Computer Packages
Computer Packages
computer packages
Notes
INTRODUCTION TO COMPUTER
COMPUTER: is an electronic device or set of device that works under control of installed
programs. It accepts raw data from outside; it processes the data so as to give out information.
DATA: is any raw fact or figures that may not make sense to the user
INFORMATION: is the processed or refined product that can be understood by the user
QUALITIES OF THE COMPUTER
Automatic: this means that after the computer has been commanded to perform its task it
requires minimal human intervention.
Data processor: computer has been designed to receive raw facts and figures that may not be
meaningful to the user and then analyses it into information which the user can understand
Electronic: computers can be equated to household appliances such as the TV, radio,
cameras, etc by the fact that they have capacitors, transistors, chips, circuit boards etc
Accuracy: since they are programmed devices, the writing of the instruction will repeatedly
recur.
Efficiency: compared to any other machine, computer will utilize time and effort to achieve
high results
Secrecy: with the use of password
Versatile: Computers are multipurpose, they are compatible to accommodate and operate
devices of different technologies e.g: watching T.V
Advantages of computer
Eases filing system in the office
Speed
Enhances communication
Enhances business
Enhances education through e learning and e teaching
Enhances industrial production through computer aided manufacturer(CAM)
Enhances entertainment
Create self-employment
Disadvantages of computers
Expensive
Cuts down on employment especially when computers are introduced where manual
work existed
Computers needs experts and skills to operate and maintain
Health hazard e. g back ache, eye sight etc
Volatile: they can lose huge and crucial information
Sensitivity to dust, humidity, heat, water
Page |0 Compiled by Mr. Davies Kiyaka
Addictive especially in games, chatting
Most computers need electrical power
Computer have encouraged laziness due to over reliance
HARDWARE
Physical or tangible components of the computer are referred to as hardware. When the
computer is shut off, the hardware would remain visible. Hardware are sub grouped into four
components namely;
CPU (processor)
Input devices
Output devices
Storage devices
SYSTEM UNIT
System unit is a metallic or plastic casing that houses or protects most of the major parts that
control and define the computer. All these smaller parts are attached to the main board called
mother board or system board. Even all the peripheral are attached to the mother wood at
the rare of the system unit. Mother board has multiple circuits that enhances transportation of
data and expansion slots that allow connection of additional parts. Some of parts found on
system unit are the CPU (processor), hard disk, drives, memory chip, cards, buses etc.
THE MOUSE
Mouse is an input device that enters instruction or retrieves commands out of the computer.
Mouse is an operating system that assist keyboard in operating computer. Mouse has two
buttons;
Left mouse button LMB
Right mouse button RMB
The LMB is the active button for it is after issue commands in to the computer. Is the inactive
button for it is not after use when the RMB is used, it is the retrieve commands out of the
computer.
5. Click away
3. FUNCTIONS KEYS
They include F1 through F12 and are positioned at the top most part of the keyboard. Their
purpose is to shortcut commands or they can be assigned some special duties. Sometimes
they are used together with keys to attain the duty e. g
F1 can retrieve help notes
F7 can be used to check spelling and grammar
F12 can be used to save
Alt +F4 can be used to close a program
4. ARROW KEYS
They are also referred to navigation keys. They are four of them; ARROW LEFT, ARROW
RIGHT, ARROW UP, ARROW DOWN.
Arrow keys facilitate horizontal and vertical movement to navigate through the cells; and can
be used with other keys to achieve the duty
5. SPECIAL KEYS
SOFTWARE
Software are the intangible component of the computer. They cannot be seen but only their
results. Software are programs. Program are sets if instruction in electronic language, written
to instruct the computer hardware on what to do and how to do it.
Types of software
System software
Application software
SYSTEM SOFTWARE
These are programs concerned with the effective performance of the computer hardware.
They aid org ware handle/ operate the computer. They act on the user’s requirement as he/
she commands them. Some control various programs in order to achieve a certain duty.
System software can be grouped into;
1. Operating system software
Operating system (OS) is a complex amalgamation of programs which controls the execution
of the user applications. It enables the user access hardware and software resources of the
computer. They control, and coordinate most of the computer operation. OS could be single
tasking or multi- tasking, single user or multi - user, and command base interface, menu
driven interface or graphical user interface.
Functions of OS
Job scheduling
Resource control and allocation
Input/ output handling
Memory management
Error handling
Job sequencing
Interrupt handling
Example of OS
Microsoft windows
Windows has version such as
Ms. Windows NT
Ms. Windows me
Ms. Windows 2000
Ms. Windows’s xp
Ms. Windows’s vista
Ms Windows 7
Ms Windows 8
Ms Windows 10 etc.
Microsoft dos (disk operating system)
Page |7 Compiled by Mr. Davies Kiyaka
UNIX
Linux
Macintosh (mac OS)
2. Language translators
This system software electronically translates one language to another through a machine.
Language is computerized
3. Utility/ service system software
These special system file that render services commonly applied tasks within the computer.
These task include copying, sorting, file handling, disk management etc.
4. Communication system software
Enhances communication or interaction between people through machines e. g phone dealers,
network connection, internet etc.
APPLICATION SOFTWARE
These are program that enable the user to perform and achieve results from any perturbing
problem I. e they are applied by user to achieve a certain duty/ task.
Classes of application software
User application
Application packages
User application
They program designed for the computer user according to his/her specifications; there for
referred to as tailor-made. They are written by ordinary programmers for their client.
Application packages
These are ready made programs. They are complex for the keenly manufactured to
accomplish several tasks. They are directly bought form the shop installed into the computer.
Sub-classes of application packages
Word processor
These are designed to edit textual data. There is a lot of typing and formatting in this sub
class. Example include MS word, word perfect, word star, word pro etc.
Spreadsheets
These are designed to create and manipulate numerical data. Here formulas and functions are
utilized to enable calculation. Example MS excel, lotus 1-2-3, VisiCalc, VP planner etc.
Database
These are used to create, organize, store and manage huge amount of data. Example include
MS access, dbase I-IV, paradox, fox pro etc.
Presentation
These help to prepare notes and graphic in an artistic manner by a presenter intended to a
certain audience. Example include MS power point freelance graphics etc.
Graphics and design
They also referred to as desktop publishing (DTP’s) because they were traditionally used for
publishing purposes. They highly employ both text and graphics. Example are Corel draw,
adobe page maker, Microsoft publisher, adobe photo shop, adobe illustrator etc.
Accounting packages
They are meant to tackle and simplify the accounting aspect such as the ledgers, balance
sheet, assets, stock, report, chart etc. example are quick books, quicken, sage line 50, pastel
etc.
MALWARE
Page |8 Compiled by Mr. Davies Kiyaka
Short for malicious software, is any software used to disrupt computer operation, gather
sensitive information, or gain access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer user, and does not include
software that causes unintentional harm due to some deficiency. The term badware is
sometimes used, and applied to both true (malicious) malware and unintentionally harmful
software
Viruses consist of harmful programs designed to infect legitimate software programs. Once
a person installs and runs the infected program, the virus activates and spreads itself to other
programs installed on the computer before taking further action such as deleting critical files
within the operating system. Similarly,
Computer viruses are small software programs that are designed to spread from one computer
to another and to interfere with computer operation. A virus might corrupt or delete data on
your computer, use your e-mail program to spread itself to other computers, or even erase
everything on your hard disk.
Computer viruses are often spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you know
who it's from and you are expecting it.
Worms are stand-alone programs that are able to transmit themselves across a network
directly. Unlike a computer virus, worms do not need to attach themselves to an existing
program. However both types of malware can cause severe damage by exploiting shared files
and databases.
Other malwares
Trojan Horse. Similar to Greek mythology, Trojans present themselves as harmless, useful
gifts, in order to persuade victims to install them on your computer. Thus, Trojans typically
appear as regular software. The catch is that the Trojan comes bundled with other software
that often includes a backdoor allowing unauthorized access to your computer. Trojans do not
attempt to inject themselves into other files or applications like computer viruses instead, they
use tactics such as drive-by downloads or installing via online games in order to reach their
targets.
Adware and spyware. Though not technically fitting into the virus category, at times these
programs may invade your privacy, contain malicious code and at the very least become a
nuisance. Adware is a form of financially supported malware that usually presents itself as
unwanted advertisements to the user. The Internet is filled with these types of programs that
can hijack your PC for profit, most are hidden inside so-called “free” downloads and pop-up
ads that forcibly install software on systems with active vulnerabilities.
A zombie works in a similar way to spyware. The difference is that a zombie does not
usually collect information from the computer. Instead, it just sits there waiting for
commands from a command-and-control server controlled by the attacker. Attackers infect
tens of thousands of computers, turning them into zombies and then issuing commands so
that all of them instantaneously send network requests to a target host, overwhelming it with
traffic also known as a DDoS attack or distributed denial of service.
MICROSOFT WINDOWS
Window is a multi-user and multi-tasking operating system characterized by the graphical
user interface (GUI). It is multi-user for more than one user can operate at a go; it is multi-
tasking one can open and run several tasks at one particular time.
GUI means between the user and the computer MS windows bears graphics or pictures that
represent items so as to guide the user. MS Windows is said to be user friendly especially
when compared to other operating system. MS window is designed to operate application
programs such as micro soft word, micro soft excel, micro soft access etc. it also supports a
number of operations and hardware. Version of MS windows have been seen earlier in
introduction.
Status bar
This displays the current activities of the running program; for instance if MS word is
running the status bar shall display the current page, section, line, column etc.
Scroll bar
These are two
Vertical scroll bar (VSB)
Facilitates up and down movement of the working area
Horizontal scroll bar (HSB)
Facilitates the left and right movement of the working area
Tool bars
Tool bar are strips that provide the user icons meant to shortcut often applied/ used
commands. There could be several toolbar placed on the screen depending on pro running or
the task being performed but are two universal toolbars which are found almost all the basic
application programs.
Task bar
It is the strip at the bottom of the desk top window. It bears the start button, all running
programs, system calendar, system clock etc.
DIALOG BOX
These are electronic form whereby the computer user is supposed to enter details in order the
computer to complete the duty assigned. This happens when the computer needs the user to
choose from the list of items or aspects.
WINDOWS EXPLORER
This is a program in windows operating system that enables the computer user to organize
and manage all the items within the computer. This program explores the entire items (drives,
folder, sub folder, files/ documents, shortcuts etc.) in hierarchical manner. Window explorer
is divided into 2 parts; folder’s list and contents’ list.
Open windows explorer
Method 1
Right click start button
Click explore
Method 2
Right click any folder or drive
Click explore
Method 3
Select a folder or drive
Press ctrl+ shift+ enter keys
Folder’s list
This is the left part of the windows explorer. It displays all the drives, folders and sub folders
either expanded or collapsed
Content’s list
This is the right part of the window explorer. It displays the contents (drives, folders, sub-
folders and files) inside a selected item on the folder list.
Expand a folder
Any folder with other folders inside is referred to main folder or parent folder. It will be
shown with positive sign (+) to the left of it icon in the folder list
Click the positive sign to expand the folder and sub folders displayed below it.
Collapse a folder
This is hiding the sub folders back to the main folder if they were expanded
Click the negative sign (-) to the left icon of the main folder to collapse the folder
Document
Document is the data within the random access memory before it has been saved
Creating file
Creating files from a source program
Click start button
Click a source program
Enter or type the data
Save the document by giving it an appropriate file name and choosing a known
location
Creating a file on desktop
Right click a blank space on the desk top
Point new
Click the folder
Click a source program
Type an appropriate file name
Click away
Open the file
Enter/ type data
Save the changes
Creating a file into specific file folder
P a g e | 18 Compiled by Mr. Davies Kiyaka
Open the file folder
Right click bank space
Point new
Click file to create
Type name of the file
Click away/press enter key
TO SELECT ITEMS
This is to particularize items from a list of others for a particular task such as opening,
copying, cutting, deleting etc.
Ways of selection
Single selection
Method 1
Point and click the item
Method 2
Press tab key and arrow keys
Selective selection
Press and hold down shift key
Point and click the needed item
Release the ctrl
Group/ list selection
Method 1
Select the 1st item
Press and hold down shift key
Click the last item
Method 2
Click and hold LMB on the 1st item
Drag over to the last item
Entire selection
Method 1
Select the 1st item
Press and hold down shift key
Press A key
Method 2
Click edit menu
Click select all
TO OPEN ITEM
Opening is identifying and accessing an item within the computer either for viewing or for
the purpose of working on it.
Steps to open items
Method 1
Right click the item
RENAME İTEMS
This is giving different name to an item in cases of correction or after changing contents
within the item.
Steps to rename item
Method 1
Right click the item to rename
Click rename
Type the new name in the blinking cursor
Click away
Method 2
Select the item to rename
Click its label
P a g e | 21 Compiled by Mr. Davies Kiyaka
Type the new name in the blinking cursor
Click away
Method 3
Select the item to rename
Click file menu
Click rename
Type the new name in the blinking cursor
Click away
DELETE ITEMS
Deleting is erasing or doing away with unwanted items from their original locations to the
recycle bin. Items that can be deleted include folders, files, shortcut etc.
Steps to delete items
Method 1
Select the item to delete
Press delete key
Click yes to confirm
Method 2
Right click the item to delete
Click delete
Click yes
Method 3
Select the item to delete
Click file menu
Click delete
Click yes
Method 4
Drag the item to delete
Drop it on the recycle bin icon
THE RECYCLE BIN
It is kind of memory location usually found on the desktop where all deleted items are stored
temporarily waiting for retrieval or permanent deletion.
Retrieving item from recycle bin if an item has accidentally been deleted. It can be retrieved
back to its original location.
Method 1
Open the recycle bin
Select the item to be retrieved
Click file menu
Click restore
Method 2
Open the recycle bin
Select item to retrieve
Right click on selected item
Click restore
Permanent deletion
P a g e | 22 Compiled by Mr. Davies Kiyaka
Permanent deletion completely does away with item out of the computer memory. This
deletion is important for it clears the computer of space for storage.
Method 1
Open the recycle bin
Select the item to permanently delete
Press delete key
Click yes
Method 2
Open the recycle bin
Click empty recycle bin
Method 3
Open the recycle bin
Select the item
Right click the selected item
Click delete
Click yes
Method 4
Right click the recycle bin icon
Click empty recycle bin
Click yes
2. Web site
This is collection of related webpages, well organized and maintained by an organization, an
academic institution or government agency. A individual can also create, organize and
maintain his/ her own web site.
3. Home page
It is usually the first welcoming page that appears when you open the internet browser or a
web site or even the first webpage of the email account. The home page is customized or set
to meet the user’s preferences.
4. History
This comprises tracks of all web pages that has been viewed previously on connected
computer, it enable the user go to specific information instead browsing afresh.
5. Hyper link
This is a special address that connects two or more related web pages in a website. It is
usually an underlined text, a button or a picture which when clicked opens the link page.
BROWSING/ SURFING
Browsing is accessing and collecting different information bit by bit from the internet.
Surfing is finding out what new or what is out there in the net. Look at it in this perspective
on one hand a student of ICT or IT may learn in class about the architecture of the CPU and
later goes to the internet for further notes.
Steps to browse/ surf the net
Turn on a connected computer
Open the web browser as any other program
Type a keyword in the search box
Press enter key
Use the link appropriate to relate information
Print the information if necessary
Logical operators
They are words attached to keywords in the search box to narrow a search. These are AND,
OR, NOT among others, let’s assume we are searching for political using logical operators it
would be as follows
POLITICS AND AFRICA
This will search for politics only in Africa
POLITICS OR AFRICA
This will search for anything politics and anything Africa
POLITICS NOT AFRICA
This will search for anything politics and nothing in Africa
Some common search engines
Google
Yahoo
EMAIL ACCOUNT
Email stands for electronic mail. It is an address given to a individual or an organization after
registering to be a member of the internet through some host. It facilitates communication
among members of the internet.
Email account breakdown
ID (identity)
This is the name that identifies individual to the internet
Set up (@)
Indicate where the ID or the browser is hosted
Host
The organization that maintains the server to act as link between the internet and the
members. It is ideal because it has a large storage capacity for electronic mails being
exchanges. Most of the hosts are search engines.
A search engine is an organization with powerful software that can delve into the internet and
retrieve the requested information. E.g. yahoo, Google, Hotmail etc.
Separator/ period
It puts distinctions between the host and the type of institution the host is.
Extension/ suffix
Indicates the nature of the host
OPENINNG AN EMAIL
Sign up
This is getting registered as a new member in the internet through some host. One can acquire
as many email accounts as possible, but remember each email accounts must be activated
often; otherwise it will be inactivated together with the mails.
Steps to sign up
Open the web browser on a connected computer
Identify and open host
Click sign up link button
Fill in the registration form and submit it
FILE ATTACHEMENT
These are details already created in their respective source programs or already existing
within the internet and should accompany the email.
Importance of attachment
Saves ordinary time for creating such document
Variety selection of items from the internet
Save air time and thus save money
Point to note before file attachment
The file to attach to the mail should be composed before hand
If the file to attach will come from the internet it should be browsed for before hand
Steps to attach file
Click attach file button
Click browse button to identify the file
Select the location with the file
Select the file to attach
Click open
Click attach file and wait for attachment
Click attach more file
Click back to message
Click send button
INTERNET ETIQUETTE
Internet is designed and improved every day to save time and energy to the user. Etiquette is
the manners by which the user will conduct himself when online, therefore it is important to
observe some conduct that may hinder the purpose of internet.
Brief and precise to deliver messages
Prepare or browse for attachments before hand
Use short forms if possible e.g. its, coz
Avoid retrogression or repetition
Stick to the point when browsing or surfing
Sign out
This is ending the browsing session within the internet. It closes ones email account. It is
important because it saves money and preserves secrecy.
Steps to sign out
Click sign out button wherever it may be or
close the web browser
BENEFITS OF INTERNET
Communication
Email enable people around the world send, receive and reply an electronic mails. This is
faster more convenient and even cheaper than the ordinary mails.
Information
P a g e | 28 Compiled by Mr. Davies Kiyaka
The internet provides information virtually on every topic; be it politics, science, religion etc.
at reduced cost.
Programs
Computer wizards can find and retrieve volumes and volumes of application programs
including anti-virus which are designed, dispatched and downloaded from the internet either
free or at cost.
Entertainment
People can watch, matches, play games, listen to radio stations etc.
Discussion/ chat group
This involves internet browsers with email accounts who might be strangers or even friends,
they pick on a topic and then privately or publicly discuss it. The discussion may be serious.
E-commerce
This is business over the internet or online. It enable ordering of goods and services over the
internet and delivery don without the customer leaving the office desk or the home
compound.
Advertisements
Because of millions of internet browsers are hooked on the net, companies find it ideal to
market their products to broader clientele.
E-teaching/ E-learning
On one hand academic institutions have moved at higher gear to deliver education to
student’s online thus reducing congestion in their scarce physical facilities.
While on the other hand the students have embraced the move by enrolling more for
travelling and accommodation costs have been slashed
E-banking
With EFI (electronic fund transfer) and other electronic facilities financial institutions have
made it easy for their customer to make transaction very conveniently
DISADVANTAGES OF INTERNET
1. Moral decay
The ever booming pornography material online especially to children live them hanging on
the verge of high cliff.
2. Fraud
Financial institutions lose millions daily to hackers who break into their system codes and
make away with huge sums of money.
3. Addiction
Game players, chatters, movie watchers etc. waste crucial hours on computer at the expense
of their daily chores.
4. Anti-social community
Man- made machines make people not to communicate face to face. This has in itself the
physical interaction among friends and family members, many being left loners.
Ctrl+D Uses the Fill Down command to copy the contents and format of the
topmost cell of a selected range into the cells below.
Ctrl+E Adds more values to the active column by using data surrounding that
column.
Ctrl+F Displays the Find and Replace dialog box, with the Find tab selected.
Shift+F5 also displays this tab, while Shift+F4 repeats the last Find
action.
Ctrl+Shift+F opens the Format Cells dialog box with the Font tab
selected.
Ctrl+G Displays the Go To dialog box.
F5 also displays this dialog box.
Ctrl+H Displays the Find and Replace dialog box, with the Replace tab
selected.
Ctrl+I Applies or removes italic formatting.
Ctrl+K Displays the Insert Hyperlink dialog box for new hyperlinks or the
Edit Hyperlink dialog box for selected existing hyperlinks.
Ctrl+L Displays the Create Table dialog box.
Function keys
Key Description
F1 Displays the Excel Help task pane.
Ctrl+F1 displays or hides the ribbon.
Alt+F1 creates an embedded chart of the data in the current range.
Alt+Shift+F1 inserts a new worksheet.
F2 Edits the active cell and positions the insertion point at the end of the cell contents. It
also moves the insertion point into the Formula Bar when editing in a cell is turned
off.
Shift+F2 adds or edits a cell comment.
Ctrl+F2 displays the print preview area on the Print tab in the Backstage view.
F3 Displays the Paste Name dialog box. Available only if names have been defined in
the workbook (Formulas tab, Defined Names group, Define Name).
Shift+F3 displays the Insert Function dialog box.
F4 Repeats the last command or action, if possible.
When a cell reference or range is selected in a formula, F4 cycles through all the
various combinations of absolute and relative references.
Ctrl+F4 closes the selected workbook window.
Alt+F4 closes Excel.
F5 Displays the Go To dialog box.
Ctrl+F5 restores the window size of the selected workbook window.