ICT G8 Textbook
ICT G8 Textbook
ICT Textbook
Copyright:
Content, artwork and layout developed by MyCanvas Print Pvt. Ltd.
All rights reserved. Full or part of this book may not be reproduced or transmitted by any
means, mechanical or electronic, without prior permission from the Publisher.
The sale of this book is made under the condition that it shall not be re-sold, shared, circulated
or traded by any means without the Publisher’s prior consent.
We have taken every effort to contact all copyright holders, but if any have been overlooked,
contact us at [email protected] We will be pleased to make the necessary
arrangements.
Edition:
Pre-print
Preface
Practicals
CHAPTER
1
TYPES AND COMPONENTS
O F CO M P U T E R SYST E M
In this chapter you will learn about:
1.1 Hardware, software and its types.
1
Information and Communication Technology
= A processing unit.
Fig 1.1e
2
Types and components Of computer system
Fig 1.1f
= Compiler.
= Linkers.
= Device driver.
= Operating system.
= Utility software.
3
Information and Communication Technology
Fig 1.1g
Fig 1.1h
Fig 1.1i
4
Types and components Of computer system
Fig 1.1j
Fig 1.1k
5
Information and Communication Technology
Fig 1.1l
Examples of photo editing software: Adobe Photoshop, Aurora HDR, Corel Draw.
Control and measuring software are a group of software that allows computer or
microprocessor to interface with the sensor to measure the physical quantities,
control applications by comparing the stored data with the sensor readings and
sending out signals to alter the process parameters.
6
Types and components Of computer system
= Output device.
Fig 1.2a
Input device refers to any device that helps in providing data to the
computer system for further processing.
7
Information and Communication Technology
Fig 1.2b
Arithmetic and Logic Unit: A part where the actual computation takes place. It
consists of a circuit that performs arithmetic operations.
Control Unit: It obtains instructions from the program stored in the main memory
interprets the instructions and issues signals that cause the units of the system to
execute them and also controls the activities of the internal and external devices.
RAM is a volatile memory which means the data stored in the RAM will be erased
when the computer is switched off or restarted.
= It is volatile in nature.
8
Types and components Of computer system
ROM is a non volatile memory which means the data stored in the ROM will not be
erased even the computer is switched off or restarted.
ROM contains the boot up file which instructs the computer what to do when it first
starts up. This code is referred to as BIOS (Basic Input Output System)
= It is nonvolatile in nature.
BIOS carries out the following tasks when the computer is turned on
= BIOS checks if the hardware devices present are functional and loads the
operating system into RAM.
Internal hard disk is the computer’s main internal storage where application
software, operating systems and files are stored. The computer can read from and
write to it.
Output device refers to any device that produces the result of the processed data.
Fig 1.3a
9
Information and Communication Technology
Fig 1.3b
In Graphical User Interface, the user can directly interact with the computer
without the need to type in commands. GUI has a feature called WIMP (Windows,
Icons, Menus, Pointers). This interface is used by end users who doesn’t have any
great knowledge about how the computer works. Examples of graphical user
interface: Windows, Ubuntu.
Fig 1.3c
10
Types and components Of computer system
WIMP
= Menus are list of options or applications which the user can select from.
There are two types of menus: Pop up and drop down.
Fig 1.3d
11
Information and Communication Technology
= Easier to upgrade.
12
Types and components Of computer system
1.4.3 Tablets
It is a computer that is intermediate in size between a laptop computer and a
smartphone. Tablets use touch screen technology and don’t usually have a
conventional keyboard. Tablets have a series of sensors like cameras, microphone,
accelerometers and touch screen.
Features of tablet:
13
Information and Communication Technology
1.4.4 Smartphones
A smartphone is a portable device that has functionalities of a mobile phone
and a computer in a single unit. They make use of a number of apps that allow the
following functions.
Features
= Telephone banking.
14
Types and components Of computer system
1.4.5 Smartwatches
Smartwatch is a wearable computer on
the wrists. As with the smartphones, they use
touch screen technology but also have the ability
to link to smartphones using Bluetooth
technology. They have functions similar to that of
a smartphone
= Easy to monitor fitness and heath = Though it has all the features of a
regime. smart phone, it is difficult to
operate as the display size is very
small.
15
Information and Communication Technology
1.4.5 Smartwatches
Smartwatch is a wearable computer on the wrists. As with the smartphones,
they use touch screen technology but also have the ability to link to smartphones
using Bluetooth technology. They have functions similar to that of a smartphone
16
Types and components Of computer system
1.5.3 Robotics.
Impacts:
= Airport security.
= Personal safety.
= Building security.
17
Information and Communication Technology
Impacts:
= Astronomy.
= Military.
= Navigation.
= Medical.
18
Types and components Of computer system
1.5.3 Robotics
Robot is an automatically operated machine that replaces human efforts,
though it may not resemble human beings in appearance. Robots are widely used in
automobile manufacturing industries to perform simple repetitive tasks, and in
industries where work must be performed in environments, hazardous to humans.
Many aspects of robotics involve artificial intelligence; robots may be equipped with
the equivalent of human senses such as vision, touch, and the ability to sense
temperature. Some are even capable of simple decision making, and current
robotics research is geared towards devising robots with a degree of self-sufficiency
that will permit mobility and decision-making in an unstructured environment. One
application of robotics is the use of drones. A drone is a flying robot that can be
remotely controlled or fly autonomously using software-controlled flight plans in its
embedded systems, that work in conjunction with on board sensors and a global
positioning system.
Impacts:
= Efficient manufacturing.
= Loss of job.
19
Information and Communication Technology
Impacts:
= Secure voting.
= Secure communication.
= Terminology databases.
= Translation memories.
Impacts:
= Accurate document.
= Quicker translation.
20
Types and components Of computer system
Impacts:
= Improved security.
= Engineering design
= Architecture
= Simulations
= Medical imaging
= Gaming
= Advertising
= Holographic televisions
21
Information and Communication Technology
Impacts:
= In engineering (for example to check how the new design will look.)
22
Types and components Of computer system
System Application
Video editing software
Device driver
Utilities
Control and measuring software
(a) __________________________________________________
(b) __________________________________________________
(c) __________________________________________________
(d) __________________________________________________
23
Information and Communication Technology
15. CAT uses two tools in language translations. Name them and explain
16. Describe how the 3-D and holographic imaging system work does
17. What is virtual reality? Name any four areas where VR is used
24
Input and output devices
CHAPTER
2
Input and output devices
In this chapter you will learn about:
2.1 Manual Input devices
= Manual input devices – the devices used by people to enter data into a
computer by themselves.
25
Information and Communication Technology
= Numbers (0,1,2….9)
= Arrow Keys
Uses
= Input of data into application software (for example, text into word
processors, numbers into spreadsheets, etc.).
= Enables fast entry of text into = People with wrist and hand
documents. problems can find keyboard
painful to use.
= Very easy to use.
= Keyboards are quite large and
= Information that the user input
can take up a lot of desk space.
instantly appears on the screen.
This lets user to check quickly = Entering data is slow when
whether the data entered is compared to automatic input
correct or incorrect. devices.
QWERTY Keyboard:
26
Input and output devices
Ergonomic Keyboard:
Numeric Keypad:
= Numeric keypads are faster than = They can be difficult to use, due
standard keyboards for entry of to very small keys.
numeric data.
= It is difficult to use them for
= Since many are small devices entering text.
(e.g. mobile phones), they are
= Sometimes the order of the
very easy to carry around
numbers on the keypad isn’t
intuitive.
Concept Keyboard:
27
Information and Communication Technology
Uses
Mouse
Uses
28
Input and output devices
= Image editing, for example controlling the size and position of a drawing
pasted in a document.
Touch Pad
29
Information and Communication Technology
Light Pen
Tracker-ball
30
Input and output devices
Graphics tablet
31
Information and Communication Technology
2.1.3 Scanner
Scanners usually attach to a computer and it reads printed data, and similar
sources is fed into computer for editing and display. Scanner used to scan
documents, images etc. OCR also will be used in scanner to convert the text images
into soft copy text for editing purpose.
Types of scanner:
32
Input and output devices
2.1.4 Microphone
Microphone is used to input analogue sounds into a
digital computer. It is used in presentations, voice-overs in
movies, VoIP (Voice over Internet Protocol), conducting video
conferencing, voice recognition software, hands free mobile
phones, with gaming consoles, etc.
= Faster to read in text than to type it = Sound files can take up a lot of
in using a keyboard. computer space.
33
Information and Communication Technology
Uses
= Televisions, satellite systems, DVD players and hi-fi systems will use
remote controls to alter functions such as sound volume, on/off, change
channels open the disc drawer, and so on.
34
Input and output devices
= Becoming more and more easy to = The picture quality can be poor at
use Both sound and video is used, lower resolutions.
making the communication more
= Generally, has a fixed position;
sophisticated.
hence cannot be moved around.
= Users can use the webcam to save
= Does not have separate storage
videos that they capture to watch
device as digital camera.
later or send to others.
35
Information and Communication Technology
= Can capture both- still and moving = Very difficult to produce good video
images. without training on a video camera.
2.1.9 Sensors
36
Input and output devices
Uses of Sensors
37
Information and Communication Technology
2.1.10 Joysticks
Joystick is a pointing device similar to tracker ball mouse. It is used to control
the pointer on a screen. A joystick has a handle or sticks which allow us to move the
pointer in a different direction that we want. It also has the buttons to select different
options.
Uses
= Used in flight simulators to train the pilots to control the simulated plane.
Uses
38
Input and output devices
Uses
= Used in smart phone, Tablet, Laptop, PDA to reduce the use of mouse.
= Used in bank ATM, Deposit machine, etc to know about the account
balance, to withdraw and deposit money.
39
Information and Communication Technology
Uses
= Credit and debit cards have magnetic stripes that are used by ATMs.
= Security cards for entry to buildings, hotel rooms, etc. use magnetic
stripes.
= Data entry is faster compared with = If the magnetic stripe gets damaged
keying in using a keyboard or (e.g. due to exposure to a strong
keypad. magnetic field or excessive use) the
data is lost.
= The system is error free, since no
typing is involved. = The card needs to be in close
contact with the reader, so magnetic
= The information held on the
stripe readers don’t work at a
magnetic stripe is secure because it
distance.
cannot be read directly by a person;
and, since there is no typing, there = Since the information is not human
is not the risk of somebody readable, this can be a
observing your key strokes. disadvantage in some applications.
40
Input and output devices
Chip and PIN reader are used in many retail outlets for the digital payment.
The card is inserted into the reader. Once it is inserted, it will read the details stored in
a small chip like account number, bank details etc. Payment will be made once the
PIN number is checked and approved.
= More secure than magnetic swipe = User may forget the password and
reader. so cannot make payments.
= Information contained on the chip is = People can look when PIN is being
hard to clone. entered. This is called as shoulder
surfing.
= Can hold more data than magnetic
stripes.
A system which can read marks made in pen or pencils. Typically used to
read multiple choice examinations where students shade in answers. OMR device
read the position of the mark from OMR sheet and compare it with the mark stored in
computer memory for the correct answers. If the positions are not shaded fully, then
it reject the answers.
41
Information and Communication Technology
42
Input and output devices
A marketing company has decided to get the feedback from the customers
about their products. They have decided to prepare a questionnaire to gain the
information from the customers. When they design a data capture form, they need
to consider the features of OMR and OCR so that it will be easy for them to input the
feedback from the questionnaire to the computer easily and quickly. So, it is better to
compare both OMR and OCR before the form is being designed.
43
Information and Communication Technology
OMR OCR
= Information obtained from the OMR = It reads all the type of answers and
is limited as all the details are pre converts into digital format. So, it is
designed.It is not possible to extend possible to extend the answers.
the answers
= It even reads the handwriting. But, it
= Answers are in shading the may not read the poor handwriting
lozenges.So,it has to be shaded
= It shall be used for any type for
completely to read and accept
question and answer format as it
= It is ideal for only the multiple choice converts all the documents into
questions digital format
RFID used in many areas like goods tracking in cargo, animal tracking in
Zoo, student’s tracking in school and transport etc.
44
Input and output devices
Types of Output
TEMPORARY OUTPUT
= Can be used with light pen. = They are very large and bulky.
= Produce a larger range of colors = Creates a lot of heat.
than TFT.
= Screen glares when in direct light.
= The screen angle is better than
TFTmonitors. = Need more power than TFTs to
= Cheaper to buy than TFT monitors. operate.
45
Information and Communication Technology
TFT stands for Thin Film Transistor. These are thin flat screened monitors.
They are used in laptops and mobile phones. The picture is made up of thousands of
tiny pixels (transisters controlled by microprocessor)
A flat panel screen that uses the liquid crystal display (LCD) technology and
connects to a computer. Laptops have used LCD screens almost exclusively, and
the LCD monitor is the standard display screen for desktop computers.
The front layer of the monitor is made up of liquid crystal diodes which are
grouped as pixels with red, green and blue colours.
Advantages and Disadvantages of LCD Monitor
46
Input and output devices
An LED is basically a flat panel display that uses light producing diodes as
the audio-visual display. An LED display panel screen is available in Visual Impact
Production large and small sizes, which depends on its use. LED diodes works with
sequenced instructions of light signals to make a LED presentation.
Advantages and Disadvantages of LEDMonitor
= It is efficient.
2.3.5 OLED
OLED consists of pixels made from Organic Light Emitting Diodes. When
current flows between a cathode and an anode, an emissive layer of organic
molecules sandwiched between these electrodes can become illuminated. A
conductive layer lies between the emissive layer and the anode. The anode is
positively charged and that draws electrons from the conductive layer, leaving the
conductive layer with a positive charge that draws electron from the emissive layer.
2.3.6 QLED
47
Information and Communication Technology
2.3.8 Speakers:
They are used to listen to different types of sounds like music albums,
watching a movie, browsing videos, multimedia encyclopedia etc. Speakers can be
directly connected to the devices through wires or Bluetooth. Sound will be
produced on speakers by converting the digital data into analogue by DAC (Digital
Analogue Converter)
= They can help blind people use a = High quality speakers are
computer. expensive.
48
Input and output devices
PERMANENT OUTPUT
Often called as impact printer where pins are pressed against an inked
ribbon which produces animprint on paper. These printers are used in noisy
environment where continuous printout (multi-stationary) is required.
49
Information and Communication Technology
They use laser beam to draw onto a drum. The laser leaves a positive electric
charge on the drum. The toner is sprayed onto the drum and it sticks to the parts that
contain the positive electric charge. These printers are used for high volume printing
and where less noise is required.
50
Input and output devices
= Much cheaper than laser printers. = Ink cartridges don’t last long.
2.3.13 Plotter:
2.3.14 3D Printer:
Material Used:
Many different materials can be used for 3D printing, such as ABS plastic,
PLA, polyamide (nylon), glass filled polyamide, stereo lithography materials (epoxy
resins), silver, titanium, steel, wax, photopolymers and polycarbonate.
51
Information and Communication Technology
Medical: Surgical guides, custom prosthetics and education models for medical
professionals
Food Industry: Prototypes and tools to build or calibrate your machinery in the food
industry.
Aeronautics: Prototypes and functional production parts for planes, drones and
satellites. Check aeronautics and aerospace applications.
Education: Bridge theory and reality by making objects with 3D Printing. Train the
students to design real products.
Robotics: Custom parts and short series for robotics. Creating robots has never
been as simple as it is with 3D printing.
No toners and ink cartridges are used in 3D printer. Instead, very different
types of raw materials will be used to make an object. Regular printers or 2D printers
will scan an image and then use the appropriate color ink to copy the image on to a
flat surface such as an A4 sheet. The 3D printer requires a couple of extra steps to
achieve its goal. Input image must be replicated. It has to be rendered in 3D format
using a software to convert a flat image into a 3D one.
52
Input and output devices
= The computer then processes the input data (according to the program)
2.4.1 Actuators:
2.4.2 Motors:
= Washing machines
= Control Fans
2.4.3 Buzzers:
It is otherwise called as beeper. It makes a single sound and are often used to
inform the user that particular thing has happened. Such devices are usually used in
quiet environment. So that it will then be heard clearly. They are used in
53
Information and Communication Technology
= Burglar alarms
2.4.4 Heaters/Coolers:
2.4.5 Lights/Lamps:
Light bulbs and LEDs can be used to provide light, or to indicate something.
For example, computer-controlled lights are used in traffic lights, at music concerts.
Lights are used in car dashboards to show if any of the systems in the car have
problem. They are used in
= Security lights
= Lights in greenhouse
54
Input and output devices
(f) A device which converts a hard copy into a soft copy ________________
(h) A device used with stylus pen to produce freehand drawing ___________
(j) A device which can read marks mead in pen or pencils _______________
(k) A device use radio waves to read and capture information ___________
Laser Printer
3D Printer
55
Information and Communication Technology
3. Tick the most appropriate device for reading the details from the following media
4. Circle the names of three devices which are used for input.
8. Which pointing device is used in laptop? Give any two advantages and
disadvantages of the device.
10. Why graphic table is popular in Art field? Give any two advantages and
disadvantages
11. Explain the types of scanner with two advantages and disadvantages
16. OMR, OCR and MICR are methods of direct data entry.
17. Describe each method, giving an example of an application where each might be
used
18. How the library books are inputted into the database software?
56
Input and output devices
23. Which device works as both an input and output device? Give any two
advantages and disadvantages of the same.
26. Why 3D printers are very expensive? List four areas where 3D printers are used
57
Information and Communication Technology
58
Storage devices and media
CHAPTER
3
STO R AG E D E V I C E S A N D
MEDIA
LEARNING OUTCOME:
3.1 Backing up of data
Hardware failure: Backup of data is important in case hardware failure like hard
disk damage and damage of data when it is written on the hard disk due to some
unexpected failure.
59
Information and Communication Technology
Hacking data: Hacker might hack the data or file and delete/ modify with or without
intension. So, to save the files against the hackers, we need to take backup.
Transfer data: Sometimes backup is needed to transfer data/files from one place to
other place.
Virus attack: In case your computer is infected by virus, there are chances for data
corruption, change in file format etc. So, to safeguard against virus attack, backup
is necessary.
These three terms will be explained with an example like we are storing data
about 30 smart phones in a mobile store. Data about each smart phone such as its
model, storage capacity, RAM speed, Display size, battery capacity are stored in the
allocated space which known as a field. Collection of the above data for a particular
smart phone is called record. The entire 30 smart phone data are collected together
and saved in a particular format is called file.
60
Storage devices and media
= It is mostly used on Magnetic tapes where data access rate is very slow.
= The computer can directly search where the data is stored and go to it
directly.
= When stored information needs updating, the direct access device, will
write data to the next available space and its position is recalculated by the
computer.
= An example of direct access is a DVD movie where unlike a film reel tape,
user can jump to any scene on the DVD.
Data stored in the devices are measured with the memory size. Following
table gives a clear understanding of storage memory size:
Byte B 8 bits
61
Information and Communication Technology
Storage medium: The physical material that actually holds data is called as storage
medium.
Storage device: The hardware that writes data to, or reads data from a storage
medium is called as storage device.
Examples:
Digital Versatile Disc (DVD) Digital Versatile Disc drive (DVD drive)
Floppy disk drive, Zip diskette drive, Internal hard disk drive, External hard
disk drive, magnetic tapes are the examples of magnetic storage media. Let us learn
one by one in detail.
62
Storage devices and media
Uses
Uses
Zip discs are used to transfer large files from one computer to another
compared to floppy disks.
63
Information and Communication Technology
Uses
64
Storage devices and media
Uses
= Its light weight and easy to carry as = It is not robust. If the device is
it is portable dropped, changes for file damage.
Magnetic tapes
Uses
65
Information and Communication Technology
An optical disk is an electronic storage medium that can be used to read and
write the data on its surface using laser beam light. There are different type of optical
disks namely CD, DVD, Blu-Ray.
The data are stored on the CD or a DVD as a series of minute grooves which
are known as ‘pits’ encoded on these spiral tracks. The areas between the ‘pits’ are
known as ‘lands’. These pits and lands do not represent the 1s and 0s, rather each
change from pit to land or land to pit and it is interpreted as 0 while no change is read
as 1. The pits and lands are read by a low-powered laser beam that follows the data
stream and reads from the centre outwards in a spiral track.
66
Storage devices and media
A CD uses a thin layer of an organic material to write the data and a DVD
uses a silver alloy or gold reflector to store the data. A laser beam produces a heated
and unheated spots to burn the disk surface.
= CD-R and DVD-R are cheaper than = Need a separate drive to read.
other storage media.
= Easy to misplace.
= Small and Portable.
= If there is any scratch on the disk,
data will not be read.
Uses
= CD-ROM are used to store Music, Computer games.
67
Information and Communication Technology
= Can store more data than floppy = If there is any scratch on the disk,
disks. data will not be read.
Uses
= Unlike CD-R and DVD-R, data can be added in the free spaces even after
completing the recording of data.
68
Storage devices and media
DVD-RAM
DVD-RAM works under different technology
compared to other format of CD/DVDs. Writing and
reading of data can happen at the same time in DVD-
RAM. For example, you can write some data into the
DVD-RAM while you are watching a Movie which is
stored in the same disk.
Features of DVD-RAM:
= Use number of concentric tracks instead of
single spiral track.
= Concentric track allows the data to read and write at the same time.
= Allow to read and write the data up 100000 times and storage life is longer
up to 30 years.
Uses
= Since the storage life is longer, it is used in data archiving ( to store data for
many years.)
= Longer life compare to other format = Expensive than DVD-R and RW.
of optical disks.
= Some systems may not recognize
= Writing data is reliable as it has in- the DVD-RAM format.
built verification software to check
= Easily misplaced as the size of the
the accuracy level of the data.
disk is small.
= Larger capacity than DVD-R or
RW.
69
Information and Communication Technology
Blu-ray disks
Blu-ray disks are different from CD/DVD as the way it carry out read/write
operations.
Uses
= Used to store high definition video files.
70
Storage devices and media
Applications of SSD
Initially Solid state drives were designed for consumer devices. But, due to
the increased speed and power, various sectors also started using SSDs. Some of
them are listed below:
Gaming – For every gaming program the computer requires a faster data access
speed enabling a faster load time which is provided by the SSD.
Servers – SSDs can improve the server’s response time due to its speed. They are
suitable for faster read and write operations.
71
Information and Communication Technology
Used to transfer files between computers and also used as backup device.
Pen drives are also used as dongle (a security device) to prevent software piracy.
72
Storage devices and media
73
Information and Communication Technology
1. Tick the most appropriate storage medium for each of the following uses
(d) The RAM version of this medium is used to record and play
recorded images at the same time ________________________
74
Storage devices and media
10. Why do we need magnetic tape to take backup? Give any two
advantages and disadvantages
13. How does the Blu-ray disk are different from CD/DVD?
75
Information and Communication Technology
76
Networks and the effects of using them
CHAPTER
4
Networks and the effects
of using them
LEARNING OUTCOME:
4.1 Networks.
= 4.2.2 Authentication.
4.1 NETWORKS
What is network?
77
Information and Communication Technology
Switches
78
Networks and the effects of using them
registered. Switch sends the data to the specific devices or computers by identifying
its IP/MAC address. So, it is called “Smart Device”. Data transfer rate is faster and
the security level is high when compared to a hub.
A switch will have an empty table. The computer’s MAC address is registered
as soon as the computers are connected with the switch port using LAN cables.
Bridges
A bridge in a network joins two separate LAN together to make a single LAN.
The network bridge enables the communication between LANs and provides a way
for them to work as a single network with the same protocol.
A network bridge checks the incoming traffic and decides whether to forward
or discard the traffic according to its intended destination. The following figure is an
example of a Bridge network with four computers. This network is divided into
segments by a bridge. Each segment is a separate collusion domain with its own
bandwidth. If Host A wants to communicate with Host C, Host A send the frame with
the Host C’s MAC address to the bridge. Bridge will inspect the frame and forward it
to the segment of Host C. Bridges support Wi-Fi to Wi-Fi, Wi-Fi to Ethernet and
Bluetooth to Wi-Fi connections. Since bridge sending out all data packets to all the
possible destinations, there would be huge network traffic.
79
Information and Communication Technology
Router
When a data packet comes out to a router port, router check its destination
device by its IP or MAC address information in pocket to determine out which port the
packet will be sent. There is a routing table in a router in which all the connected
devices addresses are stored. A routing table is a set of rules used to determine the
data packets sent over an IP (Internet Protocol). A routing table contains the
necessary information such as IP address, MAC address to forward data packets by
identifying the best route towards it destination. Each data packet contains
information about its origin and destination. Data packets contain the following
information:
80
Networks and the effects of using them
= Sender’s IP address.
= Receivers IP address.
Modem
The first modem was Dial-Up which means we need to dial a phone number to
connect internet provided by the ISP. Data transfer rate is very slow in dial-up
modem (up to 56 Kbps) and also the cost for internet connection is very high.
Modern broadband modem is of two types ADSL and Cable modem. ADSL
uses telephone line but the frequency range is high and also we shall use internet
and telephone calls simultaneously. So, the data transfer rate also higher when
compared to dial-up modem. Cable modem use coaxial cables and provide internet
through cable television. Fiber optic cables which provide higher data transfer rates.
In ADSL modem, downloading speed is faster than uploading speed.
81
Information and Communication Technology
There are three types of NIC namely Ethernet NIC, Wireless NIC and USB
NIC. Ethernet NIC is either inbuilt with computer mother board or a separate
hardware attached to a slot in mother board. Wireless NIC consists of a small
antenna where the communication between computers is set up without wires. An
USB NIC shall be connected via USB ports and it is plug and play device. USB NIC
shall be removed easily from the computer and shall be connected with any device.
Network Cables
82
Networks and the effects of using them
Gateway
4.1.2 Internet Protocol (IP) and Media Access Control (MAC) addresses
Internet Protocol (IP) address
83
Information and Communication Technology
Wi-Fi radio signal frequencies are measured in Gigahertz (GHz) and it uses
the frequency 2.4 GHz or 5 GHz to transmit the data. Wi-Fi devices communicate
each other with set of standards. It is classified under IEEE (Institute of Electrical and
Electronic Engineers) 802.11 standards, a non-profitable organization created to
certify the network products.
84
Networks and the effects of using them
Bluetooth
Wi-Fi Bluetooth
= Wi-Fi use 2.4, 3.6 and 5.0GHz = Bluetooth use 2.4 GHz frequency to
frequency to transfer files. transfer files.
85
Information and Communication Technology
Hardware:
Software:
= Putting common software into the server and accessing that software by
the client with proper software license.
86
Networks and the effects of using them
87
Information and Communication Technology
WANs are used to connect two or more computers are devices from long
distances geographically. A WAN may consist of connections to a company’s
branches across country. Many LAN connections joined together locally and using
a Router, the devices are connected to the LAN from different location. Internet and
ATM are the examples for most commonly used WAN. WAN uses telephone or
satellite to connect devices. Companies prefer dedicated line or leased line for WAN
as it is more secured and less expensive.
There are two type of connections in WAN system which are End system and
Intermediate system.
88
Networks and the effects of using them
WLAN provides network access to the devices without cables via Wireless
Access Point (WAP) or wireless nodes. Access points are connected to the LAN with
wires and the Access points provide the network access to the devices without wires
using high frequency radio waves which transmit the signals from the LAN to the
devices. APs use spread spectrum technology which supports the range up to 50
meter. Some APs use Infrared signals also to connect the short rage about 1 to 2
meter. APs transmit the data between LAN and WLAN. Users receive the data by
connecting the AP through the Wi-Fi LAN adapters which are in built in their devices.
89
Information and Communication Technology
90
Networks and the effects of using them
Tablets
Laptops
= Lighter than desktop. So, easily = Difficult to replace the parts as all the
carried around. parts are integrated.
91
Information and Communication Technology
Desktops
92
Networks and the effects of using them
4.2.2 Authentication
Authentication techniques are used to ensure only authorizes persons are
allowed to gain access to a network through their username & password, biometrics,
swiping cards, two factor authentication, Transaction authentication number (TAN)
etc.
= Should avoid using the familiar names as password like nickname, family
members name etc.
When the user log on to their online accounts, they might be asked following
additional information:
93
Information and Communication Technology
Security question: User might be asked to type the answer for the secret question
like mother’s maiden name, favorite movie etc.
Personal image: Some banks requires users to identify an image when they log in
to their websites.
Cards
Magnetic strip cards have a small piece of magnetic strip on the back of the
card. This magnetic strip is made up of tiny magnetic particles on a plastic film in
which all the required information like ID number, name, date of birth are stored.
Details stored in the strip are read when the card is swiped through a card reader.
Details on the magnetic strip can be easily updated.
Many countries started using RFID in passport to avoid the fraudulence. The
RFID has a small microchip designed for wireless transmission and small antenna
which needs to connect with the RFID reader. A chip in RFID passports stores the
similar data that is printed on passport such as passport holder’s name, date of birth,
expiry date and other biographic information.
94
Networks and the effects of using them
= The passport page containing the person photograph is placed face down
on a reader.
= RFID reader deducts the passport’s microchip through antenna and the
facial image is scanned by the scanner.
= The photograph is converted into a digital format and will be compared with
the photograph available in the microchip.
= Also the details available in the microchip are compared with the
centralized database.
= If all the details are matched, then the passport will be accepted.
Antivirus software
95
Information and Communication Technology
are many Antivirus available in the market, but almost all the software has the same
features:
Real time scanning: Once the antivirus software is installed, it runs in the
background on a computer will continuously monitor the system to prevent from
virus attacks
Automatic updates: Since the new type of viruses are constantly being developed,
antivirus software needs frequent update in order to track the new threats and
quarantine or delete them.
Full system Scan: A full system scanning is required at least once in a week to keep
the computers more safe. For example, some viruses lie dormant and would only be
picked up by the full system scan.
Heuristic checking: This is the checking of software for types of behavior that could
indicate a possible virus; this is useful if software is infected by a virus not yet on the
database
= Check the website address starts with “https” or with padlock symbol
= When you receive any advertisement email with a URL link, do not click on
the link. Instead, copy the URL from the email and paste in the browser
address bar. This helps to avoid links to the fake websites.
= Avoid opening unknown emails. Most of the viruses are spread through
unknown emails.
Other than website or email links, viruses spread through some hardware
devices like pen drive, memory card, Optical disks etc. When you insert any such
devices in to the computer, run the antivirus to check whether the devices are
infected by virus.
96
Networks and the effects of using them
Data must be fairly and lawfully processed: An individual or business may only
collect, process and hold personal information in a fair and transparent way.
Data can only be processed for the stated purpose: The personal data must be
collected for the specific use for which the data holders should grant the permission.
Data should not be transferred, sold and duplicated for the other purpose.
Data must be adequate, relevant and not excessive: irrelevant details should not
be collected. Collected data must be adequate and relevant according to the
legislation.
Data must not be kept longer than necessary: DPA states how long the data can
kept for their details. It is a good practice to remove the data after a dormant period
and have a strong company policy.
Data must be processed in accordance with the data subject’s rights: People
have the right to know about what type of details an individual or company can hold.
Data must be kept secure: There should be a strong system to keep the all
processed data secure. The system must be robust against attack; also it should be
ensured that the level of security is appropriate to the business.
Data must not be transferred to another country unless they also have
adequate protection: It is important to know that each country has the data
protection act before sending data to other countries.
97
Information and Communication Technology
Fax is a short form of “facsimile” which means copy. There are two types of
fax machine for sending and receiving fax:
= Once the hard copy is inserted into the sender’s fax machine, it converts
the light/dark areas of the printed documents into noises
= These noises are sent to the other end fax machine thorough a telephone
line.
= These noises are again converted into printed marks and prints on the
paper kept on the receiver’s end fax machine
= Less cost as there is no ink / toner required to print the document as the
data can be sent in digital format and can save paper cost also.
= Only the authorized people can view the document when it is sent via
Email and it is password protected.
= There is no telephone cost to send the fax; only internet charges are
included.
= No need to wait for the call from receiver’s end in case it is busy. All the sent
data are stored in a database server and it reaches to the receiver’s end
once it is available.
98
Networks and the effects of using them
Email is also a part of electronic fax and it is useful for sending and receiving
many file formats like documents, audio files, video files, images etc. A username
and a password required to access email. There are many email service providers
give email services free of costs with limited storage capacity. Storage capacity to
store and send files can be increased by paying subscription fee. Files can be
encrypted and sent with protection. An email account provided by ISP (Internet
Service Provider) that consists of a username and a domain name separated by an
“@” symbol (Example: [email protected]).
Conference
There are three type of conference used to communicate people from one
location to another location which are Video conferencing, Audio conferencing and
Web conferencing.
Video conferencing
99
Information and Communication Technology
Hardware requirement:
= Devices like laptop, tablet and smartphone has all the hardware in built, so
only the device is required.
Software requirement:
= User must login to the video conferencing system to connect with people
100
Networks and the effects of using them
Audio conferencing
= Two PIN numbers will be provided by the phone company. One is personal
PIN which is used by the audio conference organizer and another one
participant’s PIN which will be shared to all the persons to connect with the
conference.
= Organizer will contact all the participants and give the PIN and time to join
with the conference
= First the organizer start the call and enter the personal PIN to begin the
conference and then all the participants will join with the conference by
calling the same phone number and entering the PIN which is shared to
them.
101
Information and Communication Technology
Web conferencing
102
Networks and the effects of using them
1. Tick whether the following statements would most appropriately apply to the
internet or an intranet
Internet Intranet
A common network system
Difficult for the hackers to access the sensitive data
It is difficult to control the network
It is within a organization only
(d) This device connects one LAN to another LAN that uses the same
protocol ____________________________
103
Information and Communication Technology
3. Tick whether the following statements would apply to a LAN, a WAN or a WLAN.
13. Explain to set up a office network with hardware and software requirements
104
Networks and the effects of using them
17. What RFID? How does the RFID Passport system work?
18. What is computer virus? List some common effects of computer virus
22. What are the hardware and software required to conduct a video conferencing?
24. What is audio conferencing? Write down the procedure to conduct audio
conferencing
25. How does the web conferencing is different from video conferencing
105
Information and Communication Technology
106
File Management
CHAPTER
5
F I L E M A N AG E M E N T
LEARNING OUTCOME:
5.a - Types of files and uses
_________________________________________
Back up files
Place all Give files logical regularly
documents under a specific names
single “root” folder
107
Information and Computer Technology
MIND MAP:
FILES / FOLDERS
Generic file
Generic file format saves files in a format which can be opened in any
platform. Using generic formats allows files created on PC to be read/ imported on
an apple Mac and vice versa.
Some file types such as Excel (.xls), Spreadsheets (.xlsx), words (.docx),
Access data base (.accdb) used by MS Office are NOT GENERIC.
108
File Management
2.Text: these files have a .txt file extension. A text file is not formatted and can be
opened in any word processor.
3.Rich text format: these files have a .rtf file extension. This is a text file type that
saves some of the formatting within the text.
2.Join photographic expert group: these files have a .jpeg/ .jpg extension. This
format stores still images only, not moving images. It is an efficient method of storing
images using a smaller file size and is widely used in a web page.
3. Portable document format: these files have a .pdf extension. These files can be
converted into image format and allows documents as an image so that read it can
be read only. The pages look just as they would when have printed but can contain
clickable links, buttons, form fields video and audio. A PDF document is a protected
document to stop others from editing.
4. Portable network graphics: these files have a .png file extension. It is a file
format that compress graphic images without any loss of quality. It was created to
replace graphics interchange format and is now the most used lossless
compression format used for image on the internet.
5. Moving picture experts group player 4: this files have a .mp4 file extension. it is
not a single file format that is a multimedia container which is used for storing video
files, still images, audio files, subtitles and many more. This container is often used
to transfer video files on the internet.
1. Moving picture experts group layer 3: this files have a .mp3 file extension. It is
a compressed file format used for storing audio files. It cannot store still are moving
images as the file sizes are relatively small but have near CD quality.
109
Information and Computer Technology
2. Zip: these files have a .zip extension. this is a container which can hold almost any
type of files in a compressed format as it reduces the number of bytes needed to
save storage space for two reduced transmission time when sent from one device to
another.
2. Hypertext markup language: these files have a .htm/ .html file extension. this is a
text based language which is used to create markup that a web browser will be able
to display information as a webpage.
Fig. Hierarchical
file system
110
File Management
Few file management tips that will help you keep your files accessible
1. Use the Default Installation Folders for Program Files
Use the default file locations when installing application programs. Under
Windows, by convention application program files reside under the (Drive Letter:)-
>Program Files directory. Installing applications elsewhere is confusing and
unnecessary.
Place all documents under a single "root" folder. For a single user in a
Windows environment, the default location is the My Documents folder.2.
These are the drawers of your computer's filing cabinet, so to speak. Use
plain language to name your folders; you don't want to be looking at this list of folders
in the future and wondering what “TFK” or whatever other interesting abbreviation
you invented means.
Create other folders within these main folders as need arises. For instance, a
folder called “Invoices” might contain folders called “2018”, “2017” and “2016”. A
folder named for a client might include the folders "customer data" and
"correspondence". The goal is to have every file in a folder rather than having a
bunch of orphan files listed.
111
Information and Computer Technology
Use descriptive file names for easy identification and retrieval but don't go overboard
- file/path names have length limits which vary between operating systems.
6. Be Specific
Give electronic files logical, specific names and include dates in file names if
possible. The goal when naming files is to be able to tell what the file is about without
having to open it and look. So if the document is a letter to a customer reminding him
that payment is overdue,
7. File as You Go
The best time to file a document is when you first create it. So get in the habit of using
the "Save As" dialogue box to file your document as well as name it, putting it in the
right place in the first place.
If there are folders or files that you use a lot, force them to the top of the file list by
renaming them with a ! or an AA at the beginning of the file name.
Sometimes what's old is obvious as in the example of the folder named "Invoices"
above. If it's not, keep your folders uncluttered by clearing out the old files.
Whether you're copying your files onto another drive or onto tape, it's important to set
up and follow a regular back up regimen.
As it is a stand-alone personal computer, all the files will be stored in the local
hard disk or SSD drives. You are using a network system; files are likely to be stored
on a network drive usually in a secure area where only you have access.
Each system is different and one must use the “This PC” or “My Computer”
icon from the windows 8 in the start screen access bi price inside.
With the help of the below given Fig.11. c.2, it is easy to learn how to locate
the exact file and open it.
113
Information and Computer Technology
= On most computers
double clicking on the
file icon will open the
file in most suitable
application. There are
times when you may
wish to use the other
programs to open a
file for example in the
website according
section you may wish
Fig.Opening a file to open a file on both
the browser and in notepad. In this case you can either:
Ÿ Right mouse click on the file name and use open with.
to overwrite the original, use the "Save as" function to create a copy with a new file
name. Many programs have an autosave function.
114
File Management
Save option that will automatically save your file after a set amount of time.
This can save you in a pinch, but should not replace actively saving often.
Printing a file
After saving a file by using the
file options on the tab we find print it and
a short cut - cntrl + p is also used for
printing a file.
116
File Management
The largest file stored and transmitted are of an image files. These images
can vary in size with lower resolution graphics which are often used for web pages to
speed up the loading time. Higher the image resolution the larger the file. Video
files which contains thousands of still images are usually to be the largest files which
are stored and transmitted. Large database management systems such as that
used by the driver and vehicle licensing agency (DVLA) in the United Kingdom,
require immense amounts of storage. File sizes must be kept as small as possible
but not to the point where the images become so pixelated that they are not clear.
This method is said to be Resizing or Resampling image files which require less
storage space and takes less time to load.
117
Information and Computer Technology
RESIZING RESAMPLING
Resizing changes the physical Resampling changes the quality
dimension width and height of an of an image
image
simply changing the size at which Physical changes in the number
the image will print and keeping the of the pixels of an image
number of pixels in the image the
same
Resizing vs. Resampling an Image
Make sure you have your image open in Photoshop and let's look at what the
Image Size dialog box is telling us about this image. To access it, you need to go up
to the Image menu at the top of the screen and choose Image Size. Now let's look at
the image sixe dialog box as shown in the
given Fig.11. e.1 Image size dialog box.
Before we go any further, there's three more options in the Image Size dialog
box below the Document Size section:
= Scale Styles
= Constrain Proportions
= Resample Image
The first one, Scale Styles, has to do with Layer Styles and how they're
affected by resizing or resampling the image. We'll ignore that option since it has
nothing to do with this topic. The second option, Constrain Proportions, which is
enabled by default, links the width and height of the image together so that if you
make a change to the width of the image.
118
File Management
To better understand the difference between what we'll call the "Image
Resize" version and the "Image Resample" version of the Image Size dialog box,
here's a screenshot of what the Image Size dialog box looks like with the "Resample
Image" option checked, and below it is a screenshot of what Image Size looks like
with "Resample Image" unchecked:
119
Information and Computer Technology
File compression
If a document contains lots of formatting or lots of images its file size tends to
be quite large. To reduce the file size for transmission and if the file is not to be edited
you can turn the file into portable document format by the following method:
enter the new file name and click on publish to create a PDF
If you need to send multiple files, the most efficient way is to compress the
files together as a single file. To do this you must open file explorer by pressing the
windows and e keys. hold down control and select files to be shipped.
With this file selected click the right mouse button to get the menu. Move the
cursor down to the send to option and a second menu appears. At the left mouse
button on compressed zipped folder. Edit the name of the folder if appropriate.
120
File Management
For awareness of more recent activity, you can use Google Alerts to email
you when it finds new results—such as web pages, newspaper articles, blogs, or
scientific research—that match your search term.
You can also view all the activity that you have carried out while logged into
Google by visiting My Activity. This can be useful if you want to re-run Google
searches that you carried out, for example, but it is also very scary to see just how
much information is being held about you. You can delete activity.
Look for the advanced search option as this allows more flexibility in
combining search words , e.g. https://www.google.co.uk/advanced_search. If you
are using Bing you can use symbols to help combine words to make your search
more precise:
= | (OR) – use to broaden a search and find more sites, e.g. American | President
= – (NOT) – use with care to eliminate unwanted search words, e.g. American -
President
= Use exact phrase (quotation marks) to search for a precise phrase, e.g.
“American President”
121
Information and Computer Technology
= Site: – use to find information within a specific site e.g. student bursaries
site:cam.ac.uk. You can also exclude a specific site or domain e.g.
–site:shef.ac.uk
= Intitle:/intext:/inurl: – search for a word within the title, text or URL e.g.
intitle:Girton
You can also refine your results, e.g. to exclude older results. In Google, you
do this by selecting Tools and using the drop down menus.
Google Images lets you limit searches results by usage rights; go to “Tools”
and select “Usage Rights”. You can also do reverse image searches (i.e. search for
an existing image) by clicking the camera icon in the search bar. (Useful if you want
to look for fake versions of your own social media accounts, for example, although
TinEye <https://tineye.com> is a specialised alternative.) Bing also lets you filter
image search results by “Licence”.
122
File Management
You will need to look critically at the sites you find. Aspects to look out for
when evaluating sites include:
Last modified – is the site updated regularly? Look for a date at the bottom of the
page.
123
Information and Computer Technology
Unsuccessful search?
Here are some of the tips to do when your search was unsuccessful.,
2.Remember, search engines don't index everything that's out there. The
“invisible web” or the “hidden web” can include sites that are password-protected,
including Moodle. Content may also have expired or been removed.
= Internet web archive (Wayback Machine) – useful for finding information that
appeared on websites previously and for links that no longer work. Search using
a URL.
Exercises:
1.What the direct( in person) and indirect( offline) communication methods? Why we
need both of them to business in ICT enabled environment?
2.Do you know how to recall a email that you had accidently sent to unintended
person?
3.Internet provided the growth of many new communication methods? Can you take
an example and discuss
124
IMAGES
CHAPTER
6
I M AG E S
LEARNING OUTCOME:
6.a - Images in Document or presentation
125
Information and Computer Technology
MIND MAP
Images
In this chapter, you will learn how to search for and insert clip art, how to
insert an image from a file, and how to change the text wrapping settings for your
images.
Clipart : Open Microsoft word document Select the Insert tab Click the Clip Art
command in the Illustrations group The clip art options appear in the task pane to
the right of the document Enter keywords in the Search for: field that are related to
the image you want to insert Click Go.
Image : Open Microsoft word document Place your insertion point where you want
the image to appear Select the Insert tab Click the Picture command in the
Illustrations group. The Insert Picture dialog box appears Select the desired
imagefile, then click Insert to add it to your document.
126
IMAGES
Step 2: On the Insert tab, in the Images group, click Online Pictures.
Step 3: (PowerPoint 2013) In the Bing Image Search box, type what you are
searching for, and press Enter.
127
Information and Computer Technology
128
IMAGES
5. Move the image around to see how Fig. Text wrapping around an image
the text wraps for each setting.
If you can't get your text to wrap the way you want, click the Wrap Text command,
then select More Layout Options from the menu. You can make more precise
changes in the Advanced Layout dialog box that appears.
129
Information and Computer Technology
Through: this place is the image on the page and the text wraps around the image
with pre-set values.
Top and bottom: displaces the image with the text above and below the image but
not wrapped with the side.
Behind text: this place is the image behind the text for stop it can be used as a set
background image in the document.
In front of text: this place is an image over the top of the text.
More layout options: this can be used to give more options to the selected layout
types about. For example, if a square layout is selected you can specify whether you
wish to fly the text around the image and the distance of the text from the image on
each side. This option also allows you to control the positioning of the image on the
page. This menu can also be found by right clicking the mouse on an image and
selecting a wrap text.
130
IMAGES
Fig. snow
If the image needed to be in the portrait orientation you would need to crop
the image. Where the crop? If you crop the top of the image the trees will be lost
which gives the viewer and idea of the depth of the snow. The choices are your
depending upon what message you want the image to give. Images should retain
the correct proportions between width & height; this is called the “aspect ratio”.
131
Information and Computer Technology
Resizing an image
1. Resize an Image by Clicking and Dragging
Step 1: In the Word document, select the object you want to resize. Then, on the
ribbon, select Picture Format.
Step 2: To resize the object to an exact size, go to the Size group and enter the
values you want in the Height and Width boxes. Or, use the arrows to change the
height and width of the object.
Step 3: To resize the object to an exact proportion, select the dialog box launcher.
Step 5: In the Scale section, select Lock Aspect Ratio. In the Height or Width section,
use the controls to change the height or width. The other dimension automatically
changes to maintain the ratio.
132
IMAGES
Reflection
To reflect an image left mouse click on the image and select the format
picture pane, then click on the Pentagon icon to select of this menu. do not select
reflection but click on the triangle to open the 3D rotation options. With the 3D
rotation features a reflection ( flip) from left to right is an X rotation of 180 degrees
and a flip reflection from top to bottom is y rotation of 180 degrees. sometimes it is
easier to perform these functions in graphics package before placing the image.
134
IMAGES
Cropping an image
1.Use Insert > Picture to add the image to an Office file
(such as a Word document, PowerPoint presentation, or
Excel workbook).
6.You can also outcrop, or add a margin around a picture, by dragging the cropping
handles outward rather than inward.
2. Under Picture Tools, on the Format tab, in the Adjust group, click Color.
135
Information and Computer Technology
3. If you don't see the Format or Picture Tools tabs, make sure that you've selected a
picture. You may have to double-click the picture to select it and open the Format
tab.
C. To apply a built-in stylized effect, such as grayscale or sepia tone, click one of
the common adjustments offered under Recolor.
4. Optionally, you can fine-tune the intensity of your color change by clicking Picture
Color Options, or you can customize your own color by clicking More Variations >
More Colors.
136
LAYOUT
CHAPTER
7
L AYO U T
LEARNING OUTCOME:
7.a - Basic document
Elements of Layout
Conceptual Elements [Point, Line, Plane, Volume]
Visual Elements [Shape, Size, Color, Texture]
Relational Elements [Direction, Position, Space, Gravity]
Practical Elements [Representation, Meaning, Function]
137
Information and Computer Technology
MIND MAP
LAYOUT
Creating a Open an
new document existing Header Why it is
& Footer? needed?
How to
create?
138
LAYOUT
Ÿ Select the file icon in File Manager and choose Open from the File Manager
Selected menu.
Ÿ Drag the document's file icon to the Text Editor control in the Front Panel.
139
Information and Computer Technology
OneDrive.
Ÿ The Open dialog box appears. Locate and select your document, then click
Open
Ÿ If you've opened the desired presentation recently, you can browse your
Recent Documents rather than search for the file.
Ÿ Word 2013 also allows you to open existing PDF files as editable documents.
This is useful when you want to modify a PDF file. Read our guide on Editing
PDF Files for more information.
140
LAYOUT
The basic steps to insert text or to create a new document in Word are listed
below;
Ÿ You will see a blinking cursor or insertion point in the text area below the
ribbon
Ÿ Now, as you start typing, the words will appear on the screen in the text
area
For a basic table, click Insert > Table and move the cursor over the grid
until you highlight the number of columns and rows you want.
For a larger table, or to customize a table, select Insert > Table > Insert Table.
2.Use your mouse to select the cells that contain the information for the table.
5.If you have column headings, check the box "My table has headers".
142
LAYOUT
Images
As we have discussed the same in our previous chapter, Images, we have
learnt various steps to insert an image in a document.
Select Insert > Pictures > Stock Images for high quality images or backgrounds.
Select Insert > Pictures > Online Pictures for a picture on the web.
Ÿ It provides the easiest way to analyse and read data from the document.
There are the following types of graph that you used in the Word document -
1. Bar graph
143
Information and Computer Technology
2. Line graph
3. Pie chart
Bar Graph
Bar Graphs are also known as the Bar Charts. Bar Graph is used to
represent data and quantities using bars or strips. Bars can be horizontal or
vertical. Typically, bar graphs are used in financial analysis and businesses for
displaying the data.
Step2: Place cursor in the document where you want to insert a bar graph.
Step 3: Go to the Insert tab on the ribbon and click on the Chart option in the
Illustrations group.
Step 4: An Insert chart dialog box will appear on the screen. Click on the Bar option
from the left side panel and select the chart that you want to Insert. Click on the OK
button at the bottom of the screen.
Line Graph
A line graph is also known as a line chart or line plot. It is used to display
quantitative values of data over a specific time interval.
A line graph mainly contains two axes: x-axis (for horizontal) and y-axis
(for vertical)
There are the following steps to insert a Line graph in Word document.
Step 1: Open the Word document where you want to insert a line graph.
Step 2: Go to the Insert tab on the ribbon and click on the Chart option under the
Illustrations group.
144
LAYOUT
Step 3: An Insert Chart window will appear on the screen. Select the Line option
from the left pane and pick a line graph that you want to insert. Click on the OK button
at the bottom of the screen.
An insertion point appears, and the text you are entering appears in the active cell
and in the Formula bar.
Clicking the Enter button ends the entry and turns off the Formula bar buttons
146
LAYOUT
To delete data
Ÿ Click the cell.
Ÿ Click the Cancel button to delete an entry and turn off the Formula bar
buttons.
Click the cell and type the new entry; the old entry is
replaced. If the original entry is long and only requires a
minor adjustment (in spelling, for example), edit the entry.
To edit
Click the cell and edit the entry in the Formula bar
Double-click the cell. This opens the cell for direct editing.
Press Enter or click the Enter button on the Formula bar to complete the entry.
Editing methods you can now choose your method from the following
Right mouse click with the highlighted area to get the drop down menu then
select cut. This removes the sentence and places it in the windows clipboard. Move
the cursor to the end of the first paragraph and right mouse click to obtain the
dropdown menu again. This time select paste.
147
Information and Computer Technology
Right mouse click within the highlighted area to get the drop down menu then
select copy. This copies the sentence to the clipboard but does not remove it. Move
the cursor to the end of the first paragraph and right mouse click to obtain the drop-
down menu and select paste. Move back to the original sentence highlight it and
press the delete key on the keyboard. All this method takes longer than method 1 it
does not remove the original sentence until the end of the process so if you
accidentally lose the sentence from the clipboard the original is still present.
Click the left mouse button in the highlighted area and hold this down moving
the cursor to the end of the first paragraph. Release the left mouse button at the point
and you will drop all the highlighted text here. To add the subtitle move the cursor to
the end of the first paragraph and press enter key twice.
completely.
Merge and Centre - Combines 2 or more adjacent cells to create a single
cell.
Horizontal Alignment
The horizontal alignment adjusts
the left right position of your cell contents.
General - (Default setting) Aligns text to
the left and numbers to the right.
148
LAYOUT
Centre Across Selection - This allows you to centre text across a selection of
cells, without the disadvantages of actually merging the cells. The text has been
entered in cell B2, and then centred across the cell range "B2:F2". Enter the text in
the left most column. Select the cells that you were going to merge and apply this
format. This is preferred to Merging the cells since you can still cut or copy the rows
or columns that intersect with it.
Vertical Alignment
The vertical alignment adjusts the top to
bottom position of your cell contents.
Top - (Default setting) Aligns the cell
contents at the top.
Centre - Aligns the cell contents in the
middle.
Bottom - Aligns the cell contents at the bottom.
149
Information and Computer Technology
150
LAYOUT
Headers and footers are needed to make sure that each page or pair of
facing pages as elements like the page number book or document or chapter logon
titles filename etc. placed consistently with them. If these are placed in the header or
footer they only have to be placed once but will repeat on every page. This saves the
author a great deal of time and effort not having to duplicate their work on every
page.
TASK
Create a file with name students list, add
header as Grade 10, and footer as Pg. No., insert
table, add the names of grade 10 student, save the file
and open it again. Use the alignment option to make
the list look presentable. Add a bar an line graph to
show the no of students present or not an a pie chart of
total strength of Hindi & Tamil students.
151
Information and Computer Technology
152
STYLES
CHAPTER
8
STYLES
LEARNING OUTCOME:
8.a – Corporate house styles
153
Information and Computer Technology
MIND MAP:
STYLES
Corporate Editing
Font styles
house styles styles in a
& Sizes
Document
Fonts and typography are also important to how a company presents itself.
Heavy fonts imply seriousness and trust, scripted fonts elegance and sophistication,
while others are cute and playful. It is doubtful that a law or public accounting firm
would use the same font and typography as a sports franchise or fast food chain. The
logo is another key element of a firm's house style. It is a visual representation of the
company, and the best logos are easily recognizable by the public. McDonald's
Golden Arches and Apple's once-bitten apple are two famous examples.
154
STYLES
= Transitional 2. Casual
= Clarendon
= Glyphic
= Grunge 1. Grotesque
= Psychedelic 2. Square
= Graffiti 3. Humanistic
4. Geometric
155
Information and Computer Technology
1. Old Style
This category includes the first
Roman types, originally created between
the late 15th mid 18th centuries, as well as
typefaces patterned after those designed
in this earlier period. The axis of curved
strokes is normally inclined to the left in
these designs, so that weight stress is at
approximately 8:00 and 2:00 o'clock. The
contrast in character stroke weight is not
dramatic, and hairlines tend to be on the
heavy side. Serifs are almost always
bracketed in old style designs and head
serifs are often angled. Some versions, like the earlier Venetian old style designs,
are distinguished by the diagonal cross stroke of the lowercase.
2. Transitional Serifs
English printer and typographer John
Baskerville established this style in the mid 18th
century. These typefaces represent the transition
between old style and neoclassical designs, and
incorporate some characteristics of each.
Baskerville's work with calendered paper and
improved printing methods (both developed by him)
allowed much finer character strokes to be
reproduced and subtler character shapes to be
maintained. While the axis of curve strokes can be
inclined in transitional designs, the strokes normally have a vertical stress. Weight
contrast is more pronounced than in old style designs. Serifs are still bracketed and
head serifs are oblique.
These typefaces are derived from 17th century formal writing styles. Many
characters have strokes that join them to other letters.
Calligraphic Scripts
Casual Scripts
Decorative Styles
This is the largest category and also the most diverse. Rarely used for
lengthy blocks of text, decorative typefaces are popular for signage, headlines and
similar situations were a strong typographic statement is desired. They frequently
reflect an aspect of culture – such as tattoos or graffiti – or evoke a particular state of
mind, time period or theme. Many – such as psychedelic or grunge designs – are
time-sensitive and fall out of fashion. Some decorative typefaces use unorthodox
letter shapes and proportions to achieve distinctive and dramatic results. Some
even appear three-dimensional.
You can change the formatting (such as font size, color, and text indentation)
in styles applied to titles, headings, paragraphs, lists, and so on. You can also select
formatted text in your document to create a new style in the Styles gallery.
The styles covered in this article are located in the Styles gallery, a
visual menu located on the Home tab. To apply a style, simply select the text
you want to format, and then click the style you want in the Styles gallery.
158
STYLES
STEP: 1
STEP – 2
159
Information and Computer Technology
STEP: 4 - You could simply click OK here, but I want you to see what your options
are in case you want something other than the defaults Word will choose for you:
160
STYLES
You can make further format changes to your Style settings in both these
places. The area at the top will let you make some font and spacing changes,
but Format button will take you to various dialog boxes (Paragraph, Numbering,
etc.) for more advanced formatting.
161
Information and Computer Technology
If you've got a specific set of requirements and are fairly adept with character
and paragraph formatting, though, you can simply create a new Style from scratch.
For this example, I'm going to create one for quoted deposition text.
To start, click the drop-down arrow at the bottom right-hand corner of the
Quick Styles area to open the Styles pane:
STEP 1:
162
STYLES
163
Information and Computer Technology
164
STYLES
STEP: 1 - Select the text or graphic that has the formatting that you want to copy.
STEP: 2- On the Home tab, click Format Painter. The pointer changes to a
paintbrush icon.
STEP: 3 - Use the brush to paint over a selection of text or graphics to apply the
formatting. This only works once. To change the format of multiple selections in your
document, you must first double-click Format Painter. To stop formatting, press
ESC.
Word allows you to create custom lists using the List Styles feature.
You can easily create and reuse lists of any kind, both ordered lists (such as
the alphabetical and numerical lists available in Outline Numbering) and
unordered lists (such as lists that use different symbols or icons). There are
two types of list that you need to know about bulleted lists and numbered lists.
Bulleted lists contain a bullet point at the start of each line to show that it is a
new item in a list of other similar items.
165
Information and Computer Technology
STEP: 5 - Click OK. Word applies the list style you've chosen.
166
STYLES
167
Information and Computer Technology
168
PROOFING
CHAPTER
9
PROOFING
LEARNING OUTCOME:
9.a - Spell check & Grammar Check
9.d - Verification
9.e - Proofreading
= If your document is not too long, you could try printing it out and
reading it on paper. Not great for the environment, but many
people find it much easier to pick up errors on paper.
169
Information and Computer Technology
MIND MAP:
Validation routines
PROOFING
Proofing Techniques
Verification
Proofreading
170
PROOFING
STEP: 4 - After you decide how to resolve the misspelling (ignoring it, adding it to the
program's dictionary, or changing it), the program moves to the next misspelled
word.
171
Information and Computer Technology
Keep in mind that adding a word to the dictionary will not necessarily add all
versions of that word. For example, after adding iPad to the dictionary, the dictionary
will still not recognize iPads.
The good news is that adding a word to the Microsoft Word dictionary will
also add it to the dictionary for other Office products such as Excel and PowerPoint.
The dictionary is case-sensitive. Adding iPad will not add ipad (a good thing,
since ipad is incorrect). Keep this in mind if the word you want to add to the dictionary
is capitalized because it is at the beginning of a sentence.
172
PROOFING
Grammar check
Grammar check works much like spell check, searching through your
document for grammatical and style errors rather than spelling errors. Grammar
check underlines words or phrases in blue or green, depending on your version of
Word.
173
Information and Computer Technology
TASK: 1
Open a document in your system and remove all the
errors, the save the document to print it.
For example: If a bank receives a file with for 100 clients data, the bank will
validate the data is accurate, contains all necessary data, and is not corrupt. The
validation ensures the bank received everything and that it can be added to their
systems. If the bank did not validate the data, and the data was inaccurate,
incomplete, or corrupt, it may cause errors or missing data resulting in lost client
information or transactions.
B) Retrospective validation
C) Concurrent validation
D) Revalidation
174
PROOFING
Retrospective validation
Retrospective validation is used for facilities, processes, and process
controls in operation use that have not undergone a formally documented validation
process. Validation of these facilities, processes, and process controls is possible
using historical data to provide the necessary documentary evidence that the
process is doing what it is believed to do. Therefore, this type of validation is only
acceptable for well-established processes and will be inappropriate where there
have been recent changes in the composition of product, operating processes, or
equipment. This approach is rarely been used today because it's very unlikely that
any existing product hasn't been subjected to the Prospective validation process. It
is used only for the audit of a validated process.
Concurrent validation
Concurrent validation is used for establishing documented evidence that a
facility and processes do what they purport to do, based on information generated
during actual imputation of the process. This approach involves monitoring of critical
processing steps and end product testing of current production, to show that the
manufacturing process is in a state of control.
Revalidation
Revalidation means repeating the original validation effort or any part of it,
and includes investigative review of existing performance data. This approach is
essential to maintain the validated status of the plant, equipment, manufacturing
processes and computer systems. Possible reasons for starting the revalidation
process include:
Retrospective
Validation
(Pre-market
Validation)
è
Types of
Revalidation è Process
Validation
è Concurrent
Validation
è
Retrospective
Validation
Fig. Four types of Validation
= Values - type numbers in the criteria boxes like shown in the screenshot below.
= Make sure the Show input message when cell is selected box is
checked.
= Enter the title and text of your message into the corresponding fields.
As soon as the user selects the validated cell, the following message will show up:
Check the Show error alert after invalid data is entered box (usually selected by
default).
Enter the title and text of the error message into the corresponding boxes.
Click OK.
177
Information and Computer Technology
3. The Expression Builder dialog box will appear. Click the text box and type your
validation rule. In our example, we want to limit data in the State field to actual state
postal codes. We'll type each of the valid responses in quotation marks and separate
them with the word Or, which lets Access know that this field can accept the
response "AL" Or "AK" Or "AZ" or any of the other terms we've entered.
8. The validation rule is now included in the field. Users will be unable to enter data
that violates the rule.
Simple validation rules can be written exactly like query criteria. The only difference
is that query C data, while an identical validation rule either permits or rejects data.
178
PROOFING
Ÿ No tables
Ÿ No windows or orphans.
Part of proofreading and error correction will be to check for windows and
Orphans. A window is the last line of paragraph that appears alone at the top of a
new page or column. An Orphan is the first line of a paragraph for reading that
appears alone at the bottom of a page or column. Even though you may have
applied automatic window and orphan control it is always good practice to check that
these have been removed. It is possible that you did not apply it to every paragraph.
Make sure that other objects like bulleted or numbered lists, tables, graphs and
database or spreadsheet extracts are not split over two columns or pages. Again,
inserting appropriate breaks should avoid these problems.
If you are well aware of the issues that you might experience as you go on
with the data entry tasks, you should know that looking for the wrong entry or what
made the data inaccurate will take you time and higher cost. To avoid these
problems from happening, your data entry staff should be mindful of the importance
of data accuracy.
180
PROOFING
9.d - Verification
Verification can be done to
ensure that the data in the database has
as few errors as possible. Another way
to phrase this is by saying that
verification is done to make sure that the
data entered is equal to the data from the
original source. Verification means to
check that the data from the original source document is exactly the same as the
data that you have entered into the system.
Methods of Verification
Visual Verification
Double entry
This refers to inputting the data twice and comparing the two entries.
= A classic example would be when creating a new password. You are often asked
to enter the password twice. This lets the computer verify that data entry is
exactly the same for both instances, and that no error has been committed. The
first entry is verified against the second entry by matching them.
= While this may be useful in identifying many errors, it is not practical for large
amounts of data. Here are some disadvantages of double entry:
= It would take an encoder a lot of time to input the data twice. It doubles the
workload as well as the cost.
= An encoder could input the same error twice, and it wouldn't be noted as
an error.
= The possibility of having two (correct) versions of the same data exists,
and double entry can't account for this eventuality.
181
Information and Computer Technology
Proofreading Editing
Language formatting for consistency Improves the overall quality of the text
Spelling mistakes – e.g. rules of using of capital letters, rules of hyphenation, solid
and separate writing of words
Punctuation errors – it means the use of punctuation marks, like missing or extra
commas, periods, and quotation marks used incorrectly
182
PROOFING
Misplaced words – choosing the correct word choice improves your content to a
more sophisticated level
TASK: 2
Create a story in a MS word as a document.
Save the file as story.doc. Now do the above given
methods to CHECK the spellings, grammar. Validate
using the proofing techniques and finally Validate &
verify the written story. At the end of the story and
validating and verifying, proofread the document and
save it.
183
Information and Computer Technology
184
GRAPHS & CHARTS
CHAPTER
10
GRAPHS & CHARTS
LEARNING OUTCOME:
10.a - Chart types
185
Information and Computer Technology
MIND MAP
GRAPHS &
CHARTS
Use of
secondary
axes
Bar
Line
186
GRAPHS & CHARTS
Charts
A chart is a graphical representation of data, in which "the data is
represented by symbols, such as bars in a bar chart, lines in a line chart, or slices in a
pie chart". A data chart is a type of diagram or graph, that organizes and represents a
set of numerical or qualitative data.
Pie charts
A Pie Chart is a type of graph that displays data in a circular graph. The
pieces of the graph are proportional to the fraction of the whole in each category. In
other words, each slice of the pie is relative to the size of that category in the
group as a whole. The entire “pie” represents 100 percent of a whole, while the pie
“slices” represent portions of the whole.
The following chart shows water usage (image courtesy of the EPA). You can
see that toilet water usage is greater than shower water usage because the piece of
the “pie” is greater: Designated
Organic for recycling
compostable paper and cardboard
Designated
Nonrecyclable 15.04%
for recycling
How much water do we use? paper Glass containers
7.20% 2.40%
Organic Designated
yard trimmings for recycling
Shower Toilet 5.15% Metal
16.8% 26.7% Organics: 4.07%
food scraps
Faucet 21.42%
15.7% Leaks Designated
13.7% for recycling
Household
Clothes Hazardous
Beverage
Washer cartons
waste Other 0.40%
21.7% 0.27%
Other plastic
5.3% Electronics 13.44%
e-waste Other
0.70% Textiles CAD Materials
and Carpets Debris 15.13%
7.01% 6.29%
Fig. Pie chart
Pie charts give you a snapshot of how a group is broken down into smaller
pieces. The following chart shows what New Yorkers throw in their trash cans. You
could read that New Yorkers (perhaps surprisingly) throw a lot of recyclables into
their trash, but a pie graph gives a clear picture of the large percentage of
recyclables that find their way into the trash.
When to use Pie Charts: Use pie charts to compare percentages of a whole
(“whole” is the total of the values in your data). Each value is represented as a piece
of the pie so you can identify the proportions. There are five pie chart types: pie, pie
of pie (this breaks out one piece of the pie into another pie to show its sub-category
proportions), bar of pie, 3-D pie, and doughnut.
187
Information and Computer Technology
Bar charts
A bar chart is a way of summarizing a set of categorical data (continuous data
can be made categorical by auto-binning). The bar chart displays data using a
number of bars, each representing a particular category. The height of each bar is
proportional to a specific aggregation (for example the sum of the values in the
category it represents). The categories could be something like an age group or a
geographical location. It is also possible to colour or split each bar into another
categorical column in the data, which enables you to see the contribution from
different categories to each bar or group of bars in the bar chart.
Example:
Line Graph
A line graph is a graphical display of information that changes continuously
over time. A line graph may also be referred to as a line chart. Within a line graph,
there are points connecting the data to show a continuous change. The lines in a line
graph can descend and ascend based on the data. We can use a line graph to
compare different events, situations, and information.
A line graph has two axes. The x-axis of a line graph shows the occurrences
and the categories being compared over time and the y-axis represents the scale,
which is a set of numbers that represents the data and is organized into equal
intervals. It is important to know that all line graphs must have a title. The title of a line
graph provides a general overview of what is being displayed. A line graph will also
include a key that represents the event, situation, and information being measured
over time.
Line graphs are common and effective charts because they are simple, easy
to understand, and efficient. Line charts are great for:
On the other hand, they are not necessarily your best choice for:
189
Information and Computer Technology
When to use Line Charts Line graphs are used to track changes over short
and long periods of time. When smaller changes exist, line graphs are better to use
than bar graphs. Line graphs can also be used to compare changes over the same
period of time for more than one group.
1. Make It Clean: Cluttered graphs — those with excessive colours or texts — can
be difficult to read and aren't eye catching. Remove any unnecessary information so
your audience can focus on the point you're trying to get across.
2. Choose Appropriate Themes: Consider your audience, the topic, and the main
point of your chart when selecting a theme. While it can be fun to experiment with
different styles, choose the theme that best fits your purpose.
3. Use Text Wisely: While charts and graphs are primarily visual tools, you will likely
include some text (such as titles or axis labels). Be concise but use descriptive
language, and be intentional about the orientation of any text (for example, it's
irritating to turn your head to read text written sideways on the x-axis).
190
GRAPHS & CHARTS
4. Place Elements Intelligently: Pay attention to where you place titles, legends,
symbols, and any other graphical elements. They should enhance your chart, not
detract from it.
5. Sort Data Prior to Creating the Chart: People often forget to sort data or remove
duplicates before creating the chart, which makes the visual unintuitive and can
result in errors.
2. Enter the data you want to use to create a graph or chart. In this example, we're
comparing the profit of five different products from 2013 to 2017. Be sure to include
labels for your columns and rows. Doing so enables you to translate the data into a
chart or graph with clear axis labels. You can download this sample data below.
191
Information and Computer Technology
To name your chart, double click the Chart Title text in the
chart and type a title. We'll call this chart “Product Profit
2013 - 2017.”
We'll use this chart for the rest of the walkthrough. You can
download this same chart to follow along.
192
GRAPHS & CHARTS
193
Information and Computer Technology
In this example, switching the row and column swaps the product and year
(profit remains on the y-axis). The chart is now clustered by product (not year), and
the color-coded legend refers to the year (not product). To avoid confusion here,
click on the legend and change the titles from Series to Years.
194
GRAPHS & CHARTS
2. Here you can change your chart type to any of the nine
chart categories that Excel offers. Of course, make sure that
your data is appropriate for the chart type you choose.
1.Click the Move Chart icon on the far right of the toolbar.
2.Click the dropdown menu on the top left side of the toolbar and click the chart
element you are editing
195
Information and Computer Technology
If the values are needed, then you will want to use data labels. I suggest
placing them inside the end of the column or bar, or just outside the column or bar.
This example shows a column graph with data labels only.
Large majority of risk assessments on lower half of scale
59%
18% 17%
6%
1% 0%
Very low Low Intermediate Moderately High Very high
high
Lower risk Higher risk
Fig. Labelling a bar chart
196
GRAPHS & CHARTS
Example 2
If the message is more related to the ranking of the values, then you can use
an axis. You don't need data labels, the axis gives the audience the scale they need
to compare the values. This example shows a column graph with an axis because
we are ranking the values from least frequent to most frequent
50
40
Average
transactions 30
per day
20
10
0
General Property Hunting Driver’s
inquiry transfer license license
Example 3
If you are talking about a trend, you will use a line graph. In this case, line
graphs are better than column graphs at communicating trends to the audience. The
question you need to ask when using a line graph is whether the audience needs to
know the starting and ending values of the line. Sometimes these are important, and
sometimes it is just the slope of the line that is important.
If the slope is the most important, then just use an axis. In this example, the
slope of each line is the key message because we want the audience to see which
type of contract is growing at a faster rate and when the revenue from National
contracts will surpass the revenue from Regional contracts.
197
Information and Computer Technology
Example 4:
If the starting and ending
values of the line are important for
the audience to know, then add
data labels to just those two points
on the line. This example uses data
labels for the first and last value to
emphasize the changeover the
time period.
When you are using a column, bar, or line graph, use the
information above to decide how it should be labelled so the
audience understands your message.
198
GRAPHS & CHARTS
2. Open the file in Excel, and get the quarterly GDP growth by dividing the first
difference of quarterly GDP with the previous quarter's GDP.
3. Select the GDP column (second column) and create a line chart. Use the quarterly
observation date column (first column) as the horizontal axis, i.e., the axis label for
the GDP. Change the format of the axis labels to show year only. It can be done by
changing the number format in the right-hand side formatting pane to yyyy.
199
Information and Computer Technology
4. Add the GDP growth column (fourth column) to the chart by right-clicking on the
chart and clicking on select data and then adding a new data series. Use the
quarterly observation date column (first column) as the horizontal axis, i.e., as the
axis labels for the GDP growth.
6. From the menu, select Combo and set both the chart types to “line” and set the
GDP growth data series to the secondary axis.
8. The last step is to make cosmetic changes that make the chart easier to work with.
The changes that can be made include adding axis labels, a legend, and a chart title.
200
GRAPHS & CHARTS
201
Information and Computer Technology
202
DOCUMENT PRODUCTION
CHAPTER
11
DOCUMENT PRODUCTION
LEARNING OUTCOME:
11.a - Format text & Organize Page Layout
Mind map
Document Production
203
Information and Computer Technology
204
DOCUMENT PRODUCTION
205
Information and Computer Technology
What is a widow?
A widow is a lone word or short
group of words that appears at the
bottom of a paragraph, column or
page. They tend to make long
sections of text look unbalanced and
messy, as well as leaving too much
excess white space at the end of a
page.
In other words, if you start a Fig. Widow
paragraph effect on one page or column but there is not enough room on the page to
get the last line typed in, the single line of text which appears at the top of the next
page or column is called a widow.
What is an orphan?
An orphan is a similar
u n w a n t e d s t r a g g l e r, b u t t h i s
describes words that appear at the
top of a page. Orphans really belong
on the previous page, as not only do
they look untidy on the page they
appear, but they also break the flow of
reading across two pages.
Similarly, sometimes you start a Fig. Orphan
paragraph at the bottom of a page or column but you can only type in one line before
the rest of the text goes on to the next page. The first line of the paragraph at the
bottom of the page or column is called an orphan.
You can set up word to avoid widows and
orphans automatically. To do this, select the
PAGE LAYOUT TAB, then in PARAGRAPH
SECTION, click the left mouse button on the
icon at the bottom right corner of the box, to
open the paragraph window. Now click on the
LINE and PAGE BREAKS tab so that the
window looks like this. To get word to avoid,
widows and orphans select WIDOW or
ORPHANS CONTROL the tick box and click on
OK.
Fig. To avoid widow & Orphan
206
DOCUMENT PRODUCTION
Section breaks
INSERTING A NEXT PAGE SECTION BREAK
This is the most commonly used section break. You
need to place a Next Page section break wherever
you want to change something in the document
such as page numbering, margins or orientation.
• Place your insert point where you want the section
break to be.
• On the Page Layout ribbon, select Breaks and then
Next Page under Section Breaks.
Again, if you scroll up to where you had your insert point you should now see a
Section Break marker.
Column breaks
INSERTING A COLUMN BREAK
• If you have a layout that uses
columns and want to force text to
move into the new column, use a
Column break (also in the Breaks
menu).
• The can also be achieved using
Ctrl+Shift+Enter.
DELETING BREAKS
• With your non-printing symbols showing, click in front of the break.
• Press Delete on your keyboard.
209
Information and Computer Technology
210
DOCUMENT PRODUCTION
Create a Multi-Level
Bulleted or Numbered
List
1. Start the list as usual.
2. Press Tab to indent a
line to the next level
bullet or number, type
the item, and then press
Enter to insert the next
bullet or number.
3. Press Shift+Tab to
return to the previous
level bullet or number.
4. To format the multi-
level list, select the list, Fig. Bullets & numbering
click the Multi-Level List button on the Home
tab, and then select a format.
211
Information and Computer Technology
Here’s an example:
Let’s say you want to send a holiday email or letter to your customers.
However, you don’t want to send them a generic email or letter — you want each
email to include unique greetings and mention their individual names and
addresses.
Instead of manually creating separate emails or letters for each person,
just perform a mail merge!
It will automatically add each person’s details to the email or letter you
send them — sparing you the trouble of doing it yourself.
212
DOCUMENT PRODUCTION
The mail merge function would then merge your data file and your letter
template to generate individual letters for each person.
What can you use them for?
The real question should be — what can’t you use them for?
213
Information and Computer Technology
214
DOCUMENT PRODUCTION
3. Insert Merge Field – insert other mail merge fields from your Excel file.
Here’s a step-by-step guide on how to add all three personalization variables
to your merge document (form letter):
Note – You can add a personalization variable at an insertion point of your
choice in the Word document. For example, to add a greeting line before the body of
your letter, simply place the text cursor at the point you want to add it.
• Step 1 – Insert address block
To insert a recipient’s address from your Excel worksheet, click on Address
Block from the Write & Insert Fields section. In the window that appears, choose an
address block format of your choice and click OK.
• Step 2 – Insert greeting line
To insert a greeting line, click on Greeting Line from the Write & Insert fields
section. In the dialog box that pops up, select the format you want to use and click
OK.
• Step 3 – Insert merge field
You can also add other mail merge fields — like your contact’s first name,
company name, email id, etc. — from your Excel worksheet to your Word template.
To do this, click on Insert Merge Field from the Write & Insert fields group.
Previewing and finishing the mail merge process
After personalizing the form letter for each recipient, you can preview the
letters to see how they look with the data you inserted from your Excel worksheet.
Here’s a step-by-step guide on how to do this:
• Step 1
Click on Preview Results under the Mailings tab.
• Step 2
To preview the result for each recipient, you can enter the recipient number
(the corresponding row number in your Excel spreadsheet) in the text box.
• For example, to preview the form letter for my second recipient – Brandon
Walsh, I type “2” in the text box and click on the Preview Results button.
• Step 3
After previewing the form letter, click on Finish & Merge to finish the Word
mail merge process.
215
Information and Computer Technology
216
DATA MANIPULATION
CHAPTER
12
D ATA M A N I P U L AT I O N
LEARNING OUTCOME:
12.a - Database structure
12.a.3 – Datatypes
Data Manipulation
Mind map
Sorting data in
Data type Sorting data
queries existing
in reports
table
217
Information and Computer Technology
218
DATA MANIPULATION
Property Description
Import Column If selected, the Developer tool uses data in the first row
Names From for column names. Select this option if column names
First Line appear in the first row. The Developer tool prefixes
"FIELD_" to field names that are not valid.
Specify a line break character. Select from the list or
enter a character. Preface an octal code with a backslash
(\). To use a single character, enter the character.
219
Information and Computer Technology
Row Delimiter The Data Integration Service uses only the first character
when the entry is not preceded by a backslash. The
character must be a single-byte character, and no other
character in the code page can contain that byte. Default
is line-feed, \012 LF (\n).
Start Import at Line Row number at which the Data Integration Service starts
reading when it imports the file. For example, if you
specify to start at the second row, the Developer tool
skips the first row before reading.
Treat Consecutive If selected, the Data Integration Service reads one or
Delimiters as One more consecutive column delimiters as one. Otherwise,
the Data Integration Service reads two consecutive
delimiters as a null value.
Retain Escape Includes the escape character in the output string.
Character in Data
For a fixed-width flat file, configure the following properties:
Property Description
Import Column If selected, the Developer tool uses data in the first row
Names From for column names. Select this option if column names
First Line appear in the first row.
Start Import at Line Row number at which the Data Integration Service starts
reading when it imports the file. For example, if you
specify to start at the second row, the Developer tool
skips the first row before reading.
Column breaks Configures the column breaks in the fixed-width file.
Click Edit Breaks to edit column breaks. Or, follow the
directions in the wizard to manipulate the column breaks
in the file preview window. You can move column breaks
by dragging them. Or, double-click a column break to
delete it.
220
DATA MANIPULATION
12.a.3 – Datatypes
When you create a new database you will set a data type for each field. The
data type tells Access how to store and manipulate die data for each field. You will
usually decide what data type should be used for each field. There are a number of
data types that you can use and different packages may have different names for
them. The list below shows the generic names tor these data types but,depending
on die package used, you may have different names. For example, in Access an
alphanumeric field is called a text field. The three main types of field are
alphanumeric, numeric and Boolean.
221
Information and Computer Technology
The rows don’t typically have a header cell as such, but often the first column
will contain a unique identifier – such as an ID. This field is often assigned as the
primary key, as a primary key requires a unique identifier (i.e. the value of this field
will be different for each record).
This means that we can identify each record by its ID (or other unique
identifier). Therefore, tables can reference records in other tables simply by
referring to the record’s primary key value. In this case, the tables have a
relationship. This is where the relational part comes from relational database
management systems.
Ÿ To set the Primary key for the database, click in the margin opposite the
CustomerID field to select it, right click and choose Primary Key from the menu. A
key will appear in the column to the left of the field indicating the key has been set.
223
Information and Computer Technology
· Click Create > Table and repeat these step to create a second table, called Visits.
It should have these fields and captions.
· Do not set a primary key for this table so, if prompted to do so, answer no. If the
Primary key is created for you automatically, as it is in this example, below, right
click the row and deselect the Primary key so it is removed. Close and save both
tables before continuing.
224
DATA MANIPULATION
225
Information and Computer Technology
226
DATA MANIPULATION
227
Information and Computer Technology
This is an effective choice for locating a specific record when the record that
you want to locate satisfies specific criteria, such as search terms, and comparison
operators, such as "equals" or "contains".
You can only use the Find and Replace dialog box if the
table or form currently displays data. This is true even if there are no
visible records because a filter has been applied.
6.In the Search list, select All, and then click Find Next.
7.When the item for which you are searching is highlighted, click Cancel in the Find
and Replace dialog box to close the dialog box. Records that match your conditions
are highlighted
FUNCTIONS
Functions return a value. There are many built-in functions, and you can also write
custom functions in Access. Many of the functions follow the same kind of syntax as
in Excel. In other words, the function name is followed by possible arguments or
parameters in parentheses. For example, the Format function needs arguments to
specify what to convert and the format code with instructions:
=Format([EOMSale],“yyyy”“Quarter”“q”). Yet not all functions in Access require
arguments. The Now function, for example, doesn’t need arguments to return the
current date and time. It simply reads the system clock.
230
DATA MANIPULATION
There are many different categories of built-in functions. Some of the basics
include conversion, date/time, financial, math, and text. Conversion functions are
used to change data type, which is important since Access is always concerned
about data type. Examples include Nz (null-to-zero), CCur (convert to currency),
and CDate (convert to date).
Date/time functions involve date and time. For example, DateAdd lets you
get a new date by adding or subtracting an interval of time to a specified date. The
Year, Month, and Day functions extract their respective parts from a date. Hour,
Minute, and Second do the same with time. And the Date function returns today’s
date. Financial functions involve currency: PV (present value), FV (future value),
IRR (internal rate of return), Pmt (payment for an annuity), and SLN (straight-line
depreciation of an asset for a single period).
Math functions include Abs (absolute value), Sin (sine of an angle), Round
(round a number to specified number of decimal places), Log (logarithm), and Int
(round down to nearest integer). Text functions include Left, Right, Mid, Len, and
Trim. Many of the text functions in Excel exist in some form in Access. They just don’t
always have the same name: TEXT in Excel is Format in Access, UPPER is
UCase, LOWER is LCase, and FIND is similar to InStr.
OPERATORS
Operators are used between different parts of a formula. Arithmetic
operators are addition (+), subtraction (-), multiplication (*), division (/), divide
and truncate to integer (), divide and return remainder (Mod), and raise to
power of an exponent (^).
Comparison operators are used between two expressions to create a
formula that returns True or False. The expressions can be compared using equal
(=), not equal (<>), less than (<), less than or equal to (<=), greater than (>),
greater than or equal to (>=), or where an expression is in a range (Between
value1 And value2), in a set (IN (list)), or matches a rule (Like “pattern”).
Logical operators: combine two expressions and evaluate to True or
False, such as AND (both expressions true), OR (either expression true), EQV
(both true or both false), and XOR (true if one is true but not both). NOT
reverses True to False and False to True. To produce a single piece of text from
more than one string (and/or values that can be converted to string), use the
ampersand (&) to concatenate. To conditionally combine strings only if all results
have a value, use the plus sign (+) to join. For instance, the last example in Figure
2 shows how a space after a middle name is added only if there also is a middle
name.
231
Information and Computer Technology
1.In Query Editor, select the primary column for the sort.
2.Click the down arrow ( ).
3.From the drop-down menu, click Sort Ascending or Sort Descending.
4.Repeat steps 1-3 for each subsequent column you want to use for sorting.
For example, when you sort by State then Population, the final result is a table
ordered by state with the cities in each state ordered by population. Alphabetically
Arizona comes before California and within Arizona Phoenix has more people than
Tucson. The formula lists each sort column in sort priority and the type of sort to
apply to it.
232
DATA MANIPULATION
Report Design Opens a blank report in Design view, to which you can add
the required fields and controls.
Opens a blank report in Layout view, and displays the Field
Blank Report
List from where you can add fields to the report
Displays a multiple-step wizard that lets you specify fields,
Report Wizard grouping/sorting levels, and layout options.
Displays a wizard that lets you select standard or custom
Labels label sizes, as well as which fields you want to display, and
how you want them sorted.
233
Information and Computer Technology
234
DATA MANIPULATION
• Name your report 'Customer Visit Details', choose Preview the report and click
Finish.
• Wait while the report is compiled and the results displayed on the screen.
• If the text boxes containing the data on the report require adjustment to display the
data more clearly, click Home tab > View > Design View, make your changes and
return to the report preview to view the results.
• When you're satisfied, close and save the report so you have it available to use
again in the future.
12.d.2 – Use of formulae in reports
Step 1: Open Microsoft Access. Open the report in which you want to add the
calculating field. Since the question is about reports, the user should have already
created a table and a query for the report to read from.
Step 2: Go in to "Design View." Add a text box in the "Page Footer" section of the
report.
Step 3: Right-click the textbox (not the label associated with the textbox), and
choose the "Properties" option. The "Property Sheet" will open on the right side of
the window. Select the "Control Source" option located in the "All" section on the
"Property Sheet." Click the "..." button. This will cause the Expression Builder to
open.
Step 4: Double-click the "Functions" folder in the right-hand column. The
"Functions" tree will open. Select the "Built-In Functions" folder.
Step 5: Select the function you wish to perform from the list on the far right side. The
middle column breaks down the various functions into separate categories. Double-
click the "Sum" function. In the expression window you will see "Sum (<<expr>>)."
This is telling the report to add all values from a certain data source.
Step 6: Highlight “<<expr>>" and press the "Delete" key. Double-click the "Queries"
folder to open the Query tree, which will display all of your project queries. Single-
click the query folder and a list of available queries will appear in the center column.
Double-click the query you are using for your data source. The query will be called
"WeeklyCosts."
Step 7: The expression window now reads "Sum (WeeklyCosts)."
Step 8: Click the "OK" button on the "Expression Builder" to close the window. The
formula, Sum (WeeklyCosts), is displayed in the Control Source of the Property
Sheet.
Step 9: Run the report to see your results.
235
Information and Computer Technology
236
PRESENTATIONS
CHAPTER
13
P R E S E N TAT I O N S
LEARNING OUTCOME:
13.a - What is a presentation?
How to
Clipart Set up the How to save
open
images slide show a presentation?
a source
237
Information and Computer Technology
238
PRESENTATIONS
Once you have more than one slide, you can add a different design for just
one slide. To do this, select the slide you want to change the design on by clicking on
it. It will pop-up as the big slide in the screen. Then you can right-click the design you
want for this slide and select 'Apply to Selected Slide'. It will appear on that slide, but
will not change the design of the other slides.
242
PRESENTATIONS
243
Information and Computer Technology
244
PRESENTATIONS
After adding the image using the fig given above mages often need
cropping, resizing, and more tweaks to fit in a presentation. Apps like Photoshop
have image editing tools, but they're difficult to learn. The good news is that
PowerPoint has image editing essentials inside the app. You can add images to your
presentation and edit them without even opening a separate photo editor.
Here are the PowerPoint image tools you'll learn to use in this tutorial:
• Resizing. Scale an image in PowerPoint to the correct size for your slide.
• Rotating. Flip an image to face the correct direction, including mirroring it
horizontally or vertically.
• Cropping. Select a part of an image in PowerPoint to remove.
• Removing picture backgrounds. If your image has a white background and you
want to remove it, PowerPoint has a tool to remove backgrounds. This will create
transparent images in PowerPoint.
• Image effects. Add color tints and adjust image saturation (including black &
white) inside your PowerPoint presentation.
246
PRESENTATIONS
247
Information and Computer Technology
If your notes exceed the allotted length of the Notes pane, a vertical scroll
bar appears on the side of the pane. You can also enlarge the Notes pane by
pointing your mouse at the top line of the pane and then dragging upward after the
pointer turns into a double-headed arrow.
248
PRESENTATIONS
249
Information and Computer Technology
2.In the Selection Pane, double-click the default object name to open the box, and
type a new name for the object.
· To present your slide show in a window, where control over advancing the slides
is not available to the people watching, select Browsed by an individual (window).
· To loop your slide show until the people watching press Esc, select Browsed at a
kiosk (full screen).
Slides: From the drop-down, choose to print all slides, selected slides, or the
current slide. Or, in the Slides box, type which slide numbers to print, separated by a
comma.
Print Layout: Choose to print just the slides, just the speaker notes, an outline, or
handouts.
The Outline prints only the text in the slides, without images. The Notes of a
presentation show the slide and the related speaker notes below it. If you choose to
print Handouts, you can print several slides on one page using a variety of layouts,
some with space for note-taking.
Collated: Choose whether you want the sheets collated or uncollated.
Color: Choose whether you want color, grayscale, or pure black and white.
Edit Header & Footer: Select to edit the header and footer before printing.
4.For Copies, select how many copies you want to print.
5.Select Print.