0% found this document useful (0 votes)
46 views6 pages

Assignment01@Blessed 221334696

This document contains a student's assignment cover page for a CODeL computer literacy course. It includes the student's name, student number, email, cell phone number, and centre. The assignment is for course CLC3509 and covers sections on IT concepts, using computers/file management, MS Word, MS Excel, MS PowerPoint, and internet/email. The assignment number is 1.

Uploaded by

Thristi Thethird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views6 pages

Assignment01@Blessed 221334696

This document contains a student's assignment cover page for a CODeL computer literacy course. It includes the student's name, student number, email, cell phone number, and centre. The assignment is for course CLC3509 and covers sections on IT concepts, using computers/file management, MS Word, MS Excel, MS PowerPoint, and internet/email. The assignment number is 1.

Uploaded by

Thristi Thethird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CODeL ASSIGNMENT COVER

2022 ACADEMIC YEAR


Student Name Blessed Koromora
Student number 221334696
Email Address [email protected]
Cell/Tel no 0813812004
CODeL Centre Windhoek Centre

Course/Module Name Course/Module


Code
Computer Literacy CLC3509

Assignment no
(e.g. 1, 2 or 3, etc.).
1
SECTION A: Concept of IT

1. Random Access Memory (RAM)


2. - Data is Collection of unorganized facts. examples Each student's test score is
one piece of data
- Information are data processed to give a clear meaning for example The class'
average score or the school's average score is the information that can be
concluded from the given data.
3. In its most basic form, a computer consists of five functional units: an input unit, an
output unit, a memory unit, an arithmetic and logic unit, and a control unit. Where
by input unit include the input devices such as keyboard and mouse. And output
include are error message for examples. The memory unit include the main
memory and the secondary memory.
4.
Linux Window
Linux is a open source operating While windows are the not the
system. open source operating system.
It provide more security It provide less security

SECTION B: Using Computers and File Management

1.

i. Find and press the power button on the system unit.


ii. Turn on the monitor if it does not turn on automatically.

2. Press the window button and click on a start icon, the choose a shutdown option.

3. A font is a graphical representation of text that may include a different typeface, point
size, weight, color, or design.

4. KB, MB, GB, and TB


5. A warm boot

6. Decrease the size and have it sit on desktop bar.

7. Right click on the folder you want to rename, choose a rename option and type in the
new name. Press Enter key

SECTION C: MS WORD

1. Click or press the Start button. Hover your mouse to the search bar and type word
document, click on it.
2. Documentation
3. Headers and Footers of a document
4. Home tab
5. It indicates a words spelling error
6. Formatting text
7. Justification feature
8. A page break is a signal to the document translator that the content on the following
page is part of a following/new page.
9. To change the layout or formatting in one section of your document
10. To quickly jump to a specific location in the document
11. A header can be used to show a document name, and a footer can be used to
show the page number.
12. Right-click the heading and click expand/collapse .
13. Firstly, tap where you want to reference to the footnote or endnote.
Secondly, On the References tab, select Insert Footnote or Insert Endnote.
Thirdly, enter what you want in the footnote or endnote.
And Lastly Return to your place in the document by double-clicking the number or
symbol at the beginning of the note.
14. Open Microsoft Office 2013. Open the document you want to screenshot. Now
select the insert menu option. Now from it select the Screenshot option. Click on
the arrow, shown below, the Screenshot option and a window will be visible with
the thumbnails of every open window on our desktop.
15. Click the picture you want to add a caption to, tap on the references tab, then click
insert Caption.
16. Ctl + Home
17. Select the area where you want to add a hanging incident, Under home tab tap
paragraph dialog launcher and click incident and spacing. Under special select
hanging and adjust the depth of the indent using a By field and click ok.

18. On the Design tab, select Watermark and click Custom Watermark. And
choose picture/text Watermark and select a picture/a text of your choice, and then
Click OK.
19. Ctrl + Enter
20. Tap at the beginning of the document. On the Review tab, go to Changes, and
Accept or reject all changes.

Section D: MS Excel spreadsheet

1. A spreadsheet is a computer program that allows you to compute, organize, analyze,


and save data in a tabular format..

2. Cell address is a combination of a column letter and a row number that identifies a
cell on a worksheet.

3. Yes, Choose the cell(s) you want to change. Choosing a cell range to work with.
On the Home tab, click the drop-down arrow next to the Number Format command. A
drop-down selection for Number Formatting will display. Choose the formatting choice
you want. The new formatting style will be applied to the selected cells.
4. Must begin with an equals sign (=)
5. Formula names
6. Function
7. Formulas can be copied and pasted to different cells and even to different
worksheets.
8. The formula bar
9. Merge cells
10. Select the cells, choose Edit, and select Clear, then All
11. Numeric entries
12. Using cell references allows your formulas to update automatically if the value in a
particular cell changes and can also assist you in updating formulas as cells are copied
or moved.
13. Charts allow your audience to see the meaning behind the numbers, and they make
showing comparisons and trends much easier.
14. Right-click the cell and then click Insert Comment (or press Shift+F2)
15. Yes, Click Review > Protect Workbook. Note: The Windows option is available only
in Excel 2007, Excel 2010, Excel for Mac 2011, and Excel 2016 for Mac. Enter a
password in the Password box. Select OK, re-enter the password to confirm it, and then
select OK again.
16. The ribbon is a set of toolbars at the top of the window in Office programs designed
to help you quickly find the commands that you need to complete a task.
17. Select the column to the right of the column(s) you want to freeze. On the View tab,
select the Freeze Panes command, then choose Freeze Panes from the drop-down
menu. The column will be frozen in place, as indicated by the gray line.

Section E: MS PowerPoint
1. title, text, graphs, drawn objects, shapes, clipart, drawn art, visual.
2. Notes slides
3. In the Taskbar, click the PowerPoint icon. If you don't see the icon, right-click the
Start button and select Search. In the search field, type "PowerPoint," and when
it appears, double-click it to open it.
4. Would not include any full-motion videos.
5. Choose the slide for which you wish to change the arrangement.
Select Home > Layout from the drop-down menu.
Choose your preferred layout. Text, movies, photos, charts, shapes, clip art, a
background, and other elements can be placed in the layouts.

Section F: Internet and Email

1. When you use the reply all function, you email your response to both the
previous message's sender and everyone who received the original email.
2. It’s a domain name for google
3. A web browser
4. LAN
5. The modem
6. The Internet is a vast network that connects billions of computers and other
electronic devices all around the world. You can get nearly any information,
communicate with anyone in the globe, and do a lot more with the Internet.
7. An effort to exploit a computer system or a private network within a computer is
known as hacking. Simply described, it is unauthorized access to or control of
computer network security systems with the intention of committing a crime.

You might also like