Topic outline
UNIT 1:COMPUTER MAINTENANCE
Introductory activity 1.0
1. Observe the image below and answer related questions:
a. What is the task being accomplished by the person in the image above
b. List out any five names of devices found on the figure above
1.1. HARDWARE:
Hardware refers to any physical or tangible part of a computer. The computer hardware consist of internal and external parts.
A. Internal computer components Those are all components that are found inside the system unit such as disk drives, motherboard, processor, power supply, memory, etc.
B. External computer components
External components of a computer also known as peripherals refer to all externals devices connected to central housing known as the system unit. They can be input devices, output devices such as the monitor or storage devices such as a hard drive or flash drive, memory card. Peripherals devices are connected to the system unit through different ports found on the computer.
1.1.1. Elements of the computer system unit and their roles:
Activity 1.1
1. Open the system unit cover to expose the internal components as shown in Figure below
a. Identify various components inside the system unit
b. Briefly state the role of each component identified in a)
The system unit, which houses all the internal components of a computer, has a number of components inside it such as the power supply and the motherboard on which are connected other parts like microprocessor (or CPU) disk drives, adapter cards and memory. Different components of the computer case and their roles are elaborated in the content to follow.
Different components of the computer case and their roles are elaborated in the content to follow.
A. Power supply
The power supply is unit is the one which is directly connected to the power outlet through the power cable. The Power Supply Unit (PSU) converts alternating current (AC) from the power outlet to direct current (DC) required by internal computer components.
B. Motherboard
A motherboard also known as circuit board is the main printed circuit board onto which all components of the computer interconnect into one another. It also allows communication of those different parts as it has routes from/to those parts.
Motherboard size varies depending on whether a computer is a desktop or a laptop and the size also varies depending on manufacturers but the devices found on each and their functions don’t vary. A particular desktop computer looks like in the image below:
On the motherboard are connected different devices which are CPU, hard disk, video card, RAM, ROM, expansion slots, data buses, etc.
B.1. Central processing unit (CPU)
The Central Processing Unit (CPU), also known as the processor or microprocessor, is the most important part of the computer which is considered as the “brain” of the computer because all processing activities are carried out inside it.
The processor controls the retrieval, interpretation, and execution of instructions in a computer.
It consists of three components namely the Arithmetic and Logic Unit (ALU), the Control Unit (CU) and the memory units, known as registers.
i. The Arithmetic and Logic Unit (ALU)
It is the part of the CPU that performs two main functions, namely arithmetic operations such as addition, subtraction, division, and multiplication and logical operations such as OR, AND, and NOT among others. These two functions are necessary in the execution of different instructions by the CPU.
ii. The control unit (CU)
The control unit coordinates all processing activities in the CPU as well as input, storage and output operations. It also performs tasks like controlling, supervising. and overseeing all the activities of the computer. It oversees fetching instructions from the main memory, decoding the instructions in a format the computer can understand, executes the instructions by issuing commands to respective components where action is supposed to be taken and controlling the transfer of data and information within the available storage space.
iii. Registers
Registers are temporary storage locations located inside the processor that are used to hold data, instructions or information waiting processing or output. There are four types of registers namely: instruction register, accumulator register, address register, and storage register. All the four types of registers store information that is temporarily needed for program execution. The Instruction register holds an instruction before it is converted to machine readable format, the Address register stores the address of the next instruction to be processed, the Accumulator register holds the last processing step of the Arithmetic Logic Unit and the Storage register holds information waiting to be outputted.
B.2. Hard disk
A hard disk also known as hard disk drive (HDD) is a non-volatile computer storage device containing magnetic disks or platters with high speed. It is a secondary storage device used to store data and program permanently, the term Non-volatile means data and program are retained even when the computer is turned off.
B.3. Video card
Video cards also referred to as graphic cards are components that are connected to the motherboard of a computer system and generates the quality of images on output devices such as screen. Graphic cards have processors or a graphic processing unit and are directly connected to the motherboard which allows it to accept information from the CPU and send output to the monitor.
B.4. Random Access Memory (RAM)
Random access memory (RAM) also known as working storage is used to hold instructions and data needed by the currently running programs. It is referred to as random access because its content can be read directly regardless of the sequence in which it was stored.
RAM is a temporary or volatile storage because its content disappears when the computer is switched off. Therefore, before switching off the computer, it is important to save the work in a device that offers relatively permanent storage facility.
B.5. ROM
Read-Only Memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. As the name indicates; data stored in ROM may only be read and cannot be electronically modified after the manufacturer of the memory device. Unlike RAM (Random Access Memory), ROM is non-volatile, which means it keeps its contents regardless of whether or not it has power.
B.6. Expansion slot
Expansion slot alternatively referred to as bus slot or port is a connection on the motherboard to which an expansion card can be plugged in order to expand the functionalities of a computer.
B.7. Data buses
Data buses are those used to transfer data and instructions between components inside the computer.
B.8 Complementary Metal- Oxide Semi-Conductor (CMOS) Battery
Complementary Metal- Oxide Semi-Conductor (CMOS) is the term usually used to describe the small amount of memory on a computer motherboard that stores the BIOS settings. The basic activities carried out by CMOS is to test the availability of computer basic input and output devices (POST) and make sure no errors exist before loading the operating system.
APPLICATION ACTIVITY 1.1
1. Explain three types of ports available on a desktop or laptop computer.
2. Research on the internet about primary, secondary and tertiary memory and answer the questions below:
a. Which devices are referred to as primary, secondary or tertiary storage devices?
b. Why are some of these devices referred to as mass storage devices?
1.1.2. Computer maintenance principles
Activity 1.2
1. Identify five factors that need to be considered in order to minimize health risks such as RSI (Repetitive Strain Injuries) and eye strain while using computer.
2. Explain why it is not advisable to take food substances and drinks in the computer lab.
Computers are expensive to acquire. They are also useful to human being because they carry out tasks that are sometimes so difficult. As an important tool in the life of a human, a computer needs to be in good working conditions. Some computer components can easily get damaged hence need to be handled with care. To protect computers, certain rules, precautions and practices must be obeyed while using computers and their components. This would help to avoid damage to the computers.
Computer maintenance is the practice of keeping computers in a good state. Computer maintenance can be carried out on the hardware or software. The principles of software maintenance can be updates firmware, operating system, application and data security such as encryption, cache clearing, and secure deletion. On the hardware side of maintenance there can be cleaning and properly connecting hardware components, monitoring peripherals, maintaining cooling and testing individual components for integrity such as power supplies, RAM modules and the hard disk. On the software side there is running different tools and software aimed at optimizing the working of a computer.
Below are principles to be followed for computer maintenance:
A. Hardware:
1. Clean dust from the computer.
Computers are some of the most efficient dust collectors. Apart from looking gross and possibly being an allergy hazard, a dusty computer will trap heat, which can reduce its performance and lifespan.
2. Clean up the cabling and everything else
Cables may collect a lot of dust as they are sometimes on the floor. If there are many peripherals consider cleaning them regularly.
3. Organize the installation disks
Keep memories for different software organized. Don’t mix CDs with memory sticks or external memories and separate each memory depending on the type of software stored. Installation software can be Operating systems, application and utility software.
4. Properly interconnects components
Electronic device components are designed to fit into one another without using mechanical force, when interconnecting a component into another requires force this may be an indication of connecting it wrongly and it can result in the breaking of pins making the whole device unusable.
B. Software
1. Properly switch on/off the computer
To properly switch off the computer gives time for the whole process required to unload running programs. Switch off the computer when all programs are closed and use the available computer menu (click on Start then on Shut down). Never press the power button for switching off the computer. When programs fail to close use the combination key Ctlr + Alt + Delete to open the task manager which will help in closing those stubborn programs.
2. Delete unused files and programs
Unused Files and empty folders occupy space and make the computer run slowly. Delete temporary files, old audios and videos as these occupy bigger space. Delete also programs that are not used and don’t keep two versions of the same program if they are not both needed.
3. Back up the data.
A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data backup should be done regularly in order to avoid total catastrophe in case there is a problem with the computer.
4. Run antivirus and scans regularly
Antivirus software is a type of utility software used for scanning and removing viruses from a computer. Scan so as to avoid computer being infested.
5. Clean up the OS
Disk cleanup is a maintenance utility used to free up space on a hard disk by deleting unnecessary files and Windows components that are no longer in use. This includes temporary internet files, downloaded program files and files in the recycle bin. The disk cleans up procedure will be discussed later.
6. Clean up the software.
Every few months, look through the ‘Add or Remove Programs’ interface that is found in the control panel. If there’s a software that is no longer needed, it must be deleted.
7. Update everything
Check for updates for the hardware and software. This includes running Windows Updates, checking for updated drivers, and checking for software patches.
8. Defragment
Defragmentation is the process of moving file fragments to contiguous clusters to optimize the storage space and performance.
APPLICATION ACTIVITY 1.2
1. Explain the importance of computer maintenance
2. Highlighting some routine maintenance practices that need to be carried out in a computer laboratory.
1.1.3. Computer capacity
Activity 1.3
One day, Josiane wanted to borrow films from Paul who had many but when she went to Paul’s home with her flash disk to borrow, the flash was able to keep only two. a. What should Josiane do so as to get all the films? b. The two films stored on the flash were of equal size and the flash dish’s size is 1GB. What is the size of each film?
A. Storage size
In digital computers, data is represented using a sequence of bits, bytes and words. A bit is a short form for binary digit referring to a single digit which can be either 0 or 1 used to represent any data in digital computers. In other words, a bit is the smallest unit used to represent data in digital computers. A byte is a storage unit capable of representing a single character, such as a letter, number or symbol. Technically, computers represent any type of data using a sequence of 8 bits. A byte can store 28 or 256 different values, which is sufficient to represent standard ASCII characters (letters, numbers and symbols)
A word is a unit of data used by a particular processor
Storage capacity also known as storage size refers to the amount of data a storage device can hold. It is measured in kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (TB). Since most files contain thousands of bytes, file sizes are often measured in kilobytes. Larger files, such as images, videos, and audio files, contain millions of bytes and therefore are measured in megabytes. Modern storage devices can store thousands of these files, that is why storage capacity is typically measured in gigabytes or even terabytes for larger memories.
Standard units of measurement used for data storage are in the table below:
A.1. Reading memory/storage size
It is possible to know the size of the memory plugged in a computer or found inside it.
I. Hard disk size
The hard disk size and its different disks can be viewed by going to the Computer or This PC icon depending on the operating system. These icons can be found on the desktop or on the startup menu. The window below will appear:
The window above shows that the computer has three disks each disk having respectively 297.48GB, 100 MB and 500 MB of size. The size of the hard disk is obtained by summing up the size of all the individual disks.
NB: When there is an external memory mounted on the computer, the name of that memory will be displayed in the window used to view the hard disk’s size and the size of that memory can also be viewed in the same window.
ii. RAM size
Proceed through the following steps to obtain basic information regarding the capacity of primary memory (RAM) installed in the computer.
Press control panel icon
Through all Control Panel Items select System. A shortcut can also be used by using Right click on this PC icon and select properties. The figure below showing information of installed RAM will appear.
B. Processing speed
Processing speed is defined as the number of cycles per second at which the central processing unit (CPU) of a computer operates and is able to process information. It is measured in megahertz and is essential to the ability of a computer to run applications.
The processing speed is measured in terms of Clock Speed which is measured in gigahertz (GHz), with a higher number equating to a higher clock speed. Faster clock speeds mean that tasks ordered from CPU are completed quicker, making the computer user experience seamless. The processor speed can be viewed using the same window as the one used to view the RAM size.
APPLICATION ACTIVITY 1.3
1. If a CD contains 700 MB, how many number of CDs a DVD of 4,7 GB can contain ?
2. If a 4MB document is downloaded within 6 seconds, what time (in hours) is required to download a 4GB movie?
1.1.4. Identifying and addressing hardware issues
Activity 1.4
a. Explain how you would connect both projector and monitor to a single computer.
Computers are built with all security to protect sensitive components and hardware housed inside a casing against any form of dust and other harsh elements. However, some common computer hardware problems occur despite the protection. It’s very crucial to identify and recognize such problems. The following are some of the commonly found hardware related problems on computers.
1.1.4.1. Common hardware related problems
A. The Check POST test fails
POST stands for “Power on Self-Test”. This is part of a computer’s startup program used to diagnose the keyboard, random access memory (RAM), disk drives and other hardware to make sure they are working properly. If the POST detects any errors in the hardware, it will either display a text error message on the screen or a series of short and long beeps.
If an error message appears as the computer is booted, read careful the error message and correct it or type the exact error message into a search engine to find more information about it.
B. Blank monitors
A blank monitor is the most common computer problem. Most people who work with computers might have dealt with such non-working blank monitor at least once. In such cases, first and foremost check the supply cord and power systems. Sometimes, the video cable might be loosened. Just push the video cable and place it again.
C. Mouse Problems
The mouse is used for a variety of purposes, such as playing games or opening files and moreover, it facilitates easy navigation. The most common problems related to the mouse include failure to move, connection problems, freezing on the screen or damage to the mouse. Mouse with PS/2 connection are prone to damages in its pins, once such a mouse is not functioning its pins must be checked for blockage or bending.
D. Jumpy Mouse
A jumpy mouse is just a muted mouse that cannot be scrolled. In case of a track and ball mouse the problem can be solved by opening the ball container, removing the excess debris and cleaning the dirt that lines the rollers. For an optical mouse, eliminate the dust that has collected around the optical sensor.
E. Computer does not recognize USB
In this case, even when the USB is connected, the computer might not be able to recognize it and hence displaying errors like “Device not recognized” This might be due to the USB connector problems or the software malfunctions.
F. Keyboard Problems
Keyboard is a vital part of any computer. It not only allows typing, but also gives commands. Common potential problems with the keyboard include keyboards that will not connect to the computer, stuck keys, broken keyboards or keyboards where the letters end up jumbled.
G. Power Cord Problems
Whether it is a laptop or a desktop, power cords are a vital part of any computer. A laptop can run on batteries for a limited amount of time but then needs the power cord for recharging. The most common problem with the power cord is an improper connection.
H. Motherboard Problems
The motherboard has several parts of the computer including the RAM, BIOS system, mass storage and CPU. The computer motherboard contains several devices, which can create numerous potential problems. Problems with the motherboard range from too little RAM to BIOS problems. Fixing the problems will depend on the specific problem and, in the worst case scenario will require purchasing a new motherboard to fix the problems.
I. Insufficient Memory Processor
-intensive programs also demand a lot of memory. Random access memory (RAM) aides the central processing unit (CPU) by storing instructions linked to common operations. Without enough RAM, software crashes and slowdowns can occur.
1.1.4.2. Checking for hardware problems
Many computer problems are caused by hardware failures or problems with hardware drivers. Windows will usually notify about devices that have problems. Device Manager can be used to check the status of different hardware devices.
The Device Manager which is the Control Panel extension of Microsoft Management Console, provides users an organized, central view of the Windows-recognized hardware attached to a computer. This includes devices like keyboards, hard disk drives, USB devices etc. It sorts out all hardware, listing them on the basis of various criteria and when a device malfunctions or stops working altogether, it immediately notifies the user. Thus, it can be used to control devices, enable or disable them, configure them, identify conflicts between devices, and so forth.
To check for window hardware problem using device manager go through this process:
Open Control Panel
Click on the Hardware and Sound link for Windows 8 or 10 or Click System and Security for Windows 7.
Check under Devices and Printers in Windows 8 and 10, and under System in Windows 7, to find Device Manager.
Once Device Manager is open, user can view device status, update device drivers, enable or disable devices or do hardware management as shown in the figure below:
APPLICATION ACTIVITY 1.4
1. a. Identify the common hardware problems that you used to face with while using computer
b. How can you proceed to solve the problem above?
Note: Depending on version of Windows, Control Panel is usually available from the Start Menu or the Apps screen.
1.1.5. Assembling a computer & disassembling a computer
Activity 1.5
1. By searching the internet identify tools used in assembling and disassembling a computer
2. Explain the reasons that may prompt a technician to remove any internal part of a computer
A. Assembling a computer
Assembling a computer is putting together the computer components mainly the internal ones so that they get interconnected and work together. Assembling a computer can take 20 to 40 minutes provided all parts to assemble are available.
Steps to assemble a computer
Step 1: Gather Tools and Supplies
Some tools such as Screwdriver, Wire cutters and strippers, Needle-nosed pliers, Small flashlight, Small container to hold screws, Grounding Strap are helpful to open or fix the screw and need to be made ready before. Also make sure all parts are available and are organized in a way to facilitate identification of which part to fit in the computer case first.
Step 2: Prepare the Case for Assembly
There are three things that need to be considered before assembly Before assembling consider removing the cover for the optical drive and make note of the cables pre-installed in the case. These should be front panel connections for features such as the power switch, audio jacks and USB ports.
Step 3: Install the Motherboard
During motherboard mounting all standoffs need to be installed in the case. After installation of standoffs it is necessary to check for screw hole locations on the motherboard for exact placement. The next stage requires lowering the motherboard into the case and aligning with the I/O bezel and installing the screws. The standoffs and screws are installed in order to prevent damage to the motherboard.
Step 4: Install Hard Drive
Hard disk drives are usually connected to the motherboard through Enhanced Integrated Drive Electronics (EIDE), Small Computer System Interface (SCSI) or Serial Advanced Technology Attachment (SATA) cable interface. Because with the SATA technology a drive can be detached or attached to the motherboard while the computer is switched on
The following steps are used to mount the drive into its hole:
1. Find drive bay to install the drive in. If there is a trouble finding a place to mount the drive consult the case documentation for suggestions.
2. Slide the drive into place until the screw holes on the sides are lined up with the holes in the case and put/tighten the screws in place.
3. Connect wires that need to be connected
Step 5: Install Optical Drive
The optical drive is installed in the drive bay. The following steps are used to mount the optical drive into its hole:
1. Slide the drive into the drive bay until the screw holes are lined up and the front of the drive is flush with the front of the case. Make sure that it is orientated correctly.
2. Install the screws and install wires to the right places Step 6: Install the CPU The CPU is the brain of the computer. It is installed on the motherboard’s appropriate socket.
Step 6: Install the CPU
The CPU is the brain of the computer. It is installed on the motherboard’s appropriate socket.
To install the CPU, first locate the corner marking that designates pins of the CPU. The second stage require to lift the small metal rod next to the socket and then find the corresponding marking on the CPU socket to insert the CPU so that the markings are lined up. Last push the rod down to lock the processor in place.
Step 7: Install RAM
The RAM is the temporary memory location that the processor works from. Permanently stored data is pulled from disks and stored in RAM while the processor works with it.
The following steps are gone through to mount RAM into its exact position:
Set the RAM board in the socket. Check to see that the notch in the board is in the correct location
Press firmly on both ends of the board to set it into the socket. Make sure the tabs lock into place and press the board only when the tab is aligned as not doing so can damage the RAM or even the motherboard.
Step 8: Install the CPU Fan
The CPU fan is a combination of a heat sink and fan together. The unit draws heat away from the CPU. To install the fan the following steps are followed:
Firstly, Place thermal compound to the CPU following the instructions provided with the compound.
Secondly, set the fan assembly on the CPU with mounting tabs aligned, Pull the locking rod down on the fan assembly to lock into place, Connect the fan assembly’s power connector to the motherboard.
Note: Failure to apply thermal compound results in insufficient cooling and can cause damage to the CPU or motherboard.
Step 9: Install Case Fan
The case fan is usually installed on the back panel of the case. To mount the fan do the following:
1. Align the mounting holes by holding the fan to the mounting pad on the inside of the case. The fan needs to be mounted so that it blows air out of the case.
2. Insert the screws from the outside of the case and tighten them
Step 10: Install Power Supply
The following steps are followed to install power supply:
1. Align the mounting holes in the case and power supply.
2. Insert screws and tighten.
Step 11: Connect Cables
When all of the components installed in the case, it may be possible that there are some parts which may not be supplied with the power. It is important to consult the motherboard manual in order to make sure proper connections are made. There are two kinds of connections, power and data.
About power connectors, every device installed needs power. The motherboard has two power connections, connectors specifically for SATA devices (drives) other connectors for running fans and or non-SATA devices. While data cables connect drives and front panel devices to the motherboard. Incorrect connections can damage components.
Step 12: Wrap-up
Now that the components are completely installed, the last thing to do is to reinstall the side panels on the case. The computer is now ready to be turned Associate Nursing Program, Senior 4 29 on. If the computer has problems starting up, check all component connections and mounting to make sure that everything has been attached correctly. Otherwise consult individual component manuals for specific troubleshooting information if problems persist.
B. Disassembling a desktop computer
Disassembling a computer means disconnecting external and internal components from the system unit. This process involves unplugging, unscrewing and sliding out components depending on the mechanism used to connect to the system unit or mount it onto motherboard. To disassemble a computer, the following process is followed:
1. Disconnect the computer from the power source by unplugging the power cable from power supply unit.
2. Unplug peripheral devices attached to the system unit such as monitor, keyboard, mouse and printer.
3. Open the outer cover of the system unit by unscrewing or sliding it out.
4. Remove the adapter cards by first unscrewing them and gently unplug them off the motherboard
. Remove the fixed drives such as hard disk and optical (CD/DVD) drives by unscrewing and disconnecting them from power supply unit. Next, disconnect the IDE or SATA interface cable that connects the drive to the motherboard.
6. Remove memory (RAM) modules by pressing the tabs located on both ends down away from the memory slot. Carefully hold the slightly lifted module by the edges and remove it from the motherboard.
7. Remove the power supply unit starting with the power connector to the motherboard, CPU fan, cabinet fan, power buttons and drives if any. Next, unscrew the unit to disconnect it from the system casing
8. Remove the CPU and its fan by first unscrewing the cooler fan from the motherboard.
9. Finally, unscrew the motherboard to unplug it from the system unit casing so as to have an empty shell of the casing
APPLICATION ACTIVITY 1.5
1. Demonstrate how to mount a motherboard using the following guidelines:
• Line it up properly on the chassis, screw and fit it into place.
• Mount the processor, RAM modules and any expansion cards separately.
• Plug in the power cable connector from the power supply unit.
• Connect other internal components onto the board, and then connect the monitor, keyboard and mouse to the system unit.
• Test for power and ensure that internal and external components are initializing correctly during POST (Power-On Self-Test).
2. Do a research and explain five types of expansion cards used on desktop computers.
1.2. SOFTWARE
1.2.1. Software installation principles
Activity 1.6
1. Explain the importance of reading the user manual before installing new software.
2. State three factors you would consider before purchasing application software.
3. State three hardware requirements to be considered when installing application software.
Software is another part of a computer. It is the invisible part which consists of instructions which operates a computer and executes specific tasks. Software can be classified into two main categories namely system software and application software.
System software is the one that performs a variety of fundamental operations that helps to make computer resources available to the user. It can be divided into Operating systems, Utility software, Firmware and Networking software.
Application software is the one used in a computer in order to perform tasks, functions for the benefits to the user. Application software available in a specific computer depends on the needs of the computer user.
For example one may have VLC to play videos while another may not have it depending on the needs.
The number of computer software or programs installed on a computer is only limited to hardware specifications such as processor type, memory and storage capacity. Once a computer meets recommended specifications, software installations is automatically carried out.
A. System requirement Before installing computer program whether operating system or application software, there are minimum system specifications that have to be considered in terms of: Memory (RAM) capacity, Free hard disk space, Processor type with speed and Graphics display.
For example, the following are the minimum and recommended system requirements for the installation of Windows 10 operating system:
• Memory capacity: 1 Gigabyte (GB) of RAM on a 32-bit or 2 GB on 64-bit machine
• Storage space: 16 GB free-disk space on 32-bit or 20 GB on 64-bit machine
• Processor type and speed: 1 Gigahertz (GHz) of CPU Speed
• Graphics card: Microsoft DirectX 9 graphics controller with WDDM driver (Windows Display Driver Model)
B. Application software goes with specific operating system An operating system has specific application software that it is designed to accept, that is due to the fact that an application software needs a working environment that is made ready by an operating system and while developing a program, the developer considers the environment provided by that specific operating system. For example, Windows operating system cannot accept application programs developed for Linux.
APPLICATION ACTIVITY 1.6
1. Discuss various categories of software installed in the computers found in the computer lab of your school.
2. Research on the internet minimum and recommended specification for installing the following software:
a. Latest version of Microsoft Office
b. Latest release of Kaspersky Antivirus
c. latest Ubuntu Linux
1.2.2. Computer software issues:
Activity 1.7
At the end of the school term when students were using computers in the school computer lab, every computer worked well but at the beginning of next term they brought from outside different storage devices such as flash disks and other external disks used to copy various documents to the computers. One day when their teacher switched on the computers so as to install some software most of the computers displayed suspected messages.
a. Discuss what may be the cause of such behaviors.
b. How the problem can be addressed in the laboratory?
A. Operating System issues
Being the one that directly interacts with the computer hardware through the Operating system kernel, an operating system issue is a serious problem that may make even accessing the computer’s different applications impossible.
The various operating system issues are elaborated in the subsequent content.
i. The computer won’t start
Operating system has the function of managing hardware and other application software resources. A complete damage of an operating system leads a computer to do not start even not function.
ii. Abnormally Functioning Operating System
If the operating system or other software is misbehaving, close it forcefully and reopen it. A virus scan can also help if a reliable anti-virus software is installed.
iii. Operating system is not booting up
When the operating system is not loading, it is a serious problem that requires a fresh reinstall of an OS.
iv. Operating system blue screen of death
A blue screen of death pops up when Windows encounter a critical error and indicates a serious error with a computer device. Incase this occurs, users are prone to losing important data since regular apps don’t normally have a right to save their open data.
The main reasons for this issue are:
• Crashing of a low-level software or drivers
• Drivers updates going wrong
• A faulty hardware
• A virus attack on a system
How to fix the blue screen of death issue:
• Do a system restore which will help undo any recent installed driver.
• Update device drivers since as time goes by some drivers become incompatible with the regular OS updates which could cause the computer drivers to crash more frequently.
• Start PC in Safe Mode and troubleshoot any problem from the blue screen details and scan it for viruses since some viruses are known to cause the Blue Screen of death.
• Reinstall the Windows OS if none of the above works.
v. Windows freezes or stops responding
The operating system may sometimes stop responding and freeze. In this case a cursor may not move, an application may not respond or just a computer user gets stuck on a certain action.
Potential causes of the random freeze and unresponsiveness on a PC may include:
• Software related issue including malicious software, virus attack and driver related issues,
• Running too many programs at the same time,
• Memory issues and general hardware failure
• Solutions to windows freezing or stopping to respond
• The best solution is to give the computer some time to process, since it might be handling a complex task that could be taking most of its CPU and RAM If giving it more time does not work, then force end the task or program that is not responding by pressing Ctrl + Alt + Del to open the Task Manager.
After the Task Manager opens highlight the non-responding program or process and choose “End Task”.
• Reboot the PC by pressing down on the power button until the computer turns off and restart it after a few seconds
• If after rebooting the computer still freezes then reboot the PC in Safe Mode and uninstall any recent driver that might be causing the computer to freeze.
• Determine if there is a defective piece of hardware that might be causing the device to freeze and replace it immediately. Also check on the computer’s memory such as RAM to know if it needs upgrading.
• When none of the above solutions work a clean install of the Windows Operating System can be considered.
vi. Less free storage than before after an operating system upgrade
This happens because files from the previous operating system are still left in the system in a folder known as “Windows Old “the “Disk Clean-up” tool can be used to prevent the computer from running slowly.
Steps to delete unnecessary files after an operating system upgrade
• Irrespective of the operating system used, either Windows 7, 8, 8.1, or 10 go to the start then search and type Disk Cleanup
• The disk cleanup app shows, click on it to launch
• From the Apps interface, select the drive on which the OS is installed which is usually C by default in many PCs.
• After selecting the drive click Ok and the disk cleanup app will scan for the unnecessary files that can be deleted and present them as a list.
• The disk cleanup then does another search and gives another list now with all the necessary files to delete. From the list select all the unnecessary files taking up on the space including “Previous Windows installations”
• Click OK and a box asking whether to permanently delete these files will pop up. Click Delete Files. There are thousands of problems an operating system might encounter. However most of those problems are rare and the existing few have been documented. The various common issue and how they can be solved has been looked at in the above content.
B. Applications issues Common computer software issues or fault can include the following: Inadequate software performance: This refers to slow system response time and transaction throughput rates.
1. Obsolete software: Software that no longer works due to new hardware or support software changes
2. Inconsistent processing: Software that only works correctly in one environment. This refers to software that has been designed for only one environment and cannot be easily transported and used in another environment.
3. Unreliable results or performance: This means that the software does not deliver consistently correct results and cannot work correctly each time it is used.
4. Incorrect software version being installed on a computer
5. Virus and malware infection on a computer, etc. The most common way to rectify software issues include uninstalling and reinstalling a software, upgrading the software, running a virus and malware scan. It is also a good practice to check for the manufacturers’ website for patches
C. Malware
Malware are harmful programs or malicious software that are specifically designed to gain access or damage a computer without the user’s knowledge. They affect the smooth running of a computer system or carry out illegal activities such as collecting information from the infected user’s computer.
The categories of harmful programs include: viruses, worms, Trojan horses, rootkits, spyware, crime ware, and adware. In this section we will discuss on viruses.
a) Virus
A virus is a self-duplicating computer program or piece of code that is loaded into a computer without the user’s knowledge. Viruses can spread themselves from computer to computer, interfering with data and software. The source of computer viruses is the internet and storage devices or media. To Prevent Harmful Programs the following measures can be taken:
i. Install an antivirus program
An antivirus will check for suspicious files and disinfect them or delete them. Make sure the antivirus is up to date so that it can detect even newly created viruses.
ii. Avoid non-secure sites
Avoid visiting unfamiliar suspicion sites and block special sites that should not be accessed using the computer browser.
iii. Scan emails for viruses
Do not open email attachments unless they are from legitimate known source. iv. Install anti-spyware software This is a type of program designed to prevent and detect unwanted spyware program installations.
b) Trojan Trojan or Trojan Horse is a malicious software that is disguised as legitimate. Trojan misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it on a computer. Trojans do not replicate themselves and appear harmless but in fact malicious.
c) Worms
A worm is a computer program that sits in the computer memory, duplicates itself continuously until the system runs out of memory and crashes. Worms infect networks by replicating themselves and transmitting their multiple copies to all the nodes connected on the network
d) Rootkit
A rootkit is software used by a hacker to gain constant administrator-level access to a computer or network. It is installed through a stolen password or by exploiting system vulnerabilities without the victim’s consent or knowledge. Rootkits primarily aim at user-mode applications. Rootkits can completely deactivate or destroy the anti-malware software installed in an infected computer, thus making Associate Nursing Program, Senior 4 37 a rootkit attack difficult to track and eliminate. When done well, the intrusion can be carefully hidden so that even system administrators are unaware of it.
e) Spyware
Spyware is a software code installed on a computer without user’s knowledge to monitor or supervise user activities. Spyware can do the following:
• Gather personal information and can transmit it without user’s knowledge,
• Change computer settings,
• Corrupt windows Registry files,
• Slow down internet connection speeds and the computer itself by taking up memory and space on the computer,
• Can make a computer to malfunction or totally crash.
f) Adware
The term adware is used to describe a form of malicious software which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-ups or in a window that cannot be closed. Adware is considered a dangerous program, its main objective is to collect information about the user, to remove the browser ‘s restrictions, settings and default search engine. When data collection is complete, the current opened program starts to be active, and user gets low-quality sites in response to any request.
g) Crime ware
Crime ware is distinct from spyware and adware. It is designed to commit identity theft through social engineering in order to access a computer user’s financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions.
Crime ware can have the following impact:
• Install keystroke loggers to collect sensitive data login and password information for online bank accounts.
• Redirect a user’s web browser to a counterfeit website controlled by the thief even when the user types the website’s proper domain name in the address bar.
• Steal passwords cached on a user’s system.
• Enable remote access into applications, thus allowing a break into networks for malicious purposes
• Encrypt all data on a computer and require the user to pay a ransom to decrypt it
APPLICATION ACTIVITY 1.7
1. Using internet and brainstorming, search any other common sources of computer virus infection
2. Discuss the various ways a user can acquire a software to use.
3. Demonstrate how to start disk cleanup utility.
1.2.3. Computer software installation
1.2.3.1. Installation of an OS
Activity 1.8
Suppose your school receives 30 new computers with no installed programs.
a. What is the first program the school ICT teacher or lab technician should firstly install?
b. Explain why?
The term Software Installation means the process of copying installation files of a given program onto the hard disk in a format that allows the computer to run the program. It means putting a computer program on a computer and make it ready to use. Before installing any software read the manufacturer’s installation manual to correctly install programs
. This manual describes all the procedures and the necessary system requirements for successful installation. Most programs are installed by downloading the program from online sources. Programs can be installed from an external storage medium such as a DVD or USB stick.
If a program is being installed from the disk, the installer will automatically start when a memory is inserted in the DVD drive. What the one doing the installation will have to do is just follow the instructions. Installation of an Operating System is a fundamental process that starts with identifying minimum or recommended system specifications.
Installation of Windows 10 Like other versions of Microsoft Windows, installation of Window 10 is a three phase process consisting of: copying files from either bootable USB or CD/ DVD, installing features and drivers and configuring settings.
a. Copying files
At this first stage of installation the all files are moved from either bootable USB or CD/DVD to computer which require installation.
b. Installing features and drivers
At this stage the copied files with respect to their features start to be installed together with the drivers, recall that the role of drivers is to provide a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware being used.
c. Configuring settings
This is where installer is asked to choose from available options. This stage of configuration requires to be taken carefully as some of the settings once disabled may lead to the malfunctioning of the computer
Step 1: This is the first screen to see while installing Windows 10 using a bootable USB flash drive or DVD. Here’s where to choose the Operating System’s language, time and currency format, and input method. Once everything is chosen appropriately choose Next to continue
Step 2: In the new window that appears click on Install now
Note: If the repair option is chosen, the Troubleshoot screen where to choose to reset the PC and re-install windows will appear. Therefore, keep or remove the files
Step 3: In the window that appear next enter the Windows product key. This can be found online, in the confirmation email so that they can be purchased, or on the DVD packaging.
Step 4: Accept the license terms. This stage deals with reading software license terms and condition to install window 10. Step 5: In the next image, one can choose to upgrade or custom install windows. In the upgrade option, files, settings and apps are moved to Windows while in custom option these are not moved. The choice to make will depend on the one installing Windows and what is the needed outcome at the end of the installation.
Step 6: Select the drive to install Windows 10 on. At this step an existing drive can be formatted and used for installation like a new drive can be used for that purpose. Partition is also done.
Step 7: Once the partition in which Windows will resides specified, clicking the Next button moves the installation to the next phase of copying Windows 10 files onto the partition as shown in Figure below:
At this stage after files have been copied configuration is started. During drivers and features configuration stage, the PC restarts several times.
Step 8: Do personalization of installed Windows
Read the settings to customize carefully before turning them on or off
Step 9: Sign in or create a Microsoft account when prompted to do so as shown in the figure below.
Microsoft account is important as it allows the user to access Windows 10 resources like online emails, cloud and Apps. Step 10: Let the installer configure Apps before the desktop shown in the figure below is displayed
Now Windows 10 is ready to be used. The newly installed window will have on desktop three main items:
This PC, Network and Recycle bin
APPLICATION ACTIVITY 1.8
Demonstrate and outline steps on how to install various versions of Microsoft Window operating systems such as window 7,8, etc..
1.2.3.2. Installation of Application software
Activity 1.9
John bought a computer and connected a flash disk on it to play some music, unfortunately the computer refused to either play the music or open some documents stored on the flash disk but once the flash was connected to the friend’s computer it played and opened the document. After reading this scenario:
a. Suggest what should be the problem with John’s computer
b. How to handle the issue seen in a?
In order to have a computer accomplish a specific task that the computer user want, instead of having only the operating system, a specific software to accomplish a specific task is installed.
That software to install is an application software.
A. General guidelines procedure to install application software on the Computer
The first most important step in software installation is to check whether the target system meets the general hardware requirements of the application. It is also necessary to make sure that the version of the application to be installed corresponds to the Operating System platform running on the computer.
Some computer programs also have software requirements prior to installation. Once all the initial requirements have been met, make sure that there are no unnecessary programs running before beginning the installation procedure. Software installation can be done directly from the Internet or from an installation media
A.1. Installation from media
To install from the disk, insert the CD/DVD drive. Once A setup wizard is running simply follow the prompts until the installation process is completed. In case there is no setup wizard window, open the Explorer and navigate to the optical drive. Double click on either the Autorun or Setup file. For novice users, accept the default values to minimize potential problems during the procedure.
A.2. For installation from the Web
Launch the browser application and download the setup file to the hard drive. After completion of the downloading process, run the setup program which is found in the Downloads folder to execute the setup wizard that will handle the automatic installation of the software. After the installation procedure has been completed and the setup wizard has terminated, reboot the computer before launching the newly installed software.
A.3. Installation of Microsoft office 2013
Most software developers package several programs into a suite with good example being Microsoft Office 2013. Go through the following steps:
Step4: Insert Microsoft Office 2013 DVD or USB installation media into the computer. In the license agreement screen that appears, click the check box with the text “I accept the terms of this agreement”.
Step 2: Once the Microsoft terms of agreement are accepted, choose whether to upgrade an existing version or custom install a new copy. install new copy as shown in Figure below:
If an old version of office is already installed there is an option to upgrade it to a newer version but both the new and the old versions can be kept depending on the user’s choice.
Step 3: To upgrade an existing version of Microsoft Office, click Upgrade. Make sure the radio button “Remove all previous versions” is selected, and then click Next.
The installation progress screen shown in the figure fellow.
Step 4: Once the installation process is complete, sign in for Microsoft account to get online access to the Microsoft resources like the screen shown in the figure below is displayed to confirm that Office 2013 has successfully been installed.
Step 5: Open Office 2013 by clicking on the Start button then All apps. The list of installed Microsoft Office 2013 apps is displayed.
Note: To install application software successfully there is a need to use an administrator login because with other types of accounts with limited privileges such an installation is not possible. Sometime once a program is installed into a computer there may be a need for removing them from the computer for different reasons. The process or removing installed application software from computer is known as uninstallation.
Here below are the procedures followed to uninstall some programs in window 10:
• Open the Start menu
• Select control panel
• Click on uninstall program
• Select the program to remove
• Click Uninstall
• Click on the program to uninstall
APPLICATION ACTIVITY 1.9
You are provided with Microsoft Office 2019 Installation on DVD or on flash disk.
Uninstall the current running Microsoft office and Install this provided application on your computer.
End unit assessment
1. Compare safety precautions applied in scientific laboratories such as chemistry, physics and those observed in computer laboratory
2. Study the motherboard of a computer and perform the following:
a. Identify the CMOS cell battery and RAM mounted on the motherboard
b. Detach and re-attach a CMOS battery and RAM
3.a. Explain briefly the meaning of operating system in the computer system.
b. Explain three phases taken by operating system during its installation
c. Discuss any five functions performed by the operating system residing on a computer.
4. State four factors to consider before purchasing application software.
5. Explain why motherboard is the first element to be installed in the process of assembling but the last one to be removed during the process of disassembling?
UNIT 2: ADVANCED WORD PROCESSING
Introductory activity 2.0
Muhire an associate nurse student was asked to prepare a document presenting the features of his/her reference hospital. The document to prepare must contain at least five images which present the most aspects of the hospital. Those images can be Emergency, Intensive care unit, administrative blocks, Pharmacy, Radiology and Laboratory. The document must contain titles and have highlights of words to which more attention is needed. The highlighted words can be made bold, italic, underlined or can have any other color depending on the preferences.
a. Prepare such a document with at least 4 pages and give it the title “My beautiful Hospital”
b. Insert page numbers in the created document
c. Create a table of content for that document
d. Create a cover page that is going to be the first page in the document but with no page number
2.1. Formatting a document
Activity 2.1
Instruction:
Open a blank document in Ms Word and save it as”Inzu”; then type in the document “Hano hari inzu ikodeshwa “ Do the following:
1. Change the font size to 36
2. Change the font
– type to Book Antiqua.
3. Change the text font color to red.
4. Change text to Bold Italic and Underline it.
5. Change text to the UPPERCASE.
Formatting a document refers to the appearance or presentation of a document which is done in order to make that document look more beautiful by looking like a readable document rather than a letter or note to a friend.
2.1.1. Change the font
Text formatting allows the changing of the appearance and layout of text and other characters within a document. The font determines the way the text appears on the screen and when the document is printed. The more common font types are Times New Roman, Verdana and etc. there are also different font colors and size which are used depending on the user’s choice. It is possible to apply a font to either an entire document or to certain portions of a document.
To apply a font:
• Click on the Home tab
• Go to the Font group
• Select/click on the font to apply
Note: When the font is to be applied on a text already written the steps to apply a font will be preceded by selecting that text
A. Changing font size
The most used size of word characters is 12, however character size in word varies from 1 to 72 but can increased even up to 1638 for Microsoft Office word 2013.
To change the font–size go through the following steps:
1. Select the text for which the size is going to be changed
2. On the Home tab, click the Font size drop-down arrow. Select a font size from the menu. If the font size needed is not available in the menu, click the Font size box and type the desired font size, then presses Enter. In the image below the font size of the text is now changed to 36.
Note: It is possible to change font size using the Increase Font Size and Decrease Font Size commands
B. Changing font type
By default, the font type of each new document is set to Calibri. However, Ms Word provides many other fonts to use in customizing the text. It is advisable to use the font type “Times New Roman” and the font size 12
To change text’s font type go through these steps:
1. Select the text to modify.
2. On the Home tab, click the drop-down arrow next to the Font box. A menu of font styles will appear.
3. Select and click on the font type to apply. Immediately the font types changes.
C. Changing the font color The most common font color for word text is automatic (near black) but there are other fonts available.
To change the font color:
1. Select the text to modify.
2. On the Home tab, click the Font Color drop-down arrow. The Font Color menu appears.
3. Select the font color to use. The font color will change in the document.
The Color to choose from are not limited to the drop-down menu that appears. Select More Colors at the bottom of the menu to access the Colors dialog box and choose one of the colors
D. Making text Bold Italic, and Underlined
The Bold, Italic, and Underline commands are used to help draw attention to important words or phrases.
To make text have these attributes do the following:
1. Select the text to modify.
2. On the Home tab, click the Bold (B), Italic (I), or Underline (U) commands in the Font group
3. The selected text will be modified and made bold, italic and underlined as in the next image if all the corresponding icons were clicked on.
D. Changing text case
The text case is about the presentation of characters in words. A character can be in capital or small letter. The available cases are: Sentence case, Lower case, Upper case, Toggle case and Capitalize each Word. When changing the text case is needed, use the Change Case command instead of deleting and retyping the text.
To change the case:
1. Select the text for which to change the case.
2. On the Home tab, click the Change Case command in the Font group.
3. A drop-down menu will appear. Select the desired case option from the menu.
The text case will be changed in the document like in the next image whose text was in small letter before changing to upper case.
APPLICATION ACTIVITY 2.1
Write at least four lines of text which describes “peace of mind “and do the following:
1. Change font type of the first and second sentences to “Poor Richard” ,font size to “14”, font color to “Blue” and make the sentences italic.
2. Change the third and fourth sentence to the font type ”Tahoma”, font size “12”, font color “Red” and underline those sentences.
2.2. Paragraph group
Activity 2.2
1. Type text in word processing software which describe your last holidays. The first paragraph talk about your daily activities, the second about what made you happy and sad during the holidays.
Save it as “my activities” and do the following:
a. Apply on the text a line spacing of 1.0
b. Using the numbering option number your paragraphs as 1 and 2
c. Apply an indentation of 2.1 to the left on your paragraphs
A paragraph is a distinct section that describes a special idea.
Paragraph format contains one or more lines with a combination of words, numbers and other characters. Various commands are used to format a paragraph such as: Text Alignments, Bullets, Numbering, Multi-Level list, Paragraph Indents, Sorting Text, Line Spacing and many others.
2.2.1. Indent
Indent means how far to move the paragraph away from the left or from the right margin.
A. Method 1 of changing indent: he Tab key
The quickest way to indent is to use the Tab key which creates a first-line indent of 1/2 inch. That is done in this way:
1. Place the insertion point at the very beginning of the paragraph to indent.
2. Press the Tab key and the paragraph will be moved to the right by 1/2 inch.
3. The first line of the paragraph will be indented.
B. Method 2: Indent markers
In some cases, there is a need to have more control over indents. Word provides indent markers that allow to indent paragraphs to the needed location.
The indent markers are located to the left of the horizontal ruler, and they provide several indenting options:
• First-line indent marker adjusts the first-line indent
• Hanging indent marker adjusts the hanging indent
• Left indent marker moves both the first-line indent and hanging indent markers at the same time (this will indent all lines in a paragraph)
Indent using the indent markers goes through the following
Indent using the indent markers goes through the following steps:
1. Place the insertion point anywhere in the paragraph to indent, or select one or more paragraphs.
2. Click and drag the desired indent marker.
2.2.2. Line Spacing
Line spacing is the space between each line in a paragraph. Word processing program allows to customize the line spacing to be single spaced (one line high), double spaced (two lines high), or any other space size.
Steps to format line spacing:
1. Select the text for which to change the line spacing.
2. On the Home tab, click the Line and Paragraph Spacing command, then select the desired line spacing.
The line spacing will change. In the the image below the line spacing is 1.0
2.2.3 Bullets and Numbering
Bullets or numbering are used for a list. It is possible to apply automatically simple bullets and numbering to lists in the document as it is being written
. Method 1: Custom made bullets and numbering
1. Start a bulleted list in Word by typing a character to use as a bullet at the beginning of the first item in the list and pressing the “63” key.
2. After pressing the “Spacebar” on the keyboard, the asterisk will turn into a bullet point.
3. Type the first line of the list and press the “Enter” key to move to the next line. The bulleted list will continue to be created.
4. To discontinue the bulleting, press “Enter” two times when finished with the list
Note: The character to use as a bullet can be a number or a letter. It can also be followed by a dot or a closing parenthesis. Method
2. Bullets and Numbering found in the paragraph group
The paragraph group has bullets and numbering that can be chosen from. To apply them Go to the Home tab, in the Paragraph group, choose the Numbering button and then the style of bullets and numbering to use.
2.2.4 Alignment
It refers to the arrangement of text relative to the left or right margin of a page. There are four types of alignments namely: Left, Right, Centre, and Justified Alignments.
Left alignment: Text is evenly positioned along the left margin but uneven at the right margin. Typing begins at the left margin and does not have to end at the right margin
Right alignment: Text is evenly positioned along the right margin but uneven at the left margin. Typing begins at the right margin and does not have to end at the left margin
Center Alignment: Text is evenly arranged at the center of the page but uneven both at the left and right margins. Typing begins at the center of the page.
Justification: Text is evenly arranged both at the right and left margins.
APPLICATION ACTIVITY 2.2
Instruction:
Using MS Word type a text from an English book, then do the following:
1. Indent the first sentence,
2.Change the font type to “Time New Roman “ , size =”12” , line spacing =”2.0
3. Change alignment from Left to Justified alignment
2.3. Referencing a word document
Activity 2.3
Using Ms Word type text about the use of ICT in Health Sector and do the following tasks:
1. Insert page header text “ICT tools in education”
2. Insert page footer text “Enhancing students’ learning”
3. Insert 2 footnotes to the text “My First Footnote” and “Second footnote
2.3.1. Header and Footer
Headers are lines of text or graphics that appear above the top margin of a page or selected pages while Footers are lines of text or graphics that appear below the bottom margin of a page or selected pages.
To insert a header and footer do the following:
Step 1:Click Insert Tab from the menu bar; then click on Header or footer command from the ribbon.
Step 2: A drop down menu appears showing the different styles of footer or header. Click on the desired option.
Step 3: In the Header & Footer regions type the desired content to use as header or footer respectively. Then press Enter. After entering the text to use the respective header and footer will look like in the following images:
2.3.2. Insert Footnotes and End notes in Word
Footnote is the note citing a particular source or making a brief explanatory comment placed at the bottom of a page corresponding to the item cited in the corresponding text while endnote is a note citing a particular source or making a brief explanatory comment placed at the end of a research paper and arranged sequentially in relation to where the reference appears in the paper.
To insert footnotes and endnotes do the following:
Step 1: Place the cursor where the superscript number for the first note should appear.
Step 2: Select the References tab in the ribbon.
Step 3: Select the dialog box launcher in the Footnotes group.
Step 4: Select Footnotes or Endnotes in the Footnote and Endnote dialog box.
Step 5: Select the note’s location from the drop-down menu.
Note: It is also possible to choose additional options in the Footnote and Endnote dialog box such as number formatting and whether the numbering applies to the whole document or to a specific section.
Step 6: Select the Insert button to create the first note.
After Word has created the superscript number, the cursor will automatically move to the note location selected in the Footnote and Endnote dialog box.
Place the cursor where the superscript number for the next note should appear in the text and then select Insert Footnote or Insert Endnote in the Footnotes group in the ribbon to insert the next note
2.3.3. Converting Footnotes to Endnotes
Step 1: Open the document and select the References tab. In the Footnotes group, click Show Notes
Step 2: Select the notes to convert, and then right-click and Select Convert to Footnote or Convert to Endnote
APPLICATION ACTIVITY 2.3
1. Differentiate footnotes and endnotes?
2. Open “use of ICT in Health Sector ” file created in the activity 3.3 and create 5 endnotes of your choice in that document:
3. Convert all the above Endnotes to Footnotes?
2.4. Creating and updating a table of contents
2.4.1 Creating table of content
Activity 2.4
Using MS Word, write text which describe computer hardware and software and save it as “Information and Communication Technology”. The text to write should contain titles and in order to do it quickly you can copy text from the softcopy books available on the REB website.
Make sure the document has at least 3 pages. Do the following with the created document:
1. Change the Font-Type to “Book Antiqua”
2. Change the Font Size to 12 and Line Spacing =”2.0”
3. Change Heading 1 to “Arial Black ” and Font-size =”14”
A Table of Contents (TOC) is an organized listing of chapters and major sections of a document. The role of Table of content is to help readers immediately see how the document is organized. A clear, concise, and well formatted Table of Content is the first indicator of a good document.
Below are steps to create a table of content:
Step 1: Set different titles to different headings depending on their importance.
Heading 1 is the biggest title in the document if it is a unit for example the heading 1 may be the unit name. The other headings are those under the Heading 1. In Heading 1 there are many Heading 2 and in Heading 2 there are many Heading 3 and so forth. The font properties of the headings can be set by the computer user.
To set a title’s heading select the title and while in Home click on the desired heading.
Note: Ms Word will create a table of contents based the headings created in the whole document so do this for all of the text that will appear in the table of contents.
Step 2: Place the cursor where the table of contents will appear usually at the beginning of the document
Step 3: Go to References and Choose Table of Contents
Step 4: Choose the style to apply as the table of content. Immediately the table of content will be inserted where the cursor is.
The table of content above is that of one part of the Student Book of ICT Year One in TTC schools. To create a table of content like the one above, the titles have been set to the following headings:
Note: If the Custom Table of Contents option is chosen, it is possible to format the way the table of contents will look: Choose a different style, hide page numbers, include more heading levels than the default three levels, and more
2.4.2. Updating the table of Content
As more titles are added and some removed, page numbers changed, the table of content needs to be changed to reflect the actual document. To update the table of content go through the following steps:
Step 1: Click on the Table of Contents to highlight the whole area (the whole area becomes grayed-out)
Step 2: Right-click to bring up the Table of Contents menu
Step 3: Click on Update Field
Step 4: Click on Update page numbers only or Update entire table
Note: Use ‘update page numbers only’ to keep the table exactly as it is and just update the numbering or ‘update entire table’ if Ms Word will regenerate the Table of contents.
APPLICATION ACTIVITY 2.4
1. Create a document on ICT which has the following headings:
Computer Hardware (Heading 1) Generate a list of computer hardware available in the school’s computer Laboratory on the following categories which will be Heading 2
• Input Hardware
• Output hardware
• Processing hardware
• Storage hardware Create additional headings in Heading 2 where possible. Those headings will be Heading 3 and Heading 4
2. Add a new title “SOFTWARE” in the document. Make that title a heading appropriately and in it create other headings. Update your table of content
2.5. Page layout tab command
Activity 2.5
Using Ms Word, write a document which has a title Benefit of Learning ICT as Future Nurse and apply on it the following:
1. Change page orientation from Portrait to Landscape
2. Organize the text into 3 separate columns
3. Change page margin from 1.0 to 1.5 points
2.5.1. Page Setup Group
It is found on the ribbon when the Page Layout tab is clicked. It is used to specify the margins and the orientation of a page, size, number of columns among other specifications.
2.5.2. Setting Margins
Page margins are the blank spaces around the edges of a page. Text and graphics are normally inserted in the printable area between the margins. However, some items can be positioned in the margins such as headers, footers, and page numbers among others.
To set the margins do the following:
Step 1: Click Page Layout tab, from the Page Setup group and click Margins command.
Step 2: Click the margin type desired from the pull-down menu that appears. The margins are automatically adjusted.
Step 3: To set a customized margin, either click Margins, then select Custom Margins command or click on the dialog box launcher at the bottom of Page Setup group. A dialog box is displayed.
Step 4: Click on Margins tab on the dialog box that appears.
Step 5: Specify all the desired options and click OK to apply
2.5.3. Page Orientation
This refers to the positioning of the page in relation to the text or graphics.
There are two types of page orientation.
• Portrait: This is where text and graphics are printed with the longest side placed vertically and the shortest placed horizontally.
• Landscape: This is where text and graphics are printed with the longest side placed horizontally and the shortest placed vertically.
A. Changing the page orientation of an entire document
To change the page orientation of an entire document, proceed as follows:
Step 1: Click on the Page Layout tab, in the Page Setup group, click Orientation
Step 2: Select either Portrait or Landscape. B. Using both portrait and landscape orientation in the same document There can be a need to have both landscape and portrait pages in the same document. Such a need can arise for example when the document is in a portrait format and that there is a big table that cannot fit in the document if the page is not made landscape. Go through these steps:
Step 1: Select the content on the pages or paragraph(s) whose orientation is to be changed to portrait or landscape.
Step 2: Click on the Page Layout tab, in the Page Setup group.
Step 3: Click Margins, then select Custom Margins command or click on the dialog box launcher in the Page Setup group. Step 4: Click on the Margins tab on the dialog box that appears.
Step 5: Under the Orientation section, select the desired orientation (Portrait or Landscape).
Step 6: Under the Apply to section, choose selected text option and click OK to apply.
Note: If some but not all of the text on a page is selected to change to portrait or landscape orientation, Word places the selected text on its own page, and the surrounding text on a separate page.
2.5.4 Columns
Columns are created to enhance the look of a document. The flow of the content from the bottom of one column to the top of the next one in the same page should be consistent. Columns can either be created using predefined or user-defined options.
i. Predefined To create a predefined column, do the following:
Step 1: Select the text.
Step 2: Click Page Layout tab from the menu bar; then click on the Columns command under Page Setup group.
Step 3: Click on the number of columns desired from the drop-down menu displayed.
ii. User Defined columns
Step 1: Select the text.
Step 2: Click Page Layout tab from the menu bar then click on the Columns command under Page Setup group.
Step 3: Select More Column option from the resulting pull down menu.
Step 4: Specify the column width and spacing, line between columns, number of columns, and where the column is to be applied.
Step 5: Click OK to apply once all the desired options have been selected.
APPLICATION ACTIVITY 2.
1. Type Microsoft word document which describes “your school environment” and then do the following:
a. Split the paragraph into 2 columns.
b. Make the page Landscape
2.6. Protecting a document from unauthorized access and changes
Activity 2.6
Write a word document which describes the benefit of studying in TTC especially in your Option and protect it with a password.
A word document can be protected from unauthorized access. This protection is done when the document contain sensitive and private information to which the owner does not want anyone to have access to.
2.6.1 Protecting Word files with a password
The followings are steps to follow when protecting a word file with a password.
Step 1: Select File then Info
Step 2: Select the Protect Document option
Step 3: Choose “Encrypt Document with Password”
Step 4: Type the password to use, and then select OK
Step 5: Type the password again to confirm and then select OK
2.6.2 Protect a document and mark the parts that can be changed
Step 1: On the Review tab, in the Protect group, click Restrict Editing.
Step 2: In the Editing restrictions area, select the Allow only this type of editing in the document check box.
Step 3: In the list of editing restrictions, click No changes (Read only)
Step 4: Select the part of the document where to allow changes.
The selected words in bracket, show where the other user can make change only. To select more than one part of the document at the same time, select one part then press CTRL and select more parts while holding down the CTRL key.
Step 5: Under Exceptions, do one of the following:
• To allow anyone who opens the document to edit the part that was selected, select the Everyone check box in the Groups list.
• To allow only particular individuals to edit the part that was selected, click more users, and then type the user names.
Step 6: Click OK and select the check boxes next to the names of the individuals that are to be allowed to edit the selected part. Note: If more than one individual are selected, those individuals are added as an item to the Groups box, so that you can quickly select them again.
Step 7: Continue to select parts of the document and assign users permission to edit them.
Step 8: Under Start enforcement, click Yes, Start Enforcing Protection.
Step 9: Do the following:
To assign a password to the document so that users who know the password can remove the protection and work on the document, type a password in the Enter new password (optional) box, and then confirm the password.
Use the above option if other people are going to work on the document at the same time and make sure to use strong passwords that combine uppercase and lowercase letters, numbers, and symbols.
Step 10: To encrypt the document so that only authenticated owners of the document can remove the protection, click User authentication. Encrypting the document prevents others from working on the document at the same time.
2.6.3 Unlock a protected document
To remove all protections from a document, use the password that was applied to the document or there is a need to be listed as an authenticated owner of the document. For an authenticated owner of the document or if you know the password for removing the document protection, do the following:
Step 1: On the Review tab, in the Protect group, click Restrict Editing.
Step 2: In the Restrict Editing task pane, click Stop Protection
Step 3: If prompted to provide a password, type the password.
2.6.4 Make changes in a restricted document
When opening a protected document, Word restricts what can be changed based on whether the document owner granted the permission to make changes to a specific part of the document.
The Restrict Editing task pane displays buttons for moving to the regions of the document for which there is permission to change. If no permission is granted to edit any parts of the document, Word restricts editing and displays the message, “Word has finished searching the document” when the buttons in the Restrict Editing task pane is clicked.
2.6.5 Finding word document parts to edit
If the Restrict Editing task pane is closed and there is a need to make changes where the user has not been granted permission, Word displays the following message in the status bar: “This modification is not allowed because the selection is locked”.
To return to the task pane and find a region where there is permission to edit, do the following:
Step 1: On the Review tab, in the Protect group, click Restrict Editing.
Step 2: Click Find Next Region I Can Edit or Show All Regions I Can Edit
APPLICATION ACTIVITY 2.6
Using Ms Word
1. Open a document which describe the benefit of learning in your option that you protected and remove password
2. Type any text related to your career, Protect it and mark the parts that can be changed
End unit assessment
1. Explain the following concept
a. Formatting
b. Paragraph
2. Write at least one page on XO laptop hardware and do the following :
a. Change line spacing to 1.5
b. Change font-type =”Book Antiqua” , size=” 14” color =”Blue” ,and alignment=”Justified ”
c. Insert header =” ICT for children” and footer=” XO laptop for fun ”
d. Protect the document
UNIT 3: ADVANCED SPREADSHEET I
Introductory activity 3
At the end of the year Teacher Peace was overloaded with work as she was required to prepare the end of the year report for pupils. The marks given to her are word softcopies for which total are manually. She has the task to write the marks in the word sheets, calculate the totals for the whole year, the average per subject for the whole year and the overall average for the whole year for each pupil. For this reason she is planning to buy a calculator and is considering hiring someone to help her which is against the ethics.
a. Advise Teacher Peace on how to handle this situation using the word files she has
b. Advise this same teacher on how excel program can help her
c. Compare the easiness of the task when Teacher Peace adopts the advice in a) and when she chooses the option presented in b
3.1. Conditional formatting
Activity 3.1
Open Spreadsheet program and enter data in the table below. Save the file as “Burera Ltd Sales data”
Do the followings:
1. Using Burera Ltd Sales data, show salespersons who are meeting their monthly sales goals. The sales goal is 50,000 items per month
2. Highlight all salesperson whose sales are below the average 3. Highlight with blue color ,all salesperson whose sales are above 80,000
Conditional formatting is a spreadsheet functionality which allows Excel(spreadsheet) users to specify conditions allowing to get specific answers on data in the worksheet that was otherwise not easy to analyze.
It can be applied to a range of cells or an entire worksheet and makes cells meeting specified criteria have relative formatting (font). If the formatting condition is true, the range of cells is formatted according to the preset criteria, else that range is not formatted.
Conditional formatting is a feature in many spreadsheet applications that allows users to apply specific formatting to cells that meet certain criteria. It is most often used as color-based formatting to highlight, emphasize or differentiate among data and information stored in a spreadsheet.
Conditional formatting enables spreadsheet users to do a number of things. It calls attention to important data points such as deadlines and at-risk tasks. It can also make large data sets more digestible by breaking up the wall of numbers with a visual organizational component. Among the options provided by conditional formatting are: highlight cell rules, top bottom rules, customized rules, etc
3.1.1. Highlight cell rule
Conditional formatting can be used to enhance the reports and dashboards in Excel. The conditional formatting statement under the Highlight Cells Rules category allow to highlight the cells whose values meet a specific condition.
The benefit of a conditional formatting rule is that Excel automatically reevaluates the rule each time a cell is changed provided that cell has a conditional formatting rule applied to it. Those rules include: greater than, less than, equal to, between, text that contain, A Date occurring, duplicate values, …
Here are the steps to apply the highlight cell rule:
Step 1: Select the desired cells on which to apply the conditional formatting rule
Step 2: From the Home tab, click the Conditional Formatting command. A drop-down menu will appear.
Step 3: Hover the mouse over the desired conditional formatting type, and then select the desired rule from the menu that appears. In the Activity 4.1, cells that are greater than 50, 000 are to be highlighted.
Step 4: A dialog box will appear. Enter the desired value(s)into the blank field. In the case of the activity 4.1.the taken value is 50, 000.
Step 5: Select a formatting style from the drop-down menu. In the Activity 3.1, the color to choose is Green Fill with Dark Green Text, then click OK.
Step 6: The conditional formatting will be applied to the selected cells. In this case, it’s easy to see which salesperson reached the 50, 000 sales goals for each month.
Note: It is possible to apply multiple conditional formatting rules to a cell range or worksheet. This allows to visualize different trends and patterns in data.
3.1.2. Clear rule
Rules that have been used to highlight cells that meet certain conditions can be removed and have text with no highlight when the rules are no longer needed or when there is a need to set new rules.
To clear rules, do the following:
Step 1: Select the desired cells for clearing the conditional formatting rule
Step 2: On the Home tab, in the Styles group, click Conditional Formatting
Step 3: Click Clear Rules then click Clear Rules from Selected Cells
After clearing rules for selected cells, cells are no longer colored, there is no more formatting in cells.
3.1.3. Create Top/Bottom Rules
Top/Bottom rules are another useful Conditional Formatting in Excel. These rules allow users to call attention to the top or bottom range of cells, which can be specified by number, percentage, or average.
The steps to create Top/Bottom rules are:
Step 1: Select the desired cells for the conditional formatting rule
Step 2: From the Home tab, Select Conditional Formatting then Top/Bottom Rules then click Above Average
Step 3: A dialog box will appear. Choose color format to use like “Light Red Fill with Dark Red text”. After choosing cells format, Press “OK”
Step 4: The sheet will now highlight the values above the average
3.1.4. Create new rule
Excel allows to create a formula-based conditional formatting rule.
The available options are:
• Formatting cells based on their values,
• Formatting cells that contain certain values,
• Formatting only top or bottom ranked values,
• Formatting only values that are below or above average,
• Formatting only unique or duplicate values and using a formula to determine which values to format.
All those options are presented in the window below:
Step 1: Select the cells to be formatted. In the Home tab click on Conditional Formatting command and click New rule.
Step 2: Create a conditional formatting rule, and select the Formula option then click OK. In the window below the option “Use a formula to determine which cells to format” has been chosen
1. Format all cells based on their values
Step 1: New formatting rule window will be opened.
Step 2: Select Format all cells based on their values option, however this is by default selected.
There are at least four format styles that can be applied while applying conditional formatting on Excel data. Those formats are: Data Bar, Icon Set, 2-Color Scale and 3-Color Scale a. 2-color scale
Step 1: Choose minimum and maximum values
Step 2: Click Ok button to apply this conditional formatting
Step 3: Data set with this condition formatting will look like below Note: we have chosen minimum number to 50,000 and the maximum to 80,000, then selected a colors to separate both values.
b. 3-color scale
Step 1: New formatting rule window will be opened.
Step 2: Select Format all cells based on their values option, however this is by default selected.
Below are steps to apply 3 -color formatting style:
Step 3: Select 3 color scale option in format style
Step 4: Choose the type; here we are taking as Minimum, Midpoint and Maximum
Step 5: Put values for number for Minimum, Midpoint and Maximum then, results are displayed as follows:
2. Use a formula to determine which cells to format
New rules can be created by customizing own formulas. By using custom made formula, a custom condition that triggers a rule is created and can be applied as the user needs it to be applied. In the data that is going to be used the formula = B3>80000 has been applied for formatting.
To specify the formatting formula click on Conditional Formatting tab then New Rule and choose Use Formula to determine which cells to format as in the window below:
Step 3: In the window that will appear, enter a formula that returns TRUE or FALSE then set formatting options, save the rule and press OK
After clicking OK cells that meet the formatting rule are highlighted as specified in the new rule. In the window below cells meeting the criteria are blue colored as it has been specified in the preceding window.
Note: Always write the formula for the upper-left cell in the selected range and Excel will automatically copy the formula to the other cells in the selected range.
Below are some formulas that apply conditional formatting and return TRUE or FALSE, or numeric equivalents that can be used in setting formatting cell rules based on formula:
1. =ISODD (A1): This function is used to check if a numeric value is an odd number. ISODD returns TRUE when a numeric value is odd and FALSE when a numeric value is even. If value is not numeric, ISODD will return the #VALUE error.
2. =ISNUMBER (A1): The function is used to check if a value is a number. ISNUMBER will return TRUE when value is numeric and FALSE when not.
3. AND (A1>100, B1<500): The AND function is used to apply more than one condition at the same time, up to 255 conditions. Each logical condition (logical1, logical2, etc.) must return TRUE Examples AND (A1>100, B1<500) tests if the value in A1 is greater than100 and B1 less than 500
APPLICATION ACTIVITY 3.1
Open the file “Burera Ltd. Sales Data”
1. Using Burera Ltd Sales data, show salespersons who are not meeting their monthly sales goals. The sales goal is 50,000 item per month
2. Highlight all salesperson whose sales are above the average
3. Highlight with green color all salesperson whose sales are below 80,000
3.2 Charts
Activity 3.2
1.Open Spreadsheet program, en- ter data in the table below and save it as “Production”
2.Using Production data make the graph below
3.2.1 Create a Chart
In spreadsheet, a chart is often called a graph. It is a visual representation of data from a worksheet that can bring more understanding to the data than just looking at the numbers
A chart is a powerful tool that allows to visually display data in a variety of different chart formats such as: Bar, Column, Pie, Line, Area, and many.In order to create a chart, the following steps are followed:
Step 1: Select the desired cells in the chart creation
1.Open Spreadsheet program, en- ter data in the table below and save it as “Production”
Step 2: On the Insert tab, in the Charts group, choose the type of chart to use. In this case the type chosen is the column chart. Click the column chart symbol
Step 3: Choose the appropriate style. Here a Column Chart has been chosen. The chart looks like in the image below:
3.2.2. Change Legend Position
To move the legend to the right side of the chart, go through the following steps.
Step 1: Select the chart.
Step 2: Click the button on the right side of the chart, choose Legend and click on the arrow next to it. Click on any option to apply in this case Right was chosen.
After changing the Legend style, the Legend will be located on the right side of the chart as it was specified in the steps. The chart looks like in the image below:
3.2.3. Data Labels
Data labels focus the readers’ attention on a single data series or data point. These labels can be arranged in the center of the bar, outside end or any other fashion that the reader wants. Data labels positions are set in this way:
Step 1: After selecting the chart click a green bar to select the Data Labels.
Step 2: Choose the position where data is going to appear, in this case Center has been chosen
The graph below with data labels in centers is the result:
3.2.4 Change Chart Type
There are different types of chart which can be used depending on the data to display. Switching from one chart type to another is done in this way:
Step 1: Select the chart for which the type is to be changed
Step 2: Click on the Design tab found under the Chart Tools and in the Type group, click Change Chart Type
Step 3: In the new window that will appear click on either“ Recommended Charts ”or “All Charts”. Choosing all charts will display all the charts from which user can choose. In the image below the line chart was chosen. Select the type and click OK
The resulting graph will look like in the image below:
APPLICATION ACTIVITY 3.2
Open the file “Burera Ltd. sales data and do the following:
1. Create a bar column using Burera Ltd. Sales Data
2. You have the graph below. Change it to another type (Column chart)
3.3. Data organization
Activity 3.3
1. Open Burera Ltd Sales data file and update the table as follow:
a. Show salesperson whose region is “Northern”
b. Show all salesperson whose sales are below the average
After data has been entered into an Excel worksheet and even after it has been organized into a table, it can still be manipulated and reorganized. One of the easiest options is to sort data in a particular order for example, sorting data in alphabetical order.
On the other hand, Filtering data allows to analyze data easily. When data is filtered, only rows that meet the filter criteria is going to be displayed and other rows will be hidden. Filters narrow down the data in a worksheet, allowing to view only needed information.
3.3.1 Filtering data
After entering data in Excel, it is also possible to filter, or hide some parts of the data, based on user-indicated categories. When using the Filter option, no data is lost; it is just hidden from view. In order for filtering to work correctly, the worksheet should include a header row which is used to identify the name of each column and is used for filtering. Follow these steps for filtering data in an excel table:
Step 1: Select the Data tab, and then click the Filter command. Immediately a drop down arrow will appear in the header cell for each column. The filter command can also be accessed by clicking the Home tab and finding it at the far right side of the menu in the Editing Group.
Step 2: Click the drop-down arrow for the column to filter. In this activity column B (Region) is filtered to view only certain region.
Step 3: In the Filter menu that will appear uncheck the box next to Select All to quickly deselect all data.
Step 4: Check the boxes next to the data to filter, and then click OK.
In this example, Northern is checked to view only those types of equipment. The data will be filtered, temporarily hiding any content that doesn’t match the criteria
3.3.2 Clear a filter
After applying a filter, it can be removed or cleared from the worksheet. That can be in this way:
Step 1: Click the drop-down arrow for the filter that is going to be cleared the Filter options will appear. In the case of the activity4.3, the column B filter is going to be cleared.
Step 2: Choose Clear Filter from [COLUMN NAME] from the Filter menu. In this activity, select Clear Filter from “Checked Out”. This can also be done by selecting all the items (Northern, Eastern, Western) available in the filter
Step 3: The filter will be cleared from the column. The previously hidden data will be displayed
3.3.3. Sorting
Sorting refers to ordering data in an ascending or descending order according to some linear relationship among the data items. Sorting can be done on names, numbers and records.
Below are steps to sort data:
Step 1: Select the entire table to sort. In most cases, select just one cell and Excel will pick the rest of the data automatically, but this is an error-prone approach, especially when there are some gaps (blank cells) within the data to sort.
Step 2: On the Data tab, in the Sort & Filter group, click Sort
Step 3: The Sort dialog box will show up with the first sorting level created automatically
Note: If the first dropdown is showing column letters instead of headings, tick off the “My data has headers” box.
Step 4: Click the Add Level button to add the next level and select the options for another column then click Ok if all needed levels are added. For sorting by multiple columns with the same criteria, click Copy Level instead of Add Level. In this case choose a different column in the first box.
After the sorting criteria are applied data will be sorted by Region then by Salesperson as it is clear in the image below:
APPLICATION ACTIVITY 3.3
1. Open Burera Ltd Sales data file and update it to make it look like the table below:
a. Show salespersons whose region is “Western” and sale “Battery”
b. as product
c. Sort Product in ascending order by showing the region where the product is sold
3.4. Exporting Excel files to PDF or other file types
Activity 3.4
1. Open Burera Ltd Sales data file and export it to a PDF file format
3.4.1 Export Excel Files to PDF
By default, Excel workbooks are saved in the .xlsx file type. However, there may be times when there is a need to use another file type such as a PDF.
Follow the steps below to export an Excel file to PDF Step 1:Click on the File menu then Export on bottom of File Menu. A Panel will appear on right side to Export file in .PDF format. Click on Create PDF/ XPS Document then on Create PDF/XPS
APPLICATION ACTIVITY 3.3
Open Burera Ltd Sales that you have created in previous activities and do the following:
1. Export Burera Ltd Sales data File to web page file
2 . Export this same file to PDF. What are the benefits of saving an excel worksheet to PDF?
Step 2: A Save As window will appear. Select the location where to save the PDF file, give it a name and click Publish.
Excel will Export only the worksheet that is currently active. For exporting to PDF a workbook that has more than one worksheet click on the Option tab available on the save as window then tick “Entire workbook” and click on OK then on Publish.
3.4.2 Exporting in another File Type
Apart from PDF and other file formats that can be used to save Excel, it is possible to export an Excel file in other formats like csv, binary workbook and many others.
To Export Excel files to other formats go through the following steps:.
Step 1:Go to File, then Export. Click on Change File Type and the window below with different file types will appear
Step 2: In the window that will appear choose the new file type to apply and click on Save As in order to provide the name and the location of the file. File types can be csv, OpenDocument spreadsheet, Macro-Enabled workbook, Text or any other available option.
APPLICATION ACTIVITY 3.4
1. Open Burera Ltd Sales that you have created in previous activities and do the following:
2. Export Burera Ltd Sales data File to web page file
3. Export this same file to PDF. What are the benefits of saving an excel worksheet to PDF?
End unit assessment
Enter the data below in Excel and save the file under the name “Senior 4 MPC Mark Sheet”
1. Calculate the total and the grand total for each student
2. Highlight in red and bold students who scored less than 5 points in each subject
3. Use Green fill with dark green text to Highlight students who have total above 12 in any subject
4. Using blue highlight show all students who scored 55 and above 5. Sort Grand Total in descending order
UNIT 4: SEARCHING THE INTERNET
Introductory activity 4.0
During the end of the year holiday, Jean Claude, a student in Senior Four in one of the schools with Associate Nursing Program in Rwanda received a message from someone claiming to be a girl who studies in Senior Four at the same school. The girl claimed to have feelings for Jean Claude. They chatted as much as they could even confidentially and sent to each other pictures. At the beginning of the new school year Jean Claude met the girl as they entered the school gate and tried to hug her but the girl seemed not to know him. Later he learned from her that they never chatted. Some weeks later Jean Claude received a message that if he does not pay 100000 Frw his nude pictures will be published on social networks.
a. “The girl seemed not to know him” Explain why while they introduced themselves to one another and have been sending pictures to one another
b. Discuss how Jean Claude would have prevented the threat of having his nude pictures shared
c. Have you encountered a problem like this while using the internet and social media? Discuss.
4.1 Internet ethics
Activity 4.1
During the end of the year holiday, Jean Claude, a student in Senior Four in one of the schools with Associate Nursing Program in Rwanda received a message from someone claiming to be a girl who studies in Senior Four at the same school. The girl claimed to have feelings for Jean Claude. They chatted as much as they could even confidentially and sent to each other pictures. At the beginning of the new school year Jean Claude met the girl as they entered the school gate and tried to hug her but the girl seemed not to know him. Later he learned from her that they never chatted. Some weeks later Jean Claude received a message that if he does not pay 100000 Frw his nude pictures will be published on social networks.
a. “The girl seemed not to know him” Explain why while they introduced themselves to one another and have been sending pictures to one another
b. Discuss how Jean Claude would have prevented the threat of having his nude pictures shared
c. Have you encountered a problem like this while using the internet and social media? Discuss
Internet is an interconnection of computer networks worldwide providing a series of information and communication facilities and thus being a big tool for carrying out researches. Internet ethics refers to set of moral principles that regulate the use of internet. Thus the internet users must be honest, respect the right and property of others on internet.
The following are ethical issues that should be addressed at individual, social, and political level:
a. Flaming
Flaming refers to messages that contain offensive, obscene or immoral words spread via social media applications such as WhatsApp, Facebook and Instagram.
b. Forgery
Availability of computers and high-resolution imaging devices has made it possible for criminals to forge certificates, money and identity cards.
c. Piracy
Piracy is a form of theft of intellectual property on copyrighted software products without proper authorization. To avoid violation of copyright laws, everyone needs to understand various software licences.
d. Terrorism
High penetration of internet and mobile phones has exposed most countries to evil plans of terrorists across the globe.
e. Pornography
Availability of pornographic material in form of pictures and video has affected moral values of young children leading to immoral behavior such as homosexuality and premature sex.
f. Fraud
Computers and mobile phones are being used to steal other people’s account details or money through fraudulent means such as fake websites and SMS messages.
g. Corruption
Corruption has become social evil in private and public institution because it is seen as the easiest means to gaining social, economic or political favors. In some countries, mobile and internet-based money transfer has opened doors to corrupt behavior that goes unnoticed by law enforcement agents.
h. Blackmail
Is an action of asking money or any other benefits in exchange to not revealing private information on someone. That information can be nude pictures or videos and other compromising information about someone.
As internet ethics mean acceptable behavior of using internet below are ten rules that anyone using the internet should follow:
1. Do not use the Internet to harm other people.
2. Do not interfere with other people’s internet work.
3. Do not snoop around in other people’s internet files.
4. Do not use the Internet to steal.
5. Do not use the Internet to bear false witness.
6. Do not copy or use proprietary software for which you have not paid without permission.
7. Do not use other people’s Internet resources without authorization or proper compensation.
8. You shall not appropriate other people’s intellectual output.
9. Think about the social consequences of the program you are writing or the system you are designing if it is to be used over the internet
10. Always use the Internet in ways that ensure consideration and respect for your fellow humans
Apart from the rules some of the ethics to be followed while using internet are here below:
• While using email and chatting, internet must be used for communication or for research purpose. Be on guard while chatting with stranger and avoid forwarding e-mail from unknown people or stranger
• Do not be rude and do not use bad language while using email, chatting, blogging and social network, be respectful to others’ views.
• It is not advisable to use internet to fool others or pretending to be someone else, hiding one’s identity to fool other on internet is a crime.
• It is not advisable to download and share the copyrighted material without permission.
APPLICATION ACTIVITY 4.1
1. Brainstorm on how technology use has influenced our morals in terms of communication, privacy and intellectual property rights.
2. What are ethical challenges arising from the use of computers and mobile devices used to access the internet?
4.2. Web security spyware, hacking and firewall
Activity 4.2
1. Discuss the measures taken by your school to protect computers against different security threats If they are not secured suggest solutions that can be used to safeguard them.
2. By doing a research write down some cases of internet security break that have happened in Rwanda and in the world?
Computers are indispensable tools in the life of human beings. Computers are used in different area such as banking, shopping, communicating between people through emails and chats, etc. However, some intruders join the conversations and try to read emails and other information for which they don’t have the rights. Most of the time, they misuse their computers by attacking other systems, sending forged emails from computers, or examining personal information stored in others’ computers.
Web security, spyware, hacking and firewall are among the terms that are common in the world of internet specifically when it comes to using the internet. The common attributes for all these terms are that they refer to the need to use the internet securely.
4.2.1. Web security
Web security refers to the techniques of protecting computers, networks, programs and data from unauthorized access or attacks. Major areas covered in web security are: Application Security, Information Security, Disaster recovery and Network Security.
The key Web services security requirements are authentication, authorization, data protection, and no repudiation. These are implemented in order to have more security while on the web.
a. Authentication
It is a process in which the credentials provided are compared to those in the database of authorized users’ information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access. Therefore, authentication verifies the identity and enables authorization.
c. Data protection It is the process of safeguarding important information from corruption, compromise or loss.
4.2.2. Spyware
Like virus, Spyware also comes under the category of malware attacks. Although the working of spyware is different from the other types of malware mentioned earlier in unit 2, Spyware as the name suggests is used to spy into a system. The job of the spyware is to silently sit inside the host system and observe the activities of that system.
i. How spyware work
Suppose a user is logging on to any bank. Once the website of the bank opens, the user id and login password are input. After that if the user wants to do a financial transaction, the transaction password has to be entered. All this information is quietly registered by the spyware then the spyware sends all the information recorded from the user’s computer to probably a hacker who is somewhere else on the Internet.
ii. How spyware is spread
Devices which use windows operating systems are more susceptible to attacks; here below are the most common ways, a computer can become infected with spyware:
• Accepting a prompt or pop-up without reading it first
• Downloading software from an unknown source
• Opening email attachments from unknown senders, etc.
iii. How to recognize spyware on the device
Spyware can be difficult to recognize in an infected device. But there are clues that can help one to know that a computer has been infected. The symptoms of a computer attacked by a spyware are that the device is so slow or crashes unexpectedly, it runs out of hard drive space and there are pop-ups when online or offline.
iv. How to remove spyware
If the device is infected with spyware, it is necessary to run a scan with current security software to make sure it has cleaned up everything it can. The best fight against a spyware is to install reputable anti-spyware removal tools. v. How to help prevent spyware Here are four main ways to help prevent spyware.
Do not open emails from unknown senders.
• Do not download files from untrustworthy sources.
• Do not click on pop-up advertisements.
• Use reputable antivirus software.
4.2.3. Hacking
Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer belonging to other people. It is the process by which cyber criminals also known as hackers gain access to a computer. After entering in that computer, a hacker can find weaknesses (or pre-existing bugs) in the security settings and exploit them in order to access available information. Hackers can also install any malware such as spyware or Trojan horse, providing a back door in where to enter and search for information.
4.2.4. Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between an internal network and incoming traffic from external sources such as the internet in order to block malicious traffic like viruses and hackers.
i. How does a firewall Work ? Firewalls carefully analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks. Firewalls guard traffic at a computer’s entry point, called ports which is where information is exchanged with external devices.
ii. Types of Firewalls
Firewalls can either be software or hardware, A software firewall is a program installed on each computer and regulates traffic through port numbers and applications, while a physical firewall is a piece of equipment installed between the network and the gateway.
APPLICATION ACTIVITY 4.2
1. Discuss and write a brief report on the importance of web security at your school, in Rwanda and in the whole world.
2. In a bank, any customer can create and use an identity (e.g. a user name and password) to log into that bank’s online service but the bank’s policy must ensure that the customer can only access individual account online once his/her identity is verified.
a. Identify which type of security is used in this bank?
b. Why is that imposed security important?
4.3. URL and its parts
Activity 4.3
Each year all students of P6, Senior three and Senior six pass the national exam. Marking is the second step that follows. After marking, Rwanda Basic Education Board avails the result on its web application so that each student can view the results.
Give and explain the steps to go through for accessing national exam results
1. Briefly explain the term web browser
2. Differentiate between a web page and website as used when referring to the internet
a. Web browser
Commonly referred to as a browser. It is a software program that allows a user to locate, access, and display web pages. They are used primarily for displaying and accessing websites on the internet as well as other content created using appropriate languages such as Hypertext Markup Language (HTML) and Extensible Markup Language (XML).
Examples of browsers: Mosaic, Netscape Navigator, Internet Explorer, Mozilla Firefox, Opera and Google Chrome.
b. Website
It is a collection of related web pages stored as a single file in a web server. It is also defined as a group of World Wide Web pages usually containing hyperlinks to each other and made available online by an individual, company, educational institution, government, or organization.
c. Webpage:
This is hypertext and hypermedia documents containing information about an individual or organization. It is accessible through the internet or other networks using an internet browser.
A web page is accessed by entering a URL address and may contain text, graphics and hyperlinks to other web pages and files.
4.3.1. Uniform Resource Locator (URL)
The term Uniform Resource Locator abbreviated as URL commonly known as website address is a unique address of each web page and identifies the location of that specific web page on the internet. An example of URL is: http://www.yahoo. com
4.3.2. Parts of URL
The URL consists of three main parts namely: Protocol, Domain also known as host name and Resource ID.
i. Protocol
It is a set of rules that governs how data is transmitted over a network. There are many types of protocols used in a network. In a URL address, the protocol is shown at the beginning of the address followed with a colon and double slashes. In the example above the protocol is http (Hypertext Transfer Protocol). Nowadays, HTTPS, which stands for Hypertext Transfer Protocol Secure, is the most common used protocol. It tells a web browser to encrypt any information entered onto the page, like the passwords or credit card information, so cybercriminals cannot access it.
ii. Server name or Host name
It identifies the computer on which the resource is located. This computer is known as a remote server. Most web server names begin with the letters www (For example www.igihe.com) The server name always ends with a dot and a three or two-letter extension called the domain name.
iii. Domain name
The domain is important because it usually identifies the company, agency or organization that is directly responsible for the information, or is providing the computer space where the information is kept. Sometimes it indicates the country where the server is located.
The Top-Level Domain (TLD) specifies what type of entity an organization registers as on the internet. For example, “.com” is intended for commercial entities.
Here below are some common top-level domain names:
• com: identifies company or commercial sites.
• org: for non-profit organization sites.
• ac: for academic/educational institution.
• edu: for educational sites.
• go: for government agencies sites.
• net: for Internet service providers.
• co: for company.
• mil: for military organization.
Examples of country domains are .rw for Rwanda; .ke for Kenya; .uk for United Kingdom; .jp for Japan; .tz for Tanzania; .us for United States; .au for Australia; .ca for Canada; etc.
iv. Sub domain
Website is like a house; sub domains are like specific rooms in that house. A sub domain in a URL indicates which particular page of a website the web browser should serve up.
v. Resource ID
It identifies the file name and the folders or subfolders under which the webpage is stored on the remote server.
Example of resource ID is /index.php/ icons/services
APPLICATION ACTIVITY 4.3
1. What do you understand by the term web address
2. Describe all parts of URL
3. What do mean by the term Top level domain?
4.4. Search on the internet
4.4.1. Strategies for better search results:
4.4.1.1. Simple search technique
Activity 4.4
1. Considering the image below of Google search engine window. Name the parts labeled from A to G
2. Open the browser in address bar, type the most used search engine and in search box type the following text “the proper use of ICT in Rwandan school” Explain what you observe after
Search on the internet requires the use of search engines, such as Google or Ask. The words that are typed in the search box are called keywords, and should be directly related to the topic that one is searching for.
Understanding how to perform searches for online information increase the chances of finding the needed information. Search Engine: Search Engines are programs that help the user look for and identify items that corresponds to keywords or phrases specified from the World Wide Web. Examples include; Yahoo, Google, Bing and Ask.com among others.
A. Strategies to pinpoint specific information online
Searching the internet can be a frustrating; researcher may enter a word or a phrase into a search engine and get irrelevant information. What is need is the ability to refine the search to get exactly what is needed.
1. Vary the Search Engine
Search engines search through about millions of active websites to provide content and source of content. No search engine is perfect, they all have shortcomings that are avoided only by the techniques of the user while searching. Keywords are the terms that searcher uses to find content on the internet. Making the keywords as specific as possible will lead search engine to track down the information that user needs.
2. Simplify the Search Terms
Some engines include Stop Words in their searches. These are frequently used words such as prepositions (in, of, on), conjunctions (and, but) and articles (a, the), which means that the search results have more pages of search results than needed. It is usually best to eliminate stop words from the internet searches. The main exception is if the search is based on looking for a specific title or name that includes them.
3) Use Quotation Marks
Enclosing a search term also known as search query within quotation marks prompts the search engine to search for that specific word or phrase.
If the term is a single word, using quotation marks will cut out stemmed variations of it. For example, if searching for the word director, the researcher likely receives a lot of results for direct, direction, directions, and so on typing “director” with quotation marks, ensure that only results for that stem word are displayed.
If the search term is a phrase, the search will be for that specific phrase, rather than for all the component words as individual items. For example, if searching for the phrase director of human resources, without quotation marks, the search returns results based on all of the words in the phrase. Thus, surrounding the term with quotation marks, will generate results that feature this specific term.
4. Remove unhelpful words
The use of a hyphen, small dash or minus sign immediately before a word excludes it from a search. For example, typing in marketing -digital will exclude digital from the search engine, making it easier to find the information searched for. Typing marketing -digital -social would allow researcher to get rid of even more confusion.
5. Refine the search using operators
Other characters or terms, known as operators allow to narrow down the internet search in more targeted ways.
A few of those are explored here below:
• Wildcard searches: use the * symbol as a placeholder for another word. For example, searching for * man in the world returns results for the richest man in the world, the tallest, the oldest, and so on. Wildcard searches are also useful for example when researcher do not know the full text of a quote.
• Combination searches: the OR operator enables user to search for two or more terms simultaneously, and is most useful when those terms are very similar. For example, typing selling OR retailing, will return pages where either of the terms is used, without both needing to be present.
• Another way to combine searches is to use AND. This operator ensures that researcher receives only search results that include two or more terms.
• Search in a specific Site: Typing the site followed by the URL of the website that researcher wish to search and a search term limit the search to a single website. For example, the site: reb.rw” Director General” will return all the pages from reb.rw that feature the term “Director General.”
• Finding related sites: A useful operator is related. Typing this in front of a web address like in the search sentence “related: igihe.com” (don’t consider the quotes) will deliver a range of websites that are similar to igihe.com.
6. Avoid the use of difficult word to recognize (Search Pitfalls)
Note: When searching online, it is important to bear in mind that the use of abbreviation cannot give the relevant result. Whatever written in search box of search engine, the search engine tries to provide relevant information related to the search query.
The window below shows what the search engine displays when researcher wants to get information about current Rwandan District.
B. Keywords
Keywords are the words that the search engines use to find pages. Generally, the more specific the word, the better the returned results will be, because the page which contains that word will more likely have something the user intended to look for.
APPLICATION ACTIVITY 4.4
1. Using Google search engine conduct a research about the topic” IMPACT OF GIRA INKA MUNYARWANDA”
2. Using Search in a Specific Site, Conduct a research about the all prime ministers of your country .
4.4.1.2 Advanced search techniques
Activity 4.5
1. Conduct a research on internet about Boolean operators
2. Using different search techniques which include Boolean operators, quotation marks,… do a research on the internet about the sexual development of a human from birth to adolescence .
i. Advanced search techniques using Boolean operators Boolean searching, also known as searching using Boolean Operators in between the search words is the single most effective advanced search techniques used to improve the search results, making them more relevant and precise. While using these operators capitalize the words AND, OR, and NOT to form the most effective search queries.
Additionally, quotations are important when searching for a phrase or multiple phrases.
Examples:
• Keyword1 AND Keyword2: Results must include both results
• Keyword1 OR Keyword2: Results must include at least one of the keywords
• Keyword1 NOT Keyword2: Results must exclude Keyword2
The Boolean logic expression “Lesson and Tutorial” once typed in search engine will ensure that the engine returns document which contains both words.
The Boolean logic expression “power imbalance” OR “power balance in mediation “once typed in search engine will ensure that the engine returns any document which had either of the terms. The Boolean logic expression “Lesson Not Tutorial” once typed in search engine will ensure that the engine returns any document which contains Lesson but no
document contain the word Tutorial will appear in the same page of search engine.
When the AND operator is used in the search query, the search engine returns results whose content has both keywords on either side of the operator. In this case the words lesson and tutorial will appear in the search results. On the other hand, using the OR operator will return only results containing one of the operand words.
Note: both or none of the keywords may not appear in the search results when the operator AND, OR are used but when the link is opened the opened page will contain those keywords
ii. Advanced search technique using quotation marks
Quotation marks (“”) can be used in search engine to avoid finding similar terms or derived words. They are used around phrases. The use of quotation marks tells the search engine to only bring back pages with the typed term in exact order they were typed. Example: typing the “health and care reform” in search engine is accurate than typing health and care and reform and will display in the search results that sentence in quotes
iii. Advanced search techniques using tilde sign (~) When the tilde operator is placed in front of a keyword, it also searches for words that are synonyms of that keyword. The searcher can use the tilde operator (~) to get Google or other search engines to expand the search with related keywords. This is helpful when one does not know the entire search query to use.
iv. Advanced search technique using NEAR
This operator is a more specific form of the AND operator. It ensures that the document contains both terms and that they are located near each other. In many lengthy documents, just using the operator AND might not provide useful results as the two keywords might be located in very different parts of the document and might not be related to one another.
Example: The expression “resistance NEAR physics” used in the field of physics search engine will ensure that the engine uses both words in its search and ranking logic that both words appear
v. Advanced search techniques using parenthesis
The operators AND, NEAR, OR and NOT are powerful in their own right but when used in conjunction with parentheses, they can offer substantial control over the search logic executed by the engine. Parentheses are used in Boolean logic similar to the way they are used in mathematical equation, limiting and ordering relationships between variables.
Example: If one wants to find a web-based internet tutorial, it is better to use the search criteria internet AND (tutorial OR lesson). The documents returned must contain both of the word internet and tutorial or internet and lesson. Obviously, the parentheses are used to distribute the keyword internet to one of the two “OR” words inside the parentheses.
APPLICATION ACTIVITY 4.5
1. Using the advanced search techniques seen, search on the internet about these topics:
a. Non-renewable energy
b. The power of the mind
3. Discuss about the use of NEAR keyword used in advanced search techniques
4.4.1.3. Searching for documents, books, images, video on the internet
Activity 4.6
1. One day an ICT teacher wanted to teach about the topics “assembling and disassembling computer”. The day before the teacher gave homework to the students to go to the internet and watch for video showing how to conduct the activity to assemble and disassemble computer.
a. Suppose you are in that class, search for those videos on the internet
b. Analyze the videos got and compare them in terms of their relatedness to the topic
Finding specific information on the internet is compared to searching for information in the library. It is not necessary to have experience in internet searching or even to know where to locate search sites. Different ways of searching for document, books and video on internet are elaborated in the sections to follow.
A. Searching for documents
Most information is found on the internet by using search engines. While searching for documents online using search engine simply require the typing of search query in search box, the search engine displays a lot of information which can be in millions of pages like in the image below where more than 6 millions of pages are returned.
Accessing document from internet
The process of getting files from the internet is known as downloading. The downloaded files can be viewed, saved or printed. Any attachment sent in an internet needs to be downloaded.
The process of putting information, document, web pages, images and files onto a web server is also known as uploading
B. Searching for book
There are different ways to search for online book such as using Wikipedia, Google as search engine; researcher can even search for books which have been uploaded to any site such as in-house books uploaded to the REB website. When the searched book is found, the next step is to download it.
To search for a book using Wikipedia, one needs just to know the book Title, Author, publication house, and date of publication for that book. There are free online websites such as www.free-ebooks.net but also there are some websites where books are found after payment. Those websites are like amazon, burner and noble.
C. Searching for images
Most people use the web to search for images. They like to search for images online and there are many sites and search engines dedicated just to searching different kinds of images. While searching for online images consider the copyright issues before using them.
To search and download images from the internet follow these
steps:
1. Type “google.com” in the web address to find the image to download.
2. Type the name of the image needed, in the available list of related images select the needed image.
3. Right-click to the image to save.
4. Click Save image as, searcher can even use “copy image as” option.
5. Choose location where to save the image.
D. Searching for video on the internet
Internet video or online video is the general field that deals with the transmission of video over the internet. Internet video exists in different formats, such as MPEG-4 AVC, AVCHD, FLV, and MP4 MP, MP4A etc. Those videos can be accessed through several online video hosting services, such as YouTube, as well as Vimeo, Twitch, and Youku, vidmate etc.
D.1. Searching for video using search engine and video icon
It is easy to access videos through the use of video icon located on search engines. The process of locating videos simply requires to type the name and the author of the video in search box of search engine and thereafter click on video icon as shown in the figure below:
D.2. Search video on internet using online video hosting services
Internet video or online video such as YouTube, vimeo, Twitch, and youku, vidmate for Smartphone are very useful tools that help to search for video.
To search for video online proceed as follows:
• Open the browser
• In web address or URL type the online video hosting services such as youtube. com
• In the opened webpage just write the name of the video by specifying its author in order to avoid confusion.
Here is a window showing how to find a video using YouTube online hosting service.
Once a video is seen it can be watched online or downloaded and saved using different appropriate software such as YTD Video Downloader, Internet Download Manager so that they can be watched offline.
D.3. Searching for images and videos on internet using add-on software •
Software add-on
This is a piece of software that adds a specific feature or capability to an existing software application. A software add-on cannot be run independently; it is just a software extension. Examples of common add-ons are Adobe Flash, QuickTime, Download Helper and Silverlight.
• Download Helper
This is a tool used to extract videos and image files from websites and save them to the hard drive.
• Download file (Video) using add-ons/download helper
Type in the Address bar “www.YouTube.com”. Locate a favorite video and click on it. To download a video on YouTube, there is a red button under Active Video download. If Download Helper is used and there is an active video on any website, the icon is active for downloading it, see the figure below.
Click the above Download button of the active video then Save As dialog box is displayed and at this stage user can select the location where to save the downloaded video.
Note: YouTube has been designed for users who only watch and view videos on their website. In case to save the video on computer is needed, select from a variety of online downloader programs to download the video
APPLICATION ACTIVITY 4.5
1. a) Through the use of internet and by using different techniques, search for a video on any one of the three video hosting services (YouTube, Vmeo, Twitch). The video to search for is about “grain germination”
b) Which one gives more related search results? Explain
2. Search on internet a book called “Imigani miremire ” written by Aloys BIGIRUMWAMI
3. Create a folder on Desktop and call it your name, thereafter Search on internet the current map of Rwanda and save it in the created folder.
4.4.2 Searching by image
Activity 4.7
Take an image of your classmates in the classroom and save it on the computer with internet connectivity. Using that saved image search for similar images of students (or student teachers) in the classroom.
The term search by image also called “reverse photo lookup” is a type of online search where, user instead of typing in a text-based keyword also known as search query, uploads an image to find visually similar images and relevant details about the query image.
Here below are procedures to conduct the search by image:
1. Open Google Images (images.google.com)
2. Click on the camera icon in the search box
3. Click Upload an image
1. Click Choose file’ and browse through the image from PC.
2. Select the image and upload it to Google image.
In the figure above images can be searched by pasting the address (Paste image URL) of searched image or by uploading it. The term upload has been seen earlier. Here below is the description of the downloaded image called download33. The image shows that it is related to images describing the smart classroom.
APPLICATION ACTIVITY 4.7
Download ICT books for your subject available on the internet and save them on your computer
4.5. Browser’s techniques for remembering
Activity 4.8
3. What is the role of the cord found in the book below
2. Tom Likes watching movies related to Surgical Pathology on YouTube. Whenever he opens YouTube he finds Surgical Pathology related topics displayed the first. For his friend Kamana who likes to watch videos on History of Rwanda, videos on Surgical Pathology are not displayed. Discuss the possible reason for this.
People who use the internet testify that the internet seems to be intelligent based on the feedback and suggestions they get from it. Some websites offer the possibilities to store some data like details of a filled form, user name and passwords in such a way that on the next visit to the same website those data won’t need to be refilled. Some websites like YouTube, social media websites and e-commerce websites provide suggestions to their visitors depending on their experience for the last visit on the same website. The different mechanisms through which this is achieved are elaborated in this topic.
A. Cookies
Cookies are small files which are stored on a user’s computer. They are designed to hold a modest amount of data specific to a particular client and website and can be accessed either by the web server or the client computer.
A computer cookie consists of information. When user visits a website, the website sends the cookie to the computer. The computer stores it in a file located inside the web browser of the used computer.
The purpose of the computer cookie is to help the website keep track of user visits and different activities carried out by the users.
♦ Some activities of cookies
• Registering which people have visited what pages on a website. This information can then be used to choose the right advertisement or otherwise tailoring the pages the user may view. Many cookies used for advertising and tailoring content are third-party cookies.
• Monitoring the traffic through statistics to improve the site and learn more about different target groups.
• Keeping track of the selected language.
♦ Where to locate, enable or delete cookies
1. Open the browser. Because cookies are stored in the web browser, the first step is to open the browser.
2. Find where cookies are stored. Each browser manages cookies in a different location.
For example, in Internet Explorer, find them by clicking “Tools” and then Settings. And then click advanced settings” In Chrome, choose “Preferences” from the Chrome menu in the navigation bar, display settings. Then expand the “Advanced” option to display “Privacy and security.” From there, open “Content settings” and “Cookies.”
1. Manage the cookies. Every browser gives a range of options for enabling or deleting cookies. Internet Explorer for instance, allows managing cookies under “Privacy” and “Advanced.” In Chrome, find where cookies are stored as outlined above, and then select the management options under “Cookies.”
B. Bookmark
When referring to an Internet browser, a bookmark or electronic bookmark is a method of saving a web page’s address. In Microsoft Internet Explorer, bookmarks are referred to as favorites.
♦ The purpose of bookmark A bookmark is very useful when user finds a webpage that should be remembered in order to be able to look at it another day. Bookmarking is like creating a shortcut for quick access to that web page.
Here below is a list of shortcuts that can be used to access and view the bookmarks in a browser:
• Google Chrome: Ctrl+Shift+O
• Mozilla Firefox: Ctrl+B or Ctrl+ Shift+B
• Microsoft Edge: Ctrl+I
• Internet Explorer: Ctrl+I
• Opera: Ctrl+Shift+B
♦ Process of viewing bookmark in Google chrome
1. Open the Google Chrome browser.
2. Navigate to the page to bookmark.
3. Press Ctrl+D or click the star icon on the far side of the address bar
d. Cache
A web cache also known as a HTTP cache or page cache is a system that temporarily stores data such as web pages, images and similar media content when a web page is loaded for the first time.
When a user visits a page for the first time, a site cache commits selected content to memory and when that same page is visited again, the site cache is able to recall the same content and reload it much quicker when compared to the first visit.
e. Browser history
In computing system, the term web browsing history refers to a list of web pages a user has visited recently and associated data such as page title and time of visit which is recorded by the web browser software as standard for a certain period of time. Web browsers software do this in order to provide the user with a back button and a history list to go back to pages they have visited previously as well as displaying visited links which is recorded by the web browser software as standard for a certain period of time.
Web browsers software do this in order to provide the user with a back button and a history list to go back to pages they have visited previously as well as displaying visited links Viewing browsing history in Google Chrome:
All web browsers keep a record of every page visited in their web history. Here are the steps followed to view a browser’s history:
1. Open the browser.
2. Click the icon located to the far-right corner of Google Chrome under the closing icon.
3. Select History. This option is near the top of the drop-down menu.
4. Click History. It’s at the top of the pop-out menu.
5. Review the browsing history
APPLICATION ACTIVITY 4.8
1. Explain the purpose of Bookmark, cookies Cache.
2. Using internet explain three ways to view bookmarks using different browsers.
End unit assessment
1. What is URL? Explain the five parts of URL
2. What does the prefix https:// in a browser address field mean?
3. Differentiate web page from web site
4. When moving from one web page to another, it is a good to open each web page in a different window. Try opening the following links, each in its own window: www.igihe.com, www.reb.rw, www. google.com
5. What is a browser’s page history? What is its purpose?
6. Define the term search engine and list at least three examples of the most common ones
7. Nowadays most services are carried out online by using the web application www.irembo.gov.rw. With your computer connected to Internet, search for steps to be followed while applying for National ID using this web application.
BIOGRAPHY
1) National Curriculum Development Centre (NCDC). (2011). ICT Syllabus for Upper Secondary. Kigali.
2) MYICT. (2011). National ICT strategy and plan NICI III-2015.Kigali.
3) National Curriculum Development Centre (NCDC). (2006). ICT syllabus for Lower Secondary Education. Kigali.
4) Pearson Education. (2010). Computer Concepts.
5) Rwanda Education Board (REB), (2019), ICT Syllabus for TTC, (2019), Kigali
6) Rwanda Education Board (REB) (2019), Computer Science S5 student’s book
7) Rwanda Education Board (REB) (2019), Computer Science S6 student’s book
8) Rwanda Education Board (REB) (2019), Information and Communication Technology for Rwandan Schools Secondary 1 Students’ Book
9) Rwanda Education Board (REB) (2019), Information and Communication Technology for Rwandan Schools Secondary 1 Students’ Book
10) Rwanda Education Board (REB) (2019), Information and Communication Technology for Rwandan Schools Secondary 2 Students’ Book
11) Longhorn Publishers (2016) Computer Science For Rwandan Schools Senior Four Student’s Book
12) Fountain Publishers (2016) Information and Communication Technology (ICT) for Rwanda Schools Learner’s Book Senior Three.