Professional Documents
Culture Documents
MS-ACCESS
FIRST PACKAGE
MS-WORD
What is MS-WORD ?
Microsoft Word is a word processing software pakage.
You can use it to type letters ,reports,and other
documents.
The four main operations of a word processing pakage
are:
Defining the form of the document
Entering a document from a keyboard
Editing (modifying) the document
Printing the document.
Components of Microsoft Word
The Ribbon that displays various
commands and features of all the
tabs
Features of Microsoft Word
Creating Document.
Editing document.
Graphics.
Word Art.
Printing Document.
Proofing Word Document
Spelling Checker
Grammar checker
Thesaurus
Auto correct.
Formatting Word Document
The process to change the appearance of a document is
called the document formating you can format a single
character, word, lines, paragraph or whole document.
The document is formated to make it more attractive
and beautiful.
The commands used to format the document are
selected from the Home tab.
Creating Tables
Microsoft word provides a tool called table. It is used
to organize information of a rows and columns .
Grouping. The grouping feature helps you both to group your data and ungroup it so
that you have subtotals and so forth.
Page layout. Themes, colors, sheets, margins, size, backgrounds, breaks, print, titles,
sheets height, width, scaling, grids, headings, views, bring to front of font or back
alignment, and many more are available for you to lay out your page.
Arithmetic calculation
Graphs And Charts
Some Functions of MS-Excel
Average
Count
Pi
Sum
Product
Max
If
MS-Power point
What is Power Point ?
PowerPoint is computer software created by
Microsoft which allows the user to create slides with
recordings, narrations, transitions and other features
in order to present information. An example
ofPowerPoint is presentation software made by
Microsoft.
Features of MS-Power Point
Animatation
Auto shapes
Editing presentation
Spell checking in presentation
Hiding and Un-hiding slides
Running presentation
Slide transition
Saving presentation
Printing presentation
What is MS-ACCESS ?
MS ACCESS is a tool which used for create database
and it is also a application software.
Features of MS-ACCESS
Database
Record
Field
Table
Form
Report
Primary key
Simply
Ms word used for to write documents
Ms excel used for to make spread sheets
Ms PowerPoint for presentations
Ms access for data base management purpose
2/3/2020
Introduction to
Computers & Internet
What is a computer ?
Computer :
1
2/3/2020
2
2/3/2020
Software is any sets of instructions that tells the hardware what to do. It
is divided to
i. system: programs that control operations of the computer.
ii. Application: programs that designed to make users more productive.
3
2/3/2020
1. Super Computer:
It is a very large computer that can operate many programs at the same
time , where we can connect with hundreds of terminals.
The disadvantage of these computers are their cost.
2. Main Frames:
3. Mini computer:
This computer is widely used, because it’s cheap and we can connect with many
terminals and networks.
4. Micro computer:
5. Workstation computer:
4
2/3/2020
6. Control computer:
5
2/3/2020
Input Devices
Input device – any hardware component the allows users to enter data,
programs, commands, and responses into a computer (translating the data
from users to processing unit)
Input Devices
The Keyboard
desktop computer keyboard typically has 101 to 105 keys
handheld computers use an onscreen keyboard and use a stylus to select
keys
The Mouse
A pointing device that fits under the palm of your hand
Control the movement of the pointer on the screen and make selections
from the screen
One to five buttons
bottom is flat and contains a mechanism or ball that detects movement
Notebooks have a pointing device built into the keyboard
6
2/3/2020
Input Devices
Scanner
A scanner can be used to input pictures and text into a computer.
There are two main types of scanner; Hand-held and Flat-bed.
13
Input Devices
Bar Codes
14
7
2/3/2020
Input Devices
Digital camera
A digital camera can store many more pictures than an ordinary camera.
Pictures taken using a digital camera are stored inside its memory and can be
transferred to a computer by connecting the camera to it. A digital camera
takes pictures by converting the light passing through the lens at the front into
a digital image.
15
Touch Screens
16
8
2/3/2020
Touch Screens
Intuitive to use
17
Output Devices
9
2/3/2020
Monitors
CRT LCD
Types of monitors:
Pixel
picture element (smallest unit of an image, basically a
single dot on the screen)
Resolution
number of pixels in the image
Common resolution size is 1024x768
Refresh rate
The CRT electron gun
“shoots” 3 electrons at
the screen representing
the amount of red, green
20 and blue for the pixel
10
2/3/2020
Printers
21
Output Devices
Printers
There are two kinds of printers
impact printers – strikes an inked ribbon against the paper (dot
matrix printer)
22
11
2/3/2020
Types of Printers
Inkjet Laser
24
12
2/3/2020
Processor
Processor
The processor controls other parts of the computer such as the memory, the
hard drive and the video card.
The processor is found in most high-tech gadgets such as
game consoles, digital audio players, and GPS devices.
13
2/3/2020
Processor
Processor
Control Unit
is circuitry that directs operations within the computer's processor by
directing the input and output of a computer system.
The processor then controls how the rest of the computer operates (giving
directions to the other parts and systems).
14
2/3/2020
Memory
The RAM (Random Access Memory) within your computer is where the
operating system is loaded to when you switch on your computer and also
where your applications are copied to when you start an application, such
as a word processor or database program.
When you create data, (e.g. letters and pictures), these are initially created
and held in RAM and then copied to disk when you save the data. As a rule
of thumb, the more RAM you have installed in your computer the better.
These days you will commonly find over 512 Megabytes of RAM installed.
Memory
What is RAM?
15
2/3/2020
Memory
Memory
What is ROM?
Is a class of storage medium used in computers and other electronic
devices. Data stored in ROM cannot be modified, or can be modified only
slowly or with difficulty.
16
2/3/2020
Memory
ROM-BIOS
The ROM-BIOS (Read Only Memory - Basic Input Output System) chip is a
special chip held on your computer's system (mother) board.
It contains software which is required to make your computer work with your
operating system, for instance it is responsible for copying your operating system
into RAM when you switch on your computer.
This software then loads your operating system from the disk into the RAM.
Memory
17
2/3/2020
Memory
RAM ROM
Types: The two main types of RAM The types of ROM include PROM,
are static RAM and dynamic EPROM and EEPROM.
RAM.
Use: RAM allows the computer to ROM stores the program required to
read data quickly to initially boot the computer. It only
run applications. It allows allows reading.
reading and writing.
Storage Devices
Storage devices – The hardware that writes data to or reads data from a storage
medium is called a storage device.
18
2/3/2020
computer refers to the fact that ultimately the computer works in what is called
binary.
A digital computer uses the numbers 0 and 1 (or on and off if you prefer).
When we talk about computer storage, either the amount of memory (RAM) or the hard
disk capacity.
Bit: All computers work on a binary numbering system, i.e. they process data in
ones or zeros.
This 1 or 0 level of storage is called a bit.
Often hardware is specified as a 32-bit computer, which means that the hardware can
process 32 bits at a time.
Software is also described as 16 bit, 32 bit or 64 bit software.
Communications Devices
19
Introduction to
Computers & Internet
S
Computer Networking
❖ With these computers different other devices like printer, scanner, fax
machine etc are also connect for data storage and sharing purposes.
❖These computers and devices are connected with each other by means of
cables.
❖LAN is used in small office, where area is not big, or in a building or in group
of buildings.
❖LANs are also typically owned, controlled, and managed by a single person
or organization.
Computer Networking WAN
✓ Information Protection
✓ Email
Networks Disadvantages
❖ Hub
❖ Cables
❖ Network cards
❖ Modem
Basics of Networking
❖ Each computer in this network can use the resource in any other computer
in the network. This means that users must remember which computers in
the workgroup have the shared resource or information that they want to
access.
❖ It also means that users must log on to each computer to access the shared
resources on that computer.
❖ it is difficult for users to track where information is located because data
is generally stored on multiple computers. This makes it difficult to back
up critical business information
Advantages of Peer to Peer
Network
❖ Peer to Peer Networks are easy and simple to set up and only require a Hub or a
Switch to connect all the computers together.
❖ The user can access any file on the computer as long as it is set to shared folder.
❖ The requirements for a Peer to Peer Network are that you have a 10 Base T
Ethernet cable and an Ethernet hub/ switch. This is rather cheap than having a
server.
❖ If one computer fails to work all the other computers connected to it continue to
work.
Disadvantages of Peer to Peer
Network
❖ Security is not good and you can set passwords for files that
you don’t want people to access but apart from that the security
is pretty poor.
Server-Based Network
❖ In a server-based network, the server is the central location where users share
and access network resources.
❖ In a server-based network, users have one user account and password to log on
to the server and to access shared resources.
❖ A Client Sever Can Be scaled up to many services that can also be used by
multiple users.
❖ A client server enables the roles and responsibilities of a computing system. This
means that it can update all the computers connected to it. An example of this
would be software updates or hardware updates.
❖ All the data is stored on the servers, which generally have far greater security
controls than most clients. Servers can better control access and resources, to
guarantee that only those clients with the appropriate permissions may access
and change data.
❖ When the server goes down or crashes. All the computers connected
to it become unavailable to use.
❖ When everyone tries to do the same thing it takes a little while for
the server to do certain tasks.
➢ In this type of topology, all the nodes (computers as well as servers) are
connected to the single cable (called bus), by the help of interface
connectors.
➢ This central cable is the backbone of the network and is known as Bus.
➢ Every workstation communicates with the other device through this Bus.
BUS TOPOLOGY
➢ Cable length required for this topology is the least compared to other
networks.
➢ Linear Bus network is mostly used in small networks. Good for LAN.
Disadvantages of Bus Topology
➢ There is a limit on central cable length and number of nodes that can be connected.
➢ Dependency on central cable in this topology has its disadvantages. If the main
cable (i.e. bus ) encounters some problem, whole network breaks down.
➢ Security is very low because all the computers receive the sent signal from the
source.
Star Topology
➢ As compared to Bus topology it gives far much better performance, signals don’t
necessarily get transmitted to all the workstations. A sent signal reaches the intended
destination after passing through no more than 3-4 devices and 2-3 links.
➢ Easy to connect new nodes or devices. In star topology new nodes can be added
easily without affecting rest of the network. Similarly components can also be
removed easily.
➢ Failure of one node or link doesn’t affect the rest of network. At the same time its
easy to detect the failure and troubleshoot it.
Disadvantages of Star Topology
❖ This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision.
❖ Also in ring topology all the traffic flows in only one direction at very high speed.
❖ Even when the load on the network increases, its performance is better than that
of Bus topology.
❖ There is no need for network server to control the connectivity between workstations.
❖ Each packet of data must pass through all the computers between
source and destination. This makes it slower than Star topology.
❖ If one workstation or port goes down, the entire network gets affected.
❖ Patient health record: this data forms part of the patient health record.
No clinical staff will be able to remember details about patient
treatment in detail. Thus there needs a place to record it in order to
remind clinicians about treatment protocols, treatment history,
continuity of care etc.
❖ Inputs to the health system and related processes (e.g., health infrastructure,
human and financial resources, equipment, policy, and organization)
Health
determinants
Risk factors
Behaviours Health
Genetics status
Environment
Health
Mortality
Socio-economic & system
demographic outcomes Morbidity /
disability
Health Health Well-being
system system Service
inputs outputs utilization
Policy Information
Financing Service
Human availability and
resources quality
Organization
Health Informatics In Saudi
Arabia
❖ Population indicators
Types of Health informatics
Artificial Intelligence
➢ Medication
➢ Appointment scheduling
➢ Reminders
Multiple Uses of EHR
❖ Patient care
❖ Quality improvement
❖ Outcome reporting
❖ Resource management
❖ Financial status
❖ Barriers to implementation
Planning
❖ Identify vendors
❖ Visit websites
❖ Plan
❖ Staff involvement
❖ Workflow changes
❖ Paper to electronic
❖ Test
Implementation
❖ Staff training
❖ Issues list
❖ Keep it going
❖ System/software issues
❖ Internal issues
❖ Workflow issues
❖ Transition to support
Barriers
❖ Access.
❖ A ccuracy.
❖ Theft.
❖ D isposal.
Computer Ethics
Computer Ethics
• Computers are involved to some extent in almost every aspect of our lives
• They often perform life-critical tasks
• Computer science is not regulated to the extent of medicine, air travel, or
construction zoning
• Therefore, we need to carefully consider the issues of ethics
Ethics
Ethical principals are tools which are used to think through difficult situations.
Three useful ethical principals:
An act is ethical if all of society benefits from the act.
An act is ethical if people are treated as an end and not as a means to an
end.
An act is ethical if it is fair to all parties involved.
Computer Ethics
• Most people don’t worry about email privacy on the Web due
to illusion of anonymity
• Each e-mail you send results in at least 3 or 4 copies being stored on
different computers.
• INTELLECTUAL PROPERTY:
Intangible creations protected by law
• TRADE SECRET:
Intellectual work or products belonging to a business, not in public domain
• COPYRIGHT:
Statutory grant protecting intellectual property from copying by others for 28 years
• PATENT:
Legal document granting owner exclusive monopoly on an invention for 17 years
Computer Crime
• Restricting access both to the hardware locations (physical access) and into the
system itself (over the network) using firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently
• Making backup copies
• Using anti-virus software
• Encrypting data to frustrate interception
• Anticipating disasters (disaster recovery plan)
• Hiring trustworthy employees
Computer Ethics for Computer Professionals
Rapid Change:
Reduced response time to competition
Maintaining Boundaries:
Family, work, leisure
Dependence And Vulnerability
Employment:
Re-engineering job loss
Equity & Access:
Increasing gap between haves and have nots
Health Issues
Physical Health Issues
• Conserve
• Turn computers off at end of work day
• Use screen savers
• Recycle
• Most of the paper we use is eligible
• Dispose of old parts via recycling programs – most computer parts
are dangerous in landfills
• Educate
• Know the facts about ecological issues