Digital Literacy Notes Level 6
Digital Literacy Notes Level 6
4.1 Introduction
Demonstrate digital literacy unit of competency is among the seven basic competencies
units offered in all the TVET level 6 qualification. This unit covers the knowledge, skills,
and behaviours required to effectively use computer and other PCs, digital devices such as
smartphones, tablets, laptops and desktop. It entails identifying and using digital devices
for purposes of communication, work performance and management at the work place.
Digital literacy is siginificant to TVET level 6 curriculum due to the critical role that
technology plays in societal and industrial growth. Digital literacy has also gained
recognition as a valuable tool for lifelong learning and collaboration in this global village.
127
4.3.2 Learning Outcome No 1: Identify appropriate computer software and hardware
4.3.2.1 Learning Activities
Learning Outcome No 1: Identify appropriate computer software and hardware
Learning Activities Special Instructions
Introduction
Digital literacy is an important topic in the modern world. Literacy is the urge to read and
learn. So digital literacy is the process of acquiring knowledge and skills to effectively use
computers and other technology devices. Some of the computer hardware are,
desktop/monitor, printers, scanners, mouse, Keyboard, and storage devices (hard disk). The
computer software includes Windows, Linux, UNIX. These are the operating system
software.
Under the computer software’s we also have application software’s which include: word
processors (e.g. Microsoft word), spreadsheets (e.g. Microsoft Excel), graphic
presentations (e.g. Microsoft PowerPoint), and the database management systems (e.g.
Microsoft access).
128
processing, output, storage and management of activities. Softwares which are used for
inputting data in the system include; word processors, spreadsheets, and presentation
software. Software used for storage include cloud storage where the output is stored or
hosted using resources in data centers and delivered to end users over the internet. Software
for management of activities include database management systems which allow users to
process data into useful information.
Computer hardware: This is any tangible device in the computer environment. Some of
the hardware that maybe encountered in this topic are:
Monitor: This is the main output device of a computer. It is commonly known as
Visual Display Unit (VDU).
Printer: is used to print information of paper.
Storage devices: these include flash disks, hard disks and optical disks (e.g. CDs).
Input devices: such as the mouse and keyboard.
Internet: This is a global system of interconnected computer networks that use internet
protocol suite (TCP/IP) to link devices worldwide. The internet carries a vast range of
information, resources and services. Picture information is shared via the internet.
Digital literacy: While literacy is defined as the ability to read and write, digital literacy is
the ability to access, process, understand and create information in the digital environment.
Content/Procedures/Methods/Illustrations
1.1 Concepts and Functions of ICT
Functions of ICT
Data capture: Process of compiling information e.g. Amazon uses internet cookies
to capture data about the customers’ purchases via the website. So, it use the data
to suggest items to a user related to the previous orders via the website.
Data processing: This involves converting, analyzing, computing and producing
all forms of data information. After capturing data, the system must reorganize that
data based on what the organization wants to use the information for.
Generation of information: Involves organizing information into a useful form.
Storage of information involves retaining information for future use e.g. Facebook
stores user registration details.
Retrieval of information: Process by which a computer device is used to find and
copy data for future distribution and processing. A good example is Google or
Yahoo who have data centers which store information which can be used at a later
stage by the end user to search for information online.
129
foundation of economy and a driving force of social change in the 21st century. Distance is
no longer an issue when it comes to accessing information, e.g. working from home,
distance learning, and e-banking are now possible from any place with an internet
connection and a computing device.
Hardware: The physical and tangible parts of a computer, that is, electrical, electronic and
mechanical parts e.g. monitor, keyboard, mouse, etc.
Software: These are the intangible parts of computer.
Software types
i. Operating system: This is the program which manages computer hardware e.g.
Linux, Windows, Mac OS X, etc.
ii. Application software (utility programs): These are all programs that users use to
perform different tasks or for problem solving. For example Microsoft word,
Microsoft excel and Microsoft PowerPoint.
iii. Computer networks: A computer network is comprised of at least two computers,
connected by wire or wirelessly that can exchange data.
Types of networks:
LAN (local Area Network): Covers a relatively small geographical area e.g. a
university campus or office building. Examples include Ethernet and Wi-Fi.
WLAN (Wireless Local Area Network): Links two or more devices using wireless
communication within a limited area such as a campus or office building. Some
WLANs exist to extend an existing wired network.
WAN (Wide Area Network): Covers a relatively large geographical area e.g. cities
or states. Connects a greater number of computers and local networks.
i. First generation (1937-1946): The first computer Atanasoh Berry computer (ABC)
was built by Dr. JOHN B. Atanasoh and Clifford Berry. In 1943 an electronic
computer named the colossus was built for the military. Other developments
continued until 1946 when Electronic Numerical Integration and Computer
(ENIAC) was built. There were no operating systems.
ii. Second generation (1947-1962): The computers in this generation used transistors
instead of vacuum tubes, which were more reliable. The Universal Automatic
Computer (UNIVAC1) was introduced for commercial use. In 1953, the
130
International Business Machine (IBM) 650 and 700 series computers made their
mark in the computer world. Over 100 programming languages were developed.
Computers had memory and operating systems.
Classification of computers
Computers can be classified in the following basis:
Basis of size
Basis of functionality
Basis of data handling
131
1.3 Components of a Computer System
Computer system
A computer software is simply a collection of data or computer instructions that tell the
computer how to work. They include computer programs, libraries and non-executable data
such as online documentation or digital media.
Types of software
Application software: Uses the computer system to perform special functions or
provide entertainment functions beyond the basic operation of the computer itself.
System software: Software for managing computer hardware behavior so as to
provide basic functionalities that are required by users or other software to run
properly. Examples are operating system, device drivers and utility software.
Malicious software: Software developed to harm and disrupt computer e.g.
malware, viruses.
132
Functions of an operating system
Security: It uses password protection to protect user data and similar techniques.
Job accounting: It keeps track of time and resources used by various tasks and users.
Memory management: It manages the primary and main memory.
Processor management: It decides which processes have access to the processor.
Device management: It manages device communication via their respective drivers
and keeps track to all devices connected to the system.
Conclusion
This unit covered determining concepts of computers, classification of computers,
identification of appropriate computer software and hardware as well as determining
functions and commands of operating systems, history of computers, functions and
concepts of ICT.
Further Reading
133
4.3.2.3 Self-Assessment questions
Written Assessment
1. WAN stands for?
a) Wide area network
b) Wide access network
c) Wide arithmetic network
2. Program used to control system performance is classified as.
a) Experimental program
b) System program
c) Specialized program
d) Organized program
3. Examples of system programs include
a) Operating system
b) Trace program
c) Compiler
d) All of the above
4. Which of the following is not a computer hardware?
a) Malware
b) Monitor
c) Compact disk
d) Hard disk
5. Which one of the following is an odd one out when looking at the functions of ICT?
a) Generation of information
b) Storage of information
c) Data capture
d) None of the above
6. Which one of the following is not a classification of computers on the basis of size?
a) Analogue computers
b) Minicomputers
c) Mainframe computers
d) Supercomputers
7. Types of computer software are
a) System software
b) Logic software
c) Both A and B
8. Which network covers a relatively small geographical area?
9. WLAN stands for.
10. What is a computer software?
11. What are embedded computers?
12. What is an operating system?
134
Oral assessment questions
1. What are some functions of an operating system that you understand?
2. Briefly explain the history of computers.
Practical Assessment
Which one of the following is used to store programs installed on a computer?
a) DVD drive
b) Video card
c) CD drive
d) Hard drive
Project
1. Type the following in a word document
Students
Peter
James
John
Teachers
Lewis
Caleb
Melisa
2. I want to create a second copy of an open document under a different name. What
should I do?
i. copy and paste the text in a new document
ii. use ‘save as’
iii. press ctrl s
iv. open the file again
v. Which of the following methods can you not use to zoom in?
vi. holding ctlr key and scrolling the mouse wheel
vii. using the zoom button
viii. ctrl+ shift +z
ix. Using the zoom slider at the bottom right corner.
135
Computer software
4.3.2.5 References
136
4.3.3 Learning Outcome No 2: Apply security measures to data, hardware, software
in automated environment
4.3.3.1 Learning Activities
Learning Outcome No 2: Apply security measures to data, hardware, software in
automated environment
2.1. Classify data security and privacy (confidentiality of data, cloud Computer software
computing) in accordance with the prevailing technology. and hardware to be
2.2. Apply security threats (cyber terrorism, hacking) and control provided.
measures (counter measures against cyber terrorism, risk
reduction, risk management, pass wording) in accordance with Activities may be
laws governing protection of ICT. carried out in groups
2.3. Detect computer threats and crimes. or individually.
2.4. Undertake protection against computer crimes in accordance
with laws governing protection of ICT.
Introduction
Data security is certainly a hot topic these days. Controlling access to data helps ensure
privacy and is required according to federal agency policies and regulations. Data security
is a process of making sure data are available only to those who need to use it for a
legitimate purpose. We have found that data security is not very different from other forms
of security. The same concepts used to design castles apply to the construction of servers
that offer access to a corporate database. The details are different, and the technical pieces
are quite different, but the same approaches, rules and lessons apply. Below are some
important maxims to keep in mind. Most of them have stood the test of time for thousands
of years:
i. There is no such thing as absolute security: We can raise the attacker’s cost of
breaching our data security to a very high level, but absolute guarantees are not
possible.
ii. Data security is always a question of economics: What is the value of what you are
protecting? How much time, effort, and money are your opponent’s willing to spend
to get through your defenses?
iii. An attacker doesn’t go through security, but around it: Their goal is to find and
exploit the weakest link.
iv. Don’t underestimate the value of your asset: Often common everyday data is
underestimated. Mundane data can be very important.
137
Definition of key terms
Data security: This is the process of making sure data is available only to those who need
it for legitimate purpose.
Data: This is the information that has been translated into a form that is efficient for
movement or processing.
Data privacy /Information privacy: It is the aspect of information technology that deals
with the ability of an organization or individual to determine what data in a computer
system can be shared with third parties.
Security threats: This is the process of an illegal entity gaining access to a company’s data
or information.
Control measures: This is any measure taken to eliminate or reduce the risk of security
threats.
Cyber criminals: These are illegal users who use many different methods to lure you into
parting with your confidential personal or business information.
Content/Procedures/Methods/Illustrations
2.1 Data Security and Privacy Are Classified in Accordance with the Prevailing
Technology
As discussed earlier, data security is the process of making sure data is available only to
those who need to use it for legitimate use. Data security privacy on the other hand is the
aspect of information technology that deals with the ability of an organization or individual
to determine what data in a computer system can be shared with third parties. As more of
our daily lives go online and the data we share is used in new and innovative ways, privacy
and security have become important trust and reputation issues. The growing volume and
sensitivity of information being shared, stored and used is driving demand for greater
transparency about how such information is being protected (security) and managed
(privacy). As a result, data security and privacy have moved from the backroom to the
boardroom. Data breaches and privacy missteps now regularly make headlines and are a
focal point for discussions and legislation worldwide. Failure to communicate on these
important issues can damage business by eroding trust, tarnishing brand and reputation as
well as undermining competitiveness.
Data security ensures that the data is accurate and reliable, and it is available when those
with authorized access need it. A data security plan includes facets such as collecting only
the required information, keeping it safe, and destroying any information that is no longer
needed.
These steps will help any business meet the legal obligations of possessing sensitive data.
Companies need to enact data security policy for the sole purpose of ensuring data privacy,
or the privacy of their customers’ information. More so, companies must ensure data
138
privacy because the information is an asset to the company. A data security policy is simply
the means to the desired end which is data privacy. However, no data security policy can
overcome the willing sale or soliciting of the consumer data that was entrusted to an
organization.
139
Affected users: How many users will be impacted?
Discoverability: How easy it is to discover the threat?
140
iv. Computer worm: This is a software program that can copy itself from one
computer to another without human interaction. A worm can send copies of itself
to every contact in your email address book and then send itself to all the contacts
in your contact address book.
v. Spam: In the security context, it is primarily used to describe unwanted messages
in your email box. Spam is a nuisance as it can clutter your mailbox as well as taking
up space on your mail server. However, spam messages can contain links that when
clicked could go to a website that installs malicious software on to your computer.
vi. Pursing: Pursing scams are fraudulent attempts by cybercriminals to obtain private
information. Pursing scams often appear in the guise of email messages designed to
appear as though they are from legitimate sources.
vii. Rootkit: This is a collection of tools that are used to obtain administrator-level
access to a computer or a network of computers. A rootkit could be installed on a
computer by a cyber-criminal exploiting a vulnerability or security hole in a
legitimate application on your PC and may contain spyware that monitors and
records keystrokes.
These are perhaps the most common computer threats and crimes you will encounter that
describe methods cyber-criminals use to access data, computer hardware and software.
Conclusion
This unit dealt with application of security measures to data, hardware, and understanding
and listing the computer threats and crimes, classifications of security threats and the
counter measures and methods of protecting data, software and hardware from security
threats.
141
Further Reading
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and
Internet security: repelling the wily hacker. Addison-Wesley Longman
Publishing Co., Inc.
4.3.3.3 Self-Assessment
Written Assessment
1. A computer network consists of two or more computing or other devices connected
by a?
a) Wireless signal
b) Cable
c) Communication media
d) Wire
2. Which is not a method of protecting data from computer threats?
a) Pursuing
b) Rootkit
c) Spam
d) All the above
3. The process of an illegal entity to gain access to a company’s data or information
is?
a) Security threat
b) Data privacy
c) Data security
d) Data integrity.
4. Which one of the following is not a computer threat or crime?
a) Computer virus
b) Malware
c) Rootkit
d) None of the above
5. Which one of the following are categories of the risk of security threats?
a) Damage
b) Negligence
c) Affected user
d) Both a and c
6. Security threats can be classified as.
a) Physical damage
b) Technical failures
c) Compromise of functions
d) All the above
7. What does download from the internet mean?
a) Retrieving files from the internet
142
b) Lowering your game level on the internet
c) Viewing web pages on the internet.
8. What is data?
9. What is a computer virus?
10. What is data privacy?
11. What is data security?
12. What is a security threat?
Oral Assessment
1. What is a security threat and what are the types of a computer threats you know?
2. Briefly explain the concept of data security and privacy?
4.3.3.5 References
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet security:
repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc.
Panko, R. R. (2010). Corporate computer and network security, 2/e. Pearson Education
India.
Pfleeger, C. P. (2003). Data security.
143
4.3.4 Learning Outcome No 3: Apply computer software in solving tasks
4.3.4.1 Learning Activities
Learning Outcome No 3: Apply computer software in solving tasks
Learning Activities Special Instructions
Introduction
The term software refers to the set of electronic program instructions or data that a computer
processor reads in order to perform a task or operation. Software can be categorized
according to what it is designed to accomplish. The main two types are: System software
and application software. Under this unit, we will talk about application software.
Application software (or simply applications) are often called productivity programs or end
users programs because they enable the users to complete tasks such as: Creating
documents, spreadsheets, databases, publications, doing online research, sending email,
designing graphics etc. Application software is specific to the task it is designed for and
can be simple as a calculator application or as complex as word processing application.
When you begin creating a document, the word processing software has already set the
margins, font and line spacing for you. Microsoft Word is a popular word processing
application that is included in the software suite of applications called Microsoft Office.
144
A software suite is a group of software applications with related functionality. For example
Office software suites might include word processing, spreadsheets, and database,
presentation and email applications.
Graphics suites such as Adobe Creative Suite might include applications for
creating and editing images.
Audio suits such as Sony Audio Master Suite is used for audio productions.
In designing databases, there are a few rules to stick to. It is important to know what these
rules are, but more importantly to know why these rules exist, otherwise you will tend to
make mistakes. On the other hand, worksheets help you with your financial calculations.
Content/Procedures/Methods/Illustrations
3.1 Word Processing Concepts Are Applied in Resolving Workplace Tasks, Report
Writing and Documentation
As we have seen, word processing is the production of typed documents (such as business
letters) with automated and usually computerized typing and text editing equipment. A
word processing program allows you to create, edit, format and print many types of
documents such as letters. Memos, CVs, etc. You can create World Wide Web pages with
some word processing programs.
145
Word Processing Concepts and Descriptions
a) Opening word processing package: Word processing package is mostly used in
offices on microcomputers. To open a new document, click on the “start” button
and go to “all programs” and click on “Microsoft word”
b) Opening and closing of documents: Word automatically starts with a blank page.
To open a new file, click on “new”.
c) Page set up: Page set up options are usually available on the “page layout menu”.
Parameters defined by the user help in determining how a printed page will appear.
d) Print preview: This option is used to view the page or adjust before any document
gets printed.
e) Cut, copy, paste.
f) Table manipulation: Manipulation of table includes drawing a table, changing cell
width and height, alignment of text in the cell, deletion/insertion of rows and
columns and boarders and shading.
In summary, this topic provides us with a clear idea about components of word processing
basics, opening and closing the documents, text creation and manipulation, formatting the
text, table manipulation.
3.2 Word Processing Utilities are applied in Accordance with Workplace Procedures
Under this topic, we look at some of the word processing utilities in Microsoft word. They
include:
a) Checking spelling. To check spelling in an entire document:
i. Under the review menu, choose spelling and grammar under the proofing
submenu.
ii. A popup box will appear where you will get to specify exactly what you want
to check. It will also give you suggestions to the current sentence.
iii. Then you will click change command and it will automatically save the changes
and take you to the next sentence. Once finished, you will close the spelling and
grammar popup box by clicking the close command.
c) Hyphenating words.
Hyphenation allows words to break between the syllables of words. Books and magazines
hyphenate their texts in order to have more uniform spacing between words.
Under the page layout menu, select hyphenation from the page set up submenu and the
word processor will automatically hyphenate the text.
146
d) Getting word count and other document statistics.
Word count is finding out the numbers of words, characters, paragraphs and lines in the
document.
Under the review menu, click the word ‘count’ from the porting submenu. A popup box
will appear showing the document’s statistics which includes pages, words, characters
(with and without spacing), paragraphs and lines.
147
Basic Terms in Excel
Formulas: It is an expression that operates on values in a range of cells or a cell. Example
=A1+A2+A3 which finds the sum of the range of value from cell A1 to cell A3.
Functions: These are predetermined formulas in excel. They eliminate laborious manual
entry of formulas while giving them human friendly names. For example, = SUM [A1:A3].
This function sums all the values from A1 to A3.
ii. AVERAGE
= AVERAGE {number 1, [number 2,}
iii. COUNT
This function counts all cells in a given range that contain only numeric values.
=COUNT {value 1, [value 2],}
iv. COUNTA
This function counts all cells in a given range regardless of the type i.e. it counts dates,
times, strings.
= COUNTA. {Value 1, [value2],}
v. IF
It is used when you want to sort your data accordingly to a given logic.
=IF {logical –test, [value –if-true], [value-if-false]}
148
vi. TRIM.
This function makes sure your functions do not return errors due to unruly spaces.
=TRIM [text]
i. Identifying Entities: Types of information that are stirred in a database are called
entities. These entities exist in four kinds: people, things, events and locations. If
the information you want to include doesn’t fit in these categories, then it is
probably not an entity but a property of an entity, an attribute.
ii. Identifying Relationships: Identify the relationship between entities and determine
the cardinality of each relationships. The relationship is the connection between
entities. Types of relationships include:
One to one
One to many
Many to one
Many too many
iii. Identifying attributes: The data elements that you want to save for each entity are
called attributes. For example, about the product that you sell, you may want to
know the price, name of the manufacturer, etc.
iv. Assigning keys
Primary keys: One or more data attributes that uniquely identify an entity. A key
that consists of two or more attributes is called a composite key. All attributes part
of a primary key must have a value in every record (which cannot be left empty)
and the combination of these attributes must be unique in the table.
Foreign keys: This is an entity in reference to the primary key of another entity. It
can also be part of a primary key, in that the attribute will be indicated primary key
behind its name.
149
Defining the attributes data type
The standard data types that every database knows and are most likely to be used are:
i. CHAR: Includes characters, numbers, and punctuations and has a characteristic that
is always saved as a fixed amount of positions e.g. CHAR 10.
ii. VARCHAR: same as CHAR but the difference is that VARCHAR only takes as
much space as necessary.
iii. TEXT: Contains large amounts of texts.
iv. INT: Contains a positive or negative whole number e.g. INT 10
v. FLOAT, DOUBLE: It can store floating point numbers.
3.7 Provides Data Sorting, Indexing, Storage, Retrieval and Security in Databases
Data storing in database is done by a process called Normalization.
Normalization
Normalization makes your data model flexible and reliable. It does generate some overhead
because you usually get more tables, but it enables you to do many things without having
to adjust it.
Normalization the first form: States that there may be no repeating groups of
columns in an entity.
Normalization the second form: States that all attributes of an entity should be fully
dependent overall primary key.
Normalization the third form: States that all attributes need to be directly dependent
on the primary key and not on other attributes.
Saving Databases
Access doesn’t require that you save your data. It automatically saves any edits you make
to the records in a table.
When you add or edit a database object, Access waits until you finish and close the object
at which it prompts you to save or discard your changes.
150
Conclusion
The unit covered the application of computer software in solving tasks in accordance with
workplace procedures. We looked at word processing using Microsoft word, preparing
worksheets using Microsoft excel and designing databases using Microsoft Access.
Further Reading
Schneider, G. M., & Gersting, J. (2018). Invitation to computer science. Cengage Learning.
4.3.4.3 Self-Assessment
Written Assessment
1. What stores information in databases?
a) Query
b) Report
c) Table
d) All the above
2. In a computer, a tool which is used to find a similar or alternative word in a
document is called?
a) Finder
b) Thesaurus
c) Dictionary
d) Style Cluster
3. Computer word processing includes process of?
a) Entering text
b) Editing text
c) Formatting document
d) All of the above
4. When starting word, default document window name is
a) Document 1
b) File 1
c) Word 1
d) Wpd 1
5. DBMS is a software
a) True
b) False
151
6. Database is generally
a) System centered
b) User centered
c) Company centered
d) Data centered
7. The restrictions placed on the data
a) Relation
b) Attribute
c) Parameter
d) Constant
8. What is a word processor?
9. What is a database?
10. What is a spreadsheet?
11. What is a function in MS Excel?
12. What do you understand by normalization?
Oral Assessment
1. What are some of the word processing concepts you understand?
2. What are some of the ways that one can insert data in Microsoft excel?
Practical Assessment
1. Type a word document using a word processing utility of your choice and explain
the importance of growing technology in the modern world.
2. Using Microsoft excel, come up with a spreadsheet that inputs all the marks in your
academic year and come up with the total marks. Generate a report.
3. Briefly explain the features of Microsoft word and excel.
Project
Using the knowledge on database design, come up with a database called class of year
2019.Create tables with your names, ID number, unit and date of admission as the fields.
Create another table called course, with course ID, course name and year as the fields. Use
the appropriate relationships to link these table then fill each with a maximum of 6 entries.
152
4.3.4.5 References
153
4.3.5 Learning Outcome No 4: Apply internet and email in communication at
workplace
4.3.5.1 Learning Activities
Learning Outcome No 4: Apply internet and email in communication at workplace
Learning Activities Special Instructions
4.1. Open and apply electronic mail addresses in workplace Computer software
communication in accordance with office policy. and hardware to be
4.2. Define and execute office internet functions in accordance with provided.
office procedures.
4.3. Determine Network configuration (organizing and maintaining Activities may be
information on the components of a computer network) in carried out in groups
accordance with office operations procedures. or as individual.
4.4. Install and manage official World Wide Web according to
workplace procedures.
Introduction
This unit covers applying internet and email in communication by opening email address,
executing office internet functions and determining network configuration. We will have
to understand what the internet and email is. The internet is many connected computers
(large set of computer networks) linked together they can communicate with each other,
over the telephone lines. Internet refers to a global interconnection of computer and
computer networks to facilitate global information transfer. It is an interconnection of
computers throughout the world, using ordinary communication lines and modems. The
internet uses (Very Small Aperture Telecommunication Systems) VSATS such as
telephone lines, satellites. The electronic mail (email) is one of the common services
provided by the internet. Email is a worldwide system for sending and receiving electronic
messages from one computer to another. Email refers to electronic messages sent over the
internet or a network. Email can contain both text and files.
In summary we will be looking at how we will apply the internet and email in
communication by opening electronic mail addresses, executing the internet functions and
determining network configuration.
154
Definition of key terms
Internet: Refers to the global interconnection of computers and computer networks to
facilitate global information transfer. It is an interconnection of computers throughout the
world.
Email: This is a worldwide system for sending and receiving electronic messages from one
computer to another.
HTTP (Hyper Text Transfer Protocol): This is a standard protocol for communications
between a web browser and a web server.
Web browser: This is a program that lets the user browse through information in the web.
Intranet - Is an internal corporate network used in an organization to enable the sharing of
documents among coworkers.
Extranet: It works in the same manners as intranet but provides information to selected
users outside the organization.
Web pages: Documents published by organizations and individuals who are interested in
putting themselves on the web.
Network configuration: This is the process of setting network controls, flow, and
operation to support the network communication of an organization and or network owner.
It is also known as network set up.
World Wide Web (WWW): This is a global (international) system of connected web
pages containing information such as text, pictures, sound and video.
Content/Procedures/Methods/Illustrations
1.1 Opening and Applying Email Addresses in Workplace Communication
Electronic mail (email)
Email is a worldwide system for sending and receiving electronic messages from one
computer to another. Email refers to electronic messages sent over the internet or a network.
Email can contain both text and files. With email, users can create send messages to one
user, several users or all the users on a distribution list. Most email software enables users
to send text messages. Users can also attach files from word processors, spreadsheets,
reports, production data etc. and then send them via email.
155
Components Required
For one to be able to communicate using email, the following components are required:
A computer: Where you will send and receive email.
An email program: Programs that let you send, receive and manage email messages.
They include Microsoft outlook, outlook express, lotus notes and Eudora.
Email addresses of the sender and the receiver.
An internet service provider (ISP): Company who will deliver your messages to the
receiver.
Email addresses
Each user has his/her own email address in form of computer storage space to receive
messages. The email address is accessed via a computer terminal within the system. In
addition, each user has a password to protect access.
156
Some activities done on the email
Reading email messages.
Reply email messages
Creating and sending email messages.
Advantages of email
It is cheap and economical.
It is secure i.e. access can be restricted by a password.
It is faster i.e. emails can be sent instantly.
It is efficient i.e. messages prepared only once can be sent to several users.
Disadvantages of email
Initial installation cost is high.
Messages may be lost before they are read due to virus infection.
High cost of storage.
Internet services
Electronic mail [email]
Online chatting
Downloading of programs
File transfer
Video conferencing
157
Uses of the internet
Buyers can do shopping online.
Salespeople can use the internet to keep in touch with their home offices.
Students can communicate and gather information.
Researchers can get information.
158
4.4 World Wide Web (WWW or WEB)
The web is an internet application [software] that uses the internet as its network. The web
is a collection of hyperlinked web pages published on the internet. The web is a global
(international) system of connected web pages containing information such as text,
pictures, sound, and video.
Web pages: Documents published by an organization and individuals who are interested
in putting themselves on the web.eg text, pictures, sound, video,
Website: Collection of web pages belonging to an organization or individual
Web browser: Program that lets the user surf on the web. Some of the common types of
web browsers are Internet Explorer, Firefox, Chrome, Microsoft Edge, Torch, etc.
Web hosting: A WWW server is a computer with programs that answers requests for
documents from clients [browsers] over the internet.
Web address: (Uniform Resource Locator URL) An address is a location of a file. Each
web page in the world has a unique internet address or location. The internet addresses are
called URLs. e.g. URL of Microsoft is http://www.microsoft.com
Conclusion
The unit dealt with applying internet and email in communication. We looked at how to
open emails and applying them in workplace communication. We also looked at the
components of the email, its advantages and disadvantages. We looked at the internet, its
features and functions and we also looked at some of the network configurations
Further Reading
159
4.3.5.3 Self-Assessment
Written Assessment
1. The program that lets the user browse through information on the web is called.
a) Intranet
b) Extranet
c) Web browser
d) Web pages
2. In internet technology IP means?
a) Internet provider
b) Internet protocol
c) Internet procedures
d) Internet processor.
3. A website’s front page/main page is called?
a) Browser page
b) Search page
c) Home page
d) Bookmark
4. Verification of a log in name and password is known as?
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
5. The process of transferring files from a computer on the internet to your computer
is called?
a) Uploading
b) Forwarding
c) FTP
d) Downloading.
6. Internet explorer falls under.
a) Operating system
b) Complier
c) Browser
d) IP address.
7. What is the full form of WWW in web address?
a) World Wide Web
b) Worldwide word
c) Worldwide wood
d) None of these.
8. What is an email?
9. What is an attachment?
10. What is Microsoft outlook?
160
11. What is the internet?
12. What is the World Wide Web?
Oral Assessment
1. What are some of the functions of the internet?
2. What are some of the advantages of the internet?
Practical Assessment
Open a web browsing application and go to address http://www.ecdl.org/mysampletestvs/
i. Name the second of the 2 logos displayed in the top of the screen that loads (not the
ECDL logo).
ii. Click on the social networking link. What is this person’s marital status?
iii. Copy and paste this person’s education information into the answer box.
4.3.5.5 References
LaMacchia, B. A., Lange, S., Lyons, M., Martin, R., & Price, K. T. (2002). NET framework
security. Reading: Addison-Wesley.
Northcutt, S., & Novak, J. (2002). Network intrusion detection. Sams Publishing.
Panko, R. R. (2010). Corporate computer and network security, 2/e. Pearson Education
India.
161
4.3.6 Learning Outcome No 5: Apply Desktop publishing in official assignments
4.3.6.1 Learning Activities
Learning Outcome No 5: Apply Desktop publishing in official assignments
Learning Activities Special Instructions
5.1. Identify desktop publishing functions and tools in accordance Computer software
with manufactures specifications. and hardware to be
5.2. Develop desktop publishing tools in accordance with work provided.
requirements.
5.3. Apply desktop publishing tools in accordance with workplace Activities may be
requirements. carried out in groups
5.4. Enhance typeset work in accordance with workplace standards. or as individual.
Introduction
In this unit we will cover the application of desktop publishing by identifying, developing
and applying functions and tools. We will look at the definitions of desktop publishing, the
desktop publishing software, designing a publication, using a DTP system and orienting
terminologies. We can describe publishing as the process of producing publications such
as newspapers, pictures, cards, pamphlets, books calendars, etc. that has a special text and
graphical designs and layouts. Desktop publishing refers to the process of producing
publications by designing their text and graphics layout using special desktop publishing
software installed on the personal computers. We shall later be discussing the DTP later on
this unit.
162
Content/Procedures/Methods/Illustrations
5.1 Desktop Publishing Functions and Tools
Publishing is the process of producing publications such as newspapers, cards, pamphlets,
books etc. that has special text layout and designs. Traditionally publishing involved
drawing and writing manually on wooden or metallic boards. The artwork would then be
painted with ink and pressed on papers to produce a printout. Today the art of publishing
makes use of personal computers and small printers that are able to print high-quality text
and graphics. All the publishing process can be done on a desk in the office or at home.
Desktop publishing refers to the process of producing publications by designing their text
and graphics layout using special desktop publishing software installed on personal
computers.
163
d) Business: Today desktop publishing is pretty much used to handle all the
“paperwork” of a business although it is possible to run a business without it the
help of DTP, it the smartest business decision. Examples of DTP use in business
are business cards, postcards and invitations.
e) Crafts and personal project: DTP is the crafters dream come true. Examples of
desktop publishing project for personal use are greeting cards, postcards and
invitations.
These five uses of desktop publishing software are only a few and after taking advantage
of desktop publishing you will soon realize there are many other uses of DTP software that
you didn’t realize before. Desktop publishing has proven beneficial to corporations, the
work at home and the starring artists. Some of the desktop publishing tools we will discuss
them below:
i. Adobe page maker
ii. Adobe Photoshop-mainly used for editing and formatting photographs
iii. Adobe illustrator-used for creating complex freehand artwork such as drawing and
logos
iv. Microsoft publisher
v. Harvard graphics
Graphic-based desktop publishers have superior capabilities for handling images such as
setting resolutions, brightness contrast, cropping and filling images with color.
b) Layout-based: They are specifically developed to create different page layout designs
and pictures. Examples:
Adobe page maker: This is a discontinued desktop publishing computer program
introduced in 1985 by Aldus. The combination of PageMaker using the Macs
graphical user interface for document creation and the apple laser writer for output
represented the starting point of what became the desktop publishing revolution in
the late 1980.
164
Microsoft publisher: This is a desktop publishing application from Microsoft word
in that emphasis is placed on page layout and design rather than text composition
proofing.
Other types of desktop publishing tools are:
Adobe framework
Microsoft power point
Microsoft word
Open office organization / Libre Office
Luks cape
165
Designing a publication
Different publication has different design layout and formatting.
Types of publication
There are several types of publication that can be produced using DTP software. They
include:
Cards: They may be for special occasions such as weddings graduations, etc.
Certificates: These are types of publications used to show completion of courses
and special events
Newspapers, magazines and newsletters: They contain news targeting a group of
people.
Books: Are bulky publications with many pages bound together.
5.4 Typesetting
Type setting is the composition of the text by means of arranging physical types or digital
equivalent. Stored letters and other symbols (called sorts in mechanical systems and
graphics in digital system) are retrieved and ordered according to a language orthography
for visual display. Typesetting is the process of arranging letters numbers and characters
on a printed or digital space. Typesetting is done to maximize print space, for graphic
design purposes and generally to facilitate a given result for the orientation of text on a
page. Typesetting began with the original printing presses, where this process was
profoundly a manual task. Workers had to struggle with bulky machines and manually
integrate letters and character, eventually sets of printed dies to set up typesetting for print
production. The typesetting processes of today are radically different. Early digital
typesetting information was stored on disk drives. Eventually tools like text markup
languages as well as solid taste media and modern networking, evolved typesetting to the
point where today processes rely on advanced algorithms that knows just to put and how to
position on each letter and character.
Conclusion
This unit covered applying desktop publishing functions, tools, application of desktop in
workplaces.
Further Reading
Toor, M. L. (1996). The Desktop Designer's Illustration Handbook. John Wiley & Sons.
166
4.3.6.3 Self-Assessment
Written Assessment
1. You have finished your travel brochures for social studies. How can you see what
your document will look like before printing?
a) View brochure
b) Print review
c) Open the brochure
d) You can’t you must print it first
2. Typing in ALL CAPS and small CAPS is the same thing?
a) True
b) False
3. Which photography file format is common printed documents?
a) TYEG
b) GIF
c) TIFF
d) AVL
4. All the following are design principles for desktop publishing EXCEPT
a) Alignment and write space
b) Random graphics and text
c) Proximity and unity
d) Consistency and contrast
5. Type of publication used to give out contract information usually printed on card
stock is.
a) Business card
b) Letter head
c) Brochure
d) Newsletter
6. Type of publication that includes the name and logo of the company or individual,
the address, phone number, email address and tax number is.
a) Business cards
b) Letter head
c) Brochure
d) None of these
7. What is using a computer and a software program to produce high quality, printed
documents that combine text and graphics?
a) Word processing software
b) Desktop publishing
c) Painting software
8. What is desktop pursing?
9. List two areas of DTP application
10. What is layering?
167
11. What is publishing?
12. List two examples of desktop publishing software.
Oral Assessment
1. Why is layering a very useful feature in a desktop publisher?
2. Why is a desktop publisher preferred in designing documents than a word
processor?
Practical Assessment
1. Contribute a desktop published article to a publication. The production will include
colour and graphics. It will be based on interview and other methods of research.
2. Produce a desktop published color advertisement for web or magazine publication.
This will be based on a creative brief negotiated with a client and two other methods
of research.
Project
Write and desktop published a formal report or discursive paper on an issue of concern.
This production will use color and include graphics it will be based on an interview and
two other methods of research.
4.3.6.5 References
.
Blakey, S. Logging on for Desktop Publishing.
Covington, M. M. (1995). Barron's Dictionary of Desktop Publishing. Barron's
Educational Series Inc.
Toor, M. L. (1996). The Desktop Designer's Illustration Handbook. John Wiley & Sons.
168
4.3.7 Learning Outcome No 6: Prepare presentation packages
4.3.7.1 Learning Activities
Learning Outcome No 6: Prepare presentation packages
Learning Activities Special Instructions
6.1 Identify types of presentation packages in accordance with office Computer software
requirements and hardware to be
6.2 Create and formulate slides in accordance with workplace provided.
procedures
6.3 Edited and run slides in accordance with work procedures. Activities may be
6.4 Print slides and handouts according to work requirements. carried out in groups
or as individual.
Introduction
This unit covers preparation of presentation packages through identification of types of
presentation, creation, editing and printing slides in accordance with office requirement and
workplace procedures. In this unit we will cover presentation of presentation packages
through identification of types of presentation, creation, editing and printing slides in
accordance with office requirements. A presentation package is a software package suite
that contains programs designed to accompany the speaker when he makes a presentation.
It is always in form of a slide show. We will also discuss presentation software like
PowerPoint and Impress. A presentation software is one of the application software that is
used to display information in the form of a slide show. They have three major functions:
an editor, a method and a slide show system to display content.
Presentation package: This is a software package suite that contains programs designed
to accompany the speaker when he makes a presentation. It is always in form of a slide.
169
Content/Procedures/Methods/Illustrations
6.1 Types of Presentation Packages are identified in Accordance with Office
Requirements
A presentation package is a software package that contains programs designed to
accompany the speaker when he/she makes a presentation. It is always in form of a slide.
Presentation soft wares have three major functions; an editor, a method and a slide show
system.
Editor: Allows text to be inserted
Method: Used to insert and manipulate graphic language
Slide show system: Displays content
The types of presentation packages (software) that we will discuss under the topic are:
Microsoft PowerPoint
Impress
Windows moviemaker
Slide shark
a) Microsoft PowerPoint
This is one of the popular presentation software developed by Microsoft. It is available in
Microsoft office packages. You can prepare a slide by using PowerPoint. PowerPoint is
available in different versions such as Microsoft office PowerPoint 2000, 2003 2004, 2007,
2010, etc. All PowerPoint files have.pptx extensions
Advantages of Microsoft PowerPoint
The program is very easy to use.
We can prepare presentation slides within a short period of time.
We can insert images, videos etc.
Various themes are available in this program.
Many viewings options.
Opportunity of animation.
Slides can be printed.
You can make fancy transitions between your slides.
b) Impress
Created by Sun Microsystems Inc. Impress is part of a suite of programs offered as a free
download. It contains a word processor, a spreadsheet program and a drawing program.
c) Windows Moviemaker
This desktop video program was created by Microsoft and is pre-installed on every
windows computer. Windows Moviemaker allows you to create and edit movies to use to
accompany your presentation, although you can also add graphics, create a slideshow just
as in PowerPoint and Impress.
NOTE: In the following sub-topics, we will discuss Microsoft PowerPoint
170
6.2 Slides Are Created and Formulated in Accordance with Workplace Procedures
When using PowerPoint, start by:
i. Clicking the start button located on the task bar
ii. Clicking all programs
iii. Clicking Microsoft office
iv. Then clicking Microsoft PowerPoint
You will be prompted to use options such as open an existing presentation or create a new
presentation.
PowerPoint screen
The PowerPoint screen consists of:
The title bar: Contains the current presentation, name and also minimize, restore
and close button.
Menu bar: Contains the menu used to design presentation.
Standard toolbar: Commands icons to open, save, print, and spell check.
Formulating toolbar: Contains fonts, font size, bold, italic, underline, alignment,
font color etc.
Task pane: Has all common functions that you might need when designing your
presentation such as creating new project, new side etc.
6.3 Slides Are Edited and Run in Accordance with Work Procedures
i. Use of themes
A PowerPoint template is a pattern or blueprint of a slide or a group of slides that you can
save as a .pptx file. Templates contain layouts, theme colors, theme fonts, theme effects,
background styles and even new contents. We follow the following steps:
Click on design tab
Choose available themes or click on more button to search for other different
themes.
If the color of theme needs to be changed, then click on the drop-down arrow.
171
If you like to choose or make different colors, then create new theme colors. Choose
the color and click on save button.
If the background needs to be changed, then click on background styles.
Choose available backgrounds or click on format background to change the style of
pictures and colors. Finally click on the close button.
v. Slide animation
Slide animation effects are predefined special effects that you can add to objects on a slide
to apply an animation effect.
Select the object.
Click the custom animations from the animation tab. animation pane will appear on
the right side of the screen.
Click the add effect and choose the appropriate effect from the pane.
172
vii. Adjusting slide transitions
Add sound by clicking the arrow next to the transition sound.
Modify the transition speed.
Conclusion
The unit covered preparation of presentation packages. This unit covered the presentation
of packages. Creating, editing and printing presentations. The types of presentation
packages especially Microsoft PowerPoint.
Further Reading
Lambert, J. (2016). MOS 2016 Study Guide for Microsoft PowerPoint: MOS Study Guide
Micro Power. Microsoft Press.
173
4.3.7.3 Self-Assessment
174
12. What is type setting?
Practical Assessments
1. How do you know if you followed best practices for creating effective PowerPoint
presentations?
2. How do you show your presentation online in PowerPoint?
3. How do you record a slide show in PowerPoint 2013?
Project
Create a video using PowerPoint 2013
4.3.7.5 References
175