CSC300 Lecture Notes
CSC300 Lecture Notes
Faculty of Science
In this lecture, the following an overview of the following topics will be presented:
5. History of computers
6. Computer applications
8. Computer security
9. Microsoft Word
Data is an unprocessed facts and figures, which at a glance do not have any meaningful interpretation or
analysis. Information represent data that have been processed, interpreted in order that it has meaning
for the consumer. Knowledge combines information, experience and insight that may be beneficial to
the individual or organization. In practice, there is no clear distinction between data and information
and there are sometime used interchangeably. Common forms of data are numbers, texts, pictures,
audios and videos.
A data can either be discrete (countable finite representation) or continuous (non-finite representation,
typically in a number line).
Numbers are generally used to represents objects (numbers, texts, pictures, audios and videos) and can
either by an integer (whole) or floating-point (real with a radix point). Examples: 758 (integer), 9.56
(floating point), 89.0 (floating point), 2.3e-3 (floating point using scientific notation)
Depending on the allowable digits, numbers are commonly represented in decimal (base 10, using digits
0,1,…,9, only), binary (base 2, using digits 0 and 1 only), octal ( base 8, using digits 0,1,2,…,7) and
hexadecimal (base 16, using digits, 0,1,2,…, 9, A,B,C,D,E,F).
Examples: 819 (base 10), 1110011 (base 2), 634110 (base 8) and 0xEA0F (base 16). Note that the prefix 0x is
used to hexadecimal numbers.
Recognizing the relationship between binary and hexadecimal can facilitate easy conversion between
two bases. (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F) in base 16 equal to (0000, 0001,
0010,0011,0100,0101,0110,0111,1000,1001,1010,1011,1100,1101,1110,1111) in binary. Therefore 0xA1C in
hexadecimal is equivalent to 101000011100 in binary. 110001010 in binary is equivalent to 0x18A in
hexadecimal.
A computer is a programmable electronic device that can store, retrieve, and process data.
3. Hardware Components
Hardware if the tangible or physical parts of a computer: input devices, output devices, memory devices,
processing devices
Input devices: keyboard, mouse, are joysticks, touchscreens, pen devices, character recognition, voice
recognition, barcode readers, universal serial bus (USB) drives, hard disks (HDs) and compact disks
(CDs)
Output devices: monitor, speaker, printer, headphone. A printer can either be an impact or non-impact
printer.
Memory devices: volatile – Read Access Memory (RAM); non-volatile – Read-Only Memory (ROM),
secondary storage devices – hard drives, DVD/CDs, flash drives
The capacity of memory is measured in bytes. 1 byte is equivalent to 8 bits. 1 kilobyte (kb) = 1024 bytes, 1
megabyte (mb) = 1024 kbs, 1 gigabyte = 1024 mbs, etc.
Common manufacturers of processing devices (CPU) are Intel and AMD. Examples of CPUs are Intel
Pentium, Intel i5 Quadcore, etc.
The speed of the processor is measured in hertz (hz is equivalent to one clock cycle – i.e., time to
complete 1 machine instruction cycle). 1 kilohertz = 1000 hz, 1 megahertz = 1000khz, 1 gigahertz =
1000mghz
4. Software Components
Software is the logical, non-tangible or non-physical unit of a computer. Software are a collection of
programs that are used to run a computer. A software is either a system or application software. A
system software operates and controls computer hardware and it is either an operating system
software or a utility software.
Examples of operating system software are Windows OS, Mac OS, Unix/Linux OS, Windows Mobile, iPhone
OS (iOS), Windows NT, Android.
Examples are utility are BIOS, virus protection software
5. History of Computers
The history of computers spans the pre-mechanical era (ancient era), mechanical era, electro-
mechanical era and modern era.
Ancient era is marked by counting devices, Abacus and tally sticks
During the mechanical era, adding machine was discovered by Blaise Pascal (1642), Leibniz
(1690). Difference machine by Charles Babbage (1822), Analytic machine by Charles Babbage
and Augusta Ada Byron (1833). Babbage is regarded as the father of modern day computers.
In the electro-mechanical era, also called the vacuum tubes era, electrically-based computer devices
were developed: Herman Hollerith (1890), Howard Aiken (1936), John Atanasoff (1930), John
Mauchly and J. Presper Eckert (1946).
Modern era is characterized by vacuum tubes and digital computers. This era is classified into
generations: first-generation (1943-1958, vacuum tubes, Universal Automatic Computer
–UNIVAC, Electronic Numerical Integration Computer-ENIVAC); second-generation (1959-1964,
transistors-based computers); third-generation (1965-1970, integrated circuits), fourth-
generation (1971-1989, large-scale and very large scale integrated circuits); fifth-generation
(1990-present, high performance computing, smart devices,
6. Computer Applications
During the past few decades, computers and electronic technologies have been incorporated
into almost every aspect of society. Areas of applications include, but not limited to, business,
banking and finance, government, education, marketing, insurance, healthcare and medicine,
engineering design, military, home, manufacturing, agriculture, workplace, scientific research,
recreation and entertainment.
7. Mobile devices and applications
Mobile computing is the next evolution in the development of computing systems. Mobile
Computing is the use of portable computing devices (such as laptops, tablets, smartphones) in
conjunction communication technologies that allow transmission of data, voice and video
usually over a wireless network. The following wireless networks support mobile computing:
Wireless Personal Area Networks (Bluetooth, Sensors, etc.); Wireless LANs (802.11 family); Fixed
Wireless (e.g. CDMA); Cellular networks - 1G to 5G; and Satellite systems.
Mobile hardware: portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.
Mobile operating systems software: Android (from Google), iOS (from Apple Corp.), Blackberry
OS (from RIM), Windows Mobile (from Microsoft).
8. Computer Security
Computer security involves the process of protecting assets to ensure confidentiality, integrity
and availability. Confidentiality implies that only authorized users can view assets; integrity
implies only authorized users can modify assets; and availability implies authorized users are
able to use and have access to assets
Control measures for confidentiality include access control, authentication and identification.
Identification is the action or process of asserting one’s identity. Authentication is the act of
establishing or confirming that one actually is who he or she claims to be. A commonly used
authentication method is password. A password is an agreed-upon word, phrase, or set of
characters that is presumed to be known only by the user and the system.
Strong authentication utilizes:
Something the user knows, e.g., password, PIN, mother’s maiden name, etc.
Something the user has, e.g., physical key, ID badge, driver’s license, security token, etc.
Educate yourself. Organizations provide internal security training for all employees.
Be skeptical. You should treat anything you see online with a high degree of skepticism.
Check privacy policies & settings. Make sure you understand them, as they likely explain if
your information is shared with other parties.
Good passwords. Use good, strong passwords. If possible, the password should contain letters
and numbers, as well as special characters.
Protect the password. You should never share your password with others.
Stay updated. Always ensure that the software you use is up-to-date.
Microsoft Word is an example of an Word Processor. Word Processors are used for word
processing, that is, used for creating and editing text based documents such as memo, letters,
newsletters, minutes, projects etc ).
Microsoft Word belongs to a group of Microsoft applications called Microsoft Office suite.
Others include Microsoft Excel, Microsoft Access, Microsoft PowerPoint, and Microsoft Outlook.
Microsoft Word has features for:
Today, Information and Communications Technology (ICT) has become an integral part of the
human life. The Internet and the social media have come to completely revolutionize the human
life and activities.
The internet may be simply defined as a global communication network that allows almost all
computers worldwide to connect and exchange information. Internet services include:
Presently, there are hundreds of social media platforms in existence and operation. Some of
them are: Facebook, Google+, Friendster, hi5, LinkedIn, Twitter, Tumblr, XING, Flickr, Howcast,
iTunes, MySpace, Picasa, Vimeo, YouTube, Blab, Delicious, Digg, Instagram, Pinterest, Quora,
Reddit, Scribd, SlideShare, Wikipedia, Yelp, WhatsApp, 2Go, Nairaland, LindaIkejiBlog, etc.
University of Abuja
Faculty of Science
Department of Computer Science
CSC 300: Microcomputer Applications
2. Text representation
As described in Lecture 1, data is used to represent texts, pictures, videos and audios. Texts are
usually in characters which are converted to numbers (by means of a code) for representation
in the computer. Each character symbol is assigned a unique bit pattern. The text is then
represented as a long string of bits in which the successive patterns represent the successive
symbols in the original text.
In the mid-1900s, the American National Standards Institute (ANSI) adopted the American
Standard Code for Information Interchange (ASCII) that uses bit patterns of length seven to
represent upper- and lowercase letters of the English alphabet, punctuation symbols, digits 0
through 9, and certain control information such as line feeds, carriage returns, and tabs. The
symbols are represented in the table below with the column bits representing the first 3 bits
and the row bits representing the last 4 bits of the bit pattern.
7
Column
0 1 2 3 4 5 6 7
000 001 010 011 100 101 110 111
Row
0(0000) NUL DLE SP 0 @ P ` p
1(0001) SOH DC1 ! 1 A Q a q
2(0010) STX DC2 " 2 B R b r
3(0011) ETX DC3 # 3 C S c s
4(0100) EOT DC4 $ 4 D T d t
5(0101) ENQ NAK % 5 E U e u
6(0110) ACK SYN & 6 F V f v
7(0111) BEL ETB ' 7 G W g w
8(1000) BS CAN ( 8 H X h x
9(1001) HT EM ) 9 I Y i y
10(1010) LF SUB * : J Z j z
11(1011) VT ESC + ; K [ k {
12(1100) FF FS , < L \ l |
13(1101) CR GS - = M ] m }
14(1110) SO RS . > N ^ n ~
15(1111) SI US / ? O _ o DEL
The binary code for any entry can be found by composing the bits of the column number with the
bits of the row number. For example, CR is in column 0, row 13, and thus has the binary code
0001101 = 13 decimal = 15 octal = 0D hexadecimal. The ASCII encoding scheme can only
accommodate 128 character symbols.
In contrast to the 7-bit ASCII encoding scheme, IBM developed Extended Binary Coded Decimal
Interchange Code (EBCDIC) in 1963. This is an eight-bit character encoding used mainly on IBM
mainframe and IBM midrange computer operating systems. The EBCDIC can accommodate
character symbols.
ASCII and its extended versions, were not sufficient to accommodate alphabets of man Asian
and some Eastern European languages. For this and other reasons, the Unicode was developed
through the cooperation of several of the leading manufacturers of hardware and software. The
encoding scheme uses up to 21 bits to represent each symbol. The Unicode is usually combined
with Unicode Transformation Format 8-bit (UTF-8) encoding standard to accommodate ASCII 8-
bit pattern (note that 8-bit ASCII simply attached 0 as the most significant bit), and languages
8
such as Chinese, Japanese, and Hebrew. UTF-8 also uses 24-bit and 32-bit patterns to represent
more obscure Unicode symbols.
A file consisting of a long sequence of symbols encoded using ASCII or Unicode is often called a
text file. A text file contains only character-by-character encoding of the text. Note that text file
produced by a word processor contains numerous proprietary codes representing changes in
fonts, alignment information and other parameters.
3. Image Representation
Pictures and videos are represented in bits, octal or hexadecimal. Pixels (or picture elements)
are also used to represent pictures and video frames. A pixel is defined as the basic unit of
programmable color on a computer display or in a computer image. The physical size of a pixel
is based on the resolution for the display screen. The appearance of each pixel is then encoded
and the entire image is represented as a collection of these encoded pixels called bit map.
The method of encoding the pixels in a bit map varies among applications. In a simple black-
and-white image, each pixel is a single bit whose value depends on whether the pixel is black or
white. A more elaborate black-and-white photograph uses collection of bits (typically 8 bits) to
allow for a variety of shades of grayness to be represented. For color images, each pixel is
encoded using two approaches.
First approach: RGB encoding uses red, green and blue color components, corresponding to the
intensity of three primary colors of light to represent a pixel. Three bytes of storage are
required to represent a single pixel in the original image.
Second approach: uses brightness component and two color components. The brightness
component is called the pixel luminance and it is the sum of the red, green, and blue
components. The two color components are blue and red chrominance, obtained from the
difference between the pixel luminance and the amount of blue or red light in the pixel.
4. Sound representation
The most generic method of encoding audio information for computer storage and
manipulation is to sample the amplitude of the sound wave at regular intervals and record the
series of values obtained. A sample rate of 8000 samples per second has been used for years in
long-distance voice telephone communication.
To obtain better quality sound reproduction by today’s musical CDs, a sample rate of 44,100
samples per second is used. The sample data is represented in 16 bits (or 32 bits for stereo
recording).
Another encoding scheme for audio known as Musical Instrument Digital Interface (MIDI) is
widely used in the music synthesizers found in electronic keyboards, video game sound, sound
9
effects accompanying websites. MIDI encodes what instrument is to play which note and for
what duration of time.
5. Data compression
Data compression is the technique of reducing the size of the data while retaining the
underlying information. Data compression scheme is either lossless or lossy. Lossless
schemes do not lose information in the compression. Lossy schemes may lead to the loss of
information. Lossy techniques often provide more compression than lossless schemes and are
therefore popular in settings in which minor errors can be tolerated.
The bit maps produced using the encoding schemes described in the preceding sections are
often large. Numerous compression schemes have be devised for image, audio and sound
compression. Examples of such compression schemes are Graphic Interchange Format (GIF),
Joint Photographic Experts Group (JPEG), Tagged Image File Format (TIFF), and Motion Picture
Experts Group (MPEG).
GIF was developed by CompuServe and it uses dictionary encoding system to reduce the
number of colors of a pixel to 256. The 256 encodings are stored in a table (a dictionary) called
palette. Each pixel in an image is represented by a single byte whose value indicates which of
the 256 palette entries represents the pixel’s color.
JPEG is has proved to be an effective standard for compressing color photographs. The JPEG
standard encompasses several methods, each with its own goals. When precision is utmost,
JPEG’s lossless is used, this usually entails high level compression The JPEG’s lossy sequential
mode has become the standard of choice in many applications.
TIFF as a compression technique allows for the storing of photographs along with their related
information, such as date, time, and camera settings.
MPEG is a compression scheme for audios and videos and it encompasses a variety of
standards.
References
Brookshear and Brylow, 2015, Computer Science, An Overview, 12th edition, Pearson
Publishers.
http://www.bernstein-plus-sons.com/.dowling/Characters.html
https://en.wikipedia.org/wiki/EBCDIC
10
LECTURE 3: Internet, E- mail, IM & E-commerce
Communication is an important component of life. It is also a known fact that Information or knowledge
is power. Nowadays, there are various forms of communication. This ranges from one way
communication devices such as TV and radio, to two way communication devices such Laptops, Tablets
and Mobile Phones. This trend enhances voice calls, text messaging, email and instant messaging.
Teenagers’ and young adults’ use of Instant Messaging (IM) is on rapid rise, and this has been a recent
object of media attention. Indeed, the popularity of IM indicates that synchronous (or near-
synchronous) text messaging and presence awareness has a place in teenage communications,
despite an array of competing media available to them. This lecture discusses various email
communication types, instant messaging, Social Media and its security considerations as well as e-
commerce applications. All these are achievable with internet connectivity.
TYPES OF EMAIL
Generally speaking, HTML email can be broken down into two categories:
One-to-many, where a large list of people are sent the same or very similar emails from a source to
which they’ve intentionally subscribed (like a newsletter, or an event invitation).
Transactional, where an email is sent to a person on an individual basis, usually as a result of an action
they’ve taken (like making a purchase, or receiving a shipping update).
ONE-TO-MANY EMAIL
One-to-Many emails have been a staple of electronic marketing since the early days of the web. They’ve
been an optimal way to market to millions of people at a lower cost than print or other types of media
like television and radio. Since HTML email marketing is generally interest driven, the audience to which
you’re sending is already receptive.
Email evolved with the explosion of social media to include more focused subjects and audiences,
allowing “one-to-many” to actually be personal, despite large audiences.
11
Figure 1
Transactional Email
Transactional emails are becoming essential to the way we interact with applications and services on
the web. You know those emails from Facebook letting you know someone’s commented on a photo, or
those receipt emails you get from Amazon? They’re transactional emails, with content that’s tailored
specifically to you. Transactional email is a type of one-to-one email. It’s different from bulk email, which
goes to many people with the same content.
Transactional emails might invite us back to a web service after a period of inactivity, let us know what’s
happening online while we’re away, or encourage us to purchase items we left in our shopping cart.
The idea of the term “transactional” may vary across industries—it doesn’t necessarily infer e-
commerce, as not all transactional emails are related to purchases. Many people refer to transactional
emails as triggered, automatic, real-time, or even personalized
12
Figure 2
Generally speaking, transactional emails aren’t considered marketing emails. However, they may
sometimes contain a marketing message along with the transaction details.
13
What are IMAP and POP?
IMAP and POP are two methods to access email. IMAP is the recommended method when you need to
check your emails from several different devices, such as a phone, laptop, and tablet.
IMAP
IMAP allows you to access your email wherever you are, from any device. When you read an email
message using IMAP, you aren't actually downloading or storing it on your computer; instead, you're
reading it from the email service. As a result, you can check your email from different devices, anywhere
in the world: your phone, a computer, a friend's computer.
IMAP only downloads a message when you click on it, and attachments aren't automatically downloaded.
This way you're able to check your messages a lot more quickly than POP.
POP
POP works by contacting your email service and downloading all of your new messages from it. Once
they are downloaded onto your PC or Mac, they are deleted from the email service. This means that after
the email is downloaded, it can only be accessed using the same computer. If you try to access your
email from a different device, the messages that have been previously downloaded won't be available to
you.
Sent mail is stored locally on your PC or Mac, not on the email server.
A lot of Internet Service Providers (ISPs) give you email accounts that use POP.
If you've used Gmail, Outlook.com, Hotmail.com, or iCloud, then you've used webmail. To get to your
webmail account, you access the Internet and sign in to your email account.
If you have a PC or Mac, you've probably used a program like Outlook, Apple Mail, or Thunderbird to
manage your email. Outlook, Apple Mail, and Thunderbird are email apps: programs that you install on
your computer to manage your email. They interact with an email service such as Gmail or Outlook.com
to receive and send email.
You can add any email account to your email app for it to manage your email. For example, you can add
webmail accounts - Gmail, Outlook.com, Hotmail.com, AOL, and Yahoo - to the Outlook or Apple Mail app to
manage your email, and you can add work email accounts.
Adding webmail accounts to email apps such as Outlook, Apple Mail, Thunderbird
When you add your email account to your email app, it will usually attempt to set it up with IMAP access,
without any input from you.
If the email app has difficulty adding your email account, it's usually because the email account is set up
for POP access. In this case, you need to go to your email provider and find out the name of their POP and
SMTP server so you can enter the info into the email app. The info usually looks something like this:
14
Incoming (POP) Server: pop.<name of service>.com
INSTANT MESSAGING
Instant messaging (IM) is a form of online communication that allows real-time (or close to real
-time) interaction through per- sonal computers or mobile computing devices. Users can
exchange messages privately, similar to e-mail, or join group conversations. Although typed
text remains the primary con- vention for IM, the technology has grown significant ly from early
versions and now allows users to send images, audio and video files, and other attachments.
Early versions of IM appeared in the late 1990s, and the list of IM tools has grown to include
dozens of applications. Technolo- gies that enable IM—such as wireless connectivity and
mobile devices—have become widespread, providing a “critical mass” for IM to reach near
ubiquity. At the same time, many vendors whose primary business is something other than IM
have added IM functionality to their products. Nearly all learning management systems have
incorporated chat tools, ranging from the elegant and sophisticated, which include icons,
sounds, and pictures, to the rudimentary, which simply provide text in boxes.
The interactive nature of IM is closer to spoken conversation than written correspondence,
allowing users to communicate in a manner that e-mail does not. IM users have a sense of
presence of other users, as if they were in a room together. At the same time, the technology
facilitates the kind of on-screen interaction, with its perceptions of distance and safety, that
many especially comfortable.
The IM Users
Large and growing numbers of teens—today’s and tomorrow’s college students—are regular
users of IM, both as a personal communication tool and, in some cases, for educational initia-
tives in high school. As IM matures into an accepted means of communication, and as ever-
larger numbers of students arrive on campus as seasoned IM users, colleges and universities
are adding IM to campus functions ranging from recruiting and admissions to teaching and
support. Some institutional libraries have set up online reference desks with IM applications,
and faculty have begun using the technology to facilitate virtual office hours. For many current
and prospective students, IM is becoming the preferred mode of contact with recruiters and
admissions staff, the registrar’s office, and academic advisors.
IM FUNCTIONALITIES
Functionality ranges widely for IM applications, but typically users log in to a service with a
screen name or ID. Most IM applications notify users when others join or leave, and many allow
15
users to indicate their status, such as “away from desk” or “in a meeting.” Once logged in, you
can send messages to individuals or join IM sessions. Most IM windows include an area where
messages are displayed chronologically and a composition box where messages are typed.
Composition boxes usually allow basic formatting of text, and most let you add images,
multimedia files, or other attachments. When someone types an instant message, the chat
client indicates that a message is being composed. When the message is sent, it pops up on
your screen in front of other applications.
SIGNIFICANCE OF IM
Hundreds of millions of people use IM to stay connected. In many ways, IM epitomizes the notion
of the always-connected, multi- tasking student, sending and receiving messages at all hours,
from a wide spectrum of devices, while doing several other things at the same time. For many
students, the technology has become as ingrained in daily life as telephones are for older
generations. Many colleges and universities are working to incorporate IM into the educational
aspects of students’ lives, rather than relegating it to a social function.
IM interactions are infused with a level of serendipity and the possibility of chance encounters
online that are unique to the medium. Some applications allow users to set a status of “hidden.”
Even though you cannot tell they are online, they might suddenly send you a message. You can
send a message to someone who is logged in, but perhaps she is away from her computer.
Maybe she is in class or otherwise occupied but hasn’t set her status to show that.
IM users have developed an evolving syntax that includes short- hand, acronyms, symbols, and
other elements that constitute a unique lexicon, encouraging users to interact in ways not
possible either in person or with other forms of electronic communication. While this dynamic
expands access to students who are uneasy with other types of communication, it also provides
new modes of expression for students who are otherwise comfortable participating in class. IM
creates an environment that approximates the sharing of a physical space, allowing distance
students to engage in learning that approaches face-to-face meetings.
The technology is also promoting the practice of creating “back channels,” or secondary
conversations that happen at the same time, for example, as a lecture, board meeting, or
conference call. Students in a lecture hall might use IM to ask each other questions about the
lec- ture topic and share their thoughts without interrupting the professor
IM CHALLENGES
The flip side of offering new modes of interaction is that the technology might encourage some
participants to engage in offensive, disruptive, or other behavior that, in different contexts,
theywould see as inappropriate. As with any new form of communi- cation, IM can lead to
misunderstandings about what others are trying to convey. Moreover, the always-on notion of
IM carries the risk of unrealistic expectations about how quickly users can expect responses.
Because messages pop up on users’ screens who are logged in, some consider the technology
16
to be a source of continual distractions.
Users of IM technologies face a number of security risks. Although sending attachments
through IM fosters a richer experience, those files are subject to viruses and other malware,
particularly since IM attachments often bypass antivirus software. Some IM networks are more
susceptible than others to eavesdropping, and a problem looming on the horizon is that of
“spim,” the IM version of spam. Because it’s difficult to verify the source of an instant message,
some people have begun sending unwanted messages to IM clients, with bogus advertisements
or solicitations for personal information.
IM TREND
Just as IM tools are showing up in non-IM software, so too are traditionally non-IM features
included in IM applications, blurring the lines between types of applications. The introduction
of new consumer electronic devices and the growing functionality of existing ones are
broadening the scope of IM availability. Video chat applications are appearing, and IM networks
are starting to allow users to send messages to users who are not online and to see archived
transcripts of past messages. New IM features are being added to allow richer conversations,
such as turn taking, collaborative composition, and game playing. The proliferation of IM-
capable devices will bring new uses of the technology that take advantage of its unique nature.
IMPLICATIONS FOR TEACHING AND LEARNING
Students who use IM feel connected with peers and faculty, and some users have found that IM
facilitates semiformal distance rela- tionships that are difficult to create through other media.
IM offers higher education a new mode of communication, often for relative- ly low cost and
without significant overhead for IT infrastructure. Increasingly, students will arrive on campus
having spent years using IM, expecting the technology to be part of their educational lives. In
addition, because IM is used for communication in many corporations, for many its use will
extend beyond college.
SOCIAL MEDIA AND SECURITY CONSIDERATIONS
Social media is defined by Kaplan and Haenlein (2010) as ‘a group of internet-based applications that
build on the ideological and technological foundations of Web 2.0, and that allow the creation and
exchange of user generated content’. Trends suggest that social networking websites are becoming
more common and important for individuals (Szwedo et al., 2010), and recently also for organizations
(Light et al., 2008; Kuikka and Äkkinen, 2011).
Most IM systems presently in use were designed with scalability rather than security in mind. Virtually
all freeware IM programs lack encryption capabilities and most have features that bypass traditional
corporate firewalls, making it difficult for administrators to control instant messaging usage inside an
organization. Many of these systems have insecure password management and are vulnerable to
account spoofing and denial-of-service (DoS) attacks. Finally, IM systems meet all the criteria required
to make them an ideal platform for rapidly spreading computer worms and blended threats:2 they are
ubiquitous; they provide a communications infrastructure; they have integrated directories (buddy lists)
17
that can be used to locate new targets; and they can, in many cases, be controlled by easily written
scripts. Even worse, no firewall on the market today can scan instant messaging transmissions for
viruses.
Virtually all IM systems employ the same basic client-server architecture. Users install instant
messaging clients on their client machines—desktop computers, wireless devices, or PDAs, for
example—and these clients communicate with an IM server in the messaging provider’s infrastructure
to locate other users and exchange messages. In most instances, messages are not sent directly from
the initiating user’s computer to the recipient’s computer, but are sent first to an IM server, and then
from the IM server to the intended recipient. (See Figure 3.)
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by
enterprises to engage with customers, build their brands and communicate information to the rest of
the world. However, social media for enterprises is not all about "liking," "friending," "up-voting" or
"digging." For organizations, there are high risks to using social media, ranging from damaging the
brand to exposing proprietary information to inviting lawsuits.
Information security has become a growing concern for companies by the advent of social media. New
technologies for collaboration and interaction have increased the possibilities for information sharing.
Although online communication has become very popular and has become the way to maintain social
relationships, it has also highlighted the adverse effects on human behaviour. For companies, it would
be important to get an understanding of whether and how social media represents a threat to
18
information security in order to be better able to plan their appearances in and policies concerning
social media.
For companies and their employees, social media allows new ways to communicate with customers and
colleagues. Vast amounts of information are being exchanged in social media. Information is a highly
valuable asset, and therefore questions concerning information security become more and more
important. Companies are becoming increasingly worried about information security in social media.
First, challenges arising from employees’ actions or unawareness in social media (especially reputation
damage) seem to represent bigger threats to information security than threats caused by outside
attacks.
Second, the confusion of private and professional roles in social media represents an information
security risk, and distinguishing between these roles becomes more difficult the higher an employee’s
position in the company.
Third, communication with employees and colleagues represents an information security challenge
especially when communication is not steered by the company.
The rise of social media is inextricably linked with the revolution in mobile computing, which has
spawned a huge industry in mobile application development. Naturally, whether using their own or
company-issued mobile devices, employees typically download dozens of apps because, well, because
they can. Sometimes they download more than they bargained for. In early March, Google removed from
its Android Market more than 60 applications carrying malicious software. Some of the malware was
designed to reveal the user's private information to a third party, replicate itself on other devices,
destroy user data or even impersonate the device owner.
And all because this new game is supposed to be even better than Angry Birds!
E-commerce
Electronic commerce, commonly known as E-commerce is trading in products or services using
computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web for at least one
part of the transaction's life cycle, although it may also use other technologies such as e-mail.
Definition of E-commerce:
19
E-Commerce Categories:
1. Electronic Markets
Present a range of offerings available in a market segment so that the purchaser can compare the
prices of the offerings and make a purchase decision. Example: Airline Booking System
• Communicated from one computer to another without the need for printed orders and
Example: EDI is used in the large market chains for transactions with their suppliers
3. Internet Commerce
• It is use to advertise & make sales of wide range of goods & services.
• This application is for both business to business & business to consumer transactions.
Example: The purchase of goods that are then delivered by post or the booking of tickets that can be
picked up by the clients when they arrive at the event.
Advantages Of E-commerce:
20
Businesses can reach out to worldwide clients - can establish business partnerships
Disadvantages of E-commerce:
Security of internet is not very good - viruses, hacker attacks can paralise
e-commerce
Threats of E-commerce:
It is also worth considering where potential threats to your ecommerce site might come from, as
identifying potential threats will help you to protect your site.
Who may want to access your ecommerce site to cause disruption or steal data; for example
competitors, ex-employees, etc.
What level of expertise a potential hacker may possess; if you are a small company that would
not be likely to be considered a target for hackers then expensive, complex security may not be
needed.
Features of E-Commerce:
21
via mobile devices, anytime. geographic location.
Global reach: The technology reaches Commerce is enabled across cultural and across national
boundaries, around the earth. national boundaries seamlessly and without modification.
Universal standards: There is one set of There is one set of technical media standards
technology standards, namely Internet across the globe.
Richness: Video, audio, and text messages Video, audio, and text marketing messages are
possible integrated into a single marketing message and consuming experience.
Interactivity: The technology works Consumers are engaged in a dialog that through interaction
with the user dynamically adjusts the experience to the individual, and makes the consumer a
co-participant in the process of delivering goods to the market.
Information density: The technology Information processing, storage, and reduces information
costs and raises quality communication costs drop dramatically, while currency, accuracy, and
timeliness improve greatly. Information becomes plentiful, cheap, and accurate.
Business-to-Consumer (B2C)
Business-to-Business (B2B)
Consumer-to-Business (C2B)
22
company that meets his price expectations.
References
Kaplan, A.M. and Haenlein, M. (2010). Users of the World, Unite. The Challenges and Opportunities of
Social Media. Business Horizons, 53(1), 59-68.
Kuikka, M and Äkkinen, M. (2011). Determining the Challenges in Organizational Social Media
Adoption and Use. In Proceedings of the 19th European Conference on Information Systems.
Rebecca E. Grinter & Leysia Palen. Instant Messaging in Teen Life. In CSCW’02, November 16–20,
2002, New Orleans, Louisiana, USA. Copyright 2002 ACM 1-58113-560-2/02/0011
Lecture 4
Title: Word Processing
OBJECTIVES
The students will learn:
*Definition of Word Processing, Word Processing Software and examples of word processing
Software.
* MS Word Graphical User Interface: Ribbon, the quick access toolbar, the title bar, the text area
*Working with text: deleting, copying, pasting
* Working with documents: Be able to create document, save documents, print documents, format
documents, create tables, use headers and footnotes, templates, column and order, use the proofing
features and modifying spacing
WORD PROCESSING
Word processing is the phrase used to describe using a computer to create, edit, and print
documents. Of all computer applications, word processing is the most common. To perform
word processing, you need a computer, a special program called a word processor, and a
printer.
23
Is used to manipulate a text document, such as a resume or a report. You typically enter text by
typing and the software provides tools for copying, deleting and various types of formatting.
Some of the functions of word processing software include:
There are a number of different word processing applications. One of the most widely used ones
is Word, which is part of Microsoft Office. Another widely used one is WordPerfect by the Corel
Corporation. A third one is Writer, which is part of OpenOffice by Apache. While the first two are
commercial software, OpenOffice is open source and can be downloaded and used free of
charge. Finally, there is Pages, which is part of iWork by Apple.
24
the document on which you are currently area. The blinking vertical line in the upper-
working. left corner of the text area is called the
cursor. It marks the insertion point. As you
iv The Ribbon
type, your text displays at the cursor
location.
25
document.
Left-click the mouse. The insertion
point appears.
Type the text you want to appear.
To delete text:
To select text:
26
Select the text you want to copy. Left-click your mouse, and drag the
Click the Copy command on the text to the location where you want it
Home tab. to appear. The cursor will have a text
Place the insertion point where you box underneath it to indicate that
want text to appear. you are moving text.
Click the Paste command on the
Home tab. The text will appear.
To drag and drop text: If text does not appear in the exact location
you want, you can click the Enter key on
Select the text you want to copy. your keyboard to move the text to a new line.
27
Click the Microsoft Office button. By default, Word automatically checks your
Select Save from the menu. document for spelling and grammar errors.
These errors are indicated by colored wavy
Using the Save command saves the lines.
document in its current location using the
same file name. If you are saving for the The blue line indicates a contextual
first time and select Save, the Save As spelling error.
dialog box will appear. o A contextual spelling error is
when an incorrect spelling of
To Save As a Word 97 - 2003 document: a word is chosen. For
example, if you write Deer Mr.
Click the Microsoft Office button. Theodore at the beginning of
Select Save As Word 97-2003 a letter, deer is a contextual
Document. spelling error because dear
should have been used. Deer
is spelled correctly, but it is
used incorrectly in this letter.
The red line indicates a misspelled
word.
The green line indicates a
grammatical error.
Proofing Features
Line colors
28
Once you complete your document, you may
want to print it for various reasons. This
lesson covers the three basic features of
printing in Word, including Print Preview,
Quick Print, and traditional Print.
Printing
Modifying margins
Changing page orientation
You can also choose to ignore an Changing page size
underlined word, go to the Grammar dialog Zooming in and out to view various
box, or find out more information about the parts of the document
word and its usage. Viewing multiple pages
Accessing Word Options to change
You can also wait and run the spelling and several Word settings
grammar check after completing the
document. Click the Spelling & Grammar To print:
command on the Review tab.
Click the Microsoft Office button.
Select Print
Print. The Print dialog box appears.
Select the pages you want to
Printing
29
print—either all pages or a range of
pages.
Select the number of copies.
Check the Collate box if you are
printing multiple copies of a multi-
page document.
Select a printer from the drop-down
list.
30
Select the text you want to modify. document.
Left-click the drop-down arrow next
to the font style box on the Home tab. Your color choices aren't limited to the drop
The font style drop-down menu -down menu that appears. Select More
appears. Colors at the bottom of the list to access the
Move your cursor over the various Colors dialog box. Choose the color you
font styles. A live preview of the font want, then click OK.
will appear in the document.
31
o Align Text Left: Aligns all of in a new window.
the selected text to the left
margin
o Center: Aligns text an equal
distance from the left and
right margins
o Align Text Right: Aligns all of
the selected text to the right
margin
o Justify: Aligns text equally to
the right and left margins;
used in many books,
newsletters, and
newspapers
You can select any of the categories in the
Microsoft Office Online section of the New
Document Dialog box. This will display free
templates that are available online. Your
computer must have Internet access to
download these templates.
32
To insert text into a template: you will learn how to modify line and
paragraph spacing in various ways.
Click near the text you want to
replace. The text will appear Modifying spacing
highlighted, and a template tag will
appear. To format line spacing:
33
spacing options between each paragraph. document you want to create, in which case
Typically, extra spaces are added between you will want to modify these settings. In
paragraphs, headings, or subheadings. addition, you may want to change the page
Extra spacing between paragraphs adds formatting depending on the document
emphasis and makes a document easier to you're creating.
read.
In this lesson, you will learn how to change
To format paragraph spacing: the page orientation, paper size, and page
margins, as well as how to insert a break.
Click the Line spacing command on
the Home tab. Page layout and formatting
Select Add Space Before Paragraph
or Remove Space After Paragraph To change page orientation:
from the menu. If you don't see the
option you want, click Line Spacing Select the Page Layout tab.
Options to manually set the spacing Click the Orientation command in
(see below). the Page Setup group.
OR
Left-click either Portrait or Landscape
Select Line Spacing Options. The to change the page orientation.
Paragraph dialog box appears.
Change the Before and After points Landscape format means everything on the
in the Paragraph section. page is oriented horizontally, while portrait
format means everything is oriented
vertically.
34
Select the Page Layout tab.
Left-click the Columns command.
OR
Enter the desired margin size in the Click the Show/Hide command on the Home
appropriate fields. tab to display the paragraph marks and
breaks.
You can always access the Page Setup
dialog box by clicking the small arrow in the The Format Painter command allows you to
bottom-right corner of the Page Setup group. easily format text to appear like other text in
The dialog box should look familiar to your document. Select the text that is
people who have used previous versions of formatted the way you want, click the
Word. Format Painter command on the Home tab,
and select the text you want to change. The
Columns and Ordering new text now appears modified.
35
The Design tab with Header and
Footer tools is active.
OR
36
of your design options. below the location where you want
to add a row.
37
Select Insert Insert Columns to or shading, change line weight, or erase
the Left or Insert Columns to the part of the table.
Right. A new column appears.
To insert a blank table:
To delete a row or column:
Place your insertion point in the
Select the row or column. document where you want the table
Right-click your mouse, and a menu to appear.
appears. Select the Insert tab.
Select Delete Columns or Delete Click the Table command.
Rows. Drag your mouse over the diagram
squares to select the number of
To apply a table style: columns and rows in the table.
38
EXERCISES
2. Give three advantages of using a word processing software over a conventional type
writer
6. Use the report or any Word document you choose to complete this.
REFERENCES
www.webopedia.com/TERM/W/word_processing.html
http://www.gcfearnfree.org/word2007
https://www.microsoft.com/learning
Apeh Ayo I CSC200 Lecture note on Introduction to Microsoft Word
39
Department of Computer Science
Faculty of Science
University of Abuja
CSC 300: NOTE 5
SREADSHEET
INTRODUCTION
A spreadsheet is an interactive computer application for organization, analysis and storage of data
in tabular form. Spreadsheets are developed as computerized simulations of paper accounting
worksheets. The program operates on data entered in cells of a table. Each cell may contain either
numeric or text data, or the results of formulas that automatically calculate and display a value
based on the contents of other cells.
LANPAR was the first electronic spreadsheet on mainframe and time sharing computers. VisiCalc
was the first electronic spreadsheet on a microcomputer, and it helped turn the Apple II computer
into a popular and widely used system. Lotus 1-2-3 was the leading spreadsheet when Disc
Operating System (DOS) was the dominant operating system. Excel now has the largest market share
on the Windows and Macintosh platforms. A spreadsheet program is a standard feature of an office
productivity suite; since the advent of web apps, office suites now also exist in web app form.
40
GrapeCity Spread Studio
NeoOffice
Pyspread e.t.c
INTRODUCTION TO EXCEL
Excel is an electronic spreadsheet program that can be used for storing, organizing and
manipulating data. It is a Microsoft Application program developed for official use with an icon .
2. Basic Accounting
3. Return on Investment
4. Customer Data
5. Performing basic mathematical operations.
6. Find values such as profit or loss.
7. Calculating repayment plans for loans or mortgages.
8. To Find the average values
9. To find Maximum or minimum values in a specified range of data.
10. To analyze student Result
THE WORKBOOK
Workbook: Workbook is a Microsoft Excel window that is made up of several sheets. Excel is more of
textbook with series of page in it. The general name of Microsoft Excel is called “spreadsheet” and
the official name is called “workbook”. It file name are called Book, Book2, and Book3 …. Bookn
depend on the number of file that has already been saved. While a worksheet is a page in a
workbook, worksheet is the collection of multiple “Cells” that was arranged in a vertical and
horizontal series. The vertical arrangement of cells is called “columns” and the horizontal
arrangements of cells are “Row”.
WORKSHEET
Worksheet: A worksheet is a network of Cells formed as a result of intersection of Rows and Columns
parallel to each other in a workbook. Each sheet has links that appears at the bottom of an active
sheet called Tabs, with a default name, as follow (sheet1, sheet2, sheet3 . . . sheetn etc). You can add
and switch between worksheets by clicking each tab bellow
41
i. Cell: Microsoft Excel Cells are tiny textboxes found in a worksheet. Each Cell has a unique
address called Name located in a place called Name Box. There are two types of cells: Active and
Inactive cells.
ii. Active Cell: an active cell is that cell with a tick/bold rectangular border with a tiny square box
(Fill Box) at the bottom right Corner. It is usually a Computer focus and ready to accept Data.
iii. Focus: is to pay attention to a particular thing. Computer focus is the active portion or where
cursor is blinking while Human focus is the Pointer which changes it shapes depending where you
move it to in a worksheet.
iv. Inactive Cell: Inactive Cell is that cell which has no tick/bold border. You can change the Active
to Inactive by clicking deferent cell.
v. Column: Microsoft Excel Columns are Alphabetical order of Cells from left to right starting from A
to Z and then a combination of letters e.g. ABA, ABB till the last column XFD which amount to a total of
256 columns. To see the last column do this: Hold down a control key (Ctrl) along with right arrow
Key
vi. Row: Microsoft Excel Rows are horizontal arrangement of serial numbers of Cells from 1 to
1,048,576. To view the last Row, Hold down a control key (Ctrl) along with down arrow key.
vii. Name box: Name box is a Reference potion of an active cell which displays Cell address.
viii. Cell Address: Cell address is a combination of letter and number to represent a location of Cell
in a worksheet e.g. A3, F12, etc.
ix. Address Bar: is a potion of worksheet below a Ribbon that is use to enter data or formula to an
active cell. You can edit data through the Address Bar when a particular cell is activated.
Note: There are 256 numbers of columns in a worksheet; 1,048,576 numbers of Rows which rises to
268,435,456 Cells.
A B D E F
C 42
G H I J K
43
ii. 1 Click the start Button, a start menu pop up check if Excel icon is not on the list then.
v. Click again on the Microsoft office Excel 2007 application icon to launch it.
Here we are :
TABS
44
sheet3 and the new sheet will be sheet4.
ii. How to delete a sheets
Renaming a sheet can be a latter, Number, word or phrase. If you want your sheet name to be a
phrase e.g. ‘Abuja color’ then you should adopt the idea of underscore by adding _ in between the
words like ‘Abuja_color’ as the new name. the implication of not applying underscore is error due to
reference which shall be discourse in lesson 7 of this Book.
Right click on the Tab you want to rename
Go to rename
45
This will display a Menu containing a list of Tabs click which you intending to move.
in this case click on the arrow head and select new book
Click Ok.
Dropdown menu: is a written text with an arrow head indicating an extension or sub items.
46
Example: start menu, office menu e.t.c.
Dialog boxes: A dialog box is a special type of window that asks user a question to answer before
performing next task, or provides you with information. You'll often see dialog boxes when a program
or Windows needs a response from you. Most of them contain option buttons to click
A dialog box appears if you exit a program without saving your work
Unlike regular windows, most dialog boxes can't be maximized, minimized, or resized. They can,
however, be moved. In addition all dialog boxes are window
COMMAND
Go to Microsoft office button at the top right Corner of your screen click to see the menu
i. Click on open. A window will appear
ii. Type or locate the file to open
Open command
i. Click on office button
Note through Excel you can only open an excel file. The only file which has an extension name (.exlx).
Closing command
i. Click the office button while in the office menu
OR
47
Exit Command
i. Click on Office button
OR
Click on
Or (Ctrl +N )
Saving a workbook:
In this case saving a workbook is of two type: ‘Save As’ and ‘Save’
You can use ‘Save As’ when saving a new workbook. This mean that the workbook you are
working in has not being assign a name and it is to be saving for the first time. ‘Save As’ can
also be use when you want to save your work in another location either in Flash drive or in
Desktop. While ‘Save’ it is use to update an existing workbook in a particular location
usually in a location called Documents.
To Save As:
i. Click Office button
ii. Click on ‘Save As’ a location will be display with title header ‘ Libraries Documents ’
48
iii. Below you will see a bar title with a ‘File name’
v. Click on ‘Save’ button or change where you want to save the document
.
To Save:
i. Click on Office button
ii. Click on ‘Save’ the Office menu will automatically disappear to show that it responded to
the command.
FORMATTING
Font :
Go to font group
Click on B in
49
Go to font group
Go to font group
Go to font group
Go to font group
50
How to change font size
Click on cell you intending to change font size
Go to font group
f. Applying/Draw border
Go to font group
Click on the arrow head beside this to select your desire border.
You can as well create new border, erased border, line style and color of your choice
through any of the above steps.
g. Text Alignment
Go to alignment group
Go to alignment group
c. Merge cells
51
Select the cells you intended to merge
Go to alignment group
Applying style
Conditional format
In the text box blinking a cursor, set a condition value of your desire.
At the right hand side of that text box is a list box with multiple choice of color
Click OK
Remark: the number you set in a text box is the condition you give to set color in the cell you
are working with. If the content of that cell is greater than the value you gave as criteria the
cell will automatically change to conditional color you set.
Format as table
Go to styles group
52
Click on the small arrow head beside ‘format as table’
Click on any of the table provided, this will take effect on the highlighted cells.
Go to cells group
Click on delete
Alternatively
Click on the key board or
Click on delete
Click on copy/cut
Click Enter
Move a pointer to right edge of the selected column until the cursor turns to cross
53
Free the dragging
Go to view menu
Click on hide/unhide
Arithmetic Operation:
i. Addition (+), Subtraction (-), Multiplication (*) and Division (/) are the common arithmetic
operators we listed in the previews lesson. The operations of these are common in daily
basis.
Excel consists of numerous cells in which each of the cells has addresses. Each time a user
type an address is equally making a reference to the content of excel.
Example: Addition and subtraction of numbers
If 4+3=7. In excel assuming 4 and 3 are entries in cell addresses A2 and B2 respectively. To
get this result in excel type (=A2 + B2) in a separate address e.g. C2. Likewise subtraction,
multiplication and division.
Steps on how to add two/more number in excel
Select the cell you wish to enter the first value
Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
Whole Number: these are numbers that are standard /complete. They can be 1, 2, 3 e.t.c.
Whole number, zero or negative number like -1, -2, -3 e.t.c. e.g. A whole Apple or Orange that
is not yet been cut to pieces. In the other way one Apple or one Orange can be referred as 2
or 3 or 8 even 1000 if it is complete. In the other way round number less than one are:
Decimal points, Fraction and Percentage.
DECIMAL POINTS:
Decimal points: these are number that have dot in between them which shows that is part of
whole number. They are like 5.23, 0.7 etc.
Steps on how to add two/more Decimal numbers in excel
Select the cell you wish to enter the first value
Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
FRACTION:
1 1 1 2 2 5
Example (1) + = . Example (2) + =1
3 3 15 3 5 6
For excel to do this for you follow the steps bellow:
1
Enter Equality sign and in one cell
3
55
1
Enter in another cell
2
Enter equality sign in the third cell follow the cell address of step 1.Addition or
Multiplication sign and cell address of step 2,
e.g.
Click enter
In addition:
5/6 will be the result of example 1while
11/15 will be for example 2
Note that was not eleven over fifteen, it is one whole number one over fifteen.
PERCENTAGE:
Example1
10% refers to 10 portions out of 100.
Example2
30% +20% = 50%, this result mean it’s not yet a whole number .i.e. half of a given figure or
item.
Example3
69% + 31 = 100% one hundred percent is a whole figure or item which is reference to.
CONVERSION OF PERCENTAGE TO NUMBER:
Example 25% is spent out of 1000. What is the Amount spent?
Solution
25
X 1000 = 250
100
For excel to do this for you follow the steps bellow:
25
Enter Equality sign and in one cell
100
Enter equality sign in the third cell follow the cell address of step 1 Multiplication sign
and cell address of step 2
Click enter
56
CONVERSION OF NUMBER TO PERCENTAGE:
Example 500 out of 8000
Solution
500
X 100 = 6.25 %
8000
Enter equality sign in the third cell follow the cell address of step 1, Multiplication sign
and cell address of step 2
Click enter
Practical:
Mr. Bello spent 35% out of 2500 he realised from barbing. How much is the money he spent.
Solution
35
Step 1, enter =
100
57
Step 4, click enter
Step 5, type = A1*B1in the next cell
Explanation
Mr. Bello spent 875 from 2500 he realized from barbing Saloon.
5.5 ALGEBRAIC
Scientific calculation like addition of superscript and subscript result to error in excels
which we are going to treat that in subsequent lessons.
Example:
22 + 33 or 2^2 + 3^3 and 22 + 33 these well result to error like this #VALUE!
This is the kind of Error we are going to look up to in Lesson 7
5.6 AUTO FILL
Auto fill: is to quickly fill in several cells with the same content or format of the selected
cell/cells. You can select cells and drag the fill handle of the active cell to any
58
direction. To use the fill handle, you select the cells that you want to use as a basis for filling
additional cells, and then drag the fill handle across or down the cells that you want to fill.
Example 1: To auto fill week days
Type in Monday or Mon
5.7 FUNCTION
i. SUM: it is a techniques used to add range of cells.
Type in Sum
Click arrow to the direction of the first value to activate the first Cell
Click on colon :
Click on arrow to the direction of the last value to activate the second Cell
Your formula should look similar to something like this ‘=SUM(A1:A9) or SUM(=A1 :F9)’
depending on vertical or horizontal arrangement of Data.
Alternatively:
59
Select where you want to sum range of number
Type sum
60
Examples of Non-Adjacent approaches are:
61
ii. AVERAGE: Average is the arithmetic mean, and is calculated by adding a group of
numbers and then dividing by the count of those numbers. For example, the average of 2, 3, 3,
5, 7, and 10 is 30 divided by 6, which is 5.
Click a cell below or to the right of the numbers for which you want to find the average
On the Home tab, in the Editing group, click the arrow next to AutoSum , click Average,
Alternatively:
Enter all the number in which you intended to get their average in several cells each.
Type in quality sign in the cell in which you want to the average to appear
Type average
62
The formula should also look like this =Max(A1:A9), =Min(A1:A9), =Count(A1:A9). In this case
count helps to count non-empty cells.
5.8 RANKING:
Returns the rank of a number in a list of numbers. The rank of a number is its size relative to
other values in a list. (If you were to sort the list, the rank of the number would be its
position.)
Ranking is mostly use to assign position for students in the class.
Syntax
=RANK(Number,Ref,Order)
Number: is the value you want to find its position.
Ref is an array or range of cell. .e.g. A1:A9 which mean the whole class
Order is a number specifying how to rank number base on ascending order or descending
order, .i.e. the height value will be assign first position and lowest will be assign last
position.
If order is 0 (zero) or omitted, Microsoft Excel ranks number as if ref were a list sorted in
descending order.
If order is any nonzero value, Microsoft Excel ranks number as if ref were a list sorted in
ascending order.
Example
A
1 Data
2 7
3 3.5
4 3.5
5 1
6 2
Formula
=RANK(A3,A2:A6,0)
=RANK(A3,A2:A6,1)
Description (Result):
Position of 3.5 in the list above (3) if using first formula
Position of 7 in the list above (5)
How to do Ranking in excel
63
Enter the number you want to rant in a column
Go to the next column the first adjacent cell to the first entry number
Click Enter
There are two type of date the system and manual dates. Manual date/time is static while
system date/time changes each time you launch window. These will give you the idea of
counting certain event.
How to insert manual date/time function:
Select where to insert date/time
64
Press Enter key
Note: ‘Now ()’ function gives date and time while ‘Today ()’ function gives only date.
CELLS REFERENCES
Cell reference To create a reference, select a cell or range of cells on the same worksheet.
Cell references and the borders around the corresponding cells are color-coded to make it
easier to work with them.
The first cell reference is B3, the color is blue, and the cell range has a blue border with
square corners.
The second cell reference is C3, the color is green, and the cell range has a green border
with square corners.
You can drag the border of the cell selection to move the selection, or drag the corner of the
border to expand the selection.
Press Enter key
You can refer to cells that are on other worksheets by appending the name of the worksheet
followed by an exclamation point (!) to the start of the cell reference.
65
Click the cell in which you want to enter the formula.
Note If the name of the other worksheet contains non-alphabetical characters, you must
enclose the name (or the path) within single quotation marks (').
Create a cell reference to another workbook
You can refer to cell that are on other workbook by opening the workbook you intended to
reference to side by side with the workbook you are working on. Let for instant you working
on Book1 and Book2 is the reference book all what you need to do is by:
Make show both workbook are opened (e.g. Book1 and Book2)
Locate the cell in which you want to get it content, and click on it
Click enter
Note the content of the cell you just click in Book2 will be coped to Book1. And the formula
look similar to this =[Book2]Sheet1!$A$1.
Change a cell reference to another cell reference
Double-click the cell that contains the formula that you want to change. Excel highlights
each cell or range of cells with a different color.
To move a cell or range reference to a different cell or range, drag the color-
coded border of the cell or range to the new cell or range.
In the formula bar , select the reference in the formula, and then type a
new reference.
Click ENTER.
66
67
CSC 300 LECTURE NOTE 6
DATABASE
Data: Data is the raw material that can be processed for any computing machine e.g employee
name, product name, name of the student, marks of the student, any number, image.
Information: It is the data that has been converted into more useful or intelligible form e.g
report card sheet.
Knowledge: Human mind purposefully organize the information and evaluate it to produce
knowledge e.g 38 in a data and marks of student is information and the hard work require
getting mark in knowledge.
Knowledge
i. Fact based: The knowledge gain from fundamental and through experiment and
great judgment likes hypothesis
68
5. E.g product name, name of students E.g report card sheet
Database: The related information when placed in an organized form makes a database or an
organized collection of related information is known as database e.g Dictionary, Telephone
Directory, Mobile contact.
i. Insertion
ii. Updation
iii. Deletion
iv. Retrieve
v. Sorting
Traditional file system: A file system is the method of storing and organizing the computer files
and the data they contain to make it easy to find and access.
iii. Files are design by using the program written in programming language such as c,
c++
69
iv. It can lead to loss of data integrity
DBMS (Data Base Management System): It is the software system that allows the user to define,
create, maintain the database and provide control access to the data.
Application of Database
i. Library system
iii. ATM
Components of DBMS
1. Hardware: The hardware is the actual computer system used for keeping and accessing
database. Conventional DBMS hardware consists of secondary storage devices such as
hard disk. Database run on the range of machine from micro computers to mainframes.
2. Software: Software is the actual DBMS between the physical database and the users of
the system. All they request from the user for accessing the database are handled by
DBMS.
3. Data
4. User: There are a number of users who can access or retrieve the data on demand using
the application and the interfaces provided by the DBMS.
70
The users of the database can be classified into the following groups.
i. Naïve users
Naïve Users: Those users who need not be aware of the presence of the database system. They
work through a menu driven application programs, where the type and range of response is
always indicated to the users.
2. Online users: Those users who may communicate with database directly through an
online terminal or indirectly through user interface and application program.
3. Sophisticated users: They are those users who interact with the system without writing
the program instead they form their request in database query language.
4. Application programmers: Those users who are responsible for developing the
application programs or user interface. The application programs could be written in high level
language.
Database Language
Data Definition Language (DDL): It is a language that allows the user to define the data
and their relationships. Other types of data command are;
i. Create
ii. Alter
71
iii. Rename
iv. Drop
i. Insert
ii. Delete
iii. Select
iv. Update
i. GRANT
ii. REVOKE
Database Schema: The overall design of the database is called schema or Description of
database.
Subschema: It is the subset of the schema; and it inherits the same property that a schema has.
It gives the users a window through which he/she can view only that part of database which is
of interest to him/her.
Architecture of DBMS
i. External level
72
The objective is to separate each user’s view of the data from the way the database is physically
represented.
External level/view level: This level describes that part of the database that is relevant to each
user. This insulates the users from the details of conceptual and the internal level.
The internal structure of the database should be unaffected while changes to the physical
aspects of storage
The DBA should be able to change the conceptual structure of the database without affecting all
other users.
Conceptual level/logic level: The level describes what data is stored into the database and the
relationship among the data. It represents:
The conceptual view is defined by conceptual schema, which describes all the entities,
attributes and their relationship with the integrity constraints.
There is only one conceptual schema and internal schema per database and more than one
external schema.
Internal level: It is the physical representation of the database on the computer. This level
describes how the data is stored in the database. It covers the data structure and file
organization used to store the data on storage devices.
External schema: The external view is described by means of a schema called external schema
that corresponds to different view of the data. For example two users may be viewing two
separate views of the same database of a studentResults in a database system.
73
Mapping between the levels:
i. External/conceptual mapping
End
users External Schema B
Logical data independency: it indicates that the conceptual schema can be changed without
affecting the existing external schema. Logical data independency is much more difficult to
achieve than physical data independency as it requires the flexibility in the design of the
database and programmer has to see the future requirements or modification in the design.
Physical data independency: It indicates that the physical storage structure or devices can be
changed without affecting the conceptual schema. The change would be absorbed by the
74
conceptual internal mapping.
Components of DBMS
Data: It is the most important component of DBMS environment from the end users point
of view.
One of the major features of database is that actual data are separated from the
programs that use the data. A database should always be designed, built and populated
for a particular audience and for a specific purpose.
Procedures: Procedures refer to the instructions and rules that govern the design and
use of the database. The user of the system and the staff that manage the database
require documented procedures on how to use or run the system.
Disadvantages of DBMS
Complexity: The provision of the functionality that is expected of a good DBMS makes the
DBMS an extremely complex piece of software database designers, developers,
database administrators and end-users must understand this functionality to take full
advantage of it. Failure to understand the system can lead to bad design decisions,
which can rare serious consequences for an organization.
Size: the complexity and breadth of functionality makes the DBMS an extremely large
piece of software, occupying megabytes of disk, space and requiring substantial
amount of memory to run efficiently.
Performance: A file based system is written for a specific application such as invoicing.
A result performance is generally very good. However the DBMS is written to be more
general to cater for many applications rather than just one.
Cost of DBMS: The cost of DBMS varies significantly depending on the environment and
75
functionality provided. There is also the recurrent annual maintenance cost.
76
77
Department of Computer Science
Faculty of Science
University of Abuja
CSC300:
Lecture 7
Title: Microsoft Powerpoint
Description:
Objectives:
Requirement
Students are expected to have basic knowledge of Microsoft word or any other word (text)
processing software.
7.0 Introduction
78
Microsoft Office Suite in which the Microsoft powerpoint belongs. It is interesting to note that
any student who can work with any version of Microsoft powerpoint can as well work with any
other one because of their similarities. There is no doubt that there are some differences
between the various versions of Microsoft powerpoint. In case of difficulties as a result of some
differences, manuals for various versions may be consulted. These manuals may be
downloaded from Microsoft website
Slide layouts contain formatting, positioning, and placeholders for all of the contents that
appear on a slide.
Placeholders are the containers in layouts that hold such content as text (including body text,
bulleted lists, and titles), tables, charts, SmartArt graphics, movies, sounds, pictures, and clip
art.
Clip art is a single piece of ready-made art, often appearing as a bitmap or a combination of
drawn shapes. According to Wendy (2014), design themes make it easy to coordinate
PowerPoint presentation with colors, graphics and fonts that all work together to create a mood
for a presentation. Even though different types of slide layouts are used for different aspects of
your topic material, the whole presentation works together as a attractive package
Slide theme is a set of colors, fonts and effects that is used in a file. A theme may be defined as
a set of visual attributes that is applied to elements in a file as well as the background of a slide.
Figure 7.2 below shows a slide layout:
Figure 7.1 above shows all the layout elements that can be included on a PowerPoint slide
PowerPoint includes nine built-in slide layouts. Though, one can create custom layouts that
meet one’s specific needs. However, a standard (default) slide comes with only two layouts
(title and subtitle placeholders).
The creation of Microsoft powerpoint slide is dependent on the particular Microsoft Office in
79
use. In this work, Microsoft powerpoint 2010 is to be deployed as the case study.
In order to create a powerpoint standard slide for presentation, the following steps may be
used:
These steps would display a standard blank slide as in figure 7.2 below:
Rather than create a powerpoint from the scratch, one may use a design template and modify it
to suit the purpose. Microsoft PowerPoint’s pre-defined slide design templates allow for
attractive and consistent design of slides in a presentation(Regents of the University of
Minnesota, 2010)
Adding text to slide may be carried out directly by typing the text on the slide. In figure 7.2 above,
clicking on “click to add title” or “click to add subtitle” would allow direct typing of text on the
slide. Figure 7.2 (a) below shows typing text directly on the slide.
80
Figure 7.2 (a): Direct Typing of Text
Another way of adding text to a slide is by copying already typed text and pasting on the slide.
This can be demonstrated in figure 7.2 (b) below:
The already typed words are copied from Microsoft word and pasted on the powerpoint slide as
shown in figure 7.2 ( c) below:
Figure 7.2 ( c): Copied from Microsoft Word and Pasted on Slide
81
After the already typed text is copied from Microsoft Word, a cursor is placed at the point on the
slide where the text should appear.
An image is a picture that is produced by a camera, artist, mirror or any other means. To insert a
picture image, the following steps should be followed:
1. Open the slide to insert the picture image
2. Locate and click “Insert”
3. Locate and click “Picture”
4. Select the picture image and open it accordingly.
5. Resize the picture image as desired
The first step to insert a picture element in a powerpoint slide is open the desired slide where
the picture element is to be inserted.
Figure 7.3 (a) below shows how University of Abuja logo image in form of a picture can be
inserted in a powerpoint slide.
After the powerpoint slide is opened, the Insert is located on the powerpoint screen as is
illustrated in 7.3 (b) below:
82
This is followed by locating and clicking “Picture” which enables one to choose the picture to
be inserted from the location where such picture is stored on the disk. By opening the “picture”
the image appears on the powerpoint slide. Figure 7.3 (c) below shows University of Abuja logo.
Below the logo, there is provision to add notes to the picture image. This note may be used to
describe the image. The note shows that the image is University of Abuja logo
Apart from the above method of using insert to create a powerpoint slide, the copy and paste
commands can be deployed to achieve the same result.
The same way an image can be inserted on a slide, so also date and time may also be inserted.
To insert date and time in the previous slide (figure 7.3(c) above, the following steps is followed:
1. Open the slide
2. Click Insert
3. Locate and click Header & Footer
4. Check the Date and Time box
5. Click the pull-down arrow and choose the desired Date and time
6. Click Apply or Apply to All as the case may be.
The first step in adding date and time to a slide is to open the slide. This is shown in figure
7.4(a) below:
83
7.4 (a): University of Abuja Logo on a Slide with Note
After opening the slide in which date and time is to be inserted, then the Insert command is
clicked and Header & Footer located. This is shown in figure 7.4 (b) below:
Figure 7.4 (b): Clicking Insert Command and Header & Footer Located
The next step would be check the Date and Time box and pull down the arrow to select the
appropriate date and time desired. This can be illustrated as in figure 7.4 (c ) below:
84
Figure 7.4 (c): Clicking Insert Command and checking the date and time box
Clicking on Apply to All would insert the selected date and time as is seen in figure 7.4 (d) below:
When all the slides are put together, then the presentation will be made to the audience. The
steps below are needed to achieve that:
The above two steps would enable the presentation to be displayed on a wide screen to the
target audience. If the computer is connected to a projector, the presentation is then projected
to the wall for a wider view.
85
Practice Problems
References
1. Justin Seeley, Good Presentation Design Examples: PowerPoint and Keynote,
http://www.lynda.com/Keynote-tutorials/Examples-good-presentation-design/124082/
86