Second Term Yr 9 Lesson Note
Second Term Yr 9 Lesson Note
SPREADSHEET
DEFINITION OF SPREADSHEET: A
spreadsheet is a collection of cells organized
into rows and columns where data is stored
and manipulated. The spreadsheet is known
as a worksheet. A spreadsheet begins with
row number one and column A. A cell is a
space in a worksheet formed by the
intersection of a row and a column. Each cell
can contain a number, text or formula. A cell
can also reference another cell in the same
worksheet, the same workbook or a different
workbook. Each cell has an address called
Cell Reference e.g. A1, B3, C7 etc. combination of more than one sheet is referred to as
workbook. The worksheets can accept thousands of rows of data and columns in the form of
fields. Active Cell is recognized by heavy border surrounding. It is the cell that is currently worked
upon.
CONTENT OF SPREADSHEET
When you are setting out a spreadsheet, you have to enter values, labels and formulas.
• VALUES: Values are those numbers you already know before starting the spreadsheet
operation. These values are inserted into cells of the spreadsheet.
• LABELS: Labels are words you enter to explain the values. You would not just enter a list of
numbers without explanation. Putting labels next to each of the numbers makes it easier to check
it through.
• FORMULA: Formulas are the mathematical equations you insert into the cells. Formulas are
commands that instruct the computer on what to do.
EVALUATION
1. Define a worksheet.
2. What do you understand by cell reference?
USES OF SPREADSHEET
There are various uses of a spreadsheet. It uses varies according to the intended purpose. Some
of its uses are as follows:
1. Spreadsheets are used for administrative functions.
2. Spreadsheets are used for creating reports.
3. They are used for the preparation of daily sales.
4. They are used in computing school results.
5. They are used for project budgeting control.
6. They are used for drawing balance sheets.
7. Excel can store and calculate the data as directed using existing data.
8. A spreadsheet can be used for analysis and decision making.
9. It makes calculations much easier than working things out yourself.
EXAMPLES OF SPREADSHEET
There are various types of spreadsheet software which include:
• Microsoft excel
• Lotus 1-2-3,
• Starview,
• SuperCalc, etc.
MICROSOFT-EXCEL
Out of the many examples of spreadsheet
packages, Microsoft Excel is the most
commonly used because of its friendly
features. Microsoft Excel is part of Microsoft
suite. The suite comes in various version
such as 2000, 2005, 2007,2010, 2015 etc.
Formulas are often used to carry out calculations in Ms-Excel. The desired formula for any
calculation must be preceded with an equal sign (=).
1. Row
2. Column
3. Cell
4. Active Cell
5. Worksheets
6. Workbook
7. Chart
8. Data Range
9. Fill handle
10. Moving border
Rows
A Row is a horizontal line of cells which runs from left to right in a worksheet. They can be
identified by the numbers at the left-hand-side of the work sheet. They are numbered from 1, 2, 3
to 1,048,576 in Excel 2007, 2010, 2013 & 2016.
Columns
A Column is a vertical line of cells in a worksheet usually identified by letters across the top of the
sheet. There are about 16,384 columns in Excel 2007, 2010, 2013 & 2016.
Cells
A Cell is the intersection of a row and a column. The highlighted rectangle on the cell is the cursor
but is known as ‘cell pointer’ which enable users to move around the sheet. They can be identified
by the combination of column header (e.g. ‘A’) and the row header (e.g. ‘1’) to give cell A1.
Worksheet
The worksheet (also known as spreadsheet) is the working area of the package where entering of
data and calculations are handled. It consists of rows, columns, cells and a cell pointer where
data are actually entered and manipulated.
Workbook
This can be simply defined as a collection of worksheets. Each workbook contains many
worksheets just like a normal single book with a number of pages.
Chart
A Chart is a graphical representation of data that enables you to understand the data at a glance.
Examples of Charts include Column (histogram), Pie chart, Bar Chart, Line Chart, Surface,
Doughnut, etc.
Data Range
A group of highlighted cells in a worksheet is referred to as a Range.
Fill Handle
This is a small black square at the corner of selected cells. The cursor changes to a black cross
when moved to it.
Moving Border
This is an animated border that appears around a selected cell that has been cut or copied. Press
the ESC key to cancel a moving border.
STARTING MS EXCEL
1. Starting Worksheet (Using Microsoft Excel) Click the Start button;
2. Click All Programs; Click Microsoft Office;
3. Click Microsoft Office Excel.
EVALUATION
1. Highlight the steps for starting Ms-Excel.
2. What are the types of calculations that can be performed in Ms-Excel?
When creating a formula, you must know MS Excel’s order of operations. Certain operations are
performed before others. The term PEMDAS is the acronym to denote
MS Excel’s order of operation.
P —— Parenthesis (Bracket)
E —– Exponential
M —– Multiplication
D —– Division
A —– Addition
S —— Subtraction
Calculations enclosed in parenthesis are performed first, followed by calculations involving
exponentials. Multiplication and division operations are performed next because they are
considered equal in importance. They are performed in the order in which they are encountered
from left to right. Addition and subtraction are performed last in the order in which they are
encountered from left to right.
Formulas in MS Excel
Examples: Addition =C3+D3
Subtraction =C3-D3
Division =C3/D3
Multiplication =C3*D3
Average =AVERAGE(C4…C9)
GENERAL EVALUATION
1. In the right order, list the order of calculation operations in Excel.
2. Apart from MS-Excel, list two other types of Spreadsheet packages.
3. Write the full meaning of the acronyms PEMDAS.
4. List two formulas in Ms-Excel.
Summary Note for Year 9, Week Three: Worksheet: Starting Excel Worksheet,
Formatting Worksheet
TOPIC: WORKSHEET
Each worksheet is composed of a very large number of cells – which are the basic storage unit
for data in a file or workbook. The cells are arranged in a grid pattern using rows and columns.
In Excel 2013:
There are 1,048,576 rows per worksheet;
There are 16,384 columns per worksheet;
By default, each new file contains only one worksheet;
The number of sheets per file is limited only by the amount of memory available on the computer.
In earlier versions of Excel, the default number of worksheets per file was three.
EVALUATION
1. What are the steps involved in creating a Spreadsheet?
2. Explain how to enter data into Excel.
To retype:
Move the cell pointer to the cell to be corrected or re-type the entry and press ‘Enter’
To correct only the mistake:
Move the cell pointer to the cell and double click on the cell. Make the correction by inserting,
deleting or retyping.
Press ‘Enter’.
SAVING A WORKSHEET
Saving for the first time:
Click on ‘Home’ button,
Click ‘Save As’ button and wait for a dialog box to open.
Type in your desire filename (i.e. the name of the document). Click the ‘Save’ button or press
enter on the keyboard.
Saving while working (after the first saving).
Click on the ‘save’ icon on the Quick Access toolbar or click on ‘office button’ to open the menu.
and click ‘save’ from the options.
RETRIEVING A SAVED WORKSHEET
Retrieving a worksheet means to open an already saved worksheet from its location in the
computer. This is usually done to view, edit or update the worksheet.
Click the ‘Open’ option from the list and wait for a dialog box to open.
Navigate to the file you want to open and double click on it.
GENERAL EVALUATION
1. Define a cell.
2. State steps involved in saving a worksheet for the first time.
3. Highlight the steps in retrieving a saved document.
To enter a formula, first select the cell that will contain the formula.
All formula must begin with equal (=) sign tells Excel to treat the cells contents as a formula.
The function name (e.g. SUM, AVERAGE) which is preceded by equal (=) sign must be selected
and followed by the desired argument, i.e. =SUM (A5:F5). In this case, SUM is the function name
and A5:F5 is the argument.
Addition: Using the SUM Function
The SUM function is used to add together a range of data or numbers. To sum up the values of a
range of data:
Open the worksheet containing data (as previously done in Fig. 2 in the previous lesson).
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. SUM) and state the range of cells.
The IMSUB function is used to find the difference of two numbers. To find the difference of a
range of data;
Open the worksheet containing data (as previously done in Fig. 2 in the previous lesson).
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. IMSUB) and state the range of cells, usually two cells.
Average
It is also possible to use the spreadsheet package to find the average of certain values or group
of numbers. To find average:
Position the cell pointer in the desired cell where result is to be displayed
Type “=AVERAGE (DATA RANGE)”in the formula bar
Count
The COUNT function is used to ascertain the number of cells within a specified range that
contains values. To use the count function;
Multiplication
The multiplication function is solely for multiplication of numbers just like in arithmetic. To multiply
a range of data;
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. PRODUCT) and state the range of cells.
Division
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. QUOTIENT to display the integer portion of a division)
and state the range of cells.
Also, the symbol (/) can be used to display the exact result.
Printing of Worksheet
After the spreadsheet have been formatted and properly calculated the next thing is to get the
worksheet printed. To print your worksheet, take the following steps:
Select the name of the printer from the Printer Name box
Click on Preview button and select Page Set Up. Set all the necessary parameters like margins,
page layout, paper size and grid lines (if necessary).
Click on OK
Click on
EVALUATION
State THREE guidelines that must be followed when performing excel calculations
Highlight the major steps required to carry out the following calculations: (a) Addition (b)
Subtraction (c) Count (d) Average (e) Division
Summary Note for Year 9, Week Five: Creative and Editing Graphs
A graph is a diagram showing the relationship that exist among variables, quantities (varies data),
usually of two, each measured along one of a pair of axes at right angles. It may not be possible
to plot a graph without value. The excel spreadsheet provides the values that are plotted.
Creating a Graph
Charts are used to display a series of numeric data in a graphical format to make it easier to
understand large quantities of data and the relationship between different series of data.
To create a chart in Excel, you start by entering the numeric data for the chart on a worksheet.
Then you can plot that data into a chart by selecting the chart type that you want to use on the
Insert tab, in the Charts group.
1. Worksheet data
2. Chart created from worksheet data
Excel supports many types of charts to help you display data in ways that are meaningful to your
audience. When you create a chart or change an existing chart, you can select from a variety of
chart types (such as a column chart or a pie chart) and their subtypes (such as a stacked column
chart or a pie in the 3-D chart). You can also create a combination chart by using more than one
chart type in your chart.
Example of a combination chart that uses a column and line chart type.
Types of Chart
1. Line graph
2. Histograms
3. Pie-charts
4. Legends
5. Line Graph
Line graphs are often used to plot changes in data over time, such as monthly temperature
changes or daily changes in stock market prices. Line graphs have a vertical axis and a horizontal
axis. If you are plotting changes in data over time, time is plotted along the horizontal or x-axis
and your other data, such as rainfall amounts is plotted as individual points along the vertical or y-
axis.
Histograms
A histogram consists of tabular frequencies, shown as adjacent rectangles, erected over discrete
intervals (bins), with an area equal to the frequency of the observations in the interval. The height
of a rectangle is also equal to the frequency density of the interval.
Pie Charts
Pie charts, or circle graphs as they are sometimes known, are a little different from the other two
types of graphs discussed.
For one, pie charts do not use horizontal and vertical axes to plot points like the others. They also
differ in that they are used to chart only one variable at a time. As a result, it can only be used to
show percentages. The circle of pie charts represents 100%. The circle is subdivided into slices
representing data values. The size of each slice shows what part of the 100% it represents.
Legends
A legend is used to identify each series in a chart. It contains on sample of the marker colour and
pattern of each series.
EVALUATION
1. State the steps to modify a chart
After creating a chart, you can change it to the type you want. The type you choose depends on
how you want to present your data.
Under Chart Type, list click to select the desired chart type (e.g, Column, Bar, Line, etc). Under
Chart sub-type list, click to select the chart sub-typed desired. You can view the chart sample by
pressing it and hold to view sample button.
Adding or removing more data point to the existing chart data series.
Formatting a Chart
You can change the font of chart text, change the horizontal and vertical alignment and rotate text
to a vertical orientation. You can also change the pattern and the colour of the text area. The text
is displayed in the front of the area pattern so that it is always visible. Microsoft Excel
automatically formats the charts title and axes title as bold.
To format all the text in a chart, select the chart by choosing select chart from the chart menu. To
format a single piece of attached or unattached text, click the text to select it. To format tick-mark
labels for an axis, click the axis to select it.
To format text that appears in a legend, click the legend; click the legend to select it.
Who is a hacker?
In the computer security context, a
hacker is someone who seeks and
exploits weaknesses in a computer
system or computer network.
Hackers may be motivated by a
multitude of reasons, such as profit,
protest, challenge, enjoyment, or to
evaluate those weaknesses to
assist in removing them. The subculture that has evolved around hackers is often referred to as
the computer underground and is now a known community.
Hacking is usually a technical activity, although that does not necessarily mean that attackers are
always technically capable. Most of the attackers are script kiddies, who know just about enough
in order to use other (more competent) hackers’ work. That fact aside, it is necessary to know the
technical side of hacking, in order to understand the kind of knowledge that some attackers have.
This section provides a brief explanation of how to get into a target system and how to exploit this
as a full-scale hacking activity.
CRACKING COMPUTER SYSTEMS
There are many ways for attackers to obtain illicit access to computer systems. This kind of
access is often called “intrusion”, and the first thing an intruder does is usually trying to obtain
special/administrative privileges (root access) on that system. Having root access is very
important for the attackers since this means that they can do whatever they want on the system,
including covering their tracks, strengthening their hold and doing damage.
Physical Intrusion: This kind of intrusion happens when an intruder has physical access
to the target machine. This might allow the intruder to gain full control of the system – for
example by booting with a special floppy or by taking the system apart physically (e.g.
removing the Hard-drive to another system owned by the attacker, which then enables
him/her to read/write to it).
System Intrusion: In this case, it is assumed that the intruder has already got low-level
privileges on the system. They then exploit unpatched security vulnerabilities in order to
escalate their privileges to the administrative level.
Remote Intrusion: With remote intrusion, an attacker tries to get into the system remotely
through the network. They initially do not have any privileges to the system, but one way or
another – e.g. by finding out some valid account names and cracking their (usually weak)
password, or by exploiting common security vulnerabilities (buffer overflow, etc.) – they
manage to get in and obtain root access.
Remote intrusion is the most common type of attack associated with hackers. Nevertheless,
there are some cases of system intrusion, for example, the insider attack, where a legitimate user
(could be a disgruntled or former employee) performs an attack due to various reasons (revenge,
cyber-espionage, etc.).
In order to minimize intrusion, many organizations install Intrusion Detection Systems (IDS).
Such a system inspects inbound and outbound network activity and identifies suspicious patterns
that may indicate a network or system attack from someone attempting to break into or
compromise a system. There are many IDSs available. Most of these are commercial software
and are primarily concerned with remote intrusions. We will not discuss IDS in great detail in this
paper since our focus is on the attackers along with their hacking activities and some insights into
their human aspects.
TYPES OF ATTACKS
Attackers can cause various levels of damage, depending on their skill level and/or their motives.
There is a common pattern though: they usually follow a similar set of steps of information
gathering before launching the attack.
Foot Printing: The aim of this activity is to obtain a complete profile of the target organization’s
network and its security arrangement. The information of interest includes the technology that the
organization is using (e.g. Internet, Intranet, Remote Access, and Extranet) and its security
policies and procedures. Although there are many different methods attackers can use to perform
footprinting, there are four general steps that they are likely to follow: − Determine the scope of
the footprinting activities. In some cases, it might be a bit too much to determine all entities
associated with a Target organization. Therefore attackers often need to narrow down the scope
of their Footprinting activities.
Social Engineering: Social Engineering is the term used to describe cracking techniques that
rely on weaknesses in wetware (i.e. human users attached to the system – administrators,
operators, etc.) rather than software. The aim is to trick people into revealing passwords or other
information that compromises a target system’s security.
Software Bugs: Another way to get into a system is through security vulnerabilities brought by
bugs in the software (operating system, server daemons, client applications, etc.). It is almost
impossible to have bug-free software and the attackers only need to find one hole in order to
break in. As a result, the program may crash and very often; this gives the attackers root access
and/or allows them to run any arbitrary code. Attackers can find buffer overflow bugs by:
1. browsing the web for known buffer overflow vulnerabilities on certain programs;
2. Searching for these bugs in the program directly if the source code is available;
3. Examining every place the program prompts for input and trying to overflow it with random
(massive) data. If the program crashes, there is a chance that by carefully constructing the input,
access to the system can be obtained.
EVALUATION
1. Briefly explain the 3 main ways to intrude into a system
2. State the types of attacks
Summary Note for Year 9, Week Eight: Logic Circuit
LOGIC CIRCUIT
A logic gate is an elementary building
block of a digital circuit. Most logic gates
have two inputs and one output. At any
given moment, every terminal is in one of
the two binary conditions low (0) or high
(1), represented by different voltage
levels. The logic state of a terminal can,
and generally does, change often, as the
circuit processes data. In most logic gates,
the low state is approximately zero volts (0
V), while the high state is approximately five volts positive (+5 V).
There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and XNOR.
AND GATE
The AND gate is so named because, if 0 is called “false” and 1 is called “true,” the gate acts in the
same way as the logical “and” operator. The following illustration and table show the circuit
symbol and logic combinations for an AND gate. (In the symbol, the input terminals are at left and
the output terminal is at right.) The output is “true” when both inputs are “true.” Otherwise, the
output is “false.”
OR GATE
The OR gate gets its name from the fact that it behaves after the fashion of the logical inclusive
“or.” The output is “true” if either or both of the inputs are “true.” If both inputs are “false,” then the
output is “false.”
XOR GATE
The XOR (exclusive-OR ) gate acts in the same way as the logical “either/or.” The output is “true”
if either, but not both, of the inputs, are “true.” The output is “false” if both inputs are “false” or if
both inputs are “true.” Another way of looking at this circuit is to observe that the output is 1 if the
inputs are different, but 0 if the inputs are the same.
Inverter or NOT Gate
A logical inverter, sometimes called a NOT gate to differentiate it from other types of electronic
inverter devices, has only one input. It reverses the logic state.
NAND GATE
The NAND gate operates as an AND gate followed by a NOT gate. It acts in the manner of the
logical operation “and” followed by negation. The output is “false” if both inputs are “true.”
Otherwise, the output is “true.”
NOR GATE
The NOR gate is a combination OR gate followed by an inverter. Its output is “true” if both inputs
are “false.” Otherwise, the output is “false.”
XNOR Gate
The XNOR gate is a combination inverter / NOT gate followed by an XOR gate. Its output is “true”
if both inputs are “false.” Otherwise, the output is “false.”
Using combinations of logic gates, complex operations can be performed. In theory, there is no
limit to the number of gates that can be arrayed together in a single device. But in practice, there
is a limit to the number of gates that can be packed into a given physical space. Arrays of logic
gates are found in digital integrated circuits (ICs). As IC technology advances, the required
physical volume for each individual logic gate decreases and digital devices of the same or
smaller size become capable of performing ever-more-complicated operations at ever-increasing
speeds.
EVALUATION
1. State the uses of standard Logic Circuit
2. Mention four types of gate
3. Draw the symbol of any four logic gate
4. Construction the truth table of AND, OR, NOR, NAND gate
5. Write the boolean expression of AND, OR, NOR, NAND gate
Database administrator – Takes overall responsibility for the usage, accuracy, efficiency,
security, maintenance of an organization’s database systems. Coordinates development and
use of data resources.
Computer security specialist – Protects computer systems from illegal intrusions, viruses, data
theft, fraud, or other forms of tampering.
Chief information officer (CIO) – Serves as the highest information services executive for a
major corporation. Responsible for long-term planning and setting organization-wide policy and
standards relating to all computer-related activities.
Network administrator
Takes overall responsibility for the operation and planning for a local or wide-area computer
network. Plans expansion; selects appropriate network operating system and software tools;
configures major features; deals with the connection between local network and Internet;
establish procedures for support staff and users.
Data miner
Analyzes databases in business, government, or scientific applications in order to extract
additional information or find useful patterns. Needs familiarity with major database and statistical
packages.
Webmaster
Creates or maintains a Web site. Provides content and programming or supervises writers and
programmers. Monitors the performance and popularity of the site. Provides secure forms and
transactions for Internet-based businesses.
Multimedia developer
Uses design and programming skills to create interactive multimedia products that combine
sound, images, and text.
Technical writer
Writes instructional guides and other materials that explain how to use computer systems,
software, operating systems, or programming tools. Researches and writes reviews and feature
articles suited to specific reader profiles.
CERTIFICATE: This is the process of verifying the technical knowledge of an individual who has
demonstrated competence in a particular area, today there are more than 200 certificates
available, such as.
1. MICROSOFT CERTIFIED APPLICATION SPECIALIST
2. MICROSOFT CERTIFIED APPLICATION PROFESSIONAL
3. MICROSOFT CERTIFIED DESKTOP TECHNICIANS and so many more.
EVALUATION
1. Briefly explain the career opportunities of computer science graduates
Summary Note for Year 9, Week Ten: Qualities of Good Computer Professional
Computer professionals are information technology experts. The definition has extended to those
involved in the internet industry too, those who deal with the computer industry to develop
something. They may design, build, write or sell software. A computer professional is a person
who works in the field of
COMPUTER SCIENTIST
1. Good knowledge of a Computer
2. Ability to repair and maintain a computer
3. Must be able to identify good computers
PROGRAMMER/SOFTWARE ENGINEER
1. Good computer programmer must be able to give instruction to the computer.
2. Use of computer programming language to develop programs.
3. Ability to develop a good and durable program.
4. Must be able to detect or debug a problem in a program.
COMPUTER INSTRUCTOR/EDUCATOR
1. Teaches and trains people on the use, misuse and care of computer
2. Impacts knowledge into computer illiterates
3. Good knowledge of computer and effective operation
COMPUTER TECHNICIANS
1. Good computer technician repairs computer
2. Assembles computer parts
3. Troubles shooting of Computer problems
4. Computer hardware maintenance and repair
NETWORKING ENGINEER
1. Computer networking
2. Troubleshooting of faulty networks
3. Network configuration.
4. Internet networking.
5. Network update knowledge
COMPUTER OPERATOR
1. Fast typing skills.
2. Use of graphics package for design
3. Excellent use of computer for documents
4. The effective operation of the Computer
EVALUATION
1. State some of the qualities needed to be most successful in the computer and IT world
2. State general qualities of a good Computer Professional