0% found this document useful (0 votes)
34 views

CSC300 - Computer Application

This is an original computer work for 300 level students and below.

Uploaded by

lukmandewise001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

CSC300 - Computer Application

This is an original computer work for 300 level students and below.

Uploaded by

lukmandewise001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

University of Abuja

Faculty of Science

Department of Computer Science

CSC 300: Microcomputers Applications

Lecture 1: Computers: An Overview

In this lecture, the following an overview of the following topics will be presented:

1. Data and information


2. Simple computer model
3. Hardware components of a computer
4. Software components of a computer
5. History of computers
6. Computer applications
7. Mobile devices and mobile applications
8. Computer security
9. Microsoft Word
10. ICT and Society

1. Data, Information and Knowledge

Data is an unprocessed facts and figures, which at a glance do not have any meaningful interpretation or
analysis. Information represent data that have been processed, interpreted in order that it has meaning
for the consumer. Knowledge combines information, experience and insight that may be beneficial to
the individual or organization. In practice, there is no clear distinction between data and information
and there are sometime used interchangeably. Common forms of data are numbers, texts, pictures,
audios and videos.

A data can either be discrete (countable finite representation) or continuous (non-finite representation,
typically in a number line).

Numbers are generally used to represents objects (numbers, texts, pictures, audios and videos) and can
either by an integer (whole) or floating-point (real with a radix point). Examples: 758 (integer), 9.56
(floating point), 89.0 (floating point), 2.3e-3 (floating point using scientific notation)

Depending on the allowable digits, numbers are commonly represented in decimal (base 10, using digits
0,1,…,9, only), binary (base 2, using digits 0 and 1 only), octal ( base 8, using digits 0,1,2,…,7) and
hexadecimal (base 16, using digits, 0,1,2,…, 9, A,B,C,D,E,F).
Examples: 819 (base 10), 1110011 (base 2), 634110 (base 8) and 0xEA0F (base 16). Note that the prefix
0x is used to hexadecimal numbers.

Recognizing the relationship between binary and hexadecimal can facilitate easy conversion between
two bases. (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F) in base 16 equal to (0000, 0001,
0010,0011,0100,0101,0110,0111,1000,1001,1010,1011,1100,1101,1110,1111) in binary. Therefore
0xA1C in hexadecimal is equivalent to 101000011100 in binary. 110001010 in binary is equivalent to
0x18A in hexadecimal.

2. Simple Computer Model

A computer is a programmable electronic device that can store, retrieve, and process data.

An algorithm is a sequence of instructions needed to perform a task on a computer.


The computer accepts data and instructions, executes the instructions on the data to produce results or
perform actions as an output. Conceptually, a computer consists of input, output, processing and storage
memory units. The processing unit also called the computer processing unit (CPU) is made of control unit
(CU) and arithmetic/logic unit (ALU). The storage memory unit is either volatile (called primary or main
memory or RAM) or non-volatile (secondary storage memory).
Computers are known for their automation, accuracy, speed, storage capacity, versatility, diligence,
multitasking, and communications.
To actualize the simple computer model, a computer must need software (logical aspect) and hardware
(physical aspect). Software and hardware form the two components of a computer. It is possible
physically integrate software into the hardware to form what it is called firmware.
A computer can either be digital (accepts binary digits – 0s or 1s) or analog (works a continuous range of
values) or hybrid.
Types of digital computers are supercomputers (for high performance computing), mainframe computers
(for large organizations), minicomputer computers (less expensive than mainframe and for medium-sized
organizations) and microcomputers (general purpose personal computers).
Types of microcomputers are desktops, laptops and handheld computers (Personal Digital Assistants).

3. Hardware Components
Hardware if the tangible or physical parts of a computer: input devices, output devices, memory devices,
processing devices
Input devices: keyboard, mouse, are joysticks, touchscreens, pen devices, character recognition, voice
recognition, barcode readers, universal serial bus (USB) drives, hard disks (HDs) and compact disks
(CDs)
Output devices: monitor, speaker, printer, headphone. A printer can either be an impact or non-impact
printer.
Memory devices: volatile – Read Access Memory (RAM); non-volatile – Read-Only Memory (ROM),
secondary storage devices – hard drives, DVD/CDs, flash drives
The capacity of memory is measured in bytes. 1 byte is equivalent to 8 bits. 1 kilobyte (kb) = 1024 bytes,
1 megabyte (mb) = 1024 kbs, 1 gigabyte = 1024 mbs, etc.
Common manufacturers of processing devices (CPU) are Intel and AMD. Examples of CPUs are Intel
Pentium, Intel i5 Quadcore, etc.
The speed of the processor is measured in hertz (hz is equivalent to one clock cycle – i.e., time to
complete 1 machine instruction cycle). 1 kilohertz = 1000 hz, 1 megahertz = 1000khz, 1 gigahertz =
1000mghz

4. Software Components
Software is the logical, non-tangible or non-physical unit of a computer. Software are a collection of
programs that are used to run a computer. A software is either a system or application software. A system
software operates and controls computer hardware and it is either an operating system software or a utility
software.
Examples of operating system software are Windows OS, Mac OS, Unix/Linux OS, Windows Mobile,
iPhone OS (iOS), Windows NT, Android.
Examples are utility are BIOS, virus protection software

5. History of Computers

The history of computers spans the pre-mechanical era (ancient era), mechanical era, electro-
mechanical era and modern era.
Ancient era is marked by counting devices, Abacus and tally sticks
During the mechanical era, adding machine was discovered by Blaise Pascal (1642), Leibniz
(1690). Difference machine by Charles Babbage (1822), Analytic machine by Charles Babbage
and Augusta Ada Byron (1833). Babbage is regarded as the father of modern day computers.
In the electro-mechanical era, also called the vacuum tubes era, electrically-based computer devices
were developed: Herman Hollerith (1890), Howard Aiken (1936), John Atanasoff (1930), John
Mauchly and J. Presper Eckert (1946).

Modern era is characterized by vacuum tubes and digital computers. This era is classified into
generations: first-generation (1943-1958, vacuum tubes, Universal Automatic Computer –
UNIVAC, Electronic Numerical Integration Computer-ENIVAC); second-generation (1959-
1964, transistors-based computers); third-generation (1965-1970, integrated circuits), fourth-
generation (1971-1989, large-scale and very large scale integrated circuits); fifth-generation
(1990-present, high performance computing, smart devices,
6. Computer Applications
During the past few decades, computers and electronic technologies have been incorporated
into almost every aspect of society. Areas of applications include, but not limited to, business,
banking and finance, government, education, marketing, insurance, healthcare and medicine,
engineering design, military, home, manufacturing, agriculture, workplace, scientific research,
recreation and entertainment.
7. Mobile devices and applications

Mobile computing is the next evolution in the development of computing systems. Mobile
Computing is the use of portable computing devices (such as laptops, tablets, smartphones) in
conjunction communication technologies that allow transmission of data, voice and video usually
over a wireless network. The following wireless networks support mobile computing: Wireless
Personal Area Networks (Bluetooth, Sensors, etc.); Wireless LANs (802.11 family); Fixed
Wireless (e.g. CDMA); Cellular networks - 1G to 5G; and Satellite systems.

Mobile hardware: portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.

Mobile operating systems software: Android (from Google), iOS (from Apple Corp.), Blackberry
OS (from RIM), Windows Mobile (from Microsoft).

Mobile Communication Technologies: 1G-5G – first to fifth generation mobile


telecommunication; global positioning system (GPS); long-term evolution (LTE), Worldwide
Interoperability for Microwave Access (WiMAX); and Near Field Communication (NFC).

8. Computer Security

Computer security involves the process of protecting assets to ensure confidentiality, integrity
and availability. Confidentiality implies that only authorized users can view assets; integrity
implies only authorized users can modify assets; and availability implies authorized users are
able to use and have access to assets

Control measures for confidentiality include access control, authentication and identification.

Identification is the action or process of asserting one’s identity. Authentication is the act of
establishing or confirming that one actually is who he or she claims to be. A commonly used
authentication method is password. A password is an agreed-upon word, phrase, or set of
characters that is presumed to be known only by the user and the system.

Strong authentication utilizes:


Something the user knows, e.g., password, PIN, mother’s maiden name, etc.

Something the user has, e.g., physical key, ID badge, driver’s license, security token, etc.

Something the user is, e.g., voice recognition, biometrics

Combining two or more of these authentication mechanisms strengthens the authentication


process (multifactor authentication)

Best practices for securing assets:

Educate yourself. Organizations provide internal security training for all employees.

Be skeptical. You should treat anything you see online with a high degree of skepticism.

Check privacy policies & settings. Make sure you understand them, as they likely explain if
your information is shared with other parties.

Good passwords. Use good, strong passwords. If possible, the password should contain letters
and numbers, as well as special characters.

Protect the password. You should never share your password with others.

Stay updated. Always ensure that the software you use is up-to-date.

9. Microsoft Word (Brief)

Microsoft Word is an example of an Word Processor. Word Processors are used for word
processing, that is, used for creating and editing text based documents such as memo, letters,
newsletters, minutes, projects etc ).

Microsoft Word belongs to a group of Microsoft applications called Microsoft Office suite.
Others include Microsoft Excel, Microsoft Access, Microsoft PowerPoint, and Microsoft
Outlook. Microsoft Word has features for:

• Automatically pointing out misspelled English words by underlining them,


• Automatically pointing out grammatical English error by underlining them,
• Formatting Documents automatically as you type,
• Keep track of changes made to your document etc.

10. ICT and Society

Today, Information and Communications Technology (ICT) has become an integral part of the
human life. The Internet and the social media have come to completely revolutionize the human
life and activities.

The internet may be simply defined as a global communication network that allows almost all
computers worldwide to connect and exchange information. Internet services include:

• World Wide Web (WWW) • Internet Relay Chat (IRC)


• Electronic Mail (E-mail) • Telnet
• News Groups • Voice over Internet Protocol (VoIP)
• File Transfer Protocol (FTP) • Gopher

Social media is comprised of online communications channels dedicated to community-based


input, interaction, content-sharing and collaboration. Websites and applications dedicated to
forums, microblogging, social networking , social bookmarking, social curation, and wikis are
among the different types of social media.

Presently, there are hundreds of social media platforms in existence and operation. Some of
them are: Facebook, Google+, Friendster, hi5, LinkedIn, Twitter, Tumblr, XING, Flickr,
Howcast, iTunes, MySpace, Picasa, Vimeo, YouTube, Blab, Delicious, Digg, Instagram,
Pinterest, Quora, Reddit, Scribd, SlideShare, Wikipedia, Yelp, WhatsApp, 2Go, Nairaland,
LindaIkejiBlog, etc.
University of Abuja
Faculty of Science
Department of Computer Science
CSC 300: Microcomputer Applications

Lecture 2: Review data representation, characters, words, strings


In the lecture, the following topics will be covered:
1. Types of data and data Representation
2. Text representation
3. Image representation
4. Sound Representation
5. Data Compression: images, sounds and videos

1. Types of data and data representation


In Lecture 1, it was explained that data is an unprocessed facts and figures and that data is
represented in the computer using 0s and 1s (equivalent to electrical pulses) called bits (or binary
digits). The smallest “unit” of data on a binary computer is a single bit. A group of 4 bits is
called nibble, a group of 8 bits is called byte and a group of 16 bits is called word. Bytes are
typically used as a unit of measure of data in the storage unit. A 1 megabyte storage unit can
store 1048576 bytes of data (which is equal to 1024 kilobytes).

2. Text representation
As described in Lecture 1, data is used to represent texts, pictures, videos and audios. Texts are
usually in characters which are converted to numbers (by means of a code) for representation in
the computer. Each character symbol is assigned a unique bit pattern. The text is then
represented as a long string of bits in which the successive patterns represent the successive
symbols in the original text.
In the mid-1900s, the American National Standards Institute (ANSI) adopted the American
Standard Code for Information Interchange (ASCII) that uses bit patterns of length seven to
represent upper- and lowercase letters of the English alphabet, punctuation symbols, digits 0
through 9, and certain control information such as line feeds, carriage returns, and tabs. The
symbols are represented in the table below with the column bits representing the first 3 bits and
the row bits representing the last 4 bits of the bit pattern.

7
Column
0 1 2 3 4 5 6 7
000 001 010 011 100 101 110 111
Row
0(0000) NUL DLE SP 0 @ P ` p
1(0001) SOH DC1 ! 1 A Q a q
2(0010) STX DC2 " 2 B R b r
3(0011) ETX DC3 # 3 C S c s
4(0100) EOT DC4 $ 4 D T d t
5(0101) ENQ NAK % 5 E U e u
6(0110) ACK SYN & 6 F V f v
7(0111) BEL ETB ' 7 G W g w
8(1000) BS CAN ( 8 H X h x
9(1001) HT EM ) 9 I Y i y
10(1010) LF SUB * : J Z j z
11(1011) VT ESC + ; K [ k {
12(1100) FF FS , < L \ l |
13(1101) CR GS - = M ] m }
14(1110) SO RS . > N ^ n ~
15(1111) SI US / ? O _ o DEL

The binary code for any entry can be found by composing the bits of the column number with the
bits of the row number. For example, CR is in column 0, row 13, and thus has the binary code
0001101 = 13 decimal = 15 octal = 0D hexadecimal. The ASCII encoding scheme can only
accommodate 128 character symbols.

The International Organization for Standardization (ISO) developed a number of extensions of


ASCII, each of which was designed to accommodate a major language group.

In contrast to the 7-bit ASCII encoding scheme, IBM developed Extended Binary Coded
Decimal Interchange Code (EBCDIC) in 1963. This is an eight-bit character encoding used
mainly on IBM mainframe and IBM midrange computer operating systems. The EBCDIC can
accommodate character symbols.

ASCII and its extended versions, were not sufficient to accommodate alphabets of man Asian
and some Eastern European languages. For this and other reasons, the Unicode was developed
through the cooperation of several of the leading manufacturers of hardware and software. The
encoding scheme uses up to 21 bits to represent each symbol. The Unicode is usually combined

8
with Unicode Transformation Format 8-bit (UTF-8) encoding standard to accommodate ASCII
8-bit pattern (note that 8-bit ASCII simply attached 0 as the most significant bit), and languages
such as Chinese, Japanese, and Hebrew. UTF-8 also uses 24-bit and 32-bit patterns to represent
more obscure Unicode symbols.

A file consisting of a long sequence of symbols encoded using ASCII or Unicode is often called
a text file. A text file contains only character-by-character encoding of the text. Note that text file
produced by a word processor contains numerous proprietary codes representing changes in
fonts, alignment information and other parameters.

3. Image Representation

Pictures and videos are represented in bits, octal or hexadecimal. Pixels (or picture elements) are
also used to represent pictures and video frames. A pixel is defined as the basic unit of
programmable color on a computer display or in a computer image. The physical size of a pixel
is based on the resolution for the display screen. The appearance of each pixel is then encoded
and the entire image is represented as a collection of these encoded pixels called bit map.

The method of encoding the pixels in a bit map varies among applications. In a simple black-
and-white image, each pixel is a single bit whose value depends on whether the pixel is black or
white. A more elaborate black-and-white photograph uses collection of bits (typically 8 bits) to
allow for a variety of shades of grayness to be represented. For color images, each pixel is
encoded using two approaches.

First approach: RGB encoding uses red, green and blue color components, corresponding to the
intensity of three primary colors of light to represent a pixel. Three bytes of storage are required
to represent a single pixel in the original image.

Second approach: uses brightness component and two color components. The brightness
component is called the pixel luminance and it is the sum of the red, green, and blue components.
The two color components are blue and red chrominance, obtained from the difference between
the pixel luminance and the amount of blue or red light in the pixel.

4. Sound representation

The most generic method of encoding audio information for computer storage and manipulation
is to sample the amplitude of the sound wave at regular intervals and record the series of values
obtained. A sample rate of 8000 samples per second has been used for years in long-distance
voice telephone communication.

To obtain better quality sound reproduction by today’s musical CDs, a sample rate of 44,100
samples per second is used. The sample data is represented in 16 bits (or 32 bits for stereo
recording).

9
Another encoding scheme for audio known as Musical Instrument Digital Interface (MIDI) is
widely used in the music synthesizers found in electronic keyboards, video game sound, sound
effects accompanying websites. MIDI encodes what instrument is to play which note and for
what duration of time.

5. Data compression

Data compression is the technique of reducing the size of the data while retaining the underlying
information. Data compression scheme is either lossless or lossy. Lossless schemes do not lose
information in the compression. Lossy schemes may lead to the loss of information. Lossy
techniques often provide more compression than lossless schemes and are therefore popular in
settings in which minor errors can be tolerated.

The bit maps produced using the encoding schemes described in the preceding sections are often
large. Numerous compression schemes have be devised for image, audio and sound compression.
Examples of such compression schemes are Graphic Interchange Format (GIF), Joint
Photographic Experts Group (JPEG), Tagged Image File Format (TIFF), and Motion Picture
Experts Group (MPEG).

GIF was developed by CompuServe and it uses dictionary encoding system to reduce the number
of colors of a pixel to 256. The 256 encodings are stored in a table (a dictionary) called palette.
Each pixel in an image is represented by a single byte whose value indicates which of the 256
palette entries represents the pixel’s color.

JPEG is has proved to be an effective standard for compressing color photographs. The JPEG
standard encompasses several methods, each with its own goals. When precision is utmost,
JPEG’s lossless is used, this usually entails high level compression The JPEG’s lossy sequential
mode has become the standard of choice in many applications.

TIFF as a compression technique allows for the storing of photographs along with their related
information, such as date, time, and camera settings.

MPEG is a compression scheme for audios and videos and it encompasses a variety of standards.

References

• Brookshear and Brylow, 2015, Computer Science, An Overview, 12th edition, Pearson
Publishers.
• http://www.bernstein-plus-sons.com/.dowling/Characters.html
• https://en.wikipedia.org/wiki/EBCDIC

10
LECTURE 3: Internet, E- mail, IM & E-commerce
Communication is an important component of life. It is also a known fact that Information or knowledge
is power. Nowadays, there are various forms of communication. This ranges from one way
communication devices such as TV and radio, to two way communication devices such Laptops, Tablets
and Mobile Phones. This trend enhances voice calls, text messaging, email and instant messaging.
Teenagers’ and young adults’ use of Instant Messaging (IM) is on rapid rise, and this has been a recent
object of media attention. Indeed, the popularity of IM indicates that synchronous (or near-
synchronous) text messaging and presence awareness has a place in teenage communications, despite
an array of competing media available to them. This lecture discusses various email communication
types, instant messaging, Social Media and its security considerations as well as e-commerce
applications. All these are achievable with internet connectivity.

TYPES OF EMAIL
Generally speaking, HTML email can be broken down into two categories:

• One-to-many, where a large list of people are sent the same or very similar emails from a source to
which they’ve intentionally subscribed (like a newsletter, or an event invitation).
• Transactional, where an email is sent to a person on an individual basis, usually as a result of an action
they’ve taken (like making a purchase, or receiving a shipping update).

ONE-TO-MANY EMAIL

One-to-Many emails have been a staple of electronic marketing since the early days of the web. They’ve
been an optimal way to market to millions of people at a lower cost than print or other types of media
like television and radio. Since HTML email marketing is generally interest driven, the audience to which
you’re sending is already receptive.

Email evolved with the explosion of social media to include more focused subjects and audiences,
allowing “one-to-many” to actually be personal, despite large audiences.

One-to-Many emails include:

• General interest newsletters from organizations, businesses, and communities


• Product marketing, coupons
• Event announcements, invitations, and details
An example is shown on Fig.1.

11
Figure 1

Transactional Email
Transactional emails are becoming essential to the way we interact with applications and services on the
web. You know those emails from Facebook letting you know someone’s commented on a photo, or
those receipt emails you get from Amazon? They’re transactional emails, with content that’s tailored
specifically to you. Transactional email is a type of one-to-one email. It’s different from bulk email,
which goes to many people with the same content.

Transactional emails might invite us back to a web service after a period of inactivity, let us know what’s
happening online while we’re away, or encourage us to purchase items we left in our shopping cart.

The idea of the term “transactional” may vary across industries—it doesn’t necessarily infer e-
commerce, as not all transactional emails are related to purchases. Many people refer to transactional
emails as triggered, automatic, real-time, or even personalized

12
Figure 2

You may receive a transactional email when you:

• Sign up for a service, site, or newsletter


• Forget your username or password, and request a new one
• Make a change to an account profile
• Have updates or notifications sent from an account
• Make a purchase or donation online or in a brick-and-mortar store (some retailers will now offer to
email a receipt to you)
• Leave items in an online shopping cart
• Renew a subscription to a site or service
• Get a reply to a comment on a blog or social-media site
• Get a response from a contact form or online survey

Generally speaking, transactional emails aren’t considered marketing emails. However, they may
sometimes contain a marketing message along with the transaction details.

Email Access Types by ISP


The most common types of accounts are referred to by their Internet protocol name — POP3 and IMAP
or just POP and IMAP. Your ISP can tell you which protocol you use to access your e-mail account, but
POP3 is by far the most common. The POP3 and IMAP accounts differ in where your messages are saved
ultimately.

13
What are IMAP and POP?

IMAP and POP are two methods to access email. IMAP is the recommended method when you need to
check your emails from several different devices, such as a phone, laptop, and tablet.

IMAP

IMAP allows you to access your email wherever you are, from any device. When you read an email
message using IMAP, you aren't actually downloading or storing it on your computer; instead, you're
reading it from the email service. As a result, you can check your email from different devices, anywhere
in the world: your phone, a computer, a friend's computer.

IMAP only downloads a message when you click on it, and attachments aren't automatically
downloaded. This way you're able to check your messages a lot more quickly than POP.

POP

POP works by contacting your email service and downloading all of your new messages from it. Once
they are downloaded onto your PC or Mac, they are deleted from the email service. This means that
after the email is downloaded, it can only be accessed using the same computer. If you try to access
your email from a different device, the messages that have been previously downloaded won't be
available to you.

Sent mail is stored locally on your PC or Mac, not on the email server.

A lot of Internet Service Providers (ISPs) give you email accounts that use POP.

Webmail accounts vs email apps

If you've used Gmail, Outlook.com, Hotmail.com, or iCloud, then you've used webmail. To get to your
webmail account, you access the Internet and sign in to your email account.

If you have a PC or Mac, you've probably used a program like Outlook, Apple Mail, or Thunderbird to
manage your email. Outlook, Apple Mail, and Thunderbird are email apps: programs that you install on
your computer to manage your email. They interact with an email service such as Gmail or Outlook.com
to receive and send email.

You can add any email account to your email app for it to manage your email. For example, you can add
webmail accounts - Gmail, Outlook.com, Hotmail.com, AOL, and Yahoo - to the Outlook or Apple Mail
app to manage your email, and you can add work email accounts.

Adding webmail accounts to email apps such as Outlook, Apple Mail, Thunderbird

When you add your email account to your email app, it will usually attempt to set it up with IMAP
access, without any input from you.

If the email app has difficulty adding your email account, it's usually because the email account is set up
for POP access. In this case, you need to go to your email provider and find out the name of their POP
and SMTP server so you can enter the info into the email app. The info usually looks something like this:

• Incoming Mail (IMAP) Server: imap.<name of service>.com

14
• Incoming (POP) Server: pop.<name of service>.com

• Outgoing Mail (SMTP) Server: smtp.<name of service>.com

INSTANT MESSAGING

Instant messaging (IM) is a form of online communication that allows real-time (or close to real-
time) interaction through per- sonal computers or mobile computing devices. Users can
exchange messages privately, similar to e-mail, or join group conversations. Although typed text
remains the primary con- vention for IM, the technology has grown significant ly from early
versions and now allows users to send images, audio and video files, and other attachments.
Early versions of IM appeared in the late 1990s, and the list of IM tools has grown to include
dozens of applications. Technolo- gies that enable IM—such as wireless connectivity and mobile
devices—have become widespread, providing a “critical mass” for IM to reach near ubiquity. At
the same time, many vendors whose primary business is something other than IM have added
IM functionality to their products. Nearly all learning management systems have incorporated
chat tools, ranging from the elegant and sophisticated, which include icons, sounds, and
pictures, to the rudimentary, which simply provide text in boxes.

The interactive nature of IM is closer to spoken conversation than written correspondence,


allowing users to communicate in a manner that e-mail does not. IM users have a sense of
presence of other users, as if they were in a room together. At the same time, the technology
facilitates the kind of on-screen interaction, with its perceptions of distance and safety, that
many especially comfortable.

The IM Users
Large and growing numbers of teens—today’s and tomorrow’s college students—are regular
users of IM, both as a personal communication tool and, in some cases, for educational initia-
tives in high school. As IM matures into an accepted means of communication, and as ever-
larger numbers of students arrive on campus as seasoned IM users, colleges and universities
are adding IM to campus functions ranging from recruiting and admissions to teaching and
support. Some institutional libraries have set up online reference desks with IM applications,
and faculty have begun using the technology to facilitate virtual office hours. For many current
and prospective students, IM is becoming the preferred mode of contact with recruiters and
admissions staff, the registrar’s office, and academic advisors.
IM FUNCTIONALITIES
Functionality ranges widely for IM applications, but typically users log in to a service with a
screen name or ID. Most IM applications notify users when others join or leave, and many allow

15
users to indicate their status, such as “away from desk” or “in a meeting.” Once logged in, you
can send messages to individuals or join IM sessions. Most IM windows include an area where
messages are displayed chronologically and a composition box where messages are typed.
Composition boxes usually allow basic formatting of text, and most let you add images,
multimedia files, or other attachments. When someone types an instant message, the chat
client indicates that a message is being composed. When the message is sent, it pops up on
your screen in front of other applications.

SIGNIFICANCE OF IM
Hundreds of millions of people use IM to stay connected. In many ways, IM epitomizes the
notion of the always-connected, multi- tasking student, sending and receiving messages at all
hours, from a wide spectrum of devices, while doing several other things at the same time. For
many students, the technology has become as ingrained in daily life as telephones are for older
generations. Many colleges and universities are working to incorporate IM into the educational
aspects of students’ lives, rather than relegating it to a social function.
IM interactions are infused with a level of serendipity and the possibility of chance encounters
online that are unique to the medium. Some applications allow users to set a status of
“hidden.” Even though you cannot tell they are online, they might suddenly send you a
message. You can send a message to someone who is logged in, but perhaps she is away from
her computer. Maybe she is in class or otherwise occupied but hasn’t set her status to show
that.

IM users have developed an evolving syntax that includes short- hand, acronyms, symbols, and
other elements that constitute a unique lexicon, encouraging users to interact in ways not
possible either in person or with other forms of electronic communication. While this dynamic
expands access to students who are uneasy with other types of communication, it also provides
new modes of expression for students who are otherwise comfortable participating in class. IM
creates an environment that approximates the sharing of a physical space, allowing distance
students to engage in learning that approaches face-to-face meetings.
The technology is also promoting the practice of creating “back channels,” or secondary
conversations that happen at the same time, for example, as a lecture, board meeting, or
conference call. Students in a lecture hall might use IM to ask each other questions about the
lec- ture topic and share their thoughts without interrupting the professor
IM CHALLENGES
The flip side of offering new modes of interaction is that the technology might encourage some
participants to engage in offensive, disruptive, or other behavior that, in different contexts,
theywould see as inappropriate. As with any new form of communi- cation, IM can lead to
misunderstandings about what others are trying to convey. Moreover, the always-on notion of
IM carries the risk of unrealistic expectations about how quickly users can expect responses.

16
Because messages pop up on users’ screens who are logged in, some consider the technology
to be a source of continual distractions.
Users of IM technologies face a number of security risks. Although sending attachments
through IM fosters a richer experience, those files are subject to viruses and other malware,
particularly since IM attachments often bypass antivirus software. Some IM networks are more
susceptible than others to eavesdropping, and a problem looming on the horizon is that of
“spim,” the IM version of spam. Because it’s difficult to verify the source of an instant message,
some people have begun sending unwanted messages to IM clients, with bogus advertisements
or solicitations for personal information.
IM TREND
Just as IM tools are showing up in non-IM software, so too are traditionally non-IM features
included in IM applications, blurring the lines between types of applications. The introduction
of new consumer electronic devices and the growing functionality of existing ones are
broadening the scope of IM availability. Video chat applications are appearing, and IM networks
are starting to allow users to send messages to users who are not online and to see archived
transcripts of past messages. New IM features are being added to allow richer conversations,
such as turn taking, collaborative composition, and game playing. The proliferation of IM-
capable devices will bring new uses of the technology that take advantage of its unique nature.
IMPLICATIONS FOR TEACHING AND LEARNING
Students who use IM feel connected with peers and faculty, and some users have found that IM
facilitates semiformal distance rela- tionships that are difficult to create through other media.
IM offers higher education a new mode of communication, often for relative- ly low cost and
without significant overhead for IT infrastructure. Increasingly, students will arrive on campus
having spent years using IM, expecting the technology to be part of their educational lives. In
addition, because IM is used for communication in many corporations, for many its use will
extend beyond college.
SOCIAL MEDIA AND SECURITY CONSIDERATIONS

Social media is defined by Kaplan and Haenlein (2010) as ‘a group of internet-based applications that
build on the ideological and technological foundations of Web 2.0, and that allow the creation and
exchange of user generated content’. Trends suggest that social networking websites are becoming
more common and important for individuals (Szwedo et al., 2010), and recently also for organizations
(Light et al., 2008; Kuikka and Äkkinen, 2011).

Most IM systems presently in use were designed with scalability rather than security in mind. Virtually
all freeware IM programs lack encryption capabilities and most have features that bypass traditional
corporate firewalls, making it difficult for administrators to control instant messaging usage inside an
organization. Many of these systems have insecure password management and are vulnerable to
account spoofing and denial-of-service (DoS) attacks. Finally, IM systems meet all the criteria required to
make them an ideal platform for rapidly spreading computer worms and blended threats:2 they are

17
ubiquitous; they provide a communications infrastructure; they have integrated directories (buddy lists)
that can be used to locate new targets; and they can, in many cases, be controlled by easily written
scripts. Even worse, no firewall on the market today can scan instant messaging transmissions for
viruses.

Figure 3 INSTANT MESSAGING CLIENT SERVER ARCHITECTURE

Virtually all IM systems employ the same basic client-server architecture. Users install instant messaging
clients on their client machines—desktop computers, wireless devices, or PDAs, for example—and these
clients communicate with an IM server in the messaging provider’s infrastructure to locate other users
and exchange messages. In most instances, messages are not sent directly from the initiating user’s
computer to the recipient’s computer, but are sent first to an IM server, and then from the IM server to
the intended recipient. (See Figure 3.)

Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by
enterprises to engage with customers, build their brands and communicate information to the rest of
the world. However, social media for enterprises is not all about "liking," "friending," "up-voting" or
"digging." For organizations, there are high risks to using social media, ranging from damaging the brand
to exposing proprietary information to inviting lawsuits.

SOCIAL MEDIA SECURITY THREATS:

Information security has become a growing concern for companies by the advent of social media. New
technologies for collaboration and interaction have increased the possibilities for information sharing.
Although online communication has become very popular and has become the way to maintain social
relationships, it has also highlighted the adverse effects on human behaviour. For companies, it would
be important to get an understanding of whether and how social media represents a threat to

18
information security in order to be better able to plan their appearances in and policies concerning
social media.

For companies and their employees, social media allows new ways to communicate with customers and
colleagues. Vast amounts of information are being exchanged in social media. Information is a highly
valuable asset, and therefore questions concerning information security become more and more
important. Companies are becoming increasingly worried about information security in social media.

There are three main security challenges:

First, challenges arising from employees’ actions or unawareness in social media (especially reputation
damage) seem to represent bigger threats to information security than threats caused by outside
attacks.

Second, the confusion of private and professional roles in social media represents an information
security risk, and distinguishing between these roles becomes more difficult the higher an employee’s
position in the company.

Third, communication with employees and colleagues represents an information security challenge
especially when communication is not steered by the company.

MOBILE APPS: ADVERTISING

The rise of social media is inextricably linked with the revolution in mobile computing, which has
spawned a huge industry in mobile application development. Naturally, whether using their own or
company-issued mobile devices, employees typically download dozens of apps because, well, because
they can. Sometimes they download more than they bargained for. In early March, Google
removed from its Android Market more than 60 applications carrying malicious software. Some of the
malware was designed to reveal the user's private information to a third party, replicate itself on other
devices, destroy user data or even impersonate the device owner.

And all because this new game is supposed to be even better than Angry Birds!

E-commerce
Electronic commerce, commonly known as E-commerce is trading in products or services using
computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web for at least one
part of the transaction's life cycle, although it may also use other technologies such as e-mail.

Definition of E-commerce:

Sharing business information, maintaining business relationships and conducting business transactions
using computers connected to telecommunication network is called E-Commerce.

19
E-Commerce Categories:

1. Electronic Markets

Present a range of offerings available in a market segment so that the purchaser can compare the prices
of the offerings and make a purchase decision. Example: Airline Booking System

2. Electronic Data Interchange (EDI)

• It provides a standardized system


• Coding trade transactions
• Communicated from one computer to another without the need for printed orders and
• invoices & delays & errors in paper handling
• It is used by organizations that a make a large no. of regular transactions
• Example: EDI is used in the large market chains for transactions with their suppliers

3. Internet Commerce

• It is use to advertise & make sales of wide range of goods & services.
• This application is for both business to business & business to consumer transactions.

Example: The purchase of goods that are then delivered by post or the booking of tickets that can be
picked up by the clients when they arrive at the event.

Figure 4 The Three Categories of E-commerce

Advantages Of E-commerce:

• Buying/selling a variety of goods and services from one's home or business


• Anywhere, anytime transaction
• Can look for lowest cost for specific goods or service
• Businesses can reach out to worldwide clients - can establish business partnerships
• Order processing cost reduced
• Electronic funds transfer faster
• Supply chain management is simpler, faster, and cheaper using ecommerce

- Can order from several vendors and monitor supplies.

20
- Production schedule and inventory of an organization can be inspected by cooperating
supplier who can in-turn schedule their work

Disadvantages of E-commerce:

• Electronic data interchange using EDI is expensive for small businesses


• Security of internet is not very good - viruses, hacker attacks can paralise
• e-commerce
• Privacy of e-transactions is not guaranteed
• E-commerce de-personalises shopping

Threats of E-commerce:

• Hackers attempting to steal customer information or disrupt the site.


• A server containing customer information is stolen.
• Imposters can mirror your ecommerce site to steal customer money
• Authorised administrators/users of an ecommerce website downloading hidden active content
that attacks the ecommerce system.
• A disaffected employee disrupting the ecommerce system.

It is also worth considering where potential threats to your ecommerce site might come from, as
identifying potential threats will help you to protect your site.

Consider Potential Threats:

• Who may want to access your ecommerce site to cause disruption or steal data; for example
competitors, ex-employees, etc.
• What level of expertise a potential hacker may possess; if you are a small company that would
not be likely to be considered a target for hackers then expensive, complex security may not be
needed.

Features of E-Commerce:

• Ubiquity Internet/Web technology is the marketplace is extended beyond traditional available


everywhere: at work, at home, and boundaries and is removed from a temporal and elsewhere
via mobile devices, anytime. geographic location.
o Marketspace‖ is created; shopping can take place anywhere. Customer convenience is
enhanced, and shopping costsare reduced.
• Global reach: The technology reaches Commerce is enabled across cultural and across national
boundaries, around the earth. national boundaries seamlessly and without modification.
o Marketspace‖ includes potentially billions of consumers and millions of businesses
worldwide.
• Universal standards: There is one set of There is one set of technical media standards
technology standards, namely Internet across the globe.
• Richness: Video, audio, and text messages Video, audio, and text marketing messages are
possible integrated into a single marketing message and consuming experience.

21
• Interactivity: The technology works Consumers are engaged in a dialog that through interaction
with the user dynamically adjusts the experience to the individual, and makes the consumer a
co-participant in the process of delivering goods to the market.
• Information density: The technology Information processing, storage, and reduces information
costs and raises quality communication costs drop dramatically, while currency, accuracy, and
timeliness improve greatly. Information becomes plentiful, cheap, and accurate.
• Personalization/Customization: The Personalization of marketing messages and technology
allows personalized messages to customization of products and services are be delivered to
individuals as well as groups based on individual characteristics.

Business models of e-commerce:

There are mainly 4 types of business models based on transaction party.

Business-to-Consumer (B2C)

In a Business-to-Consumer E-commerce environment, companies sell their online goods to consumers


who are the end users of their products or services. Usually, B2C E-commerce web shops have an open
access for any visitor, meaning that there is no need for a person to login in order to make any product
related inquiry.

Business-to-Business (B2B)

In a Business-to-Business E-commerce environment, companies sell their online goods to other


companies without being engaged in sales to consumers. In most B2B E-commerce environments
entering the web shop will require a log in. B2B web shop usually contains customer-specific pricing,
customer-specific assortments and customer-specific discounts.

Consumer-to-Business (C2B)

In a Consumer-to-Business E-commerce environment, consumers usually post their products or services


online on which companies can post their bids. A consumer reviews the bids and selects the company
that meets his price expectations.

Consumer-to-Consumer (C2C)In a Consumer-to-Consumer E-commerce environment consumers sell


their online goods to other consumers. A well-known example is eBay.

References

Kaplan, A.M. and Haenlein, M. (2010). Users of the World, Unite. The Challenges and Opportunities of
Social Media. Business Horizons, 53(1), 59-68.

Kuikka, M and Äkkinen, M. (2011). Determining the Challenges in Organizational Social Media
Adoption and Use. In Proceedings of the 19th European Conference on Information Systems.

Rebecca E. Grinter & Leysia Palen. Instant Messaging in Teen Life. In CSCW’02, November 16–20,
2002, New Orleans, Louisiana, USA. Copyright 2002 ACM 1-58113-560-2/02/0011

Symantec Security White Paper: Securing Instant Messaging

22
Department of Computer Science
CSC300: COMPUTER APPLICATIONS

Lecture 4
Title: Word Processing

OBJECTIVES
The students will learn:
*Definition of Word Processing, Word Processing Software and examples of word processing
Software.
* MS Word Graphical User Interface: Ribbon, the quick access toolbar, the title bar, the text area
*Working with text: deleting, copying, pasting
* Working with documents: Be able to create document, save documents, print documents, format
documents, create tables, use headers and footnotes, templates, column and order, use the proofing
features and modifying spacing

WORD PROCESSING

Word processing is the phrase used to describe using a computer to create, edit, and print
documents. Of all computer applications, word processing is the most common. To perform
word processing, you need a computer, a special program called a word processor, and a
printer.

Word processing software

Is used to manipulate a text document, such as a resume or a report. You typically enter text by
typing and the software provides tools for copying, deleting and various types of formatting.
Some of the functions of word processing software include:

• Creating, editing, saving and printing documents.


• Copying, pasting, moving and deleting text within a document.
• Formatting text, such as font type, bolding, underlining or italicizing.
• Creating and editing tables.
• Inserting elements from other software, such as illustrations or photographs.
• Correcting spelling and grammar.

Examples of Word Processing Software

There are a number of different word processing applications. One of the most widely used
ones is Word, which is part of Microsoft Office. Another widely used one is WordPerfect by the

23
Corel Corporation. A third one is Writer, which is part of OpenOffice by Apache. While the first
two are commercial software, OpenOffice is open source and can be downloaded and used free
of charge. Finally, there is Pages, which is part of iWork by Apple.

Microsoft Word commands you frequently use. By default


Save, Undo, and Redo appear on the Quick
Microsoft Word is a word processor Access toolbar.
developed by Microsoft. It was first
iii The Title Bar
released on October 25, 1983 under the
name Multi-Tool Word for Xenix systems.
Subsequent versions were later written for
the Title bar is next to the Quick Access
several other platforms.
toolbar . The Title bar displays the title of
the document on which you are currently
Basics of Microsoft Word
working.
Starting Microsoft Word
iv The Ribbon
To start Microsoft Word, Click on Microsoft
Word from your program or Desktop and
the screen below is display. This is called
Microsoft Word GUI.

The Ribbon is located near the top of the


screen, below the Quick Access toolbar. At
the top of the Ribbon are several tabs;
clicking a tab displays several related
command groups. Within each group are
The Microsoft graphical user interface related command buttons. You click
contains the following buttons to issue commands or to access
i. The Microsoft Office Button menus and dialog boxes. you use the
Ribbon to issue commands You may also
find a dialog box launcher in the bottom-
In the upper-left corner of the Microsoft right corner of a group. Clicking the dialog
Word GUI is the Microsoft Office button. box launcher gives you access to additional
When you click the button, a menu appears. commands via a dialog box.
You can use the menu to perform many v The Ruler
tasks.
ii The Quick Access Toolbar
The ruler is below the Ribbon.

the Quick Access toolbar is Next to the the ruler is used to change the format of
Microsoft Office button. The Quick Access your document. If your ruler is not visible,
toolbar provides you with access to you can make it visible as follow:

24
The vertical and horizontal scroll bars
enable you to move up, down, and across
your window simply by dragging the icon
located on the scroll bar. The vertical scroll
1. Click the View tab to choose it.
bar is located along the right side of the
2. Click the check box next to Ruler in
screen. The horizontal scroll bar is located
the Show/Hide group. The ruler
just above the status bar. To move up and
appears below the Ribbon.
down your document, click and drag the
vertical scroll bar up and down. To move
vi The Text Area back and forth across your document, click
and drag the horizontal scroll bar back and
The text area is the large area below the forth. You won't see a horizontal scroll bar if
ruler. You type your document in the text the width of your document fits on your
area. The blinking vertical line in the upper- screen.
left corner of the text area is called the
cursor. It marks the insertion point. As you viii The Status Bar
type, your text displays at the cursor
The Status bar is at the bottom of your
location.
window and provides such information as
the current page and the number of words
in your document.

vii The Vertical and Horizontal and


Vertical Scroll Bars

25
WORKING WITH TEXT To copy and paste text:

To insert text: • Select the text you want to copy.


• Click the Copy command on the
• Move your mouse to the location Home tab.
where you want text to appear in • Place the insertion point where you
the document. want text to appear.
• Left-click the mouse. The insertion • Click the Paste command on the
point appears. Home tab. The text will appear.
• Type the text you want to appear.

To delete text:

• Place your cursor next to the text


you want to delete.
• Press the Backspace key on your
keyboard to delete text to the left of
the cursor. To drag and drop text:
• Press the Delete key on your
keyboard to delete text to the right • Select the text you want to copy.
of the cursor. • Left-click your mouse, and drag the
text to the location where you want
To select text: it to appear. The cursor will have a
text box underneath it to indicate
• Place the insertion point next to the that you are moving text.
text you want to select.
• Left-click your mouse. While holding
it down, drag your mouse over the
text to select it.
• Release the mouse button. You have
selected the text. A highlighted box
will appear over the selected text. • Release the mouse button, and the
text will appear.
When you select text or images in Word, a
hover toolbar with formatting options If text does not appear in the exact location
appears. This makes formatting commands you want, you can click the Enter key on
easily accessible, which can save you time. your keyboard to move the text to a new
line.

26
WORKING WITH DOCUMENTS same file name. If you are saving for the
first time and select Save, the Save As
dialog box will appear.
Saving document
To Save As a Word 97 - 2003 document:
How to save documents
• Click the Microsoft Office button.
To use the Save As command:
• Select Save As Word 97-2003
Document.
• Click the Microsoft Office button.
• Select Save As Word Document.
The Save As dialog box appears.

• Select the location where you want


to save the document using the
• Select the location where you want drop-down menu.
to save the document using the • Enter a name for the document.
drop-down menu. • Click the Save button.
• Enter a name for the document.
Proofing Features

Worried about making mistakes when you


type? Don't be. Word provides you with
several proofing features that will help you
produce professional, error-free
documents. In this lesson, you will learn
about the various proofing features,
including the Spelling & Grammar tool

• Click the Save button. Using proofing features

To use the Save command: Line colors

• Click the Microsoft Office button. By default, Word automatically checks your
• Select Save from the menu. document for spelling and grammar errors.
These errors are indicated by colored wavy
Using the Save command saves the lines.
document in its current location using the

27
• The blue line indicates a contextual
spelling error.
o A contextual spelling error is
when an incorrect spelling of
a word is chosen. For
example, if you write Deer
Mr. Theodore at the
beginning of a letter, deer is
a contextual spelling error
because dear should have
been used. Deer is spelled
correctly, but it is used You can choose to ignore an underlined
incorrectly in this letter. word, add it to the dictionary, or go to the
• The red line indicates a misspelled Spelling dialog box.
word.
• The green line indicates a To use the grammar check feature:
grammatical error.
• Right-click the underlined word. A
menu will appear.
• Select the correct word from the
listed suggestions.
• Left-click your mouse on the word. It
will appear in the document.

To use the spelling check feature:

• Right-click the underlined word. A


menu will appear.
• Select the correct spelling of the
You can also choose to ignore an
word from the listed suggestions.
underlined word, go to the Grammar dialog
• Left-click your mouse on the word. It box, or find out more information about
will appear in the document. the word and its usage.

You can also wait and run the spelling and


grammar check after completing the
document. Click the Spelling & Grammar
command on the Review tab.

28
Printing • Print. The Print dialog box appears.
• Select the pages you want to print—
Once you complete your document, you either all pages or a range of pages.
may want to print it for various reasons. • Select the number of copies.
This lesson covers the three basic features of • Check the Collate box if you are
printing in Word, including Print Preview, printing multiple copies of a multi-
Quick Print, and traditional Print. page document.
• Select a printer from the drop-down
Printing list.

To preview the document before printing:

• Click the Microsoft Office button.


• Select Print Print Preview. The
document opens in Print Preview
format.

• Click OK.

Creating a New Document

In addition to working with existing


documents, you will want to be able to
• Click Print to print the document or create new documents. Each time you open
Close Print Preview to exit the Word, a new blank document appears;
preview format and make changes to however, you will also need to know how to
the document. create new documents while an existing
document is open.
In Print Preview format, you can perform
many tasks, including: New documents

• Modifying margins To create a new blank document:


• Changing page orientation
• Changing page size • Click the Microsoft Office button.
• Zooming in and out to view various • Select New. The New Document dialog
parts of the document box appears.
• Viewing multiple pages • Select Blank document under the Blank
• Accessing Word Options to change and recent section. It will be highlighted
several Word settings by default.

To print:

• Click the Microsoft Office button.


• Select Print

29
• Left-click the drop-down arrow
next to the font style box on the
Home tab. The font style drop-down
menu appears.
• Move your cursor over the various
font styles. A live preview of the
font will appear in the document.

• Click Create. A new blank document


appears in the Word window.

You can access templates that are installed


on your computer or on Office Online. Click
the Microsoft Office button and select New.
You can create blank documents and access
templates from the dialog box that appears.

Formatting Text
• Left-click the font style you want to
To create and design effective documents, use. The font style will change in the
you need to know how to format text. In document.
addition to making your document more
appealing, formatted text can draw the To format font color:
reader's attention to specific parts of the
document and help communicate your • Select the text you want to modify.
message. • Left-click the drop-down arrow next
to the font color box on the Home
To format font size: tab. The font color menu appears.
• Move your cursor over the various
• Select the text you want to modify. font colors. A live preview of the
• Left-click the drop-down arrow color will appear in the document.
next to the font size box on the
Home tab. The font size drop-down
menu appears.
• Move your cursor over the various
font sizes. A live preview of the font
size will appear in the document.

• Left-click the font size you want to


use. The font size will change in the
document.

To format font style: • Left-click the font color you want to


use. The font color will change in the
• Select the text you want to modify. document.

30
Your color choices aren't limited to the o Align Text Left: Aligns all
drop-down menu that appears. Select More of the selected text to the left
Colors at the bottom of the list to access the margin
Colors dialog box. Choose the color you o Center: Aligns text an equal
want, then click OK. distance from the left and
right margins
o Align Text Right: Aligns all
To use the bold, italic, and underline of the selected text to the
commands: right margin
o Justify: Aligns text equally
• Select the text you want to modify. to the right and left margins;
• Click the bold, italic, or underline used in many books,
command in the Font group on the newsletters, and newspapers
Home tab.

Using a Template
To change the text case:

• Select the text you want to modify. A template is a predesigned document you
• Click the Change Case command in can use to create new documents with the
the Font group on the Home tab. same formatting. With a template, many of
• Select one of the case options from the more important document design
the list. decisions such as margin size, font style and
size, and spacing are predetermined.

Creating a new document with a


template

To insert a template:

• Click the Microsoft Office button.


• Select New. The New Document
To change text alignment: dialog box appears.
• Select Installed Templates to
• Select the text you want to modify. choose a template on your computer.
• Select one of the four alignment
options from the Paragraph group on • Review the available templates.
the Home tab. • Left-click a template to select it.
• Click Create, and the template opens
in a new window.

31
• Click near the text you want to
replace. The text will appear
highlighted, and a template tag will
appear.

You can select any of the categories in the


Microsoft Office Online section of the New • Enter text. The placeholder text will
Document Dialog box. This will display free disappear.
templates that are available online. Your
computer must have Internet access to To change prefilled information:
download these templates.
• Select the Microsoft Office button.
Information about using templates • Click the Word Options button at
the bottom of the menu. The Word
Templates include placeholder text that is Options dialog box appears.
surrounded by brackets. Often, this • Enter the user name and/or initials
placeholder text includes information in the Popular section.
regarding the content for a specific area.

Additionally, some information is


prefilled in the template. You can modify
your Word Options and change the prefilled
information that appears.
Word templates may include separate Quick
Parts sections, which give you various
options for the template.

• Click OK.

Line and Paragraph Spacing

An important part of creating effective


documents lies in the document design. As
part of designing the document and making
formatting decisions, you will need to know
how to modify the spacing. In this lesson,
To insert text into a template: you will learn how to modify line and
paragraph spacing in various ways.

32
Modifying spacing between paragraphs adds emphasis and
makes a document easier to read.
To format line spacing:
To format paragraph spacing:
• Select the text you want to format.
• Click the Line spacing command in • Click the Line spacing command on
the Paragraph group on the Home the Home tab.
tab. • Select Add Space Before
• Select a spacing option. Paragraph or Remove Space After
Paragraph from the menu. If you
don't see the option you want, click
Line Spacing Options to manually
set the spacing (see below).

OR

• Select Line Spacing Options. The


OR Paragraph dialog box appears.
• Change the Before and After points
• Select Line Spacing Options. The in the Paragraph section.
Paragraph dialog box appears.

• Click OK.

Line spacing is measured in lines or points,


which is referred to as leading. When you
reduce the leading, you automatically bring
• Use the Line spacing drop-down
the lines of text closer together. Increasing
menu to select a spacing option.
the leading will space the lines out, allowing
• Modify the before and after points
for improved readability.
to adjust line spacing as needed.
• Click OK.
Modifying Page Layout
Paragraph spacing
You may find that the default page layout
Just as you can format spacing between lines settings in Word are not sufficient for the
in your document, you can choose spacing document you want to create, in which case
options between each paragraph. Typically, you will want to modify these settings. In
extra spaces are added between paragraphs, addition, you may want to change the page
headings, or subheadings. Extra spacing formatting depending on the document

33
you're creating.

In this lesson, you will learn how to change


the page orientation, paper size, and page
margins, as well as how to insert a break.

Page layout and formatting

To change page orientation:


OR
• Select the Page Layout tab.
• Click the Orientation command in • Select Custom Margins from the
the Page Setup group. menu. The Page Setup dialog box
appears.

Left-click either Portrait or • Enter the desired margin size in the


Landscape to change the page orientation. appropriate fields.

Landscape format means everything on the You can always access the Page Setup
page is oriented horizontally, while dialog box by clicking the small arrow in the
portrait format means everything is bottom-right corner of the Page Setup group.
oriented vertically. The dialog box should look familiar to
people who have used previous versions of
To change the paper size: Word.

• Select the Page Layout tab. Columns and Ordering


• Left-click the Size command, and a
drop-down menu will appear. The Two useful formatting features in Word
current paper size is highlighted. are the columns and ordering commands.
Columns are used in many types of documents
but are most commonly used in newspapers,
Left-click a size option to select it. The
magazines, academic journals, and newsletters.
page size of the document changes.
Ordering is the process of layering two or more
To format page margins: shapes so they appear in a certain way. For
example, if you have two shapes that overlap
• Select the Page Layout tab. and want one shape to appear on top, you will
• Click the Margins command. A have to order the shapes.
menu of options appears. Normal is
selected by default.
• Left-click the predefined margin size Inserting columns and ordering
you want. objects

To add columns to a document:

• Select the text you want to format.

34
• Select the Page Layout tab.
• Left-click the Columns command.

Working with Headers and Footers

You can make your document look


• Select the number of columns you professional and polished by utilizing the
want to insert. header and footer sections. The header
is a section of the document that
Click the Show/Hide command on the appears in the top margin, while the
Home tab to display the paragraph marks footer is a section of the document
and breaks.
that appears in the bottom margin.
The Format Painter command allows you Headers and footers generally
to easily format text to appear like other text contain information such as page
in your document. Select the text that is number, date, and document name.
formatted the way you want, click the
Format Painter command on the Home tab, Headers and footers
and select the text you want to change. The
new text now appears modified. To insert a header or footer:

To change the order of objects: • Select the Insert tab.


• Click either the Header or Footer
• Right-click the object you want to command. A menu appears with a
move. In this example, click the list of built-in options you can use.
shape. • Left-click one of the built-in options,
• In the menu that appears, select and it will appear in the document.
Order.
OR
• Select a menu option that will
arrange the item in the desired way. • Left-click Blank to select it.
In this example, select Send Behind
Text.
• The text and image are now
displayed layered on top of the
shape.

35
• The Design tab with Header and your design options.
Footer tools is active.

Working with Tables

• Type information into the header or A table is a grid of cells arranged in


footer. rows and columns. Tables can be
customized and are useful for various
To insert the date or time into a tasks such as presenting text
header or footer: information and numerical data.

• With the header or footer section Inserting and modifying tables


active, click the Date & Time
command. To convert existing text to a table:

• Select the text you want to convert.


Select a date format in the dialog box • Select the Insert tab.
that appears. • Click the Table command.
• Select Convert Text to Table from
the menu. A dialog box appears.

• Choose one of the options in the


• Click OK. The date and time now Separate text at: section. This is
appear in the document. how Word knows what text to put in
each column.
Other header and footer options
• Click OK. The text appears in a
There are many other header and footer table.
options you can use to design these sections
of your document. From the Header and To add a row above an existing row:
Footer Tools Design tab, you can see all of

36
• Place the insertion point in a row • Right-click the mouse. A menu
below the location where you want appears.
to add a row. • Select Insert Insert Columns to
the Left or Insert Columns to the
Right. A new column appears.

To delete a row or column:

• Select the row or column.


• Right-click your mouse, and a menu
appears.
• Select Delete Columns or Delete
• Right-click the mouse. A menu Rows.
appears.
• Select Insert Insert Rows Above. To apply a table style:

• Select the table. A Table Tools


Design tab now appears on the
Ribbon.
• Select the Design tab to access all of
the Table Styles and Options.

A new row appears above the insertion


point.

• Click through the various styles in


the Table Styles section.
• Left-click a style to select it. The
table style will appear in the
document.
You can also add rows below the insertion
point. Follow the same steps, but select
You can modify which table styles are
Insert Rows Below from the menu.
displayed. In the Table Styles Options, you
can select and deselect various table options.
To add a column:
For example, you can select banded rows,
and only tables with banded rows will
• Place the insertion point in a
appear in the Tables Styles section.
column adjacent to the location
where you want the new column to
Want to have a little more creative freedom
appear.
when it comes to formatting your tables?
You can manually change the table border

37
or shading, change line weight, or erase part • Enter text into the table.
of the table.
Modifying a table using the layout tab
To insert a blank table:
When you select a table in Word, Design
• Place your insertion point in the and Layout tabs appear under Table Tools
document where you want the table on the Ribbon. Using commands on the
to appear. Layout tab, you can make a variety of
• Select the Insert tab. modifications to the table, including:
• Click the Table command.
• Drag your mouse over the diagram • Adding and deleting columns
squares to select the number of • Adding and deleting rows
columns and rows in the table. • Changing the cell size
• Aligning cell text
• Changing text direction
• Merging and splitting cells

• Left-click your mouse, and the table


appears in the document.

EXERCISES

1. Give four functions of a word processing software

2. Give three advantages of using a word processing software over a conventional type
writer

3. give three examples of a word processing software

4. Using Microsoft Word:

• Open an existing Word document.


• Save the document with the file name trial.
• Close the document.
• Open another existing Word document.
• Save the document so it is compatible with Word 2003.
• Close the document.

5. Create a new blank Word document.

• Insert text into the document.


• Change the font size of some text.

38
• Change the font style of some text.
• Change the font color of some text.
• Try various cases using the Change Case command.
• Try the four alignment commands.

6. Use the report or any Word document you choose to complete this.

• Convert text into a table.


• Apply a table style.
• Delete a row from the table.
• Insert a blank table with five rows and four columns.

REFERENCES
www.webopedia.com/TERM/W/word_processing.html
http://www.gcfearnfree.org/word2007

https://www.microsoft.com/learning
Apeh Ayo I CSC200 Lecture note on Introduction to Microsoft Word

39
Department of Computer Science
Faculty of Science
University of Abuja
CSC 300: NOTE 5

SREADSHEET
INTRODUCTION

A spreadsheet is an interactive computer application for organization, analysis and storage of data in
tabular form. Spreadsheets are developed as computerized simulations of paper accounting
worksheets. The program operates on data entered in cells of a table. Each cell may contain either
numeric or text data, or the results of formulas that automatically calculate and display a value based
on the contents of other cells.

LANPAR was the first electronic spreadsheet on mainframe and time sharing computers. VisiCalc
was the first electronic spreadsheet on a microcomputer, and it helped turn the Apple II computer into
a popular and widely used system. Lotus 1-2-3 was the leading spreadsheet when Disc Operating
System (DOS) was the dominant operating system. Excel now has the largest market share on the
Windows and Macintosh platforms. A spreadsheet program is a standard feature of an office
productivity suite; since the advent of web apps, office suites now also exist in web app form.

List of other spreadsheets software

• Accel Spreadsheet from SSuite Office


• Calligra Sheets (formerly KCalc)
• Corel Quattro Pro (WordPerfect Office)
• GS-Calc
• GridCraft collaborative cloud spreadsheet for web and iPad
• iSpread for iPad, iPhone and iPod Touch
• Kingsoft Spreadsheets
• Mariner Calc is Mariner Software's spreadsheet software for Mac OS.
• Calc XLS is Mariner Software's spreadsheet software for iOS.
• Numbers is Apple Inc.'s spreadsheet software, part of iWork.
• ZCubes-Calc

40
• GrapeCity Spread Studio
• NeoOffice
• Pyspread e.t.c

INTRODUCTION TO EXCEL

Excel is an electronic spreadsheet program that can be used for storing, organizing and

manipulating data. It is a Microsoft Application program developed for official use with an icon .

The uses of Excel


1. Scheduling
2. Basic Accounting
3. Return on Investment
4. Customer Data
5. Performing basic mathematical operations.
6. Find values such as profit or loss.
7. Calculating repayment plans for loans or mortgages.
8. To Find the average values
9. To find Maximum or minimum values in a specified range of data.
10. To analyze student Result

THE WORKBOOK
Workbook: Workbook is a Microsoft Excel window that is made up of several sheets. Excel is more
of textbook with series of page in it. The general name of Microsoft Excel is called “spreadsheet” and
the official name is called “workbook”. It file name are called Book, Book2, and Book3 …. Bookn
depend on the number of file that has already been saved. While a worksheet is a page in a workbook,
worksheet is the collection of multiple “Cells” that was arranged in a vertical and horizontal series.
The vertical arrangement of cells is called “columns” and the horizontal arrangements of cells are
“Row”.

WORKSHEET
Worksheet: A worksheet is a network of Cells formed as a result of intersection of Rows and
Columns parallel to each other in a workbook. Each sheet has links that appears at the bottom of an
active sheet called Tabs, with a default name, as follow (sheet1, sheet2, sheet3 . . . sheetn etc). You
can add and switch between worksheets by clicking each tab bellow

41
i.Cell: Microsoft Excel Cells are tiny textboxes found in a worksheet. Each Cell has a unique address
called Name located in a place called Name Box. There are two types of cells: Active and Inactive
cells.
ii.Active Cell: an active cell is that cell with a tick/bold rectangular border with a tiny square box (Fill
Box) at the bottom right Corner. It is usually a Computer focus and ready to accept Data.
iii.Focus: is to pay attention to a particular thing. Computer focus is the active portion or where cursor is
blinking while Human focus is the Pointer which changes it shapes depending where you move it to
in a worksheet.
iv.Inactive Cell: Inactive Cell is that cell which has no tick/bold border. You can change the Active to
Inactive by clicking deferent cell.
v.Column: Microsoft Excel Columns are Alphabetical order of Cells from left to right starting from A
to Z and then a combination of letters e.g. ABA, ABB till the last column XFD which amount to a
total of 256 columns. To see the last column do this: Hold down a control key (Ctrl) along with right
arrow Key
vi.Row: Microsoft Excel Rows are horizontal arrangement of serial numbers of Cells from 1 to
1,048,576. To view the last Row, Hold down a control key (Ctrl) along with down arrow key.
vii.Name box: Name box is a Reference potion of an active cell which displays Cell address.
viii.Cell Address: Cell address is a combination of letter and number to represent a location of Cell in a
worksheet e.g. A3, F12, etc.
ix.Address Bar: is a potion of worksheet below a Ribbon that is use to enter data or formula to an
active cell. You can edit data through the Address Bar when a particular cell is activated.

Note: There are 256 numbers of columns in a worksheet; 1,048,576 numbers of Rows which rises to
268,435,456 Cells.

CHARACTERISTICS OF POINTER IN EXCEL WORKSHEET


We should all know that a pointer is when user uses mouse to interact with computer, and something
moves around the screen. In Excel worksheet the movement of this mouse changes the shape to the
list of below shapes depending on the point of intersection:

A B D E F
C

G H I J K
e

Pointer Point of contacts Use Method of


Application
A Active cell border To Move the entire content Dragging
of cell into deferent cell
B Border between To increase/decrease height Dragging
rows number of a Row
C Border between To increase/decrease width Dragging
columns of a Column

42
D Fill Box To copy/repeats the content Dragging
of one cell in to deferent
cell/cells
E All part of To click on object Click
worksheet except
cells area
F All cells except To select/high-light cell or Dragging
active cell range of cells
G On a Number To select/high-light the entire Click
address of cells Row
H On a letter To select/high-light the entire Click
address of cells Column
I Above the upper To separate/split worksheet Dragging
Arrow head of in to two in order to view
vertical scroll bar upper and lower part of it at a
time
J Right side of the To separate/split worksheet Dragging
arrow head of in to two in order to view left
horizontal scroll and right part of it at a time
bar
K Address bar and To edit text Double click
active cell/textbox
Table: 1.0 Characteristic of Pointer

STARTING MICROSOFT EXCEL


How to start Excel
i.Go to left bottom of your Screen and

ii.1 Click the start Button, a start menu pop up check if Excel icon is not on the list then.
iii.Click All program
iv.Scroll down to Microsoft office folder

v.Click again on the Microsoft office Excel 2007 application icon to launch it.
Here we are :

43
TABS

i.How to add New sheets/Tab:


You can also add more sheets by clicking next button after the last tab. In this case the last tab is
sheet3 and the new sheet will be sheet4.
ii.How to delete a sheets

➢ Right click on the Tab you want to delete

➢ Go to delete and click

ii.How to rename a sheets


Renaming a sheet can be a latter, Number, word or phrase. If you want your sheet name to be a phrase
e.g. ‘Abuja color’ then you should adopt the idea of underscore by adding _ in between the words like

44
‘Abuja_color’ as the new name. the implication of not applying underscore is error due to reference
which shall be discourse in lesson 7 of this Book.
➢ Right click on the Tab you want to rename
➢ Go to rename
➢ Type the name of your choice
➢ Click enter key

iii.How to add color to a Tabs


➢ Right click on the Tab you want to color
➢ Go to tab color Note: color options display
➢ Click color of your choice

iv.How to hide/unhide Tab


➢ Right click on the Tab you want to hide/unhide
➢ Go to hide/unhide and click hide
➢ Or Unhide this will display a Menu containing a list of hidden sheet.
➢ Click which you intending to unhide.

v.How to Change position of Tab in the Tab menu


➢ Right click on the Tab you want to change position
➢ Go to move or copy.. and click it
➢ This will display a Menu containing a list of Tabs click which you intending to move.
Alternatively drag the tab to the tab before intending position.

vi.How to move a Tab to a new workbook


➢ Right click on the Tab you want to move
➢ Go to move or copy.. and click it
➢ This will display a Menu containing a list of Tabs

➢ in this case click on the arrow head and select new book
➢ Click Ok.

45
CONCEPT OF WINDOW, MENU AND DIALOG BOX
Window: A window is any rectangular frame that pup up immediately you click a file, a folder, an
icon or a program.It's important to understand how to move them, change their size, or just make
them go away.
Menu: This is just a list of command items in a small rectangle frame that can come up when you
right click on any place while working with Microsoft office. It does not have any command button
attached.
There are two type of menu
➢ List menu : is either an ordinary written text or an icons
➢ Dropdown menu: is a written text with an arrow head indicating an extension or sub items.

Example: start menu, office menu e.t.c.

Dialog boxes: A dialog box is a special type of window that asks user a question to answer before
performing next task, or provides you with information. You'll often see dialog boxes when a
program or Windows needs a response from you. Most of them contain option buttons to click

A dialog box appears if you exit a program without saving your work

Unlike regular windows, most dialog boxes can't be maximized, minimized, or resized. They can,
however, be moved. In addition all dialog boxes are window

COMMAND

Go to Microsoft office button at the top right Corner of your screen click to see the menu
i.Click on open. A window will appear
ii.Type or locate the file to open
iii.Click on Open button.
Open command
i.Click on office button
ii.Click on folder with a name Open

Note through Excel you can only open an excel file. The only file which has an extension name
(.exlx).
Closing command

46
i.Click the office button while in the office menu
ii.Float down to Close folder and click on that.
OR

Click on button at the right of the screen.

Exit Command
i.Click on Office button
ii.Click on Exit Excel in the office menu window.

OR

Click on

CTEATING, OPENING AND SAVE WORKBOOK


Creating a new workbook:
A new worksheet can be created through a workbook while you are working on it. To create
a new workbook while typing:
i.Click on office button
ii.Click on New.
Note a blank page will display.
iii.Click on create.
Or (Ctrl +N )

Saving a workbook:
In this case saving a workbook is of two type: ‘Save As’ and ‘Save’
You can use ‘Save As’ when saving a new workbook. This mean that the workbook you are
working in has not being assign a name and it is to be saving for the first time. ‘Save As’ can
also be use when you want to save your work in another location either in Flash drive or in
Desktop. While ‘Save’ it is use to update an existing workbook in a particular location
usually in a location called Documents.
To Save As:
i.Click Office button
ii.Click on ‘Save As’ a location will be display with title header ‘ Libraries Documents ’

47
iii.Below you will see a bar title with a ‘File name’

iv.Change the name to your desire.


v.Click on ‘Save’ button or change where you want to save the document
.
To Save:
i.Click on Office button
ii.Click on ‘Save’ the Office menu will automatically disappear to show that it responded to the
command.
Or hold down control key and press S (Ctrl +S)

FORMATTING
Font :
a. Applying Bold text
How to bold cell
➢ Click on cell you intending to bold
➢ Go to font group

➢ Click on B in

How to undo bold cell


➢ Reverse previous steps

b. Applying Fill color


How to fill color in a cell
➢ Go to font group
➢ Click on cell you intending to fill

➢ Click on arrow head beside to select your choice

How to unfilled color in a cell


➢ Click on cell you intending to fill

➢ Go to font group
➢ Click on arrow head beside
➢ select ‘No fill’.

48
c. Applying Font color

How to add font color to a cell


➢ Click on cell you intending to fill
➢ Go to font group

➢ Click on arrow head beside to select your choice.

d. Applying font (font face)

How to change font


➢ Click on cell you intending to fill
➢ Go to font group

➢ Click on arrow head beside


➢ Scroll to select your choice.

e. Applying font size

How to change font size


➢ Click on cell you intending to change font size
➢ Go to font group

➢ Click on arrow head beside a figure


➢ Scroll to select your choice under font group.

f. Applying/Draw border
➢ Click on the cell you intending to change it border
➢ Go to font group

➢ Click on the arrow head beside this to select your desire border.

You can as well create new border, erased border, line style and color of your choice through
any of the above steps.
g. Text Alignment
a. Left, centre and right.
➢ Click on the cell you intending to align
➢ Go to alignment group

➢ Click on any of these under alignment group

49
Note: the one in red fill is the active one
b. Orientation (text direction)
➢ Click on the cell you intending change it direction
➢ Go to alignment group
➢ Click on the arrow head beside to see option
➢ Click your desire text direction.
c. Merge cells
➢ Select the cells you intended to merge
➢ Go to alignment group
➢ Click on ‘merge & centre’

How to unmerge cells


➢ Select the cells that are merge
➢ Click on ‘merge & centre ‘ again

Applying style

Conditional format
➢ Select the Range of cells you intended to apply condition
➢ Go to styles group in the Home Menu
➢ Click on Conditional Formatting arrow head to choose from the list
➢ Float Highlight Cells Roles
➢ Click on Greater than a dialog box will appear
➢ In the text box blinking a cursor, set a condition value of your desire.
➢ At the right hand side of that text box is a list box with multiple choice of color
➢ Select any color of your choice.
➢ Click OK

Remark: the number you set in a text box is the condition you give to set color in the cell
you are working with. If the content of that cell is greater than the value you gave as criteria
the cell will automatically change to conditional color you set.
Format as table
➢ Select the cells you intended to format as table
➢ Go to styles group
➢ Click on the small arrow head beside ‘format as table’
➢ Click on any of the table provided, this will take effect on the highlighted cells.
(i) Deleting Content of a cell

50
➢ Select the cell/cells
➢ Go to cells group
➢ Click on delete
Alternatively
➢ Click on the key board or
➢ Right Click the cell then
➢ Click on delete

(ii) Copy, pest and Cut contents of cells


➢ Select the cell/cells
➢ Right click the cell
➢ Click on copy/cut
➢ Go to where you want the contents to appear
➢ Right click and click pest.

Iii Editing content of a cell


➢ Double click on the cell. Note: a blinking cursor appear
➢ Type in your desired
➢ Click Enter

(iii) Resize Column/Row


➢ Select Column/Row
➢ Move a pointer to right edge of the selected column until the cursor turns to cross
➢ Hold and drag it to the right
➢ Free the dragging

(iv) Freezing Column/Row


➢ Click the column you wish to freeze
➢ Go to view menu

➢ Under window group click on arrow head of freeze icon


➢ Click on freeze panes.
➢ Repeat the same step to unfreeze

(v) Hide/unhide column/row


➢ Right Click on the column/row

51
➢ Click on hide/unhide

COMMON ARITMETIC AND FUNCTION

Arithmetic Operation:

i.Addition (+), Subtraction (-), Multiplication (*) and Division (/) are the common arithmetic
operators we listed in the previews lesson. The operations of these are common in daily
basis.
Excel consists of numerous cells in which each of the cells has addresses. Each time a user
type an address is equally making a reference to the content of excel.
Example: Addition and subtraction of numbers
If 4+3=7. In excel assuming 4 and 3 are entries in cell addresses A2 and B2 respectively. To
get this result in excel type (=A2 + B2) in a separate address e.g. C2. Likewise subtraction,
multiplication and division.
Steps on how to add two/more number in excel
➢ Select the cell you wish to enter the first value
➢ Enter the first value in the first cell
➢ Select the cell you wish to enter the second value
➢ Enter the second value in the second cell
➢ Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
➢ Press Enter key
Repeat the above steps for multiplication, subtraction, division.

ii.Addition and Subtraction of Number less than one


Whole Number: these are numbers that are standard /complete. They can be 1, 2, 3 e.t.c.
Whole number, zero or negative number like -1, -2, -3 e.t.c. e.g. A whole Apple or Orange
that is not yet been cut to pieces. In the other way one Apple or one Orange can be referred
as 2 or 3 or 8 even 1000 if it is complete. In the other way round number less than one are:
Decimal points, Fraction and Percentage.

DECIMAL POINTS:
Decimal points: these are number that have dot in between them which shows that is part of
whole number. They are like 5.23, 0.7 etc.
Steps on how to add two/more Decimal numbers in excel
➢ Select the cell you wish to enter the first value
➢ Enter the first Decimal value in the first cell
➢ Select the cell you wish to enter the second value
52
➢ Enter the second Decimal value in the second cell
➢ Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
➢ Press Enter key

FRACTION:
1 1 1 2 2 5
Example (1) 3 + = . 15 Example (2) + = 16
3 3 5
For excel to do this for you follow the steps bellow:
1
➢ Enter Equality sign and 3 in one cell
1
➢ Enter 2 in another cell
➢ Enter equality sign in the third cell follow the cell address of step 1.Addition or
Multiplication sign and cell address of step 2,

e.g.
➢ Click enter
In addition:
5/6 will be the result of example 1while
11/15 will be for example 2
Note that was not eleven over fifteen, it is one whole number one over fifteen.
PERCENTAGE:
Example1
10% refers to 10 portions out of 100.
Example2
30% +20% = 50%, this result mean it’s not yet a whole number .i.e. half of a given figure or
item.
Example3
69% + 31 = 100% one hundred percent is a whole figure or item which is reference to.
CONVERSION OF PERCENTAGE TO NUMBER:
Example 25% is spent out of 1000. What is the Amount spent?
Solution
25
𝑋 1000 = 250
100
For excel to do this for you follow the steps bellow:
25
➢ Enter Equality sign and 100 in one cell
➢ Enter 1000 in another cell
➢ Enter equality sign in the third cell follow the cell address of step 1 Multiplication sign
and cell address of step 2
➢ Click enter

53
CONVERSION OF NUMBER TO PERCENTAGE:
Example 500 out of 8000
Solution
500
𝑋 100 = 6.25 %
8000

For Excel to do this for you, follow the steps bellow:


500
➢ Enter Equality sign and 8000 in one cell
➢ Enter 100 in another cell
➢ Enter equality sign in the third cell follow the cell address of step 1, Multiplication sign
and cell address of step 2
➢ Click enter

Practical:
Mr. Bello spent 35% out of 2500 he realised from barbing. How much is the money he spent.
Solution
35
Step 1, enter =
100

Step 2, click enter key

Step 3, type in 2500 in next cell

Step 4, click enter


Step 5, type = A1*B1in the next cell

Step 6, Click enter key

The Result is: 875

54
Explanation
Mr. Bello spent 875 from 2500 he realized from barbing Saloon.

5.5 ALGEBRAIC
Scientific calculation like addition of superscript and subscript result to error in excels which
we are going to treat that in subsequent lessons.
Example:
22 + 33 or 2^2 + 3^3 and 22 + 33 these well result to error like this #VALUE!
This is the kind of Error we are going to look up to in Lesson 7
5.6 AUTO FILL
Auto fill: is to quickly fill in several cells with the same content or format of the selected
cell/cells. You can select cells and drag the fill handle of the active cell to any
direction. To use the fill handle, you select the cells that you want to use as a basis for filling
additional cells, and then drag the fill handle across or down the cells that you want to fill.
Example 1: To auto fill week days
➢ Type in Monday or Mon
➢ click at the fill handle
➢ Drag it down or across

Example 2: To auto fill series of numbers


➢ Type in the first and second series numbers
➢ Highlight the entries
➢ click at the fill handle
➢ Drag it down or across

5.7 FUNCTION
i.SUM: it is a techniques used to add range of cells.
➢ Select where you want to sum range of number
➢ Type equality sign
➢ Type in Sum

55
➢ Type in left parenthesis e.g. (
➢ Click arrow to the direction of the first value to activate the first Cell
➢ Press and hold SHIFT Button
➢ Click on colon :
➢ Click on arrow to the direction of the last value to activate the second Cell
➢ Type in right parenthesis e.g. )
➢ Press Enter key
Your formula should look similar to something like this ‘=SUM(A1:A9) or SUM(=A1 :F9)’
depending on vertical or horizontal arrangement of Data.

Alternatively:
➢ Select where you want to sum range of number
➢ Type equality sign
➢ Type sum
➢ Type test parenthesis
➢ Type in the first address in the range
➢ Type in colon e.g. :
➢ Type in the last address of the last cell in the range
➢ Type right parenthesis
➢ Press Enter key.

Approach in Summing Data


There are two approaches of summing Data known as adjacent and non-adjacent:
The adjacent approach of summing Data is when Data are sum from one Column or one Row
in to one cell; while non-adjacent is when Data are sum from two or more Rows ore Columns
in to one cell.
Examples of Adjacent approaches are:

Column format in adjacent summation

Row format in adjacent summation

56
Examples of Non-Adjacent approaches are:

Column format in non-adjacent summation

Row format in non-adjacent summation

ii.AVERAGE: Average is the arithmetic mean, and is calculated by adding a group of


numbers and then dividing by the count of those numbers. For example, the average of 2, 3,
3, 5, 7, and 10 is 30 divided by 6, which is 5.

57
➢ Click a cell below or to the right of the numbers for which you want to find the average

➢ On the Home tab, in the Editing group, click the arrow next to AutoSum , click
Average,

➢ and then press ENTER

Alternatively:
➢ Enter all the number in which you intended to get their average in several cells each.
➢ Type in quality sign in the cell in which you want to the average to appear
➢ Type average
➢ Click on SHIFT Button then
➢ Click on the left Parenthesis Button e.g. (
➢ Select the first cell in the range
➢ Click on colon button e.g. :
➢ Click on the right Parenthesis Button e.g. )
➢ Click on Enter Button

Your formula should be similar to ‘=Average(A1:A9) or Average(=A1 :F9)’. Either vertical


or horizontal arrangement of Data.
Apply the same techniques above for Count Number, Max and Min function.
Note: Max and Min are short form of maximum and minimum number respectively.
The formula should also look like this =Max(A1:A9), =Min(A1:A9), =Count(A1:A9). In this
case count helps to count non-empty cells.
5.8 RANKING:

Returns the rank of a number in a list of numbers. The rank of a number is its size relative to
other values in a list. (If you were to sort the list, the rank of the number would be its
position.)
Ranking is mostly use to assign position for students in the class.
Syntax
=RANK(Number,Ref,Order)

58
Number: is the value you want to find its position.
Ref is an array or range of cell. .e.g. A1:A9 which mean the whole class
Order is a number specifying how to rank number base on ascending order or descending
order, .i.e. the height value will be assign first position and lowest will be assign last position.
If order is 0 (zero) or omitted, Microsoft Excel ranks number as if ref were a list sorted in
descending order.
If order is any nonzero value, Microsoft Excel ranks number as if ref were a list sorted in
ascending order.
Example
A
1 Data
2 7
3 3.5
4 3.5
5 1
6 2
Formula
=RANK(A3,A2:A6,0)
=RANK(A3,A2:A6,1)
Description (Result):
Position of 3.5 in the list above (3) if using first formula
Position of 7 in the list above (5)
How to do Ranking in excel
➢ Enter the number you want to rant in a column
➢ Go to the next column the first adjacent cell to the first entry number
➢ type = Rank(‘cell address’, ‘range‘, ‘select 1’)
➢ Click Enter
5.9 DATE AND TIME FUNCTION:

There are two type of date the system and manual dates. Manual date/time is static while
system date/time changes each time you launch window. These will give you the idea of
counting certain event.
How to insert manual date/time function:
➢ Select where to insert date/time
➢ Press on equality sign key

59
➢ Type date/time follow by
➢ Press SHIFT button follow by left parenthesis
➢ Note: a format display indicating ‘year, month, day’
➢ Enter the year/hour then comma
➢ Enter the month/minute then comma and
➢ Enter the day/second
➢ Press SHIFT button follow by right parenthesis
➢ Press Enter key

How to insert system date/time function:


➢ Select where to insert date/time
➢ Press on equality sign key
➢ Type ‘Now’ or ‘Today’
➢ Press SHIFT button follow by left parenthesis
➢ Press SHIFT button follow by right parenthesis
➢ Press Enter key

Note: ‘Now ()’ function gives date and time while ‘Today ()’ function gives only date.

CELLS REFERENCES

Create a cell reference on the same worksheet:

➢ Click the cell in which you want to enter the formula.

➢ In the formula bar , type = (equal sign).

➢ Do one of the following:

Cell reference To create a reference, select a cell or range of cells on the same worksheet.
Cell references and the borders around the corresponding cells are color-coded to make it
easier to work with them.

60
➢ The first cell reference is B3, the color is blue, and the cell range has a blue border with
square corners.
➢ The second cell reference is C3, the color is green, and the cell range has a green border
with square corners.

You can drag the border of the cell selection to move the selection, or drag the corner of the
border to expand the selection.
➢ Press Enter key

Create a cell reference to another worksheet:

You can refer to cells that are on other worksheets by appending the name of the worksheet
followed by an exclamation point (!) to the start of the cell reference.

➢ Click the cell in which you want to enter the formula.

➢ In the formula bar , type = (equal sign).

➢ Click the tab for the worksheet to be referenced.

➢ Select the cell or range of cells to be referenced.

Note If the name of the other worksheet contains non-alphabetical characters, you must
enclose the name (or the path) within single quotation marks (').
Create a cell reference to another workbook

You can refer to cell that are on other workbook by opening the workbook you intended to
reference to side by side with the workbook you are working on. Let for instant you working
on Book1 and Book2 is the reference book all what you need to do is by:

➢ Make show both workbook are opened (e.g. Book1 and Book2)

➢ Click the cell in Book1 in which you want to make a reference.

➢ Click the Book2.

➢ Locate the cell in which you want to get it content, and click on it

➢ Click enter

Note the content of the cell you just click in Book2 will be coped to Book1. And the formula
look similar to this =[Book2]Sheet1!$A$1.
61
Change a cell reference to another cell reference

➢ Double-click the cell that contains the formula that you want to change. Excel highlights
each cell or range of cells with a different color.

➢ Do one of the following:

• To move a cell or range reference to a different cell or range, drag the color-coded
border of the cell or range to the new cell or range.

• To include more or fewer cells in a reference, drag a corner of the border.

• In the formula bar , select the reference in the formula, and then type a
new reference.

➢ Click ENTER.

62
CSC 300 LECTURE NOTE 6

DATABASE

Data: Data is the raw material that can be processed for any computing
machine e.g employee name, product name, name of the student, marks of
the student, any number, image.

Information: It is the data that has been converted into more useful or
intelligible form e.g report card sheet.

Why we need information

i. In gain knowledge about the surroundings


ii. To keep the system up to date
iii. To know about the rules and regulation of the society

Knowledge: Human mind purposefully organize the information and


evaluate it to produce knowledge e.g 38 in a data and marks of student is
information and the hard work require getting mark in knowledge.

Knowledge

Fact based Holistic based

i. Fact based: The knowledge gain from fundamental and through


experiment and great judgment likes hypothesis

Differences between data and information

S/NO DATA INFORMATION


1. Data is the raw fact It is the processed form
of data
2. It is not significant to a business It is significant to a
business

63
3. Data are Atomic level piece of It is collection of data
information
4. Data does not help in decision making It help in decision
making
5. E.g product name, name of students E.g report card sheet

Database: The related information when placed in an organized form makes


a database or an organized collection of related information is known as
database e.g Dictionary, Telephone Directory, Mobile contact.

Operations perform on database

i. Insertion
ii. Updation
iii. Deletion
iv. Retrieve
v. Sorting

Differences between traditional file system and database

Traditional file system: A file system is the method of storing and organizing
the computer files and the data they contain to make it easy to find and
access.

Characteristic of file system

i. It is a group of files for storing the data of an organization


ii. Each file is independent from one another
iii. Files are design by using the program written in programming
language such as c, c++

Limitation/Disadvantages of file processing system

i. Separated and isolated data

64
ii. Duplication of data: It cost time and money
iii. It takes up additional storage space
iv. It can lead to loss of data integrity

Database: is an organized collection of related files in a computer system


using a specialized software.

Building block of database

i. Column/fields/attributes. Eg Regno, Course Code, PhoneNo Etc


ii. Rows/Records/data. Eg 12, unibuja road, Gwagwalada,
08069719601
iii. Tables. Eg semesterResult, BankStatement

DBMS (Data Base Management System): It is the software system that


allows the user to define, create, maintain the database and provide control
access to the data.

Application of Database

i. Library system
ii. Banking system
iii. ATM

Examples Database: Mysql, oracle, sql services, DB2, Microsoft Access

Components of DBMS

1. Hardware: The hardware is the actual computer system used for


keeping and accessing database. Conventional DBMS hardware
consists of secondary storage devices such as hard disk. Database run
on the range of machine from micro computers to mainframes.
2. Software: Software is the actual DBMS between the physical database
and the users of the system. All they request from the user for
accessing the database are handled by DBMS.

65
3. Data
4. User: There are a number of users who can access or retrieve the data
on demand using the application and the interfaces provided by the
DBMS.

The users of the database can be classified into the following groups.

i. Naïve users
ii. Online users
iii. sophisticated users
iv. Application programmers
v. DBA- Database administrator

Naïve Users: Those users who need not be aware of the presence of the
database system. They work through a menu driven application programs,
where the type and range of response is always indicated to the users.

2. Online users: Those users who may communicate with database


directly through an online terminal or indirectly through user interface and
application program.

3. Sophisticated users: They are those users who interact with the
system without writing the program instead they form their request in
database query language.

4. Application programmers: Those users who are responsible for


developing the application programs or user interface. The application
programs could be written in high level language.

5. DBA-Database Administrator: It is a person or a group in-charge


for implementing the database system within the organization. The DBA has
all the privilege allowed by the DBMS and can assign or remove the
privileges from the users.

66
Database Language

• Data Definition Language (DDL): It is a language that allows the


user to define the data and their relationships. Other types of data
command are;
i. Create
ii. Alter
iii. Rename
iv. Drop
• Data Manipulation Language (DML): It is a language that provides
a set of operation to support the basic data manipulation, Operation on
the data held in the database command used are:
i. Insert
ii. Delete
iii. Select
iv. Update
• Data Control Language (DCL):command are:
i. GRANT
ii. REVOKE

Database Schema: The overall design of the database is called schema or


Description of database.

Subschema: It is the subset of the schema; and it inherits the same


property that a schema has. It gives the users a window through which
he/she can view only that part of database which is of interest to him/her.

Architecture of DBMS

There are three levels

i. External level
ii. Conceptual level

67
iii. Internal level

Objectives of the three level architecture

The objective is to separate each user’s view of the data from the way the
database is physically represented.

External level/view level: This level describes that part of the database
that is relevant to each user. This insulates the users from the details of
conceptual and the internal level.

The internal structure of the database should be unaffected while changes to


the physical aspects of storage

The DBA should be able to change the conceptual structure of the database
without affecting all other users.

Conceptual level/logic level: The level describes what data is stored into
the database and the relationship among the data. It represents:

a. All the entities, attributes and their relationships


b. The constraints on the data
c. Security and integrity information /storage level

The conceptual view is defined by conceptual schema, which describes all


the entities, attributes and their relationship with the integrity constraints.

There is only one conceptual schema and internal schema per database and
more than one external schema.

Note: Instance/Extension of database

Internal level: It is the physical representation of the database on the


computer. This level describes how the data is stored in the database. It
covers the data structure and file organization used to store the data on
storage devices.

68
Schema and its types

External schema: The external view is described by means of a schema


called external schema that corresponds to different view of the data. For
example two users may be viewing two separate views of the same database
of a studentResults in a database system.

Mapping between the levels:

i. External/conceptual mapping
ii. Conceptual/internal mapping

External/conceptual mapping: Each external schema is related to the


conceptual schema by external conceptual mapping. This mapping gives the
correspondence among the records and the relationships of the external and
conceptual views. There is a mapping from a particular logical record in the
external view to one or more conceptual record in the conceptual view.

Conceptual/internal mapping: Conceptual schema is related to internal


schema by conceptual internal mapping. Mapping between the conceptual
and internal level specify the method of deriving the conceptual record from
physical database.

End
users External Schema B

External External View External View External/Conceptual


schema Mapping

Conceptual Conceptual View


schema DBMS

Conceptual/Internal
Data independence
Mapping
Internal Internal View
schema

i. Logical data independency

69
ii. Physical data independency

Logical data independency: it indicates that the conceptual schema can


be changed without affecting the existing external schema. Logical data
independency is much more difficult to achieve than physical data
independency as it requires the flexibility in the design of the database and
programmer has to see the future requirements or modification in the
design.

Physical data independency: It indicates that the physical storage


structure or devices can be changed without affecting the conceptual
schema. The change would be absorbed by the conceptual internal mapping.

Components of DBMS

• Data: It is the most important component of DBMS environment from


the end users point of view.
One of the major features of database is that actual data are
separated from the programs that use the data. A database should
always be designed, built and populated for a particular audience and
for a specific purpose.
• Procedures: Procedures refer to the instructions and rules that
govern the design and use of the database. The user of the system
and the staff that manage the database require documented
procedures on how to use or run the system.

Disadvantages of DBMS

• Complexity: The provision of the functionality that is expected of a


good DBMS makes the DBMS an extremely complex piece of software
database designers, developers, database administrators and end-
users must understand this functionality to take full advantage of it.

70
Failure to understand the system can lead to bad design decisions,
which can rare serious consequences for an organization.
• Size: the complexity and breadth of functionality makes the DBMS an
extremely large piece of software, occupying megabytes of disk, space
and requiring substantial amount of memory to run efficiently.
• Performance: A file based system is written for a specific application
such as invoicing. A result performance is generally very good.
However the DBMS is written to be more general to cater for many
applications rather than just one.
• Higher impact of a failure: The centralization of resource increases
the vulnerability of the system since all users and applications duly on
the availability of the DBMS, the failure of any component can bring
operation to a halt.
• Cost of DBMS: The cost of DBMS varies significantly depending on
the environment and functionality provided. There is also the recurrent
annual maintenance cost.

File management e.g C++ or Database management e.g


COBOL program
oracle or Sybase
1. Small system Large system
2. Relatively cheap Relatively expensive
3. Few files Many files
4. Files are files Files not necessarily files
5. Simple structure Complex structure
6. Little preliminary design Vast preliminary design
7. Integrity left to application Rigorous inbuilt integrity
programmer
checking
8. No security Rigorous security
9. Simple, primitive Complex & sophisticated

71
backup/recovery
10. Often single user Multiple user

Role of DBMS (Database Administrator): It is a person or group in


charge for implementing DBMS in an organization. The DBA job requires
high degree of technical expertise. DBA consist of a team of people rather
than just one person.

Responsibilities of DBA

• Makes the decision concerning the content of the database


• Plans the storage structure and access strategy
• Provides the support to the users
• Defines the security and integrity checks
• Interpret backup and recovery strategies
• Monitoring the performance and responding to the changes in the
requirements.

PRACTICAL SOFTWARE TO IMPLEMENT THE DATABASE IS MS.


ACCESS

72
Department of Computer Science
Faculty of Science
University of Abuja
CSC300:

Lecture 7
Title: Microsoft Powerpoint

Description:

PowerPoint is a presentation program developed by Microsoft. It is included in the


standard Office suite along with Microsoft Word and Excel (techterms.com, 2008).
Powerpoinnt uses slides in displaying the work to be presented. Slides are the building
block of a presentation. PowerPoint is the presentation program in the Microsoft Office
suite that allows one to create amazing slide presentations that can integrate images,
video, narration, charts, and more. Whether an idea is being introduced to the boss or
delivering a speech at a conference, an engaging presentation will help reach the target
audience and emphasize important message. Powerpoint presentation is used in
seninars, conferences, workshops etc to highlight important points to the target
audience.

Objectives:

Students will learn:

1. Some basic slide terminologies


2. To create a standard slide
3. To add text to a standard slide
4. To insert an image to a standard slide
5. To insert date and time to a standard slide
6. To make a presentation to a target audience

Requirement

Students are expected to have basic knowledge of Microsoft word or any other word
(text) processing software.

7.0 Introduction

Microsoft PowerPoint is a software product used to perform computer-based


presentations. There are various circumstances in which a presentation is made:
teaching a class, introducing a product to sell, explaining an organizational structure,
etc. Microsoft powerpoint presentations may be made using various Microsoft
powerpoint versions. The common versions include Microsoft powerpoint 97-2003,
Microsoft powerpoint 2007, Microsoft powerpoint 2010, Microsoft powerpoint 2013.

73
However, there exist similarities among various versions. These versions are dependent
on the Microsoft Office Suite in which the Microsoft powerpoint belongs. It is interesting
to note that any student who can work with any version of Microsoft powerpoint can as
well work with any other one because of their similarities. There is no doubt that there
are some differences between the various versions of Microsoft powerpoint. In case of
difficulties as a result of some differences, manuals for various versions may be
consulted. These manuals may be downloaded from Microsoft website

7.1 Some basic slide terminologies

Slide layouts contain formatting, positioning, and placeholders for all of the contents
that appear on a slide.
Placeholders are the containers in layouts that hold such content as text (including
body text, bulleted lists, and titles), tables, charts, SmartArt graphics, movies, sounds,
pictures, and clip art.
Clip art is a single piece of ready-made art, often appearing as a bitmap or a
combination of drawn shapes. According to Wendy (2014), design themes make it easy
to coordinate PowerPoint presentation with colors, graphics and fonts that all work
together to create a mood for a presentation. Even though different types of slide
layouts are used for different aspects of your topic material, the whole presentation
works together as a attractive package
Slide theme is a set of colors, fonts and effects that is used in a file. A theme may be
defined as a set of visual attributes that is applied to elements in a file as well as the
background of a slide. Figure 7.2 below shows a slide layout:

Figure 7.1: A slide layout

Figure 7.1 above shows all the layout elements that can be included on a PowerPoint
slide
PowerPoint includes nine built-in slide layouts. Though, one can create custom layouts
that meet one’s specific needs. However, a standard (default) slide comes with only
two layouts (title and subtitle placeholders).

74
7.2 Creating a standard Slide

The creation of Microsoft powerpoint slide is dependent on the particular Microsoft


Office in use. In this work, Microsoft powerpoint 2010 is to be deployed as the case
study.

In order to create a powerpoint standard slide for presentation, the following steps may
be used:

1. Open Microsoft PowerPoint.


2. Locate and click “File” at the top of the screen
3. Locate and click Click “New” and Blank presentation would be highlighted
4. Locate and click “Create” below the Blank presentation displayed at the top right
of the screen

These steps would display a standard blank slide as in figure 7.2 below:

Figure 7.2: A Standard Blank Slide

Rather than create a powerpoint from the scratch, one may use a design template and
modify it to suit the purpose. Microsoft PowerPoint’s pre-defined slide design templates
allow for attractive and consistent design of slides in a presentation(Regents of the
University of Minnesota, 2010)

7.3 Adding Text to a Standard Slide

Adding text to slide may be carried out directly by typing the text on the slide. In figure
7.2 above, clicking on “click to add title” or “click to add subtitle” would allow direct
typing of text on the slide. Figure 7.2 (a) below shows typing text directly on the slide.

75
Figure 7.2 (a): Direct Typing of Text

Another way of adding text to a slide is by copying already typed text and pasting on the
slide. This can be demonstrated in figure 7.2 (b) below:

Figure 7.2 (b): Copying the highlighted Text

The already typed words are copied from Microsoft word and pasted on the powerpoint
slide as shown in figure 7.2 ( c) below:

Figure 7.2 ( c): Copied from Microsoft Word and Pasted on Slide

76
After the already typed text is copied from Microsoft Word, a cursor is placed at the
point on the slide where the text should appear.

7.3 Inserting Image to a Standard Slide

An image is a picture that is produced by a camera, artist, mirror or any other means.
To insert a picture image, the following steps should be followed:
1. Open the slide to insert the picture image
2. Locate and click “Insert”
3. Locate and click “Picture”
4. Select the picture image and open it accordingly.
5. Resize the picture image as desired

The first step to insert a picture element in a powerpoint slide is open the desired slide
where the picture element is to be inserted.
Figure 7.3 (a) below shows how University of Abuja logo image in form of a picture can
be inserted in a powerpoint slide.

Figure 7.3 (a): Powerpoint Slide to insert a Picture

After the powerpoint slide is opened, the Insert is located on the powerpoint screen as is
illustrated in 7.3 (b) below:

7.3 (b):Highlighting the Insert Menu to Insert an Image

77
This is followed by locating and clicking “Picture” which enables one to choose the
picture to be inserted from the location where such picture is stored on the disk. By
opening the “picture” the image appears on the powerpoint slide. Figure 7.3 (c) below
shows University of Abuja logo. Below the logo, there is provision to add notes to the
picture image. This note may be used to describe the image. The note shows that the
image is University of Abuja logo

7.3 (c): Insertion of University of Abuja Logo on a Slide with Note

Apart from the above method of using insert to create a powerpoint slide, the copy and
paste commands can be deployed to achieve the same result.

7.4 Insert Date and Time to a standard slide

The same way an image can be inserted on a slide, so also date and time may also be
inserted. To insert date and time in the previous slide (figure 7.3(c) above, the following
steps is followed:
1. Open the slide
2. Click Insert
3. Locate and click Header & Footer
4. Check the Date and Time box
5. Click the pull-down arrow and choose the desired Date and time
6. Click Apply or Apply to All as the case may be.

The first step in adding date and time to a slide is to open the slide. This is shown in
figure 7.4(a) below:

78
7.4 (a): University of Abuja Logo on a Slide with Note

After opening the slide in which date and time is to be inserted, then the Insert
command is clicked and Header & Footer located. This is shown in figure 7.4 (b)
below:

Figure 7.4 (b): Clicking Insert Command and Header & Footer Located

The next step would be check the Date and Time box and pull down the arrow to select
the appropriate date and time desired. This can be illustrated as in figure 7.4 (c ) below:

79
Figure 7.4 (c): Clicking Insert Command and checking the date and time box

Clicking on Apply to All would insert the selected date and time as is seen in figure 7.4
(d) below:

7.4 (d): Date and Time Inserted on a slide


Rather than selecting Apply to All, one may select Apply to have the chosen date and
time format appear only on the particular slide.

7.5 Making Presentation to a target Audience

When all the slides are put together, then the presentation will be made to the audience.
The steps below are needed to achieve that:

1. Locate and click on the Slide Show on the menu


2. Choose from the beginning or from current slide

The above two steps would enable the presentation to be displayed on a wide screen to
the target audience. If the computer is connected to a projector, the presentation is then
projected to the wall for a wider view.

80
Practice Problems

1. Define the following:


i. Placeholder
ii. Clip art
iii. Slide theme
iv. Slide
2. Create a similar powerpoint slide as in figure 7.3 (c ) and add notes to it
3. Use the copy and paste commands to display your picture in a powerpoint slide
and add your name and department as notes to the slide.
4. Make a presentation on your favorite topic on any of the courses you offered last
semester.
5. State the use(s) of a presentation software.
6. Mention any two ways in which text can be added to a slide.

References
1. Justin Seeley, Good Presentation Design Examples: PowerPoint and Keynote,
http://www.lynda.com/Keynote-tutorials/Examples-good-presentation-
design/124082/

2. GCF Learnfree.org, PowerPoint 2013,


http://www.gcflearnfree.org/powerpoint2013/

3. FunctionX, Inc., 2004-2007, Introduction to Microsoft PowerPoint,


http://www.functionx.com/powerpoint/Lesson01.htm

4. Wendy Russell (2014), What is a Design Theme?,


http://presentationsoft.about.com/od/d/g/designtheme.htm

5. techterms.com (2008), PowerPoint Definition,


http://techterms.com/definition/powerpoint

6. Regents of the University of Minnesota (2010). Use a Pre-defined PowerPoint


Slide Template, http://accessibility.umn.edu/use-a-pre-defined-powerpoint-slide-
template.html

81

You might also like