Hexco Complete Notes
Hexco Complete Notes
TABLE OF CONTENTS
TOPIC PAGE
INTRODUCTION TO COMPUTERS 48
INPUT DEVICES 48
OUTPUT DEVICES 53
STORAGE DEVICES 58
INTERNET 61
EMAIL 69
SOCIAL NETWORKS 72
COMPUTER VIRUS 74
BACKING STORAGE 77
Word processor
Is a specialist computer or package dedicated and used for only one task of word
processing.
MS Word 2016
Word Perfect 5.1(and 6.0)
WordStar
AmiPro
WordCraft
Multimate
Displaywrite
Document
Is anything that can be typed e.g. letter, memo, report etc
Formatting
Is adding or applying style to documents to improve appearance such as emboldening,
italicizing, underlining, text alignment text rotation and changing font size, type and
colour.
Editing
Is manipulation of documents such as making corrections, deletions, additions or
insertions of text to existing documents.
Title bar
A bar on which the file name of the document appears after saving
Menu bar
A bar that offers options such as ‘File Edit View Insert Format Tools Table Window Help’
Tool bar
B I U
A bar that contains various icons e.g.
Window
An area on which text can be typed and viewed
(a) Ability to edit documents on screen without retyping the whole document
(b) Ability to automatically check and correct spellings and grammar using the spell
and grammar checker
(c) Ability to format documents i.e. applying style to improve document appearance
(d) Ability to save, electronically file and retrieve documents
(e) Ability to print many copies from one document
(f) Ability to insert tables, diagrams and pictures
(a) Page break - a forced end of page which is done by pressing Control and Enter
keys simultaneously
(b) Hard return – is when the cursor(aka blinking underscore) is moved to the next
line before reaching the right margin after pressing Enter key
(c) Soft return – is when the cursor(aka blinking underscore) moves to the next line
automatically after reaching the right margin without pressing Enter key
(d) Widow - part of a sentence left at the bottom of a page if the sentence goes on to
the next page
(e) Orphan - part of a sentence that goes to the next page if the sentence cannot fit
at the end of the previous page
(f) Header – words that are inserted or typed to automatically appear at the top of
every page of a given document
(g) Footer - words that are inserted or typed to automatically appear at the bottom
of every page of a given document
(h) Footnote – text printed to offer an explanation at the end of a page to a word that
appears on that particular page(e.g. in Shakespearan plays)
(i) Endnote - text printed to offer an explanation at the end of a document for words
that have been appearing throughout the document e.g. in some Bibles
(j) Subscript – characters printed slightly below the normal print line e.g. in H 20,
the digit 2 is the subscript
(k) Superscript – characters printed slightly above the normal print line e.g. x 2, the
squared(2) is the superscript.
(l) Type face – is the font type i.e. style of font such as Times New Roman, Bookman
Old Style etc
(m) Tab – is short for tabulator stop i.e. one stop jump along the ruler that moves the
cursor by using the tab key
(n) Indentation – is starting the paragraph one or more tab stops inside the default
left margin setting by using the tab key.
(o) Margins – are settings that define the window on which one types text by marking
the top, bottom, left and right margins.
Open a document
1. Click file
2. Click open
3. Select folder which contain the file
4. Select the file you want
5. Click open
Printing a document
1. Click file
2. Click print
3. Select the printer
4. Select pages to be printed
5. Type number of copies
6. Click print
1. Click file
2. Click Info
3. Click protect a document
4. Click encrypt with a password
5. Type your password
6. Click ok
7. Retype your password to to verify
8. Click ok
Close a document
1. Click file
2. Click close
Bolding text
1. Select text
2. Click Home
3. Click B
Underling text
1. Select text
2. Click Home
3. Click U
Change Case
1. Select text
2. Click home
3. Click Change case tab
4. Click UPPERCSE or lowercase
1 ½ line spacing
1. Select text you want to space
2. Click home
3. Click line spacing tab
4. Click 1.5
Center text
1. Select text
2. Click home
3. Click text alignment tab
4. Click center
Justify text
1. Select text
2. Click home
3. Click text alignment tab
4. Click justify
Creating a table
1. Click insert
2. Click table
3. Click insert table
4. Type number of rows
5. Type number of columns
6. Click ok
3. Click layout
4. Click eraser
5. Click lines you want to erase
Inserting Header
1. Click insert
2. Click Header
3. Select the position which you want your header to appear
4. Type your Header
5. Click in your document
Inserting Footer
1. Click insert
2. Click footer
3. Select the position which you want your footer to appear
4. Type your footer
5. Click in your document
Inserting Equation
1. Put the cursor where you want the equation to appear
2. Click Insert
3. Click Equation
−𝑏±√𝑏2 −4𝑎𝑐
4. Select the type of equation you want to insert e.g 𝑥= 2𝑎
5. Edit it if you want to change values
Inserting a symbol
Inserting Shapes
Setting margins
1. Click Layout
2. Click margins
3. Click the margins you want
Indentation
1. Click Layout
2. Click indentation
3. Specify cm to the right
4. Specify cm to the left
Line Numbering
1. Click layout
2. Click line numbering
3. Select line numbering you want eg continuous or restart each page
Mail Merge
Mathematics
Chemistry
Biology
Physics
For Advanced level Chegato Secondary have been performing very well. For the past three years
overall performance of different departments is summarised by the table below
DEPARTMENTAL PERFORMANCE
Department 2016 2017 performance 2018 performance
performance
Sciences 87% 89% 95%
Commercials 86% 88% 93%
Arts 80% 87% 91%
Social Sciences 79% 85% 90%
Effect the following changes to the document created in 1(a) and save it Testb and print it
(i) Underline the heading, change heading font size to 22, center the heading [6]
(ii) Apply bullets of your choice to subjects listed under paragraph 3 [2]
(iii) Divide the first praragraph into 3 columns with lines inbetween [2]
(iv) Apply 1.15 line spacing to the whole document [2]
(v) Put a text water mark called Information Technology the document [2]
(vi) Put a footer called Test to this document [2]
(vii) Apply word Art to the heading above the table [2]
(viii) Insert a picture with relevance to education below the heading [2]
(ix) Find the word secondary in the document and replace it with High [2]
(x) Copy the second paragraph and paste it at the end of the document [2]
(xi) Apply page borders of you choice [1]
In a bus network, all the devices share a single communication cable. This is a typical topology
for a LAN. Information is transmitted in either direction between any computers on the network.
This means that when two computers want to use the line at the same time, there has to be some
method of deciding who gets the line first. For example, before a station begins to transmit, it
checks that the channel is not busy, if it is it has to wait before transmission can begin. Once it
begins transmission, it listens for other nodes also beginning transmission. If the transmitted
messages collide, both stations abort and wait a random period of time before trying again. This
technique is known as Carrier Sense Multiple Access With Collision Detection (CSMA-CD).
(Mesh.)6
A full mesh topology occurs when every node on the network has a separate wire connecting it to
every other node on the network. It provides each device with a point-to-point connection to every
other device in the network. A full mesh topology is redundant because if any one node of
connection fails, all remaining nodes can continue
2. Change the line spacing for the whole document to double line spacing. [1]
3. Apply art page borders around the document [1]
4. Apply your forename(s) as a footer and surname as the header on this document. [2]
5. Change the font size of headings to 20 and font style to Lucida Handwriting. [2]
6. Italicise the second paragraph [1]
7. Copy the title of the document and paste it below the document [2]
8. Insert a picture of a computer at the bottom right of the document. [2]
9. Drop cap the first character of every paragraph to 2 lines [2]
10. Apply a water mark “ networks” to your document [2]
DTP(Desktop Publishing)
Use of graphics, charting and page make-up software with high quality output in
typesetting, design and producing documents in style e.g. magazines, newspapers,
manuals, posters, brochures and pamphlets.
Application of DTP
Advertising agents in producing various adverts
Printing and publishing houses for producing magazines and pamphlets
Press co-corporations for publishing newspapers e.g. at Zimpapers
Other private companies or users for producing posters, in-house magazines,
notices etc
DTP Package
Is a graphics, charting and page make-up program with high quality output for
producing documents in style e.g. magazines, newspapers, manuals, posters and
pamphlets.
Text
Can either be imported from a word processing package or typed using the DTP package.
Text style can be improved by rotating, enlarging, changing colour etc
Pictures(graphics)
Can be inserted in a DTP package by either:
Importing from ClipArt gallery(library of various pictures)
Scanning using a scanner
Uploading from a digital camera
Borders around graphics can be inserted and can graphics can also be zoomed, rotated,
changed colour etc.
Columns
Allows division of paragraph on the page to facilitate continuation of text from the
bottom of one column to the top of the next column
Page view
A facility for preview document before printing by viewing scaled down, zoomed or
specified parts of a document
Opening a Publication
1. Click file
2. Click Open
3. Select the folder which contain your file
4. Select you filer
5. Click open
Creating a Calendar
1. Click file
2. Click New
3. Click Calendars
4. Select the format of calendar you want
5. Select colour scheme
6. Select fond scheme
7. Select layout
8. Select Time frame
9. Set Calendar dates
10. Include schedule of events
11. Click create
Creating flyers
1. Click file
2. Click New
3. Click Flyers
4. Click format of Flyers you want
5. Select font scheme
6. Select colour scheme
7. Select business information
8. Include mailing address
9. Include graphic
10. Select type of tear off you want
11. Click create
Creating an email
1. Click file
2. Click New
3. Click Email
4. Click format of Email you want
5. Select font scheme
6. Select colour scheme
7. Select business information
8. Click create
Creating an Advertisement
1. Click file
2. Click New
3. Click Advertisements
4. Click format of the advertisement you want
5. Select font scheme
6. Select colour scheme
7. Select business information
8. Select page size
9. Click include logo
10. Click create
Creating a Catalogue
1. Click file
2. Click New
3. Click Catalogue
4. Click format of catalogue you want
5. Select font scheme
6. Select colour scheme
7. Select business information
8. Include customer address
9. Click create
Microsoft Publisher exercise 1
Your elder sister just got married and you are tasked to design a wedding bell invitation card for
her wedding. [10]
Your local church is hosting a crusade. As a computer specialist, you are tasked to design a flyer
to be used to advertise the event. The flyer must include the following information: [10]
a. Hosting church
b. Hosting Pastor
c. Guest Speaker
d. Venue
e. Time
f. Date
1. a) Create a varsity design calendar showing one month of your choice [7]
b) Set calendar dates to 2017. [1]
c) Highlight holiday dates [1]
c) Print the calendar on A4 landscape [1
Uses of spreadsheet
(a) Financial and cash flow analysis
(b) Creating business plans
(c) Sales forecasting and analysis
(d) Creating business budgets
(e) Preparing financial statements
Cell
Is an intersection of a row and column
Label
Any textual data made of letters of the alphabet only or combination of both letters and
numbers e.g. headings, titles. Labels cannot be manipulated by formulas are are left
aligned by default.
Value
Any numerical entry i.e. data in form of signed digits 0 to 9 inclusive with or without a
decimal point. Values can be manipulated by formulas and are right aligned by default
Excel Formulas
When typing a formula you start with = or =sum or +
∑ auto summation
Examples of Excel formulas
Displaying formulas
Press ALT M H
Hiding formulas
Press ALT M H
Inserting rows
1. Select a row or rows
2. Click home
3. Click insert
4. Click rows
Inserting columns
1. Select column
2. Click home
3. Click insert
4. Click columns
Changing column width
1. Select the column you want to change column width
2. Click home
3. Click format
4. Click column width
5. Type column width you want
6. Click ok
Changing row height
1. Select the column you want to change column width
2. Click home
3. Click format
4. Click row height
5. Type column height you want
6. Click ok
Applying borders to a worksheet
1. Select the worksheet you want to apply borders
2. Click home
3. Click format
4. Click format cells
5. Click border
6. Click outline
7. Click inside
1. Click insert
2. Click header
3. Type your header
4. Click anywhere on the worksheet
Merging cells
1. Select cells you want to merge
2. Click home
5 104 Chatikobo 55 88 43 70 84
6 105 Miedzo 82 59 88 72 63
7 106 Zodzwa 70 50 89 91 70
8 107 Toendepi 95 56 77 97 61
9 108 Rudo 54 78 85 82 78
10 Total
11 Average
12 Lowest
13 Highest
14
(a) Insert a row between Chatikobo and Miedzo so that marks for Rosemary who was
omitted can be included. Student number 1099 English 76, Shona 81, History 89,
Science 60, Maths 45 [4]
(b) Create a formula in H2 to calculate total marks for Gondo [2]
(c) Copy and paste the formula so that totals for other students are calculated [2]
(d) Calculate student average for Gondo in I2 [2]
(e) Enter appropriate formula to calculate subject total for English, Average mark for
English, Lowest mark for English and highest mark for English [8]
(f) Copy and paste the formula so that total , Average mark , Lowest mark and highest mark
for other subjects are calculated [8]
(g) Format all the numbers to one decimal point [2]
(h) Change the spreadsheet layout to landscape orientation [2]
(i) Bold all the data in A1 to I1 [2]
(j) Border the whole worksheet [2]
(k) Change column B width to 16 [2]
(l) Change font type of data in B1 to B9 to Times New Roman [2]
(m) Change font size of column A to 10 [2]
The main objective of the database is to provide up-to-date information in form of reports
for effective control of the business based on facts rather than assumptions. A database
has facility for creating, maintaining and updating records.
Database models
Relational database
Use tables called relations i.e. arrays of rows and columns of data where rows are
records of individual records and fields are fields of [Link] can be accessed much
faster by random requests.
Network database
Use linked lists idea where links between records are established through the use of
pointers i.e. one record can point to several other records which relate to it e.g. student
records can be accessed using the reference number.
Hierarchical database
Has a top-down or branch arrangement. It takes the form of an inverted tree structure
and consists of a main trunk from which branches develop
Is software that is used to organize and control access to a database and provides an
interface between the user and the database.
Character
The smallest unit of data in a database file e.g. a single letter or digit
Field
A column of related data characters in a record e.g. surname, date of birth
Record
A collection of related fields in a database file e.g. details such as student number,
surname, first name, date of birth etc for a single person.
File
A collection of related records e.g. all student details or records make up a student file
Database
A structured and organized collection of related data (files)
Table
Set of related data arranged in rows and columns(NOTE: it is the same thing with file)
Database terms
Queries
A query is a search condition used to select specific records from a given database file
e.g. a query to select all form 3 students from a school database file( Form = 3)
Report
A formatted collection of information organized to provide printed data
on a specific subject.
Select Query
A query that answers a question about one or more tables by
limiting the number of records and fields displayed.
Form
– a structured document with specific areas for viewing or entering data
one record at a time.
Criteria
–the conditions that control which records to display in a query.
Primary key
Unique field used to identify a particular record in a database e.g. student number,
bank account number, credit account number etc. In the above database file, the
primary key would be the student number since each student is assigned a different
and unique identification number.
Secondary key
An alternative field used to identify a particular record but not necessarily unique e.g.
surname. Surname cannot be used as a primary key because of its possible for two or
more people to have the same surname.
Appending
This refers to the addition of new records at the end of an existing database file e.g.
adding new comers to a school database file or adding new customers to a customer
database file.
Amending
This refers to modifying existing records when circumstances change e.g. changing the
address of a student if the family moves to some new home.
Deleting
This refers to removing or erasing ‘dead’ records i.e. records which are no longer
necessary to the database file e.g. records of students who have transferred, students
who have finished school or students who have died.
Inserting
This is similar to appending but differs in the sense that with inserting records, you will
be placing new records between specified records and not necessarily at the end of an
existing database file.
Browsing
This refers to viewing, scanning or simply going through records whilst on the screen.
Displaying
Simply means showing records on the screen without printing them.
Field name
Is a name that identifies a specific field which should give a rough meaning or idea of
the type of data stored e.g. price, surname, student number etc.
Field length
Is the maximum number of character spaces that a field should carry and normally it
should be long enough to accommodate the longest possible entry in that field.
String
Is a list of keyboard characters e.g. ‘I am in Form 4’. May be referred to as
alphanumeric data.
Creating a query
1. Click create
2. Click Query design
3. Select the table or table you want to base your query on
4. Click Add
5. Click close
6. Double click fields one by one to add them to your query design
7. Set your criteria . For example extracting all students whose home town is Harare
Creating a report
A report is created based on a table of a query. To create a report you do the following
1. Click create
2. Click report wizard
Creating a form
To create a form you do the following
1. Click Create
2. Click form wizard
3. Select table or query you want to use to create the form
4. Add fields you want to include in your form
5. Click next
6. Type the name of the form
7. Click finish
c) Create the table using information given below in the database you have created, type all
the records and save the table as Student File and print [5]
Surname First Name StudNumb Sex Date of Amount Units
Birth
Buzuzi Farai 0128474H M 01/01/99 $350 10
Muusha Flavia 0218474G M 01/01/00 $290 4
Mangere Rutendo 0264774F M 01/01/98 $299 5
Mtetwa Natasha 0321857B F 09/08/97 $321 6
Muzomba Lister 0885767B M 01/05/97 $320 6
Manzvera Tapiwa 0509587K M 05/05/01 $397 7
Aphiri Destiney 0645476P M 01/01/01 $309 4
Dube Munyaradzi 0647464P M 01/01/99 $400 9
Kaunda Faith 0837635V F 01/01/01 $290 6
Dzimba Eddie 0890234R M 06/11/96 $366 5
2. Save the Student File as Sorted Student File and sort the Sorted Student File records in
descending order of their Units and print it. [1]
3. Save the Student File as Modified Student File and perform the following on the
ModifiedStudent File table
a) Rename the field Amount to AmountPaid [1]
b) Delete the record of MuushaFlavian [1]
c) Add a record of Mapfumo Isaac, StudentNumber 0300978G, Female, born on
01/06/1999, paid $305 and has 4 units, Print it [1]
4. Using the Sorted Student file, perform the following
a) Create a Columnar Form and name its form header as Sorted Student Form [2]
5. Using the Student File table, perform the following:
a) Create a Select Query that will only display records of students whose Surname start
with M. Name it SurnameM Query [2]
b) Create a Select Query that display records of students who were born after 1998 whose
amount is more than $300.00. Name is DateBornand amount Query [2]
c) Create a Select Query that displays record of students who have more than 5 units or
whose amount is less than $305.00. Name it Units or amount query [2]
a) Create a report, in tabular and landscape form, that will display all records in the
SurnameM Query and name it SurnameM Report [3]
a) Create a report called All RecordsReport that will have all records in the Student File
but excluding the FirstName and Sex fields on it [2]
Title Slide
This is the slide which you describe what the rest of powerpoint is about. On top of this
slide is the title. Bottom box is give credit to the creator of the slide or or is used for
subtitle
Standard Slide
This is the slide which is used for the majority of presentation. It features title bar
on top describing what the slide is about and content box on the bottom
Comparison Slide
This has two boxesside by side that each have individual titles side and content.
This is used when you are comparing two things
Step 1:
Open Microsoft PowerPoint
Step 2:
Go to File at the top of the screen and click New. A box that says “New Presentation” should
appear on the right side of your screen.
Step 3:
In the “New Presentation” dialog box, click on “From Design Template.” You may then scan
through design templates and choose one that you like.
2. Better preparation
When we are creating a PowerPoint presentation, we can have everything ready to go and
organize in a nice fashion. We will have more control over what we are talking about for they are
all in the PowerPoint files. Besides, it will save us a lot of time than to write down the tips on
board using chalks or pens.
4. Less nervous
It is natural that most people are afraid of public speaking and they will get nervous when talking
in front of several people. I still remember that when we were in school, our eyes will track our
teacher while he paced back and forth in the classroom. The PowerPoint can make us less
nervous since people are looking at the presentation on screen not us.
5. Templates for different appearance
By using templates we can create a great PowerPoint presentation fast and easily. There are a
bunch of ready-made PowerPoint templates, like Valentine’s Day template, Easter template,
Educational template, Business template, Wedding template, etc.
8. Multimedia output
We can also convert PowerPoint to video for sharing on YouTube or viewing on portable
devices like iPad 2, iPhone 4S, Galaxy Tab, Nokia Lumia 900 or Blackberry, etc. Besides, with
the help of PowerPoint to DVD burner we can make a DVD slideshow for wedding, school
yearbook, holiday, family gathering, etc. fast and easily.
9. Cross-platform viewing
Microsoft has Windows and Mac OS versions, but due to its great popularity, the PowerPoint
formats have become the standard of presentations and are supported widely. With the help of
Google Docs, anyone with Internet connection can view our PowerPoint presentations online.
Upload PowerPoint files to Google Docs and share PowerPoint on the web with others.
2. In the Choose a SmartArt Graphic dialog box, on the Hierarchy tab, and then select
Picture Organization Chart:
3.2. In the Insert Picture dialog box, choose the picture location, select the picture file, and
then click Insert:
Check how to format pictures in organization chart if you will need to change pictures later.
4. To enter text, do one of the following:
4.1. Select the shape in the SmartArt graphic, and then type your text.
Note: For best results, use this option after you add all the boxes that you want, because
PowerPoint automatically changes sizes and layout.
4.2. Click [Text] in the Text pane, and then type the text:
Note: If the Text pane is not visible, select the SmartArt graphic and open it by:
clicking the Text pane button, under SmartArt tools, on the Design tab, in the Create Graphic
group:
4.3. Copy text from another location or program, click [Text] in the Text pane, and then
paste your text.
1. Imagine you have been asked to make a presentation on buying a house. You will need the
following six slides:
Introduction
Types of housing
Costing
House pictures
[Link] an introductory first slide with the title of the presentation, your name and a suitable
picture. All the other slides should have a title taken from the above list.
3. On slide 2, add a bulleted list of different types of housing, e.g bungalows, flats, semi-
detached or detached houses, with a note about any pros and cons, e.g no stairs, if this type of
property is cheap or not, any gardens to maintain, the view etc.
5. On slide 4, add suitable drawings or pictures to illustrate the topic, and include relevantly
worded text boxes or Wordart objects, e.g tiring, cups of tea, where’s the dogs? New neighbours,
etc.
ercise
Microsoft PowerPoint Exercise 2
You are required to prepare the following presentation to be used to introduce form one
students to Chegato High school computer studies department
Slide I [2 Marks]
Create title slide “WELCOME TO CHEGATO HIGH SCHOOL COMPUTER STUDIES
DEPARTMENT ” Bold it. Insert a picture of a computer
Slide 2 [3 marks]
COMPUTER STUDIES
ENROLLMENT
20
200
300
Slide 3 [3 Marks]
COMPUTER STUDIES DEPARTMENTAL STAFF CHART
Head of Department
Slide 5 [2 Marks]
DEPARTMENTAL STENGTH
Team work
Constant research
Network with other schools
Co-operation and dedication
Slide 6 [1 Marks]
CONCLUSION
I WISH YOU A NICE TIME AS YOU STUDY COMPUTER STUDIES [1]
Additional information
(i) Use design style of your choice for your presentation [2]
INTRODUCTION TO COMPUTERS
WHAT IS A COMPUTER:
A computer is an electronic device which work under the control of a stored program
automatically accepting data, stores data and process it into information. Examples of computers
are desktop computers, laptop computer, minicomputer, mainframe computer and super
computer.
Computer hardware
Computer hardware are all the physical and electronic components of a computer. These
are tangible components. These include the hard disk, motherboard, buses, processor, power
supply, floppy drive, CD rom, random access memory, read only memory, visual display unit,
keyboard, mouse and other hardware components
Computer software
These are all programs which are used by the computer for it to be able to do its function.
Computer software are under two major groups which include systems software and application
software.
Application software
Application software are all programs which are used by a computer to solve problems or to
perform a specific task. For example Microsoft word is an application software which is used to
process word documents. Microsoft Access is a an application program which is used to create
and manage a database
Systems software
These are programs which are used for the control and maintenance of a computer. For example
an operating system like windows 8 is used for the overall control and maintenance of a
computer
Database management systems are systems programs which are used for the creation and
maintenance of a database
Translators and compilers are systems programs which are used to change programs written in
high level language to machine language
Utilities are systems programs which provide a useful service to the computer user. For
example, the copy utility, sort utility, dump utility etc.
Input Devices:
sensing reflected infra-red light. The software in the reader interpretes the marks into
meaningfull characters which can be passed to the computer for storage analysis
Advantages of Optical Mark Recognition
sensitivity can be altered to allow for different surfaces and pencils and inks
has a better recognition rate than Optical Character Recognition
Can be prepared where data originates, without machines
errors are easily corrected.
Disadvantages
Mark readers are relatively slow
Verification of marked data is difficult
Document may be difficult to understand and fill in
the document reader will have to be reprogrammed for each new document design
Barcode scanners read barcodes on the products sold in shops and send the price to
the computer in the cash register. Barcodes consist of a series of black and white stripes
used to give products a unique identification number.
The resolution of a scanner is measured in dpi or dots per inch. For example, a 1.200
dpi scanner gives clearer, more detailed images than a 300 dpi scanner.
Most scanners come with Optical Character Recognition software. OCR allows you to
scan pages of text and save them into your word processor; they can be edited.
Digital cameras
A digital camera doesn't use a film. Photos are stored as digital data (bits made up of
1s and 0s), usually on a tiny storage device known as flash memory card. You can
connect the camera or memory card to a PC and then alter the images using a
program like Adobe
Is a type of flat panel display common to large TV displays 30 inches (76 cm) or
larger. They are called "plasma" displays because they use small cells containing
electrically charged ionized gases, which are plasmas.
Braille printer
Is an impact printer that renders text as tactile braille cells. Using braille translation
software, a document can be embossed with relative ease, making braille production
efficient and cost-effective.
Other output devices include Computer Output Microfilm (COM), Film Recorder and
Microfiche
CACHE MEMORY
It is a type of memory with extra high access speed which is placed between the processor
and the main memory to facilitate high processing of data
Floppy disks
It is a single, flexible disk held in a protective jacket. Is made up of polyester film coated with
metal oxide compound and resembles a 45 [Link] record. Typical sizes are 51/4 and 31/2. They
can be hard or soft-sectored. Floppies operate in much the same as hard disks. The disk is
inserted into a floppy disk drive to be read/written.
Advantages of using floppies are
Very cheap as compared to other disk media
Small, light weight and convenient
Exchangeable.
Disadvantages of using floppies
Vulnerable- short shelf life, susceptible to dirt
MAGNETIC TAPE
Is a secondary storage medium consisting of plastic ribbon coated with magnetic material that
can be magnetized to represent data. Data on tape are recorded in blocks which are separated by
interblock gaps to allow the tape to speed up and slow down at the beginning and end of the
reading blocks
Advantages of magnetic tape are
o A good backup for large files
o Store more data than magnetic disk
o Speed- the transfer rate of (typically) 50 000 – 100 000 or more characters per second is
quite adequate for many applications
o Capacity- a standard reel can hold 10 million or more characters depending on the
blocking factor
o Cost- magnetic tape is the cheapest magnetic medium.
o Convenient- It is light, compact and easy to store in racks
Disadvantages of magnetic tape
Tape is a serial medium and therefore searching is necessary. This makes it impractable
for direct access applications
A record on magnetic tape cannot be read, updated in place. Record to be updated have to
be read, updated and then written to a second tape
Tape must be stored in a suitable environment where humidity, temperature and dust are
tightly controlled
Tapes has a limited shelf life (about 2 years) for reliable results and is therefore not
suitable for long term storage of historical files
MAGNETIC DISK
Is a round platter made of metal or plastic and coated with magnetizable material. Those made of
metal are rigid and are usually referred to as hard disks. We can think of the surface of the disk
as being divided into a number of concentric circles, called tracks. The number of tracks per disk
varies considerably from one system to another. Access to data stored on magnetic disk is direct
Advantages of magnetic disk
Cloud computing
Is the practice of using a network of remote servers hosted on the Internet to store, manage, and
process data, rather than a local server or a personal computer
Cloud computing services examples
Some common services that are hosted in the cloud are hosted desktop, provided by companies
like AT&T; hosted email like Gmail, provided by companies like Google; cloud storage, provided
by companies like Dropbox; and streaming music, provided by companies like Spotify. These
services, applications and files are stored in the cloud and can be accessed by users via any device.
There are a wide range of companies and industry verticals that use cloud computing such as
Amazon and Google. Small, medium, and large size public and private companies alike use cloud
computing to reduce technology acquisition costs.
Internet terms
Internet
A global computer network providing a variety of information and communication facilities,
consisting of interconnected networks using standardized communication protocols.
Search Engine
A program that searches for and identifies items in a database that correspond to keywords
Universal Resource Locator (URL)
The generic term for all types of names and addresses that refer to objects on the World Wide
Browser
Is an application program that provides a way to look at and interact with all the information on
the World Wide Web.
Web
Is basically a system of Internet servers that support specially formatted documents
World Wide Web www
Domain
The unique address of every user that uses the Internet.
The term World Wide Web (WWW) refers to the collection of public Web sites connected to the
Internet worldwide, together with the client ..
Address Box
A narrow, rectangular box in the browser window where you can type in a web address. Typing
in the web address in the address box and hitting Enter on the keyboard will take you to a
website.
File Transfer Protocol (FTP)
The standard method for downloading and uploading files over the Internet.
Internet Protocol (IP) Address
A set of unique numbers that identifies each computer on the Internet.
E-mail
Mail that's electronically transmitted by your computer.
Homepage
The first page that is viewed when the browser starts.
Hypertext Transfer Protocol (HTTP)
It is the set of rules by which Web pages are transferred across the Internet.
Link or Hypertext Link
An underlined word(s), phrase(s), or graphics on a Web page that transports the reader to
additional or related information on the Internet
Link (or hyperlink)
A highlighted or underlined feature on a web page that, when clicked, will take you to another
web page. A link most often appears as underlined words or an image.
TelNet
A terminal emulation protocol (or Internet program) used to connect a computer to a remote host
or server.
Web Page
A single hypertext file or a page that is part of a Web site.
Website
A collection of World Wide Web pages or files.
Advertisement
Web Address or URL The address for a website. (URL stands for Uniform
Resource Locator.)
U.S.-based web addresses usually start with the letters www (for World
Wide Web) and end with a dot followed by letters that indicate the type of
website it is:
.com = commercial enterprise or business
.org = non-profit organization
.edu = educational institution.
.gov = government agency
.mil = military agency
.net = another ending for a commercial website
Website A location on the World Wide Web (and Internet) that contains
information about a specific topic. A website usually contains multiple pages with
different types of information about the topic.
Advantages of the internet
1) Information on almost every subject imaginable.
2) Powerful search engines
3) Ability to do research from your home versus research libraries.
4) Information at various levels of study. Everything from scholarly articles to ones directed at
children.
5) Message boards where people can discuss ideas on any topic. Ability to get wide range of
opinions. People can find others that have a similar interest in whatever they are interested in.
6) The internet provides the ability of emails. Free mail service to anyone in the country.
7) Platform for products like SKYPE, which allow for holding a video conference with anyone in
the world who also has access.
8) Friendships and love connections have been made over the internet by people involved in
love/passion over similar interests.
9) Things such as Yahoo Answers and other sites where kids can have readily available help for
homework.
10) News, of all kinds is available almost instantaneously. Commentary, on that news, from
every conceivable viewpoint is also available.
ADVANTAGES OF E-COMMERCE
1. Overcome Geographical Limitations
If you have a physical store, you are limited by the geographical area that you can service. With
an ecommerce website, the whole world is your playground. Additionally, the advent of
mcommerce, i.e., ecommerce on mobile devices, has dissolved every remaining limitation of
geography.
Physical retail is driven by branding and relationships. In addition to these two drivers, online retail
is also driven by traffic from search engines. It is not unusual for customers to follow a link in search
engine results, and land up on an ecommerce website that they have never heard of. This
additional source of traffic can be the tipping point for some ecommerce businesses.
3. Lower Costs
One of the most tangible positives of ecommerce is the lowered cost. A part of these lowered costs
could be passed on to customers in the form of discounted prices. Here are some of the ways that
costs can be reduced with ecommerce:
Personnel
The automation of checkout, billing, payments, inventory management, and other
operational processes, lowers the number of employees required to run an ecommerce
setup.
It is no longer about pushing a shopping cart to the correct aisle, or scouting for the desired product.
On an ecommerce website, customers can click through intuitive navigation or use a search box to
immediately narrow down their product search. Some websites remember customer preferences
and shopping lists to facilitate repeat purchase.
It is not unusual for customers to travel long distances to reach their preferred physical store.
Ecommerce allows them to visit the same store virtually, with a few mouse clicks.
Ecommerce facilitates comparison shopping. There are several online services that allow
customers to browse multiple ecommerce merchants and find the best prices.
Though there are physical equivalents to deals, bargains, coupons, and group buying, online
shopping makes it much more convenient. For instance, if a customer has a deep discount coupon
for turkey at one physical store and toilet paper at another, she may find it infeasible to avail of
both discounts. But the customer could do that online with a few mouse-clicks.
There are limitations to the amount of information that can be displayed in a physical store. It is
difficult to equip employees to respond to customers who require information across product lines.
Ecommerce websites can make additional information easily available to customers. Most of this
information is provided by vendors and does not cost anything to create or maintain.
Using the information that a customer provides in the registration form, and by placing cookies on
the customer's computer, an ecommerce merchant can access a lot of information about its
customers. This, in turn, can be used to communicate relevant messages. An example: If you are
searching for a certain product on [Link], you will automatically be shown listings of other
similar products. In addition, [Link] may also email you about related products.
Store timings are now 24/7/365. Ecommerce websites can run all the time. From the merchant's
point of view, this increases the number of orders they receive. From the customer's point of view,
an "always open" store is more convenient.
DISADVANTAGES OF E-COMMERCE
1. Security
When making an online purchase, you have to provide at least your credit card information and
mailing address. In many cases, e-commerce websites are able to harvest other information about
your online behavior and preferences. This could lead to credit card fraud, or worse, identity theft.
Unless you are using a website to merely order a pizza online, e-commerce websites deliver take
a lot longer to get the goods into your hands. Even with express shipping, the earliest you get goods
is "tomorrow."
Not that all physical retailers have a personal approach, but I do know of several retailers who
value human relationship. As a result, shopping at those retail outlets is reassuring and refreshing.
Clicking on "Buy Now," and piling up products in virtual shopping carts, is just not the same for
me.
Despite its many conveniences, there are goods that you cannot buy online. Most of these would
be in the categories of "perishable" or "odd-sized." Think about it, you cannot order a popsicle
(also referred to as an ice pop or ice lolly) or a dining table set.
5. Customer ‘s privancy is lost if shopping habits are tracked by the e-commerce website
E-Banking
E-banking refers to electronic banking. It is like e-business in banking industry. E-banking is also
called as "Virtual Banking" or "Online Banking". E-banking is a result of the growing
expectations of bank's customers.
E-banking involves information technology based banking. Under this I.T system, the banking
services are delivered by way of a Computer-Controlled System. This system does involve direct
interface with the customers. The customers do not have to visit the bank's premises.
Advantages of e-banking
The main advantages of E-banking are :-
1. The operating cost per unit services is lower for the banks.
2. It offers convenience to customers as they are not required to go to the bank's premises.
3. There is very low incidence of errors.
4. The customer can obtain funds at any time from ATM machines.
5. The credit cards and debit cards enables the Customers to obtain discounts from retail
outlets.
6. The customer can easily transfer the funds from one place to another place electronically.
Delayed Statements
When performing online banking there is not a standard at which payments made will show up on
your online bank statements; they might show up two to three days later, depending upon the bank.
When banking in person, you can generally get the exact status of your bank account.
Security Concerns
One of the biggest disadvantages of doing electronic banking is the question of security. With the
prevalence of keyloggers, phishing emails, trojans and other online threats, it is natural for people
to be concerned with the security of their identity, funds and electronic banking transactions. Using
antivirus and similar programs is not full-proof. People worry that their bank accounts can be
hacked and accessed without their knowledge or that the funds they transfer may not reach the
intended recipients. Although it is rare nowadays with enhanced security measures, these threats
still exist.
8. Friendship and dating. You may be surprised at the number of electronic “personals”
that you can find on the World Wide Web.
9. Downloading files. Many documents can be downloaded fro the internet
It messages distributed by electronic means from one computer user to one or more recipients via
a network. This is done through any gadget which can be connected to communication system
Advantages of e-mail
Disadvantages of e-mail
SOCIAL NETWORKS
A social networking service (also social networking site, SNS or social media) is a platform to
build social networks or social relations among people who share similar personal and career
interests, activities, backgrounds or real-life connections. The variety of stand-alone and built-in
social networking services currently available in the online space introduces challenges of
definition, but there are some common features. Social network users are able to share text
messages, videos, images, audio and even attaching of other file formats in the network such as
pdf, word documents and others. The services of offered on social network are given at very low
cost. For example one can use facebook or whatsappi in Zimbabwe for less than one dollar for a
week.
Examples of social networking sites or networks
Facebook
Facebook is a social networking site that makes it easy for you to connect and share with your
family and friends online. Originally designed for college students, Facebook was created in
2004 by Mark Zuckerberg while he was enrolled at Harvard University. By 2006, anyone over
the age of 13 with a valid email address could join Facebook. Today, Facebook is the world's
largest social network, with more than 1 billion users worldwide.
Facebook is a popular free social networking website that allows registered users to create
profiles, upload photos and video, send messages and keep in touch with friends, family and
colleagues. The site, which is available in 37 different languages, includes public features such
as:
Whatsappi
WhatsApp Messenger is a cross-platform instant messaging application that allows iPhone,
BlackBerry, Android, Windows Phone and Nokia smartphone users to exchange text, image, video
and audio messages and other documents formats for free. WhatsApp is especially popular with
end users who do not have unlimited text messaging. In addition to basic messaging, WhatsApp
provides group chat and location sharing options. Technically speaking, WhatsApp uses a
customized version of the open standard Extensible Messaging and Presence Protocol (XMPP).
WhatsApp Inc. was founded in 2009 by Brian Acton and Jan Koum, both veterans of Yahoo!
Twitter
Twitter is a free social networking microblogging service that allows registered members to
broadcast short posts called tweets. Twitter members can broadcast tweets and follow other users'
tweets by using multiple platforms and devices. Tweets and replies to tweets can be sent by cell
phone text message, desktop client or by posting at the [Link] website. Tweets, which may
include hyperlinks, are limited to 140 characters, due to the constraints of Twitter's Short Message
Service (SMS) delivery system. Because tweets can be delivered to followers in real time, they
might seem like instant messages to the novice user. But unlike IMs that disappear when the user
closes the application, tweets are also posted on the Twitter website. They are permanent, they are
searchable and they are public. Anyone can search tweets on Twitter, whether they are a member
or not
1. Social networks free—and not only that, but it's also one of the best mediums for
communication. You can send messages, start a video call, and upload photos and videos
without charge.
2. Most social networks lets you connect to different people from anywhere in the world.
3. It is an easy way to share feelings and what's happening in your daily life. You can share
your achievements to get some appreciation, or you can share your sorrows to get support
from your generous friends.
4. If you're a business, social network also allows you to advertise. Fan pages are very
helpful for a successful marketing campaign, because they allow potential consumers to
engage, stay informed, and share with friends.
5. Students can use Facebook for group study by creating a group only for studying. There,
you can share information about your projects, homework, assignments, exams, due dates,
etc.
6. Relationships can blossom on Facebook. For long distance couples, the easy
communication can help keep the love alive all the time they're apart. The site can even
help people eventually tie the knot.
COMPUTER VIRUS
Is a program which is written to cause destructive effects to the computer or it is a program
which is written to give undesirable effects to the computer. To guard against virus attack,
anti-virus program such as Norton anti-virus and Dr Solomon ‘anti-virus are used.
The anti-virus program scan the computer during start up and when opening files. It can also
scan at any moment if a command to scan is given. The anti- virus is a program which is
written to protect the computer from viruses and to remove viruses from the computer. To
scan for virus you do the following
1. My computer speaks to me: There are all types of pop-ups and messages on the desktop
either advertising things, saying that the PC is infected and needs protection… This is a
typical, surefire case of an infection. There is either spyware on the computer, or it has
been infected by a fake antivirus (also called “rogueware”).
2. My computer is running extremely slowly… This could be a symptom of many things,
including infection by a virus. If it has been infected by a virus, worm or Trojan, among
other things, which are running on the computer, they could be running tasks that
consume a lot of resources, making the system run more slowly than usual.
3. Applications won’t start. How many times have you tried to run an application from the
start menu or desktop and nothing happens? Sometimes another program might even run.
As in the previous case, this could be another type of problem, but at the very least it’s a
symptom that tells you that something is wrong.
4. I cannot connect to the Internet or it runs very slowly. Loss of Internet
communication is another common symptom of infection, although it could also be due
to a problem with your service provider or router. You might also have a connection that
runs much more slowly than usual. If you have been infected, the malware could be
connecting to a URL or opening separate connection sessions, thereby reducing your
available bandwidth or making it practically impossible to use the Internet.
5. When I connect to the Internet, all types of windows open or the browser displays
pages I have not requested. This is another certain sign of infection. Many threats are
designed to redirect traffic to certain websites against the user’s will, and can even spoof
Web pages, making you think you are on a legitimate site when really you have been
taken to a malicious imitation.
6. Where have my files gone? Hopefully nobody will be asking this type of question,
although there are still some threats around designed to delete or encrypt information, to
move documents from one place to another… If you find yourself in this situation, you
really ought to start worrying…
7. Oh, oh… My antivirus has disappeared, my firewall is disabled… Another typical
characteristic of many threats is that they disable security systems (antivirus, firewall,
etc.) installed on computers. Perhaps if one thing shuts down it might just be a specific
software failure; but if all your security components are disabled, you are almost certainly
infected.
8. My computer is speaking a strange language. If the language of certain applications
changes, the screen appears back-to-front, strange insects start ‘eating’ the desktop… you
might just have an infected system.
9. Library files for running games, programs, etc. have disappeared from my
computer. Once again, this could be a sign of infection, although it could also be down
to incomplete or incorrect installation of programs.
10. My computer has gone mad… literally. If the computer starts acting on its own, you
suddenly find your system has been sending emails without your knowledge, Internet
sessions or applications open sporadically on their own… your system could be
compromised by malware
Types of viruses
Boot sector viruses
Boot sectors are areas on a floppy drive or hard disk in which you do not store information. It is
an area that the system uses to store system information like boot records and master boot
records
Program viruses.
Generally a program becomes active when it is executed and therefore, viruses tend to hide
within these programs so that they can replicate themselves whenever you run the program
Macro-viruses
These are viruses which attach themselves to word processing or spreadsheet document and
templates. These viruses can reduce the functionality of the word processor or spreadsheet.
Way of minimizing computer virus
1. Use ant-virus programs
2. Avoid sharing of floppy disks
3. Prevent unauthorized access by using passwords and login names
4. Locking computer rooms
5. Write protect disketes
Effects of computers on Health
Repetitive Strain injury
Symptoms of RSI
Headaches
File Management
BIT
The bit is represented by 0 for OFF or 1 for ON. It is a binary digit. It is the smallest
unit of data the
computer can store in a database.
BYTE
A byte is a collection of bits. Each byte consists of eight bits. Each byte represents a
character.
CHARACTER
Is any letter, number, space, punctuation mark, or symbol that can be typed on a computer.
FIELD
Is a collection of related characters
RECORD
A record is a collection of related fields. Example : Each record stores data about a
students.
For example, a student record is a collection of fields about a student.
FILE
A file is a collection of related records. For example, a student file is a collection of
students’ records.
DATABASE
Is a collection of related files
In a bus network, all the devices share a single communication cable. This is a typical topology
for a LAN. Information is transmitted in either direction between any computers on the network.
This means that when two computers want to use the line at the same time, there has to be some
method of deciding who gets the line first. For example, before a station begins to transmit, it
checks that the channel is not busy, if it is it has to wait before transmission can begin. Once it
begins transmission, it listens for other nodes also beginning transmission. If the transmitted
messages collide, both stations abort and wait a random period of time before trying again. This
technique is known as Carrier Sense Multiple Access With Collision Detection (CSMA-CD).
(Mesh.)6
A full mesh topology occurs when every node on the network has a separate wire connecting it to
every other node on the network. It provides each device with a point-to-point connection to every
other device in the network. A full mesh topology is redundant because if any one node of
connection fails, all remaining nodes can continue
2. Change the line spacing for the whole document to double line spacing. [1]
3. Apply art page borders around the document [1]
4. Apply your forename(s) as a footer and surname as the header on this document. [2]
5. Change the font size of headings to 20 and font style to Lucida Handwriting. [2]
6. Italicise the second paragraph [1]
7. Copy the title of the document and paste it below the document [2]
8. Insert a picture of a computer at the bottom right of the document. [2]
9. Drop cap the first character of every paragraph to 2 lines [2]
10. Apply a water mark “ networks” to your document [2]
Nitrogen in the
Nitrates
Ammonium
compounds
QUESTION 3: SPREADSHEETS
SailThruPvt (Ltd) keeps its employee salary records in a spreadsheet as given below. The
rate/hr ($) is marked at $5.
A B C D E
1 Name Hrs Gross Pay Deductions NetPay
worked (12%)
2 Michlael 10
3 Sasha 15
4 Brendon 20
5 Gamuchirai 18
6 Rodney 14
7 Hazvinei 25
8
9
10 Highest gross
salary
Lowest gross
salary
Average Gross
Salary
1. In Sheet 1 type the above worksheet. Save as Question 1 and print [2]
Using data in Sheet 1, perform the following:
2.
(i) Insert a new row above row 1 and type the words SAILTHRU SALARY RECORDS
in cell B1 (of the newly inserted row ) [1]
ii) Merge and centre cells A1 to F1 [1]
iii) Insert All boarders on all cells in the worksheet you have typed [1]
iv) Calculate the Gross Pay for each employee [2]
v) Calculate Deductions foreach employees [2]
vi) Calculate the NetPay for each employee [2]
vii) Calculate the Highest Gross Pay in cell D11 [2]
viii) Calculate the Lowest Gross Pay in cell D12 [2]
ix) Calculate the Average Gross Pay in cell D13 [2]
x. Format the column of hrs worked to 2 decimal places [1]
xi. Format the column of Gross Pay and NetPay to currency [2]
xii. Insert new column between Name and Hrs worked, rename it Employee No. [2]
xiii. Type the following Employee in their order in the inserted column:
00021; 00022; 00025; 00028; 00029; 00030 [2]
xiv. Delete the row with the record for Sasha [1]
xv. Sort all employee records in ascending order of Netpay [1]
xvi. RenameSheet1 to EMPLOYEE SALARIES. (Use a dump screen to prove this) [2]
xvii. Save it as Question 2 and print the worksheet
QUESTION 4: DATABASE
6. The school has decided to computerise information about its students and has requested to
do this task.
d) Create and save a database called STUDENTDATABASE [2]
e) StudNumb is to be used as the primary key (provide screen dump as proof) [1]
f) Create the table using information given below in the database you have created, type all
the records and save the table as Student File and print [5]
Surname First Name StudNumb Sex Date of Amount Units
Birth
Buzuzi Farai 0128474H M 01/01/99 $350 10
Muusha Flavia 0218474G M 01/01/00 $290 4
Mangere Rutendo 0264774F M 01/01/98 $299 5
Mtetwa Natasha 0321857B F 09/08/97 $321 6
Muzomba Lister 0885767B M 01/05/97 $320 6
Manzvera Tapiwa 0509587K M 05/05/01 $397 7
Aphiri Destiney 0645476P M 01/01/01 $309 4
Dube Munyaradzi 0647464P M 01/01/99 $400 9
Kaunda Faith 0837635V F 01/01/01 $290 6
Dzimba Eddie 0890234R M 06/11/96 $366 5
7. Save the Student File as Sorted Student File and sort the Sorted Student File records in
descending order of their Units and print it. [1]
8. Save the Student File as Modified Student File and perform the following on the
ModifiedStudent File table
d) Rename the field Amount to AmountPaid [1]
e) Delete the record of MuushaFlavian [1]
f) Add a record of Mapfumo Isaac, StudentNumber 0300978G, Female, born on
01/06/1999, paid $305 and has 4 units, Print it [1]
9. Using the Sorted Student file, perform the following
b) Create a Columnar Form and name its form header as Sorted Student Form [2]
e) Create a Select Query that display records of students who were born after 1998 whose
amount is more than $300.00. Name is DateBornand amount Query [2]
f) Create a Select Query that displays record of students who have more than 5 units or
whose amount is less than $305.00. Name it Units or amount query [2]
b) Create a report, in tabular and landscape form, that will display all records in the
SurnameM Query and name it SurnameM Report [3]
b) Create a report called All RecordsReport that will have all records in the Student File
but excluding the FirstName and Sex fields on it [2]
Your local church is hosting a crusade. As a computer specialist, you are tasked to design a flyer
to be used to advertise the event. The flyer must include the following information: [10]
g. Hosting church
h. Hosting Pastor
i. Guest Speaker
j. Venue
k. Time
l. Dates
QUESTION 6: POWERPOINT
1. Imagine you have been asked to make a presentation on buying a house. You will need the
following six slides:
Introduction
Types of housing
Costing
House pictures
[Link] an introductory first slide with the title of the presentation, your name and a suitable
picture. All the other slides should have a title taken from the above list.
3. On slide 2, add a bulleted list of different types of housing, e.g bungalows, flats, semi-
detached or detached houses, with a note about any pros and cons, e.g no stairs, if this type of
property is cheap or not, any gardens to maintain, the view etc.
5. On slide 4, add suitable drawings or pictures to illustrate the topic, and include relevantly
worded text boxes or Wordart objects, e.g tiring, cups of tea, where’s the dogs? New neighbours,
etc.
10 marks
MAIL MERGE
MrsAli Aziz is preparing letters to be sent to all 6 candidates who applied for various job in
the school. He has typed a letter template as shown below. He wants to finalize the letters
by inserting address, the name, the position of job applied, and the date and time of the
interview for each candidate.
1. a) Use the table below and create 5 records and 6 fields [10]
(Candidate’s address)
Thank you for applying for the post of (Job) with our school.
This letter is to confirm your interview for the position. Your interview has been scheduled
for (Date) at (Time) in the Administration building of our school.
Please bring all the original of the certificates which you have mentioned in your application
form. Please note that if you do not appear for this interview, we will conclude that you are
not available for this position. Please contact me at clerk@[Link] if you have any
further questions.
Sincerely,
Mr Ali Aziz
Clerk Administration
Fair Angle School
QUESTION 8: SPREADSHEET
1.
A B C D E
1 Student Test 1 Test 2 Pass/Fail
2 Deke T 90 31
3 Kaswaya H 48 23
4 Mtetwa N 97 79
5 Maisiri P 96 69
6 Makoto D 78 88
7 Makuyana E 31 45
8 Maximum
9 Minimum
10 Average
Type the above worksheet in Sheet1 and Save it as Test1 [4]
2. i) Insert all borders on all cells in the worksheet you created [2]
ii) Format the data items in Test 1 column to 2 decimal points [2]
iii) Insert a new row above labels (Student, Test 1, Test 2 …) and type the text ‘Form 4
Coursework Marks’ in cell B1 [2]
iv) Merge and centre cells B1:E1 [2]
v) Format the data in merge cells to font type Comic Sans MS [2]
vi)Change the font size of the inserted heading to size 23 [2]
vii)Calculate the value of cell D3 using a user define formula [2]
viii) Use the logical formula to calculate the answer in Cell E2 [2]
ix) Calculate the value in cell B9:D9, B10:D10 and B11:D11 [3]
x) Use the drag down or fill handle to copy formula in cells D3 and E3 to cell ranges in cell
D4:D8 and to E4:E8 respectively [2]
xi) Create a line graph indicating each student mark for Test 1 and Test 2 [1]
a) The chart heading is Form 4 Coursework Graph [1]
b) Clearly and accurately label the y- and x-axis of the graph [2]
c) The legend should be at the boom of the graph [1]
d) Save it as Test 2
xii) Print all the saved worksheets (Test 1 and Test 2) [1]
30 marks
QUESTION 9: DATABASE
1. Create a new Jobs database and design the following table and save as Job Details [3]
2. Enter the following details into the table and print it. [3]
Employer Job Salary Location Contact Closing Date
Connell Sales £18,000.00 Oxford 0186576333 20/02/02
St. Mary’s RE Teacher £23,000.00 Milton Keynes 0184422366 15/02/02
Hedges Secretary £16,500.00 Oxford 0186556699 01/03/02
Mango Administrator £17,500.00 Oxford 0186544455 20/02/02
Builbase Sales £24,000.00 Witney 0199323111 03/03/02
Garsington Education Officer £14,000.00 Abingdon 0123522288 14/02/02
3. Sort the records starting with the highest paid employee and print screen.[3]
4. Create a query to display only Oxford location. Save and print a copy of the query. [2]
5. Delete Milton Keynes record entirely and increase the salary for Hedges to £17,950. [2]
6. Add the following two records:
Beaumont House, Care Assistant, £12,500, Abingdon, 0123544777, 14/2/02
Gateway Hotel, 2nd Chef, £19,000, Witney, 0199322134, 5/3/02
Print the resulting table. [2]
7. Design a report to show all fields except Contact. Print the report in Landscape. [2]
8. Design a form which shows all records, insert any picture and print [5]
9. Create a query named Salaries to extract Salaries which are less than or equal to 23000
and print screen [3]
25 marks
1. Using the presentation package available at your school, draw an organogram of your school
from the school head to the school prefect. [10]
Your elder sister just got married and you are tasked to design a wedding bell invitation card for
her wedding. [10]
10 marks
Based on the theory of reasoned Action, Davis (1986) developed the Technology Acceptance
Model which deals more specifically with the prediction of the acceptability of an information
system. The purpose of this model is to predict the acceptability of a tool and to identify the
modifications which must be brought to the system in order to make it acceptable to users. This
model suggests that the acceptability of an information system is determined by two main factors:
perceived usefulness and perceived ease of use.
Perceived usefulness is defined as being the degree to which a person believes that the use of a
system will improve his performance. Perceived ease of use refers to the degree to which a person
believes that the use of a system will be effortless. Several factorial analyses demonstrated that
perceived usefulness and perceived ease of use can be considered as two different dimensions
(Hauser et Shugan, 1988; Larcker et Lessig, 1980; Swanson, 1987).
Forms of technology
1. Communication technology
2. Telecommunication
3. Information and Communication Technology
Importance of Technology
1 Easy communication Cheap
2 Fast communication Connect with friends
Questions
a. Type the above paragraphs as they are and save as technology. [7]
e. Insert word art of your choice at the end of the document. [2]
f. Insert a right aligned footer of your name using font size 10 [3]
j. Insert any symbol of your choice between paragraph 1 and paragraph 2. [1]
25 marks
Total ********
NB If the total price is greater than $150, a 20% discount is given and if total price is less
than $150, 5% discount is given.
Questions
SalesRecordsTable
ItemCode ItemName LastPurchaseDate UnitPrice QtySold QtyInStock
00002 Asbestos Sheets 12/01/15 $25.00 6 15
00003 Iron Sheets 16/02/15 $11.00 9 10
00004 Fertiliser 09/03/15 $32.00 6 17
00005 Cement 08/01/15 $ 9.00 10 21
000010 Door Frame 14/01/15 $18.00 9 5
000015 Window Frame 15/02/15 $27.00 8 18
000022 Door 01/10/15 $20.00 7 4
a) Design and create the above table [3]
b) i) Create a duplicate table and name it Sorted Sales Records, and sort its records
c) Create a columnar form using Sales Record table and name it SalesEntries Form [2]
d) Create a query from the Sales Records table, that displays all records of items whose
name start with the letter C. Print the query result [2]
e) A report, in tabular and landscape form, that will display all records in the Sort Sales
Records table. Insert a picture at the top right corner of the report you created and print
it. [3]
f) A report named After2015 that displays items purchased after January 2015 and print it
[2]
g) A report with all records in the Sales Records table excluding the following fields:
ItemCode and QtyInStock and are sorted in ascending order of ItermName, Print the
report [4] 30 marks
2. a) Create a varsity design calendar showing one month of your choice [7]
b) Set calendar dates to 2017. [1]
c) Highlight holiday dates [1]
c) Print the calendar on A4 landscape [1]
10 marks
1. Your parents have decided to throw a party for your elder sister who has just graduated from a
local university. You are tasked to create a presentation for the function.
a. Your presentation must have the following slides, a text slide, a slide with a table, a slide with a
picture and a slide with a graph.
10 marks
A
B C
QUESTION 2
Choose an appropriate method of entering data for the following situations or applications, in
each case justify your answer
a) Marking multiple choice examination scripts [2]
b) Computer Aided Design [2]
c) Retail outlet [2]
d) Getting quality coloured images into a Desktop Publisher system [2]
e) Reading cheques in a bank [2]
f) Production of a music sheet from a music keyboard [2]
QUESTION 3
Name the application software for each of the following file extensions
i) .ppt
ii) .doc
iii) .dbs
iv) .xls
v) .pub [5]
QUESTION 4
ROM and RAM are both types ofcomputer memory
i. What does ROM stand for? [1]
ii. What does RAM stand for? [1]
iii. Tick one box next to each item to show whether the statement applies to ROM
or RAM [3]
ROM RAM
a. Contents are lost whenthe computer is turned off
b. Contents are not lost when the computer isturned off
c. Stores the programs needed to start the computer
QUESTION 5
a. State any 3 sections of the keyboard [3]
b. Describe the function of each of the following keyboard keys [5]
i. Tab key
ii. Arrow keys
iv. Shift key
v. Capslock
vi. Delete key
QUESTION 6
i. Explain the difference between direct access and serial access files. [2]
ii. State two advantages of each type of file mentioned above. [4]
iii. Give two advantages of hard disk over floppy disk [2]
TOTAL 50 MARKS
B - processor
C- output devices
D-storage device
[4]
QUESTION 2
Method of entering data for the following situations/applications
a) Marking multiple choice examination scripts and justifying answer
Optical Mark Recognition (OMR) or Mark-sense reader
o Consistent in identifying marked data
o More accurate than keying in data
o Fewer/limited input errors - more accurate than keying in data
o Fast input of large volumes marked data – documents fed automatically without user input
b) Computer Aided Design
GUI friendly input device e.g. mouse, trackball, light pen, puck used with graphic tablet
o Easier to control or manipulate when drawing
c) Retail outlet
Bar code reader/scanner/light pen/magnetic stripe reader/smart card reader
o Fast input of data/quick entry of data
o Fewer input errors – accuracy in data entry
QUESTION 3
i. Presentation [1]
ii. Word processor [1]
iii. Database [1]
iv. Spreadsheet [1]
v. Publisher [1]
(Oran exampleof the package)
QUESTION 4
i. Read Only Memory [1]
ii. Random Access Memory [1]
iii. a. RAM [1]
b. ROM [1]
c. ROM [1]
98
QUESTION 5
a. numeric pad, alphanumeric , Edit keys ( special keys ), cursor control keys, arrow keys [3]
b. i. Tab key -To move the cursor in blocks
ii. Arrow keys - to move the cursor in the direction of the arrow within a created document
iii. Shift Key – activates the top row characters, to select when used in conjunction with arrows, to
type capital letters when the caps lock is off and vice versa
iv. Caps lock –activates or deactivates uppercase
v. Delete -removes characters to the right side ofthe cursor [5]
QUESTION 6
a. Difference between direct access and serial access
i. Direct access - the process of storing or retrieving data items without having to search
through other stored items first or random access on disk storage where records
are retrieved without reading through preceding records by using an addressing system.
Serial access – the process of storing or retrieving data items by first reading through all
records to locate the required record.
ii. Advantages of
Direct access.
o Faster retrieval of data – data not in processing order.
o Several files can be processed and updated at the same time.
o No need to sort transaction before storage
o Amendments and updates can be made to individual records quickly and on demand –
records updated in situ/in place
Serial access
o Efficient when high proportion of records are processed in order.
o Low-cost medium (magnetic tape) can be used.
TOTAL 50 MARKS
99
COPS THEORYASSIGNMENT 2
QUESTION 1
Define the following terms and giveONE example of each
i. Application software [2]
ii. System software [2]
QUESTION 2
a. “Hacking” is where someone gains illegal access to a computer system. This is usually done using a
remote terminal or microcomputer.
Describe three ways in which computer hackers might do more harm than an office burglar.
[3]
b. i. List four symptoms which may indicate a possible virus attack. [4]
ii. List four ways of preventing virus attack. [4]
QUESTION 3
a) Microsoft office uses various toolbars and controls to accomplish various tasks. Draw and label the
icons that represent the following: [5]
i. Copy
ii. Sort ascending
iii. Redo
iv. Left alignment
v. cut
b) Explain the 5 advantages of using word processing software over a manual writing system when
preparing academic work [5]
100
QUESTION 4
A spreadsheet has been designed to calculate the fuel economy for 6 cars:
A B C D
1 Car Distance (km) Fuel used (litres) Economy (km/litre)
2 1 48 4 12
3 2 160 9 17.8
4 3 70 4.5 15.6
5 4 200 20 10
6 5 150 33 4.5
7 6 300 15 20.5
8 Average economy 13.3
9 Best economy 20
i. What formula is in cell D2 to calculate the economy for car 1? [1]
ii. What formula is in cell D8 to calculate the average economy for all 6 cars? [1]
iii. What formula is in cell D9 to calculate the best (highest) economy? [1]
b. If cell B7 was changed to 200, which cells would be automatically updated? [3]
c. Fuel economy is often given in litres per 100 km. Column E is to be added
to the spreadsheet to contain these new economy values.
What formula needs to be in E7 to find the economy of car 6 in litres per 100 km? [2]
QUESTION 5
a. Identify the two types of network topologies shown in fig 1 [2]
i) ii)
Fig 1
b. Illustrate a star network topology and state where it is commonly used [3]
101
QUESTION 6
QUESTION 7
a. Explain any two uses of the Internet. [2]
b. The Internet is widely used in schools.
i. Give one problem or danger which might occur when pupils have unsupervised access to the Internet
[1]
ii. How can this problem or danger be prevented.
[1]
c. State any three equipment needed for connection to the internet. [3]
TOTAL 50 MARKS
102
COPS THEORY ASSIGNMENT2 Answers
QUESTION 1
i. Application software
- programs with associated documentation used to solve a particular problem.
- programs that specify the information processing activities require for the completion of
specific tasks of computer users
Examples
Spreadsheets
Word processing
Databases etc.
Definition 1mark,example 1 mark [2]
QUESTION 2
a. Ways in which hackers can do more harm than office burglars
Changing passwords
Encrypting/scrambling computer data
Deleting/corrupting/changing computer software/data
QUESTION 3 a.
i. Switches pages between landscape and potrait layouts
ii. alphabetise the selected text or sort numeric data in ascending or descending order
iii. aligns texts to the left
iv. repeats an operation
v. Cuts the selected work and puts it on the clipboard [5]
b.
MS word has the following features which do not exist in manual writing systems
Word-wrap
cursor control
editing
Formatting
spell-check
Thesaurus
Macros
Printing
file management
mail merge printing
[5]
QUESTION 4
i. = (B2/C2) [1]
ii. = sum (D2:D7)/6 or = average (D2:D7) [1]
104
iii. = max (D2: D7) [1]
b. D7, D8 [3]
c. = (C7/B7)*100 [2]
QUESTION 5
[1]
a. i. Bus
ii. ring [1]
[2]
many home networks use the star topology [1]
QUESTION 6
a. any two correct answers
Designing workstations for a neutral wrist position (using a wrist rest to support the wrist),
Proper monitor stands, and footrests all contribute to proper posture and reduced RSI.
New, ergonomically correct keyboards are also an option. [2]
Frequent rest breaks and rotation of employees to different jobs.
(b) Any 3 correct answers [3]
Trailing cables place cables inside or under the carpet
Overloaded power sockets never plug too many cables in a power socket
Spilt drinks or food keep drinks and food away from computers.
105
QUESTION7
a. Uses of internet
Information browsing File transfer (FTP)/file/programs
E-mail communication downloads /e-scabbing
Newsgroups
Access and use of other computers (telnet) – enables a user to of one computer to become a user of
another computer across the network
Entertainment
E-commerce/e-conferencing/e-shopping/e-banking/e-government
Social communication through social networks e.g. Facebook.
b. i. Problems/dangers of the Internet in Schools.
Access to unsafe sites e.g. access to pornographic websites or being exposed to violence.
Downloading of viruses Being subjected to abuse
ii. Prevention of problems/dangers
Setting filters on or blocking unsafe sites
Use of anti-virus software to guard against virus downloads
c. A multimedia PC, A MODEM, telephone connection, an account with an Internet Service Provider (ISP)
[3]
106
107
Complete the following statements with the appropriate term from the list below
Input device, micro computers, hybrid, laptop, mouse, digital, hardware, analogue, ROM,
touch pad, RAM, CPU
QUESTION 2
Describe the following terms as they are used in word processing
i. Orphan [2]
ii. WIMP [2]
iii. Page break [2]
iv. Word wrap [2]
v. Soft return [2]
QUESTION 3
a. Define the following terms, citing examples [8]
[Link] engine
ii. Surfing
[Link]
iv. Anti-virus
b. Many countries have data protection legislation. Recommend any two rules for the
legislation. [2]
QUESTION 4
Graphical user interfaces are very popular interfaces that are used with computers,
mobile phones and other portable devices
a. Give three features of a Graphical User Interface [3]
b. List two advantages of using G.U.I [2]
c. Other than GUI give any other 2 types of a user interface [2]
d. Give three functions of an operating systems [3]
QUESTION 5
Give and explain any five conditions ideal for an optimum operation of users and maximum
performance of machines in computer room
[10]
QUESTION 6
a. Give two uses of the following application packages
i. Desktop Publishing
ii. Spreadsheet
iii. Database [6]
b. Explain the following terms as used in spreadsheets [2]
i. Label
ii. Value
c. What do the terms field and record mean as used in a database [2]
QUESTION 7
a. Differentiate the following terms as used in computers by giving and fully explaining
two distinct reasons.
i. Data and Information [4]
ii. Impact and Non Impact printers [4]
b. Give any two attributes of good information [2]
QUESTION 8
Computers can affect the health of users.
i. Name any five known side effects of computers on users [5]
ii. Of the named side effects in (i) outline a corrective measure for each [5]
QUESTION 9
Explain a, e, f, i andj ; expand the rest,as used in computers
a) Bluetooth
b) VLSI
c) DVD
d) USB
e) Posture
f) Intelligent terminal
g) EEPROM
h) LCD
i) Micro computer
j) Light pen [10]
QUESTION 10
a. Why is it important to secure data on a computer [2]
b. Outline any 3 measures that can be used to prevent data theft [3]
c. Describe teleworking [1]
d. Give two advantages of teleworking for the employer [2]
e. Give two advantages of teleworking for the employee [2]
QUESTION 2
i. Orphan: this is the last part of a document that can occupy the first part of a page.
ii. Wimp :window Icon Mouse Pointer
iii. Page break : it is used for separating /creation of pages
iv. Word wrap :is when the computer automatically moves the word to the next line
v. Soft return: is the automatic movement of the cursor to the next line. [10
QUESTION 3
a. i. Search engine
-Is an interactive tool to help people to locate information via the world
wide web
-it is an interface between the user and the underlying database
-Alta vista Exite, Lycos, Google, Yahoo, Ask [2]
ii. Surfing
- is the process of visiting different websites on the internet hosted by various
organisations
-explain any typical situation [2]
iii. Browser
- is the internet client software that acts on an interface between the user and the
inner workings of the internet, specifically the WWW
-examples internet explorer, Firefox, Opera Mini, Netscape, Google Chrome, Lynx
[2]
iv. Anti-virus
- Program to detect and to remove computer viruses
- examples Avast, Esset, Norton, Doctor Solomon
[2]
QUESTION 4
a. features
- icons
- pointer
- menus
- windows
- pointing devices
[3]
b. advantages
- user friendly
- online help
- easy to learn
- novices can easily learn it [2]
c. Command Driven interface, Menu Driven, Forms and Dialogue boxes, Natural
language, WIMP interface [2]
d. functions of the operating systems
- interrupt handling
-User interface
-Resource allocating
- Error detecting
-File management
-Etc [3]
QUESTION 5
Stating one mark, explanation one mark
- air conditioner- which control the room temperature and humidity levels
- dust free – dust is the biggest killer of hard drives
ii. Spreadsheet:
- A spreadsheet is a computer application with tools that increase the user's
productivity in capturing, analyzing, and sharing tabular data sets.
USES:
- Lists • You can create lists, from shopping lists to contact lists, on a spreadsheet.
- Maintaining personal or professional contacts allows you to sort by every field.
- Accounting
- invaluable calculators.
- Time Sheets
- Database Use
- Chart Creation
iii. Database:
- A database is a collection of data arranged for easy and quick searching and
retrieval.
-
USES:
- Forms Database programs include report creation functions.
- Reports allow users to manipulate their data in numerous ways.
- Users can insert functions into reports to help in analyzing the data.
- Report creation Database software provides users with features to organize their
information simply and specifically
QUESTION 8
problem 1 mark, corrective measure 1 mark [10]
Problem Area: Lower back Pain Causes: Wrong type of chair or desk, Right chair an desk but
wrong posture, Sitting on the edge of the chair, sitting with all the weight on one buttock by
sitting cross legged. Corrective Measures: Always go for a chair that has a mechanism for
lowering and raising the height of the backrest. Never buy a computer chair that has arms
rest.
Problem Area: Neck Pain Causes: While typing when one is moving the neck up and down, left
and right too much it causes neck pain. Use of wrong type of glasses (like bifocals), Height of
screen. It may sound strange to some of you but some people sit on the computer with
mouthpiece of phone hanging around their neck. This casual attitude is not cool at all!
Corrective Measures: A document holder is a must to restrict neck movement. Take opticians
advice and go for special glasses that you can use while in front of the computer. Screen’s
height should be adjusted parallel to eyesight – not too high and not too low.
Problem Area: Pain In Wrists & Fingers Causes: Height of the chair not adjusted properly. If
you have bought the right chair you might a well make use of it! Striking the keys too hard.
Mouse is not close to the body. Corrective Measures: Height of the chair should make a
perfect L between the shoulder, elbow and wrist. This ensures fingers and keys or mouse are
at a perfect horizontal. Clicking finger is also horizontal for that perfect wrist support. Mouse
should be placed right in front of the shoulder, close to our body.
Problem Area: Strain In the Eyes Causes: Glare from monitor, sun glare directly coming in
straight on to the monitor from windows, lighting arrangement of the room are some causes
that put strain on the eyes. Corrective Measures: The correct thing to do is to place the
computer table between lights and not directly under them. The best alternative is to switch
off the overhead light and switch on the angle poise lamp. Ask your optician to put slight tint
coat on your glasses. Adjust monitor’s contrast and brightness. Make sure the distance is
right. Opt for a 17inch SVGA or XGA screen
QUESTION 9
a. Bluetooth: Bluetooth is a proprietary open wireless technology standard for exchanging
data over short distances (using short wavelength radio transmissions in the ISM band from
24002480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with
high levels of security
b. VLSI - VERY LARGE SCALE INTEGRATION
c. DVD - DIGITAL VERSATILE DISC
d. USB - UNIVERSAL SERIAL BUS
[Link] - The sitting position of a computer user.
f. Intelligent terminal: Intelligent terminals include memory and a processor to perform
special display operations. In contrast, a dumb terminal has no processing capabilities; it
must rely entirely on the central computer. A smart terminal has some processing
capabilities, but not as much as an intelligent terminal.
g. EEPROM – Electrically Erasable Programmable Read Only Memory
h. LCD - LIQUID CRYSTAL DISPLAY
i. Micro computer: The term microcomputer is generally synonymous with personal
computer (PC), or a computer that depends on a microprocessor. Microcomputers are
designed to be used by individuals, whether in the form of PCs, workstations or notebook
computers. A microcomputer contains a central processing unit (CPU) on a microchip (the
microprocessor), a memory system (typically read-only memory and random access
memory), a bus system and I/O ports, typically housed in a motherboard.
j. Light pen: A light pen is a computer input device in the form of a light-sensitive wand used
in conjunction with a computer's CRT TV set or monitor. It allows the user to point to
displayed objects or draw on the screen in a similar way to a touch screen but with greater
positional accuracy. It was long thought that a light pen can work with any CRT-based display
QUESTION 10
a. – to reduce the risk of corruption and or loss
- to make sure it is only accessed by authorized users [2]
b. measures
- valid user name
- passwords to gain data
- restricted entry [3]
c. teleworking is a method of working in which an employee works from a remote
office or from home using telecommunication links [1]
d. advantages to employer
- need no furniture and building for all its office staff
e. advantages to employee
- does not spend money and time travelling
- work can be fitted around other commitments [2]