Professional Documents
Culture Documents
SESSION 1
INTRODUCTION
Computers play a key role in how individuals work and how they live. Even the smallest
organizations have computers to help them operate more efficiently, and many
individuals use computers at home for educational, entertainment, and business
purposes. In this tutorial, you will learn the basics about computers, the different
categories of computers, hardware and software, and how to maintain your computer.
You will also learn about productivity software applications, computer applications in
education and explore various technology issues that are related to computers such as
security, privacy and ethics.
WHAT IS A COMPUTER?
A computer is an electronic device capable of accepting data in a convenient form, which
is automatically processed following sequential set of instruction called program, which
is also stored in a device, and producing results known as output or information.
In other words, a computer is any electronic device that takes an input in some logical or
mathematical manner and producing the resulting output to the environment. The
memory and the processor are responsible for transforming data into information.
WARES OF A COMPUTER
A computer system is made up of three wares namely live-ware (user or end-user),
software and hardware.
Live-ware: This is the user of the computer. Without the user (person), the computer will
not be able to work.
Software: They are the programs or list of instructions that makes the computer run.
They are therefore, the parts of the computer that cannot be seen or touched; they are
not physical. Without the software the computer will not work. The three types are the
system software, application software and programming software.
1
Hardware: They refer to the physical components or devices of the computer system.
That is the things that one can see and touch. Examples include the keyboard, printer,
mouse, scanner, monitor, and the joystick. The inputs, outputs and backing storage units
connected to the computer are referred to as peripheral devices.
CLASSIFICATION OF COMPUTERS
Computers can be classified in three ways namely,
(i) Capacity (ii) Type and (iii) Purpose
BY CAPACITY/SIZE
In the earliest stages of electronic computer development, capacity was sometimes
measured in terms of physical size. Today physical size is not a good measure of
capacity because late models of computers have achieved compactness as a result of
development of integrated circuits (IC). Because of the ability of computer scientists and
engineers to fit more computer power into less and less space, modern desktop
computers have as much power as or more than the room–size computers built several
decades ago.
Capacity is now therefore expressed in terms of the volume of work that the
computer can handle, the speed of processing it and functional units of the CPU.
Price and size are also considered. However rapid changes in technology make firm
definitions of these categories very difficult. Computers under capacity are basically
classified in five ways as:
i. Microcomputers/Personal Computers (PCs)/ Micros
ii. Servers
iii. Minicomputers/ Mini-frames
iv. Mainframe/Maxi computers and
v. Supercomputers.
Microcomputers
It is the smallest and cheapest systems. The part of a microcomputer that does the
actual computing is the tiny silicon chip, the symbol of ‘H-Tech’. The economy and
small size of the microcomputer have made possible the spread of individual owned and
operated personal computers.
They have a memory access time about 100 nanoseconds and handle 8-bit, 16-bit or
32-bit words. The original ones handle 4-bit words. Types of microcomputer include
handheld, palmtop, notebook, sub notebook, Laptop, Pen inputs (e.g. Personal
Digital Assistants, PDA), Desktops, Towers, and Workstations. Apart from the last
three, the rest are considered to be portable computers.
1. Handheld computers are designed for specific purpose such as meter reading,
which is for workers who stand on their feet.
2
4. Sub notebooks are smaller versions of notebooks, Weigh less than four
pounds and may or may not have a disk drive but have special purpose memory
cards for storage.
5. Laptops are larger versions of notebooks and have large capacity disk storage
devices and larger screen. Weigh between eight and fifteen pounds.
6. Pen inputs are specialized portable computers that use a pen-like device for
data entry. It has special software that recognizes handwritten input. The pen can
be used as pointing service to select a processing choice on the screen or write
information on a special input screen. One type of small pen input system is a
Personal Digital Assistant (PDA)/ Personal Communicator, which combines
pen input, writing recognition, personal organization tools, and communication
capabilities such as voice or fax. An example is Apple Newton PDA.
7. Desktops sit on top or alongside a desk yet are too big and heavy to carry
around. They have separate display screens.
Examples include:
1. Apple Macintosh- Classic 2, Colour Classic, iMac
2. IBM – PS/2, PS/1, PS/Value point. Note that PS/2 = Personal system 2
3. IBM compatible such as Compaq, Dell, Gateway, Packard Bell, AT&T-
Globalyst.
8. Towers are personal computers in an upright case. They are the most powerful
and can be full-size, which have more room for expanding the system and
adding more optional equipment or mini-tower case, half the size of full-size,
with less expansion room than desktop but takes up less room.
10. Server computers are designed to support a computer network that allows users to
share files, applications software, and hardware such as printers. Server
actually describes how a computer is used if it can support a network. Of
late, however servers have been specifically designed for network use.
Characteristics:
1. Designed to be connected to one or more networks
2. Most powerful CPUs available
3. Capability to add more than one CPU to divide the processing tasks
(some can use up to 32 CPUs)
4. Large memory capacity
5. Large disk storage capacity, made up of numerous small disks
6. High speed internal and external communications.
MINICOMPUTERS
Minicomputers make up the middle class of computer size and power. They are
physically bigger than micros and handle 32-bit words. The original ones were 12-bit
3
words. Memory access time is as fast as 75 nanoseconds. They are mostly special–
purpose Computers. They also require a high–speed line printer and can support about
20 terminals.
Examples include: note: refer to the eg on special purpose computers.
IBM System 36(S/36), Advance system 400 (AS/400).
DEC PDP – 8 and PDP-11
Vax-11/780, Vax-11/750, Vax-11/782, Vax-11/730.
Minicomputer systems are usually larger and more powerful than microcomputer
systems and smaller and less powerful than mainframes. However, this is not always the
case. There are some micros that are more powerful than the smallest minis and
large minis that are more powerful than smaller mainframes.
Mainframes
The mainframe computer is used principally by large organizations such as Universities,
large businesses, airlines, hospitals, government agencies and manufacturing
companies and by computer service organizations such as service bureaus. These are
large, powerful and expensive general-purpose computers with a range of powerful
input/output, processing and storage facilities. It process 64-bit words. They have an
access time of 15 nanoseconds. They support 100 or more terminals and need a very
high–speed printer.
Examples are IBM 360 and 370 (earliest), IBM 3084 and IBM 4381 (latest), Burroughs
B7900, Amdahl 5860, Cyber 170 model and 855 and NCR 8400.
Supercomputers
The largest and most powerful of the mainframes, used primarily by government and by
scientists are called supercomputers. They are used when organizations require
extraordinary amounts of computing power like the weather services, airline
reservations. In these organizations, vast amount of information must be processed in
short time to provide fast response to users. It can process great quantities of data
extremely quickly and can do in several hours, the work that normally takes weeks on
conventional large mainframes.
Examples are Cyber 205, Cray X-MP, Cray 2 and Cray I (this was for several years the
fastest computer in the world). Cary X-MP is five to eight times faster than Cray 1.
CLASSIFICATION BY TYPE/NATURE
Basically there are three types of computers under this classification, and these are,
Analog, Digital and Hybrid. This classification is done using the manner in which data
are computed.
Analog computers
Analogs are so named because they perform computations by setting up physical
situations that are analogous to mathematical situations. Analog computers calculate by
measuring the continuous variation in some physical quantity such as pressure,
temperature and speed. The computers are essentially measuring devices like
speedometer, thermometer, and voltmeters. The thermometer for instance compares or
draws an analog between the expansion of mercury in it and the surrounding
temperature. The speedometer in a car for instance computes speed in miles per hour
by measuring how fast the car’s wheels are rotating. As the car goes faster, the
4
movement of speedometer needle shows the computed speed. The oil-pressure gauge
in the car is another example. Analog computers usually have pointers for reading
values anytime.
The output is often in the form of smooth graph from which information can be read.
Many physical phenomena may be used to construct analog computers but since
electrons are so mobile, analog computers perform mathematical operations with the aid
of electronic circuits. Vannevar Bush, an American scientist built the first analog
computer. Analog computers are used mainly for scientific and engineering purposes.
Digital computers
As the name suggests, digital computers are basically counting devices. The digital
computer solves problems by counting precisely, adding, subtracting, multiplying,
dividing and comparing. It is the most common computer used in data processing
environments. Since most business data are in discrete form, the digital computer is
readily adaptable to business data processing applications. The speedometers of
some car models are digital. Eg. They are general purpose computers.
Hybrid computers
Although computers are basically of analog and digital make, there is a third type in the
market known as hybrid computer. Hybrid computers combine analog and digital
capabilities in the same computer system. This type of computer usually finds
applications in the industries.
CLASSIFICATION BY PURPOSE
Depending on the flexibility of operations or ease of adaptability, computers are
divided into special or general purpose.
5
5. Many home appliances such as refrigerators, TVs, heaters and microwave
ovens contain small computers to control the appliance.
6. Most cameras have device that controls the shutter amount of light reaching
the film
7. Monitoring and controlling the operation of a nuclear power plant, oil refinery
or steel plant.
8. Controlling a military weapon system.
9. Regulating city traffic control operations
10. Directing operations of spacecraft, airplanes, tankers, ship submarines.
11. Managing manufacturing machinery.
12. Operating hospital procedures such as CT Scanners.
13. Navigational system of an atomic submarine.
General–Purpose Computers
These are designed to solve a wide range of problems. They can perform any task
required simply by changing the application program stored in their main memory. This
makes it possible to use such a computer for task such as banking, accounting, and
scientific analysis. For instance, a desktop computer can be used to play games, write
letters, draw pictures, or solve mathematical problems.
COMPUTER BRANDS/MODELS/SPECIFICATION
EG. MACINTOSH, DELL, IBM, COMPAC, TOSHIBA, HP,
SPECIFICATION: P1,P2,P3,PENTIUM M. (PENTIUM BY INTEL
MANUFACTURING COMP. CALLED THEIR PRODUCTS PENTIUMS) AMD
CELERON CYRIX -
COMPUTER SYSTEM
A computer system consists of four parts, namely:
1. Hardware (computer)
2. Software (programs)
3. Data
4. People/ users/ end-users
PARTS OF A COMPUTER
There are three main parts of the computer namely the
1. Keyboard 2. System unit and 3. Monitor
The mouse has become a fourth integral part of the computer of late due to its
versatility.
Monitor
System
unit
6
SESSION 2
WHAT DOES COMPUTER DO?
FUNCTIONS: CP HAS A DEVICE ACCEPTS INPUT & PROCESSES IT, AND STORES
IT OR OUTPUT IT.
Data can be either numeric or non numeric (text or word). Drawings, addresses of
friends, test scores, and signals sent from or received by other items of technology are
all examples of data in different applications. Data normally derived their meaning in the
context of an application. For example, in a monthly sales application the value 31-06, is
a datum and identifies a day and month. Likewise in a payroll application data 123-45-
7890 could be a social security number. Data therefore is the raw facts from which
information can be extracted.
Information is the result of processing data into a form that can be useful to the
computer user and is usually organized and understandable. Information is therefore
processed data. The characteristics of information are:
1. Timely: Information must be ready when needed for correction and decision-
making.
2. Precise: It must be exact and meaningful information.
3. Relevant: It must be necessary and important for the purpose intended.
4. Concise: It must be short and brief for easy understanding
5. Compact: It must be handy, bearing in mind relevance.
6. Accurate: It must assume high level of correctness.
7. Cost effective: It should not cost too much to obtain information.
7
either magnetized or non-magnetized in one direction or in the opposite direction;
a pulse or voltage is present or absent. All data is represented within the computer
by the presence or absence of these various signals.
In a two state on /off arrangement, one state can represent a 1 digit whereas the other
as 0 digit. Therefore, the basic number system used by the computer is the binary
system (Bi-means “two”). This two-state situation allows computers to use the
binary system to represent data and programs. In the binary system, each 0 and 1
is called a bit, which is the short form of binary digit or binary unit. Thus, in the
computer the 0 can be represented by the electrical current off (or at low voltage) and
programs that go into the computer are represented in terms of these numbers. Bits can
be grouped in various combinations to represent characters of data such as numbers,
letters, and punctuation marks.
8
With floating point numbers the position of the point varies from number to number. It is
therefore used to represent mixed numbers (numbers that have an integer part and a
fraction part). This concept is used in scientific notation. 43 x 10 -2. Examples include
437.5, 43.75, and 4.375. Since the position of the point is not fixed or predefined it is
necessary for the computer to store this position.
There are many coding schemes. Two common ones are EBCDIC and ASCII
(pronounce “ask-ee”). Both commonly use 8 bits to form each character, or byte,
providing up to 28 = 256 combinations with which to form letters numbers and special
characters, such as mathematical symbols and Greek letters. One newer coding scheme
uses 16 bits, enabling it to represent 216 = 65,536 unique characters.
EBCDIC, which stands for Extended Binary Coded Decimal Interchanged Code, is
commonly used in IBM mainframes. EBCDIC is an 8-bit coding scheme, meaning that it
can represent 256 (28) characters. The problem with this scheme is that it is used only in
IBM machines. To resolve this problem, the next code was developed.
ASCII, which stands for America Standard Code for Information Interchange, is the most
widely used binary code with non-IBM mainframes and virtually all microcomputers.
Whereas standard ASCII originally used 7 bits for each character, limiting its character
set to 128 (27) the more common extended ASCII uses 8 bits generating 256(2 8) unique
characters.
Unicode: Although ASCII can handle English and European languages well it cannot
handle all the characters of some other languages, such as Chinese and Japanese.
Unicode, which was developed to deal with such languages, uses 2 bytes (16 bits) for
each character, instead of 1 byte (8 bits). It therefore can handle (216) 65,536 character
combinations rather than just 256. Although each Unicode character takes up twice as
much memory space and disk space as each ASCII character, conversion to the
Unicode standard seems likely. However, because most existing software applications
and databases use the 8-bit standard, the conversion will take time.
Parity schemes may be even parity or odd parity. Even parity works by counting the
numbers of 1’s in a binary number and if that number is odd, adding an additional 1 to
guarantee that the total number of 1’s is even. On the other hand, if that number is even,
9
the parity bit of 0 is added to make it even. For example, ASCII letter H (01001000)
consists of two 1’s thus, the ninth bit, the parity bit, would be 0 in order to make an even
number of 1’s.
Likewise, with the letter 0 (01001111), which has five 1’s the ninth bit would be 1 to make
an even number of 1’s. The system software in computer automatically and continually
checks the parity scheme for accuracy. Odd parity works in a similar manner but it
guarantees that the total number of 1’s is an odd number.
A fifth stage is often attributed to this cycle, which is the archiving or deletion of
unwanted data.
DATA PROCESSING
Data processing is the manipulation of data into meaningful information by manual,
mechanical or electronic method. It is also referred to as the conversion of data into a
more refined form (information).
10
3. Manipulation (PROCESSING)
The original form of data is usually not disputable for any action to be taken, decision to
be made, knowledge to be acquired. So there must be a form of conversion of the
original data into a more useful form. The manipulation is accomplished by means of one
or more of the following procedures.
4. Communication of Information
It is the process of transferring data or information from one point to another
during the data processing cycle or delivering the results to the users. Methods used to
communicate data ranges from transporting, which involves usually the use of
conveyor mechanism, or by hand delivery. Communication could also be done by the
use of electrical transmission of coded data. This transmission could be achieved by the
use of telephone or telegraph circuit, microwaves or radio transmission, and sometimes
through satellite.
LITERACY
Literacy is the ability to read and write. In modern context, the word means reading and
writing in a level adequate for written communication and generally a level that enables
one to successfully function at certain levels of a society.
11
There are so many types of literacy such as business, media, information, computer,
technology, visual, and health but for the purpose of this course in computing the
following will be considered:
i. Computer literacy
ii. Information Literacy
iii. Integration Literacy
Computer Literacy
It is the level of expertise and familiarity someone has with computers. Computer
Literacy generally also refers to the ability to use application rather than to program.
Individuals who are very computer literate are sometimes called power users. In other
words, it is the knowledge and ability to use a computer and its software efficiently to
accomplish practical tasks.
It refers to the comfort level one has with using computer programs and other
applications that are associated with computers. Such a person should know how
computers work and operate.
Information Literacy
Information Literacy is defined as the ability to know when there is a need for
information, to be able to identify, locate, evaluate, and effectively use that information
for the issue or problem at hand.
Integration literacy
Integration literacy refers to ones ability and level of competence to incorporate
technology resources and technology-based practices into daily routines, work, and
management of schools. Technology resources are computers and specialized
software, network-based communication systems, and other equipment and
infrastructure. Practices include collaborative work and communication, Internet-based
research, remote access to instrumentation, network-based transmission and retrieval of
data, and other methods.
It is important that the integration is routine, seamless, and both efficient and effective
in supporting school goals and purposes. The conditions necessary in a school to
support the integration of technology are the physical facilities, capacity, and
conditions, curricular connections, teacher actions and characteristics, student
activities, and support.
12
SESSION 3
WHY ARE COMPUTERS SO POWERFUL?
The following are some of the things that make computers powerful/advantageous:
1. Speed: computers can calculate tens of millions of times faster than the human brain
and in seconds solve problems that would take dozens of experts some years to
complete: Computer speeds are measured in four or more ways:
Millisecond (one-thousandth of a second = 1 x 10-3 second)
Microsecond (one-millionth of a second = 1x10-6 second )
Nanosecond (one-billionth of a second = 1x 10-9 second)
Picosecond (one-trillionth of a second = 1 x 10-12 second)
Femtosecond (one-quadrillionth of a second = 1 x 10-15 second)
2. Accuracy: Even the fastest machine in the world would be of little use if it made
mistakes that human had to check and correct. Fortunately, computers are accurate
machines that can process large volumes of information according to complex and
receptive procedures. Remember that whenever your computer gives you the
wrong result it implies that the computer had a wrong data from you hence “GIGO”
(Garbage In Garbage Out).
5. Versatility: the computer can be used to solve many problems provided a suitable
program can be written. It is not like the human who is restricted to only one or two
professions.
7. Storage: With computers, records are stored on the diskettes that don’t occupy any
significant space on the table. In fact billions of characters are stored on disks that
virtually occupy a small space.
DISADVANTAGES OF COMPUTERS
1. Computer breakdown: when a computer system breaks down or when there
is power failure, the computer cannot be used and that highly hinders the work of
an organization.
2. Extensive system analysis and programming: The computer is run by
software which is prepared by skilful system’s analyst and programmers. Several
13
years of investigation and preparation may have elapsed before the software
becomes operational.
3. Computer fraud: It refers to the illegal use of the computer system or the
manipulation of computer programs for personal gains.
4. Invisible processing: Data being operated or processed by the computer is
invisible by the human who is using the system or machine. Therefore, he or
she cannot appreciate the work of the computer.
5. Initial cost: The initial cost of a large installation is very high. Therefore, it may
scare many people and organizations from computerizing their operations.
6. Dislocation of employees: Since computers can combine the work of several
employees into software, such employees may be redundant.
SESSION 4
COMPONENTS OF A COMPUTER
HARDWARE AND SOFTWARE.
There are basically two components of a computer namely hardware and software.
HARDWARE
Hardware is the term used to define all the physical component of the computer system.
That is the part of the computer that can be seen or touched. Examples are the Input
devices such as keyboard, mouse, scanner, digitizer, a light pen, a joystick and modem,
and Output devices such as monitor, printer, and modem, System Unit (memory and
CPU and other components), and Storage devices.
The input, output and storage units are referred to as peripheral devices or peripheral.
Peripherals are attachment to the system unit that form the computer. Peripherals that
are not controlled by or in communication with the CPU are said to be off- line while
those controlled by or in communication with the CPU are called on-line. For example,
in punched card data processing environment the keypunch that transcribes data is an
example of an off- line operation whilst the machine attached to the computer that reads
cards is an example of an on line device.
All peripheral devices must be installed. In other words, the device’s driver must be used
to tell the computer what kind of device is attached to the system. A driver is a software
programme that links a peripheral device to the computer’s operating system. The driver
contains the machine language necessary to activate the device and perform the
necessary operations. Drivers may come on disk with the peripheral device. In the case
of fundamental peripherals such as the keyboard, diskette drive and some hard disks,
the drivers are included in the computer’s BIOS chip. The manual accompanying the
peripherals gives a direction on how to install the device.
14
SOFTWARE
A program therefore specifies what operations are to be performed and the sequence in
which they are to be performed. When directing the operations to be performed,
a program must be stored in the main memory unit of the computer. Computer
programs are commonly referred to as computer software. Without software or a
program, computer hardware cannot function. Software, therefore, makes the
hardware intelligent.
15
d. Education and reference software is used to educate. There are CD-
ROMs with encyclopaedias, home books, mailing lists, maps and
reproductions of famous acts.
16
DISADVANTAGES OF USING AN APPLICATION SOFTWARE PACKAGE
1. The purchaser does not have direct control over the package in the
same way as would be if the software were produced in-house.
2. The package will have been produced to meet general needs may
therefore not be ideal for a particular customer.
WHAT IS CURRICULUM?
In education, a curriculum (plural curricula) is the set of courses and their contents
offered by an institution such as a school or university. In some cases, a curriculum may
be partially or entirely determined by an external body (such as the Curriculum Research
Development Division (CRDD) of the Ghana Education Service (GES) in Ghana.
Types of Curriculum
There are basically seven types of curriculum. These are:
1. The written (actual) curriculum, which gives the basic lesson plan to be
followed, including objectives, sequence, and materials. This provides the
basis for accountability.
2. The hidden curriculum includes the norms and values of the surrounding
society. These are stronger and more durable than the first two, and may be in
conflict with them. [I would add that it is something that is not explicitly
taught, but that is part of what moulds the school/university environment].
3. The co-curriculum is the planned experiences outside of the specific
educational session.
4. Formal is the accepted, committee passed, written documents that are
supposed to guide practice. Here at OLA we might find some of this in the
code of ethics book.
5. Informal curriculum is those activities that happen that are not designed,
planned, or formally accepted by the school.
17
6. The null curriculum consists of what is not taught. Consideration must
be given to the reasons behind why things are not included in the official or
operational curriculum.
7. The operational curriculum is what the teacher teaches, and how it is
communicated. This includes what the teacher teaches in class and the learning
outcomes for the student.
EXERCISE 1
1. What is the difference between computer literacy and information literacy?
How do computers relate to information literacy?
2. Name any four characteristics that make the computer such a powerful tool?
Describe each.
3. State the three classifications of computers. Briefly describe each.
4. What is computer software? How is system software different from
application software?
18
12. The two parts of a machine language instruction are (n) …………. This tells
the computer what to do and matches one of the commands in the instruction set
and (n) ………………. That specifies the data or location of the data that will be
used by the instruction.
Short Answer
1. What is the difference between computer literacy and information literacy?
How do computers relate to information literacy?
2. Name any four characteristics that make the computer such a powerful
tool? Describe each.
3. How are computers generally classified? What are the five major categories of
computers? Briefly describe each. Why is it difficult to make firm definitions
of these categories?
4. What is computer software? How is system software different from
application software?
5. What is data accuracy important? What does the computer jargon term GIGO
mean?
11. What is a parity bit?
19
CHAPTER 2
COMPUTER COMPONENTS 1
The following components will be considered in this section.
1. SYSTEM SOFTWARE
2. SYSTEM UNIT
3. STORAGE DEVICES
SECTION 1
SYSTEM SOFTWARES
Definition: These are computer programs that (start up the computer and) function
as the principal coordinator of all hardware components and application software
programs and the user. Without system software loaded into RAM of your computer,
your hardware and applications software are useless. In other words, system software
works “behind the scenes” and it underlines application software. System software deals
with the physical complexities of computer hardware by telling the computer:
1. How to interpret data and instructions;
2. How to communicate with peripheral equipment like printers, keyboards,
and disk drives;
3. How to manage files; and
4. How to use the hardware in general.
5. It allows the user to interact with the computer.
OPERATING SYSTEMS
What is it? These are programs that operate your microcomputer.(IT CONTROLS
YOUR APPLICATION SOFTWARE AND MANAGES HOW YOUR HDWARE DEVICES
WORK TOGETHER. THE BASIC SOFTWARE OF ANY COMPUTER SYSTEM. EG.
WIDOWS, LINUX, DOS, MacOS AND UNIX). The operating system is the most
important system software component. It consists of master programs, called the
supervisor that manages the basic operations of the computer. The operating system
allows you to concentrate on your own tasks or applications rather than on the
complexities of managing the computer. Interpreting the commands you give, the
operating system runs programs and allows you to interact with the programs while they
are running.
The same part of the operating system is automatically loaded into the RAM soon after
you turn on, or “boot” the computer. The parts of the operating system that always
remain in memory while the computer is on are called “resident”. Less-frequently-used
parts of the operating system are copied from disk when needed and are called “non-
resident” or “transient”. The operating system includes BIOS (Basic Input Output
20
System), which manages the essential peripherals such as the keyboard, monitor, disk
drives and ports.
Every operating system performs three functions:
1. Managing resources;
2. Providing a user interface; and
3. Running applications.
2. User interface (UI): This enables user to interact with applications software and
hardware. Almost all operating systems today provide a windows–like Graphical
User Interface (GUI) in which icons are used to represent features.
21
a. Text Interface
i. Presents information to the user in the form of text.
ii. Have to type in commands or select commands from a
menu displayed as text on the screen.
iii. Hard to use or learn, because the user must memorize and
type in commands.
iv. Examples:
MS-Dos (MicroSoft Disk Operating System)
ProDos (Professional Disk Operating
System)
v. Many of the Text Interfaces had shells placed over them.
A shell was more of a Graphic User
Interface.
Made using the Text Interface easier to use.
UTILITY PROGRAMS
These are programs generally used to support, enhance or expand existing programs in
a computer system. All Kinds of things can happen to the computer system such as
internal hard disk crash, virus invasion, and “freezing up” (slow down of operations) and
so on.(help in solving trouble shooting purposes such as internal hd crash, virus
invasion and freezing up) These events can make computing frustrating but with utilities,
you can weather the storm. Many operating systems have built–in utility programs
whiles others such as Norton system works and McAfee Office are available
separately.
22
New viruses are constantly being developed. Therefore you need the type of
anti-virus software that can detect unknown viruses and that also offers frequent
free updates. Examples are Norton Antivirus, McAfee’s virus scan, Dr.
Solomon’s Ant-virus, Webscan, Panda Anti-virus , KV 3000 and PC–cillin.
3. Data Recovery: these are used to restore or resurrect data file that has been
physically corrupted or has been accidentally deleted. Data can be damaged by
viruses, bad sectors, hardware failure, and power fluctuations that occur while
data is being written or recorded. Examples are the recycle bin in windows and
Norton unease wizard.
LANGUAGE TRANSLATORS
These are softwares that translate programs in a language such as C++ into machine
language, which the computer can understand. All system softwares and application
software must be turned into machine language for the execution by the computer.
Language translators are of three types:
1. Assemblers (Assembly Language)
2. Compilers and
3. Interpreters
Assembly Language
It is a type of low-level computer programming language in which each statement
corresponds directly to a single machine instruction. Assembly languages are thus
specific to a given processor. After writing an assembly language program, the
programmer must use the assembler specific to the microprocessor to translate the
assembly language into machine code. Assembly language provides precise control of
the computer, but assembly language programs written for one type of computer must
be rewritten to operate on another type. Assembly language might be used instead of a
high-level language for any of three major reasons: speed, control, and preference.
Programs written in assembly language usually run faster than those generated by a
compiler; use of assembly language lets a programmer interact directly with the
hardware (processor, memory, display, and input/output ports).
23
Compilers
Compiler, in computer science, computer program that translates source code,
instructions in a program written by a software engineer, into object code, those same
instructions written in a language the computer’s central processing unit (CPU) can read
and interpret. Software engineers write source code using high level programming
languages that people can understand. Computers cannot directly execute source code,
but need a compiler to translate these instructions into a low level language called
machine code.
Compilers collect and reorganize (compile) all the instructions in a given set of source
code to produce object code. Object code is often the same as or similar to a computer’s
machine code. If the object code is the same as the machine language, the computer
can run the program immediately after the compiler produces its translation. If the object
code is not in machine language, other programs—such as assemblers, binders, linkers,
and loaders—finish the translation.
Most computer languages use different versions of compilers for different types of
computers or operating systems, so one language may have different compilers for
personal computers (PC) and Apple Macintosh computers. Many different manufacturers
often produce versions of the same programming language, so compilers for a language
may vary between manufacturers.
Consumer software programs are compiled and translated into machine language before
they are sold. Some manufacturers provide source code, but usually only programmers
find the source code useful. Thus programs bought off the shelf can be executed, but
usually their source code cannot be read or modified.
Interpreters
Most programming languages—such as C, C++, and Fortran—use compilers, but some
—such as BASIC and LISP—use interpreters. An interpreter analyzes and executes
each line of source code one-by-one. Interpreters produce initial results faster than
compilers, but the source code must be re-interpreted with every use and interpreted
languages are usually not as sophisticated as compiled languages.
24
SECTION 2
THE SYSTEM UNIT
The rectangular box which houses the main components of the computer.
The system unit is made up of so many parts. The main ones are the following:
I. Central Processing Unit/ CPU (Processor)
II. Main memory/ primary storage/ RAM and
III. Motherboard/systemboard - The motherboard is the main circuit board of a
microcomputer, on which can found the processor, Cmos battery. It is also
known as the main board or system board.
IV. Bus - A bus is an electronic line that allows 1s and 0s to move from one place to
another.
V. Expansion Slots - Expansion slots appear on the motherboard. They are
sockets into which adapters are connected.
VI. Ports and Connectors - A port is a connector located on the motherboard or on
a separate adapter.
VII. Bays - A bay is a space inside the computer case where a hard drive, floppy
drive or CD- ROM drive sits.
VIII. Power Supply - A power supply changes normal household electricity into
electricity that a computer can use.
IX. Sound Components - A sound card lets a computer play and record high quality
sound.
25
transferred to a specific calculator. That is, it keeps track of where a
given instruction or piece of data is stored in the memory. An
accumulator collects the results of computation.
iv. The Instruction Counter: It is for recording the number of instructions
executed and is incremented by one after each instruction is completed.
26
conditional transfer and it provides the needs for processing according to the
circumstances disclosed by the data.
TYPES OF PROCESSESORS
1. It can either be in the form of Pin Grid Array (PGA) and the Slot Type (SCC).
The resources are the memory, input or output device, information or stored data and
the arithmetic logic unit. Examples of operating system include Ms DOS, Ms Windows,
and Novel.
27
WHAT IS MEMORY?
Memory is the electronic holding place for instructions and data that your computer's
microprocessor can easily reach. This type of memory is known as Random Access
Memory (RAM) and Read Only Memory (ROM). (A third type of memory falls into the
category of storage devices and these will be discussed later in this tutorial.)
When the computer receives information from input devices, the processor processes it,
and it is fed back to the user through output devices. This cycle (input - process - output)
would not be possible without a holding place for the information. This holding place is
known as memory.
Types of RAM
2. SRAM (Static Random Access Memory): It is a type of RAM, whose
content remains in one position until the CPU explicitly changes it. As long as
there is power, SRAM keeps the stored data so that no mechanism is
required to refresh and charge it. However, it is expensive.
3. DRAM: It is an acronym of Dynamic Random Access Memory. It is a type
of RAM, which is inexpensive. However, it is slow and the data stored
dissipates faintly rapidly because the electric charge is small. Therefore, the
computer must check each storage location frequently and refresh its charge.
4. CMOS: It is an acronym of Complementary Metallic Oxides Silicon. It uses
battery or little power to store information. Usually, it is used to store machine
configuration, settings such as the number of disks drives, memory size and
input or output peripherals. It is volatile memory because when the battery
runs down, the CMOS contents are lost.
28
CHARACTERISTICS OF THE READ ONLY MEMORY (ROM)
1. It contains items, which have been permanently written into it. A specific
function has been burnt into the chip at a time of manufacture.
2. It is non-volatile. It does not loose its data even when the computer is
switched off. Because of this, it is used for permanent purposes such as
control function.
Types of ROM
1. PROM (Programmable Read Only Memory): In contrast to normal ROM in
which the pattern of stored data is permanently incorporated into the chip, the
PROM can be programmed by the user of the system by special device. It is
an extension of ROM, which allows the user to program his own software for
permanence and an unalterable. The danger with PROM is the possibility of
errors and consequently the cost of correction.
2. EPROM (Erasable Programmable Read Only Memory): This can be read
from and written to as well as erased. The erasing and the rewriting process
are very slow compared to the reading, which limits the use. For this reason
they are sometimes called Read Mostly Memory (RMM). It is erasable by
means of ultraviolet light so that correction is less expensive.
3. EAPROM (Electrically Alterable Programmable Read Only Memory): It is
similar to EAPROM except that the program instructions are selectively
erasable by electrical methods. This makes it more convenient.
STORAGE DEVICES
What are storage devices? Storage devices are any physical device in or on which
computer information can be kept. Examples include hard disk, pen drive, floppy disk,
compact disk and DVD.
A disk is a place to store data. Although there are several types of disks, for the
purposes of this tutorial, only the following types will be discussed: Hard Drive, Floppy
Disk / ZIP Disk, and Compact Disk.
29
drive stores programs, data files, saves files, and organizes files. The hard drive is
located inside the computer case. The hard drive, magnetically stores data on stacks of
rotating disks called platters.
The hard drive serves as a storage space for all of your documents, old email, and all
applications (including the operating system). Hard drives are measured in terms of
megabytes and gigabytes. When the hard drive reaches its capacity, files need to be
moved to free up space. To free up space on the hard drive or to save files to a portable
medium, files can be copied to a floppy disk.
Never move a computer while it is on. The hard drive is spinning and movement
could cause the magnetic disks to become scratched.
Shut down you computer properly.
Regularly perform diagnostic tests of your hard drive using ScanDisk.
30
tape. Each column consists of 7 bits including the parity bit. Data are stored on magnetic
sports. Vertical columns are called frames (character frames) and there are often 800
or 1600 frames to the inch. Horizontal columns are called channels or tracks.
Data is written to and read from magnetic tape using a device called a magnetic tape
deck. The tape decks are permanently linked to the CPU. When it is required to write
data from the main store to magnetic tape, a reel of tape is loaded into the deck. The
tape is threaded from the supply reel under the read/write head and wound round the
take–up reel. The vacuum chambers on each side of the read/write head acts as
reservoirs and ensure that the tape passes the head at a constant speed and that the
tape does not tear when it is stopped or started. Characters are transferred from the
CPU, translated into the appropriate magnetic tape code, and written to the tape, frame
by frame, by the write head. Reading tape is accomplished in a similar fashion.
To enable the tape to be wound round the supply and take–up reels, lengths of the tape
at both ends are not used for recording data. The point where recording can begin on
the tape is shown by a reflective load point marker, which is sensed by photoelectric
cells. An end–of-tape marker, which indicates the effective end of tape, works on the
same principle.
When reading from a magnetic tape in response to a read instruction in the program, a
number of characters are read into store at a time. Those frames transferred to the store
at any one time make up a BLOCK and a block often consists of several records. When
these records have been dealt with, the next block of records is read into store and it
over-writes the previously stored records. Data is also written to magnetic tape a block at
a time.
After a block of data has been read into the main store, the tape stops until the next read
instruction is encountered in the program. The tape has, then, to accelerate to a given
constant speed before reading can take place. To allow for this acceleration and for
deceleration after a block has been read, gaps are left blank between blocks of data on
the tape. These INTER–BLOCK GAPS (IBGs) are usually between ½“and ¾“ long. The
same considerations apply when writing to a magnetic tape.
The smaller the block size on the magnetic tape, the less core store we use when writing
to or reading from the tape. This could lead us to use single–record blocks that will give
us INTER RECORDS GAPS (IRGs). But this will mean that we would be constantly
stopping and starting when reading the tape, and would increase the time needed to
read a file of records. It would also mean that a great proportion to the tape would be
taken up with IBGs, and so the amount of data held on a tape would be lowered. For
these two reasons, we usually use multi–record blocks, even though this means
that we will use more core store.
31
Assume that a tape is 2400 long, and that its density is 1600 frames per inch. Its
theoretical capacity is thus 46,080,000 characters (2400x12x1600).
If, however the IBGs on the tape are half an inch long, and the file contains records
which are 400 characters long, with a blocking factor of 4, then only 2/3 of the tape is
used to hold data (1/2”: 1” or 800:1600), and so only 30,720,000 characters can be
held.
The time taken to read a file of records on magnetic tape depends on:
1. The time taken to read the data and
2. The time taken to stop and start between blocks.
If a tape has a density of 1600 frames per inch, and the tape deck has a transport speed
of 200 inches per second, then the transfer rate is 320,000 characters per second (1600
x 200).
If a file on the tape contains 100,000 records, each of 500 characters, with a blocking
factor of 5,and it takes .01 seconds to stop the tape and .01 seconds to start it, then:
There are 50, 000,000 characters and so it takes:
156. 25 seconds to read the data.
As there are 20,000 blocks to the file, it takes
400 seconds (20,000x 01 x 2) to stop and start.
The total time to read the file is thus 556.25 seconds.
Once a file of data has been written to magnetic tape, the reel of tape can be taken from
the tape deck, stored in a tape library, and extracted for use when required. A tape can
be read as often as necessary, for reading is non-destructive. When data on a tape is no
longer needed, it can be overwritten by new data, as writing is destructive. Tapes can be
re-used. Note that, after a tape has been written to or read from, it has to be re-wound
before it can be used again.
MAGNETIC DISK
This is the most popular and important secondary storage medium. It permits direct and
immediate access to data.
There are two types of magnetic disk: hard disk and floppy disk.
32
HARD DISK
The hard disk is made up of thin steel platter with iron oxide coating. Several disks may
be mounted together on a vertical shaft where they rotate as wheel of approximately
3500 revolutions per minute. The electromagnetic read/write heads is mounted on an
access arm. The head flies over the spinning desks and read and write on the concentric
circle called tracks.
Data are recorded on tracks as tiny magnetized spot forming binary digits. The read/
write head never touches the disk but hovers a few thousandth or millionth of an inch
above it. A smoke particular or human hair on the disk surface will cause the head to
crash into disk. The disk storage capacity depends on the type, quantity and the
arrangement of disk in a unit. Capacity may range from several megabytes to several
gigabytes.
Typical examples are the removable pack and the Winchester disk. The removable
hard disk consists of number of individual units called a pack that can be mounted and
removed as unit. A typical example is the eleven digits. Since each individual disk has
two surfaces and the top and bottom are not recordable, we end up getting 20 surfaces.
Each surface is divided into tracks where data are stored and each track can store
thousands of bytes.
A cylinder represents circular tracks on the same vertical line within a disk pack. The
Read/ write heads are directed to specific record consisting of a cylinder number, the
recording surface number and the data record number.
The Winchester disk is hermetically sealed units of hard disk that cannot be removed
from the disk drive. It has a very high rotational speed. The very high rotational speed
plus the smaller distance between the r/w head and the disk surface translates into a
very high-speed access time. The speed at which data can be located on the magnetic
disk and loaded into memory or written on the disk itself is called the disk access time.
The disk access time is determined by the three factors:
1. The access motion time;
2. The rotational delay; and
3. The data transfer rate.
A typical disk access time is 200 000 to 4 000 000 bytes per second.
FLOPPY DISK
The floppy disk is an ideal medium for storing data programs that are not in constant use
or for transporting data and programs. They are available in many different sizes: (8
inches, 5 ¼ inches, and 3 ½ inches. The 8” and 5 ¼ “ are not popular anymore. The
floppy disk use sector method. (Sectors are the basic unit for diskette storage). The disk
surface is divided into sectors.
The actual number of sectors depends on the disk system being used. Each sector has
the same storage capacity and assigned a unique number. Data is located using the
address consisting of the sector number and the data record number. Alternatively,
you can use the surface number, the track number and the sector number.
The exact storage capacity of each diskette can be determined by using the formula:
Number of sectors X Number of bytes per sector = Number of bytes. (This gives total
33
capacity of the disk). However, floppy disks have limited storage capacity -- generally
1.44 MB.
Access time
The time required to access and retrieve data from the floppy disk is determined by four
factors:
1. The time it takes to position the r/w head over the proper track.
2. The latency period: The time it takes for the sector that contains the data
to rotate under the read/write head;
3. The settling time: The time required for the read/write head to be placed
in contact with the disk;
4. The data transfer rate: the time required to transfer data from the floppy
to the main memory.
ZIP DISK
ZIP disks are high capacity, removable, magnetic disks, which can be read or written by
ZIP drives from Iomega Corporation. ZIP disks are similar to floppy disks, except that
they are much faster, and have a much greater capacity. While floppy disks typically hold
1.44 megabytes, ZIP disks are available in many sizes, most commonly 100 megabytes
and 250 megabytes.
Be careful not to touch the magnetic film on a floppy disk. Oil or dirt can damage
floppy disks.
When labeling a new floppy disk, write on the label prior to attaching the sticker
to the new disk.
When labeling a disk with a label sticker already attached, use a soft felt tip pen
to avoid damaging the thin magnetic film inside.
Keep floppy disks out of extreme cold or hot temperatures. Disks become brittle
in the cold and may warp in hot weather.
Information on floppy disks is stored magnetically. To prevent disks from being
erased or permanently damaged, avoid placing disks too close to magnetic
objects (such as computer speakers).
Store floppy disks in boxes or trays to protect them from scratches and dust.
Transport floppy disks in carrying cases to prevent damage.
34
OPTICAL DISKS
Today’s optical disks can hold over 4.7 GB of data, which is the equivalent of over 1
million typewritten pages. Therefore, Optical disks have a great impact on storage today.
In optical disk technology, a LASER (Light Amplification by the Stimulated Emission of
Radiation) beam alters the surface of a plastic disk to represent data. Data
representation on optical disk is done by the use of reflected light. Data is stored on
these disks in different ways or different formats, such CD and DVD.
Compact Disk:
It is also known as CD. Typically, CD drives can store 650 MB of data on one side. A CD
consists of a single track spirals from the outside to the inside. A CD has about 600
tracks per linear inch of disk surface. A laser beam is needed to detect the presence
or absence of pits, which have been burned into this surface at the writing stage. There
are three basic types of CDs: CD-ROM, CD-R, and CD-RW. CD-ROM is a device that
reads information stored on a compact disc. CD-ROM stands for Compact Disc Read
Only Memory. One CD is equal to the space in over 40 floppy disc.
1. CD- ROM: This stands for Compact Disc Read Only Memory. Read only
means it cannot be written on or erased by the user. Therefore, the user has
access only to the data copied into it by the creator of the content. CD-ROMs are
used to distribute large databases, references and large software application
packages. Microsoft Windows 95 for example was supplied on a single CD-
ROM or on 38 floppies. Installing software on a hard disk from a CD-ROM is
much faster and easier than doing the from floppies.
The user simply starts it up, enters any required information, and comes back
later; it’s no longer necessary to feed disk after disk into the computer. When
they were introduced, CDs held large databases such as encyclopedias. Today
they are used for every possible type of data from national phone directories and
software libraries to collection of clip art, music, and games. Typically, a CD ROM
holds up to 650 MB of information.
2. CD-R: This stands for CD–Recordable and is also known as WORM meaning
write once, read many, it is the type of CD that allows users with CD recorders
(CD-R drives) to write data, only once, onto a specially manufactured disk that
can then be read by a standard CD-ROM drive. Once the data is recorded, it
can’t be written over (changed). I.e. A CD-R is a one time recordable compact
disc. CD-R can hold up to 700MB of information.
3. CD-RW: This stands for compact disk re-writable and also known as erasable
optical disks. This format allows users to erase data so that the disk surface of
CD-RW is not permanently altered when data is recorded. Because they can be
changed, CD-RWs are often used to create and edit multimedia presentations.
I.e. A CD-RW allows you to read, write, erase and write again. Writing takes
place in a single pass of the focused laser beam; this is sometimes referred to as
direct overwriting and the process can be repeated several thousand times per
disc.
The most common type of erasable and rewritable optical disk is probably the
magneto–optical (MO) disk which uses a magnetic /optical technologies. Super
35
Disk uses a magnetic /optical technology. Most MO disk holds about 250 MB.
CD-RW drives can also accept CD-R disks and CD-ROMs.
Be careful not to touch the flat surface of a CD. The information on the CD is
stored on the shiny metallic surface underneath the plastic protective coating. If
the flat surface has smudges or scratches on it, the laser that reads the metallic
surface is unable to penetrate the damaged area.
Avoid extreme hot or cold temperatures. In cold temperatures, CDs may become
brittle, in extreme heat, they become warped.
Store CDs in trays or boxes to protect them from dust or scratches.
Transport CDs in a protective jewel case or plastic sleeve to keep dust or
scratches from damaging the flat surface.
36
Item D is: Monitor Mouse Speaker
Exercise 2 is designed to test your knowledge of the input and output devices of a
computer.
UNIT 3
COMPUTER SECURITY
SESSION 1
COMPUTER SECURITY RISKS AND SAFEGUARDS
Computers and the information they contain are often considered confidential systems
because their use is typically restricted to a limited number of users. This confidentiality
can be compromised in a variety of ways. For example, computers and computer data
can be harmed by people who spread computer viruses and worms. A computer virus is
a set of computer program instructions that attaches itself to programs in other
37
computers. The viruses are often parts of documents that are transmitted as
attachments to e-mail messages. A worm is similar to a virus but is a self-contained
program that transports itself from one computer to another through networks.
Thousands of viruses and worms exist and can quickly contaminate millions of
computers.
Hackers
People who intentionally create viruses are computer experts often known as hackers.
Hackers also violate confidentiality by observing computer monitor screens and by
impersonating authorized users of computers in order to gain access to the users’
computers. They invade computer databases to steal the identities of other people by
obtaining private, identifying information about them. Hackers also engage in software
piracy and deface Web sites on the Internet. For example, they may insert malicious or
unwanted messages on a Web site, or alter graphics on the site. They gain access to
Web sites by impersonating Web site managers.
Malicious hackers are increasingly developing powerful software crime tools such as
automatic computer virus generators, Internet eavesdropping sniffers, password
guessers, vulnerability testers, and computer service saturators. For example, an
Internet eavesdropping sniffer intercepts Internet messages sent to other computers. A
password guesser tries millions of combinations of characters in an effort to guess a
computer’s password. Vulnerability testers look for software weaknesses. These crime
tools are also valuable security tools used for testing the security of computers and
networks.
An increasingly common hacker tool that has gained widespread public attention is the
computer service saturator, used in denial-of-service attacks, which can shut down a
selected or targeted computer on the Internet by bombarding the computer with more
requests than it can handle. This tool first searches for vulnerable computers on the
Internet where it can install its own software program. Once installed, the compromised
computers act like “zombies” sending usage requests to the target computer. If
thousands of computers become infected with the software, then all would be sending
usage requests to the target computer, overwhelming its ability to handle the requests
for service.
A variety of simple techniques can help prevent computer crimes, such as protecting
computer screens from observation, keeping printed information and computers in
locked facilities, backing up copies of data files and software, and clearing desktops of
sensitive information and materials. Increasingly, however, more sophisticated methods
are needed to prevent computer crimes. These include using encryption techniques,
establishing software usage permissions, mandating passwords, and installing firewalls
and intrusion detection systems. In addition, controls within application systems and
disaster recovery plans are also necessary.
Backup
38
Storing backup copies of software and data and having backup computer and
communication capabilities are important basic safeguards because the data can then
be restored if it was altered or destroyed by a computer crime or accident. Computer
data should be backed up frequently and should be stored nearby in secure locations in
case of damage at the primary site. Transporting sensitive data to storage locations
should also be done securely.
Encryption
Approved Users
Another technique to help prevent abuse and misuse of computer data is to limit the use
of computers and data files to approved persons. Security software can verify the
identity of computer users and limit their privileges to use, view, and alter files. The
software also securely records their actions to establish accountability. Military
organizations give access rights to classified, confidential, secret, or top-secret
information according to the corresponding security clearance level of the user. Other
types of organizations also classify information and specify different degrees of
protection.
Passwords
A more secure method is to require possession and use of tamper-resistant plastic cards
with microprocessor chips, known as “smart cards,” which contain a stored password
that automatically changes after each use. When a user logs on, the computer reads the
card's password, as well as another password entered by the user, and matches these
two respectively to an identical card password generated by the computer and the user's
password stored in the computer in encrypted form. Use of passwords and "smart cards"
is beginning to be reinforced by biometrics, identification methods that use unique
39
personal characteristics, such as fingerprints, retinal patterns, facial characteristics, or
voice recordings.
Firewalls
Security software called intrusion detection systems may be used in computers to detect
unusual and suspicious activity and, in some cases, stop a variety of harmful actions by
authorized or unauthorized persons. Abuse and misuse of sensitive system and
application programs and data such as password, inventory, financial, engineering, and
personnel files can be detected by these systems.
Application Safeguards
The most serious threats to the integrity and authenticity of computer information come
from those who have been entrusted with usage privileges and yet commit computer
fraud. For example, authorized persons may secretly transfer money in financial
networks, alter credit histories, sabotage information, or commit bill payment or payroll
fraud. Modifying, removing, or misrepresenting existing data threatens the integrity and
authenticity of computer information. For example, omitting sections of a bad credit
history so that only the good credit history remains violates the integrity of the document.
Entering false data to complete a fraudulent transfer or withdrawal of money violates the
authenticity of banking information. These crimes can be prevented by using a variety of
techniques. One such technique is checksumming. Checksumming sums the
numerically coded word contents of a file before and after it is used. If the sums are
different, then the file has been altered. Other techniques include authenticating the
sources of messages, confirming transactions with those who initiate them, segregating
and limiting job assignments to make it necessary for more than one person to be
involved in committing a crime, and limiting the amount of money that can be transferred
through a computer.
Organizations and businesses that rely on computers need to institute disaster recovery
plans that are periodically tested and upgraded. This is because computers and storage
components such as diskettes or hard disks are easy to damage. A computer's memory
can be erased or flooding, fire, or other forms of destruction can damage the computer’s
hardware. Computers, computer data, and components should be installed in safe and
locked facilities.
40
SESSION 2
Viruses operate, replicate, and deliver their payloads only when they are run. Therefore,
if a computer is simply attached to an infected computer network or downloading an
infected program, it will not necessarily become infected. Typically a computer user is
not likely to knowingly run potentially harmful computer code. However, viruses often
trick the computer's operating system or the computer user into running the viral
program.
Some viruses have the ability to attach themselves to otherwise legitimate programs.
This attachment may occur when the legitimate program is created, opened, or modified.
When that program is run, so is the virus. Viruses can also reside on portions of the hard
disk or floppy disk that load and run the operating system when the computer is started,
and such viruses thereby are run automatically. In computer networks, some viruses
hide in the software that allows the user to log on (gain access to) the system.
With the widespread use of e-mail and the Internet, viruses can spread quickly. Viruses
attached to e-mail messages can infect an entire local network in minutes.
41
3. Difficult to detect since they are to be hidden; and
4. Sometimes can cause damage to the computer.
Types of Viruses
There are five categories of viruses: parasitic or file viruses, bootstrap sector, multi-
partite, macro, and script viruses.
Parasitic or file viruses infect executable files or programs in the computer. These files
are often identified by the extension .exe in the name of the computer file. File
viruses leave the contents of the host program unchanged but attach to the host in
such a way that the virus code is run first. These viruses can be either direct-action
or resident. A direct-action virus selects one or more programs to infect each time it
is executed. A resident virus hides in the computer's memory and infects a particular
program when that program is executed.
Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk,
known as the boot sector. These viruses replace either the programs that store
information about the disk's contents or the programs that start the computer. Typically,
these viruses spread by means of the physical exchange of floppy disks.
Multi-partite viruses combine the abilities of the parasitic and the bootstrap-sector
viruses, and so are able to infect either files or boot sectors. These types of viruses can
spread if a computer user boots from an infected diskette or accesses infected files.
Macro Viruses infect programs that contain powerful macro languages (programming
languages that let the user create new features and utilities). These viruses are written in
macro languages and automatically execute when the legitimate program is opened.
Script viruses are written in script programming languages, such as VBScript (Visual
Basic Script) and JavaScript. These script languages can be seen as a special kind of
macro language and are even more powerful because most are closely related to the
operating system environment. The "ILOVEYOU" virus, which appeared in 2000 and
infected an estimated 1 in 5 personal computers, is a famous example of a script virus.
Virus Detection
Antivirus programs are software programs designed to detect, disinfect, and protect
computers and networks from viruses. Antivirus programs work by looking for programs
that attempt to modify the boot program, the operating system, and other programs that
normally are read from but not written to. Most antivirus programs also have utilities to
42
remove or repair infected programs and files. Examples of such programs are Norton’s
Antivirus, MacAfee, and Trojan Removal.
Find Virus
The Findvirus program is a scanner. It is programmed to look for the patterns of
bytes, which specific viruses create when they infect a disk or file. Its database contains
information about thousands of viruses and is updated on a regular basis to keep
abreast of new viruses as they are discovered. If a match is found, Findvirus will identify
the virus and you can then use the virus encyclopedia to find out the procedure for
removing it from the system. Findvirus contains specially optimized high speed
searching routine to enable it to look for thousand of different virus patterns across the
entire hard disk in a matter of seconds.
Viverify
Viverify is a “fingerprinting” program. It detects any changes in the composition of
program files and boot or partition sectors on hard and floppy disks. Generally speaking,
program files remain exactly the same from the day they are installed. Any change to
their contents should be regarded as suspicious, as it could signal a virus infection. The
first thing that viverify does is to look at each program file and calculate a checksum,
which is specific to that particular file and its contents.
Every time viverify is run from then on, the checksum will be calculated again and the
result compared with that obtained the first time round. If there is any difference between
the two results, the program file has been altered and the user is alerted as to the
possibility of a virus. The suspect program can then be scanned to check it for known
viruses and then appropriate action taken.
Virusguard
Virusguard is a memory resident scanner. It intercepts system calls to enable it to check
over program for known viruses before allowing it to be run or copied. This works in a
similar way to find virus, except that it checks files only as you use them. Being
automatic and very fast, it does not affect the way you run your programs.
Memory Check
The entire Toolkit program incorporates Anti-Stealth-Methodology to combat
sophisticated virus concealment techniques. Before installing or running, all toolkit
programs scan the computer’s memory for resident viruses which may be trying to
deceive the system about what is on the disks.
Integrity Check
Toolkit programs also perform integrity self check to make sure that they have not
themselves been infected. The toolkit menu provides direct access to the complete set
of tools via easily understood icons. To run FINDVIRUS, simply select the option from
the scan menu. The basic menu allows you to select which drives are to be scanned.
43
The advanced menu allows you to control exactly which parts of the disk are to be
scanned for viruses.
The FIND icon starts the scanning operation. FINDVIRUS keeps you informed of its
progress as each directory is scanned. When the scan is complete, a detailed report
explains the results and a summary provides the most important information at a glance.
The fingerprint checker is run in a similar way. It provides a set of options to calculate
and verify fingerprints for all program files or specific files of your choice. The third
detection option scans your PCs memory for known virus patterns. The memory
resident fingerprinting program can also be set up from the Toolkit menu. [For fully
automatic operation, the memory-resident check sum program needs to be loaded in
your AUTOEXEC. BAT file]. The various options are simple to configure using
conventional windows selection methods.
Some antivirus software attempts to remove detected viruses, but sometimes with
unsatisfactory results. More reliable results are obtained by turning off the infected
computer; restarting it from a write-protected floppy disk; deleting infected files and
replacing them with legitimate files from backup disks; and erasing any viruses on the
boot sector.
2. Don't open email that is suspicious or that you don't recognize the senders name.
4. Create backups of legitimate original software and data files regularly so that the
computer system can be restored if necessary.
5. If your computer does contract a virus, be prepared to reformat and start all over
again!
44
3.3 Unauthorized Access and Use
Unauthorized access is the use of a computer or network without permission. The
term, cracker or hacker, refers to a person who tries to break into a computer often with
the intent of stealing or corrupting its data. Unauthorized use is the use of a computer
or data for unapproved or possibly illegal activities. Unauthorized access is prevented
by establishing access controls, which are security measures that define who may
access a computer or information.
45
2. ATM Spoofing
These crooks have pulled some impressively intricate heists. One group of criminals set
up a complete fake ATM machine inside a mall in Connecticut.. It looked and worked just
like a real one, except that after giving it your card and typing in your pin, it would refuse
you service saying it was out of order. It then had a record of the card and PIN numbers
of all the people who tried to use the machine.
3. PIN Capturing
Another group of criminals scoured the area across the street from a busy ATM, looking
for the perfect spot to hide a video camera aimed at the keys on the ATM machine. They
found such a spot and set up their camera. After each successful PIN number
identification that they recorded, one of the group members would go check for a
discarded receipt at the ATM. If they found one, the group had the card number and the
PIN number.
4. Database Theft
The previous criminal activities are all aimed at compiling databases of information
obtained fraudulently from people one by one. This takes time, and these people only
have limited amounts of time before their operations will be recognized and shut down.
This limits the number of people whose information these criminals can obtain. There
are, however, large databases of this kind of information that have been built up slowly
and legally by mild-mannered, legitimate internet companies. For example, BMG Music
Service lets customers give their credit card numbers when they sign up, so they don't
need to bother each time they make a purchase. There are thousands of users of this
service, many of whom likely use this feature. Combine this with the fact that hundreds
of computer systems are hacked into every day, and we have a situation where hackers
could steal an industrial-sized database of this kind of information, and run wild.
System failure
A system failure is a computer malfunction as a result of electrical power problems,
hardware component failure, or software error. An undervoltage occurs when the
electrical power supply drops. An overvoltage, or power surge, occurs when the
incoming electrical power increases significantly above the normal 120 volts. A surge
protector keeps an overvoltage from damaging computer equipment.
Backup procedures
A backup is a duplicate of a file, program, or disk that can be used if the original is lost,
damaged, or destroyed. Files can be restored by copying the backed up files to their
original location on the computer. Backup copies should be kept in a fireproof and
heatproof safe or offsite.
46
Some users implement a three-generation backup procedure to preserve three
copies of important files.
1. The grandparent is the oldest copy of the file.
2. The parent is the second oldest copy of the file.
3. The child is the most recent copy of the file.
The most important thing that you store on your computer is information. Often the
contents of a hard disk can represent years of work. If the hard disk stops working one
day you could lose all those years of work. For this reason it is VITAL that you take
regular backups of the information that is stored on the computer. In large organizations
this backup procedure is normally performed automatically by your computer support
team, where the data is normally held on a centralized, networked computer.
It is no good backing up your data, only to leave the item that you backed up to next to
the computer. Ideally, backups should be stored off-site at a safe location to prevent it
from being stolen or catching fire. At the very least, consider storing your backups in a
fireproof safe, which will give some protection against fire damage.
You should perform backups at night. If you backup your computer during the day (when
you are using programs on the computer) then any program or data files that are in use
at the time of the backup will not be backed up. The backup program will skip these
‘open’ files.
One of the problems related to privacy is the tendency to regard anything displayed on a
computer screen as public information. Although most people, including students, would
never pick up and read a document lying on someone else's desk, many people do not
hesitate to read someone else's computer screen. As word-processing and other tool
software become more and more common, we must extend the courtesy of privacy from
written documents to material displayed on computer screens or stored on disks.
Ethics and the Information Age
Ethics are the standards of honesty, morality, and fairness. These standards relate to
using computers. One has a responsibility to respect the property, rights, and privacy of
others in the way you use computers. Today in the Information Age, one must follow a
code of ethics to respect others properties and others personal information.
The legal aspects of computing are complex and multifaceted. Teachers can help society
by practicing ethical computer use, avoiding software piracy, and providing direct
instruction on ethical computing practices.
47
Data Protection and Privacy Issues
If your computer system holds information about individuals then you have a moral and
legal duty to treat that information with respect. For instance if a police force computer is
used by unscrupulous people to gain unauthorized information abut a person’s private
life that would be a clear breach of trust. In the same way doctors, government
departments and credit agencies often hold vast amounts of information about the
public, which is both sensitive and private. In a free society you have a right to ensure,
that information held about you is not abused. In many countries, this right is enshrined
under data protection laws.
Not every work of authorship is eligible for copyright. To qualify for copyright protection, a
work must be both fixed and original. The law considers a work to be fixed if it is
recorded in some permanent format. Acceptable ways of fixing a work include
writing it down, storing it on a computer floppy disk or compact disc (CD),
recording it on videotape, or sculpting it in marble. To be original, the work must
not be copied from previously existing material and must display at least a reasonable
amount of creativity.
When personal computers became widely available, however, the situation changed
because computers stored information in the binary digits of computer code. End users
of copyrighted works were suddenly able to reproduce copyrighted material digitally and
to send the material instantly all over the world through the Internet. To combat unlawful
copying of their works in this environment, some copyright owners began to use various
protective measures. For example, some encrypted their works to make copying
impossible. Others required that users enter a password to view or download a work.
However, some users were able to bypass or circumvent these protective measures.
Another well-known copyright controversy in the digital age has involved peer-to-peer
file sharing. This is the process of exchanging files—usually music files—with other
people over the Internet. File swapping violates the copyright laws because the people
sharing files are making unauthorized copies of protected works without permission and
without paying. However, it has proven very difficult for copyright owners to stop this
behavior.
Common sense and a constant awareness of the risks are the best preventive measures
against theft of notebook computers and other portable equipment. Software piracy is
the unauthorized and illegal duplication of copyrighted software. Software piracy is a
violation of copyright law and is a federal crime. A software license is an agreement
that provides specific conditions for use of the software, which users must accept before
using the software.
48
ENSURING LONG LIFE OF YOUR COMPUTER
1. Ensure that the computer is kept out from direct sunlight. Allow enough room
around fans if they are in use for air to circulate freely. The system will stop
running if it gets too hot.
2. Dust and other environmental contaminants can filter their way inside the
computer. Therefore, make your work area/room/office as clean as possible.
3. Ensure your system is turned off before you connect or disconnect from it. If you
just turned your machine off and want to turn it back on, wait for at least 15
seconds. The power supply needs a chance ot reset itself.
4. Should it become necessary to move your system, be sure the power is turned
OFF on every unit.
5. Unplug the power cords from the mains and disconnect all the peripheral cables
form the back panel. Check the screws that hold your computer over to make
sure they are secure.
EXERCISE 3
1. List any four ways of protecting your computer from viral attack.
2. What is Internet? Differentiate between the Internet and the World Wide Web.
3. Name the four common anti virus toolkit and explain briefly how each works.
4. What is a computer virus? Why is a program called a virus?
5. List the four components a virus consists of.
6. List five common computer security risks.
UNIT 4
PRODUCTIVITY SOFTWARE
Productivity software applications are used by a wide range of organizations and
individuals to perform their work more efficiently. Some common types of productivity
software applications are as follows: Word Processing Software; Presentation Software;
Database Management Software; Spreadsheet Software; Graphic & Multimedia
49
Software; Educational Software; Games Web; Electronic Mail Software; Data
communication software
Text Interface
1. Presents information to the user in the form of text.
2. Have to type in commands or select commands from a menu displayed as text
on the screen.
3. Hard to use or learn, because the user must memorize and type in commands.
Examples:
i. MS-Dos (MicroSoft Disk Operating System)
ii. ProDos (Professional Disk Operating System)
Many of the Text Interfaces had shells placed over them. A shell is more of a Graphical
User Interface, made using the Text Interface easier to use.
Graphic User Interface (GUI) presents information to the use in the form of pull-down
menus and icons. For pull-down menus, the user clicks on to display the menu. Icons
are small pictures that stand for something, like a file, volume, trash, or program. The
user gives commands to the computer by selecting items from a menu or by clicking on
an icon when using a pointing device. GUIs are easy to learn and use Examples:
Windows 98, Windows 2000 and MacOS.
SECTION 1
PRACTICAL WORK
WINDOWS OPERATING SYSTEM AND DESKTOP
1.1 Introduction
Computers use the operating system to manage all the related tasks needed to run the
computer and its input and output devices. The Macintosh and the Windows operating
systems translate information into a graphical user interface (GUI) that is easier to
understand. The GUI allows the user to input information by clicking icons or symbols
rather than typing lines of code. One of the major components of the GUI on the
Windows operating system is the desktop.
50
The operating system is an application that manages other applications and devices.
The diagram below depicts an operating system managing a printer, a mouse, an
application, a disk drive, a monitor and a keyboard. The interaction with the monitor is
probably the one that humans appreciate and think about the most.
The operating system translates the computer language (remember all those 0's and 1's)
into information. One method of presenting this information is via a graphical user
interface (GUI). Elements of a GUI include such things as windows, menus, buttons,
scroll bars, icons, the taskbar and the desktop.
The desktop is the primary GUI generated by the Macintosh and Windows operating
systems, and you will learn about the Desktop in the next section.
1.3 Logging On
When you startup a XP computer the first thing you will see is a log on screen. XP allows
many people to use the same computer while keeping their settings and files separate. If
you are the only person using your computer, XP will skip the log on Welcome screen.
Sometimes the administrator or owner of the computer may have set up a guest
account. This account will allow use of the computer and programs without granting
permission to personal files or specific settings.
As you just learned, the desktop is the main screen generated by the Windows operating
system. The Desktop serves as the home base for just about everything you will do on
the computer. From the desktop, you can manage files, store documents, launch
programs, adjust the way the computer works, and personalize the workspace. Most
importantly from the desktop you can access the Start Menu.
Each operating system has a unique desktop appearance. The Windows XP standard
desktop background is the green hillside. XP comes with many other photos you can use
as the background or you can add your own image.
The desktop will display the Task Bar, generally located at the bottom of the screen. At
start up, the Task Bar will contain the Start button and the program status information.
51
The Taskbar
The taskbar keeps track of all currently open programs and lets you make each active by
clicking on their name.
To switch between programs simply move the mouse pointer over the button for the icon
of the program you want to use and click once.
A new feature in Windows XP is taskbar grouping, this groups similar types of windows
under one button. To see the names of the grouped windows click on the arrow. Click the
name of the window to open the window.
52
The Start Menu
In the left hand corner of the Task Bar you will find the Start Menu. When you click on
the Start Menu, it reveals a customizable menu allowing you to open programs,
documents, folders, and allows you quick access to the frequently used documents
without searching through the hard drive files. Each item on the Start Menu is actually a
sub-menu.
Now you are ready to learn how to boot up (to load an operating system into the
computer's random access memory (RAM) a Windows computer. Different computer
makers put the "on" button in different places and they are often different shapes (round,
square, rectangular). However, for the most part, you can identify the "on" button by
looking for one of the symbols below. The symbol will be located on or below the button.
53
Two symbols that indicate power buttons.
Pushing the power button initiates the loading of the operating system into RAM. After
the operating system is loaded, the computer performs a check to make sure that all
peripheral devices (input, output and storage devices) are properly attached to the
computer. As soon as all devices are verified, the computer is ready to accept input from
the user.
Shutting down the computer turns the system off completely. To safely shut down a
Windows computer, click on the Start Menu, move the mouse pointer up to select "Shut
Down..."and click once. If you are running the Windows XP Home user version you will
see "Turn off computer" rather than Shut down.
The "Shut Down Windows" dialog window will appear. From this window you can choose
to Restart or turn off your computer. The computer will automatically shut itself off. It
does not require you to push the power button.
1.7 Summary
You know how to boot up or turn on the computer. You are also able to explain the
function of an operating system and identify the Windows XP operating system. You also
learned about the desktop appearance and functions and the contents of the Start menu.
In the next lesson, you will learn how to operate windows in the windows operating
system.
EXERCISES
Exercise 1 is designed to test your knowledge of a few of the terms introduced in this
section and to test your knowledge of the various function of the Windows OS desktop.
54
to illustrate a function or application.
SECTION 2
USING WINDOWS WITHIN AN OPERATING SYSTEM
2.1 Introduction
Another element of the GUI is windows. Windows are resizable work spaces for each
open program or function. Windows OS utilizes windows as part of their interface. In
this lesson, you will learn how to operate the controls for windows in the Windows OS
environment.
The Windows OS window includes the control menu, title bar, minimize button, maximize
button, close button, menu bar, scroll bars (right and bottom) and the size box. In the
next section, you will learn how to perform the basic Windows OS window operations.
55
2.4 Activating Windows
The image below displays two windows. You can distinguish the active window from the
inactive window by looking for the window with the darker color. The window at the top of
the image is inactive (the "My Computer" window) and the window at the bottom of the
image is active (the "Microsoft Word" window). To make a window active, click anywhere
inside the window or on the title bar. As windows are opened, a button for that window
will appear on the task bar and the active will appear recessed. Notice the task bar at the
bottom of the image.
56
Window can be placed anywhere on the desktop by clicking and dragging it. A window
can be moved using the title bar. To move the window, place the mouse pointer over the
title bar and click and drag to the new location.
The window can be resized using any of the borders. The border depicted in this tutorial
is the right border. Place the mouse pointer over the right border. The mouse pointer
changes to a double headed arrow. While holding the mouse button down, drag the
window with the mouse. Once you have adjusted the border to the new size, release the
mouse button. The window will expand or contract to fit the newly sized window.
Maximizing a window expands the active window to fill the entire screen. To maximize a
window, place the mouse pointer over the maximize button and click once. You can also
maximize a window by double-clicking on the title bar.
57
After clicking the mouse once in the maximize button, the window expands to fill the
entire screen. The mouse pointer does not stay in the same place and the maximize
button has changed from a one window icon to a two window icon.
To restore the window to its custom size, click on the Restore Button. Place the mouse
pointer over the restore button and click once. You can also restore a window by double-
clicking on the title bar.
The window will be restored to its original state, and the restore button will change back
to the maximize button.
Minimizing a window reduces the window to a button on the task bar. To minimize a
window, place the mouse pointer over the minimize button and click once.
The minimized window will be placed as a button on the task bar. Minimizing a window
does not change or destroy its contents. To expand the minimized window, click on the
corresponding button on the task bar.
58
2.10 Scrolling
Scrolling allows you to move the objects in the window either left, right, up or down.
Three different ways to scroll are:
OR
OR
Below are the three options available to you for closing a window.
Option A - place the mouse pointer in the close box and click once.
59
Option A
Option B
Option C
2.13 Summary
In this lesson, you learned how to recognize and operate windows in the Windows OS
environment. You are able to minimize, maximize, and close windows. Also, you
understand how to scroll, resize and move windows. In the next lesson, you will learn
about icons -another element of the GUI.
EXERCISE
Exercise 1 is designed to test your knowledge of the parts of the Windows OS window.
60
Menu Bar
Item A is: Control Menu
Scroll Bar
Title Bar
Item B is: Size Button
Minimize Button
Maximize Button
Item C is: Menu Button
Minimize Button
Close Button
Item D is: Maximize Button
Menu Box
Menu Button
Item E is: Close Button
Scroll Bar
Scroll Bars
Item F is: Title Bar
Menu Button
Workspace
Item G is: Close Button
Menu Button
SECTION 3
ICONS
3.1 Introduction
Now you are familiar with the desktop, you can recognize several unique types of icons.
Icons are pictures or symbols used to represent a folder or application/program. This
lesson introduces the types of icons and their respective functions.
There are five categories of icons in the Windows OS: program icons, file icons,
folder icons, shortcut icons, and special icons. Examples of a program icon, a
document icon, a file icon, and a shortcut icon are shown below.
61
3.3 Program Icons
Programs allow you to accomplish tasks on your computer. Program icons come in
many shapes and sizes, but they should give you a good idea of what the program is
just by looking at it. The image below depicts the following program icons: Microsoft
Word, Microsoft Access, and Microsoft Excel.
Files are typically created by programs. For the most part, file icons look like the
program that created them. The key to looking for file icons is the folded over upper-right
corner of the icon. Below are examples of file icons: a document created in Microsoft
Word and a spreadsheet created in Microsoft Excel.
Folders represent the containers where files and applications are stored. You may also
store folders within other folders. Picture a file cabinet with several drawers. Within each
drawer there are different types of folders -- hanging file folders, manila folders, and
accordion folders. Within each folder, you may also store other folders as well as files.
62
3.6 Shortcut Icons
A shortcut is a pointer to an item. The shortcut icon can be anywhere in the Windows
OS. When you want to open the item, double click on the shortcut icon instead of
searching My Computer or accessing it through the Start Menu. Below is an image of a
program shortcut icon. The key to looking for shortcut items is the arrow in the bottom
left-hand corner of the icon.
Some of the special icons include the my computer icon, my network places icon, the
recycle bin icon, the hard drive icon, the floppy disk drive icon, and a few others. Some
of the special icons are shown below.
63
My Computer Icon
The My Computer icon defaults in the Start menu but can be moved to a different
location. It is the doorway to all of your disk drives, including your hard drive, floppy
drive, CD ROM drive, and the printer folders. By opening this icon (with a double click)
you can see the hard drive and any other disk drives you have installed.
The Recycle Bin is the trash can for Windows OS. Here you drag items you no longer
want. This receptacle is not a permanent disposal. It is a container (like a folder) holding
64
all of your trash until you are ready to dispose of it permanently or until it consumes 10
percent of your hard drive. To completely delete the items in the recycle bin, you must
empty the recycle bin.
To throw items in the Recycle Bin, drag the file you want to throw away over the Recycle
Bin icon. When the Recycle Bin icon becomes highlighted, then release the mouse
button. The file or icon will be "thrown away." If you want to view the contents of the
Recycle Bin before emptying it permanently (remember emptying the recycle bin deletes
the files forever), double-click on the Recycle Bin icon and a window will appear
displaying its contents. If you decide to keep something you threw away, simply drag the
icon out of the Recycle Bin window and onto the desktop. When your recycle bin has
items in it, it will change from an empty recycle bin to one with paper in it.
To Empty the Recycle Bin, open the icon (double click on it) and select "Empty Recycle
Bin" from the Recycle Bin Tasks menu. A warning box will appear confirm you are sure
about deleting the files.
65
Hard Drive Icon
The next icon you see when you open My Computer is the hard drive icon. (The number
you see and how they are named varies depending on the computer you are using.) The
hard drive is the primary storage location on the computer. The hard drive serves as a
storage space for all of your files, old email, and all programs (including the operating
system). Hard drives are generally measured in terms of gigabytes. In general a hard
drive icon will appear as in the image below. Like all other icons, double clicking on it
opens the hard drive icon.
A floppy disk and a zip disk are both removable portable storage allowing you to move
data from one computer to another. A floppy disk typically holds 1.4MB of data. A zip disk
can hold much more, anywhere to 100-500MB. To check the space available simply
66
double-click the icon and view the details section. However, floppy disks have limited
storage capacity and are slower at saving and retrieving information than a hard drive.
Because floppy disks are portable, they are more susceptible to physical damage and
viruses than a hard drive. To access information on them simply double-click their
respective icon.
To insert a floppy disk, insert the disk into the floppy disk drive (usually this is drive A)
label side up and metal pointing in.
Choose My Computer from the Start menu and then double-click on the floppy disk
drive icon.
If the disk was successfully inserted in the floppy drive, you will be able to see the
contents of the disk.
To eject a floppy simply push the eject button on the floppy disk drive.
NOTE: Before ejecting a disk, be sure the computer is not reading or writing to that drive
(if the light for the drive is on or blinking, the computer is using that drive) otherwise you
may damage your data.
In addition to the hard drive and the floppy drive on My Computer, you may also see a
CD ROM (Compact Disk Read Only Memory) Drive or DVD Drive. CD ROMs are read
only storage medium. Newer CDs called CD-R or CD-RW allow you to write information
on them. Typically, a CD ROM holds up to 700 MB of information. While information
retrieval is faster than from a floppy disk, it is still not as fast as from the hard drive. The
CD drive appears in My Computer as in the image below. When you insert a CD into the
computer this is the icon you need to double click on to access it.
To insert a CD in the drive, open the disk tray (the open/close button is in different places
based on the type of computer you have).
67
Place the CD on the tray label side up and push the close button or push the tray in
manually.
If the CD was successfully inserted, you should be able to view the contents of the CD
by double-clicking on the icon.
To eject the CD, push the open/close button on the drive or Right click on the CD
drive icon and select Eject from the menu. The CD ROM tray will open.
3.8 Summary
Icons are small pictures representing an object, either a file, folder, shortcut, or program.
Icons all have various functions on the computer. You are now able to identify the five
categories of icons in Windows OS. All the hard disks installed on your computer have
an icon allowing you to access them. In the next lesson, you will learn about menus and
their functions.
EXERCISE
Exercise 2 is designed to test your ability to identify the special Windows OS icons.
68
Icon A is: My Computer Hard Drive
Floppy Disk Drive
SECTION 4
MENUS
4.1 Introduction
Menus, like icons, are another way to access information. A Menu is a list of options
from which you can execute commands. In this lesson you will learn about Windows OS
specific menus.
In the Windows OS environment, there are few items about menus you need to be
aware of.
Menu items can have a check mark in front of them. This means the item is enabled
and may be turned off.
Menu items may be dimmed or gray. This means the item can not be selected at this
time. The menu pictured below is an example of a pull down menu. Most menus in the
Windows OS are pull down menus.
69
Some menu items have an arrow to their right. Hovering over these opens sub-menus.
Some menu items show a keyboard shortcut after them. Indicating this menu item can
be executed by pressing the corresponding characters on the keyboard. (In this case,
pressing Ctrl+A).
70
4.3 Save / Save As Menu
After you create or make changes to a file you will want to save the file. Click on File and
choose Save As from the pull-down menu. Saving means sending your file to a disk,
either the hard drive, floppy disk, or zip disk. When you are saving a file for the first
time, a Save As menu will open asking for pertinent information. Once you have given
this information, you will only have to click on Save, unless you want to change any of
the pertinent information.
The Open menu looks and acts very similar to the Save As menu. To open a file click on
File and pull-down to Open. To open a file through this manner you will need to know
where the file is saved. If you forgot where the file is saved use the Search feature
(refer to Section 6).
71
4.4 Shortcut Menu
Shortcut menus are especially useful because they anticipate the commands you will
probably want when working on a particular task. Shortcut menus are also dynamic,
meaning they change depending on when and where you open them. To access a
shortcut menu, move the mouse pointer over the item whose shortcut menu you want to
view and right-click.
72
A shortcut menu is a pull-down menu. To make a selection, drag the mouse to the item
in the menu you want and click the
4.5 Summary
Menus are unique to the application or window they reside in. You now know how to
open and save a file using their individual menu. In this lesson, you learned about how
menus work and some of the unique menus in the Windows OS environment.
EXERCISE
Exercise 1 is designed to test your knowledge of terms and functions related to menus.
SECTION 5
FILE MANAGEMENT
5.1 Introduction
In Section One, you learned how computers receive and store data. In this lesson, you
will learn how the operating system presents the stored data and the basic options
available for managing the stored data.
73
In Windows OS, files are managed in a hierarchical file system. The hierarchical system
represents an upside down tree. The Hard Drive is organized by folders, subfolders and
files. In the Window OS, the root directory is C Drive. C Drive is organized into
directories*, subdirectories and files. The options for viewing and managing the specific
OS file structures will be discussed independently.
What you need to understand about the hierarchical file structure in Windows OS is that
the different types of drives (or storage devices) which are named with different letters.
Generally, the floppy disk drive is listed as the A: drive. The icon for the floppy will vary
depending on the view option that My Computer is set to. The Hard Drive is generally
listed as the C: drive.
74
5.4 File Structure Views
Before learning how to navigate and manage data in the Windows OS, it is important to
understand how the file structure can be viewed and what information is presented in
each view. The views available under the View Menu are Thumbnails, Tiles, Icons,
List and Detail.
View Menu
The Thumbnail view displays a miniature picture of the file or folder. If the folder
contains pictures, a few of the pictures will be displayed on the folder.
The Icons view only shows an icon indicating whether it is a file or a folder.
75
The List View vertically displays small icons showing the files and/or folders.
The Details view provides the most information, such as size, type, and date. The type
of information displayed under the Details view will vary depending on the window you
have opened.
76
In addition to seeing more information in the details view, the columns are adjustable.
To adjust the columns, move the mouse pointer to the dividing line at the right of the
column you want to adjust. The mouse pointer will change to a vertical bar with two
arrows. Once you have the vertical bar with two arrows, you can drag the dividing line to
the left or right.
The window can also be sorted into ascending or descending order by single clicking on
the column heading.
5.6 Navigation
Navigating in the Windows OS has been simplified with the Explore tool (this is not the
same as Windows Internet Explorer). To access the Explore tool, right click on Start
menu and select Explore from the menu.
To see the hierarchy of directories on a disk drive or folder, click on the plus sign (+) in
front of the disk drive or folder. Directories with plus signs and directories with no plus
signs will be displayed. Directories with a plus sign indicate there is another directory
inside. Directories without plus signs mean there are only files in the directory.
77
To help with any confusion an example is provided. You want to open the file
Report1.doc. You know this file is in the folder called American Literature. American
Literature is in a folder called Book Reports on C drive. So to get to the report you would
need to:
The string of names of folders you just opened to get to the file Report1.doc make up a
pathname. A pathname is a sequence of the names of the folders where a file resides.
The path name for the Report1.doc file is:
It's the Drive Letter with a colon and backslash after it and then the directories with a
backslash after each directory name. It is important to understand pathnames so you
78
know where to locate a file. When the results of a find are returned it gives you a
pathname of where to look for files and directories. Now you know pathnames start with
the drive letter and the names of the directories are separated by backslashes. The last
directory in the sequence is the directory in which the file is located. With the pathname
at your disposal, you can launch the Explore tool and then quickly open the directories
you need to find your file.
If you forgot where you saved a file and can not locate it using the Explore tool, you can
use the Search tool under the Start Menu. To activate the Search window, click on the
Start Menu and select Search.
From this window, select the type of file you are looking for. The type you select will ask
for different search factors. If you are not sure what type of file you are looking for, use
the All Files and Folders option. The more information you enter, the faster your search
results will be returned.
In the Windows OS, files, folders and shortcuts are treated the same with respect to how
the move, copy, and delete operations are performed.
Moving is the action performed when you want to relocate a file, folder or shortcut on the
same storage device (ex. desktop to hard drive). Click and drag the item to the new
location. When the location becomes highlighted, release the mouse button. The item is
79
now considered to be moved. For example, highlighting an item and then dragging it to
the recycle bin -- you moved an item.
You can also move a file or folder by selecting 'Move this file' from the File and Folder
Task menu. First select the file or folder you want to move and then click Move this file.
Once you click Move this file the Move Items window will appear.
Copying is the action performed when you want a copy of a file or folder. To copy a file or
folder click on the item you want to copy and hold down the Control (Ctrl) key on your
80
keyboard and drag it to the new location. Release the mouse button and the copying
process will begin.
You can also copy a file or folder by selecting 'Copy this file' from the File and Folder
Task menu. First select the file or folder you want to move then click Copy this file. This
process works very similar to moving the file.
You will know the copy process has started because the Copying status box will appear
on the screen.
The Copying status box will automatically disappear once the file has been completely
copied, and the item will be visible in the new location as well as the old location with the
same name.
81
When renaming files keep the file name extension the same.
Not all icons in the Windows OS environment can be renamed. If you single click twice
on an icon and no edit box appears around the name, the icon cannot be renamed.
Type the new name in the highlighted field. When you finish typing, press Enter on the
keyboard or click anywhere else on the desktop to accept the changes.
To free up space on your storage devices, unwanted files or folders can be deleted. One
way you have learned is to drag an item to the recycle bin. You can also select the file or
folder and press the delete key on the keyboard. Also, you can click Delete the File from
the File and Folder Tasks menu. A dialog box will appear asking you if you are sure
about sending the item to the Recycle Bin.
One way to enhance your file structure is to add folders. To create a folder click Make a
new folder from the File and Folder Tasks menu. You can also choose New from the File
Menu and then Folder from the new sub-menu. A new folder titled New Folder will
appear.
82
5.13 Formatting Removable Disks
When you format a disk you erase all the information on the disk and reset its filing
system. If you are formatting a used disk, make sure you do not need any of the
information stored on that disk. Also, make sure your disk is not write protected.
To format a floppy disk, insert the disk into the floppy disk drive (drive A:). Double-click
on My Computer and right-click on the floppy disk drive. Click on "Format" from the
menu.
The Format - 3 1/2 Floppy (A): dialog box will appear. Check the Quick Format box to
quickly remove all files and wipe the disk clean. When the process is complete click on
the close button. Your floppy disk is completely empty and ready to use.
5.14 Summary
In this lesson, we discussed the hierarchal structure of folder and files. You learned how
to manage and navigate in Windows OS using the Explore tool. Also, you learned to
83
copy, move, delete and rename files and/or folders. You can create folders and format a
floppy disk. In the next lesson, we will learn various ways to customize your Windows
computer.
EXERCISE
Exercise 1 is designed to test your knowledge of terms and concepts discussed in this
lesson.
A pathname is a sequence of
characters that allows you to identify
True False
where files are located in the Windows
OS.
SECTION 6
CUSTOMIZING WINDOWS XP
6.1 Introduction
Windows XP offers many different ways for each user to customize their computer. XP
makes it easy to set up and manage computer accounts for everyone who uses your
computer by having separate user accounts. In this lesson you will learn to customize
the Start menu, create shortcuts, personalize your desktop picture, and display
resolution.
A feature of XP is having different user accounts each with various accessibility and
settings. If you are an administrator or have full access on your XP computer, you are
able to add and remove user accounts.
84
Adding an Account
From the Start menu choose Control Panel and select User Accounts. Click Create a
new account, type in a name for the account and click next.
The next screen will ask you to choose what type of access this user will have to your
computer. You are able to choose from an administrator or Limited account. Selecting
each gives its individual options.
Note: If the account is for a one-time use you can allow the user to log on using a Guest
account.
Deleting an Account
From the Start menu choose Control Panel and select User Accounts. Select the
account you want to delete and click "Delete the account".
85
Before you delete the account, you will be asked if you want to keep or delete the user's
files. If you decide to keep the user's files the desktop and My Documents folders will be
saved. A confirmation screen will make sure you want to delete the account.
To customize the Start menu, right-click over the Start menu and choose Properties. The
Taskbar and Start Menu Properties window will appear.
Select the Customize button to change the appearance of the Start menu.
86
Add/Remove Shortcuts from Start Menu
A new feature in Windows XP allows you to easily add a program to the Start menu; this
action is called pinning. First find the program you want to add to the Start menu, either
through All Programs in the Start Menu or by searching through the hard disk. Once you
locate the program, right-click over it and click Pin to Start menu.
87
To remove a program from the Start menu shortcut list, simply right-click over the
program and choose Unpin from Start menu.
88
If you drag the program straight from the Start menu, make sure you hold down the
Control (Ctrl) key. If you do not hold down the Control key, you will be moving your
shortcut from the Start menu to the desktop.
The little picture appearing next to your name on the log on screen and on the Start
menu can be changed. To change the picture, click on the Start menu and click on the
picture. The User Account window will open and allow you to choose a different picture.
89
6.6 Changing Your Display Properties
To open your Display Properties, right-click on any blank space on your desktop and
choose Properties.
90
6.8 Selecting Desktop Icons
From the Desktop tab on the Display Properties click the Customize Desktop button.
From the Display Properties window, choose the Settings tab. From this tab you can
change the screen resolution. Changing the resolution changes the amount of
information you can view on your screen. As you increase the pixel resolution, more
information will fit on the screen because everything will be smaller.
91
6.9 Summary
You are now able to customize your Windows XP computer making it easier, more
efficient, and personally set up for you. You can manage the user accounts by adding
and deleting user accounts with various levels of accessibility. You can also specify a
different image for each user account. The next lesson discusses how to maintain your
Windows XP computer and get help when needed.
EXERCISE
Exercise 1 is designed to test your knowledge of terms and concepts discussed in this
lesson.
92
the desktop.
SECTION 7
MAINTENANCE AND HELP
7.1 Introduction
For the most part, computers operate with minimal errors or difficulty. Occasionally,
however, a computer will stop responding. When this happens, it is necessary to exit the
application or program you are using. Occasionally, it is necessary to restart your
computer in order to restore normal operating conditions. This lesson will give you some
basics in maintaining your computer and receiving help for common errors.
By executing this key combination, the Task Manager window will be displayed. Click on
the Task Manager button and choose the Applications tab. The window will list all the
active programs. The stalled program will have "not responding' listed after it. Click on
this program and then click on the End Task button. Be patient -- sometimes it will take a
while for the computer to properly end the program.
If End Task is successful the program will close and you will lose any unsaved changes.
(Save your work OFTEN.) Once you have closed the stalled application, save any other
unsaved work, close all open programs and then restart your computer.
If End Task is unsuccessful, the computer or program will still be stalled. Press the
Ctrl+Alt+Delete keys again and choose Shutdown from the Task manager.
If the above procedure does not work, you will need to manually turn off your computer.
If your computer has a reset button push it. If it does not, hold down the power button for
5 seconds to completely turn it off. Wait 30 seconds before turning it back on.
93
If End Task is successful, you will want to restart the computer after closing all
documents and programs. To restart the computer, click on the Start Menu and choose
Shut Down. From the Shut down Windows dialog box choose Restart the computer. The
computer will shut itself down and restart Windows.
A new feature of Windows is the System Restore function. If you have made a change to
your computer that seems to be causing problems, you can revert to your previous
settings. System Restore returns your computer to an earlier time without causing you to
lose recent work and email.
Click on the Start menu- All Programs - Accessories - System Tools - and select System
Restore. This menu will give you two options, either restore to an earlier time or create
restore point. Restore points are automatically created and from this same menu, you
can also create your own restore points.
From this window you will be able to identify the current operating system, the speed of
the processor and the amount of RAM installed.
94
7.6 Getting Help
What's This?
If you are not sure what something does, right-click over the item and choose What's
this? This menu is not available for everything, but it is quick and easy help when it is
there.
95
Clicking on the What's This? will open a help window with a short description. Clicking
anywhere else will close the help window.
96
other support services. Click on the Start menu and choose Help and Support. Here you
can select from the topics or search a topic for assistance.
7.7 Summary
You have learned the procedure to follow when your Windows XP computer is not
responding. Using the Ctrl+Alt+Delete keys will bring up the Task Manager. The task
manager allows you to close individual programs and shutdown your computer. You
have also learned how to find help and support for Windows XP issues. Congratulations!
You have just completed the Introduction to Computers Module over Windows XP.
EXERCISE
Exercise 1 is designed to test your knowledge of the terms and concepts discussed in
Section 7
97
SESSION 2
WORD-PROCESSING SOFT WARE /WORD PROCESSOR
Word processing software is a computer application program used everyday to create
any viewable materials such as letters, memos, reports, and other documents. The most
widely used computer application is word processing. It enables a computer to
produce or modify documents that consist primarily of text.
One advantage of using it to produce a document is the capability to easily change what
has been done since the document is stored electronically. It is also an effective way of
storing document because many documents can be stored on a disk or diskette.
Word processing software can be used on personal computers and well as larger
systems like minicomputers or mainframes. Dedicated word processing systems are
used for only word processing.
CREATING
Creating a word processing document involves entering text usually by using the key
board. Key word processing features in this step include.
1. Word wrap 2. Scrolling 3. Moving the cursor.
Word wrap provides can automatic line return when the text reaches a certain position
on the document such as the right-hand margin.
Scrolling is the process of moving the document so that the user can view any potion. It
can be scrolled (moved) up and down. For large documents it can be scrolled left and
right, as well.
Moving the cursor: The cursor is a symbol, such as an underline character, rectangle,
or vertical bar that indicates where on the screen the next character will appear. The
cursor is moved by using the mouse or keyboard. Cursor control keys on keyboard move
98
cursor one character or line at a time. If the keys are held down, the movement is
repeated until the key is released.
The Page Up and Page Down keys are used to move a page (screen) at a time. Home
and end keys are used to move to the beginning or end of a line. Other key
combinations can be used to move to the beginning of word, paragraphs or start or end
of the document.
EDITING
It is the process of making changes in the content of a document. Word processing
editing, features include cutting, copying and pasting, inserting and deleting, and
searching and replacing. Advanced editing features include spell checking, using a
thesaurus, and grammar checking.
Cut, copy and paste: To cut involves removing a portion of the document and
electronically storing it in a temporary location called the clipboard. It can then be placed
somewhere else in the document from the chipboard by giving a paste command. When
you copy, a portion of the document is duplicated.
Insert and Delete: When you insert; you add text to a document. When you delete, you
remove text. Most word processors are normally in the insert mode that is as you type
any existing word is pushed down the page to make room for the new text. But when
they are in the over overtype modes new text replaces any existing text.
Search: The search feature lets you find all occurrences of a particular character, word,
or combination of words. Search can be combined with replace to substitute new letter
or words for the old.
Spell checking: A spelling checker allows you to review individual words, sections of a
documents or the entire document for correct spelling by comparing with an electronic
dictionary in the word processing software. Spelling checkers can catch misspelled
words or words that are repeated, say the cannot identify words that are used
incorrectly.
Thesaurus allows one to look up synonyms, for words in a document while using the
word processor, the cursor is put on the word to check, and activate thesaurus with
either a keyboard command or a pointing device. The designed word is automatically
incorporated in the document by replacing the previous word.
Grammar checker is used check for grammar, writing style, and sentence structure
errors. This software checks documents for excessive use of word or phrase, identify too
long sentences and find words used out of context.
FORMATTING
To format means to change the appearance of document. Word processing features that
can be used to format a document include the following:
99
Typeface, font, and style
A typeface is a specific set of characters that are designed the same. Arial and Times
New Roman are examples. The size of a typeface is measured in points with each point
about 1/72 of an inch. The text you are reading now is eleven (11) point type. A font is a
specific combination of typeface and point size. It is common to hear and read
typefaces being called fonts. A particular style such as bold, Italics or Underline, can be
applied to make it stand out.
Justification/ alignment deals with how text is positioned in relation to a fixed reference
point, usually a right or left margin. Full justification aligns text with both left and right
margin. Left and right justification aligns with the left and right margins only. Centered
justification aligns the text equally on either side of a reference point, usually the center
of a page.
Spacing
It deals with how individual letters (horizontal spacing) and lines of text (vertical spacing)
are placed. With mono-spacing, each character takes the same amount of space with
proportional spacing wide characters (W or M), are given more space then narrow
characters such as an I. Line spacing increases the distances from the bottom of one
line to the bottom of the next line. Single and double line spacing are the most common.
Tables are a way of organizing flows to the top of the next column. User can add or
change information on a table or move the entire table as a single item.
Graphics: Most word processors can now incorporate graphics such as drawings or
pictures. Some graphics are chided in WPP packages. But graphic items are usually
created in separate applications and imported into the WP document.
Headers and footers allow you to place the same information on the top or bottom of
each page. An item that may appear in a header or footer includes a company’s name,
report title, data, or page numbers.
100
Style sheets let you save font and format information so it can be applied to new
documents. It saves considerable time if you use different formatting techniques on
frequently created documents such as company letter head, a memorandum, or report
that is prepared each month.
PRINTING
Most WP, give the user many options other than printing a single document.
Print preview: It allows the user to see on the screen how the document will both like
i.e. What You See Is What You Get (WYSIWYG-pronounced whiz-e-wig).
PRACTICAL WORK
SECTION 1
Although there are several word processing applications on the market today, the
computer labs at OLA Training College, Cape Coast, Ghana have Microsoft Word
installed on them. This lesson covers some basic word processing concepts, but also
will introduce you to the common screen elements found in Microsoft Word. For the most
part, the screens in Microsoft Word XP (Windows OS) and Microsoft 2000 (Macintosh
OS) look very similar. The screenshots are taken from Word 2000 unless otherwise
specified.
Microsoft Word has several unique elements which make navigation, formatting, and
editing a document easier. In this lesson, we will discuss some commonly used toolbars
and navigation.
The image below, should help you understand the main parts of the Microsoft Word XP
window. The parts of the window are as follows: 1) Menu Bar, 2) Standard Toolbar, 3)
Formatting Tool bar, 4) Title Bar and 5) Status Bar.
101
The image below, should help you understand the main parts of the Microsoft Word
window (Macintosh OS). The parts of the window are as follows: 1) Menu Bar, 2)
Standard Toolbar, 3) Formatting Tool bar, 4) Title Bar and 5) Status Bar.
In Microsoft Word XP, the Title Bar appears at the top of the document window and
contains the name of the document. The default name for a new document is
Document1 with each following document named Document2, etc. After the new file is
saved, its new file name will replace the default name in the title bar.
102
At the bottom of your screen is a Status Bar displaying your current Page Number and
Location on the page in inches, lines, and columns. The status bar also allows you to
see a word count of the documentation.
Toolbars allow you to work with frequently used commands. You can easily customize
toolbars by adding and removing buttons, hiding or displaying toolbars, and moving
toolbars. The Toolbars that are most often used are displayed at the top of the window.
The Standard Toolbar consists of icons used for commonly executed tasks. These
include icons for Opening, Saving and Printing files.
The Formatting Toolbar displays the current Style, Font and Text Formatting.
Click on the toolbars you wish to display. Currently displayed toolbars will have a
checkmark in front of its name.
To hide a toolbar, click on the View menu and click on the checkmark next to the
toolbar you wish to hide.
Floating a Toolbar
Click on the dotted lines at the front of the toolbars (usually gray) area on the toolbar you
wish to move. The cursor will turn into a four headed arrow.
103
Drag the toolbar until a title bar appears and release the mouse button. In the image
below, the standard toolbar below has changed to a floating toolbar.
Docking a Toolbar
Hold down the mouse button and drag the toolbar into docking position until the title bar
disappears. In the image below, the quadruple arrow on the far left side of the toolbar
represents the docking of a toolbar.
Microsoft Word allows you to look at your document in different ways called Page Views.
To the left of the Horizontal Scroll Bar (in the lower left hand corner) are the Page Views
Selector Buttons. To change from one page view to another, click on the corresponding
button at the lower left-hand side of your screen or go to the veiw menu and select
another view option.
104
A review of the different Page Views follows.
If you click on the left most button , your page view will be Normal.
This view allows you to view your document as text only with no special formatting or
layout. You will see page, section, and column breaks in this view as well. The dotted
line in the image below indicates a page break below.
In the Web Layout View you see backgrounds, AutoShapes, and other effects in Web
documents. You can also see how text wraps to fit the window and how graphics are
positioned.
105
The Print Layout View (Page Layout in the Macintosh) is an editing view that will
display your document, as it will print. Use this view to see margins, page numbers, and
footers, as they will appear when the document is printed out.
106
1.3 Opening a New Document
When you open Microsoft Word, the program generally provides you with a new, untitled
document labeled Document1. If you do not see a new document or if you want to create
a new document after you have opened Microsoft Word, there are serveral options to
choose from.
The New Document task pane opens, listing files you've used recently, a new blank
document, existing files, or new templates. Choose the Blank Document option listed
under the New section.
107
Note: On Macintosh you only need to select New from the File Menu.
OR
Another option for opening a new document for both the Windows and Macintosh OS is
to click on the New button on the Standard Toolbar. A new document will appear.
OR
Press the Ctrl button and N at the same time (Command (N) on the Mac), and a new
document will appear.
You now have a new document. Notice that there will be a generic title at the top of the
page. It is recommended that you save your document now with a new name before you
begin typing. Refer to the section later in this module called Saving a New Document for
more information.
If the document you want to open is one that was used recently, it will be listed under the
File menu (on the menu bar). Move your pointer to the list of recently used files, just
above Exit (or Quit on the MAC OS) at the bottom of the menu. Select the file and it will
open automatically. If the file came from a removable disk be sure to insert the disk into
the corresponding drive in order to retrieve the file.
Selecting Open from the file menu or clicking on the Open icon brings up the Open
dialog box. This shows a list of the contents of the folder where a workbook was last
saved.
108
Microsoft Word XP
The save as window will open the first time you save regardless of whether you clicked
Save or Save As because you need to give the file a name and destination.
109
To save a document: Click on the File menu and select Save OR Click on the Save icon
on the standard toolbar, and the Save As dialog box will appear.
MAC OS
110
1.6 Saving an Existing Document
Saving an existing file using Save As: allows you to rename a document or to choose a
new location to save it to. You might want to use part of one document in another one
(for example a series of assignments using the same or very similar layout). Perhaps
you simply want to create a document so you can keep the older version as a back up.
The Save As... command allows you to make these changes.
You can move around documents by using the scroll bars, the keyboard or the mouse.
To move the insertion point with the mouse, move the mouse pointer to the new location
and click. The example below demonstrates the positions of the scroll bars. If you need
a review of window features please review Module One.
The keyboard commands below are shortcuts for moving around documents.
111
document
Bottom of
<End> <Ctrl><End>
document
Top of Previous <Ctrl><Alt><Page
<Option><Page Up>
page Up>
Top of next <Ctrl><Alt><Page
<Option><PageDown>
page Down>
Goto Key G <Ctrl>G
1.8 Summary
In this lesson, you learned about the commonly used screen elements in Microsoft
Word. You also learned how to create, open, and save a document as well as how to
navigate within a document. In the next lesson, you will learn how to format the
document text and layout.
EXERCISE
112
The ____ view allows you to view
topic levels or an entire Outline Normal Print Layout
document.
SECTION 2
FORMATTING TEXT
2.1 Introduction
When you discuss formatting you are referring to the way something looks. Microsoft
Word gives you the option of changing the size, color, and style of text or paragraphs in
a document. This lesson will discuss basic formatting concepts as well as the specific
ways to accomplish those formatting tasks using Microsoft Word.
In order to make some changes to text in Microsoft Word you must select it first. Word
provides many ways to select text. The selection bar is the empty space at the left hand
margin of the text. The selection bar allows you to quickly select lines, paragraphs or the
entire document without scrolling.
When you are in the selection bar area the pointer becomes a right
pointing arrow. The following table demonstrates the actions used to
select different sections of text.
113
following
A Word Double-click mouse on word
A line Click in selection bar beside the line
A paragraph Double-click in selection bar
Click at beginning of text block, hold down the
A block of text
<Shift>key and click at the end of text block
Entire document Ctrl while clicking in selection bar or Press Ctrl A
Deselect a block of
Click anywhere on white background
text
Press the Command Key ( ) instead of Ctrl key when using a
Macintosh.
You can format text before it is typed into the document, or once you have entered your
text into the document, you may decide to change the way the text looks on the page.
You may choose to change the font style or size, the orientation of the text on the page,
or the location of a block of text on the page.
OR
To format the text of the whole document you may go to the Edit menu and choose
Select All or use the keyboard short cut Ctrl A (Command A on the Mac).
Once you have selected the text, review the next sections to see the different formatting
options that Microsoft Word provides.
Font
In this section you will learn how to change the font, font size, font style, and color of
selected text. The following diagrams reveal how to perform font changes from the
Formatting toolbar and the Font dialog box.
114
From the Font Dialog Box:
To open the font dialog box select Format from the menu bar and click on Font.
You may also change the fonts tyle of selected text through key board shortcuts. The table
below lists the key board shortcuts for each font style. These are "toggle" controls that are
turned on and off each time you select them.
115
There are a number of paragraph formats that make formatting documents much easier.
The following section outlines the justification, indention, line spacing, and tab set
options. The following diagrams will demonstrate how to perform the commands using
the toolbars, ruler, and the Paragraph dialog box.
To select a paragraph for formatting, place your cursor anywhere within the paragraph. If
you need to format more than one paragraph, you will have to highlight each of the
paragraphs. Once a paragraph format has been applied it will be applied to all of the
following paragraphs.
2.5 Justification
There are four buttons on the Formatting Toolbar which can be used to select whether
text is Left Align, Centered, Right Align or Justified.
Centered - text that is centered between the left and right margins.
Click on the appropriate button and all text selected will follow that formatting style. OR
2.6 Indenting
The Ruler at the top of the document window displays the current margin and tab
settings as well as paragraph indentation. The two small triangles on the left side of the
ruler control the left indents. The upper triangle controls the first line indent. The lower
triangle controls the second line left indent called the hanging indent. The rectangle
below the bottom triangle is used to create a left indent for an entire paragraph. The
116
triangle on the right side of the Ruler is used to set the right indent for an entire
paragraph.
Drag the top and bottom triangle on the left hand side (using the box) to the desired
point on the ruler.
Drag the right hand side triangle to the desired point on the ruler.
Drag the top triangle to the right. The bottom triangle does not move.
Drag the bottom triangle to the right. Top triangle will not move.
117
Using the Increase Indent button :
Select the paragraph you wish to indent and click on the Increase Indent button on the
formatting toolbar.
Select the paragraph you wish to decrease the left indent for and click on the Decrease
Indent button on the formatting toolbar.
The paragraph will decrease the left indent by 1/2 inch increments.
Position your cursor anywhere in the paragraph in which you would like to change the
line spacing.
Click on the Line Spacing button list arrow to select the new spacing size.
A Tab Stop is a place on the ruler where the text moves when you press the tab button
on the key board.
Each click on the button changes the tab indicators shape. The default tab setting is left
justify. The sequence is: Left, Center, Right, Decimal tab, Bar tab, First Line Indent, and
118
Hanging Indent. Default tab stops are positioned every 1/2 inch on the Ruler and are
Left-aligned.
Each click on the tab button will change it to a different tab. The Center Tab is pictured
below.
If you click the tab button a second time, the Right Tab shape will appear.
Select the appropriate tab stop button and click on the Ruler where you want to place
the tab.
To move the Tab Stop, drag the tab stop to the new position.
119
To delete a tab stop, drag the tab off the ruler.
Leader Tabs are often used when creating a table of contents to draw the reader's eye
across the space between the chapter name and the page number on which the chapter
begins.
Select the paragraphs in which you want to insert leader characters before a tab
stop.
On the Format menu, click Tabs.
In the Tab stop position box, type the position on the ruler where you want a new
tab, or select an existing tab, to which you want to add leader characters.
Under Alignment, select the alignment for text typed at the tab stop.
Under Leader, click the leader option you want, and then click Set.
Click OK
Press the tab key and the leader tabs will appear.
You can make paragraph changes to a document through the Paragraph dialog box. The
diagram below explains how to indent, justify, and set line spacing for a paragraph.
120
The Line and Page Breaks tab allows you to set rules for handling line breaks and page
breaks, widow/orphan control, turn automatic hyphenation off, and set tab stops for
selected paragraphs.
Text can be moved around in a document by using the Cut, Copy, and Paste commands.
The following section explains what each command is used for and how to perform each
command using the Edit menu, the Standard toolbar, and the keyboard shortcuts.
Cutting Text
121
Cutting text will remove the selected block of text from its original location and place it
temporarily on the clipboard. You may choose to paste the text into a new location or
continue typing. If you do not paste the text, the information will be lost as soon as you
select Cut or Copy again.
OR
OR
Press Ctrl key and the X key at the same time on the keyboard.
Copying Text
Copying text will make a duplicate of the selected text and places it temporarily on the
clipboard. This allows you to paste it in a new location-either within the same document
or in another document.
OR
OR
Press the Ctrl key and the C key at the same time on the keyboard.
Pasting Text
Pasting text will place the contents of the clipboard into the new location. You may
repeatedly paste the contents of the clipboard until you cut or copy again.
Place your cursor in the document where you want to paste the text.
OR
122
Click on the Paste icon in the Standard toolbar.
OR
Press the Ctrl key and the V key at the same time to Paste.
NOTE: On the Macintosh OS, press Command instead of the Control key to perform the
following commands.
Paste Options
Microsoft Word XP allows you to determine the format of the items pasted by clicking on
the Paste Options button that appears just below your pasted selection. The Paste
Options menu will pop up and you may select from the following options:
Keep Source Formatting - Pasted selection keeps exact style and format from
destination copied.
Match Destination Form - Pasted selection matches the style and format of the
document you have pasted onto.
Apply Style or Formatting - Create your own style and format of the selection pasted.
The Backspace and Delete Keys on the keyboard are used to delete text. Backspace
will delete text to the left of the cursor and Delete will erase text to the right. To
delete a large section of text, highlight it using any of the methods outlined previously
and press the Delete key
2.12 Summary
In this lesson, you learned how to manipulate text and paragraphs within a document.
You also learned how to change the font, font style and size, and text color as well as
alter the justification and indentation of a paragraph, how to create a tab stop, and lastly
how to cut, copy and paste. In the next Lesson, you will learn how to format the
document for printing.
123
EXERCISE
SECTION 3
FORMATTING A PAGE
3.1 Introduction
In the previous lesson, you learned how to format text and paragraphs. In this lesson
you will learn how to change the appearance of the page when it is printed. The
following formatting concepts and how they are accomplished will be discussed: setting
margins, indents, tabs, line spacing, page breaks, headers and footers, and endnotes
and footnotes.
Open the File Menu and select Page Setup. (On the Mac click on the Page
Attributes pop up menu and select the Microsoft Word option. The dialog box will
change to reflect the different page setup options for Microsoft Word, from there
click on the Margins… button to open the Document dialog box.)
124
The diagrams below demonstrate how to change the margins in both Word XP
and Macintosh versions.
125
Microsoft Word 2000
To display the paragraph markers, tabs, and space codes, click on the Show /Hide
Paragraph Button from the Standard Toolbar.
When the Show/Hide Paragraph Button is pressed, a horizontal dotted line across the
screen represents a page break. Word inserts default page breaks at points determined
by page layout and top and bottom margin settings. If you do not have the Show/Hide
Paragraph button pressed, you can see inserted page breaks using the Normal View
and see the different pages in Print Layout View.
Position the cursor where you would like to place the Page Break.
In the Break dialog box click on Page Break and select OK.
On the Mac click on the Insert menu and select the Page Break option.
126
Select the horizontal dotted line.
A Header is text appearing at the top of each page. A Footer is text appearing at the
bottom of each page. You may type text into a header or choose to insert fields that are
updated automatically. Any text typed into a header or footer may be formatted like the
text in the document, for a review of text formatting see Lesson 2. Follow the diagram
below to learn how to create a Header or Footer and to insert fields using the Header
and Footer toolbar.
127
An editing pane revealing the Header and Footer area will appear on your document as
well as the Header and Footer toolbar.
The Header and Footer window is divided into three sections: the left margin,
center and right margin.
To move through the sections press the tab key or click on the proper justification
button in the Standard toolbar.
Once you have the correct section you may enter your text or use the Header
and Footer toolbar to insert fields like the page number, time, and the date. The
following diagram gives an explanation of the fields and buttons found on the
Header and Footer toolbar.
You can view your Headers and Footers by choosing Print Layout from the View menu
or select Print Preview from the File menu.
NOTE: Headers and Footers appear grayed out in a document unless you are creating
or editing them.
128
Editing Headers and Footers
Footnotes and Endnotes explain, comment on, or provide references for text in a
document. You can include both footnotes and endnotes in the same document. The
difference between the two is Endnotes typically appear at the end of a document, and
Footnotes appear at the end of each page in a document. Footnotes and Endnotes
consist of two linked parts: the note reference mark and the corresponding note text.
Select the Footnote command from the Reference menu. If you are using a
Macintosh simply select Footnote… from the Insert menu.
A dialog box will appear. The following diagram will show you how to insert
footnotes and endnotes.
129
Once you have clicked the Insert button, in the footnote or endnote section enter
the text after the number. Click the Close button to return to your document. The
footnote or endnote number appears in your text.
3.10 Summary
Now that you have learned how to open a new document, format the text and the page,
you must learn how to proof your work before turning in an assignment. The next lesson
will show you how to check your spelling and grammar in a document.
EXERCISE
130
This tab ( ) aligns the right edge of a
True False
line of text with the decimal point.
SECTION 4
PROOFING
4.1 Introduction
Once you have finished typing and formatting your document, you need to proof your
work for accuracy. This lesson will discuss how to check the spelling and grammar in
your document.
There are two ways to spell check your document. Position your cursor at the beginning
of document and select one of these commands:
Open the Tools menu and then select Spelling and Grammar... (On a Macintosh
simply select the Spelling option.
OR
Click on the Spelling and Grammar button from the Standard Toolbar.
The Spelling and Grammar dialog box appears and Word begins spell and
grammar checking.
131
When spell checker finds a word that is not in the dictionary, the mispelled word is
highlighted in red in the Not in Dictionary: section of the dialog box. You may then
choose one of the following options:
Ignore -- If the word is spelled correctly, and you do not want to make changes to
the word.
Ignore all -- If the word is spelled correctly and you want Word to ignore all
cases of this word in the whole document.
Add to Dictionary -- Allows you to add the word to the Custom Dictionary. (For
example if you would like to add a name.)
Change -- If the word is misspelled, In the Suggestions section of the dialog box
Word will give alternative spellings. Select the correct spelling and click Change.
Change all -- This option causes Word to change all instances of the misspelling
in the document.
Undo --Allows you to reverse the most recent spelling and grammar check
actions, at one time.
NOTE: Word uses a dictionary installed with the program to check for misspelled words.
If a word is not in that dictionary, Word will assume it is misspelled. Word does not check
to see if homophones (words that sound the same but are spelled differently) have been
used properly. For example, if you type a sentence that says "Fuzzy Wuzzy was a bare."
Word's dictionary will not recognize that "bare" is used improperly in this sentence-only
that "bare" was spelled correctly.
When checking grammar in a document, Word will find a sentence that is not
grammatically correct, and display the error in green text.
132
Following is an explanation of the options you have when checking grammar in Word:
Ignore Once-- If the grammar is correct and you do not want to make changes.
Ignore Rule-- If you want Word to ignore the grammar rule in all instances where
the rule applies for the whole document. (Ignore All is the option for Macintosh
users)
Next Sentence -- If you want to move to the next sentence without changing
anything.
Change -- If you agree with the suggested grammatical change.
Explain -- Provides more information about the possible grammar error.
(Macintosh users do not have this option)
NOTE: The Grammar Checker is very good at detecting run-on sentences, repeated
words, and incomplete sentences. However, some of the grammatical changes Word
suggests may be subjective or inappropriate in the context of your document. Use your
judgment when using the Grammar Checker.
If you have the automatic spelling and grammar check turned on, as you type, Word will
underline spelling errors in red and grammar errors in green. To fix the error immediately
you may right click (control click on the Macintosh) over the line. This will reveal a
shortcut menu containing a list of suggested corrections, choose either the right spelling
or the correct grammar correction and the error will be corrected in your document. If
you do not agree with the automatic spelling or grammar check, after right clicking the
error and choose Ignore All from the shortcut menu and the error will disappear.
4.5 Summary
Now that you have created, formatted and proofed your document, you are ready to
print. The next Lesson will show you how to print your document.
133
EXERCISE
SECTION 5
PRINTING
5.1 Introduction
Once you have finished typing, formatting, and proofing your document, you are ready to
print. This lesson will discuss how to preview your document before printing and to print
your document.
Print Preview displays the document the way it will be printed. To preview your document
before printing:
OR
In the Print Preview mode you will notice when you move the mouse pointer over the
134
The Magnifier Button is used to enter and edit text in Print Preview mode. By default
Word has the button selected, click on the Magnifier button to deselect it and it will turn
the mouse pointer from a magnifying glass to a cursor and then you may enter or edit
text in Print Preview mode.
Press the Control key plus the P key on the keyboard at the same time.
(Command + P on the Macintosh)
A Print dialog box appears showing you the printer that the document will be sent to. The
following diagram explains the different print option found in the Print dialog box.
135
View Parts of Microsoft Word 2000 Window
5.4 Summary
When printing documents in the lab, pay close attention to which printer your document
will be sent to. The next lesson will cover where to find basic Help in Microsoft Word.
SECTION 6
HELP
6.1 Introduction
Occasionally, you may find that you are unable to do a particular task in Word. This
lesson will show you where to go to find Help.
Microsoft Word provides a help system allowing you to find information about the
program and how to use the different features and commands available.
Click on Help in the Menu bar and select Microsoft Word Help.
OR
136
Click on the Microsoft Word Help button on the Standard Toolbar.
Performing one of the previous actions opens the Microsoft Word Help dialog box. The
dialog consists of two panes. In the top of the left pane are three tabs that allow you
different methods of using the Microsoft Word Help dialog box. The following sections
give you a diagram on how to use each of the tabs.
137
Using the Answer Wizard tab:
138
6.3 Getting Help from the Office Assistant
Microsoft Word also has a feature called the Office Assistant. The Office Assistant can
answer your questions, offer tips, and provide Help for a variety of features specific to
the Office program you are in.
The default image of the office assistant for Microsoft Word looks like a paper clip with
eyes floating on a yellow sheet of notebook paper. To open the Office Assistant go to the
Help menu in the Menu bar and select Show the Office Assistant.
The Office Assistant appears in the right side of your screen with a dialog
box asking you “What would you like to do?”
Type your question and click Search.
The Office Assistant will search the Help database and offer some
suggestions for how to accomplish your desired task. Click in the button
next to the topic to reveal its information.
Once you have finished using the Office Assistant, you can turn it off by
Selecting Hide the Office Assistant from the Help menu in the Menu bar.
6.4 Summary
You have now completed the Word Processing Module. You have learned how to use
Microsoft Word to create, format, save, and print a document.
Exercise
Completion
_________________________ 1. When saving, click ___ to keep a previously named
version of a document.
_________________________ 2. Give three examples of character format.
_________________________ 3.
_________________________ 4.
_________________________ 5. To open new document, click ___ icon or use ___ from
the file menu.
_________________________ 6.
_________________________ 7. To move text to another location, click ___ icon or use
___ from the edit menu.
_________________________ 8.
_________________________ 9. To open an existing file, click the ___ icon or use the
___ from the file menu.
_________________________ 10.
_________________________ 11. Click __ to clear the screen of a document so you
can continue working on another document.
_________________________ 12. To copy text to a new location, one must follow four
important steps. List them.
_________________________ 13.
139
_________________________ 14.
_________________________ 15.
_________________________ 16. ___ symbol in the document shows the user the
location of the mouse.
_________________________ 17. Clicking the mouse changes the location of the ___
___ which blinks to show the location of the next
character to be typed.
_________________________ 18. Default tabs are set at every ___.
_________________________ 19. Default margin measurements are set at ___(top),
___(bottom), ___(left and right).
_________________________ 20.
_________________________ 21.
_________________________ 22. Default alignment is ___.
_________________________ 23. To save a file you must indicate the location you wish
to save it. If you save it to a floppy, you would designate
the ___ drive. If you save it to the hard drive, you would
designate the ___ drive.
_________________________ 24.
_________________________ 25. Once a document has been named, the document
name appears on the ___ of your application window.
_________________________ 26. You would select ___ from the file menu to rename
your document.
Short Answers
27. How may the insertion point be moved down three lines and ten spaces to the right
without affecting text?
28. What does pressing the Enter key do when keying in a word processor?
29. What is the difference between pressing the Delete key or the left arrow key in the
middle of a line of text?
31. How can a menu be removed from the screen with out executing a command?
32. If you display a dialog box by mistake, how can you remove it from the screen?
Matching
140
__________ underline 1.
__________ cut 2.
__________ save 3.
__________ right tab 4.
__________ new 5.
__________ undo 6.
__________ show/hide 7.
__________ close box 8.
__________ print 9.
__________ center 10.
__________ open 11.
__________ copy 12.
__________ italic 13.
__________ bold 14.
__________ paste 15.
__________ left justify 16.
__________ decimal tab 17.
__________ minimize 18.
Short Answers
141
31. Click mouse to deselect
32. Click cancel button
Matching
8. Underline 5. Center
9. Cut 1. Open
15. Save 4. Copy
14. Right tab 11. Italic
13. New 7. Bold
16. Undo 17. Paste
18. Show/hide 3. Left justify
12. Close box 6. Decimal tab
2. Print 10. Minimize
142
_________________________ 14. What type of printer are we using in the laboratory?
_________________________ 15. What feature improves the display on a monitor over
the older monitors?
_________________________ 16. Name three examples of computer storage.
_________________________ 17.
_________________________ 18.
_________________________ 19. What size of floppy disks is most commonly used?
_________________________ 20. ______and _____ determine the number of
characters stored on a floppy disk.
_________________________ 21.
_________________________ 22. High density floppy disks store ___mg of data.
_________________________ 23. List three care procedures to follow when using a
floppy disk.
_________________________ 24
_________________________ 25.
_________________________ 26. Data is stored internally on your computer's ____.
_________________________ 27. CD-ROM initials stand for ___ ___-___ ____ ___.
_________________________ 28. ____ software is used to tell your computer how to
load, store, and use an application.
_________________________ 29. Use of icons to make operating system user friendly
by providing visual clues is called _____.
_________________________ 30. Name five basic types of application software.
_________________________ 31.
_________________________ 32.
_________________________ 33.
_________________________ 34.
_________________________ 35. A ___ device converts digital and analog signals,
which allows computers to communicate over telephone
wires.
143
8. Memory of the computer is measured by the following units.
144
UNIT 2
PRESENTATION SOFTWARE
145
USES OF PRESENTATION GRAPHICS SOFTWARE
Presentation programs are used to produce a series of slides i.e. single- screen images
that contain a combination of text, numbers and graphics such as charts, clip art, or
graphics. Other documents can also be created apart from the slides, such as
transparency.
As one works on the slide you see exactly how it will look when shown to an audience
(WYSIWYG). A presentation can contain a single slide or hundreds of slide. You may
save a set of slides as a group in one file so that you can open the related slides and put
them together.
Presentation graphics goes beyond analytical graphics by offering the user a wider
choice of presentation features. Some of the features include:
1. Numerous chart types;
2. Three-dimensional effects for charts, texts, and graphics;
3. Special effects such as shadows, shading and textures;
4. Colour control that includes pre-established groups of complementary colours for
backgrounds, lines and texts, shadows, fills and accents.
5. Image libraries that include clip art graphics that can be incorporated into the
slides. They illustrate factories, people money, and other business related art.
Other documents can also be created apart from the slides, such as transparency.
1. Outlines include only the text from each slide, usually the slide title and the key
points.
2. A notes page is used by a speaker making the presentation and includes a
picture of the slide and any notes the speaker wants to see when discussing the
slide.
3. Audience handouts include images of two or more slides on a page that can be
given to people who attended the presentation.
4. Slide sorters help organize and present the slides. A slides sorter presents a
screen view similar to how 35mm slides would look on a photographs light table.
Using presentation graphics software allows you to efficiently create professional
quality presentations that help communicate information more effectively.
CREATING A PRESENTATION
Slides can be created from the scratch i.e. using black slide or by using one of the
presentation programs many templates, which is easier and faster to work with. A
presentation template is a predesigned document, which already has finished fonts, a
layout and a background. A presentation program provides dozens of built-in
templates.
The next is to create a slide by choosing a slide type. Presentation programs provide
several types of slides, which can hold varying combinations of titles, text, charts, and
graphics. After choosing the slide type the program provides special texts boxes and
146
frames (special resizable boxes for text and graphical elements) to contain specific types
of content. The text boxes have instructions to the user.
Check inside the text box to add text at the insertion point. Text is automatically
formatted but can also format it later as in word processors. Charts, tables, clip art and
other graphics are added by choosing a slide type that has any of the graphics. Create it
in a separate window and insert in your original slide template. For clip art or any
graphic in a slide, select appropriate image from your software collection of graphics,
or import an image file. Built-in paint tools can also be used to draw simple graphics.
FORMATTING SLIDES
Slides can be formatted with different fonts, colours backgrounds, and borders. Using
frames the user can resize many of the elements in a slide by dragging one of its
handles. Toolbars and options from format menu are used to format selected text.
Formatting text here is just like in word processor. Normally; presentation programs are
like a combination of word processor, spreadsheet, and paint program.
Colour, borders and shades can also be added. A gradient bill changes colour as it
moves from one part of the slide to another. Annotative are special note text added to
cash slides P.Ps enable users to add animations, sounds and other multimedia
components to their presentations, using Ps, you can present a slide show live from the
computers disk on a PC or view screen.
PRACTICAL WORK
SECTION 1
POWERPOINT INTRODUCTION
1.1 Introduction
Microsoft PowerPoint XP is part of Microsoft Office XP. PowerPoint is used for creating
multimedia presentations consisting of slides, which are formatted with text and/or
objects on a background. Additionally, you are able to create transparencies, handouts,
and speaker notes. Using PowerPoint allows you to clarify information, reinforce main
ideas, and make points memorable. In this lesson you will learn the basic elements of
the program and the essentials to creating a multimedia presentation using PowerPoint.
Like all programs in the MS Office suite, PowerPoint has menus and toolbars to choose
various commands and options. A task pane is located on the right side of the screen,
changing dynamically depending on your current action. The main portion of the window
is the presentation window.
147
A. Title bar E. Outline tab I. Task pane
B. Menu bar F. Slides tab J. Slide pane
C. Standard bar G. View buttons K. Notes Pane
D. Formatting toolbar H. Drawing toolbar
To open a new blank presentation, double-click the PowerPoint icon on the desktop to
launch PowerPoint. A new blank presentation will open starting with a title slide that will
have minimal design and no color applied to it.
Base your presentation on a PowerPoint template that already has a design concept,
fonts, and color scheme. In addition to the templates that come with PowerPoint, you
can use one you created yourself.
148
1. Single-click General Templates in the New From Template section in the Task Pane.
2. Click the Design Templates tab, single click on a design template name to select it
and see a preview of that design's layout.
3. Click OK to apply the selected design to all of the slides in the current presentation.
1. Single-click General Templates in the New From Template section in the Task Pane.
2. Click the Presentations tab, and then single click on an auto content wizard design
template name to select it and see a preview of that design's layout.
3. Click OK to begin the wizard and fill in any customized information.
If you have an existing presentation you would like to open, there are many options.
Here are three different methods:
At this point the Open dialog box will appear. You can use the Look in: menu or Places
149
bar to locate the file. When you find your file single-click the file name in the file list then
click the Open button.
The slide master is an element of the design template that stores information about the
template, including font styles, placeholder sizes and positions, background design, and
color schemes. Changes made to the Title Master affect only the slides you add with the
Title Auto layout. Changes made to the Slide Master affect all of the slides in a
presentation. The background of the slides, design of text, and images can be added to
both masters.
Slide Master
Displays the slide master, where you can set the default layout and formatting for all the
slides except title slides (which are controlled by the title master). For example, switch to
slide master view to set the default font or to add an illustration (such as your company
logo) that you want to appear on each slide. Don't add text in slide master view; switch
back to normal view to add text.
• Choose View on the Menu Bar, trace to Master, and select Slide Master.
• Make any changes in the design or alignment of the text, format the background of the
slide, and insert any desired images.
Title Master
Use the title master to make changes to slides in your presentation that use a Title Slide
layout. A Title Slide layout contains placeholders for a title, subtitle, and headers and
footers. You could use a title layout several times in a presentation to lead off new
sections, and you might want to give these slides a slightly different look than the rest of
your slides — by adding art, changing a font style, changing the background color, or the
like. You can change the title master and see the change on all of the title slides.
•Double-click Insert on the Menu Bar and select New Title Master
•Make any changes in the design or alignment of the text, format the background of the
slide, and insert any desired images.
1.8 Summary
This lesson covered the fundamentals of using Microsoft PowerPoint. You should be
familiar with basic screen elements and new presentation templates. The next lesson will
discuss using the various views in PowerPoint.
EXERCISES
150
Drawing
What element of the screen is A? Menu Bar Title Bar
Toolbar
What element of the screen is B? Standard Bar Formatting Bar Menu Bar
What element of the screen is C? Menu Bar Standard Bar Formatting Bar
What element of the screen is D? Task Pane Formatting Bar Slides Tab
What element of the screen is E? Outline Tab Slide Tab Slide Pane
What element of the screen is F? Slide Pane Slide Tab View Buttons
What element of the screen is G? View Buttons Menu Bar Formatting Bar
What element of the screen is H? Standard Bar Drawing Bar Title Bar
What element of the screen is I? Slide Pane Notes Pane Task Pane
What element of the screen is J? Slide Pane Outline Tab View Buttons
What element of the screen is K? Drawing Bar Task Pane Notes Pane
151
Exercise 2 is designed to test your knowledge of basic PowerPoint functions.
SECTION 2
POWERPOINT VIEWS
2.1 Introduction
In order to work efficiently and effectively in PowerPoint, you will need to understand the
various “views”. View refers to how you look and how you work on your slides.
PowerPoint has three main views: normal view, slide sorter view, and slide show view.
You can easily change views by accessing the View menu or the
Normal view is the main editing view, which you use to write and design your
presentation. The view has three working areas: on the left side there are tabs that
alternate between an Outline tab and the Slides tab, in the center there is the Slide
pane, which displays a large view of the current slide; and on the bottom the Notes
152
pane.
Slide Pane
Shows the current slide enlarged. Use this view to add text, insert pictures, tables,
charts, drawing objects, text boxes, movies, sounds, hyperlinks, and animations.
Slides Tab
Single-click the Slides tab to see a thumbnail view of each slide in the presentation. Use
this view to navigate through your presentation and rearrange, add, or delete slides.
Outline Tab
Single-click the Outline tab to see slide text in outline form. Use this view to write and
organize content, navigate through your presentation and rearrange, add, or delete
slides or slide content.
Notes Pane
PowerPoint allows you to add notes that relate to each slide's content, and use them in
printed form to refer to as you give your presentation, or create notes that you want your
audience to see either in printed form or on a Web page. You can view the Notes on the
button of the normal view or you can open the Notes Page.
To Open and edit the Notes Page, double-click View on the Menu Bar and Select Notes
Page. Click inside the Click to add text placeholder and type notes that relate to the
slide's content.
Slide sorter view displays all of the slides within the current presentation in thumbnail
form. Use this view to reorder, add, or delete slides and preview the transition and
animation effects. To access the Slide Sorter View double-click View on the Menu Bar
and select Slide Sorter.
Rearrange Slide Order
Single-click and drag the slide to a new location.
Delete a Slide
1. Select the slide in Slide Sorter View.
2. Press the DELETE key.
Slide show view takes up the full computer screen, like an actual slide show
presentation. In this full-screen view, you see your presentation the way your audience
will. You can see how your graphics, timings, movies, animated elements, and transition
effects will look in the actual show.
The following two methods will begin your presentation in full-screen mode starting with
the first slide.
• Click View on the Menu Bar and select Slide Show.
OR
• Click Slide Show on the Menu Bar and select View Show.
153
Use the following method to view the current slide in full-screen presentation mode.
Keyboard
commands P, ARROW LEFT, ARROW UP, PAGE UP
• Single-click the right mouse button and select the
Mouse Previous command from the short-cut menu.
commands • Press the Slide Icon button and select the
Previous command from the menu.
154
2.6 Summary
This lesson described the various “views” in PowerPoint. You should be comfortable
switching views via the View toolbar buttons. The next lesson will discuss working within
slides.
EXERCISE
SECTION 3
3.1 Introduction
While working on your presentation you will need to edit slides and add slides. This
lesson will show you how to add and insert slides in a variety of ways. Also, you will
learn to customize the content and layout of each slide to meet your needs.
155
3.2 Adding Text
The crucial aspect to making your presentation a success is the use of text. Animation
and colored text will not impress your audience if it is poorly written and placed in your
presentation. PowerPoint presentations are meant to display main points. You should not
place paragraphs of text on slides. As you are presenting you can always supplement
with details.
To add text click inside of a placeholder and type the desired text. To edit text, highlight
the text to be changed and start typing your new text. Click outside of the slide to
deselect elements of a slide.
To format text, click inside of a placeholder and then highlight the text to be formatted. To
highlight all the text in the placeholder, select the perimeter of the placeholder.
1. Double-click
Format on the
Menu Bar and
select Font
2. Choose the
Font name,
style, size,
effects and
colors.
3. Click Preview
to see the
changes without
accepting them
4. Click OK to
accept the
changes or
Cancel to
cancel the changes
156
3.3 Changing the Background Color
If you choose not to use a design template and would like to enhance your slide, you can
apply a background. You can choose to apply the background to individual slides or the
entire presentation. A background can be added as a solid color or you can use one of
PowerPoint’s special effects, called fill effects.
157
3.4 Adding and Deleting New Slides
When designing your presentation you may want to add or edit slides in your
presentation.
Adding Slides
There are several methods for inserting a new slide layout into a presentation:
Deleting Slides
Just as you had many options for inserting a new slide, you have many options for
deleting a slide. In the outline pane or slide sorter view select the slide to be deleted:
158
Layout refers to the way things are arranged on a slide. A layout contains placeholders,
which hold text such as titles and bulleted lists and slide content such as tables, charts,
pictures, shapes, and clip art. Each time you add a new slide, you can choose a layout
for it in the Slide Layout task pane.
1. On the Slides tab in normal view, select the slides you want to apply a new layout to
2. Choose Format on Menu Bar, and select Slide Layout
3. In the Slide Layout task pane, point to the layout you want, and then click it
Insert Clipart
If a slide does not have the clipart layout provided, an image from the clipart gallery can
still be inserted.
159
1. Choose Insert on the Menu Bar, trace to Picture and select Clip Art.
2. Type the search term and click the search button.
3. Single-click the picture to insert the image.
Note: If you can not find the necessary clipart for you presentation try searching Clips
Online link in the Task Pane.
Insert Pictures
You can use a picture that you have uploaded from a digital camera, imported from a
scanner or downloaded from the web in your presentation.
1. Choose Insert on the Menu Bar, trace to Picture and select From File…
2. In the Insert Picture dialog box, navigate to the folder holding the picture.
3. Single-click the picture and click the Open button.
Resizing Images
The clipart or pictures you inserted on a slide may be too small or large. To resize an
image:
Note: To avoid stretching the image disproportionately, do not use the middle
placeholders to resize the picture. The corner placeholders will maintain the picture
proportions.
160
Moving Images
To move the image to your desired location:
3. Once the mouse pointer changes to a four-headed arrow , click and drag the
picture to a new location.
Note: Once the picture is selected, the directional arrow keys on the keyboard can be
used to nudge the image into position.
3.7 Summary
This lesson explained various topics for working within a slide. Such as, adding and
formatting text, changing the background color, adding and deleting slides, and using
images.
EXERCISE
Exercise 1 is designed to test your knowledge of the different work areas within
PowerPoint.
161
holders to resize it.
SECTION 4
POWERPOINT EXTRAS
4.1 Introduction
Now that you know the basics of PowerPoint we can discuss some of the bells and
whistles. PowerPoint allows you to animate text, and create graphics, diagrams, charts,
along with other objects on your slides. This leaves you time to focus on important
points, control the flow of information, and add interest to your presentation. Also, to add
more flavor and features to your PowerPoint you can add transitions, hyperlinks, and
action buttons.
Animations allow you to bring your presentation to life, but more importantly, they allow
you to control the flow of information.
To Apply Animation:
1. From the Task Pane select: Slide Design – Animation Schemes.
2. Select the object to be animated.
3. Click on animations listed in the Task Pane to preview.
Transitions effect how the display changes as the user moves from one slide to another.
Note: Click the Apply to All Slides to apply the effect to all slides in the presentation;
otherwise, only the current slide will be affected. Click the Play button to view the
transition. Use the drop-down menus to modify the speed or add a sound to the
transition.
162
Insert a Text Hyperlink
1. Select the object to be linked
• Web Page – type the full address in the Address: text box (For example:
http://www.abcnews.com).
• File – click the drop-down menu of the Look in: box and select the location and file on
your computer that you want to link to (Files can include Word documents, Excel
Spreadsheets, PowerPoint Presentations, etc.).
• Place in This Document – select Place in this document and then the particular slide
you want to link to in the current PowerPoint presentation.
• Create New Document – link to a new blank document by choosing its location and
name on your computer (Be sure to type in the file extension such as .doc, .htm, .ppt,
etc. so that the appropriate type of document is created).
NOTE: To test the link in Normal View, press the [CTRL] key and click the link or to test
the link in Slide Show View, point to and click the link.
163
Change the Hyperlink Color
It may be necessary to change the color of an unvisited and visited hyperlink color if the
hyperlink text does not display on the background design.
NOTE: The color changes are for all of the existing and newly created hyperlinks in the
current presentation.
An Action Settings allows the presenter or the viewer to move through the slideshow at
their own pace and order.
164
Create an Action Button
2. Click the drop-down arrow on the Fill Color button on the Drawing toolbar
and
PowerPoint gives many options for printing. You can print your entire presentation — the
slides, outline, notes pages, and handouts. These slides can be printed in color,
grayscale, or pure black and white. The Print what: menu allows you to choose from the
various options.
165
4.7 Summary
Lesson 4 discussed the “extras” in PowerPoint. Some of the extras covered were adding
animation and transitions, inserting hyperlinks and action buttons, and using the various
print options.
EXERCISE
Exercise 1 is designed to test your knowledge of the extra options PowerPoint gives
you.
A hyperlink is a connection
between slides, to another
File Folder Floppy disk
presentation, a web page, and a
____.
166
You can change the color of the
hyperlink by going to Slide Design Animation Design
Edit Color Schemes
on the Task Pane, what link do you Schemes Templates
go to from here?
SECTION 5
PLAY OPTIONS
5.1 Introduction
Once you have designed your PowerPoint presentation, there are many options on how
your presentation plays. This lesson discusses hiding slides in a presentation, ending
with a blank slide, viewing in kiosk mode, and looping the presentation.
PowerPoint allows you to “hide” a slide. The slide remains in your file, even though it is
hidden when you run the presentation.
Hide a Slide
167
2. Click on the Hide Slide button on the Slide Sorter toolbar.
Unhide a Slide
This option displays a black slide that states 'End of Slide, click to Exit' as the last slide
of the presentation.
1. Click on Tools on the Menu Bar, and choose Options on a PC, on a MAC choose
Preferences.
2. On the View tab select End with a Blank Slide.
Kiosk runs the slide show full-screen as a self-running show that restarts after 5 minutes
of inactivity. The viewer can advance the slides or click the hyperlinks and action buttons
but cannot modify the presentation. When you click this option, PowerPoint automatically
selects the Loop continuously until "Esc" check box.
1. Click Slide Show on the Menu Bar and choose Set Up Show.
2. Choose Browsed at kiosk check box and click OK.
If you will be running the presentation on a computer at an exhibit, you may want
PowerPoint to replay the presentation automatically.
• Click Slide Show on the Menu Bar and click Set Up Show.
• Select the Loop continuously until 'Esc' check box.
168
5.5 Summary
This lesson covered some of the options PowerPoint has for playing your slideshow. We
discussed hiding slides, ending with a blank slide, viewing at kiosk, and looping the
slideshow.
EXERCISE
Exercise 1 is designed to test your knowledge of the play options within PowerPoint.
Image A: Image B:
Image C:
Slide Show Hidden Slide No Animation
Image C is an example of what?
SECTION 6
169
6.1 Introduction
The previous lessons have covered the technical aspect of creating a PowerPoint
presentation. This lesson will cover tips for making your presentation easy to follow and
easy to read on an overhead projector.
6.2 Color
When deciding on colors for your presentation, make sure they will look good when you
display your presentation. For instance, dark backgrounds in a darkened room make it
difficult to take notes (and people may get sleepy). Light backgrounds may wash out the
text and make it difficult to read.
Be sure to use colors that compliment your background. For instance, don’t use black
text on a dark blue background. Always keep in mind how the colors will look projected
on a large screen, reproduced on color overhead transparencies or printed for handouts.
Note: Dark blue reproduces better than greens, browns, or reds when printing color
overheads.
Also, remember that fewer colors are better. Too many colors on a slide can detract from
the message you are trying to convey.
When choosing a background, find something that suits the topic you are discussing.
You don’t want to talk about fashion and have a medical seal in the background unless
you are talking about surgical wear! Make sure that the background color looks good
when it is projected on-screen or printed.
If your background has a pattern, make sure that the pattern is subtle enough to stay in
the background. Your text should show through clearly over the top of the background
pattern and colors.
6.4 Images
Clip art can be a quick fix for a dull slide, but make sure that the clip art makes sense
with the points you are making. Also, be sure that your resize and recolor choices do not
clash with the overall layout and color scheme of the presentation.
6.5 Animation
170
Animation is a good way to catch the audience’s eye in the beginning of a presentation
or to highlight an important point. However, animation on every slide is distracting. The
audience may begin looking for the animated object rather than paying attention to your
message. Additionally, file size is also important when adding animation to a slide. It is
best to add animation that loads quickly.
If you use Quick-Time Movies in your presentation, be aware that they only project to
about 13 inches! If you are projecting on a 4x6 screen, the movie will appear tiny in
comparison.
6.6 Sound
Use sound as a way to draw attention to something important. If you use sound on every
slide, it loses its impact and becomes a distraction to the audience. Remember to pay
attention to file size when using sounds. Like images and animation, a large sound file
will take longer to load and will interrupt the flow of your presentation.
If you have sound in your presentation, make sure that the room you will use to present
has working speakers.
PowerPoint has a dizzying array of transition and animations. The types of transitions
are a matter of preference, but keep in mind what they look like projected on a large
screen. Also put yourself in the audience’s place and decide whether a transition is
interesting or distracting when you see it after every slide.
When using text animations, make sure they “fit” with the slide. Text animations are best
used on bulleted lists, but can be used to bring in a graphic, or show a movie. The best
advice is to find a few effects that work for you and stick to them throughout the
presentation. Don’t make it look like you were just trying everything. Too much is
distracting!
6.8 Text
The text of a presentation is the most important element and is often the most
overlooked. Be sure the font size is readable from a distance. The minimum suggested
font size is 24 point. If shadow effects are used, make sure that the projected text can be
easily read. Use fonts without “serifs” or tails on them for title text such as Arial,
Helvetica, Verdana, or Comic Sans. “Serif” fonts such as Times New Roman or Book
Antiqua (fonts with tails) look better in the body of the text. Minimize the use of different
fonts. Use no more than three fonts in a presentation.
Don’t spend too long on any one slide. The audience needs a change of scenery
about once every 30 seconds or a minute. Only put the major concepts on a bulleted
list. Use keywords instead of sentences or paragraphs of text. Make sure all the
bullets are punctuated the same, and have similar construction. If you have
rehearsed your presentation properly, you should only need to have major points
171
displayed and can fill in the rest of the information in your speech. If you need
additional information for yourself, you can print a copy of speaker’s notes with
elaboration of the bullet points.
Limit the number of bullets per slide to no more than four. More bullets may look
cluttered and force you to reduce the font size.
Avoid using the “rehearse timings” function which automatically advances slides
in your presentation. Regardless of how well rehearsed you are, the unforeseen
happens and you may get out of sync with your slide timer. Moving forward
manually allows more control over the progression of slides in case you have to
pause to answer a question from the audience or need to elaborate more
extensively.
Use graphics, animation, and sound only when making an IMPORTANT point.
Too much clutter (graphics, animation, sound) detracts from all the hard work you
have put into your presentation.
Always check your spelling! Spelling and grammar errors ruin a speaker’s credibility.
How can an audience trust the speaker’s research if the speaker is not careful
enough to check their spelling?
6.10 Summary
This lesson focused on presentation tips for making your slideshow effective and
professional. The next lesson will discuss getting help with your presentation.
EXERCISES
Clip art can be a quick fix for a dull Problem Topic Points
slide, but make sure it makes
172
sense with the _____ you are
making.
173
EDUCATIONAL SOFTWARE FOR BASIC SCHOOLS
Educational software is computer program whose primary purpose is to
enhance teaching and learning. It ranges from programs for pre-school
children, which have a large entertainment component, to straightforward typing
tutors and programs that teach foreign languages (computer-assisted language
learning, aka CALL).
o Microsoft Encarta
o Eye Witness Science Encyclopedia
174
link educational content to school curricula (such as England’s National
Curriculum).
The design of educational software programmes for home use has been
influenced strongly by computer gaming concepts – in other words, they are
designed to be fun as well as educational. However as far as possible a
distinction should be drawn between proper learning titles (such as these) and
software where the gaming outweighs the educational value (described later).
Parents need such a distinction in order to make informed purchasing choices.
2. Classroom aids
A further category of educational software is software designed for use in
school classrooms. Typically such software may be projected onto a large
whiteboard at the front of the class and/or run simultaneously on a network of
desktop computers in a classroom. This type of software is often called
classroom management software. While teachers often choose to use
educational software from other categories in their IT suites (e.g. reference
works, children’s software), a whole category of educational software has grown
up specifically intended to assist classroom teaching. Branding has been less
strong in this category than in those categories orientated towards home users.
175
Software titles are often very specialised and produced by a wide variety of
manufacturers, including many established educational book publishers.
The schoolzone.co.uk Guide to Digital Resources, 5th ed. (2005) - An up-to-date
full-colour guide with reviews of around 500 selected and recommended
products, categorised by subject area, albeit specific to the UK school system.
3. Edutainment
In a broader sense, the term edutainment describes an intentional merger of
computer games and educational software into a single product (and could
therefore also comprise more serious titles described above under children’s
learning software). In the narrower sense used here, the term describes
educational software which is primarily about entertainment, but tends to educate
as well and sells itself partly under the educational umbrella.
Software of this kind is not structured towards school curricula, does not
normally involve educational advisors, and does not focus on core skills such as
literacy and numeracy.
Examples:
1. Microsoft’s Zoo Tycoon series, where children can learn about
animals (and business skills) while simulating the management of a
zoo.
2. Economic simulations such as Capitalism and Industry Giant,
intended for older learners.
4. Reference software
Many dictionaries and encyclopedias rushed into CD-ROM editions soon after
the widespread introduction of the CD-ROM to home computers.
A second major development occurred as the internet also became widely
available in homes, with reference works becoming available online as well.
The conversion of previously print-only reference materials to electronic format
marked a major change to the marketing and accessibility of such works.
176
The opportunities brought by new media enticed new competitors into the
reference software market. One of the earliest and most well-known was
Microsoft Encarta, first introduced on CD-ROM and then also moving online
along with other major reference works. In the dictionaries market, one of the
more prolific brands was Merriam-Webster, who released CD-ROM and then
online versions of English dictionaries, thesauri and foreign language
dictionaries. A long list of online dictionaries is maintained under "dictionaries".
Wikipedia and its offspins (such as Wiktionary) marked a new departure in
educational reference software. Previous encyclopedias and dictionaries had
compiled their contents on the basis of invited and closed teams of specialists.
The Wiki concept allowed anyone and everyone to join in creating and editing an
online set of reference works.
13. The icon is used for typing the alphabets in capital letters…… False
177
14. The processing cycle is made up of input, process output…… True
15. A bit is the same as a byte……….False…………………
16. Computers can be found in the homes and supermarkets……True……….
March the following (write the correct letter in the space provided)
17. Another name for a file D a. Tape
SECTION B (Short answer question). 15 mark each. Answer the following questions as
clearly as you can in the space provided.
Computer Literacy is the knowledge and ability a person has to use a computer and
technology efficiently. Computer literacy can also refer to the comfort level someone has
with using computer programs and other application that are associated with computers.
Such a person must know how computers work and operate.
Other Definition
Computer literacy is an understanding of the concepts, terminology and operations that
relate to general computer use. This includes being able to solve problems, adapt to
new situations, keep information organized and communicate effectively with other
computer literate people.
Computers are used in schools for many applications such as writing papers or
searching the Internet for information. Computer skills are also a subject being
specifically taught in many schools, especially form puberty onward – when the ability to
abstract forms. Where there are widespread, they are also a very useful part of the
education system in terms of teaching and learning. It has created a revolution in
education and therefore the trained teacher need to be computer literate in education
and therefore the trained teacher need to be computer literate in other to function
professionally.
The Main Memory has 3 functions. It stores all or part of the programs being executed,
it stores the operating system programs that manage the operating of the computer and
holds data that are being used by the programs. The main memory is volatile.
Secondary memory is used to store information in a non-volatile state and to store
volumes of data too large to fit into memory. Programs and data are stored here
permanently and retrieved into memory and when required.
178
Example of Secondary Memory are Hard Disk, Floppy Disk, CD ROM, Flash
3. What are computer viruses? How can you protect your PC against
computer viruses?
A virus is a piece of program code inserted into another program to cause some event to
occur that would not be normal or desirable. The virus becomes active when its code is
executed by the computer. Usually the person or organization that provides the file is
unaware that it contains a virus.
Alternative Definition
A virus, the most common type, is a computer program developed with the intent to
replicate the pass itself undetected to multiple computers.
The best way to prevent viruses from infecting your computer files is to ensure that you
have adequate virus-protection software installed on your computer. Since new viruses
are constantly being discovered, you must keep both your anti-virus software package
and your virus definitions up to date and scan your hard drive regularly.
Make regular backups
Scan all floppy disks before use
Download from trusted Web sites
Beware of e-mail attachments – scan them first
Delete junk e-mails – don-t forward chain e-mail
4. What is a word processor? What are the main features of a modern word
processor?
Cut and paste: Allows you to remove (cut) a section of text from one place in a
document and insert (past) it somewhere else.
Page Size and Margins: Allows you to define various page sizes and margins, and the
word processor will automatically readjust the text so that it fits.
Search and Replace: Allows you to direct the word processor to search for a particular
word or phrase. You can also direct the word processor to replace one group of
characters with another everywhere that the first group appears.
179
Word Wrap: The word processor automatically moves to the next line when you have
filled one line with text and it will readjust text if you change the margins.
Others are
Headers and Footers: option of creating standard blocks of text that will automatically
appear at the top or bottom of each page in a document.
Table of Contents and Index Generators: Programs that create these based on the
text of a document.
Form letter Merging: Automatic combining of a form letter with a mailing list to
generate multiple copies of the letter with the different addresses and other variable
information filled in.
Automatic Spelling Checker and Corrector: Program that compares words in the text
against an on-line dictionary, flagging item not found in the dictionary and offering
alternative spellings and a means of correcting the errors.
13. The icon is used for typing the alphabets in capital letters………………
180
March the following (write the correct letter in the space provided)
17. Presentation Package a. Notebook
18. Word Processing Package b. MS PowerPoint
19. A storage device c. MS Word
20. A potable computer d. Pen Drive
SECTION B
(Short answer questions) 15 marks each
Answer the following questions as clearly as you can in the spaces provided
181
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------
REFERENCES
http://en.wikipedia.org/wiki/Curriculum
Shelly, G. B., Cashman, T. J., Waggoner, G. A., & Waggoner, W. C. (1995). Using
Computers: A Gateway to Information. Danvers: Boyd and Fraser Publishing
Company.
Shelly, G., Cashman, T., Gunter, R., & Gunter. G. (2002). Teachers Discovering
Computers: Integrating Technology in the Classroom. (2nd ed.).
http://www.teachereducation.com/demo/tdc_outline_tdc_demo.htm
182