Computer Notes
Computer Notes
Computer Notes
CHAPTER ONE
INTRODUCTION TO COMPUTERS
Summary
Research shows that the trend in computer technology revolution is that there is;
o Continual decrease in computer size
o Improved speed and power processing
o Decrease in computers and the related facilities cost
Number of components elements e.g. transistors, capacities, diodes etc in computer per circuit (IC) greatly
increased i.e. to over 500,000.
1. Speed – a computer is a very fast machine. It can perform in a very few seconds the amount of
work that a human being can do in a year if he/she worked day and night doing nothing else.
2. Accuracy – the computer accuracy is consistently high.
3. Diligence – computers are free from monotony, tiredness and lack of concentration etc. It can therefore
work for hours without creating an error. For example if 10 million calculations are to be done, a computer
will do the tenth million calculations with exactly the same speed and accuracy as the first one.
4. Versatility – a computer performs various tasks with ease. I.e. it cansearch for a letter, the next moment
prepare an electricity bill, and write a report next then do an arithmetic calculation all with ease.
5. Large Memory capacity – a computer can store and recall any information due to its secondary
storage capability.
(I) Size
According to size computers are classified as:
1. Super computers
They are very large in size and use multiple processors and superior technology. Super computers are
biggest in size, the most expensive in price than any other is classified and known as super computer. It can
process trillions of instructions in seconds. This computer is not used as a PC in a home neither by a
student in a college. Governments specially use this type of computer for their different calculations and
heavy jobs. Different industries also use this huge computer for designing their products.
In most of the Hollywood’s movies it is used for animation purposes. This kind of computer is also
helpful for forecasting weather reports worldwide. They are known for von Newman’s design i.e.
multiple processor system with parallel processing. In such a system a task is broken down and shared
among processes for faster execution. They are used for complex tasks requiring a lot of
computational power.
2. Mainframe computers
A mainframe is another giant computer after the super computer and can also process millions of
instruction per second and capable of accessing billions of data .They are physically very large in
size with very high capacity of main memory. This computer is commonly used in big hospitals, air
line reservations companies, and many other huge companies prefer mainframe because of its
capability of retrieving data on a huge basis. They can be linked to smaller computers and handle
hundreds of users they are also used in space exploitation. The term mainframe was mainly used for
earliest computers as they were big in size though today the term is used to refer to large computers. A
large number of peripherals can be attached to them. They are expensive to install.
3. Minicomputers
They are smaller than the main frame but bigger than m i c r o computers. They support concurrent
users. They can be used as servers in companies. They are slower and less costly compared to
mainframe computers but more powerful, reliable and expensive than micro computers.
4. Micro computers
They are of advanced technology i.e. the micro era based on large scale integration that confines several
physical components per small elements thumb size IC, hence the size reduced. It is the smallest of the
three computers. They are usually called personal computers since they are designed to be used by
individuals. The micro chip technology has enabled reduction of size of computers.
Microcomputers can be a desktop, laptop, notebooks, or even palmtop
o Notebook computer An extremely lightweight personal computer. Notebook computers typically
weigh less than 6 pounds and are small enough to fit easily in a briefcase. Aside from size and
portability, Notebook computers use a variety of techniques, known as flat-panel technologies, to
produce a lightweight and non-bulky display screen.
o Desktop Computer is an independent personal computer that is made especially for use on a
desk in an office or home. The term is used mainly to distinguish this type of personal
computer from portable computers and laptops, but also to distinguish other types of
computers like the server or mainframe.
o Laptop A small portable computer light enough to carry comfortably, with a flat screen
and keyboard that fold together. Laptops are battery- operated, often have a thin, backlit or
sidelit LCD display screen, and some models can even mate with a docking station to perform
3
as a full- sized desktop system back at the office. Advances in battery technology allow laptop
computers to run for many hours between charges, and some models have a set of business
applications built into ROM. Today's high- end (Advanced) laptops provide all the capabilities
of most desktop computers.
o Palmtop A small computer that literally fits in your palm. Compared to full-size computers,
palmtops are severely limited, but they are practical for certain functions such as phone books
and calendars. Palmtops that use a pen rather than a keyboard for input are often called
hand-held computers or PDAs. Because of their small size, most palmtop computers do not
include disk drives. However, many contain PCMCIA slots in which you can insert disk
drives, modems, memory, and other devices. Nowadays palmtops are being integrated into
the mobile phones as
multipurpose devices.
All computers fall into two broad groups according to the tasks they perform namely special and general
purpose.
(III) Functionality
In this class computers are classified according to the type of data they can process.
o Analog computers
Process data that is analog in nature which is continuous. They solve mathematical operations and logical
comparison by measuring the amount of change in physical magnitude e.g. speed, temperature, etc. They are
dedicated to a single task. Are used in manufacturing process control like monitoring and regulating furnace
temperatures, speed, pressures, weather, etc, stations to record and process physical quantities e.g. wind, cloud
speed, temperature, etc. in addition to PCs, most modern home appliances such as digital TVs, microwaves,
wall clocks are digital in nature. Continuous data is represented using a continuous waveform.
o Digital computers
They process digital data only which is discrete in nature and their operations are based on two states namely
“on” and “off” or “1” and “0”.
o Hybrid computers
`They are computers build with the characteristics of both analog and digital, thus process both analog and
digital data.
Computer hardware refers to the physical components of a computer such as the monitor, Keyboard, Mouse,
system unit etc shown in the diagram below.
Computer software
A set of programs associated with the operation of a computer.
CHAPTER 2
• Printout is permanent
• Color laser printers are still fairly expensive
o Speakers Used to output sound
o LCD Projectors Similar to monitors but projects an image on to a screen.
They are mainly used for presentations.
The processor and main memory of a PC are commonly held on a single board called a mother board.
The processor has the following functions:
The processor contains the control unit and the arithmetic/logic unit(ALU).
The control unit coordinates and controls all the operations carried out by the computer. The control
unit operates by repeating three operations which are:
The cycle (input - processing - output) would not be possible without a holding place for the
instructions and data that the processors (CPU) can easily reach. This holding place is known as
memory also called main storage and is internal to the computer consisting of RAM and possibly ROM.
• Is the basic kind of internal memory that holds data and instructions while the computer is in use.
• It can be read from and written to.
• It is called random access because the processor or computer can access any location in
memory in any order as contrasted with sequential access devices which must be accessed in
order.
• RAM is volatile; losing the stored information in an event of power loss, and quite expensive.
These are devices which are used to store huge information for future use. This is mostly hard drives and
removable media such as floppy disks, optical media (CD ROM) etc.
Hard Drive:
Hard disk drives are magnetic, non-volatile computer storage devices. A hard disk drive stores data on two
spinning platters inside the drive. The data is read with a read/write head that uses magnetic technology to
write the data. The non-volatile nature of a hard disk drive means the data does not get erased when the
drive loses power, as is the case with random access memory.
Floppy Disk: Floppy disks allow information to be transported easily from one
computer to another they have limited storage capacity, generally 1.44 MB. Saving and retrieving
information from a floppy disk is slower than on a hard drive. They are more susceptible to physical
damage and viruses than the hard drive. The size of a hard drive is usually expressed in terms of
megabytes and gigabytes.
Compact Disk Read Only Memory (CD ROM): CD ROMs are read only storage medium. Typically, a
CD ROM holds up to 650 MB of information. While information retrieval is faster than from a floppy
disk, it is still not as fast as from the hard drive.
Compact Disk-Writable (CD-R): A CD-R is highly effective for storing a large amount of data. Can
hold up to 700MB of information. A CD-R is a one time recordable compact disc.
Magnetic tapes
A magnetic tape is made using a thin ribbon coated magnetic material on which data can be stored using
magnetic process. The tape may be housed inside a plastic as a cassette or coiled around an open wheel. It
uses serial access. It stores large amount of data at relatively low cost
Main Memory
10
The diagram above shows how the units interact with each other in the processing of data. Input devices
enter information to be processed by the processor. The processor can read and write into the secondary
storage devices.
The processor also stores the instructions being currently executed into the main memory. So can be able
to read and write into the main memory (RAM). Once the data has been processed by the processor, the
data can be displayed by the output devices. Please note the direction of the arrows as it depicts the
flow of the data and instructions.
Information is stored in computers in the form of bits. A bit is used to represent information in the
computer. They are referred to as binary digits i.e. the 0’s and 1’s with 0 representing an OFF state and 1
representing an ON state.
The stored bits are usually retrieved from computers memory for manipulation
by the processor
A single bit alone cannot represent a number, letters or special characters, to represent
information; bits are combined into groups of eight. A group of eight bits is called a byte. Each
byte can be used to represent a number, letter or special character.
11
COMPUTER SOFTWARE
Software is a Program commercially prepared and tested in software by one or a group of programmers
and system analyst to perform a specified task. Software is simply set of instructions that cause a
computer to perform one or more tasks. The set of instructions is often called a program or, if the set is
particularly large and complex, a system. Computers cannot do any useful work without instructions
from software; thus a combination of software and hardware (the computer) is necessary to do any
computerized work. A program must tell the computer each of a set of tasks to perform, in a framework
of logic, such that the computer knows exactly what to do and when to do it. Data are raw facts and
ideas that have not been processed while Information is data that has been processed so as to be
useful to the user.
Software
Software can be broadly classified into system software and application software
supervises and directs all the software components and the hardware components. Sophisticated
operating system could handle multi-processors, many users and tasks simultaneously. Examples of
computers operating systems are UNIX, Microsoft windows 95/98, Windows NT, Windows 2000,
Windows XP, Windows Vista and Linux.
(ii) Service programs are programs designed for general support of the processes
of a computer; "a computer system provides utility programs to perform the tasks needed by most
users". The service programs can further be divided into;
o Utilities Performs a variety of tasks that maintain or enhance the computer’s operating
system Utility programs are generally fairly small. Each type has a specific job to do. Below are
some descriptions of utilities.
• Anti-virus applications protect your computer from the damage that can be caused by
viruses and similar programs
• Compression utilities make files smaller for storage (or sending over the Internet)
and then return them to normal size.
• Data recovery utilities attempt to restore data and files that have been damaged or
accidentally deleted.
• Disk defragmenters reorganize the data stored on disks so that it is more efficiently
arranged.
• Firewalls prevent outsiders from accessing your computer over a network such as
the Internet.
o Development programs are used in the creation of new software. They comprise of sets of
software tools to allow programs to be written and tested. Knowledge of appropriate
programming language is assumed. Tools used here are
• Text editors that allows one to enter and modify programs statements
• Assembler- allows one to code in machine programs language .i.e. processor specific
• Compilers-makes it possible for programmer to convert source
• code to object code which can be stored and saved on different computers.
• Interpreters-used to convert source programs statement by statement as it executes
the program without being compiled first.
• Libraries- commonly used parts or portions of a program which can be called or
included in the programmer’s code without having to recode that portion.
• Diagnostic utilities-used to detect bugs in the logic of program
• during program development
o Communication programs- refer to programs that make it possible to transmit data.
NB: Nowadays most of the general purpose software is sold as a complete software suites such as
Microsoft office or Lotus SmartSuite. These suites offer four or more software products packaged
together at a much lower price than buying the packages separately.
o Tailor made/special purpose software Tailor-made computer system refers to computer
application developed by in-house IT personnel or outside software house according to
specific user requirements in a firm. They are developed for given purpose e.g. Payroll system,
stock control system etc.
14
Banks
- Manage financial transactions through the use of special cash dispensing machines called ATMs used for
cash deposit and withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping and processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information / documents
- For calculating and keeping home budgets
Industries
- To monitor and control industrial processes through the use of robots
- For management control i.e. to keep track of orders, bills and transactions
- For advertisement purposes, which enable an industry to attract more customers
- CAD {Computer Aided Design} allows accurate, quick and easy designs of products on computer screen.
Transport industry
- Airports; to control the movement of aircrafts, their take off and landing using radar equipment
- For making reservations (Booking purposes)
- Storing flight information
- Automobile traffic control i.e monitoring vehicle traffic in busy towns
- In Railway corporations to coordinate the movement of goods and wagons
- In shipping control for efficient management of fleets, cargo handling and communication
Offices
- For receiving and sending of information through e-mails, fax , etc
- Production of documents
- Keeping records
Hospitals
- For keeping patient records
- Keeping records of purchases and stock of medicine
- Analysis data obtained from X-rays
- Maintaining the booking system of scarce resources such as operation theaters.
- Control of life support machines in intensive care unit
- Used by physicians to get proper diagnosis of the affected part of body through cross sectional view
15
Education
- Access internet through email to link different schools and to exchange knowledge
- Communication through email to link different schools and exchange knowledge
- For teaching and learning purposes e.g. computer practical
- Administration –storing information about students, processing grades and teachers salaries.
Library services
- Enables library personnel to easily access and keep updated records of books and other library materials
i.e. to keep electronic catalogues and track book circulation.
- Library users can also use computers to search for titles instead of using the manual card catalogue
Entertainment industry – to generate and edit computer graphics in movies and games.
Impaired persons
- converts speech to text for the deaf
- converts spoken language to sign language for the deaf.
- Converts text to speech for the blind using speech synthesizers.
- The introduction of computers has lead into unemployment, in some companies thousands of workers
have been made redundant.
- Computer technology has created new opportunities for crime such as hacking, theft of data and
the introduction of viruses.
- Computers have caused stress at places of work as humans try to keep up with the output of their
computers.
- People who work with computers a lot without interacting with other people are likely to develop
psychological problems due to isolation.
- Computers have affected relationships of people working together such as employee-supervisor
relationships and thus becoming a dehumanizing factor.
- Computerisation has caused job content reduction and role ambiguity.
- Cause of power redistribution organizations due to change in organizational structure..
16
Computer Networks
A computer network is an interconnection of two or more computers to form a network in order
to share information and resources.
Advantages of Networks
• It allows the sharing of information held on disk drives to be accessed by all permitted
users.
• It allows the sharing of resources such as printers, scanners and disk storage.
• Application programs can be stored on one computer and make them available to all
users rather than having copies individually installed on each computer.
• Allows electronic messages to be sent between the users.
• It allows the connection of different types of computer which can communicate with
each other.
The Internet is a world wide computer network, which interconnects computer networks across
countries. It started with an initial 4 computers in 1969 and grew over the next ten years to
connect 200 computers in military and research establishments in the US. Today there are
more than 4 million host computers, any of which could be holding the information you are
looking for, and as many as 50 million people connected.
This is a special part of the internet that allows people to view information stored on participating
computers. It is an easy-to-use, graphical source of information
which has opened the internet to millions of people interested in finding out
information.
• Internet service provider – an internet service provider provides you with a connection to
the internet and the software you will need to navigate.
• telecommunication line – a telephone line is required to connect you to the internet
service provider.
• Modem – a modem converts a digital signal received from a computer into an analogue
signal that can be sent along ordinary telephone lines, and back to digital at the other end.
17
• we b Browser- a web browser is software used to view and download Web pages and various
b types of files such as text, graphics and video. Examples are Microsoft Internet Explorer or
We Netscape Navigator.
Common Internet services
Electronic mail can be sent to another internet user anywhere in the world within seconds. E-mail
facilitates; sending of messages, file attachments, address book, sending E-mail to a group,
forwarding messages and many others.
Videoconferencing
In this facility you can see the person at the other end of the line and you can be able to talk to
them using a microphone.
- It offers different ways of communicating and innovations are going on to make it faster,
more reliable.
- The Internet is a virtual treasure trove of information. Any kind of
information on any topic under the sun is available on the Internet.
- It is a source of entertainment where users can play computer games, visiting chat rooms or
just surfing the Web.
- Many services are now provided on the internet such as online banking, job seeking,
purchasing tickets for your favorite movies etc.
- Business (E-commerce) can be transacted over the internet.
- Personal information such as name, address, credit card number etc. can be stolen by other
culprits and misused.
- Unwanted e-mails in bulk (Spam), which provide no purpose and needlessly obstruct the
entire system, can be sent on the internet.
- Computers attached to internet are more prone to virus attacks and they can end up into
crashing your whole hard disk.
- Pornographic sites on the Internet that can be easily found by children which can corrupt
their morals.
- Anyone can publish incorrect information online because there’s no quality control
18
It involves:
- Protection of data and information against access or modification
- Denial of data and information to unauthorized users
- Provision of data and information to authorized users.
Data control is the measure taken to enforce the security of programs and data.
Confidentiality
Sensitive data or information like employees details, business financial ,etc belonging to the
organization or government should not be accessed by or disclosed to unauthorized people.
Integrity
Means that data should not be modified with without owners authority.
Availability
Information must be available on demand.
Laws governing protection of information
Computer Ethics – are the moral principles and values that govern the actions and decisions of
an individual or group. They serve as guidelines on how to act rightly and justly when faced
with moral dilemmas.
ICT Legislation – these are laws that govern what information can be kept about an individual
and how that information may be used. Any activity that contravenes these laws is considered
illegal.
Viruses
The term virus stands for: Vital Information Resource Under Siege
A virus is a program that will change the operation of the computer without the user’s
information. Viruses attach themselves to computer files called executable files such that any
time such programs are run a copy of the virus is sent out. So it duplicates itself continuously.
19
20
Control measures
Use surge protectors and UPS to protect computer systems against brownout or black out which
causes physical damage or data loss.
Install a Fault Tolerant system which has the ability to preserve the integrity electronic data
during hardware or software malfunction.
Disaster recovery plans by establishing offsite storage of an organizations databases so that
incase of disaster or fire accidents, the backed up copies are used to reconstruct lost data.
Unauthorized access
Physical access to computer system should be restricted to ensure that no unauthorized person gets
access to the system.
21
Errors and accidental access to data and information may be as a result of people experimenting
with features they are not familiar with. Also people may mistaken printing sensitive reports and
unsuspectingly giving them to unauthorized persons.
Control measures
1. Set up a comprehensive error recovery strategy in the organization.
2. Deny access permissions to certain groups of users for certain files and computers.
Physical theft
This involves the theft of computer hardware and software. It involves breaking into an office or
firm and stealing computers, hard disks, data and other valuable computer accessories by being
taken away by either an insider or an intruder. Most cases of theft are done within an organization
by untrustworthy employees of the firm {Inside job} or by an intruders (outsiders) for commercial,
destruction to sensitive information or sabotage resources.
Control measures
- Employ guards to keep watch over data and information centres and backup.
- Burglar proof the computer room.
- Reinforce weak access points
- Create backups in locations away from main computing centre.
- Motivate workers to feel sense of belonging in order to make them proud and trusted custodians
of the company resources.
- Insure the hardware resources with a reputable firm.
Trespass
This is the act of gaining access or entering into a computer system without legal permission.
Cracking
Refers to the use of guess work over and over again, by a person until he/she finally discovers a
weak in the security policies or codes of software. Alternatively refers to someone using his / her
knowledge of information systems to illegally or unethically penetrate computers systems for
personal gain.
Hacking
Refers to when an individual intentionally breaks codes and passwords top gain unauthorized access
into a computer system, but without intent of causing damage.
Tapping
Tapping is when someone gains access to information that is being transmitted via communication
links. Any information that is transmitted across a network is at risk of being intercepted, if
appropriate security measures are not put in place.
Piracy
Is the act of making illegal copies of copyrighted software, information or data.
To eliminate piracy
- Make software cheap, enough to increase affordability
- Use licenses and certificate to identify originals
- Set installation password to deter illegal installation of software
- Enforce laws that protect the owners of data and information against piracy.
22
Fraud
Refers to leaking personal or organizational information using a computer with the intention of
gaining money or information.
Example of fraud is where one person created an intelligent program in the tax department that
could credit his account with cents from all the tax payers. He ended up becoming very rich before
he was discovered.
Alteration
Refers to illegal changing of data and information with the aim of gaining or misinforming the
authorized users. When a system is compromised the data lacks reliability, relevance and integrity.
Example of data alteration are when students break into system to alter exam results, or someone
breaks into a banking system to change account details or divert money.
Spam
A spam is unsolicited electronic junk mail, often commercial, message transmitted through the
Internet as a mass mailing to a large number of recipients. Is send by a person gaining access to a
list of e-mail addresses and redirecting the e-mail through the Mail Server of an unsuspecting host,
making the actual sender of the spam difficult to trace. Spam is annoying, but usually harmless,
except in cases where it contains links to web sites. Clicking on these links may sometimes leave
your system open to hackers or crackers.
Audit trail
Computer Audit Trails are used to keep a record of who has accessed a computer system and
what operations he or she has performed during the given period of time. Audit Trails are useful
both for maintaining security and for recovering lost transactions. Audit Trails help to detect
trespassing and alterations. Incase the system is broken into by a hacker; an Audit Trail enables
their activities to be tracked. Any unauthorized alterations can be rolled back to take the system
back the state it was in before the alterations were done
Data encryption
Data encryption is a means of scrambling (or ciphering) data so that it can only be read by the
person holding the encryption ‘Key or ‘algorithm’. The key is a list codes for translating
encrypted data – a password of some sort. Without the key, the cipher cannot be broken and the
data remains secure. Using the Key, the cipher is decrypted and the data remains secure. Using
the Key, the cipher is decrypted and the data is returned to its original value or state. Each time
one encrypts data a key is randomly generated. The same key is used by the data recipient to
decrypt the data.
Data encryption is a useful tool against network snooping (or tapping).
Log files
They are special system files that keep a record (log) of events on the use of the computers and
resources of the information system. The information system administrator can therefore easily
track who accessed the system, when and what they did on the system.
Firewalls
A firewall is a program or hardware that filters information coming through the Internet and
23
connection into your personal computer or network. Firewalls can prevent unauthorized remote
logins, limit or stop Spam, and filter the content that is downloaded from the Internet. Some
Firewalls offer virus protection, but it is worth the investment to install Anti-Virus software on
each computer.
Security monitors
These are programs that monitor and keep a log file or record of computer systems and protect
them from unauthorized access.
Biometric security – is unauthorized control measure that takes the user’s attributes such as
voice, fingerprints and facial recognition.
Authentication policies such as signing users log on accounts, use of smart cards and Personal
Identification Number (PIN).
6. OPERATING SYSTEM
Definition:
An operating system (sometimes abbreviated as "OS") is the program that, after being initially
loaded into the computer by a boot program, manages all the other programs in a computer.An
operating system (OS) is a set of programs that manage computer hardware resources and provide
common services for application software.
Is a group of programs that manage all activities on the computer.
24
Main program that controls the execution of user applications and enables the user to access the
hardware and software resources of a computer.
A program that controls the execution of an application programs and acts as an interface between
the user of a computer and the computer hardware.
The operating system provides a software platform on top of which other programs (application
programs), can run. Examples of Operating Systems: Microsoft Windows 95/98/2000/XP/Vista/NT,
Macintosh OS, OS/2, CP/M, VMS, UNIX, MS-DOS
25
vii). Security
Modern operating systems implement security policies such that unauthorized users cannot get
access to a computer or network resource.
a)Number of users
i). Single user OS
Used only by one person and runs one user application at a time.
ii). Multi-user OS (multiprogramming)
Enables two or more users to run a program simultaneously. Examples are UNIX, Linux , Windows
XP, Novell, OS/2, Windows 3.11, Windows NT & Windows 2000.
26
b)Number of tasks
i). Single program/tasking OS
Allows processing of only one program in the main memory at a time e.g Ms – DOS.
ii). Multitasking OS
The OS allows a single CPU to execute more than one program at a time e.g. Windows Vista, XP,
etc.
c) Interface
i). Command line
User interacts with a computer by typing a command at the dot prompt found on a command line.
The computer reads the typed command at the command line and executes it. Examples of
command line OS are Ms-Dos, UNIX and OS/2. To apply: Click Start menu>All
Programs>Accessories>Command Prompt.
For example you can copy a file called Fruits.Dat from a hard disk C to floppy disk A type the
following at the command prompt:
COPY C:\ FRUITS.DatA:\
This interface is hard to learn or remember the commands, they cannot process complex graphics
and they hardly make use of emerging hardware and software technologies.
27
Economy of storage – the method should use the least storage possible because memory is a scarce
resource.
Simplicity of maintenance – the method should enable quick navigation through the file system and
make it easy for it to be maintained.
Reliability - the file organization method should be reliable.
Windows organize information in three tier hierarchy i.e;
Files
Folders and subfolders
Drives.
1. File
It’s a collection of related data or information given a unique name for ease of access, manipulation
and storage on a backing storage and stored in one location a. A file has details that indicate:
- A unique name and an optional extension
- Its size, date and time the file was created or modified.
Types of files
There are three are types namely; system, application and data files.
System files : contain information that is critical for the operation of the computer.
Application files: these files hold programs or application files that are executable.
Data files contain user specific data.
The are some file extension;
Extension File type Description
.doc Data A Microsoft Word document file
.txt Data A plain text file created using note pad or DOS editor.
.exe Application file The file that launches a particular application e.g. PM
7.0 .exe, Winword.exe, etc
.bat System files File containing a series of commands loaded during boot
up.
.sys System files System files that perform fundamental operation in a
computer.
Function of file
- Storage of data
- Organization of information
2. Folder / Directory
It’s a named storage area where the user can store related files for easy access. All folders or
directories originate from a special directory called the root directory or folder. The root directory is
represented by a back slash (\).
Sub-folder is a folder or directory within another folder/directory. In Windows folders and sub-
folders icon appear in yellow colour while file icons are mostly white with a fold at the top right
hand corner.
File icon
Folder icon
All folders or directories originate from a special directory called the root directory or folder. The
28
3. Drives
The Operating System views storage media or devices as drives. When creating folder or saving a
file identify a storage location which is more reliable e.g Floppy disk, Compact Disk, Hard disk,
Flash disk etc. Drives may be given labels such as letters A-Z to identify them.
Storage location Drive Remarks
Floppy drive A and B If a computer has two drives, one will be assigned letter A the
other B.
Hard disk C, D, E, F If a computer has 4 hard drives, they may be assigned letters C
– F.
Optical drives D, E, F, G If a computer has one hard disk and three or more CD/DVD
drives, may take any number between D and Z
Other Removables D, E, …Z If a computer does not have an optional drive, any removable
drive attached to the computer can take any letter between D
and Z.
Network drive Logical Network drives takes D – Z depending on the number of
physical drives installed or attached.
Windows Desktop
Desktop is mostly an empty screen that appears when windows starts, and has some standard icons
that show that the computer is ready for use.
Desktop features
Icons – are small images representing objects such as files, application programs, peripheral
devices, operator tools in programs, etc. Are manipulated using pointing devices. Examples icons on
the desktop are My Computer, Recycle bin, Internet Explorer, My Documents, Antivirus, etc.
Task manager: Plain stripe that displays buttons of all currently running tasks.
System tray: Right most part of the taskbar. It has icons of the tasks running in the background but
are not displayed on the screen e.g. Time and Calendar etc. To display the task simply double click
its icon.
29
When you click the Start button, a Start Menu appears which a list of choices is. When you click
any choice in the Start Menu, the list of choices displayed is called Sidekick Menu.
Sidekick
menu
Start Menu
Common Start Menu Items:
All Programs – which displays a list of all programs installed in the computer.
My Recent Documents – which lists the last 15 recently accessed files.
Control Panel – provides tools which user can use to maintain and make changes to the computer
setup.
Control panel – provides options for you to customize the appearance and functionality of your
computer, add or remove programs, and setup network connections and user accounts.
My computer – give access to, and information about, the disk drives, cameras, scanners and other
hardware connected to your computer.
Search –opens a window where you can pick search options and work with search results incase the
user forgets file or folder name or its location.
Help and support – opens a central location for help topics, tutorials, troubleshooting and other
support services..
Run – enables the user to: Install programs on the hard disk, open files and folders from a storage
location, and Run programs from removable media. It also opens a program, folder document or a
web site.
Log on / log off: Log on is a security measure that restricts unauthorized users from accessing
computer resources. It prompts the user for a User name and Password in order to gain access. After
using the computer Log off the computer before leaving.
Booting Up
It is useful to understand what happens behind the scenes when you switch on your computer
from an idle machine to an operable and functional system. There are essentially two forms of
booting - the soft boot and the hard boot. The warm boot or hard boot involves powering the
30
computer up from an initial zero power supply. A cold boot on the other hand takes place when a
software application or operating system triggers the computer to perform a reboot.
A successful boot is dependent on 3 conditions - the hardware, BIOS and operating system files to
function without errors. When an error occurs, you will be notified by error messages, beeping
sounds or in the worst scenario, a blank screen.
Boot-up Process
The boot-up process is a list of detailed procedures that the system undergoes to perform all system
checks and load all necessary files to bring the computer to an operable state.
31
Logging On to Windows XP
You must log on to the PC before you can use it. Each user is given a user name and a password
which must be entered in the log-on screen before Windows will start up. When you log on you
will have access to your own personal space.
The default Login screen for Windows XP computers is appears when you switch on the
machine. To login; Enter your user and password in the respective boxes.
When you enter your password, Windows XP will display a series of
●●●●●●●●●●●s to protect your password from wandering eyes.
Press ENTER on the keyboard or click OK
Windows XP Desktop
Desktop is your work area on which program and files icons are located. it is basically a
workspace where you can access everything you need to operate your computer, such as
system components, applications, the Internet, etc.
32
• Start button: one of the most important tools you will use while working with
Windows XP. The Start button allows you to open menus and start applications.
• Icons (or graphical pictures): represent applications, files, and other parts of the
operating system. By default Windows XP provides you with one desktop icon, the
Recycle Bin. Learn more about the Recycle Bin in a later module.
• My Computer. The My Computer icon provides access to the resources on your
computer. You can access your drives and other peripherals by
33
clicking on the My Computer icon. You can also access the Control Panel through My
Computer.
• Internet Explorer. The Internet Explorer icon launches the Internet
Explorer browser.
• My network places. If you are working on a network, this displays all of
the computers on the network
• System Tray. The part of the taskbar that holds the clock, volume control,
and icons for other utilities that runs in the background of your system.
• Recycle Bin. This is where you dump any files you want to delete.
3. Point your cursor to Microsoft Office Another menu will appear to the right of the All
Programs menu, as shown below. 4. Click on Microsoft Word.
34
Parts of a Window
Windows contain buttons and menus to control the program and window.
Windows are used in most programs, but the good news is once you learn the window of one
program, you will be familiar with the windows for most programs since the window, menu and
button layout appears in just about every window program.
Toolbar
Close Button Closes the window or program, removing it from the screen and the computer’s
memory. Minimize Button Minimizes a program from view. The program is still ready for use
and can be found in the task bar.
Maximize Button Enlarges the window so that it fills the entire screen, allowing
you to see your entire workspace. Notice, when a window is maximized, this button is not
shown.
Restore Button When a window is maximized, this button is shown. Clicking it will make the
window smaller.
Menu Bar Controls what a program does. The menu functions listed will change from program
to program, but the bar is always located at the top.
35
Status Bar Displays information about the program, such as instructions or special information.
Title Bar Displays the name of the program and name of the file in use.
Main Window .This is where you work within a program. If it is Microsoft Word, this is
where you would type, if it is a web browser this is where the web page would be displayed.
Toolbar. Have shortcuts to the menu items
More than one person may use your computer. For example several coworkers may be able to
access your computer on a computer network. Windows XP allows everyone who uses your
computer to have separate computer accounts. A computer accounts tracks each person's unique
settings, documents, and email accounts.
Windows XP even enables you to log off the computer so someone else can log on without
having to restart the computer.
36
When you've finished using Windows XP, be sure to turn off (or shut down) the computer
correctly.
If you're experiencing computer problems or have installed something new, you can simply
restart your computer.
Always turn off or restart your computer using this method. Do not turn off your computer by
switching the power off and on. If you do so, you may damage Windows XP.
37
• Go to File – New – Folder. Or if creating on the desktop right click on the desktop and
use the new option to create a folder.
• The folder will appear at the bottom of your list. When it displays as a black
rectangle with the words New Folder highlighted in blue, it is prompting you to give it
a name. Type the name of your folder and hit Enter.
Renaming a Folder
To rename an existing folder, move your mouse over the name and right click. A
menu will appear. Close to the bottom you will see the word Rename. Click it,
and the black rectangle with the word highlighted in blue will appear. Rename your folder and
hit Enter.
Deleting a folder
• Right click on the folder and select delete or.
• Select the file, go to file menu and select delete
• A dialog box appears asking if you want to delete the folder, click yes Once files are
deleted they go to the recycle bin which is a holding or storage location for files not required.
Such files are still in the hard disk. These files can be retrieved from recycle bin as long as
recycle bin have not been emptied.
Retrieving files
Go to recycle bin.
Locate the file and right click on it and select restore.
38
If any printers are already set up their icon appears in the printer folder (on start, then printers and
faxes).
To set up a printer;
Click start menu, control panel. Select
printers and other hardware.
2. Which of the following has the command for turning off the computers system
(a) Recycle Bin (b) Task Bar (c) Start Button (d) File menu
5. Explain the steps you would follow to create a folder in my documents location.
39
CHAPTER FIVE
WORD PROCESSING
Word processors are programs that enable you to Create, Edit and Format documents. Examples
of word processors are, Microsoft Word, Word perfect, Word star.
Ms Word is a powerful word processing program that helps the user create, edit, format and save
documents.
Loading can also be achieved by clicking the Ms Word icon on the Microsoft shortcut bar
(only if it is available)
The Ms Word screen contains various features. The common ones are:
1. TITLE BAR: This bears the name of the application followed by the name of the
current document or the file.
2. STANDARD BAR: It contains shortcut command buttons for some of the commonly
used commands.
40
6. STATUS BAR: Gives information about the current selection or cursor position.
Ms-Word Screen
When the program starts, the following document window will be displayed on
the screen.
Menu bar Toolbars
Title bar
Vertical
Scroll
Bar
Blinking
Cursor
41
Option 2
2. On the standard tool bar click the ‘New’ (icon)
Saving
Closing
◆ Click close button on the Ms- Word desktop or
◆ From the file Menu click Exit.
SELECT DO THIS
A word Drag over the word or Double click it
A graphic Click anywhere within the graphic
A line of text Drag over the text or Double click at the start of line
A sentence Hold Down Ctrl key and click anywhere in the Sentence A
paragraph Triple click anywhere in the paragraph to select
Entire document From Edit, click Select All
5.4 Formatting
To bold text
◆ Select or highlight the text.
◆ In the format menu click font.
42
To Italicize text
◆ Select or highlight the text.
◆ In the format menu click font.
◆ Under font style choose and click italic.
◆ Click Ok.
To underline text
◆ Select or highlight the text.
◆ In the format menu click font.
◆ Under underlining choose and click the underlining desired.
◆ Click Ok.
Formatting Paragraphs
Word displays text, as it will appear when printed.
43
Aligning text
• Select or highlight the text.
• In the format menu click paragraph.
• Under alignment, choose and click alignment desired i.e. left, right or center.
• Click Ok.
Change case
• Highlight or select the text.
• In the format menu click change case.
• Choose and click the desired case option e.g. upper, lower, title or sentence
cases.
• Click Ok.
44
Page Break
1. Position the cursor where you want the page break to appear.
2. From the insert Menu, click Break then select page break.
3. Click Ok.
Add a background
You can add different backgrounds to Word documents.
1. On the format Menu, point to background and then check the color you want or click
more colors to see additional color choices. Click fill effects for special effects such as
textures.
2. Select the option that you want.
1. From the insert menu, select pictures, and then move to word art and click.
2. Select and click the word art style desired.
3. Type your text in the area “YOUR TEXT HERE”
4. Click Ok.
Insert a picture
You can insert a clip art or a picture from the clip Gallery.
1. Position the insertion point(cursor) where you want to insert a clip art or a picture.
2. From the Insert menu, point to picture then click art then click the clip art tab.
3. Click a clip art category then choose a clipart and click insert clip.
45
undo mistakes
In the edit menu, click undo or click the Undo button on the standard toolbar.
46
Pasting Text
An existing piece of text may be required in a different document. Ms word allows the user
to copy this text rather than retype then paste it to the required area. when text or graphic is
copied or cut, it is stored in the clipboard and can be pasted into as many documents as desired.
Moving text
◆ Select the text to move.
◆ Select Edit, Cut or click cut icon on the standard toolbar.
◆ Position the cursor where you want the text placed.
◆ Select Edit, Paste or click paste icon on standard toolbar.
Note: When you cut, the text is completely removed from the original location.
To find text
◆ On the edit menu, click Edit and choose Find.
◆ In the find what box, type the word/text being sought
◆ Click find next button
◆ To close the dialogue box, click cancel button
To Replace Text
◆ You can find and replace test at the same time
◆ On the edit menu, click edit and choose replace
◆ In the find what box type word / text as above
◆ In replace with box type the word/ text to replace the sought word
/ text
47
48
Sorting
Information in the table can be sorted in either ascending or descending order
49
5.7 Columns
Option 1
Using the column button on the standard toolbar
1. Highlight the text to be columned.
2. Click the column button on the standard bar.
3. Select the number of columns you want.
Option 11
This command control other options i.e. width, spacing, line between columns etc.
1. From the format menu choose columns.
2. Select a column format under preset i.e. one, two, three etc.
3. Type or select the number of columns in the number of column box (if it is not included
under preset in step two above)
4. To insert a line between columns click the line between the check box.
5. Click Ok.
Templates
A template is a document that contains predefined settings. The use of templates ensures that
there is consistency between documents.
To Print a Document
You can print the active document by clicking the print icon on the standard toolbar. This will
not give you the option of choosing a variety of commands.
1. From the file menu, click print.
2. In the name box select a printer.
3. Choose an option for the number of pages to be printed i.e.
ALL: -Prints the entire document
CURRENT PAGE: -prints the current page
50
Mail Merging
If you had to type the same form letter 100 times, you know what boring and back breaking
work it can be. Never again, by setting up the form letter as a Ms Word merge documents, you
need type the letter only once.
STEP 1
1. From the tool menu, click Tool and choose Mail Merge…
2. Under Main document choose Create button
3. Choose form letters…
4. Choose active window button
STEP 2
STEP 3
1. Place the cursor to position of field insertion
2. From the mail merge toolbar click insert merge field
3. Repeat field insertion until all the fields have been insert
4. Choose mail merge helper from the mail merge toolbar
5. Click…merge button
51
Definition of a computer
A
computer is an electronic device capable of executing instructions, developed
based on algorithms stored in its memory, to process data fed to it and produce
the required results faster than human beings.
Different types of
computers
♣ Supercomputer
♣ Mainframe computer
♣ Minicomputer
♣ Workstations
♣ Personal computer
BASIC UNITS
Main Memory
Backing Storage
52
CHAPTER SIX
SPREADSHEETS
Applications of Spreadsheets
1. Can be used to record sales, produce invoices and compile statements.
2. Researchers can compile and analyze their results.
3. Teachers can compile their students’ marks and produce overall results.
4. Clerks and secretaries can easily create tables of figures and manipulate.
START EXCEL
Option 1
Click the start button moves to programs move to Microsoft excel and click
Option 2
Click the excel button on the Microsoft shortcut if only if the option available
53
Window
When you work in Excel, you use workbook files to hold your information. Each
workbook consists of several worksheets made up rows and columns of
information.
A workbook therefore allows you to organize various kinks of related information in a
single file (or workbook)
Worksheet
A worksheet is one sheet in an Excel workbook. Each worksheet consists of 256 columns and
65,536 rows.
Columns
Columns are the vertical divisions of a worksheet that are identified by letters. The columns
begin with A and proceed through the alphabet. The 27th column is AA followed by AB, AC,
and this convention for naming continues through the entire alphabet until you end up with
the last column (column 256) which is designated IV.
Rows
Rows are the horizontal divisions of a worksheet and are identified by numbers.
Cells
A cell is the intersection of a row and a column. Each cell has an address that consists of the
column letter and row number (A1, B3, C5 and so on)
Each cell is capable of containing different types of information e.g. text, number, times, formulas.
Excel data basically comes in two varieties: labels and values.
A value is data that has numerical significance. These include numbers, dates
and times that you enter on your worksheet. Values can be acted on by formulas and functions.
54
Tool
bars Menu bar Formula bar Column Headings
Worksheet tabs
Status bar
Row Headings
Cell Selector
Element Description
Formular bar When you enter information into a cell, it appears in the
Formula bar.You can use the formula bar to edit the
data later. The cell’s location also appears.
Row Headings The numbers down the side of the worksheet, which
Identify the rows in the worksheet.
55
Cell Selector The dark outline that indicates the active cell. It Highlights the cell you
are currently working in.
Active cell It indicates the cell in which the typed data will be
entered. It is also known as the current cell.
Option 2
Click the ‘new’ icon on the standards tool bar
Saving a workbook
1. In the file menu click save as.
2. In the save in text box click and specify the location to save in.
3. In the file name text box type the name of the file.
4. Click save.
NB
The first time you click ‘save as’ from the file menu, the Documents folder is displayed by
default as the folder to save in.
Close a workbook
On the file menu click close.
56
Rename a sheet
1. Double click the sheet tab.
2. Type a new name over the current name.
Hide a sheet
1. Select the sheet you want to hide.
2. On the format menu, point to sheet and click Hide.
57
Use a slash or a hyphen to separate the parts of a date, for example, type 8/6/99 or jun-99
To enter a time based on the 12-hour clock, type a space and then a or p after the time for
example, 9.00 p. Otherwise, Microsoft Excel enters the time as AM.
Enter a formula
1. Click the cell in which you want to enter the formula.
2. Type =(an equal sign)
3. Enter the formula.
4. Press ENTER.
To increment the series by a specified amount, select the next cell in the range
and enter the next item in the series. The difference between the two starting
items determines the amount by which the series is incremented.
58
To undo a complete entry, click Undo button on the standard tool bar.
To select Do this
A single sheet Click the sheet tab.
Two or more adjacent sheets Click the tab for the first sheet and then
59
hold down
SHIFT and click the tab for the last sheet.
Two or more nonadjacent sheets Click the tab for the first sheet and then hold
down
CTRL and click the tabs for the other sheets.
All sheets in a workbook Right click a sheet tab and then click Select All Sheets
on the shortcut menu.
Undo mistakes
To undo recent actions one at a time, click Undo on the edit menu.
To undo several actions at once, click the arrow next to Undo button on the standard
toolbar and select from the list. Microsoft Excel reverses the selected action and all actions
above it.
To undo several actions at once, click the arrow next to Undo button on the standard
toolbar and select from the list. Microsoft Excel reverses the selected action and all actions
above it.
60
Insert rows
1. To insert a single row, click a cell in the row immediately below where you want the new
row. For example, to insert a new row above Row 5,click a cell in Row 5.
To insert multiple rows, select rows immediately below where you want the new
rows, select the same number of rows you want to insert.
Insert columns
1. To insert a single column, click a cell in the column immediately to the right of where you
want to insert the new column. For example, to insert a new column to the left of column B,
click a cell in column B
To insert multiple columns, select columns immediately to the right of where you want to
insert the new columns. Select the same number of columns as you want to insert.
61
3. In the Font size box, click the font size you want (on the formatting toolbar)
Bold B
Italic I
Underlined U
To apply a different color, click the arrow next to Font Color A and then click a color on the
palette.
62
The selected graphic is repeated to fill the sheet. You can apply solid color shading to
cells that contain data.
2. To change the column width for multiple columns, select the columns you want to
change. Then drag a boundary at the right of a selected column
63
heading.
3. To change the column width for all columns on the worksheet, click the Select All
button (at the left edge of the borders) and then drag the boundary of any column heading.
4. To make the column width fit the contents, double-click the boundary to the right of the
column heading
1. Drag the boundary below the row heading until the row is the height you want.
2. To change the row height for multiple rows, select the rows you want to change then
drag a boundary below a selected row heading.
3. To change the row height for all rows on the worksheet, click the Select All button (at the
left edge of the borders) and then drag the boundary below any row heading.
4. To make the row height fit the contents, double-click the boundary below the row heading.
Procedure
1. Position the mouse pointer right on the block like mark in the bottom right
corner of the active cell.
2. Click and drag to extend a series.
6.7 OPERATORS
Operators are signs or symbols which specify the type of a calculation that you may perform in
the elements of a formula.
There are four different types of calculation operators i.e.
64
1. Arithmetic
2. Comparison
3. Text and
4. Reference
ARITHMETIC OPERATIONS
They perform basic mathematical operations e.g. addition, subtraction,
multiplication and division.
COMPARISION OPERATORS
They compare two values then produce a logical value i.e. TRUE or FALSE.
OPERATOR EXAMPLE
= (Equal to) A1=B1
> (Greater than) A1>B1
< (Less than) A1<B1
>=(Greater or equal to) A1>=B1
<=(Less or equal to) A1<=B1
65
REFERENCE OPERATORS
OPERATOR EXAMPLES
:(COLON) Range operators which
produces one reference for all the cells B5:B15
between two references.
FORMULAS
A formula is an equation that analyses data in a worksheet. Formulas perform operations e.g.
addition, multiplication, comparison etc. They can refer to other
cells on the same worksheet as well as other sheets in the same workbook or
even in other workbooks .A formula must always begin with an equal sign or symbol e.g.=10-
5. The result of the formula is then displayed in the cell.
You can use parentheses to change the syntax (structure or order of elements)
e.g. in the formula =5+2*3 Excel carries multiplication first .If the parentheses are used, the
syntax changes.
E.g. =(5+2)*3
FUNCTIONS
This is a special kind of predefined by Excel
The specific arguments required by a function depend on what the function does.
66
AVERAGE: If cell A1 contains value 12 and B1 value 8,the function =average (A1:B1)
returns 10.
MODE: This is the most frequently occurring or repetitive value in an array of data
syntax e.g. =mode (10,3,4,3,5,3,7,3,4)
N/B If a data set has no duplicate values, mode returns the # N/A error value.
MEDIAN: This is the middle value or the number in the middle of a set of
numbers
Syntax e.g. =median (2,4,6,8,10)
Numbers in the middle e.g.
=Median (1,2,3,4,5) equal 3
=Median (1,2,3,4,5,6,) equals to 3.5 and this is the average of 3+4
Error Description
#DIV/0! The formula is attempting to divide by zero. Check the cell references
for blanks or zeros that may have resulted if you deleted a cell
referenced by the formula.
#N/A The formula refers to a cell with a #N/A entry or a cell that
contains no value. This error warns you that not all the data referenced by
a formula is available.
#NAME? Excel doesn’t recognize a name you entered in a formula. Verify that
all names in the formula exist and define any missing names.
If applicable, verify that you used the correct function name.
#NULL! The formula specifies two areas that don’t intersect. Check to
see
if you entered the cell or range reference incorrectly.
Remember to
use commas (not spaces) between function arguments.
#NUM! There is a problem with a number used in the formula. Check for
the correct use of function arguments.
#REF! A cell reference in the formula is incorrect. Check for changes to cell
reference caused by deleting cells, rows or columns referenced by the
formula.
#VALUE! The formula contains the wrong type of argument or
67
Procedure
1. From the tools menu choose and click Data Analysis.
2. From Analysis tools choose and click Descriptive statistics.
3. From the resulting dialogue box, choose as desired as explained below;
Input Range
Enter the cell reference for the range of data you want to analyze. The reference
must consist of two or more adjacent ranges of data arranged in columns or
rows.
Grouped By
To indicate whether the data in the input range is arranged in rows or in columns, click
Rows or Columns.
68
Output Range
Enter the reference for the upper left cell of the output table. This tool produces two columns of
information for each data set. The left column contains statistics labs and the right column
contains the statistics. Microsoft Excel writes a two- column table of statistics for each column
or row in the input range depending on the Grouped By option selected.
New Workbook
Click to create a new workbook and paste the results on a new worksheet in the new workbook.
SUMMARY STATISTICS
Select if you want Microsoft Excel to produce one field for each of the following statistics in
the output table: Mean, Standard Error (of the mean), Median, Mode, Standard Deviation,
Variance, Kurtosis, Skewness, range, Maximum, Minimum, Sum, Count, Largest (#), Smallest
(#), and Confidence Level.
To merge any selection of cells within a row or column, click cells on the Format menu, click the
Alignment tab and then select the Merge cells check box.
69
To use only selected parts of the autoformat, click Options and then clear the check boxes
for the formats you don’t want to apply.
1. Select the cells that contain the data that you want appear in the chart.
2. Click Chart Wizard on the standard tool bar or click insert menu then chart.
3. Follow the instructions in the Chart Wizard.
70
71
Sorting a list
You can rearrange the rows or columns of a list based on the values in the list by sorting.
When you sort, Microsoft Excel rearranges rows, columns or individual cells by using the
sort order that you specify. You can sort lists in ascending (1 to 9,A to Z) or descending (9 to
1,Z to A) order and sort based on the contents of one or more columns.
ZZ
A
1. Click a cell in the column you would like data sort.
2. Click Sort ascending or descending button on the standard toolbar.
72
Autofilter
Displays only those rows that match the value in the active cell and inserts Autofilter
arrows to the right of each column label.
Show all
Displays all of the rows in a filtered list.
Create a spreadsheet using the following information. You have been asked to prepare a
spreadsheet to show the profit and loss figure for the last financial year. The profit and loss
should be shown as a dollars and as a percentage.
1) Enter the raw data below, applying as many presentation Features (Font, Font Size, Font Colour,
Number Formats and Colour, Cell Shading, Text Rotation, etc) to it as you wish.
2) Apply appropriate number formats to your numbers.
3) Give your spreadsheet an appropriate title and center it across your spreadsheet.
4) Select the best page orientation for your spreadsheet.
5) Adjust the column width and row height to suit the layout you have selected.
6) Create formula's to calculate the profit / loss as a currency for each month.
7) Create formula's to calculate the profit / loss as a percentage for each month.
8) Create formula's to calculate the Annual Totals for the Income, expenditure, and profit / loss.
9) Create a formula to calculate the profit / loss for the whole year.
10) Setup an appropriate header for this spreadsheet.
11) Setup a page number for this spreadsheet and place it in the footer.
73
74
CHAPTER SEVEN
These are software that allow records to be entered in the system and to be
retrieved in a specified format. Examples are Ms Access, Paradox, Dbase, FoxPro, Sybase.
From the above examples, we shall look at Ms Access.
7.1 MS ACCESS
MS Access is a database tool used to store, maintain and use a collection of information
that is organized to serve a specific purpose.
Database objects
Tables, Queries, Forms, Reports, Macros, Modules.
Tables
Collection of data about a specific subject e.g. customers, employees e.t.c.
In a table, data is organized in fields (columns) and records (rows)
75
(a) Field name: - these are column headings for the table being created.
(b) Data types: - the attribute of a field that determines the type of data it can
hold e.g. text, Numeric, Currency etc.
(c) Description: - This column is optional but can be used to give a detailed of
the field name.
Primary key: - This is a field that is used to uniquely identify each record stored in a
table.
Queries
A query is a type of database search. It enables you to retrieve data that has met conditions you
specify, indicating data from tables.
The word ‘query’ literally means ‘to ask’. Access queries provide a way of asking about your
data. When you design a query, you identify the fields to be included and the records to be
retrieved from one or more tables.
You can as well update or delete multiple records at the same time, perform built in or custom
calculations on your data.
Forms
They are used for adding new data, editing or displaying existing data. This data can be in a table
or a query. Information entered directly in a form will appear in Tables automatically.
Reports
The desired result of any database is to provide information in the form of reports. You
can print reports from tables or queries in any desired format. Reports are used to
summarize and display data from your database. It displays the most up-to-date
information.
Modules
They are collection of codes using Access Basic programming language. If programming
is necessary, you can write modules.
76
Database definitions
1. Field: This is any piece of information in a database e.g. Names, Age, Birth
date.
2. Record: It is a collection of several related fields.
3. Database File: This is a collection of several records.
Applications of databases
1. Educational applications: Preparing students’ reports, class schedules.
2. Retail applications: This may include sales projections and Quotas,
Market analysis e.t.c.
3. Legal applications: This may include client information and case
schedules.
4. Financial applications: This may include stock market forecasting and
end of year financial reports.
PLANNING REQUIREMENTS
In order to plan an efficient database you need to ask yourself some questions,
these include.
The subject/object here is a student and the suggested field names could be;
i) Student’s name
ii) Student’s registration number
iii) Student’s address
iv) Parent’s name
v) Age
vi) Sex
vii) Course taken
viii) Subjects
ix) Hours a subject takes
x) The lecturer
xi) Lecture’s rate per hour
xii) Tuition fee
77
All the above listed is information about one object – student. There is need
however to limit the list to the subject area only.
Let us assume we wish to store student fee payment records only. This will
reduce above list to the following.
i) Student’s name
ii) Student’s registration number
iii) Student’s address
iv) Course taken
v) Age
vi) Sex
vii) Date of admission
viii) Amount paid
NB: The database name (Macarl student record system) is displayed on the title bar of the
database window.
78
7.3
6. Click data type column and select the data type, (in this case text)
7. Click the description column and describe the field you have just made.
However it is optional and could be skipped.
8. Define all other student’s detail fields by repeating steps 5-7.
9. Close the table and respond affirmatively to ‘save changes’ dialog box.
Save the table as ‘students’
NB: your database now has one table object.
79
A unique field is required in every table. This is an identification key like the national ID
card that identifies each person individually. The unique key is referred to as primary key
in Access. It is useful when you want to avoid entering duplicated records.
If what you design does not have a unique field, Access lets you include a special field
called AutoNumber which contains sequential or random numbers that Access automatically
generates as you add new records.
80
N/B: If Access has already taken AutoNumber as the primary key, delete the
record by choosing it from the border and pressing delete key from the
keyboard.
N/B:
◆ Datasheet view allows you to add records while design you modify the table in
view.
◆ You can rename a field in data sheet view by double clicking the field and typing a new
name
Y Sorting helps to quickly locate the highest or the lowest value in a list E.g. you can sort to
know who has paid the highest amount.
Y It also helps arranging data in order of priority.
Procedure
1) Position the cursor in the field you want to sort.
81
7.4 RELATIONSHIPS
After setting up different tables for each subject in a database, there is need to let access know
how to bring the information back together. The first step in this process is to define
relationships between the tables. After that, queries, forms, reports can be used to display the
information from all the tables at once.
A relationship is an association established between common fields in two tables. It can be one-
to-one, one-to-many or many-to-many relationship. A relationship works by matching data in
key fields usually a field with the same name in both tables.
A one-to-one relationship
In a one-to-one relationship, each record in Table A can only have one matching
record in Table B and each record in Table B can have only one matching record
in Table B.
A one-to-many relationship
A one-to-many relationship is the most common type of relationship. In a one-to-
many relationship, a record in Table A can have many matching records in Table
B, but a record in Table B has only one matching record in Table A.
A many-to-many relationship
In a many-to-many relationship, a record in Table A can have many matching
records in Table B, and a record in Table B can have many matching records in Table A. This
type of relationship is only possible by defining a third table (called a junction table) whose
primary key consists of two fields, the foreign keys from both Tables A and B. A many to
many relationship is really two one-to-many relationships with a third table.
82
Creating a query
Query is a database search. It enables you retrieve data that meets certain criteria.
You can use a query to create a table, a report or a form. When you have a
frequently asked query, you can save it so that each time you need the information,
you just run the query instead of opening the table.
Saving a query
1. Close the query box by clicking ‘X’ button
2. Click yes when prompted to save the query.
3. Type the name of the query in the ‘save as’ dialog box. In our case ‘students
balance s’
4. Click Ok
Procedure
1. Create a new query in the design view.
83
Example: You may decide to raise the fees by 1000,therefore you paid] type [amount
+1000 in the ‘update to’ row of the amount paid field.
7. Run the query.
8. A warning appears informing you that the action cannot be reversed.
9. Click Yes to update the records.
10. Close the query and save the changes.
NB: An update query does not open the records when double clicked, Instead you should open
the table that you run the update query on to view the results.
84
6. Select the field you want delete records from. Choose the criteria of the records e.g.
<01/10/1999
7. Click the run button ‘! ‘
8. A dialog box appears warning you about running the query. Click yes to delete then close the
query.
9. Save the query.
TYPES OF TOTALS
Types of Calculations Used to calculate
Sum The total values in a field
Average The average values of a field
Minimum (Min) The lowest value in a field
Maximum (Max) The highest value in a field
Count The number of values in a field
StDev The standard deviation of values in a field
Var The variance of values in a field
First The field value from the first record in a table or a
query
Last The field value from the last record in a table or a
query
85
3. The ‘Make Table’ dialog box appears. In the ‘Table Name’ type the name of the table
you want to create, or click the one you want to replace from the drop down menu.
4. Click “Current Database” to put the new table in the open database, or “Another
Database” and type the name of the database you want to put the new table in.
5. Click Ok.
A parameter query is a query that when run displays its own dialog box prompting you for
information, such as criteria for retrieving records or a value you want to insert in a field. You
can design the query to prompt you for more than one piece of information; for example, you
can design it to prompt you for two dates. Microsoft Access can then retrieve all records that
fall between those two dates.
To prompt the user for one or more characters to search for, and then find records that
begin with or contain the characters the user specifies, create a parameter query that uses
the LIKE operator and the wildcard symbol (*). For example.
For a field that displays dates, you can display the prompts "Type the beginning date:" and "Type
the ending date:" to specify a range of values.
Procedure
1 .In the database window, click the query tab.
2. Click the ‘New’ button and then select design view.
3. Click OK.
4. The show table dialog box appears. In this dialog box, you select the
table(s) that you want to base your query on.
5. Select the table and click Add.
6. Click close to close the dialog box and get to the query window.
7. Place the cursor in the row for ‘field’ and click to chose the field(s) you
want in your query.
8. In the field's Criteria cell, type Between [Type the beginning date:] And
[Type the ending date:].
9. Click the run button ‘!’ on the toolbar.
10. Save the changes you have made.
86
3. Click OK.
4. The show table dialog box appears. In this dialog box, you select the table(s) that
you want to base your query on.
5. Select the table and click Add.
6. Click close to close the dialog box and get to the query window.
7. Place the cursor in the row for ‘field’ and click to chose the field(s) you want in your
query.
8. In the field's Criteria cell, type
LIKE [Enter the first character to search by:] & "*"
7.6 FORMS
87
(d) Click the name of the table or query that includes the data you want to base your form on.
(e) Click Ok
Procedure
1) In the database window, click the tables tab then click new or use an existing
table.
2) Click design view then Ok
3) Designate one of the field for the O.L.E. The field name could be photo, picture etc.
For its data type, select O.L.E. objects.
4) Close the table and save the changes.
5) Open the table.
6) Right click the O.L.E fields(s) then insert object.
7) From the object type list, select a category i.e. Microsoft clip gallery then
click Ok.
8) Select a clip then click insert.
NB/ The object will always be seen whenever you open a form based on the table or query
that has the O.L.E field.
88
7.7 REPORTS
Reports are used to analyze data or present it in a certain way in print. A report could be that
which groups data and calculates totals and another different data formatted for printing mailing
tables.
Procedures
89
Required
1. Create a data entry form in design view and apply your own design in the form
2. Enter the above records using the form above
3. The semesters fees is 60,000 Kshs. Produce a list of students who have cleared the
fees
4. Produce a list of Female students taking a course in education
5. Produce a list of students who were born before the year 1990
6. Product a report that will show the current students grouping them by their respective
courses
7. Prepare a report showing a list of students who have cleared their fees
8. Prepare a macro that will open no 3 above and open the report on 7 above.
90
CHAPTER EIGHT
PRESENTATION GRAPHICS
MS POWERPOINT
INTRODUCTION
What is PowerPoint?
This is a complete presentation graphics package.
It gives you everything you
need to produce a professionally looking presentation. It enables you to express your ideas in
graphics, text and objects all in one.
What is presentation?
It is a collection of slides, handouts, speaker’s note, and outline all in one file. As
create a slide you are creating a presentation, giving it a format that will carry
through from beginning to the end.
What is a slide?
Slides are individual pages of your presentation. Slides have titles, text, drawn
objects, shapes, clip arts, and visuals created with other application.
Starting PowerPoint
From the start menu select programs and the move to PowerPoint and click.
91
1. AutoContent Wizard: This contains suggested contents and designs. The AutoContent
wizard contains sample presentations for a variety of topics
e.g. a company meeting or an event planning.
2. Templates: This determines the presentation’s design but does not include contents.
3. Blank presentation: This enable you to choose the layout desired hence helping you
to have a customized presentation.
92
Applying background
1. Choose the slide you want to apply background (if you have several) by
scrolling.
2. In the format menu choose background and click.
3. In the drop down list choose the color desired (click more colours to view more)
4. Click apply.
Applying design
1. Choose the slide you want to design.
2. In the format menu choose, apply design, and click.
3. In the resulting dialog box, choose the desired design.
4. Click apply.
93
◆ Slide or notes page Drag the vertical scroll bar until you get
The slide.
◆ Outline Double click the slide icon.
◆ Slide sorter Double click the slide.
◆ Slide show Right click, point to ‘GO’ on the
shortcut
Menu, and click slide Navigator.
Deleting a slide
1. Select the slide you want to delete
2. On the Edit menu, click Delete Slide
PowerPoint comes with its own set of pictures in the clip art gallery. The clip art gallery includes
a wide variety of clip arts that makes it easy for you to dress up your presentation with
professionally designed images. You will find everything from maps to people and from
buildings to scenic backgrounds.
94
N.B : In the slide layout, you can choose a layout with the organization chart.
Using Templates
This option helps you to create slides with a particular chosen design. E.g. Blush,
Fireball, Fan etc.
8.6 ANIMATION
You can animate text, graphics sounds, movies, and other objects on your slides so as to focus
on important points, control the flow of information, and add
95
interest to your presentation. You can have each main bullet point appear independently of others,
or you can have objects appear progressively, one after another.
You can set up the way you want each bullet point or object to appear on your slide e.g. to fly
in from the left and whether you want other bullets or objects to dim or change color when you
add a new element. You also change the order of timing of your animation.
96
8.8 PRINTING
You can print your entire presentation either in black and white or color.
1. Open the presentation you want to print.
2. Click print from the file menu.
3. In the resulting dialog box, choose and click as appropriate.
4. Click okay.
8.9 Margins
PowerPoint does not have fixed margins as in word processing programs. You can place text
and objects right up to the edge of a slide. You align objects by resizing their placeholders.
97
1. You are the marketing manager of Mount Kenya University and you are
required to make a presentation at the Inter-University conference about Mount
Kenya. The presentation should not be less than 15 slides and should also have the following
features;
- Slides with the different layouts i.e Organisation chart, Chart, Tables, clip art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
2. You are the marketing manager of Mount Kenya University and you are
required to make a presentation at the Inter-University conference about Mount Kenya. The
presentation should not be less than 15 slides and should also have the following features;
- Slides with the different layouts i.e Organisation chart, Chart, Tables, clip
art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
3. You are the marketing manager of Mount Kenya University and you are required to make a
presentation at the Inter-University conference about Mount Kenya. The presentation should not
be less than 15 slides and should also have the following features;
- Slides with the different layouts i.e. Organization chart, Chart, Tables, clip
art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
98
CHAPTER NINE
3. What is the difference between the internet and the worldwide web?
(a)E-Mail (b) Internet relay chat (c) Google (d) Video Conferencing
99
Chapter 1.
1. C 2. D 3. A 4. D 5. True
Chapter 2
1. D 2. B 3. B 4. D 5. C
Chapter 3
1. A 2. D 3. B 4. A 5. D
Chapter 4
1. D 2. C 3. True 4. A
5. Locate the place to create your folder e.g. My Documents, Desktop, C Drive Go to File –
New – Folder. Or if creating on the desktop right click on the desktop and use the new option to
create a folder.
The folder will appear at the bottom of your list. When it displays as a black rectangle with
the words New Folder highlighted in blue, it is prompting you to give it a name. Type the name
of your folder and hit Enter.
Chapter 9
1. B
2. D
3. This is a special part of the internet that allows people to view information
stored on participating computers.
4. A
5. C
100
Mt Kenya University
UNIVERSITY EXAMINATION
Instructions
Answer question ONE and any other TWO questions
Q1 (a) Define the following computer terms
(i) BIT
(ii) BYTE
(iii) Output
(iv) Virus
(v) Software
(10 marks)
(b) Computers have evolved through many generations over the years. State and
explain the five generations the computers have evolved through (5
marks)
Q2 Word Processing
(a) (i) Explain what
a font is. (2 marks)
(ii) Name two different fonts. (2 marks)
(b) State the two different page orientations a word processed document can be set to.
(2 marks)
(c) Describe how you would carry out the following word processor operations:
(i) Opening an existing document (2 marks)
101
(d) (i) Explain why you might want to change the size of the margins of a word
processed document such as a letter or report. (2 marks)
(ii) Name two word processing tools which can help proofread a
document.
(2 marks)
(e) Below are images of three button icons from a word processing program.
For each image describe the purpose of the button.
(Total 20 marks)
Q2 Spreadsheets
(a) Explain what the following spreadsheet functions do, illustrating your
answer with an
example of how the function could be used:
(i) SUM
(ii) AVERAGE
(iii) COUNT (9 marks)
(b) The image below shows a partially completed spreadsheet that will be used for
creating invoices.
An individual Item Total is calculated by multiplying Price and Quantity.
The Items Total figure is calculated by adding up all the individual Item Total
figures.
The Tax (10%) figure is calculated as 10% of the Items Total figure.
The Invoice Total is calculated by adding the Items Total and the Tax (10%)
figure together.
102
(i) State a formula that correctly calculates the Item Total figure in E7. (2 marks)
(ii) State what the most efficient formula is to calculate the Items Total figure in
E12.
(2 marks)
(iii) State a formula that correctly calculates the Tax (10%) figure in E13. (2
marks)
(iv) State a formula that correctly calculates the Invoice Total figure in E14.
(2 marks)
(c) Suggest a
change to the formatting of the spreadsheet in order to improve the presentation of the
spreadsheet. (1 mark)
(d) Suggest a suitable folder name and file name for saving the spreadsheet.
(2 marks)
(Total 20 marks)
Q4 Database
(a) Explain what the following database terms mean.
(i) Record (sometimes called row) (2 marks)
(ii) Field (sometimes called column) (2 marks)
(iii) Table (2 marks)
(b) Give an example
of what a business might use a database for. (2 marks)
(c) State the most appropriate data type for storing each of the items of data
listed below.
(i) +44 (0)20 8329 2930 (1 mark) (ii) 21 July 1969 (1 mark) (iii) 3.1415 (1 mark)
(d) Below is a screenshot of part of a database. Refer to it when answering the questions
below the database.
(i) Explain what the problem with this design is. (2 marks)
(ii) Describe what changes you would make to improve the design of this database.
(2 marks)
(e) For queries on the data shown above:
(i) How many records would be displayed if a criterion of >50 was set for the age field? (1
mark)
100
(ii) What criteria would you use to display records of people aged from 20 to 45
years inclusive? (2 marks)
(iii) What criteria would you use to display records of people that are younger
than21 years or with the Forename James? (2 marks)
(Total 20 marks)
Q5 Electronic Mail
(a)Explain what the following e-mail terms mean.
(i) Junk mail (also known as spam) (2 marks)
(ii) Zip (2 marks)
(iii) Cc (also known as Carbon Copy) (2 marks)
(iv) Reply to All (2 marks)
(b) Describe two precautions you should take when using e-mail and explain
why each
precaution is necessary. (4 marks)
(c) Reply and Forward are two very useful e-mail commands.
(i) Explain one similarity between Reply and Forward. (2 marks)
(ii) Explain one difference between Reply and Forward. (2 marks)
(c) Name two internet software and internet browsers (4 marks)
(Total 20 marks)
10
Mt Kenya University
Instructions
Answer question ONE and any other TWO questions
(d) Explain the main units of the Central processing unit (CPU) giving their functions (6
Marks)
(e) Differentiate
between RAM and ROM (3 marks)
Q2 Word Processing
(a) (i) Explain what
a font is. (2 marks)
(ii) Name two different fonts. (2 marks)
(b) State the two
different page orientations a word processed document can be set to. (2 marks)
(c) Text can be aligned in different ways to improve the appearance of a
document.
10
State two different kinds of paragraph alignment, and for each give an example of its use.
(4 marks)
(d) (i) Explain why it is important to proofread a word processed document.
(2 marks)
(ii) Name two word processing tools which can help proofread a document.
(2 marks)
(e) Below are images of three button icons from a word processing program.
For each image describe the purpose of the button.
(Total 20 marks)
Q3 Spreadsheets
(a) Explain what each of the spreadsheet terms listed below means.
(i) Cell (ii) Worksheet (iii) Formula
(6 marks)
(b) Below is an image of an incomplete spreadsheet for recording results of a
sports
league. In each match a team may win, lose or draw.
A win scores 3 points, a draw scores 1 point and a loss scores 0 points.
(i) Write down a formula to input into cell E8 that calculates the number of games
played by the Eccles team. (2 marks)
(ii) Write down a formula to input into cell F8 that calculates the number of points
scored by the Eccles team. (4 marks)
(iii) Write down a formula to input into cell G8 that calculates the average number of
points the Eccles team gets per game. (2 marks)
(c) State what formatting should be applied to the figures in column G to make
them easier to read. (2 marks)
(d) (i) Explain what
a macro is. (2 marks)
(ii) Outline how a macro could be used in a spreadsheet. (2 marks)
10
(Total 20 marks)
Q4 Database
(a) Explain what the following database terms mean.
(i) Record (sometimes called row) (2 marks)
(ii) Field (sometimes called column) (2 marks)
(iii) Table (2 marks)
(b) Give an example
of what a business might use a database for. (2 marks)
(c) State the most appropriate data type for storing each of the items of data listed
below.
(i) +44 (0)20 8329 2930 (1 mark) (ii) 21 July 1969 (1 mark) (iii) 3.1415 (1 mark)
(d) Below is a screenshot of part of a database. Refer to it when answering the questions
below the database.
(i) Explain what the problem with this design is. (2 marks)
(ii) Describe what changes you would make to improve the design of this database.
(2 marks)
(e) For queries on the data shown above:
(i) How many records would be displayed if a criterion of >50 was set for the age
field? (1 mark)
(ii) What criteria would you use to display records of people aged from 20 to 45
years inclusive? (2 marks)
(iii) What criteria would you use to display records of people that are younger than
21 years or with the Forename James? (2 marks)
(Total 20 marks)
Q5 Electronic Mail
(a)Explain what the following e-mail terms mean.
(i) Junk mail (also known as spam) (2 marks)
(ii) Zip (2 marks)
(iii) Cc (also known as Carbon Copy) (2 marks)
(iv) Reply to All (2 marks)
10
(b) Describe two precautions you should take when using e-mail and explain why each
precaution is necessary. (4 marks)
(c) Reply and Forward are two very useful e-mail commands.
(i) Explain one similarity between Reply and Forward. (2 marks)
(ii) Explain one difference between Reply and Forward. (2 marks)
(c) Name two internet software and internet browsers (4 marks)
(Total 20 marks)
10