Tag Archives: computer studies notes pdf

COMPUTER STUDIES NOTES FORM 1-4 (ALL TOPICS)

COMPUTER STUDIES NOTES FORM 1-4

INTRODUCTION TO COMPUTERS

Definition of a Computer

It is an electronic device that transforms data to information.

Data: Raw facts. Information: Processed data.

The System Unit

It houses the Central Processing Unit (CPU), motherboard, storage devices and other peripheral devices.

Peripheral Devices

Devices connected directly or indirectly to the mother board.

Classification of Computers

  1. Size and Memory
  2. Purpose
  3. Functionality

COMPUTER NOTES IN PDF FREE DOWNLOADS

COMPUTER STUDIES NOTES FORM 1-4

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking Schemes, Topical revision materials, Syllabus and Many more

Classification according to Size and Memory

Supercomputer

Mainframe

Minicomputer

Microcomputer

Desktop Laptop Advantages

  • Portable
  • Ruggedness: Designed to withstand travelers
  • Display active color screen
  • Power batteries serve as ups

Disadvantages

  • Less expansion options
  • They are easily stolen

Palmtop

Classification according Purpose

  1. General computers

This computer can do or handle a variety of tasks when loaded with appropriate programs.

  1. Special computers

They are designed to serve a specific purpose or to accomplish one particular task.

  1. Dedicated Computers

They can handle any task but it is a dedicated to one task.

 

Classification according to Functionality

  1. Digital computers: They handle discrete data.
  2. Analog computers: Deals with data that keeps on changing in time (Continuous data).
  3. Hybrid computers: The computers can handle both analog and digital data.

 

Elements of a Computer System

  1. Input: Data or raw facts.
  2. Processing: Act of transferring raw facts into meaningful output or information.
  3. Output: Processed data or information.
  4. Storage:

 

Control unit:

Functions of the control unit are-

  • Avails instructions in sequence
  • Interprets instructions
  • Initiates the appropriate actions thereby controlling all the processes

 

Development of Computers

First Generation Computers (1940 – 1958)

Used thermionic valves or vacuum tubes

Advantages

  • Vacuum tubes technology made it possible  with advent of electronic digital computers
  • It was the fastest calculating device that time.

Disadvantages

  • Too bulky
  • Unreliable
  • Had limited memory
  • Generated a lot of heat
  • Consumed a lot of power

Examples

IBM 650, UNIAC

 

Second Generation Computers (1958 – 1964)

They used transistors

Advantages

  • Smaller than first generation computers
  • More reliable
  • Generated less heat than the first generation
  • Less prone to hardware failure

 

Disadvantages

  • Required air condition for cooling
  • Required frequent maintenance
  • It was very expensive

Examples

IBM1401, Honeywall200, CDC1604 e.t.c.

 

Third Generation Computers (1964 – 1970)

They used Integrated Circuit (IC)

Advantages

  • Smaller in size
  • More reliable than the previous ones
  • Emitted lesser heat than the previous ones
  • Less maintenance cost
  • Less power consumption than the first and the second generation

Disadvantages

  • Highly sophisticated for the manufacture of Integrated Circuit
  • Costly

Examples

IBM360, BurroughsB5600

 

Fourth Generation Computers (1970-1989)

The are characterized by the use of Large Scale Integrated Circuit (LSIC)

Advantages

  • Smaller in size
  • More reliable than previous generation computers
  • Generated neglible heat
  • Faster than previous generation computers
  • Less prone to hardware failure
  • Portable

Disadvantages

Highly sophisticated technology in manufacturing of Large Scale Integrated chip

Examples

IBM3033, Buroughs67700

 

Fifth Generation Computers (From 1989)

  • Expected to do parallel processing
  • Based on logical inference operations
  • Expected to make use of artificial intelligence

 

Features of a Computer

  • Automation: Computers work with minimum human intervention once supplied with data and instructions.
  • Accuracy: Computers are ever accurate but entirely depend on the data entered.
  • Speed: Performs tasks in very short period.
  • Storage: Computers can store large volumes of data and information.
  • Versatile: Ability of doing different tasks as per instructions.
  • Diligence: Work for a long period of time without getting bored

 

 

Disadvantages of Computers

  • Computers are very expensive
  • Cuts down on employment opportunities
  • Needs expertise which is expensive to hire and maintain
  • They create eye problems
  • Loss of information if not well managed

 

Areas where Computers are used

  1. Supermarkets: Used to keep in stock control i.e. keep accounts of what is in the store, what has been sold, what is out of stock e.t.c
  2. Offices: First access and receiving information, automate faster message distribution and document processes.
  3. Banks: Special cash dispensing machines called Automated Teller Machine (ATM for cash withdrawal and deposition service. They provide better record keeping and document

processing.

  1. Industries: Monitoring and controlling industrial processes e.g. using robots
  2. Hospitals: Keeping patients records for easier access to treatment and diagnosis.

Computerized diagnosis in laboratories.

  1. Communication: Sending and receiving emails, teleconferencing, telecommuting, facsimile and e-calling.
  2. Transport: Monitoring automobile traffic, aircraft navigation and making flight reservation.
  3. Law enforcement
  • Biometric analysis- study of human biological characteristics to know fingerprints, voice and facial features.

Video cameras e.g. in banks.

  • Development of strong military bases which have international coordination by use of computer radar.
  • Jet fighters are computerized with connection to control centres.
  1. Education: Computer Aided Learning (CAL) and Computer Aided Teaching (CAT).
  2. Domestic and entertainment/ home: used at home for recreation purposes and keeping

budgets.

  1. Library services: Easy access and update of books and other library materials.

 

Advantages of a Computer

  • Stores large amount of information in a limited space
  • Speed: performs tasks in very short periods.
  • Efficiency: creates an all round saving on space and time.
  • Consistency: gives the same results given the same data and instructions.
  • Secrecy: information is fairly protected if computer system is well managed.
  • Versatility: Can do the same thing over and over again without being worn out.

 

Disadvantages

  • Computers are very expensive
  • Cuts down employment opportunities
  • Needs expertise which is expensive to hire and maintain
  • They create eye problem
  • Loss of information if not well managed.

 

 

Computer Laboratory, Safety Precautions and Practice

Considerations for a Computer Laboratory

  1. The number of computers to be installed.
  2. Size of the laboratory.
  3. The number of user that the laboratory can accommodate.
  4. Reliability of a source of power.

 

Safety Precautions and Practices

  1. Behavior in Computer Laboratory
  • Avoid smoking or exposing computer to dust. Smoke and dust damage computer components.
  • Avoid carrying food and beverages: may damage components and liquids may cause rusting and electrical shocks.
  • Avoid unnecessary movement because you may accidentally knock down peripherals.
  • Follow the correct procedure for storing and shutting down computers.
  • Reporting accidents immediately.
  • Ask for assistance.
  1. Ventilation: to avoid suffocation and overheating. This avoids damage of electronic parts.
  2. Lighting: to avoid eyestrains that leads to headaches, stress and fatigue. User may adjust

brightness of computer monitor. Also radiation filter screen may be fitted.

  1. Protection against fire: Use or fit gaseous fire extinguisher.
  2. Dust and dump control
  • Special curtains reduce dust entry
  • Covering computers
  1. Regulate humidity to remain at an optimum of 50%.by the use of humidifier and dehumidifier.

Low humidity allows static electricity to build up and cause damage to computer components. High humidity causes corrosion, destroy devices and electrical faults.

  1. Furniture: Strong and wide enough to accommodate all peripheral devices. User seats must be

comfortable and have straight back rest that allows someone to sit upright to avoid muscle pains and aches.

  1. Burglar proofing:
  • Fit strong metallic grills and locks on doors and windows
  • Don’t welcome strangers to computer room
  • Install security alarms at strategic access points to alert security personnel incase of break in.
  1. Stable power supply: Functions of Uninterrupted Power Supply (UPS)-
  • Regulate high voltage
  • Regulate low voltage
  • Provide temporary power
  • Notify when power goes off.

 

Keyboard Layout

  1. Alphanumeric Keys

Comprises of numbers and all alphabets, symbols like @,!,$,%,^,&,*,(,),?,>,< e.t.c. Other keys

include Caps lock, Enter key, Tab, Spacebar, Back space.

  1. a) Caps Lock: When on letters typed appear in uppercase and when of letters appear in

lowercase.

  1. b) Enter keys: When pressed it forces the cursor to move to the beginning of the next line.

 

  1. c) Tab keys: Used to move the cursor at set intervals.
  2. d) Back space: Deletes characters to the left from the cursor position.
  3. Function keys

They are always located along the top of the keyboard. They are labeled F1, F2 to F12.

  1. Cursor Movement and Editing Keys

Cursor Movement Keys

  1. a) Arrow Keys: Used to move the cursor up, down, left and right.
  2. b) Page up and page down keys: Moves the cursor one page up or down.
  3. c) Home and End keys: Pressing Home key moves the cursor to the beginning of the current

line. End key moves the cursor to the end of the current line.

Editing Keys

  1. a) Insert key: It helps the user to insert or replace a character at the cursor position.
  2. b) Delete (Del) key: This key deletes characters at the cursor position from left to right.
  3. Special PC Operation Keys

They are rarely used singly but in combination with other keys to give special instructions to the

computer. They include SHIFT, CTRL, ALT and ESC.

  1. Numeric Keypad

Consist of a set of numbers 0 to 9 and the arithmetic signs +,-, *, / and are located on the right side of the keyboard.

 

COMPUTER SYSTEM

 

 

Definition: Collection of entities that work together to process and manage data to information.

 

Elements of a Computer System

  1. Hardware- Physical or tangible computer components e.g. keyboard, mouse etc.
  2. Software- Programs installed.
  3. Liveware- The computer user.

 

Hardware Configuration

 

CPU                                         PERIPHERALS

 

ALU   MAINMEMORY CONTROL UNIT                   INPUT   OUTPUT     STORAGE

 

Central Processing Unit (CPU)

It processes data and controls all computer operations. Elements of the CPU are:

Arithmetic and logic unit (ALU)- Performs the actual data manipulation.

 

Control Unit– 1. Fetch phase-Access instruction in sequence

  1. Decode phase-Interprets instructions
  2. Execution phase-execution of commands

 

Main memory

It forms an integral element of the processor. It’s tasks are;

ü   Holds data awaiting processing

ü   Holds data being processed

ü   Holds data that has been processed awaiting to be output

 

Read Only Memory (ROM)

It’s content can be read but cannot be changed during normal computer operations. It is normally

used for permanent storage of data and instructions that remains unchanged for along period of

time.

Types of ROMs

  1. Mask Read Only Memory (MROM): contents cannot be changed once written on it by

manufacturers.

  1. Programmable ROM (PROM): the user rather than the manufacturers can after store data

but once only.

  1. Erasable Programmable ROM (EPROM): the content can be reprogrammed by exposing it to ultraviolet light.
  2. Electrically Erasable Programmable ROM (EEPROM): the content can be erased and programmed using electricity.

Characteristics of ROM

ü   The content cannot be changed unless written in a special type.

ü   Non-volatile: data cannot be lost when the computer is switched off.

 

Random Access Memory (RAM)

  1. Static RAM: the data doesn’t need to be refreshed, it is capable of handling data

extremely faster. It is also reliable.

  1. Dynamic:  The data must be refreshed i.e.  data must be read and written periodically. It stores more information than static RAM.

 

Types of DRAM

1)   Fast Page Mode (FPM)

2)   Extended Data Out (EDO) : improvement on FPM

3)   Extended Correcting Code (ECC): Special DRAM, corrects errors, and used on savers.

4)   Synchronous Dynamic Random Access Memory (SDRAM):  twice fast as EDO. Run at a speed of  system bus up to 100 – 133 MHz

5)   Rhombus Dynamic RAM (RDRAM): has a data transfer rate of 800 MHz

6)   Double-Data  rate (DDR): fast DRAM with module speed at which  SRAM can transfer data to the processor.

7)   Video RAM (VRAM): Special type of memory that is used only with video adapter.

8)   Window RAM (WRAM):  a faster version of video memory.

 

DRAM in system unit on memory chamber of laptops

1)   Dual-inline Package (DIP)

2)   Single-inline Memory Module (SIMM)

3)   Dual Inline Memory Module (DIMM)

4)   Small Outline DIMM (SODIMM)

5)   Micro DIMM

 

Characteristics of RAM

ü   Information can be accessed at any time (random)

ü   Data can be changed

Special Purpose in RAM

  1. Buffers: They provide temporary storage for finished tasks so that the CPU is set free to carry out other activities instead of waiting for all data to be entered in information to be output.
  2. Registers: They hold a piece of data at a time and they are inside the CPU. Examples a)An accumulator: temporarily holds the result of the last step of the Arithmetic and

Logic Unit.

  1. b) An address register: Temporarily holds the next piece of data waiting to be processed.

c)Instruction register: Temporarily holds an instruction just before it is interrupted into a form that the CPU can understand.

  1. d) Storage register: It temporary holds a piece of data that is on its way to and from

the CPU and the main memory.

 

Cache Memory

It helps the processor to access data and instructions faster due to incorporation of small high-

speed type of Static RAM than it would have taken to fasten it from the relatively slow Dynamic

RAM.

 

Types of Cache Memory

  • Level 1 (Primary cache):  located inside microprocessors.
  • Level 2 (Extended cache): may be inside microprocessors or mounted on the motherboard.
  • Level 3 (Latest cache): works like level 2 to optimize system performance.

 

Terms used in the CPU

  1. Chip: A small rectangular piece of silicon on which most circuits are implemented by

extension.

  1. Integrated Circuit (IC): It is a device that is integrated or joint to connect a circuit of several electronic components in a single package.
  2. Large Scale Integration (LSI): Refers to the technology that integrates thousands of

transistors on a single Integrated Circuit (IC). If more than 20000 transistors are integrated the Very Large Scale Integration (VLSI) is used.

  1. Microprocessor: This is the brain of the PC.
  2. Microcomputer system: This refers to computer set of devices require using and operating the computer. This includes peripheral devices.

 

 

 

 

 

 

 

 

 

 

 

 

 

INPUT DEVICES

Devices that accept data from external environment and encode it into a form understandable to

the computer for processing.

 

 

 

Classification of Input Devices

  1. Keying devices: use buttons to make entries e.g. keyboard and keypad
  2. Pointing devices: Mouse, trackball, joystick, lightpen
  3. Scanning: capture data directly from source

 

Optical scanners

  1. Optical Mark Recognition (OMR): Detects marks made on a piece of paper using a soft pen or pencil.

Advantages

  • Low error rates
  • Conspicuous errors are corrected
  • Minimize manual work

Disadvantages

  • Relatively slow
  • Difficult verification of worked data
  • Not widely used in business

Application

  • Making of multiple choice exams
  • Market research questionnaires
  • Payroll entry
  • Traffic surveys
  1. Optical Bar Recognition (OBR): Used to read bar codes.

Advantages

  • Barcodes can be printed by normal printing methods
  • Type of item or price doesn’t have to be repeatedly written or retyped

Disadvantages

  • Bar codes can be read by machines
  • Only numbers can be coded this way
  • Are relatively fixed, so they are unsuitable for recording prices which can change frequently

Applications

  • On labels and on shelves for stock taking
  • Printed on shop goods e.g. supermarkets
  • In libraries
  1. Optical Character Recognition (OCR): Not only does it scan characters but also can scan real objects, pictures and drawings

Advantages

  • Limited errors
  • Early methods
  • Document design is less complicated
  • Character can be read by people

Disadvantages

  • Expensive or costly
  • May require redesigning quite frequent
  • Only certain font is applicable

 

Magnetic scanners

  1. Magnetic Ink Character Recognition (MICR): Allows special devices to read magnetic characters written in a special format.

Advantages

  • Fast, accurate and automatic
  • Codes are both machine and human readable
  • Reduces forgery

Disadvantages

  • Limited to only 14 characters
  • Based on magnetism and can easily

Application

  • Banking industry for cheques

 

  1. Magnetic Strip Recognition (MSR):

Advantages

  • Simple to produce
  • Not easily damaged
  • Stores fairly large number of characters

Disadvantages

  • Data can be changed or erased by magnetic fields

Applications

  • On credit card
  • On bank cards
  • As tags on clothes
  • As a phone card

 

 

 

 

 

Keying devices

  1. Traditional Keyboard
  2. Flexible keyboard: can be folded
  3. Ergonomic Keyboard: designed to provide comfort and allocate wrist strain.
  4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
  5. Braille keyboard: designed for the blind.

 

Pointing devices

Mouse

  1. Standard mouse: has a ball underneath, two buttons and optical scroll button located

between left and right buttons.

  1. Optical mouse
  2. Cordless/ wireless mouse: battery powered mouse that uses radio or infrared waves instead of being physically connected to the system unit.

 

 

Trackball

It’s advantage over mouse is that it neither requires an extra space nor a flat surface for

movement.

 

 

Joystic

An input device like a car gear that can be moved sideways, upwards or downwards to control the

position of the cursor.

 

Light pen and style

The lightpen is a hand held  device that has just a light sensitive point. It can make selections,

place images, draw and indicate dimensions by simply touching the screen. Doesn’t emit light but reacts to light emitted by the display using a photosensitive detector at its base.

 

 

 

 

Speech Recognition/ Voice input: This is where microphone is used to enter data/

information or spoken words into a computer. Situations for speech recorgnition:

ü   Where hands are busy handling documents

ü   Due to movement

ü   Disability e.g. blind without hands

 

 

Uses

  • Electronic fund transfer
  • House/ car security i.e. voice activated locks
  • Offer security for room access
  • Voice activated toys and scanners
  • Quality control and automation in factories
  • Automated material handling
  • Computer Aided Design

Limitations

  • Existence of homophones
  • Word separation is difficult
  • Slow recognition
  • Speaker variability
  • It is still at the early stage of development
  • Limited vocabularies

 

 

 

 

 

 

Touch screen, Digitizers and Cameras

Touch screen: Use touch sensitive screen where the computer detects the position of the finger

on the screen and responds accordingly.

Digitizers: Almost similar to light pen but has a graph tablet on which user writes using a pen like device called a style

Cameras: Store images in digital form.

 

Other Examples of Input Devices

Point of sale (POS) Terminal

This consists of numeric keypads and a few controls or function keys. They are normally used in

computerized wholesale or retail organizations like supermarkets.

Input Facility Considerations

ü   Cost

ü   Input Speed

 

ü   Volume

ü   Accuracy

ü   Reliability

ü   Mode of operation

ü   Appropriateness

 

Problems faced while collecting data

  • Preparation of source document is slow hence prone to mistakes.
  • Low typing speed leads to keyboard bottleneck.
  • It is wasteful to use a media which can only be used once like punched cards.
  • Mistakes can be made when copying data from one medium to another.
  • Translation delays or losses can occur if data is physically transferred to the computer.
  • Data entry can be expensive

 

The Main methods of data entry

  1. Source document reader: Orders, sheets and forms are batched and converted into

computer acceptable medium.

  1. Online data entry (keyboard entry): Data is entered directly into computer one translation at a time under program control.
  2. Direct data capture: Data capture directly without conversion stage.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OUTPUT DEVICES

Devices that accept information from internal environment and then decodes it in a form

understandable to user

Classification of Output Devices

  1. Soft copy: includes monitors/ VDU and the speakers
  2. Hard copy: Printers and plotters
  3. Microfiche: Computer Output on Microform (COM)

 

 

Visual Display Unit (VDU)/ Screen

Types

  1. a) Monochrome- Display images and text in only one colour
  2. b) Color- Display in multiple colours

Examples of Graphic Adapters

  1. Monochrome Display Adapter (MDA)- display text in only one color.

 

  1. Hercules Graphic Adapter (HGA)- Support monochrome image and text
  2. Color Graphic Adapter (CGA)- Display using sixteen colours.
  3. Enhanced Graphic Adapter (EGA)- An improvement over colours but use 16 colours.
  4. Video Graphic Array (VGA) – Offers at most 256 colors.
  5. Super Video Graphic Array (SVGA) – an enhanced VGA

Common Types of Flat panel Display

  1. Liquid Crystal Display (LCD): Doesn’t emit light of their own instead have tiny liquid

crystals that reflect light falling on them from the environment.

  1. Electro Luminescent: Improved LCD. Emit light when electrically charged.
  2. Gas plasma: Use gas that emits light in presence of electric charge.
  3. Thin Film Transistor (TFT): This is the latest technology advancement that provides high quality resolution.

 

 

Printers

How printers are classified

  1. a) Speed
  2. b) How the produce the print; character, line or page printers
  3. c) How they provide prints on the stationery; impact or non-impact printers

Types

  1. a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
  2. b) Non-impact printers: Thermal, inkjet, electrostatic and laser printers

 

Impact Non-impact
Slow Fast
Use ink ribbon Thermal/electrostatic principle
Cheaper Costly due to technology involved
Noisy Quiet
Multiple copies produce is possible Multiple copies produce almost impossible

 

 

 

 

 

 

 

Printers Consideration

  1. Printers initial price, subsequent maintenance cost and cost of consumable items.
  2. Volume of printing expected.
  3. Nature of report to be generated.
  4. Range of capability for the selected printer.
  5. Interface with computer at hand on for family particular make.

 

Plotters

They are used to produce graphical output e.g. maps and diagrams.

  1. Flatbed plotters: Has a flat surface which the stationery is placed for the pen to be moving over it in all directions to produce graphical output.
  2. Drum plotters: Has a drum onto which stationery is placed for the drawing to be possible.

 

Difference between a printer and a plotter

Printer: produces hardcopy of information on papers.

 

Plotter: Produces big charts e.g. maps, pictures and drawings. Used for printing geographical, architectural and engineering drawings e.g. maps, advertisements posters to be placed on bill boards, machinery parts etc.

 

Computer Output (originated) microform (COM)

Provides photograph type of output into the microform (photographs reduced documents on

films)

 

 

Advantages

  1. Saves stationery and space
  2. Faster than printing
  3. Non-bulky hence conveniently transportable
  4. Guarantee security as content cannot be ready by naked eyes

 

Computer Bus

  1. Longer lifespan compared to paper medium output

Disadvantages

  1. Expensive
  2. Cause eyestrains
  3. Expensive additional equipment for viewing contents

 

Communication medium within a computer that allow different elements of the computer to communicate with one another.

  1. Address bus: Pathway used to locate storage position in memory for the data to be executed.
  2. Data bus: Pathway where the actual data transfer takes place.
  3. Control bus: Pathway for all timings and controlling functions sent by the control unit to the parts of the system

 

AUXILIARY/ SECONDARY STORAGE DEVICES

 

Factors to consider when choosing a storage device

  • Volume of data to be stored
  • The cost
  • The quantity or size of data it can hold

 

Magnetic Tapes

These are sequential access devices. Implies that information is at the end of tape the program

will have to read almost entire tape which may take time to read. Data recorded as series of magnetic dots across tracks on the tape cassette when characters are stored serially down the length of the tape.

Sequential access medium: Data is stored across magnetic tape

Serial access medium: data is stored along the media

 

Advantages

  • Light and easy to carry
  • Effective for batch applications since they are cheaper

Disadvantages

 

Magnetic Disks

Floppy Disks (Diskettes)

  • Slow since they are sequential access media
  • Gaps between (called Inter Record

Gap, IRG) waste storage space.

 

Information is recorded on number of concentric circles called tracks. Tracks are divided into sectors. Sectors and tracks have same storage capacity because inner tracks have a high density. Diskettes are direct access storage medium (DASM) and access time is made up of 3 parameters.

  1. Seek time: Time taken by the read/write (R/W) head to locate right track that contains content.
  2. Rotational delay time: Time taken by drive mortar to spin the diskette past R/W head.
  3. Data transfer time: Time taken by the R/W head to interpret content and send it as

computer input.

 

Advantages

  1. Exchangeable and easy to carry
  2. Can be used with PCs with no hard disk
  3. They are cheap
  4. Used for back up

Disadvantages

  1. Slower than hard disk
  2. Less storage capacity
  3. Damaged by light, magnet and dirt

 

Densities DS/DD HD DS/DD HD
Size (inches) 5.25 5.25 3.5 3.5
Capacity 360KB 1.2MB 720KB 1.44MB
Tracks 40 80 80 80
Sectors 9 15 9 155
Head 2 2 2 2
Type Flexible Flexible Rigid Rigid

 

Zip Disks

Come with portable external drive and are slightly large and thicker in size and has a capacity of

up to 250MB

 

Jaz Disks

Come with portable external drive and have a capacity of 1GB to 2GB and have high access

speeds.

 

 

 

 

Advantages of Magnetic Disks

  1. Light and portable
  2. Effective for batch application
  3. Cheap

 

Care of Magnetic Storage Media

  1. a) Keep them away from magnets.
  2. b) Keep them away from extreme temperature c)   Never touch the disk surface
  3. d) Never put weighty objects on them e)   Never use clips to hold the disk
  4. f) Keep them away from dust, moisture and low and high humidity

 

OPTICAL (LASER) DISKS

They are recorded using a laser beam (very strong concentrated light)that burns patterns as fine circular tracks (indentations) on the surface. Data is retrieved using relatively low power laser.

 

Super disk (SD) LS-120

They resemble 3 ¼ floppy disk but has a high capacity of 128 MB

 

Compact Disk (CD)

They have a high recording density of about 700MB. There are three types of compact disks:

  1. CD-ROM (Read Only Memory): The recorded data cannot be changed, deleted or added.
  2. CD-R (Recordable): They are initially blank but when data is recorded it becomes permanent.
  3. CD-RW (Re-writable): Data can be overwritten/ added or raised.

CD-ROM and CD-R are referred to as WORM (Write Once Read Many) since you cannot write the second time but you can read many times

 

Digital Versatile Disk (DVD)

They resemble the compact disks but have a greater storage capacity up to 17GB

 

Optical Tapes

They resemble magnetic tapes but they use optical technology

 

 

Optical Card

 

HARD DISK

Advantages

  1. They offer cheap storage
  2. They are well protected since they are housed in the CPU
  3. Fast in terms of access retrieval and saving of data

Care for the Hard disk

  1. a) Keep them away from smoke and dust.
  2. b) Use the right procedure to switch of the computer to allow the R/W head to move from the disk surface to avoid scratching on rotating surface
  3. c) Exposure to magnetic property

 

Minimal Requirements for a multimedia computer

  • A Video Graphic Array (VGA)/ Super Video Graphic Array (SVGA) card and monitor.
  • A sound card
  • 128MB RAM or higher
  • CD or DVD drive
  • FM/TV card

 

 

 

 

 

Power and Interface Cables

Power cables are used to connect the computer to main power outlet.

Interface cables connect all peripherals to the motherboard and transmit data signals.

Power supply unit supplies power to motherboard and other internal device

 

Types of Cables and Ports

  1. Parallel ports: They transmit data simultaneously using a set of connectors- 8bit parallel cables. They are faster over short distance. Printers, removable storage drives and network adapter. Port is (PT1) 25 PIN

 

  1. Serial ports: They transmit one bit at a time. They are slower than parallel ports but they support two way communications. They are 25 pin and 9 pin. COM 1 and COM2. Used by the serial printers.

 

  1. Universal Serial Bus (USB)

They transmit one bit at a time but at a very high speed and provide quality data transmission

about 15m distance. – External storage devices, cameras etc.

Advantages of USB

  • Provide very high speed
  • Quality data transmission over long distance
  • Support a wide range of peripheral devices

 

  1. Small Computer System Interface (SCSI) – Use parallel method but faster than parallel cables. The port connects up to 8 peripheral devices.

 

Other ports and connectors

  • 5 PIN DIN and 6 pin (PS/2): used by keyboard and mouse
  • 9 pin D and 15 HI-pin-D: monitors
  • Audio connectors: jack plugs found on sound adapter for connecting speakers, microphone and other portable audio equipments.

 

 

 

 

Classification according to Purpose

  1. 1. System software

They perform a variety of fundamental operations that avails computer resources to the user.

They are:

Operating System

A set of complex programs that work together to control execution of user programs called applications. Examples: MS Windows, UNIX, LINUX, Macintosh (Mac OS) and OS/2.

Importance of the operating systems:

  • Platform for loading programs
  • Acts as a link between applications and computer hardware
  • Manages input and output and storage operations

 

Firmware (Store Logic)

A combination of both software and hardware recorded permanently on electronic chips mounted

on the motherboard. May hold operating system, utility programs, language processors etc.

 

Utility Software

A special program that performs commonly used services that make certain computing aspects go

on smoothly e.g. sorting, copying, disk management etc. There are two types:

  1. System level:  Help user to work with the operating system and its function. It tells

whether the command entered is wrong and give suggestion on how the error can be corrected.

  1. Application level: Make use of an application program smoother and efficiently.

Functions of utility software

Reporting of errors which occur during program execution

  • Control input and output devices
  • Protest use hardware and data from misuse
  • Provide program testing routines
  • Provides communication between computer user and each program
  • Memory management
  • Maintenance of internal time clock and log of system usage by all users.

 

Network software

Establish communication between two or more computers by linking them using a

communication channel like cables to create a computer network e.g. Novell Netware

 

Translators

 

  1. 2. Application (packages) software

Programs that are designed to help user accomplish specific tasks.

Software Uses Examples
Word processors Typing  long documents MS-Word, Word Pro
Spread sheet Calculating budgets MS-Excel, Quatropro
Desktop Publishing (DTP) Designing publications Adobe PageMaker, MS-

Publisher

Computer Aided Design

(CAD)

Technical drawing AutoCAD
Database Keeping records and files MS-ACCESS, Dbase
Graphic Design Creating and manipulating

graphics

Corel Draw, Adobe Photoshop

Internet Software

Used in communication and perusing the internet.

 

 

 

  1. 3. Programming Software

Used to create programs that behave like software

 

Classification according to Acquisition

  1. In-house developed programs/ Custom design programs

They are designed to meet the needs of a specific user or organization

 

  1. Standard/ Vendor of the shelf software

Designed by software engineers to be used by different users. When closely related software are

put under one software it is known as suit/ integrated/ general software. While packages are known as single purpose software e.g. Lotus Suite, MS Office etc.

Advantages of Standard Software

  • Less expensive
  • They’re readily available for almost any tasks
  • Well tested before they are released hence chances of errors are minimal
  • Easily modified (customized) to meet specific user needs
  • Other software can be linked to it and use the same data

Disadvantages

  • Easily pirated
  • Do not meet all user requirements

 

Consideration for a Computer System

Criteria for selecting a computer system

Ø   Identify the user requirement

Ø   Evaluate the hardware requirements that will meet users’ needs

Ø   Evaluate the software requirements

 

Hardware Considerations

  1. a) Processing speed: For faster data processing the speed of the processor must be relatively high.

 

  1. b) Memory capacity: At least 128MB RAM. There are also factors to be considered when buying a memory module-The type of module supported by motherboard

-Whether there is an empty slot on the motherboard

-Compatibility of the module with the existing one

-Module capacity

  1. c) Warranty: Arrangement between the buyer and the seller whereby incase the product fails during the agreed period of time it is taken care by the seller free of charge or for an agreed fee. Things to consider in a warranty –The scope of cover

-Call out response and liability agreement

-Regular preventive maintenance

  1. d) Cost: The cost is determined by the processor, size, and the memory capacity.
  2. e) Upgradability and compatibility: Whether the hardware chosen can be easily upgraded to accommodate emergent technologies.
  3. f) User’s needs: Can it meet the unique needs like for the disabled?
  4. g) Monitor: Always consider the size, resolution and the technology involved.
  5. h) Multimedia capability: It should have speakers, CD/DVD drive, sound card, VGA or

SVGA card.

 

Software Requirements

  1. a) Authenticity: Always consider genuine, valid and legitimacy and developers license.
  2. b) Documentation: Manual from the developers that guide the user on installation, usage and maintenance. –User guides

-License

-Manual guide

-Installation process

-Quick reference

-Warranty

  1. c) Reliability and security: Consider whether the software offers good security to confidential and private information.
  2. d) User friendliness: How easily the user can interact with the software.
  3. e) Compatibility and system configuration: Consider whether the software can work with the computer at hand.
  4. f) Cost: Always consider the cost and whether it serves the purpose.
  5. g) Users’ needs: The purpose of the software.
  6. h) Portability: Consider whether it can be installed in different computers.

 

Operating System

Resources under the Operating System

  • Processor: The operating system arranges all tasks accordingly to prioritize and decides which task to continue and which task to stop.
  • Main memory: The operating system determines which task to remain in memory for execution and what to send back to backing storage to wait.
  • Input Output devices and ports: It controls the input of the data and output of information.
  • Secondary storage device: The operating system manages the storage (saving) and the retrieval of data and information in storage devices. It utilizes hard disk space by holding take not need currently by the RAM.
  • Communication devices and ports: Operating system controls the exchange of data and information.

 

 

Functions of an Operating System

  1. Job scheduling: It determines which tasks to process first since the processor can only

handle one task at a time.

  1. Resource control and allocation: An identification number called interrupt number is given to each resource such that processor will be able to recognize and priorities the use and request for resources are released when or where required to avoid situations known as Deadlock (a situation where a program refuses to releases its resources to be used by other programs).
  2. Input output handling: It coordinates between the input output and other peripherals.
  3. Memory management: The operating system divides the memory into blocks or partitions for the running applications
  4. Error handling: It alerts the user on errors made and gives suggestions on how to correct

them. It also alerts on errors on hardware and software.

  1. Job sequencing: The operating system keeps a list of tasks to be processed and the order of processing.
  2. Interrupt handling: This is a breaking of normal processing sequence in programs. An

external request courses processing to halt for sometime to de something else before returning back to the program interrupted.

 

Types of Operating System

Classification according to task handled currently

  1. Single program operating system: It allows processing of only one program at a time

like the Microsoft Disk Operating System (MS DOS)

  1. Multitasking operating system: It allows a single CPU to execute more than one program at a time

Classification according to number of user

  1. Single user operating system: Can only be used by one application at a time e.g.

Windos95/98, MS DOS.

  1. Multi-user/ multi-access operating system: can be used by more than one use at a time e.g. UNIX, LINUX, Windows NT/2000/XP/VISTA, and Novell.

Human Computer Interface (HCI)

This method of interaction between the user and the computer.

  1. Command line interface: The user interacts with the computer by typing the command

in the command prompt then pressing the enter key for execution.

  1. Menu driven interface: They give the use a list of options to select from
  2. Graphical user interface: It represents commands in form of graphics or icons.

 

Operating System Consideration

  1. Hardware configuration: memory size, hard disk capacity and  the processor type.
  2. Basic design of the computer
  3. User friendliness and the human computer interface (HCI)
  4. Availability in the market
  5. Cost
  6. Reliability: can it run without crashing/ hanging i.e. stop responding to commands

 

Common features in Windows Operating System

ü   Similar interface/ interaction

ü   Long file name

ü   Plug n play (PnP) windows automatically accept a new hardware once installed

ü   Support multi-tasking and multi-user

 

Factors that dictate how an operating system organizes information

Rapid access: organization method should allow quick access to stored data.

Ease of update: by keeping a record of the date modified.

Economy of storage: should use the least storage possible because memory is a scarce resource. Simplicity of maintenance: organization method should enable quick navigation through the file system and make it easy for it to be maintained.

Reliability: organization method must be reliable.

 

Properties operating system display about a file

  • Capacity
  • Location
  • Extension
  • Date

 

Two types of Windows

  1. Application Window:  Screen that appears when an application program is opened.
  2. Document window: this represents the work area

 

 

 

Files

Definition

 

Types of files

ü   System files: files that contain information required for the operation of the computer

ü   Application files: Files that hold programs or start an application.

 

File Extensions

Importance

 

 

 

Examples DAT- data TXT- text

DOC- document

XLS- excel

SYS- system files COM- command file BAK- back up

PPT- PowerPoint

BAT- batch file

 

 

Folder/ directory: A named storage area created for storing files for easy access.

Subfolder: divided folder

Windows desktop: This is the first screen after successful booting.

 

Desktop Elements

Icons: This is the graphical/ pictorial representation of items.

Taskbar: It allows the user to switch between different files and programs. Start button: It displays the start menu.

Task manager: Display buttons of the current running tasks.

System tray: Has icons of tasks running in the background but not displayed on the screen.

 

Parts of an application window

Title bar: Display name of current application program or task. Minimize button: Reduces a window to a button on the taskbar.

Restore/ maximize: It stretches a window to cover the entire screen or return to the original screen. Close button: Exits the document but not the application.

Menu bar: provides a list of commands inform of buttons. Toolbar: represents shortcuts to menu commands.

Work area/ document window: Where data is being entered.

 

DISK MANAGEMENT

 

 

Formatting: Preparing a disk for use by imprinting tracks and sectors.

 

Scanning:  -scanning for virus

-scanning for errors: SCANDISK: Check up for minor storage problems e.g. lost storage location or damaged surface

 

Defragmenting: Re-arranging scattered folders to speed up access and retrieval.

 

Compressing: Squeezing disk contents to free space on the media.

 

Backing up data: Creating duplicate copies of data on separate storage device for security purposes.

 

Boot up (start-up)/ system disk: System disk created to start the system in case the components of starting up fail or when the hard disk is seriously damaged. The booting instructions are copied on the disk.

 

Partioning: Subdividing a large physical disk into two or more partions called logical drives. Reasons for disk partioning:

ü   When user intends to install more than one operating system on the same disk.

ü   For back up purposes

 

Troubleshooting Windows Related Problems

  • This is a process of diagnosis and trying to fix hardware or software related problems.
  • Some problems Windows experience
  • Failure to boot
  • Computer hanging now and then
  • Abnormal restart

 

These problems may result from

  1. 1. Problem in installing process missing files
  2. 2. Insufficient system memory
  3. 3. Problems with hard disk boot sector may be due to virus infection
  4. 4. Corrupted window registry system
  5. 5. Due to interrupt request conflicts

 

 

 

 

WORD PROCESSING

 

 

Definition

This is the creation of long document, reports, memos etc.

Main types of Word Processors

  1. 1. Dedicated: This word processor is the only program in the computer.
  2. 2. Non-dedicated: the word processor is among other programs installed in that computer.

 

Terms in Word Processing

Word wrap: This is the way the word processor detects whether the last word on a certain line will fit if not the whole word is pushed to the beginning of the next line.

 

Hyphenation: The way the word processor detects if the last word on a certain line will fit if not it adds hyphenation after the first words then part of word in argument is pushed at the beginning of the next line.

 

Justification: Position of line according to the centre of the page, left and the right margin. There are for ways

  • Full: All lines in a paragraph start at the same point and end at the same point.
  • Left: All lines in a paragraph start at the same point but end at different point.
  • Right: All lines in a paragraph start at different points but end at the same point.
  • Centre: All lines in a paragraph are centered along the page.

 

Indentation: Way lines(s) start and end from the normal starting or ending point by the use of Tab key indent tools from format command in the main menu. Ways of indenting;

  • Indenting a paragraph from the left margin
  • Indenting the first line of a paragraph from the left margin
  • Hanging indent
  • Indenting a paragraph from the right margin
  • Indenting from both margins

 

Bolding: Increasing the intensity of text such that when printed it appears darker than normal text.

 

Blocking: Separating part of text by highlighting so that any issued command affects the highlighted text.

 

Orphan: The last line in the last paragraph of a page that becomes the first line on the next page after the first page is filled up.

 

Widow: First line in the last paragraph of a page that becomes the last line on that page while the other part is moved to the next page after the first page is filled up.

 

Superscript: Character above the normal typing line.

 

Subscript: Character below the normal typing line.

 

Header: Text/ message appearing on top of each page of a document.

 

Footer: Text/ message appearing at the bottom of each page of a document.

 

Pagination: Default page numbering that the word processor provides.

Repagination: Situation where the default page numbering is altered by the user.

 

Softcopy: Document that is in computer memory or the screen where changes are applicable.

 

Hardcopy: Document that is already printed.

 

Soft return: Situation where the cursor automatically moves to the next line before it reaches the end of the current line.

 

Hard return: Situation where the user forces the cursor to move to the beginning of the next new line by pressing the enter key on the keyboard before it reaches the end of the current line.

 

Soft page: Automatic page ending as per the settings that comes when one page is filled up.

 

Hard page: Forced page ending before the current page is filled up.

 

Continuous stationery: Situation where the printer uses rolls of papers therefore one does not need to keep on inserting a paper after the other.

 

Preprinted stationery: One needs to insert a paper after the other is printed.

 

Toggle switch: How word processor behaves depending whether certain keys are on or off like Insert and the Caps Lock keys.

 

Margin: Blank space around the edges of a page.

 

Boarder: Printable edges around the page.

 

Paper Orientation

Portrait

Landscape

 

Difference between Elements and Features Features: Inbuilt facilities that can be activated on text. Elements: Physical components that can be viewed on the screen.

 

Features of a word processor

  1. 1. Enables one to create a file and save it again for retrieval, editing and formatting.
  2. 2. Have spell checker, thesaurus and grammar checkers.
  3. 3. Provides headers and footers, indexing, footnotes
  4. 4. Ability to create and import text and graphics from other applications

 

Advantages of Word Processor

  1. 1. It is faster to create a document because of the availability of facilities like formatting and editing

features.

  1. 2. Enables the users to proofread and spell check the document on the screen before printing.
  2. 3. It allows multiple copies printing unlike the typewriters.
  3. 4. Enables the user to store the document for future editing/ reference if need be.
  4. 5. Has a superior document formatting features.

 

 

 

 

Mail merging Document

The process of generating personalized letters or documents by combing a main document with an existing document. Files involved in mail merging:

  1. 1. Primary file: Contains data that is to appear on all the letters after combining.
  2. 2. Secondary file: Content to appear in all the letters.
  3. 3. Merged file: Combined primary and secondary documen

 

Ways of Mail Merging

  • Previewing merged document
  • Merging to a printer
  • Merging to a new document
  • Sending merged document via email or fax

 

Editing a Document

Deleting text

There are many ways to accomplish this operation

  • Highlighting the text then right click the highlighted text and choose delete or press delete key.
  • Backspace Key: Deletes text on the left side of the cursor position.
  • Delete key: Deletes text on the right side of the cursor position.

Find and replace: Fast way to search for a word in the document and if necessary replacing it with another word.

Spelling and grammar: Press F7 or go to Spell checker to correct wrongly spelled words and incorrect grammar

Thesaurus: Used to search for words with similar meaning (synonyms) or with opposite meaning

(antonyms).

Autocorrect and autotext: Autocorrect automatically corrects wrongly spelled word during data entry while autotext completes words when the user types in the first letters of a word.

Undo and Redo: Undo (CTRL+Z) automatically cancels the last action done by the user while

Redo (CTRL+Y) automatically reverses the last command or action undone by the user.

 

Formatting Document

Text Formatting

Changing the font type, size and colour

Changing the case

  • Uppercase: automatically changes the highlighted text into capital letters.
  • Lowercase: automatically changes the highlighted text into small letters.
  • Sentence case: automatically makes the fast letter of a sentence to a capital letter.
  • Toggle case: automatically changes capitalized letters to small letters and vice versa.

Superscript and subscript

Press (CTRL+SHIFT++)  for superscript option or (CTRL+=) for subscript option.

 

 

 

 

Paragraph Formatting

Alignment or Justification

  • Full: All lines in a paragraph start at the same point and end at the same point.
  • Left: All lines in a paragraph start at the same point but end at different point.
  • Right: All lines in a paragraph start at different points but end at the same point.
  • Centres: All lines in a paragraph are centered along the page.

Line spacing

Tab setting and Indents

  • Indenting a paragraph from the left margin
  • Indenting the first line of a paragraph from the left margin
  • Hanging indent
  • Indenting a paragraph from the right margin
  • Indenting from both margins

Drop cap: Formatting the first letter of a paragraph to appear bigger and occupy several lines. Bullet and numbering

Column

Page and column breaks

Formatting the entire document

Page setup

Page numbering Headers and footers Footnotes and endnotes

 

SPREADSHEET

 

 

Definition

An essentially large sheet that lets you enter, edit and manipulate numerical data.

 

Types of Spreadsheet

Manual

Electronic

 

Examples of Spreadsheet

Lotus 123

VisiCalc MS-Excel VP Planner

 

Advantages of Electronic over manual spreadsheet

  1. 1. It utilizes powerful aspects of the computer like: speed, accuracy and efficiency to enable the user accomplish the task.
  2. 2. It offers a large virtual sheet for data entry and manipulation.
  3. 3. It utilizes large storage space on computer storage devices to store and retrieve documents.
  4. 4. Enables the user to produce neat work because traditional paper, pencil, rubber and calculator are not required
  5. 5. Has a better document formatting capabilities.
  6. 6. Has inbuilt formulas called functions that enables the user to quickly manipulate mathematical data.
  7. 7. Automatically adjusts the results of a formula if the data in the worksheet is changed- Automatic

recalculation.

 

Components of a Spreadsheet

  1. 1. Worksheet: where data is entered. It consists of cells, columns and rows.
  2. 2. Database: Does the actual management of data e.g. filtering records, using forms, calculating subtotals, data validation, pivot tables, pivot charts and reports.
  3. 3. Graph and charts: Pictorial representation of the base data in a workshee

 

Types of charts

Line, bar, column, pie, scattered, histogram,

Legend: A key that explain what each colour or pattern of data representation in a chart means.

 

Application Areas of Spreadsheet

  1. 1. Statistical analysis
  2. 2. Accounting: Recording daily transactions and keeping of financial records. Also in;
  3. 3. Track the value of assets overtime (Depreciation and Appreciation).
  4. 4. Calculate profits
  5. 5. Prepare budgets.
  6. 6. Data management: Sorting, filtering data, calculating subtotals, and using forms.

 

  1. 7. Forecasting/ What if analysis: Changing values of a cell or argument in a formula to see the difference the change would make to the calculation results.

 

Worksheet Layout

ü   Cell: Intersection between a row and column.

ü   Rows: Horizontal arrangement of cells.

ü   Columns: Vertical arrangement of cells.

ü   Range: A group of rectangular cells that can be manipulated as a block.

 

Cell Data Types

  1. 1. Label: Any text or alphanumeric characters entered in a cell.
  2. 2. Values: Numbers that can be manipulated automatically.
  3. 3. Formula: Designed mathematical expression that create a relationship cell and return a value in a chosen cell.
  4. 4. Functions: Inbuilt predefined formula that the user can quickly use instead of creating new one

each time a calculation has to be carried out.

 

Cell Referencing

Identifies a cell or range of cells on the worksheet and shows MS-Excel where to look for the values or data needed to be used in a formula.

  1. 1. Relative cell referencing: The formula keeps on changing automatically depending on the position on the workshee
  2. 2. Absolute: Cell reference that is always referring to a cell in a specified location of the worksheet

even if they are copied from one cell to another.

ü   A1 referencing style: A cell can be identified by its column label followed by the row number.

ü   R1CI referencing style: A cell is referred by its row number followed by its column number.

 

A1 style                                         R1C1

B2                                                  R2C2

C2                                                  R10C3

E20                                                R20C5

 

Data Management

  1. 1. Sorting
  2. 2. Filtering data: Quick and efficient method of finding and working with a subset of data in a lis
  3. 3. Auto filter: Uses simple criteria and include filter by selection
  4. 4. Advanced filter: Uses more complex criteria.
  5. 5. Subtotal
  6. 6. Total function
  7. 7. Forms: Special prepared templates that the user can use to make data entry fast.

 

Basic Functions and Formulas

Statistical Functions

  1. 1. Average: Returns the average or mean of a certain formula which can be numbers or array.
  2. 2. Count: Counts the number of cells that contain values.
  3. 3. Max: Returns the largest value in a set of values.
  4. 4. Min: Returns the smallest value in a set of values.
  5. 5. Mode: Returns the most frequent occurring value in a set of values.
  6. 6. Rank: Returns the rank of a number in a list by comparing its size in relation to the others.

 

 

 

 

 

 

Logical Functions

  1. 1. If: Returns a specified value if a condition is executed and found to be true and another value if it

is false.

  1. 2. Count if: Counts a number of cells within a specified range that meet the given condition of criteria. Example A10:E10 contain eggs, in cell 6, 5 and 2  =COUNTIF (A10:E10,”eggs”)  will return 3.
  2. 3. Sum If: Adds values in the specified cells by giving a condition or criteria. Example A10:E10 contain 10, 50, 60, 30, 70 sum all values greater than 50 =SUMIF (A10:E10,”50”) returns 180.

 

 

Mathematical Functions

  1. 1. Sum: Adds values in a range of cells as specified and returns the result in a specified cell.
  2. 2. Product: Multiplies values in a range of cells as specifies and returns result in a specified cell.

 

Operator Name Precedence
Negative as in -1 1
% Percentage 2
^ Exponential 3
*and/ Multiplication and Division 4
+and – Addition and Subtraction 5
=,<>,<,>,<=,=> Relation 6

 

Order of Execution

 

 

 

 

 

DATABASES

 

 

Definition of Database

Collection of structured and related data items organized to produce a consistent and controlled access to the items.

 

Challenges facing human way of managing databases (Manual)

  1. 1. Unnecessary duplication of data.
  2. 2. Burning and time wasting when searching for an item.
  3. 3. Misleading reports due to poor data entry and organization.
  4. 4. Poor update of records.

 

Functions of Database Management System

  1. 1. Enables users to add or delete records.
  2. 2. Enables users to update or modify records.
  3. 3. Allows user to organize data for easy access, retrieval and manipulation.
  4. 4. Acts as an interface between database and other application programs.
  5. 5. Ensures security of data by safeguarding it against unauthorized access.
  6. 6. Keeps statistics of data items in a database.

NB: Database Management Software (DBMS) facilitates the creation, organizing and management of databases.

 

Components of a Database System

  1. 1. Hardware: Storage disks, tapes and other associated devices like the CPU.
  2. 2. Data: Values physically recorded.
  3. 3. Software:
  •  Data definition: Method of data definition and storage.
  • Data maintenance: Checks data in the fields.
  • Data manipulation: Inserting, updating and sorting data.
  • Data display: Viewing data.
  • Data integrity: Accuracy or completeness of data and information in a computer or received from an information system.
  1. 4. User:
  2. a) Application programmer: Write programs that use databases. b)   End users: Interact with the database from a terminal.
  3. c) Database administrator: Functions
  • Overall in charge of the system
  • Determine the information content of a database
  • Define unauthorized checks and validation procedures
  • Monitor performance and respond to changes in user requirement
  • Define a strategy for backup strategy

 

Advantages of Computerized Databases

  1. 1. Reduces redundancy through the integration of files that have something in common.
  2. 2. Avoids inconsistency by safeguarding item duplication.

 

  1. 3. Data can be shared- data requirement can be satisfied even without necessary creation of a new file.
  2. 4. Offers security by restricting unauthorized access.
  3. 5. Data integrity is maintained- the accuracy of data.
  4. 6. Data independence: the immunity of the application to changes in storage and access strategy.

 

Database Models

  1. 1. Flat files: They hold only one set of data and is not any different from the manual files. Example is the library catalog.
  2. 2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access level two data one has to

first access level one data items.

  1. 3. Networking models: Links or paths are used to express the relation between different data items forming a network of items.
  2. 4. Relational model: Related data items are stored together in structures called relations or tables.

Relationships created between records of different tables.

  1. 5. Object Oriented Model: Database is a complete program built to hold a collection of objects which have both properties and behavior.

 

Features of Database Management System

  1. 1. Tables: Hold related records.
  2. 2. Queries: A database tool used to search or question the database on specific data items. Types of queries-
  • Select query- Used to search and analyze data in one or more tables.
  • Action query- Used to make changes to many records once. Task- a)  Update: updates data in a table
  1. b) Append: adds data in a table from one or more tables. c)      Make table: Creates a new table from a dynase
  2. d) Delete: Deletes specified records from one or more tables.
  3. 3. Forms: Enables users to view and enter data in a table.
  4. 4. Reports: Provides users with means to specify output layout and what is to be printed.
  5. 5. Macros: A set of procedure to automatic frequently performed tasks.
  6. 6. Programming module: A powerful tool than macros to automate the database operations further.

 

Data Organization in a Database

  • Fields: Character or logical combination of characters.
  • Records: Collection of related fields that represent a single entity.
  • Tables: A collection of related records.
  • Database: Highest in data records.

 

Field Data Types

  • Text: Alphanumeric letters, numbers, space and functions.
  • Number: Numeric numbers can be manipulated mathematically.
  • Memo: Made of alphanumeric data up to 64000 characters.
  • Date/ Time: Identify a field as either a date or time.
  • Currency: Identify numeric values that are in decimal or fraction.
  • Auto number: Numeric value u wish MS-Access to automatically increment values in a field.
  • Yes/ No: Logical field where entry is either a yes or no using a check box.
  • Object Linking and Embedding (OLE): Used for graphical interface applications for inserting graphical objects.

 

 

 

 

 

 

Field Properties

  1. 1. Field size: Allows user to set the number of characters in a field.
  2. 2. Format: Determines how information appears on screen and when printed.
  3. 3. Decimal places: Used for number or currency fields, and to specify the number of decimal places.
  4. 4. Input Mask: Automatically formats field entry into specified forma
  5. 5. Caption: A more descriptive name for a field to be used in a table.
  6. 6. Default value: A value that will automatically appear in datasheet if nothing is entered.
  7. 7. Validation rule: Logical expression that restricts the value to be entered in a field.
  8. 8. Validation text: Message that appears when the validation rule is violated.
  9. 9. Required: Determines if an entry must be made in a field before you proceed to the next field.
  10. 10. Allow zero length: Allows the users to proceed without making any entry in fields set as zero length.
  11. 11. Indexed: Facilitates the organization of records for easy search.
  12. 12. Primary key: Enforces uniqueness in a table so that one record isn’t entered twice.
  13. 13. Index: Used to speed up search and sort operations in a table.
  14. 14. Foreign Key: A key in a child table which is a primary key in a parent table.

 

Ways of Protecting Information System from Unauthorized Access

  • Use of passwords
  • User and group permission
  • Data encryption
  • User level security

 

Data integrity Constrains

Rules governing entering, changing and deletion of data and records in a database.

  1. 1. Entity integrity: Rules governing the composition of primary key.

ü   Cannot contain a null value, it must be unique- No zero length

ü   No duplicate- indexed

ü   Input mask

ü   Caption

  1. 2. Referential integrity: Governs the nature of records in a one to many relationship between tables in the database.

-All foreign keys in child tables must have a matching field in a parent table.

  1. a) Restricted database- the system deletes or updates a parent record if there are no matching records. A parent record has a primary key and a child record has a foreign key of the relationship in the second table.
  2. b) Cascades database- deletes or updates all matching child records when the parent record is deleted or updated.
  3. 3. Domain integrity: Ensures no field takes on a value outside the range of valid values.
  • Format
  • Validation rule
  • Validation text
  • Indexed

 

Terms used in Database

  1. 1. Normalization: This is the process of dividing information into independent tables to avoid repletion of data entries.
  2. 2. Query language: Special language used to write query statements.
  3. 3. Data redundancy: duplication of data.
  4. 4. Data inconsistency: When one piece of information in a record doesn’t concur with the other piece in a different file.

 

Types of Controls used in Database

  1. 1. Bound Control: One whose source of data is a field in a table or a query.
  2. 2. Unbound Control: A control that is not connected to any data source.

 

Query Criteria

  • Relational operations: >, <, <=, >=, <>, and =.
  • Wildcards: *(asterisk) and #.
  • Logical operators: AND, OR and NOT.
  • LIKE and BETWEEN: relate or display values within a range.

 

Considerations for a Database Relationship

  • Field of similar data types
  • Field content
  • Primary key

 

 

 

 

 

DESKTOP PUBLISHING (DTP)

 

 

Definition

This is the production of publication work within the computer framework of art and design

 

Purpose of Desktop Publication

  • Graphic design
  • Page layout design
  • Printing

 

Application areas Desktop Publication

  1. 1. Designing text and images
  2. 2. Production of publication
  3. 3. Creating illustrations
  4. 4. Editing text and graphic
  5. 5. Composing templates

 

Types of Desktop Publishing Software

Graphical based software

They are used to develop, edit and format graphical objects. Examples of graphical based software are: Adobe Photoshop, Corel Draw, Harvard Graphics e.t.c

Layout based software

Examples are Adobe PageMaker, MS-Publisher.

 

PageMaker Screen Layout

  1. 1. Pasteboard: A large blank area where you place text and objects before arranging them on printable area.
  2. 2. Printable area: Area surrounded by margins on the pasteboard.
  3. 3. Master Pages: They are used to design the general layout that needs to be applied in all other pages of publication.
  4. 4. Rules: Help the user to manually create ruler guides which are non print extensions, and also to measure publication size.
  5. 5. Control Palette: Shortcut toolbar mainly having text and paragraph formatting command icons.
  6. 6. Toolbox: A set of buttons that contain various tools used to create and manipulate publications.

The buttons are;

  • Pointer- Used to select, move and resize text blocks and graphics.
  • Hand- Used to scroll the page and preview it.
  • Text- Used to type, select and edit text.
  • Line- used to draw straight lines in any direction.
  • Rotating- used to select and rotate objects.
  • Constrained line- Used to draw horizontal and vertical lines.
  • Cropping: Used to trim imported graphics.
  • Rectangular frame- used to create a rectangular placeholder for text and graphics.
  • Zoom- used to magnify or reduce an area of a page.

 

  • Ellipsis frame- used to create an oval or circular placeholder for text or graphics.
  • Polygon: used to draw basic polygons, triangles and stars.
  • Rectangle- Used to draw squares and rectangles.
  • Ellipsis- Used to draw circles and elipses.

 

Terms used in Desktop Publishing

  • Tracking: Changing the visual denseness or openness of characters in a line
  • Kerning: Fixing particular pairs of letters that are either too close or too far from each other.
  • Cropping: Trimming graphics.

 

Non Printing Guides in PageMaker

  1. 1. Ruler guides: They are used to measure a publication size.
  2. 2. Column guides: They help on to divide a page into columns that make the publication more organized.
  3. 3. Margin guides: Used in the development of the printable area of your publication.

 

Layering

The process of placing objects, text and graphical objects on one another.

Importance of Layering

To have presentable levels

 

 

 

 

Advantages of PageMaker over Word Processor

  • The use has control over the desktop
  • Master pages are used to set a common layout which may be repeated on all the pages of the publication
  • There is a wide range of templates available e.g. brochures, posters e.t.c

 

 

 

 

 

INTERNET AND E-MAIL

 

 

Definitions of Internet and Intranet

Internet: This is an interconnection of many large computer networks to enable different computers world wide to communicate.

Intranet: Interconnection of computers within an organization to form a network.

 

Importance of Internet

  • Research activities
  • News and information dissemination
  • Leisure
  • Communication
  • Business transactions

 

Internet Connectivity Requirements

ü   Data terminal equipment: processor, host computer and transmit data on networks e.g. mobile phones, Personal Digital Assistant (PDA).

ü   Transmission media: physical (wired) or wireless pathway.

ü   Telecommunication  lines: fiber optic cables.

ü   Wireless telecommunications  like the GSM use GPRS.

ü   Satellite transmission

ü   Internet Service Providers (ISPs): Companies that offer internet services to end users at a fee.

ü   Software: Help to facilitate you access to internet- Internet Protocol (IP/ TCP), browsers (Mozilla, Opera, Internet Explorer), Email (Ms-Outlook, Express, Eudora, Yahoo Mail e.t.c)

ü   Modem: Special digital to analog interface card that is changes digital data to analog so as to be transmitted and on receiving end the data is changed from analog to digital form for computer to understand

 

Protocols

A set of rules that governs how two computers can send and receive data on the network. Types of

protocols are:

  • Transmission Control Protocol (TCP): Governs how data is transferred from one computer to the next.
  • Internet Protocol (IP): Determines the addressing system on the internet.

 

Types of Internet Connection

  1. 1. Analog:ISP ancholes.
  2. 2. Integrated Service Digital Network (ISDN): Dial up faster than analog.
  3. 3. Broadband/ Asymmetrical Digital Subscriber Line (ADSL)/ Symmetrical Digital Subscriber Line

(SDSL): Faster than dial up.

 

 

 

 

 

Internet Architecture

 

 

 

 

Global System for

Mobile Communication

 

 

 

 

 

 

GSM

Public Service Telephone Network

 

 

PSTN

 

 

VPN

 

 

Telephone

 

 

Virtual Private Network

 

Based Station

Network

 

GPRS

network

 

 

WAP

 

 

Internet

 

General Packet Radio

Service

 

Wide Area Protocol

 

WWW

 

 

 

 

GPRS device using

GSM Air

Interface

 

Internet Services

TCP/ IP required for

Each IP gate

Gateway to reach

External IP network

 

  1. 1. E-mail: Electronic exchange of letters, data and graphics on the interne
  2. 2. E-learning: Learning through interacting with special programs on the computer.
  3. 3. E-commerce: Buying and selling of goods and services on the interne
  4. 4. Video conferencing: Use of computer, digital camera and audio capturing equipment and communication network to enable people in different locations to talk to one another.
  5. 5. Instant messaging: Allow two or more people communicate directly e.g. Yahoo! Messenger, Google talk, IzzyTalk.
  6. 6. News group
  7. 7. Searching: Google, Opera Mini, Yahoo, Excite, Alta Vista.
  8. 8. World Wide Web (www): Vast virtual space on internet where information pages called websites is installed.
  • Website: Group of related web pages or other resources located on a web server.
  • Web portal: It offers specialized services like search, email, sports updates, financial news and links to selected websites.
  • Blog: Website containing information that can be easily updated. It acts as resume diary and may be used for business, advocacy and campaigns.
  • Multimedia: contains photos, movies, music, web TV, and internet radio.

 

Terms used in accessing the internet

  1. 1. Uniform Resource Locater (URL): Address given to every resource on the internet which specifies the files or data and its location.
  2. 2. Log in:
  3. 3. Sign up:
  4. 4. Surf/ browser: Process of accessing internet resources.
  5. 5. Hyperlinks: Text or picture on an electronic document especially web pages that causes other web pages to open when link is clicked.

 

  1. 6. Search engine: program that searches document for specified keywords anad returns a list of document where keywords are found.
  2. 7. Downloading: Process of transferring information from host computer network to the local storage.
  3. 8. Uploading: Process of transferring information from a local storage to a remote computer on network.
  4. 9. Computer Network: This is a collection of independent entities that are arranged in such a manner so as to exchange data, information or resources all interconnected with a computer.

 

E-mail Facilities

  1. 1. Mails
  • Checking
  • Compose
  • Send
  • Forward
  1. 2. File attachment
  2. 3. Online meeting
  3. 4. Telephone messaging
  4. 5. Contact management

 

Advantages of Emails over Letters

  • They are cheaper per individual message
  • They are faster
  • One can attach any kind of file
  • More safer than a letter

 

Precautions when setting an email system

  • Install, use and regularly update antivirus software to reduce virus infection.
  • Have a mail filtering system to track unsolicited mails.
  • Install firewalls to block unauthorized internet traffic.
  • Use passwords to allow only authorized users.

 

Email Address Parts

  • Example:  josedeororah@ovi.com
  • Josedeororah- Username
  • @- Separates username from host
  • Ovi- Host computer on network
  • .com- Identifies the type institution or domain.

 

Web Address Parts

 

 

 

DATA SECURITY AND CONTROLS

 

 

Data and Information Security involves

ü Protection of data and information against unauthorized access.

ü Denial of data and information to unauthorized access.

ü Provision of data and information to authorized users.

 

Data Security Core Principles

1. Confidentiality  
2. Integrity CIA
3. Availability  

 

Security Threats and Control Measures

  1. 1. Virus

Destructive program that installs itself in the computer

Types of Viruses

  1. 1. Boot sector: It destroys the booting information on storage devices.
  2. 2. File: It attaches themselves to files.
  3. 3. Hoax: They are spread through e-mails.
  4. 4. Trojan: It performs undesirable activities in the background.
  5. 5. Worms: They stick in the computer memory.
  6. 6. Backdoors: Trojan/ worm that allow hidden access to computer files.

Sources of Viruses

  • Contacts with contaminated system
  • Pirated software
  • Infected proprietary software
  • Freeware and shareware
  • Updates of software distributed

Symptoms of viruses

  • Quizzical messages appearing on the screen
  • Unfamiliar graphics
  • Keys on keyboard changing
  • Program taking longer to load
  • File access taking longer to load
  • Less memory available is unusual
  • File programs disappearing mysteriously.
  • Disk access seem extensive for simple tasks

Control Measures against viruses

  • Install the latest version of antivirus
  • Avoid foreign disks
  • Scanning mails before opening

 

  1. 2. Unauthorized Access

Types

  1. 1. Eavesdropping: Tapping into communication channels to get information.
  2. 2. Surveillance: Gathering information and use it for illegal purpose
  3. 3. Espionage: Spying to get information to use it to counter or finish another computer.

 

Control Measures against Unauthorized Access

  • Data encryption during transmission
  • Reinforce check access points
  • Enforce network security measures
  • Keep the computer room closed when nobody is using it
  • Fingerprint identification strategies

 

  1. 3. Computer Error and Accidental Access

Occur as a result of people experimenting with features which they’re not familiar with or make a mistake by printing sensitive reports and unsuspecting give them to unauthorized person.

Control Measures

  • Give various file access privileges
  • Set up comprehensive error recovery strategy in the organization
  1. 4. Theft

Control measures

  • Employ guards
  • Burglar proofing
  • Reinforce weak access points
  • Install backup storages preferably out of the computer room

 

  1. 5. Computer Crimes
  2. 1. Trespass: Gaining access to information without permission.
  3. 2. Cracking: Guess work till one discovers weakness in security.
  4. 3. Hacking: Intentional breaking of codes and passwords to gain access.
  5. 4. Tapping: Sending an intelligent program to the host computer to get information.
  6. 5. Piracy: Making illegal copies of copyrighted software.
  7. 6. Fraud: Use of computers to cheat people with the intention of gaining money or information.
  8. 7. Sabotage: Illegal destruction of data and information with the aim of crippling service delivery or causing great loss to an organization.
  9. 8. Alteration: Illegal changing of data and information without permission with the aim of gaining or

misinforming the authorized users.

 

Control measures against piracy

  • Make software cheap enough to increase affordability.
  • User license and certificates to identify originals.
  • Set installation passwords to deter illegal installation.

 

Detection and Protection against Computer Crimes

  1. a) Audit trial: Careful study of an information system in order to establish or find out all weakness in the system that could lead to security threats and weak access points.
  2. b) Data encryption: Transforming data in a way that only the sender and receiver can understand.
  3. c) Log files: Special system files that keep records of events on the use of the computer and resources in the information system.
  4. d) Firewalls: Software that filters data and information exchanged between different networks by enforcing the host network access control policy.

 

Rules in selection of a good password

  • A good password should be at least six characters long, including both letters and numbers.
  • It should not be easy for somebody to know.
  • It should be easy to remember.

 

Reason for Information System failure

  1. 1. Hardware failure due to improper use.
  2. 2. Unstable power supply as a result of brownout or blackout and vandalism
  3. 3. Network breakdown
  4. 4. Natural disasters like floods, etc.
  5. 5. Program failure or crash

 

Difficulties in detection and prevention of computer crimes

  • Crime right be complex
  • It’s not easy to find clear trail of evidence leading to the guilty party e.g. no fingerprints.
  • There are no witnesses.
  • Few people in management and law enforcement know enough about to prevent crimes.

 

Causes of Data Loss

  • Attack by malicious programs like viruses
  • Data manipulation- alteration and deleting ( sabotage)
  • Piracy: illegal copying of copyright  protected data and information

 

 

 

Data Protection Measures

ü   Encryption

ü   Enforcing data and information access control policies on all employees and outsides

ü   Reinforce computer room security

ü   Assign user accounts in a networked environment

ü   Install firewalls: They act as security buffers or wall between private network and other networks

ü   Install security and antivirus software, which should be updated regularly to protect the computer against malicious programs.

ü   Put in place disaster recovery plan

ü   Avoid downloading programs, games, screen savers and themes you are not sure of

ü   Enable write protection on removable disks.

ü   Protect the computer against brownouts or blackouts which may cause physical damage or data loss by using surge protectors and UPS.

 

Concerns related to collection and use of private and confidential data are:

ü   Spreading information without the owners consent or awareness

ü   Spreading inaccurate information

ü   Eavesdropping and taping of information from a communication line

ü   Secretly recording and reporting user activities by using normal recording devices, spyware and copiers

 

Laws governing Piracy and Confidentiality

  1. 1. No secret databases e.g. in government or private organizations
  2. 2. Right to individual access
  3. 3. Right of consent- information for one purpose cannot be used for other purpose without owners consen
  4. 4. Right to correct- individual corrects or amends records of his or her information.
  5. 5. Assurance of reliability and proper use- Data must be reliable.

 

Laws governing protection of Information

  1. 1. Data and information should be kept secure against loss or exposure.
  2. 2. Data and information should not be longer than necessary.

 

  1. 3. Data and information should be accurate and up to date.
  2. 4. Data and information should not be transferred to other counties without owners’ permission.
  3. 5. Data and information should be collected and kept for specified lawful process.

 

 

DATA REPRESENTATION IN A COMPUTER

In this topic we will focus on the classification of computers according to their functionality:

  1. 1. Analog
  2. 2. Digital
  3. 3. Analog

 

In digital computers, the user input is first converted  then transmitted as electrical pulses called periodic that can be represented by two distinct states  ON and OFF. The ON state may be represented by a “1” and OFF state by a “0”. The sequence of the two states results to an electrical signal that the computer can understand.

 

 

 

 

 

 

 

 

 

 

Digital Signal                                                                  Analog signal

In order for data to be exchanged via network the data is first converted to analog signals during transmission (modulation) then the analog signals are converted to digital (demodulation).

 

Three Signal parameters in a periodic

  • Amplitude (A): The maximum value attained by a pulse in a wave.
  • Frequency (f): Number of cycles made by the wave in one second.
  • Periodic time (T): Time taken by signal to complete one cycle

 

Concept of data representation

Data representation in electric circuits

High voltage (ON) is represented as “1” while a low voltage (OFF) is interpreted as “0”.

 

Data representation in magnetic media

The presence of magnetic field in one direction is (1) while absence of magnetic field is (0).

 

Data representation in optical media

The presence of light is (1) while absence is interpreted as (0)

 

Reasons for use of binary digital technology

  1. 1. It is the only language the computer can understand.
  2. 2. Devices that use binary technology use less energy, are more reliable and are small in size than analog devices

 

Bits, bytes, nibble, word, word length

  • Bit: Binary unit/ Basic unit of data and information in a digital computer.
  • Byte: A collection of eight bits.
  • Nibble: four bits or half a byte.
  • Word: Combination of logical characters.
  • Word length: Number of bits of in each word of a computer.

 

 

Types of Data Representation

Number system and their representation

 

Decimal number system

Consists of 10 digit ranging from 0 – 9. It is written as base10. In decimal number system the magnitude of a number is evaluated using three parameters:

ü   Absolute value- magnitude of a digit in a number line

ü   Place value/ position value-

ü   Base value

 

Binary number system

Use two digits “0 and 1”. It is written as base2.

 

Octal number system

It consists of eight digits ranging from 0 to 7. It is written as base8.

 

Hexadecimal number system

It consists of sixteen digits ranging from 0 to 9 then letters A to F. A= 10,B= 11 and so on.

 

Reasons for using Octal and Hexadecimal number system

ü   A single octal/ hexadecimal digit encodes more than one binary digit. This is automatic data compression, hence saves space on storage media.

ü   Instead of transacting long digits of 0’s and 1’s between devices, the data can be encoded sa octal or hexadecimal to improve transmission efficiency.

 

Base Conversion

Decimal to binary

Divide by 2 noting the remainder from bottom. For fractional part multiply by 2 while noting the remainder from top.

Example

Convert the decimal number 7.562510  into its binary equivalent

Solution

Convert the two parts separately

Integral part

2       7

 

2       3 R 1

2       1 R 1

0 R 1         7 is equivalent to 1112

Fractional part

Read this digits

 

0.5625 x 2 = 1.125

0.125 x 2   =   0.250

0.250 x 2 =    0.500

0.500 x 2 =    1.000

Since the product of the last step of the fractional part is zero. We stop here.

0.5625 x 2 = 0.10012

 

7.5625 = 111.10012

 

Binary to decimal:

The integral part

First write the place values starting from the right hand side. Write each digit under its place value.

Multiply each digit under its corresponding place value i.e. 2^ (from 0, 1). Add up the products. The answer will be the decimal number in base 10. The fractional part

Multiply each digit under its corresponding place value i.e. 2^ (from -1).

 

Decimal to octal

Divide by 8 noting the remainder from bottom. For fractional part multiply by 8 while noting the remainder from top. The answer is to base 8.

 

Octal to decimal

The method is similar to converting binary to decimal but using 8 instead of 2.

 

Binary to octal

Divide the binary numbers in pairs of three from the right side. Then multiply each digit by its place

value i.e. 2^. The answer is to base 8.

 

Octal to Binary Divide each digit by 2. Decimal to Hexadecimal

Just like the process done in converting decimal to binary but using 16. The answer is to base 16.

 

Hexadecimal to decimal

Like binary to decimal conversion but using 16^. The answer is to Base 10.

 

Binary to Hexadecimal

Divide into four parts, then multiply each digit by the place value of 2^, answer to base 16.

 

Hexadecimal to Binary

Divide each digit by 2. Answer to base 2.

 

 

Symbolic Representation using Coding Schemes

Binary Coded Decimal (BCD)

This is a 4 bit code scheme applied in calculators and microwaves because it makes it easier

to process and display individual numbers on the LCD screen. Standard BCD is an enhanced BCD in an 8 bit representation scheme and can represent non-numeric characters. Only 64 or (24) characters can be represented.

 

American Standard Code for Information Interchange (ASCII)

A 7 bit code scheme that only represents 128 characters (28).

 

Extended Binary Coded Decimal Interchange Code (EBCDIC)

An 8 bit digit character coding scheme used primarily in IBM systems. A total of 256 or (28)

characters can be represented.

 

Binary Arithmetic Operations

Arithmetic and Logic Unit (ALU) performs subtraction  by process called (complementation).  For multiplication and division the ALU uses a method called (shifting) before adding the bits. Representation of signed binary numbers

Both positive and negative numbers can be represented in the computer memory during processing.

Various methods are used to represent negative numbers in the computer:

 

  1. 1. One’s Complement (1c Method)

The binary bits representing the negative number are negated that in the number are changed to 0’s and vice versa. Example; -1710

-17 can be represented in binary as a negative as follows

Solution

1710                     100012

Therefore -17              011102       (One’s Complement)

 

  1. 2. Two’s Complement (2c Method)

The negative number is represented into binary, then complemented as in 1c method but a (1) is added to the least significant digit of the complement value. Example; -1710

Solution

1710                   100012

Therefore -1710                         011102

01110

 +       1   

011112

 

 

  1. 3. Signed Magnitude

In decimal numbers, signed number has a prefix “+” for a positive number  and (-) for negative number may be represented by prefixing a digit ‘1’ to the number while a positive number may be represented by prefixing a ‘0’ ie.

1710                 100012  (unsigned)

-1710                   To indicate it’s a negative number we add an extra bit (1) 100012

+1710                   To indicate the positive number we add an extra bit (0)100012

 

Advantages of Two’s Complement

There are no two ways of representing a zero as in 1c method and signed magnitude.

Effective addition and subtraction can be done even with numbers that are represented with a sign bit.

 

Binary Arithmetic

Binary Addition

Binary addition rules

A+B

0+0

SUM

0

CARRY

0

0+1 1 0
1+0 1 0
1+1 0 1
1+1+1 1 1

 

Binary Subtractions

A-B DIFFERENCE BORROW
0-0 0 0

 

Rules

 

 

0-1 1 1
1-1 1 0
1-1 0 0

 

 

Subtracting Using One’s Complement

Question: Get the difference in 7-4 using Ones complement.

2 4 0
2 4 0
  1 1

 

Solution

Rewrite the problem as 7+ (-4)

Convert the absolute value of 4 to 8 bit equivalent ie.

 

 

000000012

Take the one’s complement of 000000012  ie 111111102  which is the binary representation of –

410

Add the binary equivalent of 7 to 1c of 4 ie.

2

2

7

3

1

1

  1 1

 

R

 

 

00000111

+11111110 (1)000001012

Looking at the difference of two binary numbers, you will observe that

  1. 1. Has an overflow bit
  2. 2. The results shows that the difference between the two numbers is 000001012. This isn’t true! We know it should be 000001102.

00000101

                1    

000001102

 

 

 

 

Subtracting using Two’s Complement

Question: Using 2’c Method work out 710 – 410 in binary form.

Solution

Convert 410 to binary equivalent ie. 000000012

One’s complement of 000000012  is 111111102

Two’s complement of 111111102 + 1 = 111111112

Add the 2’c to the binary equivalent of 710

11111111

+00000111   (1)000001102

 

000001102

 

DATA PROCESSING

 

 

Definition

This is the process of transforming data into a meaningful output i.e. information.

Data Processing Cycle

 

Data Collection

 

 

 

 

 

Data Output

Data Input

 

 

 

 

Processing

 

 

Data collection/ Information gathering/ Fact Finding

Methods involved in data collection are; interviews, questionnaires, observation or direct data capture. Stages involved

  1. i. Data creation: the process of putting together facts in an organized forma ii.       Data transmission: converting the collected data to something meaningful.

iii.       Data preparation: conversion of data from source document to machine readable form.

  1. iv. Media conversion:
  2. v. Input validation: check and remove errors
  3. vi. Sorting: arranging data in an organized forma

Data Input

This is the process where the collected data is converted from human readable form to machine readable form.

Data Processing

This is the actual transformation of input data by the control processing unit (CPU) to a more meaningful output or information.

Data Output

This is the final activity of data processing cycle which produces the information. Ways of data dissemination

  • Electronic presentation over media or television
  • Distribution of hard copies
  • Broadcasting the message over the internet
  • Mobile phones

 

Description of Errors in Data Processing

Types of Data Processing Errors

Transcription errors

Errors that are made during data entry. Types of transcription errors are;

  1. a) Misreading errors-Occur as a result of incorrect reading of source document by the user like typing S instead of 5.
  2. b) Transposition errors– Occurs as a result of incorrect arrangement of characters or incorrect order of characters. Example, instead of typing 567, typing 576.

Computational errors

Result from an arithmetic operation that doesn’t produce the required output. Types;

  1. a) Overflow errors– Occur from a calculation that is too large to be stored in allocated memory space.
  2. b) Truncation errors– result from real number that has a long fractional part which cannot fit in

the allocated memory. Example 0.75535322                   0.755 (truncated to four digits)

  1. c) Rounding errors– from raising or lowering a digit in a real number to the required rounded number. Example 7.56                 7.6

Algorithm or Logical errors

Result from logarithmic design.

 

Data Integrity

The accuracy and completeness of data intended in a computer or received from the information

system. Data integrity is determined by;

  1. 1. Accuracy: whether the data is true or false.
  2. 2. Timeliness: This relays the availability of data in time or whether it is already outdated.
  3. 3. Relevance: Consider whether the expected output meets the processing cycle requirements, the daily operations and the decision making.
  4. 4. Audibility (Verifiability): Ability of the user to check the accuracy and completeness of information.

Minimizing threats to data integrity

  • Using error detection and correction software when transmitting data.
  • Using devices that capture data directly from source e.g. cameras
  • Controlling the access to data by enforcing security measures.
  • Back-up data preferably on external storage media.
  • Design user interface that minimize chances of invalid data entry.

 

Data Processing Methods

  1. 1. Manual data processing
  2. 2. Mechanical data processing
  3. 3. Electronic data processing

 

Factors determining the Methods of Data Processing

  • Size and type of business
  • Timing aspects
  • Link between applications

 

Computer Files

Definition: A collection of related records that give a complete set of information about a certain data

item.

Advantages of a computer files

  • Information takes less time than manual system
  • Enhances integrity and reduces item duplication
  • Offers faster data access and retrieval
  • It’s much easier to update and modify easier

 

Elements of a Computer File

ü   Character- any single entry

ü   Field- a single character or a collection of character that represent a single piece of data

ü   Records- A collection of related fields that represent a single entity

ü   File

 

Ways of viewing a file

  1. 1. Logical: the file is viewed in terms of its content and the processing to be carried upon.
  2. 2. Physical:  the file is viewed in terms of its appearance and how processing is made possible.

 

Types of Computer Files

  1. 1. Master: Main permanent or semi permanent file containing record of particular item.
  2. 2. Transaction: Input output file holding incoming and outgoing data and also updates master file.
  3. 3. Reference: Permanent or semi-permanent used for look up purposes and it contains static records.
  4. 4. Sort: File created from existing transaction/ master file.
  5. 5. Back up: Duplicate existing files to supplement the operational files incase of any loss reason.
  6. 6. Report: They contain extracted records from master file.

 

File Processing Methods

ü   Updating: Changing data in master file to reflect the current status.

ü   Reference: Happens when it is made to particular records to ascertain what is contained there in but doesn’t alter the content.

ü   Sorting: Entails arranging of file contents into a predetermined sequence of the key field

which occupy the same position.

ü   Merging: Process of combining the contents of master file from a file.

ü   Matching: Input files records are matched or compared to ensure that records exist in both files.

ü   Summarizing: Records of interest from the file are accumulated to form a record in an output file.

ü   Searching: Entails looking for the record of interest from the file.

File Updating

ü   Hit rate: Used to describe the rate of processing of a master file in terms of its active records

ü   Volatility: Frequency with which records are added to the file or deleted from. If the frequency is high then the file is said to be “volatile” otherwise “static”.

ü   Size: Refers to the amount of data stored in the file. Its expressed in terms  of the total number of records in the file.

 

File Organization Methods

Sequential file organization

Records are stored and accessed in a particular order sorted using a key field. The key field is used to

search for particular record. Searching commences from the beginning of file and proceed to the tail of the file till the record is reached e.g. in magnetic tapes.

Advantages

  • Simple to understand the approach
  • Easy to organize, maintain and understand
  • In expensive input output media and devises are used

Disadvantages

  • Entire file must be accessed even when the activity rate is very low.
  • Random enquiries are impossible to handle.
  • Data redundancy is typically high.

 

Random or direct file organization

Records are stored randomly but accessed directly. A record key is issued to determine where the record is stored on storage media e.g. in magnetic and optical disks.

Advantages

  • Records are quickly accessed
  • File update is easily achieved

Disadvantages

  • Data may be accidentally erased or overwritten unless precaution taken
  • Expensive hardware and software resources are required
  • Relative complexity of programming
  • System design around is complex and costly

 

 

Serial file organization

Records are laid out contiguously one after the other in no particular sequence. The records are stored one after another in the same order they come into the file and there exists no relationship between contiguous records e.g. magnetic tapes.

 

 

Indexed sequential file organization

It is similar to sequential method only that an index is used to enable the computer to locate individual records on the storage media e.g. magnetic disks.

Advantages

  • Resources can be accessed sequentially or randomly
  • Records are not duplicated
  • Accessing of records can be fast if done randomly

Disadvantages

  • Storage media is rather expensive
  • Accessing records sequentially is time consuming
  • Processing records sequentially introduce redundancy

 

Elements of Data Processing Modes

  1. 1. Online: Data is processed immediately received. The computer is connected to data input unit via communication link and stores the results.

Application

  • Banking
  • Stock exchange
  • Stock control

 

  • Water/electricity billing

Advantages

  • Files are maintained up to date.
  • Information is readily available for current decisions.
  • Files enquiries are possible through terminals (workstations).

Disadvantages

  • Systems are complex to develop.
  • Costly in terms of hardware, software, storage media e.t.c.
  1. 2. Real-time: Process incoming data as soon it occurs, updating transaction file and giving immediate results.

Application

  • Air reservation
  • Hotel reservation
  • Chemical plant processing

Advantages

  • Information is readily available for instant decision making.
  • Provides immediate control.
  • Fast and reliable information.

Disadvantages

  • Requires complex and expensive operating system.
  • Aren’t easy to develop.
  • Require Front End Processors (FEPs) to relieve the central processor.
  1. 3. Distributed: Divides processing task to two or more computers on separate sites connected by data transmission media.

Application- Banks where customers can be served from different branches but information

is updated at head branch.

Advantages

  • Less risk to system breakdown.
  • Incase of data loss, only a small portion of data is lost.
  • Reduces the load on the host computer hence faster processing.

Disadvantages

  • Requires more expensive CPUs.
  • Operating system is complex and more difficult to operate.
  1. 4. Timesharing: Terminals are connected to the central computer are given access to the CPU

apparently the same time.

Application

  • Bureau
  • Companies
  • Learning institutions

Advantages

  • Better services to users, for information/ output are fast.
  • File enquiries possible since files are held online.
  • User interaction possible through terminals.

Disadvantages

  • User has no control over the central computer.
  • Not reliable with regard to data security. Response time is slow where there are many tasks.
  1. 5. Batch: Data is accumulated as a group (batch) over a specified period of time then processed

Application

  • Payroll processing

Advantages

  • Simple to develop
  • Timing reports is not a necessity

 

  • Unit cost of processing is low

Disadvantages

  • Time lag between origination of transaction and the information available
  • Late information is not suitable in situations when instant decisions are required.
  • Difficult to provide the desire priority schedule
  1. 6. Multiprocessing: Different processors are connected to the main processor like in banks to update transactions made.
  2. 7. Multitasking/ multiprogrammining:  Capable of handling more than one task but the processes one at a time.

Advantages

  • Increase productivity of computer reducing CPU idle time
  • Reduces incidence of peripheral bound operations

Disadvantages

  • Requires more expensive CPUs
  • More sophisticated software is required to maintain data integrity.
  1. 8. Interactive: Continuous communication between the user and the computer.

 

Advantages of Electronic Processing

  1. 1. Quick processing especially where all required data is available
  2. 2. Availability of data and information digitally
  3. 3. Distance between entities that are processing data is made non-significant
  4. 4. Support for information sharing and collaboration

 

 

 

Disadvantages of Electronic information Processing

  1. 1. Security of data can be compromised during storage or while in transept on networks if appropriate measures are not taken
  2. 2. Lack of legal framework in many countries that should support electronic processing activities
  3. 3. Lack of ICT skills among many knowledge workers to support electronic data processing

 

ELEMENTARY PROGRAMMING PRINCIPLES

 

 

Program: A set of instructions

Programming: The process of developing computer instructions used to solve a particular task. Programming language: Special list of symbols that can be translated into machine readable form by a computer when in a particular sequence or order.

 

Terms used in Programming

Source program: Program code that programmers enter in the program editor window that is not yet translated into machine readable.

Object code: Program code that is in machine readable form

Translator: Language processor that converts source program into object code.

Assembler: Translates assembly language into machine language that computer can understand. Interpreter: Translates source program line by line allowing CPU to execute one line before translating

Compiler: Translates the entire source program into object code.

Encapsulation: Process of having data and functions that operate on the data within an object.

 

Interpreter Compiler
Translates source program one statement at a time Translate entire source code at once for execution
Translates program code each time it

is run hence slower the compiling

Object code can be saved on a storage

media and run as required hence executed faster

 

Levels of Programming

Low Level

They were easy, understandable and hardware oriented hence not portable.

  1. 1. First Generation Language (1st GLs)/ Machine Language: they are written using binary logic.
  2. 2. Second Generation Language (2nd GLs)/ Assembly Language:  used MNEMONICS

(symbolic operation codes, shortened two or three words)

High Level

They are very close to human language and are machine independent, hence they are portable

  1. 1. 3rd GLs (Structured procedural): Pascal, Formula Translator (Fortran), COBOL,

BASIC, Ada.

  1. 2. 4th GLs: They present programmers with programming tools. Examples; Visual Basic, Visual Delphi, Visual COBOL.
  2. 3. 5th GLs: They depict human like intelligence- PROLOG, MERCURY, LISP and OCCAM.
  3. 4. Object Oriented Programs (OOP): Simula, C++, Java and Small Talk.
  4. 5. Web scripting: Java, php (hypertext preprocessor), Visual Basic Scrip

 

 

 

Advantages and Disadvantages of Low and High Level

Advantages and Disadvantages of Low Level

Advantages

  1. 1. Easily understood by the CPU

 

  1. 2. Processed faster
  2. 3. Stable and hard to crash

Disadvantages

  1. 1. Difficult and cumbersome to use and learn
  2. 2. Require highly trained personnel
  3. 3. Debugging is difficult
  4. 4. Machine dependent

 

Advantages and Disadvantages of High Level

Advantages

  1. 1. They are portable
  2. 2. Friendly and easy to use and learn
  3. 3. Flexible enhancing the creativity of programmers
  4. 4. Debugging is easier

Disadvantages

  1. 1. Easily crash

 

 

Program Development Stages

  1. 1. Problem recognition
  2. 2. Problem definition
  3. 3. Program design
  4. 4. Program coding
  5. 5. Program testing and debugging
  6. 6. Implementation and maintenance

 

Problem recognition

Reasons for development of a computerized program:

  • Problem or undesirable situation that prevents an individual from achieving their goals.
  • Opportunity to improve the current system.
  • A new directive, given by the management requiring a change in status quo.

 

Problem analysis

Determining or defining the likely input, processing activities and the expected output.

 

Program Design

Actual development of program’s processing or problem solving logic called the algorithm.

 

Program Coding

Process of converting a designed model into its equivalent program using programming language.

 

Program Testing and Debugging

Correcting errors in the program being developed and making sure it meets the requirements. Types of errors:

  1. a) Syntax errors: Arise from the improper use of language rules e.g. punctuation and spelling.
  2. b) Logic errors: They are not detectable by translator but halt the program when running i

Method of Error Detection

  1. 1. Desk checking (dry run): correction is done on papers.
  2. 2. Debugging utilities: errors are corrected before execution.
  3. 3. Test data: trial runs by programmers.

Reasons for testing the system before implementation

  1. 1. Ensure that all the system programs are error free

 

  1. 2. Guarantee that the end user can successfully interact with the system
  2. 3. Establish whether components of the system interface correctly
  3. 4. Determine the ruggedness of the system
  4. 5. Ensure that operations group has adequate group has documentation and instructions to operate the system properly

 

Implementation and Maintenance

Implementation: Actual delivery and installation of the new program ready for use. Review and maintenance

 

Program Documentation

Writing of support materials explaining how program can be used by users, installed by experts by operations and modified by programmers:

  1. 1. User oriented- enables the user to use the program easily and quickly.
  2. 2. Operator oriented: help to install and maintain the program.
  3. 3. Programmer oriented: provide necessary technical information for future modification of programmers.

 

Benefits of program documentation

  • Help during future modification of a program
  • Help other programmers to understand the code statement
  • User learns how to use the program quickly
  • Help in installing and maintaining the program.

 

Algorithm Development

Pseudocode

Guidelines for designing a good Pseudocode

  1. 1. The statement must be short, clear and reliable
  2. 2. The statements must not have more than one meaning i.e. should be unambiguous
  3. 3. The Pseudocode lines should be clearly outlined and indented clearly
  4. 4. A Pseudocode should show  clearly the start and stop of executable statements and the control structures (to be discussed later in the section).
  5. 5. The input, output and processing statements should be clearly stated using keywords like PRINT, READ, INPUT etc.

 

Program Flowcharts

Common symbols used in drawing program flowcharts are:

 

 

 

Start/ Stop

 

 

 

Input/

output

 

 

 

Process

 

 

 

 

 

Decisio n

Ellipse: denotes the beginning and end of the program algorithm. Parallelogram: used to denote an input or output operation.

 

 

Rectangle: Indicates that a processing or data transformation is taking place.

 

 

Rhombus: Used to specify a condition. A condition must evaluate to a Boolean value (True or false) for the program to execute the next instructions.

 

 

 

Connect or

Connector: Used as a connecting point or interface for arrows coming fro different directions

 

 

 

 

Arrow: Used to indicate the direction of flow of the program logic.

 

 

Advantages of Flowcharts

  • Gives programmer good visual reference of program function.
  • Serves as a program or system document.
  • It is easy to trace through from the start to find the action resulting

 

Program Control Structure

Blocks of statement that determines how statements are to be executed; sequence, selection and iteration.

Sequence

Computer read instructions from a program file stretching from the first top lines and proceding document one-by-one to the end- sequential program execution.

 

Selection

Execution of statement depends on a condition that returns true or false. There are four types

IFTHEN

Only one IF option is available. All others are ignored during program execution. General format: IF <condition> THEN

Statement; END IF

 

IFTHEN…ELSE

Only two Ifs are the available option. The general format: IF <condition> THEN

Statement; ELSE

Statement; END IF

 

Nested IF selection

There two or more If options and statements to be conditioned to make a selection. General format; IF <condition> THEN

Statement

ELSE

IF <condition> THEN Statement

ELSE Statement

END IF END IF

 

Case Selection

An alteration to Nested If especially where there are several options to choose from. The flowchart not different from Nested IF.

 

CASE X OF

Label 1: statement 1

Label 2: statement 2

Label 3: statement 3

.

.

.

Label n: statement n- 1

ELSE Statement n

END CASE

 

 

Iteration/ Looping

Repetition designed to execute  the same block of code again and again till a certain condition if fulfilled.

The WHILE…DO loop

General format

Pseudocode                                                                           Flowchart

 

 

 

 

While <condition> Do

Statement

End while

 

 

 

Condition

?

No

 

Statements

 

 

Yes

 

End Loop

 

 

The REPEAT…UNTIL loop

General format

Pseudocode                                                                           Flowchart

 

 

 

Repeat

Statement

Until <condition>

 

Statements

 

 

 

 

 

Condition

?

Yes

 

No

End Loop

 

The FOR loop

General Format

  1. 1. Format for the FOR loop that counts from the lower limit

 

FOR loop variable= Lower limit To Upper limit DO Statements

End FOR

  1. 2. Format for the FOR loop that counts from the upper limit down to the lower limit

 

FOR loop variable= Lower limit Down to Lower limit Do

Statements

End For

 

 

 

 

 

Flowchart extract for  a FOR loop that counts upwards

 

 

 

 

Loop variable= Lower limit

Lower limit= Loop variable + 1

 

 

 

 

 

 

Condit ion?

No

 

 

Yes

Statement

 

 

 

 

 

Flowchart extract for  a FOR loop that counts downwards

 

 

 

 

 

Loop variable= Upper

Limit

Upper Limit= Loop variable + 1

 

 

 

 

 

 

Condit ion?

No

 

 

Yes

Statement

 

SYSTEM DEVELOPMENT

 

 

Definition of System Development

Organization of components which interact in a given environment and within a specified boundary to achieve collective goals and objectives that are emergent.

 

Description of a system

A system is described as either hard or soft system

Soft System

  • Their boundaries may be fluid or keep on changing.
  • Their goals and objectives usually conflict and may not be captured clearly because they are human based.
  • It is difficult to precisely define exact measure of performance for them. Examples: sales tracking and predicting systems, political system,

Hard systems

They are systems whose goals and objectives are clearly defined and the outcome from the system process are predictable and can be modeled accurately.

 

Characteristics of Systems

  1. 1. Holistic thinking: Combination of various components to create a complex whole.
  2. 2. Subsystems: A system doesn’t exist in solitude but may be a component of a large system.
  3. 3. Boundary and environment: An external element whose changes in attitudes, behavior and property affect respectively.
  4. 4. Processor: Transform or processes data from one state to another.
  5. 5. System entropy: The decaying or becoming useless because of the improvement in technology, new management policies or the change in user requirements.
  6. 6. Inputs and outputs: The system communicates to its environment by receiving inputs and giving outputs.
  7. 7. Open and Close: The open system receives input from and gives output to the environment while the closed system uses input as its own benefit thus building itself from the outpu
  8. 8. Purpose: The objectives that a system is supposed to achieve enable system developers to measure the performance of a system during its operation.
  9. 9. Control: This is the method by which the system adapts to changes in the environment in order to give the expected output or to perform to the expected level.

 

 

Input

System Processes

Output

 

 

System Processes

Control                                                                         Feedback

Signal

 

Control

 

Information System

An arrangement of people, data processes and information that works together to support and improve the day to day operation in a business and decision making. Purpose:

  • Supporting information processing task e.g. data collection, processing and communication.
  • Helping in decision making by collecting operational data, analyzing it and generating reports to be used in supporting decision making process i.e. online analytic process.
  • Enable information sharing

 

Reasons to develop a new system

  • New opportunities to improve quality of internal processes and service delivery in an organization.
  • Problems that prevent an organization from meeting its goals.
  • Directives or new requirements by the government, management or an external influence.

 

The Role of an Information System Analyst

  1. 1. Responsible for identifying an organization’s needs and problems.
  2. 2. Reviewing the existing system and making recommendations on how to improve or implement an alternative system.
  3. 3. Working hand in hand with programmers to construct a computerized system.
  4. 4. Coordinating training of the new system users and owners.

 

Theories of system development

  1. 1. Traditional approach: Relies mostly on the skills and experience of individual staff members carrying out the project.
  2. 2. Rapid Application Development (RAD): Quick implementation of the new information system.
  3. 3. Structured approach: System developers define a set of procedures to be followed when developing a system.

 

Stages of System Development

  1. 1. Problem recognition and definition (Problem analysis)

The system analyst needs to carry out a special study to establish the cost and benefits of a new system i.e. a feasibility study. The feasibility of a system is assessed in four ways:

  1. 1. Operational feasibility: Establishes the extend to which the users are comfortable with the proposed system.
  2. 2. Schedule feasibility: Whether development of proposed system will be accomplished within the

available time.

  1. 3. Technical feasibility: Whether the available technology is sufficient or can be upgraded.
  2. 4. Economical feasibility: The effective cost i.e. cost and benefit of proposed system.

 

  1. 2. Information Gathering/ Fact finding

Studying available documentation

Advantages

  • One has the necessary material.

Disadvantages

  • Slow method
  • If wrong data was entered wrong information will be collected.

 

Interviews

Guidelines:

 

ü   Interviewee must be informed in good time and the topic of discussion communicated before to allow for adequate preparation.

ü   Avoid personal biases in your questions.

ü   Be careful about body language and proxemics.

 

Types of Interviews

  • Structured: Questions have been already organized or prepared and spaces for the answers/

responses.

  • Unstructured: Questions are not written or prepared.

Advantages

  • Non-verbal communication can be used.
  • Questions can be rephrased instantly for clarification and to probe the interviewee further.
  • Gives adequate opportunity for the interviewer.
  • Interviewer is accessible to first hand information.

Disadvantages

  • It is difficult to organize interviews and they are time consuming.
  • Interviewee may not fully open up on some issues that may be personal or sensitive.
  • They are expensive to conduct.

 

Automated Methods

The uses of data capture devices like cameras, scanners and camcorders.

Advantages

  • The method is accurate.
  • Fast.

Disadvantages

  • Expensive equipment required.

 

Questionnaire

It is a special purpose document that allows a person to collect information and opinions from the people who receive and respond to it.

Application

  • When limited amount of information is required from a large number of people.
  • People you need to gather information from are vastly dispersed.

Advantages

  • Since they are filled and returned in primary more sincere responses are possible.
  • Respondent can fill the questionnaire at their own pace.

Disadvantages

  • Good ones are difficult to prepare.
  • The respondent may not fully understand the questions because of ambiguity of language hence giving erroneous responses.
  • Time consuming in analyzing.

 

Observation

Advantages

  • Difficult concept for non-technical staff to explain can be observed.
  • Helps analysts become acquainted with the operational personnel.
  • Helps the analyst acquire know how needed to assist that have been recommended.
  • Can correct “hazy” understanding/ erroneous impressions.

Disadvantages

  • The person being interviewed can alter behavior leading to wrong requirement being observed.
  • The need to be on-site consumes a lot of time.
  • The method cannot give information about past activities and problems.

 

 

  1. 3. System Classification
  • Deterministic system: system whose output is precisely known by their inputs like the computer system.
  • Probalistic system: Output can only be predicted but not precise like in business and economics.
  • Cybernetics system: Self system which adapts to the environment and regulate their own behavior by accessing the feedback e.g. in human beings, plants.

 

  1. 4. Requirement Specification

Output Specification

Activities that entail generation of reports used to facilitate decision making. Factors to consider;

  • Target audience.
  • Frequency of report generation.
  • Quality and format of output.

Input Specification

  • Content and volume of input.
  • Mode and device of input selection.
  • Layout and information sequence

File / data store specification

  • The key attribute/ field
  • Type of data
  • Length of each field
  • Back up and recovery strategies

Hardware and software specification

  • Economic factors e.g. prices
  • Operational factors e.g. reliability, upgradability, compatibility with existing resources
  • User-friendliness

 

  1. 5. System Construction

The coding, installing and testing modules and their components e.g. Input, output by

  • Using high-level structure language like PASCAL, COBOL e.t.c.
  • Fourth Generation languages- Visual Basic, Visual COBOL, Visual Delphi e.t.c.
  • Customizing the standard packages.
  • Testing

 

  1. 6. System Design

Development of flowcharts, data flow diagrams, structured charts e.tc.

 

  1. 7. System Implementation

The activities involved during this stage are: Installing the system, testing, converting from old system to the new system and training the users.

File creation and convention: Setting up of master files to be used to support the new system.

Training the staff

  • Convert staff of user department on the effectiveness of the new system
  •  Remove fear of change from them
  • Enabling staff cope with processing task of the new system

Methods used in training: documentations, film shows, manual reference, group discussions and visits

 

Changeover

The process of changing over from old system to the new system.

  1. 1. Direct Changeover: The new system commences live operations and immediately the old system is abandoned.

Advantages

  • Cheap method

 

Disadvantages

  • Places the organization in a do or die situation
  • Extremely risky

 

  1. 2. Parallel Changeover: Operations of the old system and the new system are run alongside each other

Advantages

  • Provides a method of training in the new system
  • Personnel become familiar with the new system

 

Disadvantages

  • Costly to run two systems
  • Cross checking is difficult
  • Requires more staff hence more training is required

 

  1. 3. Phased Changeover: Implementation is done only on part of the new system at one time or step by step.

Advantages

  • Allows the system to be implemented quickly
  • Less costly
  • Failure of the new system is limited
  • Cause minimal description

 

Disadvantages

  • Problems on assuming that the final sphere is implemented and converted

 

  1. 8. System Review and Maintenance

Adjustment and enhancement or correction of errors after the system has been implemented. Reviewing includes going through the specification and testing the system after implementation to find out whether it still meets the original specifications.

 

System Documentation

  1. 1. Reports on fact-finding
  2. 2. Requirement specification
  3. 3. System and module flowcharts
  4. 4. Table/ file structure description
  5. 5. Sample test data and expected output
  6. 6. Output reports.

 

INTRODUCTION TO NETWORKING AND DATA COMMUNICATION

 

 

Computer Network: Collection of computers linked together using transmission media for the purpose of communication and resource sharing.

 

 

Terms used in Networking

  1. 1. Data signal- Voltage level in the circuit which represent flow of data.
  2. 2. Multiplexing- Process of sending multiple signals over same media.
  3. 3. Demultiplexing- Process of separating multiple signals at receiving poin
  4. 4. Bandwidth- Maximum amount of data a transmission medium can carry at one time.
  5. 5. Baseband signal- Analog signal send over transmission medium using a particular frequency.
  6. 6. Baseband width- Digital signal generated and applied to transmission medium directly

without modulation.

  1. 7. Attenuation- Decrease in magnitude and energy as signal progressively moves along a transmission medium.
  2. 8. Repeater station- Receive signals, clean, amplify them for transmission.

 

 

Modes of Communication

  1. 1. Simplex- Communication in only one direction e.g. television and radio broadcasting
  2. 2. Half duplex- Communication in both directions, one at a time e.g. Walkie Talkie
  3. 3. Full duplex- Communication in both directions simultaneously.

 

 

Types of Computer Network

  1. 1. Local Area Network (LAN)- Network that spans a relatively small geographical area e.g. a building, a school etc.
  2. 2. Metropolitan Area Network (MAN) – Covers a metropolitan are like a town or a city of typically a radius of between 5 to 50Km or MAN is made up of many LAN’s in a metropolitan area.
  3. 3. Wide Area Network (WAN) – Covers a large geographical area like continent or the world.

 

Server: This is computer dedicated to serving requests for resources from other computers(workstations)  on network.

 

 

Advantages of LAN

  1. 1. Enables many users share expensive resources like printers and data.
  2. 2. Enables communication- sending messages and open chat sessions.
  3. 3. Capable of transmitting data very fast.

 

Purpose of Networking

  1. 1. Resource sharing– File sharing, mail exchange, sending faxes, schedule meetings and print documents leading to less wastage of time and enhances greater productivity.

 

  1. 2. Remote communication-faster  data transmission from different geographical site. Problems that faced workers.

 

ü Roaming of officers who by virtue of their work cover long distance away  from their work place.

ü Time wastages in accessing organization information.

Remote communication is the process of transmission of data signals between communications devices located at different geographical locations. Components of remote communication are:

  • Remote Client- Computer that tries to access resources from another

computer on network.

  • Remote host- Computer being accessed on network

 

  1. 3. Distributed processing facilities– Def. Process of running databases or programs on different

computers which are on the same network. The advantages:

(i)      Failure of central computer doesn’t affect the operations of the other terminals. (ii)     Processing load shared is equally distributed hence no wastage.

 

  1. 4. Cost effectiveness– Although the initial installation cost is high it cuts down most expenses and adds value to service delivery. Advantages

(i)         Daily communication- paperless communication environment. (ii)        Reduces transport cost for executive meetings.

(iii)       Resource sharing e.g. printers, fax machine, optical drives, files and applications.

 

  1. 5. Reliability     (i) Transfer of data with minimum errors from destination

(ii) Easy recovery incase of computer breakdown.

 

 

Limitations of Networking

  1. 1. Security issues- Data is prone to more illegal access threat in the network
  2. 2. High initial cost for software and hardware.
  3. 3. Moral and cultural effect- chartrooms and pornography.
  4. 4. Spread of terrorism and drug trafficking.
  5. 5. Overeliance on network thus network failure may halt the system or bring down the organization.

 

Elements of Networking

  1. A. Data Communication Media
  2. 1. Bounded (cabled) Media

Two line open cable

Insulator between the two wire help reduce interline interference. They capture environmental frequencies e.g. radio waves hence causing noise in the transmission medium/pathway.

 

 

Insulator

 

Wire

Conductor

 

 

 

 

 

 

 

Twisted pair cable

Wires are in a double helix manner. They transmit both voice and signal data. Types

(i)         Unshielded Twisted Pair (UTP) cables- Don’t have a shied that prevents electromagnetic interference (EMI) or “electronoise” from the environment.

(ii)           Shielded Twisted Pair (STP) cables

 

Advantages

  • Used in the telephone systems
  •  Cheap installation equipments
  • Cheap due to mass production of telephone

 

Disadvantages

  • Suffer a high attenuation rate.
  • Sensitive to EMI and eavesdropping
  • Low data transmission but more than
  • two line

 

 

Coaxial cables

Has a central copper core surrounded by a dielectric material (insulator) that is then    surrounded by a hollow mesh conductor covered by a shield. The braid (mesh conductor) is made of copper/ aluminum and serves as the ground for the carrier wire. The braid protects radio and electromagnetic interference. The thinner the conductor determines the attenuation rate. Thinner have a high attenuation rate. Used in network blockade- A link that connects two separate LAN’s

(ii)        Thin coaxial cables (Thinnet)- has no dielectric insulator

(iii)       Thick coaxial cables (Thicket)- has two dielectric insulators.

 

Copper core

 

 

 

 

Core insulator Aluminum foil Braided shielding

 

Outer layering

 

 

 

 

(b) Thicknet

 

 

Advantages

  • Stable even under high loads
  • Large bandwidth than twisted pair
  • Carry voice, data and video signals simultaneously
  • Resistant to radio and EMI than twisted pair cables.

 

Disadvantages

  • Thicket is hard to work with
  • Are relatively expensive to buy and install compared to twisted pare

 

 

 

Fiber optic cable

Electronic signals from source are converted to light signals the propagated along the fiber cable by a Light Emitting Diode (LED) at the transmitter then at the receiving end a photosensitive device used to convert light signals back to electric signals. Components:

(i)          Core- Central part and is made of a hollow transparent plastic glass.

(ii)         Cladding- Single protection layer surrounding the core. (iv)       Buffer- Surrounds the cladding, strengthening the cable. (v)         Jacket- Outer casing

 

Types of optical fiber cables:

(i)         Multimode: Has a very narrow center core hence have low attenuation rate as light takes only one path in its suitable for long distance

(ii)        Single mode: Has a thicker core hence allow several light rays

 

 
 
 
 
 
   

 

Jacket

 

Cladding

 

 

 

 

 

 

 

 

 

 

 

 

 

Light rays

 

 

Advantages

 

Core

 

 

Cladding

 

  • Immune to EMI and eavesdropping.
  • Fast and support high bandwidth.
  • Large distance can be covered- low attenuation
  • Used in hazardous places- Don’t generate electric signals.
  • Smaller and lighter than copper- Ideal for space limited situation

Disadvantages

  • Difficult installation since it must be carefully be handled
  • Expensive connectivity devices and media are required
  • Relatively complex to configure
  • Difficult and expensive to repair

 

  1. A. Unbounded (Wireless) Media

Microwave Transmission

Line of sight

 

 

Have a high frequency of 3 GHz to 4 GHz. It suitable for point to point transmission (line of sight): Signal is directed through a focused beam from transmitter to receiver.

 

Advantages

  • It is less prone to transmission errors.
  • It is capable of operating on both digital and analog data
  • Operates at a high speed.

 

Disadvantages

  • Signals affected by atmospheric conductors e.g. lightening
  • Additional numbers of repeaters are added after every few kilometers.

 

Satellite Transmission

 

 

 

Satellite in space

 

 

 

 

 

 

 

 

Uplink

Downlink

 

 

 

 

 

 

Receiving earth station

Transmitter earth station

 

 

 

 

 

 

 

A satellite transmission system has three main components:

  1. 1. The transmitter earth station- sets up an uplink in order to transmit data.
  2. 2. A satellite (geostationary) – receives, amplifies and transmits the signal to receiving earth station via a downlink frequency.
  3. 3. Receiving earth station- receives signals on the other side of the globe from the satellite

 

Satellite footprint: Area on earth where line of site can easily be located. Transmission of signals to many recipients’ earth stations forms a point to multipoint transmission.

 

Very Small Aperture Terminal (VSAT): This technology refers to very small satellite dish used in radio, data and TV communications. It enables direct access to satellite communication instead of having to go through satellite owned or licensed satellite gateway.

 

Advantages

  • Has a high band width.
  • Earth station can be installed on a customer property than layering extensive cables.
  • Cheap since cost is not dependent on the distance.

 

Disadvantages

  • Expensive to install ground stations.
  • Heavy rains or bad weather increases loss of signals.
  • Any station can receive the signals.

 

 

Radio Communication

(i)         High Frequency (HF) – Propagated by directing it to ionosphere on earth. Then the ionosphere will reflect back to earth surface and the receiver will pick it up.

(ii)        Very High Frequency (VHF) – Transmitted over the earths surface. Stationeries are place strategically to maintain the line of sight from one another.

(iii)       Ultra-High Frequency (UHF)- It is the same as VHF but require smaller aerial because

they can be made to follow even narrow and direct path to the receiver than VHF

 

(iv)   Bluetooth– Enables people to use hand-held communication devices e.g. phones PDA’s

to access the internet. Network Bluetooth enabled devices is called a wireless personal are

network (WPAN) or piconet.

 

 

Infrared Transmission

Infrared transceivers must be within the line of sight in the same room because unlike radio signals they cannot penetrate objects.

 

Advantages of Wireless Media

  • Flexible in operations compared to wired.
  • Span a large geographical area.
  • Can take place in satellite even in remote areas.

 

Disadvantages of wireless Media

  • Relatively difficult to establish or configure.
  • High initial cost.

Communication Devices for Bounded (Wired) Media

  1. 1. Network Interface Card (NIC): Creates a physical link between computer and transmission media.
  2. 2. Modems and Codec: Modem (Modular demodulator) is a device that converts digital

to analog signals when sending data over a transmission media then converts the analog signals to digital at the receiving point. Codec converts analog signals to digital form for transmission via a digital medium.

  1. 3. Hubs (Concentrators):   Connects computers on the network and relay signals from

one computer to another on the same network using protocols.

  1. 4. Bridge: Determines selectively the appropriate network segment for which a message is meant for delivery through address filtering thus dividing a busy network into segments reducing network traffics.
  2. 5. Repeaters: Receive signals from one segment of the network, cleans it to remove any distortion then send it to another segment.
  3. 6. Routers: Interconnects different networks and directs transfer of data packets from source to destination depending on the network address.
  4. 7. Router: Communication device that combines the functionality of a bridge and the

router.

  1. 8. Gateway: Any device that can be configured to provide access to a Wide Area

Network (WAN) or the internet.

  1. 9. Switches: Unlike the hub, a switch forwards a packet directly to the address node without broadcasting

NB Node- Data terminal equipment e.g. workstation.

 

Wireless (Unbounded) Communication Devices

  1. 1. Access points (AP): Entry point into a bounded network for people who have wireless network devices like PDAs, laptops and computers with wireless links.
  2. 2. Wireless antennae: Detects signals in the surroundings.
  3. 3. Personal computer memory card international association (PCMCIA): Add-on card inserted in devices e.g. PDA or laptops in order to enable wireless communication between devices and wired network server. Mostly used in LAN connection.

 

Network Software

Classifications of Network Software

  1. a) Network operating system
  2. b) Network protocols

Network operating system

Network operating system is specially designed to optimize the network computer ability to respond

to services request. Its functions are:

(i.)       Provide access to network resources e.g. printers and folders.

(ii.)       Enables nodes on network to communicate with each other more efficiently.

(iii.)       Support interprocess communication i.e. enables various process on the network communicate.

(iv.)       Respond to request from application program running one network.

(v.)       Support network services e.g. network cards, drivers and protocols. (vi.)       Implementing network security features.

 

 

Functions of network Administrators

(i.)       Secure the network against unauthorized access

(ii.)       Track network usage and keeps a log of all people who have used the network. (iii.)       Ensures inter-operatability between various systems on the network.

(iv.)       Performance monitoring to ensure maximum throughput on the network. Examples of networking operating systems are:

  • Windows NT,/2000 /2003
  • UNIX
  • Linux
  • Novell Netware.

 

Network Protocols

They are a set of rules and procedures that govern communication between two different two devices

or people.

Concept behind network protocols

In order to transmit data over the network it has to be broken into discrete systematic steps. Each step has its own rule and procedures i.e. protocols that must be coordinated so that there are no conflicts or incomplete operations. Achieved through protocol layering .Network protocols are designed after the Open System Interprocess (OSI) model. The open system interconnection model is not a protocol as such but is meant to help designers to come up with high quality layered protocols.

 

 

 

  Layer Function
7. Application layer User application run here and generate request for data

transmission or open received files.

6. Presentation layer Adds formatting, display and encryption on information to data

being presented.

5. Session layer Sets up data transmission session between two communication

devices.

4. Transport layer Manages data transfer over the network to ensure reliability.
3. Network layer Address information is added to the data packet and routed to

destination.

2. Data link layer Adds error checking information and prepares data for going into

the physical connections.

1. Physical layer Data packets are finally transmitted via the network and through

transmission media in form of bits.

 

 

 

 

Network Topologies

This refers to the way in which computers her devices have been arranged or how data is passed from one computer to another in the network.

Classifications of Network Topologies

  1. 1. Logical topology
  2. 2. Physical topology

 

Logical / Signal Topology

Mainly concerned with the way data passes from one device to the next on the computer network.. Examples of signal topology are Ethernet and Token ring topologies.

  1. a) Ethernet topology: All the workstations or computers adhere to the network media and can only send data when none of the others are sending data.
  2. b) Token ring: There is a special package for data called a token that goes around the network and only the computer whose address is on the data held in the token will take up the token to read the data then release the token.

 

Physical Topology

Bus Topology.

All the devices on the network are connected to a central cable called the bus r the backbone. Each

end of the cable is connected to a terminator to avoid signal from bouncing back and fourth on the cable causing signal distortion. The network address of computers on the network is called the medium access control (MAC) address.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Advantages of bus topology are:

  • It is to install.
  • It is less costly because doesn’t require a complete cable length per computer.

The disadvantages of bus topologies are:

  • Failure of central cable brings the whole network down.
  • Only one node can transmit message at a time.
  • Difficult to troubleshoot

 

Star Topology

All the devices are connected to the central hub (concentrator).

 

 

 

Computer

 

 

 

 

 

 

 

 

 

 
 

Computer

Central computer

Computer

 

 

 

 

 

Computer

Computer

 

 

 

 

 

Advantages of Star topology

  • Easy to configure.
  • If one node fails it doesn’t affect the other nodes.
  • It is easy to expand this topology.
  • Allows the centralization of key network resources.

 

Disadvantages

  • It requires more cables to install hence it is more expensive.
  • Failure of the central hub puts the entire network at a stand still.
  • Installing this type of network is time consuming.

 

Ring Topology

All the components in this topology are connected to a single transmission cable forming a ring styled connection of computers

 

 

 

 

 

Computer

 

 

 

 

 

 

 

Computer

Computer

 

 

 

 

 

 

 

 

 

Computer

Computer

 

Advantages of Ring topology

  • Data transmission is fast.
  • They use a short length cable.
  • Ring topology is simple to install.

 

Disadvantages of the ring topology

  • Modification may be difficult because adding or removing a device can disrupt the entire network
  • Troubleshooting can be difficult.
  • If one site fails it affects the entire network.

 

Mesh Topology

Device in this topology are connected with repeating (redundant) cables between the workstations. Each node is connected to one another.

 

 

 

 

 

 

 

 

Advantages of Mesh Topology

  • It is easier to troubleshoot.

 

Disadvantages

  • Expensive: Costly to provide the redundant cables.
  • Difficult to install and maintain.

 

Tree/Hierarchical Topology

All the nodes are connected in form of a tree with nodes as leaves and links as branches. The branches are connected to one another by the means of devices called hubs.

Advantages of Hierarchical topology

  • If the node below the main node fails, the network does not fail.

Disadvantages

  • If the top node fails the entire network fails because it controls the other nodes.
  • Expensive to install since it is complex.

 

 

 

 

 

 

 

 

 

 

 

Printer

 

 

 

 

 

 

Hub

 

 

 

 

 

Bus/backbone

 

 

 

Network Security

Classification of Network Security

(i.)       Share level security

(ii.)    User level security

 

Share level Security

Mostly the share level security is use in the peer to peer networks. Used to decide on which resource to share. It is provided by most desktop operating systems like Windows 9X.

 

User level Security

Applied in server based networks. A network administrator assigns accounts to users hence each user must provide a unique name and password in order to access the network resources. It is found in Microsoft Windows NT, 4.0/2000/2003, UNIX, Novell Netware, Linux Fedora etc.

 

APPLICATION AREAS OF INFORMATION COMMUNICATION TECHNOLOGY (ICT)

 

 

Application areas of Information and Communication

Technology Retail systems Stock control

Computers enables the user to manage his or her stock more efficiently by helping to track what is in stock and what needs recording.

 

 

Transaction handling at the electronic point of sale terminal

(EPOS)

EPOS is a computer terminal that is used in retail stores to input and output data at the point where sales are transacted e.g. supermarkets and wholesales. Other additional equipments required are: The barcode reader (wand): passed over items mar code.

Monitor: Enables the user to interact with the system

Receipt printer: Produces the receipt based on the customers purchase.

Advantages of EPOS are:

Accuracy: Correct prices are used at the check out counter. Faster: Since data entry is not manual

 

 

Financial Systems

Payroll systems

This system helps an organization to process accurately information of employees including gross pay and deductions and getting their net pay.

 

 

Accounting systems

(i.)       Customer order entry and billing: Subsystem records incoming customer orders authorizes delivery of items or services and produce invoice for customers whoi don’t pay in advance

(ii.)       Inventory management: Keeps track of items in stock and help the management to determine which item to reorder.

(iii.)       General ledger account: Keep track of how much a business makes and its worthiness by summarizing the financial transactions producing a report called balance sheet.

(iv.)       Accounts payable: Keeps track of the amount the business sows other organizations like the tax organizations, suppliers and transporters.

(v.)       Accounts receivable: Keeps track or records the amount owed by the customers.

 

Banking Systems

(i.)       Processing customers’ transactions: Computers are used in banks to record deposits, withdraws and calculating interest on savings and loans.

(ii.)       Cheque clearing and processing: The use of magnetic Ink-Character Recognition (MICR) details of the cheque is automatically entered into the computer for the cheque process. The special characters on the cheques includes the bank in which the cheque is drawn from, the customer accounts number the cheque number and the cheque amount.

(iii.)       The electronic fund transfer: Use of Information Communication Technology to move

money. Used especially with credit cards and the ATM cards.

Reservation systems

These systems are also called online enquiries. The concept used in reservation systems is the

application of distributed network systems. Applications of reservation systems:

(i.)       Hotel booking: Booking and reservations rooms in  a hotel are made from a remote terminal connected  to a centralized computer database or via the internet using the hotels website.

(ii.)       Airline booking:  All the flights and passenger records are stored in a centralized database.

Travel agents from all over the world can access each data via communication lines. Likewise the agents book in clients where tickets have not been bought.

(iii.)       Car rentals

 

 

Education Systems

  1. 1. Computer Aided Instruction (CAI): The process of using computers to learn, drill and practice particular education principles.
  2. 2. Computer Aided Learning (CAL): This is meant to drill the learner and present particular education materials the way a teacher does in class.
  3. 3. E-learning: Lessons and lectures are presented from a central site like a website the transacted to remote conference terminals or displayed on television screens.
  4. 4. Computer Aided Simulation: It refers to the science of representing behavior of a real life situation by using computerized models.

 

 

Communication Systems

(i)       Fax: During the process of sending the fax the document is scanned then converted into analog form then transmitted. The receiver fax converts it into the original softcopy the it prints the document.

(ii)       Radio communication: Computers are used to:

  • Record and manage radio programmes for broadcasting.
  • Manage radio transmission and took performance.
  • Create slides, simulated objects and sound effects when preparing electronic and printed media advertisements.
  • Downloading information from the internet like international news.

(iii)       Television sets

  • Ceefax (teletext):This refers to the computerized service where news and other information are provided on television screens to subscribers using an add-on card. It involves simplex transmission
  • Videotext (view data)

(iv)       Video conferencing: Use of computers, digital camera (camcorder), audio capturing equipments and communication network to enable people from different locations to see and talk to one another.

(v)       Telecommuting: Situation where an employee work at home using a computer connected to workplace network.

 

Advantages

  • Reduces transport cost.
  • Gives people the option of flex time.
  • Saves costs.
  • Reduces pollution and congestions inroads.

 

 

Disadvantages

  • Lack of discipline.
  • Work quality may suffer.
  • Few opportunities for brainstorming with colleagues.
  • Disappear of direct supervision.

 

(vi)      Internet

  • World Wide Web: This is the collection of webpages, which may be made of text, images, animations, sounds and video held on web servers.
  • E-mail: Electronic sending and receiving of messages, data, files or graphics in the internet.

 

 

 

 

 

 

 

Industrial systems

(i)      CAM and CAD

ü   Computer Aided Design (CAD): Refers to the integration of computers and graphics to aid in the design and drafting process. Examples of software are: Softpan, Autocad and Archicad.

ü   Computer Aided Manufacturing (CAM): It refers to the use of computers to control machines in the manufacturing process e.g. Delta.

(ii)     Industrial simulation: Allows activities that would otherwise be expensive and dangerous to real life situation to be put under test. The Non Destructive Testing (NDT) can be used to test motors and other machines with the use of computers.

(iii)   Process control: Computers are used to contol ongoing physical process like regulating temperature, pressure and fluid flow.

 

 

Scientific and Research Systems

(i)      Weather forecasting: Analyzing, predicting, processing weather patterns through the

use of Geographical Information System (GIS) and Geographical Positioning System

(GPS).

(ii)      Medical research: Diagnosing, Keeping of patients’ records, inventory control. Expert systems that emulate the reasoning of a human expert in a narrow field of

specialization.

(iii)      Military and space exploration e.g. the National Aeronautics and Space

Administration (NASA).

 

Library Systems

(i)      Lending system: Information system that manages the issuarance and the return of the borrowed reading materials.

(ii)      Inventory control: Manages the stock by checking for books currently in the shelves and those on high demands for purpose of adding more.

(iii)    Cataloging: A catalog refers to the collection of cards with information about each book or reference materials found in the library. Electronic cataloging is updated constantly when new reference materials are required.

Entertainment Systems

(i)      Games: Games are now found on the Digital videos disks (DVDs) and three- dimensional (3D) games are now possible on personal computers.

(ii)      Music and video: Video compact disks (VCDs) and Digital versatile disks (DVDs) have become a common feature in the music industry. In music industry computers are used in recording, synthesizing, editing and adding special effects on music. In video

industry, computers are used to produce high simulated and animated movies, generate scenes and actors.

 

 

Transportation Systems

(i)      Automobile traffic control: controlling traffic lights in road junctions.

(ii)      Air traffic control: Computers are used to monitor air traffic movement, take off and landing of aircrafts.

(iii)      Shipping control: Controlling and guiding paths taken by spaceships and water vessels as they travel to distant land using the Global Positioning System (GPS).

Home Use

(i)  Preparing domestic budgets. (ii) Entertainment.

(iii) Research.

(iv) Education.

 

 

Office Expert System

This is a system capable of simulating decisions making process and intelligent problems solution

just like a human expert.

 

 

Marketing

(i)  Electronic commerce (e-commerce): Transactions are carried out directly without physical interaction between the buyer and the seller.

(ii) Electronic presentation

(iii) Advertising

 

Virtual/ Artificial Reality/ Cyberspace/ Virtual Works/ Virtual

Environment

Condition in which a person is psychologically immersed in an artificial environment generated

by a computer system: Requirements

  • Head mounted display (HMD)/ Headgear: made up of two tiny display screens and sound systems that channel images and sound from the source to the eye and early presenting a stereo three dimensional (3D) sound effect in the virtual world.
  • Gloves: Allows the user to navigate through the virtual world and interact with virtual objects. They have sensors that collect data about the movement of the hands and relays the data into the system
  • Body suit: Worn during virtual reality session and iis made of condux
  • VR software

Applications

(i)  Training in medicine, military education

(ii) Entertainment

(iii) Simulation

(iv) Study of human anatomy

(v) Exploring landscape, underneath

(vi) Crime scene reconstruction

Law Enforcement

  • Biometric analysis: fingerprints and facial identification.
  • Use of video camera e.g. in banks
  • Development of strong military bases which have international coordination by use of a computer radar system
  • Jet fighters are computerized with correct control centers.

 

Teleworking

A situation where an employee works usually at home using at  home using a computer connected to work place.

 

Advantages

  • Reduces travel expenses due to reduction of unnecessary travel to work.
  • Gives people the option of flextime giving them the option of working long hours part time.
  • Saves cost if people work from home.
  • Reduces pollution and congestion as a result of fewer people commuting to work.

 

Disadvantages

  • People who lack discipline may not do work, where as others may overwork.
  • Work quality may suffer if employees take the attitude “no one sees me doing the job so it doesn’t matter.
  • Fewer opportunities of brain storming with colleagues.
  • Direct supervision disappears when people work from home.

 

Application of computers in radio communications

ü   Record and manage radio programs

ü   Automate running of selected programs

ü   Create slides, simulate objects and sound effects to prepare adverts

 

IMPACT OF ICT ON SOCIETY

 

 

Issues Resulting from the use of ICT

Effects on employment

  1. Job creation: New opportunities; computers operators, programmers, network

administration, information technology and information science managers, database administrators, software developers, system analyst etc.

  1. Job replacement: Clerical and repetitive tasks that require a large number of employees

have been made redundant. Computer illiterate are replaced.

  1. Displacement: Loosing job, displacement of employees from another place or department when computer skills are required.

 

 

Automated Production

Advantages

  • Increases efficiency due to balancing of workload and production capacity.
  • Improved customer service: Adequate and high quality goods are produced in time.
  • Efficient utilization of resources

 

Disadvantages

  • High initial cost of setting up automated systems
  • Automated production may lead to unemployment

 

 

Issues of Workers Health

  1. Repetitive Strain Injuries (RSI): Injuries resulting from wrist, hand, arm, mode strain,

tendonitis and neck strains due to forced repetitive movement. The cure for RSI is by resting, sitting in a relaxed  position and changing typing techniques.

  1. Eyestrains and headaches: Computer Vision Syndrome (CVS) is characterized by eyestrains, headaches, double vision and other problems caused by improper use of monitors. The solution for this is good resolution, antiglare filters, adjusting brightness.
  2. Stress
  3. Isolation
  4. Electromagnetic emissions: Computer users are advised to use low emission device to avoid expressing thermals to excess emission.
  5. Radiation from the VDU causes birth defects, blindness, cancer, miscarriage and sterility.
  6. Computer chip toxin: workers are exposed to toxic chemicals in chip  manufacturing industries that may pose health problems similar to those from the VDU.

 

 

Environment pollution: Huge garbage dumps of dead computer parts, printers, ink, tonner cartridges, monitors and other computer accessories are disposed in landfills causing environmental pollution. Nickel-cadmium laptop batteries that contain toxic cadmium which when buried in a landfill can leak into underground water tables and attachment areas.

 

Cultural Effects

  1. Flaming: writing online messages that use derogatory, obscene or dirty language.
  2. Pornographic material
  3. Computer crimes: hacking, eavesdropping, piracy etc.
  4. ICT have erased people’s integrity by using computers as a tool to accomplice their vices e.g. forge certificates, passports and other document.

5.

Breakthrough in ICT

It has changed lifestyles in health care, education, communication, research, commerce, art and design, entertainment, transport etc.

 

 

Evolution of Computer Systems

  1. 1. Rapid evolution in computer hardware and software.

ü   Computers will become more intelligent

ü   Software will b e more versatile and easier to use

ü   Cheaper and more powerful computers which will have faster processor

ü   Industries will become more automated

ü   More application software will be available because of high speed, large available memory for programs

ü   Education will have to gear itself to training students to computer assisted services rather

than teaching them physically

ü   Smaller size in computers

ü   Operating systems that will handle real time data analysis and objects oriented will be developed

ü   Will have improved user interface that offers user easier and more intrusive access to

information.

 

 

 

2.Artificial Intelligence (AI):

This is a branch of computer science that is concerned with the development of machines that emulate human like qualities as learning, communication, seeing and hearing.

Applications

  1. Expert System: Software designed to make a computer operate at a level of a human

expert on a specific narrow area of specialization. Examples are;

ü   Mycin- blood and meningitis

ü   Prospectors- Predicting mineral deposit in certain geographical site

ü   Delta- Repair diesel electric locomotive

ü   Xcon

Components of artificial intelligence are;

  1. Knowledge base: Expert system’s database of knowledge about a particular subject.

It contains relevant facts, beliefs, assumption and procedures for solving particular problems.

  1. Inference engine: Software that controls the search for knowledge in the knowledge

base , procedures and conclusions.

  1. User interface: Display screen that enables the user to interact with the system.

 

  1. Natural language programming:

 

  1. Artificial neural network: use of electronic devices and software to enable the neurological structure of human basic. Essential attributes;

ü   The neurodes can be trained to distinguish between what constitutes a signal and what doesn’t.

ü   They are capable of recognizing patterns in large amount of data that are

too complex for human beings.

 

  1. Robotics: Computer controlled device that emulates human beings in carrying out tasks that would otherwise be dangerous and different.

Merits

  • A robot can work on repetitive task without getting bored or tied.
  • Can work on dangerous areas unlike human beings
  • Increased production because they are capable of working at a high speed
  • Leads to less operating expenses since less personnel is required

 

Demerits

  • Lead to job replacement
  • Expensive to install

 

  1. 3. Expanded superhighway

Involves integration of cabled and wired technologies for the purpose of data and information transmission.

 

CAREER OPPORTUNITIES IN INFORMATION AND COMMUNICATION TECHNOLOGY

 

 

Computer Operator

  1. Entering data into the computer for processing
  2. Keeping up to date records (log files) of all information processing activities.

 

 

Computer Technician

  1. Troubleshooting computer hardware software related problems
  2. Assembling and upgrading computers and their components
  3. Ensuring that all computer related accessories e.g. printers, storage media, modems are in good working conditions
  4. Help hardware engineers in designing and creating some computer components e.g. motherboard, storage devices

 

 

System Analyst

  1. Attributes/ Qualities of a good system analyst
  2. Good problem solving skills and creativity: experience in problem solving
  3. Good communication skills
  4. Must have business knowledge
  5. Technical knowledge in hardware, software and processing

Responsibilities

  • Reviewing the current manual system and making recommendations on how to replace it
  • Preparing system specification
  • Working with programmers to construct and test the system
  • Preparing instruction manual
  • Coordinating training for users of the new system

 

 

Computer Programmer

  1. Writes in-house application programs/ system programs
  2. Customize commercial application packages to suite the organization needs
  3. Test, install, debug and maintain programs developed

 

 

 

 

Software Engineers

  1. Develop system and application software
  2. Develop user and technical documents for the new software
  3. 3. Maintaining and updating software to meet day to day requirement while overcoming challenges

 

Computer Engineers

  1. Design and develop computer components such as storage devices, motherboard and other components
  2. Determining the electrical power requirements of each computer component
  3. Re-engineer computer components to enhance its functionality and efficiency
  4. Design and develop engineers and manufacturing computer controlled devices such as

robots

 

 

Information Software Manager

  1. Making sure that all tasks in the IT department are done correctly and online in order to

support business planning, control and design making process

  1. Providing budgets for the department
  2. Keeping the department inventory records up to date
  3. Managing human resources within the department

 

 

Database Administrator (DBA)

  1. Designing and developing database application for the organization
  2. Setting up security measures needed to control access to data and information
  3. Keeping the database up to date by adding new records, modifying and editing
  4. Computer Trainer
  5. Training people how to use computer and other application programs

 

Computer Trainer

  1. Developing training reference materials
  2. Guide learners on how to acquire knowledge through carrying out research
  3. Advising learners on the best career opportunities in the broad field of ICT
  4. Preparing learners for ICT examination

 

 

Web Administrator/ Webmaster

  1. Developing and testing websites
  2. Maintain, updating and modifying information on website to meet new demands
  3. Monitoring access and use of internet connection by enforcing security measures
  4. Downloading information vital for the organization

 

 

Computer graphics designing and typesetting

  • Designing graphical objects and professional publication

 

 

Network Administration

  1. Set-up a computer network
  2. Maintaining and enforce security measures on the network
  3. Monitoring the use of network resources
  4. Maintaining and troubleshooting network related problems

 

Computer Sales Representatives

  1. Analyzing customer needs
  2. Advertising them accordingly

Characteristics of a good computer sales representative

  • Must be confident
  • Be persuasive
  • Proficient in business communication

Further Education Opportunities

Universities

  1. Public universities: They are established by state through the award of charter run by state appointed management term.
  2. Private universities: They are self-sponsored institutions set-up by individuals, churches or Non Governmental Organizations (NGOs)

Research Institutions

  1. Polytechnics: Offer diploma and certificate courses
  2. 2. Colleges: Offer diploma, certificate and craft courses.

COMPUTER STUDIES NOTES FREE PDF FORM 2

WORD PROCESSORS

Chapter outline

  • Definition of word processor.
  • Purpose of word processing.
  • Using a word processing package (Microsoft word).

1.4 Editing and formatting a document.

 1.5 Creating and editing a table.

1.6 Mail merge document.

  1. 7 Inserting graphics.

1.8 Printing a document.

DOWNLOAD COMPUTER STUDIES NOTES IN PDF IN THE LINKS BELOW;

COMPUTER STUDIES NOTES FORM 1-4 PDF

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking Schemes, Topical revision materials, Syllabus and Many more

Definition of a word processor

What is a word processor?

A word processor is an application software that enables a person to create, save, edit, format and print text documents. Word processing is the act of using a word processor.

 

Examples of word processors

Examples of word processors include, Microsoft Word, Corel WordPerfect, WordStar, Lotus WordPro and many others.

A word processor has a number of advantages over he type writer that include:

  1. A document can be stored in the computer for future reference in computer files that do not occupy physical space like the one on paper. This creates a paperless document-processing environment.
  2. Typing using a word processor is easier and more efficient because some actions are automated. For example, word-wrap feature automatically takes the cursor to the beginning of the next line once you reach the end of the current. Another automatic features common in most word processors is automatic insertion of a new page after reaching the end of the current page.
  3.  Most word processors have special editing tools such as spelling and grammar checkers and thesaurus that help the user to easily Correct grammar and spelling mistakes. A thesaurus helps to find a word or phrase with similar meanings.
  4.  With insert and type over modes available in most word processors, one can easily insert or replace a word or a phrase without affecting the structure and neatness of the document.
  5. Word processors have superior document formatting features. Formatting refers to the art of making the document more attractive and appealing to the eye. Such features include, underlining, boldfacing, italicization, applying different colors etc.
  6.  While a typewriter may require that we retype the entire document when we want many copies, with a word processor, printing lets you produce as many copies per session as needed.
  7. Using the cut, copy and paste commands, you can incorporate other text without having to retype it.

 

Basic word processing features and concepts

  1. They allow the user to create a file, save it and open it again and again for reuse, editing or formatting.
  2. They have almost similar document windows with the following Features:

(a) Most are designed to look like a piece of paper with a few

(b) Most of the screen is blank before typing of text.

(c) There is a cursor, which blinks at the position where you can Begin entering text.

(d) There is a status bar or line that provides the user with current status information such as saving operation, the name of the file in use, the current page, the current imaginary horizontal-line and column cursor position.

(e) Word wrap: The feature that automatically moves a word or cursor to the beginning of the next line if it does not fit at the end of the current line.

(g) Scrolling: This is the vertical movement of text document on the screen. We can scroll through a text document using the up or do n arrow keys, page up and page down keys and also using, a mouse in windows based word processors.

(h) Help: Sometimes we get lost, confused or need more information on how to use an application. Help contains instruction, tips, pointers, explanations and guidance. You can get help by either pressing F 1 on the keyboard or clicking Help from the menu.

(i) Editing Modes: Word processors have two editing modes, insert and type over mode. In insert mode, every character typed between words, lines or characters is placed at the cursor position. This pushes all the text in front of the cursor away without deleting it. However in type over mode every character typed deletes what was there before and replaces it with new text at the cursor position.

  1. Nearly all word processors have a spelling checker, thesaurus (Dictionary of synonyms) and grammar checker.
  2. They provide for the use of headers and footers, indexing, footnotes and references, typefaces (fonts) and character set.
  3. Most word processors have ability to create and import tables, text and graphics from other programs.

Mostly, word processors are used for writing letters, reports, projects, books, essays, memos curriculum vitae etc.

Factors to consider when choosing a word processor The choice of a word processor depend on:

  1. The type of operating system. For example, most microcomputers are currently running on Windows based operating system such as Microsoft Windows. This means that you should consider acquiring a graphical user interface based Word Processor,
  2. Its user-friendliness, i.e. ease of use.
  3. Its formatting and editing features. They should be good and varied.

 

Using a word processing package Microsoft Word

.

Microsoft Word is one of the components of Microsoft Office. Microsoft Office is integrated software with a number of interrelated programs. The programs include Microsoft Word, a spreadsheet called Microsoft Excel, and a database management system called Microsoft Access, communication software called Microsoft Outlook, and a presentation package called Microsoft PowerPoint among others.

Although there are several versions of Microsoft Word, the most common are Word 97, Word 2000, WordXP and Word 2003. These versions of Microsoft Word are found in Microsoft Office 97, 2000, XP and 2003 suites respectively.

Starting Microsoft Word

There are a number of ways you can start Microsoft Word. However the

Simplest is by using programs start menu.

 

Starting Microsoft Word from the start menu

  1. Click the start button.
  2. Point to programs/ all programs if you are using Windows XP
  3. Click from the programs menu

Microsoft Word screen layout

Once you start Microsoft Word, it provides you with a blank document window referred to as the new document template where you can create your document.

However you may need to use other specialised templates such as Faxes and letters, Memos and Web page. How? Click File then select New from the menu. The New dialog box in Figure 1.3 that appears enables a person to select a template by activating templates tab then double clicking its icon.

 

With Windows multitasking capability, you can have more than one document window at the same time sharing one application window. However, each document window will have its own title bar but both will share other facilities like the menu bar of the application window.

However only one document window will be visible on the desktop at a time while others remains minimized or covered. This window is referred to as the active document window. To switch between document windows, click their buttons on the taskbar.

 

Parts of a window

 

Title bar

A title bar is mostly a blue strip at the top of the window that displays the title of the currently running application or task. However it is possible to change the color of the title bar using the display properties.

 

The title bar also enables the user to move the window around the desktop. This is possible by pointing to it then dragging using the mouse.

 

On the right of the title bar are three tiny buttons called minimize, restore/ maximize and the close buttons.

The minimize button reduces a window to become a button on the taskbar.

 

The restore/maximize button stretches the window to cover the entire desktop or restore it to its original size respectively.

The close button is used to close and exit a window.

 

Menu bar

Provides a drop down list of commands that one can use to perform a task. Examples are File, Exit, Window and Help. Figure 1.4 shows the File drop down menu.

Too/bars

These are rows of buttons or icons that represent commands. The command buttons are shortcuts to the same commands you can access from the menu bar. There are various toolbars available in Microsoft Word but the most common are the Standard and Formatting toolbars (Figure 1.5 and 1.6)

To see what other commands are, just point to the icon on the toolbar and a text tip will be displayed showing the function of the icon.

Most of these commands will be discussed later.

Hiding and displaying the toolbars

  1. Click the View menu option.
  2. Position the pointer on Toolbars.
  3. Click the type of tool bar required to select it.

 

Selected toolbars have ticks or check marks next to them as shown in Figure 1.7.

Rulers

Microsoft Word provides the user with vertical and horizontal on screen rulers that helps the user position text or objects in the right position.

 

If the ruler is not visible on the screen, then display it using the following procedure.

  1. Click the View menu option.
  2. On the drop down menu that appears, click Ruler. A check mark or tick will appear next to it showing that the ruler is displayed on the screen.

 

Work area

This is the working area where you can enter text or graphical objects. All windows based application programs provide the user with a unique working area suited to that particular application.

 

Status bar

This is an interactive strip at the bottom of the screen that acts as a communication link between the user and the program. It displays interactive activities like saving, opening, background printing, cursor position etc.

Scroll bars/button_ and scroll arrows

Scroll bars or buttons are horizontal and vertical bars on the borders of a window that the user drags to scroll upward, downwards, to the right or left of a document. Scroll arrows are arrows at the end of the scroll bars that the user clicks instead of dragging the scroll button. Using scroll bars or arrows is equivalent to using the arrow keys on the keyboard

 

Running the program

 

Creating a document

When you start a new document, you will see a blinking vertical bar called an insertion pointer. You can move your insertion pointer by using the arrow keys or the mouse.

 

In case you are in Microsoft Word and you want to create another new document, you should proceed as follows:

  1. Click the File menu,
  2. Choose new, from the resulting dialog box, click Blank Document Or select template by clicking any template’s tab
  3. Click the OK button.

 

Saving a new document

  1. From the file menu, click save or Save As or simply click the save Button on the Standard toolbar. The difference between save and save as is that although both give the save as dialog box when saving for the first time, Save allows the user to save document without the opportunity to change the file name or the location. Figure 1.9 below shows a save as dialog box.

2.In the file name box, type a unique name for the document

3.Select a the location or drive you want to save in, by clicking the down arrow on the right of save in list box,

4.To save the file in a different format or type such as Word 6.0, Word for Macintosh etc. click the down arrow on the right of Save as type list box and choose a file type.

5.Click the save button. The file will automatically be saved as a Microsoft Word document.

Opening an existing document

1.From the file menu, click Open command or on the Standard toolbar, click the Open button. Alternatively press Ctrl + 0 key combination on the keyboard. The Open dialog box shown appears.

2.Select a drive or folder where the file is saved.

3.In the file name box, type or select the name of the document you want to open.

4.Click the open button

To open a document created in another program, click the file format you want in the files of type box, and then double click the document name in the folder list. You can also use wildcards in the file name box for example, type *. Document to find Microsoft Word files.

 

NB: Microsoft Word keeps a list of shortcut links to recently used files on the file drop down menu. If the list of recently used documents is not displayed, you can configure Microsoft Word to be displaying them by doing the following:

  1. Click the Tools then Options command. This displays the options Dialog box.
  2. On the general tab, select the recently used file list check box as Shown in Figure 1.11.

 

Protecting a document with a password

A password is a combination of characters that prevents other users from opening and changing a document without permission. If a document is protected by a password, only the person who knows the password can open the document or edit it.

 

To save a document with a password

  1. Create or open the document you want to protect
  2. From the file menu, choose Save As.
  3. Click the down arrow on the Tools button in the save as dialog box
  4. Click General options.
  5. Type in a password in the password to open. This prompts the user to enter password when opening a document.
  6. Type in a password in the password to modify. This prevents the user from making changes to a document unless the user enters the correct password.
  7. Finally click OK.

 

Closing a document

Closing a document means unloading the current active document from memory so that the user can create or open another without necessarily exiting from Word.

To close a document:

  1. Click the File menu.
  2. Choose Close.

 

Exiting from Word

  1. To exit from Word, make sure all open documents are saved.
  2. Click File menu,
  3. Click Exit command.

 

NB: You can exit from Microsoft Word by pressing Alt + F4 keys or by double clicking the application icon at the left most comer of the title bar. If you have not saved any of the open documents, Microsoft Word prompts you to save the document first.

 

1.4

Editing and formatting a document

 

Editing

Editing refers to making necessary changes to an existing document. Apart from manual editing using delete, insert and overtype/overwrite commands, Microsoft Word provides the user with inbuilt tools such as the spelling and grammar checker, thesaurus, undo and re-do, find and replace etc.

 

Block operations

 

Selecting (highlighting) a block of text

The purpose of selecting text is to enable the user perform a number of editing or formatting operations on the selected block of text. Microsoft Word presents the user with a number of ways for selecting a block of text. You can either select a block of text using the mouse or keyboard.

 

  Selecting with a mouse

  1. To select a word, place the insertion pointer on the word then, double Click it.
  2. To select a sentence, positions the mouse pointer at the left margin until it changes to a right arrow, and then click once.
  3. To select a paragraph, place the pointer at the beginning or end of the paragraph. Notice that the pointer changes to I-beam. Now drag the I-beam over the text to be selected and release the mouse button at the end of the text you wish to work on.

 

Selecting with the keyboard

  1. To select one word, move the insertion pointer to the beginning or End of the word then press Shift+Ctrl+Right or left arrow.
  1. To select one line, press Shift+Up or Shift+Down arrow key. Alternatively, move the insertion point to the end or beginning of The line then press Shift+Home or end keys respectively.

3.To select an entire page; press Shift+Page Down or Shift+Page Up. 4. To select the entire document, press Ctrl+A or place the cursor at the beginning of the document then press Shift+Ctrl+End.

 

Deleting text

  1. To delete a character or a word from the right to the left, place the insertion pointer on the right of the word then press the backspace key.
  2. To delete a character to the right of the cursor position, place the Insertion pointer on the left of the word then press the Delete key.

 

To delete a block of text

  1. Highlight the text to be deleted.
  2. Press the Delete key.

 

Restoring deleted text

To restore text that has just been deleted in the current word processing session: click the Edit menu, then the Undo command

 

Copying and moving text and objects

Copying means creating a duplicate of text or an object while moving means changing the position of text or an object in a document. In Microsoft Word, you can copy or move a block of text.

To copy a block of text:

  1. Highlight the text,
  2. Click Edit, then Copy or simply click the Copy button on the standard Toolbar.
  3. Position the insertion pointer where you want to copy the text,
  4. Click Edit then Paste or simply click the Paste button on the standard toolbar.

 

NB: To use the keyboard shortcut keys, press Ctrl + C to copy, then Ctrl + V to paste

 

To move text and objects

  1. Highlight the text,
  2. Click Edit, then Cut or simply click the Cut button (whose icon is a Pair of scissors) from the standard toolbar.
  3. Position the insertion pointer where you want the text to be placed,
  4. Click Edit then Paste or click the Paste button on the standard toolbar.

 

NB: To use the keyboard shortcut keys, press Ctrl + X to cut, then Ctrl + V to paste

Typing modes

There are two typing modes in a word processor that assist the user in typing or editing text documents. These are:

  1. Insert mode.
  2. Overtype/typeover mode.

 

Insert mode

This is the default mode in most word processors. In this case when text is inserted between words or characters it pushes the existing text away without replacing it.

 

Typeover mode.

In this case, when text is typed between existing words or characters, the new text automatically replaces the existing text by deleting it. To switch between typeover and insert mode, simply press the insert key on the keyboard or double click the OVR label on the status bar.

 

Find and replace

When you need to search for a word or phrase in a large document, use the Find command. In case you wish to replace a word or phrase, use the Replace option.

 

Find

  1. Click Edit menu, then click Find command. The find dialog box appears.
  2.  Type the text or phrase you want to search for then click FindNext
  3.  Step 2 can be repeated if you wish to find other occurrences of the same word or phrase. Click OK when a message appears telling you that Microsoft Word has finished searching the document. Click Cancel to close the dialog box.

 

NB: You can use the keyboard shortcut Ctrl+F to find. Some search options:

 

You can specify search options by clicking the more buttons to display them. They include:

  1. Match case: This identifies only text that matches in case with that in the find what box e.g. it will not find the word DEEN if you typed deen and selected the match case option.
  2. Whole Word: Searches for a word or phrase that is whole. If it is part of another word it will not be found, e.g. the word ever will not be found in words like however, whenever etc. during the search.
  3. Use wildcards: Wildcards are special symbols such as * and? That are used to represent a set of words with certain characters in common e.g. names like Jeff, Joe, Jane can be represented using a wildcard as J* which means all names starting with J.
  4. Like: Searches for words, which are similar in pronunciation e.g., fare and fair.

 

Replace command

Click Edit menu then Replace command. The dialog box appears.

 

Type the name you want to replace in the Find what box and the one that will replace it in the Replace with box. Click the Find next button to find the next occurrence of the word then click Replace button to replace it. To replace all the occurrences of the word in the document at once, click the Replace all button.

Proofreading

Proofreading refers to checking whether the document has typographical or grammar errors. Microsoft Word has tools for proofreading e.g. spelling and grammar checker, Thesaurus, Autocomplete and Autocorrect.

 

Spelling and grammar checker

The spelling and grammar checker is an inbuilt tool that helps the user to correct spelling errors and incorrect grammar structures. However, the checker can only recognise errors of those words whose correct spelling is in its dictionaries. A correctly spelt word used wrongly cannot be detected hence the document should be proofread just before and after printing. To check the accuracy of spelling and grammar:

  1. Click Tools menu option.
  2. Click Spelling and grammar on the drop down menu. The spelling

And grammar checker dialog box appears as shown in Figure 1.14.

Words that do not match in the custom dictionary are highlighted for correction. The lower plane of the dialog box suggests to the user with a list of suggested correct words.

  1. Either choose one of the following buttons:

(a) Change to correct only the highlighted incorrect word.

(b) Change all to correct all the occurrences of the misspelled word.

(c) Ignore to retain the highlighted and continue. For example, although a word like jembe may not be in the custom dictionary, in the Kenyan context, the word is acceptable therefore if highlighted, click Ignore.

(d) Ignore all to retain all the occurrences of the same word or phrase in the document from another language e.g. a Kiswahili

(e) Click Add to add the word into the custom dictionary.

 

In case you want to undo the changes made, click on the Undo button at the lower bottom of the spelling and grammar dialog box.

 

NB: You can close the spelling and grammar dialog box even if the process is not complete by choosing Close.

 

Using the thesaurus

This is an editing tool that helps the user find words or phrases with similar meaning (synonyms) or opposite meaning (antonyms) to the one selected.

To use the Thesaurus:

 

  1. Select a word or a phrase.
  2. Click Tools, and then point to Language.
  3. Click Thesaurus to see Figure 1.15 displayed on the screen.
  4. For synonyms, under the heading Replace with Synonym, choose an alternative word phrase you intend to use as replacement for the selected text.
  5. To replace a word or a phrase with an antonym, select the word or phrase with antonym enclosed in brackets.
  6. Click Replace.

 

Autocomplete The auto complete feature displays a complete word when the user types the first few characters of the word. This enables the user to type faster by simply accepting the suggested word if indeed he/she intend to type it. To accept the suggestion, simply press the Enter key, and continue typing other word or phrases

The figure shows an auto text that automatically completes Dear sir or Madam text entries.

 

To turn auto complete on/off

  1. Click Insert menu and point to Auto text. A dropdown list is displayed.
  2. Click AutoText.
  3. Select or clear the Show AutoComplete tip for AutoText and dates Check box
  4. Type in an Auto text in the Enter AutoText entries here text box then Click Add.
  5. Click Close.

Autocorrect

The auto correct feature automatically detects wrongly spelled or capitalised words and replaces them with the correct word. However, the settings of auto correct are user defined e.g. if a person keeps on typing the word certain as certain, set the auto correct feature to replace the later with the former. Figure 1.18 shows the auto correct feature.

 

To turn auto correct on/off

  1. Click Tools menu, then AutoCorrect.
  2. To turn on the spelling checker corrections, select the Replace text as you type check box, and then select the Automatically use suggestions from the spelling checker check box.
  3. To turn off the spelling checker corrections, click Automatically use suggestions from the spelling checker check Box at the bottom of the dialog box
  4. Click OK to close the dialog box.

Undo and redo

Undo: It reverses the last command that was issued in Order to revert back to the previous state. To undo, click Edit then Undo command.

Redo: It does the last undone action. To redo, click Edit, then Redo Command.

 

Formatting a document

Formatting refers to applying various styles or features to enhance the document’s appearance. You can format text, a paragraph or a page.

Text formatting

Text formatting refers to features such as changing fonts (type, style and size of characters), changing text color, underlining, bolding Italicising etc. You can use either the formatting tools bar or the Format menu to underline, bold, etc.

 

To format existing text using the format menu

  1. Highlight the text to be formatted
  2. From Format menu, click the Font command. A dialog box with all Text formatting features is displayed
  3. To change font type and size, where necessary scroll down the Font list box then click the font required, for example Verdana font style would appears as Verdana. To increase the font size, where necessary, scroll down the Size list box and select the required size e.g. 12 points (pt). A point is 1/72 of an inch in height. 72 points i.e. 72/72 is equivalent to 1 inch For example “Verdana” is in Times New Roman 16 points and “Verdana” is in Verdana 16 points.
  4. Bolding text: Bolding makes the selected text appear darker than the rest of the text. To bold text:
  • Activate the font dialog box.
  • From the font dialog box, select Bold.
  1. Underline text: Underlining refers to placing a line at the base or bottom of a word or a phrase. To underline:

(a) Activate the font dialog box.

(b) Click the down arrow at the right of Underline style and select. The underline style required e.g. single, double, dashed etc.

  1. Italicising text: To italicise is to make the text slant forward.

(a) To italicise activate the font dialog box.

(b) Click Italic.

  1. Changing the font color: In most cases, the font default color is black. However you can change the font color for example to red, green, blue etc. To change the font color,

(a) Activate the font dialog box

(b) Click the down arrow at the right of font color list box and

Select the color of your choice.

 

Using formatting toolbar

As mentioned earlier, the formatting toolbar lets the user easily format text by clicking the required format button. To format some text, highlight it first then click a command on the toolbar.

For example to bold text, highlight it then click then bolding command (B) on the formatting toolbar.

 

Paragraph formatting

 

Text alignment

Text alignment refers to how text is lined up on the page relative to the left, right or center of the page. There are four ways in which text can be aligned namely left aligned, centered, right aligned and justified.

 

Left alignment

Lines of text are lined up evenly along the left margin but unevenly at The right margin. This is the default alignment. To align left,

  1. Highlight your text.
  2. Simply click the left alignment button. Alternatively click format, Paragraph. And select left from the alignment list box as shown in Figure 1.20.
  3. Click OK. To apply the choice.

 

Right alignment

This is opposite of left alignment. Lines of text are lined up evenly along the right margin but unevenly at the left margin. To align right,

  1. Highlight your text
  2. Simply click the right alignment button. Alternatively click Format, Paragraph. select Rigl1t from alignment list box, then click OK..

Center alignment

The lines of text are centered unevenly between the left and right margins.

To center text,

 

  1. Highlight your text,
  2. Simply click the Center, button. Alternatively click format, paragraph,

Select centered from alignment list box, then click OK.

Justification

Lines of text are arranged evenly along the left and right margin.

To justify text,

  1. Highlight your text
  2. Simply click the Justify alignment button. Alternatively click Format,

Paragraph, select Justify from Alignment list box, then click OK.

 

Change case

When typing a text, there are a number of cases the user may intend to apply in order to create contrast within the text. These are:

  1. Sentence case: All the first characters in a sentence are in uppercase (Capitalised).
  2. Lowercase: All characters appear in lowercase.
  3. Uppercase: All characters appear in uppercase.
  4. Title case: All the first characters of each word in a sentence appear in uppercase.
  5. Toggle case: It changes upper cases to lowercases and vice versa.

 

Figure 1.21 shows a dialog box for change case.

 

To change case in an existing text;

  1. Highlight the text.
  2. From the format menu, click Change case.
  3. From change case dialog box, select the case type to be applied.
  4. Click OK.

Drop caps

There are times when you wish to attract the reader’s attention by making the first character in a sentence large, taking more space in the next line. Such kind of a character is said to be “dropped”.

To apply drop cap;

  1. Highlight the first character in the sentence
  2. From the Format menu, click Drop Cap. Drop cap dialog box appears
  3. Click Dropped or In Margin
  4. Select font in case you wish to apply a certain font to the dropped Cap
  5. Specify the number of lines to drop.
  6. Click OK

Indenting paragraphs

Indentation refers to moving the text away from the margin. You can indent the first sentence in a paragraph (first line), the whole paragraph (full indent) or the rest of the text except the first line (hanging indentations).

First line indent

  1. Select the paragraph to be indented
  2. From the format menu click paragraph. Paragraph properties dialog box appears
  3. Click the down arrow in the list box under Special and select First Line.
  1. Specify by how far the paragraph is to be indented from the margin

In the by text box

Click OK to apply the indent and close the dialog box. The paragraph will be indented

NB: You can also indent the first line by positioning the cursor at the beginning of the paragraph then press the Tab key.

Hanging Indent

  1. Select the paragraph to be indented
  2. From format menu, click Paragraph.
  3. Click the down arrow in the list box under Special and select Hanging. 4. Specify by how far the paragraph is to be indented from the margin In the by text box
  4. Click OK to apply the indent and close the dialog box. The paragraph will be indented

Full indent                     ­

  1. Select the paragraph to be indented or position the cursor anywhere in the paragraph
  2. From the formatting tool bars, click the Increase or Decrease indent Button

Setting tabs

Tabs are used to indent the first line of a paragraph or create columnar data. By default the tab stop is set at 0.5 of an inch. To change the default setting:

  1. From the format menu, click Tabs
  2. Enter a new value for tab stop in the Tab stop Position box.
  3. Choose the type of tab either left, center or right.
  1. If need be specify the Tab leader option
  2. Click the Set button then OK.

Setting tabs using the ruler

The easiest way to set tabs is by using the ruler. On the left comer of the horizontal ruler is a tab alignment button that lets the user select the type of tab. Figure 1.28 shows various tab alignment buttons, while Table 1.1 gives an explanation of each button.

To set the tab using the ruler;

  1. Click on the tab button to choose the required tab type. Notice that the tab type keeps on changing as you click the tab button.
  2. Set the tab stop by clicking where you want it to be on the ruler.
  3. Drag the tab stop

 

Button Name Purpose
Left tab Text is left aligned
Center tab Text is centered
Bar tab Inserts a vertical line at
    Tab stop and align text to
    The right of the line
. Decimal tab Text is aligned at decimal
  Character
Right tab Text is right aligned

 

Table 1.1 Examples of tabs

 

Line and character spacing

Line spacing refers to the vertical distance between lines of text. The default line spacing is single spacing. This type of spacing accommodates the characters in a text leaving a small extra space between lines. Character spacing on the other hand refers to the space between the characters in the text.

 

To change line spacing:

  1. Highlight the text,
  2. From format menu, click Paragraph to display the paragraph dialog Box.
  3. Click the down arrow from the Line Spacing list box and select the Type of spacing required e.g. double, 1.5, at least etc.
  4. Click OK to effect the changes. To change character spacing:
  5. Highlight the text
  6. From Format menu, click Font.
  7. Click the Character Spacing tab
  8. Adjust the spacing as required
  9. Click OK.

Bullets and numbering

Bullets and numbers are used to mark steps in a procedure or items in a list.

To apply bullets and numbers in a list:

  1. Select the list.
  2. From the Format menu, click Bullets and numbering. A dialog box appears.
  3. Do one of the following;

(a) To apply bullets, click the Bulleted tab.

(b) To apply independent numbers click the Numbered tab.

(c) To apply outlined numbered list, click Outline Numbered. Tab

  1. Click OK to effect the changes and close the dialog box.

 

Section breaks

A break is used to identify where a section, a column or a page ends and the beginning of next. This allows the user to apply more than one paragraph or page format in the same document especially when it comes to page layout, size, different margins etc.

 

To insert a section break

  1. Position the text cursor in the document where the break is to be inserted.
  2. Click Insert then. Break.
  1. From the Break dialog box select the type of section break to insert e.g. page break.
  1. Click OK.

 

Formatting pages

Inserting page breaks

A page break identifies the end of one page and the beginning of the next. NofQ1ally, Word automatically inserts a new page after the current. One is full. However, there may be a need to start a new page even if the. Current one is not full.

 

To insert page breaks:

  1. Position the pointer where the break is to be inserted.
  2. Click Insert then Break.
  3. From the Break dialog box
  4.  Click Page break then OK.

 

Creating columns

To, create columns on existing text:

  1. Highlight the text
  2. From Format menu, click Columns to display the dialog box
  3. In the columns dialog box, select the number of columns or type in the Number of columns text box
  4. In the Width and spacing boxes, specify the column widths and space between columns
  5. Click OK

Page setup

Page setup options let the user specify the size of the margins, paper size, paper source and layout.

 

Setting margins

Margins are blank spaces around the edges of the page. Only text and objects inside the margins are printable.

 

To set up margins:

  1. Click the File menu then Page setup. Page setup dialog box appears
  2. Click the Margins tab.
  3. Enter the values for the left, right, top and bottom margins in the respective boxes.
  4. Click OK.

 

Setting the paper size

By default, the paper size may be either Letter or A4. An A4 paper has dimensions 210 mm x 297 mm

 

To specify a different paper size

  1. From the File menu click Page setup
  2. In the page setup dialog box click the Paper size tab.
  3. Select the size of paper required from the paper size list. If your size is different from the ones provided, click Custom size and enter dimensions in the height and width boxes.
  4. Click OK.

Specifying page orientation

The term page orientation refers to the positioning of the page in relation to the text. The two available orientations are:

Portrait: text and graphics are printed with the longest side vertically upright. For example, on an A4 piece of paper, the 210 mm edges are at the bottom and top.

 

Landscape: With landscape, text and graphical objects are placed with the longest side of the page placed horizontally and the lines of text printed parallel. For example, to create a timetable on an A4 page, the 297 mm side should be horizontal.

 

To select the orientation:

  1. From File menu, choose Page setup.
  2. Click on the Paper size tab and a dialog box comes on the screen.
  3. Select the orientation required then clicks the OK button.

 

Page layout

This option lets the user specify how text will be placed on the page from the margins. By default, text starts from the top margin.

 

To change the layout

  1. From File menu, choose Page setup. The dialog box Appears.
  2. Click on the Layout tab.
  3. From the Vertical alignment tab, select the alignment required then click OK.

 

Inserting headers and footers

Headers, footers and page numbers make it easy to locate information. Headers are few words placed at the top of every page while footers appear at the bottom. To insert headers and footers:

  1. Click on the. Headers and Footers from the View menu
  2. In the text boxes that appear, type a header using the top text box or a footer using the bottom text box or even both if you are to insert both a header and footer.

Inserting page numbers

To give your document page numbers:

  1. From the Insert menu, click Page numbers to display the dialog box
  2. In the Position box, specify where you want the page numbers to be inserted.
  3. In the alignment box, specify whether the number is to be on the right, left, center, inside or outside
  4. Use the Format button to choose the number format, i.e. 1,2,3,…, A,B, C etc. You can start from any page number by using Start at box

 

Creating and editing tables

 

Creating tables

A table is a feature in Microsoft Word made up of rows and columns that is used to organise and enhance display of information.

 

Creating a new table

. .

You can create a table either by using the Insert Table command from tables menu, or by using Draw Table tool that resembles a pencil to create more complex tables.

 

To create a table using the insert table command;

  1. Click Tables menu, position the pointer on Insert, then click Table
  2. In the Insert table dialog box displayed, specify the number of rows and columns.
  3. Click OK. The table will be displayed on the screen and you can start entering data in it.

NB: You can insert a table by clicking the table button on the standard toolbar, then drag to select the number of rows and columns.

 

To create a table using the drawing tool:

  1. Click Tables menu, then Draw table or simply click the Draw table button from the standard toolbar. The mouse pointer changes to a pencil symbol
  2. Drag the pointer to draw the outline of the table
  3. Fill in the table with rows and columns by dragging the pointer as you would draw using an ordinary pencil.

 

Formatting and editing a table

 

Inserting rows and columns

To insert a row:

  1. Place the cursor where you want to insert a row
  2. Click Table, point Insert then click Row above or Row below.

 

To insert a column:

  1. Place the cursor where you want to insert a column
  2. Click Table, point Insert then click Column to left then Column to the Right.

 

Adjusting the column width:

  1. Position the mouse pointer on the row or column boundary until the mouse pointer changes to an arrowed cross.
  2. Drag the boundary to the required size.

 

Deleting rows, column or cells

  1. Select the rows or columns to be deleted.
  2. From Table menu, point Delete, then Columns, Rows or Cells.

 

Merging cells in a table

This refers to combining more than one cell in a table. To merge cells:

  1. Select cells to be merged
  2. From Tables, click Merge cells.

 

Splitting cells in a table

This refers to subdividing a cell or cells into more cells. To split cells:

  1. Select cells to be split
  2. From Tables, click Split cells. A dialog box appears that lets you specify the number of rows and columns that the selected cells will be split.

 

Formatting table borders and shading

Word provides the user with automatic formatting feature that lets you choose border styles and shading.

 

To format a table:

  1. From Table menu, click Table AutoFormat.
  2. In the formats list box, select the format you want. Note that the format you choose applies to borders, shading font and colour.
  3. Click Ok to apply the effects.

NB: You can also format a table by using the table’s toolbar. If the toolbar is not displayed, click view point to toolbars then click tables and Borders.

 

 

Table conversions

With convert feature in Microsoft Word, you can convert a table to lines of text and vice versa.

 

To convert a table to text

  1. Select the entire table or row and columns you want to convert to text.
  2. From table menu, point to convert then click table to text. A dialog box is displayed that requires you to specify how the text will be separated after conversion
  3. In the separate text with box enter or select the character to be used as a separator.
  4. Click ok

 

To convert text to table:

  1. Select the text that you want to convert to a table.
  2. From table menu, point convert then click text to table .A dialog box is displayed that requires you to specify the number of rows and of columns
  3. From Separate text at, specify whether the table will be defined by paragraphs, commas, Tabs or other characters.
  4. Click OK. .

 

Importing tables

Microsoft Word lets you import tables from other applications or an existing file. To import a table,

  1. Click the Insert menu then Objects. A dialog box appears
  2. From the Object type select the type of object to insert e.g. Adobe table.
  3. The program in which the table was created in starts and lets you choose a table from it and return back to Microsoft Word. Alternatively click Create from file. This lets you browse for a file that contains the table you wish to insert.
  4. Click OK to insert the table.

 

Performing arithmetic calculations in a table

It is possible to perform mathematical calculations such as sum, product and count, if a table has numerical figures.

 

To perform calculations:

  1. Click the cell in which you want the result to be placed.
  2. From the Table menu, click Formula. A formula dialog box is displayed.
  3. Type the formula you want or select from the Paste function box. For example, to add figures in a row or column, click SUM. The function in Table 1.2 below that calculates the total is =SUM(ABOVE). The word “ABOVE”. in brackets is called the argument of the formula and tells Microsoft Word which cells in the table are to be worked on.

Sorting

In Microsoft Word you can sort a list of text, numbers and dates in ascending or descending order.

To sort a list or table:

 

  1. Highlight the text list or table you want to sort.
  2. From the Table menu, click Son.
  3. Select the type of data to be used when sorting i.e. Text, Number or Date.
  4. Click either Ascending or decending
  5. Click OK.

 

Mail merge document

Mail merge is the process of generating personalised letters or documents by combining a main document, e.g. a letter, with an existing data source such as the address book. Therefore in mail merge, the three files created are:

  1. The primary file (main document)
  2. The secondary file (Data source)
  3. Merged file

To create the main document,

 

1 From the file menu, select New to create a new document. You can also open or retrieve an existing document.

  1. On the Tools menu, click mail merge to display a dialog box.

3 Click create button, to select the type of document needed e.g. form .letters. Select the active window as the main document this means that the currently running document will be the form letter that will be later merged with a data source to produce individualised letters.

The next step is now to create a data source.

  1. Click Get Data. To use an existing list of names and addresses, click

Open Data. Source To use existing addresses from an electronic address book, click on Use Address Book. To create a new list of names and addresses, first choose the necessary fields from the create data source box then save the record structure. A message appears asking you whether you want to edit the data source or the main document choose one then the Next.

  1. With the main document open, spot the mail merge toolbar on the screen. Position the text cursor where you want to insert merge fields. Use the insert field’s button to insert merge fields in the document

Merging the document

Once you finish inserting merge fields from the data source in the main document, you are now ready to merge. There are several merge options:

 

To merge to a new document

Click the Merge to new document icon on the mail merge toolbar.

 

Merging to printer

Click the .Merge to printer, icon on the mail merge toolbar. Before you merge to a printer or other device, you may want to preview the appearance of the merged documents. For example, you can preview the merged documents one at a time. You can also collect the merged documents into a new document, so you can review and personalise the documents.

 

Preview merged documents

Before you print the documents, ensure that you’ve inserted merge fields in the main document and selected a data source. To preview, click anywhere in the main document, and then click View Merged Data on the Mail Merge toolbar.

 

Microsoft Word displays information from the first data record in place of the merge fields.

 

Send merged documents via e-mail or fax

Click the merge button on the Mail merge toolbar Select e-mail or fax in the merge to box. Click the Setup button to specify the e-mail addresses or faxing number then click the merge button. The internet connection wizard starts and if your computer is properly configured, the mail merged document will be sent.

Inserting graphics

 

Working with graphics

The term graphics refers to non-text images generated by a compute! This includes photographs, drawings and graphs. Graphics present information in a form that is easy to understand.

 

You can insert a graphical object from Microsoft Clip Gallery, a scanner or by using drawing tools available in Microsoft Word.

 

Inserting a clip art or a picture from clip gallery:

  1. Position the insertion pointer where you want your object to be inserted,
  2. On the insert menu, point to picture then click clipart Click on the tabs to select on the category of objects i.e. clip art, pictures, sound or videos. See Figure 1.42.
  3. Double click on the object you want or click it once then click the insert button.
  4. Use the object place holders to resize your object. If you place the mouse pointer on one of these holders, it turns into a two headed arrow, hold down the mouse button and drag to increase or reduce the object size
  5. Click anywhere outside the object to remove the holders.
  6. To move you object to another position, click inside the object. The pointer turns into an arrowhead cross. Hold down the mouse button and drag your image to a new location.

Fig. 1.42: A clip art image

Inserting an image from a scanner

The computer must be connected to a scanner to complete this procedure. A scanner is a data capture device that transforms a hand copy or real graphical object into digital form.

 

To scan an object:

  1. Position the insertion pointer where you want your picture to appear,
  2. from the insert menu, point to Picture and then click from scanner or Camera.
  3. To scan, follow the instructions that come with your scanner.
  4. When the image appears on the screen you can edit and format it as required the same way you would with a clipart.

 

Inserting a picture from another file

  1. Position the insertion pointer where you want your picture  placed,
  2.  From the insert menu, point to Picture, then click “From file
  1. Locate the file that contain the image you want to insert eg from your floppy disk, from a compact disk etc.
  2. Select the object you want to insert

5 Then click the Insert button.

6 When the image appears on the screen you can edit and format it as required the same way you would with a clipart.

 

Editing and formatting pictures

 

To format or edit a picture:

Microsoft Word provides the user with a picture editing toolbar that lets you adjust the brightness, contrast, change it to black and white or grayscale and crop the image. Cropping refers to hiding the unwanted details so that they do not come out when printing.

 

To display the picture toolbar, click on View menu, point to toolbars then select Picture. The picture toolbar has buttons that enable a person to format a picture to format a picture, click it to select it then use the commands on the picture toolbar.

 

Drawing an object using MS Word drawing tools

Microsoft Word provides the user with basic drawing tools such as polygons, lines, a circle, stars and banners, call outs and many others. If the drawings toolbar is not displayed, click on View menu, toolbars then click on Drawing. The toolbar will be displayed which a button has labeled Auto shapes, an arrow, a line, square and a circle

 

To draw a line, a circle an arrow or a rectangle:

  1. Click on the appropriate shape button. The pointer changes to a plus sign.
  2. Place the pointer where you want to draw that shape and drag to the required size.

 

To draw an object using the Auto shapes:

  1. Click the Auto shapes button. A menu is displayed showing categories of shapes you can choose from
  2. Point to the category required then select the type of object you wish to draw
  3. Place the pointer where you want to draw that shape and drag to the required size.

 

Editing and formatting a drawn object

You can resize, move, fill color and change the drawing outline.

 

To resize or move a drawing.

  1. Click anywhere inside it. The place holders appear.
  2. To move it, hold down the mouse button and drag.
  3. To resize it, place the pointer at one of the place holders and drag.

 

To fill the object with color and fill effects:

1    Click the object. The place holders appear.

2    Click the down arrow of fill color button, the one that looks like a bucket pouring ink.

3 Select the color you want applied. To fill the drawing with texture, gradient or pattern, click the Effects button. From the resulting dialog box, select the appropriate fill effect.

Printing a document

 

Printing in Microsoft Word

Because the main purpose of any word processor is to prepare documents for printing, this cannot be accomplished without a printer. The choice of a printer depends on the quality of hardcopy desired. Before you print, it is very important that you preview you document to confirm that no details are outside the printable area and that the document layout is okay.

 

Using print preview

In Microsoft Word, to view your document before printing proceed as follows:

  1. From file menu, select print preview the mouse pointer changes into a symbol that resembles a magnifying glass. You can click on the mouse button inside the document to increase or reduce the size of the view.
  2. Click the close button or Esc key to return to your document.

 

To print:

 

  1. From file menu click on print A dialog box appears where you can specify:
  • The type of the printer installed in your computer other than the default printer.
  • Whether to print the whole document or a range in the Page range box,

(c) Number of copies to print per page in the Number of copies box then,

  1. Click OK to start printing.

 

SPREADSHEETS MS-EXCEL

 

Chapter outline

 

2.1 Definition of spreadsheet

2.2 Components of a spreadsheet

2.3 Application areas of a spreadsheet

2.4 Creating a worksheet/workbook using Microsoft Excel

2.5 Cell data types

  1. Cell referencing
  2. 7 Basic functions and formulae

2.8 Editing a worksheet

2.9 Worksheet formattin2.10 Data management

2.11 Charts/graphs

2.12 Printing worksheets

 

2.1 Definition of a spreadsheet

A spreadsheet is essentially a ledger sheet that lets you enter, edit and manipulate numeric data. There are two types of spreadsheets namely:

  1. The manual spreadsheet.
  2. The electronic spreadsheet.

A manual spreadsheet is the most commonly used type by book keepers as a ledger book with many sheets of papers divided into rows and columns on which various amounts of money are entered manually using a pen or pencil. You can visit your bursar’s office and request to see a ledger sheet.

 

An electronic spreadsheet on the other hand is prepared using a computer program that enables the user to enter values in rows and columns similar to the ones of the manual spreadsheet and to manipulate them mathematically using formulae.         ‘

 

In this book, the word spreadsheet shall be used to refer to the electronic spreadsheet. ‘.

Advantages of Using Electronic Spreadsheets over Manual Spreadsheet

 

  1. The electronic spreadsheet utilizes the powerful aspects of the computer like speed, accuracy and efficiency to enable the user quickly accomplish tasks.
  2. The electronic spreadsheet offers a larger virtual sheet for data entry and manipulation. For example the largest paper ledger you can get is one that does not exceed 30 columns and 51 rows while with an electronic spreadsheet, the least ledger has at least 255 columns and 255 rows!
  3. The electronic spreadsheet utilizes the large storage space on computer storage devices to save and retrieve documents.
  4. The electronic spreadsheet enables the user to produce neat work because the traditional paper, pencil, rubber and calculator are put aside. All the work is edited on the screen and a final clean copy is printed. With a handwritten spreadsheet, neatness and legibility depends on the writer’s hand writing skills.
  5. Electronic spreadsheets have better document formatting capabilities. 6. Electronic spreadsheets have inbuilt formulae called functions that enable the user to quickly manipulate mathematical data.
  6. An electronic spreadsheet automatically adjusts the result of a formula if the values in worksheet are changed. This is called the automatic recalculation feature. For a manual sheet, changing one value means rubbing the result and writing the correct one again.

 

Examples of spreadsheets

  1. VisiCalc: This was the first type of spreadsheet to be developed for personal computers.
  2. Lotus 1-2-3: This is integrated software with spreadsheet module graphs and database. 3. Microsoft Excel
  3. VP-Planner etc.

In this book, the spreadsheet that will be considered in details is Microsoft Excel.

Components of a spreadsheet

A spreadsheet has three components  ­

  1. Worksheet. /
  2. Database.
  3. Graphs.

Worksheet

This is the component in which data values are entered. It is made up of rows and columns. The intersection between a row and a column is called a cell. A row is a horizontal arrangement of cells while a column is a vertical arrangement of cells. Each row is labeled with a number while each column is labeled with a letter as shown in the Figure 2.1. Each cell is referenced using the column label followed by the row label e.g. cell B3 has the value 20. A group of many worksheets make up a workbook.

 

A             B       C          D        E         F

1                      
2                      
3   20                  
4                      
5       I              

 

Fig. 2.1: A Worksheet

 

Database

Data values can be entered in the cells of the spreadsheet and managed by special Excel features found on the Data menu. These features were incorporated in Excel but they actually belong to database management software. One of such feature is filtering records, using forms, calculating subtotals, data validation pivot tables and pivot chart reports.

 

If the data values for the same entity (related values) are entered on the same row, they form a record. Hence a worksheet can be manipulated to some extent as a database that has data records entered in it. Figure 2.2 shows a worksheet having two records, Joy and Jeff.

 

A              B             c           D           EF1

      1 Name IDNo. Age Nationality
      2 Joy 123445 25 Kenyan
      3 Jeff 125675 35 Ugandan
      4        

 

Fig. 2.2: A spreadsheet with records

 

NB: A spreadsheet file is structured in such a way that it can be visualised as a table of records. That is why such a ‘file can be imported into a database program as will be discusses later in databases.

 

Graphs

A graph is a pictorial representation of the base data on a worksheet. Most spreadsheets refer to graphs as charts. A chart enables the user to present complex data elements from a worksheet in a simple easy to understand format. Examples of charts are pie charts, line charts and bar charts. As shall be discussed later, it is easy to generate charts when working with a spreadsheet program. Figure 2.3 shows an example of a pie chart.

 

2.3 Application areas of a spreadsheet

 

Statistical analysis

Spreadsheets provide a set of data analysis tools that can be used to save steps when developing complex statistical or engineering analyses. The user is usually expected to provide the appropriate data and parameters for each analysis. The statistical tool then uses appropriate automated statistical or engineering functions and then displays results in an output table. Some of the tools generate charts in addition to the output tables.

 

Because most of these tools are complex, the user needs to have the statistical background knowledge before attempting to use the tools. Examples of some simple statistical functions include the following:

  1. Average: This is used to calculate the mean of a set of values.
  2. Median: This is used to return the value in the middle of a set of values.

 

For example a set of values may be composed of:

 

10   20    30   40    50     60.

 

The average of the set is 35 and its median is also 35. The median is found by taking the average of the two numbers at the centre of the set, in this case 30 and 40.

 

Accounting

Many accountants find the spreadsheet a useful tool to use in recording daily transactions and keeping of financial records. Spreadsheets provide a user friendly environment for financial management and they come with inbuilt functions that make accounting tasks easier. For example, the spreadsheet can be used by accountants to do the following:

  1. To track the value of assets over time (depreciation and appreciation)
  2. To calculate profits
  3. To prepare budgets

 

Other formula like sum, average, product etc. enables the accountant to carry out his daily work without any problem.

 

Data management

A spreadsheet enables neat arrangement of data into tabular structure. Related data can be typed on the same worksheet. However, when data is on different worksheets, the worksheets can be linked to enhance accessibility.

 

Data management functions include sorting, filtering (displaying only the required items) and using forms to enter and view records.

 

Spreadsheets enable the user to create, edit, save, retrieve and print worksheet data and records.

 

Forecasting (“What if” analysis)

The automatic recalculation feature enables the use of “What if’ analysis technique. This involves changing the value of one of the arguments in a formula to see the difference the change would make on the result of the calculation. For example, a formula to calculate a company’s profit, margin may be as follows:

 

Profit =, (Total units sold x sale price) – (Total units bought x cost price) – Operating ‘expenses.

A sales manager in the company c n ask the following question: What if sales increase by 20%, how much profit wills the company make? The manager substitutes the total units sold value with one that is 20% higher and the spreadsheet automatically displays the new profit. A traditional analysis method would require a different work sheet to be prepared. Therefore, this method can be used for financial forecasting, budgeting, stock portfolio analysis, cost analysis, cash flow etc.

Creating a worksheet/workbook using Microsoft Excel

To start Microsoft Excel, click Start button, point to Programs and then select Microsoft Excel from the programs menu This procedure may vary slightly depending on the version of Excel you are using or the computer’s hardware and software configuration.

The Windows environment allows a person to place shortcuts to a program’s executable (.exe) file in various places like the desktop. If the Excel shortcut is on the desktop, simply double click it to start the application.

 

The Microsoft Excel application window opens as shown in the Figure 2.5. Make sure that you can be able to identify all the labeled parts of the Microsoft Excel application window.

 

The Microsoft Excel application window

The Microsoft Excel application window is made up of the following components:

Title bar: It has the title of the application and control buttons for minimising, maximising and closing the application

The menu bar: It displays a list of menu options e.g. File, Edit, View etc. Clicking one of them displays a menu that has commands which can be selected in order to manipulate data in the spreadsheet.      ‘

Tool bars: The most common of these are the standard and formatting toolbars. The most important thing is to be able to identify each toolbar by its icons. The standard toolbar has shortcuts to some of the most commonly used menu commands like print, copy, paste and save. The formatting toolbar has shortcuts to the commonly used commands found on the format menu option

Formula bar: This is one of the most important components of the Microsoft Excel application window. It enables the user to enter or edit a formula or data in a cell. You can identify the formula bar because it has an equal sign (or fx). The name box to the left of the formula bar displays the position of the cell in which data or a formula is being entered which is also called the current cell. If the formula bar is not available, click on View menu then select Formula bars. A check mark appears on the left of the selected item to show that it is now displayed on the screen.

Cell pointer: It marks the position of the current cell or the insertion point. It is special cursors that is rectangular in shape and makes the current cell appear as if it has darker boundaries.

The Worksheet: Consists of cells, rows and columns. Data is entered here for manipulation.

Status bar: It shows the processing state of the application. For example, on its left is the word Ready which shows that the spreadsheet is ready to receive user commands.            ‘

 

Worksheet labels: These are usually of the format Sheet 1, Sheet 2 etc. A workbook may have several sheets. It is also possible to rename the sheets by right clicking on the labels then choosing rename command from the shortcut menu that appears. The active sheet (one being used) has its label appearing lighter in colour than the rest. To move to a particular sheet in the workbook, simply click its sheet label.

 

Vertical and horizontal scroll bars: Clicking the arrows at their ends moves the worksheet vertically and horizontally on the screen respectively.

 

Worksheet layout

The worksheet has the following components: Cells: An intersection between a row and a column.

Rows: Horizontal arrangement of cells. Columns: Vertical arrangement of cells.

Range: Is a group of rectangular cells that can be selected and manipulated as a block.

 

Navigating the Microsoft Excel screen

  1. Click cell D5. Notice that the cell pointer immediately moves to the cell and the name box reads D 5. Typing on the keyboard now inserts entries in cell D5 as long as the pointer is still there.
  2. Click letter A that heads the first column. Notice that the whole column is highlighted.
  3. Double click cell EIO. Notice that the text cursor forms in the cell and you can now type characters inside the cell. Also the status bar will now read enter which means that Microsoft Excel expects you to enter a value in the cell.
  4. Click the down arrow on the vertical scroll bar. The worksheet moves upwards on the screen. The opposite happens when you click the up arrow on the vertical scroll bar.
  5. Click the right button on the horizontal scroll bar. The worksheet moves to the left. The opposite happens when you click the left button on the horizontal scroll bar.
  6. Press the right arrow key on the keyboard. Notice that the cell pointer moves one column to the right on the same row. This can also be done by pressing the Tab key once.
  7. Press the left arrow key on the keyboard. Notice that the cell moves one column to the left on the same row. Pressing gives the same results.

 

  1. Press the up arrow key on the keyboard. Notice that the cell pointer moves one row up on the same column.
  2. Press the down arrow key on the keyboard. Notice that the cell pointer moves one row down on the same column.
  3. Press the end key. The status bar will display the message “END”. If you press the right arrow key, the cell pointer will move right to the last cell on the row. If the left up or down keys were to be pressed instead, the cell pointer would move to the last cell to the left, top or bottom respectively.

 

  1. Pressing Ctr1+Home moves the cell pointer to the first cell of the worksheet i.e. cell AI.

 

Creating a worksheet

At its simplest level, creating a worksheet consists of starting the spreadsheet program and entering data in the cells of the current worksheet. , However, a person can decide to create a worksheet either using the general format or from a specially preformatted spreadsheet document called a template.

 

Using the general format

When a spreadsheet program is running it will present the user with a new blank screen of rows and columns. The user can enter data in this worksheet and save it as a newly created worksheet. If this is not available then click File menu option and select the new command. The dialog box shown in Figure 2.8 will be displayed on the screen. On the General tab, double click the workbook icon. Enter data in the new worksheet created.

 

Using a template

Click File menu option then new command. On the spreadsheets solutions tab, double click the template that you wish to create. Figure 2.9 below shows some examples of templates that may be present for selection.

 

NB: If the template was saved previously on the hard disk, it will open as a new worksheet with all the preformatted features present allowing the user to enter some data. However, some templates may require the original program installation disk in order to be able to use them because they may not have been copied to the hard disk during program installation.

 

Editing a cell entry

Editing a cell means changing the contents of the cell. Before the contents in a cell can be. Changed, the cell must be selected by making it the current cell.

To edit a cell entry proceeds as follows:

.1. Move the cell pointer to the cell you wish to edit.

  1. Double click the formula bar for the text cursor to appear in the bar. The status bar message changes to edit
  2. Use the keyboard to delete and add contents to the formula bar then press enter key to apply. Click the save button on the standard toolbar to save the edited changes.

 

Selecting a range

As you have experienced with the previous two examples, working with one item at a time is tedious and time consuming. Using a range saves time when working with a large .amount of data.

 

A range is a rectangular arrangement of cells specified by the address of its top left and bottom right cells, ‘separated by a colon (:) ego Range AI:CIO is as shown in Figure 2.10.

Selecting multiple ranges

When using a mouse, you can select more than one range without removing the highlight from the previous. To do this:

Hold down the Shift key or the Ctrl key while you click on the row header of the second range you want to highlight. What happens? Do you notice the difference when holding down the shift and the ctrl keys?

  1. Shift key will cause all columns/rows between the selected and the newly clicked cell to be highlighted.
  2. Ctrl selects individually clicked cells or range.

 

Hiding rows/columns

You can hide some rows or columns in order to see some details, which do not fit, on the screen. To do this:

  1. Highlight the columns/rows you want to hide
  2. Click format menu, point on row or column and click hide command.

 

Saving a worksheet

To save a worksheet, one has to save the workbook in which it belongs with a unique name on a storage device like a hard disk. The procedure below can be used to save a workbook:

  1. Click File menu option then select Save as’ command. Alternatively, click the save command on the standard toolbar. The save as dialog appears
  2. Select the location in which your workbook will be saved in the Save in box then type a unique name for the workbook in the File name box. Make sure that the option Microsoft Excel Workbook is selected under the save as type box.
  3. Click the Save button to save.

 

Retrieving a saved workbook

This means opening a workbook that was previously saved.

  1. Click File menu option then the Open command. Notice that the Open command has three dots (called ellipsis) indicating that a dialog box will open, as the user is required to provide additional information. Alternatively just click the Open command on the standard toolbar. The open dialog box appears on the screen.
  2. Click the Look in drop down list arrow and select the drive or folder where the workbook was saved. For example, if you saved in a diskette, insert it in the floppy drive then select 3 1/2-floppy (A:). A list of folders and files in the drive will appear in the list box.
  3. Double click the icon of the workbook you want and the worksheet will be displayed in the Microsoft Excel window. Notice that the cell pointer is in the same cell it was in when the worksheet was last Saved.

Closing a worksheet

Click File then Close command. This closes the worksheet but does not

Close the Excel spreadsheet program. Alternatively, click the; close button of the worksheet window

Exiting from the spreadsheet                 

Click File then Exit command. This closes not only the worksheet but also the spreadsheet program as well. Alternatively click the close button of the main application window.

Cell data types

There are four basic types of data used with spreadsheets:

  1. Labels
  2. Values,
  3. Formulae
  4. Functions.

 

Labels

Any text or alphanumeric characters entered in a cell are viewed as labels by the spreadsheet program. Labels are used as row or column headings usually to describe the contents of the row or column. For example, if a column will have names of people, the column header can be NAMES. Sometimes, numbers can be formatted so that they can be used as labels. To achieve this add an apostrophe just before the most significant digit in the number. For example, the number 1990 will be treated as numeric. if typed in a cell but’ 1990 will be treated as a label.

 

Labels are aligned to the left of the cell and cannot be manipulated mathematically.

 

Values

. ,

These are numbers that can be manipulated mathematically. They may include currency, date, numbers (0-9), special symbols or text that can be manipulated mathematically by the spreadsheet.

 

Formulae

These are user designed mathematical expressions that create a relationship between cells and return a value in a chosen cell. In Microsoft Excel, a formula must start with an equal sign. For example, the formula

=B3+D4 adds the contents ofB3 and D4 and returns the sum value in the current cell.

 

Excel formulae use cell addresses and the arithmetical operators like plus (+) for addition, minus (-) for subtraction, asterisk (*) for multiplication and forward slash (I) for division.

Using cell addresses, also called referencing, enables Microsoft Excel to keep calculations accurate and automatically recalculates results of a formula in case the value in a referenced cell is changed. This is called automatic recalculation.

 

Functions

These are inbuilt predefined formulae that the user can quickly use instead of having to create a new one each time a calculation has to be carried out Microsoft Excel has many of these formulae that cover the most common types of calculations performed by spreadsheets. To add the contents of cell B3 and D4 the sum function can be used as shown below:

 

= Sum (B3:D4)

 

2.6

 

Cell referencing

A cell reference identifies a cell or a range of cells on the worksheet and shows Microsoft Excel where to look for the values or data needed to use in a formula. With references, you can use data contained in different cells of a worksheet in one formula or use the value from one cell in several different formulae.

By default, Microsoft Excel uses the A 1 cell referencing style. This means that a cell is identified by its column label followed by the row number. However, the Rl Cl referencing style can be used. In this case, the cell is referencing by its row number followed by its column number. The table below gives a few examples of equivalent referencing using both styles.

A1 style R1C1 style
B2 R2C2
C10 R10C3
E20 R20C5

 

 

The RlCl style is useful when automating commonly repeated tasks using special recording programs called Macros.

 

Relative referencing

When performing tasks that require cell referencing, you can use formulae whose cell references keep on changing automatically depending on their position in the worksheet. This is called relative cell referencing. A good example would be if you type the formula =Al+Bl in cell Cl. If the same formula is copied to cell C2 the formula automatically changes to =A2+B2.

 

Absolute referencing

These are cell references that always refer to cells in a specific location

, of the worksheet even if they are copied from one cell to another. To make a formula absolute, add a dollar sign before the letter and/or number,

such as $B$lO. In this case, both the column and row references are absolute. .

 

Referencing using labels and names

Labels of columns and rows on a worksheet can be used to refer to the cells that fall within those columns and rows. It is possible to create a name that describes the cell or range then use it instead of having to specify a range with actual cell references. Such a descriptive name in a formula can make it readable and easier to understand its purpose. For example, the formula =SUM(SecondQuarterProfits) might be easier to identify than =SUM(AlO:C20). In this example, the name SecondQuarterProfits represents the rangeAlO:C20 on the worksheet. Names can also be used to represent formulae or values that do not change (constants). For example, you can use the name .Tariffs to represent the import tax amount (such as 7.0 percent) applied to imports.

 

To create a named range

To create a named range proceeds as follows: 1. Select the range to be named:

  1. Click inside the name box to move the text cursor inside. Delete the Cell reference that is there and type a name for the range.
  2. Press Enter key to apply. Figure 2.13 shows a worksheet range called sales that has values used in a formula to give the sum in cell C 11.

 

 

2.7 Basic functions and formulae

Formulae perform mathematical operations ranging from very simple arithmetic problems t9 complex scientific, financial and mathematical analysis.

 

Statistical functions.

  1. Average: It returns the average (mathematical mean) of a set of values which can be numbers, arrays or references that contain numbers. If the value 20 is in cell DIO and 30 in ElO then:

=Average(D lO:E 1 0) returns 25 as the average of the two values.

  1. Count: Counts the number of cells that contain values within a range e.g.

= count (AIO: EIO) many return a value 5 if all the cells have values.

  1. Max: It returns the largest value in a set of values. It ignores text and logical values e.g. == Max (AlO:EIO) will return the maximum value in the range.
  2. Min: It returns the smallest value in a set of values. It ignores text and logical values e.g. = Min (AIO:EIO) will return the minimum values in the range.
  3. Mode: It returns the most frequently occurring value in a set of values. e.g. = Mode (AIO:ElO)
  4. Rank: Returns the rank of a number in a list by comparing its size relative to the others. For example if A 1 to AS contains numbers 7, 3.8,3.8, 1 and 2 then RANK (A2, Al :A5,1) returns 3 while RANK (AI, AI:A5,I) returns
  5. The general format is RANK (number to be ranked, range, order).

 

Logical functions

  1. If: It returns a specified value if a condition is evaluated and found to be true and another value if it is false. If (marks > 50, “pass”, “fail”) will display a pass if values are more than 50 else it will display fail.
  2. Countif: Counts the number of cells within a specified range that meet the given condition or criteria. e.g. suppose A 1 0 : E 1 0 contains eggs, beans, beans, eggs, eggs, countif(AIO:EIO, “Eggs”) will return 3.
  3. Sumif: It adds values in the cells specified by a given condition or criteria. e.g. For example if AIO to ElO contains values 10,50,60, 30, 70, to sum all values greater than 50 = Sumif(AIO:EIO, “>50”). This returns 130.

 

Mathematical functions

  1. Sum: adds values in a range of cells as specified and returns the result in the specified cell. e.g Sum (AIO:EIO) adds values in the range
  2. Product: multiplies values in a range of cells and returns the result in the specified cell. For example if A 10 has 30 and BIO has
  3. Product (AlO:BIO) will return 90.

 

Arithmetic formulae – using operators

       Operator Function

 

+ (plus)                                          adds values as specified

– (minus) .                                      subtracts values as specified

* (multiplication)                           multiplies values

/ (division)                                     divides values.

( ) parenthesis                                     encloses arguments to be calculated first.

 

For a formula =(Al +C3)/E20, if the value in E20 is not zero, the result is displayed in the current cell.

 

Order of execution

If several. Operators are used in a single formula; Microsoft Excel performs the operations in the order shown in Table 2.3. Formulas with operators that have same precedence i.e. if a formula contains both a multiplication and division operator are evaluated from left to right. Enclosing part of the formula to be calculated in parentheses or brackets makes that part to be calculated first.

 

Operator   Name Precedence
1. –   Negation as in -1 1
2.%   Percent 2
2. 1\   Exponentiation 3
3. * and / ! Multiplication and division 4
4. + and –   Addition and subtraction 5
6. =,<>,>,<,<=,>= Relational 6

 

Table 2.3: Operators’ order of execution

 

2.8

 

Editing a worksheet

 

Coping and moving data

Spreadsheet software automates many processes that could have been tedious if done manually. For example with Microsoft Excel, you can do calculations using formulae fairly easily as you give the data and correct instructions to the program. Copying and moving of, data can also be done quickly and efficiently.

 

When data is cut or copied from the worksheet, it is temporarily held in a storage location called the clipboard.

 

Copying data

To copy a cell or a range of cells:

  1. Highlight the cells or range you want copied
  2. Click the Edit menu then select Copy command.
  3. Select the cell in which you want to place a copy of the information 4. From the Edit again, click Paste command. The Paste command puts a copy from the clipboard on the specified location

 

Moving data

Unlike the Copy command where a duplicate copy is created, the Move command transfers the contents of the original cell (s) to a new location.

 

To move a range of cells:

  1. Highlight the range you want to move.
  2. From the Edit menu, select Cut.
  3. Specify the location you want to move the contents to.
  4. From the Edit menu again, click Paste.

 

2.9 Worksheet formatting

Worksheet formatting refers to enhancing the appearance of the worksheet to make it more attractive and appealing to the reader. Appropriate formatting should be used to lay emphasis, catch attention and bring otherwise II hidden detail to the fore of the document.

 

The golden rule of formatting is to use simple clear formats. It essentially consists of changing text colour and typeface (font), size, style and alignment. In Microsoft Excel, format the cells whether empty or not and their contents will acquire the set format automatically.

 

To format a single cell, make it the current cell then format menu option and select the cells command In the format cells dialog box, make the formatting specifications that you wish then click the ok button to apply. If it is a range of cells, they must be highlighted first before formatting them as a block of cells.

 

Formatting text

  1. Highlight the cells that have the text to be formatted.
  2. Click Format menu then cells command. The dialog box appears
  3. Select the font tab as shown in the figure by clicking it.
  4. Select the font type e.g. Times New Roman. Other font formatting features like style, size, underline and colour are available and can be selected.
  5. Click button to apply.

 

NB: Alternatively, use the formatting toolbar to accomplish all your text formatting needs. Notice that the options in the font dialog box are commands on the formatting toolbar.

 

Formatting numbers

  1. Highlight the cells that have the numbers to be formatted.
  2. Click Format menu then cells command. The dialog box in Figure 2.15 appears.
  3. Select the Number tab as shown in the figure below.
  4. You can now choose number formats as explained below:

Number            Meaning

General           general format cells have no specific number format.

Number           Used for general display of numbers e.g. 2345.23.

Currency         For displaying general monetary values e.g. $100, Ksh.10.

Accounting     Lines up the currency symbols and decimal poin s. Displays date in chosen format.

Date                Displays time in chosen format.

Percentage       Multiplies the value in a cell with 100 and display ‘ it as %.

Text                 Formats cells to be treated as text even when numbers are entered.

Custom          For a number format not predefined in Microsoft Excel, select custom then define the pattern.

 

Worksheet borders

You may need to put a printable border around your worksheet or in a range of cells to make it more attractive and appealing. To put a border:

  1. Highlight the range you wish to insert borders. From the format menu, click cells command.
  2. Click the borders tab and specify the border options for left, right, top and bottom. .
  3. From the style options, select the type of line thickness and style. Also select the preset options.
  4. Click the ok button. The selected range will have a border around it.

 

Formatting rows and columns

Sometimes, the information entered in the spreadsheet may not fit neatly in the cell set with the default height and width. It therefore becomes necessary to adjust the height of a row or the width of a column. The standard width of a column in Microsoft Excel is 8.43 characters but can be adjusted to any value between 0 and 255.

 

Changing column width

  1. Move the mouse pointer to the right hand side line that separates the column headers i.e. for instance the line between A and B.
  2. Notice that the mouse pointer changes from a cross to a double arrow
  3. Click the mouse button and hold it down so that you can now resize the width of the column by dragging to the size you wish. After Dragging to the required point release the mouse button and the Column will have a new size.

 

NB: Alternatively, move the cell pointer to one of the cells of the column then click Format, point to Column then click Width command from the sidekick menu. Type a width in the dialog box that resembles Figure 2.17 then click Ok.button to apply.

NB: To change the widths of several columns at the same time, highlight them first before following this method.

 

Changing row height

  1. Point to the line that separates two row numbers e.g. the line between 1 and 2. The mouse pointer becomes a double arrow.
  2. Drag the line until the height of the row is as required then stop and release the mouse button.

NB: Alternatively, click Format point to Row then click Height from the sidekick menu that appears. Type the height that you wish in the dialog box that appears and then click OK button to apply.

 

Inserting rows and columns

I, Click cell A5 to make it the current or active cell.

2.clik insert then columns to insert a ‘row above cell A5 and shift all the other rows downward.

OR

 

Click insert then Columns to insert a column to the left of column A and shift all the others to the right.

 

NB: Alternatively, click  insert  then cells to display the dialog box select the entire row or entire column options to insert a row or column respectively.

 

Global worksheet formatting

The word global in this case refers to the entire worksheet. In order to format the whole worksheet globally, it must be selected as a whole.

Two methods can be used to select a worksheet globally:

  1. Click the top left comer of the worksheet that has a blank column header i.e. immediately on the left of A and just above I,

OR

  1. Press Ctrl+A on the keyboard.

 

Notice that the whole worksheet becomes highlighted. It can now be formatted as one big block using format cells command.

 

Using autoformat

It allows the user to apply one of sixteen sets of formatting to & selected range on the worksheet. This quickly creates tables that are easy to read and are attractive to the eye..

  1. Select a range e.g. B 1 :G7 to make it active.
  2. Click format then select the auto format command on the menu that Appears. Select a format from the autoformat dialog box shown in Figure 2.19.
  3. Click the ok button to apply the format to the selected range.

 

2.9 Data management

At times, it becomes necessary to use advanced data management tools to manage large ,data stored on a ‘worksheet. For example, if the worksheet has many records, it may become necessary to arrange them in a particular order using a method called sorting for easier access to data items. Other methods of data management include use of filters, total/subtotal function and forms.

 

Sorting

To carryout sorting proceed as follows:

  1. Highlight the range that you wish to sort by clicking its column header letter.
  2. Click Data then Sort . Notice that the Sort by field is already reading the field that you selected. This field is called the criteria field.
  3. Select the field to be used as the key for sorting and the sort order as either descending or ascending then click OK button to apply.

 

Filtering data

Filtering is a quick and efficient method of finding and working with a subset of data in a list. A filtered list will only display the rows that meet the condition or criteria you specify. Microsoft Excel has two commands for filtering lists.

  1. The auto filter: It uses simple criteria and includes filter by selection.
  2. Advanced filter: It uses more complex criteria.

 

In this Pupil’s Book we will look at the autofilter.

 

Autofilter

Filters can be applied to only one list on a worksheet at a time.

  1. Click a cell in the list that is to be filtered; usually the list is in a column.
  2. On the Data menu, point to Filter, and then
  3. To display only the rows that contain a specific value, click the arrow in the column that contains the data you want to display as shown in Figure 2.21.
  4. Click the value that is to be displayed by the filter from the drop down list. e.g in the example below, the selected value is 34.

NB: Sometimes while looking through a list of values on a large worksheet, you may come to a value of interest and want to see all other occurrences of the value in the spreadsheet. Simply click the cell that has the value then click auto filter on the standard toolbar. Microsoft Excel turns on AutoFilter and then filters- the list to show only the rows you want.

 

Subtotals function

Consider the following scenario: A company that has many salespersons

will need to know how much each of them should be paid at the end of a period by looking at individual sales volumes. Also, the grand total for all the payments has to be calculated. Therefore, if the salespersons are held in a list, there would be need to calculate the amount due to each of them. This can be called a subtotal in the list. All the subtotals can then be added together to make the grand total. Consider the following list:

Name                    Amount Owed

Stephen           `           6000

Joy                              3000

Stephen                      2000

Virginia                     5000

Joy                             800

Stephen                       200

Virginia                     5000

 

Microsoft Excel can automatically summarise the data by calculating subtotal and grand total values of the list. To use automatic subtotals, the list must have labelled columns and must be sorted on the columns for which you want subtotals. In this example, the list is first sorted by name

  1. Click a cell in the list that will have subtotals e.g. cell A3.
  2. On the Data menu click Subtotals 3. Notice that all the data range is now selected.
  3. In each change in box, select Name from the drop down list because we want a subtotal for each of the names.
  4. In the Use function box select the sum function then select the list for which subtotals will be inserted in the add subtotals box by checking the appropriate label. In this case it is the amount owed field.
  5. Click ok button to apply and the list will now have sub totals inserted

Totals function

Use theAutoCalculate feature in Microsoft Excel to automatically show the total of a selected range. When cells are selected, Microsoft Excel displays the sum of the range on the status bar. Right clicking this function displays other functions like Min, Max and Average that can also be used. To find the total of a range, highlight it then click the autosum icon ∑ on the standard toolbar.

 

Forms

A form is a specially prepared template that the users can use to enter data in a worksheet. It is specifically formatted to enable users to enter data in a format that is more convenient to them. If data is collected on paper before entering in the computer, then a form can be created to have the layout of the data on the paper to quicken data entry procedures. To display a form: Click ‘Data, then form.

 

2.10 Charts/graphs

Charts/graphs are graphics or pictures that represent values and their relationships. A chart helps the reader to quickly see trends in data and to be able to compare and contrast aspects of data that would otherwise have remained obscure. Microsoft Excel has both two-dimensional and 3-dimensional charts that can be used instead of the raw data in the table that has to- be studied for a long time to understand it.

 

The various types of charts available include column, bar, line. Pie, bubble and area charts among others. Consider carefully the type of chart that would best represent the base data in the worksheet before creating one. For example, if the aim is to depict the performance index of a student from Form I-to 3, a line chart would be most appropriate because it clearly shows the trend in performance.

 

Types of charts

  1. Line chart – represents data as lines with markers at each data value in the x-y plane.
  2. Column chart- represents data as a cluster of columns comparing values across categories. .
  3. Bar chart – data values arranged horizontally as clustered bars. Compares values across categories.
  4. Pie chart – it displays the contribution of each value to a grand total.
  5. Scatter chart – compares pairs of values on the same axis.

To view types of charts, right click the chart object then select the chart type command.

 

Creating a chart

A chart must be based on values that are already entered in the worksheet.

 

To create a chart:

  1. Select the range of values for which you want to create a chart.
  2. Click the Chart wizard button on the standard toolbar and the chart wizard dialog box will open as shown in Figure 2.25
  3. Click the type of chart you wish to .create. If the office assistant appears, close it. The chart sub-type preview will show several styles of the selected chart type.
  4. Click the Next button to move to the dialog in Figure 2.26.
  5. Click the Series tab then the collapse dialog button on the labels text box.

This will shrink the dialog box so that only the category labels text box is shown. Highlight the data labels from the worksheet.

  1. Click the Expand dialog button to bring the full dialog box into view then click the: Next button. In step 3 of the wizard, use the appropriate tabs to type the title of the chart, show a legend, select whether to display gridlines or not etc. After all these click the Next button.’
  2. At step 4 determine whether the chart will be inserted in the current worksheet or a new worksheet then click Finish button (Figure 2.27).

 

Moving and resizing a chart

Once the chart is created, its size and location can be changed in the worksheet. The chart element is enclosed inside a boundary called the chart area and hence both can be resized independently. Simply click the object you wish to resize and use the object handles just like in objects to drag to size. To move the chart, click inside the chart area then drag to the desired position.

 

Data ranges

A data range is a rectangular block of cells that provides the base data that is used to create the chart. In charting, a data range is referenced as an absolute range e.g. .

=Sheetl !$B$2:$C$8 which means that the base data is found on Worksheet 1 and absolute range B2:C8.

To see the data range of a chart, right click it then select the Source data command. .

 

Labels

Each representation of data on a chart can either be labelled by a value

or text label. For example, in a bar chart that compares the height of pupils, each bar can be given a value label to make it more readable.

 

To label:

  1. Right click the chart then select the Chart options command from

the shortcut menu.

 

  1. Click the lables tab and choose whether you want value or text labels then click OK button to apply. .

 

Headings and titles

Each chart must have a heading showing clearly what it represents. To I make the chart understandable, include axis titles.

 

. To include axis titles proceed as follows:

  1. Right click the chart then select the. Chart options command.
  2. Click the Titles tab then type the chart title (heading). And axis titles respectively.
  3. Click OK button to apply.

 

Legends

The legend is like a key that explains what each colour or pattern of the data representation in the chart means. For example, Microsoft Excel may give red colour to one data value and green to the other. Without a legend it would be difficult to know how to differentiate the two sets of values.

 

: To create a legend:

.1.Right click the chart then select the Chart options command.

  1. Click the legends tab and specify that it be displayed in the chart area.
  2. Click OK button to apply.

 

2.11

 

Printing worksheets

A worksheet will finally be printed for sharing with others or for filing purposes. If it contains objects like charts, it may not fit on a standard printing page using the default printing options and settings. Therefore, Microsoft Excel allows the user to preview and set up the pages of a’ worksheet in order to fit them on the hard copy page.

 

Page setup

  1. Click .File menu option then Page setup command to display the page setup dialog box. . .
  2. On the Page tab, select the orientation of the page. Study the meanings of each buttons and options in Figures 2.28.
  3. After making the necessary selections, click OK to apply.

 

Print preview

It displays the worksheet from the point of view of the printer i.e. exactly the way it will look when printed. Before using this command, make I sure the chart is deselected.

  1. Click the Print preview button on the standard toolbar.
  2. The worksheet will be displayed in the print preview window with the status bar reading preview.
  3. Click Setup to start the page setup dialog box. To close the preview, click the Close. Button.

I Print options

 

To print click File then Print command. The print dialog, box appears as shown in Figure 2.29 .

  1. Select printer – the name box in this dialog box enables a person to select the printer that will be used to print the document. All the printers that are installed on the computer will be available here.
  2. The print what options are:

(a) Selection – this prints the selected worksheet area.

(b) Workbook – prints all the worksheets in the workbook.

(c) Selected chart – prints the selected chart only.

 

Page orientation

As explained earlier, page orientation refers to the layout of the text on the page. A worksheet can also be printed on either landscape or portrait depending on the number of columns across the worksheet.

 

Pages and copies                                                                        .

The number of copies box specifies how many copies of a particular worksheet or workbook should be printed.

 

Sometimes only some specified pages in a workbook are specified for printing e.g. if a workbook has 100 pages and you wish to print only pages 50 to 60 select the page(s) range button then type 50 and 60 in the from, to boxes respectively before clicking the OK button.

 

Printing

After selecting all the options, click the OK button to print.

 

Some common printing problems

  1. A message appears on the screen saying that the printer specified could not be found in the directory.

 

Possible problems and solutions

(a) The printer could be off. Switch it on and it will start printing.

(b) The data cable to the printer could be loose. Make sure it is firm at the ports.

(c) The wrong printer could have been selected. Select the right one in the print dialog box and send the print job again.

(d) A message appears on the screen reading that there is paper jam.         I

 

The printer is clogged with a paper jam. Alert the lab, technician or the Teacher to clear the paper jam.

 

DATABASES

 

Chapter outline

 

3.1 Introduction to databases

3.2 Database concepts

3.3 Data organization in a database

3.4 Creating a database using Microsoft Access

3.5 Editing a database

3.6 Form design

  1. 7 searching for specific records in a database

3.8 Creating reports

3.9 Creating labels

 

Introduction to databases

We are often faced with the need to keep, search for or give a report of daily experiences. This is the reason why many people use data storage methods like recording daily experiences in a diary. Traditionally, human beings used to manage data and information manually by using simple devices. However these methods have a number of weaknesses which include

 

  1. Unnecessary duplication of data
  2. Boredom and time wasting especially when searching for a Particular item.
  3. Misleading reports due to poor data entry and organisation
  4. Poor update of records etc.

 

Today, computerized systems have radically changec4the way data and information is managed by use of special programs called Database Management System (DBMS).

 

A database is a collection of structured and related data items organised so as to provide a consistent and controlled access to the items.

 

Database concepts                                                                           .

Computerised database creation and manipulation is achieved using Database Management System software. This software facilitates the creation, organisation and maintenance of databases. Examples of database management software’s include Microsoft Access (Ms Access), Oracle, FoxPro, Dbase/V, Lotus Approach etc.

 

The functions of database management software are to:

  1. Allow the user add or delete records.
  2. Update or modify existing records.
  3. Organise data for easy access, retrieval and manipulation of records.
  4. Act as an interface between a database and other application programs.
  5. Ensure security for the data in the database by safeguarding it against unauthorized access and corruption (damage).
  6. Keep statistics of data items in a database.

Database models

 

Databases are classified according to the method used to organise data. The main database models are;

  1. Flat file 2. Hierarchical
  2. Network 4. Relational

 

NB: Current database models are called object relational and object databases. However these models will not be discussed in details in this book.

 

Flat files

 

In a flat file model, a database holds only one set of data and is not any different from the manual files. For example, the teacher’s assessment report may consist of performance cards for every student in a class. Another example of a flat file database are the cards used in a library books catalogue. The cards are arranged sequentially for easy access e.g. alphabetically using books’ titles or by authors’ names. Figure 3.1 below is a sample record of a flat file.

Name Serah Seki
Admission number 649
Total marks 680
Number of subjects 10
Average 68
Position 4

Fig. 3.1: Sample record in a flat file

 

Hierarchical model

 

In this model, data items are arranged in hierarchical (tree) form as shown in Figure 3.2. To access level two data items, you have to first access level 1 data items. Level 1 item is called the root component. A specific single path leads to each item at lower levels. Hierarchical model is rarely used in modem database systems.

 

­                 Level 1 main data item

Path

  Level 2 data item

 

 

Fig. 3.2: Hierarchical database model

 

Network model

 

In this type of organisation, links are used to express the relationship between different data items, forming a network of items as shown in Figure 3.3. Access to one item can be through multiple paths and from any item. This model is also rarely used in modem database systems.

 

Dataitem 4

 

 

 

 

 

Fig 3.3: Network database model

 

Relational model

This is the most common type of model used on minicomputers and microcomputers. In this type of organisation, related data items are stored together in structures called relations or tables. Relationship can be created between tables such that a record or records from one table relates to another or other records in another table. Tables 3.1 and 3.2 show customers and orders tables that are related by two fields; the customer number in Table 3.1 and customer ID in Table 3.2. In this case, the orders table shows that one customer with number 450 (Bat Hori) has made several orders.

 

    Customer Number Name   Telephone number
    900   Mary Koech 02078907
    230   Peter Karimi 0667896
  450   Bat Hori 04456000
      Table 3.1: Customer number  
  Customer ID Order Number Date     Amount (sh)
900   2380   2/3/2004 90 000
  450   811   2/5/2004 5000
‘- 450   234   . 3/5/2004 13 000
  450   567   3/6/2004 13 000

Table 3.2: Customer ID

 

Object oriented models                                                                           . !

The next generation of database model will look at records as objects that are independent and relate with the other objects in the database. This concept is a bit difficult to conceptualise because such databases are still at developmental stage. However, many databases today combine object and relational concepts to come up with object relation models.

 

Features of a database management software

Most database software contains a collection of features that provides the user with a means to manipulate data in a database. These features include Tables/files, Queries, Reports generators, Form interface and a computer programming language within it. Microsoft Access database software that will be considered in this book has two distinct features used to automate operations namely Macros and Modules.

 

Tables/ file structure

This is a database structure that is used to hold related records. Tables are organised in rows and columns with each row representing a record while each column represents common fields in each record. Table 3.3 shows a table of six records and each record is made up of four fields.

 

FIRST NAME MIDDLE NAME LAST NAME ADDRESS
MBUGUA STEPHEN KIMANI 250 KERUGOYA
ADERA NELSON ODUOR 396 HOMA BAY
MARGARET JUDY WEKESA . 761 NAIROBI
GATO PATRICIA MUILA 170 TALA
MWELU LUCY. MWENI 390 KANGUNDO .
KOECH PETER KORIR 605 KERICHO

 

Table 3.3: Table of six records and four fields

 

Queries and query language

 

A query is a database tool used to search for or question a database on specific records. Because a query is a question posed to the database, it returns a result for the user. In Microsoft Access, this result is called a dynaset. For example, assume you work with the National Irrigation Board (NIB), you may wish to display all those farmers from Mwea Rice Irrigation Scheme who delivered rice in January to the National Irrigation Board. You can use a query object or statements to get the required records.

The query statements are written using a special language called

Structured Query Language (SQL). The user creates a, query by writing Structure query language statements such as:

Select

Farmer Number, Name, Month of Delivery

From

       Delivery Table

Where

Month of Delivery = “January”

 

Forms/screen input

 

A form is a graphical interface that resembles the ordinary paper forms used to collect data. However, a database form enables the user to view and enter data into a table. Figure 3.4 shows a sample form used for entering a student’s marks scored in four subjects and. the date of admission. Form interface is a more convenient and easy way of entering and viewing records from a table.

 

Reports

 

Most database systems provide the user with a tool for generating reports from an underlying table or query. It is the report generator that provides the user with a means to specify the output layout and what is to be output or printed on a report. Table 3.4 shows a sample report for employees’ salaries.

Net Pay Report

 

fay rol/no .Last.Name      First Name. . .Basic salary                PAYE              Net salary.

 

07      Wangui        Grace        sh 80,000.00   Kshs 7,300.00 sh 72,700.00

09      Ochieng       Mbenga    sh 37,000.00   Kshs 3,800.00 sh 33,200.00

13      Mumbua      Peter         sh 22,000.00   Kshs 2,300.00 sh 19,700.00

20      Mbuvai        Sicily        sh 60,000.00   Kshs 5,700.00 sh 54,300.00

Table 3.4: Sample report

 

Macros

 

Some database software provides the user with a tool called a macro, that can be used to automate frequently performed procedures or tasks. For example, if you frequently use a particular form when you start a database program, you need to create a macro that automates the opening of the form.

 

Programming module

 

When your database becomes more and more complex, you may need a more powerful tool than the macros to automate your database operations further. Some database software come with their own computer languages associated with them. For example Microsoft Access comes with a language called Visual Basic included as a Module in the software. Using this feature, you can create a program that will print a query result over and over again until a certain condition is true. This can be illustrated using a simple statement like;

 

Print Student Report until NumberofStudents = 40 (Not a real command anyway).

 

NB: For the purpose of this book, only tables, forms, queries and reports, have been covered.

 

Data organisation in a database

One of the functions of a database system is to organise data for easy access, retrieval and manipulation. Data is organised from the simplest fQfll1 called a field to a very complex structure called a data,base.

 

Fields

A field is a character or a logical combination of characters that represent data item. For example, in a class list, the student name is a field.

 

Records

This is a collection of related fields that represent a single entity. An example of a record is the student report card that may contain the. student’s name, admission number, class, total marks, average and grade.

 

Files/tables

A file is a collection of related records. For example, the students’ file in a school database contains the details of all the students in the school.

 

Database

This is the highest in data organisation hierarchy that holds all related files ‘or tables. For example, a school database may contain students and staff tables/files.

 

Creating a database using Microsoft Access

Microsoft Access (Ms Access) is a package in Microsoft Office suite used for creating and manipulating databases. Because there are different versions of Ms Access such as Ms Access 95/97/2000 and XP, a general approach for carrying out tasks has been adopted in this book. However most of the illustrations are based on Access 2000 in order to maintain consistency.

 

Starting Microsoft Access

  1. From Windows desktop, click the start button.
  2. Select. Microsoft Access from the programs menu
  3. In the dialog box that appears when Microsoft Access starts, click Blank Access database as shown in Figure 3.5 then OK.

 

  1. The Save As dialog box appears. See Figure 3.6. This lets you specify the name and location where your database will be stored. Click Create to save the database.

 

  1. Microsoft Access database objects window is displayed from which I you can choose the type of object to create such as tables, forms, queries etc.

 

Microsoft Access screen layout

Like the other applications discussed earlier, Ms Access application Window has a title bar, menu bar, toolbars and status bar. However instead of having a work area like that ofMs Word or Excel, it provides the user with an object window from which you choose the type of an objectto work with such as tables, forms, reports e,tc. See Figure 3.7.

 

.Exiting from Microsoft Access

Because Microsoft Access consumes a large amount of computer memory  it is advisable to exit from the application at end of each working session.

 

To exit:

From the File menu, click exit the close button on the title bar.

 

Guideline on designing a good databases

To design a good database which will require little time to maintain, consider the following:

  1. Carefully study the requirements of the user in order to define all the data inputs, outputs and relationships required.
  2. Design a draft database on the paper to determine the number of files or tables required.
  3. Divide the information into separate fields, records and tables to allow flexibility in manipulating the database. This process of dividing information into independent tables to avoid repetition of data entries items is referred to as normalizing a database.
  4. Define a field for each table that will be used to identify each record uniquely. This field is referred to as a primary key
  5. Give the most important fields the first priority when constructing a table structure. Important fields are those that are used in sorting’ and querying the database. “
  6. Design data entry forms needed for the database

Creating a table/file structure

To define a table structure:

  1. From the Microsoft Access objects window, click the tables tab then new
  2. From New table dialog box, select Design View Figure 3.8 appears. :
  3. using the grid displayed, enter a unique name for each field in the table. A field name must start with a letter and can be up to a maximum of 64 characters including letters, numbers, spaces and punctuation.
  4. Choose the correct data type before adding the next field. By default, Ms Access inserts Text as a data type. Figure 3.8 shows various data types used in Ms Access.
  5. To save the table, click the Save button on the standard tool bar or save from the file menu.
  6. Access will ask you whether you want to create a Primary Key, click Yes.

 

Description of field data types

The type of data to be used in a database must be clearly defined for the purpose of manipulation and storage. For example, if a field is to be used for calculation, it must be defined as a number. The data types allowed in Ms Access include:

 

Text

This type includes alphabetic letters, numbers, spaces and punctuation. Use this data type for fields that do not need to be used for calculations such as names, places, identification numbers etc. This type of field accommodates a maximum of 255 characters.

 

Number

These are fields made up of numeric numbers 0 to 9 that are to be manipulated mathematically.

 

Memo

This is a field made up of alphanumeric (both alphabetic and numeric) data. Instead of using Text use this data type if you need to enter several paragraphs of text because it accommodates a maximum of 32 000 characters.

 

Date/Time

Used to identify a field as either a date or time. This is because date/time values can be manipulated mathematically in a database. For example, you can calculate the age of a person from the date of birth to the current data.

Currency

Used to identify numeric values that have decimals or fractions. Use this data type especially when dealing with monetary values such as fees balance, amount sold etc.

 

AutoNumber

This is a numeric value used if you wish Ms Access to automatically increment the values in a field. For example when entering a list of forty students and you have a field labelled StudNumber, the numbers will increase by one every time you enter a new record.

 

Yes/No

This is a logical field where an entry is either a yes or a no, true or a

false. For example a field may require you to answer whether you are a male or a female.

 

OLE Object

OLE stands for Object linking and Embedding. This type of field is mostly used with graphical user interface applications for inserting graphical objects such as pictures, drawings charts etc. – – –­

 

Field properties

As you create more and more complex tables, you will find a need to use the field properties to specify finer details related to fields and the table entries expected. The field properties depend on the type of-the field selected. For example when you click on a Text field then the General tab you will see properties associated to text data type as shown in Figure 3.9. ­The various properties are:

 

Field size

This allows the user set the number of characters in a field instead of the default 50 for text fields for numeric field’s integer and long integer, Byte, Single and Double.

Integer and longer integer: Accept numbers with no decimals.

Byte: Can only accept a number from 0-255.

Single and double: Accept numbers with decimals. Single accommodates up to 38 decimal places while double, accommodates up to 308.

 

Format

Determines how information appears on the screen and when printed. For example, you can format a number to scientific, currency, percentage or general format.

 

Decimal places

For number and currency fields you can specify the number of decimal places.

Input mask                                                           ,

Input mask automatically formats the field entry into a specified format. F or example, if you enter a number such as 02000 I 00409874 and the input mask is set as 000-(00000)-000000, it is automatically displayed as 020-(00100)-409874. This property is mostly used to format phone and address entries.

 

Caption

This is a more descriptive name for a field to be used in a table or a form display. For example the caption for StuName could be Student Name.

 

Default value                                                                                         ,

This is a value that will appear automatically in the datasheet or form if ‘ nothing is entered by the user to change it. For example = Date -( ) automatically displays the current date in a date field.

   Validation Rule

Logical expression restricts the values to be entered in a field. ‘For example, if you want to restrict marks entered in a field to values between

, zero and a hundred, type >=0 And <= 100.

 

Validation Text

The message that appears once the validation rule is violated. For example, you may create a validation text for the above validation rule I to display “Enter a number between 0 and 100” whenever the user enters I a value outside this range.

 

Required

Determines if an entry must be made in the field before you proceed to the next field or record. For example, if a primary key is required, you must enter before you proceed.

 

Allow Zero Length

This allows the user to proceed without making any entry in the field set as Zero length.

 

Indexed

An Index, facilitates the organisation of records for easy search. A primary key is an example of an index set to No duplicates to control double entry of a record (redundancy).

 

Primary key and Indexes

 

An index is a database feature used to speed up search and sort operations in a table. A key field also referred to as a primary key is a special index that enforces uniqueness in a table so that one record is not entered twice.

 

Ms Access uses the primary key to search for data stored in a table as well as define relationships between tables. Once a field is set as primary key, its datasheet is automatically indexed or sorted using the primary key.

To set a primary key:

  1. Open the table in design view.
  2. Select the field you want to set as the primary key by clicking in the row header to the left of the Field Name.
  3. Click Set Primary key button on the tools bar. A key should appear on the left of the field name as shown in Figure 3.10.

 

To see another field as an index other than the primary key: 1. Open the table in design view.

  1. Ensure that non of the fields is selected as a primary key.
  2. Click the Indexes button on the tool bar that is located next to the primary key. The index design grid is displayed on the screen as shown in Figure 3.11.
  3. In the index name column, type in the name you want to give to the index.
  4. In the Field Name column, click the cell to display a drop down list. From the drop down list, select the field to use as an index.

6 In the Sort Order column, select either ascending or descending.

  1. In the lower portion, specify whether you want to make the field a primary key by selecting yes for primary and unique, and Ignore Nulls to ensure that data is entered into the field before proceeding.
  2. Close the dialog box.

 

Entering data into a table

 

To enter/append data into a table:

  1. Open the database in which the table is located
  2. Click the Tables tab then double click the table you want to add records to.
  3. Enter each record field by pressing the tab key to move to the next. Once you reach the end of the record and move the cursor to a new row the previous record is automatically saved.

 

Editing a database

 

Modifying the Datasheet view

 

To adjust the column size:

  1. Point to the column border between the field’s header then drag to the require size.
  2. Alternatively, click on the format menu then point to column and click on width
  3. Type the desired width

To adjust row height

  1. Point to the border between two rows in the row header and then drag.
  2. Alternatively, use format menu, then Row height.

To reorder fields:

  1. Select the column of the field you wish to move by pointing to the desired file name.
  2. Drag the column right or left to the top of the field where you want your field to appear and then drop.

 

Modifying the table structure

 

Once you create a table, you may need to add more fields, remove some fields, reorder the fields or change fields data types and properties. Before you modify the table it is important to save a copy to avoid losing everything in case you make a mistake

To make a copy of your table:

  1. From the file menu, click save as /export
  2. From the dialog box that appears, choose whether to save to another (external) database or the current.
  3. Type a new name for your table and click OK.

 To modify the original table:

  1. Open the table in design view by clicking the button that looks like a pencil and a set square placed on the edge of a ruler.
  2. Select the field or fields to be modified and make the necessary changes.
  3. Click the Save button to save the changes.

NB: If a table contains data and you make changes to the field data type, Ms Access may refuse to implement the changes. To avoid this problem, exit without saving and delete all the records from the table then return to the design view. You can then import a copy or copies of tables you backed up.

To import a table from another database:

  1. From the File menu, point to Get External Data then click Import
  2. From the dialog box that appears, select the database you wish to

import data from then click the Import button. Objects dialog box is displayed as shown in Figure 3.12.

  1. From the objects dialog box displayed, click the Tables tab
  2. Select the table(s) you wish to import then click OK.

 

Form design

 

Tables display many records at once from the database and in some cases you may not be able to see some fields properly. A form is an interface that enables the user to view and make data entries into an underlying table more easily. Figure 3.13 shows a sample form used to enter records into a books table.

 

In Microsoft Access, a form is designed using graphical objects called controls. A control is an object such as a text box, check box, command button or shapes that you place on a form design grid to display data or perform actions. There are two types of controls you can place on the grid: bound and unbound controls. A bound control is one whose source of data is a field in a table or query while unbound control is a control that is not connected to any data source.

 

You design or modify a form layout by dragging these controls to the required position. Figure 3.14 shows a form layout grid for a table called exam entry.

 

 Creating a form layout using form wizard

 

To create a form layout, you can either use the form wizard or start from scratch. Using the form wizard you can create either a columnar, a tabular a datasheet or a justified form layout.

Columnar form: The fields for each record are displayed down a column i.e. each value displays on a separate line with field labels to the left. Tabular: Records are displayed from left to right across the page and labels appear at the top of each column and each row represents a new record.

Datasheet: The form resembles a table datasheet view.

Justified: One record occupies the whole form.

To create a form using the form wizard:

  1. Open the database for which the form is to be created e.g.”EMPLOYEES”
  2. Click the Form tab then, New. From the New form dialog box that appears, click Form Wizard.
  3. Select the table you want to create a form for then New, A dialog box appears.
  4. Click the name of the table or query that includes the data you want to add into the form, and then click OK.
  5. From the fields list window, select the fields to add into the form by clicking the> button or click>> to add all fields then
  6. From the layout dialog box, select the layout you wish to use e.g. Standard then. click Next.
  7. In the Form title dialog box, type the name of the form then click Finish. Ms Access will automatically display the form on the screen.

 

Creating a form using autoform wizard

 

You can easily create a form using the Autoform wizard. This wizard creates a form for you automatically by asking you very minimal questions. The form includes all the fields from the selected table.

 

To construct an autoform tabular.

  1. Make sure your database is open
  2. Click the Form tab, then New.
  3. In the new form dialog box, select an auto form layout e.g. columnar
  4. In the “Choose the table or query where the object data comes” select the table you wish to create a form for then click OK. The form with all fields will be displayed.
  5. Click the Save button to save the form.

 

Creating a form from scratch

 

  1. Open your database
  2. In the database window, click the Form tab then New
  3. From the New form dialog box, select Design view
  4. In the “Choose the table or query where the-object data comes” select the table you wish to create a form for then click The form with all fields will be displayed.

To add controls onto the grid:

  1. Click the View menu, then. Field list command . The table you selected fields list is displayed.
  2. Drag and drop each field and arrange them on the grid.
  3. Save the form by clicking on the save button.

 

 

Data manipulating in a form

 

Adding and displaying records

 

The form provides the user with navigation buttons located at the bottom that can be used to navigate the form

The functions of the buttons can be summarized from left to right as follows

  1. Displays the first record in the table
  2. Displays the previous record.
  3. Displays the next record
  4. Displays the last record.
  5. Add a new record.

 

Formatting fields/controls in a form

To format fields in a form;

  1. Open the form in design view
  2. To resize, click the controls then position the pointer on the outline of the control then drag to the required size.
  3. To move, click the control and position the pointer onto the place holder or inside the control then drag to the required location.

 

Searching for specific records in a database

One major reason for use of a computerised database is the ability to search and retrieve specific information more efficiently. Rather than searching through endless filing cabinets, you simply enter an instruction and let the database do the rest. To search for data in a database, Ms Access provides the user with two search tools:

  1. Find command 2. Queries’

 

Using the find command

With a large database, the Find command saves your time when you need to move a record pointer to a particular record.

To search for a record:

  1. From Edit menu, click Find. The find dialog box appears in which you specify the field you want to search for in the” Find What” box as shown in Figure 3.16.
  2. Type the name of field you wish to search for in the Find What text box. .
  3. In the Search box (Figure 3.16), specify whether to:

( a) Search All

(b) Search Down to up or

(c) Search up to bottom

  1. In the match box, you can select one of the match types:

(a) Any part of field – As long as a string of characters to be searched are present in a word, then all the words having the string will

be searched e.g. “Berg” finds Berger, inselberg etc.

(b) Whole Field – Searches for the whole field for example, “Berg”

will not return Berger, inselberg but specifically berg if it is in the database.

(c) Start of Field – Specifies that, the searched word should start with the specified search string e.g. “Berg”

  1. In searching, you can also check or uncheck;

(a) Match case – Finds only text that has the same pattern of upper and lower case as the one specified in the Find What box.

(b) Search Field As Formatted – Select (check) to find data based on its display format e.g. ‘a date stored asa number 1/5/98 but

displayed as 05-Jan-98

(c) Search Only Current Field:- Select to search through all records for the current field only.

  1. After you set the search conditions click the Find First button.
  2. If you want to search for the second record or other records with the same field, click Find Next button.

 

You can use a wildcard e.g. asterisks (*) if you are not sure of the correct search word that will find all records that match the specified search string. For example, if you wish to search for all names that start with letter “J” in a school database, type J *. All names that start with J e.g. John, Jane Joy, Joyce and James will be displayed.

 

Using Queries

Queries are the fastest way to search for information in a database. A query is a database feature that enables the user to display specific records as well as perform calculations on fields from one or multiple tables. You can analyse a table or tables by using either a select query or an action query. However, only the select queries will be discussed in detail in this book

 

Select query

This is the most common type query used for searching and analysing data in one or more tables. Select query lets the user specify the search criteria and the records that meet those criteria are displayed in a dynaset

 

Action query

These are queries that are used to make changes to many records once. They are mostly used to delete, update, add a group of records from one table to another or create a new table from another table.

 

The four types of a action queries found in Microsoft Access are:

  1. Update – Updates data in a table.
  2. Append query – adds data in a table from one or more tables.
  3. Make table Query – Creates a new table from a dynaset.
  4. Delete Query – Deletes specified records from one or more tables.

 

Creating a select query

  1. Ensure that the database you want to create a query for is open.
  2. Click the Query tab, then New.
  3. From the New query dialog box, choose either to create a query from in Design view or using a Wizard.
  4. To design from scratch, click Design View. The Show Table dialog box appears from which you can add a table or tables you wish to create a query for as shown in Figure 3.17.
  5. Click the table from the table/ query list and then click Add.’
  6. Click Close to close the show table dialog box.
  7. The query design grid opens. In Microsoft Access it is called Query By-Example. This lets the user to design a query. Figure 3.18 is QBE grid for a table called Exam.

 

Parts of the query grid             ­

Field row- Fields from a table or tables to be used are arranged in this row. Each field should occupy its column.

Sort row – By clicking the down arrow in the sort cell, you can specify the sort order i.e. ascending, descending or no sort.

Show row – By clicking the Show box, you specify whether to display the field in the query results: When the box is not checked, the field will not be displayed.

Criteria row – This is where you type conditional statement that will be used by the query to display specific records.

Or row – Used to specify an alternative condition e.g. if you want to display records with a field called City with items Nairobi or Embu, type Nairobi in criteria cell and Embu in the Or cell.

To add fields into the query grid:

  1. Open the query in design view
  2. From the field list of the underlying table, drag each field and place it in the field row

 

Specifying the search criteria

In order to search for a particular set of records, you have to enter a conditional statement or statements in the criteria row. For example if you have a table called employees with one of the fields as salary, you can display all the employees earning more than Shs. 5,000, by typing >5000 in the criteria row, salary column.

 

To define criteria, use either relational or logical operators. Relational operators include less than «), greater than (», greater than or equal to (>=), less than or equal to «=), not equal to «» and equal to (=). Logical operators include AND, OR and NOT.

 

Use AND to display values in a specific range. For example, to display records from the employees table with salaries above 4000 but less than 6000, type, >4000 AND < 6000 on the criteria row in the salary column. All the employees who meet this condition will be displayed.

 

Use OR if you wish to get either one of two values. For example if you wish to get those employees either in Nairobi OR Embu.

 

If you want to display data in a particular range use the word Between. For example, instead of typing , >4000 AND < 6000, type Between 4000 And 6000.

 

If you want to list all records except those that you do not want to see use NOT. For example if you type NOT 6000 in the salary column of the employees table, all employees records will be displayed except. those with their salary as 6000.

 

To display records you are not sure of the field name but at least you can remember a few characters, use LIKE and the wildcards. Wildcards are

special symbols mostly an asterisk and a question mark used in place of other characters. For example, to display all names starting with “Sm” followed by any other character, type Like Sm? Like */*/1993 lists records created in 1993 regardless of the day or month.

 

Saving and running the query

  1. Click the Save button on the standard tool bar or save command from the file menu.
  2. In the name box that appears, type in the name of the query then click OK.
  3. To run the query in design view, click the Run button on the toolbar as shown in Figure 3.19 or Run command from the Query menu.
  4. You can view the results of your query any other time by selecting the query, then clicking the Open button from the database window.

 

Sorting the dynaset To sort a dynaset:

  1. In the sort row, click the down arrow that appears to specify the sort order i.e. ascending or descending of the desired field.
  2. Display the dynaset.

 

Modifying and updating a query

To delete fields from the query grid:

  1. Open the desired Query in design view.
  2. Select the field column you wish to delete
  3. Choose Delete from the Edit menu.
  4. Click the Save button to save the changes

 

To adjust the column size in a query

  1. Open the desired query in design view.
  2. Position the mouse pointer at the boundary that separates columns then drag it to the required size. Alternatively, double click the boundary to auto fit cell content.
  3. Click the Save button to save the changes

To modify a criteria statement ‘select query,

  1. Open the desired query in design view.
  2. Modify the criteria statements as desired, 3. Click the Save button to save changes.
  3. To test whether the changes have been effected, click the Run button to display the results of the query.

 

Performing calculations in a query

Unlike tables, queries let the user perform mathematical calculations on numeric data. You can perform calculations in a query by using the Total functions or by creating basic formulas

Creating basic formulae

To create a formula that calculates the total marks in an underlying table e.g. Exams table:

  1. Open your query in design view
  2. In an empty cell, preferably the immediate last field cell, type an expression that includes a field name of your choice such as:

Total: [Math’s) + (Physics) + (Chemistry) as shown in Figure 3.20

 

Math’s Physics Chemistry Total: (Math’s)+(physics)+(Chemistry)
Exam Exam Exam  
      .
        √      √     √     √

 

Fig. 3.20: Creating an arithmetic expression

 

  1. You can then set the criteria, and other query options.
  2. Save the query and run it. The results of the calculations will be displayed in the dynaset as shown in Figure 3.21. However, this field is not added to the underlying table(s) because query results must always be based on the most current data in the database.

Using Total functions                 .

With a query, you can analyze all records fields using the inbuilt functions such as Sum, Average, Minimum and Maximum etc. To use the total functions:

  1. Open your query in design view.
  2. Click the Totals button on the query toolbar.
  3. Select the field you want to analyze.
  4. For each field to be analyzed, click its cell in the Total row, and then select any of the functions as shown in Figure 3.22.

Sum: Adds all the numerical data items.

Avg; Calculates the mean of all numeric data items in the field column.

Min: Returns the minimum value from the field column.

Max: Returns the maximum value from the field column.

Count: Returns the number of items field column.

  1. Set criteria and other options then click run to preview the results
  2. Save the query.

 

Printing a query:

  1. Open the database window of the database containing the query you want to print
  2. Click the query tab then the query you want to print.
  3. From the file menu, click print Set the printing options then click the OK. Button.

 

Creating a select query from multiple tables

When you use fields from more than one table in a query, there should be a common link or relationship between the tables. There are three type of relationships

  1. One – to – One
  2. One -to – Many
  3. Many -to – Many

In a one -to one relationship, for a particular field in one table (the main table), there is only one matching record in the related table and vice versa. In a one -to many relationships, for a particular field in one table there are several matching records in another table. This is the most common type of relationship. For example, a person may make one order, or several orders. For this instance, there is only one record with that person’s details say in customers’ table, yet there are several records related to the same person in the Orders table.

In a many -to many relationship, for particular records in one table there are several matching records in the other table and vice versa. This is not very common.

 

Defining relationship between tables

  1. Make sure your database is open.
  2. From Tools menu, choose Relationships. The relationship dialog box appears.
  3. Select the tables to add then click the Add button. .
  4. To create relationship, click on the common field and drag it to the second table. The fields used to create the relationship must be of the same type and properties.
  5. To Enforce Referential Integrity, right click the line joining the two tables then click Edit. An Edit relationship dialog box such the one in Figure 3.23 will be displayed.
  6. Make sure Enforce Referential Integrity is checked to ensure that all records entered in the related table exists in the primary table.

 

  1. Click OK to close the Edit relationship dialog box.

 

To create a query based on related tables

  1. Start the database window and click the Queries tab,
  2. Select design view and click OK.
  3. From the show table dialog box, click the tables you want to base your query on and then click Add.
  4. Relationship between various tables will be displayed as shown in Figure 3.24. Add the fields from both tables into the QBE grid.
  5. Save and Run the query.

 

Creating reports

Reports are used to summarize and present information from a database. A good database software should enable the user to generate database reports and print them for presentation and distribution. This process is referred to as formal presentations. As with forms, a report layout is also designed by placing controls on to the report layout grid as shown in Figure 3.25.

 

Parts of a report layout in design view

Report Header-This contains unbound controls that displays title of the report.

Page Header – Contains heading or labels data items to be displayed in every column.

Detail – Holds bound controls that display data items for the table or query it was created from.

Page footer holds a control that is to be displayed on every page such as the page number and date. For example =Now() displays the current date and time as set in the system clock.

 Report footer Used to display summary from a report such as the grand total for numerical data in a particular field column.

 

Creating a report using report wizard

Just like the form wizard, report wizard takes the user through a number of steps by answering a few questions and Ms Access automatically does the rest.

 

To create a report layout:

  1. Ensure that the database is open.
  2. Click the Report tab, then New
  3. From the/New Report dialog box, click Report Wizard then
  4. Select a table or a query then the fields to be added to the report then click next.
  5. The wizard asks you whether you wish to add any group. Grouping is used to categorise records using a particular field for better presentation or if you need to perform calculations on a group of common items. For example, to categorise books in a library database according to ISBNNumber, double click the field then click Next. (Figure 3.26).
  6. In .the dialog box that appears, select the Sort option if you want to sort the records. You can also click the Summary options button in case you want Ms Access to perform calculations on numerical fields. In summary options dialog box, select the Summary options you want performed e.g. Sum, Average etc. as shown in Figure 3.27. Click OK to close the summary options dialog box then Next.
  7. From the layout dialog box, select the type of layout such as stepped, block etc. Select page orientation i.e. either portrait or landscape then click Next.
  8. In style dialog box, specify the report style by selecting either bold, casual etc.
  9. Finally enter the name of your report then click finish. The report will be displayed on the screen in print preview mode.

 

Creating a report in design view

Just like with forms, you can create a report in design view by placing controls on the report design grid.

 

To design a report in design view:

 

.’

  1. In the database window, click the Reports tab then New.
  2. In the New Report dialog box, click Design view.
  3. Click the name of the table or query you want to generate a report from.
  4. Click the OK button. You will get a report design grid where you can place data controls.
  5. From the view menu, click Field List.
  6. To design the layout, drag each field from the field list to the layout grid and drop it where you want the data column to appear.
  7. Once you finish placing controls, click the Save button.
  8. In the save as dialog box, enter the name of the report and click OK.
  9. To view the report, click the Print Preview button. Alternatively, click Print Preview from the file menu.

 

Modifying a report layout

To modify headers and footers:

  1. Open the report in design view.
  2. Click the report header or footer you want to modify.
  3. Make the necessary changes and then click the Save button.
  4. Click the Print Preview button to view the changes.

 

To add more controls onto the report layout:

  1. Open a report in design view.
  2. Display the field list by clicking the Field list button or using the View.
  3. Select one or more fields in the field list and drag view to the Report design grid.

 

To resize or move a control:

  1. Click at once to select it. Position the mouse pointer to on the place holder, until the mouse pointer changes to a double-sided arrow. Drag the pointer to resize the control
  2. To move a control, select it and place the mouse pointer on the place holder until it changes to a hand.

 

Creating labels

A label is a sticker or piece of paper put on an item for the purpose of identification. Examples of stickers are mailing labels, label on the floppy disk where you write your name etc. Using the report label wizard, Microsoft Access lets you easily create labels of different sizes.

To create a label using the report wizard,

  1. Open the your database
  2. From the database window, click the Report tab then New
  3. From the New Report dialog box, select Label Wizard the table or query from which the labels are to be generated from.
  4. Label wizard starts running as shown in Figure 3.28.
  5. From a series of dialog boxes displayed, specify the label size, font, and fields to be included in the label, whether to sort the labels, the name of the label then click Finish.

 

Modifying labels

Just as you can modify a report or a form, you can also modify a label by manipulating the layout controls.

To modify a label,

  1. From your database window, click the Report tab then the Design View button.
  2. The label design grid is displayed. Edit the layout as desired, save and close the design grid.
  3. To view the modified label, click the Preview button from the database window.

 

Printing the report and labels

Before you print a report or a label, you should first set the page options i.e. the margins, paper size and orientation.

  1. Open the database that contains the report you want to print.
  2. Click the Report tab, select the report you want to print then click the Preview button.
  3. From the File menu, click Print.
  4. Set the printer options i.e. the printer type, print range and number of copies.
  5. Click OK to print.

 

 

DESKTOP PUBLISHING (DTP)

 

Chapter outline

 

4.1 Introduction.

4.2 Definition of desktop publishing.

4.3 Purpose of desktop publishing.

4.4 Types of desktop publishing software.

4.5 Designing a publication.

4.6 Manipulating text using the toolbox

4.7 Editing a publication.

4.8 Formatting a publication.

4.9 Printing a publication.

 

Introduction

Have you ever asked yourself how newspaper and book publishing companies manage to produce publications that are attractive with creative layouts and graphics in large volumes? They do this through a special process called publishing. Publishing is the process of producing publications like newspapers, cards, pamphlets, pictures, calendars etc. that have special text and graphical layouts and designs. The traditional method of publishing involved drawing and writing manually on wooden or metallic boards. The artwork would then be painted with ink and pressed on papers to produce a printout. This was a very tedious work.

 

Today the art of publishing has changed because of the advent of personal computers and smaller printers that are able to print high quality text and graphics even in an office or at home.

 

Definition of desktop publishing (DTP)

Desktop publishing refers to the process of producing publications like cards, newspapers etc. by designing their text and graphics layout and inserting, editing, formatting and printing of text and graphical objects using a special desktop publishing software installed on computers. The term desktop means that all the publishing processes can now be done on a desk in the office or at home using a personal computer! The difference between a desktop publisher and a word processor is that a desktop publisher software gives the user more tools and control of the page layout, text manipulation and graphic design than a word processor.

 

However it is important to note that some word processors today have also been incorporated with text and graphic formatting and editing tools. Hence a thin line exists between them and the desktop publishers. For example you can design a full publication in Microsoft Word by using the available drawing and picture tools, create columns etc.

 

Examples of desktop publishers include Adobe PageMaker, CorelDraw, Microsoft Publisher and Ventura. This book will use Adobe PageMaker to demonstrate the concepts of desktop publishing.

 

Purpose of desktop publishing software

Desktop Publishing programs are very popular in publishing because they give the person designing publications (typesetter) a lot of control on:

Graphic design: Using desktop publishing software, a typesetter can create and edit very complex text and graphical objects like pictures to the finest details. For example, the software provides the user with rulers and ruler guides that can be used to place an object in exactly the correct position.

Page layout design: With a desktop publisher, the user can be able to design a page layout by setting consistent picture and object locations, dividing a page in a number of columns and creating layers. A layer can be viewed as the arrangement of objects on top of each other with the one on top being on the first layer e.g. text can be on one layer while graphical objects on another. Therefore the text layer can be manipulated separate from the graphical object layer like for example text moves separate from the objects. Another good example is you can make the graphical object layer transparent in order to make the text in a layer behind the object visible.

Printing: Because the main purpose of any desktop publisher is to produce publication s, this cannot be accomplished without printing. Desktop publishing software therefore helps the user prepare what is referred to as an artwork in commercial circles for printing.

 

Types of desktop publishing software

There are two main types of desktop publishing software:

Graphical based: They are specifically developed to edit and format graphic objects like pictures. Examples are Adobe Photoshop, Corel Draw, harvard graphic etc. This desktop publishers have superior image handling capabilities like setting resolution, brightness, contrast, cropping and filling images of all types with colour.

 

Layout based: These types of desktop publishers are specifically developed to create different page layout designs for text and pictures. Have you ever wondered how the complicated front page of a newspaper is developed? It is difficult to achieve such without a good layout based DTP. Good examples of layout based desktop publishers are Adobe PageMaker and Microsoft Publisher.

 

Designing a publication

Publications vary in design and formatting. For example, a card has a particular design layout that is different from a newspaper. Therefore, publication designs determine how they are classified.

 

Types of publications

It is possible to produce different types of publications using a desktop publishing software. There are several types of publications that can be published namely:

Cards: These may be for weddings and other special occasions like graduations and for congratulations.

Certificates: To show completion of courses and special events. These type of publications are very sensitive because they must be designed to discourage any type of duplication or counterfeits.

Newspapers, magazines, pamphlets and newsletters: Have news targeting a group of people. They may have many text and graphical layouts and designs.

Books: Are bulky publications with many pages bound together in the same publication.

Calendars: Apart from showing dates, they are used by companies to advertise their products hence most of them have heavy catchy graphics.

 

Running Adobe PageMaker

Currently PageMaker versions 6.5 and 7.0 are the most common desktop publishing software developed by Adobe PageMaker. Other Adobe products includes Adobe Photoshop mainly used for editing and formatting photographs, Adobe illustrator used for creating complex freehand artwork such as drawings and logos etc.

 

Starting Adobe PageMaker

  1. Click the Start button and then point to Programs
  2. From the programs sidekick menu, point to Adobe group then select PageMaker. Figure 4.1 shows how to start PageMaker in a typical Windows environment.
  3. The PageMaker program starts and provides the Document Setup dialog box. If the Document setup dialog box is not displayed, then click File menu and select the New command.
  4. In the Document Setup dialog box similar to the one in Figure 4.5 specify the publication setup options.
  5. Click OK to apply the selected options. A publication window similar to the one in Figure 4.2 is now displayed.

 

PageMaker screen layout                                                       .

The PageMaker application window looks like most application windows for programs you have used before. It also has a title bar, menu bar and scroll bars. However, you will note that unlike most of the Microsoft applications you have used before, Adobe PageMaker does not have a status bar on its application window. The most notable difference between a desktop publishing software such as PageMaker and a word-processing software such as Microsoft Word is that a desktop publishing software

 

has its printable work area centered on a pasteboard as shown in Figure 4.2.

The PageMaker publication window is made up of the following layout components:

 

  1. The pasteboard. 3. The toolbox. 5. Rulers

 

  1. The printable area. 4. Master pages.
  2. Control pallete.

 

The pasteboard

A pasteboard is a large blank area where you place text and graphical objects before arranging them neatly on the printable work area enclosed with margins.

 

The printable area

It is the area that looks like a page surrounded by margins on the pasteboard. Any object or text that is placed on the printable area will be printed by the printer.

 

The Toolbox.

This is a set of buttons that contains various tools you can use to create and manipulate your publication it has the following tools

 

Line tool

Rectangle tool

Ellipse tool

Polygon tool

Hand tool

Pointer tool

Rotate tool

Text tool

Cropping tool

Constrained tool

Rectangle frame tool

Ellipse frame tool

Polygon frame tool

Zoom tool

 

The function of each tool can be summarised as follows:

 

 

Tool

 

Purpose

 

Pointer

 

Select, move, and resize text blocks and graphical

objects

Text

 

Type, select, and edit text.

 

Rotating Select and rotate objects.

 

Cropping

 

Crop i.e. trim imported graphics
Line Draw straight lines in any direction
Constrained line Draw vertical or horizontal lines.
Rectangle

 

Draw squares and rectangles.
Rectangle frame

 

Create a rectangular placeholder for text and Graphics.
Ellipse Draw ellipses and circles
Ellipse frame Create a circular or oval place holders for text and graphics
Polygon Draw basic polygons such as triangles, pentagons, stars etc
Polygon frame Create polygonal place holders for text and graphics
Hand Scroll the page or to preview and test hyperlinks
Zoom Magnify or reduce the area of the page

 

Master pages icons

At the bottom of the publication window is a bar that holds icons representing each page in the publication. These icons are called page thumbnails. To move to a page, just click its thumbnail. When you click the master page thumbnail(s), the master page(s) are displayed. A master page is used to design the general layout that needs to be applied in all other pages of the publication. (Figure 4.4)

 

Rulers

Each publication window can include horizontal and vertical rulers. They extend along the top and left borders of the window. You can display rulers when you need them and hide them when you want more room on the screen to view a publication. The rulers must be visible to help the user to manually create ruler guides, which are nonprinting extensions of the ruler as well as measure an object size.

 

Control pallete

It is a shortcut toolbar mainly having text and paragraph formatting command icons.

 

Setting up a publication

Sometimes, it is necessary to change the setup options of a publication e.g. page size, margins, orientation etc.

 

To change publication’s setup:

  1. From File menu, click Document Setup. A dialog box such as the one shown in Figure 4.5 appears.
  2. Select the following page set up options:

(a) In the Page size list box, select the appropriate size. When you select a page size, its dimensions appear in the Dimensions text boxes. Alternatively select custom size then use the dimensions text box to specify a custom page size of up to 1065 by 1065 mm.

(b) Select page orientation by either clicking Tall for portrait or Wide for landscape orientation.

(c) Click Double-sided to set inside and outside margins to accommodate binding on pages that will be printed on two sides.

(d) Click Facing pages if you want left and right pages displayed   together as a two-page spread on the screen.

(e) Enter the number of pages you initially plan for-the publication.

(f) Click OK to effect the changes.

 

Setting up a publication using master pages

If you are creating a publication that will have several pages such as a book or a project report, it is important that you layout a common layout foundation for all pages for the sake of consistency and cohesiveness. These pages used to design a common layout to be applied in the other pages of the publication are called master pages or a document master.            You can create, modify, and delete objects on master pages just like any other objects, but you must do so from the master pages themselves.

 

The document master applies to all pages in the publication until you’ specify otherwise, and cannot be renamed or removed from the publication. To switch to master pages, simply click the master page icon(s) then:

  1. Place non-printing ruler guides on the master pages to help you place text and graphics accurately and consistently throughout your publication. Non-printing ruler guides are vertical or horizontal lines

. you place on printable area. You place the guides by positioning. the mouse pointer on the ruler then dragging the guide to the required position.

  1. Create basic design elements on the master pages, including text and graphics that you want to appear on each page in your publication.

 

Setting up margin guides

Margin guides are very important because they define the printable area of your publication.

 

To change margin settings;

  1. From File menu, click Document Setup
  2. In the Setup dialog box

(a) For a double sided document enter the values for inside and outside margins to accommodate binding for a document that will be printed on both sides. For Single sided pages, set the left and right margins.

(b) Enter the value for the Top and Bottom margins.

  1. Click OK to close the setup-dialog box and effect the changes.

 

Saving the layout

Once you complete setting up your publication layout, it is important you save it before you start entering text and graphics.

To save the layout:

  1. To save the publication for the first time, from the File menu, click Save As or click the Save button on the toolbar.
  2. In the Save As dialog box, specify the name of the file and the storage location of your publication then click Save button
  3. To save changes made to a publication, from the File menu, click Save.

 

Displaying and hiding rulers

If the rulers are not displayed, click the View menu, then Show rulers to display them. To hide the rulers, click the View menu then Hide rulers.

 

Selecting ruler measurement units

It is possible to set different measurements on both rulers. For example, you can set the vertical rule in millimetres and the horizontal in inches. Therefore if you want to use common units, you must set each ruler measurement independently.

 

To set the measurement units,

  1. Right click a ruler separately. A drop down list displays available measurement systems that is inches, decimal, millimeters, picas and Ciceros as shown in Figure 4.6 below. If you are not familiar with some of these units, it is advisable you use millimeters.
  2. Select the measurement system option you want to use.

 

Manipulating text using the toolbox

 

Manipulating text

 

Using text tool

To create a text block with the text tool:

  1. Click the text tool from the toolbox. The pointer turns into an I-beam.
  2. On an empty area of the page or pasteboard click or drag a rectangular area to define a text block or frame. If you click without dragging, a text block the width of the column or page will be created. It is the text frame that defines the space you want the text to occupy. The borders of a text block remain invisible until you click the text with the pointer tool.
  3. Type the text you want.

 

Using text frame

You can create text by using a frame tool or by converting any object you have created with the drawing tools except a line into a frame. Text frames do not change height or width as you add or remove text.

 

To add text into a frame:

  1. Draw a frame using any of the frame tools that defines the shape you want the text block to take. Alternatively select a drawn shape, from Elements menu, point to Frame then click Change to Frame.
  2. Do one of the following:

(a) Click the text tool, click in the frame, and then type or paste text from the clipboard

(b) From the File menu click Place, double-click the file that contains the text you want to place in the text frame. When the cursor becomes a loaded icon, click inside the text frame to place the text.

 

You can also add text into a text frame by:

  1. Selecting a text block, hold down Shift, and then select an empty frame.
  2. From the Element menu, point to Frame and click Attach Content. The text flows into the frame and the text block disappears.

 

Manipulating graphical objects using the toolbox

The toolbox has several graphic drawing tools. For example, the polygon tool helps a person to draw polygons and the ellipse tool is used for drawing circular objects. All these tools enables a person to apply stroke and fill patterns. For more complex graphics, PageMaker allows a person to import pictures from other applications and to place them in the publication. A stroke refers to a line style while a fill refers to applying patterns such as shading. Figures 4.7 (a) and 4.7(b) shows examples of fill and stroke respectively applied to simple rectangular graphical objects drawn using the polygon tool.

 

Applying stroke and fill

Once you create a graphical object, you can enhance it by applying stroke and fill. To apply stroke or fill:

  1. Select the object you want to apply stroke or Fill.
  2. From the element menu either point to stroke to apply a line style or fill to fill the object with a background colour or pattern. Alternatively, click the fill and stroke command to set the fill and stroke options in the dialog box as shown in Figure 4.8.

 

Moving and resizing text and graphical objects

Once you create text and graphical objects, you can adjust the size, shape, or location of an object.

To move a text or graphical object:

  1. Click the object to select it then position the pointer tool anywhere inside the text or object.
  2. Drag the text or object to a new position.

 

To resize text or object:

  1. Select the text or object with the pointer tool. Selection handles are displayed at the comers of the text block or the object. 2. Position the pointer on the selection handle and drag to the required size.

 

Editing a publication

The term edit means making changes to a publication. In most cases, editing would include the process of correcting spelling mistakes, replacing words etc.

 

You can search for specific occurrences of a word or group of words in your publication and make the necessary changes. PageMaker comes with two special editing tools namely the Find and Change tool and the Spelling tool.

 

Before editing the publication, you must open it in the story window. PageMaker defines each text block as a story. Once text is in PageMaker, it is part of a story. A story is a text block that PageMaker recognizes as a single unit. A story can be one letter or several hundred pages of text, and can be contained in a single text object or threaded through many different ones.

 

Find and change tool

This editing tool helps a person to search for a particular word or a phrase and replace it with another one. To find and change a word and or a phrase in the publication:

  1. Using the text tool, click an insertion point in a story, or select a range of text if you want to limit your search to that section.
  2. Click Edit menu then select Edit story command. The publication now opens in the story window showing only the text but not the graphical objects.’
  3. Click Utilities then Find or Change. A dialog box such as the one shown in Figure 4.9 is displayed.

4 In the Find What text box, type or paste the text you want to find. To change the text, type new text in the Change To text box. To search for formatting only, leave the text boxes blank.

  1. Select Match Case and Whole Word as appropriate.
  2. In the dialog box, specify the formatting to search for and, if appropriate, how you want to change it, and click OK
  3. Select options to determine the scope of the search e.g. in all open publications or only the current one. If you search the current publication only, select Search Story option.
  4. Click Find to begin the search.
  5. Click Find Next to continue with the search operation
  6. Once you are through, click Story menu then Close Story. Alternatively press Ctrl+W.

Spell checking

To check spelling in one or more publications:

  1. Click the insertion pointer anywhere in the publication or select the range to be spell checked.
  2. From the Story Editor menu, choose Utilities then Spelling. A dialog box as shown in Figure 4.10 appears.
  3. Specify the scope of the search either as:

(a) In selected text.

(b) In the current story only.

(c) In all stories in the publication.

  1. Specify spell checking options:

(a) Checking alternate spellings lets you see suggested replacements for misspelled words.

(b) Checked show duplicates displays/repeated words.

  1. Click the start button and spell checking begins.

 

Formatting a publication

This refers to applying special attributes to text, graphical objects and pages in order to make them attractive and appealing to the eye. Therefore, formatting may include things like font sizing, bolding, changing text colour, adjusting picture brightness and contrast and formatting columns on the page.

 

Text and paragraph formatting

To format your publication, you can either use commands available in the Type menu or a control palette. The Control palette is a strip that contains command buttons and list boxes that let you assign attributes to text and graphical objects:

 

To display the control palette

From Window menu, click show control pallet The Control palette appears floating on top of your publication (Figure 4.11). You can move it by dragging the bar at the left edge of the palette.

The contents of the Control pallete  vary. Depending on which tool is selected from the toolbar or from itself. The two types of control palettes are the object mode and text mode. The text mo e can be selected by clicking the Character view or paragraph view button. There are two types of text modes namely;

  1. The character view that is, when the T tool on the pallete is selected. This means that you can apply character attributes to selected text. Character attributes determine how text looks on the page. such as font type, size, or style (bold, italic or regular).
  2. The paragraph view that is, when you select a paragraph and you click the button below the T on the control palette (labelled M) in Figure 4.11. Figure 4.12 is displayed. You can apply paragraph styles, select alignment options, and other paragraph attributes.

In object view i,e. when a graphical object is selected, it lets you apply attributes related to the object such as rotating, moving, resizing etc.

 

To format text:

  1. Using the text tool, select the text you want to format.
  2. From the Type menu of the Control palette, choose the formatting attribute you want.

 

To format several text attributes at once

  1. With the text tool, select the text you want to format.
  2. From the type menu, click character command
  3. In the Character Specifications dialog box select text attributes such as font, size, type, colour, position (normal, subscript, superscript etc.) then click ok

The simplest way to format text attributes is by using the control palette. In character view the control palette has the following main formatting sections

 

  1. Font list box and style buttons
  2. Font size and leading list box
  3. Tracking and Horizontal scale

 

Changing text colour

  1. Select the text.
  2. From Window menu choose Show Colors.
  3. In the colors dialog box, click the Colors tab.
  4. Select the colour you wish and it will apply on the selected text.

 

Changing case

As with Microsoft Word you can also change text case to upper or lower case, sentence case e.t.c.

To change case:

1 Select the text you want to change case.

2 Click Utilities menu, point to Plug-ins, and then click Change case. Change case dialog box will be displayed as in Figure 4.1

3 Select the case you want

  1. Click Apply to preview the change
  2. Click OK to close the dialog box.

 

Formatting text to superscript and subscript

Superscript refers to text that is positioned slightly higher than the rest on the same line e.g. the power of 3 in 103 while subscript refers to text slightly below the same line such as the number 2 in H2O. To format text to superscript or subscript;

1     Select the text you want to style as superscript or subscript.

2     From Type menu, click Character and the dialog box in Figure 4.14 appears.

  1. In the Character dialog box, select either superscript or subscript from Position list box as shown then click OK.

To remove superscript or subscript format:

  1. Repeat step 1 and 2 above
  2. In the character dialog box, select Normal from Position list box, and then click OK

 

Drop cap

D

rop cap refers to text formatting where the first character in a line is bigger and drops down to occupy the space in the next lines as shown by the first letter D in this paragraph.

 

To apply drop cap:

  1. Select the character you want to drop
  2. Click Utilities menu, point to Plug-ins, and then click Drop cap.
  3. Specify the number of lines you want the character to occupy in the Size box as shown in Figure 4.15.
  4. Click Apply to preview the format and then OK to close the dialog box.

Paragraph formatting

You can use either the Control palette to format a paragraph or Paragraph command from the Type menu. However the later lets you apply formatting that is not available on the Control palette.

 

Setting indents and tabs

Indents and tabs are powerful tools for positioning text. Indents move text inward from the right and left edges of a margin while tabs position text at specific positions. You can set indents by moving the indent markers in the Indents/Tabs ruler, typing indent values in the Paragraph dialog box or type indent values on the Control palette in paragraph View.

 

To set tabs using the Indents/Tabs ruler:

  1. Select the paragraph or paragraphs you want to indent.
  2. From Type menu, click Indents/Tabs.
  3. On the Tab ruler, click a tab-alignment icon (left, right, center, or decimal) for the first tab you want to set. See Figure 4.16.
  4. Drag the new tab marker along the ruler
  5. If you want the tab leader, click the Leader button then choose the type of leader you want.

To set indent using the Control palette:

  1. Select a paragraph or paragraphs you want to indent.
  2. On the Control palette, click the paragraph-view button.
  3. Type values for the indents in the Indent text box then press the Enter key.

 

To set an indent using the Paragraph command:

  1. Click an insertion point in a paragraph, or select a group of paragraphs.
  2. From Type menu, select Paragraph.
  3. Type values for the Indents options, and then Click OK.

 

Adding space above or below paragraphs

You can control the vertical space between paragraphs by specifying the amount of space before or after selected paragraphs or all paragraphs of a certain style.

NB: PageMaker never inserts space before a paragraph set to begin at the top of a column or page (using the Page Break Before or Column Break Before attribute). For those cases you must add the extra space manually by typing one or more paragraph returns.

 

To increase or decrease space before or after a paragraph:

  1. Select the paragraph you want to edit.
  2. Choose Type then Paragraph.
  3. In the paragraph Space options, specify the values you want in the Before and After text boxes.

 

Page formatting

This refers to formatting the whole page and may include things like column guides.

 

Columns guides

Column guides helps you divide the pages into columns that make the publication look more organized. The idea is to divide a large page into short readable sentence sections. Imagine if a newspaper page was not divided into columns! Therefore columns are mostly used in designing large publications, newspapers and journals. The difference between column guides and margin guides is that margin guides are around the edges of the printable page while column guides may split the page at the center. PageMaker. marks margins with a blue line but column guides with pink coloured lines.

 

To setup more columns:

  1. Turn to the publication page or master page
  2. From Layout menu, choose Column Guides. You can setup column guides separately in a double sided facing pages by clicking Set left and right pages separately check box as shown in Figure 4.17.
  3. Enter the number of columns you want on the page and the space you want between columns. If you are setting left and right pages separately, enter values for both pages.

4Select Adjust Layout if you want existing text and objects on the page to adjust to the revised column setup.

  1. Click OK.

 

Moving and locking columns

You can move the column guides by dragging them. The two lines forming the gutter between columns move in pairs and the space between the two lines remains consistent. Text and graphics already on the page are not affected when you drag column guides. Once you have set up your columns, you can lock them in place to prevent accidental moving.

 

To lock or unlock column and ruler guides:

From View menu, click Lock Guides.

Page numbering

To print page numbers in a publication, you must set the page numbers in the master pages. You do this by adding a page-number marker (a special character) that keeps track of the page order in the publication and ensures that each page is numbered correctly at all times.

 

To add page-number markers to master pages:

  1. Click the master page(s) icon
  2. Click where you want the page number to be placed.
  3. Press Ctrl + AIt +P. Page-number markers appear as RM (right master) or LM (left master) on the master pages but actual page numbers are displayed on each page of your document.

 

Changing page number style

By default, PageMaker applies the Arabic page numbering style ie 1,2,3,…..

 

To change the style:

  1. From File menu click Document Setup.
  2. In the Page setup dialog box, click Numbers.
  3. Select the numbering style you want to use then click OK to close the Page Numbering dialog box.
  4. To start page numbering from another number other than the default

one ( which is usually 1), type the starting page number in Start

Page # box in the Document setup dialog box.

 

Rearranging pages

In PageMaker, you can change the order of your pages by rearranging page thumbnails (icons at the bottom of the window that represent pages). Changing the order of pages does not affect the text objects in your publication even though they may have moved to different pages.

 

Sorting pages

  1. From Layout menu, click Sort Pages.
  2. Select the page or pages you want to move either a single-sided page or a pair of facing pages. To select one page in a pair of facing pages, press Ctrl and click the page.
  3. Drag the selection to the location you want. To insert a selection between a pair of facing pages, press the Ctrl key and drag the selection over the facing pages. Notice that a black bar indicates where the selected pages will be inserted.
  4. Release the mouse button to drop the page onto the new position. PageMaker automatically renumbers the pages. The original page icon appears dimmed and another page icon appears beside the thumbnail to indicate its new page number.
  5. Click ok to change the page order.

 

Inserting page and column breaks

Sometimes you may want certain text or paragraphs such as a new chapter to start at the top of a column or page regardless of editing or reformatting elsewhere in the document.

 

To set a page or column break:

.

  1. Select the paragraph or text you want to move to another column or page.
  2. From type menu, select paragraph to display the paragraph specifications dialog box.
  3. Check Column Break Before to force the paragraph to start at the top of the next available column or page break before as shown in Figure 4.19 to force the paragraph to start at the top of the next available page.

Adding headers and footers to a publication

A header refers to a line of text such as a page number, date, or a company name usually printed on the top margin of each page in a large document.

 

A footer on the other hand is a line of text printed in the bottom margin.

 

You can use the same header and footer throughout or use running headers and footers that indicates the content of each page as is the case in dictionaries, telephone and address directories.

 

Defining consistent headers and footers

To define header or footer common throughout the publication

  1. Click the master page(s) icon
  2. At the top of the page, click where you want header to appear or at the bottom click where you want the footer/header to be placed.
  3. Type the text that you want displayed on every page in your publication.

 

Defining Running headers and footers

1 Select the text block you want to use to create running headers and footers using the pointer tool.

2 Click Utilities, point to Plug-ins and then select Running Headers and Footers. A dialog box such as the one shown in Figure 4.20 is displayed with preview page that helps you correctly position the header or footer.

  1. Click the place icon and drag the header/footer place holder onto the text page.
  2. From content list box, select the words that will be used as headers or footers on every page e.g. the first word in the first paragraph then click Add. You can click the Preview button to preview the running headers and footers
  3. Click ok

 

Tracking and Kerning

Tracking refers to changing the visual denseness or openness of characters in a line while kerning is fixing particular pairs of letters that are too close or too far apart from each other such as To, Ta, We, we, Wo etc.

 

To apply a track:

  1. Select the text you want to track.
  2. From Type menu, choose Expert Tracking.
  3. Choose one of the five tracks options i.e. No Track, Loose, Tight or Very Tight as shown in Figure 4.21.

 

Very loose,

 

To automatically kern a pair of characters:

  1. Select the text you want to kern.
  2. From Type menu, click Expert Kerning
  3. In the dialog box such the one shown in Figure 4.22, click the appropriate slider button to make the text either tighter or looser.
  4. Click OK to apply the expert kerning.

 

To set a word or letter spacing:

  1. Select one or more paragraphs.

2.From the Type menu, click Paragraph to display the dialog in Figure 4.23.

  1. In the Paragraph dialog box, click Spacing to display Spacing dialog box.

4.In the Word Space or Letter Space text box, type new values.

  1. Click OK.

 

Measurements

 

Using rulers to measure objects

When using Page Maker, you can be able to design page layouts and graphics that are exact in measurement as specified using the horizontal and vertical rulers. The idea is to drag ruler guides to mark an area of the screen where you want to insert graphics or text that can fit in the guides.

For example, to draw a rectangle of 5cm by 5cm, set the rulers to measure in millimeters then drag and place ruler guides from the horizontal and vertical rulers to create a 5 x 5cm region on the screen. Finally, select the polygon tool and drag a polygon that fits exactly inside the marked region as shown in Figure 4.24.

 

Formatting graphical objects

Using the PageMaker tools and formatting effects, you can create very complex graphical objects.

Changing fill and stroke of graphics

To change fill or stroke of an object:

  1. Select the object by clicking it.
  2. From Element menu click Fill and Stroke.
  3. Select the type of fill or stroke you want.
  4. Select colors for the fill and stroke.

To apply fill:

  1. Select the object
  2. From Element menu, point to Fill then select the fill pattern you want to apply.

To apply stroke:

  1. Select the object
  2. From Element menu, point to Stroke then select the line style you want to apply.

 

Reshaping objects

To apply rounded comers to rectangles and squares:

  1. Select the rectangle or square you want to change comers
  2. From Element menu, choose Rounded Corners.
  3. Select the comer style you want, and then click OK. Figure 4.25 shows one rectangle without and another with rounded corners.

 

Reshaping a polygon

Once you draw a polygon, you can change it from the default rectangle or square to triangles, pentagons, hexagons and even a star.

To reshape a polygon:

  1. Select the polygon you want to reshape.
  2. Double click the selected polygon. PageMaker displays reshape placeholders.
  3. Reshape the polygon by dragging the vertices place holders.

 

To set the number of sides or create a star object:

  1. Select a polygon you want to reshape,
  2. From Element menu click Polygon Settings,
  3. In the Polygon settings dialog box, specify the number of sides you want, from three to a hundred.
  4. To create a star, enter a value in the Star inset box. A value of 0% means no star while 100% represents a star whose vertices meet at the centre.
  5. Click OK.

Copying an object:

  1. Select one or more objects.
  2. From Edit menu, choose Copy.
  3. Position the insertion pointer where you want to place the object.
  4. From Edit menu, select paste.

 

NB: You can quickly copy an object by right clicking it then selecting the copy command on the shortcut menu then paste in a new location. Alternatively, select the object then press Ctr+C to copy and Ctrl +V to paste in a new place.

 

 

Wrapping text around a graphical object

One of the best ways to enhance a publications visual impact is to wrap text around graphical objects. Wrapping determines how text behaves around an object. For example, you can select a wrap that makes text to surround an object without displacing it as shown in Figure 4.27(a).

 

To wrap text around an object:

  1. Select the object.
  2. From Element menu, choose Text Wrap to display the dialog box in

Figure 4.27(b).

 

  1. Click the middle wrap option as shown in Figure 4.27 (b)
  2. Specify a Text Flow option. The leftmost icon makes the text jump the object to the next page or column, while the middle icon allows text to jump over the object and continue on the same page. The rightmost icon creates a rectangular text wrap around all sides of an object.
  3. Enter standoff value (distance of the text from each side of the graphic) for the boundary.
  4. Click OK and notice how the text wraps around the object.

 

Importing graphics

You can import a graphic or text directly from another file or application by using a process called placing in PageMaker. In most cases, graphic files will be created in graphical based desktop publishers or picture editing software then imported into PageMaker. PageMaker has a very powerful object import engine that can be activated by the Place command.

 

The Place command is the main importing method. When you place text or a graphic, PageMaker establishes a link to the source file on the storage device (unless the file is an HTML document).

To import a graphic:

  1. Click the pointer tool. Select the frame in which you want to place the graphic. If you do not wish to place it in a frame then ignore this step.
  2. From File menu choose Place.
  3. Select the file you want to place, and then click the Open button.
  4. The cursor changes to become a loaded icon. Clicking any place on the paste board will place the new graphic at the clicked location.

NB: If you place using text tool, then the graphic that will be placed will be an inline graphic contained within the text object and will behave like text. It will become hard to format it separately as an object.

 

Grouping and ungrouping objects

You can group several objects into one, especially if you want to format, resize or move them as a single entity.

 

To group objects:

  1. Using the pointer tool, hold down the shift key as you click the objects to be grouped. This selects multiple objects.
  2. From Element menu, choose Group or simply press Ctrl + G on the keyboard.
  3. To select an object within the group then press Ctrl as you click the object.

To ungroup objects:

1, Select the Group.

  1. From Element choose. Ungroup.

 

Locking objects

You can lock individual objects in place in order to help preserve the design of your pages through all stages of production. You can change the attributes of a locked object, provided the change does not affect the object’s size or position. For example, you can change a colour or fill applied to a locked object, but not its degree of rotation or its skewing angle.

 

To lock or unlock an object:

  1. Select the object.
  2. From Element choose Lock Position to lock. Otherwise select. Unlock to unlock a locked object.

 

Rotating an object

The process of rotating an object falls under a group of operations called transformations because rotation changes the angular placing of an object. Other transforming operations include skewing and reflect­ing objects. However, this book limits itself to rotating objects.

To rotate an object with the rotating tool:

  1. Select the object.
  2. Select the Rotation tool from the toolbox. The pointer changes and becomes a Star bust.
  3. Position the Starburst at a fixed point or around the centre of the object.
  4. Drag the starburst away from the fixed point, in the direction you want to rotate the object. To rotate an intervals of 45 degrees, press Shift as you drag clockwise or anticlockwise. The rotation lever helps you control the amount of rotation. The farther you drag the starburst away from the fixed point, the more control you’ll have when you rotate the object.
  5. When the object is in the desired position, release the mouse button.

 

Cropping an object

When you import a graphic from another program or publication, you can cut off unwanted parts of the graphic starting from the edges that you do not want to print by the crop place holders.

 

To crop a graphic using the cropping tool:

  1. Select the cropping tool, then the graphic that You want to crop to display the place holders.
  2. Position the cropping tool so that the place holder shows through the center of the tool.
  3. Hold down the mouse button to turn the cropping tool into a double sided arrow, and drag inwards until only the part of the graphic you want in your publication remains. To show more of the graphic, drag away from the center of the graphic.
  4. To move the graphic within its frame, position the cropping tool at the centre of the graphic and hold down the mouse button. (in Windows, hold down the left mouse button.
  5. When the hand appears, drag until you see the part you want to appear in your publication, then release the mouse button. .

 

Printing a publication

Because. the main purpose of any desktop publisher is to produce publications, it is impossible to do so without printing. The choice of a printer depends on the quality of hardcopy desired.

 

To print a publication:

  1. From File menu, click Print. A dialog box appears in which you can

specify the following:

(a) The printer that you wish to use.

(b) The range of print in the Ranges box if you do not wish to print whole document.

(c) Number of copies to print per page in the Number of copies box.

(d) Whether to print blank pages or not.

(e) The print orientation.

(f) Whether to print both pages.

2 Click Print to start printing.

 

 

 

INTERNET AND E-MAIL

 

Chapter outline

 

5.1 Introduction.

5.2 Definition of the internet.

5.3 Development of the internet.

5.4 Importance of the internet.

5.5 Internet connectivity requirement.

5.6 Internet services.

5.7 Accessing the internet.

5.8 Electronic mail.

5.9 Accessing information on emerging issues.

 

Introduction

Computers can be connected together using data transmission media like cables, to communicate with one another. Communication in this case will be in the form of exchange of data and information. Such interconnection of computers to achieve message transfer is called networking. This is because the computers are linked to form a net.

 

In most cases computer networks are unique to an organization. For example the computers in your computer laboratory may be networked. Such a network is local in nature hence it is usually called a local area network (LAN).

 

Definition of the Internet

The term Internet can be broken down into two words, inter and net which implies that there is an interconnection of networks. Internet is therefore a large network of networks that covers the whole world and enables millions of computers from different organizations and people

To communicate globally. Because of its large size and great volume of information that passes through it, it is sometimes called the information superhighway.

 

Because of the flexibility of Internet technology, many organizations are creating their own private networks using the technology of the Internet. In this book we shall refer to the Internet (with capital letter I) as the information superhighway and the internet (with lower case letter (i) to refer to smaller networks.

 

5.3

 

Development of the Internet

In 1969, a research body in the USA called Advanced Research Projects Agency (ARP ) set up a computer network that connected four universities and was given the name ARPAnet. This network is viewed as the forerunner of today’s Internet. The aim was to allow sharing of data and information between computers. The main benefit was that there was fast communication between researchers through electronic mail or e-mail.

ARPA’s goal was to allow multiple users to send and receive information at the same time. The network used a special data transmission technique called packet switching which was later adopted for the Internet. A computer would send a packet that contained data, destination address information, error detection control information and packet sequencing information. By 1973 e-mail was the most common service on the Internet. It was not until 1979 that the first media companies connected to the Internet.

 

By 1981, many people had seen the importance of computer networking and the Internet. ARPAnet formed the backbone on which many organizations started connecting to, hence expanding it. The American military also became a big user of the Internet because they could communicate and tap into the resources available on the net. Next, the American Government decided to access the Internet for commercial purposes hence greatly increasing the traffic. By this time, for every twenty days, a new host computer was connected to the net.

 

By 1987, the Internet boasted of 10 000 host computers. However, its access was largely limited to the United States of America and some nations in Europe. As the importance of the Internet grew, businesses spent billions of dollars to improve it in order to offer better services to their clients. Fierce competition arose among software and hardware manufacturers as they came up with new technology to meet internetworking needs. The result was a great increase in message transmission capacity (bandwidth) and it became cheaper to work with the Internet.

 

By 1994, 3 million computers were connected to the Internet. Today, the Internet has grown and covered the whole world. Governments, private organizations and individuals are using the Internet in all spheres of daily life to send messages and conduct business.

 

Importance of Internet

The Internet is an extensive system of interlinked yet independent networks. It has evolved from a specialised communication network previously only used for military and academic purposes to a public network that is changing the way people carry out their daily activities.

 

The Internet is playing a very important role in all aspects of life, leading to the emergence of an elite society called the information society. The Internet’s importance can be between through its contribution to research, news and information dissemination, leisure and communication, a place to do business and many other profitable activities.

 

Internet connectivity requirements

For a computer to be able to connect to the Internet, there are several requirements one of them is to connect to a telecommunication service provider in order to transmit data over a wide region. This section seeks to discuss some minimum requirements for Internet connectivity to be achieved.

 

Telecommunication facilities

The Internet heavily relies on telecommunication facilities like the telephone lines, telephone exchange stations and satellite transmission in order to cover the whole wide world. Indeed, without these facilities, the Internet is as good as dead.

 

Therefore, a computer is connected to the external world through a telephone line and has to dial a remote computer on the net to establish a connection for data transfer. Dial-up connections, however, are quickly being replaced by dedicated digital data transmission telephone lines called dedicated digital leased lines. A leased line connection ensures constant and quick connection to the Internet unlike the dial-up that you need to dial every time you need to access the Internet.

 

Transmission of data on land takes the form of telephone exchange to telephone exchange until the data reaches the destination. However, intercontinental transfer of data is achieved by having satellite base stations transmitting g the data through a wireless uplink channel to the satellite. The satellite then sends the data signal to the base station on another continent where it is picked up and sent to telephone exchanges

 

For transfer to the destination computer. Figure 5.1 shows a simple logical illustration of the Internet.

Modems

A computer needs a special digital to analog and vice versa interface card called a modem that enables it to send and receive data on telephone lines. Remember that voice transmission on telephone lines is analog in nature while computers work with digital data. However, digital telephone lines make it possible for computers to transmit and receive digital data without a modem.

 

The word modem is short form for modulator – demodulator. During modulation, the data to be transmitted is changed from digital to analog so that it can be transmitted on the telephone lines. At the receiving end, the data is changed from analog to digital for the computer to understand it through a process called demodulation.

 

In most cases a modem is bought separately and plugged in one of the expansion slots on the motherboard. Some modems are external hence the computer may be connected to them through a network interface card. Most computers today come with an internal modem permanently fixed on the motherboard called an onboard modem.

 

Internet service providers (ISP’s)

These are companies that offer internet services to end users. For example, in Kenya, until recently, the sole gateway to the Internet for a long time was Telkom’s Jambonet. However, because Jambonet cannot meet the service needs for all users in Kenya, they lease some of their stake to Internet service providers like Africaonline@ and Swiftkenya@ who can now provide Internet services to the end users at a fee.

Internet software

The Internet interconnects millions of computers and telecommunication devices that have different configurations for hardware and software. Therefore, to achieve communication between these otherwise incompatible devices, special software called protocol is needed. A protocol is a set of rules that governs how two computers can send and receive data on the network.

 

For the Internet, the most common protocol is the Transmission control

Protocol (TCP) and Internet protocol (IP). As its name suggests, TCP governs how data is transferred from one place to the next, while IP determines the addressing system on the Internet. For example, each network and computer on the Internet is recognised by a special number called the IP address that enables data to be sent and received by it. These two are combined to form the TCP/IP protocol suite that is needed by any computer that needs to be connected to the Internet.

Internet services

The Internet has become very popular in today’s world because of the diverse but very important services that it offers to people. It is “seductive” i.e. once a person connects to it they find themselves falling in love with its power to provide information and services. The temptation is to continue using the Internet again and again.

 

The World Wide Web (www)

The World Wide Web can be viewed as a vast virtual space on the Internet where information pages called websites are installed. Most local area networks have a special computer called a server that stores information and data for others on the same network to access. In order to connect a network to the internet, the local area network needs an Internet server. This server is usually given the name world wide web (www) and has all the information that others on the Internet access. Hence, www is created by a network of Internet servers!

 

To enable easier access to information and data on the Internet, a standard method of preparing documents to be put on the Internet was developed. This method uses a special language such as hypertext markup language (HTML) to prepare documents called web pages that are  attractive and can be accessed on the Internet. HTML can be combined with other web page production tools to achieve wonderful websites. Individuals and organizations establish sites where their web documents can be placed

 

2for easy access by the external world. Such sites are called websites and each has a special address called a uniform resource locator (URL) that can be used to access them. For example, one common URL address is:

http://www.yahoo.com

The first part (http) stands for hypertext transfer protocol which is a protocol that transfers hypertext. www is the name of the Internet server (web server) on which the webpage resides. yahoo.com is usually called the domain name of the local area network. It uniquely identifies a particular local area network. On the Internet, two networks may have the same web server name but never the same domain.

 

Electronic mail (e-mail)

This is the exchange of electronic letters, data and graphics on the Internet.

Electronic commerce (e-commerce)

Many companies are increasingly using the Internet to sell and buy goods and services. This new business strategy where goods and services are sold over the internet is called electronic commerce (e-commerce).

 

One advantage of e-commerce is that a company can access customers all over the world and is not limited by space and time. Hence, small companies that establish websites to auction their goods and services not only reduce operating costs but increase their sales. For example, most vehicle importers buy vehicles directly from international dealers by accessing their websites and placing orders.

 

However, the major challenges that face e-commerce are that people deal with each other without ever meeting physically and there is lack of proper laws to govern such business.

 

Electronic learning (e-Iearning)

Apart from the fact that academic materials for all levels of education are readily available on the Internet (web), the Internet has opened the door for those who would like to do distance education programs and home schooling. Learning through interaction with special programs on the computer is called electronic learning (e-Iearning).

 

Internet fax

The Internet provides you with complete fax facilities from your computer. You can configure fax settings, send and receive faxes, track and monitor fax activity, and access archived faxes. Using fax, you can choose to send and receive faxes with a local fax device attached to your computer, or with a remote fax device connected to fax resources located on a network.

 

Other Internet services

  1. News media on the net. All major media houses post their daily news on the Internet for their clientele to access. Hence information about an event can be sent right round the globe within a very short time.
  2. Health information on the net. The Internet provides latest medical news and research findings for practitioners and scholars.
  3. Music and entertainment on the net. It is possible to listen to music on the web and to watch video clips if your computer is a multimedia machine.
  4. Chatting on the net. People can sign into a chat room and exchange ideas freely through discussion. Chat rooms are a common feature and usually put together people of common interest to exchange ideas. For example, if you sign into a chartroom for politics, then you can exchange political views with otherwise unknown Internet friends who can read your typed comments as you view theirs. Try accessing www. Try. Com to see listings of chat topics that you can participate in on-line. However, you need to be careful in selecting the people to chat with on the web because some people who use the chat rooms have intentions of harming others.

Accessing the Internet

There are many applications that enable a person to access the Internet. Such applications are called web browsers. Some of them have text interface while the most popular have graphical user interface. Perhaps, the most common browsers in the world today are Netscape Navigator and Internet Explorer.

 

Therefore before accessing the Internet, a person must start the browser software. This book will use Internet Explorer for demonstration,

  1. The back button returns the browser to the immediate former webpage.
  2. The next button moves the browser to the next web page in case a person had clicked the back button.
  3. The stop button tells the browser to stop searching/loading a website.
  4. The refresh button tells the browser to try accessing a web site address again after failure
  5. The search button enables a person to search for words on the website.
  6. Clicking the favorites button displays all web addresses in the’ favorites” folder.
  7. The history button displays the website addresses that were visited in the recent past.
  8. The mail button enables a person to view and send mail and WebPages to links.
  9. The print button enables a person to print the web pages.
  10. The Go button tells the browser to load the current web page whose address is in the address bar.
  11. The address bar allows the user to type the address of a website to be accessed.
  12. The home button moves the user to the first page of the website.

 

Log in/sign in

To access a website, type the full address of the website in the address bar then press the Enter key on the keyboard. If the Internet connection is working properly, the browser will start connecting to the requested web site or URL. Notice that the status bar will be reading something like “connecting to site www.yahoo.com “

 

Some web sites allow free access to all their pages by all visitors. However, others require people to be members hence a new visitor has to register (sign up) by filling some on-line forms. The registration process gives the visitor a user name and password that can be used to sign in or log on the website for each successive visit. This is very common for e-mail account providers like at www.mail.yahoo.com.

 

Websites that give users a chance to log in are better especially if the services offered need some degree of privacy and customizing for

Individual customers e.g. it would be a gross mistake to have everybody accessing the other’s e-mail account.

 

Surf/browse

Surfing or browsing is the process of accessing Internet resources like web pages and websites. This is done by either typing the URL address of a site in the address bar of the browser or by following special links that lead to web pages called hyperlinks.

 

Hyperlinks and search engines

A hyperlink is a text or picture on an electronic document, especially web page that causes other web pages to open when the link is clicked. A hyperlink can be identified by the fact that the mouse pointer changes to look like a palm having four folded fingers with the index finger not folded but pointing outwards.

 

The Internet is a big forest of web pages and websites. Searching for particular materials or resources can be a nightmare because of the massive volumes of available documents and resources. To make the work a bit easy, special websites that maintain lists of hyperlinks are available. These websites are called search engines. They have special programs called robots or spiders that traverse the web from one hyperlink to the next and when they find new material, they add them to their indexes or databases. Figure 5.4 below shows one of the most common search engines called Google found at www.google.com

The user searches for a word by typing a few key words in the search field of the engine then clicking the search button. The engine searches its database for links to the information requested and displays a list of links from which the user can now access information by clicking them to open web pages.

 

Example of search engines include: www.google.com, www.hotmail.com and www.yahoo.com.

 

Downloading/saving/printing web content

After searching and finding information on the Internet, you may want to save the information locally on your computer for future reference. The process of transferring information from a remote computer to a local storage is called downloading. To download a file, the following procedure is followed:

  1. Right click the hyperlink to the file.
  2. On the shortcut menu, click the Save target as command.
  3. After some searching the browser displays the save as dialog box. Specify the folder or drive where the file is to be saved then type a unique name for the file in the name box.
  4. Click the Save button and the download progress dialog appears on the screen. Unless otherwise selected, the download dialog will notify the user at the end of the download process.

Pen the file in its application to view it.

 

NB: If you download a file whose application is not currently installed on the computer, then you may not be able to view its contents. For example, if you download a file that was created in Microsoft Word then you can only open it in the same application.

 

To print a file, open it in the application in which it was created then send it to the printer for printing. You can also print a web page directly from the browser window by clicking File then Print.

 

Electronic mail (e-mail)

Electronic mail refers to the sending and receiving of electronic letters and documents on the Internet. This feature serves to popularize the Internet even among non-technical people. For many, gone are the days when paper mail (of late called snail mail) would be sent and the recipient had to wait for long before receiving it. E-mail is fast because it takes

Only a few seconds to reach the recipient regardless of where they are in the world.

 

E-mail software

E-mail software falls under a special group of application packages called communication SoftArt. It is specially designed and developed to help a person to read and send individual text documents on the Internet as long as both the sender and receiver have an e-mail address.

 

Like the normal postal address, an e-mail address directs the computers on the Internet on where to deliver the e-mail message. A typical e-mail address would look like this: chemwex@yahoo.com

  1. chemwex is the user name and is usually coined by the user during

E-mail account registration.

  1. @ is the symbol for Hat” which actually separates the user name from the rest of the address.
  2. Yahoo. Com is the name of the host computer in the network i.e. the computer on which the e-mail account is hosted.
  3. The period H. ” is read as dot and is used to separate different parts of the e-mail address.
  4. Com identifies the type of institution offering a particular service(s) and is called the domain, meaning it is a commercial institution. Other common domains include:

 

Domain                                                                        Type

 

.edu                                                                   Educational institution

.gov                                                                   Government institution

.org                                                                   Non-profit making organization

.mil                                                                   Military organization

.co                                                                               Commercial institution

 

Sometimes another two letter extension is added after the domain name to show the country where the site is located e.g. injsmith@yahoo.co.uk, .uk stands for United Kingdom. Other countries domain name includes .ke (Kenya) .ug (Uganda, :tz (Tanzania), .jp (Japan), .au (Australia) etc.

 

E-mail facilities

Basically all e-mail software packages provide the user with ability to receive messages, display them, reply to the messages, compose new ones and store received messages.      ‘

 

Mails

  1. Checking mail In order to check mail the user has to open the e­mail account by providing the correct user name and password. While

In the e-mail account, click the Inbox command to view a link list of all the mails that you have received. To view a message, simply click its link and it opens on the screen for reading.

  1. To compose a message, click the Col11posebutton. The e-mail software opens a blank screen on which you can type the new message. Figure.5.5 shows a typical e-mail screen for composing a message.

 

  1. To send mail, type the correct e-mail address of the recipient in the to: text box. Type a subject in the subject box e.g. if it is a letter to a friend, type “Hi”. Finally click the Send, or send / receive button, and your message will be sent.
  2. Forwarded messages can be read and sent on to other people. Most of such messages are fun pages, poems, e-cards etc. After reading,

Simply click the Forward button and then provide the addresses of the recipients. Click the Send button to send.

  1. An e-mail message can be saved using the normal procedure for saving e.g. Click File, Save as then provide the name of the file and click save button.
  2. To print e-mail, select the text to be printed then click the File – Print command. In the print dialog box select the options for the page size, orientation etc. then click the Print button.

 

File attachment:

E-mail software also enables a person to attach other files like pictures, music and movie clips to an e-mail for sharing with friends before sending. The recipient can then download the attached files or simply view them on the screen. A good example where people use attachments is on-line job applications where a person attaches curriculum vitae to an e-mail message. To attach a file:

  1. Start the e-mail software i.e. Microsoft outlook express.
  2. Click File then New or open a composed e-mail.
  3. Specify the recipients address and the subject.
  4. Click the Insert menu then File attachment. A dialog box appears where you chose the file you want to attach.
  5. Select the file then click the Attach button.
  6. An attachment bar is inserted in the e-mail window with a name of the file you chose.
  7. Click Send to send the e-mail.

 

NB: You can also attach a file by simply clicking the attach button.

 

On-line meetings

It is possible to hold on-line meetings with people by sending mail to them. For example, on-line interviews may involve a person sending electronic mail composed of interview questions to a recipient who can read and answer back immediately. This method may not be as effective as a face to face interview or discussion but it is very useful in situations where traveling may be impossible or too expensive.

 

Telephone messages

Because of integration between mobile telephony and the Internet technology, it is possible to send e-mail to a mobile handset and a mobile message to e-mail account. This mobile computing is made possible by a special Internet access protocol called wireless access protocol (WAP) and wireless markup language (WML).

 

Contact management

Most mail programs allow the user to develop an address book which holds ‘contact information like e-mail addresses of different people along with other necessary information. The e-mail software usually provides a simple way of accessing these contacts when required. To create a new contact:

 

  1. Start the e-mail software i.e. Microsoft express.
  2. From the tools menu, click Address book or simply click the address book button.
  3. From the address book window click File then: Contact.
  4. Click the Name tab and enter the contact details.
  5. Click the Add button and add the contact into the contact list.
  6. Close the contact window then the address book.

 

5.9

Accessing information on emerging issues

The Internet is a storehouse for all types of information, presented in the form of text documents, pictures, sound and even video. Many emerging

Issues in the world today may not be properly documented in terms of hardcopy textbooks and journals but the Internet has a wide range of information concerning the issues. Emerging issues in this context refer to HIV/AIDS, drug abuse, environmental issues and moral issues.

 

Therefore, it is already evident that before embarking on finding any information on the web, a person needs to carefully plan their search to

Avoid wasting a lot of time wading through “junk” or useless material.

I

 

Steps for searching

  1. Plan for your search. You must develop a search strategy. Consider the following questions before starting to search for information: (a) what would be the best place to find the information required? (b) What tool best suits the work at hand?

(c) What key words can best describe the search problem?

  1. There is always the best place to start the search. One of the best places is on websites of leading media houses like www.cnn.com and www.nationaudio.co.ke because you are likely to get links to the latest research discoveries in your area of interest.
  2. after checking out on the news houses, you can now open some search engines and type the key words in the search field. Use different search engines to look for information on all the emerging issues mentioned above because different search engines give different search results.

 

 

DATA SECURITY AND CONTROLS

 

Chapter outline

 

6.1 Introduction and definition.

6.2 Security threats and control measures. 6.3 Computer crimes.

6.4 Detection and protection

6.5 Laws governing protection of information.

 

6.1 Introduction and definition

Computer information systems are becoming more and more important in daily life. Governments, private enterprises and individuals have found the need to protect data and information that is in their custody against unauthorized access, disclosure or damage. This is because of the rise of the information age and society leading to the subsequent view of information as a scarce valuable resource. This has posed threats to data and information both from known and unknown sources.

 

Data and information security Data security involves:

  1. Protection of data and information against unauthorized access or

Modification.

  1. Denial of data and information to unauthorized users.
  2. Provision of data and information to authorized users.

 

Data security also includes all the measures that will be taken to detect, document and counter the threats to data and information.

 

Data and information privacy

Private data or information is that which belongs to an individual and must not be accessed by or disclosed to any other person unless with direct permission from the owner. On the other hand, the data or information held by a government or organization about people is confidential data. This data and information may be seen by many authorized persons without the knowledge of the owner. However, it should not be used for commercial gain or any other unofficial purpose without the owner being informed. This data must also be protected against unauthorized access or disclosure.

 

6.2 Security threats and control measures

 

Viruses

A computer virus is a destructive program that attaches itself to other files and installs itself without permission on the computer when the files are opened for use. The virus may cause havoc on the computer system, for example, it may delete data on storage devices or interfere with the proper functioning of the computer system.

 

Types of computer viruses include:

  1. Boot sector viruses – they destroy the booting information on storage devices.
  2. File viruses – attach themselves to files.
  3. Hoax viruses – Come as e-mail with an attractive subject and launches itself when e-mail is opened.
  4. Trojans – they appear to perform necessary functions but perform other undesirable activities in the background without user knowledge.
  5. Worms – viruses that stick in the computer memory.
  6. Backdoors – may be a Trojan or a worm that allows hidden access to a computer system.

Control measures against viruses

  1. Install the latest versions of anti-virus software on the computers.

Make sure that you continuously update the anti-virus software with new virus definitions to counter the new viruses that are being manufactured on a daily basis.

  1. Avoid foreign diskettes in the computer room. If they have to be used, they must first be scanned for viruses.
  2. Avoid opening mail attachments before scanning them for viruses.

 

Unauthorized access

Data and information is always under constant threat from people who may want to access it without permission. Such persons will usually have a bad intention either to commit fraud, steal the information and ­destroy or corrupt the data. Unauthorized access may take the following forms:

 

Eavesdropping

This is tapping into communication channels to get information. Hackers mainly use eavesdropping e.g. to obtain numbers of credit cards.

 

Surveillance (monitoring)

 

This is where a person may keep a profile of all computer activities done

By another person or people. The information gathered may be used for one reason or the other e.g. spreading propaganda or sabotage. Many websites keep track of your activities using special programs called cookies.

 

Industrial espionage

Spying on your competitor to get information that you can use to counter or finish the competitor. This is mostly done with an aim to get ideas on how to counter by developing similar approach or sabotage.

 

Also unauthorized access can be as follows:

  1. An employee who is not supposed to view or see sensitive data by

mistake or design gets it.

  1. Strangers who may stray into the computer room when nobody is using the computers.
  2. Forced entry into the computer room through weak access points.
  3. Network access in case the computers are networked and connected to the external world.

 

Control measures against unauthorized access

  1. Enforce data and information access control policies on all employees.
  2. Encrypt the data and information during transmission (data encryption is discussed in details later in the chapter).
  3. Keep the computer room closed when nobody is using it.
  4. Reinforce the weak access points like doors and windows with metallic grills and burglar alarms.
  5. Enforce network security measures.
  6. Use files passwords to deter any persons who may get to the electronic files.

Computer errors and accidental access

Sometimes, threats to data and information come from people making mistakes like printing sensitive reports and unsuspectingly giving them to unauthorized person(s). Also, if end users have too much privilege that allows them to change or access sensitive files on the computer then accidental access mistakes may occur.

 

Errors and accidental access to data and information may be as a result of people experimenting with features they are not familiar with. For example, a person may innocently download a file without knowing that it is self-installing and it is dangerous to the system.

 

Control measures against computer errors and accidents

  1. Give various file access privileges and roles to the end users and technical staff in the organization i.e. denies access permissions to certain groups of users for certain files and computers.
  2. Set up a comprehensive error recovery strategy in the organization.

 

Theft

The threat of theft to data and information is a real one. Some information is so valuable that business competitors or some governments can pay a fortune to somebody who can steal the information for them to use. Therefore the following control measures should be taken to prevent theft of hardware, software and information.

 

Control against theft

  1. Employ guards to keep watch over data and information centers and

Backups.

  1. Burglar proofs the computer room.
  2. Reinforce weak access points like the windows, door and roofing

With metallic grills and strong padlocks.

  1. Create backups in locations away from the main computing centre.

 

Computer crimes

6.3 Trespass

The term trespass here refers to two things. One is the illegal physical entry to restricted places where computer hardware, software and backed up data is kept. The other form would be accessing information illegally

 

B­on a local or remote computer over a network. Trespass is not allowed at all and should be discouraged.

 

Hacking

A hacker is a person who intentionally breaks codes and passwords to gain unauthorized entry to computer system data and information files. The hacker therefore violates the security measures put in place such as breaking through passwords or finding weak access points in software.

 

There are various motivations for hacking. One is that some people like the challenge and they feel great after successful hacking, while some do it for computer and software producer companies that want to secure their systems by reducing weaknesses discovered after professional hacking. The most vulnerable computers to this crime are the networked computers faced with hackers working remotely.

 

Tapping

In this case, a person sends an intelligent program on a host computer that sends him information from the computer. Another way is to “spy” on a networked computer using special programs that are able to intercept messages being sent and received by the unsuspecting computer.

 

Cracking

Cracking usually refers to the use of guesswork over and over again by a person until he/she finally discovers a weakness in the security policies or codes of software. Cracking is usually done by people who have some idea of passwords or user names of authorized staff.

 

Another form of cracking is trying to look for weak access points in software. For example, Microsoft announced a big weakness in some versions of Windows software that could only be sealed using a special corrective program prepared by them. Such corrective programs are called patches. It is advisable therefore to install the latest patches in software.

 

Piracy

Piracy means making illegal copies of copyrighted software, information or data. Software, information and data are protected by the copyright law. There are several ways of reducing piracy:

 

  1. Enact laws that protect the owners of data and information against. Piracy.
  2. Make software cheap enough to increase affordability.
  3. Use licenses and certificates to identify originals.
  4. Set installation passwords that deter illegal installation of software.

 

Fraud

Computer fraud is the use of computers to conceal information or cheat other people with the intention of gaining money or information. Fraudsters can be either employees in the company or outsiders who are smart enough to defraud unsuspecting people. Some fraud may involve production and use of fake documents.

 

An example of fraud is where one person created an intelligent program in the tax department that could credit his account with cents from all the tax payers. He ended up becoming very rich before he was discovered.

 

Sabotage

This is the illegal destruction of data and information with the aim of crippling service delivery or causing great loss to an organization. Sabotage is usually carried out by disgruntled employees or those sent by competitors to cause harm to the organization.

 

Alteration

This is the illegal changing of data and information without permission with the aim of gaining or misinforming the authorized users. Alteration is usually done by those people who wish to hide the truth. To avoid this, do not give data editing capabilities to just anybody without vetting. Secondly, the person altering data may be forced to sign in order for the system to accept altering the information.

 

Alteration of data compromises the qualities of good data like reliability, relevance and integrity.

 

6.4

 

Detector and protection against computer crimes

After seeing the dangers that information systems are faced with due to threats to data and information and perpetration of computer crimes, it is important to look at some measures that can be taken to detect, prevent computer crimes and seal security loopholes.

 

Audit trial

This is a careful study of an information system by experts in order to establish or find out all the weaknesses in the system that could lead to security threats and weak access points for crimesters. An audit of the information system may seek to answer the following questions:

  1. Is. the information system meeting all its originally intended design objectives?
  2. Have all the security measures been put in place to reduce the risk of computer crimes?
  3. Are the computers secured in physically restricted areas?
  4. Is there backup for data and information of the system that can ensure continuity of services even when something serious happens to the current system?
  5. What real risks face the system at present or in future?

 

Data encryption

Data on transit over a network faces many dangers of being tapped, listened to or copied to unauthorized destinations. Such data can be protected by mixing it up into a form that only the sender and receiver can be able to understand by reconstructing the original message from the mix. This is called data encryption. The message to be encrypted is called the plain text document. After encryption using a particular order called algorithm or key, it is sent as cyphertext on the network. The recipient receives it and decrypts it using a reverse algorithm to the one used during encryption called a decryption key to get the original plain text document. Hence without the decryption key nobody can be able to reconstruct the initial message. Figure 6.1 is a flow diagram showing how a message can be encrypted and decrypted to enhance message security.

 

6.5 Log files

This is special system files that keep a record (1og) of events on the use of the computers and resources of the information system. This is because each user is assigned a user name and password or account. The information system administrator can therefore easily track who accessed the system, ‘when and what they did on the system. This unto second information can help monitor and track people who are likely to violate system security policies.

 

The most dangerous aspect in this case is when genuine users lose or give their passwords to unauthorized users.

 

Firewalls

A firewall is a device or software system t at filters the data and information exchanged between different networks by enforcing t e host networks access control policy. The main aim of a firewall is to monitor and control access to or from protected networks. People who do not have permission (remote requests) cannot access the network and those within cannot access firewall restricted sites outside the network.

 

Laws governing protection of information

Although most countries do not have laws that govern data and information handling, the awakening has started and the laws are being developed. The “right to privacy” is expected by all people. For example, the data protection law may have the following provisions:

  1. Data is not transferred to other countries without the owner’s permission.
  2. Data and information should be kept secure against loss or exposure.
  3. Data and information should not be kept longer than necessary.
  4. Data and information should be accurate and up to date.
  5. Data and information be collected, used and kept for specified lawful purposes.

 

Therefore, countries are encouraged to develop a data and information handling legal framework that will protect people’s data and information.

COMPUTER STUDIES NOTES FREE PDF FORM 1-4

INTRODUCTION TO NETWORKING AND DATA COMMUNICATION

Chapter outline 

1.1 Introduction

1.2 Definition of terms used in networking

1.3 Types of computer networks

1.4 Purpose and limitations of networking

1.5 Elements of networking

1.6 Network topologies

1.7 Network security

DOWNLOAD COMPUTER STUDIES NOTES IN PDF IN THE LINKS BELOW;

COMPUTER STUDIES NOTES FORM 1-4 PDF

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking Schemes, Topical revision materials, Syllabus and Many more

Definition of terms used in networking.

A computer network can be defined as a collection of computers linked together using transmission media for the purpose of communication and resource sharing. The term transmission media refers to any physical or non-physical link between two or more computers and in which a signal can be made to flow from source to destination. Some of the shared resources include programs, printers,storage devices, communication links etc.

Data communication

Data communication refers to the process of transmitting data signal from one point to another through the network. If all aspects related to data communication are taken into consideration, computer networking is the most recent, efficient and reliable means of transmitting data.

Terms used in data communication

Some of the terms used in data communication include: data signal, signal modulation and demodulation, multiplexing, bandwidth, base band, broadband transmission and attenuation.

Data signal: A data signal is a voltage level in the circuit which represents the flow of data. In data communication, data signals can either be analog or digital in nature. Analog data is made up of continuous varying waveform while digital data is made up of a non-continuous discrete waveform.

Signal modulation and demodulation: This is the process of converting data signals to a form that is suitable or transmission over a transmission medium. For example, a modem converts a digital signal to analog by superimposing it on an analog carrier signal which can be transmitted over analog telephone lines. This process is called modulation. A modem at the receiving end converts the analog signal into digital form, a process known as demodulation.

Multiplexing: Multiplexing is the process of sending multiple data signals over the same medium e.g. a wire conductor can be made to carry several data signals either simultaneously or at different times. Demultiplexing is the process of separating the multiplexed signals at the receiving end. Imagine a situation where one hundred computers in town A want to communicate with others of equal number in town B. If multiplexing is not used, each of the computers in town A will need a direct cable linking it to its partner in town B! However, with multiplexing, the computers can be made to share a single cable laid between the two towns hence save cost. The different frequencies create what is called different logical channels in the medium.    .

Bandwidth: A bandwidth is the maximum amount of data that a transmission medium can carry at anyone time. For example, a certain cable may have a bandwidth of 100 Mbps (Mega bits per second).

Baseband signal: Baseband signal is a digital signal that is generated and applied to the transmission medium directly without modulation. The signal takes the form of voltages of different magnitudes applied to the medium. The baseband signal utilises the full capacity of the transmission medium, hence at anyone time; only one signal can be sent. However, multiple signals can be sent at different times if they are multiplexed.

Broadband transmission: In broadband transmission, an analog signal is sent over the transmission medium using a particular frequency. This means that several data signals can simultaneously be sent through the same medium but at different frequencies. Frequency bands between these data signals prevent them from overlapping.

Attenuation: This is the decrease in magnitude and energy as a signal progressively moves along a transmission medium. If the signal is not boosted, it will totally be .lost along the way and may never reach the destination. Attenuation or signal loss is usually corrected by placing signal amplifiers also called repeater stations along the medium at appropriate distances in order to receive the weak signal, clean it, amplify it then retransmit it.

Modes of data communication

There are three modes of data communication namely: simplex, half

Duplex and full duplex.

Simplex transmission refers to communication in only one direction. An example of simplex communication is the normal radio or television broadcast. The listener or viewer cannot communicate back through the radio or television receiver back to the broadcaster.

Half duplex refers to communication in both directions but one direction at a time. A sender must send the data before the recipient can reply. For example, if two police officers are communicating using a ‘walkie talkie’ radio, one has to say “over” to mark the end of every statement in order for the other to respond.

Full duplex communication occurs in both directions simultaneously. An example of full duplex communication can be found in computers that are sending and receiving data on a network.

Types of computer networks

Computer networks can be classified using several aspects but the most common classification is according to size. Currently, there are several types of networks but the three most common are:

  1. Local area network (LAN)
  2. Metropolitan area network (MAN)
  3. Wide area network (WAN)

Local area network (LAN)

Local area network is a computer network that spans a relatively small geographical area like in one building or a school. One local area network can be connected to other local area network over any distance via data transmission lines or wireless media.

Most local area networks connect personal computers and server computers on a small network. A server computer is a computer dedicated to servicing requests for resources from other computers (workstations) on a network. Most local area networks are configured such that each workstation has its own central processing unit with which it executes programs, but it is also able to access data and devices anywhere on the local area network. Local area networks enable many users- to share expensive devices, such as laser printers, as well as data. Users can also use the local area network to communicate with each other, by sending messages or engaging in chat sessions.

Local area networks are capable of transmitting data at very fast rates, much faster than data transmitted over telephone lines.                                                    .

 

Metropolitan area networks (MAN)

A metropolitan area network is a network that covers a metropolitan area like a town or city. The metropolitan area network size typically covers a radius of between 5 to 50 km. The metropolitan area network infrastructure may be owned by a single company that has offices across a metropolitan area or by a service provider who provides network services to subscribers in the area. In essence, a metropolitan area network is made up of many local area networks in a metropolitan area.

 

Wide area networks (WAN)

A wide area net work is larger than a metropolitan area network and covers a large geographical area such as a country, a continent or the whole world. It consists of many local area networks and metropolitan area networks connected together to form one large network such as the Internet.

Purpose and limitations of networking

Purpose of networking

Some of the reasons for setting up computer networks include: resource sharing, remote communication, distributed processing facilities, cost effectiveness and reliability.

Resource sharing

A resource in the network environment means data/information, files, printers, modems, communication links, storage devices, fax machines, application programs and any other component that can’ be attached to the network for access by users.

 

Take for example an office setup where a number of users in a small business require access to. Common information. As long as all the computers are connected, they can share their files, exchange mail, send,

Faxes, schedule meetings and print documents from any point on the network. Users do not need to transfer files via removable storage but would send the work to a network printer. This centralised access to data and information leads to less waste of time and hence greater productivity.

 

Imagine the benefits of a user being able to directly fax a document from the softcopy in his/her word processor, rather than having to print it out, and then feed it into the fax machine.

 

In most network arrangements, the shared resources may be attached to a network server. The other computers on the network that send requests to the server are referred to as clients or workstations. Network servers run a special program called the server software which controls computers on the network and listens to client requests to service them over the network. For example, a print server will give permission for a particular client to print documents on the network printer. Figure 1.2 shows a simple diagram representing a computer network that is controlled by a server.

 

Remote communications

In the present computing environment, computer engineers are faced with two basic problems.

  1. Roaming of officers who by virtue of their work keep on covering long distances away from the workplace.
  2. Access to the organization’s information resources so that they can have up-to-date data or at least update the information servers with the status quo in the field.

Initially, the problem of roaming was addressed by the development of portable computers like laptops. But problem of access to the network’s information server remained! However, both problems have been addressed by remote communication. Remote communication refers to the transmission of data signals between two communication devices located at different geographical locations. A computer that tries to access resources from another computer on the network is called a remote client while the computer being accessed is called a remote host. Remote communication has been made possible by use of wireless transmission media such as radio waves, microwave and satellite as will be discussed in details later.

 

It is through remote communications that people can be able to share ideas and pass messages over the Internet.

Therefore, remote communications give a lot of freedom to the network users which translates to more productivity. Imagine continuing to work from home just as if you were in your office.

 

Distributed processing facilities

Distributed processing refers to the act of running the same programs or databases on different computers which are on the same network. However, users will not know that the processing is distributed but will think that everything is taking place on computer. The output can then be transmitted to another computer or the central computer on an organisations network. Before the advent of distributed processing, many organisations had centralised systems of management. This meant that all the data and information were sent from the dumb terminal (workstation with no processing power) for processing and storage in a central computer. It therefore followed that processing of data, release of information and decision making was centralised too.

However, with distributed processing, files reside on the user’s computer rather than on a central computer. Branch offices in a large organization have their own servers that store data, information and other resources required for their daily operations. These servers would then periodically update the central computer.

This model of data processing has a number of advantages. These include:

  1. The failure of the central computer does not affect the operations of the other terminals.
  2. Processing load is shared equally hence no time wastage.

 

Cost effectiveness

Networks are cost effective in the organization. Although the initial purchase and lying down of network components may be expensive, the savings experienced and the value added to service delivery make them a ready choice for enterprising managers.

One good thing about a network is that it greatly increases the efficient use of scarce resources. Imagine a large organization that has stand alone computers only. In such a case, the management has to buy a printer for each computer. However, with a network, only one printer is sufficient. The same applies to other resources like fax machines, optical drives, files and applications.

It should also be noted that computer networks have enhanced daily communication by providing a paperless communication environment. Users can send electronic messages and mail to each other instead of having to bear the cost of stamp duty or delivery charges. On the same note, company executives may not need to travel across continents to hold meetings. They can hold electronic video conferences instead and save the fare.

 

Reliability

A computer network is reliable in two ways especially when communicating or accessing information:

  1. Data can be transferred with minimum error from source to destination.
  2. In case one computer breaks down, a user can still access data and information from the other computers using another computer on the network.

 

Limitations of networking

Although networking has many advantages it also offers many challenges that are associated with implementation and human factors. Some of the limitations and disadvantages of networking include security issues, high initial installation cost, moral and cultural effects, spread of terrorism and drug trafficking and over reliance on networks among others.

 

Security issues

Data and information held on a network is prone to more illegal access threats than if the computer was not on the network. For example, a stand alone computer may be accessed by only a few people at home or in the office environment. However, once the computer is connected to the network, especially the Internet, many people can access it not only physically but also virtually over the network. Apart from this, when information is sent over the network from source to destination, it can be tapped or listened to by unauthorized parties.

Organisations find it very challenging to guard information systems from constant threats of illegal access. One of the common methods of data protection in a networked environment is encryption. This is the scrambling of information into a complex unintelligible form. Encrypted data cannot be understood by people who illegally access it unless they have the decryption key.

 

High initial cost

The initial cost of buying network hardware and software is very high. In fact, most institutions that have not set up their networks more often than not quote prohibitive cost as a limiting factor.

 

Moral and cultural effects

Large networks like the Internet have chat rooms and messaging services that may enable underage children to meet peers and adults on the net some of whom may have bad intentions. Access to pornographic and other negative material has also made the fight against social problems such as HIV/AIDS, bad sexual behaviour, drugs and substance abuse more complicated.

 

Spread of terrorism and drug trafficking

The Internet provides a rich recruitment ground for all types of illegal activities such as terrorism and drug trafficking. The easy flow of information from one place to another keeps even those who are on the wrong side of the law communicating easily. Terrorists and drug traffickers use information networks for their business communications. However, many countries have come up with methods of policing the Internet to try and break such syndicates.

 

Over-reliance on networks

Modem organisations have phased out most manual operations this means that all business processes and the society depend on computer networks. The disadvantage of this over reliance is that if by any chance the network fails or goes down, then many systems in the society can be brought to a halt! For instance, imagine the chaos if mobile phone services were to be abruptly brought to a halt. However, proper systems and network planning should be made to avoid such occurrences.

 

Elements of networking

A computer network is made up of several standard elements (components) which can be classified into three major categories namely:

  1. Data communication media.
  2. Communication devices.
  3. Networking software.

 

 

 

 

Data communication media

A data communication medium is a pathway used for carrying data and information from one point to another. The communication medium will more often than not dictate the type of signal that will be used to transmit a message. In essence, data communication media can be divided into two:

  1. Communication using cable (bounded media)
  2. Wireless communication (unbounded media)

 

Communication using cables (bounded media)

Data signals are transmitted from the source to the destination through a restricted pathway such as through a cable. For example, if the cable is a copper conductor, the data signal which may be in form of an electrical signal is propagated through the cable from the source to the destination. Any radiation from the guided medium is regarded as signal loss.

There are several types of bounded transmission media but the most common ones are:

  1. Two wire open lines cables.
  2. Twisted pair cables.
  3. Coaxial cables.
  4. Fiber optic cables.

 

1.Two wire open lines cables

They are made up of two parallel copper wires separated by a plastic insulator

They are used in telecommunication network to transmit voice signal e.g. the line running from a subscriber’s house to the nearest telephone post.

Although the plastic insulator is meant to reduce inter-line interference called crosstalk their linear nature allows an electromagnetic field to build around them during heavy data transmission which may cause interference to the signal. The wires also capture environmental frequencies e.g. radio waves hence causing noise in the transmission channel. In data communications, the word noise refers to random unwanted signals picked up by the channel.

 

2.Twisted pair cables

A twisted pair cable is made up of two solid copper wire strands wound around each other in a double helix manner the winding of the wires is meant to reduce the development of an electromagnetic field around the two wires as they transmit data. These cables are mostly used to transmit both voice and data signals. The two common types of twisted pair cables are the unshielded twisted pair (UTP) and shielded twisted pair (STP)

Unshielded twisted pair (UTP) cables do not have a shield that prevents electromagnetic interference (EMI) also called “electric noise” from the environment. The cable is therefore susceptible to noise and signal interference. Noise may come from lightening sparks, radio signal and even the radiations from spark plugs in motor vehicles. Unshielded twisted pair is therefore not suitable for environments that are electrically “noisy”.

Shielded twisted pair (STP) is similar to unshielded twisted pair except that a braided shield is wrapped around the wires to shield or protect them from noise.

 

Twisted pair cables are categorised into five groups according to the type of data transmitted and maximum rate of transmission, as shown below.

 

Table 1.1

 

  Suitable for Speed (max. limit)
Category Transmitting  
1 Voice Less than 1Mbps
2 Data 1 Mbps
3 Data 16 Mbps
4 Data 20 Mbps
5 Data 100 Mbps

 

  1. Mbps means Megabits per second.
  2. Today’s networks are approaching speeds of Gigabits per second.

Most organisations today use category 5 twisted pair cables to set up their local area networks. Although twisted pair cables can support high data rates (bandwidth) of up to 100 Mbps, they suffer from attenuation. For every cable length of 90 m, a device for restoring the signal called a repeateris needed to amplify the signal.

The advantages of twisted pair cabling include:

  1. Telephone systems use UTP which is present in most buildings. This means that it is easier to set up network media because connection is readily available.
  2. Installation equipment is cheap and readily available.
  3. It is cheap because of mass production for telephone use.

The disadvantages of twisted pair cabling include:

  1. It suffers high attenuation.
  2. It is sensitive to electromagnetic interference and eavesdropping.
  3. It has low data transmission rates as compared to other cables.

 

Coaxial cables

A coaxial cable resembles the cable that is used to connect television antenna to a television set. This cable has a central copper core which may be of solid or stranded wires surrounded by a dielectric material (insulator). The dielectric material is then surrounded by a hollow mesh conductor which is covered by a shield making the cable more resistant to electromagnetic interference than the twisted pair cable.

The braid (or mesh conductor) is made of copper or aluminium and serves as the ground for the carrier wire. Together with the insulation and any foil shield, the braid shield protects the carrier wire from radio frequency interference (RFI) and electromagnetic interference (EMI). However, although the cable has better protection against electrical interference than the twisted pair cables, it has a moderate protection against magnetic interference. The diameter of the centre core or conductor determines the attenuation rate. The thinner the core, the higher the attenuation rate. Data is carried on the cable using direct current (dc).

Coaxial cables have bandwidths of up to 1 Gbps (Gigabits per second). Hence, they are installed in a network to form the network backbone (a link that connects two or more separate local area networks). A good example where this cables are used is connecting different networks between buildings and routing trunk calls in telecommunication companies. There are two types of coaxial cables:

  1. Thin coaxial cable (Thinnet). It has one dielectric insulator
  2. Thick coaxial cable (Thicknet). It has two dielectric insulators around the core and is thicker than the thinnet

The advantages of coaxial cables include:

  1. They are very stable even under high loads.
  2. They have a large bandwidth (up to I Gbps) compared to twisted pair.
  3. They can carry voice, data and video signal simultaneously.
  4. They are more resistant to radio and electromagnetic interference than twisted pair cables.

The disadvantages of coaxial cables include:

  1. Thick coaxial cable is hard to work with.
  2. Coaxial cables are relatively expensive to buy and to install as compared to twisted pair.

Fiber optic cables

This is one of the latest types of bounded transmission media to be developed. Instead of carrying or transmitting data signals using electronic signals, the fiber optic cable utilises light to transmit data from one point to another on the network. The electrical signals from the source are converted to light signals, and then propagated along the fiber optic cable. To convert an electric signal to light, you need a Light Emitting Diode (LED) at the transmitter. At the receiving end, a photosensitive device can be used to convert the light signals back to electric signals that can be processed by the computer.

 

The fiber optic cable is made up of the core, cladding, buffer, strength members and the jacket. .

The core: The core is the central part of the cable and is made of a hollow transparent plastic or glass.

Cladding: This is a single protective layer surrounding the core. It has some light bending characteristics in that, when the light tries to travel from the core to the cladding, it is redirected back to the core. This is why even if a fiber optic cable is bent into coils and a light signal is inserted at one end it will still be seen coming out from the other end.

Buffer: The buffer surrounds the cladding and its main function is to strengthen the cable.

The jacket: It is the outer covering of the cable.

Fiber optic cables are of two types namely:

  1. Single mode fiber.
  2. Multimode fiber.

The single mode fiber cable has a very narrow centre core the light in the cable can therefore take only one path through it. Because of this, it has a very low attenuation rate and is preferred for long distance transmission. It has a bandwidth of 50 Gbps which is higher than that of the twisted pair’s 100 Mbps. Single mode fiber is very expensive and requires very careful handling during installation.

A multimode fiber has a thicker core than the single mode it allows several light rays to be fed in the cable at an angle. Because of multiple light signals navigating the cable at the same time, distortion of the signal is possible. Multimode cables have a high attenuation rate and are usually used for shorter distances than single mode.

The light signal travels through the core, through a process referred to as total internal reflection. The process that causes total internal reflection is called refraction. Refraction is the bending of light when it crosses the boundary of two mediums that have different density. When light signal is inserted into the cable, it tries to cross from the core to the cladding. The light is bent back into the core hence propagates along the length of the cable

The advantages of fiber optic cabling include:

  1. It is immune to electromagnetic interference and eavesdropping.
  2. It is fast and supports high bandwidth.
  3. Large distance can be covered because it has low attenuation.
  4. Can be used in hazardous places (highly flammable) because they do not generate electrical signal.
  5. It is smaller and lighter than copper cable hence ideal for space limited situations.

The disadvantages of fiber optic cabling include:

  1. Connectivity devices and the media are expensive.
  2. Installation is difficult because the cable must be carefully handled.
  3. It is relatively complex to configure.
  4. A broken cable is difficult and expensive to repair.

Wireless communication (unbounded media)

Wireless or unbounded media, is a type of media that is used to transmit data from one point to another without using physical connections. In this case transmitting antenna and receiver aerial facilitate the communication. Examples of wireless transmission media include microwaves, radio waves, and infrared transmission all use different frequencies of the electromagnetic spectrum. All these waves travel at the speed of light.

Microwave transmission

Microwave frequencies range from about 3GHz to 40GHz on the electromagnetic spectrum. Due to their small wavelength, they easily release their energy in water as heat hence they are also used in making microwave ovens used as domestic kitchen appliances. However, in networking, microwaves are very suitable for point to point transmissions. This means that a signal is directed through a focused beam from transmitter to the receiver station.

Satellite communication

A satellite is a microwave relay station. The microwave earth stations have parabolic dishes with an antenna fixed on them in order to focus a narrow beam towards the satellite in space. A satellite transmission system has three main components:

  1. Transmitter earth station that would set up an uplink to the satellite in order to transmit data. The uplink will have a unique frequency.
  2. A satellite that is somewhere in an orbit that receives, amplifies and retransmits the signal to a receiving earth station via a downlink frequency that is different from that of the uplink so as to avoid interference with the uplink signal.
  3. Receiving earth station that would receive the sent signal on the other side of the globe.

A communication satellite is usually launched into space about 36 000 km above the earth in such a manner that its speed will be relatively equal to the rotation speed of the earth. An observer on earth will therefore, see as if the satellite is stationary in space. These types of satellites are called geostationary satellites. They are convenient because the need to keep on moving the parabolic dish in a bid to track the line of sight is eliminated. A geostationary satellite offers a large constant line of sight to earth stations. The area on earth where the line of sight can easily be located is called the satellites footprint. The satellite transmits the signal to many recipient earth stations to form a point to multipoint transmission. In multipoint transmission the transmitted signal spreads out in all directions forming a cell of access radius.

The new trends in microwave transmission have seen the use of very small aperture terminal (VSAT) technology. This very small aperture terminal refers to a very small satellite dish used both in data, radio and TV communication. Many businesses are adopting this new technology because it enables direct access to satellite communication instead of having to go through the state owned or licensed satellite gateways.

The satellite produces strong signals that can be received by a satellite dish antenna of only about 2 metres in diameter. The signals are decoded using a decoder that is plugged directly to a television set or a computer.

Radio communication

Radio waves travel just like surface water waves, i.e. they are omnidirectional. This means that they start from a central point and spread outwards in all directions. As they travel outwards, their energy spreads outwards over the covered area. The waves are radiated into the atmosphere by a radio frequency antenna at constant velocity. Radio waves are not visible to the human eye. Radio waves are used in radio and television broadcasts. Data can also be transmitted over radio waves communication channels. For example, instead of laying telephone cables between two towns that are geographically separated, radiowave transmission can be used to connect the two towns. Radio waves can be of high frequency, very high frequency or ultra-high frequency.

The high frequency (HF) radio waves signal is propagated by directing it to the ionosphere of the earth. The ionosphere will reflect it back to the earth’s surface and the receiver will pick the signal. Before the advent of satellite communication, high frequency radio was the only way of communication beyond the horizon such as communicating to a ship that is on the high seas or communication between continents. The biggest challenge of high frequency communication is the danger of signal interception by unauthorised parties.

Very high frequency (VHF) radio waves are transmitted along the earth’s surface. Due to the curvature of the earth, the signal will most likely attenuate at the horizon. This means that repeater stations have to be placed strategically to maintain a line of sight in order to receive, amplify and propagate the signal from one area to another. This technology is popular for the hand held radio devices like “walkie-talkie” radios. The range of very high frequency is limited but it is preferred to high frequency where no major obstructions are encountered on the landscape. This is because with very high frequency, it is possible to make the wave to follow a narrower and more direct path to the receiver. To overcome the obstructions on the earth surface like mountains and buildings, repeater stations are built on raised areas.

 

Ultra high frequency (UHF) radio waves are like very high frequency when it comes to the line of sight principle. This means that there should be no barrier between the sending and the receiving aerial. However, they require smaller aerials. Notice that the television aerial for very high frequency is bigger than the one for ultra high frequency radio waves. This is because; ultra high frequency radio waves can be made to follow an even narrower and direct path to the receiver than very high frequency radio waves. Therefore ultra high frequency is popular for horizon limited broadcasts.

One of the latest radio transmission technologies is called Bluetooth technology. Bluetooth is a worldwide and short-range radio technology that enables people to use hand held communication devices such as cell phones and personal digital assistants to access the Internet. The main idea behind Bluetooth communication is to try and define one standard that will allow all personal communication devices regardless of their differences or size to be able to communicate with each other and through wireless technology. The main component in Bluetooth is a small low power two-way radio transceiver, small enough to be inserted in small devices. A network of bluetooth-enabled devices is called a wireless personal area network (WPAN) or piconet. This is because bluetooth networks are best suited for personal or hand held devices. This has made radio transmission to become very popular in mobile communication and Internet connectivity.

Infrared transmission

Infrared waves fall just below the visible light on the electromagnetic spectrum. Just like the radio waves, infrared waves are not visible to the human eye. Communication through this medium is achieved by having infrared transmitters and receivers (transceivers). Transceivers of infrared signals must be within a line of sight in the same room. This is because unlike radio signals, infrared signals cannot penetrate obstacles like walls. However, the signal can be reflected off surfaces like walls and ceiling until they reach their destination.

 

An example of an infrared device is the infrared transceiver on most mobile phones. Once activated, two people in the same room can send messages to each other using infrared technology on their mobiles without going through the mobile service provider hence avoid being charged.

In computer networking environment, the technology can be used to connect devices in the same room to each other without need for cables e.g. a computer to a printer. The computers infrared transceiver must maintain a line of sight with the one for the printer.

 

Advantages and disadvantages of wireless communications

Wireless communication offers numerous advantages that justify the cost of laying down the network. Some of the advantages are:

  1. Wireless medium is flexible in operation as compared to bounded media i.e. devices can be moved around without losing access to the network.
  2. Wireless networks can span large geographical areas easily.
  3. Wireless communication can take place via satellite even in very remote areas that do not have high cost physical infrastructure like telephone lines.

Some of the disadvantages of wireless communications include:

  1. It is relatively difficult to establish or configure.
  2. The initial cost is very high.

 

Communication devices

Computers and transmission media require communication devices for the network to be fully operational. These devices are more or less used as interfaces or junctions between the terminal devices. Terminal equipments are devices at both ends of the communication link such as a computer. Some examples of data communication devices include network interface cards (NIC), modems and codec’s, hubs, bridges, repeaters, routers, gateways, switches and access points.

Network interface cards (NIC)

Network interface cards (NIC) create a physical link between the computer and the transmission media. A network interface card is plugged into an empty expansion slot on the motherboard. However, most computer motherboards today come ready with an onboard network interface controller. The network interface cards have ports at the back in which the terminated end of a network cable can be plugged.

Modems and codecs

A modem is an important device in the world of communication. It converts a signal from digital to analog form for the purpose of transmission over the analog media, while a codec converts an analog signal to digital form for transmission via a digital medium. A modem can be external, an add-on card or built on the motherboard.

Hubs

A hub also called a concentrator is a component that connects computers on a network and is able to relay signals from one computer to another on the same network. A hub will usually connect networks that have a common architecture i.e. one that has the same set of communication software usually called protocols. Protocols are a set of rules that govern the communication between devices on a network. A hub transmits signals by broadcasting them to all the computers on the network. After the signal is broadcasted, the computer whose address is on the message picks the message from the network that is part of the broadcast domain. Some hubs called intelligent hubs are able to monitor the way computers are communicating on the network and keep the information in a small database of their own called a management information base (MIB). The network server can then use this information to fine-tune the network. Intelligent hubs can be able to manage a network by isolating computers that are not functioning properly. Several hubs can be connected together one after another to expand a network. However, this increases the broadcast range which may lead to broadcast storms on the network. The term broadcast storm refers to a condition where a network is overwhelmed with message broadcasts due to malfunctioning of network interface cards or hub related problems.

Bridges

This is a network device that selectively determines the appropriate network segment for which a message is meant for delivery through address filtering. Hence a bridge can divide a busy network into segments to reduce network traffic. The purpose of using a bridge therefore is to:

  1. Extend the length and number of stations that a segment can support.
  2. Reduce overall traffic flow by allowing broadcasts only in the destination segment of the network.

 

A bridge makes sure that packets that are not meant for a particular segment are not broadcast in that segment.

Repeaters

A repeater receives a signal from one segment of a network, cleans it to remove any distortion, boosts it and then sends it to another segment. Repeaters are the simplest way to expand a network because they broadcast the same message to other network segments. However, this is advisable due to broadcast storms that can develop. The repeater enables the network to eliminate attenuation problems.

 

Routers

The router interconnects different networks and directs the transfer of data packets from source to destination. Routing depends on network addresses. Each network has a unique identifier or address called the network address. Network addressing is enabled because of the use of a special internetworking protocol called the Internet Protocol (IP). Hence, the network address is usually called the IP address. All the computers on the same network have the same network address but different host numbers. The router receives a packet from another router on the internet work and checks the destinations network address. If the address is the same as the one on which the router is, it passes the data packet to the destination host by reading the host address otherwise the packet will be routed to the next network address. Some modem routing devices combine the functionality of a bridge and   router. Such a device is called a brouter.

Gateways

A gateway is any device that can be configured to provide access to wide area networks or Internet. One such device is the router. Because of this reason most people confuse a gateway and a router. However a gateway may not be necessarily a router, it may be a computer configured to provide access the Internet. Figure 1.21 shows a logical diagram of a local area network connected to a wide area network via gateways.

Switches

A switch, unlike a hub forwards a packet directly to the address node without broadcasting. A node refers to data terminal equipment such as a workstation or computer on the network. The switch does this by connecting two nodes point to point as if they were linked by a direct cable between them. This reduces the broadcast problems on the networks. It is important to note that some hubs also incorporate the switching mechanisms. Such a hub is referred to as a switching hub.

Typically, switches are more expensive than hubs. This means that one switch may be used as a bridge to connect several hubs in order to reduce collision problems caused by broadcasts.

Wireless communication devices

For a long time, networks have been implemented using tangible transmission media like cables. However, as the cost of wireless technology goes down and the quality of service increases, it is becoming cost effective for companies and individuals to extend the capability of wired networks by integrating wireless segments into their communications. Some of the most common devices used in wireless communication include access points and the antenna.

Access points (AP)

The access point is one of the most common wireless network components  As its name suggests, it is an entry point into a bounded network for people who have wireless devices such as personal digital assistants (PDA’s), laptops and computers with wireless links.

Wireless antennae

The access point needs to have antennas in order to detect signals in the surrounding. The waves may be radio waves, microwave or infrared waves in nature. In most cases, access points will have two antennas so that the one that receives the best signal at any particular time can be used.

 

Personal computer memory card international association (PCMCIA) cards

A personal computer memory card international association is an add-on card inserted into a device such as personal digital assistants or a laptop in order to enable wireless communication between the devices and a wired network server.

Network software

Computer networks have evolved from the simple linking of computers on a common transmission media to highly managed and optimised data and information transfer systems. This means that apart from data communications, the focus is now squarely on how best to utilise network resources. The issues of network security inter operatability and reliability have taken centre stage. Any network manager will be faced with the question of network load balancing and adopting best routing procedures.

 

All these tasks would be impossible if network software was not available. These software can be classified into two main groups namely:

  1. Network operating systems.
  2. Network protocols.

 

Network operating systems

These are operating systems specifically designed to optimise the networked computers ability to respond to service requests. Servers run on a network operating system. In addition to the functions of a normal operating system, this software performs the following network related functions:

  1. Provides access to network resources e.g. printers and folders.
  2. Enables nodes on the network to communicate with each other more efficiently.
  3. Supports interprocess communication i.e. enables the various processes on the network to communicate with one another.
  4. Respond to requests from application programs running on the network.
  5. Supporting network services like network card drivers and protocols.
  6. Implementing network security features.

In most cases, network operating systems are designed as multi-user operating systems that run the network server program. Once installed on the right hardware platform and configured as a server, the operating system will provide network management tools to network administrators. The administrator can use the tools to do the following:

  1. Secure the network against unauthorised access.
  2. Track network usage and keep a log of all the people who have used the network.
  3. Ensure inter-operatability between various systems on the network.
  4. Performance monitoring to ensure maximum throughput on the network.

Examples of network operating systems are Windows NT/2000/2003, UNIX, Linux and Novell Netware.

 

NB: Internetworking devices like routers also have operating systems of their own and hence they can be managed and configured for optimum performance. Note that routers are special purpose computers.

 

Protocols

Protocols are set rules and procedures that govern communication between two different devices or people. For example, a diplomat from a foreign country must adhere to the set of rules and procedures of communication when representing his country in the host country.

In computer networking, protocols are the rules and technical procedures that govern communication between different computers.

 

How protocols work

The data transmission process over the network has to be broken down into discrete systematic steps. At each step, a certain action takes place. Each step has its own rules and procedures as defined by the network protocols. The work of these protocols must be co-ordinated so that there are no conflicts or incomplete operations. This co-ordination is achieved through protocol layering. Network protocols are designed after the open systems interconnection (OSI) model. The open systems interconnection model is not a protocol as such but is meant to help designers to come up with high quality layered protocols. It has seven layers, each performing distinct functions as shown in Table 1.2.

 

Table 1.2

 

  Layer Function
7. Application layer User applications run here and generate requests for data transmission or open received

Information.

6. Presentation layer Adds formatting, display and encryption

Information to the data being sent.

5. Session layer Sets up data transmission sessions between two

Communicating devices.

4. Transport layer Manages data transfer over the network to ensure

Reliability.

3. Network layer Address information is added to the data packet

And routed to destination.

2. Data link layer Adds error checking information and prepares

Data for going onto the physical connection.

1. Physical layer The data packets are finally transmitted via the

network card through the transmission media in

form of bits

 

Application protocols work at the highest layer of the OSI model. They provide services to application programs. An example of an application program is an e-mail editor program that enables composing or reading of e-mail messages. Examples of protocols at the application layer include:

  1. Simple mail transfer protocol (SMTP) – An Internet protocol for transferring e-mails.
  2. File transfer protocol (FTP) – An Internet protocol for file transfer.
  3. Apple talk and apple share – Apple computers networking protocol suit.

 

Transport protocols ensure that data is passed between computers more reliably. Some examples include:

  1. Transmission control protocol (TCP): This is responsible for delivery of sequenced data over the network.
  2. Sequential packet exchange (SPX): This part of the Novell’s internet work packet exchange/sequential packet exchange (IPX/SPX) for sequenced data.
  3. NetBEUI: A local area network protocol for Microsoft and 1MB networks that establishes communication sessions between computers.
  4. Apple transaction protocol (ATP): Apple computer’s communication session and data transport protocol.

Network protocols provide link services. They handle addressing and routing information, error checking and retransmission of requests. Some examples of network layer protocols include:

  1. Internet protocol (IP): It does packet forwarding and routing.
  2. Internetwork packets exchange: Netware’s protocol for packet forwarding and routing.

 

Network topologies

The term network topology refers to the way in which computers and other devices have been arranged or how data is passed from one computer to another in the network. Therefore network topology can be viewed in two ways namely logical and physical topology.

 

Logical topology

Logical topology also called signal topology deals with the way data passes from one device to the next on the network. Examples of logical topologies are Ethernet and token ring. This means that two networks with different physical layout may have the same logical topology.

 

Ethernet topology

In Ethernet topology, all computers listen to the network media and can only send data when none of the others is sending.

 

Token ring topology

In token ring topology, a special package for data called a token goes around the network and only the computer whose address is on the data held in the token will take up the token to read the data then release the token. The token can then be captured by another computer which needs to transmit data.

 

Physical topology

Physical topology refers to the physical layout or arrangement of components on the network. Examples of physical topologies include star, bus, ring, mesh and tree/hierarchical topology.

 

Star topology

In star topology, all devices are connected to a central hub. Nodes communicate across the network by passing data through the hub. When the hub receives data from a transmitting computer, it broadcasts the message to all the other nodes on the network. Until recently, the star topology was found mostly in minicomputer and mainframe environments. The topology consists typically of a system of terminals or personal computers, each connected to a central server.

The advantages of star topology include:

  1. It allows centralisation of key networking resources like concentrators and servers.
  2. It gives the network administrator a focal point for network management. When something goes wrong with the network, the administrator can troubleshoot it from one place, usually a wiring closet, but possibly from a remote management terminal.
  3. Star networks are easy to configure.

 

The disadvantages of star topology include:

  1. The star-based network is costly because it requires one complete cable per computer. Each workstation is connected to the central concentrator by its own dedicated line. In some star-based network technologies this line is coaxial cable that runs from an active hub to a workstation.
  2. If the central hub fails, the entire network will be down.
  3. Installing is time consuming because each node forms a segment of its own.

 

Bus topology

All devices are connected to a central cable called the bus or backbone as shown in Figure 1.26. The sharing of the transmission media (or bus) has several problems. Most importantly, it means that the cable can carry only one message at a time and each workstation on the network must be capable of knowing when it can and cannot transmit using this shared medium.

 

A terminator is attached to each end of the cable to avoid signals from bouncing back and forth on the cable causing signal distortion. As the data passes along the cable, each station checks whether the data is addressed to it. If the address matches the machines address, it receives the data otherwise it rejects it. The network addresses of computers on a network are called the medium access control (MAC) address.

 

The advantages of the bus topology are:

  1. It is easy to install.
  2. It is less costly. Does not require a complete cable length per computer.

The disadvantages of bus topology are:

  1. A cable break in any section brings down the whole networks.
  2. Troubleshooting a cable fault is difficult because the fault could be anywhere on the cable.
  3. The bus topology limits the number of computers that can be connected to the cable because each computer is listening to the cable in order to transmit. This means that an increase in the number of computers results in an increased collision as machines compete for transmission.

Ring topology

In a ring topology, all devices are connected to one another in the shape of a closed loop each station is responsible for regenerating and retransmitting signals around the network to its neighbour. A token is used to exchange data from one station to another. A token can be viewed as an envelop or a bag where data is placed for transmission and carried around the network.

The advantages of ring topology are:

  1. They use a short length cable.
  2. Ring topology is simple to install.

The disadvantages of ring topology are:

  1. Modification may be difficult because adding or removing a device can disrupt the entire network.
  2. Troubleshooting can be difficult.
  3. One device or media breakdown may affect the entire network.

However, this is not the case with IBM token ring where a device called Multi Station Access Unit (MSA U) is used for station bypass in the event a station fails.

 

Mesh topology

This is the most common type of topology used in wide area network where there are many paths between different locations. Devices are connected with many redundant interconnections between the nodes. In a true mesh topology every node has a connection to every other node in the network. This is a hybrid topology. Groups of star-configured networks are connected to a linear bus backbone

 

Practical exercise

 

Setting up a peer-to-peer local area network

This practical activity is a step by step guide on how to set up a simple local area network. The following are some of the requirements you need.

 

Hardware requirements

  1. A computer running on any version of Microsoft Windows especially Windows 9x / 2000 / ME / Windows XP.
  2. Network Interface card. Some computers may have it already installed onboard so that you do not have to purchase one.
  3. A hub or a switch.
  4. Transmission media preferably unshielded twisted pair category 5. 5. RJ45 connectors.

 

Tools

  1. Crimping tool
  2. Cable tester
  3. Screw drivers.

Installing a network card

The network interface card acts as the physical interface or connection between the computer and a properly terminated transmission cable. As mentioned earlier, some motherboards come with on-board network interface cards hence you may not need to plug in a separate add-on card.

To physically install an add-on card:

  1. Disconnect the computer from the power source.
  2. Open the system unit and identify an empty expansion slot on the motherboard.
  3. Insert the card and screw it into place. Some little force may be needed to push the card into place squarely. Make sure that all the conductor points of the card sink into the expansion slot. Avoid touching the golden conductor points and chips on the card with your bare hands.

NB: Some cards are slotted into Industry Standard Architecture (ISA) slots while others are designed for Peripheral Components Interconnect (PCI) slots. Make sure you install in the right slot and then screw into place.

  1. Replace the casing then connect the computer to the power supply and boot it up. If you are using Microsoft Windows 9x and above, the computer will detect the new hardware because of the plug and play feature found in the operating system. It may install the protocols and device software needed for the proper operation of the network interface card automatically! If there is a problem of the card being detected, you may have to configure the card manually using software on a disk that comes with the card.

 

Installing the drivers manually

  1. Click tart, Settings then, ControlPane1. In the Control Panel window double click the Network /Network Connections icon. A dialog box will be displayed. (In some Windows versions you may have to double click the Network and Dial-up Connections icon found in the control panel then double-click the local area connection icon.)
  2. Click the configure button.
  3. Click adapter/drivers and then click ADD. Follow the on screen instructions.

 

Adding protocols

  1. Make sure the Network dialog box is open.
  2. Click ADD then protocol
  3. Click Microsoft, select TCP/IP and NetBEUI from the protocol list then ok
  4. Click Apply

 

Identifying your computer in a workgroup

A workgroup is a collection of computers that are on the same network. To specify your computer and the name of the workgroup:

  1. If you are using Windows 9x, click the identification tab from the Network dialog box. If you are using Windows Me, 2000 or XP. Identification (Computer Name) tab is located in system properties dialog box. Right click My computer, click Properties then click the computer name tab.
  2. Type your computer name and the workgroup name. The computer name you give must be unique.

 

Configuring transport control protocol/internet protocol (TCP/IP)

In order to communicate with other computers, you need to install and configure a protocol. In our case let us use TCP/IP. To configure TCP/IP,

  1. Select the TCP/IP Ethernet adapter from the list titled The following network components are installed/ This connection uses the following items.
  2. Click the properties button then the Specify the IP address option,
  3. Type in the IP address box an address such as 192.168.00.001. Each computer should have a unique IP address. Figure 1.32 shows a TCPI IP properties dialog box in Microsoft Windows XP.
  4. Specify the subnet mask. Subnet masks are values that allow the router to distinguish the network ID from host ID portions of the IP address. If the IP address is examined by the subnet mask and found to be identical, the message is destined to a host on the same network otherwise it is routed to another network. Typically, subnet masks use the format 255 .x.x.x. In our case let us use a subnet mask such as 255.255.255.0.
  5. Click APPLY then Ok The computer will prompt you to restart in order for the changes to be effected.
  6. Restart the computer

 

Media preparation and connection

In this practical, we are going to use twisted pair cabling technique because it has become almost the default method. This type of media uses a connector known as RJ45 to terminate the cable. RJ45 is attached to a UTP cable using crimping tool. To attach an RJ45 connector to a UTP cable, proceed as follows:

  1. Cut a piece of cable of suitable length approximately 3 metres.
  2. Strip off approximately a dimension centimeter of the cable sheath on both ends to expose the inner pairs.
  3. Untwist the pairs.
  4. Using the wiring diagram, place the wires in the correct order and trim the edges to make them even.

Key

  1. Green striped 2. Green
  2. Orange striped 4. Blue
  3. Blue striped 6. Orange
  4. Brown striped 8. Brown

 

  1. Insert the wires into the RJ45 connector; plug it in their correct order and then push it into the crimping tool.
  2. Squeeze the handles of the tool to make sure the wires are pierced and held tightly in the connector.
  3. Repeat steps 5 and 6 at the other end of the cable. Your cable should now be terminated on both ends
  4. You can then test the media for continuity and correct termination using the cable tester.

 

Connecting the computers to the hub/switch

It is now time to connect the computers together through the hub. To connect the computers:

  1. Connect one end of the cable to the RJ45 port of the network card and the other end to one port in the hub. If the hub is powered, a LED will indicate the connection. Repeat all this process for all other computers that you wish to connect on the network.
  2. To see if the networking is successful, right click the Network Neighborhood/ My Network Places on the desktop. If all the connected computers in the same workgroup can “see” one another then you have succeeded setting up a peer-to-peer network.
  3. if not, you may decide to test the connection using the PING command. For example if you have two computers with the IP addresses 192.168.001.001 and 192.168.001. 028. To test the connection between the two, proceed as follows:

(a) From the START, menu of the computer with IP address

192.168.001. 001, choose the RUN menu and type the command

PING 192.168.001. 028.

(b) Click, 0K.A connection failure will be displayed on the screen

Sharing network resources

If you have successfully installed the network, you can then start enjoying the benefits of networking by enabling resource sharing. For example if you are using Windows XP, you can share resources by enabling sharing and security as follows:

  1. Open Windows Explorer.
  2. From the explorer window, right click the drive folder or file you wish to share with others on the network then select sharing and security.
  3. Click the Sharing tab then enable “share this folder“.
  4. Type in the share name and set other options as required.
  5. Click 0.K.

Network security

Network security is like the security measures we implement in our homes. You do the best you can to protect yourself from intruders. Likewise in networking you should try to protect your data and information from intruders. In networking there are several ways of enforcing security one of them is share level and the other is the user level security.

 

Share level security

Share level security is a sample network security used in peer to peer networks. The user can decide which resources to give for sharing. Most desktop operating system such as Window 9X provide such kind of security.

 

User-level security

User level security model is used on server based networks. A network administrator assigns accounts to users. This means that each user is provided with a unique name and password which he or she can use to access network resources. For more on user level security, read documentations on operating system such as Microsoft Windows NT 4.0/2000/2003, UNIX, Novell Netware, Linux Fedora etc.

 

APPLICATION AREAS OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

 

Chapter outline

 

2.1 Introduction

2.2 Application areas of information and communication technology

2.3 Field work report

 

Introduction

Computers play an important role in every aspect of our society today. Hardly does a day pass without one coming across a computer system that is used in offering services that were initially done manually.

In this chapter, we shall look at how computers have been applied in the contemporary society to add value to the information systems of various organizations. An information system is a collection of specific human and machine efforts required to support the decision making process, data processing, information output and presentation.

 

Application areas of information and communication technology

Information and communication technology (lCT) has been applied in various areas such as in the development of financial systems, retail systems, reservation systems, educational systems, communication systems, industrial systems, scientific and research systems, library systems, entertainment systems, transportation systems, home use, office expert systems, marketing, virtual reality systems and law enforcement systems.

 

Financial systems

Financial systems enable organisations to manage their finances. They include:

  1. Payroll systems.
  2. Accounting systems.
  3. Banking systems.

 

Payroll systems

The primary purpose of this system is to process the accurate information of employees including gross pay, deductions and the net pay. Because money spent on human resource is one of the largest operating expenses of a business, a payroll system is also designed to produce several analysis reports e.g. a breakdown of payroll expenses against production/income of the company.

 

Accounting systems

Accounting systems are popular in business management. There are six key business accounting activities/subsystems:

  1. Customer order entry and billing
  2. Inventory management
  3. General ledger accounting
  4. Accounts receivable
  5. Accounts payable

 

Customer orders entry and billing

Customer orders entry and billing subsystem records incoming customer orders, authorises delivery of items or services ordered and produces invoices for customers who do not pay in advance or on cash basis.

 

Inventory management

Inventory management is used to keep track of the items in stock and help the management determine which items to reorder. This helps the management to have enough stock at all times to meet the needs of the customers.

 

General ledger accounting

General ledger accounting is used to keep track of how much a business makes and its worthiness by summarising the financial transactions. It produces reports on income, sources of income, expenses, and the net profit or loss earned. A summary report of these transactions is called a balance sheet and is usually generated at the end of an accounting period.

 

Accounts receivable

Accounts receivable system keeps track or records of the amount owed by each customer. This helps the management to make a follow-up by billing the customers for overdue payments.

 

Accounts payable

Accounts payable system keeps track of the amount the business owes others e.g. suppliers, tax organisations, transport e.t.c. Hence, it helps the management to produce cheques for payment of these amounts.

 

Banking systems

The banking industry was one of the earliest consumers of information and communication technology. The computerised banking services include:

  1. Processing customer transactions.
  2. Cheque clearing and processing.
  3. Electronic funds transfer.

Processing customer transactions

Computers are used in banks to carry out financial transactions such as recording deposits, withdrawals and calculating interests on savings and loans. Such systems also generate reports on the current status of accounts. In most banks, these transactions are entered via terminals, which are connected, to a central computer for centralised processing. The tellers have revolutionised banking activity by offering 24 hour service to customers and more flexibility in cash deposits and withdrawals.

 

Cheque clearing and processing

Computerised cheques clearing and processing is made possible due to the special characters on cheques printed using ink containing magnetic particles. The characters identify the bank in which the cheque is drawn, the customer account number, the cheque number and the amount of the cheque. Using a magnetic ink character reader, these details are automatically entered into a computer for cheque processing. Manual processing used to take lots of time but with computer systems, millions of cheques are processed every day hence improving efficiency in service delivery to customers.

 

Electronic funds transfer (EFT)

Electronic Funds Transfer (EFT) is the movement of money using information and communication technology. When a cash dispenser is used, the amount withdrawn by a customer is deducted from his/her account. Another example is when paying for goods and services using a credit card. Payment is transferred electronically from the customers account to the recipients account.

 

Retail systems

Computers are becoming more and more popular in retail stores such as supermarkets, distributor outlets etc. Computers are used in such stores for:

  1. Stock control
  2. Transactions handling at the electronic point of sale terminals (EPOS)

 

Stock control

A computerised stock control system enables a user to manage his/her stock more efficiently. This system is used to track what is in stock and what needs reordering so as to reduce the risk of under stocking or overstocking. Overstocking ties up valuable space and capital that could have been used for other valuable items. On the other hand under stocking causes customer dissatisfaction.

 

Transactions handling at the electronic point of sale terminals

An electronic point- of -sale (EPOS) is a computer terminal used in retail stores to input and output data at the point where sales are transacted e.g. at the supermarket checkout counter. An EPOS terminal has all facilities of a normal cash register, but with additional direct data capture devices, e.g. bar code reader, card reader, a monitor and a receipt printer. In such retail stores, goods are identified by means of bar codes. For each item, a record is stored in secondary storage medium containing: the item number, item name or description, quantity in stock and the price.

Transactions at the point of sale terminal may involve the following steps:

  1. The bar code reader (wand) is passed over the items bar code. The bar code is automatically converted to the item number, e.g. 2160, which is read to the computer.
  2. Using this number, the computer searches for the item with a corresponding number in the products database.
  3. Once the record is found, its description and price lookup file is used for processing the sale.

The advantages of electronic point of sales terminal systems are:

  1. Correct prices are used at the checkout counter.
  2. Faster since the attendant does not have to enter details manually.

 

Reservation systems

Reservation systems are distributed networked systems that are used mainly to make bookings in areas such as airlines, hotels, car-rental, theatres etc. Bookings are made from a remote terminal connected to a centralised computer database. To access the database, a customer makes enquiries via the remote terminal connected to the central computer.

For example to make airline booking enquiries such as finding out the seats reservation a customer uses a remote terminal in the nearest booking office. The response is immediately available to the customer within a few seconds.

Such a computerised reservation system is referred to as online enquiry since an individual directly requests for information through a terminal from a central computer and receives an immediate response.

Educational systems

Initially most educational institutions used computers for administrative tasks such as compiling examinational reports, writing memos and accounting purposes. Computers are playing an increasingly important role in educational institutions in the following ways:

  1. Computer aided instruction (CAI)
  2. Computer aided learning (CAL)
  3. Electronic learning (e-Learning)
  4. Computer based simulation

 

Computer aided instruction (CAI)                                                             

Computer aided instruction refers to the use of a computer to learn, drill and practice particular educational principles. For example when learning a new concept in foreign language such as Japanese, the learner is presented with the explanation of the concept. The computer then presents questions from which the learner is to select the correct answer.

Some CAI programs present learning content in form of educational games, which makes learning more fun especially for young children. A good example is a typing tutor program. Figure 2.3 below is an onscreen illustration of a sample typing tutor program that teaches a person to learn typing skills.

 

Computer aided learning (CAL)

Another educational technique that uses computers is computer aided learning. Unlike computer aided instruction, which is meant to drill the learner, computer aided learning present’s educational materials the way a teacher does in a classroom. For example, the program may pose a question and depending on the learner’s performance, it may present new content or revisit the topic.

In order to make learning effective, most computer aided learning programs have clear graphical presentations such as video clips and voice for demonstrating or explaining difficult concepts.

Electronic learning (e-Learning)

In e-Learning, lessons and lectures are presented from a central site and the presentation is transmitted to remote conference terminals or displayed on TV screens. The learner can also access learning material on the internet, sit for online examinations and receive results the same way. Learners therefore do not need to go physically to a college.

Computer based simulation

Computer based simulation refers to the science of representing the behavior of a real-life situation by using computerised models. Simulation has become very popular in learning and training institutions. For example, in distant or e-Learning, where a learner is not in physical contact with a trainer, simulation software can be used to provide the learner with clear illustrations about a certain concept or skill.

Simulation programs are mostly used in educational areas where practical skills have to be learnt like training drivers, pilots, engineers etc. have to be instructed using a virtual environment.

 

Communication systems

Communication refers to the distribution of information or data from one person or location to another. Effective and efficient data communication is achieved by use of high-speed electronic devices such as computers, cell-phones, radios and television. This integration of computerised electronic devices and telecommunication infrastructure for the purpose of communication is referred to as information and communication technology (lCT). Therefore ICT not only refers to computers but also all other devices that are used for effective and efficient communication. Examples of communication systems are:

  1. Facsmile (Fax).
  2. Radio.
  3. Television set.
  4. Video conferencing.
  5. Telecommuting.
  6. Internet.

Facsmile (Fax)

A facsmile machine, in short a fax, is a telecommunication device used to send documents via telephone lines. A document is placed in the machine, scanned and converted into analog form then transmitted over the telephone line. The receiving fax machine converts the analog data into the original softcopy and prints a hardcopy.

To send fax over the Internet, a special modem, called a fax modem is attached to the sending and receiving computers. This eliminates the need for a stand alone fax machine.

 

Radio communication

Computers can be used in radio broadcasting stations to do the following:

  1. Record and manage radio programmes meant for broadcasting.
  2. Manage the radio transmission and track performance. Most transmissions equipment are computerized for easy troubleshooting and operation.
  3. Automate the running of the selected programmes.
  4. Create slides, simulated objects and sound effects when preparing electronic and printed media advertisements.
  5. Download information from Internet that can be used in preparing programmes such as international news.

Television sets

Television sets (TV) have become increasingly important in information and communication technology because they are much more available at homes and many places than computers. Data or information is transmitted via a TV channel the same way the channel is used to broadcast conversional TV programs. The most common types of data transmitted via TV include: teletext (ceefax) and videotex (view data).

 

Teletext

Teletext refers to a computerised service whereby news and other information are provided on television screens to subscribers. A TV is configured using a special add-on card or adapter. The subscriber can browse for information using a remote controlled device. However teletext is a one way communication (simplex) which means that the subscriber cannot communicate back to the service provider.

 

Videotex (view data)

Unlike teletext, videotex also known as view data is a two way communication service half duplex over a telephone line or cable television channel. A subscriber can interact with the service provider database and the information is displayed on a home TV screen. View data is used in reservation bookings, ordering for goods and services as well as sending electronic mails.

 

Video conferencing

Video conferencing refers to the use of computers, a digital video camera, audio capturing equipment and communication networks to enable people in different locations to see and talk to one another.

Each participant’s computer is attached with a video camera (camcorder), speakers and a microphone. With such devices and appropriate communication software, a person can participate in a virtual conference room. In such a room, all participants can see each other on the computer screen as if they were seated in a real conference room.

 

Video conferencing communication is popular in TV broadcasting stations where a field reporter interacts with newscasters. It is also popular in organisations where top managers in different geographical locations hold meeting via the Internet or the organistions intranet.

Telecommuting

Telecommuting is a term used to refer to a situation where an employee works usually at home using a computer connected to the workplace network. Telecommuting takes advantage of the growing communication networks to reduce unnecessary travel to the place of work. This in turn translates to reduced travel expenses and less stress due to commuting inconveniences such as traffic jams.

The Internet

The Internet has become one of the most popular means of information transfer and efficient communication. Some of the services available on the Internet are:

  1. World wide web (www).
  2. Electronic mail (e-mail).

 

World wide web (www)

World wide web refers to a collection of web pages, which may be made up of text, images, animations, sounds and video held on web servers. One can access the information using a computer or any other communication device such as a mobile phone. However, for a mobile phone to be used to access the Internet, it must have the wireless application protocol (WAP). A computer connected to the Internet or a WAP-enabled mobile phone allows the user to access a wide range of information such as news, entertainment, banking, reservations, business news, e-mails among others.

 

E-mail

This is a very fast and efficient means of sending and receiving messages, data, files or graphics. Once you subscribe for Internet services through a service provider, you can send or receive e-mails to or from anyone connected to the Internet using a computer or a WAP-enabled cellular phone.

 

Industrial system

The application of computer technology in industrial or manufacturing processes has become one of the most effective methods of automated production. This has resulted in tremendous improvement in productivity.

 

Industrial plants such as motor vehicle manufacturers, chemical plants, refineries and mining plants use computer systems in a number of ways. Some include:

  1. Computer aided design and manufacturing.
  2. Simulation.
  3. Process control.

 

Computer aided design/computer aided manufacturing

Computer aided design Computer aided manufacturing (CAD/CAM) is an integrated system that allows products that have been designed using design application Software, to be transmitted into an automated manufacturing system for the product to be manufactured as per the computer model. For example design of motor vehicle brake pads involves designing the model using computer aided design software then feeding it to an automated machine which engineers the required shape and dimensions as per the specifications. One application of computer aided manufacturing is the use of robots to carry out assembly line operations. A robot is a computer controlled device that emulates a human being in carrying out operations that would otherwise be hazardous, repetitive and boring to a human being. Such operations may include welding, lifting heavy objects; spray painting of vehicle bodies, removing red-hot materials from furnaces etc.

Industrial simulation

Simulation allows some activities that would otherwise be expensive and dangerous in real life situation to be put under test. For example, a car or plane crash test simulation is the use of a virtual model on the computer screen that attempts to represent the real situation or object. This enables the manufacturers identify the weaknesses of the real situation or object hence put the correct reinforcement to their designs. E.g. motor vehicle seat belts can be tested for their effectiveness in case of a car crash using a computer model. The general name of using computer models in such circumstances is known as non­ destructive testing (NDT).

 

Process control

Computerised process control refers to the use of a computer system to control an ongoing physical process especially in manufacturing. Such process controls may include regulating temperature, pressure, fluid flow etc. Computerised process control is mostly used in petroleum refineries, chemical plants and other manufacturing companies to manage machine intensive processes.

 

Scientific and research systems

Computers have a wide variety of applications in science, research and technology. Some of which are:

  1. Weather forecasting.
  2. Medical research.
  3. Military and space exploration science.

Weather forecasting

Modern weather forecasting techniques have been automated using computerised systems; hence weather predictions are more accurate and reliable. Due to the large volume of data collected from rainfall, air pressure, humidity, temperature, wind speed and cloud cover, computers help in analysing, processing and predicting weather patterns using such data.

Another application of computers in weather forecasting is the use of geographical information system (GIS) and the geographical positioning system (GPS). This system represents geographical data in graphical form by positioning and superimposing it on the world map. Geographical information system is used to represent data on weather patterns in a clearer and coherent manner on a world map. Similarly, the path of storms can be accurately tracked and predicted. Such information is very important for the aviation industry and many other sectors of the economy.

 

Medical research

In health sciences, health professionals use computer technology for diagnosis, keeping patients’ records, inventory control etc. Computers are now being used to control devices that help to care for the handicapped such as the deaf, blind, bed ridden etc. In some health institutions, a more specialised computer system referred to as an expert system may be in use. An expert system is an interactive system that generates conclusions from captured data by comparing it with a set of rules held in a database called a knowledge base. The system emulates the reasoning of a human expert in a narrow field of specialisation. Expert systems have been developed to help medical professionals diagnose illnesses more accurately in the absence of human experts.

 

Military and space exploration science

The dynamic growth in military, space science and exploration would not be a reality today were it not for computer technology. Space exploration and military research bodies such as America’s national aeronautics and space administration (NASA) make extensive use of computer systems, for research, design, development and control of unmanned spaceships, aeroplanes and missiles.

 

Library systems

Libraries use computerised systems for a number of tasks. Examples are:

  1. Lending system
  2. Inventory control system.
  3. Cataloguing system.

 

Lending system

The library lending system manages the issuance and return of borrowed reading materials. Books, magazines, journals, reports etc. are given unique identification numbers or codes. Once a member borrows a book, his/her details are recorded. When the book is returned the borrower’s record is updated to reflect the new status.

 

Inventory control

This involves use of computers to manage stock, which includes checking for books currently in the shelves and those on high demand for the purpose of adding more. Similarly, books that have become obsolete can be retired to the archives.

 

Cataloguing

A catalogue is a collection of cards with information about each book or reference materials found in the library. These cards may be kept in a drawer sorted in alphabetic order either by title or author name. To enhance service delivery and efficiency, computerised cataloguing has replaced the manual cards catalogue. This electronic catalogue is updated constantly when new reference materials are acquired.

 

Entertainment systems

The advancement in multimedia technology has produced computers that can be used in recreational and entertainment. Some application areas of computers in recreation and entertainment include:

  1. Games
  2. Music and video

 

Games

Games have come a long way from the simple solitaire to modem simulated 3D games. Digital video disks (DVDs) and three-dimensional (3D) multimedia games are now possible on personal computers. There are computer games that simulate sports such as driving, war combat etc. such games gives the player maximum pleasure in a virtual environment on the screen.

 

Although some games can be played using other accessories e.g. on the TV screen using a game console, such games have been developed using computers.

 

Music and video

Video compact discs (VCD) and digital video discs (DVD) have become a common feature in the entertainment industry.

 

In music industry, computers are used in recording, synthesizing, editing and adding special effects to music.

In video industry, computers are used to produce highly simulated and animated movies, generate scenes and actors. Some movies use a lot of computer generated images that make the movie interesting.

 

Transportation systems

Computers play an increasingly important role in transportation industry in areas such as:

  1. Automobile traffic control
  2. Air traffic control

 

Automobile traffic control

In busy towns where there are round about and road junctions, you will mostly find traffic control lights. These lights control both human and motor vehicle traffic using the three lighting system i.e. green, red and amber. These lights are either controlled using a small clock switch or a computer system. The clock switches the lights at regular intervals. However, some clock controllers are intelligent enough to vary the frequency of light change according to traffic direction and volume during rush hours. Computerised traffic light systems have sensor pads laid underneath the road which detect the pattern of the traffic flow. The collected data is sent to a computer system which detects and analyses the traffic flow and builds up a simulated image of the actual scene. Control signals can then be output to the traffic lights or motorists through their receiver devices to vary  the light timings or redirect traffic to less busy roads.

 

Air traffic control

Computers are used to monitor air traffic movement, take off and landing of crafts. This has helped minimise human control errors and mistakes I that could result from human controlled systems. The computer technology used to direct aircrafts to follow the shortest path between two locations is known as geographical positioning system (GPS).

 

Shipping control

Computers are widely used to control and guide the paths taken by spaceships and water vessels as they travel to distant lands. The geographical positioning system is also used in shipping control.

Home use

Because microcomputers are nowadays affordable, most people are using computers at home for preparing domestic budgets, entertainment, research and teaching children on educational concepts.

 

Office expert systems

This is an information system usually developed and installed in the office of a human expert or knowledge worker. A knowledge worker is a person in any field who is formally trained to apply a specific set of knowledge in his work. Such as a system is capable of simulating the decision making process and intelligent problem solution just like a human expert. It also has a set of rules that help it to make conclusions when some parameters are entered.

Marketing

Without proper marketing, a business cannot survive in a competitive environment; hence computers are being used in a number of ways to enhance marketing. These include:

  1. Electronic commerce or e-business
  2. Electronic presentations
  3. Advertising

 

Electronic commerce/e-business

E-commerce is a new way of doing business where the transactions are carried out electronically without physical interaction between the seller and buyer. For example a customer may decide to buy an item through the Internet by visiting the supplier’s web site, selecting the item and placing it in a virtual shopping tray. The website tracks the whole session as the customer chooses various items and calculates the total bill. Payment is then made through a cheque, credit card or through electronic funds transfer. Once the payment is made, the item is shipped to the customer.

This method of trade has enabled people to do business without much movement hence saving money and time.

 

Electronic presentation

Using computers, marketing agents can create exciting presentations concerning the products of a business and present them to the audience using presentation software. Electronic presentation adds value to traditional marketing techniques because they are attractive.

 

Advertising

Using simulation, presentation and animation software, it is possible to design catchy advert materials and video clips. Such materials can then be displayed on billboards, broadcasted over a television or placed on the Internet.

 

Virtual or artificial reality

The term virtual reality (VR) or artificial reality refers to a condition in which a person becomes psychologically immersed in an artificial environment generated by a computer system. Other terms used instead of virtual reality are cyberspace, virtual worlds and virtual environment. To achieve this effect, the following interactive sensory equipment are used:

  1. Head mounted display/headgear
  2. Gloves
  3. Body suit
  4. Virtual reality software

 

Head mounted display (HMD)/headgear

A headgear is made up of two tiny display screens and sound systems that channel images and sound from the source to the eyes and ears thus presenting a stereo three dimensional sound effect in the virtual world. The wearer of the headgear is able to look around in the virtual environment.

A boom is an alternative to the often-uncomfortable head gear. Screen, optical and sound systems are housed in a box. The user looks into the box through the two screens to see the virtual world.

Gloves

Gloves worn on the hands allow the user to navigate through the virtual world and interact with virtual objects. The gloves have sensors that collect data about the movement of the hands and relay the data into the system. They give the wearer a sense of touch in the virtual world.

Body suit

A body suit, worn during virtual reality session is made up of conductor wires wound in a rubber suit. The wires sense the body movement and relay the data into the virtual reality system which in turn adjusts the position of the user in the virtual reality world.

 

Virtual reality software

Virtual reality software such as body electric gives the wearer of the sensory devices an interactive virtual sensory experience that makes him/her feel as if he/she is in a real  world. The software is responsible for simulation of all the aspects of the virtual reality world.

 

Application of virtual reality

Virtual reality is used to represent any three dimensional object or ideas that are either real or abstract.

 

Real objects include buildings, landscapes, underwater shipwrecks, spacecrafts, human anatomy, sculptures, crime scene reconstruction, solar system etc. For example, a house can be simulated before the actual building is physically set up. A client can be allowed to virtually move through the house, pull drawers and touch objects all in a computer generated environment

Other applications of virtual reality include entertainment, training in areas such as medicine, military, equipment operations, education, design evaluation, prototyping, simulation and assembly of sequences, assistance to the handicapped etc.

 

Law enforcement systems

Today, crime has become very sophisticated hence very difficult to deal with. Since immediate and accurate information is very crucial in crime detection, biometric analysis using computers is becoming a preferred tool in this area. Biometric analysis refers to the study, measurement and analysis of human biological characteristics. Biometric devices attached to a computer are used to identify people by recognising one or more specific attributes such as fingerprints, voice, lips, facial features like iris colour etc. Some of the devices that can be used here are video cameras and biometric scanners.

 

Field work report

Visit one of the information and communication technology (ICT) application areas discussed in this chapter and write a detailed report of about five pages on the use of computers in the area. The report should include the following:

  1. Title page
  2. Table of contents
  3. Introduction
  4. A detailed description of information and communication technology implementation in the area of field work study
  5. Conclusion

 

IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON SOCI ETY

 

Chapter outline

 

3.1 Introduction

3.2 Issues resulting from the use of information and communication technology

3.3 Evolution of computer systems

 

Introduction

This era of information and communication technology (ICT) continues to influence our lifestyle both positively and negatively. This chapter seeks to explain some of the issues that result from the use of ICT in the society.

 

Issues resulting from the use of ICT

The use of ICT offers a different set of opportunities and challenges in our society. Some of the effects of ICT in our society are:

  1. Effects on employment.
  2. Effects on automated production.
  3. Issues of workers’ health.
  4. Cultural effects.
  5. Breakthroughs in ICT.

 

Effects on employment

The introductions of computers in the workplace have resulted in creation of new jobs, replacement of computer illiterate workers and displacement of jobs that were formerly manual.

 

Job creation

ICT has introduced new employment opportunities that never existed before. The use of computers in financial institutions, reservation systems, educational institutions, communications etc. has created new job titles such as computer operators, programmers, network administrators, information technology or infof?1ation science managers, database administrators, software developers, system analysts etc.

 

Job replacement

Since the introduction of ICT in workplaces, some clerical and repetitive tasks that required a large number of employees have been made redundant. Computer illiterate people have been replaced with those who have the desired computer skills. The question in the mind of workers and managers is whether computers will in future take over all the work currently being done manually by human workers.

 

Displacement

Unlike in replacement where an employee may lose the job, in displacement an employee is moved to another place or department where computer skills are not required. For example, a clerk may end up being an office messenger if computers are introduced at the workplace and such a person is not willing to acquire new skills of using the computerised system.

 

However, to avoid losing competent employees, most employers organise in-service training for their employees on regular basis in order to help them keep up with the rapid changes in ICT.

 

Automated production

A number of manufacturing industries such as vehicle assembly plants, oil refineries and food processing companies are using computers to automate their processes with an aim of increasing production. Computer controlled robots and assembly lines are a common feature in manufacturing industries.

The advantages of using automated production are:

  1. Increased efficiency due to the balancing of workload and production capacity.
  2. Improved customer service. Adequate and high quality goods are produced in time.
  3. Efficient utilisation of resources such as raw materials, personnel and equipment hence less operating expenses are incurred.

However, automated production has its disadvantages too. These are:

  1. High initial cost of setting up 1an automated system. For example, the cost of buying one industrial robot is high compared to employing human resource.
  2. Automated production may lead to unemployment in some areas that are labour intensive. For example, what would have been done by thirty people may be done by one person using a machine.

 

Issues of workers’ health

The use of information and communication technology (ICT) and computers has some effect on our health. Some of the negative effects of ICT on our health include repetitive strain injuries, eye strain and headaches, electromagnetic emissions and environmental issues.

 

Repetitive strain injuries (RSI)

These are injuries resulting from wrist, hand, arm and muscle strain, tendonitis and neck strains due to forced repetitive movement e.g. when entering data using the keyboard. The cure for repetitive strain injuries is resting, sitting in a relaxed position and changing typing techniques.

 

Eye strain and headaches

Since computer users have their eyes at cross range with the monitor, there is danger of developing what is called computer vision syndrome (CYS). The syndrome is characterised by eye strain, headaches, double vision and other problems caused by the improper use of the monitors. The solution to this problem is to use monitors with good resolution and fitted with an antiglare screen that filters excess light. A computer user at all times must adjust the brightness of the screen to the intensity that is comfortable to the eyes.

 

Electromagnetic emissions

Electromagnetic field emissions are waves of electrical and magnetic energy that are emitted by current carrying conductors. Computer users are advised to use low emission devices in order to avoid exposing themselves to excess emissions.

 

Environment issues

Some of the environmental effects of information and communication technology include energy consumption and radiation, pollution, paper consumption and disposal.

 

Energy consumption and radiation

Initially computers consumed a lot of energy thereby generating a lot of heat and emitting electromagnetic radiations. However in recent years, the Environmental Protection agency (EPA) launched energy star policy to encourage minimal use of power by electronic devices. Electronic devices have to be energy star compliant to be recognised under this policy. You can tell whether your computer complies to EPA if it displays the star during boot up

 

Environmental pollution

Information technology has also contributed to environmental pollution. For example, huge garbage dumps of dead computer parts, printers, ink toner cartridges, monitors and other computer accessories are disposed in landfills hence causing environmental pollution. There has been concern on the disposal of Nickel Cadmium laptop batteries that contain toxic cadmium which when buried in a landfill can leak into underground water tables and catchments areas.

 

Cultural effects

The rapid growth of information technology does not only provide us with different ways of working, playing and thinking but also presents challenges to our moral and cultural values. It is the moral standards that help in guiding human behavior. Information and communication technology has changed the way we talk, affected our privacy, human rights and integrity. For example Internet users are exposed to a form of communication called flaming. Flaming is writing on-line messages that use derogatory, obscene or of dirty language. Also through the Internet, one can view pornographic materials that affect moral values negatively. These free flows of immoral information have negatively influenced the behaviour of both the young and old in the society.

Computer related crimes such as hacking, eavesdropping, piracy are on the increase. This has been accelerated by the free for all Internets. Therefore, a lot has to be done to improve on privacy and security of information.

To some extent, people with eroded integrity have used computers as a tool to accomplish their vices. Take for example where a person would use a computer to forge certificates, passport and other documents. This means that the person is cheating and therefore his/her moral integrity has been compromised.

However, ICT has its advantages too especially where it has been used as a campaign platform against diseases like AIDS and drug abuse.

 

Breakthroughs in information and communication technology

As explained in the previous chapter, there has been a lot of breakthroughs in the fields of health care, education, communication, research, commerce, art and design, entertainment, transport since the inception of ICT . These breakthroughs have greatly changed our lifestyles such that it is hard to imagine how life would be today if information and communication technology is to be withdrawn.

 

Evolution of computer systems

The rapid evolution of computers and information technology has a lot of promise. It has always been fashionable for scholars and technologists to look out into the future and to try and predict the events of tomorrow. Future trends in information and communication technology will be characterised by:

  1. Rapid evolution in computer hardware and software.
  2. Artificial intelligence.
  3. Expanded information superhighway.

 

Rapid evolution in computer hardware and software

Since the introduction of computers in the business world in the 1950s, a lot of technological improvements have been made both in hardware and software. The silicon revolution has seen rapid increase in microprocessor speeds and capabilities due to advanced research in the semi-conductor industry. Future trends will see reduction in size and cost of components but increase in capability. The capacity of computer memory is becoming larger and larger with reduced physical size and cost. Microprocessors of a thumb’s size can now execute instructions in a trillionth of a second hence leading to emergence of smaller but smart devices.

Artificial intelligence (AI)

Artificial intelligence can be defined as a branch of computer science that is concerned with the development of machines that emulate human­like qualities such as learning, reasoning, communicating, seeing and hearing. The idea of artificial intelligence developed from a need to develop computer programs that would even challenge human beings in playing games such as chess and scrabble! Computer scientists and engineers are still working hard and carrying out intensive research with the aim of coming up with smarter computers which can almost simulate human thinking and learning, instead of relying on static programmed instructions.

However artificial intelligence is still in its infancy stage and scientists are still working hard to make it a reality in the near future.

There are four main application areas of artificial intelligence namely:

  1. Expert systems.
  2. Natural language processing.
  3. Artificial neural networks.
  4. Robotics/perception systems.

Expert systems

This is software designed to make a computer operate at the level of a human expert in a specific narrow area of specialisation. Such software simulates the reasoning process of experts in certain well defined areas such as medical diagnosis, financial forecasting etc. An expert system consists of three components namely:

Knowledge base: This is the expert system’s database of knowledge about a particular subject. It contains relevant facts, beliefs, assumptions and procedures for solving a particular problem.

Inference engine: This is the software that controls the search for knowledge in the knowledge base and produces conclusions. It takes the problem posed by the user and seeks to analyse it in order to arrive at a conclusion.

User interface: This is the display screen that enables the user interact with the system.

An example of an expert system is MYCIN developed at Stanford University, USA. MYCIN is used in diagnosis of blood and meningitis infections. Another application area of expert systems is in predicting mineral deposits in a particular geographical area by analysing composition of soil samples.

Natural language processing

Natural languages are ordinary human languages such as Kiswahili, English, French etc. The problem of natural languages is that they are ambiguous and may be interpreted differently by different people. For example the word ‘sack’ has two meanings i.e. “a type of bag” and “the act of dismissing a worker from gainful employment”. Computer languages on the other hand are clearly defined.

 

Natural language processing is aimed at coming up with programming languages that would make computers recognise and understand natural languages, whether spoken or written. Currently there are voice recognition input devices and voice synthesisers are available but are limited to just a few vocabularies. However, before using them, the computer program must be trained to recognise the voice and the pronunciation of words by the user.

Artificial neural networks

The artificial neural network is the use of electronic devices and software to emulate the neurological structure of the human brain. The idea is to try and emulate the cognitive learning process of the human brain and how it recognises patterns. The human brain works by receiving signals from special sensory cells called neurons. When the neurons receive information, they either excite the cell to send a signal to the brain or not. Artificial neurodes in artificial networks work in similar manner by perceiving environmental stimuli and hence deciding whether to pass it on to the system or not.

The essential attributes of artificial neural networks are:

  1. The neurodes can be trained to distinguish between what constitutes a signal and what does not.
  2. They are capable of recognising patterns in large amount of data that are too complex for the human brain. From these patterns, they can make predictions and point out anomalies. For example, in banking the pattern of credit card usage can be tracked over time to try and generalise spending patterns of individual card owners. In case of loss or theft, the bank can notice the change of spending pattern and conclude that the card is in the wrong hands, hence take appropriate security measures even before loss of the card is reported.

Robotics

A robot is a computer controlled device that emulates a human being in carrying out tasks that would otherwise be dangerous and difficult. Although robots are being used in workplaces research is going on in order to come up with robots that will incorporate perception systems.

Perception systems are sensing devices that emulate the five common senses of a human being i.e. sight, hearing, touch, smell and taste. Such devices would operate under the control of a microprocessor. This development will give robots artificial senses. Such artificial senses include feeling the shape of an object, listening to ultrasound; detecting smell of a leaking gas or chemicals tasting food is quality and seeing using two miniature video cameras

Expanded information superhighway

Expanded information superhighway involves the integration of cabled and wireless technologies for the purpose of data and information transmission. In line with advancement in the other areas of information and communication technology, there is vast increase in throughput of various transmission media like fiber optic and wireless technologies. Scientists have demonstrated a fiber optic cable whose diameter is the size of a single strand of hair which is capable of carrying a trillion bit per second

Internet is growing tremendously causing what is generally referred to as a growth of the information superhighway to digital explosion or hurricane.

 

CAREER OPPORTUNITIES IN INFORMATION AND COMMUNICATION TECHNOLOGY

 

Chapter outline

 

4.1 Introduction

4.2 Description of career opportunities in information and communication technology

4.3 Further educational opportunities in information and communication technology

 

Introduction

 

The era of computers and automated information and communication technology has brought both blessings and disappointments in the workplace. Some people have acquired very well paying jobs while others have lost theirs. For example an ordinary typist has been replaced by one who can create documents using a computer. Many new jobs have been created in areas like banking, manufacturing, educational institutions, communication and other service industries.

 

Description of career opportunities in the field of ICT

Information and communication technology (ICT) has created new job titles such as computer operators, computer technicians, system analysts, computer programmers, software engineers, computer engineers, information systems manager, data base administrator, computer trainer, website administrators, computer graphics designers and network administrators. This section explains some responsibilities of these professionals who are generally called information technology workers.

 

Computer operator

Some of the responsibilities of a computer operator include:

  1. Entering data into the computer for processing.
  2. Keeping up-to-date records (log files) of all information processing activities.

 

Computer technician

Given that computers require regular maintenance, upgrading as well as emergency repairs, demand for computer technicians continues to grow as more and more people computerise their workplaces and homes.

Some of the responsibilities of a computer technician are:

  1. Troubleshooting computer hardware and software related problems.
  2. Assembling and upgrading computers and their components.
  3. Ensuring that all computer related accessories such as printers, modems, storage media and devices are in good working condition.
  4. In developed countries, technicians help hardware engineers in designing and creating some computer components such as storage devices, motherboards etc.

System analyst

This is a person who is responsible for analysing a company’s needs or problems then designs and develops a computer based information system. A good system analyst is one who has at least the following attributes:

  1. Good problem solving skills and creativity i.e. must have wide experience in solving problems.
  2. Good communication skills: The analyst must be able to communicate clearly and precisely both in writing and in speech. He/she must be able to talk to different groups of people e.g. managers, operators, attendant and general public.
  3. Must have business knowledge: The analyst must clearly understand the environment for which the system is being developed.
  4. Technical knowledge: A system analyst must be well trained in relevant areas of computer science such as hardware, software and programming knowledge.

Some of the responsibilities of a system analyst include:

(a) Reviewing the current manual or redundant information system and making recommendations on how to replace it with a more efficient one.

(b) Working with programmers to construct and test the system.

(c) Coordinating training for users of the new system.

 

Computer programmer

Large organisations such as insurance companies, banks, manufacturing firms and government agencies hire programmers to work together with system analysts in order to:

  1. Write in-house application programs or system programs.
  2. Customise commercial application packages to suite the organisations needs.
  3. Test, debug, install and maintain programs developed or customised for the organization.

Software engineer

A software engineer is one who is skilled in software development and technical operation of computer hardware. Some of the responsibilities of the software engineers are:

  1. Developing system and application software.
  2. Developing user and technical documentations for the new software.
  3. Maintaining and updating the software to meet day-to-day requirements while overcoming challenges.

 

Computer engineer

Computer and electronic engineers are coming up with new and more efficient technologies in information and communication technology almost daily. Since computers are electronic devices, hardware designers must be good in electronic engineering in order to be able to:

  1. Design and develop computer components such as storage devices, motherboards and other electronic components.
  2. Determine the electrical power requirement of each computer component:
  3. Re-engineer computer components to enhance its functionality and efficiency.
  4. Design and develop engineering and manufacturing computer controlled devices such as robots.

 

Information system manager

The information system manager controls, plans, staffs, schedules and monitors all the activities of the ICT department in the organization. Using computerised management information system (MIS), the manager can test the impact that an alternative course of action might have on the business.

Other responsibilities of an information system manager include:

  1. making sure that all tasks in the IT department are done correctly and on time in order to support business planning, control and decision making processes.
  2. Preparing budgets for the department.
  3. Keeping the department inventory records up-to-date.
  4. Managing the human resource within the department.

Database administrator (DBA)

The major purpose of computerising organisations or institutions is to store data in an organised way for easy access, retrieval and update. The organization requires a person who should be responsible for updating records in an information system database. For this reason, a database administrator is responsible for:

  1. Designing and developing database applications for the organization.
  2. Setting up security measures needed to control access to data and information.
  3. Keeping the database up-to-date by adding new records, modifying or deleting unnecessary records.

Computer trainer

Due to the dynamic nature of computers and information technology, there is a high demand for qualified ICT trainers. Some of the responsibilities of an ICT trainer are:

  1. Training people on how to use a computer and various application programs.
  2. Developing training reference materials.
  3. Guide learners on how to acquire knowledge through carrying out research.
  4. Advising the learners on the best career opportunities in the broad field of ICT.
  5. Preparing learners for ICT examinations.

 

Web administrator/webmaster

Internet is one of the areas of information and communication technology that has drawn the interest of most people. Thus people are able to exchange messages, search for information and do business through the Internet.

Business organisations, educational institutions and individuals put information on the Internet by developing websites. Most organisations hire the services of a web developer who is given the role of the company’s web administrator also referred to as a webmaster. A web administrator is responsible for:

  1. Developing and testing websites.
  2. Maintaining, updating and modifying information on the web site to meet new demands by the users.
  3. Monitoring the access and use of internet connection by enforcing security measures.
  4. Downloading information needed by an organization or institution from Internet websites.

Computer graphics designers and typesetters

In publishing skilled graphics designers and typesetters are required in order to design graphical objects and professional publications. Such people may get employed in publishing houses to typeset books, newspapers and magazines.

Self-employment

Self employment can be achieved by using computers or other ICT devices such as mobile phones to start bureau services, Internet services, consultancy services and computer hardware and software vendor business.

Network administrator

A network administrator is a specialist whose responsibilities are to:

  1. Set-up a computer network.
  2. Maintain and enforce security measures on the network.
  3. Monitor the use of network resources.
  4. Maintain and troubleshoot network related problems.

Computer sales representatives

Computer sales representative should have good knowledge in information and communication technology. This would helps them to analyse customer needs and advice them accordingly. A good computer salesman needs to be self confident, persuasive and proficient in business communication.

Further educational opportunities in ICT

Most computer related educational opportunities offered at post-secondary level are relatively new and dynamic in nature compared to other disciplines. It is therefore difficult for most institutions that offer ICT courses to update their ICT curricula in order to accommodate these rapid changes. These changes also make it difficult for aspiring ICT professionals to identify the best career opportunities and training institutions. ICT courses are offered in the following tertiary institutions:

  1. Universities
  2. Polytechnics
  3. Colleges

 

Universities

A university is considered as the highest institution in formal education. In most countries, universities are categorised into two major groups’ namely public and private universities.

Public universities

Public universities are established by the state through the award of a charter and are run by a state appointed management team. However, current trends in educational management point to the fact that even state universities should be allowed to operate in an autonomous manner. Admission to such a university is controlled by either the state or a recognised body. However, most universities in developed countries do their own independent admissions.

 

Private universities

Private universities are self-sponsored institutions set up by individuals, churches or any other organization. Such universities are privately run and students’ enrolment depends on whether the student is capable of sponsoring himself/herself. However, for these universities to operate they must be registered or accredited by the commission of higher education or any other quality assurance body that is recognised worldwide. Accreditation leads to public acceptance and confirmation evidenced by the grant of charters by the state or accrediting bodies.

Universities are authorised to offer approved diploma, undergraduate and postgraduate programmes. Some of the ICT related degree programs offered at university level courses include Bachelor of Science in computer science, Bachelor of Information Technology/Systems, Bachelor of Science in Computer Engineering etc.

 

Research institutions

Although for a long time universities have been considered as centers for research and excellence, other specialised research institutions that concentrate on narrow fields of study such as computer or ICT technology, agriculture and space science exist. There is a lot of research being undertaken in the field of computing such as artificial intelligence. It is possible to enroll in such institutions as a research trainee.

Polytechnics

These are institutions of higher learning that mostly offer diploma and certificate courses’ in technical fields such as ICT, mechanics, food production etc. A polytechnic may also be accredited by a university or the state to offer degree programmes.

Some of the ICT courses offered at polytechnic level are diploma and certificate in computer studies, computer repair and assembly, computer operator, management information system etc.

Colleges

Just like the polytechnics, middle level colleges offer diploma, certificate and craft courses in many disciplines such as technical, ICT, teacher training, business management etc.

Most public and private colleges are now offering ICT related courses both at certificate and diploma level.

The most important consideration to make before you join a college to pursue an ICT course is:

  1. Whether it offers ICT courses recognised both locally and internationally.
  2. The cost of training with such an institution.

 

DEVELOPING A PROJECT USING MICROSOFT ACCESS DATABASE

Chapter outline

5.1 Introduction

5.2 Preamble

5.3 Identification and definition of the problem

5.4 Fact-finding

5.5 System design phase

5.6 Constructing Bukuma information system

  1. 7 Database security and startup options

5.8 Testing and implementing the system

5.9 Sample user manual

5.10 Project appendix

5.11 Bibliography

5.1

Introduction

In this chapter, we undertake a case study entitled Bukuma information system. The objective of this case study is to help the student apply the system development techniques learnt in Form 3. We shall address each step that is required in developing a working information system.

5.2 . Preamble

Due to your expertise and experience in system development, you have been hired to be the head of Information Technology (IT) at Bukuma Limited, a company that runs a supermarket. Your first task is to develop a computer based information system that would ensure that:

  1. Stock control and monitoring is efficient and effective.
  2. Customers’ orders are processed accurately within the shortest time possible and invoices sent in time.
  3. Purchase orders are processed accurately in time t~ avoid delays in items delivery.
  4. Data entry screens or forms are easy to use hence eliminating data entry errors.
  5. On-demand reports by the management are generated within the shortest time possible. 6. Communication between the branches is efficient.
  6. Company data and information is secure from unauthorised users and only certain company employees can access certain reports.
  7. The overall operating cost is reduced by at least 40%.

By the end of this case study, we shall have demonstrated how to:

  1. Carry out the initial study.
  2. Carry out fact finding.
  3. Define system hardware and software requirements.
  4. Design a system using system and program flowcharts.
  5. Construct a system that would allow:

(a) Inputting of data through forms.

(b) Updating, modification, deletion of existing data.

(c) Carrying out of input validation and integrity checks.

(d) Search or filter specific records, query and retrieve specific records.

(e) Generate various transaction reports.

(f) Set up database security, menus and other startup options.

  1. A sample user manual has been provided to help the student identify some components of a good user manual.

Identification and definition of the problem

The problem at hand is to develop a computer based transaction processing system (TPS) that would capture and process data about business transactions. The system should also do data maintenance i.e.

provide for ability to update stored data. Some features of this system include:

  1. Input data collected from transactions products, orders etc.
  2. Output in the form of invoices, pay vouchers etc.
  3. The system is also supposed to produce a variety of reports that are to be used for managerial purposes. Such reports include inventory levels, sales reports, payroll, expenses etc.

Reports produced by the system can be classified according to purpose. These are:

  1. Summary reports – Shows totals and trends such as total sales by category.
  2. Track stock levels and automatically alert the purchases department when restocking is necessary.
  3. Produce monthly product sales and purchases reports.

In a nutshell, the following project charter outlines the objectives, preliminary investigation report and other pertinent issues that will be considered before embarking on system development:

 

Project charter for Bukuma information system

BUKUMA DISTRIBUTORS LTD.

             lndustrial area, Funzi Road Box 30307, NairobiKenya

Phone: 257- 020655147 Fax: 02065551418

Computerised transaction

Processing and stock control system

Project name: Bukuma computerised information system

Team leader: Jane Okindia, System analyst

Project objectives

The project development team will develop new computerised information system tl1at will support the operations of the company in order to realise the strategic vision for Bukuma products sales and delivery of customer services. It’s anticipated that the new system will provide highly integrated processes and. services that will not only reach out directly to customers and suppliers but also increase internal operational efficiency.

Therefore, improvement to the current system can result in a number of benefits. These include:

  1. Improving corporate profits by 10% through reduction of bouncing orders.
  2. Ensuring improved customer services by efficiently managing stock levels.
  3. Improved employee’s morale due to better processing and operations management.
  4. Improved internal decision support so that decisions are more reliable and made on time.
  5. Support the competitive strategy of the business.

Preliminary investigation

preliminary investigation and feasibility study of the current manual system and the proposed was done through:

  1. Studying the organisational chart.

 

  1. Quantifying work output against performance criteria.
  2. Observing the behaviour of the employees.
  3. Listening to external feedback from vendors, customers and suppliers.

By going through the investigative process, the team discovered the following problems with the current manual system.

  1. The constantly changing products presented to the market have created numerous internal inefficiencies and customer service problems.
  2. Increased customer base and sales through aggressive advertising may overload the current system’s ability to process transactions.
  3. Unpaid orders have increased from 4%, only two years ago, to 12%. The current credit management system has to be improved.
  4. Suppliers who have failed to deliver as per contracts have increased by 17% due to poor procurement procedures.
  5. Competition from other companies threatens the survival of the company unless there is a change in management strategies.
  6. Many orders are bouncing due to poor stock control. The orders that bounce are not given priority when new stock arrives.
  7. The management is not exploiting the Internet as a marketing and service delivery channel.

Scope of the system

The proposed computerised system will support the following internal business functions:

  1. Sales and customer order transaction processing.
  2. Inventory control and procurement processing.

Team vision

The strategic information management team has come up with the following recommendations for the new system.

  1. Adoption of automated data capture technology and methods e.g. using bar-coding as a means of capturing product stock records and sales, which is an automatic identification system currently being implemented in many modem business organisations.
  2. Triple the order processing capacity of the unit by the end of fiscal year.
  3. Reduce order response time by 50% by the end of fiscal year.
  4. Rethink any underlying business processes, procedures and policies that have any visible impact on member satisfaction and complaints.
  5. Provide improved marketing and promotion programs.
  6. Provide improved follow-up mechanisms for orders and backorders.

Feasibility of the proposed system

The feasibility analysis of the proposed system centered on the following:

Feasibility report

  1. Schedule: The system would take 9 months to develop.
  2. The technology required to develop the new system is readily available in the market.

.

  1. The system users are happy with the proposal to develop the new system.

Cost benefit analysis

(a) Costs: The entire development and operational costs can be estimated as follows:

(i) Development – Kshs 20 000 000

(ii) Monthly operational costs – Kshs 1 000000

(iii) Total lifetime of the new system – 5 years

Total lifetime costs = 20 000 000 + (12 x 1 000 000) x 5

= Kshs 80 000 000

(b) Benefits:

(i) Profit from increased sales per month – Kshs 100 000 000 (ii) Savings from introduction of paperless mail

Kshs 1 000 000

(iii) Savings from reduced travelling costs – Kshs 20000000

Total monthly benefits.                                   Kshs 121 000000

Total lifetime benefits = Kshs (121 000000 x 12 x 5) = Kshs 7 260 000 000

Conclusion

The development of the new system is cost effective and beneficial to the company because lifetime benefits greatly outweigh the costs.

 

Team resolutions

In order to develop the system within the shortest time possible, the team made the following resolutions:

  1. The team will hold weekly status meetings, chaired by the project manager (system analyst). All project status meetings minutes and reports will be shared with management and all IT directors.
  2. Team members will be communicating through e-mails, dialogue and written memos to keep in touch on project development.

Conclusion

This report is intended to help the management to make decisions about undertaking the project.

Although the system seems expensive it will contribute positively towards corporate objectives when implemented in the future. Its benefits will outdo the costs by billions of shillings throughout its operational lifetime.

Thanks.

Jane Okindia System analyst.

 

Fact finding

The management has responded and given the system development team an okay to start developing the information system. The next task now is

to discover user requirements of the new system through collection of facts. The members have been given the responsibility to carry out a detailed fact finding activity through the following:

  1. Documentations study.
  2. Interviews.
  3. Observation.
  4. Questionnaires.

Documentions study

A number of manual documents were analysed. These include products catalogue, invoices, purchase orders, sales reports etc.

Interviews

Various interviews were conducted which involved the management, employees in the company, customers and suppliers. For each of the interviewee an interview guide was used. Figure 5.1 shows a sample interview guide used with one of the staff at Bukuma distributors.

Interviewee.name.’ Interviewer
Date:.      
Time: .  
       
Subject.;    
     
Time Interviewer Interviewee
Allocated Question or Objective Response
I to 2 min. Objective

Open the interview:

-introduce ourselves

.. Thank Mr.&&&for his valuable time

State the purpose of the interview- to obtain an existing

credit..checking.policies.

 
   
   
   
   
   
5min Question. I

What conditions determine whether a customer’s order is approved for delivery?

Follow-up

 
   
   
   
5inin Question 2

What are the possible actions that might be taken once

These conditions have been evaluated?

Follow-up’

 
   
   
   
3 min Question3

How are customers notified when stock is unavailable

for their order?

Follow-1.Ip

 
   
   
   
Lmin Question 4

After a new order is received, approximately how long

Does it take to process it and put the order under shipment?

 
   
   
   
 

lmin

Question5    
  Who are the individuals that perform the credit checks? Follow-up  
       
1 -3min Question 6    
  May 1 please have permission to interview all the people  
  who carry out credit checking?  
  Follow-up    
  If so When would be the best time to meet with each of them?  
       
1 min Objective    
  Conclude. The interview:    
  Thank Mr. &&& for his cooperation and assure him that  
  He will be receiving. a copy of what transpired during the  
  interview.    
21 min Time allotted for base questions and objectives  
.9min Time allotted for. follow-up questions and redirection  
30min Total time allocated for interview

(2.00 p.m,to 3:00 p,m)

 

Fig,5.1: Sample interview guideline

 

Questionnaires

In our preliminary investigation of the business operations we decided to prepare some que.stionnaires that would help us seek some classified information without the respondent feeling threatened. Below is an extract of one of the questionnaires used.

 

BUKUMA DISTRIBUTORS INFORMATION SYSTEM

 

Date………. ,…….

 

.Introduction: The IT department is in the process of developing a new information system. Please, take a few minutes to fill in this questionnaire and return it to the IT office before date………..

.

Q I. How often do customer orders bounce due to lack of enough stock?

0 Very often 0 Often 0 Not often 0 Not at all

Q2. After receiving an order, how long does it take to process it from reception to date of shipping?

0 .1 hour () Several hours  () One day () Many days

 

Fact finding summary and recommendation report

As opposed to the preliminary investigation report which dwells on problems of the existing system from the general point of view, this report gives a more detailed analysis of the system and proposals for improving or overhauling it altogether. The following is a layout outline of the report.

 

Detailed system analysis report for Bukuma distributors

                              Current system: Manual system

                        Proposed system: Computerised model

  1. Executive summary (about 2 pages)

(a) Recommendations

(b) Summary of problems opportunities and alternatives

(c) Brief statement of objectives

  1. Background (about 2 pages)

(a) Details of all the fact finding methods used e.g. interviews.

(b) Description analytical techniques used.

  1. The current system (about 5 pages)

Models of the current system in terms of:

(a) Data entry techniques e.g. form.

(b) Files and data storage methods and media.

(c) Informatiol1processsingandmethods used.

  1. Analysis Of the current system communication (about 5.10 pages)

(a) Performance, problems, causes and opportunities.

(b) Economic Problems, causes and opportunities

(c) Security and control problems, causes and opportunities

(d) Efficiency and service problems, causes and opportunities

  1. Detailed recommendations (about 5-10 pages)

(a) Reason for the current system improvement.

(b) Limiting problems (recommendations).

(c) Proposed implementation plan for the new system:

(i) Scope and refinement.

(ii) Master plan.

(iii) Plan for the design phase.

  1. Appendixes

(a) System models.

(b) Other appropriate documents.

 

System design phase

This is the most crucial system development phase. The design phase has been broken into two:

  1. Preliminary design
  2. Detailed design

Preliminary design

Preliminary design describes the functional capabilities of the proposed information system. There are many tools that can be used at this stage. However, the system flowchart tool was selected to design the system.

System flowchart

The system flowchart shows an overview of the functionality of Computerised system. Considering Bukuma distributors, the proper system required should achieve the following:

  1. Process customer orders which may be in form of electronic messaging, post or personal visit.
  2. Maintain the stock levels by automatically alerting the management when .the items go below the reorder level.
  3. Produce various transaction documents like dispatch notes pay vouchers, various expenses and sales reports and invoices.

Figure 5.2 shows a system flowchart of the proposed system.

Detailed design

Once the general functionality of the system has been designed it is now possible to design detailed designs for various system functionalities. These include:

  1. Output design.
  2. Input design.
  3. Files and data stores design.
  4. Hardware and software requirements.

Output design

This design of both screen and printed output. The output requirements for Bukuma distributors system include: Picking lists, invoices, payment vouchers, inventories, sales reports. However in this design we shall only consider invoices, payment vouchers and sales reports.

Invoices

The sample invoice below is one of the reports that the system is expected to produce after delivery of goods to a customer. Notice that it is designed carefully to display all details necessary to seal a transaction.

BUKUMADISTRIBUTORS LTD.

Industrial area, Funzi Road Box 30307, Nairobi Kenya

                                    Phone:257-020655147 Fax: 02065551418

Invoice

Bill To:

Company name…………….                             Contact name ­…………….

Destination city………………..                        Postal code Sent via………………

Date due…………………                                 Country……………….

Order number Customer name Order date Required date Date shipped
         
Product name Quantity Unit price Discount Amount  
           
    Subtotal      
    Freight cost      
    Total      

 

Payment voucher

This is almost similar to an invoice only that it is used to authorise payments to the suppliers.

BUKUMA DISTRIBUTORS Industrial area, Funzi Road Box 30307, Nairobi Kenya

                        Phone: 257-020655147 Fax: 02065551418

Voucher

Payment To:

Supplier name———-       ­Contact title————­

Postal address—–­                   Region———-­

City————­                         Country——-­

Sent via——–­

Purchase ID Supplier name Date ordered Date required Date received
         
Product ID Quality delivered Purchase price Purchase discount Amount  
           
    Subtotal      
    Freight cost      
    Total      

Sales report

Sales report gives a summary of sales made with a period of time such as weekly, monthly or annually. Below is a sample sales report design.

 

BUKUMA DISTRIBUTORS

Product sales for the year ­Category name

Order ID Customer name Product Amount
       
    Total sales  

 

All other output reports were designed as per system requirements collected during the fact finding stage.

Input design

The quality of system input determines the quality of output. Well designed forms or screens should be effective, easy to use, attractive and consistent. The forms for data entry for Bukuma system should be clearly captioned and easy to use. Some examples of data entry forms

needed for this system are invoice processing form, products entry form, : customer entry form etc. Likewise all other entry forms should be appropriately designed according to the requirements collected.

Inventory and products entry form

Categories entry form is a compound form that should allow the user to enter or view both category and products in that category. This means that the products details should be a sub form in the categories main form. Below is the lay out of the categories and products entry sub form.

Category Details

Category ID ……………….

Category Name ……………..

Description…………………..

Products details subform

Product ID Product name Quantity per unit Price Unit in stock
         
         

Customer entry form

This is intended to be a columnar form with the following controls:

Customer ID                 Phone

Company Name            Region

Contact Name               City

Contact Title                 Country

Address

Since the fields for the customers are too many for one columnar form, they can be grouped into company information and personal information. The two categories will be implemented using a tab control form.

Company info tab                   Personal info tab

Employee ID                          Address

Last Name                              City

First Name                             Country

Title                                        Date of Birth

Hire Date                                Telephone

Invoice processing entry form

This form is intended to be a compound form used to enter customer details in the main form and the items purchased in the products sub form.

Bill To:

 Customer ID …………………

Order number…………………

Contact name………………..

Title …………………

Country………………

Destination name

Date ordered

Date required

Date dispatched

Freight cost

Product name Unit price Quantity shipped Discount Amount
         
         

Pay voucher processing entry form

Like the invoice processing entry form, pay voucher processing is also intended to be a compound form that allows the user to enter supplier’s details in the main form and the items delivered in the products sub form.

The controls in the supplier’s main form are:

Company Name                      Purchase Number

Contact Title                          Freight charges

Phone                                      Date Ordered

Country                                   Date Received

 

Products supplied sub form

Product name Unit price Quantity received Discount Amount
         
         

Suppliers entry form            .

Supplier’s details entry form may be a two tab form with company and contact information tabs.

 

Company Info tab 

Supplier 1D

Company Name

Contact Name

Contact Title

Contact tab

Address City

Region Postal Code

Country Phone Fax

 

Transporter entry form

Entry form for companies offering transport services to Bukuma may have the following controls:

Vehicle Number

Company Name

Postal Address

Phone

Files and data stores design

After designing the input and output, the last detailed design step is that of files or data store. The files and data store are considered the heart of any information system.

There are two methods of data storage in a computer namely flat files and databases.

Flat files

In flat files, records are stored in separate files each with particular details. The use of such separate files means that the same data is often stored in more than one place as illustrated by the tables below.

File A

Product Number Product Name Quantity Price
       

File B

Product Number Product Name Supplier ID Supplier Name
       

Database systems

A database is a centrally controlled store of data. It allows different users who share the database to have access to different data. This method of storage eliminates the validation problems of the flat file system.

In Bukuma Distributors Information System, the database approach is used. This will ensure that the following objectives are achieved:

  1. Sharing of data among the users of the system.
  2. Maintaining accurate and consistent data.
  3. Availability of data required for current and future applications.
  4. Giving users easy access to data.

Designing tables /tiles structures

The following points are considered before designing a file or a table structure:

  1. The types of files to be constructed – is the file a master, transaction or report file?
  2. Data access method in the file i.e. is it random, sequential or indexed­ sequential. .
  3. The size of the files hence the storage media to be used.

Data structures allow the system analyst to produce a view of the elements that make up the data structure. In our system, the basic data structure that will be used to store data elements of the various entities is the record.

The initial data structure design that shows only “what” the records will contain e.g. Name, Address etc. is called the logical design. This design would then eventually be converted to the physical design which specifies how the various data elements in the record will be implemented such as

 

Product Name as string, Product _Number as integer etc.

Below is the logical view of some of the file structures that will be designed for the Bukuma information system.

Table/file structure                                           Elements

Inventory                                           – Inventory number

– Inventory name

– Description                                

Products                                            – Product number      -Unit price

-Product name          – Purchase price

– Quantity/unit          – Quantity in stock

Customers                                         -Customer number   – Address

-Company name         – City

-Contact name            – Country

-Contact title

 

Supplier                                          –Supplier number – Contact title

-Company name      – Physical address

-Contact name

 

Purchase orders                             – Purchase number

– Product purchased

– Quantity purchased

Sales orders                                   -Order number     – Product ordered

-Customer name     – Unit price

-Order date             – Quantity

– Required date      – Discount

Transporter                                     -Transporter number -Physical address

-Company name            – Postal address

– Address                      -Phone

NB: The bolded attributes will be considered as the primary keys in the database. ‘

 

Entity relationship diagram (E-R diagram)

Some of the entities that may be used in constructing Bukuma distributor’s information database are categories, products, customers, employees, orders suppliers, transporters and purchase orders. The first step is to construct the entity relationship diagram. Figure 5.3. below shows an example of E-R diagram for customers and the products ordered.

Customer Places

 

Order Contains.

 

Product
                                                           1             Many                   1      Many

Fig. 5.3: Entity relationship diagram

Interpretation

One customer may place several orders but each individual order can be placed by only one customer (one-to-many relationship). Each order placed by customers may contain many products. However, many products can be contained in one order.

. Hardware and software requirements

After studying the detailed system design specifications and recommendations, the management of Bukuma decided to settle for a computer based system. This means that the development team must start looking for all the required hardware and software resources.

Hardware and software specialists in the team have already visited various suppliers in major towns and brought quotations and price lists for most

Table 5.1

  Hardware facility Example Estimated cost (Ksh)
1 Computer IBM desktop

Computer

Documents

collected from

various suppliers’

Quotations.

2 Storage media Optical disks,

magnetic disks

3 POS terminal

equipments

Wand reader,

magnetic card

reader, bar code

printer etc.

4 Printers Laser printer,

Matrix printer

5 Scanner  
6 Others  

of the required resources. Table 5.1 below gives a sample summary of the hardware requirements recommendations for Bukuma Distributors information system.

Table 5.2 below gives a summary of the software requirements for Bukuma distributor’s information system.

Table 5.2

  Software Example initial cost
I GUI based MS- Windows 9x, 2000,  
  Operating System XP; Mac OS9, X etc.  
2 Application MS-Office Suite, Lotus Documents
  programs Suite, Corel Word collected from
    perfect Suite various suppliers’
3 Antivirus software Norton, MacAfee, AVG. Quotations.

Constructing Bukuma information system

Since relational databases store data in a series of two-dimensional tables, the first step in designing the information base is to design tables that are related to each other via primary and foreign keys. Throughout this section the following shorthand’s will be encountered:

  1. PK – Primary key
  2. FK- Foreign key

Customer           Customer ID (PK),  Customer name……….

Sales order         Sales ID (PK), Customer ID (FK), ……

Product              Product ID (PK), Sales ID (FK), Inventory ID CFK) ……

Purchase order   purchase ID (PK), Inventory ID (FK), Supplier ID (FK)…….

Supplier             Supplier ID (PK), Supplier name . . . . . .

Transporter       Transporter ID (PK), Supplier ID(FK) ……

Inventory          Inventory ID……….

 

These entities can be implemented in an entity relationship

Setting up integrity constraints

After setting up the database based on the entity relationship diagram, some integrity constraints need to be set in the database to enhance accuracy. Examples of constrains are lookup fields and data integrity constraints.

Creating a lookup field

A lookup field displays a list of acceptable values that may be entered into a field. This avoids the problem of wrong data entry in a field. It is recommended that all foreign keys be lookup fields.

To create a lookup field:

  1. Display the table in design view.
  2. Select lookup wizard in the data type column of the desired fields. 3. Complete the prompts in the lookup wizard.

Figure 5.5 below shows how to set up a lookup for the category field in the Product table.

 

 

 

 

When the table is displayed in data entry mode (datasheet fonn), you simply select from the list as shown in Figure 5.6 below.

 

 

Data integrity constraints

Data integrity constraints are rules that govern entering, changing and deletion of data and records in a database. There are several types of integrity constraints. Some of them are:

  1. Entity integrity constraint.
  2. Referential integrity.
  3. Domain integrity.

Entity integrity

These are the rules that govern the composition of a primary key. A primary key cannot contain a null value, it must be unique. Null values are empty spaces in a field that have no data. Figure 5.7 below shows that the Customer ID field (which is the primary key) does not allow duplicates.

 

 

 

 

Referential integrity

Referential integrity governs the nature of records in a one-to-many relationships between tables in the database. All foreign keys in the child table must have a matching record in the parent table. Referential integrity is implemented in the following ways:

  1. Restricted database- The system deletes or updates a parent record if there are no matching child records. A parent record is the one that has the primary key of the relationship while a child record is the one that has the foreign key of the relationship in the second table.
  2. Cascaded database- Cascaded database will delete or update all matching child records when the parent record is deleted or updated. The cascade approach is better when changing records. For example if the customer ID changes, all foreign keys in the child records are updated as well. Figure 5.8 shows how to set up referential integrity between customer and orders table in Bukuma database.

 

 

 

 

Fig. 5.8: Setting referential integrity

 

Domain integrity

In databases, the term domain is used to refer to the acceptable range of values an attribute can have. This ensures that no field takes on a value outside the range of valid values. For example in the Purchase Orders table, the date of items received is always less than or equal to the current date <=Now() as shown in the validation rule property box in Figure 5.9. Now() is a function that returns the current date.

Fig. 5.9: Setting domain values

 

Constructing data entry and user-interface forms

The main purpose of creating forms is to reduce data entry errors. The volume of data to be entered should be minimised and validation and integrity checks such as data type, domain and referential integrity are enforced.

This section examines creating graphical user interface (GDI) forms in Microsoft Access using the appropriate controls, macros and Visual Basic for Applications (VBA) code. Notice the code that is associated with each form and the objects on the form. In Microsoft Access most of these codes are generated by the wizard associated to each during the design. However, in some cases, general subroutines have to be written by the programmer. For the purpose of clarity, these forms are grouped into two main categories namely primary and advanced forms:

Primary forms

These are the forms primarily used to enter data into underlying tables. They include customers, categories, employees, products, suppliers, transport and employees details forms.

Advanced forms

These are more complex forms that are based on underlying queries and unbound controls. The forms provide the user with easy access to and manipulation of data in the underlying tables and other database objects.

Creating the primary forms

The main factors to be considered in creating primary forms are:

  1. The general form properties e.g. record source that is, the underlying table.
  2. Control properties for each of the objects.
  3. Command buttons and their underlying event procedures and codes.

 

Customers form

It was designed as a columnar form as shown in Figure 5.10.

 

 

 

 

Fig. 5.10: Customers form

The form draws its data from the customers table. Apart from bound controls, the form has command buttons Add Customers, Search Close, and Delete. These buttons are brought to life by their underlying event procedures. The codes are generated using the command button wizard that automatically starts when you draw a command button on the form. Below are the code listings for each command button’s event procedure.

 

Option Compare Database

 

Private Sub CloseCustomers Click()

On Error Go To Err Close Customers Click

    DoCmd. Close

Exit  CloseCustomers Click:

Exit Sub

Err Close Customers Click:

­

MsgBox Err.Description

Resume Exit CloseCustomers Click

­

End Sub

Private Sub deleterecord Click()

On Error Go To Err deleterecord Click

– ­

DoCmd.DoMenultem acFormBar, acEditMenu, 8,, acMenu Ver70

DoCmd.DoMenultem acFormBar, acEditMenu, 6,, acMenuVer70

Exit deleterecord Click:

­

    Exit Sub

Err deleterecord Click:

­

    MsgBox Err.Description

 

 

Resume Exit deleterecord Click

­

                        End Sub

Private Sub addcustomer Click()

On Error Go To Err addcustomer Click

­

    DoCmd.GoToRecord” acNewRec

Exit addcustomer Click:

­

    Exit Sub

Err addcustomer Click:

­

MsgBox Err.Description

Resume Exit addcustomer Click

End Sub

Private Sub SearchRecord ClickO

On Error GoTo Err SearchRecord Click

­

Screen.PreviousControl.SetFocus

DoCmd.DoMenultem acFormBar, acEditMenu, 10,, acMenu Ver70

Exit SearchRecord Click:

­

    Exit Sub

Err SearchRecord Click:

­

MsgBox Err.Description

Resume Exit SearchRecord Click

­

    End Sub

Categories form

The categories table has many products. Hence, the fonn has the products list subfonn which shows the items in each category as shown in Figure 5.11.

 

 

 

 

Fig. 5.11: Inventories form

The main form is a columnar form. It is populated with data from the categories table. It has command buttons New Category, Search, close and Delete. In this case, the categories are the same as the inventory ID.

The subform is a data sheet form embedded in the categories form. It gets its data from the products table.

Products form

This is a single columnar form as shown in Figure 5.12.

 

 

 

 

 

Fig. 5.12: Products form

The text box controls are populated with data from the products table. Suppliers and Category are lookup controls that source data from Supplier and Categories tables respectively. To operate the form, four command buttons used i.e. New Record, Close and Delete.

Suppliers form

The suppliers form is designed using the tab tool from the toolbox. Figure 5.13 shows an illustration of the form.

 

 

 

Fig. 5.13: Suppliers form

The form is populated with data from the suppliers table. However, apart from the already discussed form operation buttons for adding a new record, closing a form, searching and deleting records, there is an Open Products Form button, brought to life by the OpenF orm wizard. The OpenForm event procedure code is as listed below:

Private Sub OpenProducts Click() 

On Error Go To Err OpenProducts _Click

Dim stDocName As String

Dim stLinkCriteria As String

stDocName = “Products”

DoCmd.OpenForm stDocName,,, stLinkCriteria

Exit OpenProducts _Click:

    Exit Sub

    ErrOpenProducts _Click:

    MsgBox Err.Description

    Resume Exit OpenProducts _Click

End Sub

Transporter form

This is a single columnar form as shown in Figure 5.14.

 

 

 

Fig. 5.14: Transporters form

The form is populated with data from the transporter table. The four command buttons are Add New, Delete and Close.

Creating advanced forms

As stated earlier, these are the forms which draw data from underlying queries. This section not only analyses the form properties but also gives illustrations of the underlying queries in design view and any event procedure used to automate the forms and controls. The advanced forms are further classified into groups namely:

  1. Data entry and manipulation forms.
  2. User interface forms.

Forms for data entry and manipulation

These are the forms used for entering and manipulating data in the underlying query. These forms include the customers invoice and suppliers’ pay voucher.

Customers invoice data entry form

This is a compound form that has the purchase orders subform contained within it as shown in Figure 5.15.

 

 

 

 

Fig. 5.15: Customer invoice form

The main form is a columnar form whose record source is Customer Bills query made from two tables, Customers and Orders as shown in Figure 5.16.

 

 

 

 

Fig. 5.16: Customer bills query

The customer details are automatically filled by selection from the lookup combo box of the customer control.

The sub form gets its data from the order amount query. The order amount query is designed using two tables, products and order details as shown in Figure 5.17.

Note that the query has a calculated field i.e. Amount that calculates the amount for each product ordered based on the UnitPrice, Quality and

 

 

Fig. 5.17: Order amount query

Discount. The expression for this field is:

Amount: ccur([order details). [unit price]*[Quantity]* (1-[Discount]/ 100)* 100

The subform has an event procedure for trapping data entry errors. This is tied to the on error event of the form properties. Since the user may forget to select a customer before entering products details in the main form section, the on error event procedure ensures that a customer is first selected before entering order details. A listing of on error event procedure is shown below.

Private Sub Form_Error(DataErr As Integer, Response As Integer)

, Errors can occur if the user has not selected a customer for

, this order on the main form. If there is an error and Orders!BillTo is Null

, inform the user and cancel the entry made in the subform.

If DataErr > 0 Then

If IsNull(Me.Parent!CustomerID) Then

MsgBox “Select a Customer to bill to before entering order details info.

RunCommand acCmdUndo

Me.Parent!CustomerID.SetFocus

        Response = acDataErrContinue

     Else

     Response = acDataErrDisplay

 End If

End If

End Sub

The ProductID in the subform is a lookup control that enables the user to select an item from the dropdown list. This control also has an event procedure used to automatically fill the UnitPrice control from the products table once an item is selected. This minimises errors that may result from erroneous unit price entry. The code listing for the UnitPrice lookup event procedure as shown below.

Private Sub ProductID AfterUpdate()

On Error GoTo Err _ProductID AfterUpdate

  Dim strFilter As String

, Evaluate filter before it’s passed to DLookup function.

  strFilter = “ProductID = “& Me!ProductID

, Look up product’s unit price and assign it to UnitPrice control.

  Me!UnitPrice = DLookup(“UnitPrice”, “Products”, strFilter)

Exit _ProductID AfterUpdate:

  Exit Sub

  Err _ProductID AfterUpdate:

  MsgBox Err.Description

  Resume Exit _ProductID AfterUpdate

End Sub

Command buttons that have been used include Print Preview invoices, Print and Close. Their underlying event procedures are similar to those generated in the other forms discussed earlier.

Suppliers voucher details entry form

This is almost similar in functionality to the customers’ invoices entry form but it is intended to process payment vouchers for goods supplied to Bukuma. Figure 5.18 shows the voucher processing form.

 

 

 

 

 

Fig. 5.18: Payment voucher

The main form is a columnar form that derives its data from Suppliers Delivery Note query. This is created from two tables, Suppliers and PurchaseOrders tables. The supplier details are automatically filled by selecting the supplier name from the lookup combo box of the Supplier control. Figure 5.19 shows the source query in design view.

 

 

 

 

 

Fig. 5.19: Suppliers delivery note query

The subform draws its records from an underlying query, Products Purchased shown in Figure 5.20.

 

 

 

Fig. 5.20: Purchase query

The Total Puchase is a calculated control with the expression:

Total Purchase: Ccur[purchase Details].[Purchase

Price]*{QuantityOrder]* ([Purchase Discountj)/l 00) * 100

Just like in the customers’ products ordered sub form, the product ID in the products purchased subform is a lookup control from which the user selects the product name. Once a product/item is selected, the Purchase Price is automatically filled with the purchase price from the products table using the lookup event procedure shown below:

Private Sub ProductID AfterUpdate()

On Error Go To Err _ProductID _After Update

  Dim strFi/ter As String

, Evaluate filter before it’s passed to DLookup function.

  strFi/ter = “ProductID = “& Me!ProductID

, Look up product’s purchase price and assign it to PurchasePrice control.

Me!PurchasePrice = DLookup(“PurchasePrice”, “Products”, strFilter)

Exit _ProductID AfterUpdate:

  Exit Sub

  Err _ProductID _AfterUpdate:

  MsgBox Err.Description

  Resume Exit _ProductID AfterUpdate

End Sub

Data validation and integrity checks have been enforced so that the pay voucher cannot be processed for a null or a non-existent supplier. This is achieved using the on error event shown in the listing below.

Private Sub Form Error(DataErr As Integer, Response As Integer)

, Errors can occur if the user has not selected a supplier for

, this order on the main form. If there is an error and PurchaseOrders!PaylTo is

Null , inform the user and cancel the entry made in the subform.

   If DataErr > 0 Then

   If IsNull(Me.Parent!SupplierID) Then

   MsgBox “Select a supplier to process the voucher for before entering pay details.”

RunCommand acCmdUndo

Me.Parent!SupplierID.SetFocus

Response = acDataErrContinue

Else

Response = acDataErrDisplay

EndIf

EndIf

End Sub

The command buttons used to control the form are New Voucher, Print Voucher, and Close.

User-interface forms

These are forms that enable the user to access, manipulate, display and print other forms and reports. Two such forms used in Bukuma System are sales report dialog and the main switchboard.

Sales report dialog form

As shown in Figure 5.21 this form is mainly designed using unbound controls such as radio buttons, a text box and command buttons.

The three groups of controls are tied together using the code listing shown below.

 

 

Fig. 5.21 : Select report

Option Compare Database’ Use database order for string comparisons.

Option Explicit’ Requires variables to be declared before they are used.

Sub PrintReports(PrintMode As Integer)

On Error GoTo Err-Preview-Click

, This procedure used in Preview_Click and Print_Click Sub procedures.

, Preview or print report selected in the ReportToPrint option group.

, Then close the Print Sales Reports Dialog form.

   Dim strWhereCategory As String

   strWhereCategory = “CategoryName = Forms![Sales ReportsDialog]! SelectCategory”

   Select Case Me!ReportToPrint

   Case 1

   DoCmd.OpenReport “Products stock level”, PrintMode

   Case 2

   DoCmd.OpenReport “Summary sales by date”, PrintMode

   Case 3

   DoCmd.OpenReport “Sales by category summary”, PrintMode

   Case 4

   IfIsNull(Forms![Sales Reports Dialog]!SelectCategory) Then

   DoCmd.OpenReport “Sales by Category”, PrintMode

   Else

   DoCmd.OpenReport “Sales by Category”, Print Mode, ,strWhereCategory

   End If

End Select

DoCmd.Close acForm, “Sales Reports Dialog”

Exit_Preview _Click:

Exit Sub

 

Err_Preview _Click:

Resume Exit_Preview _Click End Sub Private Sub Cancel- Click() , This code created by Command Button Wizard.

On Error Go To Err Cancel Click

 

, Close form.

   DoCmd. Close

Exit Cancel Click:

­

   Exit Sub

   Err Cancel Click:

­

   MsgBox Err.Description

   Resume Exit Cancel_Click

End Sub

Private Sub Preview Click()

, Preview selected report. This procedure uses the PrintReports

, Sub procedure defined in (General) section of this module.

PrintReports acPreview

End Sub

Private Sub Print Click()

, Print selected report. This procedure uses the PrintReports

, Sub procedure defined in (General) section of this module.

PrintReports acNormal

End Sub

Private Sub ReportToPrint AfterUpdate()

, Enable SelectCategory combo box if user selected Sales by Category

, report.

Const conSalesByCategory = 4

If MefReportToPrint. Value = conSalesByCategory Then

MefSelectCategory.Enabled = True

Else

MefSelectCategory.Enabled = False

 End If

End Sub

Main form (Switchboard)

The main form also referred to as the switchboard is the user-interface or main menu that is loaded when an application is started. The form mainly contains command buttons that enables the user to select the task to work on. Figure 5.22 shows the main form in design view used in Bukuma information system.

 

 

 

 

Fig. 5.22: Switchboard in design view

Creating reports

Reports present information to system users. These are the most visible components of a working system.

This section focuses on some of the reports expected from Bukuma information system. The main features to be highlighted in creation of reports are:

  1. General report properties and data source.
  2. Control properties, grouping and event procedures.
  3. The report in design view.
  4. Layout of report needed.

Sales by category

This is a comprehensive report that gives sales details for each product in each category group shown in Figure 5.23.

 

 

 

Fig. 5.23: A sample sales report

The report draws its data from products sales query. Figure 5.24 shows the query in design view.

 

 

 

Fig. 5.24: Product sales query in design view

The report has calculated controls for a number of items sold and total sales in each category whose expressions are:

Record count:

= Summary for” & ” “ & [CategoryName] & ” (” & Count(*) & ” ” & IIf(Count(*)= 1, “detail record”, “detail records”) & ”)”

Total sales: Sum([ Amount])

Sales by category summary

This is a compound report that has a chart subreport in it. The report gives summary total sales for each category both in tabular and graphical form as shown in Figure 5.25.

 

 

 

Fig. 5.25: Chart summarising sales by category

The graph shows that the most selling category is beverages followed by soaps. This report is meant for the management to decide which category of products sells more than the other.

The main report is populated with data from a select query, category sales summary shown in Figure 5.26.

 

 

 

 

 

Fig. 5.26: Category sales query design

Summary sales by date

On opening this report, the user is prompted to enter the beginning and ending date. Once the valid dates are entered, the sales for the duration are displayed as shown in Figure

 

 

 

 

Fig. 5.27: Yearly sales report

The record source for the report is the products by years query. The query has a compound criteria expression in the freight date field. The expression is:

Is Not Null And Between [Beginning Date] And [Ending Date]

Purchases by category summary

Just like the Sales summary, this is also a compound report that has a pie chart subreport in it. This report gives a summary of money spent on purchases.

The main report is populated with data from a select query, products purchased shown in design view in Figure 5.28.

 

 

 

Fig. 5.28: Purchases query

Products stock level

The stock report is meant to help the management make orders in good time. Figure 5.29 shows the items currently in stock and indicates those that need to be reordered.

 

Fig. 5.29: Stock report

The report draws its data from product sales query. The report is grouped by category and the stock balance is obtained using a calculated control:

= ([units in stock] (sum([Quantity])))

While the reorder remark Yes or No is obtained using an if function:

= Ilf(([UnitslnStock]-(Sum([ quantity])))<[ReorderLevel], “Yes”, “No”)

 

Invoice to customers

This is a report sent to the customer showing detailed description of what is to be paid for, the total payment and the due date. Figure 5.30 shows a sample invoice to one of the customer’s ofBukuma Distributors.

 

 

 

 

 

 

 

 

Fig. 5.30: Invoice sample report

The report draws its data from invoice to customers query. Figure 5.31 shows the source query in design view.

 

 

 

 

 

 

Fig. 5.31: Invoice query design

Calculated controls have also been used, these are as shown below:

 

Subtotal: = Sum([amount])

Total:= sum([amount])+ [freight]

Payment voucher

This is similar in design to the invoice, only that it is meant for the processing of payments for the suppliers of Bukuma Distributors. Figure 5.32 shows a sample pay voucher report to one of the suppliers.

 

 

 

Fig. 5.32: Pay voucher report

The report draws its data from the products purchased voucher query. It also has an unbound image of the company logo inserted using the image tool, from the toolbox. Calculated controls have also been used as follows:

Subtotal: = Sum([Total Purchase])

Total:            = sum([Total Purchase])+ [freightCost]

Products catalogue

This is a document available to the customers and other interested persons who may want to know the items sold and the unit price of each. Figure

5.33 shows a page of a catalogue generated from Bukuma’s information system.

 

 

Fig. 5.33: Products catalog

The report draws data from the products table.

NB: There are other reports that may be created in a real business environment but only a few have been considered. It is the responsibility of the learner to visit a computerised business organisation to learn more about the variety of reports used.

 

Database security and startup options

To protect the information system from unauthorised access, Microsoft Access database management software, provides a number of options. These includes:

  1. Password protection.
  2. User and group permissions.
  3. User-level security.
  4. Data encryption.

To set up any of these security options, click the Tools menu, point to security and then select the type of security you want to setup.

Password protection

This is the simplest security set-up that can be implemented using any Microsoft Windows operating system. A password to open or edit the database file is set for any user who wishes to do this action.

User and group permissions

Some operating systems like Windows New Technology (NT) lets an administrator assign permission to users on database objects such as queries, forms and reports. These permissions include opening and running the object, modifying etc.

The user and group accounts dialog box is used to assign accounts to the database users. However, this can only be done by a user who is a member of the Administrators group.

User-level security

This feature is used to assign permissions to users in order to limit user access to certain database objects. For example, the order entry clerk may not have access to payroll information. Figure 5.34 shows the log on dialog box used to log into Bukuma information system.

 

 

 

Fig. 5.34: Loging into an application

For more on setting up User Groups, Accounts and Permissions, read the online help of the Windows NT based operating systems.

Data encryption

If the database is to be used in a network or sent electronically, encryption secures the data from unauthorised access. Only the intended receipient can use the decryption key to read the message.   .

Start up options

The last step in developing a customised application is to specify the startup options. Figure 5.35 shows the startup settings for Bukuma information system.

 

 

 

 

 

Fig. 5.35: Setting up start up options

 

Testing and implementing the system

Testing

Individual system modules were tested using test data and found to work accurately and properly. Sample test data and error messages that were encountered due to invalid data entry are given in the appendix of this project report.

Implementation

This is the final stage in system development which involves putting the new system into use. The tasks during the implementation stage are:

  1. System management – This involves installation, resource and staff allocation.
  2. Staff training – This is done without interfering with the business operations.
  3. Security control and contingency planning incase the system breaks down
  4. Changing over from the old system to the new system using the most appropriate method.

Once the system has been installed and is running, the programming team must ensure that it is working as expected through a follow up evaluation. The evaluation report for Bukuma information system shows that apart from a few minor issues concerning the screen forms, the following issues have been addressed:

  1. Out of stock problems have been addressed satisfactorily.
  2. Stock transfer between warehouses is running smoothly.
  3. Store managers, accounts clerks and order processing managers feel that they are in full control of the system.

The programming team has promised to address the minor emergent problems encountered during the system maintenance phase.

 

Recommendation and conclusion

The new system received recommendation from all sectors of the organisation after the first month of operation.

Sample user manual

Below is a sample of user manual aimed at helping the users ofBukuma information system.

Introduction

Bukuma information system is a computerised information system that enables users to process business transactions more efficiently and accurately.

With this system, you can prepare most of the documents that take a lot of time to prepare manually such as invoices, pay vouchers, sales reports, profit and loss accounts and many others.

Loading the system To load the program:

  1. Click the Start button, point to programs then click Bukuma System. A logon dialog box shown in Figure 5.36 is displayed.

 

 

Fig. 5.36: Logon dialog box

  1. Enter your user name and password and click OK. The system main menu such as the one shown in Figure 5.37 below appears.

 

 

 

Fig. 5.37: Main menu ,

Menu descriptions

Within the main menu are submenus that help the user to choose on the specific task to process. These submenus are grouped into two:

  1. Details processing submenus.
  2. Viewing transaction reports.

You activate a submenu by clicking on its button. Figure 5.38 shows the customers submenu.

 

 

 

 

 

Fig. 5.38: Customers submenu

Description of submenu items

Customer’s submenu

Once you click the customer’s button, you will get the following items:

  1. Customer entry and editing form.
  2. Customer orders and invoice processing.
  3. Preview and print invoices.
  4. Preview and print a list Bukuma customers.

Categories and Products

Clicking this button displays categories submenu with the following options:

  1. Entering and editing and categories and products details.
  2. Preview products per category and invoices to customers.

Suppliers

This buttons displays the supplier’s submenu with the options

  1. Entering new editing the supplier details and products supplied.
  2. Processing purchase details for items below reorder level.
  3. Preview and print supplier’s payments.
  4. Preview and print a list of Bukuma suppliers.

 

Viewing transaction reports submenus

In this category, you activate a submenu by clicking on its button.

Sales reports

Clicking this button displays the sales dialog box from which you can select the report to preview or print.

Purchase reports

Click this button to preview purchases made for each purchase order.

Preview catalogue

This option is available to any authorised user who wants to preview or print the list of products available for sale to any interested client.

Exiting from the program

To exit the program, simply click the Exit button located at the bottom of the main menu.

Troubleshooting data entry related errors

Invalid and erroneous data entry results to error messages being prompted on the screen. Some of the error messages that you may encounter are:

Error message: The changes you requested to the table were not successful because they would create duplicate values in the index, primary key or relationship.

Description: You are trying to enter the same item twice.

Solution: Avoid double entry.

Error message: The field OrderDetails.ProductID cannot contain a null

value because the required property in the field is set to true. Description:You are trying to proceed to another record or field yet you have not selected the product name of the record in focus.

Solution: Select the product before proceeding to the next record. Error message: The value you entered isn’t valid for this field. Description: You are trying to enter an invalid data type in the field. For example, you are entering text in a numeric field or an invalid date such as 46/34/2005

Solution: Enter the correct data type.

Error message: Select a customer to bill to before entering order details info.

Description: You are trying to enter order details before selecting a customer.

Solution: Select or enter the customer before entering order or invoice details.

Incase you may experience other data entry related problems, please consult the system administrator.

Project appendix

Below is a sample appendix of the project report.

Test data used in Bukumu information system

Although a variety of test data was used to test each operation of our system, we have given only two test data tables to emphasize the need to provide test data in system development. In real situation, you are expected to provide as many test data as possible to prove the functionality of your system.

Inventory table

Table 5.3

Inventory Inventory Name Description
1 Beverages Soda
3 Washing Powders For Washing
4 Maize Flour For Ugali
5 Daily Products Milk, butte r, etc.

Order details query results

Table 5.4

 

Bibliography

Below is a sample bibliography of the project report.

The bibliography shows a list of books and reference materials used in

developing Bukuma information system.

  1. Sarah E.H, Glen J. c.: Microsoft Access 2000 Complete Edition, McGraw-Hill, 2000.
  2. Kendal E.K, Kendal J.E: System Analysis and Design, 5th Ed, Prentice-Hall (Now Pearson Education inc), 2002.
  3. Taylor G.: GCSE Computer Studies, Macmillan Press Limited, 1991.
  4. Jeffrey L. W etel: System Analysis and Design Methods, McGraw Hill, 2000
  5. Williams BK: Using Information Technology: A practical introduction to computers and communications, IRWIN, 1995,
  6. Saleemi N.A.: Systems Theory and Management Information systems, N.A. Saleemi Publishers, 1997 & 2000,
  7. Gareth W: Student Handbook. ICT, Pearsons Publishing, 2000.
  8. Microsoft Access 2000: Northwind sample database, 1999.

DEVELOPING A PROJECT USING VISUAL BASIC PROGRAMMING LANGUAGE

Chapter outline

6.1 Introduction

6.2 Preamble

6.3 Problem recognition and definition

6.4 Developing algorithms

6.5 Developing the system in Visual Basic

Introduction

In this chapter, we shall undertake a case study entitled A school canteen management system. The objective of this case study is to help the students to apply the programming techniques learnt in Form 3

Preamble

A school canteen operator sells confectionaries and toiletries to the students. The canteen operator requests you to develop a canteen management system that will accomplish the following:

  1. Allow storage of stock records in a file.
  2. Enable searching of a file to retrieve a particular record for editing and adding new stock.
  3. Process sales transactions and calculate the total bill and change due to a customer.
  4. Generate daily sales report showing all the items sold for a particular day.

Problem recognition and definition

A careful analysis of the above scenario reveals that the system will need the following tasks:

  1. Entering stock records and storing them in a file.
  2. Searching for the stock file to retrieve records.
  3. Processing of daily transactions.
  4. Recording of any sale transactions in a transaction file.
  5. Generating sales reports for a specified date.

 

Developing algorithms

Before coding, the programmer needs to develop algorithms for each task. These algorithms will enable the programmer to develop the code for each of the processes.

Algorithm for entering new stock records

The new stock module should enable the user of the system to continually enter new stock records in the file until he/she is through with the process. Therefore, the computer should request the user to key in records until the last item is entered. The following pseudocode extract can be used to represent the algorithm:

Output “Enter a new item?” Enter “yes” or “no”

Input reply

While Reply <> No

Output “Enter stock item details”

Write to stock file

Output “Are you through with entering the records Yes/No”

       Input Reply

loop

End While

Algorithm for searching for a record

This process will enable the user to access the records in a stock file and retrieve a particular record. The record search can be done as per the identification number of each record i.e. record ID. The search algorithm can be represented as follows:

Begin

Enter the code of the record

Open stock file for reading

While Not end of file Begin

       If code entered = record itemcode Then

       Output record details

       Else

       Output ‘Record not found’

 

End if loop End while Close file End

Algorithm for processing sales

Sales processing requires that the stock file be opened in order to read details of the items bought. The sales module then calculates the amount of the sale and the change owed to the customer. The module should also update the quantity of the items in stock. The following algorithm will be used:

Begin

Retrieve item from stock file by record ID

 Specify quantity to be sold

Compute bill and customer change

Save transaction in sales file

END

Saving a sales transaction

After selling an item, the sales details must be stored in the system for future reference. In our case, the current transaction has to be stored in a file which we shall refer to as a sales file.

Constructing the system in Visual Basic

Open Visual Basic and create a new project called Canteen.vbp. Create five forms in the project window i.e. Form1, Form2….Form5. To create a form, simply Click Project then Add Form command. Save the forms with the following names:

Form Name

Form I UserInterface
Form2 AddNewStock
Form3 SellItem
Form4 SearchItem
Form5 SalesReport

 

Remember while saving that all Visual Basic forms have the extension .frm. After saving, change the Name property for each form in the properties window to start withfrm e.g. frmCanteenManagementSystem for Form 1. Change the captions for each form as you proceed through the project. At the end of this activity, the forms in your project should look as shown in Figure 6.1 in the Project Explorer window.

NB: Simply click the Project explorer icon to view this window. Alternatively, click View project Explorer on the menu.

It is now time to start placing objects on the forms and entering the code associated to each of the objects.

Creating the user-interface form

  1. Double click UserInterface.frm in the project explorer window and design it as shown in Figure 6.2.

NB: Change both the Name and caption properties of the command buttons as shown below:

 

Control Property Setting
Command 1 Name

Caption

cmdAddNewStock

Add New Stock Record

Command 2 Name

Caption

cmdSellItem

Sell Item

Command 3 Name

Caption

cmdGenerateReport

Generate Sales Report

Command 4 Name cmdEnd
  Caption End Program
  1. The File menu on the form has only one command namely: Exit used to close the program when clicked.

To add this menu clicks the Menu Editor icon on the toolbar. Alternatively click, Tools then select: Menu Editor Command. Create the menu as shown in Figure 6.3 of the menu editor window:

  1. To place the command buttons on the form, simply double click their icons on the toolbar.

Since this is the first form that the user will see when the project is run, the various controls are meant to help the user access other forms in the project.

 

Adding code the “Canteen management system” form

This is the main form that has commands that enable the user to access other forms.

  1. Click the File menu then command Exit. Notice that the code window for the Exit command opens on the screen. Type the word “End” in the body of the event procedure as shown below:

Private Sub mnuExit click()

End

End Sub

This means that when the Exit command is clicked, the program will stop executing. Save and close this code window.

  1. Double click the “Add New Stock Record” button and add the code below in the body of the event procedure as shown:

Private Sub cmdAddNewStock- Click()

Load frmAddNewStock

frmAddNewStock Show

End Sub

 

This code loads frmAddNewStock form and display it on the screen when the user clicks Add New Stock record command button.

  1. Double click the “Sell Item” button and add the following code in the body of the event procedure as shown:

Private Sub cmdSellltem Click()

Load frmSellltem

frmSellltem.Show

End Sub

  1. Double click the “Generate Sales Report” button and add the following code in the body of the event procedure as shown:

Private Sub cmdGenerateReport Click()

Load frmDailySaleReport

frmDailySalesReport.Show

End Sub

  1. Double click the “End Program” button and add the following code in the body of the event procedure as shown:

Private Sub cmdEnd Click()

End

End Sub

Designing and adding code to the” Add New Stock to File” form

Design your AddNewStock form to look like Figure 6.4 below:

 

  1. Double click the “Click Here to Add New Stock Item” button and add the following code in the code window that appears. Ignore the line numbers.

1 Private Type Item

2          ID As Integer

3          ItemName As String * 20

4          Q As Integer

5          CostPrice As Integer

6          SellPrice As Integer

7 End Type

8 Private Sub cmdAddStock- ClickO

9 Dim ItemRecord As Item

10 Dim Old File As String

11 Dim Count As Integer

12 Dim Number As Integer, Reply As String

13 ‘CommonDialog 1. CancelError = True

14 ‘CommonDialog1.Filter = ”Data file (*.dat)l*.dat”

15 ‘CommonDialog 1.ShowOpen

16 ‘Old File = CommonDialog1.FileName

17 Open “c:\Program FilesIMicrosoft Visual

Studio I VB98 \ Old File. dat” For Random As #1 Len = Len (ItemRecord)

18 Reply = “No”

19 Do While Reply <> “Yes”

      20 ItemRecord.ID = InputBox(“Enter Record ID If”,“ItemRecord.ID ”)

      21 ItemRecord.ItemName = InputBox(“Enter Record Name”,”ItemRecord.Name ”)

      22 ItemRecord.Q = InputBox(“Enter Quantity”,”ItemRecord. Q”)

    23 ItemRecord.CostPrice = InputBox(“Enter the Cost Price”,”ItemRecord. CostPrice”)

   24ItemRecord.SellPrice = InputBox(“Enter the Selling Price”,”ItemRecord.SellPrice ”)

   25 Put # 1, , ItemRecord

   26 Reply = InputBox(“Are you through with record entry? Yes/ No”, “Reply”)

27 Loop

28 Close #1

29 EndSub

 

Explanations

Line 1: Declares a user defined data type called Item. The data type is a record.

Lines 2 – 6: Declares the fields in the record.

Line 7: Ends the type declaration.

Line 8: Declares an event procedure or subroutine which is executed on clicking a button called AddNewStockltem. You double click this button in order to get the code window.

Lines 9 – 12: Variable declarations.

Lines 13 -16: Notice that they are commented off, hence the computer will not execute them. However, if they are not commented, they would display the Open dialog box when the button is clicked

Line 17: It opens a file called OldFile.dat stored on the disk. This is the file in which all stock records are kept. Notice that the full path to the file has to be specified. This eliminates the need for an Open dialog box. The whole statement should be on the same line.

Lines 18 – 19: It sets a looping condition that will stop only when the variable Reply has a value of “Yes”. Each numbered statement should be on the same line.

Lines 20 – 24: Displays an input box on the screen which requests the user to input the various data elements of the record such as the ID, Name etc. Note the syntax of display a standard input box.

Line 25: It outputs a record to the file. The blank (, ,) ensures that the next record is written after the last Put operation. However if you want the record to be written to a particular position in the file, then you can specify e.g. Put # 1 ,1, ItemRecord, which means write the record at position 1 in the file.

Line 27: It encloses all the code that will be repeatedly executed in the loop.

Line 28: Closes the file after writing to it.

Line 29: Ends the event procedure.

  1. Double click the “Click Here to Update Existing Record” button and add the following code:

Private Sub cmdUpdateRecord Click()

 Load frm UpdateRecordDetails

frm UpdateRecordDetails, Show

End Sub

Save the code and exit from the code window.

Designing and adding code to sell Item form

In the Project Explorer window, double click frmSellItem and design it as shown in Figure 6.5. Remember that this form is loaded by

 

 

 

Fig. 6.5: Sell item

clicking the “Sell Item” command button that you created in the user-interface form.

  1. Design’ a menu bar on the form with the following commands:

(a) File

.. .. Open

…..Exit

(b) Transaction

….Save Transaction

Enter the following code in the mnuOpen code window:

Private Type Item

ItemID As Integer

ItemName As String * 20

Q As Integer

 

CostPrice As Integer

SellPrice As Integer

End Type

Private Sub mnuOpen Cliek()

Dim ItemReeord As Item, Quantity As String, Last As Integer

Dim Target As Integer, Current As Integer, First As Integer

CommonDialog 1. CaneelError = True

CommonDialog1.Filter = “Datafile (*.dat)/*.dat”

CommonDialog 1.ShowOpen

Old File = CommonDialog 1.FileName

Open “c: \Program Files \Microsoft Visual Studio \ VB98 \ Old File. dat”

For Random As #1 Len = Len(ItemRecord)

First = 1

Target = InputBox(“Please Enter ItemID of Item to be sold”, “Target”

Quantity = InputBox(“How many units are you selling”, “Quantity”)

Last = LOF(1)/ Len (ItemRecord)

Do While First < = Last

Get #1, First, ItemRecord

Current = ItemRecord.ItemID

If (Current = Target) Then

txtItemID. Text = ItemRecord.ItemID

txtItemName. Text = ItemRecord.ItemName

txtUnitPrice. Text = ItemRecord.SellPriee

txtQuantitySold. Text = Quantity

txtQuantityInStoek. Text = ItemRecord. Q – Quantity

       ItemRecord. Q = Int(txtQuantityInStoek.Text)

End If

First = First + 1

Loop

Close #1

End Sub

Explanation

This code enables the user to open a file on the disk called OldFile.dat by selecting it in the open dialog box. The use can then select a particular record from the file by entering its identification number (ID).

To sell another item after the first, you need to search for it in the file again. You can add the “Sell Next” button on the form having the same code as the one for the mnuOpen command.

Add the following code to the mnuSave _Transaction command that enables the user to save the details in the transaction file called SaleFile.dat

Private Type ItemSold

ItemID As Integer ItemName As String * 20 QSold As Integer

Sell Price As Integer DateSold As String * 9 Sale Value As Integer

End Type

Private Sub mnuSave Transaction Click()

Dim Sale As ItemSold

Dim First As Integer, Last As Integer

Open “c:\Program FilesIMicrosoft Visual

Studio \VB98 \SalesFile. dat” For Random As #2 Len = Len(Sale)

Last = LOF(2) / Len (Sale)

RecordNumber = Last + 1

Sale.ItemID = Int(txtItemID. Text)

Sale.ItemName = txtItemName. Text

Sale. QSold = Int(txtQuantitySold. Text)

Sale.SellPrice = Int(txtUnitPrice. Text)

Sale.DateSold = txtTodaysDate. Text

Sale. Sale Value = Val(txtBill. Text)

Put #2, RecordNumber, Sale

   Close #2

End Sub

Double click the compute totals button and then add the code listing below in its event procedure.

Private Sub cmdComputeTotals Click()

Dim Cashgiven As Integer, ItemRecord As Item

txtBill. Text = txtQuantitySold * txtUnitPrice. Text

Cashgiven = InputBox(“How much money has the customer given”, “Cashgiven”)

IblChange. Caption = Cashgiven txtBill. Text

Open “c: \Program FilesIMicrosoft Visual­

Studio\VB98\0IdFile.dat”

For Random As #1 Len = Len(ItemRecord)

ItemRecord.Q = Int(txtQuantityInStock.Text)

Close #1

End Sub

Finally double click the “Cancel” button and then add the code listing below in its click event procedure

Private Sub cmdCancel- Click()

Unload frmSellItem

End Sub

Designing and adding code to controls on Search Item form

This form lets the user add or edit the fields of an existing record in the stock file. For example, when you buy some more items, you enter the item quantity in the quantity control. Design the form as shown in Figure 6.6.

 

 

 

Fig. 6.6: Edit records form

Double click the button labelled “Search” and add the following code to it:

Private Type Item

ItemID As Integer ItemName As String * 20

 Q As Integer

CostPrice As Integer

 SellPrice As Integer

End Type

Private Sub cmdSearch Click()

Dim ItemRecord As Item

Dim Target As Integer, Current As Integer

Dim RecordNumber As Integer, Stock Value As String

Open “c: \Program Files\Microsoft Visual Studio \VB98\OldFile. dat”

For Random As #1 Len = Len(ItemRecord)

First = 1

Target = Int(txtRecordId.Text)

Last = LOF(1) / Len (ItemRecord)

Do While First < = Last

Get #1, First, ItemRecord

Current = ItemRecord.1temID

If (Current = Target) Then

Label3.Caption = “Search successful: Now edit details and Click Save”

txtName. Text = ItemRecord.1temName

txtQuantity. Text = ItemRecord.Q

txtCostPrice. Text = ItemRecord.Cost Price

txtSellingPrice. Text = ItemRecord.SellPrice

Stock Value = txtCostPrice. Text * txtQuantity.Text

IblStockValue. Caption = Stock Value ‘display total value of item in stock”

End if

First=First+1

Loop

Close #1

End Sub

 

Explanation

The code searches for a record whose ID is typed in the Record ID text box. After editing the retrieved record, the changes can be saved by clicking the “Save” button. Below is the code for save button:

Private Sub cmdSave Click()

Dim ItemRecord As Item, Stock Value As String

Open “c: \Program FilesIMicrosoft Visual Studio \ VB98\OldFile.dat”

For Random As #1 Len = Len(ltemRecord)

Target = Int(txtRecordID.Text)

First = 1 ‘first record in file is at position 1

Last = LOF(1) / Len (ItemRecord) ‘length of file equals record length

Do While First <= Last

Get #1, First, ItemRecord ‘get the record that was edited

Current = ItemRecord.ID

If (Target = Current) Then ‘search whole file for correct record

ItemRecord.ID = Int(txtRecordID. Text)

 ItemRecord.ItemName = txtName. Text

ItemRecord. Q = Int(txtQuantity. Text)

ItemRecord. Cost Price = Int(txtCostPrice. Text) ‘save fields as record

ItemRecord.SellPrice = Int(txtSellingPrice. Text)

Put #1, First, ItemRecord

Stock Value = txtCostPrice. Text * txtQuantity. Text

             IblStockValue. Caption = Stock Value

End If

       First = First + 1

Loop

Close #1

End Sub

Explanation

The code takes the contents in the text boxes of the form and saves them as a record in the file. Code for the cancel button is

Private Sub cmdCancel- Click()

Unload frmUpdateRecordDetails

End Sub

Designing and adding code to controls on Sales Report form

This form is used for displaying the daily transactions when the user specifies a particular date in the fomart mm/dd/yyyy. Design the report interface as shown in Figure 6.7.

 

Code for the sale report

.Double click the “show report” button and add the following code that will search for all the items sold on a particular day and display them on the form:

Private Type ItemSold

ItemID As Integer

ItemName As String * 20 QSold As Integer SellPrice As Integer DateSold As String * 9

        Sale Value As Integer

End Type

Private Sub cmdShowReport_Click(),

Dim Sale As ItemSold, Daysale As Integer

Open “c:\Program File&\Microsoft Visual

 Studio\VB98\SalesFile.dat” For Random As #2 Len = Len(Sale)

First = 1

DaySale = 0

Last = LOF(2) / Len (Sale)

Target = txt Target Date. Text

Print “”

 

Do While First <= Last

Get #2, First, Sale

Current = Sale.DateSold

If (Current = Target) Then

DaySale = DaySale + Sale. Sale Value

Print “”

Print Sale.ItemID, Sale.ItemName, Sale. QSold, Sale.SellPrice* Sale. QSold

End If

First = First + 1

Loop

Print “”

Print “Total sales/or”, Target, “Are: Ksh, DaySale” Close #2

End Sub

Running the project

To run the project click the Start button on the toolbar. Alternatively, click the Run then Start command on the menu. The user-interface screen comes on the screen as shown in Figure 6.8.

 

 

 

Before doing anything else, we need to create two files on drive C and enter all the records for the stock available. This program accesses the files in a folder called VB98 through the path:

c: \Program Files \Microsoft Visual Studio \ VB98

Open Microsoft Windows Notepad and save two blank files in the folder

VB98 having the names: OldFile.dat and SalesFile.dat

  1. Click the “Add New StockRecord” button and add the following records to the file that will hold all stock. This should be the OldFile.dat that you created on drive C. Enter the following records:

ID        Name          Quantity     Cost Price Selling Price

100      Bread          120             25               30

200      Milk           50               20               40

300      Jelly            200              40               50

400      Cake           300             15               30

500      Biscuit        1000           10               20

Figures 6.9 (a) to (f) shows sample input boxes for an item for sale. After entering all the records, type Yes in the input box (f) to stop this process.

 

 

 

 

Opening the stock file to sell an item

Click the “sellitem”command to display the form in Figure 6.10.

 

 

 

Fig. 6.10: Click File – Open.

Click the open command. Open dialog box of figure 6.11 appears.

Locate for the file OldFile.dat and open it. Notice that you have to provide a record number so that when the file opens, the record requested for is displayed on the form. Click the compute totals button. You will be prompted to state how much money the customer gives. This will compute the change due to the customer. Figure 6.12 shows a form with the amount payable and change due to the customer. The units in stock for the item sold also are updated automatically.

Save the transaction by clicking the “transaction” menu, then Save transaction command. To sell another Item, click the “Sell Next” button

 

Viewing a sales report

Click the “generate Report” button. The Daily Sales Report appears. Enter the date of the transactions you want to view then click the show report button. All items sold on the particular date will be displayed as shown in Fig 6.13 below.

Form 1-4 Computer Notes

Get the latest Computer Studies Notes for Form 1, 2, 4 and 4 at no cost.

FREE COMPUTER STUDIES NOTES FORM 1-4

COMPUTER STUDIES NOTES FOR FORM 1-4 COMPLETE

COMPUTER STUDIES NOTES FOR FORM 3 PDF

COMPUTER STUDIES NOTES FOR FORM 1-4

COMPUTER STUDIES NOTES FOR FORM 3 WORD

COMPUTER STUDIES NOTES FOR FORM 4

COMPUTER STUDIES NOTES FOR FORM 2

COMPUTER STUDIES NOTES FOR FORM ONE

COMPUTER STUDIES NOTES FOR FORM 4 EDITABLE

COMPUTER STUDIES NOTES FOR FORM 2 COMPREHENSIVE

COMPUTER STUDIES NOTES FOR FORM 4

COMPUTER STUDIES NOTES FOR FORM 2

COMPUTER STUDIES NOTES FOR FORM 1

COMPUTER STUDIES NOTES FOR FORM 1 OPERATING SYSTEMS

COMPUTER STUDIES NOTES FOR FORM 1 INTRODUCTION

COMPUTER STUDIES NOTES FOR FORM 1 COMPUTER SYSTEMS

COMPUTER STUDIES NOTES FOR FORM 3 PROGRAMMING

COMPUTER STUDIES NOTES FOR FORM 3 SYSTEM DEVELOPMENT

COMPUTER STUDIES NOTES FOR FORM 2 WORD PROCESSORS

COMPUTER STUDIES NOTES FOR FORM 2 DATABASES

COMPUTER STUDIES NOTES FOR FORM 2 DATA SECURITY

COMPUTER STUDIES NOTES FOR FORM 4 APPLICATIONS OF ICT

COMPUTER STUDIES NOTES FOR FORM 1 WORK BOOK

COMPUTER STUDIES NOTES FOR FORM 3 HANDBOOK

COMPUTER STUDIES NOTES FOR FORM 1 

COMPUTER STUDIES NOTES FOR FORM 1 SIMPLIFIED

COMPUTER STUDIES NOTES FOR FORM ONE

COMPUTER STUDIES NOTES FOR FORM 2 HANDBOOK

COMPUTER STUDIES NOTES FOR FORM ONE

MORE RELATED DOWNLOADS.

COMPUTER STUDIES NOTES FORM 1-4

Computer Studies Notes, Exams, Schemes F1 to F4

COMPUTER STUDIES FORM 1 NOTES FREE

COMPUTER STUDIES NOTES FORM 1-4

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking…