You are on page 1of 109

SECONDARY BOOK PRESS

4TH FLOOR, CABS CENTRE,


74 JASON MOYO
CNR JASON MOYO & 2ND STREET
HARARE, ZIMBABWE
Tel: +263 242 771 406 | +263 242 753 201
Mobile: +263 712 560 870 | +263 713 445 110
Email: sales@secondarybookpress.co.zw
Website: www.secondarybookpress.co.zw

PlusOne Information and Communication Technology | Grade 7 – Learner’s Book

ISBN: 978-0-7974-8182-4

First Published in 2020

Copyright © Monicah Sola Never Mudzingwa Rutendo Nyamupaguma

Editor in Chief: Munyaradzi Gunduza


Development Editor: Denzel Mavunga
Text layout: Sly N. Kumunda
Cover design: Parsons P. Makombore

Cover image: African Leadership Magazine

Printed by: Secondary Book Press

Every effort has been made to trace the copyright holders. In the event of unintentional omissions
or errors, any information that would enable the publisher to make the proper arrangements will
be appreciated.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior permission of the copyright owner.
Information and
Communication Technology

Grade 7
Learner’s Book

Monicah Sola Never Mudzingwa


Rutendo Nyamupaguma
Unit ICT TOOLS

1
Unit Objectives
At the end of this unit, you should be able to:
(a) identify faults.
(b) find possible fault origins.
(c) fix and replace non-functional components.
(d) assemble and disassemble ICT tools.
Looking Back
In grade 6, you learnt about faults in ICT tools and how to fix them. In this unit, you are going
to learn more on how to keep your computer from having problems and how to fix them.
Learning to fix it yourself will save you a lot of money and time.

Key Words

Assembling - fit together separate components parts of a machine.


CPU - Central Processing Unit.
Computer - is any electronic device that is capable of accepting data, process data
and give results.

Faults in ICT tools


There are so many faults that are found in ICT tools. The faults include the following:
1. Computer refusing to start
A computer can suddenly shutdown or can have difficulties when starting. This could be
caused by failing power supply. It is not only the power supply that makes the computer fail
to start. It can be a faulty hard drive, faulty memory, corrupted operating system and failing
motherboard.
You have to check whether your computer is properly connected to the power source. If it
does not respond, test the power point with another working machine to confirm whether or
not there is enough power.

1
CONTENTS

Unit 1 : ICT tools.............................................................................................................. 1


Unit 2 : Creating and publishing.................................................................................. 13
Unit 3 : Computer software........................................................................................... 22

Test 1........................................................................................................................................ 45

Unit 4 : Safety and security........................................................................................... 49


Unit 5 : The world wide web and online collaboration............................................ 55
Unit 6 : ICT careers.......................................................................................................... 67

Test 2........................................................................................................................................ 71

Unit 7 : Programming..................................................................................................... 74
Unit 8 : Communication and networking.................................................................... 89

Test 3........................................................................................................................................ 104


Windows’ System Configuration tool lets you disable programs and services that
automatically start when you boot your computer. Once you have made all your changes,
click OK and restart the computer. It should boot up quicker and feel noticeably faster.
3. Blank screen
If the computer is on but the screen is blank, there may be a problem with the connection
between the computer and the screen. First and foremost, you have to check if the monitor
is plugged to the power source. Also check the connections between the monitor and the
central processing unit. If the fault is on laptop, then you need to get a professional to fix it.
Other causes of blank screes are computer viruses, faulty RAM and HDD, faulty screen and
motherboard.
4. Overheating
If the computer lacks a sufficient cooling system, then the computer can start to generate
excess heat during operations. It can be caused by running programs that require processing
power than the computer has. Some computer viruses can make the computer overheat. To
get rid of this you have to turn your computer off and let it cool for a while. Check the fan to
make sure it is working properly.
5. Strange noise
When you hear noise coming from your computer it is a sign of hardware malfunction or
hard drives. Hard drive often make noise just before they fail so you have to make sure that
you back up your information always.
6. Abnormal function of operating system or system software
If the operating system is not responding or is misbehaving then you have to restart your
computer and run a virus scan. Misbehaviour can result from users deleting system files
mistakenly. To avoid this, you have to install a reliable anti-virus software.
7. Unable to print
If the computer is not able to print, then the fault may be due to two factors. The computer
might not be connected to the printer or the printer might not be operational. A more common
problem is as a result of printer drivers not installed on a computer. Paper jams, paper tray
empty, ink tanks or toner empty can be other problms. Check cable connection also.
3
2. Computer is too slow
The first step to fixing a slow computer is to verify that your machine is the actual source of
the problem.

The other reasons can be added such as;


• Malware attack slowing down the computer.
• Memory (RAM) is too low, it need an upgrade.
• Faulty hard drive.
If the problem is your computer, check whether you have plenty of free space on the hard
drive holding your operating system. Windows need room to create files while your system
is running. If your hard drive is maxed out, performance suffers. Now is the perfect time to
clear some space.
If your computer’s operating system resides on an overstuffed C: drive, clearing out some
space could boost operating system performance.
Microsoft’s system configuration tool is your next-best bet for tackling slow performance.
Many applications launch automatically when your machine boots up, which can stretch out
boot time especially on an older and slower computer. Make a habit of trimming the start-up
items. Open the tool by pressing Windows-R, typing msconfig and pressing the Enter key.
Checking the Startup item and manufacturer columns is the best way to figure out which
potential performance-killers you can safely disable. Avoid messing with any of the services
and programs that have Microsoft Corporation listed as the manufacturer. Items such as
Adobe AAM Updater, Google Update, Pando Media Booster, Spotify and Steam Client
Bootstrapper are all fair game. Regardless, err on the side of caution: If you are not sure
what the program or service does, do not disable it.

2
10. Mouse not responding
The mouse might not be properly connected to the computer. Try to unplug and reconnect it
to the system unit/tower case/computer box or laptop. If the problem persists there can be
two explanations. Either the mouse is not working or there is a problem with the port you
are using.
Connect the mouse to a different port to see where the problem is. If the mouse is not working
consider replacing it. Hence, it is advisable to have spare tools.
11. Applications running slowly
The slowing down of a computer can be caused by applications running poorly. However, it
is not simple to fix because there are so many factors that contribute to the slowing down of
a computer, for example, your computer might be in need of more RAM. The computer can
slow down when the hard drive is full.
You have to pinpoint the real cause of the slowdown. The best way to do this is shutting
down everything and start reopening applications one by one.
12. Applications not installing
Applications may fail to install because of many factors. For example, an application may
not be compatible with your particular operating system or the software has requirements
that your computer does not meet.
Always compare the minimum system requirement necessary to run software with
specification of your computer. If you do not meet those requirements then you simply cannot
run the program without upgrading.
Most of the time the software will still run but will do so poorly. There is a chance that it will
not finish the installation process.

Exercise 1

1. Find any ICT tools in your computer lab with a fault and try to fix them.
2. How do you fix a computer that is running slowly? If there is one with such a problem in
your lab, try and fix it.

Assembling and disassembling ICT tools


Most of the basic components are connected
in different ways and can be easily removed.
However, you have to be organised when
assembled or disambling ICT tools.
This will help to keep you from losing parts,
and also in making the reassembly easier.

5
In order for you to fix this fault you have to first check if the printer is turned on and that is
says “Ready to “Print”.

8. Icons are too small or big


If the icons are too small or large you have to change them by right clicking on the desktop
and checking on the view option. You will be able to see icon size; simply tick on the size that
you want. In order for you to get more specific sizes you can hold CTRL on your keyboard and
scroll up and down to change icon size to either small or large.
9. Computer refusing to connect to the internet
There are many ways to fix this fault. The most common problem or fault is that the computer
is not connected to the network. If the computer is using a wired network cables may not be
connected. If it uses a wireless network then you need to re-enter the security code in order
to connect. Also, there can be an issue with the network tools such as the router and other
hardware or software related with your computer.

Restarting windows can fix a problem. If you want to check your internet speed you can
use a tool like speedtest.net. You can also use windows network diagnostic tool to check
for local problems like drivers or wireless card failures.

4
• Internal hard drive power.
• Portable hard drive slot power.
Once everything is unplugged, remove the screws holding the power supply in place, on the
back of the computer. Next, push the power supply from the outside, then lift it out.

NB: Keep the screws/bolt aside in a bag so when you assemble it back, it will be easier.
Step 4: CD/DVD drive
This is one of the easiest components to remove. Just push the grey metal and pull out the
drive.

If you do not have a second drive, there should be a flat piece of metal covering the drive slot.
Step 5: System fan
Most computers have two fans: the system fan, the one blowing
air into the computer, and the CPU fan, the one blowing air
onto the CPU heat sink. The system fan is located at the back
side of the computer, the side with all the component plugins.
First, unplug the fan from the motherboard. You can find the
plug by following the wire from the fan. It should be labeled
“SYS_FAN1”. Next, you will have to unscrew the fan from the
outside. You should now be able to lift the fan out of the PC.

7
Step 1: Unplugging

Unplug every cable that is connected to the computer. Wear a grounding strap or touch an
unpainted metal part of the computer to discharge any static electricity.
If you walk across a carpet at any point, touch an unpainted metal part of the computer
again to discharge the built up static electricity.

Step 2: The casing


After your computer is unplugged, move to a clean working space, preferably a table.

First of all, take the casing off the PC by sliding it towards the front side. Then place the case
aside as you do not need it anymore.
Step 3: The power supply
The power supply manages all the power for the computer.
The power supply is a large metal box located in the top left corner.
The power supply supplies power to every component in a computer; therefore, it has the
most wires out of every other component in the computer. The first thing you do is unplug
every wire coming from the power supply. The following should be disconnected:
• Motherboard (very large connector/plug).
• CD/DVD drive(s) power.

6
Step 9: RAM (Random Access Memory)

RAM is the memory or information storage in a computer that is used to store running
programs and data for the programs. So, the more RAM you have, the faster your computer
runs. Most computers have 2 or 4 RAM slots.
To remove the RAM, push down on both tabs holding the RAM in place, which are located
at both ends of the RAM.
Step 10: CPU

Remove the CPU by working the lever. Handle with care.


Step 11: Heat sinker

Take out the heat sink through the lever, handle with care.

9
NB: Keep the screws/bolt aside in a bag so
when you assemble it back, it will be
easier.

Step 6: CPU fan


The CPU fan is located right on top of the
CPU heat sink, which is a large piece of metal
with fins on the top. The CPU fan plugs into
the motherboard which is hard to access. But
just follow the wires and you should easily
find it.
To remove the fan from the heat sink, remove the four screws securing it in place.
Step 7: Hard drive and floppy disk

Remove the metal casing on the top side of the PC.


Remove the hard drive and floppy disk combo from the computer. Then, remove each.

NB: Keep the screws/bolt aside in a bag so when you assembling it back, it will be easier.

Step 8: The power switch

To remove the button, you will need to push it from the back, the side with the wires. For
clarification, see the pictures.

8
4. Find the printer you want to use and make sure it says Ready. If it says offline, right click
on it and select printer online.

5. Right click on the printer you want to use and select your printer as Default Printer.

6. Now test your printer configuration by printing a test page by right click the printer and
select properties. Then in the general tab click on the test page button.
7. If you are unable to print restart your computer.
8. After restarting try to print a test page again to check your printer configuration.

Key points in this unit

• A faulty power supply can cause the computer to shutdown suddenly.


• Always check your computer connections between the monitor and the central
processing unit.
• If a laptop has a fault, you need a professional to fix it.
• If you hear noise from your computer, it is a sign of hardware malfunction or noisy fan.
• When your computer is refusing to print check your connections between the printer
and computer.
• Computer components are connected in different ways so they can be assembled or
dissembled.

11
Step 12: The motherboard

The motherboard is the mother of the computer. The motherboard links every component in
the computer together. The CPU, RAM and expansion cards are attached directly to it, and
every other part of the computer is in one way or another attached to it.
The motherboard has seven screws holding it to the frame, which are indicated by large
white circles around them. Remove those seven, then lift the motherboard out of the frame.
NB: Keep the screws/bolt aside in a bag so when you assembling it back, it will be easier.

Activity 1

1. With the help of your teacher disassemble a computer. Follow the instruction that you
were given in your notes. Do it carefully.
2. With the help of your teacher, check the configuration of your computer and make the
following changes to your printer.

3. Go to start, Printers and faxes.

10
Unit CREATING AND PUBLISHING

2
Unit Objectives
At the end of this unit, you should be able to:
(a) use query design wizard to create queries.
(b) query a database.
(c) modify queries to refine search results.
(d) design reports using wizard.

Looking Back
In grade 6, you learnt about creating a database and entering data. That knowledge is going
to help you further in understanding how we are going to create queries, modify queries and
design reports using wizards.

Key Words

Query - is a request for data or information from a database table or combination of
tables.
Report - offers a way to view, format and summaries the information in your database.
Tables - is an on object which stores data in rows and columns.
Row - a row is correctly called a record.
Column - is called a field.
Form - is a database object that you can use to create a user interface for a database
application.
Report - is an object in database used for formatting, calculating, printing and
summarising selected data.

Database
A database is a collection of information that is organised so that it can be easy to access.
Most databases contain multiple tables which may each include different fields (columns).
There are softwares that are used to create databases such as My SQL, Oracle, Microsoft
SQL, Microsoft Access, Microsoft Excel and many more. A school, company, hospital or any
other organisation can have its own database.

13
Unit Revision Exercises
Multiple Choice Questions
1. If a computer is on but the screen is______then there is a problem with the connection.
A. green B. working C. blank D. connected
2. When a laptop has a fault you need to get________to fix it.
A. doctor B. screw driver C. professional D. mouse
3. To avoid your computer from overheating you need to__________.
A. switch it off B. visit the internet C. check the fan D. check the connection
4. What does CPU stand for?
A. Central Processing Unit B. Central Point Unit
C. Central Packet Unit D. Central Processing Union
5. Which of the following is not a computer fault?
A. Strange noise B. Blank screen C. Overheating D. Printing

Structured Questions
1. List any five (5) computer faults.
2. Explain how you would fix a mouse that is not working.
3. What could be the causes of strange noise in a computer?
4. What is the first stage of disassembling a computer?

Practical Questions
1. Using the desktop option make changes to icons that are either too small or too big.
2. Find a computer that is not connecting to the internet and try to fix.
3. Find computers that are not working and fix them.

12
1. Launch Query Design View. Click Query design from the create tab in the ribbon

2. Select each table that you need in the query and click Add to add it to the Query. Once
you have added the tables you need to, click Close to close the dialog box.

3. Add fields. We are now in Design View. The top panel contains the tables that we
selected in the previous step. These are the tables that are available for us to use in the
Query.

15
A database
A good database design is one that divides your information into subject based tables.
Using query design wizard to create queries

A query is a very important tool for turning


data in a database into information. It is a
way of searching and compiling data from
one or more tables. Running a query is like
asking a detailed question of your database.
When you are building a query using Access,
you are defining specific search condition to
find exactly the data you want.
A query must be based on a table. Queries are mainly based on certain criteria for example
the database of students in your class, you can search for students who come from a specific
province in Zimbabwe and only students from that province will be displayed. With a query
you can search, sort, save information and perform calculations.
How to use a query

Queries are more powerful than simple search or filter you can use to find data within a
table. When you run a query, the results are presented to you in a table, but when you design
one you see a different view. This is called a Query Design View and it lets you see how your
Query is put together.

Activity 1

Open MS Access and begin to create a simple query.


Create a simple query in Design View in Access using the following steps:
(Note that when creating a Query, you can either click the Query wizard button or Query
Design button)

14
5. Run the Query. Click the Run in the ribbon to run the query. You can also run the Query
simply by switching to the Datasheet View using the View button.

6. The query displays results in Datasheet View. All fields that have had Show checked
are displayed. Now you can now switch back and forth between the Datasheet View to
modify or test your Query as often as you like.

17
Double click a field from a table in the top pane to make it appear in the bottom pane.
Do this for each field you would like in the Query.

4. Enter criteria. Now that we have added the fields to include in the query, we can add
criteria against those fields. To specify a sort order, click on the sort row for the fields you
like to Sort by choosing either Ascending or Descending.

16
For example, if telephone area codes change to accommodate an increasing population, an
update query might be created to find all existing area codes affected by the change and at
the same time, replace the old area code with a new area code.

NB: Update queries cannot create new records, only update existing records.

A select query is used to search for and display data according to the specified criterion.
This data can then be viewed as a table, in a form created specifically on the query or as a
report. A delete query is used when you need to remove entire records (rows) from a table.
Delete queries, by default, remove all of the data in each field, along with the unique key
field, (normally the primary key field). When the query is run, it removes the entire record
(row) from the table. Before creating a delete query, you would create a select query first to
ensure it returns the records that you want to delete. This way you are able to test the query
first, rather than carelessly deleting the wrong records.
Only when the select query is tested and returns the correct results, would you convert the
query to a delete query. An append query, is used when you want to extract information
(records) from one or more tables and append (add) it to one or more tables. Normally, the
tables would reside in the same database however, other database can also be used.
Deleting a query
The easiest, safest and smartest thing to do with a query is to get rid of it entirely and start
over. If something wrong has happened and you are not sure what is it, go ahead and delete
the query. Just highlight it in the list of queries and press Delete.
Modifying an existing query
Nomatter which method you use to create a query, you really have one option for modifying
an existing query. That option is to open the query in Design View and make your changes in
the query editor. Access does not offer any wizard to help you modify existing queries. Open
a query in Design View. After that you can click the show Table Button on the Ribbon. The
Show Table Dialogue Box appears so that you can add additional tables to the query. You
can also add additional fields to the query by using the same method you are first creating
a query in Design View. Likewise, you can add or modify any of the query criteria the same
way you do when creating a query.
Dragging and dropping new fields
To drag and drop a field, you need to drag the very small grey bar that is just above the field
row. When you drag and drop a field into the column of an existing field, the existing field
and any other field to the right shift to the right so that the new field is inserted before the
existing field.
Designing reports using wizard
A report is an object in database used for formatting, calculating, printing and summarising
selected data. Reports enables you to present information in the way that you want to see
it. Report do not allow you to alter data. Microsoft Access report use the concept of “What
You See Is What You Print”. Because you have control over the size and appearance of
everything on a report you can display the information the way you want to see it.
19
Saving a query
If you plan to run the query again in future, you should save it. Saving a query is just like
saving any other database object.
Follow the following steps to save a query:
1. Right click the query tab and select Save from the menu.
2. Provide a name for the query and click OK.

3. The query is now added to the left navigation pane under a queries heading. Once saved,
you can go back and modify the query at any time by right clicking in the navigation
pane and selecting Design View.
Querying a database
A query is used to retrieve data from the database. Queries are one of the things that make
databases so powerful. For example, you want to know how many students live in a given
city or you want to see which individual have registered with your database within a given
period of time. You can query a database via a user interface. The design view enables you
to pick and choose which column you want to display and which criteria you want to use
to filter the data. Regardless of the method you use to query the database, the results will
usually be displayed in tabular format.
Modify queries
Modifying queries involves the following changes:
• Opening existing queries.
• Renaming queries.
• Deleting queries.
• Updating existing queries.
• Repairing existing queries automatically.
Using a query is similar to filtering and sorting tables but much more powerful. Queries are
used to extract and study data within one or more tables. Queries can be saved, edited and
reused. They provide output for use by other database objects, such a forms and reports.
Queries are also capable of working with data across multiple tables. Different queries are
designed to perform different functions, for example an update query searches for and
updates field information in one or more tables, whilst a delete query searches for and
deletes records from one or more tables.
An update query is similar to the Find & Replace function found in most Microsoft applications,
only more advanced.

18
Unit Revision Exercises
Multiple Choice Questions
1. A ___________ is a collection of information that is organised so that it can be easily
accessed.
A. report B. company C. file D. database
2. A ____________consists of rows and columns.
A. tables B. design C. primary D. field
3. With a query you can _____________.
A. insert a picture
B. create a database
C. you can sort the results in the order of your choice.
D. create a form
4. Which of the following is not a way of closing an object?
A. Using the file menu. B. Using the control menu
C. Using the keyboard. D. Using the main menu.
5. When creating a database, you need to know the ______________ you are going to
enter into the database.
A. database B. data type C. keyboard D. fields

Structured Questions
1. List any three tasks that can be performed by a query.
2. Explain the way of closing an object using the keyboard.
3. How do you delete an existing field in a query?
4. Explain how you can delete a report.

Practical Questions
1. Create a blank database from Access Welcome screen > click blank desktop database
from the welcome screen (that is, the screen that is displayed when you first open
Access). Name the database. For this exercise name it music database.
2. Create a Query Design using the query design
3. Create a new Table in Design View using Microsoft Access.

21
You can do calculations on the data in the report. Again, you can also group and sort in the
report. It also shows data from more than one table as long as the tables are related. They
also display graphics and pictures.
There are different types of reports but the most common used are the columnar reports and
tabular reports. The following diagram shows information on columnar report and tabular
reports.
If you want to close a report;
• right click on the Orders report tab.
• select the Close command from the list displayed, to close the report.

Activity 3

Create a report using Report Wizard


1. Click on report Tab from the object tab while in the database window. To open the
database window, click the database icon or press the F11 key on the keyboard.
2. Select the option create report by using wizard.
3. Select student information (or any other database you have created) from the table or
queries drop down list.
4. The available fields section gives you a chance to select the field you want to include in
the Report.
5. Click the next button.
6. Select to sort the records by surname. If you want to sort in descending order, you just
click on ascending button to toggle between the two sort options.

Deleting a report
1. Make sure that report you wish to delete is closed. If it not done you will get an error
message like the one that is below.

2. Click on the database icon or press F11 key from the keyboard to open the database
window if you are not in it.
3. Click on the name of the report you wish to delete. pres the delete icon from the database
window tool bar.

20
We are going to crop an image using Microsoft Office Picture Manager.

1. Load Microsoft Office Picture Manager by clicking its icon on the desktop.
2. The picture manager will load as shown below.

3. To load a picture, you need to add the picture shortcut to the picture manager. Click on
“File” and then on “Add Picture Shortcut”, as shown below.

4. Navigate to the folder which has your pictures through the file explorer that comes up
as shown below.

23
Unit COMPUTER SOFTWARE

3
Unit Objectives
At the end of this unit, you should be able to:
(a) alter images.
(b) add information to an existing image inorder to relay information in a graphical way.
(c) cut elements from one image and paste them in another.
(d) plan and compose a video clip.
(e) download, organise and edit video clips.

Looking Back
In grade 6, you learnt about recording videos, animating images, exploring 2D and 3D
images and editing properties of image. That knowledge is going to help you further your
understanding of how we are going to alter images.

Key Words

Morphing - the changing of one image into another.


Editing - t he process of making changes to a text or film, deciding what will be
removed and what will be kept.

Multimedia
Multimedia refers to the combined use of sound, videos, pictures and text to present an
idea. Multimedia applications allow us to combine and edit media. To edit is to change the
appearance of an image or video file. Media can be sound, videos, pictures or text.
Cropping images
Cropping images is removing the outer parts of a photograph or image. Cropping allows us
to position our images better.

22
8. To crop the picture, select “Picture” from menu and then select “Crop” from the pop up
list.

9. Adjust the image size from the edges as shown below.

10. Click the ok button on the right hand side to finish cropping.

OK button

25
5. Click on Add to finish adding the shortcut. Pictures from your linked folder will be
displayed in the picture manager as below.

6. Select the picture you want to work on by double clicking on it. The picture will be shown
as below.

7. The picture needs to be rotated so that it becomes easy to work with. Click on rotate 90

degrees right. The picture will rotate as shown below.

24
3. Simplicity in use refers to how easy or difficult the program is easy to use. If it is very easy
to use you rate the program as excellent in terms of simplicity to use.
4. Beautiful interface refers to the general appearance of the program when it is loaded on
the screen. A very beautiful interface gets excellent, a moderately beautiful interface gets
very good and a less than moderately beautiful interface gets good.
5. Tools available refer to the number of images editing tools available for use. A program
with few tools gets good and that with many tools gets excellent.
6. After rating come up with the best image editing program from your list. Compare your
results with others. Try to come up with the best image editor as a class.

Exercise 1

1. Give any three examples of computer programs.


2. Hardware is useful without software. (True/False)
3. A computer system includes both ________ and ________.

Adding text to an image


Text can be added to images to add descriptions to them. GNU Image Manipulation Program
is used below to add text to an image.
1. Open GIMP from the desktop by double clicking its icon shown below.
GIMP will load as shown below. To load an image, click on “File” and then on
“Open”.

2. After clicking on open, a file explorer window is shown. Navigate to the location of your
picture as below.

27
11. Save the cropped image by clicking on “File” and then on “Save as” as shown below.

12. Give the file a name especially your name and class as shown below.

13. Click on “Save” to finish saving your document.

Activity 1

1. Using a computer connected to the internet search for any five free image editing
programs. Download and install the programs to your computer. Edit images using each
of the five programs you have installed on your computer.
2. Make a comparison between the programs using criteria shown in the table below.

Program name Simplicity in use Beautiful interface Tools available


Program 1 Good Excellent Good
Program 2 Very good Very good Excellent
Program 3
Program 4
Program 5

26
Text formatting buttons

Clear style of Strikethrough


selected text

Bold Italic Underline

1. Click on the option that you want to format your text. Click on “Italic” to make the text
slant.

2. Click save to save your picture in GIMP readable format. To save the work in picture
format click on “File” and then on “Export as”.

3. Give your file a name and click on export.

29
3. Double click on the image you want to load it in GIMP.

4. Select text tool from the Toolbox. The text tool has the letter “A” icon. Once the text
tool has been activated two options are available.
(a) Click and drag to create an area where you would like your text to live.
(b) Click in the image window where you would like your text to be.
Let us use option “b” first. Click the image on the position you want to put the text.

5. Before you can write your text, you can change font type, font size and font colour from
the small pop-up window shown above. Type text in the text frame as shown below.
Your text should give a description of your image.

6. To format the text select it first. To select text;


(a) Press and hold the shift key.
(b) From the cursor position press the arrow key which points to the direction of text.
(c) In the above situation the left arrow key is used.
(d) Release the buttons after all the text has been selected.

28
Morphing
Morphing is animation that changes one image slowly into another. It is often used to change
one face into another face. Morphing is widely used in movies, animation games, computer-
based trainings, presentations and educational purposes. We will demonstrate morphing by
cutting elements of one image and pasting them into another.
Cutting elements from one image and pasting them into another
There might come a time when someone might need to cut elements of one image and paste
them into another in order to achieve a certain graphic design goal. To illustrate this, we will
do a face swap using GNU Image Manipulation Program (GIMP).

1. Open GIMP by double clicking its icon from the desktop. To perform a face swap
there are certain conditions that should be met by the two images. These are;
(a) Direction – the people in the images should be looking in the same direction.
(b) The resolution of the pictures should be the same that is pictures should be taken by
the same type of camera.
(c) The lighting in the image should be the same. It will be difficult to use an image taken
indoors where lighting was low and an image taken outdoors where lighting was
high.
2. Open the images in separate tabs as shown below.

3. The two girls shown below will have their faces swapped. The girl to the left is Memory
and the one to the right is Shelly.

Memory Shelly

31
4. Another pop-up windows comes up click on export again to finish exporting.

5. The final image is shown below in Windows Photo Viewer.

Activity 2

1. There are many other image editing options available in image editing programs. Edit a
picture using the following image editing options.
(a) Blur.
(b) Enhance.
(c) Noise.
(d) Brightness.
(e) Saturation.
2. Compare your work with that of other learners. Come up with the best edited images.
Learners with best edited images demonstrate how to edit.

Exercise 2

1. Write any three tasks that can be done by computer programs.


2. How do you add a picture in Microsoft Office Picture Manager?
3. Give any two examples of multimedia programs.

30
7. To cut the face we click edit then on copy as shown below. This will copy the face to the
clipboard.

8. Load the second image in the workspace and zoom it in as shown below.

9. To paste Shelly’s face onto Memory’s click on Edit -> Paste as-> New layer

10. Upon clicking on new layer Shelly’s face shows on Memory’s face as shown below.

33
4. Shelly’s picture is selected in the GIMP workspace by clicking it in the picture tab as
shown below. We want to cut Shelly’s face and paste it into Memory’s face.

Shelly’s picture Memory’s


picture

5. Zoom in Shelly’s picture by clicking the plus (+) button. Press the shift then plus button
to zoom in. Below is the zoomed in picture of Shelly.

6. Next you select the part of the face that you want to cut.Grab the free selection tool from
the toolbox.

Go to Shelly’s face and select the part of the face you want.

Select the main features of her face as shown below. To select you press and hold the
left mouse button and move around the face until you reach the starting point.

32
Reduce the brush size to around 16.00 as shown below.

16. Create a selection just above the eyebrows. Click on the area whilst holding the Control
(Ctrl) key to select. Below is a picture showing the selected area.

Selected area

17. Click on the eyebrows to clone the colour of the selected area on the eyebrows. Continue
doing this until all eyebrows from the original image are removed as shown below.

18. The skin tone has to match so that the image looks real. This can be done using curves
or levels. Let us use levels. To do this click on the pasted layer first. Go to Colours ->
Levels as shown below.

35
11. Grab the move tool and move the layer where it fits best on the second face.

12. Bring down the opacity of the layer a little bit. Click on opacity on the right size of the
picture and bring it down.

Bring down
opacity

13. Line up the eyes and mouth using the move tool.

14. Remove the eyebrows showing on the original image. Click the original image in the
image layers. Below the original image is MemoryT.jpg.

15. Click clone tool from the toolbox. Select a medium sized brush from the right side
of the picture.

Medium sized
brush

34
Exercise 3

1. Videos can be recorded using _____ and ______.


2. A digital camera can capture both ______ and______.
3. In a digital camera there is a ________ which records sound.

Downloading and editing video clips


To download is to transfer a file to a local computer. A local computer is currently being used
by someone. Video clips can be downloaded from a digital camera, camcorder or smartphone.
Videos can be downloaded wirelessly using a wireless network or using USB cables.
Downloading videos
1. Connect your digital camera through the USB port using a USB cable.

USB port

Digital camera connected to a PC through a USB cable.


2. Navigate to your camera by clicking the File Explorer on the taskbar.

File Explorer.
3. Under This PC select your camera or smartphone. Below the camera is named S9300.

37
19. Adjust colour levels by experimenting with input levels until the desired colour tone is
achieved as below. Click OK once satisfied.

20. Finally we have to clean up the edges using the eraser tool. Select the softest brush.

Enlarge the brush by adjusting size under Eraser.

Click on the image edges to smoothen them. The final images are shown below.

Original Face Swapped

Activity 3

Learners should come up with a topic of interest for example History of Zimbabwe. Plan on
getting information on the history of Zimbabwe. Plan on interviewing a character who knows
much on your topic of interest. Come up with interview questions. Organise an appointment
with the interviewee. Use a digital camera, camcorder (video camera) or a smartphone to
record a video of the interview.

36
2. Move the mouse pointer to the folder where you want to put your video file. You can paste
from inside or outside the folder. To paste from outside right click on the folder and select
paste.

3. The progress bar shows the transfer progress of your file. The progress bar disappears
when download has been completed.

Dragging and dropping


1. To drag and drop a video file expand the folder which has the
subfolder you want to put your file. In this case videos folder is
expanded to show Downloads subfolder. A subfolder is a folder
inside another folder.
2. To drag the file, move the mouse pointer to the file you want to drag. Press and hold the
left mouse button and move the mouse to the folder where you want to drop the file.
Upon reaching the folder a copy message is shown. Release the left mouse button to
start copying.

39
4. Double click on the camera to open its storage as below:

5. Double click to open the DCIM folder . Double click the DCIM folder to

open the folder 100NIKON . Finally, double click folder 100NIKON to

view the video and image files stored on the camera. The folders may differ according
to the device being used.

6. To download a video from the digital camera storage you either copy and paste or drag
and drop to a folder on your computer.
Copying and pasting
1. Go to the video item you want to download and right click (click the right mouse button).
On the pop-up menu select copy as shown below.

38
2. Click on “Add videos and photos” to load your video. Alternatively, you can click on “Click
here to browse for videos and photos”. Select your video from its location as shown
below.

3. Click on open to load the video in Window Movie Maker as shown below.

4. Videos can be edited by adding titles, captions and credits. You can also put animations
and visual effects to videos. Videos can also be trimmed. To trim is to remove a portion
of a video and store it as a separate file. To add a title, click on title. The title icon is
shown below.

41
7. Check the folder on your local computer to see if the download has been successful.

Editing a video clip


Editing video clips is making changes to videos in order to make them more informative and
interesting. There are many video editing applications in use today. Examples include;
• Adobe Premiere Pro.
• Final Cut Pro X.
• Filmora9.
• Windows Movie Maker.
• KineMaster.
• Corel VideoStudio Ultimate.
• Lightworks.
We will use Windows Movie Maker to edit a video.
1. Load Windows Movie Maker by double clicking its icon on the desktop.

Local windows movie maker

40
Activity 4

1. Download any video from a digital camera or a smartphone to your computer. Use any
video editing software you can find to edit your video. Edit your video using the following
options;
(a) Themes.
(b) Animations.
(c) Brightness.
(d) Add music.
2. Compare the edited video to the original to see if the changes made the video more
interesting. As a class try to rate the edited videos to come up with a top ten.

Exercise 4

1. Name any three video editing programs.


2. Give any two video editing options.
3. A pop-up window which gives information about file transfer is called a ____.

Key points in this unit


• Hardware and software working together makes a computer system.
• Multimedia refers to the combined use of sound, videos, pictures and text to present
an idea.
• To edit is to change the appearance of an image or video file.
• Cropping images is removing the outer parts of a photograph or image.
• Morphing is animation that changes one image slowly into another.
• To download is to transfer a file to a local computer.

Unit Revision Exercises


Multiple Choice Questions
1. Hardware is ____________ without software.
A. not very useful B. useful C. cheap D. expensive
2. Which list contains only computer programs?
A. Adobe Reader, McAfee Antivirus, Scratch Desktop, Filmora9
B. Microsoft Office, Desktop, Facebook, Kodu Game Lab
C. iWork Numbers, Fan, Motherboard, Digitiser
D. None of the above
3. To edit is to __________.
A. delete a file B. move a file
C. make modifications to a file D. Create a file
4. Changing one image slowly into another is called__________.
A. morphing B. mopping C. morefine D. mooting
43
5. Delete the default text “My Movie” and write your own title. In this case, we will use the
title, Choral Music Festival 2019.

6. The text can be formatted using formatting options such as bold, italics, font type,
font colour, outline colour and transparency. Click the play button to preview your
changes. Animations and visual effects can also be added to the video.
7. To save the video click on Home and the on Save movie. Select the format you want to
save the video with from the drop down list shown.

8. Save the movie with a name to the directory of your choice preferably Videos library.

9. Click on save to finish saving


42
TEST 1
Paper 1: Multiple Choice Questions
Choose the correct option from either A, B, C or D.
1. A ___________ is a collection of information that is organised so that it can be easy to
access.
A. database B. table C. query D. report
2. Which of the following is not a software used to create a database?
A. My SQL. B. Oracle. C. Microsoft Access. D. Microsoft word.
3. What is the use of a query?
A. Collect data. B. Create tables.
C. Create database. D. To retrieve data from the database.
4. A __________ consist of rows and columns.
A. tables B. design C. primary D. field
5. When creating a database, you need to know the __________you are going to enter into
the database.
A. database B. data type C. keyboard D. fields
6. With a query you can ________.
A. insert a picture B. create a database
C. create a form D. sort the results in the order of your choice
7. If the operating system is not responding or is misbehaving then you have to______.
A. restart your computer and run a virus scan
B. shut down your computer and run a virus scan
C. shut down and restart your computer
D. restart and shut down your computer
8. A query is a way of ______ from one or more tables.
A. deleting and searching data B. searching and compiling data
C. moving and searching data D. moving and deleting data
9. When you run a query, the results are presented to you in a __________.
A. form B. database C. table D. row
10. To run the query, you click ________ button on the ribbon.
A. !run B. select C. run D. view
11. If your computer is too slow you have to verify that your machine is the actual source of
problem. If the problem is the computer check ___________.
A. check power source
B. check screen colour
C. check internet connection
D. check your free space on the hard drive holding your operating system

45
5. How do your download a file to a local computer?
A. Cutting and dragging. B. Copying and dropping.
C. Copying and pasting D. Dragging and pasting.

Structured Questions
1. What is a multimedia program?
2. __________ allows us to position our images better.
3. Give any two examples of video editing applications.
4. Write down the three conditions to be met by images to be face swapped.
5. Morphing is widely used in _________ and __________.

Practical Questions
1. Use two images to cut ears from one image to the other using an image editing application
like GIMP. Save the originals and the edited pictures in a folder with your name and class.
2. Create a video using a group of related pictures. Your video should tell a story for example
A trip to Kariba. Add text to make your video more informative. Add music to your video.
Save your video with the name of story you are trying to tell.
3. Use a smartphone, camcorder or digital camera to capture a video. Download the video
to your PC. Edit the video to add titles, credits and animations. You can also change the
sound of the video. Save the video.

44
24. Computer programs that use a mixture of sound, pictures, video, and text to give
information are called ______ programs.
A. editing B. morphing C. multimedia D. highlighting
25. Removing outer parts of an image is called ______.
A. morphong B. dropping C. cropping D. selecting
26. Which tool is this?

A. Crop tool B. Align tool C. Select tool D. Rotate tool


27. Software that manages computer resources is called________.
A. style software B. application software
C. system software D. machine software
28. A technique which involves using a computer to make an image appear to change shape
or change into something else is called _____.
A. styling B. molding C. mordenising D. morphing
29. Name this tool.

A. Free select tool B. Fuzzy select tool C. Zoom tool D. Shear tool
30. The following group contains only multimedia software.
A. Adobe Reader, GIMP, Adobe Photoshop, Facebook
B. Paint, Microsoft Picture Manager, GIMP, Windows Movie Maker
C. Windows 10, Notepad, Windows Media Player, Turtle System
D. Wondershare Filmora, GIMP, Adobe Premiere Pro, Mouse

47
12. If a computer is having difficulties when starting, this could be caused by _________.
A. unable connect to internet B. failing power supply
C. lack of space on your computer D. overheating
13. If the computer is on but the screen is blank, there may be a problem with the connection
between the computer and the screen. First and foremost, you have to __________.
A. check the fan of the computer B. check if the monitor is properly connected
C. check the CPU D. check if the mouse is properly connected
14. If the computer lacks a sufficient cooling system, then the computer can start to_________.
A. produce noise during operations B. generate excess heat during operations
C. run slowly during operations D. refuse to shut down
15. When you hear noise coming from your computer it is a sign of__________.
A. hardware malfunctions or noise fan B. mouse not working
C. monitor not working D. CPU not working
16. Hard drive often make noise just before they fail so you have to make sure you________.
A. back up your information B. shut down the computer
C. remove the hard drive D. replace the hard drive
17. If the computer is not able to print, then the fault may be due to the____________.
A. computer might not be connected to the printer
B. computer might be overheating
C. computer might be slow
D. computer might be not connected to the internet
18. If the icons are too small or large you have to change it by either right click on
the___________and check on the view then you will be able to see icon size simply by
ticking the size that you want.
A. desktop B. menu bar C. tool bar D. task bar
19. Which of the following falls under software?

A. B. C. D.
20. Which of the following is NOT an example of application software?
A. Scratch Desktop B. Windows Media Player
C. Opera Web Browser D. Digital Music Player
21. The other name for application software is __________.
A. system software B. microsoft office C. program D. physical components
22. What is made up by both hardware and software?
A. System unit B. Computer system
C. Windows System D. Computer application
23. Without _______, hardware is not very useful.
A. money B. software C. ICT D. smartphones

46
Unit SAFETY AND SECURITY

4
Unit Objectives
At the end of this unit, you should be able to:
(a) install antivirus software.
(b) configure firewalls.
(c) use firewalls and antivirus.
(d) update antivirus software.
(e) explain the importance of the data protection legislation.
(f) interpret data protection legislation.

Looking Back
By now you are able to identify the effects of hacking. You are also able to list the methods
of minimizing the effects of hacking. Now you are going to install antivirus and configure
firewalls. You are also going to update antivirus software. You will also identify the importance
of the data protection legislation and interpret the protection legislation.

Key Words
Firewalls – computer hardware or software that prevents unauthorised access to
private data.
Antivirus – programs designed to find and intercept viruses before they do any harm.
Malware – software designed to interfere with a computer’s normal functioning.
Legislation – a law or set of rules made by the government.

Installing antivirus software


Antivirus programs defend computers from malware that comes
through email, flash drives, downloads and websites. Windows is the
most virus prone operating system out of the three major operating
systems. It has the most users and the weakest built-in security.
Step 1 Antivirus program
Acquire an active antivirus program.
There are several popular options for an average user on the internet.
49
Paper 2: Stuctured Questions
Section A
Answer all the questions in this section.
1. What is a database? [2]
2. Queries are mainly used to search for __________. [1]
3. A _________ can use a database to find information about each patient. [1]
4. A _________ is called a field. [1]
5. Name three way of closing either a table, query or a report. [3]
6. What is the difference between a table and a report? [2]
7. List three functions of reports. [3]
8. Overheating is caused __________. [1]
9. Strange noise is caused by ___________. [1]
10. If a computer is refusing to print, what is the problem? [1]
11. Define disassembling. [1]
12. C PU stands for __________. [1]
13. RAM stands for _________. [1]
14. Explain the first stage of disassembling a computer. [2]
15. If your mouse is not working you should __________. [2]
16. What is the difference between software and hardware? [2]
17. Give any two examples of image editing programs. [2]
18. What is photo or video editing? [2]
19. An icon is a ___________. [1]
20. Double clicking is __________. [1]

Section B
Answer any three questions.
1. Using Microsoft Access, create a blank database and name it music. [5]
2. Using the desktop option make changes to icons to make them too big. [5]
3. How do you delete an existing field in a query? [5]
4. Take a headshot (picture of only head and shoulders) of your friend using a digital camera
or smartphone. Download the image to your computer. Use an image editing software
to crop the image. Resize your image to 768 pixels wide and 975 pixels high (768 × 975
pixels). Save both images in a folder. [5]
5. Take two images of your friends using the same camera, resolution and lighting.
Download the images to your computer. Perform a swap of the legs of one of your
friends to another. Save all the three images in a named folder. [5]

48
Never put a firewall into production that is not properly secured by the following configurations:
• Update your firewall to the latest firmware.
• Delete, disable, or rename any default user accounts and change all default passwords.
Make sure you use complex and secure passwords.
• If multiple administrators will manage the firewall, create additional administrator
accounts with limited privileges based on responsibilities. Never use shared user
accounts.

Activity 2

In groups, discuss about different ways to customise firewalls.

Exercise 2

1. Firewalls are a part of network ________. (design/security/identification)


2. Each machine has a unique ________ address. (IP/CPU/PI)
3. ________have domain names. (Keyboards/Animations/Servers)
4. Firewalls are _____. (customizable/static/bad)
5. Never use shared accounts. (True/False)

How to use firewalls and antivirus


Use your antivirus program to manually inspect suspicious files and emails. Antivirus
programs are most effective when they automatically scan your computer. Open your
antivirus program’s settings and look for the Schedule option. Try to schedule a time when
your computer will be on but you will not be using it. Ideally, you should be scanning once a
week, but, scan more frequently if you deal with potentially infected files.
Firewalls must be updated at least every six months. Vulnerability scans must be performed
and firewall rules must be reviewed regularly.

Activity 3

In pairs, scan your computer for viruses. Document your findings.

Exercise 3

1. Your antivirus inspects ________. (files / the keyboard / your classroom)


2. Firewalls must be updated ________. (twice / regularly / once)
3. There is no need of a schedule when scanning your computer. (True / False)

How to update antivirus software


Antivirus are updated frequently with new versions that recognise the latest threats. The
antivirus file that you downloaded from the internet are most likely not the most up to date
version, so you will need to connect to your antivirus program severs and download the
latest updates.
51
Windows 8 and 10 have Windows Defender, which is a free anti-malware software
provided by Microsoft. It is already built-in. If you deal with files and websites that are
virus infected you may want to opt for more powerful and paid protection. Paid antivirus
is typically available for a yearly subscription fee.
When downloading free or paid antivirus programs, ensure that you are downloading
from a trusted source. There are many programs that claim to be antivirus/antimalware
but instead install malware themselves.
Step 2
Install the antivirus program.
Make sure no other programs are running while you install the antivirus. You will most likely
need to be connected to the internet to download additional files and updates.
Some free antivirus programs come packaged with toolbars for your web browsers. These
can add protection and also change your search options and slow down older computers.
You have the option to opt out of these changes during the installation process.

Activity 1

In groups of three, install an antivirus of your choice on your computers.

Exercise 1

1. Download antivirus from a _____________ source. (dubious/trusted/single)


2. You need ____________ connection to download antivirus updates. (CD-ROM/USB/
internet)
3. Antivirus programs defend computers from ____________. (malware/videos/songs)
4. Windows 8 and 10 have Windows Defender. (True/False)

Configuring firewalls
A firewall is a security system that is created to prevent unauthorised access to a network.
Your firewall is a critical part of network security. Firewalls are customisable. This means
that you can add or remove filters based on several conditions. Some of these are:
(a) IP addresses – each machine has a unique address called an IP address. If certain
addresses outside the addresses that are supposed to be interacting with your computer
access your server, firewalls can block all traffic to and from that IP address.
(b) Domain names – all servers on the internet have domain names, for example, www.
seeblue.com. You can block all access to certain domain names, or allow access only to
specific domain names.
(c) Specific words and phrases – the firewall can search through words and phrases listed
in the filter. For example, you could instruct the firewall to block any packets of information
with the words X-rated in it. You can also include many words, phrases and variations of
them that can be blocked by firewalls.

50
Activity 5

Word search puzzle.


D F I R E L A W P A
A I L I N E I D R N
T N M I Y E A R O T
A N P U Z Z L E T I
E A W M A B M F E W
R L W D C S A A C L
R E Z L K R P O T T
F I R E W A L L I W

Exercise 5

1. The Data Protection Act was passed in ____________. (1988 / 1888 / 2018)
2. The Data Protection Legislation provides rules about __________ security. (hardware /
software / data)
3. ______ about data sharing are laid down by the Data Protection Legislation. (Images /
Rules / Graphs)
4. Data must be handled in a way that ensures appropriate security. (False / True)

Key points in this unit


• Antivirus programs defend computers from malware that comes through email, flash
drives, downloads and websites.
• When downloading free or paid antivirus programs, ensure that you are downloading
from a trusted source.
• Your firewall is a critical part of network security.
• Make sure you use complex and secure passwords.
• If multiple administrators will manage the firewall, create additional administrator
accounts with limited privileges based on responsibilities.
• Use your antivirus program to manually inspect suspicious files and emails.
• Antivirus programs are most effective when automated.
• The Data Protection Legislation provides rules about data sharing and data security.
• Antivirus are updated frequently with new virus definitions that recognize the latest
threats.
• Antivirus programs defend computers from malware that comes through email, flash
drives, downloads and websites.

53
Most antivirus programs allow you to right-click on the icon in the System Tray while it is
running and click Update.
Update your antivirus definitions regularly. Most antivirus programs are set to automatically
update. There is need to check the settings of your antivirus to ensure that you are receiving
the necessary updates. Once the antivirus is updated and scanned, it is time to scan your
computer. This could take several hours, depending on the number of files being scanned
and your computer speed.
Never put a firewall into production that is not properly secured by the following configurations:
• Update your firewall to the latest firmware.
• Delete, disable, or rename any default user accounts and change all default passwords.
Make sure you use complex and secure passwords.
• If multiple administrators will manage the firewall, create additional administrator
accounts with limited privileges based on responsibilities. Never use shared user
accounts.

Activity 4

In pairs, update antivirus software on your computers.

Exercise 4

1. Antivirus must be updated ____________. (twice / frequently / once)


2. Activate necessary __________. (updates / malware / hardware)
3. Most antivirus have automatic updates. (True / False)

The Data Protection Legislation


Data Protection Act was passed in 1988. It was developed to control how personal or
customer information is used by organisation or government bodies. It protects people and
lays down rules about how data about people can be used. The Data Protection Legislation
provides rules about data sharing and data security. The legislation provides stronger
protection for more sensitive information like ethnic background, political opinions, religious
beliefs and health.
Everyone who is responsible for using personal data has to follow strict rules called data
protection principals. They must make sure the information is:
• used fairly, lawfully and transparently.
• used for specific, explicit purposes.
• used in a way that is, adequate, relevant and limited to what is only necessary.
• accurate, and where necessary kept up to date.
• kept for no longer than is necessary.
• handled in a way that ensures appropriate security, including protection against
unlawful and unauthorised processing, access, loss, destruction or damage.

52
WORLD WIDE WEB AND
Unit
ONLINE COLLABORATION

5
Unit Objectives
At the end of this unit, you should be able to:
(a) use increasingly effective search terms to find information.
(b) download freely available educational material.
(c) use web programming software to create a web page.
(d) design a school website.

Looking Back
In the previous grade, you learnt about uploading and documents, using search engines
to retrieve information and sending and receiving email. In this grade, you will learn about
using effective search terms to find information, use web programming software to create
web pages.

Key Words

Advanced search - a built-in feature of Google (and most search websites) which allows a
user to specify additional requirements for a search.
Web development - refers to building, creating, and maintaining websites.
HTML - refers to HyperText Markup Language and is the most basic building
block of the Web.

Surfing the Internet


How to use advanced search in Google (Example for all results)
Advanced search is a built-in feature of Google (and most
search websites) which allows a user to specify additional
requirements for a search. When used for searching the Web,
an advanced search gives additional information to Google,
which helps refine the search.
Step 1
Visit www.google.com and type what you are searching for. Example “Zimbabwe map”

55
Unit Revision Exercises
Multiple Choice Questions
1. Antivirus programs defend computers from malware that comes through _________.
A. email B. flash drives C. downloads D. Avast
2. When downloading free or paid antivirus programs, ensure that you are downloading
from a __________.
A. trusted source B. any source C. untrusted source D. unsecure source
3. All servers on the internet have domain names, for example _______.
A. www.seeblue.com B. ww.seeblue.com
C. www.seeblue D. w.seeblue. com
4. Firewalls must be updated at least every _________.
A. 1 months B. 2 months C. 3 months D. 6 months
5. Data Protection Act was passed in ________.
A. 2020 B. 1988 C. 2000 D. 1999
6. ___________ provides rules about data sharing and data security.
A. Data Protection Legislation B. Legislation Protection
C. Protection Act D. Legislation Act

Structured Questions
1. What is the function of an antivirus program?
2. Your firewall is a critical part of __________.
3. What is the purpose of Data Protection Legislation?
4. Define the following terms:
(a) firewall.
(b) malware.
(c) legislation.

Practical Questions
1. Install an antivirus of your choice on your computer.
2. Update antivirus software on your computer.

54
the box “Zimbabwe or Map” the search would include pages about Zimbabwe and
others about Map.
• The next box is the “unwanted words” box. This box lets you not include certain words
in your search. For example, if you search for “Zimbabwe map”, you could type in
“Political” to find pages that have “Zimbabwe map” in them and not being “Political”.

Step 5
Below the boxes, you can choose from more options for example:
• “Language” selects the language in which your results will be. This option is not very
necessary. If you search an English word, then you will probably get result in English.

• “File Type” helps you select the format of your file. So if you want to find pdf files then
you would select Adobe Acrobat PDF.

• “Last update” assists you to find pages in the time that you specify.

57
Step 2
On the results page click on Settings (1) and select Advanced Search (2)

Step 3
Advanced Search - If you click Advanced Search, a page comes up with many different options.
Step 4
Let us take a look at some of the Advanced search options.
• The box labelled “All these words” is your normal search box like the one on the google
home page.

• To find pages with any words you wish to be included type the words in the “any of
these words box”.
• The box “this exact wording or phrase” does not contain words in the middle of
a sentence. It will surround the words with quotes “ ”. For example, if you type in
“Zimbabwe map” in this exact wording or phrase box, the search will not include a
page with “Zimbabwe Provincial Map”.
• The “any of these words” box lets you look up something or something else instead
but it will not find the two search terms together. For instance, you could search with

56
2. Click Notepad. It is a blue notepad icon at the top of the list of results. Doing so prompts
Notepad to open.

3. Click File. This is in the top-left corner of the Notepad window. Clicking it prompts a
drop-down menu.

4. Click Save As…. It is in the drop-down menu. The Save As window will open:

5. Click the “Save as type” drop-down box. This option is near the bottom of the window,
and should have «Text documents (*.txt)» written on it.

59
Step 6
Once you are done, then click on advanced search to see your search results and Google on!

Activity 1

Use advanced search on (Image results) to find only black and white Bus images.

Web Programming
Web development refers to building, creating, and maintaining websites. All web programming
is done with web programming languages. These languages can include HTML, CSS,
JavaScript and PHP. The following method teaches you how to create a simple, text-based
webpage by using your Windows computer’s Notepad application. You will use HTML as your
webpage’s language.
Open Start
1. Click the Windows logo in the bottom-left corner of the screen. The Start menu will
pop up. Search for Notepad. Type in notepad to do so. You should see a list of matching
results appear near the top of the Start menu.

58
8. Enter a name and the “html” file extension. Click the «File name» text box, then type
in whatever you want to name your file followed by. ht ml . Then click Save
• For example, to name your webpage’s file “hello”, you would type in he llo . ht ml .

Setting up your webpage


1. Add your webpage’s language tag. The first tag you›ll need to add to Notepad tells the
rest of the document to use HTML. Type the following into Notepad:
<!DOCTYPE html>
<html>

2. Add the “head” tags. These tags mark the beginning and end of the page title, which
you›ll create in the next step. For now, just type <he ad> after the «<html>» tag, press
Enter Key twice to leave a space, and type in < / he ad>.

3. Add page title to your website. The title, which is placed between «<title></title>»
tags, goes in the space between the «head» tags.

61
Clicking it prompts a drop-down menu to appear.

6. Click All Files. It is in the drop-down menu. This will allow you to save your file as an
HTML document.

7. Select a save location. Click the name of the folder in which you want to save your
document on the left side of the window.
• For example, to save your document on the desktop, you would scroll up and click
Desktop in the left-hand sidebar.

60
7. Save your document. Press Ctrl+S to do so. You can now proceed with adding page
elements, such as paragraphs and headings, to your document.

Adding webpage elements


1.  now that all of your webpage elements go between the “body” tags. Any element – be
K
it a heading or a paragraph – needs to be written after the “<body>” tag and before the
“</body>” tag.

2. Add your website’s main heading. Type <h1> < / h1> in between the «body» tags, then
type whatever you want your webpage›s main heading to be in between the «<h1></
h1>» tags. For example, to create a page with the heading «Welcome», you would have
the following:
<h1>Welcome</h1>
• You can use tags “<h2></h2>” through “<h6></h6>” to create smaller heading text.

3. Add paragraph text to the page. Type in the paragraph tags, which are «<p></p>»,
and then enter whatever you want to use as your paragraph in between the tags. Your
end result should look something like this:

63
This title dictates the website’s name as it appears on the browser tab. To enter a header
to name your website «My Website», for example, you›d enter the following:

4. Add the “body” tags. All of your webpage›s code will go between these tags, which
should go below the «</title>» tag:

5. Close the HTML language tag. The last tag to go in your document will be a closing
HTML tag to signify the end of the page. Type </html> below the «</body>» tag to close
the HTML tag.

6. Review your HTML document so far. At this point, your document should look like this:

62
6. Review your webpage’s appearance. While the webpage’s elements may vary, your
document should look something like this:

To add an upload button add this text


<p>Select a file: <input type=”file” name=”myFile”></p>

Activity 2

Create a website for your school and place the upload option on it.

Key points in this unit


• An advanced search gives additional information to Google, which helps refine the
search.
• Some of the Advanced search options include: “All these words”, “any of these words
box” and “this exact wording or phrase”.
• Web development refers to building, creating, and maintaining websites.
• Web programming languages can include HTML, CSS, JavaScript and PHP.
• All web programming is done with web programming languages.

65
<p>This is my website. Vote for me for class president!</p>

4. Force a paragraph break. If you want to add extra spaces between paragraphs or
heading, type <br > after the line›s closing tag. For example, to create a line break after
a paragraph, you should end up with something like this:
<p>This is my website. Vote for me for class president!</p><br>
<p>I also like potatoes.</p>
• You can add an additional “<br>” tag after the first one to add another line break, thus
creating a space between your first paragraph and your second one.

5. Add formatting to your text. You can apply bolding, italics, and underlining (as well as
superscript and subscript) formatting to any word, sentence, or block of text as long as
it is between paragraph tags:
<b>Bold Text</b>
<i>Italic Text</i>
<u>Underlined Text</u>
<sup>Superscript Text</sup>
<sub>Subscript Text</sub>

64
Unit ICT CAREERS

6
Unit Objectives
At the end of this unit, you should be able to:
(a) identify career opportunities.
(b) outline the roles of different ICT personnel.

Looking Back
In the previous grade, you learnt about the roles of a web developer and professionals that
work with a web developer. In this grade you will learn about roles of ICT personnel.

Key Words

Software developer - ICT personnel who create software that enables users to
perform specific tasks on computer devices.
Computer technician - ICT personnel who perform tasks that revolve around the
installation, maintenance and replacement of hardware.
Database administrator - ICT personnel who set up databases according to a company’s
needs and make sure they operate efficiently.

Software developers
What they do?
Software developers typically do the following:
1. Analyse users’ needs and then design,
test, and develop software to meet those
needs
2. Recommend software upgrades for
customers’ existing programs and
systems.
3. Design each piece of an application or
system and plan how the pieces will
work together. Software developer

67
Unit Revision Exercises
Multiple Choice Questions
1. ________ searches give additional information to Google, which helps refine the search.
A. Good B. Google C. Advanced D. More
2. Which of the following is not an example of an Advanced search option?
A. “All these words” B. “Any of these words box”.
C. “This exact wording or phrase” D. “Search anywhere”
3. Web development does not refer to___________.
A. building websites B. creating websites
C. maintaining websites D. browsing websites
4. Which of the following is not a web programming language?
A. HTML B. CSS C. JavaScript D. Avast
5. To name your webpage’s file “peace”, you would type in________.
A. p e ace . ht ml . B. peace.html C. peacehtml D. peace.htm.

Structured Questions
1. What is the function of an advanced search?
2. List any three advanced search options.
3. What is the meaning of web development?
4. List any two web programming languages.
5. All web programming is done with________________.

Practical Question
1. Visit a website of your choice and indicate where bold text and italic text is used.

66
How to become one:
A bachelor’s degree in a computer-related field, such as computer science or management
information systems. A certificate for a specific database platform, such as MySQL Database
Administrator, Oracle DBA and Microsoft Certified Database Administrator.

Key points in this unit


• There are many jobs to choose from when it comes to the ICT field and these include:
Software developer, Computer technician and Database administrator.
• Software developers create software that enables users to perform specific tasks on
computer devices.
• Database administrators set up databases according to a company’s needs and make
sure they operate efficiently.
• Computer hardware technicians perform tasks that revolve around the installation,
maintenance and replacement of hardware.

Unit Revision Exercises


Multiple Choice Questions
1. Which of the following is not an example of a job in the ICT field __________.
A. software developer B. computer technician
C. database administrator D. nurse
2. ___________ create software that enables users to perform specific tasks on computer
devices.
A. Software developer B. Computer technician
C. Database administrator D. Graphic designer
3. ____________ perform tasks that revolve around the installation, maintenance and
replacement of hardware.
A. Database administrator B. Graphic designer
C. Software developer D. Computer technician
4. ____________ set up databases according to a company’s needs and make sure they
operate efficiently.
A. Database administrator B. Graphic designer
C. Software developer D. Computer technician
5. Software developers do the following except for _____________.
A. a nalyse users’ needs and then design, test and develop software to meet those needs
B. recommend software upgrades for customers’ existing programs and systems
C. design each piece of an application or system and plan how the pieces will work
together
D. repairing motherboards and upgrading firmware.

69
4. Create a variety of models and diagrams (such as flowcharts) that show programmers
the software code needed for an application.
5. Ensure that a program continues to function normally through software maintenance
and testing.
6. Document every aspect of an application or system as a reference for future maintenance
and upgrades.
7. Collaborate with other computer specialists to create optimum software.
How to become one:
Software developers usually have a bachelor’s degree in computer science and strong
computer programming skills.
Computer technician
What they do?
1. Identifying and troubleshooting problems.
2. Maintaining hardware and software.
3. Resolving network and connectivity
issues.
4. Repairing motherboards and upgrading
firmware.
5. Installing software applications.
6. Handling updates.
7. Providing technical support.
How to become one:
The Computer Hardware Technician must have a Bachelor’s Degree In Computer Science or a
related one. They should possess relevant knowledge regarding the integration of hardware
boards, random access memory, motherboard, processor and other essential components.
Database administrator
What they do?
1. Installing and setting up the database.
2. Protecting the database against threats
or unauthorised access.
3. Ensuring that the database is backed up
and able to be recovered in the event of
memory loss.
4. Suggesting changes and improvements
for database maintenance or protection.
5. Upgrading the database for better
performance.
68
TEST 2
Paper 1: Multiple Choice Questions
Choose the correct option from either A, B, C or D.
1. Antivirus programs defend computers are defended from malware that comes through
_________ by antivirus programs.
A. ESET B. flash drives C. email D. downloads
2. What does HTML stand for?
A. Hyper Text Markup Language
B. Hyperlinks and Text Markup Language
C. Home Tool Markup Language
D. Markup Language
3. What is the correct sequence of HTML tags for starting a webpage?
A. Head, Title, HTML B. Title, Head, HTML
C. HTML, Head, Title D. Head, Title
4. WWWW, stands for __________.
A. World Wide Web Worm B. World Wide Wildlife Web
C. World Wide Women’s Web D. World Wide Women’s Week
5. HTML is used to create ________.
A. machine language program B. high level program
C. web page D. web server
6. All servers on the internet have domain names, for example _______.
A. www.wildlife.com B. ww.wildlife.com
C. www.wildlifie. D. w.wildlfie. com
7. Firewalls must be updated at least every _________.
A. everyday B. 6 months C. 1 months D. after two weeks
8. In internet terminology IP means _____________.
A. Internet Provider B. Internet Protocol
C. Internet Procedure D. Internet Processor
9. The process of transferring files from a computer on the Internet to your computer is
called _________.
A. uploading B. forwarding C. FTP D. downloading
10. Which one of the following is not a search engine?
A. Bing B. Google C. Yahoo D. Windows
11. In which year was the Data Protection Act passed?
A. 2019 B. 1988 C. 2008 D. 1990
12. Which of the following is not an example of an Advanced search option?
A. “All these words” B. “Search around”
C. “This exact wording or phrase” D. “Any of these words”
13. Web development refers to ___________.
A. building and creating websites
B. creating websites
C. building, creating and maintaining websites
D. maintaining websites
71
6. Computer technicians do the following except for ______________.
A. installing software applications
B. handling updates
C. providing technical support
D. protecting the database against threats or unauthorised access
7. Database administrators do the following except ___________.
A. resolving network and connectivity issues
B. ensuring that the database is backed up and able to be recovered in the event of
memory loss
C. suggesting changes and improvements for database maintenance or protection
D. upgrading the database for better performance

Structured Questions
1. List any two jobs in the ICT field.
2. List any two duties performed by professionals in the ICT field.
3. What qualifications are needed for one to become a database administrator?

70
Paper 2: Structured Questions
Section A
Answer all the questions in this sections.
1. Define the following terms:
(a) antivirus program. [1]
(b) web programming language. [1]
2. State the function of an antivirus program. [1]
3. What are the dangers of telling strangers personal information like home address,
telephone number, information about your parents? [2]
4. Firewalls can protect you from dangerous people. (True/False) [1]
5. What is the importance of an advanced search? [1]
6. List any four web programming languages. [4]
7. State any five duties performed by a computer technician. [5]
8. State any five duties performed by a software developer. [5]
9. State any five duties performed by database administrator. [5]
10. What qualifications are needed for one to become computer technician? [3]

Section B
Answer any three questions.
11. Install an antivirus of your choice on your computer. [10]
12. Update antivirus software on your computer. [10]
13. Use a template from a web programming software on the internet to create a webpage
entitled “wildlife”. [10]
14. Create a New Folder on the desktop. Go on the internet and download freely relevant
educational and save this in the folder. [10]

73
14. The following are web programming languages except for _______.
A. HTML B. CSS C. JavaScript D. MSWord
15. One would type _______ to name a webpage’s file “wildlife”.
A. wil dli fe . ht ml . B. wildlife.html C. wildlifehtml D. wildlife.htm.
16. Which of the following is an example of a job in the ICT field?
A. Software developer B. Lawyer
C. Teacher D. Nurse
17. ________ perform tasks that revolve around the installation, maintenance and
replacement of hardware.
A. Database administrators B. Illustrators
C. Software developers D. Computer hardware technicians
18. Software developers do the following except for _________.
A. providing technical support
B. installing software applications
C. design each piece of an application or system and plan how the pieces will work
together
D. protecting the database against threats or unauthorised access
19. To protect a computer from virus, you should install _________ in your computer.
A. antivirus B. backup wizard C. disk cleaner D. disk defragmenter
20. A _______ is a computer program that can invade a computer and cause it to misbehave.
A. computer virus B. antivirus C. MS Word D. MS Access

72
2. Decode phase
During decoding the CPU translate the instructions into a language the CPU is able to
understand.
3. Execute phase
The CPU now follow the instructions by their order performing actions required by the
instructions.
4. Writeback phase
The writeback phase is the final one. During each of the previous steps the CPU records
feedback on the process. This is necessary if there was a problem during one of the steps.
Even if everything loaded successfully, the CPU writes the status back into memory.
The computer therefore processes information, by following predefined steps and
instructions inside programming code using the CPU.
Flowchart diagrams
A flowchart is a picture (graphical representation) of the problem-solving process. A
flowchart gives a step-by-step procedure for solution of a problem. Algorithms can be
represented graphically using flowcharts.
An algorithm is a step by step procedure to resolve a particular problem. Flowcharts have
shapes, which represent the steps of the solution and directional arrows to show the flow of
the solution.
Uses of a flowchart
1. To specify the method of solving a problem
The chart shows clearly the method of solving a problem from start to end.
2. To plan the sequence of a computer program
The programmer can plan how the program will flow showing stages according to their
priorities.
3. To communicate ideas and solutions
Flowcharts promote reuse. Other programmers can also use flowcharts created by others.
This means ideas and solutions can be easily shared using flowcharts.
To draw a flowchart, you have to:
• Identify input and output.
• Apply reasoning skills to solve the problem.
• Draw the flowchart using the appropriate symbols and arrows to show the sequence
of steps in solving the problem.

75
Unit PROGRAMMING

7
Unit Objectives
At the end of this unit, you should be able to:
(a) describe how computers process instructions and commands.
(b) create a basic software program.
(c) create an on-screen icon using text-based programming.

Looking Back
In the previous grade, you learnt about using templates on a computer to create solutions to
given scenarios. In this unit, you will learn how to create basic software programs.

Key Words

Flowchart – a type of diagram that represents a process.


Programming – the process of writing computer programs.

Processing instructions
Just like humans, computers use a brain to process instructions. For a computer the brain
is the Central Processing Unit (CPU). The CPU is also called the microprocessor or simply
the processor. The CPU is the chip that executes all of the computer programs. The CPU is
located on the motherboard and communicates with all other hardware components inside
the computer.
To process instructions, the CPU goes through four steps. The steps are fetch, decode,
execute and writeback.
1. Fetch phase
When the user makes a command to open a program, the CPU receives this request and
processes it. The CPU retrieves the desired program by accessing the memory for the
program’s location. After locating the program, the CPU gets further instructions from the
program.

74
Playing snakes and ladders between two players.
Start
Throw the dice: the number indicated by dice is 3.
Move the coin: through 3 blocks on the board.
Landed on snake head? No.
Landed on the bottom of the ladder? Yes (See the snakes and ladders board given).
Move up the ladder: reached block 14 on the board.
Reached the last block of the game? No.
Give dice to next player.
Enter the loop till the last block of the game is reached.
End
A loop is a set of operations in a computer program that are continuously repeated. It also is
a set of action in a flowchart that are continuously repeated until a certain condition is met.

process

No
Question?

Yes

The loop is shown by the red path in the above diagram.


77
Flowchart symbols and their purpose

Flowchart symbol Geometrical shape Purpose

Ellipse is used to indicate the start and end of a


flowchart. Start written in the ellipse indicates
Ellipse the beginning of a flowchart. End or Stop or
Exit written in the ellipse indicates the end of
the flowchart.

A parallelogram is used to show data (input)


Parallelogram or to print data (output).

A rectangle is used to show the processing


Rectangle that takes place in the flowchart.

A diamond with two branches is used to show


the decision making step in a flowchart. A
Diamond question is specified in the diamond. The next
step in the sequence is based on the answer
to the question which is “Yes” or “No”.

Arrows are used to connect the steps in a


flowchart, to show the flow or sequence of the
Arrows problem solving process.

Flowchart – Snakes and ladder game

Start
Give dice to
next player
Throw the dice

Move the coin

Yes Slide down to the tail


Landed on snake head
of the snake
No
Yes
Landed on ladder bottom Move up the ladder
No
Reached the last block of game? No
Yes
You are the winner

End

76
Visual (Graphical) Based Programming using Scratch
A graphical or visual language typically uses drag and drop rather than typing. It may
use icons or textual labels on blocks or elements. Graphical User Interface (GUI) elements
such as dialogues and drop-down selection menus are often used. There are many visual
based programming languages which include; Scratch, Snap, ToonTalk, Kodu, Logo and
Flowgorithm.
We are going to learn visual based programming using Scratch. We will use scratch to
draw a square. Scratch can be used online by visiting the scratch website or offline using
Scratch Desktop.
Drawing a square using Scratch
1. Launch Scratch Desktop by clicking its icon on the desktop or looking it up using the
start menu.

2. The Scratch start page is shown as below. Scratch allows users to move blocks to the
scripts area to use them. There are eight preinstalled blocks which are, Motion, Looks,
Sound, Events, Control, Sensing, Operators and Variables. The ninth group (My Blocks)
allows users to create their own custom blocks.

3. Cut the sprite that is shown on the canvas by clicking the bin icon shown on the top right
corner of the sprite. Follow the diagram below:

Delete sprite

The Scratch window should show as below after successful deletion.

79
A decision is a choice between available options. In flowchart the options are a Yes and a
No. Below is a diagram of a decision.

Yes
Question?

No

A process is a series of actions which are carried out in order to achieve a particular result.
Below is a process diagram.

Start

process

No
Question?

Yes

End

Activity 1

Use your answers to draw a puzzle. The answers should either be across or down the puzzle.
Across
1. I am a rectangle in a flowchart. What do I represent?
2. When you want to show a decision-making step, you can use this box.
3. You can use me to communicate ideas, graphically represent a problem solving process.
4. I connect two geometrical boxes in a flowchart.
Down
1. In the flowchart, I represent data or information that is available.
2. All flowcharts begin with me. I am elliptical in shape.

Exercise 1

1. Arrows can be used to represent input in flowcharts. (True/False)


2. Arrows are used show the sequence of the problem solving. (True/False)
3. Define programming.

78
Pen extension

6. Drag to the scripts area by clicking on Pen and then dragging Pen down.

7. Click the control block and drag the block.

Change parameter 10 to 4. Parameter 4 means the loop will repeat 4 times.

81
4. Click on events and drag as shown below.

5. We want to use a loop to draw a square so we have to drag a loop block. Before looping
we need a pen to draw with. To add a pen to code block, click on add extension as
shown below.

Add extension

A window with extensions to select is displayed select pen. If successfully selected, Pen
will be shown under code blocks.

80
11. Drag and to the scripts area as shown below. Change 10 to
100 and 15 to 90 as shown. Add a wait to slow down the sprite’s movement.

12. Click the green flag to see what the program does. To stop the program, you click

the stop button. A square is drawn as shown below.

83
8. Click the motion block. No motion blocks are displayed because we do not have a sprite
selected in our project.

9. Add a sprite to the project by clicking on, “Choose a sprite”, icon. Sprites are
shown as below.

10. Select any sprite from the list shown. In this case select Beetle sprite. The previous script
block will be erased repeat the above steps to add the script.

82
Text Based Programming
Text based programming involves typing instructions using the keyboard and a text editor.
There are text-based programming languages for kids such as Logo, Sniff, Turtle BASIC,
Turtle Pascal and Turtle Python. Text based programming allows learners to use real
instructions rather than dragging and dropping code blocks.
Drawing a square using Turtle System
1. Launch the Turtle System application by clicking its icon on the desktop. You can use the
start menu to launch the application.

2. The Turtle System home screen will show on the screen as below.

3. The language currently selected is Pascal. The language can be changed by clicking the
drop down arrow next to the language selected.

4. There are three languages in Turtle System namely Pascal, BASIC and Python. We will
use Pascal language. Our first line of code will have this command:
Line 1 PROGRAM Draw Square;

85
13. To change the backdrop (picture at the background of a sprite) click on the, “Choose a

backdrop icon”

14. Choose a backdrop of your choice from the list. The selected backdrop is shown below.
Save your project by clicking on, “File” then “Save as”.

Activity 2

Create a project using scratch that draws a square without using a loop. Use a sprite and a
backdrop of your own choice.

Exercise 2

1. Name any three sprite categories found in scratch.


2. Give any two backdrops found in scratch.
3. Scratch can be used offline only. (True / False)

84
5. After writing the above program in Turtle System click on RUN to execute the program.
It should draw a square as shown below.

Activity 3

Draw a square in Turtle System using any programming language from the three available.
Do not use a loop to draw the square.

Exercise 3

1. How many programming languages are used in Turtle System?


2. To execute a program in Turtle System we click on _________________.
3. Which computer part acts as the brain?

Key points in this unit


• Computer programming is the act of writing instructions on a computer, that make a
computer do various things.
• A computer program is a sequence of instructions that a computer can interpret and
execute to produce a certain result.
• To process instructions, the CPU goes through four steps. The steps are fetch, decode,
execute and writeback.
• A flowchart is a picture (graphical representation) of the problem-solving process.
• A loop is a set of operations in a computer program that are continuously repeated.
• A decision is a choice between available options.
• A process is a series of actions which are carried out in order to achieve a particular
result.
• A graphical or visual language typically uses drag and drop rather than typing.
• Text based programming involves typing instructions using the keyboard and a text
editor.

87
The statement names the program. The whole program (source code) is given below.

Line 2 has the statement VAR x: integer; This is a variable declaration. A variable is a
name given to a computer memory location that stores a value in a computer program.
The variable will be an integer (an exact whole number). “x” is the variable name to be
used later in the program.
Line 3 has the statement BEGIN. This is the start of the program.
Line 4 is an assignment of a value to the variable x we have declared in Line 2. It means
x will hold a value 1.
Line 5 assigns the draw colour to blue.
Line 6 sets line thickness when drawing.
Line 7 is the beginning of a loop. Code that follows after the loop is executed until a set
condition is met.
Line 8 means the turtle will move 400 units forward drawing a line.
Line 9 turns the turtle 90 degrees to the right side.
Line 10 makes the computer wait for the set time to lapse before continuing to execute.
Line 11 increments the value of x by 1 or adds 1 to the value of x.
Line 12 has the condition or criteria to exit the loop. The loop will be executed until x
becomes greater than 4.
Line 13 signals the end of the program.
Each statement is terminated by a semicolon. The semicolon signals the end of a
statement. Missing a semicolon at the end of a statement will result in a syntax error. A
syntax error is an error that result from using a programming language incorrectly.

86
COMMUNICATION AND
Unit
NETWORKING

8
Unit Objectives
At the end of this unit, you should be able to:
(a) design a network cable.
(b) configure a network.
(c) access network resources.
(d) identify types of mobile technology and network providers.
(e) access mobile network services.
(f) identify different types of internet services.
(g) access internet services.

Looking Back
In this chapter, you will begin by relating networks to situations and concepts you already
covered in grade 6. Once you have a basic understanding of what networks are and what
they can do, it helps if you can actually begin working with them. In its widest sense, a
network consists of two or more objects, sharing resources and information.

Key words

Network –  is the connection of two or more computers sharing resources and


information.
Internet – is a computer network consisting of a worldwide network of computer
networks that use protocols and standards to facilitate data transmission
and exchange.
RJ 45 cable – is a cable that is used to connect computers.

RJ45 Cables
There are two types of RJ45 cables in everyday use. Standard patch cables and crossover
cables. The standard patch cable may be used, for example, to connect a computer to a
network router/switch, or to connect a cable modem to a router/switch. The crossover cable
is most often used to connect two computers directly without the use of a router or switch.

89
Unit Revision Exercises
Multiple Choice Questions
1. To be able to create computer applications you should learn ____.
A. ICT B. programming C. programmer D. computing
2. Which of the following is the use of a flowchart?
A. Handling processes. B. Keeping methods in the correct order.
C. Organising information into groups. D. To specify the method of solving a problem.
3. What is shown below?

process

No
Question?

Yes

A. Process B. Decision C. Loop D. Question


4. GUI stands for _____________.
A. Grade Unity Information B. Graphical User Interface
C. Graded Used Information D. Graphics User Interface
5. A ____________ is a name given to a section of the computer memory that stores a
value in a computer program.
A. value B. parameter C. valuable D. variable

Structured Questions
1. What is the difference between text based and graphical based programming?
2. List the four steps that the microprocessor goes through when processing information.
3. What is the function of a rectangle and ellipse in a flowchart diagram?
4. A process is a ______________.
5. Give any two examples of text-based programming languages for kids.

Practical Questions
1. Write a program that draws a triangle in any Turtle System language.
2. Create a program that animates your name in scratch.
3. Create the Pong Game by following tutorials in scratch.

88
RJ45 PINOUT T-568B

1. White/ Orange
2. Orange
3. White/Green
4. Blue
5. White/Blue
6. Green
7. White/Brown
8. Brown

There are two kinds of Ethernet cable is used for communication.


1. Straight through.
2. Cross over cable.
Straight through cable
Straight through ethernet cables are the standard cable used for almost all purposes, and
are often called “patch cables”. It is highly recommend you duplicate the colour order as
shown below. Note how the green pair is not side-by-side as are all the other pairs. This
configuration allows for longer wire runs.

RJ-45 Plug
Pin 1

Clip is pointed
away from you

Always remember that both end connector clip facing away from you when check the colour.
Crossover cables
The purpose of a Crossover Ethernet cable is to directly connect one computer to another
computer (or device) without going through a router, switch or hub.

RJ-45 Plug
Pin 1

Clip is pointed
away from you

91
These cables look identical; the only difference is the termination of the wiring in the cables
plug.
RJ45 technology is frequently used in home
and business networking contexts to connect
multiple computers both to each other and
to the Internet. Additional network-capable
devices can also be attached using RJ45
cables. For example, an office may connect
a laser printer to its network using RJ45
cables, thus allowing anyone connected to
Straight through cable Crossover cable
the network to print to the shared printer.
Rather than maintaining an expensive computer server, a company may opt to connect a
NAS device (network-attached storage) to a network using an RJ45 cable, thus allowing
other users connected to the network to access files stored on the NAS device.
How to make RJ45 cable
RJ45 cable is used for connect the ALL HMI and engineer station through a switch to
communicated each other. It is used to download the any modification and which is made
in graphics in engineering station. RJ45 cable also used for communicate the printer with
computer.
Required tools and materials
1. Ethernet Cable – Category 5e or CAT5e or CAT6.
2. RJ-45 Crimping tool.
3. RJ45 Crimp able Connectors.

CAT-6 Cable RJ45 Connectors

Crimping tool

There are four pairs of wires in an ethernet cable, and an Ethernet connector (8P8C) has
eight pin slots. Each pin is identified by a number, starting from left to right, with the clip
facing away from you.

90
Crimping the cable: Carefully place the
connector into the Ethernet crimper and
crimp down on the handles tightly. The
copper splicing tabs on the connector will
pierce into each of the eight wires. There is
also a locking tab that holds the plastic sleeve
in place for a tight compression fit. When you
remove the cable from the crimper, that end
is ready to use.
Test the cable: Check the continuity of both connectors each other. Check the cable through
a cable tester. To check the cable through computer connect both connector in two computers
for cross cable and straight cable connect through a switch then ping the computer.

Activity 1

1. With the help of your teacher design a RJ tool. Use the following tools:
(a) Ethernet cables.
(b) RJ45 cables tool.
(c) RJ45 crimping tools.
Follow the steps in your notes to make RJ45 in your notes.
2. Discuss the difference between the crossover cable and the standard patch cable.

Peer-to-Peer Network Setup


One thing you should know is to check whether your computer can communicate with others.
After installing the operating systems on the computers that will primarily participate in
the network, you can “physically” connect the workstations to the router. You can start
connecting the pieces whether the computers are on or off.
To connect the computers
When building a network, you can physically connect the computers before or after installing
the operating systems. After installing the operating system, there are a few you should
check to make sure a computer is working.

93
Procedure to make RJ45 cable
Step 1: Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the cut cable. Do
not cut deep which may cause damage the insulation of core.

Step 2: Unwind and pair the similar colours. Pinch the wires between your fingers and
straighten them out in a sequence of colour as u want to make cable (Straight cable or cross
over cable). The colour order is important to get correct.

Step 3: A straight cut across the 8 wires to shorten them to 1/2 Inch (1.3 cm) from the cut
sleeve to the end of the wires by crimping tool. Carefully push all 8 unstrapped coloured
wires into the connector. Plastic sleeve should be inserted proper in connector.

Wrong way: The plastic sleeve is not inside the connector where it can be locked into place.
The wires are too long. The wires should extend only 1/2 inch from the blue cut sleeve. The
wires do not go all the way to the end of the connector. The wires are too short.

92
If you see it, click it. A new window will come up:

Read the text and click Join Now. Another window would come up:

Click Next. You will be asked to provide a password.

Exercise 2

1. With the help of your teacher setup peer to peer network. Follow the instructions in your
notes of connecting computers.
2. Discuss the components of a peer to peer network.

95
Wired network
(a) Shutdown all computers and the router (if necessary).
(b) Turn on one computer you will use to setup the router.
(c) Your router should have come equipped with a piece of paper or a brochure of just
a few pages that lists the instructions to follow to setup the router. One of the early
instructions may ask you to insert the CD that came with the router, in the CD drive
and wait for the instructions. Follow these instructions truly.
(d) After setting up and configuring the router, turn it off and turn off the computer you
used to set it up (this step is optional).
(e) Connect each of the other computers to the router using an RJ-45 cable for each
connection:

Microsoft Windows 7 provides a fast way to create a peer-to-peer network. To use it, start
Windows Explorer. Depending on the computer or its maker, in the left frame, you may see
an icon labelled Home group:

94
As the use of 2G phones became more widespread and people began to use mobile phones
in their daily lives, it became clear that demand for data services (such as access to the
internet) was growing. Furthermore, if the experience from fixed broadband services was
anything to go by, there would also be a demand for ever greater data speeds. The 2G
technology was nowhere near up to the job, so the industry began to work on the next
generation of technology known as 3G. The main technological difference that distinguishes
3G technology from 2G technology is the use of packet switching rather than circuit switching
for data transmission.

3G: High Speed IP Data Networks


The main difference that distinguishes 3G technology from 2G technology is the use of packet-switching (rather than
circuit-switching) for data transmission. With the widespread availability of good quality 3G coverage in the mid 2000s,
USB dongles for accessing mobile internet on computers were released.
Circuit - switching sends out
1 information (voice or data)
in ordered time slots
1
Internet
Cellular network Cellular network
Packet-switching sends out

2 data (voice is digitalised)


as required, in no special order. 2

The high connection speeds of 3G technology enabled a transformation in the industry: for
the first time, media streaming of radio and even television content to 3G handsets became
possible.
4G: Growth of mobile broadband
The fourth generation of networking, which was released in 2008, is also called 4G. It
supports mobile web access like 3G does and also gaming services, HD mobile TV, video
conferencing, 3D TV, and other features that demand high speeds. It is mush stronger than
the 3G and 2G technology. It has faster speed.
The max speed of a 4G network when the device is moving is 100 Mbps. The speed is 1 Gbps
for low-mobility communication such as when the caller is stationary or walking.
Most current cell phone models support both 4G and 3G technologies. One of the main
ways in which 4G differed technologically from 3G was in its elimination of circuit switching,
instead employing an all-IP network. Thus, 4G ushered in a treatment of voice calls just like
any other type of streaming audio media, utilizing packet switching over internet, LAN or
WAN networks via VoIP. 4G LTE data transfer speed can reach peak download 100 Mbit/s,
peak upload 50 Mbit/s.
5G is a not-yet-implemented wireless technology that’s intended to improve on 4G. 5G
promises significantly faster data rates, higher connection density, much lower latency and
energy savings, among other improvements. The anticipated theoretical speed of 5G
connections is up to 20 Gbps per second.

Exercise 2

1. Discuss types of mobile technology and the benefits of using mobile network services.
2. Which mobile network allows you to make video calls and voice calls?

97
Mobile Communication

2G: Digital Networks


In the 1990s, the ‘second generation’ (2G) mobile phone systems emerged, primarily using
the GSM standard. These 2G phone systems differed from the previous generation in their
use of digital transmission instead of analogy transmission, and also by the introduction of
advanced and fast phone-to-network signalling. The rise in mobile phone usage as a result
of 2G was explosive and this era also saw the advent of prepaid mobile phones.
The second generation introduced a new variant to communication, as SMS text messaging
became possible, initially on GSM networks and eventually on all digital networks. Soon SMS
became the communication method of preference for the youth. Today in many advanced
markets the general public prefers sending text messages to placing voice calls.
Some benefits of 2G were Digital signals require consume less battery power, so it helps
mobile batteries to last long. Digital coding improves the voice clarity and reduces noise in
the line. Digital signals are considered environment friendly. Digital encryption has provided
secrecy and safety to the data and voice calls. The use of 2G technology requires strong
digital signals to help mobile phones work properly. Cell phones received their first major
upgrade when their technology went from 1G to 2G. This leap took place in Finland in 1991
on GSM networks and effectively took cell phones from analog to digital communications.
The 2G telephone technology introduced call and text encryption, along with data services
such as SMS, picture messages, and MMS.
Although 2G replaced 1G and is superseded by later technology versions, it’s still used around
the world.
3G: High speed IP data networks
The introduction of 3G networks in 1998 ushered in faster data-transmission speeds, so you
could use your cell phone in more data-demanding ways such as for video calling and mobile
internet access. The term “mobile broadband” was first applied to 3G cellular technology.
96
E-banking
Use of computers and telecommunications to enable banking transactions to be done by
telephone or computer rather than through human interaction. Its features include electronic
funds transfer for retail purchases, automatic teller machines (ATMs) and automatic payroll
deposits and bill payments. Some banks offer home banking, whereby a person with a
personal computer can make transactions, either via a direct connection or by accessing
a website. Electronic banking has vastly reduced the physical transfer of paper money and
coinage from one place to another or even from one person to another.
It provides ways for international banking. It provides banking throughout the year 24/7
days from any place that have internet access. It provides convenience in terms of capital,
labour, time all the resources needed to make a transaction.
E-banking provides many advantages for banks and customer’s. E-banking has made life
much easier and banking much faster for both customers and banks.
Main advantages are as follows:
• It saves time spent in banks.
• It provides ways for international banking.
• It provides banking throughout the year 24/7 days from any place have internet access.
• It provides well-organised cash management for internet optimisation
• It provides convenience in terms of capital, labour, time all the resources needed to
make a transaction.
• Taking advantage of integrated banking services, banks may compete in new markets,
can get new customers and grow their market share.
• It provides some security and privacy to customers, by using state-of-the-art encryption
and security technologies. Electronic funds transfer transactions are activated during
e-banking procedures.
The different methods of e-banking are:
• Online banking.
• Short message service banking.
• Telephone banking.
• Mobile banking.
Online banking
Online banking also called as internet banking, allows the customers to use all the banking
services from a computer which has internet access. The customer can perform financial
transactions on a secure website operated by the bank. Online banking offers features
such as bank statements, loan applications, funds transfer, e-bill payments and account
aggregation allows customers to monitor all their accounts in one place.
Telephone banking
Telephone banking is a service provided by the banks which provides customers to perform
transactions on phone. All the telephone banking systems uses automated answering
system with keypad response or voice recognition capability.
99
Internet Services
Electronic Governance is the application of Information and Communication Technologies
(ICTs) for delivering government services through integration of various stand-alone systems
between Government-to-Citizens (G2C), Government-to-Business (G2B), and Government-
to-Government (G2G) services.
It is often linked with back office processes and interactions within the entire government
framework. Through e-Governance, the government services are made available to the
citizens in a convenient, efficient, and transparent manner. Technology have taken over not
only in business but also in the government department. Gone are the days when one had to
queue waiting to be saved at government department and organisation through a network
called e-governance. The e-governance connect people from different bare ground.
The aims of e-governance can be stated as follows:
• To support and simplify governance for government, citizens and businesses.
• To make government administration more transparent and accountable while
addressing the society’s needs and expectations through efficient public services and
effective interaction between the people, businesses and government.
• To reduce corruption in the government.
• To ensure speedy administration of services and information.
• To reduce difficulties for business, provide immediate information and enable digital
communication by e-business.
While e-governance provides the advantages of convenience, efficiency and transparency,
it also has problems associated with it. They are as follows:
• Lack of computer literacy: In developing country the majority of the citizens lack
computer literacy which obstructs the success of e-governance.
• Lack of accessibility to the internet or even computers in some parts of the country is
a disadvantage to e-governance.
• E-governance results in a loss of human interaction. As the system becomes more
mechanized, reduced interaction takes place among people.
• It gives rise to the risk of personal data theft and leakage.
E-governance can take place in four major types of interactions:
1. Government to Government (G2G) where information is exchanged within the
government that is either, between the central government, state government and local
governments or between different branches of the same government.
2. Government to Citizen (G2C) where the citizens have a platform through which they
can interact with the government and get access to the variety of public services offered
by the government.
3. Government to Businesses (G2B) where businesses are able to interact with the
government seamlessly with respect to the services of the government offered to
businesses.
4. Government to Employees (G2E) where interaction between the government and its
employees occurs in an efficient and speedy manner.
98
4. Consumer to consumer (C2C) – as you might have guessed, C2C e-commerce happens
when something is bought and sold between two consumers. C2C commonly takes
place on online marketplaces such as eBay, in which one individual sells a product or
service to another.
5. Government to business (G2B) – G2C transactions take place when a company pays
for government goods, services, or fees online. Examples could be a business paying for
taxes using the Internet.
6. Business to government (B2G) – when a government entity uses the Internet to
purchases goods or services from a business, the transaction may fall under B2G
e-commerce. Let’s say a city or town hires a web design firm to update its website. This
type of deal may be considered a form of B2G.
7. Consumer to government (G2C) – consumers can also engage in B2C ecommerce.
People paying for traffic tickets or paying for their car registration renewals online may
fall under this category.
E-registration
It is the creation and use of an online registration form, electronic registration form, online
registration process, online registration template or digital registration form completed by
an individual, group or organization to apply to register for an agency, funding, newsletter,
school, college, university, service or other types of necessary and vital services and purposes.
E-registration processes or forms make registering for a newsletter, college, school, university
or agency easy and simple to do from a computer, laptop or other type of electronic device
that has online internet access.
E-Marking
Electronic marking, also known as e-marking and onscreen marking, is the use of digital
educational technology specifically designed for marking. The term refers to the electronic
marking or grading of an exam.

Activity 2

1. In groups, discuss the following internet service and explain how they work.
(a) E- learning.
(b) E-registration.
(c) E- banking.

Exercise 3

1. Try and use e-registration or e-learning platform or any other internet service of your
choice.

101
To prove their identity customers must provide a numeric or verbal password or answering
the questions asked by the call centre representative. In telephone banking customer cannot
withdraws and deposits cash but can do all the other transactions.
Mostly there will be a customer care representative to which the customers speak, although
this feature is not guaranteed. The customer care representatives are trained to do what are
available at the branch like chequebook orders, address change and debit card replacements.
Sms banking
SMS banking is a service permitting banks to do selected banking services from the users
mobile by the sms messaging. SMS banking services have push and pull messages. Push
messages are sent by the banks for alerting customer about new offers, marketing messages,
alerts to events happening in customers account such as large amount of withdrawals from
ATM or credit card.
Pull messages are those that are sent by the customer to bank for having some information
or to perform a transaction in their account. Examples include account balance enquiry,
requesting for current exchange rates and for new offers that are launched.
The customer has a choice to select the list of services he need to be informed. This can be
done by integrating to internet banking or speaking to the customer care representative of
the bank call centre.
E-commerce
E-Commerce or Electronic Commerce means buying and selling of goods, products, or
services over the internet.
E-commerce is also known as electronic commerce or internet commerce. These services
provided online over the internet network. Transaction of money, funds, and data are also
considered as E-commerce. These business transactions can be done in four ways: Business
to Business (B2B), Business to Customer (B2C), Customer to Customer (C2C), and Customer
to Business (C2B). Online stores like Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, Olx are
examples of E-commerce websites.
1. Business to consumer (B2C) – transactions happen between businesses and
consumers. In B2C ecommerce, businesses are the ones selling products or services
to end-users. Online retail typically works on a B2C model. Retailers with online stores
such as Walmart, Macy’s, and IKEA are all examples of businesses that engage in B2C
ecommerce.
2. Business to business (B2B) – as its name states, B2B ecommerce pertains to
transactions conducted between two businesses. Any company whose customers are
other businesses operate on a B2B model.
Examples include Xero, an online accounting software for small businesses, ADP, a
payroll processing company and Square, a payments solution for small businesses.
3. Consumer to business (C2B) – Consumer to business e-commerce happens when
a consumer sells or contributes monetary value to a business. Many crowdsourcing
campaigns fall under C2B ecommerce.

100
Structured Questions
1. Define the following terms;
(a) Network.
(b) Internet.
(c) Peer-to-peer network.
2. Which mobile network allows you to make video calls and voice calls?
3. Name three types of mobile network that you learn.
4. What is the difference between 2G and 3G mobile?
5. What is the difference between crossover and standard patch cables?

103
Key points in this unit
• Peer-to-peer networks are popular as home networks and for use in small companies
because they are inexpensive and easy to install.
• Electronic Governance is the application of Information and Communication
Technologies (ICTs) for delivering government services through integration of various
stand-alone systems between Government-to-Citizens (G2C), Government-to-
Business (G2B) and Government-to-Government (G2G) services.
• E-banking is the use of computers and telecommunications to enable banking
transactions to be done by telephone or computer rather than through human
interaction.
• E-commerce or electronic commerce means buying and selling of goods, products, or
services over the internet.
• E-registration is the creation and use of an online registration form, electronic
registration form, online registration process, online registration template or digital
registration form completed by an individual, group or organisation to apply to register
for school, college and university.
• Electronic marking is the use of digital educational technology specifically designed
for marking.

Unit Revision Exercises


Multiple Choice Questions
1. ____________ cable is used to connect two computers directly without the use of the
router.
A. RJ45 B. JR45
C. Cross over D. Standard patch
2. ___________ cable is used to connect a computer to a network device.
A. Standard patch B. Cross over
C. RJ45 D. JR45
3. ___________ is a method of banking in which a customer conduct transaction
electronically via the internet.
A. E-banking B. E-learning
C. E-commerce D. E-governance
4. ______________ is the application of information and communication technology for
delivering government service.
A. E-banking. B. E-government
C. E-commerce D. E-registration
5. Which of the following is not a mobile network?
A. 2G B. 3G C. 4G D. G4

102
13. What are the two types of RJ45 cables?
A. Standard patched cable and crossover cables.
B. ZESA cable and copper cables.
C. Twisted pair cables and ZESA cables.
D. Pair cables and wire cable.
14. There are two kinds of Ethernet cable used for communication. What are they?
A. Wire cable and cross over. B. Cross over cable and wire cables.
C. Twisted pair cable and cross over. D. Straight Through and cross over cables.
15. The 2G phone systems differed from the previous generation in their use of ________.
A. analog transmission. B. digital transmission.
C. wireless transmission. D. cable transmission.
16. What is the benefits of 2G phone system?
A. High data speed. B. Digital signals consume less battery power.
C. It is cheaper. D. Digital signal is cheaper.
17. The main difference between 2G and 3G is that 3G ___________.
A. use packet switching B. use Circuit switching
C. use both packet and circuit switching D. use 2G phone system
18. One of the main ways in which 4G differed technologically from 3G was the ______
A. removal of circuit switching, instead take on all IP Network
B. introduction of packet switching.
C. introduction of circuit switching.
D. removal of packet switching.
19. What is packet switching?
A. Send out information in form of data or voice in ordered time slots.
B. Send out data as required in no special order.
C. Send information quickly.
D. Send information slowly.
20. What is circuit switching?
A. Send 3G phone system. B. Send out information quickly.
C. Send out information slowly. D. Send out information in ordered time slots.

105
TEST 3
Paper 1: Multiple Choice Questions
Choose the correct option from either A, B, C or D.
1. The act of writing instructions that make a computer do various things is called _____.
A. coding B. program C. writing D. instructing
2. Which computer part acts as the brain?
A. Microprocessor B. System unit
C. Motherboard D. PC
3. The CPU accesses the memory for program location during which step of processing
information?
A. Decode B. Writeback C. Fetch D. Execute
4. To decode is to__________
A. retrieve information from the memory.
B. translate computer instructions into a language understood by the CPU.
C. follow instructions according to their order doing as they state.
D. record feedback on progress.
5. A(n) ______________ is a graphical representation of the problem-solving process.
A. flowchart B. algorithm C. pseudocode D. program
6. A ______ is a set of operations in a computer program that are continuously repeated.
A. decision B. process C. loop D. binary tree
7. In scratch we drag ___________ to the scripts area to create programs.
A. scripts B. sprites C. backdrops D. code blocks
8. ____________ is a text-based programming method.
A. Scratch B. Kodu
C. Turtle system D. Toontalk
9. A _____________ is a name given to a section of the computer memory that stores a
value in a computer program.
A. parameter B. value C. valuable D. variable
10. What is the name of this button?
A. Back B. Resume C. On D. Stop
11. What do you do if your computer is refusing to connect to internet and is a wireless
connection?
A. Re-enter the code in order to connect to the network.
B. Change the code.
C. Change the password of your computer.
D. Change the network devices.
12. Which of the following is not a computer fault?
A. Overheating. B. Strange noise.
C. Blank screen. D. Printing.

104
Paper 2: Structured Questions
Section A
Answer all the questions in this section.
1. Online banking is also known as _________.
2. E-marking is also known as __________.
3. Explain telephone banking.
4. __________ is also known as electronic commerce.
5. List any three problems that are associated with e-governance.
6. __________ is the use of online registration form that is completed by an individual,
group or organisation to apply to register.
7. Define internet.
8. Peer to peer network are popularly used in ___________.
9. Name the types of mobile networks that you know.
10. What is the difference between 2G and 3G mobile network?
11. List the methods of e-banking.
12. Give the differences between SMS banking and telephone banking.
13. List five advantages of e-banking
14. Draw and label peer to peer network
15. There are software that are used to create databases. Name 5 of them.
16. Give any two uses of flowcharts.
17. Define a process.
18. What is the difference between text based and graphical based programming?
19. A variable is a ____________.
20. A parameter is a ______________.

Section B
Answer any three questions.
21. Create a flowchart to perform the following;
(a) Reads three numbers A, B and C.
(b) Calculate the average of three numbers A, B and C.
(c) Print the average.
(d) If average is greater than or equal to 80 print “You are a star” and exit.
(e) If average is less than 80 print “Work hard to become a star” and exit.
(f) Save your flowchart.
22. Use scratch to create a picture story between two characters. The story should start on
a first backdrop and then the other character moves to a second backdrop. Save your
project.
23. Draw a square using a loop in any Turtle System language.
24. Explain how e-registration works.

106

You might also like