Professional Documents
Culture Documents
COMPUTER HARDWARE
- Definition of computer hardware
- Types of input devices
- Types of output devices
- Types of storage devices
- Computer ports
- Computer memory
COMPUTER SOFTWARE
- Definition of computer software
- Types of computer software
- Factors to consider before buying computer software
COMPUTER NETWORKS
- Reasons for networking
- Types of networks
- Hardware requirements for networking
- Network topologies
- Factors t consider when selecting a network topology
INTERNET
- Internet terminology
- Uses of the internet
- Limitations of the internet
- Information browsing
- Services of the internet
- Types of internet connection
- Requirements for connecting to the internet
MS-Word
MS-Excel
MS- Powerpoint
GOOGLE CLASS
- First Login
- Join a Class with a Class Code
- Student’s View: The Stream
- Student’s View: Announcements & Questions
- Student’s View: Assignments
- Student’s View: Turn In Assignments
- Student’s View: Assignment Details
- Student’s View: Unsubmit Assignments
- Student’s View: All Assignments
- Google Calendar Integration
- Google Drive Folders
- Google Classroom Navigation:
- Google Classroom Homepage:
SECTION B- INFORMATION LITERACY
ORGANISATION OF INFORMATION
The topic covers the definitions of the terms and why information organise. It also discusses
how information resources are organised in the library.
- What is organisation?
-What is information organisation?
-Why organise information
REFERENCE SOURCES
The topic will define reference sources and give the categories and types of reference sources
- Reference sources defined
- General and subject specific reference sources and
- Categories and types of reference sources
PERIODICALS
Definition of periodicals, it will also give the various types of periodicals, the role of
periodical literature in research and finding journals, newspapers and research papers in the
M.S.U library.
- Define periodical literature
-Types and uses of periodical literature
-Role of periodical literature
-Finding journals, newspapers and research articles in the M.S.U libraries
- Evaluating articles in periodicals.
Module Assessment
This module is divided into 2 sections that is IT Section and Information Literacy Section.
For each section the continuous assessment constitutes 15% of the final mark giving a total
30%. The continuous assessment will include at least 2 tests and at least 2 assignments in
each section. The final examination will cover both sections and will constitute 70% of the
final mark. To pass a student must obtain at least 50% (both sections combined)
SECTION A: INTRODUCTION TO INFORMATION TECHNOLOGY
1.1 INTRODUCTION
Today’s world is an information-rich world and it has become a necessity for everyone to
know about computers. Information technology- refers to hardware, software, databases,
telecommunication technologies and other information processing technologies that
manipulate data resources into useful information products like reports, financial statements.
Consider the example of a person who goes into a banking hall to inquire his balance. That
technology they would use to create, store, manipulate and communicate information is what
is referred to as INFORMATION TECHNOLOGY. Closely related to information technology
is an Information system, which refers to the set totality of requirements for handling
information within an organization. It can also be considered as an organized combination of
people, hardware, software, communication networks and data resource that collects,
transforms and disseminates information in an organization. An information system can be
manual (i.e. paper work) or informal (word of mouth); however, the aspect of the module is
specifically computer-based information systems that use information technology.
1.2 OBJECTIVES
After going through this unit, you would be able to:
a) Define a computer
b) State the three operations of a computer in their sequence
c) familiarise yourself with advantages and disadvantages of computers
d) identify the uses of computers in your field of study
e) identify different types of computers
f) recognise the four types of microcomputers
g) state the five generations of computers
b) Information is organized or classified data, which has some meaningful values for the
receiver. Information is the processed data on which decisions and actions are based.
c) Storage Capability
Memory is a very important characteristic of computers.
A computer has much more storage capacity than human beings.
It can store large amount of data.
It can store any type of data such as images, videos, text, audio, etc.
d) Diligence
Unlike human beings, a computer is free from monotony, tiredness, and lack of
concentration.
It can work continuously without any error and boredom.
It can perform repeated tasks with the same speed and accuracy.
e) Versatility
A computer is a very versatile machine.
A computer is very flexible in performing the jobs to be done.
This machine can be used to solve the problems related to various fields.
At one instance, it may be solving a complex scientific problem and the very next
moment it may be playing a card game.
f) Reliability
A computer is a reliable machine.
Modern electronic components have long lives.
Computers are designed to make maintenance easy.
g) Automation
Computer is an automatic machine.
Automation is the ability to perform a given task automatically.
Once the computer receives a program i.e., the program is stored in the computer
memory, then the program and instruction can control the program execution without
human interaction.
h) Reduction in Paper Work and Cost
The use of computers for data processing in an organization leads to reduction in
paper work and results in speeding up the process.
As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of paper files gets reduced.
Though the initial investment for installing a computer is high, it substantially reduces
the cost of each of its transaction.
c) Environment
The operating environment of the computer should be dust free and suitable.
d) No Feeling
Computers have no feelings or emotions.
It cannot make judgment based on feeling, taste, experience, and knowledge unlike
humans.
1.6. COMPUTER USES
The section presents the application of computers in various fields.
a) Business
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility
which has made it an integrated part in all business organizations. Computer is used in
business organizations for:
Payroll calculations
Budgeting
Sales analysis
Financial forecasting
b) Banking
Today, banking is almost totally dependent on computers. Using computers, Banks can
provide the following facilities:
Online accounting facility, which includes checking current balance, making deposits
and overdrafts, checking interest charges, shares, and trustee records.
ATM machines which are completely automated are making it even easier for
customers to deal with banks.
c) Insurance
Insurance companies are keeping all records up-to-date with the help of computers. Insurance
companies, finance houses, and stock broking firms are widely using computers for their
concerns. Insurance companies are maintaining a database of all clients with information
showing:
Procedure to continue with policies
Starting date of the policies
Next due installment of a policy
Maturity date
Interests due
Survival benefits
Bonus
d) Education
The computer helps in providing a lot of facilities in the education system. These include,
but not limited to the following:
The computer provides a tool in the education system known as CBE (Computer
Based Education).
CBE involves control, delivery, and evaluation of learning.
Computer education is rapidly increasing the graph of number of computer students.
There are a number of methods in which educational institutions can use a computer
to educate the students.
It is used to prepare a database about performance of a student and analysis is carried
out on this basis.
e) Marketing
In marketing, some of the uses of the computer are as follows:
Advertising − With computers, advertising professionals create art and graphics,
write and revise copy, and print and disseminate ads with the goal of selling more
products.
Home Shopping − Home shopping has been made possible through the use of
computerized catalogues that provide access to product information and permit direct
entry of orders to be filled by the customers.
f) Healthcare
Computers have become an important part in hospitals, labs, and dispensaries. They are
being used in hospitals to keep the record of patients and medicines. It is also used in
scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT scans, etc. are
also done by computerized machines. The following are some major fields of health care in
which computers are used.
Diagnostic System − Computers are used to collect data and identify the cause of
illness.
Lab-diagnostic System − All tests can be done and the reports are prepared by
computer.
Patient Monitoring System − these are used to check the patient's signs for
abnormality such as in Cardiac Arrest, ECG, etc.
Pharma Information System − Computer is used to check drug labels, expiry dates,
harmful side effects, etc.
Surgery − Nowadays, computers are also used in performing surgery.
g) Engineering Design
Computers are widely used for engineering purpose. One of the major areas is CAD
(Computer Aided Design) that provides creation and modification of images. Some of the
fields are:
Structural Engineering − requires stress and strain analysis for design of ships,
buildings, budgets, airplanes, etc.
Industrial Engineering − Computers deal with design, implementation, and
improvement of integrated systems of people, materials, and equipment.
Architectural Engineering − Computers help in planning towns, designing
buildings, determining a range of buildings on a site using both 2D and 3D drawings.
h) Military
Some military areas where a computer has been used are −
Missile Control
Military Communication
Military Operation and Planning
Smart Weapons
i) Communication
Communication is a way to convey a message, an idea, a picture, or speech that is received
and understood clearly and correctly by the person for whom it is meant. Some main areas in
this category are:
E-mail
Chatting
Usenet
FTP
Telnet
Video-conferencing
j) Government
Computers play an important role in government services. Some major fields in this category
are:
Budgets
Sales tax department
Income tax department
Computation of male/female ratio
Computerization of voters lists
Computerization of PAN card
Weather forecasting
b) Mainframe computers
These are large computers often found in businesses and colleges, where thousands of
people use the computer to process data. Mainframe computers multitask; that is, they can
perform more than one task at the same time. This capability is one of the primary ways
mainframes differ from supercomputers. Mainframes can store vast amounts of data using
a variety of storage devices. Early mainframe computers were very large and required
separate rooms to house them. Today's mainframe computers are significantly smaller.
c) Minicomputers
These may be used in medium-sized businesses that have smaller data storage
requirements than businesses using mainframe computers. Because of the increased
capabilities of microcomputers, minicomputers are less common now.
d) Microcomputers
These are the smallest of the four categories of computers and the one that most people
typically use. Within the microcomputer category, computers range in size from servers
that have the storage capability of minicomputers (and small mainframes) to handheld
devices that fit in your pocket. Some of the most common types of microcomputers
include the following:
i) Desktop computers sit on your desktop, floor, table, or other flat surface and have a
detachable keyboard, mouse, monitor, and other pieces of equipment. Desktop
computers generally fall into two main categories: PCs or Macs. The PC, or personal
computer, originally referred to the IBM personal computer, but is now manufactured
by a variety of companies including Hewlett-Packard, Dell, Samsung and Gateway,
just to name a few. The Apple Macintosh computer, or Mac, can perform the same
functions as the PC. There has been a long-running argument among computer users
about which is better PC or Mac? In reality, there are pros and cons to both types of
computers, although both are good systems and the choice usually comes down to
personal preference. The primary differences between the PC and the Mac relate to the
different microprocessors and operating systems each one uses. The PC is typically
used in a Microsoft Windows operating environment, and the Macintosh uses the Mac
operating system. Although the PC and the Mac each process information differently,
both can perform the same types of tasks. The PC has a larger market share among
general computer users and in business settings, while the Mac is extremely popular
with graphic design professionals.
ii) Notebook computers give users the ability to take their computers with them, making
their information portable or mobile. Originally referred to as laptops, this term is
slowly being phased-out in favor of the more appropriate notebook designation.
Although smaller than a desktop, notebook computers are not meant to be used on
your lap. If you hold one on your lap for a few minutes, you can feel the heat they
generate. Notebooks are designed to be portable and can be used in a variety of places.
Notebooks typically have a built-in monitor screen, a keyboard, and a pointing device,
although it is possible to connect them to detachable devices for more comfortable
desktop use.
iii) Tablet computers might seem similar to notebooks at first glance; however, they
have some special features that set them apart. Tablet computers weigh less than
notebooks. They also have a convertible screen that swivels, allowing the tablet to be
used like a standard notebook computer in one position or like a clipboard in the
second position. In fact, this "clipboard" aspect is where the tablet got its name. When
used in the tablet configuration, the user can actually write directly on the screen using
a special pen known as a stylus. Tablets use a special technology known as advanced
handwriting recognition. Many also use speech recognition technology as well, which
allows the user to record discussions, lectures, and so on, or to control the computer
using voice commands.
iv) Personal digital assistants (PDAs) or handheld computers vary in size and purpose.
Originally designed to provide a convenient resource for maintaining an organized
calendar and list of business and personal associates, today's PDAs are capable of
much more. Many PDAs now include personal productivity software and allow the
user to play music, take photos, make phone calls, and access the Internet. Most PDAs
use a stylus, a small sticklike device, to input information and access various features.
However, it is not uncommon to find PDAs with small detachable keyboards for text
and data entry. The line between PDAs and other mobile devices such as cell phones
is becoming blurred, as each becomes more capable of doing the same types of tasks.
Figure 1.1 identifies four different types of microcomputers.
Fifth Generation (1980 – till today ) Ultra Scale Integrated Circuits (ULSI)
Micro Processor (SILICON CHIP)
2.1 INTRODUCTION
Computer components are divided into two major categories namely hardware and software.
Hardware is the machine itself and its connected devices such as monitor, keyboard, mouse
etc. Software is the set of programs that make use of hardware for performing various
functions.
2.2 OBJECTIVES
a) identify the four basic units of a computer system and explain the functions of each
unit
b) identify the three main types of computer memory and their characteristics
c) list the five units of computer memory
d) identify different types of ports and their uses
e) differentiate between system software and application software
f) explain the importance of operating system
g) identify different application software and their uses
h) determine the factors to consider when buying computer software
i) state the advantages of a database management system
a) Keyboard
The Key board is used for typing text into the computer. It is also known as standard
Input device. A computer keyboard is similar to that of a type writer with additional
keys. The most commonly available computer keyboard has 104 keys. There are different
types of keys on the keyboard. The keys are categorized as:
Alphanumeric keys , including letters & numbers
Punctuation keys, such as colon (:), semicolon (;) Question mark (?), Single & double
quotes (‗,‖)
Special keys such as arrow keys, control keys, function keys (F1 to F12), HOME,
END etc.
b) Mouse
It is a device that controls the movement of the cursor on a monitor. A mouse will have
2 buttons on its top. The left button is the most frequently used button. There will be a
wheel between the left and right buttons. This wheel enables us to smoothly scroll
through screens of information. As we move the mouse, the pointer on the monitor
moves in the same direction. Optical mouse is another advanced pointing device that uses
a light emitting component instead of the mouse ball. Mouse cannot be used for entering
the data. It is only useful to select the options on the screen.
c) Scanner
It is an input device that can read text or illustrations printed on paper and translate into
digital form. The main advantage of these scanners is that the data need not be entered
separately resulting in saving lot of time.
a) Memory Unit
It is also known as the primary storage or main memory. It stores data, program
instructions, internal results and final output temporarily before it is sent to an
appropriate output device. It c o n s i s t s of t h o u s a n d s of cells called ―storage
locations. These cells activate with ―off-on or binary digits (0,1) mechanism. Thus a
character either a letter or numerical digit is stored as a string of (0, 1) Binary digits
(BITS). These bits are used to store instructions and data by their combinations.
b) Control Unit
It acts as a central nervous system and ensures that the information is stored
correctly and the program instructions are followed in proper sequence as well as the
data are selected from the memory as necessary. It also coordinates all the input and
output devices of a system.
a) Terminal/Monitor
It is similar to TV screen- either a monochrome (black & white) or colour – and it
displays the output. It is also referred as Visual Display Unit (VDU). Several types of
monitors are in use. Some of them are Colour Graphic A d a p t e r (CGA), E n h a n c e d
Graphics Adaptor (EGA), Video Graphics Adapter (VGA) and Super Video Graphics
Adapter (SVGA). The screen sizes differ from system to system. The standard size is
24 lines by 80 characters. Most systems have provision for scrolling which helps in
moving the text vertically or horizontally on the screen.
b) Printer
A printer is used to transfer data from a computer onto paper. The paper copy
obtained from a printer is often referred as printout. The different printers and their
speeds are as follows:
1 Dot – Matrix printer Prints the character in dotted pattern through200/300 to 700 CPS
printer ribbon using either 24 pin or 9 pin
2 Ink Jet printer Work by spraying ionized ink Slow, 90 CPS
3 Laser printer Also called page printer. Uses laser beam to6 to 12 PPM
produce an image.
4 Line printer Prints lines at a time instead of single characters. 300 to 600 LPM
Laser printer
******
a) Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the CPU. It
acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
and program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can
access them.
Figure 2.1: Showing cache memory
b) Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than the
main memory. These are used for storing data/information permanently. CPU directly does
not access these memories; instead they are accessed via input-output routines. The contents
of secondary memories are first transferred to the main memory, and then the CPU can access
it. For example, Compact disk, CD-ROM, Digital Video Disk (DVD), Hard Drive Disk
(HDD) etc.
b) Parallel Port
Used for scanners and printers
Also called printer port
25 pin model
IEEE 1284-compliant Centronics port
c) PS/2 Port
Used for old computer keyboard and mouse
Also called mouse port
Most of the old computers provide two PS/2 port, each for the mouse and keyboard
IEEE 1284-compliant Centronics port
f) Power Connector
Three-pronged plug.
Connects to the computer's power cable that plugs into a power bar or wall socket.
g) Firewire Port
Transfers large amount of data at very fast speed.
Connects camcorders and video equipment to the computer.
Data travels at 400 to 800 megabits per seconds.
Invented by Apple.
It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector,
and 9-Pin FireWire 800 connector.
h) Modem Port
Connects a PC's modem to the telephone network.
i) Ethernet Port
Connects to a network and high speed Internet.
Connects the network cable to a computer.
This port resides on an Ethernet Card.
Data travels at 10 megabits to 1000 megabits per seconds depending upon the
network bandwidth
j) Game Port
Connect a joystick to a PC
Now replaced by USB
k) Digital Video Interface, DVI port
Connects Flat panel LCD monitor to the computer's high-end video graphic cards.
Very popular among video card manufacturers.
l) Sockets
Sockets connect the microphone and speakers to the sound card of the computer.
GUI: The system can be operated with mouse and keyboard. Ex: Windows 95, Windows
XP etc
Disk Operating System (DOS): It was developed as early as 1980 by Bill Gates at
the age of 19. It is suited for personal computers. Dos is a single user and single task
operating system
WINDOWS: It works with DOS and it supports single user and multitask
system. It requires a powerful PC with a minimum RAM of 8 MB.
UNIX AND XENIX: It is suited for multi-user and multi-task system
2.8 DATABASES
What is a Database?
It is an organised collection of data with minimum duplication to service many applications at
the same time by storing and managing data so that they appear to be in one location. When a
transaction occurs, e.g. a withdrawal in a bank, some data would be stored. All the data that
completely describe a transaction is called a record. E.g.
Withdrawal record
The database management system acts as the interface between the application programmes
and the data. Database management system is special software used to create and maintain a
database and enable individual business applications to extract the data they need without
having to create separate files or data definitions in their computer programmes.
3.1 INTRODUCTION
The computer network is a set of computers connected to share resources. In computer
networks, the computing devices exchange the data with each other by using the connections
between nodes. The data links are established over cable media such as wires or optic cables
or wireless media such as Wi-Fi. Thus, a computer network is a digital telecommunication
network which allows nodes to share the resources. It is the group of computer systems and
other computing hardware devices. Those devices are linked together through communication
channels to facilitate communication and resource sharing among a wide range of users.
a) Network Cables
Network cables are used to connect computers. The most commonly used cable is
Category 5 cable RJ-45.
b) Distributors
A computer can be connected to another one via a serial port but if we need to connect many
computers to produce a network, this serial connection will not work. The solution is to use a
central body to which other computers, printers, scanners, etc. can be connected and then this
body will manage or distribute network traffic.
c) Router
A router is a type of device which acts as the central point among computers and other
devices that are a part of the network. It is equipped with holes called ports. Computers and
other devices are connected to a router using network cables. Now-a-days router comes in
wireless modes using which computers can be connected without any physical cable.
d) Network Card
Network card is a necessary component of a computer without which a computer cannot be
connected over a network. It is also known as the network adapter or Network Interface Card
(NIC). Most branded computers have network card pre-installed. Network cards are of two
types: Internal and External Network Cards.
b) RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first.
Features of a ring topology
Exactly two neighbours for each device.
Ring, a ring topology features a logically closed loop.
Data packets travel in a single direction around the ring from one network device to
the next. Each network device acts as a repeater, meaning it regenerates the signal.
In Ring topology each node is connected to form a single, closed data path.
Data from one node is passed along to the next node from which it will be examined,
and if that node is not the intended destination, then it is transmitted to the next node
until the destination is reached.
Token (a special bit pattern) is circulated in the network to enable a node to capture
the data. Ring topology might be structured so that there are a number of information
frames or slot in construct circulation.
Node wishing to transmit first detects the arrival of an empty slot then inserts the data
it wishes to send, and mark the frame as full.
The receiving node takes the data and then marks the frame as empty.
In implementation one particular node has the responsibility for generating the token
or slot when the network is first constituted
i) Advantages of ring Topology
The ability to achieve transmission rates of the order of 10 million bits per second
Provision of local communication via a single channel
No central server which reduces the cost of establishing the ring topology
ii) Disadvantages
Failure of one node result into entire network failure
Detection of fault is very difficult in ring topology
Isolation of fault is not easy in this topology
c) STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
d) MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices. There are two
techniques to transmit data over the Mesh topology, they are:
Routing
Flooding
e) TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
Ideal if workstations are located in groups.
Used in Wide Area Network.
Advantages of Tree Topology
Extension of bus and star topologies.
Expansion of nodes is possible and easy.
Easily managed and maintained.
Error detection is easily done.
Disadvantages of Tree Topology
Heavily cabled.
Costly.
If more nodes are added maintenance is difficult.
Central hub fails, network fails.
4.1 INTRODUCTION
In the present age of information Technology, use of Internet is becoming quite popular for
accessing information on any topic of your interest. It also provides tremendous opportunities
to students, researchers and professionals for getting information on matters related to
academic and professional topics and lot more. In the present world, most of the people who
have computers around themselves use Internet to access information from the World Wide
Web, exchange messages & documents and e-services.
4.2 OBJECTIVES
After going through this unit, you would be able to:
a) explain various terminology used in internet
b) identify the uses of the internet
c) use various services provided by internet
d) search the desired information over internet
e) define e-mail and its various features
f) send email
4.3 INTERNET
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite (TCP/ IP) to serve billions of users worldwide. It is a network of
networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless and
optical networking technologies. The Internet carries a vast range of information resources
and services, such as the interlinked hypertext documents of the World Wide Web (WWW)
and the infrastructure to support electronic mail. To access the Internet, an existing network
need to pay a small registration fee and agree to certain standards based on the TCP/IP
(Transmission Control Protocol/Internet Protocol). TCP "converts messages into streams of
packets at the source, and they are reassembled back into messages at the destination. IP
handles the addressing, and makes sure that a packet reaches its destination through multiple
nodes and even across multiple networks with multiple standards.
d) Homepage
This is the first page that is viewed when the browser starts. It is also the page of a Web
site that provides the introduction or content with links.
i) Web Page
This is a single hypertext file or a page that is part of a Web site.
j) Website
This is a collection of World Wide Web pages or files.
Top of Form
What are you looking for?
Account holder
This means that Susan has an e-mail account with a company called Yahoo.
b) FTP (File Transfer Protocol) File Transfer Protocol, is an Internet utility software used
to uploaded and download files. It gives access to directories or folders on remote
computers and allows software, data and text files to be transferred between different
kinds of computers. FTP works on the basis of same principle as that of Client/ Server.
FTP “Client” is a program running on your computer that enables you to communicate
with remote computers. The FTP client takes FTP command and sends these as
requests for information from the remote computer known as FTP servers. To access
remote FTP server it is required, but not necessary to have an account in the FTP
server. When the FTP client gets connected, FTP server asks for the identification in
terms of User Login name and password of the FTP client. If one does not have an
account in the remote FTP server, still he can connect to the server using anonymous
login.
c) Telnet (Remote Computing) Telnet or remote computing is telecommunication utility
software, which uses available telecommunication facility and allows you to become a
user on a remote computer.
d) Newsgroups; When one has one an e-mail, he may specify his areas of interest e.g.
recreational, sport, food, science and technology such that should anyone have any
news he will convey it to the news group.
Task
1. Explain the five types of internet connections listed above
2. State the advantages and disadvantages of each type of internet connection.
One also needs to have a modern Internet browser like Opera, Microsoft Internet Explorer or
Netscape loaded on the computer. Above all, the computer must be at least a Pentium I
machine with a speed from 166MHz. The telephone line and a modem are other requirements.
The modem converts a computer’s electronic digital data into analog signals that can be
transported through a telephone line when information is being sent into the Internet and vice
versa when receiving. The telephone line is the transmission media, which links the computer
to the Internet service provider. Your operating system should compatible with the Internet
browser and modern GUI operating systems support Internet
For large organizations, it’s ideal that they network their computers, hence more
requirements. One would need a server-based network to effect networks security and to use
one connection as a gateway to the Internet.
5.1 INTRODUCTION
Information Technology resources (hardware, software, and data) form a vital strategic
resource of any establishment which must be jealously guarded to ensure its safety, reliability,
accuracy and integrity. Ethics refer to the expected code of conduct within an organization
both on the use of computer resources and human resources. Hence, ethics direct an
employee‘s mind towards profit through sanctioned means, ensure that managers do not
engage in fraud and abuse of funds nor convert the company’s clients for personal motive. At
the same time, data in the organization must be used for its intended purpose which itself
should be legitimate.
5.2 OBJECTIVES
After going through this unit, you would be able to:
a) Identify security issues associated with information technology
b) Identify ethical issues associated with information technology
c) Take preventive measures against security threat to IT
d) Appreciate the need for computer security
Hacking Hacking is when an illegal user tries to access private On such preventative measure, is the use of a Firewall which is a program used
information that they are not entitled to access. to closely monitor precisely what information passes in and out of a computer or
information system. These programs can be set to keep other users out of to
prevent information from leaving the computer or information system.
Identify theft Identity theft occurs, when someone possesses or uses a Detecting identity theft is very difficult and prosecuting it can often be even
person’s name, address, Social Security number, bank or more difficult. The best solution to identity theft is prevention. Keeping ones
credit card account number, or other identifying information personal information close and guarding it well is the best solution to this
without a person’s knowledge with the intent to commit fraud problem.
or other crimes.
Administrative controls
They cover company code of practice/conduct and can be implemented through written policies and
procedures; division of functions and supervision
A Code of Practice is a set of standards that a business would expect its employees to conform to.
It is not legally binding but the business would ask an employee to agree to it before being
employed and would be grounds for dismissal if they were not obeyed.
It is always in the best interest of a business to treat its customers fairly and with due consideration
- or they will go elsewhere.
It ensures consistency of practice. All employees would conduct their business in a similar way.
Through division of functions can be whereby where the Information system designers are not part of the
end-users that operate a computer system.
Input Controls
They aim to ensure proper data entry by the intended personnel, through the use of passwords so that only
the holder can benefit from the computer resources, formatted input screens and audible error signals so
that data is entered correctly. Computers should have software that verifies correctness of the data typed
(validation).
Storage controls
There should be a control mechanism so that no everyone can access stored data. Thus documents can be
access through passwords.
Stored data may need to be stored in a separate backup copy so that, in case of that storage device failing
data can be recovered from the backup copy. Stored data can also be encrypted so that, should the wrong
person accesses it, he won’t make sense out of it. Firewall are computers that protect networked computers
from intrusion, hence they also ensure safe storage of data.
Physical protection
Security guards, buglar bars on windows video surveillance cameras, alarms, and building computer
centers above flood levels are some of the many moves to ensure physical safety of computers.
Disaster recovery plans
Companies should have in place a responsibility roster that explain each and every individual’s duty in
case of a disaster e.g. fire outbreak, so as to minimize the effects of the disaster. They should also have a
tentative document that explain how customers would be served and who should disseminate the
information.
b) Access Right
The second aspect of ethical issues in information technology is access right. Access right becomes a
high priority issue for the IT and cyberspace with the great advancement in technology. E-commerce
and Electronic payment systems evolution on the internet heightened this issue for various corporate
organizations and government agencies. Network on the internet cannot be made secure from
unauthorized access. Generally, the intrusion detection system is used to determine whether the user is
an intruder or an appropriate user.
c) Harmful Actions
Harmful actions in the computer ethics refers to the damage or negative consequences to the IT such as
loss of important information, loss of property, loss of ownership, destruction of property and
undesirable substantial impacts. This principle of ethical conduct restricts any outsiders from the use of
information technology in manner which leads to any loss to any of the users, employees, employers
and the general public. Typically, these actions comprise of the intentional destruction or alteration of
files and program which drives a serious loss of resources. To recover from the harmful actions extra
time and efforts are required to remove the viruses from the computer systems.
d) Patents
It is more difficult to deal with these types of ethical issues. A patent can preserve the unique and
secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright. A
thorough disclosure is required with the software. The patent holder has to reveal the full details of a
program to a proficient programmer for building a program.
e) Copyright
The information security specialists are to be familiar with necessary concept of the copyright law.
Copyright law works as a very powerful legal tool in protecting computer software, both before a
security breach and surely after a security breach. This type of breach could be the mishandling and
misuse of data, computer programs, documentation and similar material. In many countries, copyright
legislation is amended or revised to provide explicit laws to protect computer programs.
f) Trade Secrets
Trade secrets are also a significant ethical issue in information technology. A trade secret secures
something of value and usefulness. This law protects the private aspects of ideas which are known
only to the discovery or his confidants. Once disclosed, trade secret is lost as such and is only
protected by the law for trade secrets. The application of trade secret law is very broad in the computer
range, where even a slight head start in the advancement of software or hardware can provide a
significant competitive influence.
g) Liability
One should be aware of the liability issue in making ethical decisions. Software developer makes
promises and assertions to the user about the nature and quality of the product that can be restricted as
an express warranty. Programmers or retailers possess the legitimate to determine the express
warranties. Thus they have to be practical when they define any claims and predictions about the
capacities, quality and nature of their software or hardware. Every word they say about their product
may be as legally valid as stated in written. All agreements should be in writing to protect against
liability. A disclaimer of express warranties can free a supplier from being held responsible of
informal, speculative statements or forecasting made during the agreement stages.
h) Piracy
Piracy is an activity in which the creation of illegal copy of the software is made. It is entirely up to
the owner of the software as to whether or not users can make backup copies of their software. As
laws made for copyright protection are evolving, also legislation that would stop unauthorized
duplication of software is in consideration.
5.5 SOCIETAL IMPLICATIONS OF INFORMATION TECHNOLOGY
The rise of Information technology puts pressure on society members to learn and cope with the
complexity of information-based employment. At the onset Information Technology many problems as it
takes considerable effort to be comfortable with the software, network and diagnosing related problems.
The managers are very much concerned with the reliability of the computers as the software may be of
international standard but failing to address the nitty-gritties of one’s business. Managers need more
information on Information Technology use for them to confidently conduct cost-benefit analysis for the
appropriate hardware, software and network technology. If Information technology is used to monitor
employees, that must be done with their concert so that they do not feel harassed and insecure at the
workplace. This may tend to distort any motivation that a manager would offer to the employees. Other
implications of computers are many employees tend to lose their jobs due to the insurgence of information
technology based production. Other implications are positive in that, Information technology increases
customer satisfaction through a customer having confidence in the system and being served faster.
6.1 INTRODUCTION
Practical work to refer to any teaching and learning activity which at some point involves the students in
observing or manipulating the objects and materials they are studying. Given that the subject matter of
Information technology is the material world, it seems natural, and rather obvious, that learning IT should
involve practical exercise to make the use of computers concretise in their minds.
6.2 OBJECTIVES
After going through this unit, you would be able to:
Boot and shut down the computer
Create folders, copy and paste functions
Creating a Document, Editing and Saving using MS WORD
Use of options from the Tool Bars – Format, Insert and Tools, Alignment of paragraphs and Text
in MS WORD
Creating a Table, Merging of Cells, Columns and Row Width in MS WORD
Creating a Spreadsheet, Alignment of Rows, Columns and Cells using Format Tool Bar in MS
EXCEL
Entering formula expression through the formula tool bar and use of inbuilt functions MS
EXCEL
Data Analysis using inbuilt Tool Packs – Correlation and Regression in MS EXCEL
Data Analysis using inbuilt Tool Packs – tests of significance in MS EXCEL
Creating and Saving Graphs
Create a PowerPoint presentation
i) My Computer: This is the icon which represents all the files & folders which can be used in the
system. It is used to access the drives, folders & files on the computer. i.e. Floppy drive(A), Local
C, D, E, Printer, Control panel etc.
ii) My Documents: This is the default storage location for the files created in the windows.
iv) Recycle bin: This is a folder that stores all the files & folders deleted from windows temporarily,
which can be restored again if needed.
v) Network Neighbourhood: This is an application which display all the computers connected in
network with our computer.
b) Taskbar: The rectangular bar that runs horizontally across the bottom of the screen is called
Taskbar. The Taskbar has the START menu on the left & the Notification area on the right. We
can start an application using the start menu. Notification area holds system icons that allow for
functions such as changing the time & Volume of the Computer. All the open applications are
available on the Taskbar.
a) Title bar
This is the title of the window, like your name at the top of a piece of paper. The Title bar is also
the handle for the window. If you click and hold the mouse button down on the title bar, you can
move it around the screen.
i) Minimize – To have a window take the minimum amount of desktop space possible, click
the minimize button. This drops the window into the Task bar like a piece of paper going
into a drawer. The Task bar will show the task whether or not the window is minimized.
ii) Maximize – To have a window take the maximum desktop space, click the maximize
button. This stretches the window out like an architect‘s floor plan being rolled out over the
desk.
iii) Restore – A maximized window will cover over all the other windows and icons on the
desktop. The Restore button places the window back so that more than one window can
display at a time.
iv) Close (X) – When done with a window, you can have it taken completely off the desktop by
closing it. Use the X button to do this.
b) Menu bar
The Menu bar displays a list of commands that can be used to perform various tasks (this will be
below the Title bar). Menu items are commands within the menu bar that allow choosing of
functions & tasks.
c) Tool bar
Contains a set of buttons for frequently used commands
d) Scroll Bars
On the bottom and right edges of a window we find scroll bars. They are used to pan across the
information in the window, when we have information which won‘t fit into the window.
Windows Explorer is divided into 2 panes. The left pane displays the list of drives & folders on the
computer. The right pane displays the contents of the selected drive or folder. By using these two panes,
you can browse through the contents of your computer in a single window. Folder is a list of files
(Similar to Directory in MS-DOS)
6.3.5 Working with Folders
a) Creating a Folder
i) From the tree pane: select the directory under which you want to create a sub directory.
ii) Choose FileNewFolder. On the right pane of the screen, a new folder is created.
iii) Type in the name of the directory and press ENTER. You can notice the change in the tree
structure immediately.
b) Creating files
After creating a folder, we can move files into it or create new files within the folder.
Alternatively, to copy a file or folder, select it and then press ctrl +C. To paste, press ctrl+ V
a) Character: It refers to the alphabets, numerical digits, punctuations and other special symbols
which are commonly used in the text.
b) Word: A word is group of characters that are separated from other group of characters by some
delimiters like, comma, full stop and space.
c) Sentence: A sentence is a group of words preceded and followed by appropriate delimiting
characters.
d) Paragraph: It is a group of one or more sentences, paragraphs are separated by leaving blank
lines between them.
e) Pages: It is the amount of text that can be printed on one page of a paper.
f) Chapters: It is a collection of pages
g) Documents and files: It is a group of chapters. Usually, a complete document may be very short
such as a memo (or letter) or very long such as a book consisting of several chapters. These
documents are referred as ―Files‖.
Word-wrap
cursor control
editing
formatting
spell-check
thesaurus
macros
printing
file management
mail merge printing
a) Word-wrap: In word-processing packages, the text can be continuously typed and the computer
automatically starts a fresh line when a line is filled up. As soon as the length of a sentence
exceeds the right margin, the corresponding word is automatically adjusted in the following line.
This is called ―word-wrap. A paragraph is created only when carriage control is externally
given for a sentence.
b) Cursor Control: The four directional keys of the keyboard ( ) helps in locating the text
for editing in much the similar manner as that of a pointer or pencil.
c) Editing: Words or lines can be entered (inserted) or deleted in any part of the text with proper
alignment. Similarly, there is a facility to recover the text which is deleted by mistake or
accidentally. Another important facility is that any word can be replaced by a new word
throughout the file, wherever the old word appears. In addition to these, a block of text (which is
frequently used) can be prepared and moved or copied wherever desired in the file.
d) Formatting: The text formatting refers to the way the text is desired to appear on a page. This
includes following functions:
i) setting left and right margins
ii) paragraph settings
iii) line spacing
iv) selecting font specifications such as underline, bold, italics, superscripts and subscripts
v) setting foot-notes
vi) number of lines per page
vii) printing page numbers and headings for ‗Header‘ and ‗Footer‘
viii) table of contents
ix) indexing the text
e) Spell-check: Word-processing packages provide checking of spellings facility
f) Thesaurus: It provides synonyms (or words with similar meanings)
g) Macros: A macro is a character or word that represents a series of keystrokes. The ability to
define macros allows us to save a lot of time by replacing common combinations of keystrokes.
h) Printing: It gives a ‗hard‘copy of the text. The printing can be controlled after printing a fixed
number of pages or can be resumed from any specified page number.
i) File management: This facility allows to create, delete, move & search for files.
j) Mail merge printing: This facility helps in printing same ―original‖ letter with different
addresses, so that each letter is ―original‖ and not a carbon copy.
6.5.1 MS-WORD
MS- Word is a word processor. The extension name of MS- word is .doc. It is an application used to
create, edit, print and save a document. It allows the user to insert pictures, tables, charts, drawings &
features that will make the text richer & more interactive. (The term document refers to a file created
using word processor)
a) Starting MS-Word:
Start All Programs MS-office MS-word
MS-word icon is w.
Formatting Toolbar:
The formatting Tool bar is the easiest way to change many attributes of a text.
Style menu: Allows you to make your text Bold, Italic, underlined… depending on the style you
choose.
Font: Allows you to change t h e font by clicking on the drop-down arrow on the right of the
font name box. You can view a list of fonts available, you can scroll down to view more fonts
and select the font name you wish to use by clicking on its name.
Font size: Allows you to change the font size by clicking inside the Font size box and entering a
value or by clicking on the drop-down arrow on the right of the box to view a list of sizes
available. Select then a size by clicking on it.
Replace - Used to replace any part of Text / word / Character with another word/ character. (Ctrl + H)
Paste special – This will paste the copied (or) cut text in a form of an object. It will paste in box which
cannot be altered.
Go To - Curser goes to the specified page, specified line, specified paragraph. (Ctrl + G)
Features of FORMAT MENU ( ALT + O)
b) Saving a document:
Click the Save button on the Tool bar. (or)
From the Menu bar, select File Save (or)
Follow the key sequence Ctrl + S
Save dialog box appears. Type the name and click Save.
c) Printing a document:
Select File Print (or)
Click on the Print button on the Standard Tool bar (or)
Click Ctrl + P
Print dialog box appears. Select All pages (or) Current page (or) t y p e the page numbers and also
select number of copies according to the requirement and click O.K
d) Closing a document:
Select File close
Click on the small X found on the right top next to the Menu bar and the Title bar.
Word offers two modes for adding text to your documents: Insert mode and o v e r w r i t e mode. In Insert
mode, characters typed are inserted into the text to the left of the insertion point, pushing any characters
to the right of the insertion point further to the right. In overtype mode, the text you type will replace the
existing text.
Note: The Insert key is a toggle key. This means that the same key can be used to switch back and forth
between two different modes.
Selecting Text:
In order to change the format of the text you just typed, it must be first highlighted, i.e. selected
with the mouse cursor.
To highlight the whole text o r part of it, locate the mouse at the start of the text you wish to
highlight and click the left button, and then drag the mouse over the desired text while keeping
the left mouse button pressed.
Deleting text:
Use the BACKSPACE or the DELETE key to delete text.
BACKSPACE key will delete text to the left of the cursor and DELETE key will erase text to
the right.
To delete a large section of text, highlight the text using any of the methods outlined above and
press the DELETE key.
Copy text:
From the Menu bar, select Edit copy (or)
From the standard toolbar, click the Copy button (or)
Follow the key sequence Ctrl + C
Paste Text:
To paste previously cut or copied text, move the cursor to the location you want to move the text to and
follow one of the methods listed below:
From the menu bar, select Edit Paste (or)
From the standard Tool bar, click the Paste button (or)
Follow the key sequence Ctrl + V
6.6 MS -EXCEL
a) Spreadsheet is software that helps to substitute the paper worksheets in the offices.
Spreadsheet displays data in the form of rows and columns. An intersection of row and column is
known as a cell
b) MS-Excel is a window based spreadsheet developed by Microsoft Corporation. It includes all
features of a spreadsheet package like recalculation, graphs & functions. It also provides many
Mathematical, Financial & Statistical functions. Thus it is used in many scientific and
engineering environments for analyzing data. Excel can even hold graphic objects like pictures &
images.
1. Window based application: Excel like all other applications has Toolbars, Shortcut Menus,
Auto correct, Online help and Wizards.
2. Workbooks: Workbooks are the files in which worksheets related to a project are held.
3. OLE support: Object linking and Embedding is a feature through which Excel can contain any
object like a document, a picture etc.
4. Maintaining high volume of data: Excel can contain large volume of data. A worksheet can
contain 65536 rows and 256 columns. A single cell can contain a maximum of 255 characters. One
workbook can contain a maximum of 256 worksheets.
5. Availability of functions: Several Mathematical, financial & statistical functions are available in
an Excel package.
6. Availability of Charts & Graphs: MS-Excel allows users to view data entered as tables in a
graphical form as charts, which helps the user to easily understand, analyze data & compare data.
7. Data Analysis Tools: MS-Excel provides a set of data analysis tools called Analysis Tool pack.
8. Sorting capability: Excel has the capability of sorting any data in Ascending or Descending
order.
9. Auto fill feature: Excel has the feature which allows filling cells with repetitive data such as
chronological dates or numbers and repeated text.
An Excel window has several unique elements identified in the figure below:
Rows, columns & cell: In a worksheet rows are numbered from top to bottom. The
columns are labelled with letters from left to right. Rows are numbered from 1 to 65,536
and columns labeled from A to IV (256 columns).
Title bar: The title bar contains the name of the program Microsoft Excel and the default
name of the workbook Book1 that would change as soon as you save your file and give
another name.
Menu bar: The Menu bar contains menus that include all the commands you need to use to
work your way through Excel such as File, Edit, View, Insert, Format, Tools, Data,
Window and Help.
Tool Bar: Tool Bars are usually shortcuts for menu items. Standard and formatting
toolbars are displayed by default.
Active cell: The cell in which you are currently working.
Formula bar: displays the contents of the active cell.
Name box: displays the cell address of the active cell. Column letter followed by the
row number. Ex: B6
Worksheet area: The middle portion of screen which occupies a major area is called
worksheet area. In this area, information or data (i.e.) either textual or numerical can be
entered and the results can be displayed. A worksheet is a large work area of 65,536 rows
and 256 columns.
Status bar: located at the very bottom of the screen displays brief information about
activating features within the worksheet area.
Sheet tabs: appear above the status bar displaying the names of the worksheets.
Standard Toolbar
The Standard toolbar, located beneath the menu bar, has buttons for commonly performed tasks like
adding a column of numbers, printing, sorting, and other operations. Excel let's you customize the
toolbar or even display multiple toolbars at the same time. The Standard Excel XP toolbar appears
in the figure below.
Formatting toolbar
The Formatting toolbar, located beneath the Standard toolbar bar, has buttons for
various formatting operations like changing text size or style, formatting numbers and
placing borders around cells.
Name box
The Name box displays the reference of the selected cells in the form of column label
followed by row number.
Ex: Suppose you find that in the cell A6, you have entered the marks as 78 instead of 87,
then click on A6 and type 87 enter
c) Formatting a worksheet:
Changing the style or appearance of data in a worksheet is called formatting. You can
format the data in a worksheet by:
Changing the position of data in a cell
Changing the font, size, style & colour.
i) Aligning data:
By default, any text you enter in Excel is aligned to the left and any value or number is
aligned to the
Right. To change the default alignment, you can use the alignment buttons on the
formatting tool bar.
iii) Formatting Text: Text can be formatted using the buttons on the formatting
toolbar. Font of a cell, font size can be changed. The font style can also be
changed to bold, Italic etc.
Formulas:
In Excel. One of the powerful features is formulas. A formula is an equation that is used to
perform calculations on data in a worksheet. We can use formula to perform Mathematical,
Statistical & date/time operations on a single value or a set of values by using operators.
The cells in which formulas are stored, display the result of the calculation and not the
formula. In Excel, a formula starts with an equal (=) sign and should be followed by
the operation to be performed. We can use any number of operators in a single formula.
MS- Excel evaluates the formula according to the order of precedence of the operators.
Functio
n
Wizard
:
The Function Wizard is a tool in Excel through which a user can enter formulas in the
correct format without any errors. It contains all the functions according to the type such as
Mathematical, Statistical, Date/time, Financial etc.
Creating a Chart:
Step i) Enter the
data in a table.
ii) Open the Insert Menu and select Chart
iii) In the Chart Wizard – Step 1 of 4, select the type of chart you want to make and
click Next iv) In the step 2 of 4, enter chart source data and click Next
vi) In the step 3 of 4, enter the chart options like label of the chart and click Next
vii) In the step 4 of 4, give the chart location where you want the chart to be located and
press
Finish.
Column Chart: Column charts are one of the most common types of graphs used to
display data.
A column chart represents data in the form of a series of vertical bars. Each bar represents a
value.
For example, to draw a column chart for the production of different crops in a region:
S.No. A B
crop Production(tons)
1 Paddy 53
2 Wheat 24
3 Maize 18
4 Groundnut 82
90
80
70
60
50
40
30
20
10
0
paddy wheat maize groundnut
Type of crop
Pie Chart:
A Pie chart is used to represent the distribution of a categorical data. In this chart, a circle is divided into sectors,
the frequencies or percentages of cases under various categories. Data on each variable is entered in the Excel work
suitable headings. Then we select the data of the first series and choose pie chart and proceed as per the options
separate chart pie chart should be drawn for each data set.
For example, to draw a pie chart for the production of different crops in a region:
S.No. A B
crop Production(tons)
1 Paddy 53
2 Wheat 24
3 Maize 18
4 Groundnut 82
pr oduction of cr ops
heat
6.7 POWERPOINT PRESENTATION NOTES
1. to open Microsoft PowerPoint
click start -> Programs -> Microsoft Office ->
Microsoft PowerPoint application
Getting to a Slide that You Can Edit
When you first start PowerPoint, you'll have four basic choices:
Create a new, blank presentation
Create a new presentation based on a formatted template
Open a recent presentation
Roll the mouse over any of the samples, to get a live preview of the presentation with the
theme applied. As long as you don't click, nothing gets applied. You're just seeing a preview.
To see several rows of templates Down Arrow on the right side of the list, Click the arrow to
see more themes.
To see some alternate formats for the theme you chose, do the same in the Variants section on
the right. Roll the mouse pointer over a few of them, then click one you want.
If you click the Down Arrow of the Variants list, you can choose different colour schemes,
fonts, effects and background styles for the template you just chose.
For example, you can choose Colours, and get previews of different colour sets.
You can also preview and choose font sets from the same menu.
And you can also preview and choose a background style, if you want.
3. Adding Text and Inserting Slides
Go on “Click to add title” and start typing, the text will automatically go into the Title
placeholder.
The list of option will appear, so you chose the type of slide that you want.
For the slide content, you have a choice. You can create a bullet list or you can click one of
the six symbols in the middle to insert a table, image or other type of media.
Add more slides using the same procedure. It is wise that you choose different slides.
After the animations, you click on slide show, then from Beginning, the slide will play
showing what you have designed s you click your mouse.
Task
Learn how to insert table, charts and pictures on the slides.
Research on the best way to prepare the PowerPoint presentation so that it can be seen clearly
by your audience
INTRODUCTION
Google Classroom is a blended learning platform for schools that aims to simplify creating,
distributing and grading assignments in an entirely electronic format. It is a great strategy to
introduce students to methods for accessing information and communicating/collaborating
online with the lecturer and other students. Thus, Google Classroom is designed to help
lecturers and students communicate and collaborate, manage assignments paperless, and stay
organized.
First Login
Go to classroom.google.com.
The first time you arrive at the Google Classroom website you will see a screen like the one
below.
Scroll down and choose student as your role.
Join a Class with a Class Code
1) Go to classroom.google.com. If it is your first login, be sure to select your role as
Student (see previous page).
2) Click the + on the top right of the page to Join Class.
3) Enter the Class Code given to you by your teacher, and click Join
Student’s View: the Stream
Student’s View: Announcements & Questions
Student’s View: Assignments
1.1 INTRODUCTION
The ability to use information technologies effectively to find and manage information, and
the ability to critically evaluate and ethically apply that information to solve a problem are
some of the hallmarks of an information literate individual. Other characteristics of an
information literate individual include the spirit of inquiry and perseverance to find out what
is necessary to get the job done.
Baggage Room
No bags are allowed into the library. Students must leave their bags in the baggage room
where they will be given a tag with a number. The tag should be presented when one is
collecting their bags. A lost tag attracts a fine of the value stipulated in the Library Fine
Policy document. Students are advised not to leave valuable items in the baggage area.
Circulation Desk
At the circulation desk Check-out point, a student needs to scan their IDs so that the
circulation system displays their account on the computer. The circulation librarian then
scans the barcode of each of the materials being borrowed, stamps the due date and de-
sensitises the materials before they are taken out. Books to be returned are submitted to the
Librarian at the circulation desk check-in point. The Librarian scans the book barcode to
check-in an item and cancels the due date.
Open shelf
With regards to the open shelf, there is self-service where clients locate books of their choice
from the shelves and borrow them from the circulation desk in the main reading hall. These
books are borrowed for a maximum period of seven (7) days and are returned to the library
on or before the due date. Failure to bring the book on or before the due date, the client’s
library account accrues a fine of one dollar per day until the book is returned. Clients obtain
the classification numbers that enable them to locate books on the shelves from the Online
Public Access Catalogue (OPAC) or e-catalogue. The OPAC is accessible through computers
in the Library main hall.
Reserve section
The reserve section also houses books which are deemed scarce by the Library personnel to
ensure their fair circulation amongst clients. Due to the nature of the books housed on
reserve, it is a closed access area for students. Books from the reserve are borrowed for a
maximum period of two (2) hours starting from 09:00 until 3:00pm. Clients can only start
borrowing books from the reserve section for overnight use from 3:00pm up to 10:30pm
when the library closes. Books borrowed for the two hour periods are supposed to be returned
on or before the lapse of that loan period and those borrowed for overnight, are supposed to
be brought back on or before 09:00 the following day. Failure to abide with these loan
periods is a penal offense which attracts a fine of one dollar per hour in both cases.
Borrowing Privileges
(A live demonstration on how to search for books on OPAC to be projected in the main
library E-resource centre together with library rules and regulations, opening hours as
well as loan periods)
1.6 LIBRARY ORGANISATION
Books in all the MSU libraries are arranged according to the Library of Congress
Classification Scheme. A classification scheme brings books on the same subject together on
the shelves. It also facilitates easy retrieval of books from the shelves. The LC system
arranges items in alphanumeric order. This means that all the materials are filed
alphabetically and in numeric order, including decimals.
Each book is assigned a classification number (call number) which depicts its subject. This
class number is on the book’s spine and books are shelved sequentially according to that class
number. The main library shelf arrangement starts from the north wing then into the library
main hall and ends in the south wing. There are shelf guides pasted on each shelve to direct
students on the library classification sequence.
E-resource centres
MSU libraries have e-resource centres that provide access to the internet, library catalogue
and electronic books and journals. Students require an e-learning password to access the e-
books and e-journals that the library subscribes to. There are IT technicians and librarians
available to always assist students with their research at every e-resource centre. Computers
in the e-resource centres are strictly for academic searches only. Removal of network cables
or computer mouse from Library computers is strictly prohibited.
The Research Services also utilises the electronic resource centres when conducting training
on the usage of e-resources and Turnitin anti-plagiarism. The e-resource centres are also used
for self-directed learning where students conduct their own research without the instruction of
Librarians or Lecturers.
Reading Area
MSU libraries have Wi-Fi hotspots in all reading halls to facilitate online research as students
read print resources. As per University policy students are encouraged to have laptops to
promote online research. Reading desks in all libraries have power points for students to
connect their laptops and access the internet through Wi-Fi. Laptops brought into the library
must have a power-pack with a plug. Connecting live wires on library sockets is strictly
prohibited as this might start a fire.
1.7 LIBRARY RULES AND REGULATIONS
The main purpose of the rules is to safeguard the common interest of all library users and to
enable the library to function as efficiently as possible. Library rules and regulations are as
follows;
1. Users must present a valid MSU ID card to the security personnel upon entering the
Library.
2. Do not exchange student IDs to gain access into the Library or for borrowing
purposes.
3. Unauthorised borrowing will be treated as theft.
4. For security reasons, bags and cases may not be taken into the library. They should be
left in the baggage room just by the Library entrance.
5. Loss of baggage disks attracts a fine.
6. Smoking, eating and consumption of beverages in the Library is strictly prohibited.
7. Readers are expected to observe silence in the library. A fine will be charged to all
students who answer cellphones in the Library. Cellphones should be put on silent
mode upon entering the library.
8. Mutilation of library materials by marking, underlining, removing pages or portions
of pages is strictly prohibited.
9. The Library does not issue out torn or defaced books; should readers lose, damage or
deface library resources, they will be requested to replace.
10. All items taken in and out of the Library are subject to security check at the Library
exit point.
11. Library clearance will not be done for staff and students with overdue materials and
unpaid fees.
12. The Library will suppress results for all students with outstanding library fines and or
lost books.
13. Loss of Library materials should be reported immediately
14. Library materials are not to be re-shelved by users.
15. Journals, dissertations and past exam papers are reference sources for in house use
only.
16. Settle your overdue fines before you leave for vacation to avoid suppression of
results. All forms of payments are to be done at the cash office (Bursar) or bank;
receipts are to be brought to the library for verification.
1.8 MSU BRANCH LIBRARIES
The emphasis of libraries is to ensure that the information needs of the clients are met
through provision of valid, relevant and user-driven information resources. The Midlands
State University (MSU) Library consists of a network of individual libraries and electronic
resource centres. Through this network, the MSU Library is able to provide resources that
fully support the teaching, learning and research needs of the MSU community taking a
discipline based approach. The MSU Library has various branch libraries which are located
on all MSU campuses. The following are the branch libraries namely;
1. Disability Resource Centre (DRC) Library
The DRC Library offers its services to the disabled students from all the departments of
the Institution. Most of the resources circulated in the DRC Library are in Braille format
to cater for the visually impaired students.
2. Medical School Library
The Medical School Library which is situated on the main campus is a specialised library
which caters for the medical school students. It offers journals, serials and textbooks
which have a strong bias towards the medical fraternity.
3. Batanai Library
Batanai Library is situated at the Batanai campus in Senga Township. The collection of
the library has a strong bias towards the programmes offered at that campus. The
programmes are Tourism and Hospitality Management, Food Science and Banking and
Finance.
4. Graduate School of Business and Leadership Library
The Library offers services to Master of Business and Administration, Executive Master
of Business and Administration and other Master of Commerce students at the Graduate
School of Business and Leadership and Law campus.
5. Law Library
The Law Library is also a specialised library which caters for law students only. The
Library is situated at the Graduate School of Business and Leadership and Law campus.
6. Zvishavane Campus Library
The Library is situated in Zvishavane and it caters for students in the mining
programmes, Politics and Public Management and Peace studies.
7. Harare Campus Library
8. School of Social Work Library
1.9 MSU LIBRARY DEPARTMENTS
The MSU Library has departments that offer a variety of services to its clients. The various
departments are as follows;
Marketing Section
The emphasis of the Marketing Services Department is on total quality management in every
facet of the library. This section is juxtaposed with all sections in the library paying particular
attention to all front office services to ensure a good image of the library and corporate image
of the institution as a whole. The section also pays particular attention to the Library systems
to ensure quality in library service provision. The Department embarked on a variety of
marketing strategies to market the Library services and resources. The WhatsApp platform is
used to market Library services directly to individual students. The Department also uses
notices (physical, staff portal and e-learning), brochures, e-resources user guides, flyers,
newsletters to reach the MSU community. Social networking sites such as Facebook,
YouTube and Twitter are also used to market the Library services. There is the information or
help desk in the main library which is used to help clients be aware of the various resources
that are offered in the library.
Exhibitions such as the MSU Open day, Research and Intellectual Expo and Agricultural
shows are useful in marketing the MSU Library to both its internal and external customers.
The Department identifies charismatic students whom it engages as Library Ambassadors.
The responsibility of these Library Ambassadors is to ensure the quick and easy flow of
communication of information related to library services and activities between the Library
and the students. A user survey available on the MSU website is meant to get feedback from
the users on Library services in order for the Library to constantly review policies for the
betterment of service provision. The Marketing Department also makes use of the orientation
and Information Literacy Skills programmes to rigorously market Library services.
ICT Section
The Library WhatsApp line (0786755935) is dedicated for clients’ enquiries related to library
services. The WhatsApp platform is operational during the Library opening hours. The
library also has social networking accounts such as Facebook and Twitter where it
communicates with the clients on issues related to the Library. The Library offers some
photocopying facilities and clients are charged a fee for this service. Currently the fee
charged for the photocopying facility is not regulated by the MSU Library since the
photocopier is privately owned.
UNIT TWO: INTRODUCTION TO INFORMATION LITERACY AND THE BASIC
LIBRARY RESEARCH PROCESS
“Over the course of your lifetime, the more you learn and thereby come to know, but
especially the sooner you master and adopt proficient learning skills, habits and
attitudes – finding out how, from where, from whom and when to search for and
retrieve the information that you need to know, but have not yet learned – the more
information literate you thereby become. Your competency in applying and utilizing
those skills, habits and attitudes will enable you to make sounder and timelier
decisions to cope with your personal and family health and welfare, educational, job-
related, citizenship and other challenges.” - Forest Woody Horton, Jr
2.1 INTRODUCTION
Several scholars have labelled the 21 st Century as the “knowledge society”; people are
interested in finding out what has been discovered in research and they want to use that same
information to solve our daily problems to develop a better world. Furthermore, people also
want to share or communicate research results for furtherance of knowledge (ACRL, 2010).
The knowledge society is characterised by participatory knowledge acquisition, retention,
sharing and solving real life issues. Central to knowledge acquisition is the ability to
understand the need for new knowledge the nature of knowledge acquired, where to find and
how to retrieve such knowledge and how profit from the knowledge without infringing on the
knowledge creator’s rights. This ability is what is embodied in INFORMATION
LITERACY.
Information
Alexander (2003) says “information has a meaning ... (it) comes from selecting data,
summarizing it and presenting it in such a way that it is useful to the recipient.”
INTRONA (1992) defines information as “data that is organized and meaningful to
the person receiving it. Data is therefore raw material that is transformed into
information by data processing. Information can be defined in terms of its surprise
value. It tells the recipient something he did not know.”
Introna (1992) also says “... information comes into being as the receiver
appropriates the data and gives it meaning”
Checkland and Howell (1998) state that “Information is that which results when some
human mental activity (observation, analysis) is successfully applied to data to reveal its
meaning or significance.” The term ‘information’ has also been described as the structured,
organised and processed data, presented within context, which makes it relevant and useful to
the person who wants it.
Information is the data which is transformed and classified into an intelligible form, which
can be used in the process of decision making. In short, when data turn out to be meaningful
after conversion, it is known as information. It is something that informs, in essence, it gives
an answer to a particular question.
The main characteristics of information are accuracy, relevance, completeness and
availability. It can be communicated in the form of content of a message or through
observation and can be obtained from various sources such as newspaper, television, internet,
people, books, and so on.
The basic or Core functional literacy fluencies (competencies) of reading, writing, oralcy and
numeracy.
Computer and technology literacy
Media literacy
Distance Learning and E-Learning
Information Literacy
Cultural Literacy
The boundaries between these categories overlap, but they should be seen as a closely-knit
family. In this view, literacy is comprehensive in the sense that it includes many learnable
skills, and positive attitudes and behaviours that affect every aspect of one’s life.
Standard One – The information literate student determines the nature and extent of
the information needed.
The information literate student defines and articulates the need for information.
The information literate student identifies a variety of types and formats of potential
sources for information.
The information literate student considers the costs and benefits of acquiring the
needed information.
The information literate student re-evaluates the nature and extent of the information
need.
Standard Two – The information literate student accesses needed information
effectively and efficiently.
Performance Indicators:
The information literate student selects the most appropriate investigative methods or
information retrieval systems for accessing the needed information.
The information literate student constructs and implements effectively design search
strategies.
The information literate student retrieves information online or in person using a
variety of methods.
The information literate student refines the search strategy if necessary.
The information literate student extracts, records, and manages the information and its
sources.
Standard Three – The information literate student evaluates information and its
sources critically and incorporates selected information into his or her knowledge base
and value system.
Performance Indicators:
The information literate student summarizes the main ideas to be extracted from the
information gathered.
The information literate student articulates and applies initial criteria for evaluating
both the information and its sources.
The information literate student synthesizes main ideas to construct new concepts.
The information literate student compares new knowledge with prior knowledge to
determine the value added, contradictions, or other unique characteristics of the
information.
The information literate student determines whether the new knowledge has an impact
on the individual’s value system and takes steps to reconcile differences.
The information literate student determines whether the initial query should be
revised.
Standard Five – The information literate student understands many of the economic,
legal, and social issues surrounding the use of information and accesses and uses
information ethically and legally.
Performance Indicators:
The information literate student understands many of the ethical, legal and socio-
economic issues surrounding information and information technology.
The information literate student follows laws, regulations, institutional policies, and
etiquette related to the access and use of information resources.
Read articles in the sources you find to set the context of your research. Pay close
attention to the vocabulary the authors use.
Note any relevant items in the bibliographies at the end of these overview sources.
They can provide leads to other useful books or articles.
Consider the types of sources appropriate to your topic. Will books suffice? Do you
need primary sources? Should articles be exclusively from scholarly journals? Do you
need statistics?
Resources Search
Research Tips
Work from the general to the specific. Find background information first, and then
use more specific and recent sources.
Record what you find and where you found it. Write out a complete citation for
each source you find; you may need it again later.
Finding Books
Begin with the Online Public Access Catalogue (OPAC)
Use keyword searching for a narrow or complex search topic. Use subject searching
for a broad subject.
Write down all the information you will need to find it in the stacks (author, title, call
number). Notice its circulation status (Is it listed as available?)
When you pull the book from the shelf, scan the bibliography or footnotes for
additional sources.
Also remember to scan the shelves next to this title, since other books related to your
topic may be located in the same call number area.
You may be able to find the full text of most articles online. A librarian at the
Information Desk will be able to help you.
Internet sources
There is a wealth of valuable information available on the Internet. Because the information
is virtually unfiltered, you must take special care to critically evaluate what you find.
Evaluate what you have found
Critically review the information gathered for reliability, credibility, perspective and purpose.
Listed below are a few of the questions good researchers should ask.
Who is the author?
What is the purpose of the article or book?
What makes the author qualified (or not) to write this?
For what audience is the source intended?
What particular bias does the author have or what assumptions does the author make?
What are the author's conclusions and are they justified from the research or
experience presented?
On what resources was the author's research based?
Revise
You many need to repeat these steps several times before you have a polished product.
1. Check for plagiarism - the unauthorized use of the language and thoughts of another
author and the representation of them as one's own.
2. Consult a style manual, for correct citation.
3. Finally, proofread carefully.
Final Product
Congratulations, you have completed all the necessary steps to create a quality product.
Reread your paper checking for format and grammar errors. Review the initial assignment to
see that you have fulfilled all the requirements. You are ready to tackle your next project.
https://www.beloit.edu/library/research_tips/researchprocessguide/
Define your
topic
c) Mechanized arrangement
This is done by allocating notation, which expresses order. Thus, it becomes possible to
easily insert or reinsert the various documents in their correct places. This is how a
mechanized arrangement is achieved.
CLASS SUBJECT(S)
A General works
B – BJ Philosophy, Psychology
BR – BX Christianity, Bible
H Social sciences
J Political science
K Law (General)
KB Religious law
KDZ,KG – KH Law of the Americas, Latin America, and the West Indies
KE Law of Canada
KL – KWX Law of Asia and Eurasia, Africa, Pacific area and Antarctica
KZ Law of Nations
L Education
N Fine Arts
P – PA Philology and linguistics (General). Greek language and literature. Latin language and
literature
Literature (General)
PN
Science
Q
Medicine
R
Agriculture
S
Technology
T
Source: Taylor, A.G. (2006:428-429) Introduction to cataloging and classification. 10th ed.
(Referencing needs corrections)
3.5 THE MEANING OF CALL NUMBERS AND THEIR ARRANGEMENT ON THE
SHELVES
The LC number appears in three main parts, and may contain additional parts that together
provide a unique identifier for the item. One or more parts may be omitted and this represents
the judgment of the cataloguer that the remaining parts suffice to provide a unique identifier.
The three main parts are organized in this way:
This middle part further defines the subject. For example in the subject area of
commerce, it designates a type of material. 5549 = Personnel Management/
General works. To determine the arrangement of the call number on the
shelves, read these numbers the way you would count: 50 comes before 500
which comes before 5000.
The last three letters represent either the first three letters of the Author’s
surname or the first three letters of the title of the document. For example ARM
represents the author’s surname which is ARMSTRONG. In the case that there
is no author or the authors are more than three then the first three letters of the
title would be used. If the title reads ‘Personnel management’ then the call
number would be HF5549 PER
The above number may be preceded by a cutter number that further divides the
subject, or gives some information about the form of the item, such as whether
it is an outline, form book, or case book. To determine the arrangement on the
shelves, read Cutter numbers the way you would read a decimal: .3 comes
before .301 which comes before .31.
UNIT FOUR: INFORMATION ACCESS TOOLS
According to Cook (1981) stand alone indexes are tools designed to make readily
available information that appears in other separate publications.
The purpose of an index is to save the time of the reader by grouping certain related
concepts or subjects and giving their locations in a document. An index as an aid to
finding information may contain cross references all over the book linking related
topics or subjects e.g. see or see also.
Types of Indexes
Subject Index A subject index lists subjects and their related Adolescence, 383–399
concepts in a book. It makes extensive use of
cross referencing to aid the reader to quickly alcohol & drugs, 408, 357
find related terms and concepts in a document. and employment, 405, 416
b) Bibliographies
A bibliography “directs us to sources which contain the required information”,
Behrens (2000). In other words, bibliographies tell us where to find the information
in recorded form.
A bibliography is a list of literary works by a particular author, or a list of works on a
particular subject or a list of works published in a certain geographical area.
Chowdhury (et al., 2008) notes that bibliographies are usually categorised by their
content, such as:
Author bibliography: A bibliography of works by and about a specific author, e.g. World
Shakespeare bibliography Online (www.worldshakesbib.org)
Trade bibliography: A bibliography that provides the record of the publication output of
various publishers, e.g. Books in print (www.booksinprint.com/bip)
National bibliography: A bibliography that records a nation’s publishing output, and thus is
the single most authentic and comprehensive source of information on the publication output
in and about a country e.g. Zimbabwe National Bibliography published by the National
Archives of Zimbabwe.
c) Abstracts
Library Catalogues
Libraries are concerned with storing and retrieving the information, consequently as the
quantities of information grow there is need to make use of information retrieval tools to
facilitate easy access of the information stored. A library Catalogue is one of the retrieval
systems used to retrieve information. The Library Catalogue is a very crucial information
source in the library as it guides the reader / client where to locate the books and helps clients
to know the library’s comprehensive holdings.
The Library catalogue indicates where the books are on the library shelves. Apart from
indicating the location of every book in the library, it will also indicate whether or not the
library has a particular book on a particular discipline. A Library catalogue is an essential
tool, especially when a library has a large collection. It serves as a key to the resources of a
library. Without library catalogue, it would be difficult to know what is available and where it
can be located. It is also known as a retrieval tool. The information retrieval system act as a
bridge between the organizers of information or generators of information and their clients.
The Midlands State University Library has an online catalogue also called the Online Public
Access Catalogue (OPAC) that can be used to locate many sources of information such as
books, journals and electronic resources. The OPAC is available on the internet.
Kasimani and Rajendran (2019) posits that, An OPAC (Online Public Access Catalog) is an
online Bibliography of a library collection that is available to the public … because it allows
the users to search about the collection and resources of library. Online public access
catalogue (OPAC) provides facilities for library users to carryout online catalogue searches,
and then check the availability of the item required.
a) Check the availability of the book and its location and note down its Call Number
b) Approach the appropriate shelf to retrieve the book
5.2 INTRODUCTION
Information can come from virtually anywhere, i.e. from media, blogs, personal experiences,
books, journal and magazine articles, expert opinions, encyclopaedias, and web pages, and
the type of information an individual needs is depended mainly on the question one is trying
to answer. In this Unit, we discuss the information need, categories and formats of
information, and conclude with types of information sources.
Some researchers may need quick facts or little background on a particular subject. This
information need is not that big and the researcher may be able to find the answer in one
source. If a researcher needs information that requires additional facts and background
information, plus the latest research articles related to the subject under study, it becomes a
complex question that requires information from different sources. Scott (2012) notes that
recognising that a question is big, that it cannot be answered by a single source, that it has
multiple facets, and that it requires background information to understand all aspects of it is a
very good beginning.
Cost of Information
Varshney (2011) highlights that when choosing the information resources to use for
searching, one should bear in mind that some resources are free and others are at a cost. In the
case of MSU students, no library resources are accessed at a cost by registered students.
When one registers for that particular Semester, automatically he or she becomes a bonafide
library user who is allowed to borrow the stipulated number of library resources at any given
time. When one wants to use external sources other than those covered by the interlibrary
loan facility, then some costs may be incurred.
Documentary Sources
Non-Documentary Sources
Source: https://shodhganga.inflibnet.ac.in/bitstream/10603/40587/9/11_chapter2.pdf
In some instances
tertiary sources
embrace both
secondary and tertiary
sources, presenting on
the one hand
commentary and
analysis, while on the
other attempting to
provide a synoptic
overview of the
material available on
the topic.
Non-documentary sources
Varshney (2011) notes that non-documentary sources of information form a substantial part
of communication especially in science and technology. These sources provide information
which other sources do not.
-Research Organization
-Societies
-Industries
-Govt. Dept.
-Universities
-Consultants
Jstor
Magazines INFORMATION USE EXAMPLES
City Press
Library Catalog INFORMATION USE EXAMPLES
Researchers should remember that when they are using these various sources of information,
the information found in those sources may come in different types such as; Factual,
objective, subjective and analytical.
A reference source is designed by the arrangement and treatment of its subject matter to be
consulted for definitive items of information rather than to be read consecutively. To
facilitate its ease of use, particular attention is paid to the systematic arrangement of items
within it. Reference materials can be arranged alphabetically, topically, or chronologically.
There are thousands of reference sources available that cover practically every subject. In
most libraries, these books are not issued and are located in a separate reference collection.
This practice makes reference sources readily available and easily accessible. Most of the
reference books are specifically designed to provide required information quickly and in most
convenient form. Although the term reference "book" is frequently used, reference sources
can be books, serials, on-line databases or information found on the Internet. A large part of
using reference sources well is choosing the right one for your needs.
Quick guide for selecting the right type of reference source (Collins, 151):
According to Katz (1997), a dictionary gives the modern meaning of words. Behrens
(1994) defines a dictionary as a list of the words of a language or languages, or a list
of words relating to a specific subject. The words are arranged in a systematic way,
usually alphabetically. There are four types of dictionaries namely:
a) TYPES OF DICTIONARIES
Based on the number of words, scope and coverage of other items of information, the
dictionaries can be categorized into following groups:
General language dictionaries cover all the words of a language and give meanings,
definition, and explanation of the words in the same language. It covers all the words
of a language, including past as well as currently in use words.
The special dictionaries deal with special types or special aspect of the words. Special
type or class of words includes obsolete words, acronyms, abbreviations etc. Special
aspect of the word includes linguistic aspect of the words (such as pronunciation,
synonym and antonyms, etc.), or literary aspect of the words (such as quotations,
idioms, proverbs, etc.).
ENCYCLOPAEDIA
It is a book or set of books giving information on all branches of knowledge or on certain
wide fields with articles arranged alphabetically. An encyclopaedia contains information
about people, places, events, and things. It may deal with all areas of knowledge or it may be
limited to just one subject area. Articles in standard encyclopaedia are written by subject
specialists and then edited by the encyclopaedia staff editors to conform to policies of the
encyclopaedia in terms of content, style and punctuation. Most encyclopaedias are arranged
alphabetically from A to Z. Some are topically arranged, such as one volume may be devoted
to 'Animals', another to 'Plants', 'Earth' and Universe', or some other subjects.
a) TYPES OF ENCYCLOPAEDIAS
i. GENERAL ENCYCLOPAEDIA
YEARBOOKS
Yearbook, as the name indicates, is a book of information that is updated and published
annually, i.e., every year. The basic purpose of a yearbook is to record events and
developments of the previous year in a country or in the world. Based on their scope and type
of information covered yearbooks can be categorized as:- International Yearbook, National
Yearbook, Subject Yearbook. An international Yearbook provides reliable and handy
statistical information about each country of the world. For example, The Statesman's
Yearbook 2014 published by Macmillan, provides political, economic and social account of
every country (194 countries) of the world together with facts and analysis.
ALMANAC
An almanac provides brief statistical information and facts, both current and retrospective
(e.g World Almanac & Book of Facts. This is usually a one-volume work with statistics and a
compilation of specific facts. An almanac is a compendium of useful data and statistics
relating to countries, personalities, events, subjects and the likes (Katz; 1997). Almanacs are
usually published annually.
Almanac is a reference book usually published once a year and contains many kinds of
information. Almanacs originally provided a calendar of the months with eclipses, the
movement of planets and the rising and setting of sun, moon and stars. Present day almanacs
include a comprehensive presentation of statistical and descriptive data covering the entire
world.
Major topics covered are geography, government, demographic data, agriculture, economics
and business, health and medicine, Science & Technology, transport, sports, awards and
prizes. Contents also include articles focusing on events of previous year as well as summary
of recent events. Now the almanacs are more like yearbooks. Both depend on government
sources for statistical data. The only difference is that almanacs present astronomical data,
which is absent in the yearbooks.
HANDBOOK
The word handbook is derived from German word 'Handbuch' meaning a small book giving
useful facts. The literal meaning of the term 'handbook' is a book which is 'handy' to use as it
contains useful facts and handy to carry it conveniently. Handbook by definition is a concise
reference book providing specific information or instruction about a topic or a subject.
Subject handbook basically gives brief information such as facts on a subject. They are
designed to be easily consulted and provide quick answers. Behrens (1994) describes a
handbook as a reference source that provides basic information on a specific subject. It
presents one broad subject in brief, or gives a brief survey of a subject (e.g. Handbook of
American Popular Culture).
MANUAL
Term 'manual' is derived from Latin term 'manuals' meaning a guide book. Manual basically
provides step-by-step instructions on how to do a particular job or operate a particular
machine. When a customer buys any home appliances, such as a television, an air
conditioner, an oven or even a mobile phone, he/she is provided with a manual which gives
proper instructions on how to use that appliance. For example, a cookbook or a book
providing step-by-step instructions to assemble a computer is a manual. Behrens (1994)
describes a manual as a book that contains rules and procedures relating to a specific subject.
It explains how things are done, for instance, how a machine operates; or how an organisation
operates (e.g. MLA Handbook, and Broadcast News Manual of Style).
DIRECTORY
A directory is a list of names and addresses of people and organizations. Directories are also
very important reference tools in the library to answer directory type of enquiries from the
users. Directories can be broadly categorized as General Directories, and Special Directories.
1. General Directories
Telephone directory comes under the category of general directories. You must be familiar
with telephone directory. Every city in a country has telephone directory giving information
about telephone numbers of the subscribers. It also provides addresses along with the
telephone numbers of the subscribers. These directories are usually compiled by post and
telegraph departments.
2. Special Directories
Directories of organizations are called special directories and can be broadly grouped into
following three types:
b) Professionals Directories:
Geographical information sources include maps, atlases, globes, gazetteers, and guide
books. These sources provide information about places, people, rivers, mountains,
forests, lakes etc. To meet information needs of the users, libraries maintain
geographical information sources in their reference collection. This collection
comprises the following four types:-
i. MAPS
Map is a pictorial presentation of earth's surface or part of it, showing countries,
cities, rivers, lakes and mountains. Map can also be a drawing of the sky showing the
position of stars and the planets.
TYPES OF MAPS:
b) POLITICAL MAPS:
Maps that depict boundaries of countries, states, continents and other political
units are called political maps.
c) PHYSICAL MAPS:
Maps that depict the location of physical features of the earth's surface such as
mountains, rivers and lakes are called physical maps or terrain maps.
Some maps are designed to help people to find their way from one place to
another. These are maps for travel on land, on water or, in the air. Maps
showing different categories of roads, such as motorways, four-lane, or six-
lane roads are called road maps, They also show the cities, towns, parks and
other places connected by those roads. Street maps are similar to road maps,
but a street map shows a much smaller area in much more detail.
e) THEMATIC MAPS:
These maps show the distribution of a particular feature such as, population,
rainfall or natural resources like coal, petroleum, metals and minerals on the
earth. Many thematic maps express quantities by means of symbols or colour.
ii. ATLAS:
A book containing collection of maps is called an atlas. A big atlas contains the map
of every county. Globe is a map that has been pasted or printed on a hollow sphere.
Only a globe can give correct picture of the earth as a whole, as the surface of the
globe is rounded like the earth's surface. A globe represents all parts of the earth's
surface correctly. The proportions and positions of the earth's land features and oceans
in relation to each other are seen on a globe exactly as they are on the earth. National
Maps and Atlases The reliability of maps and atlases depend upon the expertise of
editorial staff and the cartographers.
iii. GAZETTEERS
Guide Books are basically travel guides or tourist guides meant for people who want
to visit various places in their own country or any other part of the world. Main
purpose of the guide book is to guide the travellers when to visit a particular place,
how to reach, where to stay, what to see, and what to buy. The travel guides include
information on historical sites, museums, parks, and other places worth visiting in that
city or a country. Other aspects covered are information on the routes and travel
facilities, best time to visit the place, the types of hotels, restaurants and shopping
complexes, etc.
Maps, illustrations and distances are also provided to enhance the usefulness of the
guide book. In addition, information regarding visa, money exchange, weather, etc. is
also given for the benefit of the foreign visitors. Usually a guidebook covers a region,
a country or a city. Tourism Departments of the Governments in most of the countries
bring out tourists guides to promote tourism in the country.
A book containing collective biographies is also called 'Biographical Dictionary', for example
The Dictionary of International Biography. The type of information covered in such sources
also varies from a brief factual type of data to detailed essay type of biography for each entry.
Some biographical sources cover famous people from all walks of life. Such sources are
called 'general biographical sources'. In some, the coverage of people is restricted to a single
discipline or some other special criteria. Such biographical sources are called subject/special
biographical sources.
Again, a biographical source may be international or national in scope depending upon the
coverage of persons. Some biographical sources cover living persons only, e.g. 'Who's Who',
Some cover persons who are no longer living, e.g. 'Who was Who', and some sources cover
life sketches of both, living and dead persons, e.g. Webster's Biographical Dictionary.
Government publications contain official information and they include such documents like
Acts of Parliament, parliamentary proceedings such as the Hansard, Government gazette,
Statistics, reports and the like. The physical form of government publications may be a book,
pamphlets, magazine, report, monograph or electronic.
6.9 PERIODICALS
By the end of this section students will be able to:
Define periodicals.
Identify types of periodical literature.
Understand the role of periodical literature in research.
Evaluate articles in periodicals.
Find periodicals in the MSU Library.
Introduction to periodicals
According to the 1964 UNESCO Conference on periodicals “periodicals are publications
with a distinctive title published continuously on a regular basis on an indefinite period of
time.” Magazines, annual reports, journals, and newspapers are all examples of periodicals.
Each issue has a volume number, issue number and date”. e.g. Journal of African law,
Volume 57, Number 1, (January-March 2013). ISSN 0021-8553. Each publication of a
periodical is called an issue, and issues generally make up a volume. These can be available
as hard copies or electronic editions (soft/digital copies) of the various issues.
b) Professional Journals
Each profession can have a professional or an academic journal that tackles different
topics about that particular industry. Professional journals are always trusted by
people because all of the articles and the information published in the pages are all
factual and based on actual studies with evidences. In addition to that, these journals
are also reviewed by a special board to ensure the credibility and relevance of the
content to the profession and to the industry as a whole. Although the primary
purpose of these academic journals is not to generate income, there will be a need to
pay for a fee for the subscription of future copies especially if the publication is done
by a commercial publisher.
d) Newspapers
The most known frequency of a newspaper is daily, but there are newspapers that
come weekly or monthly. Newspapers are concerned with current and vital
information on a wide range of topics, for example, The Herald. The aim of the
newspaper is to keep the public informed about local, national and international news.
However, their frequency of publication often means that articles lack the research
and documentation found in scholarly journals. One good characteristic of a
newspaper is that it is cheaper to acquire than a journal.
e) Trade Journals
This is a periodical that publishes current news and trends for a specific industry or trade.
Articles are written by someone with knowledge in the field for other practitioners.
Advertisements are targeted at professionals in the field.
TYPICAL CHARACTERISTICS OF PERIODICALS
Newspapers Popular Trade journals Scholarly &
Magazines Research Journals
Example Herald Drum - Physics Today Journal of African
s Chronicle Moto -American History
Financial Gazette You Archaeology Journal of Modern
Sunday Mail Trends -American African Studies
The Standard Libraries Conflict Management
The Independent and Peace Science
Purpose Current Hot topics; Current trends and Original research;
information; Current events; news in a particular Refereed or peer
Upcoming and past Interviews; field of study; reviewed; Depth of
events; Editorials; popular culture Employment; Book knowledge about the
Obituaries; reviews; Business subject; Bibliography;
Classified Ads; connections Professional authors
Columns
Languag Non- technical; Non-technical; Jargon; Written for Academic; Technical;
e Written for a Written for a practitioners Specific for the
general audience general audience discipline
Authors Journalists; Journalists Practitioners in the Researchers; Scholars;
Freelance writers field Academics
Sources Rarely cites Rarely cites Brief Extensive
sources sources bibliographies bibliographies
Publisher Commercial Commercial Professional Universities; Research
s Publisher Publisher Association organisations
Graphics Photos; Ads Glossy photos; Photos; Ads; Graphs; Charts;
(matte); Political Ads Charts Formulas; Usually no
Cartoons Ads
Relevance - Does the publication relate to your topic so that it is useful for your research?
General vs. Specific – Look at sources which cover your topic on a general level and
which are more specific or technical. You can check this by skimming the title and
abstract. An assortment of general and specific sources is good if you are working with
this topic for the first time.
Reliability (Authority) – What is the quality of the publication? Finding the authority of
a source means determining who wrote it and what his/her background is with the subject.
Is this author an expert on the subject? If not, is that important? If the source does not
give bibliographical information, consult a bibliographical reference source. Example: If
no information is available, examine the resources you have been using for other works
by the author.
Accuracy – It is important to know where the author got his/her facts and if the facts are
correct. A bibliography of the source can show you which references the author used to
get his/her information. If the author supports his/her statements with references, the
source is more reliable.
Purpose and bias– Determine whether the source is published by an organization with a
particular purpose. Determine whether the work attempts to sell a particular point of
view, if it does then it has a bias therefore is subjective information. Verify if the source
is scholarly or popular.
Bibliography - Scholarly works always contain a bibliography of the resources that were
consulted. The references in this list should be in sufficient quantity and be appropriate
for the content.
Audience - For what type of reader is the author writing? This ties in with the type of
journal, as popular magazine are geared to the general reader, while trade magazines are
for the specialist and scholarly journals are directed at researchers, scholars or experts in
the field.
Illustrations - Are charts, graphs, maps, photographs, etc. used to illustrate concepts?
Are the illustrations relevant? Are they clear and professional-looking?
UNIT SEVEN: ACADEMIC INTEGRITY AND PLAGIARISM
7.1 INTRODUCTION
Generally, integrity entails the quality of being honest and having strong moral principles.
This trait is required by people in all spheres of life and this is the reason why we are going to
be focusing on the academic side. Cambridge University Press (2020), states that integrity is
“the quality of being honest and having strong moral principles that you refuse to change”
while the Dictionary.com LLC (2020) adds that integrity is “adherence to moral and ethical
principles; soundness of moral character; honesty”. As researchers and users of information,
it is always important to consider why we need information, where and when to get it from
and how, how to evaluate such information before application. In academic circles, a
disregard to the above results in a widespread culture of cheating thus in the process violating
academic integrity (Cavico and Mujtaba, 2009).
One of the primary considerations for ranking of universities the world over is production
quality research output which of course has a strong bearing on how researchers, lecturers
and students alike interact and behave with information. Usually Midlands State University
uploads all first class dissertations and theses in the institutional repository/digital archive for
wider distribution globally via the internet. The same happens for published and unpublished
research papers and book chapters written by staff. For this very reason, students and faculty
are compelled to obey rules of academic honesty as this has a bearing on future and image.
All academic work should result from an individual's own efforts. Intellectual or academic
works used from other sources must be fully acknowledged in order to remove the impression
that you are the originator of the used work.
(3) The college years are a critical period for ethical development,
Academic integrity and dishonesty also matter because most college students are at a
developmental level where their approach to ethical decision making is being formed. It is
therefore critical to look at how colleges and universities uphold academic integrity for the
sole reason that the college years represent a period of significant moral development in
students.
Copyright is a law that gives individuals ownership to their creative works. Creative works
might include text, artistic works, music, computer programs, sound recordings and films.The
copyright immediately becomes the property of the author who created the work and it comes
with certain exclusive rights. These rights might include the right to:
distribute copies
Choreography
Sound recordings
Architecture
Computer programs
Under Zimbabwean Law, copyright is not infringed under certain circumstances. In this
module exceptions for libraries will be covered.
LIBRARIES
Libraries have a special set of exemptions from liability for copyright infringement when
they exercise some of the exclusive rights of copyright holders such as making copies,
displaying and performing works publicly, and distributing works to the public. The
following will not infringe copyright law as far as libraries are concerned:
Making or supplying of a copy of an article from a periodical
Making or supplying of a copy or part of published literary works, dramatic or musical
works.
In view of the above, the library will need to meet certain conditions that include:
Not operating for profit
Not supplying not more than one copy of the same article or part of the work
Supplying copies only for research or private study
7.5 PLAGIARISM
Plagiarism is the biggest enemy of academic integrity defined in this work as “wrongful
appropriation”, “close imitation”, or copying of another author’s language, thoughts, ideas or
expressions and the representation of them as one’s original work. In other words, plagiarism
refers to the act of copying other people’s intellectual works without acknowledging the
source of information, thereby giving the impression that you are the rightful originator of
those ideas or expressions. The habit of plagiarism begins in the early stages when a student
copies something (e.g. assignments) written by a classmate.
Within academia, plagiarism by students, professors, or researchers is considered as academic
dishonesty or academic fraud. It is a serious criminal act and offenders are subject to
academic censure, up to and including expulsion.
Plagiarism is one of a number of practices deemed by universities to constitute cheating or in
academic circles as “a lack of academic integrity”. Plagiarism is manifested by one of the
following practices:
Collusion without official approval between two or more students, with the result that
identical, or near identical work, is presented by all involved
Falsification: where content of assignments, e.g. statistics, has been invented or falsely
presented by a student as their own work
Replication: where a student submits the same or very similar piece of work, on more than
one occasion to gain academic credit
Taking unauthorized notes into an examination
Obtaining an unauthorized copy of an examination paper
Communication with other students in an examination in order to help, or be helped, with
answers.
Impersonation of another person in an examination ( Jones et al. 2005).
However, as stated earlier, plagiarism, specifically, is a term used to describe a practice that
involves knowingly taking and using another person’s work and claiming it, directly or
indirectly, as your own. This ‘work’ is usually something that has been produced by another
person, ‘published’ in some tangible way, and presented formally into the public domain. It is
not the ideas per se that are being plagiarized, as ideas can occur to people all the time; it is
the manifestation of those ideas: in print, Internet, audio-visual, theatrical, cinematic,
choreographic or other tangible form. It can also include assignments either ready written, or
written to order, and sold from Internet sites, which are then presented to an institution by the
buyer as his or her own original work.
Dennis (2005) did a research to find why students cheated and the results showed that :
Types of Plagiarism
Verbatim/Direct Plagiarism
This entails the use of another author’s exact words without citing the author. Direct
plagiarism is the word-for-word transcription of a section of someone else’s work, without
attribution and without quotation marks. To avoid this, you need to add quotation marks and
citation.
Self Plagiarism
Self-plagiarism occurs when a student submits his or her own previous work, or mixes parts
of previous works. For example, it would be unacceptable to incorporate part of an
assignment you wrote previously into another assignment. Self-plagiarism also applies to
submitting the same piece of work for assignments in different classes without previous
permission from both lecturers.
Mosaic Plagiarism
A kind of patchwriting in which parts from one or several sources are cobbled together with
some of the writer’s own words without adequate attribution.
Accidental Plagiarism
Accidental plagiarism occurs when a person neglects to cite their sources, or misquotes their
sources, or unintentionally paraphrases a source by using similar words, groups of words,
and/or sentence structure without attribution.
Referencing
One of the most important ways to avoid plagiarism is including a reference page or page of
works cited at the end of your research paper or assignment. This page must meet the
document formatting guidelines or citation styles used by your faculty or department. This
information is very specific and includes the author(s), date of publication, title, and source.
Procrastination
Do not procrastinate with your research and assignments. Good research takes time.
Procrastinating makes it likely you will run out of time or be unduly pressured to finish. This
sort of pressure can often lead to sloppy research habits and bad decisions. Plan your research
well in advance, and seek help when needed from your lecturers.
Citation Errors
Common errors that lead to accidental plagiarism include using words or passages from the
original source without using quotation marks and/or without citing the source; using
different citation formats within the same assignment; or using a citation format incorrectly.
Poor Note-taking
Inexperienced students often forget to put quotation marks around notes taken directly from
text, or find that their notes are disorganized. As a result, they cannot tell which notes came
from which source when they are in the stages of writing up their assignment.
A lecturer will receive a report showing the percentage of plagiarized content in a submitted
work. For students to use Turnitin, they need to receive an e-mail from their lecturer
containing details on how to create an account and how to submit a paper.
7.8 CONCLUSION
If students have integrity, this means they are honest and trustworthy for their personal
morals and values are a true reflection of their credibility and character. Complete academic
is required at universities while students earn their degrees as these would be true
representations of their academic achievements. Therefore degrees must be earned in fair and
honest ways. Lack of academic integrity whilst peoples are in college can be stubborn
following one into his or her workplace, something that may compromise professional goals.
Tracey Bretaga, T. et al (2013:378) cite a number of authorities (Bertram Gallant 2008, 2011;
Davis, Drinan, and Bertram Gallant 2009; Macdonald and Carroll 2006; Sutherland-Smith
2008) who advocate for what they term the holistic approach to promoting academic
integrity. Their view is to observe academic integrity in
“every aspect of the academic enterprise: from university mission
statements and marketing, to admissions processes, to nuanced and
carefully articulated academic integrity policy, to assessment practices and
curriculum design, to information during orientation, embedded and
targeted support in courses and at every level for students, to frequent and
visual reminders on campus, to professional development for staff, research
training, and the use of new technologies which both assist students avoid
academic integrity breaches, and as a tool to detect breaches when they
occur”.
UNIT EIGHT: SEARCH STRATEGIES AND EVALUATION OF INTERNET
SOURCES OF INFORMATION
1) Keyword Search
A keyword search retrieves words or phrases from the important fields of the database
records. A Keyword search looks for words anywhere in the record. Keywords represent the
main concept of your research topic and these are the words used in everyday life to describe
your topic.
Selecting keywords is a multi-step process that involves:
identifying the main concepts of your topic
brainstorming synonyms and antonyms that could also be used to describe your topic
spell out abbreviations
2) Subject Search
A subject search involves searching the subject headings used in a database. Most databases
include subject headings that are assigned to each record.
Use subject searching when you know the Library of Congress Subject Headings and you
want to do a more precise search than you can with Keyword searching. A subject heading is
an assigned word (or phrase) used in a database to describe a concept. Search using this
standardized word instead of keywords, so you do not need to worry about synonyms and
spelling variations.
Subject headings are a way to group items on the same topic together even though the authors
of the materials may have used different terms. An example is death penalty and capital
punishment. LCSH assigns all books the subject heading Capital Punishment, regardless of
which term is used in the title.
Cars
Motor Vehicles
Buses
Trucks
Notes:
Be careful not to end the stem or root of a word too early to retrieve too many results.
Example: typing cat* will find cat, cats, catalog, catastrophe, catsup, etc.
Different databases use different symbols to truncate words. However, most of our
popular online databases, such as our Library Catalog, Google and Yahoo! use
asterisk (*) as their truncation symbol. If in doubt, check the "Help" section for the
truncation symbol.
Some search engines, such as Yahoo! and Google, automatically use truncation
without you having to type a truncation symbol.
4) Wildcard Symbols
Similar to truncation, wildcards substitute a symbol for one letter of a word.
This is useful if a word is spelled in different ways, but still has the same meaning.
1. Examples:
wom?n = woman, women
Note: Again, check the Help or Tips links available on most library databases and Internet
search engines to verify the wildcard symbol that should be used (usually an asterisk (*) or
question mark (?) ).
Phrase Searching
Many search engines and other online searching services allow you to perform an exact
phrase search, so that pages with only the words you type in, in that exact order and with no
words in between them, will be found. The exact phrase search is a remedy for too many
irrelevant hits. To perform an exact phrase search at a search engine that permits it, put the
phrase in quotation marks e.g. "consumer product chemistry.”
Boolean Searching
Boolean searching is based on a system developed by George Boole, a 19th century
mathematician. Most online databases and Internet search engines support Boolean searching
to limit, widen or define your search. The power of Boolean searching is based on connecting
keywords with Boolean operators. The three basic operators are AND, OR and NOT.
Mathematically, they represented by these symbols:
AND +
OR /
NOT -
AND - narrows a search; Use to combine key concepts, for example: Water AND Pollution.
Pollution
Uses of internet
E-mail Services
E-mail is shorthand for electronic mail and is used for the exchange of messages over the
internet or intranets (Local area networks). An e-mail works by sending a message to a
specific address that looks like this
petermasharks@msu.ac.zw
This is a system of transferring or exchanging (uploading and downloading) files over the
internet between two computers. Users need an FTP client installed on their computer to
enable this to work.
Examples of software clients that offer this services are Fileszilla and Secure Shell (SSh)
Chat Systems
This is technology that permits people to exchange textual information in real time (i.e.
synchronously) or with a short time lapse between messages.
Other examples of chat systems such as Google talk or Gtalk, Google Meet, Skype, Zoom,
empathy, yahoo chat, WhatsApp, Facebook Messenger.
Text documents such as portable document format (pdf) files, word documents
etc.
Sounds
Graphics or images
Moving pictures or videos
Software
BROWSERS
A browser is software used to display the World Wide Web and also the Internet in general.
Examples include:
1. Microsoft Edge
2. Mozilla Firefox
3. Opera
4. Safari
5. Google Chrome.
A browser sends requests to the internet and displays the results to the user in the form of
websites. A browser has an address bar where a user types in the URL (Universal Resource
Locator) or website address.
SEARCH ENGINES
Burke, (1999) defines search engines as software that is used to construct a database of
websites. Basically, a search engine is a software program that searches for sites based on the
words that you designate as search terms. Search engines look through their own databases of
information in order to find what it is that you are looking for.
The internet contains billions of documents all linked by hyperlinks. It is impossible to find
information on the internet without a tool that makes everything easy. This tool is called a
search engine. A search engine is a software program that is able to retrieve information from
the internet by using the words that you input as search terms or search expressions and
returns the results in the form of ranked list. Each result is called a hit and the number of
results is called hits. A search engine works by using spiders (a type of software) that crawl
the internet, index the pages and add the pages to its database or catalogue. Search engines
are continually crawling the internet to look for new websites that are being added every day.
You might imagine the search engine’s index as a massive electronic filing cabinet.
Some search engines index every word on a website whilst others only index certain words
contained within Meta tags on a webpage. Meta tags are invisible to a general internet user.
They are used to give special keywords or description about a webpage.
Examples of general search engines are:
SEARCH ENGINE UNIVERSAL RESOURCE LOCATOR
(URL)
Google http://www.google.com
Excite http://www.excite.com/
Bing http://www.bing.com
All Meta search engines function differently and the technology they use is different from
any other Meta search engine. Some sort results according to relevancy, others search lesser
known search engines, others search particular search engines and others do not show where
they got their results.
Dogpile http://www.dogpile.com
MetaCrawler https://www.metacrawler.com/
Yippy http://yippy.com/
MetaEureka http://www.metaureka.com
8.5 EVALUATING INTERNET SOURCES OF INFORMATION
Print Sources
Quality standards of printed materials are controlled through a system of checks and
balances imposed by peer review, editors, publishers, and librarians, all of whom
manage and control access to printed information. This assures that published
materials have been through some form of critical review and evaluation, preventing
informal, poorly designed, difficult-to-use and otherwise problematic materials from
getting into the hands of users.
In academic and other research libraries, most books and periodicals are a product of
the scholarly communication system. This system ensures that authors present
information in an orderly and logical manner appropriate to the topic.
Printed information in books and periodicals follows established linear formats for
logical and effective organization.
Materials in printed form are stable. Once in print, information remains fixed for all
time. New editions and revisions often are published, but these are separate and
distinct physical entities that can be placed side by side with the originals.
Accuracy
Currency
Currency refers to the timeliness of information. In printed documents, the date of
publication is the first indicator of currency. Apply the following criteria to ascertain
currency:
If timeliness of the information is important, is it kept up-to-date?
Links
Are links related to the topic and useful to the purpose of the site?
Are links still current, or have they become dead ends?
What kinds of sources are linked?
Coverage/Scope
Clarity
ACCESSING JSTOR
1. Go to www.msu.ac.zw
4. Click on the JSTOR link. You will be taken to an authentication screen where you need to enter
your Registration number and your e-Learning password.
5. Enter your Registration Number and E-Learning password in the fields provided and click the
Login button.
6. You are now re-directed to the JSTOR journal database. You simple enter your search terms
and carry out your research in JSTOR
9.5 PRACTICAL EXERCISES – ACCESSING E-BOOK DATABASES
1. Go to www.msu.ac.zw
4. Click on the SAFARI O’REILLY link. You will be taken to an authentication screen where you
need to enter your Registration number and your e-Learning password.
5. Enter your Registration Number and E-Learning password in the fields provided and click the
Login button.
6. You are now re-directed to the Safari O’Reilly database. You simple enter your search terms
and carry out your research in Safari
Use the above steps to access all subscribed e-Journal or e-Book content from Midlands State
University.
Some Definitions
An Institutional Repository is an electronic archive of the scientific and scholarly
output of an institution, stored in digital format, where search and recovery are
allowed for its subsequent national or international use (Gonzalez, 2007).
It is an information system that collects, preserves, disseminates and provides access
to the intellectual and academic output of the university community (Gonzalez, 2007).
(Lynch, 2003) in (Prabhakar and Rani, 2018) says it is “a set of services that a
university/ institution offers to the member of its community for the management and
dissemination of digital materials created by the institution and its community
members”.
An institutional repository (IR) is an electronic system that captures, preserves, and
provides access to the digital work products of a community (Foster and Gibbons,
2005).
To increase the profile, visibility and citation impact of the University’s scholarship.
To provide unified access to the University’s scholarship i.e. to collect content in
single location
To provide open access to the University’s scholarship.
To preserve the University’s scholarship.
Provision of self- archiving of institutional scholarly research output
Institutional Repository is created to manage, preserve, and maintain the digital assets,
intellectual output, and histories of academic institutions.
10.4 THE MIDLANDS STATE UNIVERSITY INSTITITUTIONAL REPOSITORY
(MSUIR)
The MSU IR contains the intellectual output of the Midlands State University. It contains
research output from various faculties and departments. These faculties and departments
translate into communities. Research output from is collected and stored in one its respective
faculty so that it will be easy to view all the work from each faculty.
Dissertations/Theses
Conference Papers
MSU Journals The Dyke and Midlands State University Journal of Science and
Technology (MSUJSAT)
Materials in the IR are added on continuous basis and new communities may be added in the
future.
Benefits and Value of Institutional Repositories
Institutional Repositories are important to Universities for several reasons:
Stewardship
All Universities and research Institutes have digital documents that are of enduring value and
these documents need to be preserved for posterity. Doing nothing to try to preserve digital
works of enduring value guarantees their loss. Institutional Repositories are there to preserve
these digital works to guard against loss.
5. Enter your search terms inside the search box and click on the “Search MSUIR”
button.
6. You will be taken to the screen shown below
Search Results
Identity : refers to the representation of the user in the virtual world. It could include a
profile that has descriptive and personal information such as birthday, educational
qualifications, hobbies, family relationships etc., or could be as vague as an imaginary
pseudonym.
Conversations: allows users to interact with each other in a broadcast or dialogue manner
synchronously in real time or asynchronously with time lapse between statements.
Sharing: refers to activities through which existing content is spread or distributed to others
through the social platform.
Presence: allows users to know where other community members are (on/off-line and
actual/virtual location). Presence is the “illusion of being there or an experience of being
in an environment while physically situated in another location” (Sims, Wolf and Yang,
2017)
Relationships: allows community members to visualize their networks in many ways ranging
from “likes” and “followers-followed” to virtual representation of real-life relationships.
Groups: refers communities with common interests in certain subjects or topics.
Reputation: allows users to qualify the content provided by another user and establish trust-
levels between community members. These trust-levels can be made explicit, for example
through a scoring or ranking system.
1) Violation of Privacy
This may occur when personal information such as health status, financial status, online
activities, location etc is made visible to groups other than those intended and this can
sometimes result in future negative outcomes. Some large companies use robotic software to
collect information about their clients without consent and pass it on to third parties for
targeted marketing and advertising according to the person’s profile and online activities.
1) Cyberbullying
Swenson-Lepper, 2019 defines cyberbullying as “willful and repeated harm inflicted
through the use of computers, cell phones, and other electronic devices”. Types of harm
that might occur include embarrassment, humiliation, a feeling of being threatened,
discomfort and being tormented just to mention a few.
2) Cyberstalking
Cyberstalking is similar to offline stalking and is defined as “using the Internet as part of a
targeted campaign that causes fear, distress, or alarm” (Cavezza and McEwan, 2014). It
includes a variety of behaviours such as repeated unwanted emails or instant messages,
posting false or hostile information about victims online, using social networking sites to
harass the victim, subscribing to services or products in the victim’s name, hacking into
victim’s personal accounts, online identity theft, impersonating the victim online, spamming
or sending the victim computer viruses; and recruiting others to harass or threaten the victim
via the Internet.
Users are able to create profiles that include their educational levels and their research
interests
Linkedin
A social networking site used mostly by professionals and businesses. Key characterisitics
include:
Ability to create CV like profiles
Ability to connect with past and current colleagues and increase connections to people
with the same professional interests
Ability to get help and discuss specific topics in industry or at work
Ability to find jobs
Google Scholar
This is a search engine that searches scholarly literature and other academic materials. Main
characteristics include:
Ability to create personal profile
Explore related works, citations, authors, and publications
Keep up with recent developments in any area of research
Create virtual library where you can store your downloaded documents online
Ability to find citations, export and import citations
Ability to check an author’s metrics e.g. number of citations, number of publications
etc
Mendeley
Mendeley is a free reference manager that can help you collect references, organize your
citations, and create bibliographies. It is also an academic social network that enables you to
share your research with others. Mendeley can help you connect with other scholars and the
latest research in your subject area. With Mendeley you can:
Collaborate with other researchers online
Find relevant papers based on what you’re reading
Collect references from the Web
Automatically generate citations and bibliographies
Import papers from other research software
Access your papers from anywhere online
Read papers on the go with your iPhone or iPad
Build a professional presence with your Mendeley profile
From within your citation library, read, annotate and highlight PDFs
Twitter
Twitter is a microblogging social networking site that allows users to send short messages
called tweets. Twitter users follow others and you can follow people with similar academic
interests. By using Twitter, you can:
Promote your research, for example by providing links to journal articles
Reach a large number of people quickly through tweets and retweets
Follow the work of other experts in your field
Build relationships with experts and other followers
Keep up-to-date with the latest news and developments, and share it with others
instantly
Reach new audiences
Get feedback about your work and give feedback to others
Follow and contribute to discussions on events, for example conferences that you
can't attend in person
Slideshare
This is a presentation and documentation-sharing platform. Most of the information found on
Slideshare is in the form of PowerPoint presentations, videos and pdf documents. Slideshare
is a combination of social networking and an online learning platform.
By using Slideshare, you can:
Create online webinars and training programs
Create visualizations for presentations
Upload PowerPoint presentations
BIBLOGRAPHICAL REFERENCES
1.