0% found this document useful (0 votes)
52 views86 pages

CSC300 Lecture Notes

Lecture notes

Uploaded by

katherinejake688
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views86 pages

CSC300 Lecture Notes

Lecture notes

Uploaded by

katherinejake688
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

University of Abuja

Faculty of Science

Department of Computer Science

CSC 300: Microcomputers Applications

Lecture 1: Computers: An Overview

In this lecture, the following an overview of the following topics will be presented:

1. Data and information

2. Simple computer model

3. Hardware components of a computer

4. Software components of a computer

5. History of computers

6. Computer applications

7. Mobile devices and mobile applications

8. Computer security

9. Microsoft Word

10. ICT and Society

1. Data, Information and Knowledge

Data is an unprocessed facts and figures, which at a glance do not have any meaningful interpretation or
analysis. Information represent data that have been processed, interpreted in order that it has meaning
for the consumer. Knowledge combines information, experience and insight that may be beneficial to
the individual or organization. In practice, there is no clear distinction between data and information
and there are sometime used interchangeably. Common forms of data are numbers, texts, pictures,
audios and videos.

A data can either be discrete (countable finite representation) or continuous (non-finite representation,
typically in a number line).

Numbers are generally used to represents objects (numbers, texts, pictures, audios and videos) and can
either by an integer (whole) or floating-point (real with a radix point). Examples: 758 (integer), 9.56
(floating point), 89.0 (floating point), 2.3e-3 (floating point using scientific notation)
Depending on the allowable digits, numbers are commonly represented in decimal (base 10, using digits
0,1,…,9, only), binary (base 2, using digits 0 and 1 only), octal ( base 8, using digits 0,1,2,…,7) and
hexadecimal (base 16, using digits, 0,1,2,…, 9, A,B,C,D,E,F).

Examples: 819 (base 10), 1110011 (base 2), 634110 (base 8) and 0xEA0F (base 16). Note that the prefix 0x is
used to hexadecimal numbers.

Recognizing the relationship between binary and hexadecimal can facilitate easy conversion between
two bases. (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F) in base 16 equal to (0000, 0001,
0010,0011,0100,0101,0110,0111,1000,1001,1010,1011,1100,1101,1110,1111) in binary. Therefore 0xA1C in
hexadecimal is equivalent to 101000011100 in binary. 110001010 in binary is equivalent to 0x18A in
hexadecimal.

2. Simple Computer Model

A computer is a programmable electronic device that can store, retrieve, and process data.

An algorithm is a sequence of instructions needed to perform a task on a computer.


The computer accepts data and instructions, executes the instructions on the data to produce results or
perform actions as an output. Conceptually, a computer consists of input, output, processing and
storage memory units. The processing unit also called the computer processing unit (CPU) is made of
control unit (CU) and arithmetic/logic unit (ALU). The storage memory unit is either volatile (called
primary or main memory or RAM) or non-volatile (secondary storage memory).
Computers are known for their automation, accuracy, speed, storage capacity, versatility, diligence,
multitasking, and communications.
To actualize the simple computer model, a computer must need software (logical aspect) and hardware
(physical aspect). Software and hardware form the two components of a computer. It is possible
physically integrate software into the hardware to form what it is called firmware.
A computer can either be digital (accepts binary digits – 0s or 1s) or analog (works a continuous range
of values) or hybrid.
Types of digital computers are supercomputers (for high performance computing), mainframe
computers (for large organizations), minicomputer computers (less expensive than mainframe and for
medium-sized organizations) and microcomputers (general purpose personal computers).
Types of microcomputers are desktops, laptops and handheld computers (Personal Digital Assistants).

3. Hardware Components
Hardware if the tangible or physical parts of a computer: input devices, output devices, memory devices,
processing devices
Input devices: keyboard, mouse, are joysticks, touchscreens, pen devices, character recognition, voice
recognition, barcode readers, universal serial bus (USB) drives, hard disks (HDs) and compact disks
(CDs)
Output devices: monitor, speaker, printer, headphone. A printer can either be an impact or non-impact
printer.
Memory devices: volatile – Read Access Memory (RAM); non-volatile – Read-Only Memory (ROM),
secondary storage devices – hard drives, DVD/CDs, flash drives
The capacity of memory is measured in bytes. 1 byte is equivalent to 8 bits. 1 kilobyte (kb) = 1024 bytes, 1
megabyte (mb) = 1024 kbs, 1 gigabyte = 1024 mbs, etc.
Common manufacturers of processing devices (CPU) are Intel and AMD. Examples of CPUs are Intel
Pentium, Intel i5 Quadcore, etc.
The speed of the processor is measured in hertz (hz is equivalent to one clock cycle – i.e., time to
complete 1 machine instruction cycle). 1 kilohertz = 1000 hz, 1 megahertz = 1000khz, 1 gigahertz =
1000mghz

4. Software Components
Software is the logical, non-tangible or non-physical unit of a computer. Software are a collection of
programs that are used to run a computer. A software is either a system or application software. A
system software operates and controls computer hardware and it is either an operating system
software or a utility software.
Examples of operating system software are Windows OS, Mac OS, Unix/Linux OS, Windows Mobile, iPhone
OS (iOS), Windows NT, Android.
Examples are utility are BIOS, virus protection software

5. History of Computers

The history of computers spans the pre-mechanical era (ancient era), mechanical era, electro-
mechanical era and modern era.
Ancient era is marked by counting devices, Abacus and tally sticks
During the mechanical era, adding machine was discovered by Blaise Pascal (1642), Leibniz
(1690). Difference machine by Charles Babbage (1822), Analytic machine by Charles Babbage
and Augusta Ada Byron (1833). Babbage is regarded as the father of modern day computers.
In the electro-mechanical era, also called the vacuum tubes era, electrically-based computer devices
were developed: Herman Hollerith (1890), Howard Aiken (1936), John Atanasoff (1930), John
Mauchly and J. Presper Eckert (1946).

Modern era is characterized by vacuum tubes and digital computers. This era is classified into
generations: first-generation (1943-1958, vacuum tubes, Universal Automatic Computer
–UNIVAC, Electronic Numerical Integration Computer-ENIVAC); second-generation (1959-1964,
transistors-based computers); third-generation (1965-1970, integrated circuits), fourth-
generation (1971-1989, large-scale and very large scale integrated circuits); fifth-generation
(1990-present, high performance computing, smart devices,

6. Computer Applications
During the past few decades, computers and electronic technologies have been incorporated
into almost every aspect of society. Areas of applications include, but not limited to, business,
banking and finance, government, education, marketing, insurance, healthcare and medicine,
engineering design, military, home, manufacturing, agriculture, workplace, scientific research,
recreation and entertainment.
7. Mobile devices and applications
Mobile computing is the next evolution in the development of computing systems. Mobile
Computing is the use of portable computing devices (such as laptops, tablets, smartphones) in
conjunction communication technologies that allow transmission of data, voice and video
usually over a wireless network. The following wireless networks support mobile computing:
Wireless Personal Area Networks (Bluetooth, Sensors, etc.); Wireless LANs (802.11 family); Fixed
Wireless (e.g. CDMA); Cellular networks - 1G to 5G; and Satellite systems.

Mobile hardware: portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.

Mobile operating systems software: Android (from Google), iOS (from Apple Corp.), Blackberry
OS (from RIM), Windows Mobile (from Microsoft).

Mobile Communication Technologies: 1G-5G – first to fifth generation mobile


telecommunication; global positioning system (GPS); long-term evolution (LTE), Worldwide
Interoperability for Microwave Access (WiMAX); and Near Field Communication (NFC).

8. Computer Security

Computer security involves the process of protecting assets to ensure confidentiality, integrity
and availability. Confidentiality implies that only authorized users can view assets; integrity
implies only authorized users can modify assets; and availability implies authorized users are
able to use and have access to assets

Control measures for confidentiality include access control, authentication and identification.

Identification is the action or process of asserting one’s identity. Authentication is the act of
establishing or confirming that one actually is who he or she claims to be. A commonly used
authentication method is password. A password is an agreed-upon word, phrase, or set of
characters that is presumed to be known only by the user and the system.
Strong authentication utilizes:

Something the user knows, e.g., password, PIN, mother’s maiden name, etc.

Something the user has, e.g., physical key, ID badge, driver’s license, security token, etc.

Something the user is, e.g., voice recognition, biometrics

Combining two or more of these authentication mechanisms strengthens the authentication


process (multifactor authentication)

Best practices for securing assets:

Educate yourself. Organizations provide internal security training for all employees.

Be skeptical. You should treat anything you see online with a high degree of skepticism.

Check privacy policies & settings. Make sure you understand them, as they likely explain if
your information is shared with other parties.

Good passwords. Use good, strong passwords. If possible, the password should contain letters
and numbers, as well as special characters.

Protect the password. You should never share your password with others.

Stay updated. Always ensure that the software you use is up-to-date.

9. Microsoft Word (Brief)

Microsoft Word is an example of an Word Processor. Word Processors are used for word
processing, that is, used for creating and editing text based documents such as memo, letters,
newsletters, minutes, projects etc ).

Microsoft Word belongs to a group of Microsoft applications called Microsoft Office suite.
Others include Microsoft Excel, Microsoft Access, Microsoft PowerPoint, and Microsoft Outlook.
Microsoft Word has features for:

 Automatically pointing out misspelled English words by underlining them,


 Automatically pointing out grammatical English error by underlining them,

 Formatting Documents automatically as you type,

 Keep track of changes made to your document etc.

10. ICT and Society

Today, Information and Communications Technology (ICT) has become an integral part of the
human life. The Internet and the social media have come to completely revolutionize the human
life and activities.

The internet may be simply defined as a global communication network that allows almost all
computers worldwide to connect and exchange information. Internet services include:

 Internet Relay Chat (IRC)


 World Wide Web (WWW)  Telnet
 Electronic Mail (E-mail)  Voice over Internet Protocol (VoIP)
 News Groups  Gopher
 File Transfer Protocol (FTP)

Social media is comprised of online communications channels dedicated to community-based


input, interaction, content-sharing and collaboration. Websites and applications dedicated to
forums, microblogging, social networking , social bookmarking, social curation, and wikis are
among the different types of social media.

Presently, there are hundreds of social media platforms in existence and operation. Some of
them are: Facebook, Google+, Friendster, hi5, LinkedIn, Twitter, Tumblr, XING, Flickr, Howcast,
iTunes, MySpace, Picasa, Vimeo, YouTube, Blab, Delicious, Digg, Instagram, Pinterest, Quora,
Reddit, Scribd, SlideShare, Wikipedia, Yelp, WhatsApp, 2Go, Nairaland, LindaIkejiBlog, etc.
University of Abuja
Faculty of Science
Department of Computer Science
CSC 300: Microcomputer Applications

Lecture 2: Review data representation, characters, words, strings


In the lecture, the following topics will be covered:
1. Types of data and data Representation
2. Text representation
3. Image representation
4. Sound Representation
5. Data Compression: images, sounds and videos

1. Types of data and data representation


In Lecture 1, it was explained that data is an unprocessed facts and figures and that data is
represented in the computer using 0s and 1s (equivalent to electrical pulses) called bits (or
binary digits). The smallest “unit” of data on a binary computer is a single bit. A group of 4 bits is
called nibble, a group of 8 bits is called byte and a group of 16 bits is called word. Bytes are
typically used as a unit of measure of data in the storage unit. A 1 megabyte storage unit can
store 1048576 bytes of data (which is equal to 1024 kilobytes).

2. Text representation
As described in Lecture 1, data is used to represent texts, pictures, videos and audios. Texts are
usually in characters which are converted to numbers (by means of a code) for representation
in the computer. Each character symbol is assigned a unique bit pattern. The text is then
represented as a long string of bits in which the successive patterns represent the successive
symbols in the original text.
In the mid-1900s, the American National Standards Institute (ANSI) adopted the American
Standard Code for Information Interchange (ASCII) that uses bit patterns of length seven to
represent upper- and lowercase letters of the English alphabet, punctuation symbols, digits 0
through 9, and certain control information such as line feeds, carriage returns, and tabs. The
symbols are represented in the table below with the column bits representing the first 3 bits
and the row bits representing the last 4 bits of the bit pattern.

7
Column
0 1 2 3 4 5 6 7
000 001 010 011 100 101 110 111
Row
0(0000) NUL DLE SP 0 @ P ` p
1(0001) SOH DC1 ! 1 A Q a q
2(0010) STX DC2 " 2 B R b r
3(0011) ETX DC3 # 3 C S c s
4(0100) EOT DC4 $ 4 D T d t
5(0101) ENQ NAK % 5 E U e u
6(0110) ACK SYN & 6 F V f v
7(0111) BEL ETB ' 7 G W g w
8(1000) BS CAN ( 8 H X h x
9(1001) HT EM ) 9 I Y i y
10(1010) LF SUB * : J Z j z
11(1011) VT ESC + ; K [ k {
12(1100) FF FS , < L \ l |
13(1101) CR GS - = M ] m }
14(1110) SO RS . > N ^ n ~
15(1111) SI US / ? O _ o DEL
The binary code for any entry can be found by composing the bits of the column number with the
bits of the row number. For example, CR is in column 0, row 13, and thus has the binary code
0001101 = 13 decimal = 15 octal = 0D hexadecimal. The ASCII encoding scheme can only
accommodate 128 character symbols.

The International Organization for Standardization (ISO) developed a number of extensions of


ASCII, each of which was designed to accommodate a major language group.

In contrast to the 7-bit ASCII encoding scheme, IBM developed Extended Binary Coded Decimal
Interchange Code (EBCDIC) in 1963. This is an eight-bit character encoding used mainly on IBM
mainframe and IBM midrange computer operating systems. The EBCDIC can accommodate
character symbols.

ASCII and its extended versions, were not sufficient to accommodate alphabets of man Asian
and some Eastern European languages. For this and other reasons, the Unicode was developed
through the cooperation of several of the leading manufacturers of hardware and software. The
encoding scheme uses up to 21 bits to represent each symbol. The Unicode is usually combined
with Unicode Transformation Format 8-bit (UTF-8) encoding standard to accommodate ASCII 8-
bit pattern (note that 8-bit ASCII simply attached 0 as the most significant bit), and languages

8
such as Chinese, Japanese, and Hebrew. UTF-8 also uses 24-bit and 32-bit patterns to represent
more obscure Unicode symbols.

A file consisting of a long sequence of symbols encoded using ASCII or Unicode is often called a
text file. A text file contains only character-by-character encoding of the text. Note that text file
produced by a word processor contains numerous proprietary codes representing changes in
fonts, alignment information and other parameters.

3. Image Representation

Pictures and videos are represented in bits, octal or hexadecimal. Pixels (or picture elements)
are also used to represent pictures and video frames. A pixel is defined as the basic unit of
programmable color on a computer display or in a computer image. The physical size of a pixel
is based on the resolution for the display screen. The appearance of each pixel is then encoded
and the entire image is represented as a collection of these encoded pixels called bit map.

The method of encoding the pixels in a bit map varies among applications. In a simple black-
and-white image, each pixel is a single bit whose value depends on whether the pixel is black or
white. A more elaborate black-and-white photograph uses collection of bits (typically 8 bits) to
allow for a variety of shades of grayness to be represented. For color images, each pixel is
encoded using two approaches.

First approach: RGB encoding uses red, green and blue color components, corresponding to the
intensity of three primary colors of light to represent a pixel. Three bytes of storage are
required to represent a single pixel in the original image.

Second approach: uses brightness component and two color components. The brightness
component is called the pixel luminance and it is the sum of the red, green, and blue
components. The two color components are blue and red chrominance, obtained from the
difference between the pixel luminance and the amount of blue or red light in the pixel.

4. Sound representation

The most generic method of encoding audio information for computer storage and
manipulation is to sample the amplitude of the sound wave at regular intervals and record the
series of values obtained. A sample rate of 8000 samples per second has been used for years in
long-distance voice telephone communication.

To obtain better quality sound reproduction by today’s musical CDs, a sample rate of 44,100
samples per second is used. The sample data is represented in 16 bits (or 32 bits for stereo
recording).

Another encoding scheme for audio known as Musical Instrument Digital Interface (MIDI) is
widely used in the music synthesizers found in electronic keyboards, video game sound, sound

9
effects accompanying websites. MIDI encodes what instrument is to play which note and for
what duration of time.

5. Data compression

Data compression is the technique of reducing the size of the data while retaining the
underlying information. Data compression scheme is either lossless or lossy. Lossless
schemes do not lose information in the compression. Lossy schemes may lead to the loss of
information. Lossy techniques often provide more compression than lossless schemes and are
therefore popular in settings in which minor errors can be tolerated.

The bit maps produced using the encoding schemes described in the preceding sections are
often large. Numerous compression schemes have be devised for image, audio and sound
compression. Examples of such compression schemes are Graphic Interchange Format (GIF),
Joint Photographic Experts Group (JPEG), Tagged Image File Format (TIFF), and Motion Picture
Experts Group (MPEG).

GIF was developed by CompuServe and it uses dictionary encoding system to reduce the
number of colors of a pixel to 256. The 256 encodings are stored in a table (a dictionary) called
palette. Each pixel in an image is represented by a single byte whose value indicates which of
the 256 palette entries represents the pixel’s color.

JPEG is has proved to be an effective standard for compressing color photographs. The JPEG
standard encompasses several methods, each with its own goals. When precision is utmost,
JPEG’s lossless is used, this usually entails high level compression The JPEG’s lossy sequential
mode has become the standard of choice in many applications.

TIFF as a compression technique allows for the storing of photographs along with their related
information, such as date, time, and camera settings.

MPEG is a compression scheme for audios and videos and it encompasses a variety of
standards.

References

 Brookshear and Brylow, 2015, Computer Science, An Overview, 12th edition, Pearson
Publishers.
 http://www.bernstein-plus-sons.com/.dowling/Characters.html
 https://en.wikipedia.org/wiki/EBCDIC

10
LECTURE 3: Internet, E- mail, IM & E-commerce
Communication is an important component of life. It is also a known fact that Information or knowledge
is power. Nowadays, there are various forms of communication. This ranges from one way
communication devices such as TV and radio, to two way communication devices such Laptops, Tablets
and Mobile Phones. This trend enhances voice calls, text messaging, email and instant messaging.
Teenagers’ and young adults’ use of Instant Messaging (IM) is on rapid rise, and this has been a recent
object of media attention. Indeed, the popularity of IM indicates that synchronous (or near-
synchronous) text messaging and presence awareness has a place in teenage communications,
despite an array of competing media available to them. This lecture discusses various email
communication types, instant messaging, Social Media and its security considerations as well as e-
commerce applications. All these are achievable with internet connectivity.

TYPES OF EMAIL
Generally speaking, HTML email can be broken down into two categories:

 One-to-many, where a large list of people are sent the same or very similar emails from a source to
which they’ve intentionally subscribed (like a newsletter, or an event invitation).
 Transactional, where an email is sent to a person on an individual basis, usually as a result of an action
they’ve taken (like making a purchase, or receiving a shipping update).

ONE-TO-MANY EMAIL

One-to-Many emails have been a staple of electronic marketing since the early days of the web. They’ve
been an optimal way to market to millions of people at a lower cost than print or other types of media
like television and radio. Since HTML email marketing is generally interest driven, the audience to which
you’re sending is already receptive.

Email evolved with the explosion of social media to include more focused subjects and audiences,
allowing “one-to-many” to actually be personal, despite large audiences.

One-to-Many emails include:

 General interest newsletters from organizations, businesses, and communities


 Product marketing, coupons
 Event announcements, invitations, and details
An example is shown on Fig.1.

11
Figure 1

Transactional Email
Transactional emails are becoming essential to the way we interact with applications and services on
the web. You know those emails from Facebook letting you know someone’s commented on a photo, or
those receipt emails you get from Amazon? They’re transactional emails, with content that’s tailored
specifically to you. Transactional email is a type of one-to-one email. It’s different from bulk email, which
goes to many people with the same content.

Transactional emails might invite us back to a web service after a period of inactivity, let us know what’s
happening online while we’re away, or encourage us to purchase items we left in our shopping cart.

The idea of the term “transactional” may vary across industries—it doesn’t necessarily infer e-
commerce, as not all transactional emails are related to purchases. Many people refer to transactional
emails as triggered, automatic, real-time, or even personalized

12
Figure 2

You may receive a transactional email when you:

 Sign up for a service, site, or newsletter


 Forget your username or password, and request a new one
 Make a change to an account profile
 Have updates or notifications sent from an account
 Make a purchase or donation online or in a brick-and-mortar store (some retailers will now offer to
email a receipt to you)
 Leave items in an online shopping cart
 Renew a subscription to a site or service
 Get a reply to a comment on a blog or social-media site
 Get a response from a contact form or online survey

Generally speaking, transactional emails aren’t considered marketing emails. However, they may
sometimes contain a marketing message along with the transaction details.

Email Access Types by ISP


The most common types of accounts are referred to by their Internet protocol name — POP3 and IMAP or
just POP and IMAP. Your ISP can tell you which protocol you use to access your e-mail account, but POP3
is by far the most common. The POP3 and IMAP accounts differ in where your messages are saved
ultimately.

13
What are IMAP and POP?

IMAP and POP are two methods to access email. IMAP is the recommended method when you need to
check your emails from several different devices, such as a phone, laptop, and tablet.

IMAP

IMAP allows you to access your email wherever you are, from any device. When you read an email
message using IMAP, you aren't actually downloading or storing it on your computer; instead, you're
reading it from the email service. As a result, you can check your email from different devices, anywhere
in the world: your phone, a computer, a friend's computer.

IMAP only downloads a message when you click on it, and attachments aren't automatically downloaded.
This way you're able to check your messages a lot more quickly than POP.

POP

POP works by contacting your email service and downloading all of your new messages from it. Once
they are downloaded onto your PC or Mac, they are deleted from the email service. This means that after
the email is downloaded, it can only be accessed using the same computer. If you try to access your
email from a different device, the messages that have been previously downloaded won't be available to
you.

Sent mail is stored locally on your PC or Mac, not on the email server.

A lot of Internet Service Providers (ISPs) give you email accounts that use POP.

Webmail accounts vs email apps

If you've used Gmail, Outlook.com, Hotmail.com, or iCloud, then you've used webmail. To get to your
webmail account, you access the Internet and sign in to your email account.

If you have a PC or Mac, you've probably used a program like Outlook, Apple Mail, or Thunderbird to
manage your email. Outlook, Apple Mail, and Thunderbird are email apps: programs that you install on
your computer to manage your email. They interact with an email service such as Gmail or Outlook.com
to receive and send email.

You can add any email account to your email app for it to manage your email. For example, you can add
webmail accounts - Gmail, Outlook.com, Hotmail.com, AOL, and Yahoo - to the Outlook or Apple Mail app to
manage your email, and you can add work email accounts.

Adding webmail accounts to email apps such as Outlook, Apple Mail, Thunderbird

When you add your email account to your email app, it will usually attempt to set it up with IMAP access,
without any input from you.

If the email app has difficulty adding your email account, it's usually because the email account is set up
for POP access. In this case, you need to go to your email provider and find out the name of their POP and
SMTP server so you can enter the info into the email app. The info usually looks something like this:

 Incoming Mail (IMAP) Server: imap.<name of service>.com

14
 Incoming (POP) Server: pop.<name of service>.com

 Outgoing Mail (SMTP) Server: smtp.<name of service>.com

INSTANT MESSAGING
Instant messaging (IM) is a form of online communication that allows real-time (or close to real
-time) interaction through per- sonal computers or mobile computing devices. Users can
exchange messages privately, similar to e-mail, or join group conversations. Although typed
text remains the primary con- vention for IM, the technology has grown significant ly from early
versions and now allows users to send images, audio and video files, and other attachments.
Early versions of IM appeared in the late 1990s, and the list of IM tools has grown to include
dozens of applications. Technolo- gies that enable IM—such as wireless connectivity and
mobile devices—have become widespread, providing a “critical mass” for IM to reach near
ubiquity. At the same time, many vendors whose primary business is something other than IM
have added IM functionality to their products. Nearly all learning management systems have
incorporated chat tools, ranging from the elegant and sophisticated, which include icons,
sounds, and pictures, to the rudimentary, which simply provide text in boxes.
The interactive nature of IM is closer to spoken conversation than written correspondence,
allowing users to communicate in a manner that e-mail does not. IM users have a sense of
presence of other users, as if they were in a room together. At the same time, the technology
facilitates the kind of on-screen interaction, with its perceptions of distance and safety, that
many especially comfortable.

The IM Users
Large and growing numbers of teens—today’s and tomorrow’s college students—are regular
users of IM, both as a personal communication tool and, in some cases, for educational initia-
tives in high school. As IM matures into an accepted means of communication, and as ever-
larger numbers of students arrive on campus as seasoned IM users, colleges and universities
are adding IM to campus functions ranging from recruiting and admissions to teaching and
support. Some institutional libraries have set up online reference desks with IM applications,
and faculty have begun using the technology to facilitate virtual office hours. For many current
and prospective students, IM is becoming the preferred mode of contact with recruiters and
admissions staff, the registrar’s office, and academic advisors.
IM FUNCTIONALITIES
Functionality ranges widely for IM applications, but typically users log in to a service with a
screen name or ID. Most IM applications notify users when others join or leave, and many allow

15
users to indicate their status, such as “away from desk” or “in a meeting.” Once logged in, you
can send messages to individuals or join IM sessions. Most IM windows include an area where
messages are displayed chronologically and a composition box where messages are typed.
Composition boxes usually allow basic formatting of text, and most let you add images,
multimedia files, or other attachments. When someone types an instant message, the chat
client indicates that a message is being composed. When the message is sent, it pops up on
your screen in front of other applications.
SIGNIFICANCE OF IM
Hundreds of millions of people use IM to stay connected. In many ways, IM epitomizes the notion
of the always-connected, multi- tasking student, sending and receiving messages at all hours,
from a wide spectrum of devices, while doing several other things at the same time. For many
students, the technology has become as ingrained in daily life as telephones are for older
generations. Many colleges and universities are working to incorporate IM into the educational
aspects of students’ lives, rather than relegating it to a social function.
IM interactions are infused with a level of serendipity and the possibility of chance encounters
online that are unique to the medium. Some applications allow users to set a status of “hidden.”
Even though you cannot tell they are online, they might suddenly send you a message. You can
send a message to someone who is logged in, but perhaps she is away from her computer.
Maybe she is in class or otherwise occupied but hasn’t set her status to show that.
IM users have developed an evolving syntax that includes short- hand, acronyms, symbols, and
other elements that constitute a unique lexicon, encouraging users to interact in ways not
possible either in person or with other forms of electronic communication. While this dynamic
expands access to students who are uneasy with other types of communication, it also provides
new modes of expression for students who are otherwise comfortable participating in class. IM
creates an environment that approximates the sharing of a physical space, allowing distance
students to engage in learning that approaches face-to-face meetings.
The technology is also promoting the practice of creating “back channels,” or secondary
conversations that happen at the same time, for example, as a lecture, board meeting, or
conference call. Students in a lecture hall might use IM to ask each other questions about the
lec- ture topic and share their thoughts without interrupting the professor
IM CHALLENGES
The flip side of offering new modes of interaction is that the technology might encourage some
participants to engage in offensive, disruptive, or other behavior that, in different contexts,
theywould see as inappropriate. As with any new form of communi- cation, IM can lead to
misunderstandings about what others are trying to convey. Moreover, the always-on notion of
IM carries the risk of unrealistic expectations about how quickly users can expect responses.
Because messages pop up on users’ screens who are logged in, some consider the technology

16
to be a source of continual distractions.
Users of IM technologies face a number of security risks. Although sending attachments
through IM fosters a richer experience, those files are subject to viruses and other malware,
particularly since IM attachments often bypass antivirus software. Some IM networks are more
susceptible than others to eavesdropping, and a problem looming on the horizon is that of
“spim,” the IM version of spam. Because it’s difficult to verify the source of an instant message,
some people have begun sending unwanted messages to IM clients, with bogus advertisements
or solicitations for personal information.
IM TREND
Just as IM tools are showing up in non-IM software, so too are traditionally non-IM features
included in IM applications, blurring the lines between types of applications. The introduction
of new consumer electronic devices and the growing functionality of existing ones are
broadening the scope of IM availability. Video chat applications are appearing, and IM networks
are starting to allow users to send messages to users who are not online and to see archived
transcripts of past messages. New IM features are being added to allow richer conversations,
such as turn taking, collaborative composition, and game playing. The proliferation of IM-
capable devices will bring new uses of the technology that take advantage of its unique nature.
IMPLICATIONS FOR TEACHING AND LEARNING
Students who use IM feel connected with peers and faculty, and some users have found that IM
facilitates semiformal distance rela- tionships that are difficult to create through other media.
IM offers higher education a new mode of communication, often for relative- ly low cost and
without significant overhead for IT infrastructure. Increasingly, students will arrive on campus
having spent years using IM, expecting the technology to be part of their educational lives. In
addition, because IM is used for communication in many corporations, for many its use will
extend beyond college.
SOCIAL MEDIA AND SECURITY CONSIDERATIONS

Social media is defined by Kaplan and Haenlein (2010) as ‘a group of internet-based applications that
build on the ideological and technological foundations of Web 2.0, and that allow the creation and
exchange of user generated content’. Trends suggest that social networking websites are becoming
more common and important for individuals (Szwedo et al., 2010), and recently also for organizations
(Light et al., 2008; Kuikka and Äkkinen, 2011).

Most IM systems presently in use were designed with scalability rather than security in mind. Virtually
all freeware IM programs lack encryption capabilities and most have features that bypass traditional
corporate firewalls, making it difficult for administrators to control instant messaging usage inside an
organization. Many of these systems have insecure password management and are vulnerable to
account spoofing and denial-of-service (DoS) attacks. Finally, IM systems meet all the criteria required
to make them an ideal platform for rapidly spreading computer worms and blended threats:2 they are
ubiquitous; they provide a communications infrastructure; they have integrated directories (buddy lists)

17
that can be used to locate new targets; and they can, in many cases, be controlled by easily written
scripts. Even worse, no firewall on the market today can scan instant messaging transmissions for
viruses.

Figure 3 INSTANT MESSAGING CLIENT SERVER ARCHITECTURE

Virtually all IM systems employ the same basic client-server architecture. Users install instant
messaging clients on their client machines—desktop computers, wireless devices, or PDAs, for
example—and these clients communicate with an IM server in the messaging provider’s infrastructure
to locate other users and exchange messages. In most instances, messages are not sent directly from
the initiating user’s computer to the recipient’s computer, but are sent first to an IM server, and then
from the IM server to the intended recipient. (See Figure 3.)

Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by
enterprises to engage with customers, build their brands and communicate information to the rest of
the world. However, social media for enterprises is not all about "liking," "friending," "up-voting" or
"digging." For organizations, there are high risks to using social media, ranging from damaging the
brand to exposing proprietary information to inviting lawsuits.

SOCIAL MEDIA SECURITY THREATS:

Information security has become a growing concern for companies by the advent of social media. New
technologies for collaboration and interaction have increased the possibilities for information sharing.
Although online communication has become very popular and has become the way to maintain social
relationships, it has also highlighted the adverse effects on human behaviour. For companies, it would
be important to get an understanding of whether and how social media represents a threat to

18
information security in order to be better able to plan their appearances in and policies concerning
social media.

For companies and their employees, social media allows new ways to communicate with customers and
colleagues. Vast amounts of information are being exchanged in social media. Information is a highly
valuable asset, and therefore questions concerning information security become more and more
important. Companies are becoming increasingly worried about information security in social media.

There are three main security challenges:

First, challenges arising from employees’ actions or unawareness in social media (especially reputation
damage) seem to represent bigger threats to information security than threats caused by outside
attacks.

Second, the confusion of private and professional roles in social media represents an information
security risk, and distinguishing between these roles becomes more difficult the higher an employee’s
position in the company.

Third, communication with employees and colleagues represents an information security challenge
especially when communication is not steered by the company.

MOBILE APPS: ADVERTISING

The rise of social media is inextricably linked with the revolution in mobile computing, which has
spawned a huge industry in mobile application development. Naturally, whether using their own or
company-issued mobile devices, employees typically download dozens of apps because, well, because
they can. Sometimes they download more than they bargained for. In early March, Google removed from
its Android Market more than 60 applications carrying malicious software. Some of the malware was
designed to reveal the user's private information to a third party, replicate itself on other devices,
destroy user data or even impersonate the device owner.

And all because this new game is supposed to be even better than Angry Birds!

E-commerce
Electronic commerce, commonly known as E-commerce is trading in products or services using
computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web for at least one
part of the transaction's life cycle, although it may also use other technologies such as e-mail.

Definition of E-commerce:

Sharing business information, maintaining business relationships and conducting business


transactions using computers connected to telecommunication network is called E-Commerce.

19
E-Commerce Categories:

1. Electronic Markets

Present a range of offerings available in a market segment so that the purchaser can compare the
prices of the offerings and make a purchase decision. Example: Airline Booking System

2. Electronic Data Interchange (EDI)

• It provides a standardized system

• Coding trade transactions

• Communicated from one computer to another without the need for printed orders and

 invoices & delays & errors in paper handling

• It is used by organizations that a make a large no. of regular transactions

 Example: EDI is used in the large market chains for transactions with their suppliers

3. Internet Commerce

• It is use to advertise & make sales of wide range of goods & services.

• This application is for both business to business & business to consumer transactions.

Example: The purchase of goods that are then delivered by post or the booking of tickets that can be
picked up by the clients when they arrive at the event.

Figure 4 The Three Categories of E-commerce

Advantages Of E-commerce:

 Buying/selling a variety of goods and services from one's home or business

 Anywhere, anytime transaction

 Can look for lowest cost for specific goods or service

20
 Businesses can reach out to worldwide clients - can establish business partnerships

 Order processing cost reduced

 Electronic funds transfer faster

 Supply chain management is simpler, faster, and cheaper using ecommerce

- Can order from several vendors and monitor supplies.

- Production schedule and inventory of an organization can be inspected by cooperating


supplier who can in-turn schedule their work

Disadvantages of E-commerce:

 Electronic data interchange using EDI is expensive for small businesses

 Security of internet is not very good - viruses, hacker attacks can paralise

 e-commerce

 Privacy of e-transactions is not guaranteed

 E-commerce de-personalises shopping

Threats of E-commerce:

 Hackers attempting to steal customer information or disrupt the site.

 A server containing customer information is stolen.

 Imposters can mirror your ecommerce site to steal customer money

 Authorised administrators/users of an ecommerce website downloading hidden active content


that attacks the ecommerce system.

 A disaffected employee disrupting the ecommerce system.

It is also worth considering where potential threats to your ecommerce site might come from, as
identifying potential threats will help you to protect your site.

Consider Potential Threats:

 Who may want to access your ecommerce site to cause disruption or steal data; for example
competitors, ex-employees, etc.

 What level of expertise a potential hacker may possess; if you are a small company that would
not be likely to be considered a target for hackers then expensive, complex security may not be
needed.

Features of E-Commerce:

 Ubiquity Internet/Web technology is the marketplace is extended beyond traditional available


everywhere: at work, at home, and boundaries and is removed from a temporal and elsewhere

21
via mobile devices, anytime. geographic location.

o Marketspace‖ is created; shopping can take place anywhere. Customer convenience is


enhanced, and shopping costsare reduced.

 Global reach: The technology reaches Commerce is enabled across cultural and across national
boundaries, around the earth. national boundaries seamlessly and without modification.

o Marketspace‖ includes potentially billions of consumers and millions of businesses


worldwide.

 Universal standards: There is one set of There is one set of technical media standards
technology standards, namely Internet across the globe.

 Richness: Video, audio, and text messages Video, audio, and text marketing messages are
possible integrated into a single marketing message and consuming experience.

 Interactivity: The technology works Consumers are engaged in a dialog that through interaction
with the user dynamically adjusts the experience to the individual, and makes the consumer a
co-participant in the process of delivering goods to the market.

 Information density: The technology Information processing, storage, and reduces information
costs and raises quality communication costs drop dramatically, while currency, accuracy, and
timeliness improve greatly. Information becomes plentiful, cheap, and accurate.

 Personalization/Customization: The Personalization of marketing messages and technology


allows personalized messages to customization of products and services are be delivered to
individuals as well as groups based on individual characteristics.

Business models of e-commerce:

There are mainly 4 types of business models based on transaction party.

Business-to-Consumer (B2C)

In a Business-to-Consumer E-commerce environment, companies sell their online goods to consumers


who are the end users of their products or services. Usually, B2C E-commerce web shops have an open
access for any visitor, meaning that there is no need for a person to login in order to make any product
related inquiry.

Business-to-Business (B2B)

In a Business-to-Business E-commerce environment, companies sell their online goods to other


companies without being engaged in sales to consumers. In most B2B E-commerce environments
entering the web shop will require a log in. B2B web shop usually contains customer-specific pricing,
customer-specific assortments and customer-specific discounts.

Consumer-to-Business (C2B)

In a Consumer-to-Business E-commerce environment, consumers usually post their products or


services online on which companies can post their bids. A consumer reviews the bids and selects the

22
company that meets his price expectations.

Consumer-to-Consumer (C2C)In a Consumer-to-Consumer E-commerce environment consumers sell


their online goods to other consumers. A well-known example is eBay.

References

Kaplan, A.M. and Haenlein, M. (2010). Users of the World, Unite. The Challenges and Opportunities of
Social Media. Business Horizons, 53(1), 59-68.

Kuikka, M and Äkkinen, M. (2011). Determining the Challenges in Organizational Social Media
Adoption and Use. In Proceedings of the 19th European Conference on Information Systems.

Rebecca E. Grinter & Leysia Palen. Instant Messaging in Teen Life. In CSCW’02, November 16–20,
2002, New Orleans, Louisiana, USA. Copyright 2002 ACM 1-58113-560-2/02/0011

Symantec Security White Paper: Securing Instant Messaging

Department of Computer Science


CSC300: COMPUTER APPLICATIONS

Lecture 4
Title: Word Processing

OBJECTIVES
The students will learn:
*Definition of Word Processing, Word Processing Software and examples of word processing
Software.
* MS Word Graphical User Interface: Ribbon, the quick access toolbar, the title bar, the text area
*Working with text: deleting, copying, pasting
* Working with documents: Be able to create document, save documents, print documents, format
documents, create tables, use headers and footnotes, templates, column and order, use the proofing
features and modifying spacing

WORD PROCESSING

Word processing is the phrase used to describe using a computer to create, edit, and print
documents. Of all computer applications, word processing is the most common. To perform
word processing, you need a computer, a special program called a word processor, and a
printer.

Word processing software

23
Is used to manipulate a text document, such as a resume or a report. You typically enter text by
typing and the software provides tools for copying, deleting and various types of formatting.
Some of the functions of word processing software include:

 Creating, editing, saving and printing documents.


 Copying, pasting, moving and deleting text within a document.
 Formatting text, such as font type, bolding, underlining or italicizing.
 Creating and editing tables.
 Inserting elements from other software, such as illustrations or photographs.
 Correcting spelling and grammar.

Examples of Word Processing Software

There are a number of different word processing applications. One of the most widely used ones
is Word, which is part of Microsoft Office. Another widely used one is WordPerfect by the Corel
Corporation. A third one is Writer, which is part of OpenOffice by Apache. While the first two are
commercial software, OpenOffice is open source and can be downloaded and used free of
charge. Finally, there is Pages, which is part of iWork by Apple.

contains the following


Microsoft Word i. The Microsoft Office Button
Microsoft Word is a word processor
developed by Microsoft. It was first
In the upper-left corner of the Microsoft
released on October 25, 1983 under the
Word GUI is the Microsoft Office button.
name Multi-Tool Word for Xenix systems.
When you click the button, a menu appears.
Subsequent versions were later written for
You can use the menu to perform many
several other platforms.
tasks.
Basics of Microsoft Word ii The Quick Access Toolbar
Starting Microsoft Word
To start Microsoft Word, Click on Microsoft the Quick Access toolbar is Next to the
Word from your program or Desktop and the Microsoft Office button. The Quick Access
screen below is display. This is called toolbar provides you with access to
Microsoft Word GUI. commands you frequently use. By default
Save, Undo, and Redo appear on the Quick
Access toolbar.
iii The Title Bar

the Title bar is next to the Quick Access


The Microsoft graphical user interface toolbar . The Title bar displays the title of

24
the document on which you are currently area. The blinking vertical line in the upper-
working. left corner of the text area is called the
cursor. It marks the insertion point. As you
iv The Ribbon
type, your text displays at the cursor
location.

The Ribbon is located near the top of the


screen, below the Quick Access toolbar. At
the top of the Ribbon are several tabs;
clicking a tab displays several related
command groups. Within each group are
related command buttons. You click buttons vii The Vertical and Horizontal and
to issue commands or to access menus and Vertical Scroll Bars
dialog boxes. you use the Ribbon to issue
commands You may also find a dialog box The vertical and horizontal scroll bars
launcher in the bottom-right corner of a enable you to move up, down, and across
group. Clicking the dialog box launcher your window simply by dragging the icon
gives you access to additional commands located on the scroll bar. The vertical scroll
via a dialog box. bar is located along the right side of the
screen. The horizontal scroll bar is located
v The Ruler just above the status bar. To move up and
down your document, click and drag the
vertical scroll bar up and down. To move
The ruler is below the Ribbon. back and forth across your document, click
and drag the horizontal scroll bar back and
the ruler is used to change the format of forth. You won't see a horizontal scroll bar if
your document. If your ruler is not visible, the width of your document fits on your
you can make it visible as follow: screen.
viii The Status Bar
The Status bar is at the bottom of your
window and provides such information as
1. Click the View tab to choose it. the current page and the number of words
2. Click the check box next to Ruler in in your document.
the Show/Hide group. The ruler
appears below the Ribbon.

vi The Text Area


The text area is the large area below the
ruler. You type your document in the text

25
document.
 Left-click the mouse. The insertion
point appears.
 Type the text you want to appear.

To delete text:

 Place your cursor next to the text you


want to delete.
 Press the Backspace key on your
keyboard to delete text to the left of
the cursor.
 Press the Delete key on your
keyboard to delete text to the right of
the cursor.

To select text:

 Place the insertion point next to the


text you want to select.
 Left-click your mouse. While holding
it down, drag your mouse over the
text to select it.
 Release the mouse button. You have
selected the text. A highlighted box
will appear over the selected text.

WORKING WITH TEXT When you select text or images in Word, a


hover toolbar with formatting options
To insert text: appears. This makes formatting commands
easily accessible, which can save you time.
 Move your mouse to the location
where you want text to appear in the To copy and paste text:

26
 Select the text you want to copy.  Left-click your mouse, and drag the
 Click the Copy command on the text to the location where you want it
Home tab. to appear. The cursor will have a text
 Place the insertion point where you box underneath it to indicate that
want text to appear. you are moving text.
 Click the Paste command on the
Home tab. The text will appear.

 Release the mouse button, and the


text will appear.

To drag and drop text: If text does not appear in the exact location
you want, you can click the Enter key on
 Select the text you want to copy. your keyboard to move the text to a new line.

 Select the location where you want


WORKING WITH DOCUMENTS to save the document using the drop
-down menu.
 Enter a name for the document.
Saving document

How to save documents

To use the Save As command:

 Click the Microsoft Office button.


 Select Save As Word Document.
The Save As dialog box appears.

 Click the Save button.

To use the Save command:

27
 Click the Microsoft Office button. By default, Word automatically checks your
 Select Save from the menu. document for spelling and grammar errors.
These errors are indicated by colored wavy
Using the Save command saves the lines.
document in its current location using the
same file name. If you are saving for the  The blue line indicates a contextual
first time and select Save, the Save As spelling error.
dialog box will appear. o A contextual spelling error is
when an incorrect spelling of
To Save As a Word 97 - 2003 document: a word is chosen. For
example, if you write Deer Mr.
 Click the Microsoft Office button. Theodore at the beginning of
 Select Save As Word 97-2003 a letter, deer is a contextual
Document. spelling error because dear
should have been used. Deer
is spelled correctly, but it is
used incorrectly in this letter.
 The red line indicates a misspelled
word.
 The green line indicates a
grammatical error.

 Select the location where you want


to save the document using the drop
-down menu.
 Enter a name for the document.
 Click the Save button.

Proofing Features

Worried about making mistakes when you


type? Don't be. Word provides you with To use the spelling check feature:
several proofing features that will help you
produce professional, error-free  Right-click the underlined word. A
documents. In this lesson, you will learn menu will appear.
about the various proofing features,  Select the correct spelling of the
including the Spelling & Grammar tool word from the listed suggestions.
 Left-click your mouse on the word. It
Using proofing features will appear in the document.

Line colors

28
Once you complete your document, you may
want to print it for various reasons. This
lesson covers the three basic features of
printing in Word, including Print Preview,
Quick Print, and traditional Print.

Printing

To preview the document before printing:


You can choose to ignore an underlined
 Click the Microsoft Office button.
word, add it to the dictionary, or go to the
 Select Print Print Preview. The
Spelling dialog box. document opens in Print Preview
format.
To use the grammar check feature:

 Right-click the underlined word. A


menu will appear.
 Select the correct word from the
listed suggestions.
 Left-click your mouse on the word. It
will appear in the document.

 Click Print to print the document or


Close Print Preview to exit the
preview format and make changes
to the document.

In Print Preview format, you can perform


many tasks, including:

 Modifying margins
 Changing page orientation
You can also choose to ignore an  Changing page size
underlined word, go to the Grammar dialog  Zooming in and out to view various
box, or find out more information about the parts of the document
word and its usage.  Viewing multiple pages
 Accessing Word Options to change
You can also wait and run the spelling and several Word settings
grammar check after completing the
document. Click the Spelling & Grammar To print:
command on the Review tab.
 Click the Microsoft Office button.
 Select Print
 Print. The Print dialog box appears.
 Select the pages you want to
Printing
29
print—either all pages or a range of
pages.
 Select the number of copies.
 Check the Collate box if you are
printing multiple copies of a multi-
page document.
 Select a printer from the drop-down
list.

 Click Create. A new blank document


appears in the Word window.

You can access templates that are installed


on your computer or on Office Online. Click
the Microsoft Office button and select New.
You can create blank documents and
access templates from the dialog box that
appears.
 Click OK.
Formatting Text
Creating a New Document
To create and design effective documents,
In addition to working with existing you need to know how to format text. In
documents, you will want to be able to addition to making your document more
create new documents. Each time you open appealing, formatted text can draw the
Word, a new blank document appears; reader's attention to specific parts of the
however, you will also need to know how to document and help communicate your
create new documents while an existing message.
document is open.
To format font size:
New documents
 Select the text you want to modify.
To create a new blank document:  Left-click the drop-down arrow next
to the font size box on the Home tab.
 Click the Microsoft Office button. The font size drop-down menu
 Select New. The New Document dialog
appears.
box appears.
 Move your cursor over the various
 Select Blank document under the Blank
font sizes. A live preview of the font
and recent section. It will be
size will appear in the document.
highlighted by default.
 Left-click the font size you want to
use. The font size will change in the
document.

To format font style:

30
 Select the text you want to modify. document.
 Left-click the drop-down arrow next
to the font style box on the Home tab. Your color choices aren't limited to the drop
The font style drop-down menu -down menu that appears. Select More
appears. Colors at the bottom of the list to access the
 Move your cursor over the various Colors dialog box. Choose the color you
font styles. A live preview of the font want, then click OK.
will appear in the document.

To use the bold, italic, and underline


commands:

 Select the text you want to modify.


 Click the bold, italic, or underline
command in the Font group on the
Home tab.

 Left-click the font style you want to


use. The font style will change in the
document.

To format font color: To change the text case:


 Select the text you want to modify.  Select the text you want to modify.
 Left-click the drop-down arrow next  Click the Change Case command in
to the font color box on the Home tab. the Font group on the Home tab.
The font color menu appears.  Select one of the case options from
 Move your cursor over the various the list.
font colors. A live preview of the
color will appear in the document.

To change text alignment:

 Select the text you want to modify.


 Select one of the four alignment
 Left-click the font color you want to options from the Paragraph group
use. The font color will change in the on the Home tab.

31
o Align Text Left: Aligns all of in a new window.
the selected text to the left
margin
o Center: Aligns text an equal
distance from the left and
right margins
o Align Text Right: Aligns all of
the selected text to the right
margin
o Justify: Aligns text equally to
the right and left margins;
used in many books,
newsletters, and
newspapers
You can select any of the categories in the
Microsoft Office Online section of the New
Document Dialog box. This will display free
templates that are available online. Your
computer must have Internet access to
download these templates.

Information about using templates


Using a Template
Templates include placeholder text that is
surrounded by brackets. Often, this
A template is a predesigned document you placeholder text includes information
can use to create new documents with the regarding the content for a specific area.
same formatting. With a template, many of
the more important document design Additionally, some information is
decisions such as margin size, font style prefilled in the template. You can modify
and size, and spacing are predetermined. your Word Options and change the prefilled
information that appears.
Creating a new document with a Word templates may include separate
template Quick Parts sections, which give you
various options for the template.
To insert a template:

 Click the Microsoft Office button.


 Select New. The New Document
dialog box appears.
 Select Installed Templates to
choose a template on your computer.

 Review the available templates.


 Left-click a template to select it.
 Click Create, and the template opens

32
To insert text into a template: you will learn how to modify line and
paragraph spacing in various ways.
 Click near the text you want to
replace. The text will appear Modifying spacing
highlighted, and a template tag will
appear. To format line spacing:

 Select the text you want to format.


 Click the Line spacing command in
the Paragraph group on the Home
tab.
 Select a spacing option.

 Enter text. The placeholder text will


disappear.

To change prefilled information:


OR
 Select the Microsoft Office button.
 Click the Word Options button at the
 Select Line Spacing Options. The
bottom of the menu. The Word
Paragraph dialog box appears.
Options dialog box appears.
 Enter the user name and/or initials
in the Popular section.

 Use the Line spacing drop-down


 Click OK. menu to select a spacing option.
 Modify the before and after points to
Line and Paragraph Spacing adjust line spacing as needed.
 Click OK.
An important part of creating effective
documents lies in the document design. As
Paragraph spacing
part of designing the document and making
Just as you can format spacing between
formatting decisions, you will need to know
lines in your document, you can choose
how to modify the spacing. In this lesson,

33
spacing options between each paragraph. document you want to create, in which case
Typically, extra spaces are added between you will want to modify these settings. In
paragraphs, headings, or subheadings. addition, you may want to change the page
Extra spacing between paragraphs adds formatting depending on the document
emphasis and makes a document easier to you're creating.
read.
In this lesson, you will learn how to change
To format paragraph spacing: the page orientation, paper size, and page
margins, as well as how to insert a break.
 Click the Line spacing command on
the Home tab. Page layout and formatting
 Select Add Space Before Paragraph
or Remove Space After Paragraph To change page orientation:
from the menu. If you don't see the
option you want, click Line Spacing  Select the Page Layout tab.
Options to manually set the spacing  Click the Orientation command in
(see below). the Page Setup group.

OR
Left-click either Portrait or Landscape
 Select Line Spacing Options. The to change the page orientation.
Paragraph dialog box appears.
 Change the Before and After points Landscape format means everything on the
in the Paragraph section. page is oriented horizontally, while portrait
format means everything is oriented
vertically.

To change the paper size:

 Select the Page Layout tab.


 Left-click the Size command, and a
drop-down menu will appear. The
current paper size is highlighted.
 Click OK.

Line spacing is measured in lines or points,


Left-click a size option to select it. The
which is referred to as leading. When you
page size of the document changes.
reduce the leading, you automatically bring
the lines of text closer together. Increasing
To format page margins:
the leading will space the lines out,
allowing for improved readability.
 Select the Page Layout tab.
 Click the Margins command. A menu
Modifying Page Layout of options appears. Normal is
selected by default.
You may find that the default page layout  Left-click the predefined margin size
settings in Word are not sufficient for the you want.

34
 Select the Page Layout tab.
 Left-click the Columns command.

OR

 Select Custom Margins from the


menu. The Page Setup dialog box  Select the number of columns you
appears. want to insert.

 Enter the desired margin size in the Click the Show/Hide command on the Home
appropriate fields. tab to display the paragraph marks and
breaks.
You can always access the Page Setup
dialog box by clicking the small arrow in the The Format Painter command allows you to
bottom-right corner of the Page Setup group. easily format text to appear like other text in
The dialog box should look familiar to your document. Select the text that is
people who have used previous versions of formatted the way you want, click the
Word. Format Painter command on the Home tab,
and select the text you want to change. The
Columns and Ordering new text now appears modified.

To change the order of objects:


Two useful formatting features in Word
are the columns and ordering commands.
 Right-click the object you want to
Columns are used in many types of documents
move. In this example, click the
but are most commonly used in newspapers, shape.
magazines, academic journals, and newsletters.  In the menu that appears, select
Ordering is the process of layering two or more Order.
shapes so they appear in a certain way. For
example, if you have two shapes that overlap  Select a menu option that will
and want one shape to appear on top, you will arrange the item in the desired way.
have to order the shapes. In this example, select Send Behind
Text.
 The text and image are now
Inserting columns and ordering displayed layered on top of the
objects shape.

To add columns to a document:

 Select the text you want to format.

35
 The Design tab with Header and
Footer tools is active.

Working with Headers and Footers


 Type information into the header or
You can make your document look footer.
professional and polished by utilizing the
header and footer sections. The header
is a section of the document that To insert the date or time into a
appears in the top margin, while the header or footer:
footer is a section of the document that
 With the header or footer section
appears in the bottom margin. Headers
active, click the Date & Time
and footers generally contain command.
information such as page number,
date, and document name.
Select a date format in the dialog box
Headers and footers that appears.

To insert a header or footer:

 Select the Insert tab.


 Click either the Header or Footer
command. A menu appears with a
list of built-in options you can use.
 Left-click one of the built-in options,
and it will appear in the document.

OR

 Left-click Blank to select it.


 Click OK. The date and time now
appear in the document.

Other header and footer options

There are many other header and footer


options you can use to design these
sections of your document. From the Header
and Footer Tools Design tab, you can see all

36
of your design options. below the location where you want
to add a row.

Working with Tables

A table is a grid of cells arranged in


 Right-click the mouse. A menu
rows and columns. Tables can be
appears.
customized and are useful for various  Select Insert Insert Rows Above.
tasks such as presenting text
information and numerical data.

Inserting and modifying tables

To convert existing text to a table:

 Select the text you want to convert.


 Select the Insert tab.
 Click the Table command.
 Select Convert Text to Table from
the menu. A dialog box appears.
A new row appears above the insertion
point.

You can also add rows below the insertion


point. Follow the same steps, but select
 Choose one of the options in the Insert Rows Below from the menu.
Separate text at: section. This is how
Word knows what text to put in each To add a column:
column.
 Place the insertion point in a
 Click OK. The text appears in a table. column adjacent to the location
where you want the new column to
To add a row above an existing row: appear.
 Right-click the mouse. A menu
 Place the insertion point in a row appears.

37
 Select Insert Insert Columns to or shading, change line weight, or erase
the Left or Insert Columns to the part of the table.
Right. A new column appears.
To insert a blank table:
To delete a row or column:
 Place your insertion point in the
 Select the row or column. document where you want the table
 Right-click your mouse, and a menu to appear.
appears.  Select the Insert tab.
 Select Delete Columns or Delete  Click the Table command.
Rows.  Drag your mouse over the diagram
squares to select the number of
To apply a table style: columns and rows in the table.

 Select the table. A Table Tools


Design tab now appears on the
Ribbon.
 Select the Design tab to access all of
the Table Styles and Options.

 Left-click your mouse, and the table


appears in the document.
 Enter text into the table.

Modifying a table using the layout tab

When you select a table in Word, Design


and Layout tabs appear under Table Tools
 Click through the various styles in on the Ribbon. Using commands on the
the Table Styles section. Layout tab, you can make a variety of
 Left-click a style to select it. The modifications to the table, including:
table style will appear in the
document.  Adding and deleting columns
 Adding and deleting rows
You can modify which table styles are  Changing the cell size
displayed. In the Table Styles Options, you  Aligning cell text
can select and deselect various table  Changing text direction
options. For example, you can select banded  Merging and splitting cells
rows, and only tables with banded rows will
appear in the Tables Styles section.

Want to have a little more creative freedom


when it comes to formatting your tables?
You can manually change the table border

38
EXERCISES

1. Give four functions of a word processing software

2. Give three advantages of using a word processing software over a conventional type
writer

3. give three examples of a word processing software

4. Using Microsoft Word:

 Open an existing Word document.


 Save the document with the file name trial.
 Close the document.
 Open another existing Word document.
 Save the document so it is compatible with Word 2003.
 Close the document.

5. Create a new blank Word document.

 Insert text into the document.


 Change the font size of some text.
 Change the font style of some text.
 Change the font color of some text.
 Try various cases using the Change Case command.
 Try the four alignment commands.

6. Use the report or any Word document you choose to complete this.

 Convert text into a table.


 Apply a table style.
 Delete a row from the table.
 Insert a blank table with five rows and four columns.

REFERENCES
www.webopedia.com/TERM/W/word_processing.html
http://www.gcfearnfree.org/word2007

https://www.microsoft.com/learning
Apeh Ayo I CSC200 Lecture note on Introduction to Microsoft Word

39
Department of Computer Science
Faculty of Science
University of Abuja
CSC 300: NOTE 5

SREADSHEET
INTRODUCTION

A spreadsheet is an interactive computer application for organization, analysis and storage of data
in tabular form. Spreadsheets are developed as computerized simulations of paper accounting
worksheets. The program operates on data entered in cells of a table. Each cell may contain either
numeric or text data, or the results of formulas that automatically calculate and display a value
based on the contents of other cells.

LANPAR was the first electronic spreadsheet on mainframe and time sharing computers. VisiCalc
was the first electronic spreadsheet on a microcomputer, and it helped turn the Apple II computer
into a popular and widely used system. Lotus 1-2-3 was the leading spreadsheet when Disc
Operating System (DOS) was the dominant operating system. Excel now has the largest market share
on the Windows and Macintosh platforms. A spreadsheet program is a standard feature of an office
productivity suite; since the advent of web apps, office suites now also exist in web app form.

List of other spreadsheets software

 Accel Spreadsheet from SSuite Office


 Calligra Sheets (formerly KCalc)
 Corel Quattro Pro (WordPerfect Office)
 GS-Calc
 GridCraft collaborative cloud spreadsheet for web and iPad
 iSpread for iPad, iPhone and iPod Touch
 Kingsoft Spreadsheets
 Mariner Calc is Mariner Software's spreadsheet software for Mac OS.
 Calc XLS is Mariner Software's spreadsheet software for iOS.
 Numbers is Apple Inc.'s spreadsheet software, part of iWork.
 ZCubes-Calc

40
 GrapeCity Spread Studio
 NeoOffice
 Pyspread e.t.c

INTRODUCTION TO EXCEL

Excel is an electronic spreadsheet program that can be used for storing, organizing and

manipulating data. It is a Microsoft Application program developed for official use with an icon .

The uses of Excel


1. Scheduling

2. Basic Accounting
3. Return on Investment
4. Customer Data
5. Performing basic mathematical operations.
6. Find values such as profit or loss.
7. Calculating repayment plans for loans or mortgages.
8. To Find the average values
9. To find Maximum or minimum values in a specified range of data.
10. To analyze student Result

THE WORKBOOK
Workbook: Workbook is a Microsoft Excel window that is made up of several sheets. Excel is more of
textbook with series of page in it. The general name of Microsoft Excel is called “spreadsheet” and
the official name is called “workbook”. It file name are called Book, Book2, and Book3 …. Bookn
depend on the number of file that has already been saved. While a worksheet is a page in a
workbook, worksheet is the collection of multiple “Cells” that was arranged in a vertical and
horizontal series. The vertical arrangement of cells is called “columns” and the horizontal
arrangements of cells are “Row”.

WORKSHEET
Worksheet: A worksheet is a network of Cells formed as a result of intersection of Rows and Columns
parallel to each other in a workbook. Each sheet has links that appears at the bottom of an active
sheet called Tabs, with a default name, as follow (sheet1, sheet2, sheet3 . . . sheetn etc). You can add
and switch between worksheets by clicking each tab bellow

41
i. Cell: Microsoft Excel Cells are tiny textboxes found in a worksheet. Each Cell has a unique
address called Name located in a place called Name Box. There are two types of cells: Active and
Inactive cells.

ii. Active Cell: an active cell is that cell with a tick/bold rectangular border with a tiny square box
(Fill Box) at the bottom right Corner. It is usually a Computer focus and ready to accept Data.

iii. Focus: is to pay attention to a particular thing. Computer focus is the active portion or where
cursor is blinking while Human focus is the Pointer which changes it shapes depending where you
move it to in a worksheet.

iv. Inactive Cell: Inactive Cell is that cell which has no tick/bold border. You can change the Active
to Inactive by clicking deferent cell.

v. Column: Microsoft Excel Columns are Alphabetical order of Cells from left to right starting from A
to Z and then a combination of letters e.g. ABA, ABB till the last column XFD which amount to a total of
256 columns. To see the last column do this: Hold down a control key (Ctrl) along with right arrow
Key

vi. Row: Microsoft Excel Rows are horizontal arrangement of serial numbers of Cells from 1 to
1,048,576. To view the last Row, Hold down a control key (Ctrl) along with down arrow key.

vii. Name box: Name box is a Reference potion of an active cell which displays Cell address.

viii. Cell Address: Cell address is a combination of letter and number to represent a location of Cell
in a worksheet e.g. A3, F12, etc.

ix. Address Bar: is a potion of worksheet below a Ribbon that is use to enter data or formula to an
active cell. You can edit data through the Address Bar when a particular cell is activated.

Note: There are 256 numbers of columns in a worksheet; 1,048,576 numbers of Rows which rises to
268,435,456 Cells.

CHARACTERISTICS OF POINTER IN EXCEL WORKSHEET


We should all know that a pointer is when user uses mouse to interact with computer, and
something moves around the screen. In Excel worksheet the movement of this mouse changes the
shape to the list of below shapes depending on the point of intersection:

A B D E F
C 42
G H I J K

Pointer Point of contacts Use Method of


Application
A Active cell border To Move the entire content of Dragging
cell into deferent cell
B Border between To increase/decrease height Dragging
rows number of a Row
C Border between To increase/decrease width Dragging
columns of a Column
D Fill Box To copy/repeats the content Dragging
of one cell in to deferent
cell/cells
E All part of To click on object Click
worksheet except
cells area
F All cells except To select/high-light cell or Dragging
active cell range of cells
G On a Number To select/high-light the Click
address of cells entire Row
H On a letter To select/high-light the Click
address of cells entire Column
I Above the upper To separate/split worksheet Dragging
Arrow head of in to two in order to view
vertical scroll bar upper and lower part of it at
a time
J Right side of the To separate/split worksheet Dragging
arrow head of in to two in order to view left
horizontal scroll and right part of it at a time
bar
K Address bar and To edit text Double click
active
cell/textbox
Table: 1.0 Characteristic of Pointer

STARTING MICROSOFT EXCEL


How to start Excel
i. Go to left bottom of your Screen and

43
ii. 1 Click the start Button, a start menu pop up check if Excel icon is not on the list then.

iii. Click All program

iv. Scroll down to Microsoft office folder

v. Click again on the Microsoft office Excel 2007 application icon to launch it.

Here we are :

TABS

i. How to add New sheets/Tab:


You can also add more sheets by clicking next button after the last tab. In this case the last tab is

44
sheet3 and the new sheet will be sheet4.
ii. How to delete a sheets

 Right click on the Tab you want to delete

 Go to delete and click

ii. How to rename a sheets

Renaming a sheet can be a latter, Number, word or phrase. If you want your sheet name to be a
phrase e.g. ‘Abuja color’ then you should adopt the idea of underscore by adding _ in between the
words like ‘Abuja_color’ as the new name. the implication of not applying underscore is error due to
reference which shall be discourse in lesson 7 of this Book.
 Right click on the Tab you want to rename

 Go to rename

 Type the name of your choice

 Click enter key

iii. How to add color to a Tabs

 Right click on the Tab you want to color

 Go to tab color Note: color options display

 Click color of your choice

iv. How to hide/unhide Tab

 Right click on the Tab you want to hide/unhide

 Go to hide/unhide and click hide

 Or Unhide this will display a Menu containing a list of hidden sheet.

 Click which you intending to unhide.

v. How to Change position of Tab in the Tab menu

 Right click on the Tab you want to change position

 Go to move or copy.. and click it

45
 This will display a Menu containing a list of Tabs click which you intending to move.

Alternatively drag the tab to the tab before intending position.

vi. How to move a Tab to a new workbook

 Right click on the Tab you want to move

 Go to move or copy.. and click it

 This will display a Menu containing a list of Tabs

 in this case click on the arrow head and select new book

 Click Ok.

CONCEPT OF WINDOW, MENU AND DIALOG BOX


Window: A window is any rectangular frame that pup up immediately you click a file, a folder, an
icon or a program.It's important to understand how to move them, change their size, or just make
them go away.
Menu: This is just a list of command items in a small rectangle frame that can come up when you
right click on any place while working with Microsoft office. It does not have any command button
attached.
There are two type of menu
 List menu : is either an ordinary written text or an icons

 Dropdown menu: is a written text with an arrow head indicating an extension or sub items.

46
Example: start menu, office menu e.t.c.

Dialog boxes: A dialog box is a special type of window that asks user a question to answer before
performing next task, or provides you with information. You'll often see dialog boxes when a program
or Windows needs a response from you. Most of them contain option buttons to click

A dialog box appears if you exit a program without saving your work

Unlike regular windows, most dialog boxes can't be maximized, minimized, or resized. They can,
however, be moved. In addition all dialog boxes are window

COMMAND

Go to Microsoft office button at the top right Corner of your screen click to see the menu
i. Click on open. A window will appear
ii. Type or locate the file to open

iii. Click on Open button.

Open command
i. Click on office button

ii. Click on folder with a name Open

Note through Excel you can only open an excel file. The only file which has an extension name (.exlx).
Closing command
i. Click the office button while in the office menu

ii. Float down to Close folder and click on that.

OR

Click on button at the right of the screen.

47
Exit Command
i. Click on Office button

ii. Click on Exit Excel in the office menu window.

OR

Click on

CTEATING, OPENING AND SAVE WORKBOOK


Creating a new workbook:
A new worksheet can be created through a workbook while you are working on it. To create a
new workbook while typing:
i. Click on office button

ii. Click on New.

Note a blank page will display.


iii. Click on create.

Or (Ctrl +N )

Saving a workbook:
In this case saving a workbook is of two type: ‘Save As’ and ‘Save’
You can use ‘Save As’ when saving a new workbook. This mean that the workbook you are
working in has not being assign a name and it is to be saving for the first time. ‘Save As’ can
also be use when you want to save your work in another location either in Flash drive or in
Desktop. While ‘Save’ it is use to update an existing workbook in a particular location
usually in a location called Documents.
To Save As:
i. Click Office button

ii. Click on ‘Save As’ a location will be display with title header ‘ Libraries Documents ’

48
iii. Below you will see a bar title with a ‘File name’

iv. Change the name to your desire.

v. Click on ‘Save’ button or change where you want to save the document

.
To Save:
i. Click on Office button

ii. Click on ‘Save’ the Office menu will automatically disappear to show that it responded to
the command.

Or hold down control key and press S (Ctrl +S)

FORMATTING

Font :

a. Applying Bold text

How to bold cell


 Click on cell you intending to bold

 Go to font group

 Click on B in

How to undo bold cell


 Reverse previous steps

b. Applying Fill color

How to fill color in a cell

49
 Go to font group

 Click on cell you intending to fill

 Click on arrow head beside to select your choice

How to unfilled color in a cell


 Click on cell you intending to fill

 Go to font group

 Click on arrow head beside

 select ‘No fill’.

c. Applying Font color

How to add font color to a cell


 Click on cell you intending to fill

 Go to font group

 Click on arrow head beside to select your choice.

d. Applying font (font face)

How to change font


 Click on cell you intending to fill

 Go to font group

 Click on arrow head beside

 Scroll to select your choice.

e. Applying font size

50
How to change font size
 Click on cell you intending to change font size

 Go to font group

 Click on arrow head beside a figure

 Scroll to select your choice under font group.

f. Applying/Draw border

 Click on the cell you intending to change it border

 Go to font group

 Click on the arrow head beside this to select your desire border.

You can as well create new border, erased border, line style and color of your choice
through any of the above steps.
g. Text Alignment

a. Left, centre and right.

 Click on the cell you intending to align

 Go to alignment group

 Click on any of these under alignment group

Note: the one in red fill is the active one


b. Orientation (text direction)

 Click on the cell you intending change it direction

 Go to alignment group

 Click on the arrow head beside to see option

 Click your desire text direction.

c. Merge cells

51
 Select the cells you intended to merge

 Go to alignment group

 Click on ‘merge & centre’

How to unmerge cells


 Select the cells that are merge

 Click on ‘merge & centre ‘ again

Applying style

Conditional format

 Select the Range of cells you intended to apply condition

 Go to styles group in the Home Menu

 Click on Conditional Formatting arrow head to choose from the list

 Float Highlight Cells Roles

 Click on Greater than a dialog box will appear

 In the text box blinking a cursor, set a condition value of your desire.

 At the right hand side of that text box is a list box with multiple choice of color

 Select any color of your choice.

 Click OK

Remark: the number you set in a text box is the condition you give to set color in the cell you
are working with. If the content of that cell is greater than the value you gave as criteria the
cell will automatically change to conditional color you set.
Format as table

 Select the cells you intended to format as table

 Go to styles group
52
 Click on the small arrow head beside ‘format as table’

 Click on any of the table provided, this will take effect on the highlighted cells.

(i) Deleting Content of a cell

 Select the cell/cells

 Go to cells group

 Click on delete

Alternatively
 Click on the key board or

 Right Click the cell then

 Click on delete

(ii) Copy, pest and Cut contents of cells


 Select the cell/cells

 Right click the cell

 Click on copy/cut

 Go to where you want the contents to appear

 Right click and click pest.

Iii Editing content of a cell


 Double click on the cell. Note: a blinking cursor appear

 Type in your desired

 Click Enter

(iii) Resize Column/Row


 Select Column/Row

 Move a pointer to right edge of the selected column until the cursor turns to cross

 Hold and drag it to the right

53
 Free the dragging

(iv) Freezing Column/Row


 Click the column you wish to freeze

 Go to view menu

 Under window group click on arrow head of freeze icon

 Click on freeze panes.

 Repeat the same step to unfreeze

(v) Hide/unhide column/row


 Right Click on the column/row

 Click on hide/unhide

COMMON ARITMETIC AND FUNCTION

Arithmetic Operation:

i. Addition (+), Subtraction (-), Multiplication (*) and Division (/) are the common arithmetic
operators we listed in the previews lesson. The operations of these are common in daily
basis.

Excel consists of numerous cells in which each of the cells has addresses. Each time a user
type an address is equally making a reference to the content of excel.
Example: Addition and subtraction of numbers
If 4+3=7. In excel assuming 4 and 3 are entries in cell addresses A2 and B2 respectively. To
get this result in excel type (=A2 + B2) in a separate address e.g. C2. Likewise subtraction,
multiplication and division.
Steps on how to add two/more number in excel
 Select the cell you wish to enter the first value

 Enter the first value in the first cell

 Select the cell you wish to enter the second value


54
 Enter the second value in the second cell

 Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value

 Press Enter key

Repeat the above steps for multiplication, subtraction, division.

ii. Addition and Subtraction of Number less than one

Whole Number: these are numbers that are standard /complete. They can be 1, 2, 3 e.t.c.
Whole number, zero or negative number like -1, -2, -3 e.t.c. e.g. A whole Apple or Orange that
is not yet been cut to pieces. In the other way one Apple or one Orange can be referred as 2
or 3 or 8 even 1000 if it is complete. In the other way round number less than one are:
Decimal points, Fraction and Percentage.

DECIMAL POINTS:
Decimal points: these are number that have dot in between them which shows that is part of
whole number. They are like 5.23, 0.7 etc.
Steps on how to add two/more Decimal numbers in excel
 Select the cell you wish to enter the first value

 Enter the first Decimal value in the first cell

 Select the cell you wish to enter the second value

 Enter the second Decimal value in the second cell

 Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value

 Press Enter key

FRACTION:
1 1 1 2 2 5
Example (1) + = . Example (2) + =1
3 3 15 3 5 6
For excel to do this for you follow the steps bellow:
1
 Enter Equality sign and in one cell
3

55
1
 Enter in another cell
2

 Enter equality sign in the third cell follow the cell address of step 1.Addition or
Multiplication sign and cell address of step 2,

e.g.
 Click enter

In addition:
5/6 will be the result of example 1while
11/15 will be for example 2
Note that was not eleven over fifteen, it is one whole number one over fifteen.
PERCENTAGE:
Example1
10% refers to 10 portions out of 100.
Example2
30% +20% = 50%, this result mean it’s not yet a whole number .i.e. half of a given figure or
item.
Example3
69% + 31 = 100% one hundred percent is a whole figure or item which is reference to.
CONVERSION OF PERCENTAGE TO NUMBER:
Example 25% is spent out of 1000. What is the Amount spent?
Solution
25
X 1000 = 250
100
For excel to do this for you follow the steps bellow:
25
 Enter Equality sign and in one cell
100

 Enter 1000 in another cell

 Enter equality sign in the third cell follow the cell address of step 1 Multiplication sign
and cell address of step 2

 Click enter

56
CONVERSION OF NUMBER TO PERCENTAGE:
Example 500 out of 8000
Solution
500
X 100 = 6.25 %
8000

For Excel to do this for you, follow the steps bellow:


500
 Enter Equality sign and in one cell
8000

 Enter 100 in another cell

 Enter equality sign in the third cell follow the cell address of step 1, Multiplication sign
and cell address of step 2

 Click enter

Practical:
Mr. Bello spent 35% out of 2500 he realised from barbing. How much is the money he spent.
Solution
35
Step 1, enter =
100

Step 2, click enter key

Step 3, type in 2500 in next cell

57
Step 4, click enter
Step 5, type = A1*B1in the next cell

Step 6, Click enter key

The Result is: 875

Explanation
Mr. Bello spent 875 from 2500 he realized from barbing Saloon.

5.5 ALGEBRAIC
Scientific calculation like addition of superscript and subscript result to error in excels
which we are going to treat that in subsequent lessons.
Example:
22 + 33 or 2^2 + 3^3 and 22 + 33 these well result to error like this #VALUE!
This is the kind of Error we are going to look up to in Lesson 7
5.6 AUTO FILL
Auto fill: is to quickly fill in several cells with the same content or format of the selected
cell/cells. You can select cells and drag the fill handle of the active cell to any

58
direction. To use the fill handle, you select the cells that you want to use as a basis for filling
additional cells, and then drag the fill handle across or down the cells that you want to fill.
Example 1: To auto fill week days
 Type in Monday or Mon

 click at the fill handle

 Drag it down or across

Example 2: To auto fill series of numbers


 Type in the first and second series numbers

 Highlight the entries

 click at the fill handle

 Drag it down or across

5.7 FUNCTION
i. SUM: it is a techniques used to add range of cells.

 Select where you want to sum range of number

 Type equality sign

 Type in Sum

 Type in left parenthesis e.g. (

 Click arrow to the direction of the first value to activate the first Cell

 Press and hold SHIFT Button

 Click on colon :

 Click on arrow to the direction of the last value to activate the second Cell

 Type in right parenthesis e.g. )

 Press Enter key

Your formula should look similar to something like this ‘=SUM(A1:A9) or SUM(=A1 :F9)’
depending on vertical or horizontal arrangement of Data.

Alternatively:
59
 Select where you want to sum range of number

 Type equality sign

 Type sum

 Type test parenthesis

 Type in the first address in the range

 Type in colon e.g. :

 Type in the last address of the last cell in the range

 Type right parenthesis

 Press Enter key.

Approach in Summing Data


There are two approaches of summing Data known as adjacent and non-adjacent:
The adjacent approach of summing Data is when Data are sum from one Column or one Row
in to one cell; while non-adjacent is when Data are sum from two or more Rows ore Columns
in to one cell.
Examples of Adjacent approaches are:

Column format in adjacent summation

Row format in adjacent summation

60
Examples of Non-Adjacent approaches are:

Column format in non-adjacent summation

Row format in non-adjacent summation

61
ii. AVERAGE: Average is the arithmetic mean, and is calculated by adding a group of
numbers and then dividing by the count of those numbers. For example, the average of 2, 3, 3,
5, 7, and 10 is 30 divided by 6, which is 5.

 Click a cell below or to the right of the numbers for which you want to find the average

 On the Home tab, in the Editing group, click the arrow next to AutoSum , click Average,

 and then press ENTER

Alternatively:
 Enter all the number in which you intended to get their average in several cells each.

 Type in quality sign in the cell in which you want to the average to appear

 Type average

 Click on SHIFT Button then

 Click on the left Parenthesis Button e.g. (

 Select the first cell in the range

 Click on colon button e.g. :

 Click on the right Parenthesis Button e.g. )

 Click on Enter Button

Your formula should be similar to ‘=Average(A1:A9) or Average(=A1 :F9)’. Either vertical or


horizontal arrangement of Data.
Apply the same techniques above for Count Number, Max and Min function.
Note: Max and Min are short form of maximum and minimum number respectively.

62
The formula should also look like this =Max(A1:A9), =Min(A1:A9), =Count(A1:A9). In this case
count helps to count non-empty cells.
5.8 RANKING:

Returns the rank of a number in a list of numbers. The rank of a number is its size relative to
other values in a list. (If you were to sort the list, the rank of the number would be its
position.)
Ranking is mostly use to assign position for students in the class.
Syntax
=RANK(Number,Ref,Order)
Number: is the value you want to find its position.
Ref is an array or range of cell. .e.g. A1:A9 which mean the whole class
Order is a number specifying how to rank number base on ascending order or descending
order, .i.e. the height value will be assign first position and lowest will be assign last
position.
If order is 0 (zero) or omitted, Microsoft Excel ranks number as if ref were a list sorted in
descending order.
If order is any nonzero value, Microsoft Excel ranks number as if ref were a list sorted in
ascending order.
Example
A
1 Data
2 7
3 3.5
4 3.5
5 1
6 2
Formula
=RANK(A3,A2:A6,0)
=RANK(A3,A2:A6,1)
Description (Result):
Position of 3.5 in the list above (3) if using first formula
Position of 7 in the list above (5)
How to do Ranking in excel

63
 Enter the number you want to rant in a column

 Go to the next column the first adjacent cell to the first entry number

 type = Rank(‘cell address’, ‘range‘, ‘select 1’)

 Click Enter

5.9 DATE AND TIME FUNCTION:

There are two type of date the system and manual dates. Manual date/time is static while
system date/time changes each time you launch window. These will give you the idea of
counting certain event.
How to insert manual date/time function:
 Select where to insert date/time

 Press on equality sign key

 Type date/time follow by

 Press SHIFT button follow by left parenthesis

 Note: a format display indicating ‘year, month, day’

 Enter the year/hour then comma

 Enter the month/minute then comma and

 Enter the day/second

 Press SHIFT button follow by right parenthesis

 Press Enter key

How to insert system date/time function:


 Select where to insert date/time

 Press on equality sign key

 Type ‘Now’ or ‘Today’

 Press SHIFT button follow by left parenthesis

 Press SHIFT button follow by right parenthesis

64
 Press Enter key

Note: ‘Now ()’ function gives date and time while ‘Today ()’ function gives only date.

CELLS REFERENCES

Create a cell reference on the same worksheet:

 Click the cell in which you want to enter the formula.

 In the formula bar , type = (equal sign).

 Do one of the following:

Cell reference To create a reference, select a cell or range of cells on the same worksheet.
Cell references and the borders around the corresponding cells are color-coded to make it
easier to work with them.

 The first cell reference is B3, the color is blue, and the cell range has a blue border with
square corners.

 The second cell reference is C3, the color is green, and the cell range has a green border
with square corners.

You can drag the border of the cell selection to move the selection, or drag the corner of the
border to expand the selection.
 Press Enter key

Create a cell reference to another worksheet:

You can refer to cells that are on other worksheets by appending the name of the worksheet
followed by an exclamation point (!) to the start of the cell reference.

65
 Click the cell in which you want to enter the formula.

 In the formula bar , type = (equal sign).

 Click the tab for the worksheet to be referenced.

 Select the cell or range of cells to be referenced.

Note If the name of the other worksheet contains non-alphabetical characters, you must
enclose the name (or the path) within single quotation marks (').
Create a cell reference to another workbook

You can refer to cell that are on other workbook by opening the workbook you intended to
reference to side by side with the workbook you are working on. Let for instant you working
on Book1 and Book2 is the reference book all what you need to do is by:

 Make show both workbook are opened (e.g. Book1 and Book2)

 Click the cell in Book1 in which you want to make a reference.

 Click the Book2.

 Locate the cell in which you want to get it content, and click on it

 Click enter

Note the content of the cell you just click in Book2 will be coped to Book1. And the formula
look similar to this =[Book2]Sheet1!$A$1.
Change a cell reference to another cell reference

 Double-click the cell that contains the formula that you want to change. Excel highlights
each cell or range of cells with a different color.

 Do one of the following:

 To move a cell or range reference to a different cell or range, drag the color-
coded border of the cell or range to the new cell or range.

 To include more or fewer cells in a reference, drag a corner of the border.

 In the formula bar , select the reference in the formula, and then type a
new reference.

 Click ENTER.

66
67
CSC 300 LECTURE NOTE 6

DATABASE

Data: Data is the raw material that can be processed for any computing machine e.g employee
name, product name, name of the student, marks of the student, any number, image.

Information: It is the data that has been converted into more useful or intelligible form e.g
report card sheet.

Why we need information

i. In gain knowledge about the surroundings

ii. To keep the system up to date

iii. To know about the rules and regulation of the society

Knowledge: Human mind purposefully organize the information and evaluate it to produce
knowledge e.g 38 in a data and marks of student is information and the hard work require
getting mark in knowledge.

Knowledge

Fact based Holistic based

i. Fact based: The knowledge gain from fundamental and through experiment and
great judgment likes hypothesis

Differences between data and information

S/NO DATA INFORMATION


1. Data is the raw fact It is the processed form of
data
2. It is not significant to a business It is significant to a business
3. Data are Atomic level piece of information It is collection of data
4. Data does not help in decision making It help in decision making

68
5. E.g product name, name of students E.g report card sheet

Database: The related information when placed in an organized form makes a database or an
organized collection of related information is known as database e.g Dictionary, Telephone
Directory, Mobile contact.

Operations perform on database

i. Insertion

ii. Updation

iii. Deletion

iv. Retrieve

v. Sorting

Differences between traditional file system and database

Traditional file system: A file system is the method of storing and organizing the computer files
and the data they contain to make it easy to find and access.

Characteristic of file system

i. It is a group of files for storing the data of an organization

ii. Each file is independent from one another

iii. Files are design by using the program written in programming language such as c,
c++

Limitation/Disadvantages of file processing system

i. Separated and isolated data

ii. Duplication of data: It cost time and money

iii. It takes up additional storage space

69
iv. It can lead to loss of data integrity

Database: is an organized collection of related files in a computer system using a specialized


software.

Building block of database

i. Column/fields/attributes. Eg Regno, Course Code, PhoneNo Etc

ii. Rows/Records/data. Eg 12, unibuja road, Gwagwalada, 08069719601

iii. Tables. Eg semesterResult, BankStatement

DBMS (Data Base Management System): It is the software system that allows the user to define,
create, maintain the database and provide control access to the data.

Application of Database

i. Library system

ii. Banking system

iii. ATM

Examples Database: Mysql, oracle, sql services, DB2, Microsoft Access

Components of DBMS

1. Hardware: The hardware is the actual computer system used for keeping and accessing
database. Conventional DBMS hardware consists of secondary storage devices such as
hard disk. Database run on the range of machine from micro computers to mainframes.

2. Software: Software is the actual DBMS between the physical database and the users of
the system. All they request from the user for accessing the database are handled by
DBMS.

3. Data

4. User: There are a number of users who can access or retrieve the data on demand using
the application and the interfaces provided by the DBMS.
70
The users of the database can be classified into the following groups.

i. Naïve users

ii. Online users

iii. sophisticated users

iv. Application programmers

v. DBA- Database administrator

Naïve Users: Those users who need not be aware of the presence of the database system. They
work through a menu driven application programs, where the type and range of response is
always indicated to the users.

2. Online users: Those users who may communicate with database directly through an
online terminal or indirectly through user interface and application program.

3. Sophisticated users: They are those users who interact with the system without writing
the program instead they form their request in database query language.

4. Application programmers: Those users who are responsible for developing the
application programs or user interface. The application programs could be written in high level
language.

5. DBA-Database Administrator: It is a person or a group in-charge for implementing the


database system within the organization. The DBA has all the privilege allowed by the DBMS and
can assign or remove the privileges from the users.

Database Language

 Data Definition Language (DDL): It is a language that allows the user to define the data
and their relationships. Other types of data command are;

i. Create

ii. Alter

71
iii. Rename

iv. Drop

 Data Manipulation Language (DML): It is a language that provides a set of operation to


support the basic data manipulation, Operation on the data held in the database
command used are:

i. Insert

ii. Delete

iii. Select

iv. Update

 Data Control Language (DCL):command are:

i. GRANT

ii. REVOKE

Database Schema: The overall design of the database is called schema or Description of
database.

Subschema: It is the subset of the schema; and it inherits the same property that a schema has.
It gives the users a window through which he/she can view only that part of database which is
of interest to him/her.

Architecture of DBMS

There are three levels

i. External level

ii. Conceptual level

iii. Internal level

Objectives of the three level architecture

72
The objective is to separate each user’s view of the data from the way the database is physically
represented.

External level/view level: This level describes that part of the database that is relevant to each
user. This insulates the users from the details of conceptual and the internal level.

The internal structure of the database should be unaffected while changes to the physical
aspects of storage

The DBA should be able to change the conceptual structure of the database without affecting all
other users.

Conceptual level/logic level: The level describes what data is stored into the database and the
relationship among the data. It represents:

a. All the entities, attributes and their relationships

b. The constraints on the data

c. Security and integrity information /storage level

The conceptual view is defined by conceptual schema, which describes all the entities,
attributes and their relationship with the integrity constraints.

There is only one conceptual schema and internal schema per database and more than one
external schema.

Note: Instance/Extension of database

Internal level: It is the physical representation of the database on the computer. This level
describes how the data is stored in the database. It covers the data structure and file
organization used to store the data on storage devices.

Schema and its types

External schema: The external view is described by means of a schema called external schema
that corresponds to different view of the data. For example two users may be viewing two
separate views of the same database of a studentResults in a database system.

73
Mapping between the levels:

i. External/conceptual mapping

ii. Conceptual/internal mapping

External/conceptual mapping: Each external schema is related to the conceptual schema by


external conceptual mapping. This mapping gives the correspondence among the records and
the relationships of the external and conceptual views. There is a mapping from a particular
logical record in the external view to one or more conceptual record in the conceptual view.

Conceptual/internal mapping: Conceptual schema is related to internal schema by conceptual


internal mapping. Mapping between the conceptual and internal level specify the method of
deriving the conceptual record from physical database.

End
users External Schema B

External External View External View External/Conceptual


schema Mapping

Conceptual Conceptual View


schema DBMS

Data independence Conceptual/Internal


Mapping
Internal Internal View
schema

i. Logical data independency

ii. Physical data independency

Logical data independency: it indicates that the conceptual schema can be changed without
affecting the existing external schema. Logical data independency is much more difficult to
achieve than physical data independency as it requires the flexibility in the design of the
database and programmer has to see the future requirements or modification in the design.

Physical data independency: It indicates that the physical storage structure or devices can be
changed without affecting the conceptual schema. The change would be absorbed by the

74
conceptual internal mapping.

Components of DBMS

 Data: It is the most important component of DBMS environment from the end users point
of view.

One of the major features of database is that actual data are separated from the
programs that use the data. A database should always be designed, built and populated
for a particular audience and for a specific purpose.

 Procedures: Procedures refer to the instructions and rules that govern the design and
use of the database. The user of the system and the staff that manage the database
require documented procedures on how to use or run the system.

Disadvantages of DBMS

 Complexity: The provision of the functionality that is expected of a good DBMS makes the
DBMS an extremely complex piece of software database designers, developers,
database administrators and end-users must understand this functionality to take full
advantage of it. Failure to understand the system can lead to bad design decisions,
which can rare serious consequences for an organization.

 Size: the complexity and breadth of functionality makes the DBMS an extremely large
piece of software, occupying megabytes of disk, space and requiring substantial
amount of memory to run efficiently.

 Performance: A file based system is written for a specific application such as invoicing.
A result performance is generally very good. However the DBMS is written to be more
general to cater for many applications rather than just one.

 Higher impact of a failure: The centralization of resource increases the vulnerability of


the system since all users and applications duly on the availability of the DBMS, the
failure of any component can bring operation to a halt.

 Cost of DBMS: The cost of DBMS varies significantly depending on the environment and

75
functionality provided. There is also the recurrent annual maintenance cost.

File management e.g C++ or COBOL Database management e.g oracle or


program
Sybase
1. Small system Large system
2. Relatively cheap Relatively expensive
3. Few files Many files
4. Files are files Files not necessarily files
5. Simple structure Complex structure
6. Little preliminary design Vast preliminary design
7. Integrity left to application programmer Rigorous inbuilt integrity checking
8. No security Rigorous security
9. Simple, primitive Complex & sophisticated
backup/recovery
10. Often single user Multiple user

Role of DBMS (Database Administrator): It is a person or group in charge for implementing


DBMS in an organization. The DBA job requires high degree of technical expertise. DBA consist
of a team of people rather than just one person.
Responsibilities of DBA

 Makes the decision concerning the content of the database

 Plans the storage structure and access strategy

 Provides the support to the users

 Defines the security and integrity checks

 Interpret backup and recovery strategies

 Monitoring the performance and responding to the changes in the requirements.

PRACTICAL SOFTWARE TO IMPLEMENT THE DATABASE IS MS. ACCESS

76
77
Department of Computer Science
Faculty of Science
University of Abuja
CSC300:

Lecture 7
Title: Microsoft Powerpoint

Description:

PowerPoint is a presentation program developed by Microsoft. It is included in the standard


Office suite along with Microsoft Word and Excel (techterms.com, 2008).
Powerpoinnt uses slides in displaying the work to be presented. Slides are the building block of
a presentation. PowerPoint is the presentation program in the Microsoft Office suite that allows
one to create amazing slide presentations that can integrate images, video, narration, charts,
and more. Whether an idea is being introduced to the boss or delivering a speech at a
conference, an engaging presentation will help reach the target audience and emphasize
important message. Powerpoint presentation is used in seninars, conferences, workshops etc
to highlight important points to the target audience.

Objectives:

Students will learn:

1. Some basic slide terminologies


2. To create a standard slide
3. To add text to a standard slide
4. To insert an image to a standard slide
5. To insert date and time to a standard slide
6. To make a presentation to a target audience

Requirement

Students are expected to have basic knowledge of Microsoft word or any other word (text)
processing software.

7.0 Introduction

Microsoft PowerPoint is a software product used to perform computer-based presentations.


There are various circumstances in which a presentation is made: teaching a class, introducing
a product to sell, explaining an organizational structure, etc. Microsoft powerpoint
presentations may be made using various Microsoft powerpoint versions. The common
versions include Microsoft powerpoint 97-2003, Microsoft powerpoint 2007, Microsoft
powerpoint 2010, Microsoft powerpoint 2013.
However, there exist similarities among various versions. These versions are dependent on the

78
Microsoft Office Suite in which the Microsoft powerpoint belongs. It is interesting to note that
any student who can work with any version of Microsoft powerpoint can as well work with any
other one because of their similarities. There is no doubt that there are some differences
between the various versions of Microsoft powerpoint. In case of difficulties as a result of some
differences, manuals for various versions may be consulted. These manuals may be
downloaded from Microsoft website

7.1 Some basic slide terminologies

Slide layouts contain formatting, positioning, and placeholders for all of the contents that
appear on a slide.
Placeholders are the containers in layouts that hold such content as text (including body text,
bulleted lists, and titles), tables, charts, SmartArt graphics, movies, sounds, pictures, and clip
art.
Clip art is a single piece of ready-made art, often appearing as a bitmap or a combination of
drawn shapes. According to Wendy (2014), design themes make it easy to coordinate
PowerPoint presentation with colors, graphics and fonts that all work together to create a mood
for a presentation. Even though different types of slide layouts are used for different aspects of
your topic material, the whole presentation works together as a attractive package
Slide theme is a set of colors, fonts and effects that is used in a file. A theme may be defined as
a set of visual attributes that is applied to elements in a file as well as the background of a slide.
Figure 7.2 below shows a slide layout:

Figure 7.1: A slide layout

Figure 7.1 above shows all the layout elements that can be included on a PowerPoint slide
PowerPoint includes nine built-in slide layouts. Though, one can create custom layouts that
meet one’s specific needs. However, a standard (default) slide comes with only two layouts
(title and subtitle placeholders).

7.2 Creating a standard Slide

The creation of Microsoft powerpoint slide is dependent on the particular Microsoft Office in

79
use. In this work, Microsoft powerpoint 2010 is to be deployed as the case study.

In order to create a powerpoint standard slide for presentation, the following steps may be
used:

1. Open Microsoft PowerPoint.


2. Locate and click “File” at the top of the screen
3. Locate and click Click “New” and Blank presentation would be highlighted
4. Locate and click “Create” below the Blank presentation displayed at the top right of the
screen

These steps would display a standard blank slide as in figure 7.2 below:

Figure 7.2: A Standard Blank Slide

Rather than create a powerpoint from the scratch, one may use a design template and modify it
to suit the purpose. Microsoft PowerPoint’s pre-defined slide design templates allow for
attractive and consistent design of slides in a presentation(Regents of the University of
Minnesota, 2010)

7.3 Adding Text to a Standard Slide

Adding text to slide may be carried out directly by typing the text on the slide. In figure 7.2 above,
clicking on “click to add title” or “click to add subtitle” would allow direct typing of text on the
slide. Figure 7.2 (a) below shows typing text directly on the slide.

80
Figure 7.2 (a): Direct Typing of Text

Another way of adding text to a slide is by copying already typed text and pasting on the slide.
This can be demonstrated in figure 7.2 (b) below:

Figure 7.2 (b): Copying the highlighted Text

The already typed words are copied from Microsoft word and pasted on the powerpoint slide as
shown in figure 7.2 ( c) below:

Figure 7.2 ( c): Copied from Microsoft Word and Pasted on Slide

81
After the already typed text is copied from Microsoft Word, a cursor is placed at the point on the
slide where the text should appear.

7.3 Inserting Image to a Standard Slide

An image is a picture that is produced by a camera, artist, mirror or any other means. To insert a
picture image, the following steps should be followed:
1. Open the slide to insert the picture image
2. Locate and click “Insert”
3. Locate and click “Picture”
4. Select the picture image and open it accordingly.
5. Resize the picture image as desired

The first step to insert a picture element in a powerpoint slide is open the desired slide where
the picture element is to be inserted.
Figure 7.3 (a) below shows how University of Abuja logo image in form of a picture can be
inserted in a powerpoint slide.

Figure 7.3 (a): Powerpoint Slide to insert a Picture

After the powerpoint slide is opened, the Insert is located on the powerpoint screen as is
illustrated in 7.3 (b) below:

7.3 (b):Highlighting the Insert Menu to Insert an Image

82
This is followed by locating and clicking “Picture” which enables one to choose the picture to
be inserted from the location where such picture is stored on the disk. By opening the “picture”
the image appears on the powerpoint slide. Figure 7.3 (c) below shows University of Abuja logo.
Below the logo, there is provision to add notes to the picture image. This note may be used to
describe the image. The note shows that the image is University of Abuja logo

7.3 (c): Insertion of University of Abuja Logo on a Slide with Note

Apart from the above method of using insert to create a powerpoint slide, the copy and paste
commands can be deployed to achieve the same result.

7.4 Insert Date and Time to a standard slide

The same way an image can be inserted on a slide, so also date and time may also be inserted.
To insert date and time in the previous slide (figure 7.3(c) above, the following steps is followed:
1. Open the slide
2. Click Insert
3. Locate and click Header & Footer
4. Check the Date and Time box
5. Click the pull-down arrow and choose the desired Date and time
6. Click Apply or Apply to All as the case may be.

The first step in adding date and time to a slide is to open the slide. This is shown in figure
7.4(a) below:

83
7.4 (a): University of Abuja Logo on a Slide with Note

After opening the slide in which date and time is to be inserted, then the Insert command is
clicked and Header & Footer located. This is shown in figure 7.4 (b) below:

Figure 7.4 (b): Clicking Insert Command and Header & Footer Located

The next step would be check the Date and Time box and pull down the arrow to select the
appropriate date and time desired. This can be illustrated as in figure 7.4 (c ) below:

84
Figure 7.4 (c): Clicking Insert Command and checking the date and time box

Clicking on Apply to All would insert the selected date and time as is seen in figure 7.4 (d) below:

7.4 (d): Date and Time Inserted on a slide


Rather than selecting Apply to All, one may select Apply to have the chosen date and time
format appear only on the particular slide.

7.5 Making Presentation to a target Audience

When all the slides are put together, then the presentation will be made to the audience. The
steps below are needed to achieve that:

1. Locate and click on the Slide Show on the menu


2. Choose from the beginning or from current slide

The above two steps would enable the presentation to be displayed on a wide screen to the
target audience. If the computer is connected to a projector, the presentation is then projected
to the wall for a wider view.

85
Practice Problems

1. Define the following:


i. Placeholder
ii. Clip art
iii. Slide theme
iv. Slide
2. Create a similar powerpoint slide as in figure 7.3 (c ) and add notes to it
3. Use the copy and paste commands to display your picture in a powerpoint slide and add
your name and department as notes to the slide.
4. Make a presentation on your favorite topic on any of the courses you offered last
semester.
5. State the use(s) of a presentation software.
6. Mention any two ways in which text can be added to a slide.

References
1. Justin Seeley, Good Presentation Design Examples: PowerPoint and Keynote,
http://www.lynda.com/Keynote-tutorials/Examples-good-presentation-design/124082/

2. GCF Learnfree.org, PowerPoint 2013, http://www.gcflearnfree.org/powerpoint2013/

3. FunctionX, Inc., 2004-2007, Introduction to Microsoft PowerPoint,


http://www.functionx.com/powerpoint/Lesson01.htm

4. Wendy Russell (2014), What is a Design Theme?,


http://presentationsoft.about.com/od/d/g/designtheme.htm

5. techterms.com (2008), PowerPoint Definition,


http://techterms.com/definition/powerpoint

6. Regents of the University of Minnesota (2010). Use a Pre-defined PowerPoint Slide


Template, http://accessibility.umn.edu/use-a-pre-defined-powerpoint-slide-
template.html

86

You might also like