorious for its high levels of human error. That’s a lot of opportunities for
things to go wrong, whether it takes the form of inverted characters, skipped lines, misreadings,
illegible markings, or faulty keystrokes. Even worse, once an error occurs, it will often be reproduced
across a system, making it very difficult to locate and remediate the original mistake.
3. Tracking
Each time a barcode is scanned, it creates another step in a data trail that can be easily referenced
to locate items and events. This allows businesses to greatly improve real-time visibility into their
operations. From identifying a shipment’s most recent location or determining whether or not a
patient picked up their prescription from a pharmacy, barcodes help organizations and customers
alike to track down information quickly and accurately.
4. Data Collection
Todays organizations rely heavily upon data analytics to formulate their business strategy and make
key decisions. The more data they have available to them, the more nuanced and accurate their
analysis will be. Barcodes play a critical role in data collection strategies. Not only are they used to
gather information about inventory, supply chain, and sales activity,
172
End User Computing (15 Credits)
ICT also helps students improve their study skills by providing them with tools such as online tutorials
and e-learning materials.
173
End User Computing (15 Credits)
174
End User Computing (15 Credits)
experiences.
Nonetheless, some purchases are still best made in-store, and just because the shopping
preference of most customers is online does not mean offline stores will disappear. Moving forward it
is expected that most retailers will have to balance the e-commerce experience with in-store
offerings to create a consistent and holistic approach across all channels.
1. Secure your Mobile Devices Be aware that your mobile device is vulnerable to viruses and
hackers. Download applications from trusted sources.
2. Install the latest operating system updates Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to
prevent potential attacks on older software.
3. Protect your data Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in another location.
4. Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to intrusion if they
are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are
also vulnerable. Avoid conducting financial or corporate transactions on these networks.
5. Protect your e-identity Be cautious when giving out personal information such as your name,
address, phone number or financial information on the Internet. Make sure that websites are
secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when
accessing/using social networking sites).
6. Avoid being scammed Always think before you click on a link or file of unknown origin. Don’t feel
pressured by any emails. Check the source of the message. When in doubt, verify the source.
Never reply to emails that ask you to verify your information or confirm your user ID or password.
1. Use Strong Passwords Use different user ID / password combinations for different accounts.
2. Secure your computer o Activate your firewall Firewalls are the first line of cyber defence.
3. Download applications from trusted sources.
4. Turn on automatic updates to prevent potential attacks on older software.
175
End User Computing (15 Credits)
5. Protect your data Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in another location.
6. Secure your wireless network Wi-Fi (wireless) networks at home.
1. A
2. C
3. A
4. A
176
End User Computing (15 Credits)
a. Local Area Network (LAN) as the number of computers that are networked or linked together,
by means of cables in the same area.
b. Wireless Local Area Network (WLAN) as a network that is similar to LAN but computer are not
linked with cables. In wireless network, computer are connected using radio waves that send
signals to each other through air.
c. Wide Area Network (WAN) refers to computers that are linked together over large distance
using fibre optic cables.
d. A server computer is responsible for storing data which it send to and receives from the client
computer, while a client computer is the one that users sit at and interact with. It communicates
with the server computer.
e. Peer to peer networks (P2P) is a network arranged in which there is no independent server,
thus each computer is a server on its self.
2. Elaborate on the five types of computers and the environment in which they are used.
a. Mainframe Computer -It is high capacity and costly computer. It is largely used by big
organizations where many people can use it simultaneously.
b. Supercomputer -This category of computer is the fastest and also very expensive. A typical
supercomputer can solve up to ten trillion individual calculations per second.
c. Workstation Computer - The computer of this category is a high-end and expensive one. It is
exclusively made for complex work purpose.
d. Personal Computer (PC) - It is a low capacity computer developed for single users.
e. Apple Macintosh (Mac)- It is a sort of personal computer manufactured by Apple company.
f. Laptop computer (notebook)- It is a handy computer that can be easily carried anywhere.
a. HDDs - A traditional hard drive (HDD) is one of the most common types of media storage
devices. Built with a physical spinning disk inside a metal casing, HDDs offer long-term
reliability and storage for most users.
b. SSDs - Solid-state drives (SSDs) are a modern storage solution that stores digital content on
persistent memory. This gives them faster speeds for storing and retrieving data from
computing devices. SSDs offer better performance over HDDs but are generally less reliable
and slow down as more data is stored.
177
End User Computing (15 Credits)
c. Flash - Flash storage is a method of data storage that relies on small, programmable memory
modules. This means that there are no moving parts, making them faster than other options.
Flash storage is often used for quickly transferring files, making them a good option for
memory expansion but not for long-term storage.
d. Floppy - Floppy disks are an older standard that allows data to be stored on devices using a
compatible drive. Although they’re cheap, easy to handle, and relatively simple to use, they’re
limited in size and require external equipment to be used with most modern devices.
e. Optical - In optical storage media, a laser encodes data onto a device. This is commonly used
for CDs and DVDs. Optical storage devices are durable and have a low cost. Their simplicity
and portability made them a great option for encoding data before digital files became the
norm. However, they can be easily damaged or scratched, and the devices used to play them
require more complicated technology.
Unit 2
1. File path
A file path describes the location of a file in a web site's folder structure. File paths are used
when linking to external files, like: Web pages. Images. Style sheets.
2. Disk drive
A disk drive is a device that allows a computer to read from and write data to a disk. The most
common type of disk drive is a hard disk drive (HDD), and the term disk drive and hard disk drive
are typically used interchangeably. Other types include optical drives, storage devices, and
floppy drives. A disk drive is commonly found in PCs, servers, laptops, and storage arrays.
c. Folders
A folder is a storage space, or container, where many files can be placed into groups and
organize the computer. A folder can also contain other folders. For many computer software
applications, there is a current working directory. This is the folder that the application runs in.
A file is the common storage unit in a computer, and all programs and data are "written" into a file
and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled.
178
End User Computing (15 Credits)
A folder can also contain other folders, and there can be many levels of folders within folders.
Unit 3
Mail merge entails combining mail and letters and pre-addressed envelopes or mailing labels for
mass mailings from a form letter. In other words, it is the automatic addition of names and addresses
from a database to letters and envelopes This feature is usually employed in a word processor.
a. Prepare data of names and addresses in Excel data sheet for mail merge.
b. Then, in a new blank word document start mail merge.
c. Insert a merge field.
d. Preview and finish the mail merge
e. Save your mail merge.
179
End User Computing (15 Credits)
Answer:
1.The Quick Access Toolbar, is located above the Ribbon (top-left) and provides access to commonly
used features and commands, such as Save and Undo/Redo. Both the Ribbon and the Quick Access
Toolbar can be customized.
2.A title bar is a small strip that extends across the top of a window. It displays the title of the window
and typically includes the close, minimize, and maximize buttons. In macOS, these buttons are on
the left side of the title bar, while in Windows, they are on the right
3.A ribbon or riband is a thin band of material, typically cloth but also plastic or sometimes metal,
used primarily as decorative binding and tying. Cloth ribbons are made of natural materials such as
silk, cotton, and jute and of synthetic materials, such as polyester, nylon, and polypropylene
4.A scroll bar's orientation determines the direction in which scrolling occurs when the user operates
the scroll bar. A horizontal scroll bar enables the user to scroll the content of a window to the left or
right. A vertical scroll bar enables the user to scroll the content up or down
5.A horizontal scroll bar enables the user to scroll the content of a window to the left or right. A
vertical scroll bar enables the user to scroll the content up or down.
6.The zoom control is a slider that helps you to zoom in and out on the timeline so that you can focus
on areas of particular interest. Because this control zooms in on the center of the timeline view,
center the area of interest before you zoom in.
7.You can click the “Task View” button on the taskbar to open it, or you can use these keyboard
shortcuts: Windows+Tab: This opens the new Task View interface, and it stays open—you can
release the keys.
8.A status bar is a graphical control element which poses an information area typically found at the
window's bottom. It can be divided into sections to group information. Its job is primarily to display
information about the current state of its window, although some status bars have extra functionality
9.An insertion point is the location on the screen where the next character typed will be inserted. This
location may be in a text document, a form field, a Web browser address bar, or anywhere else on
the screen that allows text input. The insertion point is often identified by a flashing cursor
180
End User Computing (15 Credits)
10.A document window is a section of the screen used to display the contents of a document file on a
GUI (graphical user interface) operating system. Below is an example of a document window in the
Microsoft Word software word processor program. Document, Operating system, Window, Word
processor terms.
To restrict editing, follow the menu as mention below Go to review tab, click on Restrict Editing Pop
up window appears on right side of your document In pop up window, go to “ editing restriction”,
select the drop down for which you want to put restriction for like only comment , track changes, filling
in the form, or read only At end you will be asked to set a password for the document to keep access
limited to you
Unit 4
1. Using A1:A12 as your cell range, write down functions to calculate the following
2. How many data formats are available in Excel? Name some of them.
The order of operations in Microsoft Excel is same as in standard mathematics. It’s defined
181
End User Computing (15 Credits)
Parentheses or Brackets
Exponent
Multiplication
Division
Addition
Subtraction
Unit 5
1. Discuss five ways in which a relational database management system allows you to work with your
data.
A relational database management system (RDBMS) is a database that stores information in the
form of tables called relations. These tables include numerous rows and columns, often called
records and fields. Each record typically contains its own unique ID called a key. An RDBMS may
include millions of rows. The columns often consist of one type of data, such as names and numbers,
that contain attributes of the records. Most modern businesses, IT systems and other programs often
use RDBMSs because they can use the data in relation to other stored datasets.
2. Between different data’s what are the types of relationship can be formed?
The table contains your data can build three types of relationship
One-to-one relationships: A single data in one table is linked with a single data in another table.
One-to-many relationship: A single data in a table is linked to several data’s in another table
Many-to-many relationship: Where several data’s in one table is related to several other data’s
in another table
3. Explain how you can build a relationship between the different databases in Access?
When you establish a relationship between two data, the first table for your data is referred as the
primary key while the new field in another data is called a foreign key.
182
End User Computing (15 Credits)
Access database.accdb
Access project.adp
Access project.mdw
Access blank project template.adn
Access workgroup.mdw
Protected access database.accde
Unit 6
When all the slides of a PowerPoint presentation are set in series and then presented to a group of
people, where each slide appears one after the other, is a set pattern, this is known as a PowerPoint
slide show.
I. Clip Art
II. Graphs
III. Tables
IV. Photographs
V. Charts
VI. Media Clips
VII. Videos
All these elements are mainly used to enhance presentation skills and make the slide more
interactive.
Your applicants should know that PowerPoint files carry the .ppt or .pptx extension and that .ppt
stands for “PowerPoint presentation.”
4. Which steps would you use to set up password protection for a presentation?
Your applicants should be able to explain the steps required to set up password protection for a
presentation. To protect a PowerPoint file with a password, you need to:
183
End User Computing (15 Credits)
a. Navigate to File
b. Select the Passwords option
c. Select “Encrypt this presentation and require a password to open.”
d. Enter the chosen password
e. Enter the password again to verify it
f. Press Set Password
Unit 7
1. Email is a method of sending and receiving mail messages over the Internet. Discuss the
advantages of email.
Easy to reference - dent and received messages and attachments can be stored safely, logically and
reliably. It is a lot easier to organize emails than paper.
Easy to use - once you are set up, sending and receiving messages is simple. That goes for a host of
other email functions. Data storage and contacts can be accessed quickly and easily.
Easy to prioritize - incoming messages have subject lines that mean you can delete without opening
Speed - messages can be send under a second. Email is as fastest a form of written
communication.
Global - web based email means you can access your messages anywhere online. You can even
mail yourself a copy of your passport number, travel insurance details or your accommodation
details. Lastly, if emails are used well, it is a superb communication and productivity tool.
Keep your message brief. It's more difficult to read from a computer screen than from a printed
document, so use short paragraphs and bullet points to break up text and highlight key points. Use a
clear title in the 'Subject' line and don't resort to capital letters for emphasis - this will appear bossy.
184
End User Computing (15 Credits)
Know your audience. Corresponding with customers requires a more formal tone than emailing
colleagues. If in doubt, avoid using over-familiar terms of address, and steer clear of email-speak
and symbols that look like facial expressions - both will make you seem lightweight.
Don't forget to proof-read. Emails with spelling mistakes or lazy grammar make your business look
slapdash, and bad punctuation can make messages difficult to read. Re-reading as if you are the
recipient will help you send a more effective message and avoid misunderstandings.
Avoid sending unnecessary attachments. These tend to annoy recipients and clog up inboxes. If you
have a lot of files to send, compress or 'zip' them. Avoid passing on viruses by making sure you have
up-to-date anti-virus software.
Respond swiftly. After receiving an email, send a brief acknowledgment ahead of a full response.
Avoid flagging your own mail as 'urgent' or requesting 'read' receipts unless absolutely necessary.
Use a clear, concise signature. Record your name, job title, company address, website and
telephone number at the bottom of your emails to look serious and professional. Keep the layout
simple and don't use fancy fonts, colours or graphics - these can be cumbersome and they will make
you and your employees look like you can't be taken seriously.
Consider a disclaimer. Adding a disclaimer to the end of your emails may protect your business from
liability if your employees make defamatory statements in messages.
Social media
Telephones
Forums
Vedio conferencing
Fax
emails
185
End User Computing (15 Credits)
Unit 8
Computers allow the application of different types of software that can help businesses keep track of
their files, documents, schedules and deadlines. Computers also allow businesses to organize all of
their information in a very accessible manner. The ability to store large amounts of data on a
computer is convenient and inexpensive, and saves space. A computer's ability to allow a company
to organize its files efficiently leads to better time management and productivity. The usefulness of
computers include the following:
Communications: Companies use computers for both internal and external communications via
email, messenger systems, conferencing and word processing.
Research: Businesses can use computers to research industry trends, patents, trademarks, potential
clients and competitors via search engines and proprietary databases.
Media Production: Computers are now used to produce different types of media, including graphics,
video and audio productions.
Data Tracking and Storage: Although paper files containing hard copy documents are still in use,
organizations also store and manage their data using software and the cloud.
Product Development: Developers use computers to create new products and services.
Human resources: Internal HR processes and payroll systems are managed using software and
online services.
Electronic commerce, known as ecommerce, is the buying and selling of goods or services
electronically on the internet. It can also refer to other online activities, such as auctions, ticketing
and banking. Ecommerce is the online buying and selling of goods and services using computers,
tablets or smartphone. Ecommerce makes up several types of business, including business-to-
business, business-to-consumer, consumer-to-consumer and consumer-to-business.
186
End User Computing (15 Credits)
Ecommerce is an essential part of many businesses that rely on the sale of physical products or
services online. Here are the main kinds of ecommerce:
Business-to-consumer (B2C): B2C is the most common kind of ecommerce. When shoppers buy
something from an online store, they are involved in business-to-consumer ecommerce.
Business-to-business (B2B): B2B is when businesses sell raw goods or parts through e-commerce
to other companies that will then use those materials to create their own products.
Consumer-to-consumer (C2C): C2C ecommerce is when consumers sell to other consumers. Sites
like eBay and Craigslist are examples of this kind of ecommerce.
Consumer-to-business (C2B): C2B ecommerce is when consumers sell their products or services to
businesses.
3. Based on your expert knowledge of impact is that IT has had a different sector over the years,
discus the positive and negative impact of ICT in education and business.
In today’s interconnected world, information and communication technology (ICT) is widely used by
our nation and it affects our lives everyday. It gives great impact in education for the learners and
teachers. ICT has become a key driver in education way as well as it has been identified by a range
of important wider benefits of ICT on learning. The positive impact of ICT on students’ skills and
teamwork are included.
ICT also help student and teacher with activities that are provided in the websites. That kind of
activities gives ideas to the teachers in their teaching, so that students enjoy the class. Students
learn more independently at the same time. They will take more responsibility for learning process.
As seen from the information above, ICT can benefit both strong and weak students with their special
needs. By the way, they especially improved the performance in students’ English and on writing
skills.
187
End User Computing (15 Credits)
ICT is a part of a social system integrating meaningful communication within an education system.
We can use it for analyzing the processes, meanings and functions of ICT in education. ICT also
provided the research for us when we have to do the assignments. ICT is also one of the tools that
have easy communication with others in foreign countries. It saves cost and time.
Schools use ICT to make it easy for both students and teachers of their work. Different information
and opinion can be found from the web-sites. In addition, ICT provides wide array of information and
effective lessons. That is also easy for students to do their work by using word processing. It makes
our projects or assignments more neat and tidy. From the education system point of view, “e-” could
mean “enhanced” education rather than “electronic” education. Consequently, ICT has a great impact
on society especially on education.
On the other hand, ICT also has a bad impact on education system. Teacher who always show the
example of the work from the internet and copy the information, will not show a good example for the
students. That may cause the students follow the action of the teacher and start to copy and paste. At
the same time, the information and knowledge which come from the internet are not necessary
correct. We have to more careful when doing research from the web.
Moreover, it will cause the effect on the students. Students may not be interested in the way teachers
teach. They will more focus on the web such as Facebook, MSN, and Twitter. It unknowingly
influences their result in the class. It also changes their behavior to the teachers in school.
Students who generally communicate with friends by the ICT will cause a problem when
communicating face to face. It not only has an impact on character but also their attitude. Somehow,
they will become more rebellious when influenced by the negative material. Today, we can see that
have many teenagers use two or three phones. It will cause them not to pay attention in the lesson
time.
In conclusion, ICT can give both advantages and disadvantages to education. We have to be careful
when using it. Internet, TV, radio and others are the ICT that provide the news and information to us.
We can increase our vision when we have it. But, when we are too focused on these things, we may
suffer health problems by using them. We have to be wise in using the tools of ICT.
4. Elaborate on how ICT has positively impacted the commerce and Healthcare.
188
End User Computing (15 Credits)
Information and Communication Technology (ICT) has revolutionized the way businesses operate
and has had a significant positive impact on various aspects of the business sector. Here are some
key ways in which ICT has benefited businesses:
1. Improved Communication: ICT tools such as email, instant messaging, and video conferencing
have made communication faster, more efficient, and cost-effective. This has facilitated better
collaboration among employees, teams, and business partners, regardless of their geographical
locations.
2. Enhanced Efficiency and Productivity: ICT has automated many business processes, reducing
manual work and improving efficiency. Tasks such as data entry, inventory management, and
customer relationship management can now be automated, saving time and resources. This
allows businesses to focus on core activities and increase productivity.
3. Access to Global Markets: ICT has enabled businesses to expand their reach beyond local
markets. E-commerce platforms and online marketplaces have made it easier for businesses to
sell their products and services globally, reaching a wider customer base. This has opened up
new opportunities for growth and increased revenue.
4. Data Management and Analysis: ICT tools provide businesses with the ability to collect, store,
and analyze large amounts of data. This data can be used to gain valuable insights into customer
behavior, market trends, and business performance. Data analytics helps businesses make
informed decisions, improve strategies, and identify new opportunities.
5. Improved Customer Service: ICT has transformed customer service by providing various
channels for customers to interact with businesses. Websites, social media, and chatbots enable
businesses to provide 24/7 support and respond to customer queries and complaints promptly.
This enhances customer satisfaction and loyalty.
ICT has also had a significant positive impact on the healthcare sector, transforming the way
healthcare services are delivered and improving patient care. Here are some key ways in which ICT
has benefited the healthcare sector:
1. Electronic Health Records (EHR): ICT has facilitated the transition from paper-based medical
records to electronic health records. EHR systems enable healthcare providers to store, access,
and share patient information securely. This improves the accuracy and efficiency of medical
documentation, reduces errors, and enhances patient safety.
2. Telemedicine and Remote Monitoring: ICT has made it possible for healthcare professionals to
provide remote medical consultations and monitor patients remotely. Telemedicine allows
patients to consult with doctors through video calls, reducing the need for in-person visits.
189
End User Computing (15 Credits)
Remote monitoring devices enable healthcare providers to track patients' vital signs and health
conditions from a distance, improving access to care and reducing hospital visits.
3. Medical Research and Collaboration: ICT tools have facilitated collaboration among
researchers and healthcare professionals worldwide. Researchers can share data, collaborate
on studies, and access medical literature online. This accelerates medical research, promotes
knowledge sharing, and leads to advancements in healthcare treatments and technologies.
4. Health Information Exchange: ICT enables the secure exchange of health information between
different healthcare providers. This improves care coordination, reduces duplication of tests and
procedures, and ensures that healthcare professionals have access to complete and up-to-date
patient information. It also enhances the continuity of care for patients.
5. Healthcare Management Systems: ICT has automated various administrative and management
tasks in healthcare facilities. Hospital information systems, appointment scheduling software, and
inventory management systems streamline operations, reduce paperwork, and improve overall
efficiency. This allows healthcare providers to focus more on patient care.
In conclusion, ICT has had a profound positive impact on both the business and healthcare sectors.
It has improved communication, efficiency, and productivity in businesses, while also transforming
healthcare delivery, enhancing patient care, and advancing medical research. The continued
development and adoption of ICT will likely bring further advancements and benefits to these sectors
in the future.
Unit 9
1. Elaborate on how social networking has positive impacted the small business in South Africa
With more than 4.5 billion people using the internet worldwide, business organizations have found
digital marketing a potential advertising tool that can help them reach their target audience
effectively.
a. Brand loyalty
Every business strives to reach a state where customers choose their brand over competitors
sheerly out of trust. Brand loyalty is a state where the customers have complete faith in the
brand, and they purchase the product or service without any persuasion. Brand loyalty occurs
when a company forms a fruitful and honest relationship with its consumers.
Social media offers a platform for a company to interact with their customers and form a sacred
bond, making social media marketing an important part of digital marketing. It eliminates the
190
End User Computing (15 Credits)
middlemen (retailer, wholesaler) between brand and customer, making communication precise
and clear.
b. Easy communication
Initially, brand-customer interaction was limited to a yearly event hosted by the company to
launch their new products. However, with the advent of social media, brand and customer
interaction has become more frequent, easy, and quick. Today, customers can reach out to their
brand through social media platforms like Facebook, Twitter, Instagram, etc. Besides sharing
grievances, customers can provide real-time feedback about a product or service without a
hassle.
Nothing can be clocked on the internet. For instance, a hurtful tweet or post shared by a brand
on social media cannot be erased from the collective memory of customers because the recall
value of social media users is more than other mediums. As a result, many businesses suffer
losses due to these blundersome activities on social media.
In social media marketing, the customer has more power over the brands. Customers have a
voice that resonates with the masses. Social media gives customers the ability to publicly share
their views about a product without the fear of trial. It takes away the power of influence from
businesses and empowers customers. So, while promoting their product or services online,
brands need to be more conscious.
Social media is a platform that everyone across the globe uses. Social media marketing enables
you to attract customers from different parts of the world, helping your business expand globally
with less set-up cost, proving to be a cost-effective digital marketing technique. Moreover, the
platform transcends boundaries and connects you to your customers.
f. Competition
Social media marketing is a competitive industry that pushes everyone to do their best. It also
encourages brands to work effectively and productively to attract maximum customer attention.
191
End User Computing (15 Credits)
Social media helps in spreading the word about a business quickly and effectively. Qualtrics (a
business firm), in research, revealed that 72% of people read online reviews before purchasing a
product or service. So, businesses can leverage word of mouth to increase their sales and form
a special bond with new customers.
Social media marketing applies the concept of targeted marketing and advertising; therefore, it
creates maximum brand awareness among the target audience at less cost. It also reduces
operating costs and increases the profit margin of the businesses.
One of the most significant advantages of social media in education is its ability to provide
access to vast amounts of information. Through social media platforms such as YouTube and
Twitter, students can access a wealth of educational resources, including online courses,
tutorials, and research papers. Social media has made it easier for students to learn on their
own, without relying on traditional classroom instruction.
In addition, social media has made it easier for students to collaborate and share information
with their peers. Social media platforms such as Facebook and LinkedIn provide a platform for
students to connect with other students from different parts of the world, share ideas, and
collaborate on projects. This has created a global learning community that transcends
geographical boundaries.
3. Elaborate on how social networking has positively impacted the commerce and business.
3. Increased Sales
192
End User Computing (15 Credits)
Bibliography
Andrew Manches and Lydia Plowman, Computing education in children's early years: A call for
debate, British Journal of Educational Technology, 48, 1, (191-201), (2015)
Beth A. Rogowsky, Caryn C. Terwilliger, Craig A. Young and Elizabeth E. Kribbs, Playful learning
with technology: the effect of computer-assisted instruction on literacy and numeracy skills of
pre-schoolers, International Journal of Play, (1), (2017)
Bezanson, J., Edelman A., Karpinski, S. and Shah V.B. (2017) Julia: A fresh approach to
numerical computing. SIAM Review. 1(1)
Chou Mei-Ju, How are Our Prince and Princess Satisfying with IPad Learning, Procedia - Social
and Behavioral Sciences, 116, (2857), (2014)
Elizabeth Foss and Allison Druin, Children’s Internet Search: Using Roles to Understand
Children’s Search Behavior, Synthesis Lectures on Information Concepts, Retrieval, and
Services, 10.2200/S00591ED1V01Y201408ICR034, 6, 2, (1-106), (2014)
Emilija Stojmenova Duh, Natasa Koceska and Saso Koceski, Game-based learning: educational
game Azbuka to help young children learn writing Cyrillic letters, Multimedia Tools and
Applications, 76, 12, (14091), (2017)
Ewan Ingleby, Selected student and tutor perceptions of ICTs in further and higher education in
England, Journal of Further and Higher Education, 38, 3, (287), (2014)
Ewan Ingleby, The house that Jack built: neoliberalism, teaching in higher education and the
moral objections, Teaching in Higher Education, 20, 5, (518), (2015)
Fathi Ihmeideh and Fatima Al-Maadadi, Towards Improving Kindergarten Teachers’ Practices
Regarding the Integration of ICT into Early Years Settings, The Asia-Pacific Education
Researcher, 27, 1, (65), (2018)
Guy Roberts-Holmes, Playful and creative ICT pedagogical framing: a nursery school case study,
Early Child Development and Care, 184, 1, (1), (2014)
Heather C. Janisse, Xiaoming Li, Navaz P. Bhavnagri, Cassandra Esposito and Bonita Stanton,
A Longitudinal Study of the Effect of Computers on the Cognitive Development of Low-Income
African American Preschool Children, Early Education and Development, 29, 2, (229), (2018)
Hui-Yun Sung, Adult mediation of preschool children’s use of mobile technologies in public
libraries in Taiwan: A socio-cultural perspective, Journal of Librarianship and Information
Science, (096100061770905), (2017)
Hui-Yun Sung, Incorporating technology in children's story time: Cultural-historical activity theory
as a means of reconciling contradictions, Library & Information Science Research, 39, 1, (46),
(2017)
Joke Voogt and Susan McKenney, TPACK in teacher education: are we preparing teachers to
use technology for early literacy? Technology, Pedagogy and Education, 26, 1, (69), (2017)
193
End User Computing (15 Credits)
Kleopatra Nikolopoulou and Vasilis Gialamas, ICT and play in preschool: early childhood
teachers’ beliefs and confidence, International Journal of Early Years Education, 23, 4, (409),
(2015)
Kleopatra Nikolopoulou, ICT Integration in Preschool Classes: Examples of Practices in Greece,
Creative Education, 05, 06, (402), (2014)
Laudon, C.K. and Laudon, J.P. (2017) Management Information Systems, Managing the Digital
Firm. Twelfth Edition. New Jersey: Pearsons Education Ltd. This is the latest edition of the
textbook that is available
Marie L. Bassford, Annette Crisp, Angela O'Sullivan, Joanne Bacon and Mark Fowler, CrashEd –
A live immersive, learning experience embedding STEM subjects in a realistic, interactive crime
scene, Research in Learning Technology, 24, 1, (30089), (2016)
Maryanne Theobald, Susan Danby, Christina Davidson, Sandy Houen, Brooke Scriven and
Karen Thorpe, How Talk and Interaction Unfold in a Digitally Enabled Preschool Classroom,
Australian Journal of Linguistics, 36, 2, (189), (2016)
Mona Sakr, Multimodal participation frameworks during young children’s collaborative drawing
on paper and on the iPad, Thinking Skills and Creativity, 10.1016/j.tsc.2018.05.004, 29, (1-11),
(2018)
Monika Tavernier and Xiao Hu, Developing young children's technology-based communication
skills using iPads and creation apps: An action study, Proceedings of the Association for
Information Science and Technology, 54, 1, (415-425), (2017)
Nollaig McEvilly, Matthew Atencio and Martine Verheul, Developing children: developmental
discourses underpinning physical education at three Scottish preschool settings, Sport,
Education and Society, 22, 8, (943), (2017)
Pekka Mertala, Wag the dog – The nature and foundations of preschool educators' positive ICT
pedagogical beliefs, Computers in Human Behavior, 69, (197), (2017)
Pirita Ihamäki and Katriina Heljakka, The Internet of Toys, Connectedness and Character-Based
Play in Early Education, Proceedings of the Future Technologies Conference (FTC) 2018,
10.1007/978-3-030-02686-8_80, (1079-1096), (2018)
Rabia M. Yilmaz, Educational magic toys developed with augmented reality technology for early
childhood education, Computers in Human Behavior, 10.1016/j.chb.2015.07.040, 54, (240-248),
(2016)
Rabia M. Yilmaz, Sevda Kucuk and Yuksel Goktas, are augmented reality picture books magic or
real for preschool children aged five to six? British Journal of Educational Technology, 48, 3,
(824-841), (2016)
Sanja Tatalovic Vorkapic and Sandra Milovanovic, Computer use in pre-school education: The
attitudes of the future pre-school teachers in Croatia, Education 3-13, 42, 2, (217), (2014)
Satyanarayanan, M. (2017) The emergence of edge computing. Computer. (1)4
Stephanie Kerckaert, Ruben Vanderlinde and Johan van Braak, The role of ICT in early
194
End User Computing (15 Credits)
childhood education: Scale development and research on ICT use and influencing factors,
European Early Childhood Education Research Journal, 23, 2, (183), (2015)
Steven M. Freund, S.M., Hoisington, C., Schmieder, E. and Last, M.Z. (2016) Microsoft Office
365 and Office 2016: Introductory [PDF]. Boston, Massachusetts: Cengage Learning
Xia Liu, Eugenia I. Toki and Jenny Pange, The Use of ICT in Preschool Education in Greece and
China: A Comparative Study, Procedia - Social and Behavioral Sciences, 112, (1167), (2014)
Yi, S., Li, C. and Li, Q. (2015) Fog Computing: Focusing on mobile users at the edge.
Proceedings of the 2015 workshop on mobile big data. 1(4)
Yvonne Anders, Hans-Günther Roßbach and Susanne Kuger, Early Childhood Learning
Experiences, Assessing Contexts of Learning, 10.1007/978-3-319-45357-6_7, (179-208), (2016)
195
End User Computing (15 Credits)
196