0% found this document useful (0 votes)
3 views19 pages

E-Note SS Two 2nd Term Data Processing

The document outlines the second term e-learning scheme for Data Processing in SS2, covering topics such as the relational model, file organization, and the internet. It includes detailed content on integrity constraints, querying relational data, types of file organization, and practical SQL examples. Additionally, it provides evaluation questions, weekend assignments, and references for further reading.

Uploaded by

nwoke7616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views19 pages

E-Note SS Two 2nd Term Data Processing

The document outlines the second term e-learning scheme for Data Processing in SS2, covering topics such as the relational model, file organization, and the internet. It includes detailed content on integrity constraints, querying relational data, types of file organization, and practical SQL examples. Additionally, it provides evaluation questions, weekend assignments, and references for further reading.

Uploaded by

nwoke7616
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 19

SECOND TERM E-LEARNING NOTE

SUBJECT: DATA PROCESSING CLASS: SS 2


SCHEME OF WORK
WEEK TOPIC

1. Relational Model: (c) Enforcing Integrity constraints (d) Querying relational data
2. File Organization: (a) Types of file organization (b) Comparison of Three file
organization (c) basic operation on file
THEME: INFORMATION TRANSMISSION
3. Internet I: (a) Definition of internet(b) Internet browsers (c)Benefits of Internet
4. First Continuous Assessment (1st CA)
5. Internet II: (d) Internet Security (e) Abuse of the Internet
THEME: TOOLS FOR PROCESSING INFORMATION
6. Midterm Break
7. Presentation Packages: (a) Meaning of Presentation package (b) Uses of
presentation package (c) Getting Started with PowerPoint (Practical Session)
8. Second Continuous Assessment (2nd CA)
9. Web Design Packages: (a) Meaning of web design packages (b) Examples of web
design packages (c) Uses of web design packages (d) Components of web design
packages
10.Revision
11.Examination
12.Examination/Closing

REFERENCES:
1. Data Processing for Senior Secondary School 2, by Adedapo F.O
2. HiiT @ School, Computer Studies for Senior Secondary Education
3. Basic Concepts of Computer Studies for Senior Secondary Schools, by Samuel
Ayokunle and Adeleke Adekola.
WEEK ONE:
TOPIC: RELATIONAL MODEL II

CONTENT:
1. Enforcing integrity constraints
2. Querying relational data

SUB-TOPIC 1: ENFORCING INTEGRITY CONSTRAINTS


We will consider the following constraints:
Constraints Meaning

NOT NULL Enforces a column not to accept NULL values, that is the field cannot be
empty.

UNIQUE KEY Prevents duplicate data

PRIMARY KEY This constraint uniquely identifies each record in a database table. It always
carries a unique value

FOREIGN KEY This enforces a constraint that prevents actions that would destroy links
between tables, and prevents invalid data being inserted.

CHECK If you define a CHECK constraint on a single column it allows only certain
values for this column. If you define a CHECK constraint on a table it can limit
the values in certain columns based on values in other columns in the row.

DEFAULT allow you to specify a value that the database will use to populate fields that
are left blank in the input source.

1. SQL NOT NULL Constraint:


The following SQL enforces student_id and Firstname column to not accept NULL values:
CREATE TABLE student
(
Student_id int NOT NULL,
FirstName varchar(255) NOT NULL,
LastName,
Age,
Class,
Scores
)

2. SQL UNIQUE KEY Constraint:


The following SQL enforces gsm_nocolumn not to accept duplicate values on the teachers table
below. Meaning two teachers cannot be sharing one gsm_no
CREATE TABLE teachers
(
teacher_id int NOT NULL,
FirstName varchar(255) NOT NULL,
LastName,
Age,
email_address,
gsm_noint(11) UNIQUE KEY
)

3. SQL PRIMARY KEY Constraint:


The following SQL constraint uniquely identifies each record in a database table. It must contain
unique values. Each table should have a primary key and cannot be NULL. In most cases, the id is
used as the primary key so we will enforce it on the teacher_id in the SQL syntax below.

CREATE TABLE teachers


(
teacher_idint NOT NULL PRIMARY KEY,
FirstName varchar(255) NOT NULL,
LastName,
Age,
email_address,
gsm_noint(11) UNIQUE KEY
)

4. SQL FOREIGN KEY Constraint:


The FOREIGN KEY in one table points to a PRIMARY KEY in another table. Let us use a student
and subject table to illustrate this
Student Table
Student_id FirstName Lastname Age Class Scores

1 John Hassan 15 ss1 20

2 Mary Adebayo 14 ss1 18

3 Agwu Ifeoluwa 16 ss2 21

Subject Table
Sub_id subject Student_id

1 ICT 2

2 Geography 1

3 Chemistry 2

4 Yoruba 3
CREATE TABLE subject
(
sub_id int NOT NULL, subject varchar(20), Student_ID int,
PRIMARY KEY (sub_id),
FOREIGN KEY (Student_ID),
REFERENCES Student (Student_ID);

SUB-TOPIC 2: QUERYING RELATIONAL DATA


Definition: Queries are the primary mechanism for retrieving information from a database and
consist of questions presented to the database in a predefined format. Many database management
systems use the Structured Query Language (SQL) standard query format.

There are various SQL query statements which we will look at briefly and what they are meant for.
Fetching Data: SQL SELECT Queries
It is a rare database application that doesn't spend much of its time fetching and displaying data.
Once we have data in the database, we want to "slice and dice" it every which way. That is, we want
to look at the data and analyze it in an endless number of different ways, constantly varying the
filtering, sorting, and calculations that we apply to the raw data. The SQL SELECT statement is what
we use to choose, or select, the data that we want returned from the database to our application. It
is the language we use to formulate our question, or query, that we want answered by the database.
We can start out with very simple queries, but the SELECT statement has many different options and
extensions, which provide the great flexibility that we may ultimately need. Our goal is to help you
understand the structure and most common elements of a SELECT statement, so that later you will
be able to understand the many options and nuances and apply them to your specific needs. We'll
start with the bare minimum and slowly add options for greater functionality.

A SQL SELECT statement can be broken down into numerous elements, each beginning with a
keyword. Although it is not necessary, common convention is to write these keywords in all capital
letters. We will focus on the most fundamental and common elements of a SELECT statement,
namely
 SELECT
 FROM
 WHERE
 ORDER BY
The SELECT ... FROM Clause
The most basic SELECT statement has only 2 parts: (1) what columns you want to return and (2) what
table(s) those columns come from.
If we want to retrieve all of the information about all of the students in the student table, we could
use the asterisk (*) as a shortcut for all of the columns, and our query looks like
SELECT * FROM student

If we want only specific columns (as is usually the case), we can/should explicitly specify them in a
comma-separated list, as in; using the student table in the example we had in the previous section,
run the query below:
SELECT student_id, FirstName, LastName, Class FROM student
Result
Student_id FirstName Lastname Class

1 John Hassan Ss2

2 Mary Adebayo Ss1

3 Agwu Ifeoluwa Ss3

Explicitly specifying the desired fields also allows us to control the order in which the fields
are returned, so that if we wanted the last name to appear before the first name, we could
write it this way:
SELECT student_id, LastName, FirstName, Class FROM student

And the result will be:


Student_id LastName Firstname Class

1 John Hassan ss1

2 Mary Adebayo ss1

3 Agwu Ifeoluwa ss2

The WHERE Clause


The next thing we want to do is to start limiting, or filtering, the data we fetch from the database. By
adding a WHERE clause to the SELECT statement, we add one (or more) conditions that must be met
by the selected data. This will limit the number of rows that answer the query and are fetched. In
many cases, this is where most of the "action" of a query takes place.

We can continue with our previous query, and limit it to only those students in ss1:
SELECT student_id, FirstName, LastName, Class FROM student
WHERE Class= 'ss1'

This query will return the following result:


Student_id FirstName Lastname Class

1 John Hassan ss1

2 Mary Adebayo ss1

Only students in ss1 will be echoed. If you want to get other classes you declare it in the query and
the result will be displayed.

The ORDER BY Clause


Until now, we have been discussing filtering the data: that is, defining the conditions that determine
which rows will be included in the final set of rows to be fetched and returned from the database.
Once we have determined which columns and rows will be included in the results of
our SELECT query, we may want to control the order in which the rows appear—sorting the data.
To sort the data rows, we include the ORDER BY clause. The ORDER BY clause includes one or more
column names that specify the sort order. If we return to one of our first SELECT statements, we can
sort its results by Class with the following statement:

SELECT student_id, FirstName, LastName, Class FROM student

ORDER BY Class
The result of the query will arrange the student in order of their class.

And the result will be:


Student_id LastName Firstname Class

1 John Hassan ss1

2 Mary Adebayo ss1

3 Agwu Ifeoluwa ss2

EVALUATION:
i. Define Query.
ii. What elements can we break SELECT statement into?
iii. Differentiate between The WHERE Clause and The ORDER BY Clause

Week end Project;


Prepare a student database with the following fields, Firstname, Lastname, Class, scores and run
queries on it.
WEEK TWO:
TOPIC: FILE ORGANIZATION

CONTENT:
1. Types of file organization
2. Comparison of the Three File Organization
3. Basic Operation on a file

SUB-TOPIC 1: FILE ORGANIZATION


File organization is a way of organizing the data or records in a file. It does not refer to how files are
organized in folders, but how the contents of a file are added and accessed.

Is also a systematical way of arranging record in a file that is stored on a disk. You can access a file of
record in different ways and tailor it in a variety of ways.

TYPES OF FILE ORGANIZATION


There are a large number of ways records can be organized on disk or tape. The main methods of file
organization used for files are;
 Heap File Organization
 Sequential File Organization
 Hash / Direct File Organization
 Cluster File Organization
 Indexed Sequential Access Methods (ISAM)

Heap File Organization


An unordered file, sometimes called a heap file, is the simplest type of file organization.
Records are placed in file in the same order as they are inserted. A new record is inserted in the last
page of the file; if there is insufficient space in the last page, a new page is added to the file. This
makes insertion very efficient. However, as a heap file has no particular ordering with respect to field
values, a linear search must be performed to access a record. A linear search involves reading pages
from the file until the required is found.

Sequential File Organization:


In a sequential file organization, records are organized in the sequence by which they were added.
You cannot insert a new record between existing records, but only at the end of the last record. It is a
simple file organization that allows you to process batches of records in the file without adding or
deleting anything. However, to access a particular record, processing must run through all the other
records above it because it does not generate any random key to identify the location of the record .

Hash File Organization


In a hash file, records are not stored sequentially in a file instead a hash function is used to calculate
the address of the page in which the record is to be stored.
The field on which hash function is calculated is called as Hash field and if that field acts as the key of
the relation then it is called as Hash key. Records are randomly distributed in the file so it is also
called as Random or Direct files. Commonly some arithmetic function is applied to the hash field so
that records will be evenly distributed throughout the file.

Cluster File Organization


A traditional file system is a hierarchical tree of directions and files Implemented on a raw device
partition through the file system. Clustered file organization is not considered good for large
databases. In this mechanism, related records from one or more relations are kept in the same disk
block, that is ordering of records is not based on primary key or search key.

Indexes Sequential Access Method (ISAM)


In an ISAM system, data is organized into records which are composed of fixed length fields. Records
are stored sequentially. A secondary set of hash tables known as indexes contain "pointers" into the
tables, allowing individual records to be retrieved without having to search the entire data set.
It is a data structure that allows the DBMS to locate particular records in a file more quickly and
thereby speed response to user queries. An index in a database is similar to an index in a book. It is
an auxiliary structure associated with a file that can be referred to when searching for an item
of information, just like searching the index of a book, in which we look up a keyword to get a list of
one or more pages the keyword appears on.

SUB-TOPIC 2: Comparison between the Three Files Organization


- A hashed file does not utilize space quite as well as a sorted file, but insertions and deletions are
fast, and equality selections are very fast.
- A heap file has good storage efficiency and supports fast scan, insertion and deletion or records.
However, it is slow for searching.
- A sorted file also offers good storage efficiency, but insertion and deletion of records are slow. It is
quite fast for searching, and it is the best structure for range selections.

SUB-TOPIC 3: BASIC OPERATION ON FILE


Scan: Fetch all records in the file. The pages in the file must be fetched from the disk into the buffer
pool. There is also a CPU overhead per record for locating the record on the page.

Search with equality selection: Fetch all records that satisfy an equality selection, for example, find
the student record for the student with sid 23. Pages that contain qualifying records must be fetched
from the disk, and qualifying records must be located within retrieved pages.

Search with range selection: Fetch all records that satisfy a range selection. For example, find all
students records with name alphabetically after smith.

Insert: Insert a given record into the file. We must identify the page in the file into which the new
record must be inserted, fetch that page from the disk, modify it to include the new record and then
write back the modified page.

Delete: Delete a record that is specified using its record id. We must identify the page in the file into
which the new record must be inserted, fetch that page from the disk, modify and then write it back.

Locate: Every file has a file pointer, which tells the current position where the data is to be read or
written.
Write: User can select to open a file in write mode, the file enables them to edit its contents. It can
be deletion, insertion or modification.

Read: By default, when file are opened in read mode, the file pointer points to the beginning of the
file.

EVALUATION:
(i) Highlight the various methods of organizing files
(ii) Explain any two

GENERAL EVALUATION
(i) Explain any three ways in which files can be compared.

READING ASSIGNMENT
Study the topic ‘Internet’ using your students’ textbook

WEEKEND ASSIGNMENT
1. Records in a .............................. file are inserted as they arrive
(a) Serial (b) sequential (c) indexed (d) random
2. ................ is the collection of related data items or field.
(a) Data item (b) Field (c) Record (d) File
3. ................... is the smallest unit of information stored in computer file
(a) Data item (b) Field (c) Record (d) File
4. ......................... file is referred to as direct access file
(a) Random (b) Indexed (c) Serial (d) Sequential
5. A file that is sorted on a sequence of fields is called………………
(a) Heap file (b) random file (c) Stack file (d) hash file.

ESSAY QUESTION
1. Clearly distinguish between sequential and random file organization
WEEK THREE:
TOPIC: INTERNET I

CONTENT:
1. Definition of Internet
2. Internet Browsers
3. Benefits of Internet

SUB-TOPIC 1: DEFINITION OF INTERNET


The Internet is a global system of interconnected computer networks that use the Standard Internet
Protocol Suite (TCP/IP) to serve billions of users worldwide.

It is a network of networks that consists of millions of private, public, academic, business and
government networks of local to global scope that are linked by a broad array of electronic and
optical networking technologies. Simply put, the Internet is a collection of computers, all linked
together, to share information worldwide. It is the largest computer network in the world.

SUB-TOPIC 2: INTERNET BROWSERS


Is a software application for retrieving, presenting and traversing information resources on the World
Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) that may
be a web page, image, video or other piece of content. Hyperlinks present in resources enable users
easily to navigate their browsers to related resources.

Some popular browsers are: Internet Explorer, Opera, Safari, Chrome, Mozilla,
Netscape navigator,Edge.

Features in Main Browser Window


i. The Title bar
ii. The menu bar
iii. Tools and Help
iv. The tool bar
v. Address bar
Internet Services
1. E-mail: this service permits user to send and receive mail from anywhere in the world.
2. World Wide Web: A network service that gives room for an individual or organization to set up
a special server or site from which other users can obtain special information.
3. Voice and Video Conferencing: business and institution use the internet for voice and video
conferencing and other forms of communication that enable people to telecommunicate.
4. E-commerce: this includes advertising, selling, buying, distributing product and providing
customer service on line.
5. File Sharing: this lets individuals swap music, movie, photos and applications, provided they do
not violate copy right protection.
6. File Transfer Protocol: This was one of the first internet service developed and it allows users to
move files from one computer to another.
7. Gopher: this offers downloaded files with some content description to make it easier to find the
file needed.
8. Websites: Is a collection of related web pages, including multimedia content, typically identified
with a common domain name, and published on at least one web server.
9. Webpage: Is a document that is suitable for the World Wide Web and web browsers. A web
browser displays a web page on a monitor or mobile device. The web page is what displays, but
the term also refers to a computer file, usually written in HTML or comparable markup language.
10. Uniform Resources Locator: Colloquially termed a web address, is a reference to a web
resource that specifies its location on a computer network and a mechanism for retrieving it. A
URL is a specific type of Uniform Resource Identifier (URI), although many people use the two
terms interchangeably.
Components of a URL
i. Protocol
ii. Http and FTP
iii. Hostname: Is the name of the computer that contains the information you want to access.
iv. Data path: is the string that specifies the path to the file that you wish to retrieve.

SUB-TOPIC 3: BENEFITS OF INTERNET TO THE SOCIETY


The Internet plays a major role in the society in the following application areas
1. Education/E-Learning: With the internet, people can get educational materials and read them in
preparation for examinations, or use them for school assignments. The internet also enhances
electronic learning whereby courses or subjects are taught online using audio and or visual
materials.
2. E-Registration: The internet provides users with facilities for online registration for examinations
like WAEC, NECO and JAMB.
3. Entertainment: The internet kills boredom and enhances leisure by providing its users with latest
entertainment in the form of movies, games, News and many more.
4. Communication: This is one of the key benefits of the internet. The internet provides many
means by which users can communicate with friends, family, colleagues, and lots more through
email, chat messenger, face books, etc.
5. E-Banking: The internet can be used as a tool to carry out transactions with banks irrespective of
user’s location.
6. E-Commerce: Internet is also a tool for E- Commerce. It can allow users to buy and sell their
goods and services online regardless of their location.
EVALUATION
1. Define the term “Internet”
2. State FIVE benefits of the Internet to the society.

GENERAL EVALUATION
(i) List Five Examples of an internet browser
(ii) What is E-Banking?

READING ASSIGNMENT
Study the topic ‘Internet Security’ using your students’ textbook

WEEKEND ASSIGNMENT
1. An internet benefit that helps people to get materials and read them in preparation for
examination is called……….. (a) E-Learning (b) reference files (c) E-resources (d) E-coordination
2. A term used to refer to the process of accessing and viewing web pages on the Internet is
called………… (a) Browse (b) Opera (c) Internet (d) scroll
3. All are examples of internet browsers except........... (a) Opera (b) Safari (c) Chrome (d) Emoticon
4. A global system of interconnected computer network that uses the standard Protocol suite is
called (a) Internet (b) Selection (c) user net (d) Sequential
5. A browser can also be called……………. (a)Web browser (b) Organization browser(c) Storage
browser (d) Correction browser
WEEK FOUR: FIRST CONTINUOUS ASSESSMENT (1ST CA)

WEEK FIVE:
TOPIC: THE INTERNET II

CONTENT:
(a) Internet Security
(b) Abuse of the Internet

SUB-TOPIC 1: INTERNET SECURITY


What Is Security?
In the digital world, security refers to the precautionary steps taken to protect computing resources
against cybercrime. In this context, the primary goal of security is to prevent hackers from gaining
access to our computers and networks. Considering our daily involvement with a computer, the
internet presents a formidable enemy for cyber security experts. Millions of cyberattacks occur every
minute, bombarding our networks and personal computers. Therefore, an unprotected network or
computer may become infected or compromised after connecting to the internet, making internet
security a high priority.

What Is Internet Security?


Is a branch of computer security specifically related to the Internet, often involving browser
security but also network security on a more general level as it applies to other applications
or operating systems on a whole.

Computer security focuses on the precautions taken to protect hardware and software components
both in the private and commercial worlds. Internet security, on the other hand, focuses on
preventing cyberattacks happening through the internet by concentrating on browser and network
security. Internet security practices involve the use of encryption, virus protection, and malware
detection, as well as the installation of firewalls and other prevention measures.

Its objective is to establish rules and measures to use against attack over the internet. The internet
represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,
such as phishing. Different methods have been used to protect the transfer of data, including
encryption.

Other methods of Internet Security are


I. Use of cryptographic methods and protocols that have been developed for securing
communication over the internet.
II. IPSec Protocol- This provides security and authentication at the IP layer by using cryptography to
protect the content.

Types of Internet Security


i. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods
and protocol that have been put in place to protect communication over the internet.
ii. IPSec Protocol: This protocol is designed to protect communication in a secure manner using
TCP/IP, and it provides security and authentication at the IP layer by transforming data using
encryption.
iii. Security token: Some online sites offer customers the ability to use a six-digit code which
randomly changes every 30–60 seconds on a security token. The keys on the security token have
built in mathematical computations and manipulate numbers based on the current time built
into the device. This means that every thirty seconds there is only a certain array of numbers
possible which would be correct to validate access to the online account.
iv. Firewall: A computer firewall controls access between networks. It generally consists of
gateways and filters which vary from one firewall to another. Firewalls also screen network
traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server
between SMTP and Hypertext Transfer Protocol (HTTP) connections
v. Antivirus: Antivirus software and Internet security programs can protect a programmable
device from attack by detecting and eliminating viruses; Antivirus software was mainly
shareware in the early years of the Internet, but there are now several free security applications
on the Internet to choose from for all platforms.

SUB-TOPIC 2: ABUSES OF THE INTERNET


In spite of its benefits, some people use the internet for negative things. Abuses of the internet
include:
1. Fraud: Some people to try to deceive and collect money from them. This is a serious crime.
2. Pornography: Many websites that look innocent have been used to publish pornographic
materials several people have become addicted to watching pornography on the internet.
3. Spam: Spam is e-mail that one has not requested for. Spam is becoming a problem on the
internet because many mailboxes are filled up with a large number of unrequested e-mails daily.
E-mail users have to take time to sort through spam to find the genuine e-mail; this process takes
time and money. Most ISPs provide software that try to separate genuine e-mail from Spam. Such
software’s are called Spam filters.
4. Addiction: some people get addicted to browsing all day. This causes their school and other work
to suffer.
5. Hacking: Unauthorized access to another computer which can be successful or unsuccessful.
6. Sniffing: Capturing information that was intended for other machines.
7. Spoofing attack: Creating half open connection structures on the victim’s system making it
impossible for the victim to accept any new incoming connection until the file expires.
8. False e-mail address: Used with the intention of masking identity.
9. Mail bomb: Sending of multiple e-mail messages to an address with the sole intent of
overloading the recipients’ mailbox.
10. TCP SYN Flooding attack: Sending multiple TCP SYN packets to another computer with the
intention of exhausting the targets resources.

EVALUATION:
1. Mention THREE internet security measures.
2. State EIGHT abuses of the internet.
3. Mention five abuses of the internet.

READING ASSIGNMENT: Students are to read ‘Presentation Package of student’s textbook 2 by


‘Adedapo F.O.
GENERAL EVALUATION:
1. What is ‘Spam mail’?
2. Define internet insecurity.
3. State any THREE internet security method you know, and explain ONE.

WEEKEND ASSIGNMENT:
1. A Mail that one has not requested for is called ………… (a) Spam (b) View (c) Delete (d) Creation
2. …………… is not a measure of internet security (a) Encryption (b) protocols (c) Cryptographic
methods(d) Usenet
3. A secret word or string of characters that is used for authentication, to prove identity or gain
access to a resource -------- (a) Computer file (b) Manual file (c) Password (d) Overwriting
4. A branch of computer security specifically related to the internet is called…… (a) Internet breach
(b) Encryption (c) dotted file (d) Anti spam.
5. ------------ is not a way in which the internet can be abused (a) Mail bomb (b) Hacking (c) Spam
mails (d) TCP transponder

WEEK SIX:
TOPIC: PRESENTATION PACKAGE

CONTENT:
(a) Meaning of Presentation Package
(b) Use of Presentation Package
(c) Getting Started with PowerPoint (Practical Session)

SUB-TOPIC 1: MEANING OF PRESENTATION PACKAGE


A Presentation package is a computer software package that is used to display information usually in
the form of a slide show. It is often called graphic presentation. A presentation package can also be
defined as software for creating documents or animations for presentation.

Examples of Presentation Packages are;


1. Microsoft PowerPoint.
2. Harvard graphics
3. Windows movie maker
4. Macromedia flash
5. OpenOffice.org Impress

SUB-TOPIC 2: USES OF PRESENTATION PACKAGE


Presentation packages are used to display Information usually in the form of a slide show via the
integration of multimedia such as digital video and sounds. Other uses of the internet are;
i. Multimedia lectures
ii. Student reports
iii. Handouts
iv. Multimedia story books

Getting started with PowerPoint


- Click on start menu
- Point to program icon
- Click on Microsoft PowerPoint

PowerPoint Environment

PowerPoint View
PowerPoint provides different types of views to work with, while a presentation is being created.
These views are:
i. Slide view
ii. Outline view
iii. Normal view or Tri-pane view
iv. Slide sorter view
v. Note view
vi. Master view
vii. Slide show

Slide View
This slide view is used to view slides one by one on the screen. In slide view you can insert text,
movie clips, sound, objects like clip art, Auto Shapes and Word Art.
Outline View
In this view you can re-arrange your slides and bullets that you have inserted in your slide. In this
view you can see how your main points flow from slide to slide.
Normal View
This view consists of three pane
- slide pane-to enter and edit text and objects in slides
- Outlines pane-to rearrange the slide
- Notes pane-to insert the information for the speaker or the audience.
Note View
In notes page view, you can type speaker notes to use during your presentation. You can as well
have the hard copy of your notes for reference.
Master View
A company logo or formatting you desired to appear on every slide, notes page or handout can
be done on this view.
Slide show view
This view is used to view the presentation on the screen. A slide show is a full-screen display of
each page in a presentation.

NOTE:
Pls educator, treat all other tools use in PowerPoint.

EVALUATION:
1. What is a Presentation Package?
2. State three (3) Examples of Presentation package

GENERAL EVALUATION:
1. State the general use of a presentation package.

READING ASSIGNMENT:
Students are expected to read ‘Web Design packages’ on the next page of Handbook on
Computer studies for SS2.

WEEKEND ASSIGNMENT:
1. PowerPoint can use existing documents of ………… (a) Word (b) Access (c) pseudo codes (d) Excel
2. ----------- is a software used for making presentations (a) PowerPoint (b) Excel (c) Access(d)
Publisher
3. ---------- Means use of sounds in presentations (a) Animation (b) Backing (c) media (d) storage
4. …………… is not a feature of presentation packages (a) Creation of slides (b) Insertion of video and
audio (c) Animation (d) SMS
5. One of these is not an example of a presentation package? (a) Harvard graphics (b) Ms-
PowerPoint (c) Hacking (d) None

WEEK SEVEN: MIDTERM BREAK

WEEK EIGHT: SECOND CONTINUOUS ASSESSMENT (2ND CA)

WEEK NINE:
TOPIC: WEB DESIGN PACKAGE

CONTENT:
(a) Meaning of Web Design Package
(b) Examples of Web Design Package
(c) Uses of Web Design Package
(d) Components of Web Design Package

SUB-TOPIC 1: Meaning of Web Design Package


A web Design package is a computer program used to create, edit and update web pages and the
websites. The purpose of such a program is to make it easier for the designer to work with page and
site elements through a graphical user interface that displays the desired result, typically in a
WYSIWYG (What you see is what you get) manner, while removing the need for the designer to have
to work with the actual code that produces the result (which includes HTML, CSS, JavaScript, and
others).
SUB-TOPIC 2: Examples of Web Design Packages are;
 Adobe Dreamweaver,
 Net Objects Fusion (which are commercial) ,
 Note pad++
 Amaya,
 WebPlus X4
 Antenna Web Design Studio 3
 iweb
 Website Pro 4
 Microsoft FrontPage
 Photon FX Easy

SUB-TOPIC 3: Uses of Web Design Package


A web design package is used to create web pages in the Hyper text markup Language (HTML) format
to be rendered by a client application called a web browser.
Some of the uses of web design package include;
1. The split view option of a web design package allow users to code in Code view and preview in
Design view without the hassle of switching from design and code view tab.
2. Dynamic Web Templates (DWT) are included which allow users to create a single template that
could be used across multiple pages and even the whole web sites.
3. Interactive Buttons give users a new easy way to create web graphics for navigation and links
eliminating the need for a complicated image-editing package such as Adobe Photoshop.
4. Accessibility Checker gives the user the ability to check if their code is standard compliant and
that their web site is easily accessible for people with disabilities.
5. IntelliSense which is a form of auto completion is a key feature that assist the user while typing in
code view.
6. Code Snippets gives users the advantage to create snippets of their commonly used pieces of
code allowing them to store it for easy access when it is next needed.

SUB-TOPIC 4: Component of Web Design Package


i. Hit Counter: this gives details about the number of a visitor to a website through a graphic
counter. If you want to know the total number of a visitor who visited a particular website, then
have a look at the Hit Counter.
ii. Advertising: The advertising banner will produce an ad banner rotator with images you prefer.
You can also spell out transitions within graphics.
iii. Animated button: it uses a java applet to generate button that responds to mouse – over
movement. You can make use of these buttons the same way you use hyperlinks.
iv. Table of Content: The table of content will repeatedly create a page with hyperlink to each
page on your site. The table of content is set up in a ‘tree’ format.
v. Marquees: A marquee is a text that scrolls across the screen. The Marquee is used when you
want to draw attention to a certain point.
vi. Include Page: this will include a page into another page. They are used to include content of a
page into another page. When the include page is customized, the page with the include code is
automatically updated.
vii. Scheduled Pictures: This component can be used when you have a limited time offer or you
want to add variety to your page.
viii. Search Form: The search form component lets one have an easy way to allow ones visitors to
search ones site. This component is used to create a simple search engine for ones site.

EVALUATION
1. Define a Web Design Package
2. Mention FIVE uses of Web Design package.

GENERAL EVALUATION
1. State the function of a DWT.

READING ASSIGNMENT
Read and summarize the “Components of a web design package”.

WEEKEND ASSIGNMENT
1. ……………… is included which allow users to create a single template that could be used across
multiple pages and even the whole web site (a) DWT(b) Access (c) pseudo codes (d) Excel
2. ------------ gives users the advantage to create snippets (a) Code Snippets (b) Excel (c) Access(d)
Publisher
3. A form of auto completion is a key feature that assists the user while typing in code view.
(a) Animation (b) Backing (c) intellisense (d) snippets
4. …………… give users a new easy way to create web graphics for navigation and links
(a) Interactive buttons (b) Insertion codes (c) Animation (d) SMS
5. One of these is not an example of a Web design package package?
(a) Adobe Dreamweaver (b) Shuttle (c) Amaya (d) NetObjects

WEEK 10: REVISION

WEEK 11: EXAMINATION

WEEK 12: EXAMINATION/CLOSING

You might also like