CSC300 - Computer Application
CSC300 - Computer Application
Faculty of Science
In this lecture, the following an overview of the following topics will be presented:
Data is an unprocessed facts and figures, which at a glance do not have any meaningful interpretation or
analysis. Information represent data that have been processed, interpreted in order that it has meaning
for the consumer. Knowledge combines information, experience and insight that may be beneficial to
the individual or organization. In practice, there is no clear distinction between data and information
and there are sometime used interchangeably. Common forms of data are numbers, texts, pictures,
audios and videos.
A data can either be discrete (countable finite representation) or continuous (non-finite representation,
typically in a number line).
Numbers are generally used to represents objects (numbers, texts, pictures, audios and videos) and can
either by an integer (whole) or floating-point (real with a radix point). Examples: 758 (integer), 9.56
(floating point), 89.0 (floating point), 2.3e-3 (floating point using scientific notation)
Depending on the allowable digits, numbers are commonly represented in decimal (base 10, using digits
0,1,…,9, only), binary (base 2, using digits 0 and 1 only), octal ( base 8, using digits 0,1,2,…,7) and
hexadecimal (base 16, using digits, 0,1,2,…, 9, A,B,C,D,E,F).
Examples: 819 (base 10), 1110011 (base 2), 634110 (base 8) and 0xEA0F (base 16). Note that the prefix
0x is used to hexadecimal numbers.
Recognizing the relationship between binary and hexadecimal can facilitate easy conversion between
two bases. (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F) in base 16 equal to (0000, 0001,
0010,0011,0100,0101,0110,0111,1000,1001,1010,1011,1100,1101,1110,1111) in binary. Therefore
0xA1C in hexadecimal is equivalent to 101000011100 in binary. 110001010 in binary is equivalent to
0x18A in hexadecimal.
A computer is a programmable electronic device that can store, retrieve, and process data.
3. Hardware Components
Hardware if the tangible or physical parts of a computer: input devices, output devices, memory devices,
processing devices
Input devices: keyboard, mouse, are joysticks, touchscreens, pen devices, character recognition, voice
recognition, barcode readers, universal serial bus (USB) drives, hard disks (HDs) and compact disks
(CDs)
Output devices: monitor, speaker, printer, headphone. A printer can either be an impact or non-impact
printer.
Memory devices: volatile – Read Access Memory (RAM); non-volatile – Read-Only Memory (ROM),
secondary storage devices – hard drives, DVD/CDs, flash drives
The capacity of memory is measured in bytes. 1 byte is equivalent to 8 bits. 1 kilobyte (kb) = 1024 bytes,
1 megabyte (mb) = 1024 kbs, 1 gigabyte = 1024 mbs, etc.
Common manufacturers of processing devices (CPU) are Intel and AMD. Examples of CPUs are Intel
Pentium, Intel i5 Quadcore, etc.
The speed of the processor is measured in hertz (hz is equivalent to one clock cycle – i.e., time to
complete 1 machine instruction cycle). 1 kilohertz = 1000 hz, 1 megahertz = 1000khz, 1 gigahertz =
1000mghz
4. Software Components
Software is the logical, non-tangible or non-physical unit of a computer. Software are a collection of
programs that are used to run a computer. A software is either a system or application software. A system
software operates and controls computer hardware and it is either an operating system software or a utility
software.
Examples of operating system software are Windows OS, Mac OS, Unix/Linux OS, Windows Mobile,
iPhone OS (iOS), Windows NT, Android.
Examples are utility are BIOS, virus protection software
5. History of Computers
The history of computers spans the pre-mechanical era (ancient era), mechanical era, electro-
mechanical era and modern era.
Ancient era is marked by counting devices, Abacus and tally sticks
During the mechanical era, adding machine was discovered by Blaise Pascal (1642), Leibniz
(1690). Difference machine by Charles Babbage (1822), Analytic machine by Charles Babbage
and Augusta Ada Byron (1833). Babbage is regarded as the father of modern day computers.
In the electro-mechanical era, also called the vacuum tubes era, electrically-based computer devices
were developed: Herman Hollerith (1890), Howard Aiken (1936), John Atanasoff (1930), John
Mauchly and J. Presper Eckert (1946).
Modern era is characterized by vacuum tubes and digital computers. This era is classified into
generations: first-generation (1943-1958, vacuum tubes, Universal Automatic Computer –
UNIVAC, Electronic Numerical Integration Computer-ENIVAC); second-generation (1959-
1964, transistors-based computers); third-generation (1965-1970, integrated circuits), fourth-
generation (1971-1989, large-scale and very large scale integrated circuits); fifth-generation
(1990-present, high performance computing, smart devices,
6. Computer Applications
During the past few decades, computers and electronic technologies have been incorporated
into almost every aspect of society. Areas of applications include, but not limited to, business,
banking and finance, government, education, marketing, insurance, healthcare and medicine,
engineering design, military, home, manufacturing, agriculture, workplace, scientific research,
recreation and entertainment.
7. Mobile devices and applications
Mobile computing is the next evolution in the development of computing systems. Mobile
Computing is the use of portable computing devices (such as laptops, tablets, smartphones) in
conjunction communication technologies that allow transmission of data, voice and video usually
over a wireless network. The following wireless networks support mobile computing: Wireless
Personal Area Networks (Bluetooth, Sensors, etc.); Wireless LANs (802.11 family); Fixed
Wireless (e.g. CDMA); Cellular networks - 1G to 5G; and Satellite systems.
Mobile hardware: portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.
Mobile operating systems software: Android (from Google), iOS (from Apple Corp.), Blackberry
OS (from RIM), Windows Mobile (from Microsoft).
8. Computer Security
Computer security involves the process of protecting assets to ensure confidentiality, integrity
and availability. Confidentiality implies that only authorized users can view assets; integrity
implies only authorized users can modify assets; and availability implies authorized users are
able to use and have access to assets
Control measures for confidentiality include access control, authentication and identification.
Identification is the action or process of asserting one’s identity. Authentication is the act of
establishing or confirming that one actually is who he or she claims to be. A commonly used
authentication method is password. A password is an agreed-upon word, phrase, or set of
characters that is presumed to be known only by the user and the system.
Something the user has, e.g., physical key, ID badge, driver’s license, security token, etc.
Educate yourself. Organizations provide internal security training for all employees.
Be skeptical. You should treat anything you see online with a high degree of skepticism.
Check privacy policies & settings. Make sure you understand them, as they likely explain if
your information is shared with other parties.
Good passwords. Use good, strong passwords. If possible, the password should contain letters
and numbers, as well as special characters.
Protect the password. You should never share your password with others.
Stay updated. Always ensure that the software you use is up-to-date.
Microsoft Word is an example of an Word Processor. Word Processors are used for word
processing, that is, used for creating and editing text based documents such as memo, letters,
newsletters, minutes, projects etc ).
Microsoft Word belongs to a group of Microsoft applications called Microsoft Office suite.
Others include Microsoft Excel, Microsoft Access, Microsoft PowerPoint, and Microsoft
Outlook. Microsoft Word has features for:
Today, Information and Communications Technology (ICT) has become an integral part of the
human life. The Internet and the social media have come to completely revolutionize the human
life and activities.
The internet may be simply defined as a global communication network that allows almost all
computers worldwide to connect and exchange information. Internet services include:
Presently, there are hundreds of social media platforms in existence and operation. Some of
them are: Facebook, Google+, Friendster, hi5, LinkedIn, Twitter, Tumblr, XING, Flickr,
Howcast, iTunes, MySpace, Picasa, Vimeo, YouTube, Blab, Delicious, Digg, Instagram,
Pinterest, Quora, Reddit, Scribd, SlideShare, Wikipedia, Yelp, WhatsApp, 2Go, Nairaland,
LindaIkejiBlog, etc.
University of Abuja
Faculty of Science
Department of Computer Science
CSC 300: Microcomputer Applications
2. Text representation
As described in Lecture 1, data is used to represent texts, pictures, videos and audios. Texts are
usually in characters which are converted to numbers (by means of a code) for representation in
the computer. Each character symbol is assigned a unique bit pattern. The text is then
represented as a long string of bits in which the successive patterns represent the successive
symbols in the original text.
In the mid-1900s, the American National Standards Institute (ANSI) adopted the American
Standard Code for Information Interchange (ASCII) that uses bit patterns of length seven to
represent upper- and lowercase letters of the English alphabet, punctuation symbols, digits 0
through 9, and certain control information such as line feeds, carriage returns, and tabs. The
symbols are represented in the table below with the column bits representing the first 3 bits and
the row bits representing the last 4 bits of the bit pattern.
7
Column
0 1 2 3 4 5 6 7
000 001 010 011 100 101 110 111
Row
0(0000) NUL DLE SP 0 @ P ` p
1(0001) SOH DC1 ! 1 A Q a q
2(0010) STX DC2 " 2 B R b r
3(0011) ETX DC3 # 3 C S c s
4(0100) EOT DC4 $ 4 D T d t
5(0101) ENQ NAK % 5 E U e u
6(0110) ACK SYN & 6 F V f v
7(0111) BEL ETB ' 7 G W g w
8(1000) BS CAN ( 8 H X h x
9(1001) HT EM ) 9 I Y i y
10(1010) LF SUB * : J Z j z
11(1011) VT ESC + ; K [ k {
12(1100) FF FS , < L \ l |
13(1101) CR GS - = M ] m }
14(1110) SO RS . > N ^ n ~
15(1111) SI US / ? O _ o DEL
The binary code for any entry can be found by composing the bits of the column number with the
bits of the row number. For example, CR is in column 0, row 13, and thus has the binary code
0001101 = 13 decimal = 15 octal = 0D hexadecimal. The ASCII encoding scheme can only
accommodate 128 character symbols.
In contrast to the 7-bit ASCII encoding scheme, IBM developed Extended Binary Coded
Decimal Interchange Code (EBCDIC) in 1963. This is an eight-bit character encoding used
mainly on IBM mainframe and IBM midrange computer operating systems. The EBCDIC can
accommodate character symbols.
ASCII and its extended versions, were not sufficient to accommodate alphabets of man Asian
and some Eastern European languages. For this and other reasons, the Unicode was developed
through the cooperation of several of the leading manufacturers of hardware and software. The
encoding scheme uses up to 21 bits to represent each symbol. The Unicode is usually combined
8
with Unicode Transformation Format 8-bit (UTF-8) encoding standard to accommodate ASCII
8-bit pattern (note that 8-bit ASCII simply attached 0 as the most significant bit), and languages
such as Chinese, Japanese, and Hebrew. UTF-8 also uses 24-bit and 32-bit patterns to represent
more obscure Unicode symbols.
A file consisting of a long sequence of symbols encoded using ASCII or Unicode is often called
a text file. A text file contains only character-by-character encoding of the text. Note that text file
produced by a word processor contains numerous proprietary codes representing changes in
fonts, alignment information and other parameters.
3. Image Representation
Pictures and videos are represented in bits, octal or hexadecimal. Pixels (or picture elements) are
also used to represent pictures and video frames. A pixel is defined as the basic unit of
programmable color on a computer display or in a computer image. The physical size of a pixel
is based on the resolution for the display screen. The appearance of each pixel is then encoded
and the entire image is represented as a collection of these encoded pixels called bit map.
The method of encoding the pixels in a bit map varies among applications. In a simple black-
and-white image, each pixel is a single bit whose value depends on whether the pixel is black or
white. A more elaborate black-and-white photograph uses collection of bits (typically 8 bits) to
allow for a variety of shades of grayness to be represented. For color images, each pixel is
encoded using two approaches.
First approach: RGB encoding uses red, green and blue color components, corresponding to the
intensity of three primary colors of light to represent a pixel. Three bytes of storage are required
to represent a single pixel in the original image.
Second approach: uses brightness component and two color components. The brightness
component is called the pixel luminance and it is the sum of the red, green, and blue components.
The two color components are blue and red chrominance, obtained from the difference between
the pixel luminance and the amount of blue or red light in the pixel.
4. Sound representation
The most generic method of encoding audio information for computer storage and manipulation
is to sample the amplitude of the sound wave at regular intervals and record the series of values
obtained. A sample rate of 8000 samples per second has been used for years in long-distance
voice telephone communication.
To obtain better quality sound reproduction by today’s musical CDs, a sample rate of 44,100
samples per second is used. The sample data is represented in 16 bits (or 32 bits for stereo
recording).
9
Another encoding scheme for audio known as Musical Instrument Digital Interface (MIDI) is
widely used in the music synthesizers found in electronic keyboards, video game sound, sound
effects accompanying websites. MIDI encodes what instrument is to play which note and for
what duration of time.
5. Data compression
Data compression is the technique of reducing the size of the data while retaining the underlying
information. Data compression scheme is either lossless or lossy. Lossless schemes do not lose
information in the compression. Lossy schemes may lead to the loss of information. Lossy
techniques often provide more compression than lossless schemes and are therefore popular in
settings in which minor errors can be tolerated.
The bit maps produced using the encoding schemes described in the preceding sections are often
large. Numerous compression schemes have be devised for image, audio and sound compression.
Examples of such compression schemes are Graphic Interchange Format (GIF), Joint
Photographic Experts Group (JPEG), Tagged Image File Format (TIFF), and Motion Picture
Experts Group (MPEG).
GIF was developed by CompuServe and it uses dictionary encoding system to reduce the number
of colors of a pixel to 256. The 256 encodings are stored in a table (a dictionary) called palette.
Each pixel in an image is represented by a single byte whose value indicates which of the 256
palette entries represents the pixel’s color.
JPEG is has proved to be an effective standard for compressing color photographs. The JPEG
standard encompasses several methods, each with its own goals. When precision is utmost,
JPEG’s lossless is used, this usually entails high level compression The JPEG’s lossy sequential
mode has become the standard of choice in many applications.
TIFF as a compression technique allows for the storing of photographs along with their related
information, such as date, time, and camera settings.
MPEG is a compression scheme for audios and videos and it encompasses a variety of standards.
References
• Brookshear and Brylow, 2015, Computer Science, An Overview, 12th edition, Pearson
Publishers.
• http://www.bernstein-plus-sons.com/.dowling/Characters.html
• https://en.wikipedia.org/wiki/EBCDIC
10
LECTURE 3: Internet, E- mail, IM & E-commerce
Communication is an important component of life. It is also a known fact that Information or knowledge
is power. Nowadays, there are various forms of communication. This ranges from one way
communication devices such as TV and radio, to two way communication devices such Laptops, Tablets
and Mobile Phones. This trend enhances voice calls, text messaging, email and instant messaging.
Teenagers’ and young adults’ use of Instant Messaging (IM) is on rapid rise, and this has been a recent
object of media attention. Indeed, the popularity of IM indicates that synchronous (or near-
synchronous) text messaging and presence awareness has a place in teenage communications, despite
an array of competing media available to them. This lecture discusses various email communication
types, instant messaging, Social Media and its security considerations as well as e-commerce
applications. All these are achievable with internet connectivity.
TYPES OF EMAIL
Generally speaking, HTML email can be broken down into two categories:
• One-to-many, where a large list of people are sent the same or very similar emails from a source to
which they’ve intentionally subscribed (like a newsletter, or an event invitation).
• Transactional, where an email is sent to a person on an individual basis, usually as a result of an action
they’ve taken (like making a purchase, or receiving a shipping update).
ONE-TO-MANY EMAIL
One-to-Many emails have been a staple of electronic marketing since the early days of the web. They’ve
been an optimal way to market to millions of people at a lower cost than print or other types of media
like television and radio. Since HTML email marketing is generally interest driven, the audience to which
you’re sending is already receptive.
Email evolved with the explosion of social media to include more focused subjects and audiences,
allowing “one-to-many” to actually be personal, despite large audiences.
11
Figure 1
Transactional Email
Transactional emails are becoming essential to the way we interact with applications and services on the
web. You know those emails from Facebook letting you know someone’s commented on a photo, or
those receipt emails you get from Amazon? They’re transactional emails, with content that’s tailored
specifically to you. Transactional email is a type of one-to-one email. It’s different from bulk email,
which goes to many people with the same content.
Transactional emails might invite us back to a web service after a period of inactivity, let us know what’s
happening online while we’re away, or encourage us to purchase items we left in our shopping cart.
The idea of the term “transactional” may vary across industries—it doesn’t necessarily infer e-
commerce, as not all transactional emails are related to purchases. Many people refer to transactional
emails as triggered, automatic, real-time, or even personalized
12
Figure 2
Generally speaking, transactional emails aren’t considered marketing emails. However, they may
sometimes contain a marketing message along with the transaction details.
13
What are IMAP and POP?
IMAP and POP are two methods to access email. IMAP is the recommended method when you need to
check your emails from several different devices, such as a phone, laptop, and tablet.
IMAP
IMAP allows you to access your email wherever you are, from any device. When you read an email
message using IMAP, you aren't actually downloading or storing it on your computer; instead, you're
reading it from the email service. As a result, you can check your email from different devices, anywhere
in the world: your phone, a computer, a friend's computer.
IMAP only downloads a message when you click on it, and attachments aren't automatically
downloaded. This way you're able to check your messages a lot more quickly than POP.
POP
POP works by contacting your email service and downloading all of your new messages from it. Once
they are downloaded onto your PC or Mac, they are deleted from the email service. This means that
after the email is downloaded, it can only be accessed using the same computer. If you try to access
your email from a different device, the messages that have been previously downloaded won't be
available to you.
Sent mail is stored locally on your PC or Mac, not on the email server.
A lot of Internet Service Providers (ISPs) give you email accounts that use POP.
If you've used Gmail, Outlook.com, Hotmail.com, or iCloud, then you've used webmail. To get to your
webmail account, you access the Internet and sign in to your email account.
If you have a PC or Mac, you've probably used a program like Outlook, Apple Mail, or Thunderbird to
manage your email. Outlook, Apple Mail, and Thunderbird are email apps: programs that you install on
your computer to manage your email. They interact with an email service such as Gmail or Outlook.com
to receive and send email.
You can add any email account to your email app for it to manage your email. For example, you can add
webmail accounts - Gmail, Outlook.com, Hotmail.com, AOL, and Yahoo - to the Outlook or Apple Mail
app to manage your email, and you can add work email accounts.
Adding webmail accounts to email apps such as Outlook, Apple Mail, Thunderbird
When you add your email account to your email app, it will usually attempt to set it up with IMAP
access, without any input from you.
If the email app has difficulty adding your email account, it's usually because the email account is set up
for POP access. In this case, you need to go to your email provider and find out the name of their POP
and SMTP server so you can enter the info into the email app. The info usually looks something like this:
14
• Incoming (POP) Server: pop.<name of service>.com
INSTANT MESSAGING
Instant messaging (IM) is a form of online communication that allows real-time (or close to real-
time) interaction through per- sonal computers or mobile computing devices. Users can
exchange messages privately, similar to e-mail, or join group conversations. Although typed text
remains the primary con- vention for IM, the technology has grown significant ly from early
versions and now allows users to send images, audio and video files, and other attachments.
Early versions of IM appeared in the late 1990s, and the list of IM tools has grown to include
dozens of applications. Technolo- gies that enable IM—such as wireless connectivity and mobile
devices—have become widespread, providing a “critical mass” for IM to reach near ubiquity. At
the same time, many vendors whose primary business is something other than IM have added
IM functionality to their products. Nearly all learning management systems have incorporated
chat tools, ranging from the elegant and sophisticated, which include icons, sounds, and
pictures, to the rudimentary, which simply provide text in boxes.
The IM Users
Large and growing numbers of teens—today’s and tomorrow’s college students—are regular
users of IM, both as a personal communication tool and, in some cases, for educational initia-
tives in high school. As IM matures into an accepted means of communication, and as ever-
larger numbers of students arrive on campus as seasoned IM users, colleges and universities
are adding IM to campus functions ranging from recruiting and admissions to teaching and
support. Some institutional libraries have set up online reference desks with IM applications,
and faculty have begun using the technology to facilitate virtual office hours. For many current
and prospective students, IM is becoming the preferred mode of contact with recruiters and
admissions staff, the registrar’s office, and academic advisors.
IM FUNCTIONALITIES
Functionality ranges widely for IM applications, but typically users log in to a service with a
screen name or ID. Most IM applications notify users when others join or leave, and many allow
15
users to indicate their status, such as “away from desk” or “in a meeting.” Once logged in, you
can send messages to individuals or join IM sessions. Most IM windows include an area where
messages are displayed chronologically and a composition box where messages are typed.
Composition boxes usually allow basic formatting of text, and most let you add images,
multimedia files, or other attachments. When someone types an instant message, the chat
client indicates that a message is being composed. When the message is sent, it pops up on
your screen in front of other applications.
SIGNIFICANCE OF IM
Hundreds of millions of people use IM to stay connected. In many ways, IM epitomizes the
notion of the always-connected, multi- tasking student, sending and receiving messages at all
hours, from a wide spectrum of devices, while doing several other things at the same time. For
many students, the technology has become as ingrained in daily life as telephones are for older
generations. Many colleges and universities are working to incorporate IM into the educational
aspects of students’ lives, rather than relegating it to a social function.
IM interactions are infused with a level of serendipity and the possibility of chance encounters
online that are unique to the medium. Some applications allow users to set a status of
“hidden.” Even though you cannot tell they are online, they might suddenly send you a
message. You can send a message to someone who is logged in, but perhaps she is away from
her computer. Maybe she is in class or otherwise occupied but hasn’t set her status to show
that.
IM users have developed an evolving syntax that includes short- hand, acronyms, symbols, and
other elements that constitute a unique lexicon, encouraging users to interact in ways not
possible either in person or with other forms of electronic communication. While this dynamic
expands access to students who are uneasy with other types of communication, it also provides
new modes of expression for students who are otherwise comfortable participating in class. IM
creates an environment that approximates the sharing of a physical space, allowing distance
students to engage in learning that approaches face-to-face meetings.
The technology is also promoting the practice of creating “back channels,” or secondary
conversations that happen at the same time, for example, as a lecture, board meeting, or
conference call. Students in a lecture hall might use IM to ask each other questions about the
lec- ture topic and share their thoughts without interrupting the professor
IM CHALLENGES
The flip side of offering new modes of interaction is that the technology might encourage some
participants to engage in offensive, disruptive, or other behavior that, in different contexts,
theywould see as inappropriate. As with any new form of communi- cation, IM can lead to
misunderstandings about what others are trying to convey. Moreover, the always-on notion of
IM carries the risk of unrealistic expectations about how quickly users can expect responses.
16
Because messages pop up on users’ screens who are logged in, some consider the technology
to be a source of continual distractions.
Users of IM technologies face a number of security risks. Although sending attachments
through IM fosters a richer experience, those files are subject to viruses and other malware,
particularly since IM attachments often bypass antivirus software. Some IM networks are more
susceptible than others to eavesdropping, and a problem looming on the horizon is that of
“spim,” the IM version of spam. Because it’s difficult to verify the source of an instant message,
some people have begun sending unwanted messages to IM clients, with bogus advertisements
or solicitations for personal information.
IM TREND
Just as IM tools are showing up in non-IM software, so too are traditionally non-IM features
included in IM applications, blurring the lines between types of applications. The introduction
of new consumer electronic devices and the growing functionality of existing ones are
broadening the scope of IM availability. Video chat applications are appearing, and IM networks
are starting to allow users to send messages to users who are not online and to see archived
transcripts of past messages. New IM features are being added to allow richer conversations,
such as turn taking, collaborative composition, and game playing. The proliferation of IM-
capable devices will bring new uses of the technology that take advantage of its unique nature.
IMPLICATIONS FOR TEACHING AND LEARNING
Students who use IM feel connected with peers and faculty, and some users have found that IM
facilitates semiformal distance rela- tionships that are difficult to create through other media.
IM offers higher education a new mode of communication, often for relative- ly low cost and
without significant overhead for IT infrastructure. Increasingly, students will arrive on campus
having spent years using IM, expecting the technology to be part of their educational lives. In
addition, because IM is used for communication in many corporations, for many its use will
extend beyond college.
SOCIAL MEDIA AND SECURITY CONSIDERATIONS
Social media is defined by Kaplan and Haenlein (2010) as ‘a group of internet-based applications that
build on the ideological and technological foundations of Web 2.0, and that allow the creation and
exchange of user generated content’. Trends suggest that social networking websites are becoming
more common and important for individuals (Szwedo et al., 2010), and recently also for organizations
(Light et al., 2008; Kuikka and Äkkinen, 2011).
Most IM systems presently in use were designed with scalability rather than security in mind. Virtually
all freeware IM programs lack encryption capabilities and most have features that bypass traditional
corporate firewalls, making it difficult for administrators to control instant messaging usage inside an
organization. Many of these systems have insecure password management and are vulnerable to
account spoofing and denial-of-service (DoS) attacks. Finally, IM systems meet all the criteria required to
make them an ideal platform for rapidly spreading computer worms and blended threats:2 they are
17
ubiquitous; they provide a communications infrastructure; they have integrated directories (buddy lists)
that can be used to locate new targets; and they can, in many cases, be controlled by easily written
scripts. Even worse, no firewall on the market today can scan instant messaging transmissions for
viruses.
Virtually all IM systems employ the same basic client-server architecture. Users install instant messaging
clients on their client machines—desktop computers, wireless devices, or PDAs, for example—and these
clients communicate with an IM server in the messaging provider’s infrastructure to locate other users
and exchange messages. In most instances, messages are not sent directly from the initiating user’s
computer to the recipient’s computer, but are sent first to an IM server, and then from the IM server to
the intended recipient. (See Figure 3.)
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by
enterprises to engage with customers, build their brands and communicate information to the rest of
the world. However, social media for enterprises is not all about "liking," "friending," "up-voting" or
"digging." For organizations, there are high risks to using social media, ranging from damaging the brand
to exposing proprietary information to inviting lawsuits.
Information security has become a growing concern for companies by the advent of social media. New
technologies for collaboration and interaction have increased the possibilities for information sharing.
Although online communication has become very popular and has become the way to maintain social
relationships, it has also highlighted the adverse effects on human behaviour. For companies, it would
be important to get an understanding of whether and how social media represents a threat to
18
information security in order to be better able to plan their appearances in and policies concerning
social media.
For companies and their employees, social media allows new ways to communicate with customers and
colleagues. Vast amounts of information are being exchanged in social media. Information is a highly
valuable asset, and therefore questions concerning information security become more and more
important. Companies are becoming increasingly worried about information security in social media.
First, challenges arising from employees’ actions or unawareness in social media (especially reputation
damage) seem to represent bigger threats to information security than threats caused by outside
attacks.
Second, the confusion of private and professional roles in social media represents an information
security risk, and distinguishing between these roles becomes more difficult the higher an employee’s
position in the company.
Third, communication with employees and colleagues represents an information security challenge
especially when communication is not steered by the company.
The rise of social media is inextricably linked with the revolution in mobile computing, which has
spawned a huge industry in mobile application development. Naturally, whether using their own or
company-issued mobile devices, employees typically download dozens of apps because, well, because
they can. Sometimes they download more than they bargained for. In early March, Google
removed from its Android Market more than 60 applications carrying malicious software. Some of the
malware was designed to reveal the user's private information to a third party, replicate itself on other
devices, destroy user data or even impersonate the device owner.
And all because this new game is supposed to be even better than Angry Birds!
E-commerce
Electronic commerce, commonly known as E-commerce is trading in products or services using
computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web for at least one
part of the transaction's life cycle, although it may also use other technologies such as e-mail.
Definition of E-commerce:
Sharing business information, maintaining business relationships and conducting business transactions
using computers connected to telecommunication network is called E-Commerce.
19
E-Commerce Categories:
1. Electronic Markets
Present a range of offerings available in a market segment so that the purchaser can compare the prices
of the offerings and make a purchase decision. Example: Airline Booking System
3. Internet Commerce
• It is use to advertise & make sales of wide range of goods & services.
• This application is for both business to business & business to consumer transactions.
Example: The purchase of goods that are then delivered by post or the booking of tickets that can be
picked up by the clients when they arrive at the event.
Advantages Of E-commerce:
20
- Production schedule and inventory of an organization can be inspected by cooperating
supplier who can in-turn schedule their work
Disadvantages of E-commerce:
Threats of E-commerce:
It is also worth considering where potential threats to your ecommerce site might come from, as
identifying potential threats will help you to protect your site.
• Who may want to access your ecommerce site to cause disruption or steal data; for example
competitors, ex-employees, etc.
• What level of expertise a potential hacker may possess; if you are a small company that would
not be likely to be considered a target for hackers then expensive, complex security may not be
needed.
Features of E-Commerce:
21
• Interactivity: The technology works Consumers are engaged in a dialog that through interaction
with the user dynamically adjusts the experience to the individual, and makes the consumer a
co-participant in the process of delivering goods to the market.
• Information density: The technology Information processing, storage, and reduces information
costs and raises quality communication costs drop dramatically, while currency, accuracy, and
timeliness improve greatly. Information becomes plentiful, cheap, and accurate.
• Personalization/Customization: The Personalization of marketing messages and technology
allows personalized messages to customization of products and services are be delivered to
individuals as well as groups based on individual characteristics.
Business-to-Consumer (B2C)
Business-to-Business (B2B)
Consumer-to-Business (C2B)
References
Kaplan, A.M. and Haenlein, M. (2010). Users of the World, Unite. The Challenges and Opportunities of
Social Media. Business Horizons, 53(1), 59-68.
Kuikka, M and Äkkinen, M. (2011). Determining the Challenges in Organizational Social Media
Adoption and Use. In Proceedings of the 19th European Conference on Information Systems.
Rebecca E. Grinter & Leysia Palen. Instant Messaging in Teen Life. In CSCW’02, November 16–20,
2002, New Orleans, Louisiana, USA. Copyright 2002 ACM 1-58113-560-2/02/0011
22
Department of Computer Science
CSC300: COMPUTER APPLICATIONS
Lecture 4
Title: Word Processing
OBJECTIVES
The students will learn:
*Definition of Word Processing, Word Processing Software and examples of word processing
Software.
* MS Word Graphical User Interface: Ribbon, the quick access toolbar, the title bar, the text area
*Working with text: deleting, copying, pasting
* Working with documents: Be able to create document, save documents, print documents, format
documents, create tables, use headers and footnotes, templates, column and order, use the proofing
features and modifying spacing
WORD PROCESSING
Word processing is the phrase used to describe using a computer to create, edit, and print
documents. Of all computer applications, word processing is the most common. To perform
word processing, you need a computer, a special program called a word processor, and a
printer.
Is used to manipulate a text document, such as a resume or a report. You typically enter text by
typing and the software provides tools for copying, deleting and various types of formatting.
Some of the functions of word processing software include:
There are a number of different word processing applications. One of the most widely used
ones is Word, which is part of Microsoft Office. Another widely used one is WordPerfect by the
23
Corel Corporation. A third one is Writer, which is part of OpenOffice by Apache. While the first
two are commercial software, OpenOffice is open source and can be downloaded and used free
of charge. Finally, there is Pages, which is part of iWork by Apple.
the Quick Access toolbar is Next to the the ruler is used to change the format of
Microsoft Office button. The Quick Access your document. If your ruler is not visible,
toolbar provides you with access to you can make it visible as follow:
24
The vertical and horizontal scroll bars
enable you to move up, down, and across
your window simply by dragging the icon
located on the scroll bar. The vertical scroll
1. Click the View tab to choose it.
bar is located along the right side of the
2. Click the check box next to Ruler in
screen. The horizontal scroll bar is located
the Show/Hide group. The ruler
just above the status bar. To move up and
appears below the Ribbon.
down your document, click and drag the
vertical scroll bar up and down. To move
vi The Text Area back and forth across your document, click
and drag the horizontal scroll bar back and
The text area is the large area below the forth. You won't see a horizontal scroll bar if
ruler. You type your document in the text the width of your document fits on your
area. The blinking vertical line in the upper- screen.
left corner of the text area is called the
cursor. It marks the insertion point. As you viii The Status Bar
type, your text displays at the cursor
The Status bar is at the bottom of your
location.
window and provides such information as
the current page and the number of words
in your document.
25
WORKING WITH TEXT To copy and paste text:
To delete text:
26
WORKING WITH DOCUMENTS same file name. If you are saving for the
first time and select Save, the Save As
dialog box will appear.
Saving document
To Save As a Word 97 - 2003 document:
How to save documents
• Click the Microsoft Office button.
To use the Save As command:
• Select Save As Word 97-2003
Document.
• Click the Microsoft Office button.
• Select Save As Word Document.
The Save As dialog box appears.
• Click the Microsoft Office button. By default, Word automatically checks your
• Select Save from the menu. document for spelling and grammar errors.
These errors are indicated by colored wavy
Using the Save command saves the lines.
document in its current location using the
27
• The blue line indicates a contextual
spelling error.
o A contextual spelling error is
when an incorrect spelling of
a word is chosen. For
example, if you write Deer
Mr. Theodore at the
beginning of a letter, deer is
a contextual spelling error
because dear should have
been used. Deer is spelled
correctly, but it is used You can choose to ignore an underlined
incorrectly in this letter. word, add it to the dictionary, or go to the
• The red line indicates a misspelled Spelling dialog box.
word.
• The green line indicates a To use the grammar check feature:
grammatical error.
• Right-click the underlined word. A
menu will appear.
• Select the correct word from the
listed suggestions.
• Left-click your mouse on the word. It
will appear in the document.
28
Printing • Print. The Print dialog box appears.
• Select the pages you want to print—
Once you complete your document, you either all pages or a range of pages.
may want to print it for various reasons. • Select the number of copies.
This lesson covers the three basic features of • Check the Collate box if you are
printing in Word, including Print Preview, printing multiple copies of a multi-
Quick Print, and traditional Print. page document.
• Select a printer from the drop-down
Printing list.
• Click OK.
To print:
29
• Left-click the drop-down arrow
next to the font style box on the
Home tab. The font style drop-down
menu appears.
• Move your cursor over the various
font styles. A live preview of the
font will appear in the document.
Formatting Text
• Left-click the font style you want to
To create and design effective documents, use. The font style will change in the
you need to know how to format text. In document.
addition to making your document more
appealing, formatted text can draw the To format font color:
reader's attention to specific parts of the
document and help communicate your • Select the text you want to modify.
message. • Left-click the drop-down arrow next
to the font color box on the Home
To format font size: tab. The font color menu appears.
• Move your cursor over the various
• Select the text you want to modify. font colors. A live preview of the
• Left-click the drop-down arrow color will appear in the document.
next to the font size box on the
Home tab. The font size drop-down
menu appears.
• Move your cursor over the various
font sizes. A live preview of the font
size will appear in the document.
30
Your color choices aren't limited to the o Align Text Left: Aligns all
drop-down menu that appears. Select More of the selected text to the left
Colors at the bottom of the list to access the margin
Colors dialog box. Choose the color you o Center: Aligns text an equal
want, then click OK. distance from the left and
right margins
o Align Text Right: Aligns all
To use the bold, italic, and underline of the selected text to the
commands: right margin
o Justify: Aligns text equally
• Select the text you want to modify. to the right and left margins;
• Click the bold, italic, or underline used in many books,
command in the Font group on the newsletters, and newspapers
Home tab.
Using a Template
To change the text case:
• Select the text you want to modify. A template is a predesigned document you
• Click the Change Case command in can use to create new documents with the
the Font group on the Home tab. same formatting. With a template, many of
• Select one of the case options from the more important document design
the list. decisions such as margin size, font style and
size, and spacing are predetermined.
To insert a template:
31
• Click near the text you want to
replace. The text will appear
highlighted, and a template tag will
appear.
• Click OK.
32
Modifying spacing between paragraphs adds emphasis and
makes a document easier to read.
To format line spacing:
To format paragraph spacing:
• Select the text you want to format.
• Click the Line spacing command in • Click the Line spacing command on
the Paragraph group on the Home the Home tab.
tab. • Select Add Space Before
• Select a spacing option. Paragraph or Remove Space After
Paragraph from the menu. If you
don't see the option you want, click
Line Spacing Options to manually
set the spacing (see below).
OR
• Click OK.
33
you're creating.
Landscape format means everything on the You can always access the Page Setup
page is oriented horizontally, while dialog box by clicking the small arrow in the
portrait format means everything is bottom-right corner of the Page Setup group.
oriented vertically. The dialog box should look familiar to
people who have used previous versions of
To change the paper size: Word.
34
• Select the Page Layout tab.
• Left-click the Columns command.
35
• The Design tab with Header and your design options.
Footer tools is active.
36
• Place the insertion point in a row • Right-click the mouse. A menu
below the location where you want appears.
to add a row. • Select Insert Insert Columns to
the Left or Insert Columns to the
Right. A new column appears.
37
or shading, change line weight, or erase part • Enter text into the table.
of the table.
Modifying a table using the layout tab
To insert a blank table:
When you select a table in Word, Design
• Place your insertion point in the and Layout tabs appear under Table Tools
document where you want the table on the Ribbon. Using commands on the
to appear. Layout tab, you can make a variety of
• Select the Insert tab. modifications to the table, including:
• Click the Table command.
• Drag your mouse over the diagram • Adding and deleting columns
squares to select the number of • Adding and deleting rows
columns and rows in the table. • Changing the cell size
• Aligning cell text
• Changing text direction
• Merging and splitting cells
EXERCISES
2. Give three advantages of using a word processing software over a conventional type
writer
38
• Change the font style of some text.
• Change the font color of some text.
• Try various cases using the Change Case command.
• Try the four alignment commands.
6. Use the report or any Word document you choose to complete this.
REFERENCES
www.webopedia.com/TERM/W/word_processing.html
http://www.gcfearnfree.org/word2007
https://www.microsoft.com/learning
Apeh Ayo I CSC200 Lecture note on Introduction to Microsoft Word
39
Department of Computer Science
Faculty of Science
University of Abuja
CSC 300: NOTE 5
SREADSHEET
INTRODUCTION
A spreadsheet is an interactive computer application for organization, analysis and storage of data in
tabular form. Spreadsheets are developed as computerized simulations of paper accounting
worksheets. The program operates on data entered in cells of a table. Each cell may contain either
numeric or text data, or the results of formulas that automatically calculate and display a value based
on the contents of other cells.
LANPAR was the first electronic spreadsheet on mainframe and time sharing computers. VisiCalc
was the first electronic spreadsheet on a microcomputer, and it helped turn the Apple II computer into
a popular and widely used system. Lotus 1-2-3 was the leading spreadsheet when Disc Operating
System (DOS) was the dominant operating system. Excel now has the largest market share on the
Windows and Macintosh platforms. A spreadsheet program is a standard feature of an office
productivity suite; since the advent of web apps, office suites now also exist in web app form.
40
• GrapeCity Spread Studio
• NeoOffice
• Pyspread e.t.c
INTRODUCTION TO EXCEL
Excel is an electronic spreadsheet program that can be used for storing, organizing and
manipulating data. It is a Microsoft Application program developed for official use with an icon .
THE WORKBOOK
Workbook: Workbook is a Microsoft Excel window that is made up of several sheets. Excel is more
of textbook with series of page in it. The general name of Microsoft Excel is called “spreadsheet” and
the official name is called “workbook”. It file name are called Book, Book2, and Book3 …. Bookn
depend on the number of file that has already been saved. While a worksheet is a page in a workbook,
worksheet is the collection of multiple “Cells” that was arranged in a vertical and horizontal series.
The vertical arrangement of cells is called “columns” and the horizontal arrangements of cells are
“Row”.
WORKSHEET
Worksheet: A worksheet is a network of Cells formed as a result of intersection of Rows and
Columns parallel to each other in a workbook. Each sheet has links that appears at the bottom of an
active sheet called Tabs, with a default name, as follow (sheet1, sheet2, sheet3 . . . sheetn etc). You
can add and switch between worksheets by clicking each tab bellow
41
i.Cell: Microsoft Excel Cells are tiny textboxes found in a worksheet. Each Cell has a unique address
called Name located in a place called Name Box. There are two types of cells: Active and Inactive
cells.
ii.Active Cell: an active cell is that cell with a tick/bold rectangular border with a tiny square box (Fill
Box) at the bottom right Corner. It is usually a Computer focus and ready to accept Data.
iii.Focus: is to pay attention to a particular thing. Computer focus is the active portion or where cursor is
blinking while Human focus is the Pointer which changes it shapes depending where you move it to
in a worksheet.
iv.Inactive Cell: Inactive Cell is that cell which has no tick/bold border. You can change the Active to
Inactive by clicking deferent cell.
v.Column: Microsoft Excel Columns are Alphabetical order of Cells from left to right starting from A
to Z and then a combination of letters e.g. ABA, ABB till the last column XFD which amount to a
total of 256 columns. To see the last column do this: Hold down a control key (Ctrl) along with right
arrow Key
vi.Row: Microsoft Excel Rows are horizontal arrangement of serial numbers of Cells from 1 to
1,048,576. To view the last Row, Hold down a control key (Ctrl) along with down arrow key.
vii.Name box: Name box is a Reference potion of an active cell which displays Cell address.
viii.Cell Address: Cell address is a combination of letter and number to represent a location of Cell in a
worksheet e.g. A3, F12, etc.
ix.Address Bar: is a potion of worksheet below a Ribbon that is use to enter data or formula to an
active cell. You can edit data through the Address Bar when a particular cell is activated.
Note: There are 256 numbers of columns in a worksheet; 1,048,576 numbers of Rows which rises to
268,435,456 Cells.
A B D E F
C
G H I J K
e
42
D Fill Box To copy/repeats the content Dragging
of one cell in to deferent
cell/cells
E All part of To click on object Click
worksheet except
cells area
F All cells except To select/high-light cell or Dragging
active cell range of cells
G On a Number To select/high-light the entire Click
address of cells Row
H On a letter To select/high-light the entire Click
address of cells Column
I Above the upper To separate/split worksheet Dragging
Arrow head of in to two in order to view
vertical scroll bar upper and lower part of it at a
time
J Right side of the To separate/split worksheet Dragging
arrow head of in to two in order to view left
horizontal scroll and right part of it at a time
bar
K Address bar and To edit text Double click
active cell/textbox
Table: 1.0 Characteristic of Pointer
ii.1 Click the start Button, a start menu pop up check if Excel icon is not on the list then.
iii.Click All program
iv.Scroll down to Microsoft office folder
v.Click again on the Microsoft office Excel 2007 application icon to launch it.
Here we are :
43
TABS
44
‘Abuja_color’ as the new name. the implication of not applying underscore is error due to reference
which shall be discourse in lesson 7 of this Book.
➢ Right click on the Tab you want to rename
➢ Go to rename
➢ Type the name of your choice
➢ Click enter key
➢ in this case click on the arrow head and select new book
➢ Click Ok.
45
CONCEPT OF WINDOW, MENU AND DIALOG BOX
Window: A window is any rectangular frame that pup up immediately you click a file, a folder, an
icon or a program.It's important to understand how to move them, change their size, or just make
them go away.
Menu: This is just a list of command items in a small rectangle frame that can come up when you
right click on any place while working with Microsoft office. It does not have any command button
attached.
There are two type of menu
➢ List menu : is either an ordinary written text or an icons
➢ Dropdown menu: is a written text with an arrow head indicating an extension or sub items.
Dialog boxes: A dialog box is a special type of window that asks user a question to answer before
performing next task, or provides you with information. You'll often see dialog boxes when a
program or Windows needs a response from you. Most of them contain option buttons to click
A dialog box appears if you exit a program without saving your work
Unlike regular windows, most dialog boxes can't be maximized, minimized, or resized. They can,
however, be moved. In addition all dialog boxes are window
COMMAND
Go to Microsoft office button at the top right Corner of your screen click to see the menu
i.Click on open. A window will appear
ii.Type or locate the file to open
iii.Click on Open button.
Open command
i.Click on office button
ii.Click on folder with a name Open
Note through Excel you can only open an excel file. The only file which has an extension name
(.exlx).
Closing command
46
i.Click the office button while in the office menu
ii.Float down to Close folder and click on that.
OR
Exit Command
i.Click on Office button
ii.Click on Exit Excel in the office menu window.
OR
Click on
Saving a workbook:
In this case saving a workbook is of two type: ‘Save As’ and ‘Save’
You can use ‘Save As’ when saving a new workbook. This mean that the workbook you are
working in has not being assign a name and it is to be saving for the first time. ‘Save As’ can
also be use when you want to save your work in another location either in Flash drive or in
Desktop. While ‘Save’ it is use to update an existing workbook in a particular location
usually in a location called Documents.
To Save As:
i.Click Office button
ii.Click on ‘Save As’ a location will be display with title header ‘ Libraries Documents ’
47
iii.Below you will see a bar title with a ‘File name’
FORMATTING
Font :
a. Applying Bold text
How to bold cell
➢ Click on cell you intending to bold
➢ Go to font group
➢ Click on B in
➢ Go to font group
➢ Click on arrow head beside
➢ select ‘No fill’.
48
c. Applying Font color
f. Applying/Draw border
➢ Click on the cell you intending to change it border
➢ Go to font group
➢ Click on the arrow head beside this to select your desire border.
You can as well create new border, erased border, line style and color of your choice through
any of the above steps.
g. Text Alignment
a. Left, centre and right.
➢ Click on the cell you intending to align
➢ Go to alignment group
49
Note: the one in red fill is the active one
b. Orientation (text direction)
➢ Click on the cell you intending change it direction
➢ Go to alignment group
➢ Click on the arrow head beside to see option
➢ Click your desire text direction.
c. Merge cells
➢ Select the cells you intended to merge
➢ Go to alignment group
➢ Click on ‘merge & centre’
Applying style
Conditional format
➢ Select the Range of cells you intended to apply condition
➢ Go to styles group in the Home Menu
➢ Click on Conditional Formatting arrow head to choose from the list
➢ Float Highlight Cells Roles
➢ Click on Greater than a dialog box will appear
➢ In the text box blinking a cursor, set a condition value of your desire.
➢ At the right hand side of that text box is a list box with multiple choice of color
➢ Select any color of your choice.
➢ Click OK
Remark: the number you set in a text box is the condition you give to set color in the cell
you are working with. If the content of that cell is greater than the value you gave as criteria
the cell will automatically change to conditional color you set.
Format as table
➢ Select the cells you intended to format as table
➢ Go to styles group
➢ Click on the small arrow head beside ‘format as table’
➢ Click on any of the table provided, this will take effect on the highlighted cells.
(i) Deleting Content of a cell
50
➢ Select the cell/cells
➢ Go to cells group
➢ Click on delete
Alternatively
➢ Click on the key board or
➢ Right Click the cell then
➢ Click on delete
51
➢ Click on hide/unhide
Arithmetic Operation:
i.Addition (+), Subtraction (-), Multiplication (*) and Division (/) are the common arithmetic
operators we listed in the previews lesson. The operations of these are common in daily
basis.
Excel consists of numerous cells in which each of the cells has addresses. Each time a user
type an address is equally making a reference to the content of excel.
Example: Addition and subtraction of numbers
If 4+3=7. In excel assuming 4 and 3 are entries in cell addresses A2 and B2 respectively. To
get this result in excel type (=A2 + B2) in a separate address e.g. C2. Likewise subtraction,
multiplication and division.
Steps on how to add two/more number in excel
➢ Select the cell you wish to enter the first value
➢ Enter the first value in the first cell
➢ Select the cell you wish to enter the second value
➢ Enter the second value in the second cell
➢ Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
➢ Press Enter key
Repeat the above steps for multiplication, subtraction, division.
DECIMAL POINTS:
Decimal points: these are number that have dot in between them which shows that is part of
whole number. They are like 5.23, 0.7 etc.
Steps on how to add two/more Decimal numbers in excel
➢ Select the cell you wish to enter the first value
➢ Enter the first Decimal value in the first cell
➢ Select the cell you wish to enter the second value
52
➢ Enter the second Decimal value in the second cell
➢ Type equality sign in another cell follow by the first address of the first value, addition
sign then the second address of the second value
➢ Press Enter key
FRACTION:
1 1 1 2 2 5
Example (1) 3 + = . 15 Example (2) + = 16
3 3 5
For excel to do this for you follow the steps bellow:
1
➢ Enter Equality sign and 3 in one cell
1
➢ Enter 2 in another cell
➢ Enter equality sign in the third cell follow the cell address of step 1.Addition or
Multiplication sign and cell address of step 2,
e.g.
➢ Click enter
In addition:
5/6 will be the result of example 1while
11/15 will be for example 2
Note that was not eleven over fifteen, it is one whole number one over fifteen.
PERCENTAGE:
Example1
10% refers to 10 portions out of 100.
Example2
30% +20% = 50%, this result mean it’s not yet a whole number .i.e. half of a given figure or
item.
Example3
69% + 31 = 100% one hundred percent is a whole figure or item which is reference to.
CONVERSION OF PERCENTAGE TO NUMBER:
Example 25% is spent out of 1000. What is the Amount spent?
Solution
25
𝑋 1000 = 250
100
For excel to do this for you follow the steps bellow:
25
➢ Enter Equality sign and 100 in one cell
➢ Enter 1000 in another cell
➢ Enter equality sign in the third cell follow the cell address of step 1 Multiplication sign
and cell address of step 2
➢ Click enter
53
CONVERSION OF NUMBER TO PERCENTAGE:
Example 500 out of 8000
Solution
500
𝑋 100 = 6.25 %
8000
Practical:
Mr. Bello spent 35% out of 2500 he realised from barbing. How much is the money he spent.
Solution
35
Step 1, enter =
100
54
Explanation
Mr. Bello spent 875 from 2500 he realized from barbing Saloon.
5.5 ALGEBRAIC
Scientific calculation like addition of superscript and subscript result to error in excels which
we are going to treat that in subsequent lessons.
Example:
22 + 33 or 2^2 + 3^3 and 22 + 33 these well result to error like this #VALUE!
This is the kind of Error we are going to look up to in Lesson 7
5.6 AUTO FILL
Auto fill: is to quickly fill in several cells with the same content or format of the selected
cell/cells. You can select cells and drag the fill handle of the active cell to any
direction. To use the fill handle, you select the cells that you want to use as a basis for filling
additional cells, and then drag the fill handle across or down the cells that you want to fill.
Example 1: To auto fill week days
➢ Type in Monday or Mon
➢ click at the fill handle
➢ Drag it down or across
5.7 FUNCTION
i.SUM: it is a techniques used to add range of cells.
➢ Select where you want to sum range of number
➢ Type equality sign
➢ Type in Sum
55
➢ Type in left parenthesis e.g. (
➢ Click arrow to the direction of the first value to activate the first Cell
➢ Press and hold SHIFT Button
➢ Click on colon :
➢ Click on arrow to the direction of the last value to activate the second Cell
➢ Type in right parenthesis e.g. )
➢ Press Enter key
Your formula should look similar to something like this ‘=SUM(A1:A9) or SUM(=A1 :F9)’
depending on vertical or horizontal arrangement of Data.
Alternatively:
➢ Select where you want to sum range of number
➢ Type equality sign
➢ Type sum
➢ Type test parenthesis
➢ Type in the first address in the range
➢ Type in colon e.g. :
➢ Type in the last address of the last cell in the range
➢ Type right parenthesis
➢ Press Enter key.
56
Examples of Non-Adjacent approaches are:
57
➢ Click a cell below or to the right of the numbers for which you want to find the average
➢ On the Home tab, in the Editing group, click the arrow next to AutoSum , click
Average,
Alternatively:
➢ Enter all the number in which you intended to get their average in several cells each.
➢ Type in quality sign in the cell in which you want to the average to appear
➢ Type average
➢ Click on SHIFT Button then
➢ Click on the left Parenthesis Button e.g. (
➢ Select the first cell in the range
➢ Click on colon button e.g. :
➢ Click on the right Parenthesis Button e.g. )
➢ Click on Enter Button
Returns the rank of a number in a list of numbers. The rank of a number is its size relative to
other values in a list. (If you were to sort the list, the rank of the number would be its
position.)
Ranking is mostly use to assign position for students in the class.
Syntax
=RANK(Number,Ref,Order)
58
Number: is the value you want to find its position.
Ref is an array or range of cell. .e.g. A1:A9 which mean the whole class
Order is a number specifying how to rank number base on ascending order or descending
order, .i.e. the height value will be assign first position and lowest will be assign last position.
If order is 0 (zero) or omitted, Microsoft Excel ranks number as if ref were a list sorted in
descending order.
If order is any nonzero value, Microsoft Excel ranks number as if ref were a list sorted in
ascending order.
Example
A
1 Data
2 7
3 3.5
4 3.5
5 1
6 2
Formula
=RANK(A3,A2:A6,0)
=RANK(A3,A2:A6,1)
Description (Result):
Position of 3.5 in the list above (3) if using first formula
Position of 7 in the list above (5)
How to do Ranking in excel
➢ Enter the number you want to rant in a column
➢ Go to the next column the first adjacent cell to the first entry number
➢ type = Rank(‘cell address’, ‘range‘, ‘select 1’)
➢ Click Enter
5.9 DATE AND TIME FUNCTION:
There are two type of date the system and manual dates. Manual date/time is static while
system date/time changes each time you launch window. These will give you the idea of
counting certain event.
How to insert manual date/time function:
➢ Select where to insert date/time
➢ Press on equality sign key
59
➢ Type date/time follow by
➢ Press SHIFT button follow by left parenthesis
➢ Note: a format display indicating ‘year, month, day’
➢ Enter the year/hour then comma
➢ Enter the month/minute then comma and
➢ Enter the day/second
➢ Press SHIFT button follow by right parenthesis
➢ Press Enter key
Note: ‘Now ()’ function gives date and time while ‘Today ()’ function gives only date.
CELLS REFERENCES
Cell reference To create a reference, select a cell or range of cells on the same worksheet.
Cell references and the borders around the corresponding cells are color-coded to make it
easier to work with them.
60
➢ The first cell reference is B3, the color is blue, and the cell range has a blue border with
square corners.
➢ The second cell reference is C3, the color is green, and the cell range has a green border
with square corners.
You can drag the border of the cell selection to move the selection, or drag the corner of the
border to expand the selection.
➢ Press Enter key
You can refer to cells that are on other worksheets by appending the name of the worksheet
followed by an exclamation point (!) to the start of the cell reference.
Note If the name of the other worksheet contains non-alphabetical characters, you must
enclose the name (or the path) within single quotation marks (').
Create a cell reference to another workbook
You can refer to cell that are on other workbook by opening the workbook you intended to
reference to side by side with the workbook you are working on. Let for instant you working
on Book1 and Book2 is the reference book all what you need to do is by:
➢ Make show both workbook are opened (e.g. Book1 and Book2)
➢ Locate the cell in which you want to get it content, and click on it
➢ Click enter
Note the content of the cell you just click in Book2 will be coped to Book1. And the formula
look similar to this =[Book2]Sheet1!$A$1.
61
Change a cell reference to another cell reference
➢ Double-click the cell that contains the formula that you want to change. Excel highlights
each cell or range of cells with a different color.
• To move a cell or range reference to a different cell or range, drag the color-coded
border of the cell or range to the new cell or range.
• In the formula bar , select the reference in the formula, and then type a
new reference.
➢ Click ENTER.
62
CSC 300 LECTURE NOTE 6
DATABASE
Data: Data is the raw material that can be processed for any computing
machine e.g employee name, product name, name of the student, marks of
the student, any number, image.
Information: It is the data that has been converted into more useful or
intelligible form e.g report card sheet.
Knowledge
63
3. Data are Atomic level piece of It is collection of data
information
4. Data does not help in decision making It help in decision
making
5. E.g product name, name of students E.g report card sheet
i. Insertion
ii. Updation
iii. Deletion
iv. Retrieve
v. Sorting
Traditional file system: A file system is the method of storing and organizing
the computer files and the data they contain to make it easy to find and
access.
64
ii. Duplication of data: It cost time and money
iii. It takes up additional storage space
iv. It can lead to loss of data integrity
Application of Database
i. Library system
ii. Banking system
iii. ATM
Components of DBMS
65
3. Data
4. User: There are a number of users who can access or retrieve the data
on demand using the application and the interfaces provided by the
DBMS.
The users of the database can be classified into the following groups.
i. Naïve users
ii. Online users
iii. sophisticated users
iv. Application programmers
v. DBA- Database administrator
Naïve Users: Those users who need not be aware of the presence of the
database system. They work through a menu driven application programs,
where the type and range of response is always indicated to the users.
3. Sophisticated users: They are those users who interact with the
system without writing the program instead they form their request in
database query language.
66
Database Language
Architecture of DBMS
i. External level
ii. Conceptual level
67
iii. Internal level
The objective is to separate each user’s view of the data from the way the
database is physically represented.
External level/view level: This level describes that part of the database
that is relevant to each user. This insulates the users from the details of
conceptual and the internal level.
The DBA should be able to change the conceptual structure of the database
without affecting all other users.
Conceptual level/logic level: The level describes what data is stored into
the database and the relationship among the data. It represents:
There is only one conceptual schema and internal schema per database and
more than one external schema.
68
Schema and its types
i. External/conceptual mapping
ii. Conceptual/internal mapping
End
users External Schema B
Conceptual/Internal
Data independence
Mapping
Internal Internal View
schema
69
ii. Physical data independency
Components of DBMS
Disadvantages of DBMS
70
Failure to understand the system can lead to bad design decisions,
which can rare serious consequences for an organization.
• Size: the complexity and breadth of functionality makes the DBMS an
extremely large piece of software, occupying megabytes of disk, space
and requiring substantial amount of memory to run efficiently.
• Performance: A file based system is written for a specific application
such as invoicing. A result performance is generally very good.
However the DBMS is written to be more general to cater for many
applications rather than just one.
• Higher impact of a failure: The centralization of resource increases
the vulnerability of the system since all users and applications duly on
the availability of the DBMS, the failure of any component can bring
operation to a halt.
• Cost of DBMS: The cost of DBMS varies significantly depending on
the environment and functionality provided. There is also the recurrent
annual maintenance cost.
71
backup/recovery
10. Often single user Multiple user
Responsibilities of DBA
72
Department of Computer Science
Faculty of Science
University of Abuja
CSC300:
Lecture 7
Title: Microsoft Powerpoint
Description:
Objectives:
Requirement
Students are expected to have basic knowledge of Microsoft word or any other word
(text) processing software.
7.0 Introduction
73
However, there exist similarities among various versions. These versions are dependent
on the Microsoft Office Suite in which the Microsoft powerpoint belongs. It is interesting
to note that any student who can work with any version of Microsoft powerpoint can as
well work with any other one because of their similarities. There is no doubt that there
are some differences between the various versions of Microsoft powerpoint. In case of
difficulties as a result of some differences, manuals for various versions may be
consulted. These manuals may be downloaded from Microsoft website
Slide layouts contain formatting, positioning, and placeholders for all of the contents
that appear on a slide.
Placeholders are the containers in layouts that hold such content as text (including
body text, bulleted lists, and titles), tables, charts, SmartArt graphics, movies, sounds,
pictures, and clip art.
Clip art is a single piece of ready-made art, often appearing as a bitmap or a
combination of drawn shapes. According to Wendy (2014), design themes make it easy
to coordinate PowerPoint presentation with colors, graphics and fonts that all work
together to create a mood for a presentation. Even though different types of slide
layouts are used for different aspects of your topic material, the whole presentation
works together as a attractive package
Slide theme is a set of colors, fonts and effects that is used in a file. A theme may be
defined as a set of visual attributes that is applied to elements in a file as well as the
background of a slide. Figure 7.2 below shows a slide layout:
Figure 7.1 above shows all the layout elements that can be included on a PowerPoint
slide
PowerPoint includes nine built-in slide layouts. Though, one can create custom layouts
that meet one’s specific needs. However, a standard (default) slide comes with only
two layouts (title and subtitle placeholders).
74
7.2 Creating a standard Slide
In order to create a powerpoint standard slide for presentation, the following steps may
be used:
These steps would display a standard blank slide as in figure 7.2 below:
Rather than create a powerpoint from the scratch, one may use a design template and
modify it to suit the purpose. Microsoft PowerPoint’s pre-defined slide design templates
allow for attractive and consistent design of slides in a presentation(Regents of the
University of Minnesota, 2010)
Adding text to slide may be carried out directly by typing the text on the slide. In figure
7.2 above, clicking on “click to add title” or “click to add subtitle” would allow direct
typing of text on the slide. Figure 7.2 (a) below shows typing text directly on the slide.
75
Figure 7.2 (a): Direct Typing of Text
Another way of adding text to a slide is by copying already typed text and pasting on the
slide. This can be demonstrated in figure 7.2 (b) below:
The already typed words are copied from Microsoft word and pasted on the powerpoint
slide as shown in figure 7.2 ( c) below:
Figure 7.2 ( c): Copied from Microsoft Word and Pasted on Slide
76
After the already typed text is copied from Microsoft Word, a cursor is placed at the
point on the slide where the text should appear.
An image is a picture that is produced by a camera, artist, mirror or any other means.
To insert a picture image, the following steps should be followed:
1. Open the slide to insert the picture image
2. Locate and click “Insert”
3. Locate and click “Picture”
4. Select the picture image and open it accordingly.
5. Resize the picture image as desired
The first step to insert a picture element in a powerpoint slide is open the desired slide
where the picture element is to be inserted.
Figure 7.3 (a) below shows how University of Abuja logo image in form of a picture can
be inserted in a powerpoint slide.
After the powerpoint slide is opened, the Insert is located on the powerpoint screen as is
illustrated in 7.3 (b) below:
77
This is followed by locating and clicking “Picture” which enables one to choose the
picture to be inserted from the location where such picture is stored on the disk. By
opening the “picture” the image appears on the powerpoint slide. Figure 7.3 (c) below
shows University of Abuja logo. Below the logo, there is provision to add notes to the
picture image. This note may be used to describe the image. The note shows that the
image is University of Abuja logo
Apart from the above method of using insert to create a powerpoint slide, the copy and
paste commands can be deployed to achieve the same result.
The same way an image can be inserted on a slide, so also date and time may also be
inserted. To insert date and time in the previous slide (figure 7.3(c) above, the following
steps is followed:
1. Open the slide
2. Click Insert
3. Locate and click Header & Footer
4. Check the Date and Time box
5. Click the pull-down arrow and choose the desired Date and time
6. Click Apply or Apply to All as the case may be.
The first step in adding date and time to a slide is to open the slide. This is shown in
figure 7.4(a) below:
78
7.4 (a): University of Abuja Logo on a Slide with Note
After opening the slide in which date and time is to be inserted, then the Insert
command is clicked and Header & Footer located. This is shown in figure 7.4 (b)
below:
Figure 7.4 (b): Clicking Insert Command and Header & Footer Located
The next step would be check the Date and Time box and pull down the arrow to select
the appropriate date and time desired. This can be illustrated as in figure 7.4 (c ) below:
79
Figure 7.4 (c): Clicking Insert Command and checking the date and time box
Clicking on Apply to All would insert the selected date and time as is seen in figure 7.4
(d) below:
When all the slides are put together, then the presentation will be made to the audience.
The steps below are needed to achieve that:
The above two steps would enable the presentation to be displayed on a wide screen to
the target audience. If the computer is connected to a projector, the presentation is then
projected to the wall for a wider view.
80
Practice Problems
References
1. Justin Seeley, Good Presentation Design Examples: PowerPoint and Keynote,
http://www.lynda.com/Keynote-tutorials/Examples-good-presentation-
design/124082/
81