Computer Applications Notes
Computer Applications Notes
Computer Applications
A computer
Is an electronic device that accepts user input (data) and processes it under the influence of a set of
instructions referred to as programs to produce desired output (information).
Is an electronic device that uses instructions (programs) to accept and process data given to it in a variety
of forms in order to produce useful information.
Is an electronic device that accepts user input (data) and transforms it under the influence of sets of
special instructions called programs to produce information.
Programs
Set of instructions written in computer language that directs the computer what task to perform and how to
perform it.
Data
- Raw facts that do not have much meaning to the user. Includes alphabets, numbers and symbols.
Data processing
The varied activities performed to convert data into useful information.
Information
Processed data that is meaningful to the user and which can form a basis for decision making.
Computers come in different sizes and designs but the most common is Personal Computer (PC)
The first calculating device, which was used 2000 years ago in ancient China and Japan was called abacus. It
was used for simple and small volumes arithmetic. In 1647 Blaise Pascal invented the “mechanical calculator.
G.W Leibniz invented the Leibniz’s stepped Rekoner” which was more advanced as it could also multiply,
divide and extract square roots in 1694.
In 1833, Prof. Charles Babbage, “the father of the modern computer”, developed a machine called
analytical engine which combined arithmetic process with decision based on its own logic.
Computers have developed at different paces, but sometimes radically enough to create new generation of
computers.
second. These computers were mostly computational machines. Their input /output capabilities were
usually limited to the keyboard, paper tape and punched card input; and printer and punched card output.
They relied on machine language, the lowest-level programming language understood by computers, to
perform operations, and they could only solve one problem at a time. An example in this category was
ENIAC (Electronic Discrete Variable Automatic Computer) and later came UNIVAC (Universal
Automatic Computers).
recognition are being used today.The fifth generation is still a state of the art technology that relies on
predictions and further technological refinements.
Summary
Research shows that the trend in computer technology revolution is that there is;
(i) Continual decrease in computer size
(ii) Improved speed and power processing
(iii) Decrease in computers and the related facilities cost
Number of components elements e.g. transistors, capacities, diodes etc in computer per circuit (IC)
greatly increased i.e. to over 500,000.
1. Speed – a computer is a very fast machine. It can perform in a very few seconds the amount of
work that a human being can do in several months or even a year.
2. Accuracy – the computer’s accuracy is consistently high.
3. Diligence – computers are free from monotony, tiredness and lack of concentration etc. It can
therefore work for hours without creating an error. For example if 10 million calculations are to
be done, a computer will do the tenth million calculations with exactly the same speed and
accuracy as the first one.
4. Versatility – a computer performs various tasks with ease i.e. it can search for a letter, the next
moment prepare an electricity bill, and write a report next then do an arithmetic calculation all with
ease.
5. Large Memory capacity – a computer can store and recall any information due to its secondary
storage capability.
Supercomputers are employed for specialized applications that require immense amounts of computational
Power. For example, weather forecasting requires a supercomputer. Other uses of supercomputers include
animated graphics, fluid dynamic calculations, nuclear energy research, and petroleum exploration. They are
very fast, largest in physical size, most expensive, fastest processor speed and largest memory capacity
computers. Perform many complex calculations and generate a lot of heat due to their huge processing power.
Due to this, the whole CPU is immersed in a tank containing liquid fluorocarbon to provide cooling. They are
mainly used for scientific research, which requires enormous calculations. Applications that justify use of
supercomputers are:- space science, nuclear physics, aerodynamic design and simulation., defense and
weapon analysis.
b). Mainframe
-Are less powerful, less expensive, smaller, slower, lower memory capacity than supercomputers. Handles all
kinds of problems whether scientific or commercial. Support a variety of peripheral devices. Mostly found in
government agencies, big organizations and companies such as hospitals, banks, airports etc, which have large
information processing needs and places where processing automation is required.. They can also be used as
Network Servers in large businesses like in Banks to provide online data of customer accounts to branch
offices.
c). Minicomputers
Also referred small scale mainframes. Slightly smaller, low memory, cheaper, and low processing power than
mainframe. Supports fewer peripheral devices and not as powerful and fast as the mainframe. It was
developed as a cheaper alternative to the mainframes for smaller organizations. They are used in research
institutions, scientific laboratories, manufacturing industries, engineering plants, etc.
d). Microcomputers
They are also called personal computers (PCs). They are the smallest, cheapest, slowest and least powerful
type of computers. They are called Microcomputers because their processor is small and is called a
microprocessor. They are mainly used in training and learning institutions, small business enterprises,
communication centres, etc. Today powerful microcomputers have grown tremendously, closing the gap that
formerly existed and reserved for minicomputers and mainframes.
Types of microcomputers
Non-portable: Desktop computer which is not portable and designed to be placed on top of an office
desk.
Portable
Laptop: Are small enough to rest on persons lap when using. Weigh about 1 to 3 kg each.
Advantages of laptops
o They are portable
o Are convenient to travel with
o Their screen show sharper and clear images which prevent eye strain.
o Laptops have power batteries which serve as inbuilt UPS
Note books: are even smaller and lighter than laptops. Small enough to fit in the pocket of a coat. Cheaper
than laptops and just as useful. When very small are called sub-notebooks.
Palmtops: A small computer that literally fits in your palm. Compared to full-size computers, palmtops are
severely limited, but they are practical for certain functions such as phone books and calendars. Palmtops that
4
use a pen rather than a keyboard for input are often called hand-held computers or PDAs(Personal Digital
Assistant). Because of their small size, most palmtop computers do not include disk drives. However, many
contain PCMCIA slots in which you can insert disk drives, modems, memory, and other devices.
Examples are: Personal Digital Assistants (PDAs), personal organizers or pen computers.
2) Purpose (Use)
All computers fall into three broad groups according to the tasks they perform namely special and general
purpose; namely
3) Functionality
In this class computers are classified according to the type of data they can process.
o Digital computers
They process digital data only which is discrete in nature and their operations are based on two states
namely “on” and “off” or “1” and “0”.
Digital signal
o Analog computers
Process data that is analog in nature which is continuous. They solve mathematical operations and logical
comparison by measuring the amount of change in physical magnitude e.g. speed, temperature, etc. are
dedicated to a single task. Are used in manufacturing process control like monitoring and regulating furnace
temperatures, speed, pressures, weather, etc, stations to record and process physical quantities e.g. wind, cloud
speed, temperature, etc. in addition to PCs, most modern home appliances such as digitals TVs, microwaves,
wall clocks are digital in nature. Continuous data is represented using a continuous waveform.
+
-
Analog signal
o Hybrid computers
`They are computers built with the characteristics of both analog and digital, thus process both analog and
digital data.
Banks
- Manage financial transactions through the use of special cash dispensing machines called ATMs used for
cash deposit and withdrawal services
- Processing of cheques
- For preparation of payrolls
- Better record keeping and processing of documents
- Provide electronic money transfer facilities
Homes
- Entertainment e.g. watching movies, playing music, playing computer games
- For storing personal information / documents
- For calculating and keeping home budgets
Industries
- To monitor and control industrial processes through the use of robots
- For management control i.e. to keep track of orders, bills and transactions
- For advertisement purposes, which enable an industry to attract more customers
- CAD {Computer Aided Design} allows accurate, quick and easy designs of products on computer
screen.
Transport industry
- Airports; to control the movement of aircrafts, their take off and landing using radar equipment
- For making reservations (Booking purposes)
- Storing flight information
- Automobile traffic control i.e monitoring vehicle traffic in busy towns
- In Railway corporations to coordinate the movement of goods and wagons
- In shipping control for efficient management of fleets, cargo handling and communication
Offices
- For receiving and sending of information through e-mails, fax , etc
- Production of documents
- Keeping records
Hospitals
- For keeping patient records
- Keeping records of purchases and stock of medicine
- Analysis data obtained from X-rays
- Maintaining the booking system of scarce resources such as operation theaters.
6
Education
- Access internet through email to link different schools and to exchange knowledge
- Communication through email to link different schools and exchange knowledge
- For teaching and learning purposes e.g. computer practical
- Administration –storing information about students, processing grades and teachers salaries.
Library services
- Enables library personnel to easily access and keep updated records of books and other library materials
i.e. to keep electronic catalogues and track book circulation.
- Library users can also use computers to search for titles instead of using the manual card catalogue
Entertainment industry – to generate and edit computer graphics in movies and games.
Military to design weapons and control flight.
Research institutions to process and analyze data.
Impaired persons
- converts speech to text for the deaf
- converts spoken language to sign language for the deaf.
- Converts text to speech for the blind using speech synthesizers.
- The introduction of computers has lead into unemployment, in some companies thousands of workers
have been made redundant.
- Computer technology has created new opportunities for crime such as hacking, theft of data
and the introduction of viruses.
- Computers have caused stress at places of work as humans try to keep up with the output
of their computers.
- People who work with computers a lot without interacting with other people are likely to develop
psychological problems due to isolation.
- Computers have affected relationships of people working together such as employee-supervisor
relationships and thus becoming a dehumanizing factor.
- Computerisation has caused job content reduction and role ambiguity.
- Cause of power redistribution organizations due to change in organizational structure.
Introduction
Computer systems will include the computer along with any software and peripheral devices that are
necessary to make the computer function. A computer is made up of two main components Hardware and
Software while a computer system has three namely: Hardware, software and liveware (computer user). A
computer system is a collection of three components namely hardware, software and liveware entities that
work together to receive, process, manage and present information in a meaningful format using computers.
i). Hardware
These are the physical or tangible components of a computer system, which one can touch and feel/see. They
consist of the mechanical, electrical and electronic parts of the system e.g monitor, system unit, keyboard and
mouse, etc.
ii). Software
Is a set of instructions that direct a computer on what to do. They guide the computer in each and every
activity that happens inside the computer during data processing. The programs are also written to help the
computer users perform various tasks using the computer. The software is intangible, flexible and changeable
in nature. They are mainly classified into two categories namely system software and application software.
Computer Hardware
The computer hardware is classified into five categories namely input devices, central processing unit, output
devices, Primary Memory and Secondary storage devices.
Input devices are classified according to how they are used to enter data as follows:
1) Keying devices i.e. keyboard, keypad
2) Pointing devices i.e. mouse, joy stick, light pen, track ball.
3) Scanning and other data capture devices
4) Speech recognition or voice input devices
5) Touch screen, digitizer and digital cameras
Keying devices
Keying or typing is the most common way to input data. A keying device converts typed numbers, letters and
special characters into machine readable form before processing takes place.
Advantages of keyboard
- It’s very reliable compared to other methods of text input (voice input)
- Is very cost effective, since every computer comes with a keyboard and there are no additional costs.
Pointing devices
8
Enter data or instructions by controlling a pointer or cursor on the screen. Examples include: - mouse,
trackball, joystick, light pen, and stylus.
i). A mouse
Enter data or instructions by controlling a pointer on the screen. Generally there are three types of mice
available in the market today namely mechanical, optical and cordless.
Mechanical mouse
It has a ball underneath, two buttons and an optional scroll wheel located between the left and right buttons.
Laser mouse
A laser mouse is a type that uses a laser beam rather than a ball to track the movement of the user's hand.
Laser mice are becoming increasingly common because they are perceived to have better tracking ability
Uses of a mouse
- To select options from menus or from a set of icons by clicking the mouse button.
- To position the cursor when editing text or using design package
- To select an object in a drawing or a piece of text to be copied, moved or deleted.
ii). Joystick
Is a hand held device used for playing computer games and video games. It allows the fast interaction needed
in games. The user controls game actions by varying the pressure, speed and direction of the joystick. Just like
mouse, it has a button which is used for selecting an item, issue commands or trigger actions.
Advantages
- Provide a direct mode of input
- More precise than using a mouse
Disadvantages
- Can only detect the presence and absence of light
- Can only be used in conjunction with a graphic VDU, which is able to sense special hardware and
software.
Touch pad
Scanners
Scanning is capturing data from an object and converting it into digital format. Scanning devices are devices
that capture data into the computer directly and are classified according to the technology they use to capture
data namely optical and magnetic scanners.
Uses of OMR
- Are used to mark multiple choice questions, e.g. KCPE or aptitude test.
- analyzing responses to structured questionnaires
- Insurance premium collection
- Selecting correct number combinations from lottery tickets.
- Supermarkets for stock recording
- Payroll data entry
- Market research questionnaires
- Voter’s registration process
Advantages
- Has low error rate
- Conspicuous errors are easily corrected
- Economical where the volume of data is large
- Data captured at source, hence no data entry errors
manufacture, manufacturer and the product code. Bar codes do not have the price details because prices vary
from one place to another.
The two types of bar code scanners are the hand held wand and desktop bar code reader.
Uses
- On labels and on shelves for stock taking
- Printed on shop goods e.g. supermarkets
- In libraries
Advantages
i). Data is captured at source hence errors are limited
ii). It’s an easier method to use
iii). Document design is less complicated
iv). Characters can be read by people
Disadvantages of OCR
- Some optical scanners are expensive
- Handling precaution necessary e.g. document should not be folded or creased for accurate reading
Uses
- Sale order forms
- Stock taking sheets
The MICR is also known as magnetic reader. MICR recognizes characters formed from magnetic ink. The
document characters are typed or printed in ink containing Iron II Oxide that gives them magnetic property.
MICR is used in banks to read cheques, credit cards etc.
Advantages of MICR
- Its fast, accurate and automatic
- The codes are both machine and human readable.
- Reduces forgery i.e. its difficult to forge
-
Disadvantages
- MICR system is limited to only 14 characters
- MICR system is based on magnetism and can easily be damaged.
A magnetic stripe is a thin magnetic tape, often at the back of a plastic card e.g. ATM card. The stripe
contains coded information of the holder.
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-
based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called
swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head.
Applications
-On credit cards
-On bank cards e.g. ATM
-As tags on clothes
-As a phone card
-Production control where punched cards holds data in a factory like employee’s details
-Access control for security reasons in many offices to control access to buildings or rooms
-Car parks where badges are used to raise car barriers, allowing entry or exit from a car park.
Advantages
- Simple to produce
- Not easily damaged
- Stores fairly large number of characters
- Disadvantage
- Data can be changed or erased by magnetic fields
An emerging trend in voice input is the inclusion of voice tag in cell phones that allows the user to simply
store and dial contacts.
Advantages
- No keyboards is necessary useful in situations where hands or eyes are busy handling documents etc
- People are moving around, since wireless microphone can be used.
- Can be used from remote locations via the telephone
Disadvantages
- Homophones: some words sound the same e.g. Fair & Fare
- Recognition is low
- Speaker variability
- Limited vocabularies
- Background noise can disrupt the data entered
c). Digitizers
A graphics tablet (or digitizer, digitizing tablet, graphics pad, drawing tablet) is a computer input
device that allows one to hand-draw images and graphics, similar to the way one draws images with a
pencil and paper. These tablets may also be used to capture data or handwritten signatures. It can also be
used to trace an image from a piece of paper which is taped or otherwise secured to the surface. Capturing
data in this way, either by tracing or entering the corners of linear poly-lines or shapes is called digitizing.
Interactive whiteboard (smartboard)
An interactive whiteboard (IWB), is a large interactive display that connects to a computer and projector. A
projector projects the computer's desktop onto the board's surface where users control the computer using a
pen, finger, stylus, or other device. The board is typically mounted to a wall or floor stand. They are used in a
variety of settings, including classrooms at all levels of education, in corporate board rooms and work groups,
in training rooms for professional sports coaching, in broadcasting studios and others.
Factors to consider when selecting an input device
- Device cost: The initial cost and recurrent cost to be weighed against the expected benefits and /or
operational – characteristics of the facility
- Device speed
- Data volume: It should cope with that data volume to be input with appropriate timing.
- Device accuracy
- Device reliability
- Mode of operation: This will depend on the nature of the system i.e. data processing system.
- Appropriateness: weigh out the merits and demerits of the device in relation to where it is applied/used.
2.3 The Central Processing Unit (CPU)
The CPU also called the Processor or microprocessor is a tiny chip etched into a silicon chip. The CPU is the
most important component of the computer. This is because it is the portion of the computer responsible for
executing (processing) instructions stored in memory. Also all control operations are coordinated here.
The CPU performs the following functions:
- Processing data
- System control
- Provide temporary storage (RAM) and permanent storage (ROM)
- Runs the Operating System software installed on the computer, peripheral devices such as printers,
scanners etc.
In microcomputers, the CPU is housed inside the system unit where it is mounted on a circuit board called the
motherboard or the system board.
Control unit
CU controls / coordinates all processing activities in the CPU using a system clock, which sends electrical
signals. The CU interprets instruction fetched from the Main Memory and sends control signals to the ALU
instructing it on how to execute instructions, issue control instructions to the operating system, determines the
operation to be performed by the instruction, where the results are to be stored, and where the next instruction
is located. The CU fetches data from the main memory and puts it in the proper order for the processor. It also
sends the processed results back to the main memory. The CU also locates any data needed by the instruction
and sees that the instruction is followed.
Main memory
It is also called primary memory storage. It provides storage location for data and instructions accessed by the
control unit. The primary memory or the main memory is part of the main computer system. The processor or
the CPU directly stores and retrieves information from it. This memory is accessed by CPU, in random
fashion. That means any location of this memory can be accessed by the CPU to either read information from
it, or to store information in it.
o The primary memory itself is implemented by two types of memory technologies. The first is called
Random Access Memory (RAM) and the other is read only memory (ROM). A more appropriate name for
RAM is RWM (Read Write Memory), the CPU can write and read information from any primary memory
location implemented using RAM. The other part of primary memory is implemented using ROM which
stands for Read Only Memory.
The primary memory is used for temporarily holding data and instructions required immediately by the CPU
and contents are lost once the power is switched off. Secondary storage is used for permanently storing
information by the CPU and is not lost when power is switched off.
Primary memory
Is of two types: Read Only Memory (ROM) and Random Access Memory (RAM)
14
Characteristics of ROM
- Can only be read and cannot be written to unless it’s a special ROM e.g EAROM
- Its non-volatile
- High bit density
- Stores permanent or semi permanent instructions from manufacture although some can be programmed
according to users specification.
- Are intended for large production volumes
Disadvantages of ROM
- Are not cost effective because of large production volumes
- A ROM cannot be changed, once manufactured.
- Delay in production of the ROM.
Characteristics of RAM
- Data can be read and written in it.
- It’s temporary (volatile) storage; it’s contents are lost/ disappears when the computer is switched off.
- It’s contents is user defined.
Types of RAM
There are two types of RAM namely Static RAM (SRAM) and Dynamic RAM (DRAM)
i). Static RAM (SRAM)
SRAM is a fast type of memory found inside a microprocessor.
Characteristics
- Stores a bit of information within a flip-flop
- It’s a very fast memory and holds its contents as long as there is power.
- Its content does not require refreshment
- Its expensive
- Its very fast compared to DRAM
- Its mostly used to make special types of memories known as Cache memory
- Used for smaller memories
- Has low packing density
Disadvantages of RAM
- It is expensive
- It loses its content when you turn the power off
- It is very difficult to archive information or pass it along to someone else, if everything is kept in
RAM.
Memory capacities
Memory and storage capacity is measured in special units called bytes. A byte is equivalent to a single
character, which can be numbers 0 – 9, letters A – Z or a special symbol e.g. a number 2341 has 4 bytes, while
words ‘My school’ has 9 bytes.
Softcopy
Refers to intangible output displayed on the screen or listened to through devices like speakers. Softcopy
output devices include monitors, speakers, LCD Projectors and light emitting diodes.
Example of softcopy output devices:
Types of monitors
There are three namely Cathode Ray Tube (CRT), Liquid Crystal Display (LCD) and Gas Plasma
Display(GPD). Monitors that display sharp clear images are said to have high resolution.
CTR monitor
The screen is curved slightly outward forming a convex shape. A CRT monitor consists of a long glass tube
with an electron gun on one end and a screen on the other end. The screen is coated with tiny phosphorus dots
that illuminate red, green and blue to make a pixel. The CRTs are too bulky to carry around, consume a lot of
power and are cheap to buy.
that is passive matrix and Active matrix. In Passive matrix LCDs create images by scanning the entire
screen, requires little power and have poor clarity. Active matrix use thin Film Transistor technology (TFTs),
consume more energy and offers better clarity.
Disadvantage
Not suitable for noisy situations
-Inappropriate for lengthy or permanent information.
1. Printers
Produce a hard copy of information on papers. The printing mechanism determines the quality of hardcopy.
They are two types of printers namely impact and non-impact.
Impact printers
Impact printers print using striking mechanism, they strike the paper in order to form an imprint on it. Impact
printers are cheap to run, slow, use inked ribbons, produces multiple copies, uses cheap technology, are noisy
because of impact, produce low quality printout and print for long periods without breaking down. They
produce characters by using special light hammers with characters or pins held on the printing head. When the
hammer strikes on the head, character mark is stamped. In impact printing, the printing head comes into
17
physical contact with the stationery. An inked ribbon placed between the stationery and the printing head
element creates the imprints when the printing head strikes.
v) Chain printer
It’s an impact line printer that incorporates engraved characters printing slugs on a moving chain or belt. The
chain moves the character printing slugs at high constant speed past printing positions.
Non-impact printers
Are fast, use thermal and electrostatic principles, produces single copies and are costly due to technology
involved and quiet. They print using ink, toner cartridge, thermal or laser mechanisms. In non-impact the
printing head does not come into physical contact with the stationery.
Use the concept of spraying ink onto the paper, from tiny holes on the ink cartridge onto the paper. A colour
inkjet printer may have two cartridges, one for black and a tricolour that contains cyan, magenta and yellow
(CMY) compartments. The cartridge has nozzles that do the actual spraying of ink on the paper
Advantages
- Are cheaper and produce better quality printouts
- Inkjets printers use smaller mechanical parts than laser printers
- Provide inexpensive way to print full-colour document.
Weaknesses
- Are slow
18
iv). Photo printers are special purpose printers designed to print photographs.
Impact Non-impact
- Slow - Fast
- Cheaper - Costly
- Use striking mechanism - Use thermal or electrostatic principles
- Noisy - Quiet
- Multiple copy production - Multiple copy production almost
possible impossible
- Use inked ribbon - Use ink cartridge or toner cartridge,
resin or wax.
Plotters
These are output devices that are mostly used in engineering and architecture field for production of graphical
outputs e.g. diagrams, photographs, maps, architectural designs and such outputs. The most common
commercially available graph plotters are the Flatbed Plotter and Drum Plotter.
Drives
A drive is a computer device for reading data from or writing data into a storage media e.g. a tape, or disk.
Types / examples of computer drives
- Hard disk drive (HDD)
- CD-ROM drive
19
- USB Port
- USB Port
- Floppy disk drive (FDD)
- DVD – ROM drive
- Zip drive
It is important to have a backing storage for long – term storage of data and programs and also when there is
limited storage capacity in the main memory. Backing store is a non-volatile (permanent) memory outside the
CPU such as floppy disks, CDs and USB flash Disks.
REMOVABLE STORAGE
Magnetic Disks
Magnetic storage media use magnetic technology to store data.
Tape Drives
Tape drives are another type of magnetic computer storage devices. Tape drives are not commonly used in
consumer computers, but the low cost and reliability of tape drives allows them to be used by companies
making long-term backups. One major difference between tape drives and hard disk drives is that a hard disk
drive can read data from any part of its platters. A tape drive must read through the data from start to finish, as
the read/write heads cannot move to a specific part of the tape. Once the tape drive reaches the data point, read
speeds are faster than the average hard disk drive.
Advantages
- Store large amount of data
- Light and easy to carry
- Effective when to store sequential files for batch applications
- High capacity and backup storage at relatively low cost
Disadvantages
- Slow due to sequential reading of data
- Wastage of recording surface because of Inter-block gaps left for stopping purposes.
- Easily distorted by environmental factors such as dust, moisture, humidity etc.
20
Were a ubiquitous form of data storage and exchange from the mid-1970s to the 2000s.While floppy disk
drives still have some limited uses, especially with legacy industrial computer equipment, they have been
superseded by data storage methods with much greater capacity.
Are made of a thin plastic disc with a magnetisable iron oxide coating and enclosed in a plastic case.
Inscription of data is done on the magnetic coating around the plastic. The floppy disk is inserted inside a
floppy drive which has a read/write mechanism that runs over the magnetized spots.
There are two types of disks:
3 ½ which has storage capacity of 1.44MB and 5 ¼ inch which has a storage capacity of 1.2MB.3 ½
inch floppy store more data and are better protected as opposed to 5 ¼ inch floppy.
Note:
To write data means to move it or copy it from the main memory to backing storage.
To read data means to move it or copy it from the backing store to the main memory.
Disks are direct access storage media.
Fixed storage
-Refers to storage devices that are housed inside the system unit. e.g. hard disk.
NB: Some hard disks especially those in small computers such as laptops are removable.
Hard Drives
Hard disk drives are magnetic, non-volatile computer storage devices. A hard disk drive stores data
on two spinning platters inside the drive. The data is read with a read/write head that uses magnetic
technology to write the data. The non-volatile nature of a hard disk drive means the data does not get
erased when the drive loses power, as is the case with random access memory Consumer drives with
capacities of one terabyte (1,000 gigabytes) are becoming more common as of 2010.
Care of hard disk
- Keep it away from smoke and dust
- Switch off the computer using the correct procedure to avoid crashing on rotating disks.
- Keep them away from excessive heat because heat energy weakness magnetic media’s ability to store
data
- Do not drop magnetic media on the ground.
- Do not bend or fold magnetic media or put heavy weights on the to avoid breaking or damaging them
- Do not touch the magnetic surfaces
- Do not remove media from drive when it sis still being accessible by the computer because this may
result in data loss.
Laser disks
Data is recorded using a very concentrated light (laser beam). They store very large volumes of data. Data
stored in them is more stable and permanent than the magnetic media. Examples are: Compact disks (CD),
Digital Versatile Disk (DVD), Optical Card and Optical tape.
Forms of CDs:
Both CD-ROMs and CD-Rs are referred to as WORM (Write Once Read Many) because they allow the use to
write (record) data on them once but read them many times.
22
Optical tape
An instrument used for video or computer data storage in which a laser optical head is used to write digital
information onto a tape. Depending on the size of the reel, the tape may be capable of storing more
information than an optical disc, but has a much slower access time.
Similar to magnetic tape, but data is stored on it using optical technology.
Disadvantage
- Expensive
- Costly hardware and software for reading
- It can break easily
- Very sensitive to things like dust, water, heat, scratches which easily damage them.
Is a kind of non-volatile storage media that employs integrated circuits rather than mechanical, magnetic or
optical technology. They are regarded as solid state because they do not have moving parts but everything is
electronic as the case of RAM. Examples include flash disks, Flash pen drives and memory cards.
Memory cards
A memory card or flash card is an electronic flash memory data storage device used for storing digital
information. They are commonly used in many electronic devices, including digital cameras, mobile phones,
laptop computers, MP3 players, and video game consoles. They are small, re-recordable, and able to retain
data without power. Memory Stick is a removable flash memory card format
Flash disk
It is small in size but with massive storage capacity of as much as 32GB. Its more portable and convenient to
carry around than other secondary storage medias.
Advantages
- Data stored on flash drives is impervious to scratches and dust, and flash drives are mechanically very
robust making them suitable for transporting data from place to place and keeping it readily at hand.
Most personal computers support USB.
- Flash drives also store data densely compared to many removable media..
- Compared to hard drives, flash drives use little power, have no fragile moving parts, and for most
capacities are small and light.
- Flash drives implement the USB mass storage device class so that most modern operating systems can
read and write to them without installing device drivers. The flash drives present a simple block-
structured logical unit to the host operating system, hiding the individual complex implementation
details of the various underlying flash memory devices. The operating system can use any file system
or block addressing scheme. Some computers can boot up from flash drives.
- Specially manufactured flash drives are available that have a tough rubber or metal casing designed to
be waterproof and virtually "unbreakable". These flash drives retain their memory after being
submerged in water, and even through a machine wash
23
-
Disadvantages
- Like all flash memory devices, flash drives can sustain only a limited number of write and erase cycles
before the drive fails.
- Most USB flash drives do not include a write-protect mechanism, although some have a switch on the
housing of the drive itself to keep the host computer from writing or modifying data on the drive.
- A drawback to the small size is that they are easily misplaced, left behind, or otherwise lost.
- USB flash drives are more expensive per unit of storage than large hard drives, but are less expensive
in capacities of a few tens of gigabytes.
-
Criteria for Selecting a Computer System
Hardware considerations
i). Processor type and speed
The price of a computer is dictated by the type of microprocessor installed and its clock speed. A good
computer must have high processor speed of over 4GHz
iii). Warranty
The hardware bought must have a warranty cover and must be guaranteed for a specific period of time.
Warranty is an agreement between the buyer and the seller that spells out terms and conditions of, after selling
a product in case of failure or malfunction
A good warranty should cover the following:
o Duration e.g. six months, one year, etc. the least warrant period should be at least 1 year. In most
cases, the longer the warranty the better the hardware.
o How comprehensive is the warranty? Does it cover all the parts of a computer?
o Whether the warranty offer onsite support, so that you don’t need to take the computer back to the
seller / manufacturer in case something goes wrong.
o Call-out response and liability agreement e.g. how long should the supplier take to repair a fault or
replace the product and if he/she delays who bears the cost.
o Preventive maintenance for example regularity of service at intervals etc.
iv). Cost
The cost of computers is related to the size and additional components that may come with the computer. The
cost depends on:
- Its processing capability
- Whether it is branded or a clone. Branded computers are more expensive than their equivalent clones
because of the reliability and good after sale services
- Its size – portable computers are more expensive than desktops because of the superior technology
involved to manufacture smaller computer components without losing performance abilities.
Do market survey from magazines, newspapers and electronic media or visit a number of vendors to compare
prices to enable you purchase genuine components at a reasonable cost.
24
vi). Portability
Look for a computer that you carry with you incase you wish to access your computer and files wherever you
are. Smaller devices enhance portability.
Other considerations
- Monitor
Your choice of monitor may depend on size, resolution and technology used to make it. Currently flat panel
displays are replacing CRTs.
- Multimedia capability
-Refers to the ability for as computer to process and output text, sound, video and pictures. Multimedia system
consists of speakers, CD/DVD drive, sounds card and SVGA monitor. Also a software that supports
multimedia capability.
Other considerations include available ports, wireless connectivity, and the system unit form factor (whether
tower type or desktop).
Software Considerations
Authenticity
This is genuineness, validity or legitimacy of an item. Software is an intangible product, and its quite easy to
pirate software (make illegal copies of software). When purchasing software, get the original software that
will be supported by the developer’s license and certificate of authenticity. This is because some people
illegally produce pirated copies which are an offense.
Documentation
It includes user manuals, trouble shooting and installation guides as well as on-line help. A good software
product must be accompanied with these documentations.
User needs
It must meet users need e.g. if the user needs to type documents most often would go for a word processor.
User friendliness
This is how easy the users can be able to operate the computer. The ease of use of a program will (most likely)
influence whether the user will prefer it or not.
System requirements
Are basically the hardware specifications required to run a particular program and are usually indicated on the
package e.g. you need a minimum of 16MB of RAM to run an Access Dbase, but 32MB is recommended. The
system requirements will usually include the amount of Ram, Hard disk space, monitor type, processor type
and peripheral
Cost
Software tend to be more expensive than the hardware. The cost of acquiring software product must be
carefully considered before acquiring it against the benefits that it is likely to bring. The cost of software is a
major contributing factor in deciding whether to purchase it or not. It is usually cheaper to purchase general
purpose software if it can meet the users need.
Therefore, a software product must be compatible with the existing hardware, operating system or application
programs and should be readily upgradable.
Portability
Software portability refers to ability of a program to be copied or installed in more than one computer. Data is
said to be portable if it can be transferred from one application to another in electronic form. Most software’s
in the market are portable.
Reliability
Good software must be reliable and secure.
26
The diagram above shows how the units interact with each other in the processing of data. Input devices
enter information to be processed by the processor. The processor can read and write into the secondary
storage devices.
The processor also stores the instructions being currently executed into the main memory. So can be able
to read and write into the main memory (RAM). Once the data has been processed by the processor, the
data can be displayed by the output devices. Please note the direction of the arrows as it depicts the
flow of the data and instructions.
Information is stored in computers in the form of bits. A bit is used to represent information in the
computer. They are referred to as binary digits i.e. the 0’s and 1’s with 0 representing an OFF state and 1
representing an ON state.
The stored bits are usually retrieved from computers memory for manipulation
by the processor
A single bit alone cannot represent a number, letters or special characters, to represent information;
bits are combined into groups of eight. A group of eight bits is called a byte. Each byte can be used to
represent a number, letter or special character.
27
CHAPTER THREE
Computer software refers to a set of instructions that direct a computer on what to do. The set of
instructions is often called a program or, if the set is particularly large and complex, a system.
Computers cannot do any useful work without instructions from software; thus a combination of
software and hardware (the computer) is necessary to do any computerized work. Data are raw facts
and ideas that have not been processed while Information is data that has been processed so as to be
useful to the user.
Software
Software can be broadly classified into system software and application software
28
(i) Operating system – is a complex program and most important program that runs on a computer and
which controls the operation of a computer. It perform basic tasks, such as recognizing input from the
keyboard, sending output to the display screen, keeping track of files and directories on the disk, and
controlling peripheral devices such as disk drives and printers. In general the operating system
supervises and directs all the software components and the hardware components. Sophisticated
operating system could handle multi-processors, many users and tasks simultaneously. Examples of
computers operating sys tems are UNIX, Microsoft windows 95/98, Windows NT, Windows 2000,
Windows XP, Windows Vista, Windows 8 and Linux.
(ii) Service programs are programs designed for general support of the processes of a
computer; "a computer system provides utility programs to perform the tasks needed by
most users". The service programs can further be divided into;
• Utilities Performs a variety of tasks that maintain or enhance the computer’s operating system
Utility programs are generally fairly small. Each type has a specific job to do. Below are some
descriptions of
utilities.
• Anti-virus applications protect your computer from the damage that can be caused by
viruses and similar programs
• Compression utilities make files smaller for storage (or sending over the Internet) and then
return them to normal size.
• Data recovery utilities attempt to restore data and files that have been damaged or
accidentally deleted.
• Disk defragmenters reorganize the data stored on disks so that it is more efficiently
arranged.
• Firewalls prevent outsiders from accessing your computer over a network such as the
Internet.
• Development programs are used in the creation of new software. They comprise of sets of
software tools to allow programs to be written and tested. Knowledge of appropriate
programming language is assumed. Tools used here are
• Text editors that allows one to enter and modify programs statements
• Assembler- allows one to code in machine programs language .i.e. processor specific
• Compilers-makes it possible for programmer to convert source code to object code
which can be stored and saved on different computers.
• Interpreters-used to convert source programs statement by statement as it executes the
program without being compiled first.
• Libraries- commonly used parts or portions of a program which can be called or included in
the programmer’s code without having to recode that portion.
• Diagnostic utilities-used to detect bugs in the logic of program during program
development
•
• Communication programs- refer to programs that make it possible to transmit data.
29
documents, database for storing, retrieving and manipulating data and various calculations on
spreadsheets. General purpose programs are discussed below;
NB: Nowadays most of the general purpose software is sold as a complete software suites such as
Microsoft office or Lotus SmartSuite. These suites offer four or more software products packaged
together at a much lower price than buying the packages separately.
• Tailor made/special purpose software Tailor-made computer system refers to computer
application developed by in-house IT personnel or outside software house according to
30
specific user requirements in a firm. They are developed for given purpose e.g. Payroll system,
stock control system etc.
31
The Internet is a world wide computer network, which interconnects computer networks across countries.
It started with an initial 4 computers in 1969 and grew over the next ten years to connect 200 computers in
military and research establishments in the US. Today there are more than 4 million host computers, any
of which could be holding the information you are looking for, and as many as 50 million people
connected.
This is a special part of the internet that allows people to view information stored on participating computers.
It is an easy-to-use, graphical source of information which has opened the internet to millions of people
interested in finding out information.
• Web
w Browser- a web browser is software used to view and download Web pages and various types
e files such as text, graphics and video. Examples are Microsoft Internet Explorer or Netscape
of
Navigator.
32
Electronic mail can be sent to another internet user anywhere in the world within seconds. E-mail
facilitates; sending of messages, file attachments, address book, sending E-mail to a group, forwarding
messages and many others.
Videoconferencing
In this facility you can see the person at the other end of the line and you can be able to talk to them using a
microphone.
- It offers different ways of communicating and innovations are going on to make it faster, more
reliable.
- The Internet is a virtual treasure trove of information. Any kind of information on any topic
is available on the Internet.
- It is a source of entertainment where users can play computer games, visiting chat rooms or just
surfing the Web.
- Many services are now provided on the internet such as online banking, job seeking, purchasing
tickets for your favorite movies etc.
- Business (E-commerce) can be transacted over the internet.
- Personal information such as name, address, credit card number etc. can be stolen by other culprits
and misused.
- Unwanted e-mails in bulk (Spam), which provide no purpose and needlessly obstruct the entire
system, can be sent on the internet.
- Computers attached to internet are more prone to virus attacks and they can end up into crashing your
whole hard disk.
- Pornographic sites on the Internet that can be easily found by children which can corrupt their morals.
- Anyone can publish incorrect information online because there’s no quality control
33
It involves:
- Protection of data and information against access or modification
- Denial of data and information to unauthorized users
- Provision of data and information to authorized users.
Data control is the measure taken to enforce the security of programs and data.
Confidentiality
Sensitive data or information like employees details, business, financial, etc belonging to the organization
or government should not be accessed by or disclosed to unauthorized people.
Integrity
Means that data should not be modified without owner’authority.
Availability
Information must be available on demand.
ICT Legislation – these are laws that govern what information can be kept about an individual and how
that information may be used. Any activity that contravenes these laws is considered illegal.
Viruses
The term virus stands for: Vital Information Resource Under Siege
A virus is a program that will change the operation of the computer without the user’s information.
Viruses attach themselves to computer files called executable files such that any time such programs are
run a copy of the virus is sent out. So it duplicates itself continuously.
Therefore a computer virus can be defined as:
- A self -replicating segment of computer code designed to spread to other computers by sharing
“infected” software.
- A destructive program that attaches itself to other files and installs itself without permission on the
computer when the files are opened for use.
- A program that can pass a malicious code to other non-malicious programs by modifying them.
34
- A program or code that replicates itself and infects other programs, boot and partition sectors or
documents inserting itself or attaching itself to the medium.
Note: The main difference between a virus and a worm is that a viruses attaches themselves to computer
executable files while a worm attaches it self on non-executable files in the computer.
Install a Fault Tolerant system which has the ability to preserve the integrity electronic data during
hardware or software malfunction.
Disaster recovery plans by establishing offsite storage of an organizations databases so that incase of
disaster or fire accidents, the backed up copies are used to reconstruct lost data.
Unauthorized access
Physical access to computer system should be restricted to ensure that no unauthorized person gets access to
the system.
Control measures
1. Set up a comprehensive error recovery strategy in the organization.
2. Deny access permissions to certain groups of users for certain files and computers.
Physical theft
This involves the theft of computer hardware and software. It involves breaking into an office or firm and
stealing computers, hard disks, data and other valuable computer accessories by being taken away by either an
insider or an intruder. Most cases of theft are done within an organization by untrustworthy employees of the
firm {Inside job} or by an intruders (outsiders) for commercial, destruction to sensitive information or
sabotage resources.
Control measures
36
- Employ guards to keep watch over data and information centres and backup.
- Burglar proof the computer room.
- Reinforce weak access points
- Create backups in locations away from main computing centre.
- Motivate workers to feel sense of belonging in order to make them proud and trusted custodians of the
company resources.
- Insure the hardware resources with a reputable firm.
Trespass
This is the act of gaining access or entering into a computer system without legal permission.
Cracking
Refers to the use of guess work over and over again, by a person until he/she finally discovers a weak in the
security policies or codes of software. Alternatively refers to someone using his / her knowledge of
information systems to illegally or unethically penetrate computers systems for personal gain.
Hacking
Refers to when an individual intentionally breaks codes and passwords top gain unauthorized access into a
computer system, but without intent of causing damage.
Tapping
Tapping is when someone gains access to information that is being transmitted via communication links. Any
information that is transmitted across a network is at risk of being intercepted, if appropriate security measures
are not put in place.
Piracy
Is the act of making illegal copies of copyrighted software, information or data.
To eliminate piracy
- Make software cheap, enough to increase affordability
- Use licenses and certificate to identify originals
- Set installation password to deter illegal installation of software
- Enforce laws that protect the owners of data and information against piracy.
Fraud
Refers to leaking personal or organizational information using a computer with the intention of gaining money
or information.
Example of fraud is where one person created an intelligent program in the tax department that could credit
his account with cents from all the tax payers. He ended up becoming very rich before he was discovered.
Alteration
Refers to illegal changing of data and information with the aim of gaining or misinforming the authorized
users. When a system is compromised the data lacks reliability, relevance and integrity. Example of data
alteration are when students break into system to alter exam results, or someone breaks into a banking system
to change account details or divert money.
Spam
A spam is unsolicited electronic junk mail, often commercial, message transmitted through the Internet as a
mass mailing to a large number of recipients. Is send by a person gaining access to a list of e-mail addresses
and redirecting the e-mail through the Mail Server of an unsuspecting host, making the actual sender of the
spam difficult to trace. Spam is annoying, but usually harmless, except in cases where it contains links to web
sites. Clicking on these links may sometimes leave your system open to hackers or crackers.
37
Audit trail
Computer Audit Trails are used to keep a record of who has accessed a computer system and what
operations he or she has performed during the given period of time. Audit Trails are useful both for
maintaining security and for recovering lost transactions. Audit Trails help to detect trespassing and
alterations. Incase the system is broken into by a hacker; an Audit Trail enables their activities to be
tracked. Any unauthorized alterations can be rolled back to take the system back the state it was in before
the alterations were done
Data encryption
Data encryption is a means of scrambling (or ciphering) data so that it can only be read by the person
holding the encryption ‘Key or 8algorithm9. The key is a list codes for translating encrypted data – a
password of some sort. Without the key, the cipher cannot be broken and the data remains secure. Using
the Key, the cipher is decrypted and the data remains secure. Using the Key, the cipher is decrypted and
the data is returned to its original value or state. Each time one encrypts data a key is randomly generated.
The same key is used by the data recipient to decrypt the data.
Data encryption is a useful tool against network snooping (or tapping).
Log files
They are special system files that keep a record (log) of events on the use of the computers and resources
of the information system. The information system administrator can therefore easily track who accessed
the system, when and what they did on the system.
Firewalls
A firewall is a program or hardware that filters information coming through the Internet and connection
into your personal computer or network. Firewalls can prevent unauthorized remote logins, limit or stop
Spam, and filter the content that is downloaded from the Internet. Some Firewalls offer virus protection,
but it is worth the investment to install Anti-Virus software on each computer.
Security monitors
These are programs that monitor and keep a log file or record of computer systems and protect them from
unauthorized access.
Biometric security – is unauthorized control measure that takes the user’s attributes such as voice,
fingerprints and facial recognition.
Authentication policies such as signing users log on accounts, use of smart cards and Personal
Identification Number (PIN).
38
Definition:
An operating system ( "OS") is the program that, manages all the other programs in a computer. An operating
system (OS) is a set of programs that manage computer hardware resources and provide common services for
application software..
The operating system provides a software platform on top of which other programs (application programs),
can run. Examples of Operating Systems: Microsoft Windows 95/98/2000/XP/Vista/NT, Macintosh OS,
OS/2, CP/M, VMS, UNIX, MS-DOS
vii). Security
Modern operating systems implement security policies such that unauthorized users cannot get access to a
computer or network resource.
39
a)
Number of users
i). Single user OS
Used only by one person and runs one user application at a time.
ii). Multi-user OS (multiprogramming)
Enables two or more users to run a program simultaneously. Examples are UNIX, Linux , Windows XP,
Novell, OS/2, Windows 3.11, Windows NT & Windows 2000.
b)Number of tasks
i). Single program/tasking OS
Allows processing of only one program in the main memory at a time e.g Ms – DOS.
ii). Multitasking OS
The OS allows a single CPU to execute more than one program at a time e.g. Windows Vista, XP, etc.
c) Interface
i). Command line
User interacts with a computer by typing a command at the dot prompt found on a command line. The
computer reads the typed command at the command line and executes it. Examples of command line OS are
Ms-Dos, UNIX and OS/2. To apply: Click Start menu>All Programs>Accessories>Command Prompt.
This interface is hard to learn or remember the commands, they cannot process complex graphics and they
hardly make use of emerging hardware and software technologies.
Ease of update - the method should allow ease of update and the operating system should be able to keep a
record of the date of modification.
Economy of storage – the method should use the least storage possible because memory is a scarce resource.
Simplicity of maintenance – the method should enable quick navigation through the file system and make it
easy for it to be maintained.
Reliability - the file organization method should be reliable.
Windows organize information in three tier hierarchy i.e;
Files
Folders and subfolders
Drives.
1. File
It’s a collection of related data or information given a unique name for ease of access, manipulation and
storage on a backing storage and stored in one location a. A file has details that indicate:
- A unique name and an optional extension
- Its size, date and time the file was created or modified.
Types of files
There are three are types namely; system, application and data files.
System files : contain information that is critical for the operation of the computer.
Application files: these files hold programs or application files that are executable.
Data files contain user specific data.
The are some file extension;
Extension File type Description
.doc Data A Microsoft Word document file
.txt Data A plain text file created using note pad or DOS editor.
.exe Application file The file that launches a particular application e.g. PM 7.0 .exe,
Winword.exe, etc
.bat System files File containing a series of commands loaded during boot up.
.sys System files System files that perform fundamental operation in a computer.
Function of file
- Storage of data
- Organization of information
2. Folder / Directory
It’s a named storage area where the user can store related files for easy access. All folders or directories
originate from a special directory called the root directory or folder. The root directory is represented by a
back slash (\).
Sub-folder is a folder or directory within another folder/directory. In Windows folders and sub-folders icon
appear in yellow colour while file icons are mostly white with a fold at the top right hand corner.
File icon
Folder icon
All folders or directories originate from a special directory called the root directory or folder. The root
directory is represented by a back slash ( \ ).
3. Drives
41
The Operating System views storage media or devices as drives. When creating folder or saving a file identify
a storage location which is more reliable e.g Floppy disk, Compact Disk, Hard disk, Flash disk etc. Drives
may be given labels such as letters A-Z to identify them.
Storage location Drive Remarks
Floppy drive A and B If a computer has two drives, one will be assigned letter A the other
B.
Hard disk C, D, E, F If a computer has 4 hard drives, they may be assigned letters C – F.
Optical drives D, E, F, G If a computer has one hard disk and three or more CD/DVD drives,
may take any number between D and Z
Other Removables D, E, …Z If a computer does not have an optional drive, any removable drive
attached to the computer can take any letter between D and Z.
Network drive Logical Network drives takes D – Z depending on the number of physical
drives installed or attached.
Windows Desktop
Desktop is mostly an empty screen that appears when windows starts, and has some standard icons that show
that the computer is ready for use.
Desktop features
Icons – are small images representing objects such as files, application programs, peripheral devices, operator
tools in programs, etc. Are manipulated using pointing devices. Examples icons on the desktop are My
Computer, Recycle bin, Internet Explorer, My Documents, Antivirus, etc.
Task manager: Plain stripe that displays buttons of all currently running tasks.
System tray: Right most part of the taskbar. It has icons of the tasks running in the background but are not
displayed on the screen e.g. Time and Calendar etc. To display the task simply double click its icon.
Sidekick
Common Start Menu Items: menu
42
All Programs – which displays a list of all programs installed in the computer.
My Recent Documents – which lists the last 15 recently accessed files.
Control Panel – provides tools which user can use to maintain and make changes to the computer setup.
Control panel – provides options for you to customize the appearance and functionality of your computer, add
or remove programs, and setup network connections and user accounts.
My computer – give access to, and information about, the disk drives, cameras, scanners and other hardware
connected to your computer.
Search –opens a window where you can pick search options and work with search results incase the user
forgets file or folder name or its location.
Help and support – opens a central location for help topics, tutorials, troubleshooting and other support
services..
Run – enables the user to: Install programs on the hard disk, open files and folders from a storage location,
and Run programs from removable media. It also opens a program, folder document or a web site.
Log on / log off: Log on is a security measure that restricts unauthorized users from accessing computer
resources. It prompts the user for a User name and Password in order to gain access. After using the computer
Log off the computer before leaving.
Booting Up
There are essentially two forms of booting - the soft boot and the hard boot. The cold boot or hard boot
involves powering the computer up from an initial zero power supply. A warm boot or soft boot on the
other hand takes place when a software application or operating system triggers the computer to perform a
reboot.
A successful boot is dependent on 3 conditions - the hardware, BIOS and operating system files to function
without errors. When an error occurs, you will be notified by error messages, beeping sounds or in the worst
scenario, a blank screen.
Boot-up Process
The boot-up process is a list of detailed procedures that the system undergoes to perform all system checks and
load all necessary files to bring the computer to an operable state
The Windows XP boot-up process comprises of the following procedures:
a. The Power-On Self Test Phase
b. BIOS ROM Phase
c. Boot Loader Phase
d. Operating System Configuration Phase
e. Security & Logon Phase
Logging On to Windows XP
You must log on to the PC before you can use it. Each user is given a user name and a password which
must be entered in the log-on screen before Windows will start up. When you log on you will have access to
your own personal space.
The default Login screen for Windows XP computers is appears when you switch on the machine. To
login; Enter your user and password in the respective boxes.
When you enter your password, Windows XP will display a series of ●●●●●●●●●●●s to
protect your password from wandering eyes.
Press ENTER on the keyboard or click OK
Windows XP Desktop
43
Desktop is your work area on which program and files icons are located. it is basically a workspace
where you can access everything you need to operate your computer, such as system components,
applications, the Internet, etc
The desktop contains: icons
44
• Start button: one of the most important tools you will use while working with Windows XP.
The Start button allows you to open menus and start applications.
• Taskbar: primarily used to switch between open windows and applications
• Icons (or graphical pictures): represent applications, files, and other parts of the operating
system. By default Windows XP provides you with one desktop icon, the Recycle Bin. Learn
more about the Recycle Bin in a later module.
• My Computer. The My Computer icon provides access to the resources on your computer. You
can access your drives and other peripherals by
clicking on the My Computer icon. You can also access the Control Panel through My Computer.
• Internet Explorer. The Internet Explorer icon launches the Internet
Explorer browser.
• My network places. If you are working on a network, this displays all of
the computers on the network
• System Tray. The part of the taskbar that holds the clock, volume control,
and icons for other utilities that runs in the background of your system.
• Recycle Bin. This is where you dump any files you want to delete.
4.2 Starting a Program
1. Click the Start button, the Start menu will pop up. 2. Point your cursor to All Programs. A Menu
listing the different program categories pops up.
45
3. Point your cursor to Microsoft Office Another menu will appear to the right of the All Programs menu,
as shown below. 4. Click on Microsoft Word.
Parts of a Window
Windows contain buttons and menus to control the program and window.
Windows are used in most programs, but once you learn the window of one program, you will be
familiar with the windows for most programs since the window, menu and button layout appears in just
about every window program.
Toolbar
Close Button Closes the window or program, removing it from the screen and the computer’s memory.
Minimize Button Minimizes a program from view. The program is still ready for use and can be found in
the task bar.
46
Maximize Button Enlarges the window so that it fills the entire screen, allowing
you to see your entire workspace. Notice, when a window is maximized, this button is not shown.
Restore Button When a window is maximized, this button is shown. Clicking it will make the window
smaller.
Menu Bar Controls what a program does. The menu functions listed will change from program to program,
but the bar is always located at the top.
Status Bar Displays information about the program, such as instructions or special information.
Title Bar Displays the name of the program and name of the file in use.
Main Window .This is where you work within a program. If it is Microsoft Word, this is where
you would type, if it is a web browser this is where the web page would be displayed.
Toolbar. Have shortcuts to the menu items
More than one person may use your computer. For example several coworkers may be able to access
your computer on a computer network. Windows XP allows everyone who uses your computer to have
separate computer accounts. A computer accounts tracks each person's unique settings, documents, and
email accounts.
Windows XP even enables you to log off the computer so someone else can log on without having to
restart the computer.
To log off/switch users:
47
If you're experiencing computer problems or have installed something new, you can simply restart your
computer.
To restart the computer:
Always turn off or restart your computer using this method. Do not turn off your computer by switching
the power off and on. If you do so, you may damage Windows XP.
4.3 Working With Files and Folders Open
your Folders
• Double click my computer and locate your file.
• Double click on the folder.
• The contents of the folder will be displayed in the open window. To get back to the previous
folder, click the Back Button.
Creating a Folder
• Locate the place to create your folder e.g. My Documents, Desktop, C Drive
• Go to File – New – Folder. Or if creating on the desktop right click on the desktop and use the
new option to create a folder.
• The folder will appear at the bottom of your list. When it displays as a black rectangle with
the words New Folder highlighted in blue, it is prompting you to give it a name. Type the
name of your folder and hit Enter.
Renaming a Folder
To rename an existing folder, move your mouse over the name and right click. A menu will appear. Close
to the bottom you will see the word Rename. Click it,and the black rectangle with the word highlighted
in blue will appear. Rename your folder and hit Enter.
Deleting a folder
• Right click on the folder and select delete or.
• Select the file, go to file menu and select delete
• A dialog box appears asking if you want to delete the folder, click yes Once files are deleted they
go to the recycle bin which is a holding or storage location for files not required. Such files are still in
the hard disk. These files can be retrieved from recycle bin as long as recycle bin have not been emptied.
48
Retrieving files
Go to recycle bin.
Locate the file and right click on it and select restore.
Moving and copying files in folders
Using menu command
• Select the file
• Go to edit and click on copy
• Select the folder
• Go to edit and click on paste. By dragging
• Click on the file and hold
• Drag it to the folder and release the button
Procedure of creating shortcuts
• Locate the item
• Right click and select shortcut
• Drag the shortcut created to the desktop.
To set a program to start when windows start
• Right click on the start button and select open.
• Click on the program or file you want and hold and drag it to the start menu on the icon for
programs.
Printing
If any printers are already set up their icon appears in the printer folder (on start, then printers and faxes).
To set up a printer;
Click start menu, control panel. Select printers
and other hardware.
Chapter Review Questions
5. Explain the steps you would follow to create a folder in my documents location.
49
Word processors are programs that enable you to Create, Edit and Format documents. Examples of word
processors are, Microsoft Word, Word perfect, Word star.
Microsoft Word (MS-WORD)
Ms Word is a powerful word processing program that helps the user create, edit, format and save documents.
The Ms Word screen contains various features. The common ones are:
1. TITLE BAR: This bears the name of the application followed by the name of the current
document or the file.
2. TANDARD BAR: It contains shortcut command buttons for some of the commonly used commands.
3. MENU BAR: It contains menus. Each menu has a set of commands.
4. FORMATTING BAR: It has formatting features and commands e.g. B I U
5. DRAWING BAR: It consists of drawing tools.
6. STATUS BAR: Gives information about the current selection or cursor position.
50
Ms-Word Screen
When the program starts, the following document window will be displayed on
the screen.
Menu bar Toolbars
Title bar
Vertical
Scroll
Bar
Blinking
Cursor
51
Closing
◆ Click close button on the Ms- Word desktop or
◆ From the file Menu click Exit.
DO THIS
A word Drag over the word or Double click it
A graphic Click anywhere within the graphic
A line of text Drag over the text or Double click at the start of line
A sentence Hold Down Ctrl key and click anywhere in the Sentence A paragraph
Triple click anywhere in the paragraph to select
Entire document From Edit, click Select All
To Italicize text
◆ Select or highlight the text.
◆ In the format menu click font.
◆ Under font style choose and click italic.
◆ Click Ok.
To underline text
◆ Select or highlight the text.
◆ In the format menu click font.
◆ Under underlining choose and click the underlining desired.
52
◆ Click Ok.
Change case
• Highlight or select the text.
53
Add a background
You can add different backgrounds to Word documents.
1. On the format Menu, point to background and then check the color you want or click more
colors to see additional color choices. Click fill effects for special effects such as textures.
2. Select the option that you want.
1. From the insert menu, select pictures, and then move to word art and click.
2. Select and click the word art style desired.
3. Type your text in the area “YOUR TEXT HERE”
4. Click Ok.
Insert a picture
You can insert a clip art or a picture from the clip Gallery.
1. Position the insertion point(cursor) where you want to insert a clip art or a picture.
54
2. From the Insert menu, point to picture then click art then click the clip art tab.
3. Click a clip art category then choose a clipart and click insert clip.
undomistakes
In the edit menu, click undo or click the Undo button on the standard toolbar.
55
To remove a header /footer - refer to removing page numbers Copying and Pasting Text
An existing piece of text may be required in a different document. Ms word allows the user to copy
this text rather than retype then paste it to the required area. when text or graphic is copied or cut, it is
stored in the clipboard and can be pasted into as many documents as desired.
Moving text
◆ Select the text to move.
◆ Select Edit, Cut or click cut icon on the standard toolbar.
◆ Position the cursor where you want the text placed.
◆ Select Edit, Paste or click paste icon on standard toolbar.
Note: When you cut, the text is completely removed from the original location.
To find text
◆ On the edit menu, click Edit and choose Find.
◆ In the find what box, type the word/text being sought
◆ Click find next button
◆ To close the dialogue box, click cancel button
To Replace Text
◆ You can find and replace test at the same time
◆ On the edit menu, click edit and choose replace
◆ In the find what box type word / text as above
◆ In replace with box type the word/ text to replace the sought word/text
/Click replace all button
◆ To close the dialogue box click cancel button
Sorting
Information in the table can be sorted in either ascending or descending order
Option 1
Using the column button on the standard toolbar
1. Highlight the text to be columned.
2. Click the column button on the standard bar.
3. Select the number of columns you want.
Option 11
This command control other options i.e. width, spacing, line between columns etc.
1. From the format menu choose columns.
2. Select a column format under preset i.e. one, two, three etc.
3. Type or select the number of columns in the number of column box (if it is not included under
preset in step two above)
4. To insert a line between columns click the line between the check box.
5. Click Ok.
58
Templates
A template is a document that contains predefined settings. The use of templates ensures that there is
consistency between documents.
Mail Merging
If you had to type the same form letter 100 times, you know what boring and back breaking work it
can be. Never again, by setting up the form letter as a Ms Word merge documents, you need type the letter
only once.
STEP 1
1. From the tool menu, click Tool and choose Mail Merge…
2. Under Main document choose Create button
3. Choose form letters…
4. Choose active window button
STEP 2
60
6.
5.8 Chapter Review Exercise
Definition of a computer
A
computer is an electronic device capable of executing instructions, developed based on
algorithms stored in its memory, to process data fed to it and produce the required results
faster than human beings.
♣ Supercomputer
♣ Mainframe computer
♣ Minicomputer
♣ Workstations
♣ Personal computer
BASIC UNITS
Main Memory
Backing Storage
61
CHAPTER SIX
SPREADSHEETS
Applications of Spreadsheets
1. Can be used to record sales, produce invoices and compile statements.
2. Researchers can compile and analyze their results.
3. Teachers can compile their students’ marks and produce overall results.
4. Clerks and secretaries can easily create tables of figures and manipulate.
START EXCEL
Option 1
Click the start button moves to programs move to Microsoft excel and click
Option 2
Click the excel button on the Microsoft shortcut if only if the option available
62
worksheets made up rows and columns of workbook therefore allows you to organize various
kinks of related information in a single file (or workbook)
Worksheet
A worksheet is one sheet in an Excel workbook. Each worksheet consists of 256 columns and 65,536
rows.
Columns
Columns are the vertical divisions of a worksheet that are identified by letters. The columns begin with
A and proceed through the alphabet. The 27th column is AA followed by AB, AC, and this convention for
naming continues through the entire alphabet until you end up with the last column (column 256)
which is designated IV.
Rows
Rows are the horizontal divisions of a worksheet and are identified by numbers.
Cells
A cell is the intersection of a row and a column. Each cell has an address that consists of the column
letter and row number (A1, B3, C5 and so on)
Each cell is capable of containing different types of information e.g. text, number, times, formulas. Excel data
basically comes in two varieties: labels and values.
A label is a text entry consisting of alphanumeric characters. It is called a label because it typically
provides descriptive information such as the name of a place, person, e.t.c. A label has no numerical
significance in Excel.
A value is data that has numerical significance. These include numbers, dates
and times that you enter on your worksheet. Values can be acted on by formulas and functions.
63
Tool
bars Menu bar Formula bar Column Headings
Worksheet tabs
Status bar
Row Headings Cell Selector
Element Description
Formular bar When you enter information into a cell, it appears in the Formula
bar.You can use the formula bar to edit the data later. The
cell’s location also appears.
Row Headings The numbers down the side of the worksheet, which Identify
the rows in the worksheet.
64
Cell Selector The dark outline that indicates the active cell. It Highlights the cell you are
currently working in.
Worksheet tabs These tabs help you move from worksheet to Worksheet
within the workbook. The active Worksheet is displayed in
bold.
Active cell It indicates the cell in which the typed data will be entered. It is
also known as the current cell.
NB
The first time you click ‘save as’ from the file menu, the Documents folder is displayed by default as
the folder to save in.
Close a workbook
On the file menu click close.
6.3 WORKING WITH WORKBOOKS AND WORKSHEETS
65
When you move to a cell, it becomes the active cell (the selected cell in which
data is entered when you begin typing. Only one cell is active at a time .A heavy border bound the active
cell)
To see the different area of the sheet, use the scroll bars.
Switch to another sheet in a workbook
Click the sheet tab
(A tab near the button of a workbook window that displays the name of a sheet To display a shortcut
menu, click a tab with the right mouse button .To scroll through the sheet tabs, use the tab scrolling
buttons to the left of the tabs)
Insert a new worksheet
On the insert menu, click worksheet
Delete sheets from a workbook
1. Select the sheets you want to delete.
2. On the edit menu click delete sheet.
Rename a sheet
1. Double click the sheet tab.
2. Type a new name over the current name.
Hide a sheet
1. Select the sheet you want to hide.
2. On the format menu, point to sheet and click Hide.
Use a slash or a hyphen to separate the parts of a date, for example, type 8/6/99 or jun-99
To enter a time based on the 12-hour clock, type a space and then a or p after the time for example, 9.00 p.
Otherwise, Microsoft Excel enters the time as AM.
Enter a formula
1. Click the cell in which you want to enter the formula.
2. Type =(an equal sign)
3. Enter the formula.
4. Press ENTER.
To increment the series by a specified amount, select the next cell in the rang and enter thext item in
the series. The difference between the two starting items determines the amount by which the series is
incremented.
2. Select the cell or cells that contain the starting values.
3. Drag the fill handle over the range you want to fill.
Y To fill in increasing order, drag down or to the right.
Y To fill in decreasing order, drag up or to the left.
Cancel or undo an entry
To cancel an entry before you press ENTER, press ESC.
To undo a complete entry, click Undo button on the standard tool bar.
To select Do this
67
To cancel a selection of multiple sheets in a workbook, click any unselected sheet. If no unselected sheet is
visible, right click the tab of a selected sheet then click Ungroup Sheets on the shortcut menu.
Undo mistakes
To undo recent actions one at a time, click Undo on the edit menu.
To undo several actions at once, click the arrow next to Undo button on the standard toolbar and
select from the list. Microsoft Excel reverses the selected action and all actions above it.
To undo several actions at once, click the arrow next to Undo button on the standard toolbar and
select from the list. Microsoft Excel reverses the selected action and all actions above it.
68
Insert rows
1. To insert a single row, click a cell in the row immediately below where you want the new row. For
example, to insert a new row above Row 5,click a cell in Row 5.
To insert multiple rows, select rows immediately below where you want the new
rows, select the same number of rows you want to insert.
Insert columns
1. To insert a single column, click a cell in the column immediately to the right of where you want to insert
the new column. For example, to insert a new column to the left of column B, click a cell in column B
To insert multiple columns, select columns immediately to the right of where you want to insert the
new columns. Select the same number of columns as you want to insert.
69
3. In the Font size box, click the font size you want (on the formatting toolbar)
Make selected text or numbers bold, italic or underlined
1. Select whole cells or the specific text in a single cell that you want to format.
2. On the formatting toolbar, click a button for the format you want.
To make text Click
Bold B
Italic I
Underlined U
To apply a different color, click the arrow next to Font Color A and then click a color on the palette.
70
The selected graphic is repeated to fill the sheet. You can apply solid color shading to cells that
contain data.
2. To change the column width for multiple columns, select the columns you want to change.
Then drag a boundary at the right of a selected column heading.
3. To change the column width for all columns on the worksheet, click the Select All button (at
the left edge of the borders) and then drag the boundary of any column heading.
4. To make the column width fit the contents, double-click the boundary to the right of the column
heading
71
3. To change the row height for all rows on the worksheet, click the Select All button (at the left
edge of the borders) and then drag the boundary below any row heading.
4. To make the row height fit the contents, double-click the boundary below the row heading.
Procedure
1. Position the mouse pointer right on the block like mark in the bottom right corner of the active cell.
2. Click and drag to extend a series.
6.7 OPERATORS
Operators are signs or symbols which specify the type of a calculation that you may perform in the
elements of a formula.
There are four different types of calculation operators i.e.
1. Arithmetic
2. Comparison
3. Text and
4. Reference
ARITHMETIC OPERATIONS
They perform basic mathematical operations e.g. addition, subtraction,
multiplication and division.
COMPARISION OPERATORS
They compare two values then produce a logical value i.e. TRUE or FALSE.
OPERATOR EXAMPLE
72
73
REFERENCE OPERATORS
OPERATOR EXAMPLES
:(COLON) Range operators which
produces one reference for all the cells B5:B15
between two references.
FORMULAS
A formula is an equation that analyses data in a worksheet. Formulas perform operations e.g. addition,
multiplication, comparison etc. They can refer to other
cells on the same worksheet as well as other sheets in the same workbook or
even in other workbooks .A formula must always begin with an equal sign or symbol e.g.=10-5. The
result of the formula is then displayed in the cell.
You can use parentheses to change the syntax (structure or order of elements)
e.g. in the formula =5+2*3 Excel carries multiplication first .If the parentheses are used, the syntax
changes.
E.g. =(5+2)*3
FUNCTIONS
This is a special kind of predefined by Excel
The specific arguments required by a function depend on what the function does.
74
AVERAGE: If cell A1 contains value 12 and B1 value 8,the function =average (A1:B1) returns 10.
MODE: This is the most frequently occurring or repetitive value in an array of data
syntax e.g. =mode (10,3,4,3,5,3,7,3,4)
N/B If a data set has no duplicate values, mode returns the # N/A error value.
MEDIAN: This is the middle value or the numbers number in the middle of a set of
Syntax e.g. =median (2,4,6,8,10)
Numbers in the middle e.g.
=Median (1,2,3,4,5) equal 3
=Median (1,2,3,4,5,6,) equals to 3.5 and this is the average of 3+4
Error Description
#DIV/0! The formula is attempting to divide by zero. Check the cell references for
blanks or zeros that may have resulted if you deleted a cell referenced by the
formula.
#N/A The formula refers to a cell with a #N/A entry or a cell that
contains no value. This error warns you that not all the data referenced by a
formula is available.
#NAME? Excel doesn’t recognize a name you entered in a formula. Verify that all
names in the formula exist and define any missing names.
If applicable, verify that you used the correct function name.
#NULL! The formula specifies two areas that don’t intersect. Check to
see
if you entered the cell or range reference incorrectly.
Remember to
use commas (not spaces) between function arguments.
#NUM! There is a problem with a number used in the formula. Check for the
correct use of function arguments.
#REF! A cell reference in the formula is incorrect. Check for changes to cell
reference caused by deleting cells, rows or columns referenced by the
formula.
#VALUE! The formula contains the wrong type of argument or
75
Procedure
1. From the tools menu choose and click Data Analysis.
2. From Analysis tools choose and click Descriptive statistics.
3. From the resulting dialogue box, choose as desired as explained below;
Input Range
Enter the cell reference for the range of data you want to analyze. The reference
must consist of two rows. or more adjacent ranges of data arranged in columns or
Grouped By
To indicate whether the data in the input range is arranged in rows or in columns, click Rows or
Columns.
76
Output Range
Enter the reference for the upper left cell of the output table. This tool produces two columns of
information for each data set. The left column contains statistics labs and the right column contains the
statistics. Microsoft Excel writes a two- column table of statistics for each column or row in the input
range depending on the Grouped By option selected.
New Workbook
Click to create a new workbook and paste the results on a new worksheet in the new workbook.
SUMMARY STATISTICS
Select if you want Microsoft Excel to produce one field for each of the following statistics in the output
table: Mean, Standard Error (of the mean), Median, Mode, Standard Deviation, Variance, Kurtosis,
Skewness, range, Maximum, Minimum, Sum, Count, Largest (#), Smallest (#), and Confidence Level.
To merge any selection of cells within a row or column, click cells on the Format menu, click the Alignment
tab and then select the Merge cells check box.
77
To use only selected parts of the autoformat, click Options and then clear the check boxes for the
formats you don’t want to apply.
1. Select the cells that contain the data that you want appear in the chart.
2. Click Chart Wizard on the standard tool bar or click insert menu then chart.
3. Follow the instructions in the Chart Wizard.
78
79
Sorting a list
You can rearrange the rows or columns of a list based on the values in the list by sorting. When you
sort, Microsoft Excel rearranges rows, columns or individual cells by using the sort order that you
specify. You can sort lists in ascending (1 to 9,A to Z) or descending (9 to 1,Z to A) order and sort
based on the contents of one or more columns.
80
Autofilter
Displays only those rows that match the value in the active cell and inserts Autofilter arrows to the
right of each column label.
Show all
Displays all of the rows in a filtered list.
Create a spreadsheet using the following information. You have been asked to prepare a spreadsheet to
show the profit and loss figure for the last financial year. The profit and loss should be shown as a
dollars and as a percentage.
1) Enter the raw data below, applying as many presentation Features (Font, Font Size, Font Colour, Number
Formats and Colour, Cell Shading, Text Rotation, etc) to it as you wish.
3) Give your spreadsheet an appropriate title and center it across your spreadsheet.
5) Adjust the column width and row height to suit the layout you have selected.
6) Create formula's to calculate the profit / loss as a currency for each month.
7) Create formula's to calculate the profit / loss as a percentage for each month.
8) Create formula's to calculate the Annual Totals for the Income, expenditure, and profit / loss.
9) Create a formula to calculate the profit / loss for the whole year.
81
82
CHAPTER SEVEN
These are software that allow records to be entered in the system and to be
retrieved in a specified format. Examples are Ms Access, Paradox, Dbase, FoxPro, Sybase.
From the above examples, we shall look at Ms Access.
7.1 MS ACCESS
MS Access is a database tool used to store, maintain and use a collection of information that is
organized to serve a specific purpose.
Database objects
Tables, Queries, Forms, Reports, Macros, Modules.
Tables
Collection of data about a specific subject e.g. customers, employees e.t.c.
In a table, data is organized in fields (columns) and records (rows)
83
(a) Field name: - these are column headings for the table being created.
(b) Data types: - the attribute of a field that determines the type of data it can
hold e.g. text, Numeric, Currency etc.
(c) Description: - This column is optional but can be used to give a detailed of
the field name.
Primary key: - This is a field that is used to uniquely identify each record stored in a table.
Queries
A query is a type of database search. It enables you to retrieve data that has met conditions you specify,
indicating data from tables.
The word ‘query’ literally means ‘to ask’. Access queries provide a way of asking about your data. When
you design a query, you identify the fields to be included and the records to be retrieved from one or more
tables.
You can as well update or delete multiple records at the same time, perform built in or custom calculations
on your data.
Forms
They are used for adding new data, editing or displaying existing data. This data can be in a table or a
query. Information entered directly in a form will appear in Tables automatically.
Reports
The desired result of any database is to provide information in the form of reports. You can print
reports from tables or queries in any desired format. Reports are used to summarize and display
data from your database. It displays the most up-to-date information.
Modules
They are collection of codes using Access Basic programming language. If programming is
necessary, you can write modules.
84
Database definitions
1. Field: This is any piece of information in a database e.g. Names, Age, Birth
date.
2. Record: It is a collection of several related fields.
3. Database File: This is a collection of several records.
Applications of databases
1. Educational applications: Preparing students’ reports, class schedules.
2. Retail applications: This may include sales projections and Quotas,
Market analysis e.t.c.
3. Legal applications: This may include client information and case
schedules.
4. Financial applications: This may include stock market forecasting and
end of year financial reports.
PLANNING REQUIREMENTS
In order to plan an efficient database you need to ask yourself some questions, these
include.
The subject/object here is a student and the suggested field names could be;
i) Student’s name
ii) Student’s registration number
iii) Student’s address
iv) Parent’s name
v) Age
vi) Sex
vii) Course taken
viii) Subjects
ix) Hours a subject takes
x) The lecturer
xi) Lecture’s rate per hour
xii) Tuition fee
85
All the above listed is information about one object – student. There is need
however to limit the list to the subject area only.
Let us assume we wish to store student fee payment records only. This will
reduce above list to the following.
i) Student’s name
ii) Student’s registration number
iii) Student’s address
iv) Course taken
v) Age
vi) Sex
vii) Date of admission
viii) Amount paid
NB: The database name (Macarl student record system) is displayed on the title bar of the database
window.
86
87
A unique field is required in every table. This is an identification key like the national ID card that
identifies each person individually. The unique key is referred to as primary key in Access. It is useful
when you want to avoid entering duplicated records.
If what you design does not have a unique field, Access lets you include a special field called
AutoNumber which contains sequential or random numbers that Access automatically generates as you
add new records.
88
N/B: If Access has already taken AutoNumber as the primary key, delete the
record by choosing it from the border and pressing delete key from the
keyboard.
N/B:
◆ Datasheet view allows you to add records while design view. you modify the table in
◆ You can rename a field in data sheet view by double clicking the field and typing a new name
Y Sorting helps to quickly locate the highest or the lowest value in a list E.g. you can sort to know
who has paid the highest amount.
Y It also helps arranging data in order of priority.
Procedure
1) Position the cursor in the field you want to sort.
89
7.4 RELATIONSHIPS
After setting up different tables for each subject in a database, there is need to let access know how to
bring the information back together. The first step in this process is to define relationships between the
tables. After that, queries, forms, reports can be used to display the information from all the tables at once.
A relationship is an association established between common fields in two tables. It can be one-to-one, one-
to-many or many-to-many relationship. A relationship works by matching data in key fields usually a
field with the same name in both tables.
A one-to-one relationship
In a one-to-one relationship, each record in Table A can only have one matching
record in Table B and each record in Table B can have only one matching record
in Table B.
A one-to-many relationship
A one-to-many relationship is the most common type of relationship. In a one-to-
many relationship, a record in Table A can have many matching records in Table
B, but a record in Table B has only one matching record in Table A.
A many-to-many relationship
In a many-to-many relationship, a record in Table A can have many matching
records in Table B, and a record in Table B can have many matching records in Table A. This type of
relationship is only possible by defining a third table (called a junction table) whose primary key consists
of two fields, the foreign keys from both Tables A and B. A many to many relationship is really two
one-to-many relationships with a third table.
90
Creating a query
Query is a database search. It enables you retrieve data that meets certain criteria.
You can use a query to create a table, a report or a form. When you have a
frequently asked query, you can save it so that each time you need the information, you just run
the query instead of opening the table.
Saving a query
1. Close the query box by clicking ‘X’ button
2. Click yes when prompted to save the query.
3. Type the name of the query in the ‘save as’ dialog box. In our case ‘students
balance s’
4. Click Ok
Procedure
1. Create a new query in the design view.
91
92
6. Select the field you want delete records from. Choose the criteria of the records e.g. <01/10/1999
7. Click the run button ‘! ‘
8. A dialog box appears warning you about running the query. Click yes to delete then close the query.
9. Save the query.
TYPES OF TOTALS
93
3. The ‘Make Table’ dialog box appears. In the ‘Table Name’ type the name of the table you want
to create, or click the one you want to replace from the drop down menu.
4. Click “Current Database” to put the new table in the open database, or “Another Database”
and type the name of the database you want to put the new table in.
5. Click Ok.
Creating a Parameter query
A parameter query is a query that when run displays its own dialog box prompting you for information,
such as criteria for retrieving records or a value you want to insert in a field. You can design the query
to prompt you for more than one piece of information; for example, you can design it to prompt you for
two dates. Microsoft Access can then retrieve all records that fall between those two dates.
To prompt the user for one or more characters to search for, and then find records that begin
with or contain the characters the user specifies, create a parameter query that uses the LIKE
operator and the wildcard symbol (*). For example.
For a field that displays dates, you can display the prompts "Type the beginning date:" and "Type the ending
date:" to specify a range of values.
Procedure
1 .In the database window, click the query tab.
2. Click the ‘New’ button and then select design view.
3. Click OK.
4. The show table dialog box appears. In this dialog box, you select the
table(s) that you want to base your query on.
5. Select the table and click Add.
6. Click close to close the dialog box and get to the query window.
7. Place the cursor in the row for ‘field’ and click to chose the field(s) you
want in your query.
8. In the field's Criteria cell, type Between [Type the beginning date:] And
[Type the ending date:].
9. Click the run button ‘!’ on the toolbar.
10. Save the changes you have made.
94
3. Click OK.
4. The show table dialog box appears. In this dialog box, you select the table(s) that you want
to base your query on.
5. Select the table and click Add.
6. Click close to close the dialog box and get to the query window.
7. Place the cursor in the row for ‘field’ and click to chose the field(s) you want in your query.
8. In the field's Criteria cell, type
LIKE [Enter the first character to search by:] & "*"
7.6 FORMS
95
(d) Click the name of the table or query that includes the data you want to base your form on.
(e) Click Ok
Procedure
1) In the database window, click the tables tab then click new or use an existing table.
2) Click design view then Ok
3) Designate one of the field for the O.L.E. The field name could be photo, picture etc. For its
data type, select O.L.E. objects.
4) Close the table and save the changes.
5) Open the table.
6) Right click the O.L.E fields(s) then insert object.
7) From the object type list, select a category i.e. Microsoft clip gallery then
click Ok.
8) Select a clip then click insert.
NB/ The object will always be seen whenever you open a form based on the table or query that has
the O.L.E field.
96
7.7 REPORTS
Reports are used to analyze data or present it in a certain way in print. A report could be that which
groups data and calculates totals and another different data formatted for printing mailing tables.
Procedures
97
Required
1. Create a data entry form in design view and apply your own design in the form
2. Enter the above records using the form above
3. The semesters fees is 60,000 Kshs. Produce a list of students who have cleared the fees
4. Produce a list of Female students taking a course in education
5. Produce a list of students who were born before the year 1990
6. Product a report that will show the current students grouping them by their respective courses
7. Prepare a report showing a list of students who have cleared their fees
8. Prepare a macro that will open no 3 above and open the report on 7 above.
98
CHAPTER EIGHT
PRESENTATION GRAPHICS
MS POWERPOINT
INTRODUCTION
What is PowerPoint?
This is a complete presentation graphics package.
It gives you everything you
need to produce a professionally looking presentation. It enables you to express your ideas in graphics, text
and objects all in one.
What is presentation?
It is a collection of slides, handouts, speaker’s note, and outline all in one file. As
create a slide you are creating a presentation, giving it a format that will carry
through from beginning to the end.
What is a slide?
Slides are individual pages of your presentation. Slides have titles, text, drawn
objects, shapes, clip arts, and visuals created with other application.
Starting PowerPoint
From the start menu select programs and the move to PowerPoint and click.
99
1. AutoContent Wizard: This contains suggested contents and designs. The AutoContent wizard
contains sample presentations for a variety of topics
e.g. a company meeting or an event planning.
2. Templates: This determines the presentation’s design but does not include contents.
3. Blank presentation: This enable you to choose the layout desired hence helping you to have a
customized presentation.
100
Applying background
1. Choose the slide you want to apply background (if you have several) by
scrolling.
2. In the format menu choose background and click.
3. In the drop down list choose the color desired (click more colours to view more)
4. Click apply.
Applying design
1. Choose the slide you want to design.
2. In the format menu choose, apply design, and click.
3. In the resulting dialog box, choose the desired design.
4. Click apply.
101
◆ Slide or notes page Drag the vertical scroll bar until you get
The slide.
◆ Outline Double click the slide icon.
◆ Slide sorter Double click the slide.
◆ Slide show Right click, point to ‘GO’ on the shortcut
Menu, and click slide Navigator.
Deleting a slide
1. Select the slide you want to delete
2. On the Edit menu, click Delete Slide
PowerPoint comes with its own set of pictures in the clip art gallery. The clip art gallery includes a wide
variety of clip arts that makes it easy for you to dress up your presentation with professionally designed
images. You will find everything from maps to people and from buildings to scenic backgrounds.
102
N.B : In the slide layout, you can choose a layout with the organization chart.
Using Templates
This option helps you to create slides with a particular chosen design. E.g. Blush,
Fireball, Fan etc.
8.6 ANIMATION
You can animate text, graphics sounds, movies, and other objects on your slides so as to focus on
important points, control the flow of information, and add
103
interest to your presentation. You can have each main bullet point appear independently of others, or you
can have objects appear progressively, one after another.
You can set up the way you want each bullet point or object to appear on your slide e.g. to fly in from
the left and whether you want other bullets or objects to dim or change color when you add a new
element. You also change the order of timing of your animation.
104
8.8 PRINTING
You can print your entire presentation either in black and white or color.
1. Open the presentation you want to print.
2. Click print from the file menu.
3. In the resulting dialog box, choose and click as appropriate.
4. Click okay.
8.9 Margins
PowerPoint does not have fixed margins as in word processing programs. You can place text and objects
right up to the edge of a slide. You align objects by resizing their placeholders.
105
1. You are the marketing manager of Mount Kenya University and you are
required to make a presentation at the Inter-University conference about Mount
Kenya. The presentation should not be less than 15 slides and should also have the following features;
- Slides with the different layouts i.e Organisation chart, Chart, Tables, clip art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
2. You are the marketing manager of Mount Kenya University and you are
required to make a presentation at the Inter-University conference about Mount Kenya. The presentation
should not be less than 15 slides and should also have the following features;
- Slides with the different layouts i.e Organisation chart, Chart, Tables, clip
art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
3. You are the marketing manager of Mount Kenya University and you are required to make a
presentation at the Inter-University conference about Mount Kenya. The presentation should not be less
than 15 slides and should also have the following features;
- Slides with the different layouts i.e. Organization chart, Chart, Tables, clip
art
- Custom animation for the slides with animated text and images
- The slides should run automatically without clicking
- The presentation should be 3 minutes long in total
- Apply a design
106