Computer Notes
Computer Notes
Computer Notes
Hardware simply means physical equipment. These are parts of your computer that you can see and
touch. Physical components of your computer may include the mouse, monitor and keyboard. If all
the necessary hardware was purchased and placed on a desk, it would be insufficient for one to
operate a computer.
A computer on its own is not an intelligent machine. It follows special instructions if it has to
operate. These instructions are in the form of programs written by special people called
Programmers or Software Developers.
Software refers to instructions the computer follows if it has to operate and programs used to
accomplish tasks like browsing the web, listening to music, or even typing a letter.
Computers are used to create and maintain data. A computer will accept raw facts in form of
alphanumeric text, sound, images and process them into something meaningful to human
beings or simply store them for future use. It is important that you understand the difference
between data and information. In other fields of study these two terms can be used
interchangeably, however in computing, they are different. Data are the raw facts that have not
yet been processed while information is processed data.
Computers will seldom operate on their own. The presence of a human being is necessary.
Computer users may include students, medical personnel, bankers, accountants, businessmen
and secretaries.
Computers are found in several places and they are mainly used to manage information. They can
also be used to exchange information. Computers are found in homes, supermarkets, banks,
institutions of learning, offices, in the military, weather forecasting stations, insurance companies,
hospitals where they are used to handle home finances, manage inventory, manage accounts
information, used for study purposes, used to create important documents, used to share information
and so much more. In order to exchange information, two Computers would need a link between
them. This interconnection between computers is called a Network.
Information Technology is defined by the online dictionary as a term that encompasses all
forms of technology used to create, store, exchange and utilize information in its various forms.
These may include business data, conversations, still images, motion pictures and multimedia
presentations.
Most times when people talk about a computer, they picture a screen on top of a desk with a
tower next to it. Today computers come in different types and sizes. In fact you can carry one
around without your neighbour noticing. The next section explores but does not exhaust the
different computer types there are.
The term computer refers to an electronic and programmable device that accepts data in form
of input processes it into something meaningful to human beings, stores and displays
information to the computer user.
Students should note that the above statement does not solely define a computer. Find out the
different definitions of a computer and discuss them with your tutor.
A computer is not considered an electric device even though it needs electricity. Do not
confuse electric with electronic understand the difference. Think about a mobile phone. It will
operate with or without electricity, yet its battery requires electricity to recharge. Some
computers operate with a similar principle. An electric kettle will not operate unless it is
plugged into power. Some computers operate this way too!
Mainframes
These are large, powerful and expensive machines that are used by large companies such as banks
and airlines. A mainframe is so big that it cannot fit on your desk. They store huge amounts of
data, instructions and information and they can handle hundreds or thousands of connected users
simultaneously. These computers are not so common. Can you identify an organization in your
country that has one?
Super Computers
These are the fastest, powerful machines actually more powerful than mainframes and they are
commonly used in the military and in weather forecasting stations. Applications requiring
sophisticated mathematical calculations use super computers. They can process a tremendous
amount of data. They can process more than 100 trillion instructions in a single second.
Micro Computers
These are also called Personal Computers (PCs) and they can fit on your desk, on the floor or they
could even be carried around. Micro computers are designed for use by a single person. Micro
computers come in different sizes; Desktops, Towers, Notebooks, Hand-Held (Palm tops),
Electronic Organizers.
1.4. Main Parts of a Personal Computer
For this section, you need to consider the computer in your computer lab and identify the parts
that you see and touch.
Can you identify the following?
• Keyboard • Mouse
There are parts of a personal computer that are not visible. You would have to look inside the
machine to see them. They are located within the system unit.
All parts found within the system unit are plugged into the mother board which is an example of a
circuit board. It connects the processor to the other hardware.
Other parts of your computer are externally attached to the system unit through ports. A port
is like a socket into which a cable fits.
A byte is the basic storage unit in memory. Each byte resides temporarily in a location in
memory. A byte consists of eight bits. A bit is the smallest unit used to measure memory and
it is either 1 or 0.
You need to find out the following:
1. How many bytes make up a kilobyte?
2. How many kilobytes make up a megabyte?
3. How many megabytes make up a gigabyte?
The other type of memory is Read Only Memory (ROM) which is a special type of memory chip
that holds software that can be read but not written to. It permanently stores instructions that
a computer needs to operate. A good example is the ROM-BIOS chip. BIOS stands for Basic
Input Output System. The ROM-BIOS chip holds instructions the computer will follow to carry
out a self-check of its input and output devices when it is first switched on.
Instructions on ROM cannot be erased even when the computer is switched off. If you had to
change the contents of ROM, you would have to overwrite it. Putting data into this kind of
memory is called ‘burning in the data’ and it is usually done at the factory. One important
reason a computer needs ROM is that it must know what to do when the power is first turned
on. ROM contains the start-up instructions which ensure that the rest of memory is functioning
properly, checks for hardware devices and checks for the operating system on the computer’s
hard disk and then loads it into memory
Other storage devices include Digital Versatile Disks (DVDs), Compact Disks (CDs), Zip drives, Jazz
drives, Flash Disks, and Floppy Diskettes (these are being phased out). These devices need to be
inserted into special drives or ports on your computer for you to view the data or information they
hold.
Students should not confuse a storage device with an input device or with memory. You should be able
to note the difference.
Consider the setting within an office. It has a file cabinet, a table top or a desk and a desk organizer in
which you place your pens and pencils. If you want to work on a particular file, you will go into the
cabinet, find the necessary folder, pick out a file/document and place it on your table or desk. You will
work on it and note a few changes on the file/document using your pen or pencil and after place it
back into the cabinet for future reference. The file cabinet is like your storage device, the table top or
desk is like your main working memory and your pen or pencil like an input device.
Other distinctions between memory and storage include;
There is more room in storage than there is in memory, the contents of storage are retained when the
computer is switched off while those in the main working memory are lost and compared to memory,
storage is slower and cheaper.
Consider the storage devices above and compare them in terms of capacity and cost and fill in the table
below.
Device Capacity Cost
DVD
CD
Jazz
Zip
Flash Disk
Floppy Diskette
There are devices that can be used for both input and output, find out examples of such and discuss
them with your tutor.
What are some of the factors that affect the performance of your computer?
The performance of a computer is affected by three major factors:
For a clear understanding of each of the factors listed above, request for an explanation from your tutor.
The Operating System is a set of programs that coordinates all activities among computer hardware
devices. It provides a user with the tools that enable you to interact with a computer. When you issue
a command to the computer, the operating system translates it into a language the machine
understands and the results of your actions are displayed to you through an output device. The
following are the functions of an operating system:
• It provides a user interface through which you are able to interact with the computer. The
user interface is a set of items we see on the screen. Current operating systems have a
Graphical User Interface (GUI). Examples of such operating systems include all versions of
Windows, CentOS, Macintosh OS, and some versions of Linux like Ubuntu, Suse and Redhat. It
is called a GUI because you use a mouse or some other pointing device to point at graphical
objects such as windows, menus, icons, buttons and other tools. Older Operating Systems did
not have a GUI. One needed to know commands to work with them. A good example is the
Disk Operating System (DOS).
• It loads programs like a word processor into memory so that you can use them.
• It coordinates how programs work with the CPU, RAM, keyboard, mouse, printer and other
hardware as well as other software
• It manages the way information is stored on and retrieved from disks
An operating system can only perform the above functions after it has been loaded into memory. It is
usually loaded from the hard disk into memory after the computer has been switched on.
A Utility program allows a user to perform maintenance-type tasks usually related to managing a
computer, its devices or programs.
The functioning of the Operating System can be extended by adding utility software. Most operating
systems include several utility programs for managing disk drives, printers and other devices.
These programs need to be installed on the computer before one can use them. Instructions in a
program are stored on storage media such as a hard disk or CD. To install is to set up software to
work with the computer, printer and other hardware components. To install, insert the program disc
and the computer will copy the program from the disc to the computer’s hard disk. Once installed,
you can use the software or run it. When you instruct a computer to run an installed program, the
computer loads it which means it is copied from storage to memory. Once in memory, the computer
can execute the instructions in a program.
Computers are used in several places for different purposes. They are found in homes, supermarkets,
banks, hospitals, Libraries.
IN HOMES, a computer can be used to manage home finances, listen to music, watch videos, and play
games. You can also access online banking services and order for products online, chat with friends,
send instant messages online, communicate through electronic mail and make calls if you have
internet in your home. You may also work from home instead of physically going to an office.
Have you ever walked into a supermarket and realized you were being monitored on a screen?
Computers are used in SUPERMARKETS for this purpose. They are also used to enter transaction
details. A supermarket usually has a Transaction Processing System (TPS) that takes note of daily
transactions made by the supermarket. It may also have an inventory management system that
monitors stock levels and helps the management make decisions on when to re-stock in case they are
running out of stock.
In banks computers are used to manage customer information related to their accounts. Banks have
Auto Teller Machines (ATMs) that customers can use to withdraw money, check balance and
sometimes transfer funds from one account to another. These offer a 24 hour service if they are in
order and one does not have to line up to have a teller (human being) attend to them. Banks today
offer online banking services made possible through the internet and one can access banking services
even at home. Customers can now pay their bills without having to physically go to the bank.
In hospitals computers are used to schedule appointments with the doctor and to manage patient
records. This helps to keep the doctor organized and he can also access a patient’s history with ease.
In libraries computers are used to keep records of resources purchased, books borrowed and books
available.
It is important for a computer user to know health and safety precautions when working with a
computer. Here are some precautions to take.
Make sure that power points are not overloaded. This is dangerous and could cause a fire outbreak. It
should therefore be avoided.
Avoid trailing cables as people can easily trip over them and this could cause injury to them or even
to your computer which may lose data before you save it.
Take regular breaks when working with your computer to avoid strain that comes as a result of
constant use of the keyboard or mouse. This kind of strain is referred to as Repetitive Strain Injury
(RSI). Regular breaks also keep you from straining your eyes.
Bad posture like leaning forward or backward may affect your back in the long run. Ensure that the
monitor is at eye level. It should be adjustable to suit you. You may also consider having a foot rest.
Do not eat or drink over the keyboard. Liquids poured into your keyboard will damage it.
There are practices that can help create a good working environment. These include:
1.9. Computer Threats and Measures to Protect the Computer from these threats
The most important thing stored on your computer is information. Anything that will cause the loss of
information or data from your computer is a threat to its security.
A Computer Virus is a program usually designed with malicious intent. It finds its way to a
computer through infected flash disks or being connected to a network. It can spread so easily from
one computer to another and it affects the general performance of a computer. The presence of a
computer virus is evident if you have files being replicated without your doing, the computer
sometimes freezes when you are in the middle of doing something, program files and system files are
destroyed and sometimes the computer becomes extremely slow. You need to install antivirus
software on your computer and keep it up to date. This way you can protect your computer from virus
attacks. Scan any disks before using them in your computer. This is usually done by the antivirus
software.
If your computer is free from viruses, is it far from unauthorized users? There are individuals who will
access the data and information on your computer and alter it. Most times they do it out of malice.
You need to limit access to your information to only authorized users. This can be achieved by the use
of passwords. What is a password?
Sometimes data or information is lost as one is working with a computer due to power issues. If there
is an unexpected power cut before your work is saved, you will lose it. Attach an Uninterruptible
Power Supply to your computer to deal with power cuts. This device has batteries that will keep
power for a time long enough for you to save your work and shut down your computer after a power
cut.
Sometimes information can be lost when there are fire outbreaks. A fire will destroy your computer
the information that it holds. If you create a second copy of your work on an external storage device
and keep it off the site of your computer, you will be in position to recover your work even after a fire
hazard. Creating a second copy of your work is referred to as backing up. You may choose to back up
all the data on your computer (complete backup) and after this back up your work every night,
backing up only the new files created after the first complete back up (incremental backup).
Thieves may break into your computer room and carry away your computer. Keep thieves away by
employing security guards, use an alarm system, you may choose to have burglar proofs and also use
strong padlocks.
If your computer is connected to a network, it is prone to attack by individuals called hackers. Keep
hackers away by installing a firewall that will prevent them from accessing any information held on
computers on your network.
1. Objectives
Internet has become so common that almost everyone is using it. You can easily contact someone in
a different country; share your thoughts, knowledge and information through electronic mail and
available social networks like face book. It is even possible to shop and access banking services online
today. You can also make voice calls over the internet.
1. Describe the significance of the Internet and the World Wide Web
2. Use the Internet to search for information and to communicate
3. Understand some of the ethical issues that arise with the use of the Internet and how to deal
with them.
2. Computer Networks
Before we look at the Internet it is important that you understand computer networks.
What is a computer network?
If you have two or more computers linked for purposes of sharing information, physical resources or
communication, they make up a computer network.
There are two common types of networks. These are distinguished by the geographical location they
cover. If you have computers and computing devices interconnected over a small or a limited
geographical area they make up what is called a Local Area Network (LAN). These computers may be
in an office or a building. They could also be within an institution or within a city. A metropolitan area
network spans an urban city. Usually computers within an institution are able to communicate if they
are connected to the LAN. Each department in a big institution like Uganda Christian University may
have a LAN. Many interlinked LANs make up what is called an intranet.
An Intranet is simply a private network contained within an enterprise. The main purpose of an
intranet is to share organizational information and resources among employees. When part of the
intranet is accessible to people outside the enterprise, it becomes an extranet.
If you have an interconnection that spans a large geographical area like a state, a country or even a
continent, it is referred to as a Wide Area Network (WAN). Different LANs when interconnected also
form a WAN. The most popular WAN is the Internet.
Being connected to a network presents advantages and shortcomings. Your computer is able to
access data held on other devices, resources like printers can be shared within a department, you are
able to communicate with a friend in a distant country through electronic mail, you can also make
calls over the internet, and chat rooms are common today. There are so many advantages of being
connected to a network.
If your computer is connected to a network, it is susceptible to virus attacks and unauthorized access
to your information. If all computers on the network depend on a server, if it is down all computers
will be down.
2. Computer Networks
The Internet is a global interconnection of networks. There are millions of computers all over the
world that are interconnected. Information can therefore be shared and it is possible to have several
services running over the Internet. You need to know how to connect your computer to the Internet.
You may connect through your company’s LAN if it is already subscribed to an Internet Service
Provider (ISP) or if there are hot spots on your campus you may access Internet if your computer has
a wireless network card installed. You may choose to purchase a mobile modem device from an ISP
and connect your computer to the internet from anywhere. What are the other ways you can connect
your computer to the Internet?
There is vast information stored on machines called servers located in different countries across the
globe. This can only be accessed if your computer is connected to them through a network like the
Internet. It is important that a student learns how to search for this information.
The services that run over the Internet may include electronic mail, banking online, electronic
commerce and so many more. Shopping on the Internet has become popular today. You can
purchase your automobile online or even order for books online. You can also access the latest news.
Almost all newspapers, magazines and Television channels offer their services on their websites.
A widely used information system on the Internet that provides facilities for documents to be
connected to other documents by hypertext links, enabling the user to search for information
by moving from one document to another is called the World Wide Web (WWW). The World
Wide Web is just one of the features of the internet. Documents on the web are called web pages
and they are written in a special language called hypertext markup language (HTML). This
language makes it possible for hyperlinks to be part of a document. A hyperlink is simply text or an
image which helps you jump to another location within the same document or to another
document when clicked on. This second document may be located on the same computer as the
first or on a different computer elsewhere on the Internet. The WWW organizes widely scattered
resources into a seamless whole. A collection of related web pages is called a website.
2. Computer Networks
To search for Information on the World Wide Web is very easy once your computer is connected to
the Internet. You will need a software application that is designed to find hypertext documents on the
web and open them up on the user’s computer. This application is called a web browser and is usually
found on a user’s computer. Common examples of web browsers include Internet Explorer, Firefox,
and Google Chrome.
It is also important for one to know the address of the server that holds this information and the
location of the file on the server. The World Wide Web is built on a set of rules called hypertext
transfer protocol (HTTP) which uses internet addresses in a special format called a uniform
resource locator (URL). URLs look like this: type://address/path
In a URL, type specifies the type of server in which the file is located, address is the address of the
server, and path is the location of the file structure within server. The path includes the list of folders
where the desired file is located.
You need to type the URL for a website in the address box of your web browser to access the
information it holds.
If you have no clue of which website to visit when searching for information, you can make use of a
search engine. A search engine is a computer program that searches documents, especially on the
World Wide Web, for a specified word or words and provides a list of documents in which they are
found. A common example is Google. Others include Lycos, AltaVista, yahoo and excite.
To search for information, you need to type in one or more key words. A list of web pages containing
related information is returned to you.
2. Computer Networks
You should be in position to send a plain text message and also be able to attach a file to a message
before you send it. Know all about replying mail, opening an e-mail with an attachment, forwarding
mail and deleting mail.
6. While sending a copy to someone, make sure it is necessary before you do so. It may be
confusing and embarrassing.
7. Do not send junk mail. Junk mail is mail that is neither expected nor requested for by the
receiver
8. No recipient wants to read a long boring message. Keep it short and clear
9 Before sending mail, make sure it conveys exactly what you want to say.
10. If you want to present a certain point, break it into small pieces of numbered statements.
2. Computer Networks
3. In the address bar, type an address for a website that your tutor will specify.
i. You should be in position to identify the home page ii. Identify any hyperlinks
within the page returned to you and click on them.
iii. Use the back button to move to the previous web page you visited
4. Open a new window within your web browser and in the address bar type the address of a
search engine for example, www.google.com. Your browser will return a web page where you
can type in key words.
a. You may choose one of the following topics
i. Growing tomatoes
ii. Children’s rights
iii. First Aid
iv. Growing your business
v. Project Management Tips
5. A list of web documents will be returned to you in form of hyperlinks. Look through the list and
select the most appropriate link with information relevant to your search.
2. Computer Networks
1. You need to have an e-mail address. If you do not have one get one.
i. Compose or create a new message ii. Specify the e-mail address to which you wish
to send the message iii. Give your message a subject iv. In the body type your
message
v. Send it by clicking on the send button.
3. To attach a file, you need to create it first. You can do this with your tutor’s help
4. Follow the steps in 2 above and before you send your message, attach the file you created in
step 3. After the file is attached, you may send your message
5. Request your neighbor for their e-mail address and repeat steps 2-5 and sending a mail to
your neighbor.
a. If your neighbor has sent you mail, check in your inbox
b. If you wish to forward this mail to a friend, select it and click on the forward button
c. If you do not wish to keep this mail, select it and click on the delete button.
d. If you have received mail with an attachment, open the attachment and read the
contents. Having trouble with this? Your tutor is there to help you.
e. If you wish to reply the message simply click on the reply button and send the mess
2.7. Ethical Issues that Arise with the Use of the Internet
Privacy on the Internet is a major concern today. Wikipedia notes that it is one of the key issues that
has emerged since the evolution of the World Wide Web. Millions of internet users often expose
personal information on the internet in order to sign up or register for thousands of different possible
things. With this act they expose themselves on the internet in ways some may not realize. In other
cases, individuals do not expose themselves, but rather the government or large corporations,
companies, small businesses on the internet leave personal information of their clients, citizens, or just
general people exposed on the internet. With the increase in social networking sites, more and more
people are allowing their private information to be shared publicly. On the surface, this may be seen
as someone listing private information about them on a social networking site, but below the surface,
it is the site that could be sharing the information (not the individual).
Internet, which hosts an enormous information base, has given rise to the
concept of information privacy. The vast information on the Internet faces
security needs. Unauthorized access to the information is undesirable. Data
privacy refers to the association between technology and legal rights
related to it. Whenever any information about a person or a person’s data is
stored, privacy needs arise. Internet privacy is the control one has over what
information about oneself, the person wishes to disclose. Internet privacy
deals with controlling the access to information over the Internet.
Using the Internet often comprises of the use of social networking sites,
email facilities and the browse of various other websites. Internet privacy
comes on the scene when it
comes to website users giving out their personal details on the Internet. For
certain
websites, which facilitate online shopping, the users are made to input their
credit card numbers. In case of emailing sites, there are issues about
whether third parties should be allowed to store or read emails without
informed consent. Whether or not, the third parties should be permitted to
track the visitors on a website, is another major privacy concern. The other
important Internet privacy issue is whether the sites that gather
personally identifiable information from the users should store or
share it.
One school of thought denies the existence of Internet privacy while the
other advocates the necessity of Internet privacy.
Complete anonymity is not the intent of Internet privacy, It
rather intends to achieve a controlled disclosure of one’s personal
information.
Internet is a network of networks and when a person uses the Internet,
he/she connects to it and is identified by an address.
In technical terms this address is known as an IP address. For security
reasons, a website may wish to track these
addresses of its users. Websites may collect the non-personally
identifiable information of their users.
Such information is the one, which in no way can be used to uniquely
identify a person. The disclosure of these forms of information is acceptable.
It is actually the means which websites track the users' Internet activities.
Does Internet privacy imply that all the information posted on to the
Internet remains private and confidential? Does Internet privacy ascertain
the privacy of every Internet user? There are people who dread using online
banking and shopping websites because they doubt the unauthorized
disclosure of their personal information. Some disguise themselves while
using the Internet. Mailing lists and forum posts are a part of the search
results on the topics discussed in them. Is it ethically correct to expose
people's views in these ways? Some people fear the fact that they have a
visibility over the Internet for such reasons.
Lab Exercise 3
1. Start the Word Processing Application
2. The best way for one to learn is by looking at your screen. What do you see?
a. The Word Processor has several tools. With your tutor’s help identify the following
parts
i. Menu Bar – This displays titles of menus, which are lists of commands
and options
1. Point your mouse to one of the options and click to view the list
dropped down for you.
ii. Title Bar – It is the top most bar with the name of the application and
your document’s title. It has three control buttons
1. What do you notice when you click on the first control button? (It
looks like a minus sign)
2. Restore your window back
3. If your window is running maximized (covering the entire screen),
the second control button will help you un maximize/ restore your
window down
4 . The third and last button looks like an X and it will close your
application. (if you do not want it closed, do not click on it)
ii. Toolbars – These display buttons that represent frequently used
commands. Differentiate the Formatting toolbar from the standard
toolbar.
iii. Rulers – The horizontal and vertical ruler will show you the position of
text, margins and indents. If you do not have these showing, you can view
them.
iv. Scrollbars – Horizontal and Vertical will help you scroll through a
document if it is too large and cannot fit inside the document area
v. Status bar - Located at the bottom of your document, not your screen. It
indicates the status of your page including the page count, and
information related to your position in the document. vii. Document/ Text
area – This is the area that will hold text when it is entered using the
keyboard. You will notice a blinking bar at the beginning of the document
area. This is the Insertion point also referred to as the cursor. It simply
indicates where the next character will appear as you type
3. You are going to move the toolbars.
a. If the formatting toolbar and the standard toolbar appear on separate lines,
drag one of them till you have both toolbars displaying on the same line.
b. If the formatting toolbar and the standard toolbar appear on the same line,
drag one of them till you have both toolbars displaying on separate lines.
4. What do you do if you cannot view some toolbars? If your drawing toolbar is
missing, view it. Go to View>Toolbars>Drawing. Follow the same procedure if you want to
eliminate some of the toolbars in your window.
Lab Exercise 4
1. Make sure you are in the print layout view before you enter the following text.
You enter text by typing at the keyboard.
2. As you type, notice the cursor advancing across the screen. When your text reaches the
right edge of the screen, the word processor will automatically move the cursor to the
next line. This feature is called word wrap.
3. Do not press the enter key before you get to the end of a paragraph. The paragraph
ends just before the URL. Pressing the Enter key indicates to the word processor that
you are creating a paragraph.
You can make a chicken pie starting off with a whole chicken or just as easily from the remaining
chicken meat left over from a roast chicken dinner made previously.
A traditional chicken pie will contain plenty of fabulous fresh vegetables including carrots, peas, leeks
or onions. Nowadays, you can add almost anything to your chicken pie, for example mushrooms,
potatoes, sweet corn, parsnips or ham. http://www.helpwithcooking.com/pastry-guide/chicken-
pie.html
After typing text, you can change it without having to retype the entire document. Making changes to
an existing document is called Editing.
Before any change is made to text, it is important to first select the portion of text to which you would
like to apply changes. To select is simply to highlight.
Select a word by positioning the insertion point anywhere within the word.
Alternatively you could double click within a word to select it.
To select a paragraph, click within the paragraph thrice.
Select an entire document by pressing CTRL + A
To deselect text, click anywhere on the screen.
Having trouble with the mouse? You can use the keyboard to make your selection.
Position your cursor at the beginning of the word(s) you wish to select.
Depress the shift key and keep it depressed as you use the right arrow key to help you make
the selection.
At the end of your selection, release the shift key.
1. Deleting text
a. Using the backspace key
Position the cursor after the word Quit in the title and press the backspace key.
What do you notice?
b. Using the delete key
You can now use the delete key. What do you notice?
What is the difference between the backspace key and the delete key?
2. Undo and Redo
a. The Undo command enables you to cancel the last several commands you
performed in a document. The Redo command helps you to redo actions after
they have been undone.
i. Go to Edit (Menu)> Select Undo ii. Go to Edit (Menu)> Select Undo
iii. Use the Undo Icon on the Standard toolbar iv. Use the
Redo Icon on the Standard toolbar
v. Keyboard Shortcuts for Undo and Redo are CTRL+Z and CTRL+Y
respectively.
3. Copying and Pasting
a. Select the first paragraph
b. Copy it using any of the options below
i. Edit>Copy
ii. Icon on Standard toolbar
iii. Keyboard Shortcut CTRL + C
iv. Right click and Select the option Copy
When you copy text, it is temporarily held in the clipboard from which you can paste it
b. Position your cursor after the second paragraph and press enter
c. Paste your work in that position using any of the following options:
i. Edit>Paste
ii. Icon on Standard toolbar
iii. Keyboard Shortcut CTRL + V
iv. Right click and Select the option Paste How many copies of the
information do you have?
4. Moving Text
This is similar to the steps in 3 above
a. Select the second paragraph
b. Move it using any of the options below
i. Edit>Cut
ii. Icon on Standard toolbar
iii. Keyboard Shortcut CTRL + X
iv. Right click and Select the option Cut
When you cut text, it is temporarily held in the clipboard from which you can paste it
c. Position your cursor after the third paragraph and press enter
d. Paste your work in that position using any of the following options:
i. Edit>Paste
ii. Icon on Standard toolbar
iii. Keyboard Shortcut CTRL + V
iv. Right click and Select the option Paste
How many copies of the paragraph do you have? What is the difference between Copying
text and Moving text?
5. Find and Replace Text
Find the word champion and replace it with the word winner using the Find and Replace tool.
a. Edit > Find & Replace
b. CTRL +F
c. Locate the Find & Replace icon on the standard toolbar.
FORMATTING A DOCUMENT.
Lab Exercise 6
Getting your words down on 'paper' is only part of producing a document. Just as important is
making your document look good. A well-formatted letter, report or memo is easier to read, draws
attention to the most important information, and creates a receptive and favorable impression in the
reader.
Word processors provide you with the tools to make your documents look good. They can't give you
taste and a sense of style – although some of the up market word processors can automatically apply
consistent styles to your documents to make them look smart – but they do supply you with
everything you need to take your words from raw text to stylish output.
2. Change the font of the first paragraph to one that your tutor will specify.
3. The default font size is 12; change the font size of the first and second paragraph to 11 and
16 respectively.
9. Enter the following text in a new document and follow the instructor’s directions in bold to
format the paragraphs as described.
Align this paragraph left. This is the standard paragraph alignment. This means that the text is flush
up against the left margin. This leaves the right side of the text with a jagged appearance.
Align this paragraph center. This means that the text comes in equally from both margins, resulting in
the text being centered left-to-right. Both sides of the text will have a jagged appearance. This type of
alignment is often used for headings.
This paragraph alignment should be to the right. This means that the text is flush up against the right
margin. So the left side of the text is left with a jagged appearance. This type of alignment is very
seldom used.
Another alignment option is Justify. This will make tiny adjustments to the spaces between words so
that the text is lined up against both the left and right margins. The result is that the both sides of the
paragraph are clean and straight, just like the text in magazines and newspapers. The last line of the
paragraph, as well as single line paragraphs (headings), are not affected by this alignment.
a. Apply the following line spacing to the paragraphs you entered in step 9.
i. Paragraph 1 and 3 - Single
ii. Paragraph 2 - Double
iii. Paragraph 4 - 1.5 lines
11. Spacing Before and After Paragraphs
a. Set the space before and after the following paragraphs to 0.5
b. Alternatively set them to 18pt and 24 pt respectively.
These Spacing options will set the amount of spacing before the paragraph as well as after the
paragraph. While it sounds confusing, this is an incredible feature of Word that gives you precise
control over the look and flow of text from one paragraph to the next.
In most simple documents, you may never use this feature. But if you ever have a larger project, you
may want to consider this tool.
12. Indents are used to bring the text in from the margins. Follow the instructions in bold to set
indents for the following paragraphs.
We can use a left indent. Set it to 1.50. This brings the paragraph text in from the left margin. The
amount of indentation is completely adjustable, from as little as one-tenth of an inch, up to three or
four inches or more, depending on your desired look.
We can use a right indent. Set it to 2.5. This brings the paragraph text in from the right margin.
Again, the indentation amount can be whatever you want it to be. The purpose of indenting text, is to
help draw the eye to the indented text or to make it stand out from the other text in the document.
Use both left and right indents together for this paragraph. 0.5 Left and 0.5 Right. Indents are a
unique feature in that many different kinds of indents can be combined. When we apply both a left
and a right indent to a paragraph of text, it is often referred to as a ‘block quote.’ This is used to help
set off a lengthy quote from your own words.
3. Lab exercise 7
1. Enter the following details about ice cream cake and format them to appear exactly as below:
"This is a basic recipe for ice cream cake. You can use any flavor of ice cream or cake mix you
like”
Ingredients:
1 (18.25 ounce) package chocolate cake mix
1/2 gallon chocolate ice cream, softened
Directions:
1. Prepare cake according to package directions; bake in a 9x13 inch baking dish and cool completely.
2. Use ice cream that comes in a rectangular carton. Remove the carton and, using a piece of string
or dental floss, cut the ice cream in half lengthwise (long side to long side) and place the two
layers side by side on a piece of waxed paper.
3. Place the cooled cake over the ice cream. Trim the cake and ice cream so that the edges ma
tch.
4. Place a board or serving platter over the cake, hold onto the waxed paper and board, and flip the
ice cream cake over. Remove the waxed paper and smooth out the seam between the ice cream
slabs.
3. Cover with waxed paper and freeze until very firm. Decorate as desired.
b. A header with your name aligned right and the date aligned left
c. Footer with your registration number aligned left and Page numbers aligned center.
3. Enter the data as it appears below and format the following lines of text following the
instruction column.
Telephone Strikethrough
Author Hidden
4. Change the word 2nd so that it looks like 2nd.
Making your documents look good can be as simple as making your headings bold or positioning
addresses and salutations correctly in a letter. It can be much more than that, too, but when you're
first starting out it's far better to aim for a clean, simple, consistent look to your documents than to try
to achieve the ultimate in style. Of course, the ultimate in style may well resemble the clean, simple
consistent look you aim for in the first place.
In fact, the most frequent mistake made in formatting documents is to try to do too much: apply
multiple styles, use half a dozen fonts, go for fancy layout.
Instead of going for broke, take a look at your document, decide which elements you want to
emphasize, and assess how formal the document needs to be. Then do the minimum amount of
formatting required to achieve your ends.
7. Perform a word count on your entire document and note down the following;
a. number of pages
b. number of characters with and without spaces,
c. number of paragraphs and lines.
Using the Internet and World Wide Web
1. Objectives
Internet has become so common that almost everyone is using it. You can easily
contact someone in a different country; share your thoughts, knowledge and
information through electronic mail and available social networks like face book. It is
even possible to shop and access banking services online today. You can also make
voice calls over the internet.
1. Describe the significance of the Internet and the World Wide Web
2. Use the Internet to search for information and to communicate
3. Understand some of the ethical issues that arise with the use of the Internet
and how to deal with them.
2. Computer Networks
There are two common types of networks. These are distinguished by the
geographical location they cover. If you have computers and computing devices
interconnected over a small or a limited geographical area they make up what is
called a Local Area Network (LAN). These computers may be in an office or a building.
They could also be within an institution or within a city. A metropolitan area network
spans an urban city. Usually computers within an institution are able to communicate
Word Processing: Practical Exercises
1. Exercise 1
The film was released to DVD in early 2007 and made its television debut on September 21, 2008, on
Trinity Broadcasting Network.
1. Make all the years in the passage bold and give them a font size of 14.
5. At the end of the above text, type out every third word in each line on a separate line
and apply bullets of your choice.
6. Copy the second paragraph and paste it twice before the first
8. Justify the second paragraph and give it an indent of 0.5 left and right and 1.5 line
spacing.
9. Apply a border around your work
i. In the Header include your name aligned right and your course aligned left
ii. Insert the date and time in the Footer
i. Top: 3”
ii. Bottom: 5”
Fatboy Slim
Early Years
Although born in Bromley, Norman grew up in Redhill and later studied at Brighton Poly, where he
graduated with a BA in English, Politics and Sociology. It was in Brighton that Norman started his
music career as a DJ. Fatboy Slim is the project of Quentin “Norman” Cook.
Rise to Fame
While he was a DJ in Brighton, Norman got a phone call from an old schoolmate, inviting him to play
in a band called the Housemartins. The Housemartin‟s biggest hit was “Caravan of Love” which
reached the British number one slot in 1986. The band split the following year.
Different Projects
After the split, Norman formed beats International and had a British number one hit with “Dub Be
Good to Me” in 1989. Soon afterwards Norman was forced to take a break after getting divorced and
falling victim of a nervous breakdown. Two years later, Beats International was disbanded in favor of a
new group called Freakpower.
After touring with Freakpower for a year, Norman became a partner in Skint Recordsand adopted the
pseudonym Fatboy Slim. According to Norman, the name originates from a Louisiana blues singer in
the 1940s
Continuing Success
Fatboy Slim soon attracted much attention in Europe and the US with his blend of house, acid, hip-
hop, electric and techno music. Hits included remixes of “Brimful of Asha”, “Renegade Master”, and his
own tunes such as “The Rockafellar Skank” and “Right Here, Right Now
During two rollercoaster years, Norman found himself jetting off to DJ gigs and award ceremonies
and in the midst of all this he fell in love and married Zoe Ball. Today, the couple has a young son
called Woody Fred and Fatboy Slim continues to take the world by storm!
Bibliography
2. Illustrate all the song titles in bold and italic
4. Select all text and change it from single spacing to double spacing
5. In the first paragraph, cut the paragraph „Fatboy Slim is the project of Quentin “Norman”
Cook‟ and paste it at the start of the first paragraph. It should now read:
„Fatboy Slim is the project of “Norman” Cook. Although born in Bromley, Norman grew up in
Redhill and later studied at Brighton Poly, where he graduated with a BA in English, Politics and
Sociology. It was in Brighton where Norman started his music career as a DJ.‟
6. Change the fifth paragraph as follows using bullets and numbering:
Fatboy Slim soon attracted much attention in Europe and the US with his blend of house, acid,
hip-hop, electric and techno music. Hits included remixes of:
• “Brimful of Asha”
• “Renegade Master” and his own tunes such as:
1. “The Rockafellar Skank”
7. Save your document.
8. Insert a header with your name on the right and today‟s date on the left in a size font 10.
9. Insert a footer that consists of a page number in the center of the page.
10. Insert a page break before the headings „Early Years‟, „Rise to Fame‟, „Different Projects‟,
„Continuing Success‟ and Bibliography‟.
11. Perform a word count on the document and type the result at the end of the Bibliography.
12. Spell Check and Print Preview the Document.
13. Using the tab key, insert the following on page 4 of the document
16. Ensure that the margins of the document adhere to the following:
Top: 0.8 inches (2 cm)
17. Insert the following footnotes into the document
PAGE 3 – Rise to Fame
The Housemartins biggest hit was “Caravan of Love” which reached the British number one slot in
1986.1
1. Dick Tator, The 80s Music Scene. (London: POP Press, 1989, p.267
PAGE 4 – Different Projects
According to Norman, the name originates from a Louisiana blues singer in the 1940s. 2
2. Chris P. Bacon, Stormin‟ Norman. (New York: AD Press, 1994, p.54
18. Insert the following table under the heading Bibliography.
19. Sort the author‟s names in the table in alphabetical order.
20. Remove the line border from the table.
21. On page 1 of the document, click below the title „Fatboy Slim‟ and type „ Table of
Contents’ using the following:
Format: Underline
Alignment: Left
Font Size: 14
22. Ensure the headings „Early Years‟, „Rise to Fame‟, „Different Projects‟, „Continuing
Success‟ and „Bibliography‟ adhere to the following heading style:
Font: Arial
Alignment: Left
24. Click below the „Table of Contents‟ heading on the second page. From the appropriate
menu option choose index and tables. Select Table of Contents and choose a format your
tutor will specify, then click OK
25. Use the Find and Replace tool to change all occurrences of the word „Norman‟ to
„Norm‟ and Save your work.
A word processor has special features, most of which have been covered in the exercises in the
previous section. Some of the tools include but are not limited to language tools, tables, Mail Merge,
adding graphics and Sounds and Templates.
Language tools include checking spelling and grammar, and the thesaurus
A word processor has an in-built dictionary against which it compares words as you type. If a word
does not match, it will have a red wavy underline if it is a spelling error and a green wavy underline if
it is a grammatical error. Several ways exist in which you can correct these errors. The spell checker
will provide options for replacing the word, ignoring it, or adding it to dictionary. A grammar checker
compares each sentence to a set of standard grammatical rules and may provide grammatically
correct options.
A thesaurus simply provides you with alternative words. It may display a definition of a selected word
and a list of possible replacements.
Tables help you to organize your work. You can also make use of them to help you arrange images
within your document. A table is made up of rows and columns of information in the document.
Tables can be formatted in so many ways.
To mail merge is to combine a form letter with the contents of a database usually a list of names and
an address list so that one copy of the same letter is sent to different people with the correct name
and address printed on each letter.
It is very possible to add images and sound to your word document. Position your cursor where you
would like the image to appear, locate the image and insert it. Sound files can also be embedded in
your document
Templates are predesigned documents that are blank except for preset margins, fonts, paragraph
formats, headings, rules, graphics, headers or footers. You can open a document template, type your
text into it, save it and print the finished document. There is no need for you to manually format
complex documents.
Spreadsheets
1. Objectives
Spreadsheet Software stores information in columns and rows from which data is organized and / or
processed. Spreadsheets are more often used for calculations, such as totaling a column of numbers
or generating a more sophisticated formula to calculate some statistical measure on a list of
numbers.
A spreadsheet application combines three types of programs: worksheets, graphics, and database
management. It is designed for organizing and manipulating data, particularly numeric data, and for
translating such data into graphic form. A spreadsheet is a grid of data divided into rows and
columns. Each block in the grid is called a cell and it holds an individual piece of text or data.
A worksheet is a grid of rows and columns, in which you enter, edit and view data. It accepts data
from the user in form of numbers and text. A spreadsheet contains three worksheets when you open
it. A spreadsheet is similar to a file or a document while a worksheet is like a page in a book.
Worksheets are labeled at the bottom of a spreadsheet window. You can move from one worksheet to
another by clicking on the worksheet tab.
Learning Outcomes
TOTAL
2. A spreadsheet recognizes two basic types of data:
a. Value: any data that can be evaluated numerically including numbers, dates, and
mathematical formulas
b. Label: a string of characters generally used for descriptive text such report titles, and
column headings.
Notice the difference between the alignment of numbers and text.
3. Save your work under the file name Green and exit the application
4. Start a new Spreadsheet application
5. Retrieve the document you saved in 3 above.
4. Working with Worksheets
Deleting a Worksheet
Reduce on the number of sheet tabs if you will not use all.
• Right click at the sheet tab of the worksheet you wish to delete
• Select delete.
Renaming a Worksheet
You can change the default name like Sheet1 to your name
• The sheet tab will be highlighted allowing you to type in the new name
January 25,000 20,000 40,000
2. Using any of the methods you learnt, make a copy of this table on another part of the
worksheet.
3. Change the months of the year to days of the week and change the items sold to Leader
5. Copy the figures for the Wine sales to the Cheese and Dresses section
7. Formatting Worksheets
One can select cells and apply formats to them. Cells may be formatted when empty or when
containing data. If empty cells are formatted, data entered in these cells takes on the formats applied.
To format cells,
Note:
The above steps are taken if one is using the menu. It is possible to format cells using the toolbar,
keyboard and shortcut menu. The student is expected to try all these methods.
Font: This enables one to choose the font name, style, size, color and other effects
Borders: Border lines can be added or removed to selected cells. Borders are added along specific
edges of each cell in the selection, leading to a continuous effect which later simply appears as a grid
of horizontal and vertical lines.
Adjust the column width or row height to make sure all your text or figures fit.
1. Select the rows you would like to change by clicking the row heading.
2. Drag the line below the row heading to adjust the row height. If more than one row is
selected, dragging the row heading line for one row changes all the selected rows
To quickly adjust the row height to accommodate the largest font in the row, or to adjust the
row height for cells containing wrapped text, double click the line below the heading.
AutoFormat
This command allows you to automatically apply a built-in format to a range of cells or a table
on a worksheet. To format a table using AutoFormat;
Learning Outcomes
4. Know the error values displayed when an incorrect formula is used and avoid them
A formula is a set of instructions for performing a calculation and displaying the result in a cell.
You can create three types of formulas in a worksheet: arithmetic, text and logical.
We shall concentrate on arithmetic formulas, the most common type of formulas.
Apart from performing arithmetic on numbers typed directly into a formula, enter cell
addresses (of the cells containing numbers) into the formula instead of the numbers
themselves. Calculations will then be performed based on these cells.
For example, if you have numbers 50 in A1 and 32 in A2 and you want the sum of these two in
cell A4, enter a formula in A4 that refers to cells A1 and A2 instead of 50 and 32.
Formulas always begin with an equal (=) or a plus (+) sign. In our example therefore, the
formula to be entered in cell A4 would be = A1 + A2. The cell in which you enter a formula is
called a formula cell. When you complete your entry the result of the formula is displayed in
the current cell and the formula itself is displayed in the formula bar.
Arithmetic formulas contain values (numbers or references to cells that contain numbers) and
operators. They are entered into cells like any other entry; you move the cell pointer to the
appropriate cell, type the formula and then press the Enter key.
Comparison = > < >= <=
To enter a formula
Type an equal sign or plus sign to activate the formula bar. To insert the reference for the
active cell into the formula, type the next operator, comma, or parenthesis, or complete the
formula by pressing enter.
When you use cell references in a formula, you instruct the spreadsheet to use whatever
numbers are currently in those cells to give the result. After you enter a formula, you can
change the numbers at will and the result will keep on varying. The spreadsheet will remember
your instructions and automatically re-execute them, generating a new result.
This feature is known as automatic recalculation; which means that any time you change the
value in a cell, it is referenced by formulas in other cells be it directly or indirectly) the results of
those formulas are automatically (and immediately) calculated.
An error message is displayed whenever you make a mistake in a formula. The spreadsheet
also attempts to put the cursor on or next to the mistake on the input line. You therefore look
for the problem at the location of the cursor. Common errors include the following:
#NULL! You specified an intersection of two areas that did not intersect
#NUM! There is a problem with the number
#REF! The formula refers to a cell that is not valid
5.5 in B5,and
6.0 in B6
b. Enter a formula to sum up these figures in B8
2. Enter the figures
1.5 in C4, start entry with a single quotation mark
5.5 in C5, normally and
6.0 in C6 normally
Enter a formula to sum up these figures in C8. Explain the difference
3. Enter the label MEAN in A9 and enter a formula for the mean of figures (in B4, B5 and B6)
in B9. The mean is the sum of elements divided by the number of elements.
4. Enter the label COMP in A11 and enter the formula =B4>B5 in B11 and request for an
explanation from your tutor
Make note on a piece of paper of the results for the SUM, MEAN and COMP. now change the number
in B4 to 12.6. Note the new results 6. Save your work.
1. Position the cell pointer on the cell containing the formula to be copied
2. Issue the command Edit>Copy
3. Select the cells in which you want a similar formula and then choose Edit>Paste.
When you copy a formula, the actual addresses of the referenced cells will be abandoned and the
spreadsheet will only remember their locations relative to the formula cell.
When you copy a formula, you create new formulas, each of which replicates the general function of
the copied formula rather than its literal contents.
Note: if you change the original formula, you have to copy it again in order to have the copies change
accordingly.
Wandegeya Dairy Farm sells milk on a daily basis. On a particular day, the following people bought
the given quantities of Milk
The price of milk is Shs.800 per litre. The problem is to calculate the cost of milk for each customer
Learning Outcomes
By the end of this week you should;
2. Creating Charts
A chart is a graphic representation of data in a worksheet. It helps to analyze and compare data
or focus attention to particular critical aspects of one’s data.
When you create a chart based on a worksheet selection, values from the worksheet are used
and represented in the chart as data points which are represented by bars, lines, columns,
slices, dots or other shapes. These shapes are referred to as data markers.
Groups of data points or data markers originating from a single worksheet rows or columns
are called data series. Each data series is distinguished by a unique color or pattern or both.
Creating a Chart
a. Select the data you want to plot including cells containing any category or series names
that you want to use in the chart
b. Start the chart wizard
c. Follow through the different steps of the chart Wizard
d. Choose the Finish Button to complete the chart
1. Selecting the type of chart you wish to create. Different charts have subtypes
2. Series information. if data is already specified for the chart, the data range will be shown in
this step.
3. There are standard chart options that can be turned off in this step. As you make the
changes, you should be able to preview the chart to make sure you get the look you want.
4. Decide where you want to place the chart; whether on its own sheet or within the existing
worksheet
5. Choose the finish button and the chart will be automatically added placed on the specified
sheet. You can then shift and position it suitably.
2. Creating Charts
JAN FEB MAR APR MAY JUN JUL AUG SEPT OCT NOV DEC
10 8 11 34 40 23 7 10 11 9 5 8
1. Line chart
2. Column chart
3. Pie chart
3. Sorting Data
Sorting arranges rows in a list according to the contents of selected columns. You select the data and
sort in an order you want or you create and use a custom sort order
Sort By Is used to choose the column you wish to sort by and to select either ascending or
descending order
Then By Two additional boxes enable you to specify the order in which to sort rows if there are
duplicate items in the previous column you specified. Select ascending or descending
button for each box to determine the arrangement of data.
Note:
1. If you sort by one column, rows with duplicate items in the column remain in their original
order
2. Rows with blank cells in the sort column are placed in the sorted list
3. Hidden rows are not removed.
4. If you sort by more than one column, rows with duplicate items in the primary column are
sorted according to the second column you specify. Rows with duplicate items in the
second column are sorted according to the third column you specify.
5. It is possible to sort only selected cells.
Filtering data in a list enables you to find and work with a subset of the data in your list. Filtering
displays only the rows that contain a certain value or that meet a set of criteria, while hiding the other
rows.
1. AutoFilter: This applies drop down arrows directly to column labels in a list. You can then
select the item you want to display
2. Advanced Filter enables you to find rows by using more complex criteria.
Using AutoFilter
• From one column: Click the arrow next to the column then select all from the drop-down
list