Palphlet Form 4 Computer
Palphlet Form 4 Computer
FILTERING
- Filtering is a quick and efficient method of finding and working with subset of data in a
list
- Filtering is a process of displaying list of data that meet certain criteria or condition you
specify
- Microsoft has two commands for filtering:
- The autofilter: Uses simple criteria and include filter by selection
- Advanced filter: It uses more complex criteria
Using autofilter
- The autofilter command can be applied to only one list on a worksheet at a time.
- To autofilter a list:
1. Click a cell in the list to be filtered
2. On the data tab in the Sort & Filter group, click Filter. The filter drop down arrows are
inserted on the top cell of each column.
3. To display only the specific value, uncheck all the values you do not want to appear and
check all values to appear then click OK
Page 1 of 68
You can also filter by selecting Text Filters and specify the criteria
Advanced filter
1. The advanced filter works a slight different than the autofilter in that you have to manually
specify a criteria.
1. On the Data tab in the Sort & Filter group, click Advanced. In the Advanced Filter dialog box, do
the following
2. Select the “Filter the list in place” option
3. In the List range, specify the range of values o be filtered
4. In the Criteria range box, specify the range that covers the column and the criteria as shown
below:
Page 2 of 68
- Charts makes it easy for users to see comparisons, patterns and trends in data.
- Charts helps in analyzing data
- A chart is linked to the worksheet data it is created from, and whenever data on the
worksheet is modified, the chart is updated automatically.
Types of charts
-Some of the types of charts available in Microsoft Excel include:
1. Column charts: represents data as a cluster of columns comparing values across categories
2. Bar charts: represents data using clustered bars arranged horizontally. It is used o compare
values across categories
3. Pie charts: used to present data on a circular pie, portioned into sectors representing each
item being analyzed.
4. Line graphs: represents data as lies with markers at each data value in x-y plane
5. Scatter charts: compares pairs of values on same axis using scatted dots
6. Area graphs
Creating charts
To create charts
1. Select the range of data for which you want to create chart
2. On the Insert tab, select the type of chart you wish to create
3. Then click OK
Formatting and editing charts
- Once the chart has been created, the patterns, colours, size, location and orientation can be
changed.
- Once you double click the chart, Toolbar appears on the screen to enable you to edit and
format the chart.
Resizing and moving charts
- To resize the chart, click the chart and use the place holder on the edge to drag the chat to
size
- To move the chart, click inside the chart area then drag to desired position
Labelling data values
- Each representation of data in the chart can either be labelled by a value or text label
- To label the chart, On the Chart Toolbar, in the Chat Layout group, click the Quick Layout
command and select the layout that has data labels, then edit the chart tittle as appropriate.
Inserting tittles
-Each chart must have a heading showing clearly wat it represents. Also include axis. To include
axis, proceed as follows:
-On the Chart Toolbar in the Chart Layout group click Add Chart Element then select Chart
Tittle. Select Above Chart or Centered overlay as below:
Page 3 of 68
Inserting a legend
A legend is equivalent to a key used to manually drawn charts.
It shows what each colour or pattern of data series represents, for example green
representing boys and pink representing girls.
Without legends, it would be difficult to know how to differentiate the data series
represented by ant chart
To create legend
On the Chart Toolbar, in Chart Layout group, click Add Chart Element and then
click legend.
Select the appropriate position as shown below:
Page 4 of 68
Page setup refers to the way page margins, orientation, size and other page orientated
features are applied to the page.
Margins
Margin control the extent to which content can be placed on the page and print area.
Margins include:
1. Left, top, right or bottom margins
2. Gutter: these is the extra space usually added to the left margin of the page to give
allowance for binding the printed pages.
To setup margin, On the Page Layout tab in the Page Setup group, click margin then
select custom margin, click the margin tab and adjust as appropriate.
Page size, orientation and scaling
In the Page setup dialog box, click the Pages tab
Select the page orientation, size and scaling
i. Orientation determine whether the page will be portrait or Landscape
ii. Size can be A4, Letter A1 etc
iii. Scaling is used to fit the virtual page on the screen to the real page in the printer
iv. Print quality determine print resolution in dots per inch (dpi)
Page 5 of 68
The text that is in the document maps directly into the Excel cells.
There are two ways of achieving this:
1. Creating delimited text file (.txt) in which fields are separated by pressing the Tab key.
2. Use the comma separated values(csv) files. The comma (,) separates the fields in the file.
Liking files
Sometimes it becomes necessary to have spreadsheet that reference other spreadsheet file.
For example, in retail stores you can maintain a master spreadsheet having all prices of
the goods. A sales spreadsheet can reference this information through links when
recording transaction.
A link is a type of formula that fetches its data from anther worksheet or spreadsheet file
into the current spreadsheet file
When you start the spreadsheet that linked to external one, it checks for the update in the
external files as it starts updating its data in the process.
To link spreadsheet:
1. Open the workbook you want to link
2. In the source worksheet, highlight the cells you wish to link to and then click the Copy
command
3. Switch focus to the destination workbook, click the upper left corner of the range where
you wish the links to be.
4. On the Home tab, click the Paste drop down and then click the paste special command. In
the Paste Special dialog box, click paste Link option then Ok command
Page 6 of 68
This is because data within organization and its environment forms part of the strategic,
tactical, operational management and decision making
In order to enhance convenient and easy storage and retrieval of data, we use database
A database is a collection of related data items organized so as to provide consistent and
controlled access to the items.
TYPES OF DATABASE
There are two main types of database; namely Manual and electronic or computerized
database
Manual database
A manual database consists of a collection of repository files and folders each properly
tagged and kept in a proper sequence in a cabinet.
For example, in a school the admission office stores all students’ files identified using
unique student numbers such as 201/2014, 202/2014 etc.
However, as organization data and information data grows, manual organization becomes
difficult and time consuming resulting in the following problems:
1. Redundancy: redundancy refers t unnecessary duplication of data in multiple files
2. Lack of flexibility: it is difficult to search for a requested file or record
3. Lack of integrity: poor storage and maintenance of data may lead to unreliable and
misleading reports.
4. Lack of data sharing: Data or information in different manual files may not be available
to other users
Electronic database
Electronic database refers to the use of electronic devices such as computers to stress and
organize files for easy access
For example, in Microsoft, files are stored under one folder on a storage media
An advantage of electronic database over manual filling is that the operating system and
electronic database system provide users with tools for easy storage and access of data
and information
Database management systems (DBMS)
To create and manipulate database, we use a software referred to as Database Management
System (DBMS)
The DBMS provide tools for creating, storing, searching and manipulating databases.
Some examples of DBMS are:
1. Microsoft Access
2. OpenOffice Database
3. Microsoft SQL Server
4. Oracle
5. FoxPro
6. DbaseIV
7. Lotus Approach
8. Oracle’s MYSQL Server
Benefits of using DBMS
Some of benefits of using Database Management System include:
1. Allow authorized users to add or delete records
2. Allow users to update or modify existing records
3. Interface between database files and other application programs
Page 7 of 68
4. Organize files and records for easy access, retrieval and sharing
5. Ensure security and integrity of data by safeguarding it against unauthorized access and
modification
6. Keep statistics of data in a database
Database model
A database model is a logical structure that determine how data is stored, organized and
manipulated by DBMS software.
Five common types of database models are:
1. Hierarchical model
2. Network model
3. Relational model
4. Object/relational model
5. Object oriented model
The most popular model is relational model
Hierarchical model
In hierarchical model, files are arranged in top-down structure that resemble a tree.
The top file is called a root, the bottom files are called leaves and intermediate files have
one [aren’t file and one or several children files
For example, in the figure 1 below, to access level one data, the user has to access the
root first and follow the path to the level.
A specific path leads to each item at the lower level
Hierarchical model is rarely used in modern database system, hence absolute
Level 1
root
Canteen
Customers Suppliers
Transaction
Relational model
In relational database model (RDBMS), data is organized into records that are stored in
related tables or files.
A table is a collection of related records each record containing related fields
The reason why it is called relational model is because two tables can be linked together
such that a record from one table references to a record or records in another table.
For example, table 2.1 and 2.2 below shows Customers table and Orders table that are
related to each other through customer number and customer ID.
In this case, the Orders table shows that customer number 450 (Bat Masamba) has three
orders in Orders table.
Table 2.1: Customer
Object-oriented model
Object-oriented model purely supports storage, access and manipulation of objects
Although currently not popular in the market, object-oriented database management
systems (OODBMS) provides unification of application and database development
Object-relational model
In software development, there is a shift from structured programming to object-oriented
programming.
This shift raised a need for a database model that stores and manipulates objects
Therefore, object-relational is an evolutionary hybrid model that has capabilities to
handle both relational and object-oriented and manipulation of data
Database structure
For easy retrieval and manipulation, Relational database organize data into a structure
called a schema.
A schema is an organization structure made up of fields at the lower level and database at
the highest level
1. Field: is a set of character that define single data value. For example, each column like
Surname, Firstname, gender, sex, in a table represents a fields.
2. Record: a record is a collection of related fields that represents a single data items. An
example of a record is a row in student examination report that may contain students’
name, admission number. Grades.
3. Table: a database table contains a set of related records. For example, in a school
database, a table may contain names of all students in the school and another table may
contain names of all teachers in the school, different tables are stored in the same
database.
4. Database: a database is a collection of related tables and each table consists of related
records made up of fields.
A database schema may look like the one below:
Creating database
Page 10 of 68
Before you begin creating database, you need to design it first. This is because a design
results to better storage, access and maintenance of a database.
The following are the consideration before creating a database
1. Estimate the amount of data expected to be stored in the database. This is important to
determine the number of tables to be created.
2. Study the requirements of the user carefully in order to define all the inputs, outputs and
relationships required to create database
3. Design prototype database preferably on the paper to determine fields and tables required
to implement the database.
4. Normalize the fields into separate tables to allows flexibility in database manipulation.
This process of decomposing fields into separate but related tables is referred to as
normalization.
5. Identify a field in each table that will be used to identify each record uniquely. Such field
is referred to as a primary key.
6. Give the most important fields first priority when designing a table structure. These fields
are those mostly used to sort and search for records in a database.
7. Design sample data forms and reports needed for interaction between the user and the
database system.
Creating database
To create a database, proceed as follows:
1. Click start and open Microsoft Office, then click Access
2. Click the Blank database
3. Type the name for the database and specify the storage location. The database is saved
as .accdb file extension which stands for access database
4. Click Create tab and the blank database with the default Table 1 will be created as
shown in the figure below:
Page 11 of 68
2. Using the table grid displayed, enter unique name for each field. A field name start with a
letter can be up to 64 characters including letters, numbers, spaces and punctuations.
3. Choose appropriate data type before adding another field. Access starts with Short text as
default data type
4. To save changes, click save button
5. Access will prompt whether you want to create primary key click YES
Page 12 of 68
3. Click the Primary key button on the Design toolbar
3. In the Field Name column, select the field you wish to set as a secondary index other than
the primary key
4. In the Index Name, type the name of the index
5. In the sort order column, select the ascending of descending then close the window
Field Data Types
The type of data to be used in a database must be clearly defined for the purpose of
manipulation and storage.
For example, if a filed is to be used for calculation, it must be defined as a number
The following data types are allowed in Access:
1. Short Text
This type includes alphabetic letters, numbers, spaces and punctuations. Use this data
type for fields that do not need to be used for calculations such as Names, places.
Page 13 of 68
This type of filed accommodates a maximum of 255 characters
2. Long Text
Unlike short text data types that takes up to 255 characters, long Text takes up to 65,535
characters.
3. Number
This type is made up of numeric numbers 0 to 9 that are to be manipulated
mathematically.
4. Calculated
This is used to store data created from a formula. This is important particularly if a value
will be used in queries, forms and reports.
5. Date/Time
Used to identify a field as either date or time field. This is because date in a database can
be manipulated mathematically, for example you can calculate age of a person by given
date of birth and current date
6. Currency
Used to identify numeric values that have decimals or fractions. Use this data type when
dealing with monetary values such as fees balance
7. AutoNumber
This is a numeric data type used if you wish Access to automatically increment the value
by one. The field is incremented by one each time you enter a new value
8. Yes/No
This is a logical data type that is either yes or no or true or false. For example, fields that
requires you to answer whether you are married or not.
9. OLE object
The term OLE stands for Object Linking and Embedding.
This data type is mostly used for storing graphical objects such as pictures, drawings,
charts, among others.
10. Attachment
This data type is used to store one or more files containing pictures, sound, video or word
document.
Field properties
As you create more and more complex tables, you may need to use field properties to
specify details related to each filed in the table.
The properties depend on the type of field selected.
Click the field and then click General as below:
Page 14 of 68
1. Field Size:
Field size allow the user to set the number of characters in a field instead of the default
255 for short text field. For numeric field, you can set the field size as an integer, Byte,
Single, Double or Decimal
Integer and long integer: accept number with no decimals
Byte: can only accept a number between 1 and 255
Single, double and decimal: Accept number with decimals. (single precision
accommodates up to 38 decimal places while double precision accommodates up to 308
decimal places)
2. Format:
Determine how information appears on the screen o when printed. For example, you can
format the numeric value as scientific, currency, percentage or general.
3. Precision:
This property is used to specify the total number of digits that can be stored bot to the left
and right of the decimal point.
4. Decimal places:
This property applies to number and currency type.
5. Input mask:
Input mask is used to format a field into a specific format. For example, if you enter a
number such as 02000100409874 and the input mask is set as 000-(00000)-000000, it is
formatted and displayed as 020-(00100)-409874. This property is mostly used to format
phone numbers and address entry.
6. Caption:
A caption is a more descriptive name for a field to be used in the table or a form display.
For example, the caption for stuName could be Student Name
Page 15 of 68
7. Default value:
This is a value that will appear automatically in the datasheet or form if nothing is entered
by the user. For example, Date() automatically displays the current date in the date field
8. Validation Rule:
A validation rule may be an expression that restrict the values to be entered in a field. For
example, if you want to restrict the marks entered in a field to values between 0 and 100,
type >=0 And <=100 in the validation rule box.
9. Validation Text:
This is a custom message that appears once the validation rule is violated. For example,
you may specify a validation text for the above validation rule to display “Enter a
number between 0 and 100” whenever a user enters a value outside this range.
10. Required:
This is a validation property that ensures an entry is made in the field before proceeding
to the next filed or record. For example, if surname is required, you must enter it before
ypu proceed.
11. Allow zero Length:
This is also a validation property that allows the user to proceed without making any
entry in the field set as Zero length.
12. Indexed:
An index is a field that is used to speed up searching and sorting of records in a table. It
may also be used as a validation key to prohibit duplicate values in the field. Therefore,
we use index properties on specific fields such as Admission number to index records for
easy access and search.
Page 16 of 68
Asterisk: Marks a blank record below the current entry
Record locked: Indicate that the current record is being edited by another user in a multi-
user or networked environment.
Deleting records: To delete a record, point the arrow then Right click and finally click Delete
Record
Editing record: To edit content field, click inside the cell and then type the new record
Searching for records: To find and replace a field, click Find or Press Ctrl + F then type what
you search to search.
Copying and moving records: Select the record you want tom copy or move, click COPY/CUT,
open the target datasheet and click Paste
Sorting and filtering records
2. Sorting refers to arranging records in ascending or descending order numerically or
alphabetically.
3. On the other hand, filtering refers to extracting records from a table that meets given
criteria.
To sort records: In the Datasheet View, select the records to be sorted, On the Home tab click
either Sort icon for Ascending or Descending order.
To filter records:
There are four ways of filtering records and these are:
1. Common filter
2. Filter by selection
3. Filter by form
4. Advanced filter
To filter records
1. Open the table in Datasheet View, then select the record to be filtered
2. On the Home tab, click Filter icon that looks like a Funnel.
3. Use the checkbox to specify values by checking the field
4. To remove the filter, click Toggle filter
Modifying a Database
You can modify the table datasheet structure,
Import a table from another database
Export tables to another database
Adjusting column size: Point the column between the column header then drag to resize it
To adjust row height: Point the border between the row header ad drag to required row height
Page 17 of 68
Reordering table fields
You can rearrange the fields by switching their positions. For example, instead of starting
with Firstname followed by Midname then Surname, we can change the order to start
with Surname, Firstname and then midname.
To reorder fields: Select the column you wish to move by pointing to its header then
drag the column right or left on the top of filed where you want your field to appear and
drop.
CREATING RELATED TABLES
- One of the technical part in design of a relational database is to link tables using a foreign
key that references a primary key of another table
- A foreign key is a field in a database table that matches the primary column of another
table.
- There are three types of relationships between two tables, each named according to
number of records that may be involved in the relationship and these are:
1. One-to-one relationship
- This is a type of relationship where the primary (reference) table has only one related
record in the related (child) table and vice versa.
- For example, in a Christian marriage, a man can only marry one wife and a wife is only
married to one husband. In this case, there is only one record with that person I husband
table related to only one record in wife table. Figure below shows how to present one-to-
one relationship using an Entity Relationship Diagram (ERD)
Husband Wife
Most one-to-one relationship are forced by rule and don’t floe naturally as such you can just
combine both tables into one table
2. One-to-many relationship
- This is the most common type of relationship.
- In one-to-many relationship, one record from primary table correspond to one or more
related records in the child table but each record in the child table is related to one record
in the primary table
- For example, a student may take one or more subjects. In this case, there is only one
record with that student in Student table, yet there are several subjects related to the same
student in Subject table.
- Figure below shows how one-to-many relationship is represented using ERD
Student
One-to-
many
Page 18 of 68
Subject
To create one-to-many relationship using Student table and Subject table above, proceed as
follows:
1. Create two tables, one named Student and the other one named Subject with the
following fields as shown from the diagram
Student: (AdmisionNumber, Fname, Lname, DOB, Grade)
Subject: (SubjectCode, StudentAdmision, Subjectname, lessonsallocated)
2. Click the Database Tool tab, then click Relationship button as shown below
Page 19 of 68
3. In the Show table dialog box, select the Student table then click Add and then click
Subject table and click Add. The tables are displayed in the relationship window as
shown below:
4. Drag AdmisionNumber primary key on the Student table and drop it into the
StudentAdmision foreign key on the subject table. In the Edit relationship that appears,
click Create Button to establish the relationship shown below.
Page 20 of 68
3. In the Edit relationship dialog box, select Enforce Referential Integrity check box
Many-to-many relationship
-Many-to-many relationship also called non-specific relationship occurs when each record in the
primary table correspond to one or more records in the child table.
-For example, a teacher may teach more than one subject while one subject may be taught by one
more teachers.
-Figure below shows representation of many-to-many relationship using ERD
Many-many relationship
Page 21 of 68
Teacher Subject
Page 22 of 68
5. Drag the Teacher_ID primary key on the Teachers table and drop it into the Teacher_ID
in the TeacherSubject table. Next, drag SubjectCode on the subject table and drop it in
the SubjectCode in the TeacherSubject table. In the Edit relationship that appears,
Enforce the referential integrity and click Create button
Page 23 of 68
- A bound control is one whose source of data is a field in a table or query while unbound
control is a control whose source of data is not related to any data source
- You design or modify a form by placing these controls on the required position.
Designing a form
- There are two ways of designing a form
1. Using form Wizard
2. Using Design View
Designing form using Form Wizard
- A form can be designed using form wizard that takes you through a series of steps to select
the fields and layout. Examples of layout are:
1. Columnar form: The field or each record are displayed down a column on a separate line
with field labels to the left
2. Tabular form: Records are displayed from left to right across the page and labels appear
at the top of each column and each row represents a new record
3. Datasheet form: The form resembles a table in a datasheet view
4. Justified form: One record occupies the whole form.
Page 24 of 68
CREATING FORM IN DESIGN VIEW
- Instead of using Form Wizard, you may create a form from scratch using Design grid.
Proceed as follows:
1. Open the database you want to create from
2. On the Create tab, click Form design. A design grid shown below will appear.
3. On the right of the design grid is a Field List Pane. Under the Pane, expand the field list
Page 25 of 68
4. Drag and drop the field list on the design grid
5. Display the form on the form view to see how the controls appear in the form
I
Page 26 of 68
To change to Form View, click View then click Form View
Form Navigation
Once the form is displayed, you will notice a navigation bar at the bottom as shown below
We use Navigation bar located at the bottom of the form to do the following
1. Display the first record in the table using
Page 27 of 68
3. Display the next record using
Modifying form
To format Field controls on a form, proceed as follows
1. Open the form in Design view
2. To resize the control, click the control and resize to the required position
3. To move control, click the control and position the pointer onto he place holder or inside
the drag to the required location
CREATING QUERIES
- The term query means a question.
- In database content, the term query refers to a question used to instruct a database to retrieve
data or perform operations
- The operations performed may be insert, update and deletion of data in a table
- The language used to query a database on behalf of the user is referred to as Structured
Query Language (SQL)
TYPES OF QUERIES
In relational database, queries are classified into two types
1. Select query
- This is the most common type of query used for searching and retrieving data from one
or more tables.
- A select query lets the user specify the search criteria and the records that meets the
criteria are displayed in a query data sheet called dynaset
2. Action query
- These queries are used to make changes to records in a table.
- An action query may be used to delete, update, add a group of records from one table to
another or create a table from another table
- There are four types of Action query and these are;
1. Update: Updates data in a table
2. Append query: Adds data in a table from one or more tables
3. Make table query: Creates a new table from a dynaset
4. Delete query: Deletes specified records from one or more tables
Page 28 of 68
Creating queries
- In Ms. Access, you can create a query in two ways
1. By using query Wizard
2. By creating query in Design View
3. Drag each field or selected fields from the table into the field row
4. Type the criteria in the criteria row;
-The following are the important sections of a query design grid that are used to specify the field
and criteria to be used to display the dynaset:
1. Field row: Fields from a table or tables to be used are displayed in this row. Each field
occupy its column
2. Table row: Indicate the table providing the fields.
3. Sort row: By clicking the down row in the sort row, you can specify the sort order, that is
ascending or descending order.
Page 29 of 68
4. Show row: by clicking the show row, you specify whether to display the field in the
query results. When the box is not clicked, the field will not be displayed.
5. Criteria row: This I where you enter condition or expression that will be used by the
query to display specified records.
6. Or row: Used to specified an alternative condition.
Specifying query criteria
- In order to search for a particular record, you have to enter a conditional statement in the
criteria row.
- For example, if you want to display list of employees who earn salary less than 5000, then
you have to type <5000 in the criteria row under salary column.
- Other logical operators are: >, >=, <=, <> (not equal to), =
- You can also create compound expression using logical operators like AND, OR and NO, for
example:
Use AND to display values in specific range, for example type >5000 AND <8000in
criteria row will display list of people whose salary is between 5000 and 8000
Use OR if you e=want either one or both
If you want data in particular range, use the word BETWEEN. For example, instead of
typing >4000 AND <6000 type BETWEEN 4000 AND 6000
If u want list of records except those you do not want, then use NOT. For example, NOT
6000 will display the whole list except 6000
To display list that you are not sure of but you can only remember certain letters, use
LIKE and wildcard. Wildcards are special symbols used in place of other characters... for
example, LIKE Sm?
Page 30 of 68
GENERATING DATABASE REPORT
- Reports are used to summarize and present information from a database while labels are
used for identity purpose.
- Report can also be designed using two way
1. Using report Wizard
2. Using Design View
Generating report using Wizard
- Just like a form wizard, a report wizard also takes a user through a number of steps by
answering a few questions. Proceed as follows:
1. Ensure that the database is open
2. Click the Create tab, then Report Wizard
3. On the report wizard dialog box, select a table or a query and the fields to be added to the
report the click Next
4. Choose if you want to add Grouping. Grouping is used to classify records using a
particular field. Click Next
5. Select the sort option if you want and click Next
6. In the layout box, select the type of layout and as well the orientation and click Next
7. In the style screen, select a report style either bold, casual or any other
8. Finally enter the name of the report
9. Click Finish
Creating report in design view
1. Click the Create tab the select Report Design. A blank report design is displayed
2. To select the table or query, click Property Sheet in Tools group of design ribbon
3. On the displayed Property sheet, click the data tab and then specify the query or table
name in the record source.
4. Click filed list button in the same group
5. Drag the each filed from the field list into the layout grid and drop it where you want it to
appear
6. Once you finish placing controls, click save icon
7. Enter the name of the report
8. To view the report, click he print preview button. The design will look like the one below
Page 31 of 68
Page header: Contains headings or labels for data items to be displayed in every column
Detail section: Hold bound controls that display data items for a table or query it was
created from
Page footer: Hold a control that will be displayed on every page such as page number
and date, for example =Now(), displays current date and time
Report footer: Used to display summery information from a report such as totals
Modifying report design
- To modify the report, open the report in design View and make necessary changes then
save it.
Sorting and grouping
- Sorting arranges records in ascending or descending order based on specified field while
grouping keeps records together based on one or more fields in the table.
- When using the report wizard, you have the opportunity to group add grouping levels. For
example, if you select to group records using Student ID, all the records of a particular
students are grouped together on the report
To group and sort records, proceed as follows:
1. Open the report in design View
2. Click design tab then click Group and Sort
3. Click the field by which to group or sort. You can click the More button to add other
grouping and sorting options
4. Click the Close button to view the report
Printing reports
- You can print the report by:
1. Open the database
2. Select the report
3. Click File then Print
4. Set the print option
5. Click the Print option
GENERATING LABELS
- A label is a tag placed ion an item for easy identification.
- Examples of labels include: tags, mailing labels, bottle stickers.
- To generate labels using report wizard, proceed as follows
1. Open the database
2. Click Create tab then Label button in the Report group
Page 32 of 68
3. From the dialog boxes, specify the label size, font, fields to be included in the label, whether
to sort the label, the name of the label the click Finish
Modifying the label
-You can modify the label by manipulating the layout controls. You can do all these by
opening the label in a Design View
Database security
-Microsoft Access provides the user with data security features such as
1. Encryption
2. Password protection
3. Hiding database object
4. Providing user-level security
-A password protected database displays a dialog box that requests the password for opening.
1. Open the database in exclusive mode
2. On the Database Tools tab, point to Encrypt with password
3. On the Set Database Password dialog box that appears, type the password
4. Re-enter the password in the verify text box then click OK
To open the database in exclusive mode, proceed as follows:
1. Open Ms. Access and click Open Other File and then click Browse
2. Select the database file
Page 33 of 68
3. Click Open arrow then select Open Exclusive
4. Click File tab then click Encrypt with Password
5. Type the password then click OK
Page 34 of 68
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
4. Storage Area Network (SAN)
5. Personal Area Network (PAN)
Local Area Network
- This is a computer network that span a relatively small geographical area like in one bulding
or a school.
- It is usually owned by one organization. However, two LAN can be connected via data
transmission lines or electromagnetic waves.
- Most Local area network connect PC and server computer on a small network. A server is a
computer dedicated to servicing requests for resources from other computers on a network.
- LAN enable many users to share devices like laser printers as well as data. They also allow
users to communicate by sending messages or engaging in chart sessions.
- LAN transmit data at a very faster rate
Metropolitan Area Network (MAN)
- This network covers a metropolitan area like a town or city.
- It covers a radius of 5 to 50km
- Metropolitan network may be owned by a single company that has offices across a
metropolitan area or a service provider who provide network services to a subscriber in
the area.
- Metropolitan network is made up of many local area network in a metropolitan area
Wide Area Network
- This network is larger than metropolitan area network and covers large geographical; area
such as a country, a continent or the whole world.
- When it covers the whole world such as internet, it is called Global Area Network
- It consists of many local area network and metropolitan area network
Storage Area Network (SAN)
- This is a type of network where all data is stored in one powerful computer and be
accessed by users using their PCs, mobile phones, smartphones, tablet, laptops etc
- This powerful computer has powerful processor and huge memory and data storage
capacity. This forms what is called cloud computing.
- In cloud computing, processing power, data and programs can be located somewhere on a
network of powerful computer and simply accessed by users
- An example of SAN is Data center
Personal Area Network (PAN)
Page 35 of 68
- This is a type of network setup at home which allows users to share data using personal
devices like phones, laptops, tablets etc which has technology that enable them to
interconnect such as Bluetooth technology.
- This network is also called Home Area Network (HAN)
NETWORK TOPOLOGIES
- The term network topology refers to the way in which computers and other devices have
been arranged or how data is passed from one computer to another in a network.
- Therefore, a network topology can be viewed in two ways
1. Logical topology
2. Physical topology
Logical topology
-Logical topology also called signal topology refers to the way data passes from one device to
another on a network.
-Two types of logical topology are:
1. Ethernet
2. Token ring
Ethernet topology
- In Ethernet topology, all computers listen to the network media and can only send data when
no other computer is sending.
- Sending of the data is through broadcasting technology i.e. placing the data on a common
bus and all computers connected to the bus can ‘see’ it. However, the data has the address of
the recipient and only this computer picks the message from the bus.
Token ring topology
- In token ring topology, a special package for data called a token goes around the network I
a unidirectional manner.
- The token van only be taken up by the computer whose address is on the data held in the
token. After taking it, the computer reads the data and ten release the token. The token
then be captured by another computer which needs to transmit data.
Physical topology
- Physical topology refers to the physical layout or arrangements of computers on the
network.
- Examples of physical topology include:
1. Start topology
2. Bus topology
3. Ring topology
4. Mesh topology
Page 36 of 68
5. Tree/hierarchical topology
Star topology
- In star topology, all devices are connected to a central hub. Nodes communicate across the
network by passing data through the hub.
- When the hub receives the data from a transmitting computer, it broadcast the message to
all other nodes on the network.
Page 37 of 68
A terminator is attached at each end of the cable to avoid signals from bouncing back
and forth on the cable causing signal distortion.
As the data passes through the cable, each workstation checks whether the data is
addressed to it. If the address matches the machine address, it receives the data otherwise
it rejects it.
A network address of a computer on a local area network is called the Medium Access
Control (MAC) address.
Advantages of bus topology
1. Easy to install
2. It is less costly. Does not require complete cable per computer
Disadvantages of bus topology
1. A cable break in any section brings down the whole network
2. Troubleshooting a cable fault is difficult because the fault could be anywhere on the cable
3. The bus topology limits the number of computers that can be connected to the cable
because each computer is listening to the cable in order to transmit. This means that
increase in number of computers result in an increase collision as machine compete for
transmission.
Ring topology
- In a ring topology, all devices are connected to one another in a shape of a closed loop.
- Each station is responsible for regenerating and retransmitting signals around the network
to its neighbour.
- A token is used to exchange data from one station to another.
Page 38 of 68
3. One device or media breakdown may affect the entire network. However, this is not the
case with IBM token ring where a device called multistation Access Unit (MSAU) is used
in the event a station fails.
Mesh topology
- This is the most common type of topology used in wide area network where there are
many paths between different location.
- Devices are connected with many redundant interconnections between the node
- Every node has a connection to very other node in the network
Network software
- Network software is the software that helps to efficiently utilize network resources.
- Network software is classified into two categories:
1. Network operating system
Page 39 of 68
2. Network protocols
Network operating system
- These are operating systems specifically designed to optimize networked computers ability to
respond to service requests.
- Servers run on network operating system.
- In additional to normal operating system, network operating system performs the following
related functions:
1. Provide access to network resources e.g. printers and folders
2. Enable nodes on the network to communicate with each other more efficiently
3. Support interprocess communications i.e. enable the various processes on the network to
communicate with each other
4. Respond to requests form application programs running on the network
5. Supporting network services like network card drivers and protocols
6. Implementing network security features
NB: Internetworking devices such as routers have their own operating system and hence can be
managed and configured for optimum performance
Network protocols
- Protocols are set of rules and procedures that govern communication between two different
devices or people.
- Therefore, network protocol refers to the rules and technical procedures that govern
communication between different computers.
- The data transmission process over the network has to be broken down into discrete
systematic steps. At each step, a certain action takes place. Each step has its own rules and
procedures as defined by the network protocols.
- The work of these protocols must be coordinated so that there are no conflicts or incomplete
operations. This co-ordination is achieved through protocol layering.
- In a world that is full of innovation from different people, it is difficult to dictate uniformity
on how protocols are developed.
- To avoid protocols that conflict, a reference model for all developers was developed to give
guidance to all developers worldwide.
- Two reference models were developed
1. Open System Interconnection (OSI) reference model
2. TCP/IP reference model
Page 40 of 68
LAYER FUNCTION
7 Application layer User application runs here and generate request for data
transmission or open received information
6 Presentation layer Format data for transmission e.g. ASCII, .tif etc
Encrypt or decrypt data
5 Session layer Set up transmission session between communicating devices
for synchronized data exchange
4 Transport layer Manage data transfer over a network to ensure reliability
3 Network layer Address information is added to the packet and internetwork
routing to destination
2 Data link layer Packs data into frames, add error checking information, sends
to physical network. All this is called Data Link control
(DLC)
1 Physical layer Data encoding, attach to physical medium, transmit bits in
voltage level format
Page 41 of 68
OSI LEVEL OF OPERATION
7 Gateway
6
5 Internetworking devices
4
3 Router
2 Switch, Bridge, NIC card
Networking devices
1 Repeater, Hub
Page 43 of 68
Microsoft for its Windows NT platform and renamed NetBIOS Extended User Interface
(NetBEUI)
Network protocols provide routing service. They handle addressing and routing
information, error checking and retransmission of requests. Some of examples of network
layer protocols are:
7. IP: Internet protocol does packet forwarding and routing using he addressing system
on the internetworks known as IP addresses. Each network on the internet has a unique IP
addresses.
8. OSPF: The Open Shortest Path First protocol helps in efficient routing of data on
internetwork i.e. it analyses all the next available routes or hops and chooses the one with
the least cost to transfer the packet.
THE TCP/IP PROTOCOL MODEL
- The model was developed in 1978 long before OSI reference model
- It was developed to enable internetworking on the internet
- It combines the Transport Control Protocol (TCP) and Internet protocol (IP)into one.
- Its layered structure is similar to OSI only that it has four layers instead of seven.
- TCP/IP has the following structure:
1. The application layer
2. The transport layer
3. The internet layer
4. The network interface layer
- Note that TCP/IP does not have presentation, session and data link layers like OSI model
- The function of the missing OSI layers have been amalgamated in the four layers of TCP/IP
ISO OSI TCP/IP TCP/IP protocols
Application
TELNET
Presentation layer Application layer
SMTP
FTP
Session layer
Transport layer Transport layer TCP UDP
Network layer Internet layer IP IDMP etc.
Data link layer Network interface layer Ethernet, Token Ring etc.
Physical layer
Page 44 of 68
2. The session layer, presentation layer and data link layers present in OSI are missing in
TCP/IP although they are amalgamated in the four somehow
Page 45 of 68
b. Digital leased lines: Since the line is digital, no need for a modem but just a codec to
control how bits are sent/received by the computer. The connection is always up, no
need to dial up for connection.
Page 46 of 68
- Figure below shows some examples of wireless modems that can be used on computers to
access the internet. A SIM card is installed in the devices.
Page 47 of 68
Wi-Fi
- Wi-Fi on the other hand is a wireless radio technology that is used to provide access to
the internet for computers and mobile devices like smartphones and tablets that have
internal wireless modem
- The access is usually via the wireless access point which create a radius of access called
Wi-Fi hotspot that covers a small radius like a bus, hall, airport etc.
- Wi-Fi that have Wi-Fi activated automatically detect and connect to Wi-Fi hotspot
hence to the internet whenever they are within range.
- Figure below depict Wi-Fi hotspot
Page 48 of 68
- This is the most common IP addressing system because it was the first to be created and
adopted widely.
- Each address is made up of 32 bits. Period (.) separate the bits into groups of 8.
- Each group of 8 bits can be converted to its decimal equivalent to create a dotted notation
that is easy to read.
- The internet address has two level structure
1. The network number or prefix: which is the first part of the address and is unique
worldwide
2. The host number on the local network
There is also a broadcast address within the address which is used send data to all host in the
network.
- Figure below shows the structure of the IP address
Page 49 of 68
- These first three classes are called primary classes and are the ones in commercial use all
over.
- Class D has its first four bits set as 1110 and is reserved for IP multicasting
- Class E has the first 5 bits set as 11111 and is reserved for research purpose
Interpreting IP numbers
- The lowest IP address therefor, is
- Binary notation 00000000.00000000.00000000.00000000
- Decimal notation 0 . 0 . 0 . 0
And therefore the highest would be
Binary notation 11111111.1111111.11111111.11111111
Decimal notation 255 . 255 . 255 . 255
i.e. between 00000000 and 11111111 there are 256 numbers or 2 n =28 = 256. We wrote 255 in
the decimal notation because we are counting from 0 i.e. when you count from 0, it becomes
2n -1 =255.
The all zeros and ones host addresses are reserved and never given out
- Number of networks and number of hosts per class can be calculated using this formula
Number of network = 2network bits
Number of hosts = 2hosts bits – 2
- As said earlier on, when calculating hosts IP addresses, 2 IP addresses are decreased
because they cannot be assigned to hosts i.e. the first IP of a network is a network number
and the last IP is reserved for Broadcast
Page 50 of 68
-For example
192.168.1.0 is a network address
192.168.1.255 is broadcast address
192.168.1.2 – 254 are host addresses
Class A addresses are assigned to networks with very large number of host. The first bit
of the first octet is set to 0 and therefore, the first octet ranges from 1-127 i.e
00000000 – 01111111
1 - 127
So the class A IP addresses starts from 1.x.x.x to 126.x.x.x, the default subnet mask is
127.x.x.x
Class C addresses are assigned for small networks. The first bit of the first octet is set to
110 i.e:
11000000 – 11011111
192 – 223
Therefore, the IP addresses for class C range from 192.0.0.x to 223.255.255.x. the default
subnet mask is 255.255.255.x
Therefore
Class A has number of networks = 28bits = 256
Number of Hosts = 224 bits -2=
Page 51 of 68
Summary of IP in Decimal Notation
CLASS FIRST OCTET
Class A 0 to 127
Class B 128 to 191
Class C 192 to 223
Class D 224 to 239
Class E 240 to 255
For example,
128.8.74.1 is a class B
10.10.191.1 is class A
202.3.2.56 is a class C
Excise
Name the class of each of the following IP addresses:
a. 227.12.14.0
b. 193.15.45.22
c. 17.13.130.7
d. 253.5.15.111
e. 132.11.78.56
IP version 6 (IPv6)
- This is the new generation internet addressing system architecture designed to succeed
IPv4.
- It uses 128 bits addresses, so has very big space of 2128
- The IPv6 address consists of 8 groups of hexadecimal digits ranging from 0-F separated
by a colon for example:
2002:2c0:2001:2:213:123:249:22
- Only leading zeros are omitted, trailing ones are not. The above address is actually
2002:02c0:2001:0002:0213:0123:0249:0022
IPv6 address has the following characteristics
1. It uses 16 bit hexadecimal numbers
2. Numbers are separated by full colons (:)
3. Abbreviations are possible e.g. leading zeros in contiguous blocks are separated by
double colons(::) e.g.
2002:2c0:0000:0000:2:3c:3b:33 is equivalent to
2002:2c0::2:3c:3b:33
Specifying the network and host number
Page 53 of 68
- We use CIDR prefix representation i.e. a slash followed by the length of the network
number written after the IPv6 umber e.g.
2002:db6:12::/48 means the first 48 bits are for network number and therefore 80
bits are for host number. The last two colons (::) here indicates that all remaining
numbers are zeroes.
Comparison between IPv4 and IPv6
1. IPv6 address consists of 128 bits while IPv4 has 32 bits
2. We use decimal notation to write IPv4 addresses and IPv6 uses hexadecimal numbers
3. IPv6 separates the hexadecimals using colons (:) while IPv4 separates the decimals using
dots(.)
4. IPv6 was designed with modern internet and gargets technology in mind hence it is more
flexible and extensible i.e. it caters for wired and wireless
5. IPv6 has a lot more usable space than IPv4
IP configuration on Networks
- After the computer has been connected to the internet using transmission media, it still
needs to be configured in order for it to be able to communicate with other computers on
the local area network and access internet
- On windows 7 computer, this is done on Network Sharing Center
- Follow the procedure below:
1. Open Control Panel
2. Click Network and Sharing Center (NSC) link
3. In the NSC dialog box, you see all the available connections for which you can configure
their IP
4. On the left pane, click the Change Adapter settings link to view all available network
connection whether active or not
5. Right-click the one you wish to configure then select properties command
6. In the dialog box that appear, click on Internet protocol version 4 (TCP/IPv4) and then
click Properties button then click Use the following IP address option
7. Enter the IP address and the one for default Gateway
Page 54 of 68
The term web is a set of related hypertext documents on the web that contain information
such as images and videos.
WEB BROWSER
To view and navigate webpages and other information on the World Wide Web, a special
software known as a browser is used.
With a browser, one can view information on the internet which contains text, images,
videos and navigate between other documents using hyperlinks.
Examples of browsers are: Apple Safari, Google Chrome, Internet Explorer, Monzilla
Firefox, Opera etc.
The main purpose of a web browser is to connect to web servers, request web pages, and
then properly format and display the documents.
Each web document file is written in a language called Hypertext Markup Language
(HTPM) that include text, description of the page structure, and links to other pages,
images or media.
Figure below shows a sample of a web browser known as Monzilla Firefox
Hypertext document
The term hypertext document refers to a web page that has links to the same or other
pages on the web.
By clicking on a link, a user is taken by the browser from the current page to other page
Hypertext is structured in a way that it allows you to navigate from one page to another
instead of reading in a linear way like a book.
Page 55 of 68
To organize hypertext document for easy access, the webpage has a unique address called
Uniform Resource Locator (URL)
For example, when you visit the site such as Google, you type URL written as
http://www.google.co.
A URL consist of three parts namely
1. Protocol: which indicate how to get information such as http
2. The internet hostname of the computer where the content is stored such as google.com
3. The directory or other locations on that site where the content is located that follows the
forward slash
SEARCH ENGINES
A search engine is a special site on the web that help users easily find information stored
on other websites.
Examples of search engines are:
Google (www.google.com )
Yahoo (http://search.yahoo.com )
Lycos (http://www.lycos.com )
Bing (www.bing.com )
Alta vista
Excite
Figure below shows an example of a search engine called Google
Page 56 of 68
How search engine works?
Search engine normally consists of three components namely
1. Web robot or crawler
2. Indexing database (engine)
3. Query engine
The three components operate as follows:
1. Before the user invoke a search engine, a program called spider searches for new items on
the web to add to the search engine index database as shown in figure below. This
gathering of information before user’s request make search faster.
2. The search engine indexing database receives everything the spider brings to it. It scans
the document for keywords and generate the indexes and then store them in an index
database.
3. Once the user submits the search string (a word or phrase), the query engine receives the
indexing database and process the request as follows
Looks the keywords specified in the user queries form the index database
Retrieves associated documents and rank them according to some preferences or
criteria such as the most visited pages
4. The result and time taken to search for the request are displayed on the browser. If the
result did not match required information, the user can refine the search words.
In summary, you need to know the meaning of the following terms and how they apply to web
design
Website: a collection of more webpages linked together in a meaningful way that, as a
whole, describes a body of information
Search engine: Special type of website that help users easily search information from
other websites.
Page 57 of 68
Web server: A computer on internet or intranet that delivers web pages and other files in
response to browser requests.
Web page: Like in a book, a web page is a single document on a website containing text
and any other items that are displayed within that page.
Home page: The first page also known as index for a website that is loaded form which
you can navigate to other pages on the same or another websites
INTERNET SERVICES
- Internet has become very popular nowadays because of the very important services that it
offers to people.
- Users become addicted whenever they start using internet. Internet offers the following
services:
1. World Wide Web
- This is a vast virtual space on the internet where information is made available. This
information is made available on
A website: Is a group of related web pages or other resources located on the web
server. The first page on a website is called a home page
Web portals: provide specialized services such as searching, e-mail, sports
updates, financial, news and links to select website
Blog: Website that contains personal information which can be easily updated. It
may be used for business, advocacy and complain
Multimedia: Sites that are meant for entertainment. It contains photos, movies,
music, web TV and internet radio.
2. Electronic mail and fax
- An electronic mail simply refers to e-mail is a message transmitted electronically on the
internet.
- What you need to send and receive e-mail is to open an e-mail account
- Other than sending e-mail, you can also use your computer to send fax messages in place
of using ordinary fax machine.
3. Instant messaging.
- This is a messaging service that allows two or more people to communicate directly.
- To get the service, you need to first register with an instant messenger such as WhatsApp,
Google+, Facebook, Yahoo Messenger, Twitter etc
4. Electronic commerce (e-commerce)
- This is buying and selling of goods and services on the internet.
- Companies or individuals develop websites to auction their goods and services
- The advantages of this is that
o It reduces operation cost (i.e. travel expenses to meet customers or customers to
meet sellers)
o It also increases sales because you reach many customers worldwide
- However, the disadvantage is that
o People deal with each other without ever meeting
o Again there is lack of proper laws to govern the business
Page 58 of 68
5. Electronic learning (E-learning)
- In e-learning, teaching and learning as well as learning materials and lecturers are made
available over the internet.
6. Newsgroups
- These are organized groups of internet users who wish to share ideas and interests. Once
you join the newsgroup, you can participate in the discussion forums and debates.
Protocol: this is the rule that define how to access the content used to connect to the site
or resource. Two common examples are:
1. Hypertext Transfer Protocol (http://): That define standard for accessing website
2. File Transfer Protocol (ftp://): Is used for uploading content to the webserver.
Domain name: This is the name of the server where the website or resource is located.
For example www.malawi is a domain name or website name located in www directory
Top level domain: This represent the type of service offered by the organization. For
example, .gov.mw means that a government located in Malawi. The following highlights
other commonly used top level domains:
Top level Type
.edu Education institution
.org Non-profit making organization
.mil Military organization
.com Commercial institution
.net An organization providing network services
.ac An academic institution
- The top level domain may also have two letters extension added after the business domain
part to indicate the country in which the business or the site is located e.g.
[email protected]. This part mw stands for Malawi
- Other domain name could be
sa (South Africa)
ke (Kenys)
uk (United Kingdom)
Page 59 of 68
us (United States)
ug (Uganda)
tz (Tanzania)
jp (Japan)
au (Australia)
Hyperlinks
- hyperlinks or links are used to navigate from one page to another. To navigate from
current page to another, proceed as follows:
1. move the mouse pointer to the hyperlink until it turns to pointing finger
2. click the hyperlink once. The browser will take you to the specified page
Navigation toolbars
- The navigation toolbar consists of buttons you can easily navigate the web in Monzilla
Firefox. These include Back, Forward, refresh, home, search and stop
- Figure below shows navigation toolbar
The list below highlights the function of each button on the navigation toolbar
1. Back button: Takes the user to the previous visited web page
2. Forward button: Takes the user to visited pages after the current incase the user clicked
the back button
3. Stop button: Is used to stop loading the current web page
4. Refresh button: This is used to reload or refresh a web page
5. Search box: Where the search word is typed
6. Bookmarks: Used to bookmark the page to be revisited later
7. History: This icon is displayed on the list of recently visited web pages
8. Download: This icon is used to download the current web page
9. Home icon: The icon takes the user to the home page of the website
10. Menu icon: Clicking on this displays the main menu
Page 60 of 68
3. Use the suggested name or type a new name in the box.
Page 61 of 68
4. Sometimes you are provided with what is called CAPTCHA which ask you to enter letters
written on it in order to prove that you are not a robot
5. Choose location and click “I agree to the terms of service”
6. In the page that appears, you may create a public profile
7. Click Continue to Gmail to proceed to your Gmail account inbox and other folders
8. Once in Gmail, you can set other option like adding photos etc.
Page 62 of 68
Creating a new e-mail message
- The standard format of an e-mail message comprises of three basic parts namely header
information, message body and signature
- Figure below shows a sample of gmail account
Page 63 of 68
3. Click Open button to attach the selected files. The attached file will appear at the bottom
of the composed e-mail as shown below:
Managing contacts
- To avoid typing errors when entering e-mail addresses, add the contacts in the address
book. To do this, proceed as follows
1. Switch to inbox and point to e-mail address you would like to add contact. A pop up
appears such as the one below:
2. Click Add to contacts link
3. To change the contact, click the link immediately displayed to view contact details
SOCIAL NETWORKING
- There are two terms used in reference to social networking. These are:
1. Social media
2. Social networks
- Social media refers to content that you upload onto social network sites. The media
content may be in form of text, videos, photos or slideshows that people can respond and
comment on.
- On the other hand, Social networks are web-based sites that allow individuals to create a
public profile to share information with people they share interest, activities etc. some
examples of social networks are Facebook, Twitter, Linkedln, WhatsApp, Flicker,
Google+, Myspace and Mxit. It has the icons below
Page 64 of 68
- Therefore, social networking refers to creating social relationships to interact with other
people on social networks by uploading media contents
- To interact with people, you upload pictures, texts photos and videos. Some social
networks allow users to create groups to share common interests or affiliations, stream
live videos and setup geosocial forums. Social networking has transformed the globe into
social village
Page 65 of 68
3. Cyberbullying and crimes against children: Use of social networks can expose
individuals particularly children to harassment or inappropriate content. Unless parents
should filter the content otherwise, children may be exposed pornography.
4. Digital divide: Social networking magnifies the gap between people who have access to
computer technology and those that don’t have access.
5. Security and privacy: Social networking can compromise privacy in a big way. Innocent
people may upload their photos, videos etc. on social media and criminals may use this
information for malicious reasons such as fraud, identity theft, terrorism and
embarrassing
6. Social networking can be used to establish government and to advance terrorism: This
has been witnessed in the recent Arab countries such as Egypt, Libya and Tunisia
7. Corrupted language: This is the use on non-standard or un grammatical language which
makes people addicted and adopt that language to be used in day-to-day talk thereby
limiting standard language development.
Page 66 of 68
b. Intranet: A privately owned internet administered by an organization to provide secure
access to the organization services. An example is bank intranet that provide real time
access to banking services anywhere any time using computers and mobile phones
2. Distributed operating system: This is a special type of operating system that controls,
integrates and homogenizes use of heterogamous hardware and software resources in a
distributed system. Some examples are Mach, Chorus, UNIX
3. Distributed application: This is an application that is distributed across several servers in a
distributed system. The main responsibility of a distributed server running on a distributed
operating system is to coordinate and provide efficient access to information and services. Some
common examples of distributed applications include:
1) Online flight-reservation: Most airlines provide online web-based or mobile applications
for real-time booking and payment of flight
2) Distributed cash dispensing machines: To enhance access to withdrawal and deposit
transactions, most banks distribute processes to multiple servers across their continents.
3) Video conferencing applications: Some video conferencing applications are distributed to
provide quality of services in sound and video transmission even across continents
4) The world wide web: described earlier on
Page 67 of 68
- As opposed to centralized system, distributed applications offers the following benefits
1. Reliability: Due to load balancing distribution of record copied to multiple servers across
to the user, distributed applications provide increased availability and shorter response
time.
2. Incremental growth: In distributed systems and applications, scaling up the system only
requires extension rather that’s replacing computing devices.
3. Shared utilization of resources: Distributed applications enhances data sharing
4. Communication: Distributed applications such as social networks e.g. Facebook and e-
mail applications facilitates efficient interactions spread all over the globe.
Disadvantages of distributed systems
1. Network performance: In places of poor connectivity, delay may occur between operations
such as cash withdrawal in an ATM causing frustration or failure of transactions
2. Poor implementations of distributed applications expose users to more security risks due
to multiple access points for intruders and possible communication with insecure systems
3. Software complexity: distributed system are complex to take them run on different
platform making it difficult and time consuming to troubleshoot such systems in case of
failure.
Page 68 of 68