Msce Computer Studies Notes
Msce Computer Studies Notes
M.S.C.E
COMPUTER STUDIES
NOTES
FOR
FORM 3 & 4
Page 1 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
PART 1
FORM 3 CONTENTS
TOPIC 1: USING SPREADSHEET (MS EXCEL)
A spread sheet is any sheet with intersecting rows and columns designed to allow quick calculations and
sorting of figures.
TYPES OF SPREAD SHEET
1. Traditional spread sheet
2. Electronic spread sheet.
TRADITIONAL SPREADSHEET
It is a sheet that has been designed manually on a piece of paper or any flat surface such as
chalkboard.
The data given to be entered on a spread sheet it will determine the size of the sheet.
PURPOSES OF MANUAL SPREADSHEET
1. Organise data into tabular, for case of reading and calculating
2. Book keeping in financial accounting whereby numeric figures are entered on income and expenditure.
3. Financial analysis in stock management where stock values are entered and organised for presentation.
ELECTRONIC SPREADSHEET
It is an application software which displays a grid of vertical and horizontal lines which intersect to form
rows and columns of vertical boxes known as cells.
EXAMPLES OF ELECTRONIC SPREAD SHEET
Microsoft excel
Lotus 1- 2- 3
Corel equation pro spread sheet.
USES OF SPREADSHEETS
Page 2 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
8. It automatically adjusts the results when the value has been changed in a worksheet. The process is
known as automatic recalculation.
9. Graphs let the user provide visual representation of data from a worksheet for ease of interpretation.
Disadvantages of electronic spreadsheet
1. Startup costs including computer and software purchase may be high.
2. Learning how to use electronic spreadsheets require considerable effort and is mostly done at a cost.
3. Electronics spreadsheet file requires to be protected against unauthorised access and malware like
viruses.
WORKBOOK
It is a file in excel program. Workbook has a number of sheets.
Each sheet is known as a worksheet or spreadsheet.
CONTENTS OF SPREADSHEETS
A. WORKSHEET
It is primary document used to work with data.
It is organised into columns and rows of cells
B. COLUMNS
A column is a vertical string of cells
Each column is identified by a letter (column label) in the top row of cells.
C. ROWS
A row is a horizontal string of cells identified in the far left column by a number.
D. CELL
A cell is a single rectangle box on spreadsheet
Each cell is identified by a cell reference.
Cell reference is comprised of the letter of the column and the number of the row in which the cell is,
for example B3 (column B row number 3).
E. ACTIVE CELL
It is a cell in a spreadsheet highlighted with a thick lining along its perimeter.
It marks the insertion point of data in a spread sheet.
F. FORMULA BAR
It is a bar which displays the contents at an active cell.
Editing of data is done in a formula bar.
G. NAME BOX
It displays the address of the current cell. It is given by the column label followed by row number.
H. FILE TAB
It holds commonly used commands such as open, save as, print, close among others.
I. CELL ADDRESS
It is given by the column label and followed by a row number.
J. LABELS
Column and rows has labels. Column labels are letters A – Z, AA – AZ, IA – IZ. Rows labels are
numbers 1, 2, 3, 4 …. In a worksheet.
Page 3 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
TYPES OF CELL REFERENCE IN A SPREADSHEET
A reference is an address of a cell that contains the value referred to in a formula.
They are two main types of cell reference, namely
Relative cell reference
Absolute cell reference
RELATIVE CELL REFERENCE
Relative cell reference it do change relatively to its position on the spreadsheet.
Example of a relative cell reference formula, = Average (H25:J25).
ABSOLUTE CELL REFERENCE
Absolute cell reference will not change even if it is copied to another part of a spreadsheet.
In absolute cell referencing both the column letter and row number are preceded by a dollar sign.
Example of an absolute cell referencing formula, = MAX ($H$25:$J$25).
MIXED CELL REFERENCING
- It is the combination of relative and absolute referencing on a specific cell address to make the row or
column relative or absolute. For example, in case of B$4 referencing, the column is relative in the formula
and the row is absolute.
A function is a prewritten formula that takes a value or values to perform an operation.
BODMAS rule has to be followed when performing any arithmetic calculation in a spreadsheet.
KEYBOARD SHORTCUTS IN EXCEL
Keyboard key combination Function
1 CTRL + O Open file
2 CTRL +N New File
3 CTRL + S Save File
4 ESC Exit current dialog box
5 CTRL +X Cut selected text or object
6 CTRL + C Copy selected text or object
7 CTRL +B Bold selected text
8 CTRL + I Italicise selected text
9 CTRL + U Underline selected text
10 CTRL + T Insert table
11 CTRL + F4 Close current file
12 CTRL + F4 Close Excel
13 CTRL + Z Undo the most recent action
14 CTRL + Y Redo the most recent undone action
15 CTRL + P Print
16 F4 Repeat the last action
17 F1 Open online Help documentation
18 CTRL + F1 Hide/unhide commands ribbon
19 SHFT +ARROW Highlight cells
20 CTRL + SPACE BAR Select current column
Page 4 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
3. PRODUCT (). Multiplies a list of arguments separated by commas for example = PRODUCT (40, 3, 2)
returns 240.
4. QUOTIENT (). Returns the integer part of a division. The function is used when you want to discard the
remainder of a division. For example, =QUOTIENT (5, 2) returns a value of 2.
STATISTICAL FUNCTIONS
1. AVERAGE (). Returns the arithmetic mean of its arguments. For example, if A3, B3 and C3 contains
20, 50, and 80 respectively, = AVERAGE (A3:C3) returns 50.
2. COUNT (). Counts the number of cells that contain numeric values within a range. If a cell contains
non- numeric value, it is ignored. For example, =COUNT (A3:C3) returns 3.
3. MAX (). Returns the largest number from a range of cells. For example, =MAX (A3:C3) in a range
containing 20, 35, 80, 68 and 79.
4. MIN (). Returns the smallest number from a range of cells. For example, =MIN (A3:C3) on 20, 35, 80,
68 and 79 returns 20 as the minimum value.
LOGICAL FUNCTIONS
1. IF (). Returns a value as label if the condition you specify evaluates to TRUE and another if it evolutes
to FALSE. For example IF (C5>50,”PASS”, “FAIL”.
2. COUNTIF (). Count the number of cells within a range that satisfies a certain criteria. For example,
=COUNTIF (A1:D5,”>50”) returns the number of cells in the range that have a value greater than 50.
3. SUMIF (). Calculates the sum of values in a range of cells that satisfy a certain criteria. For example
=SUMIF (A1:D5,”>1000”) selects cells that have values greater than 1000 and calculate the sum.
4. AND (). Returns true if both expression in a comma separated list of arguments evaluates to true. For
example, =AND (3+2=7, 2+2=4) returns true.
5. OR (). Returns true if both of the expression in the comma separated list of arguments evaluates to true.
For example, =OR (3+2=7,2+2=4) returns true.
6. NOT (). This is a unary operator that reverses the value of a Boolean expression from true to false and
vice versa. For example, =NOT (3+2=5) returns FALSE.
DATE and TIME FUNCTIONS
1. TODAY (). Returns a number that represents today’s date. This function takes no arguments for
example, by the time of writing this summary =TODAY () returned 26/12/2018.
2. NOW (). Returns the current date and time formatted as date and time. It takes no argument. For
example, =NOW () returned 26/12/2018 11:20 by the time of writing this summary.
3. DATE (). Returns the serial number that represents a particular date. Ms excel uses year 1900 as serial
number 1. For example = DATE (107, 1, 4) returns January 4, 2007. Year = (1900 +107), month=1,
day=4.
4. HOUR(), MINUTE() or SECOND(), Functions Return the current hour as number 0 to 23, minute
from 0 to 59 and seconds from 0 to 59 respectively.
CREATING A TRADITIONAL SPREADSHEET
There is a need to carefully study data given to create a traditional spreadsheet successfully.
For example if the data given is to process students records the spreadsheet has to appears like this;
Page 5 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
A wizard is a feature in applications program which ask questions and then creates an item according
to the user response.
NAVIGATING IN A SHREADSHEET
Moving around the spreadsheet can be done using the following;
Navigation keys (arrow keys) on a keyboard.
After entering data an active cell can be moved by pressing enter button.
By clicking on a cell using a mouse.
By pressing TAB button on a keyboard.
TYPES OF DATA THAT CAN BE ENTERED IN A SPREADSHEET
A. LABELS.
It allows data inform of alphabetical letters or a mixture of alphabetical letters and numbers.
Labels align themselves to the left side of the cell.
B. NUMERIC AND FUNCTIONS
It allows any number including currency to be entered on a cell.
Numbers on a cell align themselves to the right of the cell.
C. FORMULARS AND FUNCTIONS
It is a chain of logical of arithmetical statement used to generate a result.
The formulas and functions appear in the formula bar of the containing the formula is made active.
Every formula or function in a spreadsheet starts with “=”, e.g. =sum A3:A8) or 10+3.
And also the following operators can be used to generate results in a spreadsheet.
+ plus
- minus
* times
/ divide
>= greater or equal to
% percent sign
^ caret (power)
For example 55* 3 means (55 multiplied by 3)
Do not leave spaces in a formula.
A formula is an equation that performs calculations on a given values in a worksheet.
An operator is a sign or symbol that specifies the type of calculation to be performed on elements of a
formula.
Table showing Arithmetic operators
symbol Description Example
/ Division =B3/M4
* Multiplication =C4*A4
- Addition =H7+J3
+ subtraction =B2-D5
Table showing Relational operators
Symbol Description Example
= Equal to =A2=B2
> Greater than =A2>B2
< Less than =A2<B2
<> Not equal to =B2<>A2
<= Less than or equal to =A2<=B2
>= Greater than or equal to =A2>=B2
Page 6 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
According to purpose software are classified into two and these include;
1. General purpose application software which are designed to perform different tasks and these
are Word processor, Spreadsheets, Databases and Presentation software.
2. Special Purpose application software these are designed for a particular task such as Desktop
publishing software DTPs, Graphic editing software or presentation, video editing and financial
accounting.
INSTALLING MICROSOFT OFFICE 2010
To install Microsoft Office 2010 suite proceed as follows:
1. Insert the Microsoft Office 2010 DVD into the optical drive. Microsoft License agreement is
displayed. To proceed read the agreement and click the check box “I accept the terms of this
agreement”.
2. Carefully read and agree to Microsoft agreement terms. The installation dialog box is displayed
whether to upgrade an existing version.
3. Once you are prompted to provide the license, enter the product key provided at the back of the DVD
casing that came with the software. Avoid installing pirated copy!
4. To install a fresh, click the customise button and make sure the radio button “Remove all the
previous versions”. If you decide to keep previous copies, select the second option then click
continue.
5. After choosing the installation option, click upgrade or install now to proceed. And the rest of the
processes are wizard driven.
6. The installation process will take several minutes depending on the options selected, you may be
required to check for updates. If you are connected to the internet, ensure the “check web for updates
checkbox” is enabled otherwise click close.
7. After the installation progress is completed, you may be prompted to register and activate the product
for online updates. This process ensures that you have a genuine copy of Microsoft Office.
8. To confirm that Office 2010 has been installed, display the start menu and then point to All
programs/ programs. The list of applications including newly installed is displayed on the start menu.
NOTE: The steps outlined are specific to Microsoft Office 2010 and may vary depending on the
version of Microsoft office and type of user license.
Object code
Is when source code is converted to machine readable form using language processors such as assembler,
interpreters and compilers?
Assembler
It convert assembly language program into machine readable form that a computer can understand and
execute.
Interpreter
It converts the source code into machine code statement-by- statement allowing CPU to execute one line at a
time. The interpreted line is not stored in a computer memory this means that every time the program is
needed for execution, each line has to be interpreted. This method of interpreting programs was common in
early computers that did not have enough memory to store the object code.
Compiler
It converts the entire source code into object code. The object code can be made into an executable file by
carrying out another process known as linking which combines the object code with library files that are
required for the execution of a program. After the linking process an executable files is generated.
THE DIFFERENCE BETWEEN THE INTERPRETERS AND COMPILERS
INTERPRETERS COMPILERS
1. Translates the source program one statement 1. Translates the entire source code at once
at a time. before execution.
2. Translates programs each time it is run hence 2. Compiled program (object code) can be
slower than compiling. saved on a storage media and run as
3. interpreted object code takes less memory required, hence executes faster than
compared to compiled program interpreted programs.
3. Compiled programs require more
memory as object file are larger.
Page 12 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
6. Ada: It was designed to develop Military, industrial and real-time systems. It was named after the first
lady programmer, Ada Lovelace.
HELLOWWORD.PAS
1. (*display Hello world on screen*)
2. Program Hello world (output);
3. Begin {main body}
4. Writeln(‘Hello World’);
5. End.
Line 1: It explains the purpose of a program or statement to other programmers. It is known as a comment
of which in programming use of comment is considered as a good practice.
Line 2: It is known as a program header of which in Pascal program must starts with keyword “program”
followed by the name of the program. The word “output” is known as a parameter and indicates that the
program displays the output on the screen.
Line 3: The keyword Begin denotes the start of the executable statements and it is where the start of the
program structure is defined using input, processing, and output statements.
Line 4: Writeln (‘Hello world’) is the most important statement in this program. Writeln is a Pascal output
function for instructing the computer to display Hello world on screen. The word Writeln is a short form of
write line.
Line 5: “END” marks the end of the program. Once the computer encounters the end (with period) the
program is terminated and unloaded from the main memory.
Fourth Generation languages (4 GLs)
- 4GLs it was an improvement on 3GLs to reduce the programming effort by making the programmer
focus more on the problem than algorithm or structure of program. 4GLs have advanced programming
tools for integrating programs with databases, generating reports and creating graphical user interface
(GUI) applications. With 4GLs a programmer can use application generator that automatically generate
program code hence relieving a programmer from tedious work of writing every line of code.
EXAMPLES OF 4GLs
- PowerBuilder - Progress 4GLs
- FoxPro - Microsoft Visual Basic and Delphi Pascal
- Python
SAMPLE OF 4GLs PROGRAM
*displays Hello world on screen
Module Hello world
Sub Main () *main body
Console.writline (“Hello world”)
Console.Readkey () *press any key to continue
End sub
End Module
Fifth Generation languages (5 GLs)
- 5 GLs is also known as natural languages are used to develop systems that solve problems that is
artificial intelligence. Artificial Intelligence refers to computer systems that mimic human – like
intelligence, such intelligence include; Visual (seeing) perception, speech recognition, decision
making and movement.
- With 5GLs programmer concentrates on constraints required for the problem to be solved not problem
solving Logic known as Algorithm.
Page 13 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
EXAMPLES OF 5GLs
- PROLOG - LISP
- Mercury - OPS5
Page 14 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
EXAMPLES OF HTML TAGS AND THEIR MEANINGS
TAG MEANING
<html> </html> Marks the beginning and end of an HTML document. All other tags and text fall
between these two tags.
<head> </head> Marks the header part of the documents.
<title> <?title> Gives title of the web page. Text between these tags appears in the title bar when
the page is browsed.
<body></body> Marks the content part of the web page
<h1></h1> Sets size of text with H1 being the largest and H6 being the smallest size.
Page 17 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
BASIC SYNTAX OF VB.NET PROGRAM
VB.Net is an object – oriented programming language. In object oriented programming, a program consists of
various objects that interact with each other by means of message passing.
Objects of the same type belongs to the same class just like human beings belong to the class called animals.
A VB.Net program is a collection of objects that communicates with each other by sending messages via
methods.
SCOPE DECLARATION
- Scope refers to the portion of the program that a variable or a constant is accessible by the program. They are
two terms used to specify the scope of variables or constants and these are;
1. Global variables or constants; this is the type of variables declared outside the function or module but within
the same application and can be accessed by other methods within the project. E.g. Private Dim X As Integer.
2. Local variables or constants; this is the type of variable declared within a function and can only be accessed
within that function. E.g. public Y As String
CONTROL STRUCTURE
- They are constructs that determines the logical flow of execution of program statements.
a. SEQUENCE – it allow the computer to read instructions from a program file starting form the first
statement sequentially moving down to the last statement.
b. SELECTION – A situation may arise in which a program needs to carry out a logical test and then take a
particular action depending on the outcome of a Boolean test.
c. LOOPING (INTERACTION) – It is the repeated execution of program statement (s). It causes program
statements to be executed several times.
TYPES OF LOOPING CONTROL STRUCTURES
1. Do …… while …. Loop
2. While ….. wend
3. Do ….. loop while
4. Do ……Until …. Loop
5. For ….. Next
Page 19 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
DO WHILE …….. LOOP
- It is used if a condition has to be met before the statements within the loop are executed. It uses a pre-test
condition to determines if the statements are to be executed zero or more times. Such as in Banks a customer
must have sufficient balance in his/her account to withdraw money in cash.
Explanation
I. The condition balance>0 is first tested.
II. If it is true, the account holder is allowed to withdraw cash.
III. The program exists the loop only when the balance falls to zero.
Loop
DO………. LOOP WHILE
- It uses a post-test condition at the end of the loop block. It executes the statement within the loop at least once.
e.g.
Do
Withdraw cash
Update balance
UNTIL balance ≤
Next loop
- For ….. Next is an alternative to while loop used in case the number of repetition are known. For example, to
calculate the sum of 10 numbers, the for…next loop is appropriate because the number of looping is predefined
as 10. The loop will executes the statement within the loop ten times before the total is displayed.
e.g.
For index =lowerlimit To upperlimit STEP <index>
<Statements>
Nextindex.
- The For ………. Next loop that executes the statements within the loop ten times functions as follows:
1. A variables e.g. count is first initialised to the lower limits, e.g. Index is assigned to Θ.
2. The lower limits is then tested against the upper limits e.g. 9.
3. If the lower limits is less than or equal to the upper limit, the program executes the statement inside the
body of loop.
4. If the lower limit is less than the upper limits, the count variable is incremented by 1 and assigned to
count, i.e. count =count +1.
5. If the lower limit is tested against the upper limit and found to be greater, the program exists from the
loop.
Page 20 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
1. Rotary dial telephones: They were the first phones to be manufactured and were used from around
1919 to 1990’s. It was using rotary dial technology.
2. Touch tone dial telephone: It was developed with push button key pads. They came to the scene in
1950’s and are used even today. They are called touch tone dial phone because each button produces a
unique sound when pressed, a feature which is common in mobile phone.
3. Mobile telephone: It is designed for portability, it was small and light, hence it can fit in a pocket.
Mobile phones communicate through cellular wireless network that is set up by the government of
Page 21 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
mobile network service provider. Each mobile phone has a special component called a Subscriber
Identification Module (SIM) card which identifies each subscriber on a network.
The mobile phones are divided into four categories and these include;
1. Basic /conversional mobile phone: Are mobile phone designed for making calls and send messages and
few monochrome games. Basic phones are characterised by small, low resolution screen, physical
keypad, limited memory capacity and low processing power. But some of the advanced phone may have
colour screen, low resolution camera QWERTY keypad and ability to access internet.
2. Touch screen feature phones: Have wide touch screen and ability to process graphics in full colour.
And it can be connected to high speed internet because it has higher memory capacity, and powerful
processor than basic phones. They have better resolution screen with higher resolution cameras.
3. Smartphones: They have advanced feature that make them operate like portable computers.
Smartphones are characterised by;
Page 22 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
5. High resolution screen and camera capable of taking high quality pictures and videos.
COMPUTER NETWORKS
- A computer network is a group of computers and its peripheral devices connected together by
communication hardware and software.
- Computers on network shares information and system resources such as disk drive and Modem as well
as Printers.
USES OF NETWORKS
ELECTRONIC BANKING
- It is the networked computer systems to offer banking services like cash withdrawal, deposit, transfer
and electronic payments. And it encourages the following services and technologies:
1. Automated Teller machines (ATMs): Is a terminal used to offer 24 hours service to customer over a
wide geographical region. ATMs enable customers to withdraw and deposit.
2. Internet banking: It provides on line transaction to customers.
3. Mobile banking: Use of mobile phone to access the bank account which enable customer to withdraw,
deposit and transfer funds.
4. E-commerce: Carrying business activities online.
5. Point of sale (POS) services: Support purchasing of goods using electronics card e.g. VISA, which
support cash less transfer.
6. Mobile communication: It is a view of wireless computer networks.
7. Electronic government: Computer network that offer electronics services to citizen e.g. payment of
taxes
IMPORTANCE OF COMMUNICATION
o It allows sharing of information on any subjects of interest.
o Cultural differences between people across the world can be broken down hence people will be able to
learn other people’s cultures through internet and other communication channel.
o It has allowed telecommuting whereby people work in their convenient locations than in their offices.
o With the introduction of wireless application protocols (WAP), it is possible to work with a laptop in
rural areas.
o Through online services it is possible to access educational, medical advice and other important services.
LIMITATIONS OF NETWORKING
- Although networking has more advantages but also they are some challenges that are associated with
implementation and human factors. And the factors includes;
o High initial installation cost; it is expensive to come up with a network structure.
o Security issues; data and information held in computers on a network is more prone to illegal access
threats than the one held on stand –alone computer.
o High initial cost; hardware and software are expensive to buy.
o Moral and cultural effects; chartrooms and messaging services available on the internet, it changes
morality of people and the culture.
o Due to access to pornographic sites on the internet, it encourages bad sexual behaviour and drugs and
substances abuse.
o Over- reliance on networks; many business processes depend on computer networks which can lead
for many business to go down when networks fails.
ELEMENTS OF COMMUNICATION SYSTEMS
- A communication system has the following elements:
1. Message source: A person who want to send the message across the communication system.
2. Transmitter: Is a communication channel is a transmission media through which data and
information flows.
3. Receivers: A receiver is a terminal equipment that gets the transmitted message from the channel and
decodes it before presenting it to the user.
4. Message user: It is the recipient of the message. The message is important to the users.
Page 23 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
NETWORK DEVICES
- Network devices are components which facilitates the linking of computers on the network system.
- The network devices includes;
o Network cables o Hub
o Transmitter o Bridge and network interface card
o Router (NIC)
o Switch o Modem ( Modulation Demodulation
MODEM
- It acts as the interface between the telephone line and the computer on a network system.
- A modem connects computers to make one or more network segments.
NETWORK CABLES
- Network cables are special designed wires used to connect different network devices.
- They connect one computer to another in direct cable connections.
- It also connects computers through interfacing devices like modems or hub.
TYPES OF NETWORK CABLES
o Two wire open line cables; are made up of two parallel copper wires separated by a plastic insulator.
They are used in telecommunication networks to transmit voice signal. They are linear in nature allows
an electromagnetic field to build around them during heavy data transmission which may cause
interference to the signals. They also capture environmental frequencies such as radio waves which can
cause noise in the channel.
o Twisted pair cables; they are made up of two solid copper wire strands wound around each other in a
double helix manner. They are mostly used to transmit both voice and data signals.
Page 24 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
2. Signal modulation and Demodulation: Is the process of converting signals from analog to digital
making it suitable for transmission.
3. Multiplexing: It the process of sending multiple data signals on the same medium.
4. Bandwidth: It refers to the maximum amount of data that a transmission channel can carry at any one
time.
5. Baseband signals: Is a digital signal that is generated and fed into a transmission medium without
modulation.
6. Broadband transmission: The process of transmitting analog signal is transmitted over a medium using
different frequencies.
7. Attenuation: It is the decrease in magnitude and energy of a signal as it progressively moves along a
transmission medium. Signals get lost when are not boosted.
Classification of communication networks
Communication networks can be classified as either Circuit switched, packet switched, and message
switched.
Page 26 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Circuit switched network
- Circuit switched network is a dedicated circuit that has to be set up before data is sent from source to
destination. All data is sent through a dedicated connection. Examples of such network are the telephone
network and dial-up network.
Advantages of circuit switching
1. Communication entities enjoy dedicated connection.
2. Data is sent through the same path from source to destination.
Disadvantages of circuit switching
1. Inefficient utilisation of communication channels since even when the link is underutilised, other devices
cannot use it.
2. Circuit switching communication is expensive in terms of setup cost and bandwidth utilization.
3. Lack of error localisation means a broken link means the entire communication breaks down.
Packet switching networks
- In packet switching a message is broken down into small tokens called packets, serialised then sent over
the network to the destination and there is no dedicated connection hence many users can use the same
link at a go.
Advantages of Packet Switching
1. Efficient utilisation of communication channels since many users can share the same channels.
2. Cheaper communication costs because no setup cost is required.
3. Errors to messages are localised i.e. if a packet becomes damaged, only that packet needs to be resents.
Also if a link breaks the packet can be rerouted through available channels.
Disadvantages of packet switching
1. Routing of the packets from source to destination is required.
2. Assembling of packets at the destination node requires computing effort.
Message switching network
- In message switching an entire message is sent from one node to the next, and then forwarded to the
next, until the message reaches the destination. Nodes have special memories called buffers for storing
messages then forwarding them.
Advantages of message switching
1. Transmission efficiency is greater since messages can share channels.
2. Message priorities can be set on the network.
3. Since the next route is determined from the current node, more efficient routing of messages is possible.
Disadvantages of message switching
1. Long message can dominate the channel at the expense of others.
2. Nodes must have large storage capacities to store and forward messages.
Types of satellite
1. Geostationary
2. Satellite footprint
3. Very small aperture terminal (VSAT)
VSAT Connections
THE ADVANTAGE OF WIRELESS COMMUNICATION
1. It is flexible in operation as compared to bounded media, because devices can be moved around without
losing access to the network.
2. It can span large geographical area easily.
3. Wireless communication can take via satellite even in very remote areas that do not have high cost
physical infrastructure like telephone lines.
Page 28 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Page 29 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
2. Check the power selector to ensure that it has the right power rating. For example in most countries,
the rating for domestic power is 240V while in US the rating is 110V.
3. Open the casing and check whether the power cable that connects to the motherboard is properly
attached.
4. If the problem Persists, replace the power supply with the new one. Never try to repair a power
supply unit because it may cause serious body harm.
Failure of cooler fan
- A computer may have several cooling fans such as that of power supply, the processor and chassis. The
fan protects delicate devices of computer components from the damage caused by overheating.
- When the fans begin to wear out, it makes a whining or grinding noise. To protect the fans from failure,
do one of the following:
1. Place the computer in a dust free place or if the computer is in a dusty place always remember to cover
it.
2. Always use the blower to blow out dust that may have settled on computer parts.
3. In case one of the fans happens to fail, turn off the computer, unclip it and replace it with a new one.
Abnormal restarting of a computer
- This is caused by poor Operating System Configuration, hardware failure or virus attack. A computer
may display a blue screen with message such as “fatal exception error has occurred”. To resolve these
problems, do the following:
1. Confirm that all hardware devices and drivers are properly installed or configured using device manager.
2. if the problem is related to Operating System, follow this Procedure:
(a). Press combination of keys (CTRL+ALT + DEL) to restart the computer.
(b). During the reboot process, and before windows is loaded, press F8 to display the safe mode
startup screen.
(c). Choose safe mode to load Windows with minimal settings. Scan the drivers or check for any
hardware related problems in device manager.
3. If the problem Persists, the Operating system may be corrupted by a malware. Use up-to-date antivirus
software to scan the boot sector for viruses.
4. If it fails you need to re-install or repair the operating system using the recovery disk created during
installation. The last and painful option is to install the operating system afresh which means losing installed
programs and sometimes data.
Damaged Removable Storage media
- When you get an error failure to read or write from/to media or an error message “error writing to disk”
this indicates that the media is corrupted. To resolve the problem try the following;
1. Open the removable media like CD/DVD into different computers to rule out drive failure as the cause
of the problem.
2. Clean up the drive using cleaning tools available in most computer vendor’s shops.
3. If the problem persists after cleaning, consider replacing it with a new one.
Page 31 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
2. If the system can start in safe mode, locate the malfunctioning device in the device manager and disable
it.
Windows protection error
They are displayed during startup before the desktop is displayed. It occurs when critical Windows drivers
fails to load. To deal with this problem do the following;
1. Restart the computer in safe mode as outlined above. If windows does not load, use the recovery disk to
repair the operating system.
2. Using the recovery disk, repair the operating system by paying attention to details.
Problem of Non- responding system
Non-responding system is also known as hanging which refers to when a computer has failed to respond to
commands. To resolve the problem, do one of the following;
1. Press CTRL+ALT+DEL keys to display the task manager.
2. In the task manager window, click the process tab, and then select the non-responding process e.g.
explore.exe.
3. Click END Process button to terminate the application.
Printer- related problems
- A printer is an output device used to produce hardcopies. To troubleshoot printer related problems you
need to know how the printer works and how to set it up.
Some of the printer related problems are;
1. I/O Print error
It occurs due to poor communication between the computer and the printer. To resolve the problem
ensure that the correct printer is selected and turned on. If fails the re-install the printer drivers.
2. Paper jam
It is caused due to use of poor quality paper, when the printer is ever loaded with paper or using too light or
too heavy paper. Jams stop the current print process to resolve gently remove the paper jam.
3. Poor printout
It is caused by use of poor quality ink or toner or laser drum/head, to resolve by replacing the ink, toner
and laser drum/head. Quality can also be affected by machine print process. Garbage is produced due to
poor communication problem between the computer and printer. To resolve make sure that the
appropriate drivers are properly installed.
4. Toner/ink Cartridge problem
It can be resolved by replacing or refilling the toner/ink. Make sure the toner is tested to avoid possibility
of using faulty cartridge.
5. Smudged Printout
With dot matrix check the printer head to resolve the problem. With laser printer replace the drum. With
ink jet printers avoid touching the printout before it dry. Try the following to solve smudged problem:
1. In case of a dot matrix printer, replace the print head. If doesn’t solve the problem, it could indicate
worn-out printer head or poor ink ribbon the replace the head or ribbon.
2. For laser printers, consult the user-guide that may be helpful in locating the problem especially relating
to the fuser. A fuser is a sensitive component that gets very hot it is advisable for it to be handled by an
experienced technician.
Page 32 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Check the operating system installed in your computers before choosing any DTPs software.
Benefits of DTPs Publishing
Although word processor can be used to create professional publications, DTP software offers the following
benefit;
1. Every item on a page is contained in a frame hence can be edited and formatted independently.
2. DTPs provide more control on how text and graphics can be arranged and formatted.
3. Frame containing text or graphics need not flow in logical sequence.
4. DTPs provide master pages used to set a common layout which may be repeated on several pages.
5. In DTPs publications can be printed in a form suitable for commercial digital offset printing using
colour separations.
6. Most DTPs have predefined templates such as brochures, booklets, posters and business cards are
available.
7. Multiple stories from different authors can be handled with ease.
8. DTP enhances Visual communication to different audience.
9. DTP ensures files print properly in their true colours, fonts and measurements.
Types of DTP Software
- DTP software are divided into two namely; Graphic-based DTPs and Layout- based DTPs.
1. Graphic-based DTPs: It is used to edit and format graphics objects such as picture and vectors
drawings. Vectors drawing are free hand drawings such as those drawn by fine artists. Adobe
Photoshop, Adobe Illustrator and CorelDraw are the examples of Graphic –based DTPs. Graphic-
based DTPs are good at setting resolution, brightness, Contrast cropping and filling images with
colours.
2. Layout-based DTPs: Are used for designing page layout for text and graphics. Adobe PageMaker,
Microsoft publisher and Adobe InDesign are some of the Layout-based DTPs.
Purpose of desktop publishing Software
- DTPs are popular in publishing because they provide personal design publication with a lot of control
on;
1. Graphic design: They can be used to design a vector images using drawing tool in CorelDraw and
Illustrator. They are used for image editing through the use of Adobe Photoshop.
2. Page layout design: DTPs are used for page design layout by setting consistent picture and object
locations, dividing a page in a number of newspapers columns and adding layers. A layer can be
viewed as the arrangement of objects on top of each other with each object on its own layer.
3. Printing: used for image color separation and provide more flexible in image printing of which
printing is the main goal.
Examples of Publications
The following are just a few examples;
1. Newspapers: These are daily publications bearing news, sports, magazine e.t.c for the readers.
2. Magazines: A magazine is a publication containing news, features, specialists knowledge etc that
has many pictures and illustrator targeting a particular audience.
Page 33 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
3. Book: A book is a publication in a particular subject area or featuring a particular story.
4. Calendar: This is a publication showing the dates and dates and days of a week, month and year.
Designing a publication
- The following are key factors you need to consider when designing a publication;
Page 34 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
1. Decide the type of publication. Is a newspaper? How many columns per page? What paper size will be
used?
2. Decide the Layout of the publication. This will help to know appropriate template or master pages to
create common layout.
3. Decide on about the colour scheme, fonts, margins, orientation, graphics etc and make sure the page is
properly setup.
Printing a Publication
- Unlike in other application programs, printing in DTPs is much more technical. This
is because you may prefer to print to print a picture in separate colours referred
to as colours separation. You can also insert crop marks and other details required
for commercial printing.
To print a publication, proceed as follows:
1. On the file tab, click print.
2. Under printer option, click printer properties hyperlink to set print options in the
dialog box.
3. To specify advanced print properties such as inserting cropmarks, click the arrow on
the right of printer button, then click Advanced output settings from the dropdown
list.
4. In the dialog box that appears, use tabs such as Marks and Bleeds to specify advance
print options.
5. Click the print button to start printing.
Page 35 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
PART 2
FORM 4 CONTENTS
TOPIC 1: USING SPREADSHEET
Using formulas to solve practical problems
- Spreadsheets programs use special formulas to help user solve daily life problems.
- Formulas like AVERAGE are used to assess the performance of a group and other formulas are
complex, for example, when you want to model the profitability of a business project.
Some examples of the formulae used in a spreadsheet are;
1. SUM 11.AND
2. ROUND 12.OR
3. PRODUCT 13.NOT
4. AVERAGE 14.TODAY
5. COUNT 15.NOW
6. MAX 16.DATE
7. MIN 17.HOUR
8. IF 18.MINNUTE
9. COUNTIF 19.SECOND
10.SUMIF
SORTING DATA
- Sorting refers to arranging data in ascending or descending order. It helps in the quick retrieval of data
and records. E.g. in a phone directory it is faster and easier to search for a particular number belonging to
a person if it is sorted.
To sort range of rows:
1. Highlight the range of cells that you want to sort on the created spreadsheet.
2. On the home tab, click the sort and filter icon found within the Editing group then select the Custom Sort
command.
3. In the Sort dialog box, select the field to be used as the key for sorting and the sort orders as either
descending or ascending order then click OK button to apply.
Filtering data
- Filtering is a quick and efficient method of finding and working with a subset of data in a list. A filtered
list will display the cells that meet the criteria you specified.
The two types of filtering are;
1. The autofilter: It uses simple criteria and includes filter by selection.
2. Advanced filter: It uses more complex criteria.
USING AUTOFILTER
- It is applied to only one list one a worksheets.
To autofilter a list:
1. Click a cell in the list that is to be filtered; usually the list in a column.
2. On the Data tab, in the sort and filter group, click filter.
3. To display only the rows that contain a specific value, click the arrow in the column that contains the
data you want to display and uncheck all the other values leaving only the one you want to be checked.
Advanced Filter
- It is used to specify the criteria manually.
1. Specify the criteria in the column that you want to use as filter criteria.
Page 36 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
2. On the Data tab, in the sort and filter group, click Advanced. In the Advanced filter dialog box, do the
following:
I. Select the “filter the list in place” option.
II. In the List range box, specify the range of values to be filtered. You don’t have to type just click the
collapse dialog button on the left of the field and select the range.
III. In the Criteria range box, specify the range that covers the column label and the criteria.
CREATING CHARTS AND GRAPHICS
- A chart is also known as a graph is a pictorial representation of underlying data on a worksheet.
- Charts make it easy for the user to see the comparisons, patterns and trends in data.
- A chart is linked to the worksheet data it is created from, and whenever data on the worksheet is
modified, the chart is updated automatically.
- A chart is a visual representation of data in a worksheet. Charts are used to compare and see patterns and
trends in the generated data.
TYPES OF CHARTS
- Some of the charts available in a worksheet are;
1. Line chart – represents data as lines with markers at each data value in the x-y plane.
2. Column chart – represents data using clustered of columns comparing values across categories.
3. Bar chart – represents data using clustered bars arranged horizontally. It is used to compare values
across categories.
4. Pie chart: used to present data on a circular pie partitioned into sectors representing each item being
analysed.
5. Scatter chart – Compares pairs of values on the same axis using scattered dots.
To generate a chart proceed as follows;
1. Select the range of values for which you want to create a chart.
2. On the insert tab, click the column button which is within the charts group.
3. Click the type of chart you want to create i.e. column chart then click OK button and the chart will be
inserted in the worksheet.
FORMATTING AND EDITING CHARTS
Resizing and moving a chart
1. Click the chart you wish to resize.
2. Use the place holders on the edge to drag the chart to size.
3. To move the chart, click inside the chart area then drag to the desired position.
Labelling data values
1. On the chart Tools toolbars, in the chart layout group then click the Quick layout command. Select a
layout that had data labels.
2. Edit the chart title as appropriate.
Insert titles
1. On the Chart toolbars, in the chart Layout group click Add Chart element then select chart Title.
2. Select the preview with the expected position of the title e.g. above chart then type the title in the
provided space.
Inserting a legend
- A legend is equivalent to a key used on manually drawn charts. It shows colour which represents each
data values.
To create a legend:
1. On the chart tools toolbars, in chart layouts group click Legend.
2. Select the preview with the right position of the legend you wish and it will be indicated.
Changing the chart location
1. Right click the chart then select the move chart command from the shortcut menu that appears.
2. In the move Chart dialog box, specify whether to embed the chart into the current worksheet or place it
in a new worksheet, and then click OK.
Page 37 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Linking files
- A link is a type of formula that fetches its data from another worksheet or spreadsheet files into a current
worksheet file.
To link spreadsheets:
1. Open the workbooks you wish to link.
2. In the source worksheet, highlight the cells you wish to link to and then click the copy command.
3. Switch focus to the destination workbook. Click the upper left corner of the range where you wish the
links to be.
4. On the Home tab, Click the paste drop down and then click the paste special command. In the paste
special dialog box, click paste link option then click the OK command.
Page 38 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
DATABASE MODELS
- There are three main database models and these are;
o Hierarchical model
o Relational model
o Network model
HIERARCHICAL MODEL
- A database model which organise data in a tree like structure. It allows repeating data using parent child
relationships.
RELATIONAL MODEL
- It organise data in tables, each table has a collection of records and each records contains the same field.
- In relational database model each row is unique and each column value are of the same kind with unique
name.
NETWORK MODEL
- It is a database model which allows each parent to have multiple parent and child record. In network
model data is organised in lattice structure.
OBJECT- RELATIONAL MODEL
- This is a database model that stores and manipulates data as objects. It is use of programming languages
to develop database system.
OBJECT- ORIENTED MODEL
- It supports storage, access and manipulation of objects. It provides unification of application and database
development. It organise a Program as one element.
CONTENTS OF A DATABASE
- They are several elements of a database and some of them are;
o Tables o Reports
o Queries o Field
o Forms o Records
o
- A table is an object that stores data. Each table is supposed to contain one type of information.
- Queries are objects that are used to retrieve data from one or more tables or forms.
- A form is a database object which is used to update data in tables and queries in a database.
- A report is an object which displays data in printed format.
- A field is a character or logical of character that represents data items.
- A record is a collection of related fields that represents a single entity.
ADVANTAGES OF A DATABASE
o It contains tables which is used to store information
o It has queries which are used to retrieve just the required data.
o It has forms that are used to view, add and update data in tables.
o It has reports to analyse or print data in a specific layout.
o It has data access page to view, update data from the internet.
DESIGNING A DATABASE
- The following steps has to be followed in database design;
1) Determining the purpose of the database.
2) Determining the fields needed in the database
3) Determining the tables needed in the database
4) Identifying primary fields. A primary field is a field that has got a unique value in a record.
5) Determining table relationships. Bring related information together.
FACTORS TO CONSIDER WHEN DESIGNING A DATABASE
Page 39 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
1. Estimate the amount of data expected to be stored in the database. This important because it
determines the number of tables to be created.
2. Study the requirements of the user carefully in order to define all the inputs, output and relationships
required to create a database.
3. Design a prototype database preferably on the paper to determine fields and tables required to
implement the database.
4. Normalize the fields into separate tables to allow flexibility in database manipulation. This process of
decomposing fields into separate but related tables is referred to as normalization.
5. Identify a field in each table that will be used to identify each record uniquely. Such field is referred to
as a primary key.
6. Give the most important fields’ first priority when designing a table structure. These fields are those
mostly used to sort and search for records in a database.
7. Design sample data forms and reports needed for interaction between the user and the database system.
TABLES AND RELATIONSHIPS
- Data in a table is arranged in columns (field) and rows (record). Creating a table involves specifying
fields on how they ought to appear in a table. A table can be created using the following way;
1) Design view
2) By using wizard
3) By entering data
CREATING TABLES IN DESIGN VIEW
o Load Ms Access.
o Click table under objects.
o Click create table in design view.
o Press ENTER. Then a blank table with three columns opens.
o Enter the field name in field name column and assign the data type in data type column.
o Define a primary key before saving the table by clicking primary key button on the standard toolbar.
o A primary key is a key used to identify unique information in a table. An index or secondary key is
used to the speed up the search of records in tables and queries in a database.
o Save the table by attempting to close the table and typing the table name in the text box and click OK.
DESCRIPTION OF FIELD (DATA) TYPES
- The type of data to be used in a database must be clearly defined for the purpose of manipulation and
storage.
- The data type used in Ms Access include;
1) Text (short Text); this data type allows the entry of letters, number, spaces and punctuation. Text has to
be used where calculation has not to be used.
2) Number; this field allows the entry of numeric numbers (0 to 9) that has to perform mathematical
calculations.
3) Memo (long Text); is a field which allows both alphanumeric. It allows several paragraph of text to be
entered in a field.
4) Date/time; is a data type used to identify a field as either date or time.
5) Currency; is a data type used to identify numerical values that have decimal or fractions.
6) Auto number; is a numerical value that tell Ms Access to automatically increase the values in a field.
7) Yes/no; is a logical field where the entry is YES or NO, TRUE or FALSE?
8) OLE Object; OLE object stands for Object linking and Embedding. It is mostly used with graphical
user interface applications for inserting graphics objects such as pictures.
9) Calculated; It is used to store data created from a formula, it important when a value has to be use in a
field.
10) Attachment; It is used to store one or more files containing pictures, sound and videos.
FIELD PROPERTIES
- Field properties they help to work with database tables in more complex methods. Some of the field
properties are as follow;
o Default value; It is a value that appears automatically in a datasheet or form e.g. =date ().
Page 40 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
o Validation rule; It is a logical expression that restrict a value to be entered in a field e.g. if >=0 and
<=100.
o Validation text; It is a text that appears when the validation is violated.
o Required; It determine if the entry has to be made before proceeding in the field.
o Allow zero length; It allows the user to proceed without making any entry in the field.
o Indexed; It facilitates the organisation of records for easy search. A primary key is an example of an
index. Indexed is a key used to speed up the searching of data in a database.
o Format; Determines how information appears on the screen or when printed.
o Precision; This property is used to specify the total number of digits that can be stored both to the left
and right of a decimal point.
o Decimal places; It applies to number and Currency types. For number and currency fields that you can
specify the number of decimal places.
o Input mask; It allows the entry of field into specified format. i.e. entering a number like
02000100409874 and the input mask is set as 000-(00000)-000000, it is formatted and displayed as 020-
(00100)-409874. The property is used to format phone numbers and address entries.
o Caption; It is a more descriptive name for a field to be used in table or a form display. For example the
caption for stuName could be Student Name.
Page 41 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
CREATING A FORM USING WIZARD
- A form is a database object that is used for entering and displaying data and it is usually bound to one or
more tables.
- A record source is a field in the table or query where a form is bound.
FORMS LAYOUT OPTIONS
1. Columnar form: the fields for each record are displayed down a column; that is, each value is displayed
on a separate line with field labels to the left.
2. Tabular form: Records are displayed from left to right across the page and labels appear at the top of
each column and each row represents a new records.
3. Datasheet form: The form resembles a table in datasheet view.
4. Justified form: One record occupies the whole form.
- To create a form by using wizard do the following;
o Click form under object.
o Click creates form using wizard.
o Press ENTER to display the dialogue box.
- In the form wizard dialogue box follow the steps below;
1) Selecting the record sources by clicking the single or double arrows.
2) Specifying layout e.g. columnar or justified
3) Specifying style e.g. blends or standard.
4) Naming the form by typing the form name in the textbox and click finish to finish form wizard.
CREATING A REPORT USING WIZARD
- A report is a database object that presents data in printed format.
SECTIONS IN A REPORT DESIGN GRID
1. Report Header: This contains unbound controls that display the title of report.
2. Page Header: Contains headings or labels for the data items to be displayed in every column.
3. Detail section: Holds bound controls that display data items for the table or query it was created from.
4. Page footer: It holds a control that has to be displayed in every page such as the page number and date.
5. Report footer: Used to display summary information form a report such as grand totals.
- To create a report by using wizard do the following;
o Click report under object.
o Click creates report using wizard.
o Press ENTER to display the dialogue box.
- In the report wizard dialogue box follow the steps below;
1) Selecting record source by clicking the single or double arrows.
2) Adding grouping levels
3) Setting up sorting orders
4) Specifying layout e.g. stepped or block and setting page orientation e.g. portrait or Landscape.
5) Specifying style e.g. bold or corporate.
6) Naming the report by typing the report name in the text box and clicking finish.
PRINTING
- Printing can be done in many ways in application programs such as Ms Word, Ms excel and Ms Access.
To print your work do the following;
Page 42 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Page 45 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
o Network interface card (NIC). Some NIC are onboard already installed in the computer.
o A hub or switch
o Network cables
o RJ45 connectors
- And the following tools are required;
o Crimping tool
o Cable tester
o Screw driver
SOFTWARE REQUIREMENT IN NETWORKING
- Network operating System (NOS)
- Network Protocols
NETWORK OPERATING SYSTEMS
- Are software that are specifically designed to optimised the networked computers ability to respond to
service requests. Servers run on a network operating system.
FUNCTIONS OF NETWORK OPERATING SYSTEMS
1. Provides access to network resources e.g. printers and folders.
2. Enables nodes on the network to communicate with each other more efficiently.
3. Support interprocess communication i.e. enables the various process on the network to communicate
with one another.
4. Respond to requests from application programs running on the network.
5. Supporting network services like network card drivers and protocols.
6. Implementing network security features.
NETWORK PROTOCOLS
- Protocols are rules and procedures that govern communication between two different devices or people.
For example a diplomat from a foreign country must adhere to the set of rules and procedure of
communication when representing his country in the host country.
- To avoid protocols that conflict, a reference model for all developer was developed to give the guidance
to all developers world wide. That is how the Open systems Interconnection (OSI) model was developed
by the international Organisation (ISO).
- OSI is not a protocol but a reference point, a standard guideline or blue print for high quality protocol
development.
- Network protocols are design after the Open systems interconnection (OSI) model. It has seven layer
each performing distinct function and the are shown in the table below;
Page 47 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Layer Function
7 Application layer User application run here and generates requests for data transmission or
open received information.
6 Presentation layer Format data for transmission e.g. ASCII, .tif etc; encrypts decrypts data.
5 Session layer Sets up transmissions between communication devices for synchronised
data exchange reliability.
4 Transport layer Manages data transfer over a network to ensure reliability.
3 Network layer Address information is added to the packet and internetwork routing to the
destination
2 Data link layer Packs data into frames; adds error checking information; sends to physical
network. All this is called data link control (DLC)
1 Physical Layer Data encoding; attach to physical Medium; transmit bits voltage levels
format
- Levels 7,6,5,4 and 3 they work at internetworking devices and levels 2 and 1 they work and networking
devices.
Repeater: A repeater extends the length of the network by receiving weak corrupted signals, regenerating
them then sending them to the other part of the network. It works at the physical layer.
Hub: A hub simply provides connectivity at the physical layer too. It has no packet filtering or data
addressing capabilities.
Switch: It works at the data link layer. It has to know the MAC address of the source and destination of data
for effective switching.
Bridge: It works at the data link layer. It has to know the MAC address of the data in order for it to perform
filtering on network segments.
NIC card: It works at the data link layer too since it has to know and send data to the right MAC address on
the network.
Router: A router is an internetworking device. It operates at the network layer and runs routing protocols
like internet protocols (IP) which enables routing of data beyond the local area network.
Page 48 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Gateway: It is the most powerful internetworking device. It operates at all levels of the OSI model and has
capability to perform inter-protocols conversions.
OSI LAYERS AND DATA TRANSFER ON NETWORKS
- The ISO OSI model is used to describe how two devices attached to a network communicate with one
another. The process goes as follow;
1. The user creates a message to be sent over the network using an application program running at level
7 (application layer) of the OSI model e.g. an e-mail application. When the user press SEND button,
the message is passed to the application layer whose protocols affix an application header (AH) to
the message.
2. The message is passed down the stack all the way to the physical layer. Each layer affixes its header
to the message. The message is then sent on the network.
3. On the receiving end, the message undergoes a reverse process i.e. each layer rips off its header e.g.
for example the message was encrypted at the presentation layer, it is now decrypted at that layer. As
the message goes up the stack, all headers will be removed until the original message is presented to
the receiving user application.
EXAMPLES OF PROTOCLS AT EACH LAYER OF OSI
Level 7: Application: Simple Mail Transfer Protocol (SMTP), file transfer Protocol (FTP).
Level 6: Presentation: ASCII/ EBCDIC/JPEG/TIF/MPEG/PKI e.t.c. these protocols format the data ready
for transmission.
Level 5: Session: Remote Procedure call (RPC), Point Tunneling Protocol (PPTP), OSI session layer
Protocol (ISO-SP, SQL.
Level 4: Transport: Transport Control Protocol (TCP), User datagram Protocol (UDP), Sequenced Packet
Exchange (SPX).
Level 3: Network: Internet Protocols (IP), Internetwork Packet Exchange (IPX), Internetwork Control
Message protocol (ICM), Open shortest Path First (OSPF).
Level 2: Data Link: Ethernet, Token Ring, Point to Point Protocol (PPP), Wireless Access Protocol (WAP),
Serial Line Internet Protocol (SLIP).
Level 1: Physical: No protocol just encoding techniques, bit streaming, transmission technique e.g. base
band or broadband e.t.c
Application protocols that work at the highest level of the OSI model
1. SMTP: The simple mail transfer protocol is the internet standard for electronic mail.
2. FTP: The file transfer protocol enables a person to transfer files on the internet.
Transport protocol that work at the transport layer
3. TCP: The Transport Control Protocol ensures reliable data transfer from source to Destination. It breaks
down the data into packets and assigns them with sequence numbers so that the message can be
reconstructed at the destination.
4. UDP: The User Datagram Protocol is an unreliable data transfer protocol and is used to transfer non-
user data like control signals etc.
5. SPX: Sequential Packet Exchange (SPX) is part of Novell’s Internetwork packet exchange/sequential
packet exchange (IPX/SPX) for sequenced data.
6. NETBEUI: Initially we had network based input output system (NetBIOS). This was extended by IBM
to create a local area network protocol which was adopted by Microsoft for its Windows NT platform
and renamed NetBIOS Exchange User interface (NetBEUI).
Network protocols provide routing services. They handle addressing and routing information, error
checking and retransmission of requests. Some examples of network layer protocols include:
7. IP: Internet Protocol does packet forwarding and routing using the addressing system on the
Internetwork has a unique IP address.
8. OSPF: The Open Shortest Path Protocols helps in efficient routing of data on Internetwork i.e. it
analyses all the next available routes or and chooses the one width the least cost to transfer the packets.
THE TCP/IP PROTOL
This protocol was developed in 1978 before the OSI reference model came into being. It was developed to
enable internetworking on the internet. It combines the Transport Control Protocols (TCP) and the internet
Page 49 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Protocol (IP) into one system. Its layer is similar to OSI only that it has four layers instead of seven. TCP/IP
has the following structure;
TELNET
SMTP
FTP
Presentation Layer
Session Layer
Transport Layer Transport Layer TCP UDP
Network Layer Internet Layer IP IGM
Data Link layer Network Interface layer Ethernet, Token Ring etc
Physical Layer
2. Digital leased lines: Since the line is digital then there is no need of a modem but just a codec to
control how bits are sent/received by the computer.
Page 50 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
CONNECTING VIA MOBILE TELEPHONE NETWORKS
- The mobile network technology is capable of carrying both voice and data. Through wireless modems,
mobile phones and tablets that can be tethered to computers, more and more people are now able to
access the internet via mobile phone networks. Types of mobile network include;
1. Global system for mobile communication (GSM).
2. Code Division Multiple Access (CDMA) network.
INTERNET ON GSM NETWORKS
- The GSM networks have been evolving over time, starting with first generation (1G), second generation
(2G), fourth generation (3G) and now 4G. The table below explain the summary of GSM network;
Page 51 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
- Devices that have wifi activated automatically detect and connect to wifi hotspots and hence to the
internet whenever they are within range.
Or
Network Prefix Host Number
Classful IP addressing
- Internet address can be divided into classes.
- Designers of these addresses decided that for easier identification and routing, the length of the network
number can be varied to differentiate them into classes.
- Depending on the number of bits used for the Network ID and the host number, the address can be
classified as either A, B, C, D and E.
Class A: It is the first bit of the address is set at 0 and network number is made up of the first eight (8) bits.
It means 24 bits are used to identify hosts on the network.
Class B: The first two highest bits start with 10 and the network number is made up of the first sixteen (16)
bits. And the host number is also made up of sixteen (16) bits.
Class C: The first three highest bits start with 110 and the network number is made up of the first sixteen
(16) bits. The host number is made up of sixteen bits. The first three classes are called primary classes and
the one in commercial use all over.
Class D: It has its first four (4) bits set at 1110 and is reserved for what is called IP multicasting.
Class E: Has the first five bits set at 1111 and is reserved for research purposes.
Interpreting IP numbers
The lowest possible IP number is:
Binary notation: 00000000.00000000.00000000.00000000
Decimal notation: 0 . 0 . 0 . 0
And the highest would be:
Binary notation: 11111111.11111111.11111111.11111111.
Decimal notation: 255 . 255 . 255 . 255
i.e. between 00000000 and 11111111. there are 256 numbers or 2n =28 =256. 255 indicated in the decimal
notation because counting starts from 0. i.e. when you count from zero the it becomes 2n -1=255. The zeroes
and ones host addresses are reserved and are never given out.
The IP space exhaustion problem
- The Classful addressing has a limited number of unique network numbers that could be generated i.e. 232
=4, 294,967, 296
Page 52 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
Examples of IP address and class ranges
The following table shows the ranges of various IPv4 addresses:
Class Rang of addresses Example
Class A. 1.xxx.xxx.xxx to 126.xxx.xxx.xxx 10.10.0.1
Class B. 128.0. xxx.xxx. to 191.xxx.xxx.xxx 128.28.0.1
Class C. 192.0.0.xxx to 223.255.255.xxx 192.28.0.1
Classless IP addressing
- Classless IP address is also called Classless Inter-Domain Routing (CIDR). Instead of having fixed
boundaries between the octets (after every 8 bits), IP addresses can be assigned with the boundary of the
network number and host number pressed any where within 32 bits address. Router can be told where
the network number ends by including a /x at the end of the IP address. i.e. 96.168.100.0/25 means the
network number is 25 bits long.
Check the table below for more examples:
Address Number of addresses per IP
192.168.100.0/25 28=255
192.168.100.0/22 210 =1024
IP version 6 (IPv6)
- Internet protocol version 6 is a new generation internet addressing architecture designed to succeed IPv4.
- It uses 128-bits addresses; hence it has a far much bigger address space.
- The IPv6 address consist of 8 groups of hexadecimal digits ranging from 0-f separated by a colon for
example: 2002:2c0:2001:2:213:123:249:22
- Only leading zeroes are omitted, trailing ones are not. The above numbers is actually:
2002:02c0:2001:00002:0213:0249:0022
The numbers have the following characteristics:
1. It uses 16 bits hexadecimal numbers
2. Numbers are separated by full colons (:)
3. Abbreviations are possible e.g. leading zeroes in contiguous blocks are represented by double colons
(::) e.g.2002:2c0:0000:2:3c:3b:33 is equivalent to 2002:2c0:: 2:3c:3b:33.
Specifying the network and host numbers
- CIDR prefix representation is used i.e. a slash followed by the length of the network number written
after the IPv6 number e.g. 2002.db6:12::/48 means the first 48 bits are for the network number. The last
two colons (::) here indicates that the remaining numbers are zeroes.
Comparison between IPv4 and IPv6
1. IPv6 has large address space (2128) as compared to IPV4 whose space is facing exhaustion (232).
2. We use the dotted decimal notation to write IPV4 address but when it comes to IPv6, lama we use
hexadecimal separated by colons.
3. IPv6 was designed with modern internet and gadgets technologies in mind hence it is more flexible
and extensible i.e. it caters for wired and wireless devices efficiency devices efficiently.
Page 53 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
IP Configuration on Networks
- After connecting the computer to the network using transmission media, it still needs to be configured in
order for it to be able to communicate with other computers on the local area network and access the
internet.
To configure an IP address on the network, follow the procedure below:
1. Open the control panel
2. Click the Network and Sharing Centre (NSC) link.
3. In the NSC dialog box, you can see all the available connections for which you can configure their
IP.
4. On the left pane, click the Change Adapter settings link to view all available network connections
whether active or not.
5. Right click the one you wish to configured then select properties command.
6. Click on internet Protocols version 4 (TCP/IP).
7. Enter the IP address and the one for Default Gateway. If you don’t know this values, ask network
administrator to supply you with them.
- On some network the administrator may have installed a protocol called Dynamic Host Configuration
protocol (DHCP), in this case there is no need of setting an IP address you simply select the obtain an IP
address automatically option.
8. After all the selections, click OK button.
THE ELEMENTS OF NETWORKS
1. Data communication devices such as computers, Cell phones and telephones.
2. Communication devices such as MODEM, HUB, SWITCH and network cable.
3. Network software.
4. Data signals.
HYBRID NETWORKS
- It refers to the network system which combines two or more network configurations.
- It may involve combining a LAN and GAN and other network system.
THE TELECOMMUNICATION PROCESS
- It is the process whereby communication devices send and receive signals using one common language.
- All the devices connected to the network system need to understand the language used in the system.
- The telecommunication process it involves the following components;
o Transmitter
o Transmission
o Channel
o Receiver
- Data to be transmitted can be either in analogue or digital.
- Analogue signals represent information as binary digits (bits).
Page 54 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
- Thus why most of the communication devices are used to convert the analogue signals from the
telephone line to digital so as to be understood by computers and digital signals are converted to
analogue signals which go through the telephone line to the internet.
COMMUNICATION SPEED
- It refers to the effective use of communication devices. For this to happen both the sending and receiving
computers has to agree on how data will be sent and received.
- The agreement of communication devices on the speed of data transmission is known as BAUD RATE.
- Baud rate is measured in bits per second, such as kilobits per second (kbps)
IMPORTANCE OF COMMUNICATION
o It allows sharing of information on any subjects of interest.
o Cultural differences between people across the world can be broken down hence people will be able to
learn other people’s cultures through internet and other communication channel.
o It has allowed telecommuting whereby people work in their convenient locations than in their offices.
o With the introduction of wireless application protocols (WAP), it is possible to work with a laptop in
rural areas.
o Through online services it is possible to access educational, medical advice and other important services.
LIMITATIONS OF NETWORKING
- Although networking has more advantages but also they are some challenges that are associated with
implementation and human factors. And the factors includes;
o High initial installation cost; it is expensive to come up with a network structure.
o Security issues; data and information held in computers on a network is more prone to illegal access
threats than the one held on stand –alone computer.
o High initial cost; hardware and software are expensive to buy.
o Moral and cultural effects; chartrooms and messaging services available on the internet, it changes
morality of people and the culture.
o Due to access to pornographic sites on the internet, it encourages bad sexual behaviour and drugs and
substances abuse.
o Over- reliance on networks; many business processes depend on computer networks which can lead
for many business to go down when networks fails.
TOPIC 4: NETWORK APPLICATIONS
INTERNET SERVICES
- These are services provided by the internet. And they are as follows;
o World Wide Web
o E-mail
o Bulletin Board
o Internet relay chat (IRC)
o File transfer Protocols (FTP)
o Web Portal
o Blog
o Multimedia
WOLRD WIDE WEB (WWW)
- World Wide Web is the interlinking of websites.
- A web site is a collection of pages or files published on the internet, using a set of rules (protocols),
known as Hypertext Transfer Protocol (HTTP).
- Pages in the web sites are viewed using a web browser.
- A web browser is an application programme used to surf (browse) the web.
- Examples of web browser are;
Internet Explorer
Netscape Navigator
URL
Page 55 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
UNIVERSAL RESOURCE LOCATOR AND SEARCH ENGINES
- URL always starts with HTTP://.
- The address is also typed using WWW, for example www.bec.com.
SEARCH ENGINE
- A search engine is an application program or software used to search on the web sites using keywords.
- Popular web site search engines includes the following;
Yahoo Ask jives
Google (G-mail) UK plus
Excite Yell and Hotbot
Alta vista
HOW A SEARCH ENGINE WORKS
Search engines consist of three components and these include;
1. The Spider (web robot or crawler)
2. Indexing database (engine)
3. The query engine
The three components operate as follows;
1. Before the user invoke the search engine, a program called spider searches for new items on the web to
add to the search engine index database. This gathering of information before user’s request makes
search faster. This is why search results are displayed instantly.
2. The search engine indexing database receives every thing the spider brings to it. It scans the documents
for keywords and generates the indexes and then stores them in an index database.
3. Once a user submits the search string (a word or phrase), the query engine receives the indexing database
and processes the request as follows;
a). Looks for the keywords specified in the user queries from the index database.
b). Retrieves associated document and rank them according to some preference or criteria such as the
most visited pages.
4. The results and time taken to search for the request are displayed on the browser. If the results did not
match required information the users can refine the search words.
TERMS USED IN WEB DESIGN
1. Website: It is a collection of one or more pages linked together in a meaningful way and it describe
the body of information or creates overall effects.
2. Search engine: It is the special type of website that help users easily search for information from
other websites
3. Web server: A computer on the internet or an intranet that delivers web pages and other files in
response to browser request.
4. Web page: It is a single document page on a website containing text and any other items that are
displayed within that page.
5. Home page: It is the first page also known as the index for web that is loaded from which you can
navigate to other pages on the same or another website.
ELECTRONIC MAIL (E-MAIL) AND FAX
- E-mail is the process of sending and receiving messages from one computer to another.
- E-mail is possible when both computers are connected on the internet.
- A computer can also be used to send and receive fax messages.
BULLETIN BOARDS (web portals)
- It is an electronic location for public messages. It is also called Newsgroup.
BLOG
- Website that contains personal information which can easily be updated. Blogs may be used for
business, advocacy and campaign.
Multimedia; sites containing photos, movies, music, web TV and internet radio. They are meant for
entertainment.
BROWSING THE WEB
Page 56 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
- Browsing information on the web is usually referred to as surfing the web.
- Every web can be accessed using an address known as Uniform Resource Locator (URL).
FILE TRANSFER PROTOCOL (FTTP)
- It refers to the protocol (rules) set to the transfer of files across the internet.
- FTP site can be accessed using the address below;
xxxxx.//.ftp.
DOMAIN NAME
- It is the name of the server where the website or resource is located i.e. .www.malawi
TOP LEVEL DOMAIN
- This represents the type of service offered by the organisation i.e. gov.mw
COMMONLY USED DOMAIN
Top level domain Type
.edu Educational institution
.org Non- profit making organisation
.mil Military organisation
.com Commercial institution
.net An institution or organisation providing networking
services
.ac And academic institution
HYPERLINKS
- Are used to navigate from one web page to another. You move the mouse pointer until it changes to a
pointing finger. And then click the hyperlink once then the browser takes you to the specified link.
NAVIGATOR TOOLBAR
- Contains buttons that help the user to easily use to navigate the web in Mozilla Firefox. These include;
1. Back: Takes the user back to previous visited web page.
2. Forward: Takes the user to visited page after the current in case the user clicked the back button.
3. Refresh: for reloading the page or refresh a web page.
4. Home: Takes the user to the home page of the web page.
5. Search: Use for searching information using Google search engine.
6. Stop: Use to stop loading the current web page.
7. Bookmarks: Used to bookmarks the web page to be revisited letter.
8. History: used to display the recently visited web page.
9. Download: Used to download the current web page.
10. Menu icon: Clicking on this displays the main menu.
PRINTING A WEB PAGE
1. On the file menu click print or press CTRL+P keys.
2. On the print dialog box displayed, set desired print properties.
3. Click OK to print the web pages.
ELECTRONIC MAIL (e-mail)
- To creates, receive, and send electronic mails (e-mails), an email software such as Outlook Express,
yahoo mail, Gmail or Eudora are required.
- To use online services such as Gmail, Yahoo mail and Hotmail services you need to register for a new
email account by providing required details such as name, date of birth and unique password.
CREATING A NEW EMAIL ACOUNT
- A web-based email account provides access to email service from anywhere as long as you a computer
or mobile phone that has access to internet.
To create a new Gmail account, proceed as follows;
1. Launch your preferred internet browser and go to Google home page by typing page:
http://www.google.com
2. Click on the Gmail at the top right corner of the page to display the sign- in or create a new account
page.
Page 57 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
3. In the page that appears and enter your first and last name, username, birthday, gender and country.
As well as phone number.
4. At the bottom of the form is what is called CPTCHA, is a verification tool that ensures that a real
person is creating the account.
5. Choose the location, and click the check box beside” I agree to the terms of service before clicking
the next step button.
6. In the page that appears, you may create a public profile for purpose of social networking or just
proceed to the next page by clicking no thanks.
7. Click Continue to Gmail button to proceed to your Gmail account inbox and other folders.
8. Once in Gmail account, you can setup other features such as adding a photo to your profile and how
incoming emails are to be sorted.
CHECKING FOR MALIS IN GMAIL
To open an e-mail in Gmail, do the following;
1. Load the e-mail home page by typing www.gmail.com
2. In the login page, enter password.
3. Then the e-mail window will be loaded in which you can create, read and send e-mails.
E-MAIL ADDRESS FORMAT
- A typical e-mail address would look like this: [email protected]
1. beston.kileta is the name of email account usually defined by the user when registering for an e-mail
account.
2. The @ symbol is for separating the account name from the domain of the e-mail service i.e. Gmail
3. gmail.com is the server in which the email account is hosted i.e. the server on which the e-mail
account is located.
4. The period”.” Is read as dot and is used to separate different parts of the e-mail address.
5. com identifies the type of nature of business of the e-mail service provider i.e. Google is the
commercial organisation.
CREATING A NEW E-MAIL
- Three basic parts of a standard format of an e-mail message include;
1. Header information: it is made of the following sections:
- Address: provide the text box for entering the e-mail address of recipients.
- Subject: The specifies the content of the message in the message body.
- Attachment: You can add files such as documents, photo and video to send via e-mail.
2. Message body: Is where you type the message to send. Which inform of text and multimedia.
3. Signature: It provides additional information about the sender such as full name, address and telephone
number.
- To compose and e-mail either in Gmail, Yahoo or outlook Express Proceed as follows:
1. Click New/ compose e-mail button.
2. Type the recipients address of get it from the address book.
3. Type in the subject of the message box.
4. Click the Send button.
INSERTING FILE ATTACHMENTS
- An attachment can be a picture, video or text but it must not be bigger than 25MBs.
To attach files once in Gmail, proceed as follows;
1. Click the attach file at the bottom that resembles a paper clip.
2. In open files dialog box that appears, select a file (s) by pressing the CTRL as you click on the file.
3. Click open button to attach selected file(s).
MANAGING CONTACTS
- To avoid typing errors when entering e-mail addresses, add the e-mail to contacts in the address book.
To add a contact in Gmail, proceed as follows;
1. Switch to inbox and point to e-mail address you would like to add to contacts. A pop-up appears.
2. Clicks add to contacts link on the left. The contact is automatically added into the address book.
3. To change the contact, click the link immediately displayed to view contact details.
Page 58 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
SOCIAL NETWORK
- The two terms used to describe social network are; Social media and Social networks. Which refers to
the contents that can be uploaded onto social networks sites. It can be inform of text, video, photo or
slideshows.
- Examples of social networks are; Facebook, Twitter, Linkedln, WhatsApp, Flickr, Google+ and
Myspace.
- Social networks refer to creating social relationships to interact with other people on social networks by
uploading media contents. The Global is turned to a social village.
ADVANTAGES OF SOCIAL NETWORKING
1. Global connections: It helps people to make new friends and stay in touch globally with people.
2. Marketing: They help in advertising goods and services.
3. Technology use: They use accessible technologies such as mobile phones that make possible to
motivate people towards using others ICT devices as computer and services like internet.
4. Social cohesion: Social networks are used to keep in touch with the family members in a fractured
society where physical meeting may not be possible.
5. Career opportunities and employment: It is the powerful engine for job searches.
6. Political power: Social networking can leverage political power for groups that might not otherwise
have access. A good example is the US president Barrack Obama who beat his rivals by capitalising on
use of social networks.
7. Security: Social networking can be used to counteract terrorism and organised crime. Security
detectives can sniff into media content to isolate cases of terrorism and organised crime.
8. Health and wellbeing: Social networking can be used to get help on difficult personal by tabling it
into a public wall to solicit for support from friends.
DISADVANTAGES OF SOCIAL NETWORKING
1. Threat to productivity: It causes big waste of time that has caused even losses of job due to low
productivity.
2. Face-to-face connections endangered: Has reduced need of physical social interaction by creating
virtual society that isolate people their physical context.
3. Cyber bullying and crimes against children: It exposes individuals particularly children to
harassment or inappropriate contact from others.
4. Digital divide: It magnifies the gap between people who have access to computer technology and
those that don’t, exacerbating other social inequities.
5. Security and Privacy: It can compromise security in a big way. It embarrassing public exposure of
prominent persons. It gives organised criminals an opportunity to track people for malicious reasons
such as fraud, identity theft, terrorism.
6. Social networking can use to destabilise governments and to advance terrorism. This has been
witnessed in the recent past in Arab countries such as Egypt, Libya and Tunisia.
7. Corrupted language: The non- standard language used in social networking has become common
grammar in day-to-day talk thereby limited standard language concept development and expression.
DISTRIBUTED SYSTEMS AND APPLICATIONS
- The three fundamental concept of distributed computing are;
1. Distributed systems: It refers to the network of different computers, applications using shared resources
which are geographically dispersed across networks.
Two examples of distributed system are;
Internet; it is the vast collection of computers networks and a very large distributed of different
components with large number of services such as World wide Web (www) and file server services.
Intranet; it is a subnet of the internet that is privately administered by an organisation to provide secure
access to the organisation services and information.
2. Distributed operating systems; it is a special type of operating system that controls, integrates and
homogenises use of heterogeneous hardware and software resources in a distributed system. Examples of
distributed OS are; Amoeba, Mac Chorus, UNIX and Microsoft Windows.
Page 59 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
3. Distributed Applications; It is an application that is distributed across several servers in a distributed
system. It is used to coordinate and provide efficient access to information and services.
Common examples of distributed application
Online flight-reservation; it is practiced in most airlines which provide online web-based or mobile
application for real-time booking and payment of flight.
Distributed Cash dispensing machines: to enhance access to withdraw and deposit transaction, most
banks distribute processes to multiple servers across intranets.
Video conferencing applications; These applications are distributed to provide quality of service in
sound and video transmission even across continents.
The world wide web; provide access to information from everywhere using computers and mobile
devices.
It is the responsibility of distributed system to manage these applications to ensure reliability of
services and information even incase of partial system breakdown.
Page 60 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]
BGSS –BALAKA, MALAWI
PREFACE
This work is intended to provide an easy and comprehensive knowledge on
computer skills at M.S.C.E level. The knowledge and skills presented in this
work is extracted from a wide range of sources and experiences.
ACKNOWLEDGEMENT
I am very grateful to the Almighty God for the gift of life, wisdom and
knowledge. And many thanks to IT department at Bakhita secondary school for
their great participation in this work and to IT students for great experiences
gained from them.
DEDICATION
I dedicate this work to IT students and Teachers as they appreciate the need to
have access to ICT tools.
REFERENCES
1. Microsoft Encarta Encyclopedia 2004.
2. Malawi Institute of education (2013), Syllabus for computer studies forms 3 and 4, Domasi.
3. ECDL LEARNING to pass By Angela Bessant, 2001.
4. Excel & Succeed junior secondary, computer studies Teacher’s Guide for form 1, by Andrew Nasalangwa.
5. Excel & Succeed Junior secondary Computer Studies book 1, by: Andrew Nasalangwa.
6. Malawi Institute of education (2013), Syllabus for computer studies forms 1 and 2, Domasi.
7. Excel & succeed senior secondary for New syllabus book 3 & 4, by Andrew Nasalangwa.
8. Achievers Senior secondary, computer studies book 3 & 4 by Dasiano Mapanje.
9. Excel & Succeed senior secondary, computer studies Teacher’s Guide for form 3 & 4, by Andrew Nasalangwa.
Page 61 of 61
WhatsApp: 0882 663 882 for your own copy @ a fee. E-mail: [email protected]