Computer Skills Diploma in Nursary Teaching DNT
Computer Skills Diploma in Nursary Teaching DNT
Computer Skills Diploma in Nursary Teaching DNT
FACULTY OF EDUCATION
STUDY MATERIAL
@TU
i
COURSE TITLE: COMPUTER APPLICATION SKILLS
CODE: UCC 1102
HOURS TAUGHT: 3 Hours Per week
PREREQUISITES: None
COURSE DESCRIPTION
The purpose of the course is to enable students learn the basic skills of using a computer as a
central tool for pursuing their studies. It provides a general introduction to the broad aspects of
computer systems, how it works, a brief history of the computers and the basic components of a
computer. In addition, students will be grounded in the proper use of the Internet for research.
1.1
COURSE OBJECTIVES
By the end of the course unit, students should be able to:
1) Identify the various parts of a computer systems and what each does.
2) Identify and explain the various Operating Systems
3) Identify major software applications and what they do.
4) Describe what capabilities Internet has, what a browser does, and be able to perform
basic navigation over the worldwide web.
5) Explain the Open source software, Linux and Open Office.
COURSE CONTENT
UNIT 1: Introduction to Computers Systems 5 hours
General introduction,
computer sub-system,
hardware/ software/ human resource,
data/operating environment,
computer hardware, system unit,
monitor/ keyboard/ mouse/ printer, computer software,
application software.
MODE OF DELIVERY
Lectures
Reading assignments
In class discussions
Guided discovery
INSTRUCTIONAL MATERIALS/EQUIPMENT
Whiteboard and Markers
Flip Charts
LCD Projectors
CDs, DVDs and Tapes
READING MATERIALS
Timothy O Leary, Linda O Leary (2005). Computing Essentials 2005 Complete Edition,
McGraw-Hill Companies, Inc., NY
Sanghera (2005). Fundamentals of Computing, Kendall/Hunt Publishing Co., USA
Larry E. Long, Nancy Long (1996). Introduction to Computers & Information
System, Internet Edition, Prentice Hall College Div
Shelly OHara, Paul Wray, (2001). Introduction to Computers and the Internet for
Seniors, D D C Publications
Cohen, Bernard (2000). Howard Aiken, Portrait of a computer pioneer. Cambridge,
Massachusetts: The MIT Press. ISBN 978-0-262-53179-5.
David J. Eck (2000). The Most Complex Machine: A Survey of Computers and Computing. A K
Peters, Ltd. p. 54.ISBN 978-1-56881-128-4.
Essinger, James (2004). Jacquard's Web, How a hand loom led to the birth of the information
age.Oxford University Press.ISBN 0-19-280577-0.
Fuegi, J.; Francis, J. (2003)."Lovelace & Babbage and the creation of the 1843 'notes'".IEEE
Annals of the History of Computing.25 (4): 16.
Ifrah, Georges (2001). The Universal History of Computing: From the Abacus to the Quantum
Computer. New York: John Wiley & Sons. ISBN 0-471-39671-0.
Stokes, Jon (2007). Inside the Machine: An Illustrated Introduction to Microprocessors and
Computer Architecture. San Francisco: No Starch Press. ISBN 978-1-59327-104-6.
UNIT 1
INTRODUCTION TO COMPUTER FUNDAMENTALS
The history of the modern computer begins with two separate technologiesautomated
calculation and programmability but no single device can be identified as the earliest computer,
partly because of the inconsistent application of that term. Examples of early mechanical
calculating devices include the abacus, the slide rule and arguably the astrolabe and the
Antikythera mechanism (which dates from about 150100 BC). Hero of Alexandria (c. 1070
AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by
a complex system of ropes and drums that might be considered to be a means of deciding
which parts of the mechanism performed which actions and when. This is the essence of
programmability.
Although mechanical examples of computers have existed through much of recorded human
history, the first electronic computers were developed in the mid-20th century (19401945).
These were the size of a large room, consuming as much power as several hundred modern
personal computers (PCs). Modern computers based on integrated circuits are millions to
billions of times more capable than the early machines, and occupy a fraction of the space.
Simple computers are small enough to fit into a wristwatch, and can be powered by a watch
battery. Personal computers in their various forms are icons of the Information Age and are
what most people think of as "computers". The embedded computers found in many devices
from MP3 players to fighter aircraft and from toys to industrial robots are however the most
numerous.
Computer
A computer is an electronic machine/device capable of accepting data (input), works with the
data arithmetically and logically (processing) and produce output as a result of processing and
the results may be stored for future use. Most computers that sit on a desktop as well as
Laptops are called Personal Computers (PCs)
Technology has struggled to find its way into the classroom in all sorts of ways, from
projectors and televisions to computer labs and student laptops. Along with improving the way
students are taught, it is also vitally important that students learn to use computers to improve
their own work and prepare for careers in a world where computers have become as common as
the pencil and paper.
Modernizing Education; Education has benefited from the inclusion of technology and
computers by making it easier for students to keep up while helping teachers by improving the
way lessons can be planned and taught. Students who use computers learn to use word
Improving Student Performance; Students who use computers have been shown to attend
school more steadily and perform better than students who do not use computers. Along with
getting higher grades on exams, students also stated they felt more involved with their lessons
and work if they used a computer. Using computers gets students to become more focused on
their work at home, in collaborative projects with other students and on their own.
Learning Job Skills; Computers play a vital role in the modern business world, and many of
even the most basic jobs involve technology and computers. Teaching students how to use
computers helps them prepare for any number of possible careers, and classes based on
computer education can get even more specific. Many classes teach students to use office suite
programs, create presentations and data sheets, and learn any number of programming
languages such as C++ or Java.
Efficiency; Computers make the learning process a lot more simple and efficient, giving
students access to tools and methods of communication unavailable offline. For example,
students can check their grades or lesson plans online, and also communicate directly with their
teachers via email or educational platforms such as Blackboard. Students can also send work to
their teachers from home or anywhere else, letting them finish work outside the constraints of
school hours and teaching them about procrastination and personal responsibility.
Research;Technology has made research far easier than in the past. Decades ago, students
learned history by going to the library and thumbing through history books and encyclopedias.
Today, many of those same books are available in digital format and can be accessed online.
As the Internet has grown, so too has the available research options. Students can research
topics in minutes rather than the hours it used to take.
Communication; Of the computers located in classrooms, the NCES found that 93 percent
had access to the Internet, turning each computer into a powerful research station with access to
global information. Students can use computers to compile information and access reference
materials, enriching the content presented in the classroom and facilitating student access to
information. Internet connections also provide a quick communication method through email,
message boards and chat programs, allowing teachers to communicate with students and
parents or for students to communicate with each other during group projects.
Computer Literacy Education; Beyond the contributions computers make to the traditional
curriculum making history lessons more engaging or grammar instruction more personalized
learning how to use and manipulate computer applications is a goal of educational computing
in itself. With a world and job market that increasingly demands computer skills, students who
learn to use the devices from an early age are at a marked personal and professional advantage.
In fact, developing countries like Pakistan have ambitious computer distribution programs for
students designed to build computer literacy and democratize computer access.
Others
It has become difficult to imagine the world without the influence of computer technology and
there are more reasons to pursue this area of study than you may think.
Expanding technology
Remember? There was a time before computers ever played a role in our lives. The exponential
growth in technology has seen in the past ten years the emergence of Twitter, Facebook, smart
phones, wireless communications and many other technological advances in fields such as
medicine and robotics. At the current rate of growth, by 2020 the technological landscape and
its influence on our daily lives will be unimaginable. Therefore, when it comes to thinking
about all the potential avenues of study you could choose from, computing is always worth
considering.
An ever-expanding field
The colossal growth of computing in the past few decades offers evidence of just how
unpredictable an area it is. The scope for progression is considerable to say the least and it is
easy to see why so many people want to be part of such an opportunity. When you commit to
studying a subject the minimum you want is to know that your future is secure. Traditionally,
computer science graduates would move into programming and software engineering.
Variety
Computer science covers a great many job roles, from pure programming positions such as
.NET developers, to the opportunity to be engaged with technical change management or to
project manage development cycles. Experienced professionals also benefit from possessing a
great number of transferable skills. This allows for professionals to move around the computing
sector, keeping their workload fresh, while simultaneously developing new and solidifying
existing skills and competencies.
A solid foundation
What works for one person will not necessarily work for someone else, and of course anyone
can change their mind on what they actually want to do in their career. This is all the more
reason to dedicate some of your studies to computing. The skills you learn in computing can be
applied to so many other areas and enable you to constantly evolve your professional life. For
example, a professional using .NET to develop applications may wish to broaden their
professional skill set by moving into a more managerial position, where they will combine
technical skills with softer, managerial skills.
Chances to be creative
Although there are many varying kinds of computing roles it is an industry that encourages a
creative side. Whether it is bringing something new to the appearance of a program, process or
application, developing and improving its function, innovation goes a long way in this field.
For example, many of the worlds richest and most successful entrepreneurs have been able to
combine a strong computing background with creativity. Mark Zuckerberg, the creator of
Facebook, is a prime example of someone who used his strong technical foundation alongside a
creative mind-set that allowed him to develop an application that billions across the world now
use.
Universal significance
The increasing influence of globalisation and developments in cross-continental
communications has transformed the job market, with large businesses and corporations now
able to relocate much of their development work to nations where the demand for skills can be
met. The emergence of global technology hubs, such as Hong Kong, South Korea and
Singapore, highlights how the uptake of computing early on in schools can significantly boost
the national economy and drive up living standards for the wider population. Taking computer
Problem-solving skills
Studying computing and the logic of a variety of coding languages and processes enables you
to advance the way that you think and relate to the world.
Make a difference
Finally, studying computing can take you down a number of different paths and many of these
allow you to have a positive impact on lives in general. Computer technology is heavily
connected to the medical field, education, entertainment, architecture and even in security, so
the opportunity to ultimately use your computer studies to bring something good to people are
vast.
The ability to store and execute lists of instructions called programs makes computers
extremely versatile, distinguishing them from calculators. Therefore computers ranging from a
mobile phone to a supercomputer are all able to perform the same computational tasks, given
enough time and storage capacity.
Computers are being used in universities, secondary schools and other institutions to teach
other subjects. For example, in subjects like physics or chemistry, laboratory experiments can
be simulated on the computer. Experiments can be repeated many times without having to use
actual chemicals or equipment. Potentially dangerous experiments or expensive experiments
can be performed with little danger or expense.
Another type of system is Computer Assisted Learning (CAL). CAL tries to teach in the
traditional sense. The computer presents material, asks questions and based on students
performance, determines whether to present new material or review topics already covered.
Nowadays, the teller enters transactions directly via the terminal. The terminal is connected to
the computer which accesses the files of customers accounts. Accounts are then queried and/or
updated in a few seconds.
Today, Automated Teller Machines have become popular in the banking industry. This is a
computer controlled device from which a customer can make withdrawals and deposits, check
account balance or make an appointment with the loans officer, all without human
involvement. In order to use this system, a customer is issued a plastic card bearing his name
and account number. A Personal Identity Number (PIN) which does not appear on the card is
also issued. A combination of the two is used to access the customers account.
1.3.1.4 Commercial Enterprises
Many businesses, large and small, use computers to help them in the control of daily activities.
Some of these are:
1) Storing Employee records; all organizations keep records of their employees. An employee
record may contain information such as name, address, telephone number, and present job
classification, date of start of a job, contract period, salary scale, allowances, and
deductions.
2) Payroll Processing
3) Accounts Receivables
4) Accounts Payable Stock Control
5) General Ledger
1.4.4 Diligence
This is the ability of a computer to perform the same task over and over without getting tired
or bored.
1.4.6 Automation
Computers can perform a number of operations and functions automatically so long as they are
programmed. They do not need any supervision in order to perform program routines.
They are sensitive to the environment, and they measure physical quantities such as
temperature, pressure, length, weight, voltage, speed, humidity e.tc,
They are special-purpose computers designed to solve scientific or technical applications and
are quite rare in commercial fields
Analog computers perform there task by measuring continuous physical variable (e.g Pressure,
length and voltage), manipulating those physical variables to obtain a solution in transforming
the solution into numerical equivalent examples are:
Thermometer, Car speedometer and barometer.
Analog computers are mainly used for scientific and engineering purposes
1.7.3 Hybrid computers
These are computers which combine the feature of digital and analog .a hybrid computer is a
combination of analog and digital computers liked together by an interface system for
converting analog data to digital data and vice versa, they are used in scientific research and
other specialized application
1.8 Purpose
Here computers are classified according to what they were designed to do, some computers are
designed to perform a specific task (Special Purpose computers), while others are designed to
perform a number of tasks (general purpose computers)
Examples include missiles, building lifts and aero plane simulators. Although usually highly
efficient and much faster than general purpose computers, they perform only limited number of
functions compared to general purpose computers.
Review questions
1) Define the term computer
2) Describe the technological characteristics of the five computer generations
If you find yourself reaching too far to get the mouse pointer where you want it to be on the
screen, just pick up the mouse, move it to where it's comfortable to hold it, and place it back
down on the mouse pad or desk. The buzzwords that describe how you use the mouse are as
follows:
1) Point: To point to an item means to move the mouse pointer so that it's touching the
item.
2) Click: Point to the item, then tap (press and release) the left mouse button.
3) Double-click: Point to the item, and tap the left mouse button twice in rapid succession
- click-click as fast as you can.
4) Right-click: Point to the item, then tap the mouse button on the right.
5) Drag: Point to an item, then hold down the left mouse button as you move the mouse.
To drop the item, release the left mouse button.
The joy stick is used to play video games and offers easy and quick movements in all
directions on the screen
1.8.5.2.3 Digital Camera
Used to take electronic pictures of an object
The pictures taken by a digital camera can be used directly by a computer
1.8.5.2.4 Microphone
Used to put sound into a computer
Need sound recording software
ROM is computer memory on which data has been prerecorded. Once data has been written on
a ROM chip, it cannot be removed and can only be read. ROM retains its contents even when
the computer is turned off. ROM is referred to as being nonvolatile. Most personal computers
contain a small amount of ROM that stores critical programs such as the program that boots the
computer. In addition, ROM is used extensively in calculators and peripheral devices such as
laser printers, whose fonts are often stored in ROM.
ROM/EEPROM is built in memory that permanently stores instructions and data. The
instructions and data in ROM are created when it is manufactured and it cannot be changed
except for EEPROM which are programmable ROM and stands for Electrically Erasable
programmable read only memory.
The CD-ROM disks are inserted into your system's D: drive. They can store much more
information than a floppy disk, but your computer cannot write to them. This is because they
are Read-Only Memory (ROM).
CD ROM:
CD ROM stands for compact disk read only memory. CD ROMs have much more storage
space than disks, but are read only, which means that data can only be read from it. CD ROM
drives, such as the D: drive read the data from the CD. CD ROMs are very versatile and can
store anything from music to computer programs. When handling the CD ROM, remember to
only touch it on its edges and in the very center.
CD ROMs are read only storage medium. Typically, a CD ROM holds up to700 MB of
information. While information retrieval is faster than from a floppy disk, it is also being
replaced in usage by USB flash disks.
1.10.1.3 Registers
This is a component which stores instructions temporarily in the CPU while waiting to be
executed by ALU. The contents of the registers can be accessed more easily and quickly by the
CPU.
1.11 Output device
These devices output results of the processing outcomes .For example display screens, printers,
or speakers let you see or hear what the computer has accomplished. Monitors or Video
Display units (VDU) and Printers are the most used of all output devices
CRT (Cathode Ray Tube) which are large and bulky and cheaper but are being phased out due
to environmental concerns as well as being robust, power consuming and the inability to use
batteries as well as poor picture display quality
TFT screens commonly referred to as flat screens are becoming more popular although more
expensive.
1.11.2 Printers
Printers produce a hard copy
The information is printed on paper and can be used when the device is off.
It is also called a printout Dot-matrix printers (impact printer)
o Use drops of magnetic ink to produce dots on a page to produce text or images.
o The print quality is almost the same as a laser printer's.
o Problems with the ink
The ink is very expensive
The ink is water soluble and will run if the paper gets wet
o Highest cost per page of all the printers
o For producing color documents, it has the highest quality at a reasonable price.
Laser printers (non-impact printer)
1.12.4 Memory
Memory is becoming more and more an important consideration when looking at purchasing a
computer. Determine the amount of memory included in the computer as well as verify if that
memory can be upgraded in the future. The more memory in the computer, the more efficient
the computer will run .consider memory of 1GB and above.
.
1.12.6 Processor
The computer processor is the most important consideration when purchasing a computer.
Today, with multiple CPU/Processor manufacturers, it may be more confusing as well as more
cost efficient to look at the different processor manufactures as well as the type of computer
processors. Common processors are Intel Pentium and AMo. Speed is of essence and the higher
the speed the better, consider processors of size 3 GHz and above with a big fan for cooling.
The latest processor technology has resulted in CPU manufacturers finding ways to incorporate
more than one CPU core onto a single chip. Single core CPU and Dual core CPU. Dual core are
efficient in processing. The family of the processor also matters e.g. Intel Pentium is better Intel
Celeron
.
This helps the user to connect the USB devices to the computers for example the flash disks,
USB mouse. The more USB ports computer has, the more USB devices it accommodate at ago.
Most computers come with 6 USB ports as standard (2 at the front and 4 at the back)
1.13.2 Documentation
While most manufacturers today are reducing the amount of documentation included with their
computer, an excellent question, especially if the computer is being purchased by a new
computer user, is "what type of documentation is included with the computer?"
All computer manufacturers will include some type of paper documentation or paper inserts;
however, does this information include documentation about upgrading the computer in the
future? How to connect the cables to the computer? Documentation on how to use the
software, such as the additional included software
1.13.3 Location
We use location as a description to describe several different topics. First, what is the location
of where the computer is purchased: If the computer is purchased at a local retail store, can the
computer be returned if unsatisfactory to that store? If the computer is purchased through mail
order or directly through the computer manufacturer or reseller, where can the computer be
returned if unsatisfactory?
Second, can the store location of where the computer was purchased service the computer? If
not, where is the closest location to where the computer can be serviced?
Third, if the computer is purchased directly from the computer manufacturer and is shipped
through mail, how is it shipped? What is the time period for the computer to arrive to your
destination? What happens if the computer is damaged during shipping?
1.13.4 Refurbished
Refurbished is a term used to describe a computer or a hardware device or component in a
computer that has been used, looked at and determined to be in working order. However,
because the product has been used or purchased, it cannot be sold as new.
Refurbished computers will have a lower price and are generally a good deal for users who
may not have a lot of money to spend on a new computer. It is important, however, to
compare the price of the refurbished computer to a new computer as well as to review all of
the tips on this page as all the same rules, tricks and tips still apply.
1.13.6 Service
Service is an important consideration to look at when looking to purchase a computer, new or
used. The service is how many companies describe the repair of a computer if it or a
component within it is to become broken. Below is a listing of what type of service to look for:
i. What type of service is offered? Is the service onsite, meaning a technician will come to
your location to replace or fix a bad component. If the service is onsite, is it for the
complete time of the warranty?
ii. If onsite is not offered, what is and for how long?
iii. Can the computer be taken to a local service center? If yes, what is the closest
authorized service center?
iv. What is the time frame the service takes to occur? For example, if the computer has a
bad component, what is the time it will take for a technician to come onsite and replace
that component, or what is the time it will take to have the computer sent in to be fixed?
Finally, if that time frame is not accomplished, what is the company willing to do, for
example, are they willing to provide you with a loaned computer.
1.13.7 Software
Software for many computer users, especially new users, is thought to be an important
consideration when purchasing a new computer. Granted there is software that we highly
recommend looking for when purchasing a computer, such as word processor or spread sheet
program, some computer companies may over hype the software package. Below is a listing of
what to look for when looking at the software included with a computer.
i. Does the software include a word processor and/or a spread sheet? For the majority of
all users, this should be an important consideration.
ii. Are the software full versions of the software or is the software demo program or
shareware programs?
1.13.8 Support
While you can always contact Computer Hope for support, manufacturer support for most users
will be a very important consideration as if an issue arises with the computer you must be able
to contact a support representative. Things to consider when looking at the support options of a
computer are:
1. Is support open 24 hours, 7 days a week? If not, what are the hours?
2. Is support open on holidays? If not, what days are it closed?
3. What support options are available? Phone? E-mail? Web? Chat?
1.13.9 Upgrade ability
While this option may not be considered at first when purchasing a computer, it is an important
consideration. Below is a listing of different options to look for when looking to upgrade a
computer.
i. What can be upgraded in the computer? RAM? CPU? Hard Drive? Video Card? If
available to upgrade, what are the maximum amounts or is it specified within
documentation provided with the computer?
1.14 SCAMS
Unfortunately, like anything, it is possible to be tricked or for computer companies to scam
you. Below is a listing of what to look for when purchasing a computer.
Get what you pay for - Ensure that the product you are purchasing is what you are
paying for. It has been known that computer companies may list a processor being a
specific speed, however, actually have a totally different speed of processor in the
computer. This unfortunately can be very easy as any user can 'over clock' a processor
making it appear as one speed but in reality being a completely different speed. For
example, you may buy a 733MHz processor but instead get a 500MHz.
To determine the processor speed, open the computer and look at the processor itself.
Do not look at the processor through a software program or through BIOS as these
values can be changed or tricked.
Legal software - When purchasing a computer, ensure it comes with legal software.
Many end-users or small computer companies who build or sell computers may not
provide you with legal copies of the software that is illegal. Verify that the software
that came with your computer is on a standard CD and not a burnt CD. A burnt or
home-made CD will generally be a different looking CD and have a gold or green
bottom. Ensure that if the software requires a license or registration number that it
was included with the computer. An example of software that includes these
certificates is Microsoft Office and Windows.
2 Computer Software
Computer System
Computer Hardware Computer Software
Computer Application Skills DNT-in-service Lecture Materials Page 35
Output Input Processing Storage Application System
Devices Devices Devices Devices software Software
2.1 Definition
Refers to a set of instructions which enable computer hardware to function/operate effectively,
i.e., a software that instructs the hardware on what to do and how to do it.
Examples include, MS word, MS excel, Windows, MS DOS, UNIX, Linux
Program: This is a series of step by step instructions that provide solutions and tell the
computer what to do.
They meet special needs for an organization or company therefore they are dependable i.e.
make life easy for the users
These packages are expensive in terms of paying the programmer to design a program
They are not flexible since they were designed for special tasks
2.2.2.2 General application packages
These are programs which are used to perform general tasks in an organization such as
Ms Access, Ms Excel, Ms Word
General purpose packages are cheap
They are flexible since they were designed for many tasks
The only shortcoming is:
They dont help you achieve a specific goal broadly
2.3 Computer Virus
2.3.1 Definition
A computer virus is a computer program that can copy itself and infect a computer
without the permission or knowledge of the owner with the purpose of damaging the
Most personal computers are now connected to the Internet and to local area networks,
facilitating the spread of malicious code. Today's viruses may also take advantage of
network services such as the World Wide Web, e-mail, Instant Messaging, and file
sharing systems to spread.
A computer virus is usually hard to detect if it's disguised as a harmless file, in the case of
a Trojan horse virus. This type of virus doesn't replicate itself like most viruses, but
instead opens your computer up to malicious imposters. Leaving you to wonder, how
you can tell if you're computer is infected?
Luckily, your computer after coming in contact with a virus or worm will display some
symptoms and signs of infection. It is particularly useful to know the signs that indicate
an infection. Because you can unintentionally introduce a virus to your computer at
anytime when you run an infected program or open an email attachment. To guard
against this you need a good anti-virus program
The information in this guide will help you to develop good working practices when using a
personal computer or workstation.
If you learn good habits now, it saves you from experiencing problems in the future.
Type using both hands ... or better still, learn to touch type
If your arms are raised or your wrists are bent for long periods of keyboarding, tendon and
nerve disorders can result.
It is worth learning to touch type because typing encourages the correct positioning of your
hand and wrist so you will not overstrain your forefingers.
Remember that using the mouse a great deal can put a strain on your hand and wrist muscles.
2.3.4.4 Radiation
The Health and Safety Executive state that there is no evidence that electromagnetic radiation
emitted from computers causes miscarriages, cataracts or skin diseases.
Reviewquestion
Alphabet keys
Keyboard
When you press the Tab key, the cursor navigates around the screen in a predetermined path.
The Tab key scrolls from the top to the bottom of the screen. If you want to scroll up, hold
down the Shift key and press the Tab key.
Some computer users prefer to use the keyboard to accomplish various tasks on the screen.
They rely on the Alt, Ctrl, Tab, and Enter keys to activate the same functions as the mouse.
With both the mouse and keyboard, you can accomplish nearly every task.
3.3.2.1 Keyboard Tips
Three buttons found on almost every window are the minimize, resize, and
close buttons. These are found in the upper right corner of each window. The minimize button
allows you to minimize or set aside a program, so it remains open or active, but allows you to
see the Windows Desktop. The resize button (also called the maximize or restore button)
allows you to change the size of the window on the screen. The close button closes the window
and program. You would need to restart the program if you click on the close button.
3.6 Computer Rules and Lab care
1) A computers must rest on a firm table to avoid shaking , shaking may damage the disk
2) Never abstract the ventilation of the computer casing
3) Never connect computer when the system unit is on
4) Never move the system unit when power is on
5) Avoid diskettes coming from outside, because they may come with Virus
6) Ensure that the computer is in an open space where there is free air circulation
7) Ensure that there is Antivirus
8) Always use stabilizers to protect your computer from damage by power fluctuations
9) Ensure that the connection is firm
10) Service your computer at least twice in a year
11) Do not open a computer for inside cleaning , unless you are qualified person( Technician)
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system. Such illegal activities can be very frustrating for you, and
so instead of just ignoring it, you should make an effort to try and stop these activities so that
using the Internet can become that much safer.
4.4.2.3 Virus threat
Virus is nothing but a program which disrupts the normal functioning of your computer
systems. Computers attached to internet are more prone to virus attacks and they can end up
into crashing your whole hard disk, causing you considerable headache.
4.4.2.4 Pornography
This is perhaps the biggest threat related to your childrens healthy mental life. A very serious
issue concerning the Internet. There are thousands of pornographic sites on the Internet that can
be easily found and can be a detrimental factor to letting children use the Internet.
4.5 Advantages and Disadvantages of Networking Computers
4.5.1 Advantages of Networking
4.5.1.1 Connectivity and Communication
Networks connect computers and the users of those computers. Individuals within a building or
work group can be connected into local area networks (LANs); LANs in distant locations can
be interconnected into larger wide area networks (WANs). Once connected, it is possible for
network users to communicate with each other using technologies such as electronic mail. This
makes the transmission of business (or non-business) information easier, more efficient and
less expensive than it would be without the network.
4.5.1.2 Data Sharing
One of the most important uses of networking is to allow the sharing of data. Before
networking was common, an accounting employee who wanted to prepare a report for her
manager would have to produce it on his PC, put it on a floppy disk, and then walk it over to
the manager, who would transfer the data to her PC's hard disk
4.5.1.3 Hardware Sharing
Networks facilitate the sharing of hardware devices. For example, instead of giving each of 10
employees in a department an expensive printer, one printer can be placed on the network for
everyone to share.
4.5.1.4 Internet Access
The Internet is itself an enormous network, so whenever you access the Internet, you are using
a network. The significance of the Internet on modern society is hard to exaggerate, especially
for those of us in technical fields.
4.5.1.5 Internet Access Sharing
Small computer networks allow multiple users to share a single Internet connection. Special
hardware devices allow the bandwidth of the connection to be easily allocated to various
individuals as they need it, and permit an organization to purchase one high-speed connection
instead of many slower ones.
4.5.1.6 Data Security and Management
In a business environment, a network allows the administrators to much better manage the
company's critical data. Instead of having this data spread over dozens or even hundreds of
small computers in a haphazard fashion as their users create it, data can be centralized on
shared servers. This makes it easy for everyone to find the data, makes it possible for the
Ethernet LocalTalk
No computer slot
Requires computer slot
necessary
ix. Occasionally Run Online Virus Scans - Unfortunately not all antivirus programs are
created equal. Each program may find infections that other antivirus programs do not
and vice-versa. It is therefore recommended that you occasionally run some free online
antivirus scanners to make sure that you are not infected with items that your particular
antivirus program does not know how to find. Two online scanners that we recommend
are:
http://housecall.antivirus.com/
http://www.pandasoftware.com/activescan/
Every once in a while, maybe once every 2 weeks, run one or both of these scanners to
Computer Application Skills DNT-in-service Lecture Materials Page 63
see if they find anything that may have been missed by your locally installed antivirus
software.
x. Use a Firewall - I can not stress how important it is that you use a Firewall on your
computer. Without a firewall your computer is susceptible to being hacked and taken
over. You may say "Why do I need a firewall?" I have all the latest updates for my
programs and operating system, so nobody should be able to hack into my computer".
Unfortunately that reasoning is not valid. Many times hackers discover new security
holes in software or operating system long before the software company does and
therefore many people get hacked before a security patch is released. By using a
firewall the majority of these security holes will not be accessible as the firewall will
block the attempt.
xi. Update your security programs regularly - As always if you do not update your
programs, your programs will not be able to find the newest infections that may be
racing around the Internet. It is therefore important that you upgrade the software
and spyware/virus definitions for a particular program so that they are running the
most effectively.
xii. Switch to another browser, like Firefox, or make your Internet Explorer more secure
- Internet Explorer as shipped is by default insecure. With that said you have two
choices; either make Internet Explorer more secure or switch another browser like
Mozilla Firefox. It's an excellent browser and is secure right after installing it. You can
find more info on switching from Internet Explorer to Firefox.
5.2 New crimes in cyberspace
There are three major classes of criminal activity with computers:
Unauthorized use of a computer
This might involve stealing a username and password, or might involve accessing the
victim's computer via the Internet through a backdoor operated by a Trojan Horse
program.
Creating or releasing a malicious computer program (e.g., computer virus, worm,
Trojan horse).
Harassment and stalking in cyberspace.
5.3 Old crimes
Similarly, many crimes involving computers are no different from crimes without computers:
the computer is only a tool that a criminal uses to commit a crime. For example,
Using a computer, a scanner, graphics software, and a high-quality color laser or ink jet
printer for forgery or counterfeiting is the same crime as using an old-fashioned printing
press with ink.
Stealing a laptop computer with proprietary information stored on the hard disk inside
the computer is the same crime as stealing a briefcase that contains papers with
proprietary information.
Using the Internet or online services to solicit sex is similar to other forms of
solicitation of sex, and so is not a new crime.
Using computers can be another way to commit either fraud.
5.3.1 False origin
There are many instances of messages sent in the name of someone who neither wrote the
content nor authorized the sending of the message. For example:
During 1950-1975, computer programs and data were generally stored on cardboard cards
with holes punched in them. If a vandal were to break into an office and either damage or
steal the punch cards, the vandal could be adequately punished under traditional law of
breaking and entering, vandalism, or theft.
However, after about 1975, it became common to enter programs and data from remote
terminals (a keyboard and monitor) using a modem and a telephone line. This same
Computer Application Skills DNT-in-service Lecture Materials Page 65
technology allowed banks to retrieve a customer's current balance from the bank's central
computer, and merchants to process credit card billing without sending paper forms. But this
change in technology also meant that a criminal could alter data and programs from his home,
without physical entry into the victim's building. The traditional laws were no longer adequate
to punish criminals who used computer modems.
Most unauthorized use of a computer is accomplished by a person in his home, who uses a
modem to access a remote computer. In this way, the computer criminal is acting analogous
to a burglar. The classic definition of a burglary is:
The breaking and entering of a building with the intent to commit a felony therein.
In traditional burglaries, the felony was typically an unlawful taking of another person's
property. However, in the unauthorized use of another's computer, the criminal "enters" the
computer via the telephone lines, which is not breaking into the building. Either the burglary
statute needed to be made more general or new criminal statute(s) needed to be enacted for
unauthorized access to a computer. Legislatures chose to enact totally new statutes.
To successfully use a remote computer, any user (including criminals) must have both a valid
user name and valid password. There are several basic ways to get these data:
a. Call up a legitimate user, pretend to be a system administrator, and ask for the
user name and password. This sounds ridiculous, but many people will give out such
valuable information to anyone who pretends to have a good reason. Not only should
you refuse to provide such information, but please report such requests to the
management of the online service or the local police, so they can be alert to an active
criminal.
b. Search user's offices for such data, as many people post their user name and password
on the side of their monitor or filing cabinet, where these data can be conveniently seen.
c. Write a program that tries different combinations of user names and passwords until one
is accepted.
d. Use a packet "sniffer" program to find user names and passwords as they travel through
networks.
e. Search through a garbage bin behind the computer building in a university or corporate
campus, find trash paper that lists user names and passwords.
A disgruntled employee can use his legitimate computer account and password for
unauthorized uses of his employer's computer. This can be particularly damaging when the
disgruntled employee is the computer system administrator, who knows master password(s)
and can enter any user's file area. Such disgruntled employees can perpetrate an "inside job",
working from within the employer's building, instead of accessing a computer via modem.
The computer voyeurs, like petty criminals who peek in other people's windows, generally hack
into other people's computers for the thrill of it. In the 1970s and early 1980s, many of these
computer voyeurs also used technology to make long-distance telephone calls for free, which
technology also concealed their location when they were hacking into computers. Many of
these voyeurs take a special thrill from hacking into military computers, bank computers, and
telephone operating system computers, because the security is allegedly higher at these
computers, so it is a greater technical challenge to hack into these machines.
In a typical attack, the hacker will delete some pages or graphics, then upload new pages with
the same name as the old file, so that the hacker controls the message conveyed by the site.
This is not the worst kind of computer crime. The proper owner of the site can always close the
website temporarily, restore all of the files from backup media, improve the security at the site,
and then re-open the site. Nonetheless, the perpetrator has committed a computer crime by
making an unauthorized use of someone else's computer or computer account.
One example of punishment for the crime of defacing a website is the case of Dennis M.
Moran. On 9 March 2001, Moran (alias "Coolio"), a high school dropout, was sentenced in
New Hampshire state court to nine months incarceration and ordered to pay a total of
US$ 15000 restitution to his victims for defacing two websites:
1. In November 1999, he defaced the website of DARE America, an organization that
campaigns against use of illicit drugs, whose website was in Los Angeles, California.
2. In February 2000, he defaced the website of RSA Security in Massachusetts.
3. In February 2000, he made "unauthorized intrusions" into computers at four different
U.S. Army and Air Force installations.
5.3.4 Denial of Service (DoS) Attacks
A denial of service attack occurs when an Internet server is flooded with a nearly continuous
stream of bogus requests for WebPages, thereby denying legitimate users an opportunity to
download a page and also possibly crashing the web server.
The following are general terms for any computer program that is designed to harm its
victim(s):
Malicious code
Malicious program
Malware (by analogy with "software")
Rogue program
Malicious computer programs are divided into the following classes:
i. A virus is a program that "infects" an executable file. After infection, the executable
file functions in a different way than before: maybe only displaying a benign message
on the monitor, maybe deleting some or all files on the user's hard drive, maybe altering
data files.
The word "virus" is also commonly used broadly to include computer viruses, worms,
and Trojan Horse programs. For example, so-called "anti-virus software" will remove
all three classes of these malicious programs.
ii. A worm is a program that copies itself. The distinction between a virus and worm is
that a virus never copies itself a virus is copied only when the infected executable file
is run.
Some of the more serious Trojan horses allow a hacker to remotely control the victim's
computer, perhaps to collect passwords and credit card numbers and send them to the
hacker, or perhaps to launch denial of service attacks on websites.
Some Trojan Horses are installed on a victim's computer by an intruder, without any
knowledge of the victim. Other Trojan Horses are downloaded (perhaps in an attachment in
e-mail) and installed by the user, who intends to acquire a benefit that is quite different
from the undisclosed true purpose of the Trojan horse.
iv. A logic bomb is a program that "detonates" when some event occurs. The detonated
program might stop working (e.g., go into an infinite loop), crash the computer, release
a virus, delete data files, or any of many other harmful possibilities. A time bomb is a
type of logic bomb, in which the program detonates when the computer's clock reaches
some target date.
v. A hoax is a warning about a nonexistent malicious program.
The toolbars in Microsoft Word provide easy access and functionality to the user. There
are many shortcuts that can be taken by using the toolbar. First, make sure that the proper
toolbars are visible on the screen.
1. Click View
2. Select Toolbars
3. Select Standard, Formatting, and Drawing
Or
After Saving your work with the name, then you can make continuous saving by clicking
on File , Save ,by clicking on the save Icon on the Standard tool bar of Pressing CTL +S
To move a small amount of text a short distance, the drag and drop method may be quicker.
Highlight the text you want to move click the selection with the mouse, drag the selection to
the new location, and release the mouse button.
6.6.7 Copying text
To copy text, choose edit/copy, click the copy button on the standard tool bar, or press CTRL +
C to copy the text to the clipboard.
6.6.9 Columns
To quickly place text in a column format, click the columns button on the standard toolbar and
select the number of columns by dragging the mouse over the diagram.
For more columns options, select format / columns from the menu bar. The columns dialog
box allows you to choose the properties of the columns. Select the number and width of the
columns from the dialog box.
6.6.10 Drop caps
A drop cap is a large letter that begins a paragraph and drops through several lines of text.
i. Place the cursor within the paragraph whose first letter will be dropped or highlight
the letter to be dropped.
ii. Select format / drop cap from the menu bar.
i. Click the bulleted list button or numbered list button on the formatting tool
bar.
ii. Type the first entry and press ENTER. This will create a new bullet or
number on the next line. If you want to start anew line with out adding
another bullet or number, hold down the SHIFT key while, press ENTER.
iii. Continue typing entries and press ENTER twice when you are finishing
typing to the end the list.
6.6.12 Addition
Use the increase indent and decrease indent buttons on the formatting tool
bar to create lists of multiple levels.
NOTE; You can also type the text first, highlight the section, and press the bulleted or
numbered list buttons to add the bullets or numbers.
6.6.13 Nested list
To create a nested list, such as a numbered list inside of a bulleted list, follow these steps;
1. Type the list and increase the indentation of the items that will make up the nested list
by clicking the increase indent button for each item.
6.6.13.1 Lists
Bulleted and numbered lists
Nested list
Formatting list
In the following exercises you will learn some of the necessary steps to create a spreadsheet
using Microsoft Excel 2003 for Windows 2000, Me, and XP. You will learn not only how to
type various items into the spreadsheet, but also how to copy columns, widen columns, fill
columns, add, subtract, multiply, divide, do graphics and a variety of other things.
To begin, load the spreadsheet by quickly clicking twice on the Excel 2003
Windows Icon in the Windows Screen. If you do not see an Excel Icon,
click-on the Start Button in the lower left corner of the screen, move the
cursor up to Programs, and then move to Microsoft Excel 2003 and click-on it.
Notice that the main part of the spreadsheet is composed of Rows (Labeled 1, 2, 3, 4,
etc.) and Columns (Labeled A, B, C, D, etc.). There are a lot of rows and columns in a
spreadsheet. The intersection of each row and column is called a cell. In the image
above the cursor is on the home cell A1. Notice Row 1 and Column A are bold,
and colored orange. This indicates what is called the address of the cell. Notice
right above cell A1, that A1 is displayed in a small box called the Name Box.
Whenever you click on a cell the address of that cell will be shown in the Name Box.
In this tutorial, whenever we indicate that you need to click the mouse, it will mean
to click the left mouse button unless we indicate that you should click the right
mouse button. So, always click left unless we tell you otherwise.
7.2 Moving Around the Spreadsheet
You can move around the spreadsheet/cells by clicking your mouse on various cells, or by
using the up, down, right and left arrow movement keys on the keyboard. Or, you can
move up and down by using the elevator bars on the right and bottom of the spreadsheet.
Go ahead and move around the spreadsheet. Hold down the down arrow key on the
keyboard for a few seconds then click-on a cell. Notice how the Name Box always tells you
Computer Application Skills DNT-in-service Lecture Materials Page 80
where you are. Now hold down the right arrow key on the keyboard for a few seconds.
Notice how the alphabet changes from single letters (A, B, C,.
. Z) to several letter
combinations (AA, AB, AC). There are hundreds of columns and thousands of rows in a
spreadsheet. Anytime you desire to return to the Home Cell (A1) simply click-in the Name
Box and type-in A1. Then tap the Enter key and you will go to cell A1. You can go to any
cell by this method. Simply type-in a row and column, tap the Enter key, and youll go to that
cell.
Now that you have the feel of how to move around Excel spreadsheet, go to the cells as
indicated below and type-in the following:
Cl (Your Name)'s Budget. It should look similar to the image below. Do not tap Enter
when you finish
Look at cells C1 and D1. Notice how your entry has spilled over from C1 into D1.
Sometimes this is a problem, and sometimes it is not. Tap the Enter key and then click-on cell
D1 and type-in the word BONZO and tap Enter key.
Notice how Bonzo now COVERS the right part of your original entry!! Now move back to
cell C1 and click-on it. Look at the upper part of the spreadsheet, just above the cells where
you typed Bonzo. Your name and the word budget are still there! Bonzo only COVERED the
portion in cell D1. See the image and arrow below.
Now we'll continue making some entries. Move to the following cells and type-in the
information indicated. You can click-on each cell and then type-in the entries.
If you happen to make a mistake simply retype the entries. Later on we'll see how to edit
mistakes. Any time you want to replace something in a cell you can simply retypea new entry
and it will replace the old one.
Cell Type-in
A3 Income
B4 Parents
B5 Job
B6 Investments
B7 Total
A10 Expenses
B11 Food
B12 Beverages
B13 Parties
B14 Miscellaneous
B15 Total
Your spreadsheet should now look like the picture on the right.
At this point you probably have noticed, the words "Investments" and "Miscellaneous"
run over the spaces given in the cells. Do not be concerned at this point. We ll soon fix
this.
If the thick line does not show-up at the top of the Text box, click-again at the top
line area in the Text box and the line will disappear. Then click-on the thick, single
line in the Line Style box again and repeat the previous instructions. If, somehow, you
make a mistake, simply click on and off in the Text line boxes. You will notice that
the lines appear and disappear. This is called a toggle in computer jargon. So, work at
this until you get the line on the top or where you want it. We have just indicated that we
want a single thick underline at the top of the cell C7. Point to OK and click the left
mouse button.
When you return to the spreadsheet, click somewhere other than cell C7. This is
called clicking away. You should now see a line at the top of cell C7. Sometimes the
box highlighting a cell hides the lines. If you messed-up, try again.
Now, underline the top of cell C15 like you did cell C7.
You probably noticed, as you typed in the numbers, some of the words were just too
wide for the default cell width (Investments and Miscellaneous). Let's widen column B
to take care of this.
Slowly move the mouse arrow to the right edge of the B cell (between the B and the
C). The cursor will turn into an arrow pointing right and left with a small vertical line
in the middle (see arrow below). Hold down the left mouse button and move (drag)
the line to the right.
As soon as you start to move (drag), a dotted vertical line will go down the
spreadsheet and it will move as you hold down the left button and drag the mouse.
Keep dragging to the right until you are past the widest word and a bit more (for some
space). Release the button. The column is widened. Notice in the upper left corner of
the screen, below File in the menu bar, and above the buttons, that as you hold down and
drag that it tells you that current width of the column.
Oops... a mistake (on purpose). We haven't left enough room at the top of the
spreadsheet to insert some budget months. So... move the cursor to the gray 2 along the
left edge (this is the second row) so we can insert two new rows. Click the left mouse
button. You will notice that the whole row goes light blue and the 2 turns dark blue.
Make sure the cursor arrow is either on the 2 or somewhere in the blue row.
When the
Format
Cells Menu
appears, click-on
the Alignment
Tab and then click-
on -- Horizontal -
Center --Vertical -
Center -- then click
OK. Try it.
This is how you can align words for neatness. You can also point to several cells you
want aligned and do this. We'll try that next.
D3 OCT
E3 NOV
F3 DEC
G3 MONTHLY TOTALS (tap the Enter key and then correct the width of
this column)
Next well highlight cells C3 through G3. To do this, point to C3 and click the Left
mouse button. Then, holding down the left mouse button, drag the mouse to the right
through G3 when the cells are highlighted take your finger off of the left mouse
button. Then point to the group of cells and click the right mouse button to bring up the
Format Cells menu. Click on Alignment and choose Center (vertical & horizontal).
Then point to OK and click the left mouse button. All of the cells will then be as
centered.
You could also click the Center button as you did before.
MONTHLY TOTALS will not fit its space when you do this. But, you know what to
do. Move the cursor over the line between cells G and H and drag the line to the right to
widen the G cell just like you did a few minutes ago.
To the right of File name: delete the information (which is in the box) and type-in
MYBUDGET (see lower left arrow). This is the name under which you are saving your
file. (In the future you will choose logical names for your spreadsheets as you save
them.) Now point to Save and click the left mouse button (see lower right arrow).
Click on the down arrow to the right of the Look in: box (Similar to the arrow in the
Save in: box see top arrow). Click-on the 3 ½ Floppy (A:), or the drive or folder you
chose. Files saved on a disk or in a folder will appear in the box below. Click-on your
file (MYBUDGET), and then click-on Open. Your file will open. You could also
double-click quickly on the file to open it.
Also, if you have not done so already, move your cursor slowly over the "buttons"
located below the menu bar. You will notice a little box appears that tells you what
these buttons do. These little boxes are called Text Help boxes. Many of them will save
you extra clicks by using them. Notice, that under File and Edit in the Menu bar,
there are a small folder (Open) and a diskette (Save). Clicking-on them will take you
directly to Open and Save.
Next we want to learn how to add numbers. There are several ways to do this. Each
method has its advantages and disadvantages.
To do this, begin by moving your cursor to cell C9, and clicking-on cell C9.
We want to add the three numbers in cells C6, C7 and C8. To use this method type-in
(using the keys on the keyboard) the following in cell C9:
= C6 + C7 + C8
When you have completed typing your equation, you will see
this formula in the area below the menu bar.
Change the number in cell C6 to 500 (and tap Enter). See how the total
AUTOMATICALLY recalculates!!!
Something happened here. Notice how you typed in an (equal sign) = before the cell
location. If you had simply typed in C6 + C7 + C8, Excel would have thought this entry
was a word (text) and this entry would have shown as you typed it.
Try this if you want. Any time you create an error in Excel, you can simply re-type or
edit the formula to correct the error.
The Type in Method is really easy if you have a few numbers and can see their cell
locations on the screen. If you have a lot of cells in the formula, which are on several
You can put in a (minus) - for subtraction, (asterisk) * for multiplication, and (slash) /
for division. As you become more capable we'll, build some nifty formulas using these
features.
7.10.2.1 Point Method
Move to cell C9 again and click-on it. We'll now add the numbers a second way. Tap
the Delete key on the keyboard to delete the current formula.
First, tap the = and then POINT (move) the cursor over cell C6 using the mouse, tap
the left mouse button on cell C6 (you will see a marquee box go around the cell). Now
tap a + and move cursor to C7, tap the left mouse
button, and tap another + and move the cursor to
C8 and tap the left mouse button (notice how as
you " + and point " the addition formula is being
built in cell C9), now tap Enter. The same
formula can be built using the arrow movement
keys on the keyboard (except that you dont have
to click-on each cell as the cell is marked - as you move the arrows). Notice, as you are
entering the cell addresses, that as you place another + in the formula, that the cursor
returns to cell C9. Also notice, as you point to each cell that it is highlighted by a
marquee box. This tells you what cell youve pointed to. Pretty neat!
This method is good when you need to move to numbers that are spread out all over
the place. Some people like it best and use it all the time -- it's your choice.
7.10.2.2 Function Method
Move again to cell C9. Delete the formula by tapping the Delete key again.
[This tells Excel that we are going to sum some numbers in a RANGE which will
follow the =SUM(.]
Point to cell C9 again. Tap the Delete key to remove the formula currently in cell C9.
This is a really important DELETE, since what well explain below wont work
correctly if you do not delete the formula in cell C9.
7.11 Functions
Two menu screens will now appear at the same time. An Office Assistant will
appear (see image on left of next page) and you can ask it questions (the little assistant
may be a paper clip or just about anything). The Insert Function menu screen will also
appear (see image on right of next page). The two menu screens work together to assist
you when you are using functions.
This is a really great, timesaving feature. Well now show you how to use the Help
features of Excel 2003 to work with and understand these functions.
The Select a function menu will look like the image below.
Look at all the functions (formulas)! Well just go through how to use the addition
formula (SUM) in this tutorial. If you need these formulas in the future, you ll know
theyre here.
Use the elevator bar on the right side of the Select a function menu screen to move
down the list until you see SUM. Click-on SUM.
Remember, you clicked-on Cell C9 which was empty because you deleted the
formula in that cell.
But its a little unclear how Excel did this. The Help in Excel Functions is excellent. So,
to see how this SUM equation works, well go to Help. To do this, click-on Help on this
function in the lower left corner of the screen (see lower left arrow above).
One of the really neat things about these Help windows is that there are examples for
each function. We moved down the SUM help screen using the elevator bar on the
right of the help screen. The bottom of the screen looks like the image at the top of the
next page. Spend a few minutes looking at the SUM Help window and notice all of the
features.
The bottom
of the SUM
help screen
looks like
the image
on the left.
Notice that
it gives you
examples
from a
small
spreadsheet
that has
data in cells
A1 through
A6. It uses
these
numbers in
the
examples at
the bottom of the help screen.
The Function
Arguments
menu screen
will still be
on the screen.
If the Office
Assistant is
still on the
screen simply point to it and click the RIGHT mouse button. A pop-up menu will
appear. Click-on Hide. This will put the Assistant away until we need it again
As you can see, in the area to the right of Number 1, the Wizard has guessed that
you want to add the numbers in the range C6 to C8. Now that you are becoming
proficient with Excel, well try something special. Carefully, point to some plain
part, in the gray area above. Click and hold down the left mouse button, and drag the
above SUM box away so that you can see your numbers in C column cells. When
Highlight cells C6 to C8 in the spreadsheet (click-on C6, hold down the left mouse
button, and drag until the three cells are highlighted). A marquee will begin to
flash around the cells, indicating they are highlighted (left arrow above). The Function
Arguments area will appear as above. Now click-on the small button on the right of
the cell (see right arrow above). The numbers will show in the area to the right of
Number 1. Now, click-on OK at the bottom of the Function Arguments menu screen.
Youll see that the SUM formula [=SUM(C6:C8)] shows in the formula area at the
top of the screen. This is a really handy method to highlight a “group” of numbers you
want to add.
AutoSum METHOD - ∑
This would be a good time to save your work. Periodically save and replace your
work in case you loose power to your computer
Now move to cell C17 and add the total Expenses in cells C13 to C16 - using each of
the four methods.
While you are in cell C17, go ahead and place a line at the top of cell C17 using the
format cells border method that you learned on Page 5.
Subtraction
In cell C19 we want to subtract ( - )the amount in for Expenses in cell C17 from the
amount for Income in cell C9. This can be accomplished by using either the Type-In
Method or Point Method. Go ahead and do this. Dont forget to tap the Enter key to
confirm your formula.
We want our numbers to look better. To do this we'll include dollar signs and decimal
points in our numbers. This is done by using the mouse. Point to cell C6, hold down
the left mouse button and drag down slowly to highlight cells C6 through C19. Your
screen should look like the one at the top of the next page.
Click-on the Number “Tab at the top of the Format Cells menu screen. Point to
Currency and click-on Currency.
Now move to cell A21 and type in the word Percent. We're going to calculate a fun
percentage to show you how division works and give you some more practice with
numbers.
Now move to cell C21. Using either the Type-In Method or the Point Method, divide
( / ) the amount for Income in cell C9 by the amount for Expenses in cell C17.
This will give you a horrid number so why not put a percent symbol with it. Now well
repeat what we did above to format our $$$$.
Point to cell C21 and click the RIGHT mouse button. Point to Format Cells, then click
the Number tab, then click-on Percentage. Select zero ( O ) Decimal Places. Click
OK. Ta Da !!! a %.
7.14 Copying
You will notice that once again, when you highlight an area, a
marquee of running lights moves around the copy area. So, youll
know you highlighted the correct area (image on right).
Now we'll tell the program where to copy the information. Point to
cell D6, click and hold down the left mouse button and drag down
and to the right to cell F21 (This will highlight three columns --
OCT, NOV, DEC -- to copy to.). When you have finished your
highlighting, your screen should look like the one at the top of the
next page.
Now point to Edit in the Menu Bar again and click the left button. Point to Paste. Click
left button. Wow !' All those numbers and dollar signs and formulas -
EVERYTHING - was copied in a flash!! That sure saved us a lot of time.
Note: You can also utilize the copy and paste buttons in the button bar to do this if
you desire.
Change a few numbers in each of the months in both the income and expense
areas to see how the spreadsheet works. (This will make the graphs well create
more realistic when we create them later in the
tutorial.)
There are times, when we are working with a spreadsheet, that we do not want a cell to
"roll" to the next column when we use the copy feature of the spreadsheet like it did
in our last copying exercise. To stop the cells from rolling we utilize something called
absoluting. The following is an illustration of absoluting.
Go to cell A23 and type-in Number. Go to cell A25 and type-in Result.
The result in C25 should be two times the net income in cell C19.
Now copy the formula in cell C25 to cells D25, E25, F25 and G25. Your row 25 should
look similar to the one below.
Point to each of the cells D25, E25, F25 and G25. Notice, as you click on each cell and
look at the screen, how C23 (the cell with the 2) "rolled" and became D23, E23, F23
and G23 (which are blank - this caused the "0's"). A blank times a number is a
0.We want the 2 to be in each formula and not to "roll".
Go back to cell C25. Now we'll enter the formula again, but a little differently
(to anchor the 2).
Type-in a =C23 (or you could type = and point to C23). NOW, tap the F4 key.
Notice, in the Edit bar at the top of the screen, that the =C23 changes to: $C$23.
(This tells you that cell C23 is absoluted or anchored. The "$'s" indicate the
absoluting.) Now finish the formula by typing in or pointing *C17 as before. Tap
Enter.
Now copy the formula in cell C25 to cells D25, E25, F25 and G25 again. Your row 25
should look similar to the image below.
The numbers should now be correct. Point to cells D25, E25, F25 and G25 (like you did
before). You will notice the "$'s" have copied the =$C$23 to each cell (absoluting) and
the Net Income figures have rolled as they should. Absoluting is something you should
know and understand.
The next important lesson is to learn how to print. This done with a few easy steps.
7.15 Printing
All of the Windows spreadsheets try to figure out what you want to print. Sometimes they're right,
sometimes they're wrong. So........
The most important thing with printing is to tell the printer what to print.
Unlike a word processor, you may need to highlight what you want to print. For the
moment, well assume that Excel 2003 will guess correctly, and that you have not
clicked somewhere that will cause a problem. If you do have problem, which well
know in a second, well show you how to take care of the problem a bit later.
It's usually a good idea to see what our printout will look like before
you print it. First, well use a Print Preview to see what our
spreadsheet looks like. To do this well click-on the Print Preview
Button in the Button Bar. Point to the Print Preview button and click
on it.
A picture, of what our printout will look like, appears on the next page.
At the top of the Print Preview screen you will see the button bar above. Well use a
number of the buttons on this bar to assist us with our printing.
Notice that the Next and Previous buttons at the left end of the bar are not highlighted
with text they are just gray. This means that the buttons are not active. This
indicates that we are OK with our spreadsheet it is all on one page. If we saw that the
Next button was active, this would mean that there are other pages to our spreadsheet. If
youll look at the lower left corner of the Print Preview screen youll see: Preview:
Page 1 of 1. This confirms that our spreadsheet is on one page. If you do not see this
combination, well show you how to take care of it later.
Next
,
notice that an image of your spreadsheet appears below the button bar (above).
If you move your cursor over the spreadsheet, youll notice that the
cursor changes from an arrow to a tiny magnifying glass. If you
click the left mouse button, your magnifying glass will zoom-in on
the exact spot where the magnifying glass is located. If you click-
again, it will zoom-out. Try this a couple of time. It is a really handy
feature.
The Page Setup menu screen at the top of the next page will appear.
Notice that the Page Setup menu screen indicates that you are in Portrait view. Now
well enhance the spreadsheet to make it a bit more presentable. In the Orientation
area click-in the small circle in front of Landscape (see arrow above). The spreadsheet
will now print on the page as indicated. Next, in the Scaling area, click-in the box to the
left of % normal size. Using either the up/down arrows, or by typing in the
information, change the size to 125. Then click-on OK.
Your spreadsheet will now be larger and fill the paper more appropriately. Click-on Print
and when this spreadsheet comes out of the printer label it: landscape enlarged to
125 %.
Now, click-in the small circle to the left of Fit 1 page(s) wide by 1 tall in the Scaling area
and make sure that 1 page is set. Excel 2003 will now return your spreadsheet to one
page. Try other things here. Work with the Margins, Header/ Footer, and Sheet tabs at
the top of the Page Setup menu screen. Any time you desire to print, go ahead and do
so. This will give you a feel for how the spreadsheets will print. When you are finished,
simply click-on Close and you will return to your spreadsheet.
Many folks ask how to center a spreadsheet on the page. This feature is located in
Margins at the bottom of the Margins screen. Simply click-on Margins at the top of the
Preview screen or on the Margins tab when you are in the Page Setup screen.
Many folks also ask about how to place gridlines and show the row and column
headings (A, B, C and 1, 2, 3) in their spreadsheet printouts. This feature is located on
the Sheet tab in the Setup screen menu.
Now we'll call it a day and close Excel 2003 for Windows. First, let's save our work one
more time. If you forget, Excel will remind you to do it. What a nice program!!
Point to the Edit menu and click the left button. Point to Exit. Click the left button.
That's it for now.
7.16 Graphics
This will be a lot of fun. We are now going to turn your spreadsheet numbers into
graphics -- bar charts, pie charts, etc. This will greatly assist you when you display and
explain your work.
Before we do this there are a couple of essential steps. First we have to tell an Excel
2003 "Wizard" what we want to chart and then were we want the chart to go.
First: in cell B9 type-in Income (to replace the word Total). Next, type-in Expenses in
cell B17 for the same reason.
VERY IMPORTANT .
Something new.... Hold down the left mouse button and highlight cells B3 to F3. Next
HOLD DOWN the Ctrl key at the bottom of the keyboard, and while you are holding
it down, highlight cells B9 through F9. You will now see two "ranges" highlighted.
Hold down the Ctrl again, and highlight cells B17 through F17. These three ranges
will make up your chart. The x-axis will be made up of B4 - F4. And, the two sets of
bars (series) will make-up Income and Expense. When you complete the above
instructions, your screen should look like the one below.
Well use the easiest method for our first chart (graph).
Click Next.
The Step 2 portion of the menu appears (as shown on the right).
This is the final Wizard page. Youll notice that it asks you where you want to put your
chart. Since this is your first chart, it is best if you select As a new sheet: (see arrow
above). This will put your chart on a new tab called Chart 1. Now click-on Finish,
Youll see that you chart has a tab of its own at the bottom of the screen, and fills an
entire screen.
WOW!!!! There's your chart. Again, notice that Excel created a new tab at the bottom
of the spreadsheet that says Chart 1. Any time the numbers change on Sheet 1, the
bars in Chart 1 will reflect the change automatically! Click on the Sheet 1 and Chart
1 tabs to get the feel of going back and forth between the data and the chart. After you
make your changes, click on the Chart 1 tab and youll see how the chart has changed.
In Excel 2003, when you save your spreadsheet, you also save your graph. Your graph
is saved wherever you are working in the graph.
If you would like to have logical names for your Excel 2003 spreadsheet tabs rather
than Sheet 1 and Chart 1, well now show you how to do this.
When you click the Right mouse button the drop down
menu screen to the right will appear. Choose Rename.
When you choose Rename, the Chart 1 tab will turn
black like the image on the right. As soon as you see
this, type in the name you want for your chart. We typed in
Budget Chart.
Note: We are about to do some things which could mess-up your graph. If you do get
"messed-up" in the graph - don't save again. Simply Close the worksheet and DON'T
SAVE. Open the worksheet again and you will be in a nice neat graph where you can
experiment some more.
Click on the Budget Chart (or whatever you named it) tab.
Click-once on your title at the top. A box with little squares on the corners will
appear. These are sizing grabbers. When you move the cursor over them you will
notice that the cursor changes to small, directional arrows. If you click, hold down the
left mouse button, and drag when you see these arrows, you will notice that the Title Box
gets larger or smaller as you drag. Next, click-on the name of your budget until you get
a flashing cursor somewhere in the title. With the arrow movement keys, or mouse,
move to the end of the title, to the right of the "t" in Budget, and tap Enter. Type in Fall
2003. Now click at the beginning of your name, hold down the left mouse button, and
drag to highlight the first line of the budget title with your name in it. Keeping the
cursor on the dark area, click the right mouse button. Click-on Format Chart Title.
Instructions on how to
change the font appear at
the top of the next page.
Change the Font to Times New Roman (by moving up and down with the arrows) or
any font that you like. As you change things you will see the results in Preview on the
Click-on the upper right hand corner of your gray graph area. You will see little
squares now appear at the four corners and sides of the graph area. Point to the upper
right corner square and move the cursor until you see an arrow with two heads .
Hold down the left mouse button and drag down and to the left then let go. Your graph
will get smaller. Now point somewhere in an open gray area of the graph (not on one of
the bars) and click again. Hold down the left mouse button and drag the graph area so
it looks more "appropriate".
Click-on the Legend on the right (box with Income and Expenses). When you see the
corner grabbers, make the Legend box a bit larger. Then click right in the Legend
area. Click Format Legend. Click the Font tab. Make the font bold and size 14.
Click OK.
If you desire to change the colors of the Income and E2003ense bars in the graph,
simply move the mouse over one of the bars and click the right mouse button. Notice
all the bars with the same color now have a little square in the middle of each bar. The
right click marked the bars. Click Format Data Series. Choose a color you like and
then click OK.
Now let's look at your graph and then print it. Go to File - Print Preview. If you like
what you see go ahead and print the graph. If not, close Preview and make some more
graph changes.
Whenever your graph is visible, you can point to any area of the graph, and click the
right mouse button on the area, and edit that particular area. You can also click-right in
the chart itself. In the menu that appears, click-on chart type and then select a different
type of chart.
You can really go wild at this point. If you make a mistake, simply click
the undo button at the top of the menu screen and try again.
Note: No matter what type of printer you have, graphs take awhile to print. Be patient.
8 Ms Power Point
8.1 Introduction into Microsoft PowerPoint
Microsoft PowerPoint is a powerful tool to create professional looking presentations and
slide shows. PowerPoint allows you to construct presentations from scratch or by using
the easy to use wizard.
After you open up Microsoft PowerPoint, a screen pops up asking if you would like to
create a New Presentation or Open An Existing Presentation.
There are different views within Microsoft PowerPoint that allow you to look at your
presentation from different perspectives.
You can view your slide show by any of the following ways:
1. Click Slide Show at the lower left of the PowerPoint window.
2. On the Slide Show menu, click View Show.
3. On the View menu, click Slide Show.
4. Press F5 on the keyboard
8.8 Navigating While In Your Slide Show
Forward Navigation
o Simply click on the left Mouse Button or hit the Enter Button on your keyboard
Reverse Navigation
o Hit the Backspace on the keyboard
Exiting the show
o Hit the Esc Button on the keyboard
8.9 Pack up a presentation for use on another computer
1. Open the Presentation you want to pack
2. On the File menu, click Pack and Go
3. Follow the instructions in the Pack and Go Wizard.
8.10 Unpack a presentation to run on another computer
1. Insert the disk or connect to the network location you packed the presentation to
2. In My Computer, go to the location of the packed presentation, and then double-
click Pngsetup
3. Enter the destination you want to copy the presentation to
8.11 Printing
Select File Print from the menu bar to print the presentation.
8.11.1 Print Range
Select all to print all the slides in the presentation.
8.11.2 Current Slide
This option prints only the current slide.
8.11.3 Slides
This option prints only selected number of slides. For example enter slide numbers in the
slides field to print only certain slides say from 1 5 out of 10 slides.
8.11.4 Copies
Enter the number of copies of each slide specified in print range and check the collate box if
necessary.
1. In slide view, create a text box by selecting Insert Text box from the menu bar.
2. Draw the text box on the slide by holding down the left mouse button while you
move the mouse until the box is the size you want it.
3. Choose Format Bullets and Numbering from the menu bar.
4. Change the size of the bullet by changing the percentage in relation to the text.
5. Choose a color for the bullet from the color menu. Click more colors for a larger
selection.
6. Select one of the seven bullet types shown and click OK.
OR
Click the picture button to view the picture bullet window select one of the
bullets and click OK.
Click the character button to select any character from the fonts on the
computer. Select a symbol font such as wingdings or webdings from the
bullets from drop down menu for the best selection of icons. Click on the
characters in the grid to see them longer click OK when you have chosen
the bullet you want to use.
Click OK on the bullets and numbering window and use the same methods
described in the Bulleted lists on design templates to enter text into the
bulleted lists.
1. Select Slide Show Action buttons from the menu bar. Click the bar a cross the top of
the button menu and drag it off the menu so it becomes a floating tool bar.
2. Click one of the button faces and draw the button on the slide using the mouse. The
action settings menu will then appear.
3. Set the actions under other the mouse click or mouse over tabs. Actions specified for
mouse click will execute when the button is clicked on the slide while actions for mouse
over will occur when the mouse pointer hovers over the button.
4. Select an action for the button by choosing a hyper link to destination.
5. If you want a sound to be played when the buttons is clicked, check the play sound box
and choose a sound from the drop-down menu.
6. Click OK.
This tutorial will help you get started with Microsoft Access and may solve some of your
problems, but it is a very good idea to use the Help Files that come with Microsoft Access (or
any program you use for that matter).
9.2 Starting Microsoft Access
Two Ways
1. Double click on the Microsoft Access icon on the desktop.
If you have already opened a database or closed the dialog box that displays when
Microsoft Access starts up, click New Database on the toolbar.
2. On the Databases tab, double-click the icon for the kind of database you want to
create.
3. Specify a name and location for the database.
4. Click Create to start defining your new database
9.2.3 Create a database without using the Database Wizard
1. When Microsoft Access first starts up, a dialog box is automatically displayed
with options to create a new database or open an existing one. If this dialog box is
displayed, click Blank Access Database, and then click OK.
If you have already opened a database or closed the dialog box that displays when
Microsoft Access starts up, click New Database on the toolbar, and then double-click the
Blank Database icon on the General tab.
2. Specify a name and location for the database and click Create. (Below is the
screen that shows up following this step)
9.3 Tables
A table is a collection of data about a specific topic, such as students or contacts. Using a
separate table for each topic means that you store that data only once, which makes your
database more efficient, and reduces data-entry errors.
Tables organize data into columns (called fields) and rows (called records).
Displays the view, which allows you Displays the view, which allows you to enter
to enter raw data into your database fields, data-types, and descriptions into your
table. database table.
9.3.4 Entering Data
Click on the Datasheet View and simply start "chugging" away by entering the data into
each field. NOTE: Before starting a new record, the Soc Sec # field must have something
in it, because it is the Primary Key. If you did not set a Primary Key then it is OK.
6. Click on Next
7. Leave !(999) 000-0000 the way it is. This is a default.
8. Click Next
9. Select which option you want it to look like
10. Click Next
11. Click Finish
Selecting a value from a dropdown box with a set of values that you assign to it.
This saves you from typing it in each time
o Example)Choosing a city that is either Auburn, Bay City, Flint, Midland, or Saginaw
i. Switch to Design View
ii. Select the field you want to alter (City)
iii. At the bottom select the Lookup Tab
iv. In the Display Control box, select Combo Box
Select in the datasheet view and you should see the change when you go to the city field.
1.
9.3.7 Relationships
After you've set up multiple tables in your Microsoft Access database, you need a way of
telling Access how to bring that information back together again. The first step in this
process is to define relationships between your tables. After you've done that, you can
create queries, forms, and reports to display information from several tables at once.
A relationship works by matching data in key fields - usually a field with the same name
in both tables. In most cases, these matching fields are the primary key from one table,
which provides a unique identifier for each record, and a foreign key in the other table.
For example, teachers can be associated with the students they're responsible for by
creating a relationship between the teacher's table and the student's table using the
TeacherID fields.
Having met the criteria above, follow these steps for creating relationships between
tables.
1. In the database window view, at the top, click on Tools ---> Relationships
2. Select the Tables you want to link together, by clicking on them and selecting
the Add Button
o When the Cascade Update Related Fields check box is set, changing a primary key
value in the primary table automatically updates the matching value in all related records.
o When the Cascade Delete Related Records check box is set, deleting a record in the
primary table deletes any related records in the related table
5. Click Create and Save the Relationship
9.4 Forms
A form is nothing more than a graphical representation of a table. You can add, update,
and delete records in your table by using a form. NOTE: Although a form can be named
different from a table, they both still manipulate the same information and the same exact
data. Hence, if you change a record in a form, it will be changed in the table also.
A form is very good to use when you have numerous fields in a table. This way you can
see all the fields in one screen, whereas if you were in the table view (datasheet) you
would have to keep scrolling to get the field you desire.
9.4.1 Create a Form using the Wizard
It is a very good idea to create a form using the wizard, unless you are an advanced user
and know what you are doing. Microsoft Access does a very good job of creating a form
using the wizard. The following steps are needed to create a basic form:
1. Switch to the Database Window. You can do this by pressing F11 on the
keyboard.
2. Click on the Forms button under Objects on the left side of screen
3. Double click on Create Form Using Wizard
4. Select Label Wizard and the table you would like to get your information from.
5. Click OK
6. Select the layout of your labels
7. Click Next
8. Select the font size and color you want on each label
9. Click Next
10. Select how you want your label to look
11. Click Next
12. Select how you want your labels sorted
13. Give your label report a name and preview it