0% found this document useful (0 votes)
105 views

Database Notes

Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
105 views

Database Notes

Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 23
Unit 3. Databases Introduction, Definition of terms and functions of Database Management system [Management of data is important in all organisations. Data in organisations forms part of tne stratage, tactical, ‘operational management and dacision making process. Electronic databases have changed the way datas created, managed and stored using computerised information systems. Definition of terms Database - t's a collection intarrelated data files stored in an organised manner to permit easy retrieval Database management system - Software that manages storage, processing and retrievsl of data in 8 computer. Examples of database management system software include: Fox?ro, Dbase ill, Dase IV, MYSQL, Lotus Approach, Microsoft Access Microsoft SOL server and Oracle. Fling management systems - Computerised filing method that uses nor-integrated files calle fat files. Functions of a database management sofeware ‘interfaces 2 datanase to other application programs 1 Safeguards database against unauthorized access. up Allows staustcal analysis of data 1w Permits tne adition of new records. i Allows modification of existing records. vi Organises dats for easy access, retrieval and manipulation of records. Types of database models 2) Flat Fle Holds only one set of data and it snot any different from manual files. Do not allow relationships to be created amongst fle. Nama Tompson Lucas Patent ID RBr545/2018 Date of admission zamena Block admixed c Bed number HOSPIBLOCK C1004 ) Hierarchical Model Records are arranged in a form that resembles family tr¢e with lower level records subordinating to the upper level records as shown in Figure below, The top mast record is called Roct cirectory To access lower level records, parent records are frst opened, Allows one to mary relationships eet arom —= ene eos Let ene €) Network model Recembles hierarchical but has baen modified to allow flexible access co racords. A child racors can belang to several parant records. Allows many to many relationships. [Root directory I I I Parent records |—hild records Network database model d) Relational database model Data Is organised in tables also called relations. Records are uniquely identified using a key field (primary kay) Permits several types of relationships including oneo-one, one-to-many and many-to-many relationships. Relationsnips are created amongst tables by linking a primary key to a foreign kay. Rows nold records (also called tuples) wile columns hold fields (sso called attributes} ‘Admission table + | Patient 1D NRBI3452018 J Primary key Patient name ‘Thompson Lucas Date of admission (22/7/2014 Block admitted c Bed number “HOSP/BLOCK C/004 Payment table Patient 1D_ NRBI3452018 reciente + [Amount of bill 220772014 Date paid a Balance HOSP/BLOCK C7004 Object oriented models Designed as a collection of objects An object cons'ss of both data (state) and the Instructions (oehaviour! to process the data. The process of combining state and behaviour in one object is called encapsulation, Allows databases to hold multimedia data Difference between Filing Management and Database Management Systems Fling Management Systems Database Management Systems (08M5) Use files that are not integrated. Use integrated les Low data incegrany Use nnagrated les ‘lows sower cata modtfcaton ‘lows faster oata modification Not compatible with other applications Compatible with other applications Features of a database management software DBMS nave the following features: Table - A data structure tnat's used to accept and organise records. Form — A graphical interface used to enter data onto an underlying table. Query Asool used to extract and analyse data, Report generator - Used o create and present both soft and hardcopy summaries of a database Macro - Used to automate frequently executed commands so snat they can be executed togarner Programming module - Used to add new instructions in a database Data organisation in a database Data is organised from me smallest unit called a field to the largest unit called a database as explained below: Fields Ieconsists of 2 character or sat of cnaractars mat ge some place of information about an enciy. Records It is 2 set of related fields tnat give sensible information about an entity, for examole, a patients row in a table showing patient's name, patients number, admission date, diagnosis and prescrition. Tables lt isa set of related records, for instance. a file showing all the patients admitted in a snecitic ward. Databases [cis set of interrelated files. For example, al patients, doctors and stock inventory files in s hospital Field data types Tex {includes alphabetic letters, numbers and punctuations and can support up to 255 characters. Used when a field wil not b€ mathematically manipulated. Memo I consists of letters, numbers and special characters. It supports up to # maximum of 32,000 characters. Number I consists of numeric numbers 010 9. The field can be mathamacically manipulaces. Date or Time identifies afield as ether date or time, Ie can be mathematically manipulated. Currency I identifies numeric values that have decimals parts ike monetary values ‘Auto number Ik automatically sets the frst entry to one and subsequently automatically increments the values in the field by YES or NO Itallows logical values with two trutn values like rue or false to be entered. OLE Object OLE stands for Oajact Linking and Embedding. tis used wth graphical user interface applications to insert JIimages, pictures, drawing and charts among others Field properties, Define finer details of fields. They include + Fld sie I allows tne user to ser he number of characters a feld will consist of ether than the default 50. For ‘numeric fields, ce following ses are used: + Integer and long integer ‘Accept fields witn no decimais. + Byte Accept numbers berween 0 and 255. + Single and double Accept number with decimals, Single supports up to 38 decimal places while double up to 308 decimal places. Format Dictates now data appears on tne screen wnen typed. Decimal places It allows the user to specify tne number of decimal places. Input mask I automatically formats the field entry into a specified manner. Caption I gives a mare descriptive name for the field in a table or @ form Default value Ie s a value enat aucomacically appears in che table or form ifno otner encry is made. Validation rule Logical expression tnat controls the values entered in a table fel Validation text ‘A message that appears once the validation rule is not observed Required Ic ensures that an entry's made in a fia before proceeding to the next Feld or record. Allow zero length Iallows tne user to proceed witout making an entry In te fel. Indexes {is used to organise records for easy searching. Note: Primary key is a special index used to speed up searching and sorting records in ¢ table. ft uniquely identifies each record stored in @ table so that no record duplication is made Table Design Terms Entity -A person, thing or a place about wnicn dats can be stored. ‘tribute - Date that can be used to describe an entity Foreign key - A primary key transferred to another table to help create relationships Referential integrity - A festure thet ensures that all records entered in the related table existin the primary table Normalisation - Process of removing repeating fields among relating tables. A table is created by spectfying + Fisk names + Field daca types | Flald properves Primary key ‘Table name A table can be linked to other existing table(s) in one of the following ways: + One-to-one relationship - A field in a table matches only one record in tne relating table. + One-to-many relationship ~ A field ina table matches several records in another table. « Many-to-many relationship ~ Spectic records in stable match several records in encther table, Form design [Aform is a graphical interface that enables the user to easily view and make data entries into an underlying rable or query. Terms: + Controls - Are objects placed on a form te snow data or execute seme commands. Examples include: text Box, ‘check box and command buttons among ethers. “Bound control - Data is sourced from a table or query. + Unbound control - Data is typed cirectly. Does not source data from table or query. The following form layouts exis: *Columnar Tabular «Datasheet ‘Justified Query design ‘The term query refers to a question used to instruct a database to retvieve dats or perform operations such as Insertion, update and deletion cf data in a table. Used to analyse table(s) dats using ether of the following types of query: i) Select query It allows the user to speci the search criteria Ii) Action query They are used to makes changes to records such as delete, update and acid a group of records from one table to another or create 2 new table trom another table. Four types of action Query |) Make table query- Creates 8 new table from an existing table, ii Delete query: Erases specified records from a table(s), 1i) Update - Modifies date in stable 'w)Append query: Adds data in a table from a able(s) Calculations in a query (Calculations in 2 quary can be parfarmad by using tne Total functions (Zor by creating basic formulae. & faw formulae are deccrived eelowe + Min - Returns te lowest value from a field column. + Max - Returns the highest value from a feld column. + Count- Returns the number of items in field column. + Sum ~ Adds numerical data icems. “Avg - Computes the mean of numeric data items. Specifying the search criteria Conditional staternene(s] are used in the criteria row to extract specific records, Operators and wild cards are used in specifying ene criteria racords. 0) Relational operators which include: “less thant) + greater thant) + grester than or equaltol>=) + ess than or equal tof<=) ‘not equal co (<>) +s equal to¢ 1) Logical operators which include: “AND “OR + NOT “BETWEEN i) Wild cards - sre special caracters used to subsctute other characters at the'r position In searcn or querying process. They include: +7 = substitutes 2 single character atts position (Example: 2am can extract Tom, Yorn, Com) + * - substitutes group of characters atts position(Example: P* can extract Paul, Poem) + #- supstitutes any single number Example: 245 wil match 208, 215,225, 235) + []~ suostiutes any single cnaracter witnin the brackets (Example: PIAE]L matcnes PAL, PEL) substitutes any character not in brackets (Example: Gllaojt matches Gill Gut and not Good, cost) Enforcing database security Several data security tools are avalable in databases such as password protection, encryption scrambling up characters so that they cannot make sense to attacking programs unless they are decrypted), hiding database objects and user level security KCSE Revision Questions KCSE 2012 Paper | Qn.20. a) Win the aid of a dlagram, dascrine tne nierarcnical dataoace mooel. (4 marks) KCSE 2009 Pager 1 Qn.17. d) Name anc describe any two types of database models. (6 marks) KCSE 2007 Paper 1 Qn 13. Diferendiate between the following pairs of terms #5 used in database design b) Table and query (2 marks) KCSE 2012 Paper 1 (Qn.20. )1) Name three types of validation checks during dats encry. (3 marks) KCSE 2011 Paper 1 (Qn.13, State the purpose of each of the following in database design. a) Input masé (1 mark) p) Default value (1 mark) Papert Qn.18. a) Using two examples, explain the term field properties as used in database design. b) Below is an extract from 2 hospital database table. Patient Ne Name Date Registered | Amount Paid | Remarks LDK/O01 Mathew Olang | 04/05/08 250000 | TogoferxXray LDk/908 —JoyChelmo 67/06/08 1200.00 | Medicine robe ordered LDKI008 Joy Kamau 09/08/08 350000 | Te be admited for further check up LDKI002 Gerald Wasike 02/04/05 00.00 To come back for review vid State with reasons the most suitable data types forthe following fields (8 marks) Patient [No Date registered ‘Amaunt paid vi Which would be the most appropriate primary key feld for tne above table?(1 mark) Jn) What isthe purpose ofa primany key file in database design?(1 mark) KCSE 2008 Paper 1 Qn.18. The information below is maintainad by a gatron of 3 wildlife club in a school. Study and answer me ‘questions mnat follow. wave | Ges | Adwisiontember | Mententiptimber | Gow u ier on aa Serengeti Gime | aw | ate root be cay N08 rox is Gey W782 voor eee srry 3800 001 coo Maio | 26 | 3905 om Soe Jonhine | 2W | 3806 wor pet fe ans 001 oat coy E05 ron ead cern |W | 9 wea i Peul IN 4013 M002, oe 2) Describe the field values, records an file G marks) 1) State the most appropriate primary key for the list. (1 mark) Stace ine most appropriate data cype for tne fields: Admission number (1 mark) |) Membership number. (1 mark 0) fa database was to be created for thelist; Forms, Tables, Queries and Reports are likely to be used. 1) State tne purpose of each of these abjects. (4 marks) 1 Which objects cannot be Used to store the dats in the I'st? (3 marks) 211) Howy many field values are inthe fist?(1 mark) 1] Hew many records are in the list2(1 mark) KCSE 2007 Paper 1 Qn.20. 2) Anead teacner keeps tne following student detals in a database: Name, Address, Town, Date of birth, Marks scored, Fees paid 1) Neme the most appropriate primary key. Give a reason. (2 marks) i For each item in the student's details above, indicate its most appropriate dats type as used in the database (Bmarks| 11) Explain why input screens are better dats entry designs than entering data directly to 8 table (2 marks) 0 Distinguish between: D Atable In word-processing application and 2 table in a database application (2.marks) KCSE 2007 Paper 1 Qn.19. BDA students’ database comprises of students’ details table and fees received table as shown below Students’ details table Surname Midge Name Fiest Name. Admission Numeer Fees recelved table Date Amount Receipt Number Course 1) State the primary key field for each table 1 State tne field which should serve as the linking field for the wo tables. (2 marks) KCSE 2015 Paper 1 (Qh.3. The figure nelow snows ralazonsnip betwaen tables ina database, Table1 Performance ID Table 2 ‘TermCode TemID ‘StdID Year Mathemais ae English ja__ | Kiswahili na Science ‘danafy wo primary and wo foreign keys used in tne relationship. KCSE 2012 Paper 1 Qn.11. Describe the following types of relationsnins as used in Database design: 2)Oneto-one »)One-to-many KCSE 2009 Paper 1 Qn.17. Alecturer keeps tne following student details in a database: name, age, and course. a) Were an expression you would use to compute the year of birt ofa student using this year asthe current year. (2 marks) _) What query expressions would the lecturer use to ist tne students whose age is anove 15 years and below 25 years? (@ marks) ‘Which expression would tne lecturer use to generate: Tne numaer of students In :ne datsoase? 2 marks) \W Tne mean age of te students n tne database? (2 marks) Unit 4. Desktop Publishing (DTP) Introduction and Definition Publishing isthe act of producing publications like newspapers, cards, pamphlets, pictures and calendars of professicnal quality. In the madern eva, the pracess of publishing has changed because of the advent of personal computers and digital princers cnat are able to produce high quality publications. Definition Desktop Definition isthe act of creating visual communications such as brochures, business cards, greeting cards, web pages anc posters among others. Desktop publishing software is application safsware for graphics design. Examples of DTP software include Adobe Pagel/aker, Microsoft Publisher, Quick Xpress, Adobe in Design, Ventura, Serf page plus and Apole page 2 Purpose and Advantages of desktop publishing software Can create complex text anc graphics. |W Allows the user to create various page layouts. ii} Allows the user to print the publications. Advantages of using desktop publishing software + Gives the user power to maripulace tert and graphics and control ofthe page layout + The graphics and text manipulation capabilites of @ DTP sofware far ourweigh those of @ word processor + Items can be edited and formatted independently + Allows te user wien a wide range of templates + Allows 3 common sesting on master pages whicn can than be repeated on omer pages. + Allows production of commercial publications. *Teallows te user to come up wth a wide varery of publications +The Frames do not necessariy have to be arranged in 3 particular order. Designing a publication and Types of desktop publishing softwar Designing a publication Desktop publishing software allows the user to design a variety of publications for print such as business cards, calendars, banners, bilboards, certificates, books, newspapers, among cthers Graphical based: Manipulate graphic objects. Layout based: Assist the user to came up with a varity of layouts Microsoft Publisher window ee Ms publisher window has the following features 2) The pasteboard - Areas that hold text and graphies during page layout. ) Toolbox - Set of buttons znat contains various tools that you can use to create and manipulate publications. Rulers - Vertical and horizontal guides. They are used to guide placement of text and graghies to the required postions, <) The printable area - This is the area surrounded by margins. 2) Master pages - This is used to lay 2 comimon layout foundation for all pages. ‘9 Control palette - Toolbar wah formatting commands for text and graphics Tool Toolbox [Garsor [Use Pointer Tool DE IBS [irks tees oc heaton ences rom heen aces can be resized moved, copied or deleted. Tene Tool 7 ‘YW Enables ext entry and editing Roaniog Tool | By | Rovares rex, drawing oF graphics Coepine Tool | Allows custom eimming of graphics Tine Teo! 7 | Draws night lincs at any angle, See Element, Lines for options Eonsransd ine | +] Draws horizontal vertical and 4 degree lines. See ements, Line for Tool option. RecangeToot | QM [+ | Drvasrecangles. To daw squares hold che SHIFT ly before dicing and dragging Reciangleframe | a) [+ | Crewesrecangular placeholders for vex and graphics. To create square Tool placcholders, hold down the SHIFT key before clicking and dragging. Layout Guides 1. Margin guides - Show you where your page margins le 2. Column guides - Help you keep your page aligned 3. Row guides - Help you keea your page aligned 4. Baseline guides - Assist a user to align objects 5. Ruler guides — Assist in accurate positioning objects verteally or norizoncally Setting up a publication and Manipulating text and graphical objects Setting up a publication ‘This s the process of creaung 2 publication of one’s cnoice.Itinvolves tne following features: ‘+ Master pages Margin guides ‘This involves adjusting text and graphics in 2 publication using the available drawing tools | Manipulating text The Text Frame defines the space you want the text to occupy, 1) Manipulacing graphical abjects Graphical objects can be formatted using a drawing tool Drawing tool- This is 3 cool at allows the user to create an illustration or a publication. All tnese tools enable a person to apply stroke and fil patterns. | 2) il ) Stroke COtner manipulating tools include: + Rotating object. + Copying ang moving opjacts | Wrapping tex around a grapnical cbject + Cropping an object + Grouping and ungrousing objects. Editing a publication, Formatting a publication and Printing a publication in Ms Publisher Editing a publication A publication could undergo editing using tools such as Spelling and Grammar checker. Editing would include the process of find and replace, correcting spelling mistakes, replacing words es well as proofreading, Acplying various stylas to ennance the appearance of text and graphics a publication, i) Text and paragraph formatting Text and paragraahs can be formatted using tne following tools and features: = Changing text calor = Changing the case + Superscript and subscript *Drop cap + Setzing indents and tabs = Column guides + Page numbering + Headers and Footers + Page and columa breaks “Tracking and Kerning + Line spacing Printing @ publication in Ms Publisher Printing in desktop publishing is mare technical You may prefer to print # picture in composite grayscale for purpose of off-set printing. You can also show crap marks. KCSE Revision Questions KCSE 2017 Paper 1 (Qn.15. identify four tasks thet can be achieved using a deskzop publishing program for the following lst oF tasks, (2marks) ) Managing students records in school. 10 Creating a calendar. ii) Designing a budget structure. iv) Cresting a banner. Creating 2 book cover. vi) Processing of examination results vil Creating business cards. KCSE 2007 9 Paper 1 (0-12. List four types of publications tnat can ne designed by using desicop publisning software. (3 marks) KCSE 2013 Poper 1 (0-12. Explain wey a DIP application would be preferred to a ward processing application when designing 3 publication. (2 marks) KCSE 2012 Peper 1 Qn.13 The Figure below is toolbar for DTP package. Scate tne functions of the tools Isoeled A, B and C. AC mark) BO mare) camer KCSE 2015 Pager 1 Qn.19. i) Describe two layout guides in desktop publishing program (DTP) that assist a user to place an object in ‘a preferred position. (4 marks) Unit 5 Internet and Email Introduction, Brief history and development of the internet Inthe modern times, efficient modes of communication based on electronic tools such as laptops and mobile phones which are connected through the Internet have become the standard modes of communication. The internet [cts a global interconnection of computers and orner internet anabled devices for ene purpose of ‘communication and sharing of resources sucn as data, information, programs and princars among otners. Brief history and development of the Internet “The first nasworking protocol usad on tne ARPANET was the Network Control Program, + In 1983, k was replaced wien tne TCP or IP pratocel inventad by Rover: Kann, Vinton Cerf, and oxners, wnich ‘quickly became tne most widely used network protocol in re wor'd. + In 1990, the ARPANET was retired and transferred to the NSFNET. + By 1990s, the differences among tre networks in each of the countries had disappeared. and tre US name: Internet began to be used to mean the entire worldwide system of networks that used the Internet TCP or IP protocols. A Protocol is a set of rules and standerds that computers use to communicate with each other overs network Importance of the Internet and Advantages of the internet a) |cis 2 research tool in new developments of products, competitors, market news and customer opinions and fesdback ) enables advertisement and marketing of goods and services via web pages an a 24-nour basis. Ics a source of encartainmenc througn games, songs, movies, online TV channels ec 6) Supports communication especially by use of Electronic mall (e-maiD. In adsition, you can have live, interactive ‘conversations with people around the worl. elltstores data by use of cloud computing. Advantages of Intemet Internet is # Wide Area Network (WAN) and has the following advantages: 1) Enables snaring of expensive peripherals ke laser printers, madems and servers exc 1 Enables snaring of all Kinds of information on every topic, held on one computer across a number of users. lu) it enables applicavons/programs to be snared across a necwork by use of NetWare, 'u) Used to faciltate ‘group working” v Facilitates telecommuting. For example the office at home vinere users can conveniently work from any part cof the geographical stations and link o their offices remotely. vi Facilitates communication between users and terminals such as video conferencing and email vi Eliminates duplication of tasks (redundancy) vil) Reduces costs and delays in processing and transmitting data Some of the unique characteristics of Internet making it popular include: |The incemat technology makes ressonsesto be Instantaneous, | Geographical spread of internet enabled devices is currently very wide meaning a large population can use it 1} 1s easy creating a network with people or organisations with similar concerns. J can create confidentiality co some degree especially when ine user intend to be anonymous or shy. 1 Because of non-physical content during communication, Iisless vulnerable to stack during transmission of signals in comparison to manual ways of communicating. Disadvantages of Internet |The cost of hardware, sofware and cabling Is high. 1) The intermet is not owned by an individual or organisation nence cificut to contro. 1) Securay is a major concern over me Internet. For example, malware, predators and cyber bullying if adequate procedures are not adapted. |v) Notall information on the internets correct. Anyone can post anything, and much with itis garbage. Some people are acidicted to the internet and thus cause problems with their interactions of friends and loved vi Spread of pornography, tecrariam and other vices can get in the hands of young children too easily. vil) Alot of time is lost and wasted on the internet. ‘Telecommuting, advantages and disadvantages of home based work ‘The office at home where users can conveniently work from any partof the geographical stations and link their offices remotely. Ths is called telecommuting. Its also called teleworking. ‘Advantages of home based work Saves travel costs by the warkers. No need to physically converge ta an office, + No nacessity to live within traveling distance to te office as you can have access remocaly. + Flexible nours of work and nat necessarily oetween Bam to Som. + Saving for the institutions in terms of renting expensive city-centre offices and learning areas or premises. Disadvantages + Loss of social contact between the clients + Need for quiet workroom at home. This can be diffcut in a small lat or noisy estates |The sifculty of office accommodation fs compounded when two ar tree members of a family all work at home. + Loss of wsible status for senior staff in terms ofa ‘plush’ office and otnerstaffto command. +The cost of hardware, software and cabling is out of reacn to so many people. The network communication casts out of reach t00 (expensive bandwicths). +50 many homes are not supplied with electricity making it/mpossible to use battery backups. Advantages of home based work + Saves travel costs by the workers. Ne need to physically converge to an office. + No necessity to live within traveling distance tothe office as you can have access remotely. + Flexible nours of work and nat necessarily between Gam to 5pm. + Saving for the institutions in terms of renting expensive cty-centre offices and learning areas or premises. Disadvantages + Loss of social contact between the clients. “Need for quiet workroom at home. This can be difficult in @ small lat or noisy estates +The difficulty of office’ accommodation is compounded when two or three members ofa family ll work at home. + Loss of visible status for senior staffin terms of a‘plush’ office and other staff to command. ‘The cost of nardware, sofware and cabling s cut of reach 10 so many people. The nework communication ost is out of reach too (expensive bandwidins). + So many nomes are not supalied wen electricity making It Impossible to use battery oackups. Internet connectivity Requirements before you can connect to the Internet include 2) Data Terminal Equipment (DTE) such as a compurer or Internet enabled device such as smartphones, Personal Dighal Assistants (PDEs), Remember nor all DTEs can send or receive data signals viainternex ») Transmission mesium: tniss the physical or wireless path which acts as 3 channel or link tnrougn wnicn messages travel rom sender to receiver such as twisted pair, satelite ) MODEM - 2 Data Communication Equioment (DCE) which converts digital signal from a transmitting computer to analogue and from analogue to digital signals on the receiving computer. Amodem is used in case where a computer is used. 0) Incemec Software - often Installed with your operating system or can be downloaded from the Internet such, 12s Web browser, Internet protocols, and email sofware, Web browsers usually allow ihe user to navigate (surf) the web pages sucn as Netscape Naulgstor, Chrome, Microsofts Internet Explorer, Mosaic, Opera, and Mezila. @)An Internet Service Provider (ISP) is a company that connects your hame or office computer to the Internet at 2 fee Examples are Zuku, Safaricom, Airtel, Telkom, Faiba, Access Kenya, Internet services 2) Communication - One can excnange information through e-mails, video-conferencing, cnat rooms anc newsgroups. b) E-commerce - Buying and selling of goods and services over the internet. Currently, you can access cyber ‘shops for online purchasing and pay for the services through electronic funds transfer (EFT), cheque and credit cards among others. ©) Advertisement and marketing - Through creating a web site it enables « business to be visible worldwide a @ ‘cheaper cost. Tis can also boost sales internationally, Case whe create websites are known as web designers, webmaster, web programmers or web davelopers. dd) Research and browsing - Researchers anc scholars use internet to access digital (vrtual libraries for tne latest Information and arcnives. €) Entertainment - Users can watch online TYs, videos and play games. ‘) Education and E-learning - Academic materials for al lavels of education are readily avaiable on the Internet. 8) Discussion group - Is 2 collection of users who join together to discuss some topic such as cookery, coltes, education, recreational and scientific research. bn Telnet - Logging into 3 remore computer and work on it as your local computer. Remember telecommuting, ID File transfer -Data in che form of files can be transferred across the Internet from one site to anather using the File Transfer Prosocol (FTP) |) Software downloads -Users can download program from remote computers ta thelr computers such as ancvirus software update. 1k Search engines or search services - Software snat nelps in locating informacion n tne Web for any information ‘hat you want to find, especially wnen you do not know where to fing it Examples of searcn engines include Google, Bing, Yahoo, Ask.com, AOL.com, Baidu. Information on the Internet is made available through the following items a) Website: A collection of web pages stored as. fle in specaltype of 2 computer called web server very website is accessed using 3 unique address known as Uniforn Resource Locstor (URL) such as hezpevfurmnvknec ace b)Web portal -A wed sit tha provides an excellent stating point for exploring the net. They letusers to pea word or phrase to quickly search for information on the web. They also alow users to browse or search by caregories. Examples of web portals, excite com, ananzico.z0,netscape-com, msn.com, yahoo.com Blog. A regulerly updated website or web page. typically run by an individual orsmall group and is writen in aninformal or conversational style. 4) Multimedia ~A term used in computing concerned with controlled integration of tex. graphics, drawings, sill pictures videos, animation, audio, and any other media where every tne of information can berepresented, stored, transmitted and processed digitally ‘Common protocols used in Internetworking ‘Transmission Control Protocol (ICP) - Governs now data Is transferred from one DTE to anomer over ie lovernet, Internet Protocol (IP) Determines me unique adidressing of communication devices on the internet. «+ Hypertext Transfer Protocol (HTTP) - & language char web clients and servers use ro communicate with each other in order to send and receive date signals or messages Accessing Internet services We snail eiscuse wo services offerec nare maint browsing and emaling, 2) Web browsing “To navigate or move around the web pages you require a wee browser. Avieb Browser isa program tat lets the user surf through information onthe internet. Informabon on tne Web is structures inta pages Win €ac% having a spectic address thats usec to locate and access informavion on that page called URL. Users navigate the pages by use ofhyperinks. + Hypertinks are clickable texts or objects which connect users to diferent pages ofthe meb document. If they are made up of text only, they are referred to as hypertext. Others made up of non-texs are referred to as hyper objec. + During browsing a user can upload or download data and fies. 0 Uploac wnen you send data or Information from your computer terminal te anosner computer on me net 0 Download when you receive anc store information fom another computer on te Internet. iting information fom anther Interne: computer Home page iste fist page tat appears each time you start your web browser or open a web site Electronic mail (E-Mail) Defination of terms |} Postal mail: This is the conventional regular postal service delivery of letters and paper messages to the recipient's local post office whose implication means, tis very siow i. Snail Mall 1) Facsimile (Fax): Is 2 telephone transmission of scanned and printed material (text or image) usually to 8 telephone number associated with a printer. The receiving Fax machine reconverts the coded image and prints {2 pager copy of the document. iti reliable, secure, faster and easy to use Il Electronic mail (E-mail): Refers to the sending and receiving of electronic lattars and documents on the Internet as opposed to postal mall Advantages of emails over the traditional paper m or ‘snail mail” ‘itis very fast. + Itis low cost, almost free + [tis convenient to access from any internet enabled device anywhere anytime. + Easy 10 send one mail to many recipients by use of carbon copies. + Can be saved for Future retrieval + Easy t0 send and reply [toes not require lot of taining to browse + Can easily be forwarded to anther recipient + Document crasted using other application can easily be attached to the mail. + Reliable if al email exiquatce and neriquente is observed, Disadvantages of emails + Security of message may not be guaranteed ~ due to tapping while on transit + Leck of infrastructure + The cost of calling is stl very high + Requires some ICT literacy t9 use and enjoy. + Unsolicited emails (spams) clog the computer memory while others are malware Email requirements Any user accessing an emall must nave tne following rams: 2) computer or an internet enabled device to send or recee tne e-mail messages. )An e-mail program allows users to send, receive and manage e-mail messages. Popular email programs include, Gmal, Hotmail. com, Yahoo.com, Microsoft outicok express, quslcomm eduro pro. ] Aunique email address of the sender and the reciplent. An omall address directs a message to the recipient. 0) Aa Internet Service Provider (ISP) Company wne will deliver your message to tne recawver. Parts of an e-mail compose window The figure below illustrates a Gmail email software display window when the compose button is clicked, To: Tne email adoress of ne receiver. (Ce--Comtains tne e-mail addresses of each recipient, when you want to send copies of the message to multiple users atthe same time. Bec: Blind Carton Copy (Bcd) is used when sending the message to multiple recipients however their names are hidden from other recipients of the message Subject - An appropriate thle of the email message ‘Attachments: - One can add documents, pictures, sound, videos, programs among others to message Email body: The large rectangular box wnere tne sendar types in the message to be sens before clicking the send ‘command burton. Note: A massage tnst returns to the sender because it cannot reach ies destination Is revarred 10 a5 a bounced message. E-mail addresses I defines location of an individual mailoox on the internet. Parts of an email address consists of two parts separated by the @ (at) symbol The left part contains the user name. For example, the name of the person's account. This can be real or nickname. Te right part (second pert) is known as the domain name. itis the location of the person's account on the Incerner. Full stops () separates the various parts of the domain name such as [email protected]. Organisation or country domains ‘The last few characters in an email address usually incicate the comsin type or the region or bath. Top level Domain country Region code com commercial au australia eau ‘education a Canada ev government © Italy mil rmiicary P Japan net neswork ke Kenya org ‘organisation (Often non-profit) ue Uzenca ‘Examples of current damain levels include: ack ~academic insttution in Kenya coke commercial entity located In Kenya go.ke government entity locsted in Kenya Exomple http/iworm-knec.acke - Website for Kenya National Exam Council E-mail features + Inbox - Ir conteins received mails + Outbox -It contains sent mail or watting sending? delivery. + Attachments - You can attach decument/picture/ soundNiseo/oragrem to your message Wen atcaching a file keap the size of your attachment small. Artactment's an examole of uploading. + Downloading - Enables attached massages to be downloaded before they can be accessed, + Forwarding a message - After reading a message, you can add comments and than send the message to 3 friend or collesgue. This s called forwarding. + Printing a message - Enables printing = message to produce a nard/paper copy Use of Internet to access information on emerging issues ‘The early years of the 21st century have witnessed an explosion in the Internet usage snd the interconnected network keeps growing 2) Positive effects ofthe internet «Easy research: It's easier to do research and gazner information on materials relevant to their resaarch topics. + Enhanced communication: Communication with family, friends and relavives is faster. + Creation of Jobs: Tnere i 2 great possility to earn while working from nome + Easy for doing business: Fastar business transactions and cheaper products has been enhanced. + Savings on travel cost: Through the use ofthe internet, its possible for executives or business managers to do teleconferencing. b) Negative effects of Internet in recent times includ + Lack of face to face communication: Mary people Find it easier to communicate through the Internet instead) of the tractional direct way. This limits one on ane interactions, + Cyber bullying: People use internet to bully or harass others, for example, on social media sites + Disrupted privacy: Seceuse of free information people tend to exchange private data such as pictures, cell phone numbers, and [D numbers unknowingly. These data can easily land! in the wrong hands or hacked. Insecurity: has made it easier for criminal elements to access private deta belonging to organisations and Individuals in order to advance thelr malicious intents + Immoralty and cultural erosion: A lot of pornographic materials are easily accessible to teenagers leading to premarital sex, arly caen pregnancies, Sewually Transmitted Diseases (STD) and HIV and AIDS, drugs and substance abuse. + Viruses: Malicious programs spread vary fast trough the intarnar whieh could lead ro data lasas. KCSE Revision Questions KCSE 2016 Paper 1 Qn.4. Explain twa ways in which the use of Internet could make reporting of corruption easier. (4 marks) KCSE 2006 Paper 1 0.13, a) What is meant by the cerm e-learning? (1 mark) b) A school intends to set-up an eJearning system. List three prooiems mat are likely to be encountered. (3 marks) KCSE 2013 Paper 1 Qn.19. Aworker is unable to travel tothe office but may sil be able to do the office work througn telecommuting. © Explain two benefits that the employer wil get by allowing the worker to do the office work through telecommuting. (4 marks) KCSE 2010 Paper 4 Qo-10. Explain why telecommuting is NOT suitable for @ dector when carrying out an operation. (2 marks) KCSE 2004 Paper 1 0.20. a} Witn tne improvement in price and performance of computers and communication equipment Ir will ‘be possible for people in various business organisations to werk from nome. Sucn working using 3 Cas a remote terminal is often described as teleworking, Stare three acvantages and three disadvantages of working from noma. (12 marks) KCSE 2015 Paper + (Qn.5.) Write the acronym MODEM in full. (1 mark) b) Explain the purpose of a madem when connecting to te internet. (2 marks) KCSE 2008 Paper 1 Qa. 17, List sic activities performed on the web. (3 marks) An Instication nas ten stand-alone computers. State me necessary steps required to connect the computers to the internet. (4 marks) KCSE 2006 Peper 1 Qn.19. 61 Whar isa search engine? (1 mark) 1) The internet can be used to source information about emerging issues that may not be available in print form. Give ono advantages and two d'sadvantages of information obiained from che internet. (4 marks) KCSE 2012 Paper 1 (Qn.9. State two: 5) Protocols used In sending and receiving of emails. (1 mark) KCSE 2009 Peper 1 Qn-11. a} i] What isan internet protocol (IP) address? (1 mark) TD Wry isan IP address necessary? (1 mark) KCSE 2008 Paper 1 Qn Describe the term ‘home page’ as applied inthe internet. (2 marks) KCSE 2007 Paper 1 (Qn-16. | Define tne following wen related terms: )Weo browser (1 mark) i) Hyperlink (1 mark) Hypertext document. (1 mark) KCSE 2003 Peper 1 Qp 20. d Give two differences between post office mail and electronic mal (= mail (2 marks) KCSE 2012 Paper 1 Qn. a) Scate tw functions of e-mail sofeware. (1 mark) KCSE 2014 Paper 1 (Qn.3.a) Differentiate between Bec and ccin an email. (2 mark) 'b) Explain why 2 worker may use each of the following: email; (2 marks) fax, (2 marks! Paper t Qn.) Differentiate between Bee and cin an email (2 mark) Qn.3. a) Differentiate between Bcc and ccin an email (2.mark) KCSE 2008 Pager 1 Qn.11..5) Wmat isthe purpose of tne following internet domains? org met i) gov(t mark) KCSE 2011 Paper 1 (Qn.19. a) What is meant by each of the following terms as used in the interne? D Surf (t mark) Uploading (t mark) LONGHORN copyngnt © 2020 Longhorn Puolsners Lz. All RIgnts Reserved.

You might also like