ICT Foundation Text Book
ICT Foundation Text Book
Chapter 0
Introduction to ICT
What is Data?
In terms of ICT, data is simply any numbers, letters or symbols that can be entered into a
computer system.
But what do they mean? Who knows? They could mean anything!
Data values don’t have any meaning unless we put them into context (context means a setting or
circumstance).
For instance, in the above example what does the value 20 mean?
Without a context the value 20 is meaningless. But, if we provide a context for our data, it
becomes something far more useful: information
What is Information?
1861977905
0806973587
0806992867
1402748124
0831110848
Without knowing the context (what the data actually represents) the data is just a
meaningless collection of numbers. However, if we are told that the values represent the ISBNs of
books, the values now have a context.
Information is
Data + Context
What is System?
A system has three stages...
What is a Computer?
Computers come in a huge variety of shapes, and sizes. You will be most familiar with Personal
Computers (PCs) – the small computer on your desk, or the laptop in your bag.
However, there are some computers that fill whole buildings and others that are small enough
to fit in a slim mobile telephone. Whatever the size, all computers do the same thing…
A computer is a device that stores and processes information according to a set of instructions.
In other words, a computer is a device that you feed information into and it does something
with the information (processes it) based on some instructions (a ‘program’) that it has been given.
Chapter 1
Types and components of computer systems
What is Hardware?
Hardware is the physical parts of the computer system – the
parts that you can touch and see. A motherboard, a CPU, a keyboard
and a monitor are all items of hardware.
What is Software?
Software is a collection of instructions that can be ‘run’ on a computer. These instructions tell
the computer what to do.
Software is not a physical thing (but it can of course be stored on a physical medium such as
a CD-ROM), it is just a bunch of codes.
There are two types of software:
1. Applications software: programs that allow the user to do specific tasks, e.g. spreadsheets.
2. Systems software: programs that allow the hardware to run properly, e.g. operating systems
However, one part of the computer system has not yet been mentioned. This is shown as the
‘Processor and internal memory devices’ in the diagram – this consists of four key components called
the central processing unit (CPU), internal hard disk, random access memory (RAM) and read only
memory (ROM).
The central processing unit (CPU) is the part of the computer which
interprets and executes the commands from the computer hardware and
software. CPUs used to be made up of discrete components and numerous
small integrated circuits, which were combined together on one or more
circuit board/s. However, due to modern manufacturing techniques, the
term microprocessor is now used instead of CPU.
This is a single integrated circuit (see Figure 1.2) which is at the heart of most
PCs and is also found in many household devices and equipment where some
control or monitoring is needed (e.g. the engine management system in a
car).
The internal hard drive is the computer’s main memory; this is where the applications software,
disk operating system and data files are stored. The main advantage of these
memories is the fast data transfer/access times and their large capacity to
store data (this is discussed further in Chapter 3).
Random access memory (RAM) is an internal chip where data is temporarily
stored when running applications. This memory can be written to and read
from.
Since its contents are lost when power to the computer is turned off, it
is often referred to as a ‘volatile’ or ‘temporary’ memory.
Read only memory (ROM) is a memory used to store information that needs to be permanent. It is
often used to contain, for example, configuration data for a computer system. These chips cannot be
altered and can only be read from (hence their name). One of the main advantages is that the
information stored on the ROM chip is not lost even when power is turned
off to the computer. They are often referred to as ‘non-volatile’ memories.
It is worth noting that ROM also contains some coding known as the
boot file. This code tells the computer what to do when it first starts up; it is
often referred to as the BIOS (basic input/output system). When the
computer is turned on, the BIOS carries out a hardware check to find out if all
the devices are present and whether they are functional. Then it loads the
operating system into the RAM. The BIOS stores the date, time and system
configuration in a non-
volatile chip called a CMOS (complementary metal oxide semiconductor), which is usually
battery powered.
Operating systems
To enable users to communicate with computer systems, special software, known as operating
systems, have been developed. The general tasks for a typical operating system include:
• controlling the operation of the input, output and backing storage devices
• supervising the loading, running and storage of applications programs dealing with errors that occur in
applications programs
• maintaining security of the whole computer system
• maintaining a computer log (which contains details of computer usage)
• allowing communication between user and the computer system (user interface).
Computer users need to be able to communicate with the operating system – this is called the
‘user interface’. There are two main types of user interfaces: command line interfaces (CLIs) and
graphical user interfaces (GUIs).
save or load a file. The user therefore has to learn a number of commands just to carry out basic
operations. It is also slow having to key in these commands every time an operation has to be carried
out. However, the advantage of CLI is that the user is in direct communication with the computer and
is not restricted to a number of pre-determined options.
1. SQLPrepare(hStmt,
2. ? (SQLCHAR *) "INSERT INTO tableB SELECT * FROM
tableA",
3. ? SQL_NTS):
4. ? SQLExecute(hStmt);
GUIs use various technologies and devices to provide the user interface. One of the most
common is windows icons menu and pointing device (WIMP) which was developed for use on
personal computers (PCs). This uses a mouse to control a cursor, which then selects icons to open/run
windows. Each window contains an application and modern computer systems allow several windows
to be open at the same time. In the example shown in Figure 1.4, a number of icons can be seen on
the left-hand side and on the bottom right; three windows are open and these are shown as grey
rectangles at the bottom of the screen.
A windows manager looks after the interaction between windows, the applications and the
windowing system (which handles the pointing devices and the cursor’s position).
In recent years, devices such as touch screen phones use post-WIMP interaction, where fingers
are in contact with the screen. This allows actions such as pinching and rotating, which would be
difficult to do using a single pointer and device such as a mouse.
Types of computers
There are many types of computer systems in existence. This section summarises some of the
more common types currently available.
PC/desktop computers
PC/desktop usually refers to a general purpose computer which is
made up of separate monitor, keyboard, mouse and processor unit (see
Figure 1.1). The term PC (personal computer) usually refers to computer
systems which are IBM compatible, thus distinguishing them from, for
example, Macintosh systems.
It is worth making a comparison here with laptop computers:
Advantages
• Spare parts and connections tend to be standardised, which usually results
in low costs.Desktops tend to have a better specification (e.g. faster processor)
for a given price (often due to size and construction constraints in laptops).
• The large casing allows good dissipation of any heat build-up.
Disadvantages
• Desktops are not particularly portable since they are made up of separate
components.
• All the components need to be hooked up by wiring, which can be quite complex and clutters up the
desk space.
• Because they are not particularly portable, it is necessary to copy files, etc. when you want to do some
work elsewhere (e.g. at home).
Laptop computers
Advantages
• They are very portable, since the monitor, pointing device, keyboard, Early portable computers were
far from being 'laptops' - you
processor and backing store units are all together in one single box. would have crushed your legs if
• There are no trailing wires, etc. because everything is in one single you'd tried to put these beasts
unit. on your lap!
• They can take full advantage of WiFi (see discussion in Chapter 4).
• Since they are portable, they can link into any multimedia system.
Disadvantages
• Since they are portable, they are easy to steal!
• They have limited battery life so the user may need to carry a heavy
adaptor.
• The keyboards and pointing devices can sometimes be awkward to use.
• Heat dissipation is more difficult due to the structure of the laptop
computers.
Netbooks
Netbook is a term used to describe a computer that can almost fit
onto a hand and is a smaller version of a laptop. These used to be known
as palmtop computers, but this term now generally applies to much
smaller devices which use touch screens and often a stylus to key in data.
Advantages
Netbook computers have many of the features of laptops and therefore have
similar advantages and disadvantages.
Disadvantages
In addition to the disadvantages listed above for laptops:
• netbooks don’t have optical drives
• the keyboards are only about 80 per cent the size of laptop keyboards
• they lack some of the features found in larger machines, principally due
to the size constraints and to the fact that they are cheaper to purchase.
Palmtop Computer
A palmtop computer is similar to a laptop computer, but smaller. Early palmtop computers
were pretty basic by today's
It's small enough to fit in the palm of your hand (hence the name!).
standards
Palmtops are usually not very powerful since fast CPUs require a large
Palmtops are often called
battery and get hot - both problems in a small device. ultra-mobile PCs (UMPC)
A typical palmtop have a very small keyboard - too small to type on normally. Instead the user
types using both thumbs. Also there is no room for a trackpad, so a touchscreen or tiny joystick is
used instead. Palmtops are extremely portable, but the small keyboard and screen make the devices
tiring to use for long periods.
Advantages
• They can be used anywhere because of their size.
• They are very lightweight and are more portable than laptop
computers.
Disadvantages
• It is difficult to enter text quickly.
• They have very limited capabilities due to the software and the
operating system used.
Mainframe computers
Mainframe computer is a term used for a large, very
powerful, computer system.
Mainframe computers are typically:
• Powerful - they can process vast amounts of data, very quickly
• Large - they are often kept in special, air-conditioned rooms
• Multi-user - they allow several users (sometimes hundreds) to use
the computer at the same time, connected via remote terminals (screens
and keyboards)
Uses
Their main purpose is to run commercial applications, such as banking and
insurance, where huge amounts of data need to be processed each day.
The main features of main frame computers are as follows.
• They can have several CPUs.
• They have very fast processor speeds.
• They can support multiple operating systems.
• They have huge amounts of storage capacity.
• They have huge internal memories (e.g. several hundred Gbyte of
RAM). From their invention back in
• They often operate using time sharing or batch processing (see the 1940s until the late 1960s,
computers were large, very
Chapter 7).
expensive machines that took
up the whole of a room
Advantages (sometimes several!) These
• Due to the features listed above, they can be used to do very large were the only computers
available.
jobs which require large memories and very fast processor time.
• They are used in time-sharing systems to allow users to be given a The circuit-boards of these
time slice of the very powerful facilities afforded by a mainframe system. computers were attached to
• They are capable of very large number crunching, and so can deal large, metal racks or frames.
This gave them the nickname
with very complex mathematical functions (e.g. fractals) which would be 'mainframe' computers.
very time consuming using, for example, a PC.
Disadvantages
• Mainframe computers need to be permanently housed in a large room, so cannot be moved around.
• They are very expensive to operate and maintain.
Chapter 2
Input and output devices
Input devices
As the name suggests, input devices are hardware devices that allow data to be input into a
computer. Many such devices exist, ranging from the more common ones, such as the keyboard,
through to the more specialist devices, such as barcode readers. A number are described in this
section.
Keyboards
These are the most common input devices and are used to input text, numbers and
instructions into the computer. Most use the QWERTY layout (this name comes from the keys on the
top row, which spell out ‘QWERTY’).
Ergonomic keyboards have also been developed recently.
These are designed to reduce health-related problems associated with
the standard keyboard (e.g. carpal tunnel syndrome or repetitive
strain injury (RSI).
Uses
• Keyboards are used to input data into applications software (e.g.
text into word processors, numbers into spreadsheets, etc.).
• They are also used for typing in commands to the computer (e.g.
Prnt Scrn, Ctrl+P to print out, etc.)
Advantages
• Keyboards enable fast entry of new text into a document.
• They are a well-tried technology and a well-known method of
entry.
Disadvantages
• Users with limited arm/wrist use can find keyboards hard to use.
• Entering data using a keyboard is slow when compared to direct data entry (e.g. optical mark
recognition).
• Keyboards are fairly large devices that use up valuable desk space.
Advantages
• Concept keyboards enable fast data entry, as there is no need to type in whole commands.
• They are waterproof, which is useful in a restaurant environment.
• These keyboards are tamper proof and so are useful in certain applications
(e.g. at unmanned airport information kiosks), preventing people from keying in information which could
potentially corrupt the computer system.
Numeric keypads
A numeric keypad is used to enter numbers only (although some
have a function key to allow input of alphabetic characters).
Uses
• Numeric keypads are used in automatic teller machines (ATMs), where
customers can key in their personal identification number (PIN), an amount of
money, etc.
• Telephones have numeric keypads to allow phone numbers, etc. to be keyed in.
• Electronic point of sale (EPOS) terminals have numeric keypads in case the barcode reader fails to read
the barcode and the number has to be keyed in manually by the operator.
• Chip and PIN devices have numeric keypads for entry of PIN, amount of money, etc.
• They are used to enable fast entry of numeric data into a spreadsheet.
Advantages
• Numeric keypads are faster than standard keyboards for entry of
numeric data.
• Since many are small devices (e.g. mobile phones), they are very easy to
carry around.
Disadvantages
• They can be difficult to use, due to very small keys.
• It is difficult to use them for entering text.
• Sometimes the order of the numbers on the keypad isn’t intuitive.
Mice
The mouse is an example of a pointing device. A ball is used underneath the mouse to detect
movement, so by moving the mouse around the user can control the position of a pointer on the
screen. There are usually two buttons, which have different functions: very
often the left button is used to select something by double clicking it and the
right button brings up drop-down menus (see Figure 2.1).
Many mice also have a scroll button, which speeds up the process of
moving through a document.
Uses
• Mice can be used for opening, closing and minimising software.
• They can be used for grouping, moving and deleting files.
• They are very useful when editing images, for example controlling the size and
position of a drawing pasted into a document.
• Mice are used for controlling the position of a pointer on the screen to allow selection
from a menu or selecting an icon and for scrolling up and down/left to right.
Advantages
• It can be faster to select an option using a mouse rather than a keyboard.
• Mice enable rapid navigation through applications and the internet.
• Mice are small and so take up little area.
Disadvantages
• People with restricted hand/wrist movement can find it hard to operate a mouse.
• Mice are easily damaged and the older type of mouse also quickly becomes clogged up with dirt.
• They are difficult to use if there is no flat surface readily available (e.g. on an aeroplane).
Touchpads
Touchpads are used in many laptop computers as a pointing
device. The pointer is controlled by the user moving their finger on the
touchpad and then gently tapping it to simulate the left hand button of a
mouse (i.e. selection). They also have buttons under the touchpad which
serve the same function as the left and right buttons on a mouse.
Uses
The uses of a touchpad are the same as those of a mouse.
Advantages
• It can be faster to select an option using a touchpad rather than a
keyboard.
• Touchpads enable rapid navigation through applications and the
internet.
• Since the touchpad is integrated into the laptop computer, there is no need for a separate mouse,
aiding portability.
• They can be used even when there are no flat surfaces available.
Disadvantages
• People with limited hand/wrist movement find touchpads difficult to use.
• It can be more difficult to control the pointer when compared with a mouse.
• They are more difficult to use when doing certain operations such as ‘drag and drop’.
•
Trackerballs
Uses
• They have the same pointing/cursor control capability as a mouse.
• They are used in applications where the user has a disability (such as RSI).
• They are used in a control room environment, where it is faster than a mouse to navigate through
process screens and is more robust than a mouse.
Advantages
• Trackerballs do not need the same fine control as a mouse.
• People with limited hand/wrist movement find it easier to use than a mouse.
• The pointer can be positioned more accurately on the screen than with a mouse.
• They take up less desk space than mice since they are stationary.
Disadvantages
• Trackerballs are not supplied with the computer as standard, so they are more expensive.
• User may need training since they are not standard equipment.
Remote controls
A remote control is used to control the operation of other devices remotely by using infra-red
signals. The buttons on the keypad are used to select options (such as television stations, sound levels
on a hifi, timings on a DVD recorder, etc.).
Uses
• Most home entertainment devices such as a television, satellite system, DVD
player/recorder, hifi systems, etc. have remote controls.
• Remote controls are also used to control multimedia systems.
• They are used in industrial applications to remotely control processes, stop and
start machinery, etc.
Advantages
• Remote controls enable devices to be operated from any distance, which is
particularly useful for people with disabilities.
• Some chemical processes are hazardous, so it is safer to operate equipment from
a distance.
Disadvantages
• People with limited hand/wrist movement can find them hard to use.
• The signal between the control and the device can be easily blocked.
Joysticks/Joy pad
Joysticks have similar functions to mice and trackerballs. By gripping the stick, a pointer on the
screen can be controlled and buttons are used to make selections.
Often they have another button on the top of the stick that is used
for gaming purposes, e.g. to fire a weapon.
Uses
• Video/computer games are often controlled by joysticks.
• They are used in simulators (e.g. flight simulators) to mimic actual
controls.
Advantages
• It is easier to navigate round a screen using a joystick rather than a keyboard.
• Control is in three dimensions.
Disadvantages
• It is more difficult to control the on-screen pointer with a joystick than
with other devices, such as a mouse.
Touch screens
With this system the user can choose an option by simply touching the button/icon on the
screen. The selection is automatically made without the need for any pointing device.
Uses
• Touch screens are used for self-service tills, e.g. petrol stations, where the user just touches the screen
to select the fuel grade and payment method.
• Touch screens are used where selections are made on screen, for example
ATMs, point of sale terminals (e.g. at restaurants), public information systems at
airports, railway stations, tourist offices.
• Personal digital assistants (PDAs), mobile phones and satellite navigation
systems use touch screens.
• Interactive white boards used for education are large touch screens.
• Touch screens are used in computer based training (CBT) where selections are made in answering on
screen testing.
Advantages
• Touch screens enable faster entry of options than using a keyboard or a mouse.
• It is very easy to choose options.
• It is a user friendly method for inputting data, so no training is necessary.
• Touch screens are tamper proof, preventing people from keying in information which could potentially
corrupt the computer system (e.g. at unmanned ticket collection kiosks).
Disadvantages
• There is a limited number of options available.
• Using touch screens frequently can lead to health problems (e.g. straining of arm muscles, RSI, etc.).
• The screen can get very dirty with constant touching.
Uses
• Credit and debit cards have magnetic stripes that are used by ATMs
or EFTPOS
(electronic funds transfer point of sale) terminals.
• Security cards for entry to buildings, hotel rooms, etc. use magnetic
stripes.
• Travel systems (e.g. train and underground tickets) use magnetic stripes.
Advantages
• Data entry is faster compared with keying in using a keyboard or keypad.
• The system is error free, since no typing is involved.
• The information held on the magnetic stripe is secure: because it cannot
be read directly by a person; and, since there is no typing, there is not the risk of
somebody observing your key strokes.
• They can prevent access to restricted/secure areas.
• Magnetic stripes are unaffected by oil, water, moisture, etc.
• There are no moving parts, so they are physically very robust.
Disadvantages
• If the magnetic stripe gets damaged (e.g. due to exposure to a strong magnetic field or excessive use)
the data is lost.
• The card needs to be in close contact with the reader, so magnetic stripe readers don’t work at a
distance.
• Since the information is not human readable, this can be a disadvantage in some applications (e.g.
hotel room numbers are not printed on the card, so there needs to be another way of showing the
information for the customer).
Uses
• Loyalty cards, ID cards and public transport passes use smart cards.
• Smart cards can be used to track customer/passenger movements (e.g. on
a metro system).
• They are used with satellite systems to decode program signals.
• Smart cards are used for electronic passports and driving licences.
Advantages
• Some smart cards (e.g. transport tickets) are used instead of money, reducing the need to carry cash.
• The chip on the card does not need to be in contact with reader, so
there is less damage compared with a magnetic stripe reader.
• Data is more secure, since it is easier to copy information on a magnetic
stripe than it is to copy information on a chip.
Disadvantages
• If the card is lost, information stored on the chip could be used in
identity theft.
Figure 2.3 The chip on a
smart card
Uses
• Chip and PIN readers are used where payments are made using cards
(restaurants, supermarkets, travel agents, etc.).
Advantages
• Chip and PIN readers provide a more secure payment system than requiring a
signature or using a magnetic stripe, since the PIN typed in must match up with PIN
stored on chip.
• Chip and PIN readers provide a more robust system than magnetic stripe readers, since the chip does
not need to be in contact with the reader.
Disadvantages
• Since the customer types in the PIN, they need to be careful that it isn’t read by somebody else, thus
giving an opportunity for fraud.
Scanners
Scanners are used to enter information on hard copy (e.g. text
documents, photographs) into a computer. The most common type is the
flat bed (as shown here) which is made up of a glass panel and lid. The hard
copy document or photo is scanned by a light source and produces a
computer-readable image.
The subsequent image can then be manipulated using a drawing
package. Images can also be used with optical character recognition (OCR)
software to allow the information to use in a word processor, desktop
publishing, presentation software, etc. Specialist scanners exist which are
designed to carry out a specific task, e.g. barcode scanners (discussed later
in this section).
Uses
• Scanners are used to scan in documents and convert them into a format for use in various software
packages.
• Old and valuable documents and books can be scanned, thus protecting the originals from damage
through handling and also producing records in case the paper copies are lost or destroyed.
Advantages
• Images can be stored for editing at a later date (paper documents cannot be edited unless they are
scanned first).
• Scanners are much faster and more accurate (i.e. no typing errors) than typing in documents again.
• It is possible to recover damaged documents and photographs by scanning them and then using
appropriate software to produce an acceptable copy.
Disadvantages
• The quality can be limited, depending on how good the scanner resolution is.
Barcode readers
Barcode readers are used to read information in the form of a
bar code (illustrated in Figure 2.4). The readers are usually in the form
of a barcode scanner and are often built into POS terminals in
supermarkets. Handheld scanners or wands (as shown here) are also
very common for reading barcodes if portability is required (e.g. if the
barcodes are on large or fixed objects).
Uses
• Barcode scanners are used in supermarkets and other shops where the
goods are marked with a barcode; the barcodes are used to give information about the product, which enables
automatic stock control, itemised billing, etc. to take place.
• They are used in libraries, to scan both users’ library cards and barcodes on books, in order to keep track
of books on loan.
• They are used as a safety function in many companies to ensure that electrical
equipment is checked on a regular basis. Barcodes are placed on an item to identify
it and a database holds all the information related to that barcode so it is possible to
interrogate the system as part of a safety audit.
Disadvantages
• Barcode scanning is a relatively expensive system to administer since every item in the shop needs a
barcode and every barcode needs to be entered on to the central database. Also, there is a need to invest in
the computer technology together with staff training, which can all be very expensive.
• The system is not foolproof – barcodes can be swapped around on items!
OMR devices
Optical mark recognition (OMR) is a system which can read marks written in pen or pencil.
The places where the pen or pencil marks can be made are clearly shown on the form, for example:
In this example, a pencil mark has been made between the dots
on answer 1. The position of the mark is stored in the computer’s
memory after being read by the OMR device.
Uses
• OMR devices are used to read questionnaires, multiple-choice examination papers and many other
types of form where responses are registered in the form of lines or shaded areas.
Advantages
• It is a very fast way of inputting the results of a survey, etc. – the documents are fed in automatically
and there is no user input.
• Since there is no typing, it is more accurate than keying in the data.
• OMR is more accurate than OCR (discussed later in this section).
Disadvantages
• The forms need to be carefully designed to make sure that the marks/shading are correctly positioned
to gather accurate information.
• There can be problems if the forms haven’t been filled in correctly and sometimes they have to be
manually checked before being read by the OMR device – this is both time consuming and expensive.
OCR readers
Optical character recognition (OCR) is the name given to software
that takes scanned text and converts it into a computer readable form. The
text can then be used in various application packages such as word
processors, desktop publishers and presentation software.
Uses
One of the most recent uses is in the processing of passports and identity cards.
OCR is used when scanning in documents so that they can be modified using a
word processor or desktop publisher package.
Advantages
• It is a much faster data entry system than manually keying in data.
• Since no manual data entry, the number of errors is also reduced.
Disadvantages
• The system still has difficulty reading handwriting.
• It is still not a very accurate technique.
MICR devices
Magnetic ink character recognition (MICR) is a system which can
read characters printed in a special ink (containing iron particles). Only
certain characters written in a standard font can be read, for example the
characters at the bottom of a bank cheque (see Figure 2.5). These
characters are converted into a form that the computer can understand and
then stored in a computer file.
Characters
read by
Figure 2.5 A bank cheque
MICR
Uses
• It is primarily used to process cheques in banking operations. When a cheque is presented its value is
then printed on the cheque in the special ink. The cheques are all gathered together (either at the end of the
day or after some specified period) and then read using a batch processing method.
Advantages
• MICR offers greater security than OCR since the printed characters cannot be altered.
• There is no manual input, thus errors are reduced.
• Even if somebody writes over the magnetic ink characters (e.g. with a signature) they can still be read.
Disadvantages
• Only certain characters can be read and the number of different characters is very limited.
• It is a more expensive method than other methods used in direct data entry.
Digital cameras
Digital cameras are rapidly replacing traditional, film-based
cameras. Once photographs are stored in memory, they are easily
transferred to a computer using a universal serial bus (USB) connection
(see Figure 2.6). Once saved, the images can be manipulated (e.g.
cropped, re-sized, contrast altered, etc.).
Uses
• Digital cameras produce photographs for transfer to a computer directly
or to print out by connecting directly to a printer.
• Many digital cameras also allow short video clips to be produced.
• Photographs can be uploaded directly into applications software such as word processors, desktop
publishers, etc.
Advantages
• It is easier to produce better quality photographs than with a traditional camera.
• It is easier and faster to upload photographs to a computer rather than
having to scan in hard copies when using traditional methods.
• There is no need to develop film and print out photographs any more – this
saves money and is also environmentally more acceptable (saves paper and no
longer need the chemicals used in developing the films).
• It is easy just to delete an image from memory if it is not satisfactory and
take the photograph again.
• The memory cards can store several hundred photographs. A traditional camera was limited by the
number of photographs that could be taken on a roll of film.
Disadvantages
• The camera user needs to be computer literate to use the cameras properly; also the transferring,
storing and manipulating of the images via a computer requires some understanding of how computers work.
• There is some artistry lost since clever software now corrects errors in A digital camera in fact
the photographs (e.g. incorrect exposure, removal of red eye, etc.). contains a small computer
• The resolution is not yet as good as traditional cameras, although this is that controls camera focus,
stores images, etc.
improving all the time. The quality of photographs depends on the number of
pixels (many cameras now offer more than 10 mega pixels per image), quality The camera’s computer runs
of lens, etc. a very simple operating
• Images often need to be compressed to reduce the amount of memory system (stored on ROM) and
usually provides a menu-
used (a single image can use more than 2 Mbytes of memory, for example).
based GUI for the user.
• It is possible to fill up computer memory very quickly with several
photographs of the same subject in an attempt to find the ‘perfect’ snap shot.
Webcams
Webcams are similar to digital video cameras; however, they are connected
directly to the computer (through a USB port) and they do not have a memory. The
information that the webcam picks up is transmitted directly to the computer. Many
computer systems now have webcams built into the top of their monitors as standard
equipment.
Uses
• While chatting online, many people use webcams as a more personal way of having
a conversation.
• They are used to enable video conferencing to take place
(discussed in Chapter 4).
Advantages
• Webcams can be left on constantly, only being activated as required.
• They allow people to keep in contact with each other without the need to travel, so
they are particularly useful for elderly or disabled people.
Disadvantages
• Webcams have very limited features and the picture is often of poor quality.
• They need to be connected to the computer, although this is less of an issue with
laptop computers when the webcam is built into the monitor lid.
Microphones
Microphones can be connected directly to a computer. Sounds can be inputted
and then manipulated. The input sound is converted to an analogue signal and then
converted into a digital signal. The computer’s sound card usually does this
automatically (i.e. it acts as an analogue to digital converter (ADC).
Uses
• Microphones are used to input speech/sounds to be used in various applications, e.g.
presentations, sampling (in films, music, etc.), special effects (films).
• They are used in voice recognition software, which can have a number of purposes,
for example:
o conversion of speech into text that can be used in, for example, a word processor
o recognition of commands (e.g. some cars now have voice-activated systems to
switch on the lights, turn up the radio volume, etc.).
Advantages
It is faster to read in text than to type it in using a keyboard.
• Using special software, it is possible to manipulate sound in real time rather than
working on a recording done at some earlier stage.
• If used in a voice activation system, this has the advantage of improving safety
since, for example, car drivers don’t need to take their hands off the wheel to operate a
switch or alter the radio station etc.
Disadvantages
• Sound files can use up a lot of computer memory.
• Voice recognition software isn’t as accurate as typing in manually (for example, the software can’t
distinguish the difference between ‘their’ and ‘there’).
Sensors
This section deals with analogue sensors. A sensor is a device
which inputs data to a computer, where the data is a measurement of
some physical quantity which is continuously changing (e.g. temperature,
light, moisture, etc.). These physical quantities are analogue in nature.
Since computers only understand digital data (i.e. 1s and 0s), the
information from the sensors needs to be converted into a digital form.
This is done using an analogue to digital converter (ADC).
Uses
Sensors are used in monitoring and control applications – the type of
sensor depends on the application (see Table 2.1). When monitoring, the data sent
to the computer is often transferred directly to a spreadsheet package (e.g. taking
measurements in a scientific experiment, measuring atmospheric pollution, etc.).
Advantages
• Readings taken using sensors are generally more accurate that those
taken by human operators.
• Readings are continuous, so there is no break in the monitoring.
• Because it is a continuous process, any necessary action (control
system) or warning (monitoring system) will be initiated immediately.
• The system can be automatic, removing the need for human
intervention. This is particularly important if the process is hazardous or
needs precise control/monitoring.
Disadvantages
• Faulty sensors can give spurious results (e.g. if the sensors on the rear bumper of a car which monitor
for obstacles become dirty, they may either not identify an obstacle or give a continuous alarm).
Graphics tablets
A graphics tablet is used with a stylus to produce freehand drawings for example. The images
produced can then be stored in a file on a computer.
Uses
Advantages
• It is possible to modify drawings before they are input.
• They offer a very accurate method of drawing, which is better than using
a mouse or trackerball.
Disadvantages
• They are more expensive than other pointing devices, such as a mouse.
Light pens
Light pens contain sensors that send signals to a computer whenever light changes are
detected. At the moment, the devices only work with cathode ray tube (CRT) monitors because they
rely on the screen image being built up row by row by an electron beam. The screen is refreshed 50
times every second, so the computer is able to determine the pen’s position by noting exactly when
the light pen detected the electron beam passing its tip. Systems to operate with thin film transistor
(TFT) monitors are still at the development stage.
Uses
Light pens are used for selecting objects on CRT screens.
They are also used for drawing on screen (e.g. with CAD packages).
Advantages
• Light pens are more accurate than touch screens.
• They are small, so can be used where space is an issue.
• They are easy to use.
Disadvantages
• There are problems with lag when drawing on screen.
• At the moment, they only work with CRT monitors.
• They are not very accurate when drawing.
Output devices
As the name suggests, output devices are hardware devices that
allow data to be output from a computer. Some devices hold the data
temporarily (such as a printer) whereas other devices produce permanent
output in the form of a hard copy (such as a printer producing output on
paper). There is a third type of output device which is used to control
processes in conjunction with sensor input devices. These are covered
separately in Section 1.3.
CRT monitors
CRT monitors are the least expensive type of monitor, although they are
becoming increasingly rare as TFT monitors are now taking over. They come in
various sizes.
They use an electron gun to fire against a phosphor screen, which
creates a picture that is made up of tiny dots. Each dot is coloured red, green
or blue – the intensity of each coloured dot makes up the vast range of colours
interpreted by the eye.
Uses
• CRT monitors are used as the primary output device for computers so the
user can see immediately what they are typing in.
• They are used with light pens, for example to allow designs to be created on
screen.
Advantages
• CRT monitors still produce a higher quality image than TFT monitors.
• The angle of viewing is still better than with a TFT monitor.
• They work with light pens in computer-aided design and computer-aided manufacturing (CAD/CAM)
applications.
Disadvantages
• CRT monitors tend to be rather heavy and are a weight hazard if not supported properly.
• They run very hot and can cause fires if left unattended (especially as they get older).
• They consume considerably more power than the modern TFT monitors.
• They can flicker, which can lead to headaches and eyesight problems with prolonged use.
TFT monitors
TFT and LCD are two of the
TFT monitors are taking over from CRT monitors as the main technologies used in flat-
output device. One of the reasons for the rapid development of laptop screen monitors: TFT is Thin-
Film-Transistor, and LCD is
computers can be attributed to the advancements made in TFT Liquid-Crystal Display.
technology. The screen is made up of thousands of tiny pixels, which are
made up of transistors controlled by a microprocessor. Each pixel has Another technology that may
replace these is OLED, or
three transistors, coloured red, green or blue; the intensity of each Organic Light-Emitting
governs the effective colour of the pixel seen by the eye. Diodes.
Uses
• TFT monitors are used as the primary output device for computers so the user can see immediately
what they are typing in.
• They are an integral part of laptop computers.
Advantages
• TFT monitors are lightweight, so do not pose the same risks as CRT monitors.
• They produce less glare than CRT monitors and also emit less radiation.
• They consume much less power and do not generate as much heat as a CRT monitor.
Disadvantages
• The angle of viewing a TFT monitor is fairly critical, with the image appearing unclear when viewed
slightly from the side. This can be an issue if several people are looking at a screen at the same time.
• The definition is sometimes not as good as CRT monitors.
• TFT monitors cannot yet be used with light pens, so these monitors cannot be used in CAD if light pens
are used to create and edit drawings.
Laser printers
Laser printers produce very high-quality hard copy output. The
print rate per page is very quick if a large number of pages are being
printed. They rely on large buffer memories, where the data for the
whole document is stored before the pages can be printed out.
Uses
• Laser printers are used where noise levels need to be kept low (e.g. in
an office).
• They are the best option for fast high quality high volume printing.
Advantages
Printing is fast for high volumes. If only a few pages are to be printed they
are little faster than inkjet printers.
• They can handle very large print jobs.
• The quality is consistently high.
• Toner cartridges last for a long time, so laser printers can be a cost
effective option, particularly if colour outputs are not required.
Disadvantages
• Laser printers are expensive to buy.
• They are only really fast if several copies are being made.
• Colour laser printers tend to be expensive to run, since four cartridges (three colours plus black) are
needed as well as diffuser kits, etc.
• They produce ozone and volatile organic compounds because of their method of printing and type of
toner/ink used. These have been linked to health hazards in the office.
Inkjet printers
Inkjet printers are used to produce good quality hard copies. Although
the quality is not quite as good as that from laser printers, it is far better than
that from dot matrix printers. Unlike laser printers, inkjet printers do not have
large buffers, so printing is done a bit at a time. This is why printing is
sometimes paused, since the whole page can’t be stored in the buffer and it
has to wait for the computer to send more data.
Uses
• Inkjet printers are used where low output volumes are required.
• If high-quality printing is required for single pages (or only a small print job) then these printers are
ideal, for example they are very good at producing photo quality printouts.
• 3D inkjet printers are now being used in industry to produce
prototypes (see below).
Advantages
• The output is of high quality.
• Inkjet printers are cheaper to buy than laser printers.
• They are very lightweight and have a small footprint (i.e. take up little
space).
• They do not produce ozone and volatile organic compounds, unlike laser printers.
Disadvantages
• The output is slow if several copies needed, as there is little buffer capacity to store the pages.
• The ink cartridges run out too quickly to be used for large print jobs.
• Printing can ‘smudge’ if the user is not careful.
• Inkjet printers can be expensive to run if they are used a lot, since original ink cartridges are
expensive.
3D inkjet printers
These are a new type of printer that produce solid 3D models using
modified inkjet technology. In this technology, known as ‘tomography’, thin
layers of fine powder (plaster, resin and starch) are bonded together as a 3D
model is slowly built up (each layer is only about 0.25 mm thick). Figure 2.7
shows some items produced on a 3D inkjet printer – these are known as
prototypes.
Uses
• Inkjet printers are used to produce prototypes which actually work from CAD packages, photograph
images, stored drawings, etc.
• Scale models are produced in colour before the real thing is manufactured.
• The ultimate objective is to produce organic objects (such as replacement human organs) using this
layering technology.
Advantages
• 3D inkjet printers save a lot of money, since making prototypes by other methods is very time
consuming and expensive.
• Physical scale models are produced with working parts, which gives a better idea of how the end
product will look.
• The powders used can often be ground up and re-used.
Disadvantages
• 3D inkjet printers are expensive to buy.
• They are slow at producing their output.
• The end product can sometimes be a little rough and often needs further work to be done on it.
Uses
• They can be used in noisy environments (e.g. garage workshops)
and in applications where print quality is not very important.
Advantages
• Dot matrix printers can be used in environments which would be a
problem for laser or inkjet printers (e.g. dusty, dirty or moist atmospheres).
• Carbon copies or multi-part outputs can be produced.
• They are very cheap to run and maintain.
• They are easy to use if continuous stationery is required (e.g. long print
jobs such as wages slips).
Disadvantages
• They are very noisy and so not good in an office environment.
• They cost more than an inkjet printer to buy.
• They are very slow and the printing is of poor quality.
Plotters
Plotters (also known as graph plotters) are devices that produce
hard copies, but operate in a different way to printers. They are not
limited to normal printer paper size and are capable of producing highly
accurate, very large drawings and posters.
The most common types are pen plotters (which use coloured
pens to draw), electrostatic (similar method to laser printers) and inkjet
plotters. With pen plotters the coloured pens are controlled by a
computer and the paper can move backwards and forwards to allow accurate shapes to be drawn.
Uses
• Plotters are used to produce large drawings (e.g. blueprints of
buildings, factories, etc.) and are often used with CAD applications.
• They are used to produce large pictures for use on billboards or giant
posters.
• They can also print on plastic-coated paper.
• If the pens are replaced with cutting tools, it is also possible to make
large signs.
Advantages
• They can produce huge printouts.
• The print quality is extremely high.
Disadvantages
• They are slow in operation.
• They are expensive, both to buy and to maintain.
Speakers
Speakers can be connected directly to a computer or are built into the
monitor or casing (as in a laptop computer). Digital data from the computer is
converted into analogue form, using a digital to analogue converter (DAC).
The signal is then amplified through the speakers.
Uses
• Speakers are used to output sound from multimedia presentations.
• They are used in home entertainment centres.
• They can help blind people (together with speech generation software) through
audio output of text on the screen.
• They are used to play downloaded sound files.
Multimedia projectors
Multimedia projectors receive signals that can be either analogue
or digital, although most modern projectors only work with digital inputs.
The signal source is usually from a computer, television or DVD player. The
image from the source is magnified and projected onto a large screen. The
devices usually work with a remote control, but can also use virtual mouse
technology which actually becomes a cordless PC mouse with the same
features as a mouse. It is then possible to direct the computer presentation
without being tied to the computer.
Another feature of the virtual mouse is the laser pointer. Most multimedia projectors take
input from various types of video format such as NTSC, PAL or SECAM.
Uses
• Multimedia projectors are used for training presentations (to allow the
whole audience to see the images from a computer).
• They are also used for advertising presentations (large images showing
product features of, for example, a new car, can be shown at exhibitions,
shopping malls, etc.).
• Home cinema systems (projecting the images from a DVD or television)
use multimedia projectors.
Advantages
• They enable many people to see a presentation rather than all of them crowding round a small
computer screen.
• They avoid the need for several networked computers. For example, when looking at a video clip on
an internet site, everybody can see the video on the large screen rather than logging on to a number of
computers.
Disadvantages
• Images can sometimes be fuzzy.
• Multimedia projectors are expensive to buy.
• Setting up projectors can be a little difficult.
Control devices
Control devices are another type of output device. They are used to control processes in
conjunction with sensor input devices. This section gives an overview of actuators and the devices
that they operate, but the use of sensors and actuators are covered in more depth in Section 7.7.
Actuators
Actuators are transducers and are used to take signals from a computer and convert them into
some form of motion, for example operating motors, pumps, switches and valves. As part of the
control process, digital signals are sent from the computer to an actuator to operate a device. Usually,
conversion of the digital signal to analogue is required first (using a DAC).
Motors
The motor is turned on or off by the actuator.
Uses
• Motors are used in many domestic appliances, such as automatic
washing machines (to make the drum rotate), cookers (to switch on fans), water
pumps in central heating systems and automatic greenhouses to open windows
and switch on fans.
• In industry, they are used to control robot arms.
• In computers, they operate fans, disk drives and DVD drives.
Buzzers
Uses
• Buzzers are used in cookers and microwave ovens to tell the operator
when the cooking process is complete.
• They are used in burglar alarm systems to warn if intruders are present.
Lights
Uses
• They are used for security lights.
• Lights are used in greenhouses to control the lighting conditions.
Heaters
Actuators are connected to switches which turn the heater on or off.
Uses
• Heaters are used in automatic washing machines, cookers and central heating systems.
• Heaters are used in automatic greenhouses to control the temperature.
Chapter 3
Storage devices and media
In this chapter you will learn about:
• back-up storage
• why it is necessary to back up data and files
• the types of access used by the backing stores
• the types of internal and external backing storage devices:
o magnetic
o optical
o solid state.
Backing up data
The first two sections in this chapter consider the need for backing up data and the different
ways of storing and accessing data. Section 3.3 then discusses many forms of backing storage and
compares the advantages and disadvantages of each type.
The comparative performance and main uses for each type of store are also discussed in some
depth.
• Backups are also made in case the files need to be used elsewhere. The original files are then
protected against possible corruption or loss.
However, backups do not necessarily guard against the effect of a virus. The virus could attach
itself to the files which could mean that the backups were also affected.
If the computer was ‘cleaned’ of the virus and then the backup files were re-loaded there
would remain the risk that the same virus could infect the computer system again. The best protection
is not to get a virus in the first place (discussed in Chapter 6).
Types of access
The way data is stored and read by different backing storage devices varies considerably. This
section briefly describes the two main methods of accessing data.
Serial access
With this system, to access data it is necessary to start at
the beginning and then access each piece of data in turn until the
required information is found.
It is primarily used on magnetic tape systems and is a very
slow form of access. It is used in applications where speed of access
or where the order in which the data is accessed is not important,
for example in utility billing, clearing bank cheques or producing
pay slips.
When a magnetic tape needs updating, an additional tape is required so that the old
information can be merged with the new data (itself often on another tape, but the new data could
be stored in various ways) to produce the updated tape (see Figure 3.1).
Direct access
This method is used with magnetic disks and with optical media (such as CDs and DVDs). The
computer uses a key field to calculate where data has been stored. It is then able to access the data
directly from the calculated position. Consequently, access is much faster than with serial access.
It is used in applications where access speed is vital (e.g. in real-time process control systems
such as controlling a chemical plant or online systems such as booking air tickets or automatic stock
control).
When updating media which uses direct access, the new data is written to the next available
location and its position is calculated using the built-in algorithm.
be used at a later date. This section will be considering various types of backing storage and the media
used.
Backing storage devices are either internal or external (i.e. plug-in devices) to the computer,
and are one of three types:
• magnetic
• optical
• solid state.
Uses
• Fixed hard drives are used to store the operating system and working
data.
• They are used for storing applications software that needs fast
retrieval and storage of data.
• Real-time systems (e.g. robots, control of a chemical plant) and online
systems
• (e.g. booking airline tickets, automatic stock control (using EPOS))
used fixed hard drives.
• They are used in file servers for computer networks.
Advantages
• They have a very fast data transfer rate and fast access times to data.
• They have very large memory capacities.
Disadvantages
• They can be fairly easily damaged (e.g. if the correct shut-down procedure
on a laptop computer has not been correctly carried out and the computer is
then moved).
• They lack portability unless a portable hard disk drive is used (see next sub-section).
Uses
• Portable hard disks can be used as back-up systems to prevent loss of
data.
• They can be used to transfer data, files and software between computers.
Advantages
• The data access time and data transfer rate is very fast.
• They have large memory capacities.
• They can be used as a method of transferring information between computers.
Disadvantages
• As with fixed drives, a portable hard disk can be easily damaged if the user accidentally drops it or
does not shut it down correctly after use.
Uses
• They are still used where small files need to be transferred/stored (e.g.
word-processed documents).
• Some older computer systems still make use of this method of storage.
Advantages
• Using a CD to store a small file (e.g. a word-processed document) is often regarded as wasteful –
especially if CD-R is used.
• It is a very simple technology. Floppy disk drives are also extremely low cost items to buy.
Disadvantages
• Floppy disks have a very low memory capacity when compared to CD/DVDs, for example.
• Very few modern computers have floppy disk drives.
• The data transfer rate is slow compared to more modern data storage devices.
• Floppy disks are not very robust.
Magnetic tapes
A magnetic tape is a very thin strip of plastic which is coated in a
magnetic layer. They are read and written to by a read/write head. The data
is stored in magnetic areas which represent 1s and 0s. Data is written to and
read from the tape in sequence (i.e. in order) – for example, if five records
A, B, C, D and E were stored they would be in the order E D C B A on the
tape; so if record B was to be read it would be necessary to read E, D and C
first before getting to the required record. This is known as serial access. This type of storage is useless
in a real-time or online application (due to the very slow access speeds) and is best suited to offline
or batch processing.
Uses
• Magnetic tapes are used in applications where batch processing is used,
for example in clearing bank cheques, utility billing (gas, electricity, water) and
producing pay slips. In these applications, there is no need for any specific
processing order and speed of data access is not important).
• They are used as a back-up media since all the data needs to be stored.
Advantages
• They are generally less expensive than the equivalent-capacity hard disk.
• It is a very robust technology.
• The data transfer rate is fast.
Disadvantages
• Access time is very slow.
• When updating, another tape is needed (i.e. original tape + tape with the changes produces an
updated tape).
The CDs and DVDs are manufactured either from a single polycarbonate disk or from two
polycarbonate disks bonded together. A very thin layer of metal or organic dye is used as the recording
media. The big advantage of these storage media is that they are portable and can store large data
files (e.g. films, music or multimedia files) which would be too large for a floppy disk.
Uses
• CD-ROMs are used by manufacturers to store music files and software,
computer games and reference software (such as an encyclopedia).
• DVD-ROMs have much larger storage capacity than CD-ROMs and are
used to store films. They are now increasingly used to store computer data and
ever-more sophisticated computer and arcade games.
Advantages
• They hold far more data than floppy disks, so one CD/DVD could replace several floppy disks in some
applications.
• They are less expensive than hard disk drive systems.
Disadvantages
• The data transfer rate and data access time are slower than for hard disks.
Uses
• They are used for home recordings of music (CD-Rs) and films (DVD-Rs).
• They are used to store data to be kept for later use or to be transferred to
another computer.
• They are used in applications where it is necessary to prevent the deletion or
over-writing of important data).
Advantages
• CD-Rs and DVD-Rs are cheaper than RW disks.
• Once burned (and finalised), they are like ROM disks.
Disadvantages
• They can only be recorded once, so if an error occurs then the disk has to be thrown away.
• Not all CD/DVD players can read CD-R/DVD-R.
Uses
• CD-RWs and DVD-RWs are used to record radio and television programmes, but can be recorded over
time and time again.
• They are used in closed circuit television (CCTV) systems.
Advantages
• CD-RWs and DVD-RWs can be re-used many times.
• They can use different file formats each time they are used.
• The RW format is not as wasteful as the R format since files or data can be added at a later stage.
Disadvantages
• CD-RWs and DVD-RWs can be relatively expensive media.
• It is possible to accidentally overwrite data.
DVD-RAM
DVD-RAM is a recent addition to the optical media group. Unlike
other CD and DVD formats, DVD-RAMs have several discrete concentric
tracks rather than a single spiral track. This gives them the advantage that
writing and reading can occur at the same time. This makes it possible to
watch an already recorded television programme at the same time as a
different programme is being recorded. DVD-RAMs can be written to
many times.
Figure 3.2 compares the single spiral track found on normal CDs and DVDs
with the discrete single tracks found on a DVD-RAM.
Uses
• DVD-RAMs are used in recording devices such as satellite receivers to allow simultaneous recording
and playback.
• They are used in camcorders to store films.
Advantages
• DVD-RAMs have a long life – minimum life is estimated to be 30 years.
• It is possible to do a re-write operation over 100,000 times, compared with the
• RW format which only allows about 1,000 re-writes.
• Writing on DVD-RAMs is very reliable, as they have in-built verification software to ensure the
accuracy of the data.
• Access is very fast if the files are fairly small.
• There is no need to finalise the disk.
• They have a very large capacity (about 10 Gbyte if double-sided format is used).
• They offer the ability to read data at the same time as data is being written.
Disadvantages
• DVD-RAMs are not as compatible as R or RW format, as many systems will not recognise their format.
• They are relatively expensive, costing about 4 times as much as a DVD-RW disk.
Blu-ray disks
Blu-ray disks have the largest capacity of all the optical media available and
go up to 100 Gbyte (at the present time). The laser beam used is at the blue/violet
end of the spectrum, rather than red which is the colour of the lasers used in other
optical media. Consequently, the light used has a shorter wavelength, allowing more data to be
stored/read on the disk.
Uses
• Blu-ray disks are used in home video consoles.
• They are used for storing and playing back films: 1 high-definition film of
two hours duration uses 25 Gbyte of memory.
• PCs can use this technology for data storage or backing up hard drives.
• Camcorders can use this media (in cartridge form) to store film footage.
Advantages
• They have a very large storage capacity, and so are ideal for storing high
definition films.
• The data transfer rate is very fast.
• The data access speed is also greater than with other optical media.
Disadvantages
• The disks are relatively expensive .
• At the time of writing, blu-ray systems still have encryption problems (which are used to stop piracy)
when used to store video.
Advantages
• They are very compact and portable media.
• They are very robust.
Disadvantages
• It is not possible to write protect the data and files.
• Their small physical size means that they are easy to lose.
Uses
• Flash memory cards are used to store photos on digital cameras.
• Mobile phones use them as memory cards.
• They are used in MP3 players to store music files.
• They are used as a back-up store in handheld computer devices.
Advantages
• Flash memory cards are very compact, so they can be easily removed and
used in another device or used for transferring photos directly to a computer or
printer.
• Since they are solid state memories, they are very robust.
Disadvantages
• They are expensive per Gbyte of memory when compared to hard drive disks.
• They have a finite life in terms of the number of times they can be read from or written to.
• They have a lower storage capacity than hard disks.
Chapter 4
The effects of using ICT
Introduction
The use of ICT has affected our everyday lives in many ways. These range from the effects of
ICT on society in general, such as the changes in types and styles of employment, to the convenience
that it offers the individual, through services such as online shopping and banking. However, in
addition to providing new opportunities, ICT has introduced its own problem, such as issues relating
to copyright, security of both companies and individuals, and health and safety. This chapter
discusses many of these effects.
Software copyright
Software is protected by copyright laws in much the same way as music CDs, film DVDs and
articles from magazines and books are protected. When software is supplied on CD or DVD there are
certain rules that must be obeyed.
• It is not legal to make a software copy and then sell it or give it away to a friend or colleague.
• Software cannot be used on a network or used in multiple computers unless a licence has been acquired
to allow this to happen.
• It is not legal to use coding from the copyright software in your own software and then pass this
software on or sell it as your own without the permission of the copyright holders.
Software piracy (illegal copies of software) is a big issue amongst software companies. They
take many steps to stop the illegal copying of software and to stop illegal copies being used once
they have been sold. The following list shows a number of ways in which software is protected, both
by making the installer agree to certain conditions and also by methods which require the original
software to be present for it to work.
• When software is being installed, the user will be asked to key in a unique reference number (a string
of letters and numbers) which was supplied with the original copy of the software.
• The user will be asked to click ‘OK’ or ‘I agree’ to the licence agreement before the software continues
to install.
• The original software packaging often comes with a sticker informing the purchaser that it is illegal to
make copies of the software; the label is often in the form of a hologram, which indicates that this is a
genuine copy.
• Some software will only run if the CD-ROM or DVD-ROM is actually in the drive. This stops illegal
multiple use and network use of the software.
• Some software will only run if a dongle is plugged into one of the USB ports (dongles were discussed
in Section 3.3).
Viruses infect computers through email attachments and through illegal software or
downloading of files from the internet that are infected. The following list shows ways of protecting
systems against viruses.
• Use up-to-date anti-virus software. This detects viruses and then removes or quarantines (i.e. isolates)
any file/attachment which has been infected.
• Do not allow illegal software to be loaded onto a computer and do not use any CD/DVD in the
computer which comes from an unknown source.
• Only download software and files from the internet if they are from a reputable site.
• Use firewalls (discussed below) on networks to protect against viruses.
Note that backing up files on a regular basis does not necessarily guarantee the prevention
of viruses spreading. If a file is already infected and it is then backed up, when the file is re-loaded
into the ‘cleaned’ computer the virus may actually be re-installed!
Hacking is the act of gaining access to a computer system or network without legal
authorisation. Although some hackers do this as a form of intellectual challenge, many do it with
the sole intention of causing harm (e.g. editing/deleting files, installing harmful software, executing
files in a user’s directory or even committing fraud).
Some large companies actually employ hackers to test out their security systems. Although
the only foolproof way of stopping a networked computer from being hacked into is to disconnect it
from the internet, this is clearly not a practical or desirable solution. Similarly, the only certain way
to prevent a stand-alone computer from being hacked into is to keep it in a locked room when not
in use; again, this is not always practical.
Whilst encryption makes files unreadable if accessed illegally, it does not prevent illegal
access (hacking) in the first place. It therefore would not prevent a hacker carrying out many of the
harmful actions described in this section.
Impact on employment
The introduction of ICT has led to unemployment in many areas such as:
• manufacturing, where robots have taken over many tasks (e.g. paint spraying in a car factory)
• computer-controlled warehouses, which are automatic and require no personnel to be present
• labor-intensive work (e.g. in the printing industry, checking football pools, filing, etc.).
However, it is also true that some new jobs have been created with the introduction of ICT.
These include writing software, maintenance of robots and other ICT equipment and work connected
with internet sites (setting sites up, maintaining them, etc.).
The overall work- related effects on people can be summarised as follows:
• the need to be re-trained because of the introduction of new technology, e.g. how to operate or
maintain the new machinery which is being introduced to do the work previously done by a person
• a cleaner working environment where robots have taken over many of the ‘dirty’ manual tasks
• de-skilling of the workforce, as jobs where high skills were needed in the past are now done by
computer systems (e.g. the use of DTP software in the printing industry, CAD software in producing
engineering drawings, etc.)
• a safer working environment (e.g. fewer people working in noisy factories)
• fewer manual tasks, since tasks such as heavy lifting are now done by robots.
Companies have also gained from the introduction of ICT systems. For example:
• there is no need to employ as many people to do the tasks, thus reducing labour costs
• robots do not take holidays, get sick or take coffee breaks, resulting in higher productivity
• whilst the quality is not necessarily better, there is greater consistency in the products made (e.g.
every car coming off a production line will be identical).
Advantages
• There is no longer a need to travel into the town centre thus reducing costs (money for fuel, bus fares,
etc.) and time spent shopping. It also helps to reduce town centre congestion and pollution.
• Users now have access to a worldwide market and can thus look for products that are cheaper. This is
less expensive and less time consuming than having to shop around by the more conventional methods.
They also have access to a much wider choice of goods.
• Disabled and elderly people can now get access to shops and banks without the need to leave home.
This helps to keep them part of society since they can now do all the things taken for granted by able-bodied
people.
• Because it is online, shopping and banking can be done at any time on any day of the week – this is
termed 24/7. This is particularly helpful to people who work, since shops/banks would normally be closed
when they finished work.
• People can spend more time doing other things. For example, going shopping to the supermarket
probably took up a lot of time; by doing this online people are now free to do more leisure activities, for
example.
Disadvantages
• There is the possibility of isolation and lack of socialisation if people stay at home to do all their
shopping and banking.
• There are possible health risks associated with online shopping and banking
• Security issues (e.g.) are a major concern. These include:
o hacking, stealing credit card details, etc.
o viruses and other malware (e.g. phishing, pharming, etc.,)
o fraudulent websites.
• It is necessary to have a computer and to pay for line rental to take part in online shopping and
banking. Also the telephone line will be tied up if the user does not have a broadband connection.
• Unlike high street shopping, it is not possible to see (or try on) the goods first before buying them. The
goods also take several days to arrive.
• There is a risk of lack of exercise if people do all their shopping and banking at the computer.
• High street shops and banks are closing because of the increase in online shopping and banking and
this is leading to ‘ghost towns’ forming.
It would prevent children and other vulnerable groups being subjected to undesirable
websites. Since anyone can produce a website, there is no guarantee of the accuracy of information.
Some form of control could reduce the amount of incorrect information being published.
Tables 5.1 and 5.2 give the advantages and disadvantages of both types of devices.
Disadvantages
• They lead to more leisure time since the • They can lead to unhealthy diets
devices can be programmed to do the tasks. (e.g. TV dinners).
• People have more time to go out and • People can tend to become lazy, since they
socialise, and can go out
relywhen
on these
they
devices.
want to.
Advantages Disadvantages
• They save energy, since they can switch off • They lead to a more wasteful society: devices
automatically. are thrown away if the electronics fail, since
they are not economic to repair.
• It is easier to program the devices to do a
task rather than having to set timings, dates, • They can be more complex to operate for
etc. manually. people who are not technology literate.
Reliability of information
• Information is more likely to be up to date than in books, since websites can be updated very quickly.
• It is much easier to get information from websites, as search engines quickly link key words together
and find information that matches the criteria.
• There is a vast amount of information on the internet, which is easier to locate than using the indices
in several books.
• However, information on the internet may be incorrect, inaccurate or even biased since it does not go
through any checking process.
• There is a risk of information overload even if search engines are used properly. It is possible to get
thousands of hits, which may make it difficult to find the information relevant to the user’s search.
Security issues
The risk of viruses and hacking has already been discussed in Section 6.3. The use of
passwords, user IDs, encryption, firewalls and other software protection was also discussed in
Section 6.3. However, there are other security risks (not necessarily as a result of viruses or hacking)
associated with connecting to the internet. These security risks are now discussed in some depth.
Phishing
Phishing is a fraudulent operation involving the use of emails. The
creator sends out a legitimate-looking email, hoping to gather personal and
financial information from the recipient of the email. To make it more realistic
(and therefore even more dangerous!) the message will appear to have come
from some legitimate source (such as a famous bank). As soon as an
unsuspecting user clicks on the link they are sent to a spoof website where they will be asked for
personal information including credit card details, PINs, etc. which could lead to identity theft.
Many ISPs now attempt to filter out phishing emails, but users should always be aware that
a risk still exists and should be suspicious of any emails requesting unsolicited personal details.
Pharming
Pharming is a scam in which malicious code is installed on a
computer hard disk or a server. This code has the ability to misdirect users
to fraudulent websites, usually without their knowledge or consent.
Whereas phishing requires an email to be sent out to every person
who has been targeted, pharming does not require emails to be sent out to
everybody and can therefore target a much larger group of people much
more easily. Also, no conscious action needs to necessarily be made by the
user (such as opening an email), which means the user will probably have no idea at all that have
been targeted. Basically, pharming works like this:
A hacker/pharmer will first infect the user’s computer with a virus, either by sending an email
or by installing software on their computer when they first visit their website. It could also be
installed as part of something the user chooses to install from a website (so the user doesn’t
necessarily have to open an email to become infected). Once infected, the virus would send the user
to a fake website that looks almost identical to the one they really wanted to visit. Consequently,
personal information from the user’s computer can picked up by the pharmer/hacker.
Certain anti-spyware, anti-virus software or anti-pharming software can be used to identify
this code and correct the corruption.
Spam
Spam is electronic junk mail and is a type of advertising from a
company sent out to a target mailing list. It is usually harmless but it can
clog up the networks, slowing them down, or fill up a user’s mail box. It is
therefore more of a nuisance than a security risk. Many ISPs are good at
filtering out spam. In fact, some are so efficient that it is often necessary
to put legitimate email addresses into a contacts list/address book to
ensure that wanted emails are not filtered out by mistake.
Spyware
Spyware is software that gathers user information through their network
connections without them being aware that this is happening. Once spyware is
installed, it monitors all key presses and transmits the information back to the
person who sent out the spyware. This software also has the ability to install
other spyware software, read cookies and even change the default home page
or web browser. Anti-spyware can be used to search out this software and
correct the corruption.
Cookies
Cookies are small files sent to a user’s computer via their web
browser when they visit certain websites. They store information about
the users and this data is accessed each time they visit the website. For
example:
• they remember who the user is and send messages such as ‘Welcome
Daniel’ each time they log onto the website
• they recognise a user’s buying preferences; e.g. if a user buys CDs, pop
ups (adverts) related to their buying habits will appear on the user’s screen each time they visit the website.
Without cookies, the web server would have no way of knowing that the user had visited the website
before.
Internet developments
The internet has changed out of all recognition since it first started, and continues to develop. This
section considers some of the most recent developments in the way the internet is used.
Web 2.0 refers to a second generation of internet development and design. This has led to a
development of new web-based communication, applications and hosted servers. For example, the
following will be considered in more detail in this section:
• blogs
• wikis
• digital media sharing websites
• social networking sites
• folksonomies.
Blogs
Blogs (which is an abbreviation for web logs) are personal internet
journals where the writer (or blogger) will type in their observations on
some topic (e.g. a political view) or even provide links to certain relevant
websites. No training is needed to do this.
Blogs tend to range from minor projects where people just gossip about some topic (such as
the performance of an actor in a recent film) through to important subjects such as politics,
advertising products or raising awareness of a certain key event taking place. However, comments
made are not immune from the law and bloggers can still be prosecuted for making offensive
statements about people!
Wikis
The word ‘wiki’ comes from a Hawaiian word meaning ‘fast’. Wikis are software allowing
users to easily create and edit web pages using any web browser. A wiki
will support hyperlinks and has very simple syntax (language rules) for
creating pages.
They have often been described as ‘web pages with an edit button’. Anyone can use wikis,
which means that the content should always be treated with some caution. One of the most common
examples of a wiki is the online encyclopedia Wikipedia.
Folksonomies
Folksonomies are closely related to tagging and literally mean ‘management of people’.
Tagging is a type of social bookmarking where a user can tag any web page with words that describe
its contents. Anyone can view web pages corresponding to a specific tag. In folksonomies, the visual
representation is a tag cloud – this is a sequence of words of different sizes that represent popular
tags by showing them in a larger font size. One of the most common examples is Flickr.
Although health and safety are closely related, they are very different subjects. Health issues
are related to how to stop people becoming ill or affected by daily contact with computers. Safety is
more concerned with the dangers which could lead to serious injury or even loss of life. They are
discussed in separate sections below to help clarify the main differences.
Health aspects
Table 6.3 highlights a number of health issues, together with possible solutions to either minimise
the risk or eliminate it altogether.
isk Solution
Safety aspects
Table 6.4 gives a number of safety issues, together with possible solutions to eliminate or
minimise the risk.
● use strong desk and tables to support heavy hardware ● use large
Heavy equipment falling desks and tables so that hardware isn’t too close to the edge where it
can fall off
Chapter 5
File Management
1. File Management
Right click where you want to make the folder (on desktop, in another folder, etc).
Copy – copy files and folders when you want to keep it in the original location, and add a copy
in another location.
Move – move files when you want them in a new location, and you no longer need them in the
old location.
64
Moving Files
Open the folder where the original file or folder is located. Open the folder where you
want the file or folder to be. Drag form one window to the other.
By default, Microsoft Office programs save in My Document. You can save a document
wherever you want by navigating to a new location during the Save process. To save a file in
an existing folder in My Document, double click the folder.
65
To save a file in location other than My Document, use the Save In drop down menu at
the top of the screen, or the links on the left hand side, and browse to a new location.
Note: A computer will not allow two files in the same location to have the same name.
1.6 Deleting
When a file is deleted, it goes to the recycle bin. However, it is still in your computer,
taking up space.
66
Open the Recycle Bin. Right click on the file or folder you want to restore, and choose
Restore. It will reappear in the folder from which it was deleted.
To delete a file without having it go to the Recycle Bin, select the file or folder you wish to
delete. Hold the SHIFT key and the press the Delete key.
67
Chapter 6
Word Processing
1. Introduction to Word
Before you begin these steps, be sure to turn on and/or log on to your computer.
On the Windows 10 desktop, click the Start button. The Start menu appears.
On the Start menu, locate Word 2016 and click the icon. The Word 2016 screen ap-
pears. On the left side of the screen, you see the recent documents that have been accessed, and
the right side displays the blank document page and templates.
68
Before you begin working in Microsoft Word 2016, you need to acquaint yourself with
the primary user interface (UI). When you open a blank document in Microsoft Word 2016.
Quick access
Tool bar
Collapse ribbon
lbar
Ribbon
Document Page
Insertion Point
Click the Blank document icon to create a new document file. The Ribbon is located at the
top of the Word screen. In your newly opened document, the Home tab is the default tab on
the Ribbon. Note how the Ribbon is divided into groups: Clipboard, Font, Paragraph, Styles,
and Editing.
69
The insertion point is the blinking vertical line in your document. It indicates where
you can enter text on the page.
You can use the insertion point in a variety of ways.
Blank document: When a new blank document opens, the insertion point will appear in
the top-left corner of the page.
If you want, you can begin typing from this location.
Adding spaces: Press the spacebar to add spaces after a word or in between text.
New paragraph line: Press Enter on your keyboard to move the insertion point to the
next paragraph line.
Manual placement: Once you begin typing, you can use the mouse to move the inser-
tion point to a specific place in your document. Simply click the location in the text where you
want to place it.
Arrow keys: You can also use the arrow keys on your keyboard to move the insertion
point. The left and right arrow keys will move between adjacent characters on the same line,
while the up and down arrows will move between paragraph lines. You can also press Ctrl +
Left or Ctrl + Right to quickly move between entire words.
70
When you select text or images in Word, a hover toolbar with command shortcuts will
appear. If the toolbar does not appear at first, try hovering the mouse over the selection.
Place the insertion point where you want the text to appear.
Click the Paste command on the Home Tab. Alternatively, you can press Ctrl + V on
your keyboard. The text will appear.
72
By contrast, the Redo command allows you to reverse the last undo. You can also access
this command by pressing Ctrl + Y on your keyboard.
Exercise 1
Jasmine Phyu
628, Rhode Avenue
Boise, ID 27632
Telephone: (252) 285-29373
Email ID:[email protected]
25 July 2017
Dear San
Having seen advertisement published in myjob.net. I would like to apply as Office Assistant
in your company. I want to expand my skills and experience. I am interested working in
administrative field.
I have enclosed my resume for your review and consideration. You can contact me at (252)
298-23918. Thank you for your attention.
Sincerely
Jasmine Phyu
75
2. Formatting Text
2.1 Character Font and Size
Select desire words and change Bold, Italic, Underline, Superscript, Subscript etc.
2.3 Highlighting
Select desire words and change font color and background color.
2.7 Alignment
Select facts and Click Bullet and Numbering. And then choose bullet style.
77
Select the desire words or paragraph and click one desire styles. You can also modify
the styles or creating new styles. The advantage of using styles is consistency in all words and
paragraphs.
Select the desire lines or paragraph and click borders. You can also fill the shading
within the borders.
78
Exercise 2
Introduction1
UTAUT has distilled the critical factors and contingencies related to the prediction of
behavioral intention to use a technology and technology use primarily in organizational con-
texts.
Performance Expectancy
Effort Expectancy
Social Influence
Facilitating Conditions
In longitudinal field studies of employee technology acceptance, UTAUT explained
about 70 percent of the variance in behavioral intention to use a technology and about 50 per-
cent of the variance in technology use.
79
Exercise 3
Julianna Lanely
40 First Avenue, Apartment 214
New London, CT 54923
Dear Phyu
I attended an event planning career panel last year at Northeastern College where I
heard you speak about YIC. Something you mentioned has stuck with me – to be successful,
you must have passion for what you do. I believe I have the passion it takes to pursue a career
in event planning. I am writing to express interest in an event planning position at YIC. I
graduated from Northeastern College in May with a degree in marketing communications. As
a recent graduate I believe I can bring new ideas, personal energy, and a fresh perspective to
your company. Some highlights of my background include the following:
I would appreciate opportunity to show you some samples of my work and discuss any
open positions. I will contact you next week so we can set up a meeting time that is convenient
for you. You can reach me at 570-444-3596 or [email protected]. I look forward to
discussing your opportunities.
Sincerely,
Julianna Lanely
80
3.2 Thesaurus
Select the desire words and press Shift + F7 for Thesaurus.
3.9 Printing
Select File > Print.
Choose Printer. Choose Print Range.
Choose Orientation and Size.
Choose copy and then Print.
83
Exercise 4
1. Left and Right indent 1 inches for second paragraph.
2. All line spacing 1.15.
3. Format as shown below.
4. All margin 0.75 and choose A4 with Portrait. And then Print it.
No one ever gave me directions like this on a golf course before: "Aim at either Mi-
crosoft or IBM." I was standing on the first tee at the KGA Golf Club in downtown Bangalore,
in southern India, when my playing partner pointed at two shiny glass-and-steel buildings off
in the distance, just behind the first green.
The tee markers were from Epson, the printer company, and one of our caddies was
wearing a hat from 3M. Outside, some of the traffic signs were also sponsored by Texas In-
struments, and the Pizza Hut billboard on the way over showed a steaming pizza, under the
headline "Gigabites of Taste!"
I had come to Bangalore, India's Sil- to do. India and the magical Spice Islands
icon Valley, on my own Columbus-like of the East were famed at the time for their
journey of exploration. Columbus sailed gold, pearls, gems, and silk—a source of
with the Nina, the Pinta, and the Santa Ma- untold riches.
ria in an effort to discover a shorter, more Finding this shortcut by sea to India,
direct route to India by heading west, across at a time when the Muslim powers of the
the Atlantic, on what he presumed to be an day had blocked the overland routes from
open sea route to the East Indies —rather Europe, was a way for both Columbus and
than going south and east around Africa, as the Spanish monarchy to become wealthy
Portuguese explorers of his day were trying and powerful.
84
4. Inserting Objects
4.1 Insert WordArt
Click Insert > WordArt, and pick the WordArt style you want.
The placeholder text "Your text here" appears, with the text highlighted.
Type “HAPPY BIRTHDAY’.
To create a curved effect, on the Drawing Tools Format tab, click Text Effects
>Transform and pick the one you want.
Exercise 5
CEO
General
Secretary
Exercise 6
Curriculum Vitae
Personal Details
Education Details
Qualifications
Working Experience
Others
Signature -------------------------------
90
Chapter 7
Presentation
1. Introduction to PowerPoint
Fig 1.1
91
Fig 1.2
Commands
Slide
Fig 1.4
Fig 1.5
93
Fig 1.6
Fig 1.7
94
Fig 1.8
Fig 1.9
95
Fig 1.10
Fig 1.11
96
2. Formatting
2.1 Text Alignment
Fig 2.1
2.2 Line Spacing
Home tab > Paragraph group > Line and Paragraph Spacing > 1.5
Fig 2.2
97
Fig 2.3
2.4 Find and Replacing Text
Home tab > Editing group > Replace > Find what > CPU > Find Next
Fig 2.4
98
Fig 2.5
Fig 2.6
99
Exercises
1.
2.
100
3.
4.
101
5.
6.
102
7.
8.
103
3. Inserting
3.1 Insert Picture
Insert tab > Image group > Pictures > Choose
Fig 3.1
Fig 3.2
104
Fig 3.3
Fig 3.4
105
Fig 3.5
Fig 3.6
106
Fig 3.7
Fig 3.8
107
WordArt Styles group > Text Fill - Light Blue, Text Outline - Red, Text
Effects – 3-D Rotation > Isometric right up
Fig 3.9
Fig 3.10
108
Insert Audio
Insert tab > Media group > Audio > Audio on My PC > Choose (audio file)
Fig 3.11
Exercises
10.
11.
12.
110
13.
14.
15.
111
16.
17.
18.
112
19.
20.
21.
113
22.
23.
24.
114
25.
115
4. Effect of Slides
4.1 Slide Design
Design tab > Theme group > Ion
Fig 4.1
Fig 4.2
116
Fig 4.3
Transitions tab > Timing group > On Mouse Click (or) After: 00:05:00
Fig 4.4
117
4.5 Animations
Animations tab > Animation group > Zoom
Effect options > Object Center
Fig 4.5
Advanced Animations
Animation tab > Advanced Animation group > Animation Pane
Fig 4.6
118
Fig 4.7
Fig 4.8
Exercise 26
Presentation
119
Chapter 8
Spreadsheets
1. Introduction to Excel
1.1 Stating excel
Open Start button > All Program > Microsoft Office 2013 > Excel 2013
The Microsoft Excel window appears and your screen looks similar to the one shown
here.
The Ribbon
In Microsoft Excel 2007, you use the Ribbon to issue commands. The Ribbon is located
near the top of the Excel window, below the Quick Access toolbar.
120
Worksheets
Microsoft Excel consists of worksheets. Each worksheet contains columns and rows.
The columns are lettered A to Z and then continuing with AA, AB, AC and so on; the rows are
numbered 1 to 1,048,576.
The combination of a column coordinate and a row coordinate make up a cell address.
For example, the cell located in the upper-left corner of the worksheet is cell A1, meaning
column A, row 1. Cell E10 is located under column E on row 10. You enter your data into the
cells on the worksheet.
If the Formula bar is turned on, the cell address of the cell you are in displays in the
Name box which is located on the left side of the Formula bar. Cell entries display on the right
side of the Formula bar.
1. Type: Add, Subtract, Multiply, and Divide in cells A1, B1, C1, and D1 respectively
2. Type: 12, 25, 11 and 75 in cells A2, B2, C2 and D2 respectively
3. Type: 8, 13, 6 and 5 in cells A3, B3, C3 and D3 respectively
4. Type: = A2 + A3 in cell A5 and press Enter
5. Type: = B2 + B3 in cell A5 and press Enter
6. Type: = C2 + C3 in cell A5 and press Enter
7. Type: = D2 + D3 in cell A5 and press Enter
124
When creating formulas, you can reference cells and include numbers. All of the fol-
lowing formulas are valid:
(a) =A2/B2; (b) =A2+12-B3; (c) =A2*B2+12; (d) =24+53/B2
Advanced Calculations
1. Move to cell A7.
2. Type =3+3+12/2*4.
3. Press Enter.
Note: Microsoft Excel divides 12 by 2, multiplies the answer by 4, adds 3, and then adds an-
other 3. The answer, 30, displays in cell A7. To change the order of calculation, use parenthe-
ses. Microsoft Excel calculates the information in parentheses first.
1. Double-click in cell A7.
2. Edit the cell to read = (3+3+12)/2*4.
3. Press Enter.
Note: Microsoft Excel adds 3 plus 3 plus 12, divides the answer by 2, and then multiplies the
result by 4. The answer, 36, displays in cell A7.
2.2 AutoSum
You can use the AutoSum button on the Home tab to automatically add a col-
umn or row of numbers. When you press the AutoSum button, Excel selects the numbers it
thinks you want to add. If you then click the check mark on the Formula bar or press the Enter
key, Excel adds the numbers. If Excel's guess as to which numbers you want to add is wrong,
you can select the cells you want.
AutoSum
The following illustrates AutoSum:
125
1. Go to cell F1.
2. Type 3.
3. Press Enter. Excel moves down one cell.
4. Type 3.
5. Press Enter. Excel moves down one cell.
6. Type 3.
7. Press Enter. Excel moves down one cell to cell F4.
8. Choose the Home tab.
9. Click the AutoSum button in the Editing group. Excel selects cells F1 through F3 and
enters a formula in cell F4.
10. Press Enter. Excel adds cells F1 through F3 and displays the result in cell F4.
126
Note that you can click on the arrow next to AutoSum to access other automatic calculations
like average, minimum and maximum values, count numbers, etc.
Note that left and right alignment can be carried out in a similar manner.
.
2.5 Insert and Delete Columns and Rows
You can insert and delete columns and rows. When you delete a column, you delete
everything in the column from the top of the worksheet to the bottom of the worksheet. When
you delete a row, you delete the entire row from left to right. Inserting a column or row inserts
a completely new column or row.
128
After you type the first letter of a function name, the AutoComplete list appears. You
can double-click on an item in the AutoComplete list to complete your entry quickly. Excel
will complete the function name and enter the first parenthesis.
Functions
The SUM function adds argument values.
4. Press Enter.
5. Type 65 in cell C3, and Press Enter
6. Choose the Formulas tab.
7. Click the Insert Function button. The Insert Function dialog box appears.
8. Choose Math & Trig in the Or Select A Category box.
9. Click Sum in the Select A Function box.
10. Click OK.
11. The Function Arguments dialog box appears with C1:C3 displayed in the Number1
field.
12. Type C1:C3 in the Number1 field, if it does not automatically appear.
13. Click OK. The sum of cells C1 to C3, which is 300, appears.
Print Preview
4. Creating Charts
In Microsoft Excel, you can represent numbers in a chart. On the Insert tab, you can
choose from a variety of chart types, including column, line, pie, bar, area, and scatter. The
basic procedure for creating a chart is the same no matter what type of chart you choose. As
you change your data, your chart will automatically update.
You select a chart type by choosing an option from the Insert tab's Chart group. After
you choose a chart type, such as column, line, or bar, you choose a chart subtype. For example,
after you choose Column Chart, you can choose to have your chart represented as a two-di-
mensional chart, a three-dimensional chart, a cylinder chart, a cone chart, or a pyramid chart.
There are further sub-types within each of these categories. As you roll your mouse pointer
over each option, Excel supplies a brief description of each chart sub-type.
To create the column chart shown above, start by creating the worksheet below exactly
as shown.
After you have created the worksheet, you are ready to create your chart.
141
1. Select cells A3 to D6. You must select all the cells containing the data you want in your
chart. You should also include the data labels.
2. Choose the Insert tab.
3. Click the Column button in the Charts group. A list of column chart sub-types types
appears.
4. Click the Clustered Column chart sub-type. Excel creates a Clustered Column chart and
the Chart Tools context tabs appear.