Introduction To Computing (Autorecovered)
Introduction To Computing (Autorecovered)
LESSON
1
INTRODUCTION TO COMPUTING
SUB-STRAND 1: COMPONENTS OF COMPUTERS AND COMPUTER SYSTEMS
B7.1.1.1. Examine the parts of a computer
B7.1.1.1.1 Discuss the fourth-generation computers
MICROCHIPS
A microchip -- also called a chip, computer chip or integrated circuit (IC) -- is a unit of integrated circuitry that is
manufactured at a microscopic scale using a semiconductor material, such as silicon or, to a lesser degree, germanium.
Electronic components, such as transistors and resistors, are etched into the material in layers, along with intricate
connections that link the components together and facilitate the flow of electric signals.
Microchips typically include the following types of components, which can number into the millions or even billions,
depending on the type and function of the microchip:
• Transistors. Transistors are active components that control, generate or amplify electric signals within the circuitry,
acting as a switch or gate. Multiple transistors can be combined into a single logic gate that compares input currents and
produces a single output according to the specified logic.
1. Logic. This type of microchip does all the heavy lifting, processing the instructions and data that are fed to the device and
subsequently to the chip in that device. The most common and widely used type of logic microchip is the central
processing unit (CPU). However, this category also includes more specialized chips, such as graphical processing units
(GPUs) and neural net processors.
2. Memory. This type of microchip stores data. Data storage is either volatile or non-volatile. volatile memory chips require
a constant source of power to retain their data. DRAM is a common example of a volatile memory chip. A non-volatile
chip is one that can persist data even if the power supply is disrupted.
There are two primary processor architectures used in today’s environments: 32-bit (x86) and 64-bit (x86-64, IA64, and
AMD64). These architectures differ in the data path width, integer size, and memory address width that the processor is
able to work with. A 64-bit processor can support processing of larger “chunks” of data and address more memory than its
32-bit counterparts. Although most new hardware comes with 64-bit hardware, it is important to know what the
underlying processor architecture of existing hardware is for compatibility purposes.
A processor, also known as a CPU (Central Processing Unit), has several key parts, including the Arithmetic Logic Unit
(ALU), Control Unit (CU), registers, and cache. The ALU performs arithmetic and logical operations, while the CU
manages instruction execution and data flow. Registers provide fast, temporary storage within the CPU, and cache is a
high-speed memory for frequently accessed data.
B7.1.1.1.2 Demonstrate understanding in the use of input devices (barcode, scanner, etc.)
1. Keyboard
A keyboard is undoubtedly the most popular input device. A lot of the data we input into a computer is done through a
keyboard. The main set of keys on a keyboard include:
2. Mouse
A popular pointing device, it helps control the cursor. It has a left and a right button. The primary purpose of the mouse is
to send appropriate signals to the CPU. The first person to whom the creation of a working mouse is credited is Douglas
C. Engelbart, in 1963. The original mouse used a rollerball under the mouse’s surface; most optical mice today use a
laser.
3. Joystick
Similar to a mouse, a joystick serves as a pointing device, allowing the movement of a cursor. The joystick can be
maneuvered in all directions. Notably, the cursor continues moving toward the joystick unless it is in an upright position,
distinguishing its operation from that of a mouse, where the cursor moves with the mouse’s motion. Joysticks find
significant applications in areas such as computer-aided design (CAD) and gaming.
4. Trackball
. It is used in some keyboards as well as older versions of the mouse. Essentially, it has a socket holding a ball with
sensors that can detect the ball’s rotation.
5. Scanner
This input device resembles a photocopy machine and is used when transferring information on paper onto the computer.
What the scanner does is that it captures the images from the paper and converts them into their digital form.
Like a scanner, a digitizer converts analog information into digital. A digitizer can then convert signals from the television
or camera. It can convert graphics into binary inputs. A graphic tablet is often used as a digitizer.
7. Microphone
Through this input device, you can input sound into the computer system. Using a microphone, both live audio and pre-
recorded audio can be fed into the computer-based recorder. The microphone functions by converting acoustic energy into
an electric signal. Its low cost, compact size, and high sensitivity make it advantageous. Additionally, this device can be
utilized for dictating text instead of typing it via the keyboard.
You may have encountered this device being used in banks to process checks. The reader scans both the bank’s code and
check numbers, ensuring a swift and error-free process.
Advantages
• Data entry is fast compared with keying in sing a keyboard or keypad
• System is error free, no typing involved
• Information is secure since there is no typing and the information can’t be read directly by a person
• Can prevent access to restricted/secure areas
• Magnetic stripes are unaffected by oil water and moisture
• No moving parts therefore physically robust
Disadvantages
• If the magnetic stripe is damaged the data is lost
• Card needs to be in close contact with the reader
• Since the information is not human readable, they need to find a way to show the information to the customer (e.g. hotel
room number not printed on cards)
Advantages
• Faster than keying in information, and fewer mistakes are made
• Used as a way of recording data, can improve safety
• Barcodes enable automatic stock control
• Barcode scanning is a tried and trusted technology
• When an item price is changed, only the central database needs to be updated, there is no need to change the prices
individually on each item
Disadvantages
• Barcode scanning is an expensive system to administer since every item in the shops needs a barcode and every barcode
needs to be entered on the system.
• Also there is a need to invest in the computer technology together with staff training, which can all be expensive
• The system is not fool proof- barcode can be swapped around on items
Advantages
• A very fast way of inputting results of a survey
• Since there is no typing, it is more accurate than keying in data
• OMR is more accurate than OCR
Disadvantages
• Forms need to be carefully designed to make sure that the marks/shadings are correctly positioned to gather accurate
information
• There can be problems if forms aren’t filled correctly, sometimes they have to be checked manually
before being read by an OMR, this is both time consuming and expensive
B7.1.1.1.3. Examine the uses of the output devices: graphing plotter, data and multimedia projectors as well as pico
projector
OUTPUT DEVICES
Output devices are computer hardware that present information from the computer to the user. They transform data into a
human-perceptible form, such as text, graphics, audio, video, or tactile feedback.
Output devices are categorized by the type of information they display or produce.
COMMON CATEGORIES
1. Visual Output Devices:
2. Audio Output Devices:
3. Print Output Devices:
4. Tactile Output Devices: Braille Readers:
5. Other Output Devices: Film Recorders, GPS Devices, Speech Synthesizers
Examples of Output devices
1. Monitor 2. Printer 3. Projector 4. Plotter 5. Speaker
6. Headphones 7. Sound Card 8. Digital Projector 9. Visual Display Unit (VDU)
10. Liquid Crystal Display (LCD) 11. Light Emitting Diode (LED) Display
12. Cathode Ray Tube (CRT) Display 13. Braille Embosser
14. Digital Audio Tape (DAT) 15. Digital Light Processing (DLP) Display
16. Laser Printer 17. Inkjet Printer 18. Thermal Printer
19. Magnetic Ink Character Recognition (MICR) Printer 20. Touchscreen Display
Graphing Plotters
Plotters are primarily used for printing large-format technical drawings, architectural plans, and other graphics that require
precision and high-quality visuals. They are commonly found in engineering, architecture, and design industries, where
large-scale documents like blueprints, maps, and charts are needed.
USES
1. Technical and Architectural Drawings:
• Plotters excel at creating large-scale technical drawings, blueprints, and architectural plans with high precision.
They are used to print detailed schematics, maps, and other large-format documents for various engineering and
architectural projects.
They can also be used to print renderings, orthophotographs, and other graphic outputs for construction and design
purposes.
2. Computer-Aided Design (CAD) and Manufacturing (CAM):
• Plotters are often integrated with CAD and CAM software to print large-format designs and layouts.
• They can produce detailed drawings, charts, and maps for various manufacturing and engineering applications.
Multimedia Projectors
As their name suggests, multimedia projectors allow you to connect to various external devices like DVD players,
computers, or laptops and support WiFi and Bluetooth for wireless streaming and screen mirroring to display various
content.
Data Projectors
A device that projects computer and TV output onto a white or silver fabric screen that is wall, ceiling or tripod mounted.
Data projectors are widely used in classrooms and auditoriums for instruction and slide presentations.
Although many projectors have built-in speakers, projectors designed for TV and movies are called "front-projection
TVs" and support display enhancement technologies such as HDR. See front-projection TV and HDR.
A data projector has HDMI inputs for set-top boxes and computers. It may also have a VGA input for older computers.
Earlier projectors had analog video interfaces (composite, component and S-video).
Pico projectors are very small projector modules that can be integrated into mobile devices, such as handsets or laptops,
or used to create highly portable projector accessories for mobile workers. They can be implemented using several
technologies, including liquid-crystal-on-silicon imaging chips with light-emitting diode or laser diode illumination,
microelectromechanical systems digital light processing technology, or laser diffraction.
Advantages of Plotters
• High-quality resolution:
Plotters can produce detailed and precise prints, especially for line drawings and technical graphics.
• Large format printing:
They can handle large sheets of paper, making them ideal for blueprints, maps, and posters.
• Versatile media:
Plotters can print on various materials like paper, film, and even some plastics and metals.
• Specialized applications:
They are well-suited for applications like architectural drawings, engineering plans, and cartography.
• Superior quality and precision:
Plotters excel in creating high-quality, accurate drawings, which is crucial for many professional tasks.
Disadvantages:
• High cost:
Plotters are typically more expensive than traditional printers, and the cost of specialized inks can be substantial.
Large footprint:
Plotters require significant space, as they are often larger than regular printers.
Maintenance:
Plotters may require more maintenance due to their complex mechanisms and specialized inks.
Slower printing speeds:
Plotters may not be as fast as traditional printers, especially for general-purpose printing tasks.
Potential for paper jams and mechanical issues:
The complex mechanisms of plotters can be prone to issues like paper jams and other mechanical problems.
NOTES
Fixed Hard Disk Drives (HDDs) are magnetic storage devices that store data on rotating platters. They offer high storage
capacity and cost-effectiveness, but are slower and less durable than Solid State Drives (SSDs).
Advantages:
• High Storage Capacity:
HDDs can store large amounts of data, making them suitable for storing large files, videos, and other media.
Cost-Effective:
HDDs are generally less expensive per gigabyte than SSDs, making them a budget-friendly option for storing large
amounts of data.
Persistent Storage:
Data stored on HDDs remains available even when the power is off, making them suitable for long-term storage.
Disadvantages:
• Slower Performance:
HDDs have slower read and write speeds compared to SSDs, which can lead to longer boot times and application loading
times.
• Mechanical Failure:
HDDs rely on moving parts, making them more susceptible to mechanical failure and damage from impacts or vibrations.
• Limited Durability:
HDDs are not as durable as SSDs and can be damaged by external forces or environmental conditions.
• Lower Lifespan:
HDDs have a shorter lifespan than SSDs and may need to be replaced more frequently.
Magnetic Tape: Used for backup and archiving data, often used in large-scale data storage.
Floppy Disks:
Used for data storage in older computer systems, but are now largely obsolete.
They were portable, inexpensive, and could be used for data transfer and backups, but they suffered from limited capacity,
slow speed, and susceptibility to damage.
Advantages:
Portability:
Floppy disks were easily portable, making them useful for transporting data between different computers or locations.
Low Cost: Compared to other storage options, floppy disks were inexpensive to produce and purchase.
Data Transfer:
They served as a simple and reliable way to transfer files between computers, especially before widespread internet
access.
Backups:
Floppy disks were used for creating physical backups of important data and files, offering a simple and relatively
inexpensive way to protect against data loss.
Compatibility: They were widely compatible with most computers, making them a readily available storage option.
Disadvantages:
Limited Capacity:
Floppy disks offered very limited storage capacity, often just a few kilobytes or megabytes, compared to modern hard
drives and USB flash drives.
Slow Speed:
Data transfer and access speeds were significantly slower than newer technologies like USB flash drives or hard drives.
Susceptibility to Damage:
Floppy disks were vulnerable to damage from dust, heat, magnetic fields, and physical impact.
Unreliability: Floppy disks were prone to failure if not properly stored and maintained.
Outdated Technology:
Floppy disk drives have become largely obsolete in modern computers, replaced by more efficient and faster storage
technologies
Audio and Video Tapes: Use magnetic recording technology for storing audio and video signals.
NOTES
B7.1.1.2.1 Discover the latest Windows Operating System (Start screen, Use of tiles, Taskbar buttons, Preview
thumbnails), temporal peeking into a window on a taskbar)
TASKBAR
The taskbar on a computer screen is the narrow strip of icons, usually located at the bottom of the screen, that shows you
which windows are currently open and that allows you to control functions such as the Start button and the clock.
Search Bar: Allows users to search for files, applications, and web pages.
Pinned Apps: Allows users to pin frequently used apps to the taskbar for quick access.
System Tray: Displays icons for various settings, such as volume, network, and system notifications.
Task View: Allows users to see and manage multiple virtual desktops.
Tiles
A tile is an app's representation on the Start menu. Every app has a tile. When you create a new Windows app project in
Microsoft Visual Studio, it includes a default tile that displays your app's name and logo. Windows displays this tile when
your app is first installed.
Key aspects of tiles in Windows 10:
1. Visual representation: Tiles provide a quick and visual way to access applications and features.
2. Live updates: Live tiles can display dynamic information, such as new messages, news updates, or weather forecasts,
without requiring users to open the specific app.
3. Customization:
Tiles can be customized by users, allowing them to rearrange, resize, and move tiles on the Start menu to their preference.
4. Folders: Tiles can be grouped into folders on the Start menu to help organize and manage applications.
TILES
THUMBNAILS
NOTES
6
FILE MANAGEMENT TECHNIQUES
B7.1.1.2.2 Practise file management techniques (file & folder management, Users & Accounts)
FILE MANAGEMENT
File management in computing refers to the organization, storage, and retrieval of digital files, which can include
documents, photos, videos, and more. It involves processes like creating folders, assigning permissions, and using file
systems to structure data. Effective file management helps users find, access, and manage their digital information
efficiently.
That said, you should create a master folder that enables you to organize your documents into a hierarchical system of
subfolders. Then, create more specific subfolders therein for different users, and document types.
For example, if you’re a property owner, you might create subfolders for your different types of properties such as
apartments, homes, office buildings, and so on.
File naming conventions help you stay organized and quickly identify your files. In a shared or collaborative group file-
sharing setting, it will help others more easily navigate your work.
No Spaces: Avoid using spaces in file names. Instead, use underscores (_) or hyphens (-).
Special Characters: Avoid using special characters (e.g., !, @, #, $) as they can cause issues with different operating
systems.
Uppercase/Lowercase: For consistency, use lowercase for file names, especially when dealing with file systems that are
case-sensitive.
3. Versioning and Dates:
Version Numbers: Use a versioning system to track different iterations of a file (e.g., v1, v2, v1.0, v1.1).
Dates: Include the creation or modification date in the file name using a standard format (e.g., YYYY-MM-DD).
4. File Extensions:
Valid: project_report_2025-05-18_v1.pdf
Invalid: Project Report (Draft) 2025-05-18.doc (due to spaces and descriptive name)
File Extension
A filename extension, is a suffix to the name of a computer file (for example, .txt, .mp3, .exe) that indicates a
characteristic of the file contents or its intended use. A filename extension is typically delimited from the rest of the
filename with a full stop (period), but in some systems[1] it is separated with spaces.
Some file systems implement filename extensions as a feature of the file system itself and may limit the length and format
of the extension (as seen in DOS), while others treat filename extensions as part of the filename without special
distinction (as seen in Unix) and instead prefer to use file signatures.
Depending on your role, you may use presentation files to prepare for meetings or training sessions. Here are some
common presentation file types you might encounter:
1. PowerPoint presentation (PPT or PPTX)
The PPT file format, developed by Microsoft, is widely used for sharing and uploading presentations and slideshows.
2. Open document presentation (ODP)
ODP files are designed for use with OpenOffice programs, allowing you to create and share presentations that include
text, graphics, and animations.
3. Apple Keynote file (KEY)
The KEY file format is associated with Apple's Keynote program, enabling professionals to create and share dynamic
visual presentations.
You may use an audio file to upload music, readings, or sound recordings. This is common in certain industries, such as
audio entertainment, education, or writing. Here are some common audio file formats you may use in the workplace:
1. MPEG 4 audio (M4A)
The M4A file is a common audio file format often used for compressed audio recordings. Its smaller file size makes it
easy to share and upload, while still maintaining good sound quality.
2. MPEG layer audio 3 (MP3)
The MP3 audio file format compresses sound into smaller sizes, making it easier to share with others while maintaining
good sound quality.
3. Waveform audio file (WAV)
The WAV file format is a common type of audio file known for maintaining high sound quality.
A 7z file is a compressed archive format that uses advanced compression techniques to create smaller file sizes compared
to standard ZIP files. It can also support encryption and various pre-processing algorithms. However,
No matter which operating system we use, it uses user accounts to authenticate, trace, log and monitor its services. When
we install an operating system, it automatically creates some essential user accounts which allow us to access it just after
the installation. During the installation, typically, it creates four types of user accounts. These accounts are system
account, superuser account, regular user account, and guest user account.
System accounts
These accounts are used by different services running on the operating system to access the system resources. The
operating system uses these accounts to check whether a particular service that is requesting system resources is allowed
to access those resources or not. Usually, services create necessary accounts on their own when they are installed. After
installation, services use those accounts to access necessary resources. Unless you are a system or network administrator,
you never need to know about these accounts.
Superuser account
This user account has the highest privilege on the operating system. In Windows, this user account is known as the
Administrator account. In Linux, it is known as the root account. The operating system allows this user account to
perform all privileged tasks such as changing system files, installing new software, removing existing software, starting
services, stopping services, creating new user accounts, and deleting existing user accounts.
Modify
Permits the user(s) to:
• create folders.
• add new files.
• delete files.
1
STRAND 1
SUB-STRAND 2
Spreadsheet
A spreadsheet is a tool for organizing, analyzing, and storing data, typically in a tabular format with rows and columns.
It's used for tasks like creating budgets, managing finances, tracking inventory, and more. Spreadsheets are versatile and
can be used by various professionals, including accountants, business managers, and teachers
Uses of Spreadsheet
1. Data Organization and Storage:
2. Calculations and Analysis:
3. Visualization and Reporting:
4. Automation and Efficiency:
5. Project Management: Spreadsheets can be used to track project progress, manage tasks, and allocate resources.
6. Inventory Management: They can be used to track inventory levels, manage stock, and optimize purchasing
decisions.
7. Personal Finance: Spreadsheets are commonly used for managing personal finances, tracking expenses, and creating
budgets.
8. Academic Use: Spreadsheets can be used for organizing data, calculating grades, and conducting research.
Encarta
Encarta, Microsoft's digital encyclopedia, was released in 1993. The first version was available on CD-ROM and
contained more than 25,000 articles. The encyclopedia was updated annually until 2009, when Microsoft announced it
would no longer produce new versions.
Encarta was an application that could be installed on a Windows PC. It included a search engine and articles from a
variety of sources, including Encyclopedia Britannica, Compton's Encyclopedia, and World Book Encyclopedia.
Microsoft also released Encarta Kids, a version of the encyclopedia geared towards children.
Scrabble
Scrabble is a word game in which two to four players score points by placing tiles, each bearing a single letter, onto a
game board divided into a 15×15 grid of squares.
Players draw seven tiles from a pool at the start and replenish their supply after each turn. Tiles in the pool and those of
other players are kept secret so that a player can see only those tiles on the board and his own. A player may forfeit his
turn and exchange any or all of his tiles for those in the pool. There are 100 letter tiles, each imprinted with a point value
for different letters, approximately corresponding to the frequency of occurrence of the letter in English words. Words are
scored by adding up the point values of their letters, multiplied by any of 61 premium squares that may be covered, such
as double letter, triple letter, double word, and triple word.
Presentation
Presentation software allows users to create and deliver engaging visual presentations using slides, graphics, multimedia,
and other visual elements. Popular options include Microsoft PowerPoint, Google Slides, Prezi, and Keynote. These tools
enable users to organize information, create visual narratives, and share ideas effectively
AutoDraw’s suggestion tool uses the same technology used in QuickDraw, to guess what you’re trying to draw. Right
now, it can guess hundreds of drawings and we look forward to adding more over time. If you are interested in creating
drawings for others to use with AutoDraw,
Scratch
Scratch is a visual programming language developed by MIT's Lifelong Kindergarten Group that allows users to create
interactive stories, games, and animations using a drag-and-drop interface. It's designed to be accessible and engaging,
particularly for young learners, making it a popular tool for introducing coding concepts.
2
NEGATIVE IMPACT OF COMPUTERS AND COMPUTER USE
ON THE ENVIRONMENT
B7.1.2.1.4. Examine the negative impact of computers and computer use on the environment
2. E-waste
Another major negative impact of computers on the environment is the generation of electronic waste, or e-waste. E-
waste refers to electronic devices that are no longer wanted or needed, and can include computers, laptops, printers,
smartphones, and other electronic devices.
When electronic devices are discarded, they often end up in landfills where they can release harmful chemicals into the
environment. These chemicals can contaminate soil and water, posing a threat to plants, animals, and even humans. In
addition, the extraction of the materials used in electronic devices, such as metals and plastics, can also have negative
environmental impacts. Agbogbloshie in Ghanan is one of the largest e-waste dumping site in the world
3. Air Pollution
The production of computers also contributes to air pollution. The manufacturing of computers involves the use of
various chemicals and materials, many of which can release harmful pollutants into the air. These pollutants can include
carbon dioxide, nitrogen oxides, and other greenhouse gases, which can contribute to air pollution and climate change.
Also, Electronic waste contains gold, silver and cooper, and people in developing countries attempt to extract these
materials by burning the substance which releases hazardous smoke into the air and creates a poor air quality with so
much pollution.
Computers have a negative impact on the health of its user such as the following diseases: arthritis, sleeping disorders
such as frequently waking up during the night or having insomnia, back pain for staying in the same sitting position,
headaches and poor attention spam in which you regard single tasks as boring and makes you anxious. Watching the
screen of the computer that contains lights can burn your retina and cause blindness.
The use of computers has numerous benefits and has brought significant advancements to our society. However, it is
important to recognize the negative environmental impacts of computers, including energy consumption, the generation
of e-waste, air and water pollution, and deforestation.
There are steps that can be taken to reduce the negative environmental impacts of computers. Some of these steps include:
Energy-efficient computers: Choosing computers that are designed to be energy efficient can help reduce their overall
energy consumption and greenhouse gas emissions. Look for computers with the ENERGY STAR label, which indicates
that they meet strict energy-efficiency standards set by the Environmental Protection Agency (EPA). We have to try to
reduce the amount of power the computer uses by using the computer only when it's needed and turning the computer off
when we are not using it. Some other small things we can do is adjusting the computer brightness, setting, and using LCD
monitors instead of CRT.
E-waste recycling: Properly disposing of e-waste is crucial for reducing its environmental impact. Many communities offer
e-waste recycling programs, where old electronic devices can be safely and responsibly recycled. This helps to prevent e-
waste from ending up in landfills and reduces the demand for the extraction of new materials.
Green Manufacturing: Consumers can also support companies that are committed to environmentally-friendly
manufacturing practices. These companies often use sustainable materials and employ eco-friendly production
Paper Waste recycle: Computers produce a large amount of paper waste, mostly by printing. To reduce paper waste, we must
recycle the paper that can be reused.
Many countries contain facilities in which electronic waste is recycled such as: Australia, UK, the United States and
Canada. Many developing countries contain vast landfills like Ghana, Nigeria, and India. Continents like Africa are
known to contain many landfills of electronic waste, in which is hazardous to the environment and the entire population.
Taking steps to reduce these impacts, such as choosing energy-efficient computers, recycling e-waste, supporting
companies that use eco-friendly manufacturing practices, and reducing our overall consumption of computers, can help to
safeguard the environment and make sure our world has a viable future. It is up to each of us to take responsibility for the
environmental impact of our actions and make choices that are better for the environment.
1
STRAND 1
SUB-STRAND 3
The long-term use of computers has been linked to a range of potential health problems, or "computing related disorders"
(CRDs). The health problems most highly associated with the use of computer equipment are upper limb disorders, eye
problems, stress and fatigue, and skin complaints. Upper limb disorders are term used to describe a range of conditions
affecting the fingers, hands, arms and shoulders.
A hazard describes anything or situation that could be harmful to the user as they use a computer. For example, prolonged
and improper use of the keyboard and mouse can cause repetitive strain injury. Additionally, using the wrong body
posture can lead to body pain and other health issues over time.
Computer users are a key component in any computer system. Protecting users is just as important as protecting hardware,
software, and data. The widespread use of computers has led to some important user health concerns. Users should be
proactive and minimize their chance of risk. The following sections discuss health risks and preventions, along with
measures users can take to keep the environment healthy. The long-term use of computers has been linked to a range of
potential health problems, or "computing related disorders" (CRDs).
Computers and health risk
Slowly bring your chin down to your chest, hold for 3 seconds, and then release.
1
STRAND 2
SUB-STRAND 1
A word processor is a device or software program capable of creating, storing, and printing text documents. It allows users
to write and modify text, display it on a screen, save it electronically, and print it out.
1. Ribbon Interface: MS Word utilizes a ribbon interface at the top of the window, offering tabs with various commands.
This intuitive layout simplifies access to tools for formatting, editing, and other functions.
2. Quick Access Toolbar: Located near the ribbon, the Quick Access Toolbar allows users to customize shortcuts for
frequently used commands, improving workflow efficiency.
3. Document Views: MS Word provides different document views, including Print Layout, Read Mode, and Web Layout,
allowing users to choose the most suitable view for their tasks.
4. Navigation Pane: The Navigation Pane aids document organization by displaying a thumbnail view of pages, headings,
and search results, making it easy to navigate large documents.
5. Styles and Formatting: MS Word enables users to apply consistent styles and formatting to text, paragraphs, and
headings, ensuring a polished and professional appearance.
6. Insert Options: Users can insert various elements such as tables, images, hyperlinks, and headers/footers. SmartArt
and Charts facilitate the inclusion of visual elements for better document comprehension.
7. Review and Collaboration Tools: MS Word offers features like Track Changes, Comments, and Compare Documents,
promoting collaboration and easing the review process among multiple users.
8. Spell Check and Grammar Check: The built-in proofing tools help users identify and correct spelling and grammar
errors, ensuring the production of accurate and polished documents.
9. Mail Merge: MS Word includes a Mail Merge feature for creating personalized documents like letters and envelopes
by merging a document with a data source.
10. Page Layout Options: Users can customize page margins, orientation, size, and apply various layouts to suit specific
document requirements.
12. Document Protection: Users can secure documents by applying password protection and restricting editing
permissions, enhancing document security.
Editing
In MS Word, editing refers to the process of making changes to a document, including correcting errors, improving
content, and formatting text for clarity and readability. This involves a range of actions like adding, deleting, rearranging,
or formatting text and objects within a document.
EDITING TOOLS IN MS WORD
Basic Text Editing:
• Selecting Text: You can select text with the mouse or keyboard to apply formatting, copy, cut, or delete.
• Cutting and Pasting:
These actions allow you to move text from one location to another within the document or between documents.
• Copying and Pasting:
This allows you to duplicate text, creating a copy that can be placed elsewhere.
• Undo and Redo:
These tools enable you to revert to previous states of the document, correcting mistakes or exploring different options.
Editing and Proofreading:
• Find and Replace:
This feature helps locate specific words or phrases and replace them with new ones, ensuring consistency and accuracy.
• Spell Check and Grammar Check:
Word's built-in features identify and correct spelling and grammatical errors, improving the overall quality of the text.
INSERT TEXT
To insert text in a Microsoft Word document, place the cursor where you want the text to appear and start typing. You can
also copy and paste text from another source into the document. Additionally, you can insert text boxes to add text within
specific areas or shapes.
Using the insert or ins key
The "Insert" or "Ins" key on a keyboard toggles between two text input modes: insert mode and overwrite mode. In insert
mode, typing inserts new characters without overwriting existing ones. In overwrite mode, typing replaces characters at
the cursor's position
To control insert/overtype mode in applications like Microsoft Word, you can use the status bar to toggle between the two
modes. The status bar will typically show an indicator like "Insert" or "OVR" when you're in overtype mode. You can also
use the Insert key on your keyboard to switch between modes, and in some applications, you can customize the status bar
to show an indicator for this feature.
1. Using the Status Bar:
• Right-click on the status bar.
• Select "Overtype" (or a similar option) to add it to the status bar.
• The status bar will show "Insert" or "OVR" depending on the active mode.
• Clicking the indicator will switch between the modes.
2. Using the Insert Key:
➢ The Insert key on your keyboard toggles between insert and overtype modes.
➢ Some applications allow you to enable the Insert key to control overtype mode in the options.
3. Customizing the Status Bar
➢ You can often customize the status bar to show specific information, including the overtype/insert mode indicator.
➢ This can be helpful for quickly seeing which mode is active.
Using the Keyboard to copy and paste
The Office Clipboard stores multiple copied items, allowing you to paste them later in the same or different applications.
To paste, open the Clipboard (often by pressing Ctrl+C twice), select the item you want, and paste it where needed.
Detailed Steps:
2. Copy: Press Ctrl+C (or Cmd+C on Mac) to copy the selection to the Office Clipboard.
3. Access the Clipboard: Open the Clipboard by pressing Ctrl+C twice, or by clicking the "Clipboard" dialog box launcher
on the Home tab.
4. Select the item: In the Clipboard, you'll see a list of recently copied items. Click on the item you want to paste.
5. Paste: Place your cursor where you want to paste the item. Click the Paste button, or double-click the item in the
Clipboard.
Select Text
In Word, you can select all text in a document (Ctrl+A), or select specific text or items in a table by using the mouse or
keyboard. You can also select text or items that are in different places. For example, you can select a paragraph on one
page and a sentence on a different page.
1. Place your cursor in front of the first letter of the word, sentence, or paragraphs you want to select.
2. Click and hold while you drag your cursor to select the text you want.
• Delete Key: Press the Delete key to remove the selected text.
Backspace Key: Press the Backspace key to remove the text to the left of the cursor.
Typing: Type over the selected text to replace it.
Cut: Select the text and use the Cut command (Ctrl/Cmd + X) to remove it from the document.
Edit Menu: In some applications, you can also find delete or cut options in the Edit menu.
Find and Replace is a feature in many applications, especially text editors and spreadsheets, used to search for specific
text or numbers and replace them with other text or numbers. It's a powerful tool for efficiently editing large documents or
datasets, making corrections, and ensuring consistency.
To undo a recent action or edited changes in most applications, you can use the Ctrl+Z keyboard shortcut or the Undo
button on the Quick Access Toolbar (usually a backward arrow). For redoing changes you've undone, you can use Ctrl+Y
or the Redo button (usually a forward arrow).
1. Keyboard Shortcuts:
The most common and efficient way to undo is to press Ctrl+Z (or Command+Z on a Mac). You can repeatedly press
Ctrl+Z to undo multiple steps.
2. Undo Button:
Many applications, like Microsoft Word, Excel, and other programs, have an Undo button (often a backward arrow) on
the Quick Access Toolbar. You can click this button to undo the last action.
To check spelling and grammar in Microsoft Word, you can use the "Spelling & Grammar" feature, accessible through the
"Review" tab or by pressing F7. Word will highlight errors with red or blue squiggly lines and offer suggestions. You can
also adjust the check settings in the Word options under "Proofing".
Here's a more detailed breakdown:
1. Checking Spelling and Grammar:
Method 1: Using the Review Tab: Go to the "Review" tab and click on "Spelling & Grammar" or "Editor".
Method 2: Using the Keyboard Shortcut: Press F7.
Method 3: Using the Editor Pane: The Editor pane will open on the right side, showing errors and suggestions.
Making Corrections: Right-click on a highlighted word to see suggested corrections. Select the correct spelling or
grammar option from the list.
Ignoring Errors:
If you want to ignore an error, right-click on it and select "Ignore Once" or "Ignore All".
Adding Words to the Dictionary:
If you want Word to remember a specific spelling, right-click the word and select "Add to Dictionary".
Checking for Clarity:
Word can also highlight writing style issues and offer suggestions to improve clarity.
Thesaurus
A thesaurus in word processing software helps writers find alternative words (synonyms) for selected words, enriching
their writing and avoiding repetition. Most word processors, like Microsoft Word, have a built-in thesaurus tool that
allows users to quickly look up synonyms and antonyms.
Word Count
To view the word count in Microsoft Word, you can either look at the status bar at the bottom of the document or use the
Word Count feature. The status bar displays a quick word count, while the Word Count feature provides more detailed
statistics like page count, paragraph count, and character count, including or excluding spaces.
Method 2: Go to the Review tab: On the Ribbon, click on the "Review" tab, then in the "Proofing" group, click "Word
Count".
Method 3: Use the Ctrl+Shift+G shortcut: Press Ctrl+Shift+G to open the Word Count dialog box.
To use Microsoft Word to translate text, select the text you want to translate, go to Review > Translate > Translate
Selection, choose your desired language, and then click Insert. Alternatively, you can translate an entire document by
selecting Review > Translate > Translate Document and following the prompts.
Detailed Steps:
1. How To Translate Selected Text:
➢ Open your Word document and highlight the text you want to translate.
➢ Go to the "Review" tab in the ribbon at the top of the screen.
➢ Click on "Translate" and then "Translate Selection".
➢ A pane will appear on the right where you can choose the language you want to translate to.
➢ Select your desired language and click "Insert". The translated text will replace the original selection.
2. Translate an Entire Document:
• Open your Word document.
• Go to the "Review" tab in the ribbon.
• Click on "Translate" and then "Translate Document".
• A dialog box will appear where you can choose the language you want to translate from and to.
• Word will then send the document to Microsoft Translator and create a new document with the translation.
FONT GROUP
The Font group provides unlimited customization of text. It allows users to change the font or style of the text, the size of
the text, provide text emphasis, and even change the colors.
Beginning in the upper left-hand corner, the Font Selection Box and Text Size boxes allow customizations of hundreds of
font designs and text sizes. The capital “A” button on the right allows the user to gradually increase the text size with
the smaller capital “A” button next to it on the right decreases the text size. The lower row of the Font group
contains Bold , Italics , and Underline (without underline options for line thickness). To the right of the
Underline, the button is the border settings button . This button allows the user to control border lines around
highlighted cells. Users can select top, left, right, bottom, or all borders to their selected cells. To the right of the border
settings are the paint can icon . The painted icon allows the user to color a cell. Finally, to the right of the paint
can menu is an icon of the letter “A” with a line underneath . This control allows the user to change the color of any
selected text with an almost infinite number of color options. By clicking on the arrow pointing down and to the right in
the Font group, an expanded menu with even more options will launch, allowing the user with many more text
customization options, as well as the option to set default text options and effects.
• Font Typeface: The design or shape of the letters (e.g., Times New Roman, Arial, Calibri).
Format characters
To do this Press
Display the Font dialog box. Ctrl+D or Ctrl+Shift+F
Increase the font size. Ctrl+Shift+Right angle bracket (>)
Decrease the font size. Ctrl+Shift+Left angle bracket (<)
Increase the font size by 1 point. Ctrl+Right bracket (])
Decrease the font size by 1 point. Ctrl+Left bracket ([)
Switch the text between upper case, lower case, and title case. Shift+F3
Change the text to all upper case. Ctrl+Shift+A
Hide the selected text. Ctrl+Shift+H
Formatting
Apply or remove single-line strikethrough formatting
To remove double-line strikethrough formatting, select the text, and then go to Home and select Strikethrough twice in
the Font group.
1. Select the text for which you want to change the case.
2. Go to Home > Change case .
3. Do one of the following:
o To capitalize the first letter of a sentence and leave all other letters as lowercase, select Sentence case.
o To exclude capital letters from your text, select lowercase.
o To capitalize all of the letters, select UPPERCASE.
o To capitalize the first letter of each word and leave the other letters lowercase, select Capitalize Each Word.
o To shift between two case views (for example, to shift between Capitalize Each Word and the opposite, cAPITALIZE
eACH wORD), select tOGGLE cASE.
Paragraph Group
The Paragraph group includes features and commands that allow the user to format paragraphs, including adding bullets
and numbers, aligning text, adding borders, and customizing spacing.
The Line and Paragraph command include the following spacing options: 1.0 pt (single line spacing), 1.15 pt, 1.5 pt, 2.0
pt (double line spacing), 2.5 pt, and 3.0 pt.
Fig 2A
➢ On the Home tab in the Paragraph group, select the Line and Paragraph Spacing button and select Line Spacing
Options on the menu.
➢ On the Home tab, in the Paragraph group, click the Dialog Box Launcher in the lower right corner.
➢ On the Layout tab, in the Paragraph group, select the Dialog Box Launcher in the lower right corner.
The lower half of the Paragraph dialog box focuses on spacing. The options for spacing include the following:
•
o Before: This adjusts the spacing before the paragraph.
o After: This adjusts the spacing after a paragraph.
o Line Spacing: This adjusts the space between each line in the paragraph. Several options are available to set the line
spacing.
o Don’t add space between paragraphs of the same style.
To change the spacing before or after the line, the user can either type a number in the box or use the arrows to adjust the
number. Select the line spacing using the dropdown menu. If the user does not want space added between paragraphs of
the same style, click the box for “Don’t add space between paragraphs of the same style.” The Preview box will show the
user how the options selected impact the paragraph.
If the user wants the options to be the default, they need to select Set As Default, found at the bottom of the dialog box.
When the box appears, click an option and select OK
Paragraph Spacing
If the user wants to change the spacing for the entire document, another option can be used. Using the Paragraph Spacing
button in the Document Formatting group on the Design tab makes this a simple task. The text does not need to be
selected prior to clicking the Paragraph Spacing button. Just click on the Paragraph Spacing button and the menu will
open. Select the option desired or customize the spacing.
Default 0 pt 8 pt 1.08
Compact 0 pt 4 pt 1 pt
Tight 0 pt 6 pt 1.15
Open 0 pt 10 pt 1.15
Relaxed 0 pt 6 pt 1.5
Double 0 pt 8 pt 2
• Align Left: The text is aligned at the left margin. The keyboard shortcut for this command is (Ctrl + L).
•
• Center: The text is horizontally centered on the page. The keyboard shortcut for this command is (Ctrl + E).
•
• Align Right: The text is aligned at the right margin. The keyboard shortcut for this command is (Ctrl + R)
• .
• Justify: The text is aligned at both the left and right margin and extra spacing may be added between words for the
alignment to occur. The keyboard shortcut for this command is (Ctrl + J).
Alignment can also be done using the Paragraph dialog box (see Figure 2A).
➢ To use this dialog box,
➢ click the Dialog Box Launcher in the lower right corner of the Paragraph group on the Home tab.
➢ The top section of the Paragraph dialog box on the Indents and Spacing tab provides options for alignment.
Bullets, numbering, and multilevel list can be used to create lists. Each of these three options has a down arrow, which
provides the user with additional options. The user can select a bullet or number style shown or define (select) new bullet
or number formats. Figure 3 shows the additional options for bullets, numbering, and multilevel List.
To start a bulleted list, type a symbol (such as a hyphen [-] or asterisk [*]) and a space before the text. Word will move the
symbol over and start the bulleted list. To start a numbered list, type 1 followed by a period and a space. Word will indent
and start the list as you start typing the text.
If you have an existing list that needs to be numbered or bulleted, select the text. Click on the bullets or numbering
buttons in the Paragraph group on the Home tab. The selected text will become bulleted/numbered.
Indentations, moving text away from the left margin, help text stand apart from other text. Indents can be used with bullets
and paragraphs. The user can indent the first sentence of a paragraph, which is called first line indent. In resource
reference documents (e.g., works cited pages), the user can use hanging indents. With hanging indents, the first line is at
the left margin and all remaining lines are indented.
The Decrease Indent and Increase Indent commands (buttons) are used to decrease and increase the space of the paragraph
or bulleted list from the left margin. If the Increase Indent button is used, the text will move one tab stop to the right. If the
Decrease Indent button is used, the text will move one tab stop to the left. By default, tab stops are spaced every half an
inch.
To use these commands, place the pointer in the paragraph or bulleted list or select the text to be moved. Click on the
Decrease Indent or Increase Indent button in the Paragraph group on the Home tab.
Shortcut keys can also be used instead of clicking the button. Use (Ctrl + M) for the Increase Indent button and (Ctrl + Q)
for the Decrease Indent button.
Tab Key
Using the Tab key on the keyboard is a quick way to indent the first line of a paragraph ½ inch or to create a first line
indent. This key can also be used to move paragraphs and bullets. To move the first line, a paragraph, or a bullet to the
left, use (Shift + Tab) as a keyboard shortcut.
When creating a first line indent, place the cursor at the start of the paragraph and press the Tab key. To move it back to
the left margin, place the cursor at the start of the paragraph and press (Shift + Tab). To move a bullet to the left, place the
cursor at the start of the text after the bullet and press the Tab key. To indent a paragraph, highlight the paragraph and
press the Tab key. To move both the bullet and the paragraph to the left, use the (Shift + Tab) shortcut.
Customized Indentations
The user can customize the indents by using Indents in the Paragraph group on the Layout tab. The right and/or left
margins can be customized. More advanced customization of indents can also be done using the Paragraph dialog box.
The indentation options are in the middle of the dialog box and include the following:
Table 2 shows three types of indent markers. Using the indent markers on the horizontal ruler allows the user additional
control over the indent placements. To make the ruler visible, select the View tab and click the checkbox next to the Ruler
in the Show group.
To use the indent markers, place the cursor in a paragraph or select multiple paragraphs. Click and drag the indent marker
to the desired location on the ruler. When the mouse is released, the paragraph(s) will be moved.
Sort
The Sort command allows the user to sort a one-level numbered or bulleted list. Depending on the option selected, the text
can appear in ascending (A to Z) or descending (Z to A) alphabetical order.
➢ To use, select the text to be sorted.
➢ Click the Sort button in the Paragraph grouping on the Home tab.
➢ Select either Ascending (A to Z) or Descending (Z to A). Click OK.
Show/Hide
The Show/Hide command can be used to show hidden spaces, tab markers, page insertion, and paragraph markers.
➢ To use, click the Show/Hide button to see the hidden markers and click again to hide them.
➢ The Show/Hide feature can be helpful if the user is having issues formatting a document. Sometimes the
hidden markers are the issue, and deleting a marker may solve the issue.
Borders
Adding borders to a document is another formatting technique that can make the document visually appealing.
❖ The Border button includes a down arrow to the right of it.
❖ By clicking the arrow, a menu of borders opens.
❖ The user can apply borders at the top, bottom, and right and left sides, and they can also choose to have no
borders, all borders, outside and inside borders, and additional borders.
❖ The last option on the menu is Borders and Shading. When this is selected, the Borders and Shading dialog box
appears.
❖ The Borders and Shading dialog box has many options for the user (Figure 4A). There are three tabs at the top of
this box – Borders, Page Borders, and Shading. The Borders tab features will be discussed first.
On the left side, the user can select a setting to use. The middle column allows the user to select the style, color, and width
of the line. All these have dropdown menus with additional options. When selecting colors, if the user hovers over a
color, the name appears (Figures 4B and 4C). The default setting is a solid black line with a width of 2 ¼ pt. After
selecting the middle column options, the user can click the buttons in the third column to apply the new line.
To apply borders to a paragraph, start by selecting the paragraph. Click on the Borders button or the down arrow on the
right. If the Borders button is clicked, the line shown will be applied. If the down arrow is selected, select the line style,
color, and width. Click the buttons in the third column to apply the lines.
Example
Apply a solid 3 pt blue line border to the top and bottom and a dashed 6 pt pink line border to the sides. To do this, select
the text or paragraph that needs the borders. Click on the down arrow next to the Border command/button in the Paragraph
group on the Home tab. Select Borders and Shading at the bottom of the menu. On the Borders and Shading dialog box,
select the solid line, blue, and 3 pt. Then, click the top border and the bottom borders in the third column. Next, select the
dashed line, pink, and 6 pt. Then, click the right and left borders in the third column. Click OK.
• The Borders command/button down arrow button found in the Paragraph group on the Home tab. Click Borders and
Shading at the bottom of the menu. Select the Page Border tab.
• Page Borders in the Page Background group on the Design tab.
Both ways open the Borders and Shading dialog box with the Page Border tab opened (Figure 5A). Select the options
desired. If the user wants to adjust the distance between the edge of the page and the border, click Options near the bottom
of the dialog box. On the Borders and Shading Options dialog box, revise the measurements and select OK (Figure 5B).
Click OK on the Border and Shading dialog box.
Shading
Shading can be applied as a background to words or paragraphs. Shading in the Paragraph group is different than the Text
Highlight Color button in the Font group on the Home tab. The Text Highlight Color button looks like a highlighter. It has
limited color options and does not change if the user applies another theme. Shading has many more options for the user.
To apply shading, select the text or paragraph to be shaded. If the color on the Shading button is desired, click the button
to apply the color. To use another color, click the down arrow to the right of the Shading button in the Paragraph group on
the Home tab. The color will show on the document as the user hovers over the color. Click the desired color.
If the user selects a color in the Themes section, it will update if the user changes the Theme of the document. If the user
selects a color from Selection Colors or More Colors, the color will not change if the theme changes.
• Left Tab: Text starts at the tab stop and flows to the right.
Right Tab: Text starts at the tab stop and flows to the left.
Center Tab: Text is centered on the tab stop.
Decimal Tab: Aligns numbers around the decimal point.
Bar Tab: Inserts a vertical bar at the tab stop
The tab icon at the upper-left shows the type of tab that's active. If you want something else, click the icon to cycle
through the available options.
3. Click on the ruler where you want to place the tab stop.
The tab stop is added and everything after the tab is aligned to it.
Aligns the text so that Aligns text and A vertical line character
Aligns the left side of Aligns the right side of
it’s centered under the numbers by decimal is inserted at the bar
text with the tab stop. text with the tab stop.
tab stop. point. tab.
If you want to create an additional tab at an exact location, you can use a custom tab stop.
3. Click Tabs.
4. Type a tab stop position.
5. Select the type of tab stop you want to use in the Alignment section.
You can set a tab leader here, which is a series of dots, dashes, or line that extends across the empty space added by a tab.
These are very helpful when you need to line up information across multiple lines, like in a directory or table of contents.
6. Click Set.
The tab stop is added. You can repeat the process to add more tab stops.
7. Click OK.
Click the Clear button in the Tabs dialog box to remove a single tab stop or click the Clear All button to remove all tab
stops.
You can adjust a tab stop directly from the ruler, moving it to a new position or removing it entirely.
1. Click and drag a tab stop along the ruler to reposition it.
As you drag a tab stop to a new position on the ruler, the text affected by that tab stop will move with it.
2. Click and drag a tab stop off the ruler to remove it.
Removing a tab stop will shift the text over to the next tab stop. If another tab stop isn’t set, the text will instead use the
default half-inch tab spacing.
1
SUB-STRAND 2
Presentation software is crucial for effectively communicating information visually, enhancing audience engagement, and
organizing ideas for presentations. It allows for the creation of visually appealing slides, incorporating various multimedia
elements, and guiding audiences through a narrative. This software makes it easier to hold focus, manage transitions, and
tailor presentations to specific audiences.
Popular presentation software programs
Microsoft PowerPoint Apple Keynote
Google Slides Beautiful.ai
SlideDog Prezi
Canva CustomShow
Ludus Powtoon
Haiku Deck ClearSlide
Visme Zoho Show
Located in the bottom left corner of your screen, typically represented by the Windows logo.
Shortcut Icon: If you have a PowerPoint shortcut icon on your desktop (a small image that represents the program), you
can double-click it to open PowerPoint.
Start Menu: You can also launch PowerPoint through the Start Menu. Click the Start Menu button, then navigate to the
PowerPoint application and click on it.
NOTES
Features of MS PowerPoint
MS PowerPoint is an application that allows users to create slides and runs a slideshow.
Home
Firstly, in PowerPoint, there are slides. Users need to add content to them to make a presentation. From the Home menu,
users can add new slides, decide their sequence, layout, design & other word processing functions like font change, size
change, etc. PowerPoint layout is used to change the layout of the current slide.
Insert
From the Insert menu, the user can add media like pictures, symbols, audio, video, header, footer, shapes, etc. to the slides
to enhance the user’s presentation.
Design
The design menu offers the user with ready-made templates & background designs for slides that make the presentation
look very attractive.
Slideshow
Finally, from the Slideshow menu, the user can view the final form of the slideshow. Users can start the slideshow from
the first slide or the slide that users are editing. They can also set display time for each slide from the ‘Slideshow’ menu.
Animations
During the slide show, the slides emerge on the screen one after the other. In case, one desires to add some animations to
how a slide displays itself, they can refer to the “Animations” category.
Transition & Animation are the unique functions of PowerPoint. These menus offer different options in which the text
appears on the slides & takes transitions from one slide to another.
With the Animation effect option, the animation effect is applied to the chosen content. Next with Custom Animation,
different options will be provided for the animation effects like Entrance, Emphasis, Exit, and Motion path.
Slide transition: This group consists of animation effects that are applied to complete slides. During the slideshow, the
slide begins as soon as it starts. This is termed the transition effect.
PowerPoint Template: Microsoft gives thousands of free, professionally outlined PowerPoint design templates. Several
other sources of differing quality and prices are available online, as well.
As you work on a presentation, PowerPoint automatically checks spelling and basic grammar to help you avoid errors and
mistakes.
3. Explore the Thesaurus Task Pane: The task pane will appear, displaying suggested synonyms.
4. Choose a synonym:
o Replace directly: Point to a synonym, click the down arrow, and choose "Insert".
o Copy and paste: Point to a synonym, click the down arrow, and choose "Copy" to paste it elsewhere in your presentation.
5. Find more words: Click on a word in the list to see related synonyms.
6. Switch languages: If needed, you can select a different language from the Thesaurus task pane.
Themes And Templates
What is a PowerPoint theme?
A theme is a predefined set of colors, fonts, and visual effects that you apply to your slides for a unified, professional
look.
Using a theme gives your presentation a harmonious appearance with minimal effort. For example:
• When you add graphics (tables, shapes, and so on) to your slides, PowerPoint applies theme colors that are compatible
with other slide elements.
1. Open a slide. On the Design tab, point at a Theme thumbnail to get a preview of how it would affect the look of your
slide.
2. To see the full gallery of themes, click the More button:
3. When you find a theme you want, click its thumbnail to apply it to all slides in your presentation.
A template is a theme plus some content for a specific purpose—such as a sales presentation, a business plan, or a
classroom lesson.
So a template has design elements that work together (colors, fonts, backgrounds, effects) along with sample slides
and boilerplate content that you augment to tell your story.
3
HOW TO USE SPECIAL CHARACTERS
B7.2.2.1.3. Demonstrate how to use Special Characters.
1. Place your cursor in the file at the spot where you want to insert the symbol.
2. Go to Insert > Symbol.
4
HOW TO CHANGE TEXT CASE, TEXT SIZE TEXT
COLOUR AND DECORATIVE TEXT
B7.2.2.2 Demonstrate how to use Microsoft PowerPoint (Formatting)
B7.2.2.2.1. Demonstrate how to change text case, text size, text colour and decorate text.
The "Font" group on the Home tab in PowerPoint is a section on the Ribbon where you can control the appearance of text
in your presentation. This group allows you to change the font type, size, color, and apply formatting like bold, italics, and
underlines.
Here's a more detailed breakdown:
• Font: This dropdown list allows you to choose from various font styles available on your computer.
Font Size: You can select a pre-set size or enter a custom size for the text.
Bold, Italics, Underline: These buttons toggle bold, italic, and underline formatting on or off.
Font Color: You can change the color of the text.
Text Shadow: This option adds a shadow effect to the text.
Strikethrough: This option adds a line through the selected text.
Character Spacing: You can adjust the spacing between characters in the text
Step 1: To change the default font in PowerPoint, go to View -> Slide Master.
Step 3: Edit the default fonts by selecting a desired font type. In the dialog box that appears, you will be able to select the
heading and body fonts for the primary text and complex scripts for mixed languages. This can allow you to set different
default fonts for different language types, such as Latin text (e.g., English, French, Spanish, etc.) or Complex scripts (e.g.,
Arabic, Persian, Urdu, etc).
Step 4: Once you have selected the default font for your file, it’s time to save it as a template. To do this, go to File ->
Save As and choose a location to save your file.
Step 6: Make sure the file is saved as a PowerPoint Template file (such as a POTX file) and click Save after selecting the
Custom Office Templates folder.
Step 8: Select the template with your desired font settings to edit your file with your default fonts.
To set a proofing language in PowerPoint for spelling and grammar checking, navigate to the "Review" tab, then
"Language," and select "Set Proofing Language." From there, choose the desired language and click "OK," according to
Microsoft Support. You can also select specific text and change its proofing language through a right-click, notes
Microsoft Support.
Detailed Steps:
3. Access Language Options: Within the "Review" tab, find the "Language" group and click on "Set Proofing Language,"
says Microsoft Support.
4. Select Proofing Language: In the "Set Proofing Language" dialog box, select the language you want to use for spell
checking and grammar checking, notes Microsoft Support.
5. Apply to All Text (Optional): If you want to change the proofing language for the entire presentation, select "All Text" at
the bottom of the dialog box, notes Microsoft Support.
6. Confirm and Save: Click "OK" to confirm your changes. Save the presentation to ensure the changes are permanent,
1. If the ruler isn’t visible at the top of your presentation, check the Ruler box on the View tab.
2. Select the text you want to change, then do one of the following:
3. To indent the first line, on the horizontal top ruler, drag the First Line Indent marker where you want the text to
start.
4. To increase or decrease the left indent of the whole paragraph, on the Home tab, in the Paragraph group, click Increase
List Level or Decrease List Level.
1. Select the text you want to change, then do one of the following:
2. To increase or decrease the left indent of the whole paragraph, on the Home tab, in the Paragraph group, click Increase
List Level or Decrease List Level.
3. Under Indentation, in the Before text box, click the arrow to set the measurement you want, such as 0.5".
1. Select the Insert tab, then select the Shapes drop-down menu.
5. (Optional) Right-click the border and select Format Shape. Use the Format Shape panel on the right to adjust how the
border line looks.
You can also search for a new border to use in your presentation. PowerPoint uses a Bing Image Search to locate and
download borders. You can search for new border images if you are connected to the Internet.
1. On the slide where you want to add a border, click Insert > Pictures > Online Pictures.
2. Type a search phrase, like line borders or flower borders in the Bing Image Search box, and press Enter.
APPLYING SHADES
To add a fill or effect, click your shape, click Format, click the arrow next to Shape Fill or Shape Effects, and select a
color, gradient, texture, or effect.
1. Click the shape that you want to fill. To add the same fill to multiple shapes, click the first shape, and then press and hold
Ctrl while you click the other shapes.
2. On the Shape Format tab, in the Shape Styles group, click the arrow next to Shape Fill.
6
USE OF THE SLIDE MASTER, DESIGN TEMPLATE
B7.2.2.1.3. Demonstrate the use of the Slide Master, design template, and be able to give a 5-slide presentation in MS-
PowerPoint using the tools of the ribbons studied.
MASTER SLIDE
What is a slide master in PowerPoint?
A slide master is the control center and basic framework for a presentation built in PowerPoint. It serves as a toolbox you
can use when creating a presentation, allowing you to establish rules for the layout and appearance of every slide. In the
slide master, you can create new slides that maintain consistency in formatting and style.
2. When you open Slide Master view, a slide master is shown in the thumbnail pane with the default, associated layouts
below it. If you want to add another slide master, do the following:
a. Click a location in the slide thumbnail pane where you want the new slide master to appear.
b. On the Slide Master tab, select Insert Slide Master.
Note: In the slide thumbnail pane, the slide master is the larger slide image at the top, and the associated layouts are
positioned below the slide master.
o To control whether footers (the slide number, date, and footer-text placeholders) are visible on a particular type of slide:
In the thumbnail pane, select a slide layout, then on the Slide Master tab, select or clear Footers. To assign specific text to
any of the footers, on the ribbon, select Insert > Headers, then select the options you want. See Insert or change the slide
numbers, date, or footer for on-screen slides in PowerPoint for more details.
4. After you make your changes, on the Slide Master tab, select Close Master View.
Note Master
The Notes Master in PowerPoint allows you to control the layout and appearance of the notes pages in a presentation,
similar to how the Slide Master controls the slide layouts. You can use it to modify the format of the notes text, adjust
placeholders for slide images, and customize headers and footers. This ensures a consistent look and feel across all your
notes pages.
The Handout Master in PowerPoint allows you to customize the appearance of presentation handouts, including layout,
headers, footers, and backgrounds. Changes made here apply to all pages of the printed handout.
Here's a more detailed explanation:
Key Features and Uses:
• Customizing Layout: You can choose the number of slides per page (e.g., 1, 2, 3, 6, 9 slides).
Adding Headers and Footers: You can add information like the date, time, slide number, or presentation title to
each handout page.
Changing Backgrounds: You can modify the background design of the handouts.
Adding Placeholders: You can add or remove placeholders for elements like the date, time, slide number, or
presentation title.
Changing Orientation: You can choose between portrait or landscape orientation for your handouts.
Accessing the Handout Master:
Select Handout Master: In the Master Views group, click "Handout Master".
Make Changes: Modify the layout, headers, footers, and backgrounds as needed.
Close Handout Master: Click the "Close Master View" button to return to normal presentation mode.
Spreadsheet
A spreadsheet or worksheet is a file made of rows and columns that help sort, organize, and arrange data efficiently, and
calculate numerical data. What makes a spreadsheet program unique is its ability to calculate values using
mathematical formulas and the data in cells. An example of how a spreadsheet may be utilized is creating an overview of
your bank's balance.
o o
Apple Numbers
Google Sheets WPS Office
Zoho Sheets
EtherCalc
OnlyOffice
Apache OpenOffice Calc
Smartsheet
Stackby
Spreadsheets allow for structured data storage in rows and columns, making it easy to access, manage, and sort data. This
organized structure also helps in identifying patterns and relationships within the data.
Spreadsheets provide tools for sorting, filtering, and analyzing large datasets, allowing users to extract meaningful
insights. They also offer features like formulas and functions that automate calculations and facilitate complex analyses.
3. Collaboration and Sharing:
Many spreadsheet applications support real-time collaboration, enabling multiple users to work on the same document
simultaneously. This facilitates sharing and communication, making it easier to work on projects as a team.
4. Visual Representation of Data:
Spreadsheets allow users to create charts and graphs, providing a visual representation of data that is easier to understand
and interpret. These visuals can highlight trends, comparisons, and patterns that might not be immediately obvious from
numerical data alone.
5. Automated Calculations and Data Management:
Spreadsheets automate repetitive calculations using formulas and functions, saving time and reducing the risk of errors.
This allows users to focus on analysis and decision-making rather than manual calculations.
2
FEATURES OF ELECTRONIC SPREADSHEET
B7.2.3.1.2. Explore features of MS-Excel interface
MS-Excel's interface offers a range of features for data organization, analysis, and presentation. Key elements include the
Ribbon, containing various tabs for common tasks like Home, Insert, Page Layout, Formulas, Data, Review, and View.
The Quick Access Toolbar provides shortcuts to frequently used commands, while the Status Bar displays information
about the worksheet. Worksheets contain cells, rows, and columns, allowing for data entry and manipulation.
Here's a more detailed look at some key interface features:
1. Ribbon:
Home: Offers basic formatting, editing, and style options for cells, including font, alignment, and number formats.
Insert: Provides tools for inserting tables, charts, images, and other objects into the worksheet.
Page Layout: Allows customization of page orientation, margins, and themes.
Formulas: Enables the use of formulas and functions for calculations and analysis.
Data: Offers data management tools like sorting, filtering, and validation.
Review: Provides features for proofreading, adding comments, and protecting the worksheet.
View: Allows customization of the worksheet view, including zoom level and layout.
2. Quick Access Toolbar:
A customizable toolbar located at the top of the interface, providing quick access to commonly used commands.
3. Status Bar:
Located at the bottom of the interface, displaying information about the current worksheet, such as the page number,
zoom level, and mode.
4. Worksheets:
Consists of rows and columns, with individual cells referenced by their row and column intersection.
5. Other Features:
Formulas and Functions: Excel uses formulas and functions to perform calculations on data in cells.
Data Validation: Allows users to set rules for data entry, ensuring data accuracy and consistency.
BS 7 73 MASTER’S APPROACH COMPUTING
Sorting and Filtering: Enables users to organize and filter data based on various criteria.
Conditional Formatting: Highlights cells based on specific criteria, making it easier to identify trends and patterns.
Charts and Graphs: Provides tools for creating various types of charts and graphs to visualize data.
Pivot Tables: Summarize and analyze data in a dynamic, interactive way.
VBA (Visual Basic for Applications): Enables users to automate tasks and create custom functions.
Data Analysis Tools: Offers tools for statistical analysis, scenario planning, and goal seeking.
Workbook: This refers to the Excel file itself, which can contain multiple worksheets.
Worksheet: Also known as a spreadsheet, this is a single page within the workbook where you enter and manipulate
data.
Cell: The fundamental unit of a worksheet, where data is entered and stored. It's the intersection of a row and a column.
Row: Cells aligned horizontally in a worksheet, numbered from 1.
Column: Cells aligned vertically in a worksheet, labeled with letters (A, B, C, etc.).
Cell Reference: The unique address of a cell, formed by the column letter and row number (e.g., A1, B5).
Formula: A calculation within a cell that uses operators, numbers, and cell references to generate a value.
Function: A predefined formula (like SUM, AVERAGE) that performs a specific task.
INSERTING DATA
In MS Excel, there are 1048576*16384 cells. MS Excel cell can have Text, Numeric value or formulas. An MS Excel
cell can have maximum of 32000 characters.
Inserting Data
For inserting data in MS Excel, just activate the cell type text or number and press enter or Navigation key
Inserting Formula
For inserting formula in MS Excel go to the formula bar, enter the formula and then press enter or navigation key. See the
screen-shot below to understand it.
For modifying the cell content just activate the cell, enter a new value and then press enter or navigation key to see the
changes. See the screen-shot below to understand it.
Drag the mouse over the data you want to select. It will select those cells as shown below.
If you want to select specific region, select any cell in that region. Pressing F5 will show the below dialogue box.
Click on Special button to see the below dialogue box. Select current region from the radio buttons. Click on ok to see
the current region selected.
MS Excel provides various ways of deleting data in the sheet. Let us see those ways.
Select the data you want to delete. Right Click on the sheet. Select the delete option, to delete the data.
Step 1 − Select the data you want to Move. Right Click and Select the cut option.
MS Excel provides copy paste option in different ways. The simplest method of copy paste is as below.
Copy Paste
To copy and paste, just select the cells you want to copy. Choose copy option after right click or press Control + C.
Select the cell where you need to paste this copied content. Right click and select paste option or press Control + V.
When you copy data in MS Excel, it puts the copied content in Windows and Office Clipboard. You can view the
clipboard content by Home → Clipboard. View the clipboard content. Select the cell where you need to paste. Click on
paste, to paste the content.
You may not want to copy everything in some cases. For example, you want to copy only Values or you want to copy
only the formatting of cells. Select the paste special option as shown below.
To determine the data type in Excel, right-click on any cell or a range of cells and choose Format Cells. The Number tab
here will display the available data types, such as Number, Date, or Text.
Alternatively, you can go to the Number group from the Home tab and see the data types.
Data types help you insert data into the document correctly. If there are incorrect data types within the dataset, the data
can be misrepresented and cause calculation errors. So, knowing what data types are suitable for datasets is important.
Number data
Number data can be any value, including large numbers, small fractions, or qualitative data. In this section, we will take a
look at examples including currency amounts, whole numbers, percentages, decimals, dates, times, and telephone
numbers. As we will see, in order to ensure that Excel interprets your numeric data accurately, we have to define them
using proper symbols and formats.
Keep in mind, there are subtle differences. For example, in a case where one cell has financial data and another has a date,
Excel registers them both as Numeric, yet they are not identical.
Currency
You will be familiar with the Currency data type if you work with financial data. It formats monetary values and ensures
that financial data is accurately represented by appropriate currency symbols and decimal places.
Here’s how you can apply the currency data type. Here we will convert numbers into currency.
Date and Time data types store dates and times in different formats. These formats help with chronological data analysis,
scheduling, and time-sensitive calculations.
Let's take a look at the example of how to convert a Text into a Date. For time formatting, follow these steps and select
the Time data type instead.
The Percentage data type converts numbers into percentages, making it easier to read and interpret ratio data and
proportional values.
Fractions
You can use the Fraction data type to display your value in fractions instead of decimals.
Scientific
The Scientific data type displays a number in exponential notation, using E+n to represent that the number preceding E is
multiplied by 10 to the nth power.
Let's take a look at how to convert the number data type to the scientific data type:
Speciall
Excel's Special data type includes formatting for zip codes, phone numbers, and Social Security numbers (SSNs). These
formats keep the leading zeros in the case of zip codes and correctly format phone numbers and SSNs using the
appropriate separators.
Custom
As the name suggests, Custom data type allows you to customize the formatting according to your needs. It provides
various formatting suggestions that can help you customize your values.
Text data
Text data is the basic type that allows you to input characters, including alphabetical, numerical, and special symbols.
Unlike number data, symbols inputted as Text do not support calculations. That’s why you can manually manage Text and
Number data according to your needs.
However, by default, Excel interprets figures it does not understand as text data.
Boolean data
Excel's Boolean data type represents logical values that perform logical operations. It only has two possible values: TRUE
and FALSE. These values are used in functions and formulas to test conditions and return logical results.
Take a look at how we test whether the two given values are equal or not using the Boolean data type: =value1=value2.
In the rest of this section, we will take a closer look at how Boolen data types are used in logical function. You can also
find some logical functions by heading over to Formulas > Logical.
IF() function
IF() determines if the value in one cell is greater than the other. If the condition is true, it returns TRUE. Otherwise, it
returns FALSE.
OR() function
OR() tests values or logical statements—checks if any values meet the arguments.
Using OR operator
XOR() function
NOT() function
NOT() reverses the argument's value. If the argument is valid, then the NOT() function will return FALSE. Conversely, if
the argument is false, then the NOT() function will return TRUE. This function can also be used to find duplicates in
Excel.
Error data
Excel can generate error values whenever it recognizes an error or if data is missing as the entry is being processed. This
indicates where things go wrong so you can correct the problem and get the result you are looking for.
All error values begin with a #. Here are the common error values that you must look out for:
1. #NAME?: This error occurs when any value is not written within quotes in a formula or when a quote is missing.
2. #DIV/0!: This indicates you have divided the number by zero, but the divisor is not equal to zero.
3. #REF!: This occurs when you have an invalid cell reference or when you delete or paste stuff in place of a formula
reference.
4. #NUM!: This occurs when you input an invalid formula or function or when the calculation outcome is too large for
Excel to display.
5. #N/A: Excel displays this error for empty or unreadable cells.
6. #VALUE!: This occurs when there is no valid argument or operator in the function.
7. #NULL!: This error condition is raised if you reference the intersection of a range of cells that don't intersect or if a range
of cells in a function doesn't have separating commas.
In this section, we will review two examples of how to verify data types in Excel. In the first example, we can check if a
cell is empty by applying the ISBLANK() function.
Linked data types in Excel connect your worksheet to rich data from the web, which means you can bring in data related
to companies, currencies, cities, foods, stocks, and more.
This way, you can manage your currency conversion, stock market analysis, recipe nutritional summaries, and fitness
tracking tasks with much less time.
1. Rich Data Integration: Linked data types bring live connected data directly into your spreadsheet.
2. Automatic Data Updates: Data linked from the web is updated automatically.
3. Data Cards: When you click on a cell containing a Linked data type, a data card showing detailed information about that
data pops up.
4. Easy Data Extraction: You can extract specific fields from the Linked data type into your worksheet.
Summary table
Let's take everything we know now about data types into a table for easy comparison and reference.
Date and Stores dates and times for chronological ISDATE() (custom function), check
01/01/2024, 12:00 PM
Time analysis and calculations. date/time format.
Formats values for zip codes, phone 12345, (123) 456-7890, Verify by checking the special
Special
numbers, and Social Security numbers. 123-45-6789 format (e.g., zip code, phone
number, SSN).
#NAME?, #DIV/0!,
Indicates errors or missing data with specific Verify by identifying error messages
Error #REF!, #NUM!, #N/A,
error values starting with #. starting with #.
#VALUE!
4
HOW TO ALIGN TEXT, MERGE & WRAP
B7.2.3.1.4. Demonstrate how to use Align Text, Merge & Wrap, Borders and Shades
If you want to change the way data appears in a cell, you can rotate the font angle, or change the text alignment.
You can rotate your text up, down, clockwise, or counterclockwise, or align text vertically:
Begin by selecting the cell or cells you want to align. You can align text in a single cell, a range of cells, a row or rows, a
column or columns, or the entire worksheet. (Use Ctrl+A to select all cells.)
3. On the Home tab, in the Alignment group, select a vertical alignment option:
Apply Borders
MS Excel enables you to apply borders to the cells. For applying border, select the range of cells Right Click » Format
cells » Border Tab » Select the Border Style.
Then you can apply border by Home Tab » Font group » Apply Borders.
Fullscreen
Apply Shading
You can add shading to the cell from the Home tab » Font Group » Select the Color.
MS Excel enables you to merge two or more cells. When you merge cells, you dont combine the contents of the cells.
Rather, you combine a group of cells into a single cell that occupies the same space.
Choose Merge & Center control on the Ribbon, which is simpler. To merge cells, select the cells that you want to merge
and then click the Merge & Center button.
• Choose Alignment tab of the Format Cells dialogue box to merge the cells.
The Home » Alignment group » Merge & Center control contains a drop-down list with these additional options −
• Merge Across − When a multi-row range is selected, this command creates multiple merged cells one for each row.
• Merge Cells − Merges the selected cells without applying the Center attribute.
• Unmerge Cells − Unmerges the selected cells.
If the text is too wide to fit the column width but dont want that text to spill over into adjacent cells, you can use either the
Wrap Text option or the Shrink to Fit option to accommodate that text.
MARGINS
Margins
Margins are the unprinted areas along the sides, top, and bottom of a printed page. All printed pages in MS Excel have the
same margins. You cant specify different margins for different pages.
Choose Page Layout » Page Setup » Margins drop-down list, you can select Normal, Wide, Narrow, or the custom
Setting.
• These options are also available when you choose File » Print.
Center on Page
By default, Excel aligns the printed page at the top and left margins. If you want the output to be centered vertically or
horizontally, select the appropriate check box in the Center on Page section of the Margins tab as shown in the above
screenshot.
Page Orientation
Page orientation refers to how output is printed on the page. If you change the orientation, the onscreen page breaks adjust
automatically to accommodate the new paper orientation.
Page Layout View in Excel stands as one of three primary worksheet views. It brings clarity by dividing your worksheet
into individual pages, facilitating content arrangement. This view reveals the complete page layout, encompassing
margins, headers, and footers. It empowers you to:
To access the Page Layout view using the View tab in Excel:
Step 3: Click on the "Page Layout" option right next to the “Page Break Preview” in the Excel ribbon.
Step 4: In this view, your page appears as sheets, resembling physical papers. This helps you preview how your data will
be printed on the sheet.
Step 6: Additionally, you can customize the view further using the Show section by hiding rulers, the formula bar, and
gridlines according to your preferences.
Step 7: To exit Page Layout View in Excel, just click on the "Normal" option. This will switch you back to the regular
view of the Excel spreadsheet.
You can easily enter Page Layout View by clicking the small button at the bottom right corner. A single click will switch
to this view.
To exit, just click the Normal View button next to Page Layout View in Excel.
6
HOW TO SET UP A HEADER AND A FOOTER
B7.2.3.2.2. Demonstrate how to set up a header and a footer.
A header is the information that appears at the top of each printed page and a footer is the information that appears at the
bottom of each printed page. By default, new workbooks do not have headers or footers Remaining Time -7:15
You can choose the predefined header and footer or create your custom ones.
When a header or footer is selected in Page Layout view, the Header & Footer » Design » Options group contains
controls that let you specify other options −
• Different First Page − Check this to specify a different header or footer for the first printed page.
• Different Odd & Even Pages − Check this to specify a different header or footer for odd and even pages.
7
HOW TO USE AUTO FILL FUNCTION IN MS EXCEL
WORKBOOK
B7.2.3.2.3. Demonstrate the use of the Autofill function in MS-Excel worksheet
The AutoFill feature in Excel allows for automatic generation of sequences like days of the week, months, numbers, and
even multiplication tables. To use AutoFill, select the starting cell(s) with the initial values, move the cursor to the fill
handle (the small square at the bottom-right corner of the selection), and drag it to fill the desired range.
Here's a demonstration with examples:
1. Days of the Week:
Select cell A1, and move the cursor to the fill handle.
Drag the fill handle down to create a sequence of days of the week.
3. Counting Numbers:
4. Move the cursor to the fill handle, and drag it down to create a sequence of numbers.
4. Odd Numbers:
4. Move the cursor to the fill handle, and drag it down to create a sequence of odd numbers.
5. Multiplication Tables:
4. Move the cursor to the fill handle, and drag it down to create the first row of a multiplication table.
6. Move the cursor to the fill handle, and drag it right to create the multiplication table.
4. Move the cursor to the fill handle, and drag it down to create a sequence of numbers increasing by 5.
Formulas in MS Excel
Formulas are the Bread and butter of worksheet. Without formula, worksheet will be just simple tabular representation of
data. A formula consists of special code, which is entered into a cell. It performs some calculations and returns a result,
which is displayed in the cell.
Formulas use a variety of operators and worksheet functions to work with values and text. The values and text used in
formulas can be located in other cells, which makes changing data easy and gives worksheets their dynamic nature. For
example, you can quickly change the data in a worksheet and formulas works.
Elements of Formulas
Using the Pointing method to supply the cell addresses for formulas is often easier and more powerful method of formula
building. When you are using built-in functions, you click the cell or drag through the cell range that you want to use
when defining the functions arguments in the Function Arguments dialog box. See the below screen shot.
EXERCISE
1
COMPUTER NETWORKS
SUB-STRAND 1
Computer networking refers to interconnected computing devices that can exchange data and share resources with each
other. These networked devices use a system of rules, called communications protocols, to transmit information over
physical or wireless technologies.
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
Network devices are physical devices that allow hardware on a computer network to communicate and interact with each
other. Network devices like hubs, repeaters, bridges, switches, routers, gateways, and brouter help manage and direct data
flow in a network. They ensure efficient communication between connected devices by controlling data transfer, boosting
signals, and linking different networks. Each device serves a specific role, from simple data forwarding to complex
routing between networks. In this article, we are going to discuss different types of network devices in detail.
• Network devices help to send and receive data between different devices.
• Network devices allow devices to connect to the network efficiently and securely.
• Network devices improves network speed and manage data flow better.
• Repeater • Routers
Access Point
An access point in networking is a device that allows wireless devices, like smartphones and laptops, to connect to a wired
network. It creates a Wi-Fi network that lets wireless devices communicate with the internet or other devices on the
network. Access points are used to extend the range of a network or provide Wi-Fi in areas that do not have it. They are
commonly found in homes, offices, and public places to provide wireless internet access.
Modems
Modem is also known as modulator/demodulator is a network device that is used to convert digital signal into analog
signals of different frequencies and transmits these signals to a modem at the receiving location. These converted signals
can be transmitted over the cable systems, telephone lines, and other communication mediums. A modem is also used to
convert an analog signal back into digital signal. Modems are generally used to access the internet by customers of an
Internet Service Provider (ISP).
Types of Modems
• DSL Modem: Uses regular phone lines to connect to the internet but it is slower compared to other types.
• Cable Modem: Sends data through TV cables, providing faster internet than DSL.
• Wireless Modem: Connects devices to the internet using Wi-Fi relying on nearby Wi-Fi signals.
• Cellular Modem: Connects to the internet using mobile data from a cellular network not Wi-Fi or fixed cables.
Firewalls
A firewall is a network security device that monitors and controls the flow of data between your computer or network and
the internet. It acts as a barrier, blocking unauthorized access while allowing trusted data to pass through. Firewalls help
protect your network from hackers, viruses, and other online threats by filtering traffic based on security rules. Firewalls
can be physical devices (hardware), programs (software), or even cloud-based services, which can be offered as SaaS,
through public clouds, or private virtual clouds.
Repeater
A repeater operates at the physical layer. Its main function is to amplify (i.e., regenerate) the signal over the same network
before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same
network. When the signal becomes weak, they copy it bit by bit and regenerate it at its star topology connectors
connecting following the original strength. It is a 2-port device.
Hub
Types of Hub
• Active Hub: These are the hubs that have their power supply and can clean, boost, and relay the signal along with the
network. It serves both as a repeater as well as a wiring center. These are used to extend the maximum distance between
nodes.
• Passive Hub: These are the hubs that collect wiring from nodes and power supply from the active hub. These hubs relay
signals onto the network without cleaning and boosting them and can't be used to extend the distance between nodes.
• Intelligent Hub: It works like an active hub and includes remote management capabilities. They also provide flexible
data rates to network devices. It also enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
Bridge
A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering content by reading
the MAC addresses of the source and destination. It is also used for interconnecting two LANs working on the same
protocol. It typically connects multiple network segments and each port is connected to different segment. A bridge is not
strictly limited to two ports, it can have multiple ports to connect and manage multiple network segments. Modern multi-
port bridges are often called Layer 2 switches because they perform similar functions.
Types of Bridges
• Transparent Bridges: These are the bridge in which the stations are completely unaware of the bridge's existence i.e.
whether or not a bridge is added or deleted from the network, reconfiguration of the stations is unnecessary. These bridges
make use of two processes i.e. bridge forwarding and bridge learning.
• Source Routing Bridges: In these bridges, routing operations is performed by the source station and the frame specifies
which route to follow. The host can discover the frame by sending a special frame called the discovery frame, which
spreads through the entire network using all possible paths to the destination.
Switch
A switch is a multiport bridge with a buffer designed that can boost its efficiency(a large number of ports imply less
traffic) and performance. A switch is a data link layer device. The switch can perform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and forward good packets selectively to
the correct port only. In other words, the switch divides the collision domain of hosts, but the broadcast domain remains
the same.
Types of Switch
• Unmanaged Switches: These switches have a simple plug-and-play design and do not offer advanced configuration
options. They are suitable for small networks or for use as an expansion to a larger network.
• Managed Switches: These switches offer advanced configuration options such as VLANs, QoS, and link aggregation.
They are suitable for larger, more complex networks and allow for centralized management.
• Smart Switches: These switches have features similar to managed switches but are typically easier to set up and manage.
They are suitable for small- to medium-sized networks.
• Layer 2 Switches: These switches operate at the Data Link layer of the OSI model and are responsible for forwarding
data between devices on the same network segment.
• PoE Switches: These switches have Power over Ethernet capabilities, which allows them to supply power to network
devices over the same cable that carries data.
• Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster than traditional Ethernet speeds.
• Rack-Mounted Switches: These switches are designed to be mounted in a server rack and are suitable for use in data
centers or other large networks.
• Desktop Switches: These switches are designed for use on a desktop or in a small office environment and are typically
smaller in size than rack-mounted switches.
• Modular Switches: These switches have modular design that allows for easy expansion or customization. They are
suitable for large networks and data centers.
Router
A router is a device like a switch that routes data packets based on their IP addresses. The router is mainly a Network
Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing table based on which
they make decisions on routing the data packets. The router divides the broadcast domains of hosts connected through it.
Gateway
A gateway, as the name suggests, is a passage to connect two networks that may work upon different networking models.
They work as messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways
are also called protocol converters and can operate at any network layer. Gateways are generally more complex than
switches or routers.
Brouter
It is also known as the bridging router is a device that combines features of both bridge and router. It can work either at
the data link layer or a network layer. Working as a router, it is capable of routing packets across networks and working as
a bridge, it is capable of filtering local area network traffic.
NIC
NIC or network interface card is a network adapter that is used to connect the computer to the network. It is installed in
the computer to establish a LAN. It has a unique ID that is written on the chip, and it has a connector to connect the cable
to it. The cable acts as an interface between the computer and the router or modem. NIC is a layer 2 device which means
that it works on both the physical and data link layers of the network model.
The arrangement of nodes and links is called network topology. They can be configured in different ways to get different
outcomes. Some types of network topologies are:
Mesh Topology
Star Topology
Bus Topology
Advantages of Bus Topology
• If N devices are connected to each other in a bus topology, then the number of cables required to connect them is 1,
known as backbone cable, and N drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to build small networks.
• Bus topology is familiar technology as installation and troubleshooting techniques are well known.
• CSMA is the most common method for this type of topology.
Disadvantages of Bus Topology
• A bus topology is quite simpler, but still, it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used in the
MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
• Adding new devices to the network would slow down networks.
• Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected to a single coaxial cable or
twisted pair cable. This topology is also used in cable television networks.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A number of repeaters
are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node
in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is
used by the workstations to transmit the data.
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which contains the repeater. This data
flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e.
devices to the secondary hub and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all different types of
networks.
Advantages of Hybrid Topology
• This topology is very flexible .
• The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
• It is challenging to design the architecture of the Hybrid Network.
• Hubs used in this topology are very expensive.
• The infrastructure cost is very high as a hybrid network requires a lot of cabling and network devices .
A common example of a hybrid topology is a university campus network. The network may have a backbone of a star
topology, with each building connected to the backbone through a switch or router. Within each building, there may be
a bus or ring topology connecting the different rooms and offices. The wireless access points also create a mesh
topology for wireless devices. This hybrid topology allows for efficient communication between different buildings
while providing flexibility and redundancy within each building.
Why is Network Topology Important?
Network Topology is important because it defines how devices are connected and how they communicate in the
network. Here are some points that defines why network topology is important.
• Network Performance: Upon choosing the appropriate topology as per requirement, it helps in running the network
easily and hence increases network performance.
B7.3.1.1.2 Describe types of networks [Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area
Network (MAN), Wide Area Network (WAN)]
The Network allows computers to connect and communicate with different computers via any medium. LAN, MAN,
and WAN are the three major types of networks designed to operate over the area they cover. There are some similarities
and dissimilarities between them. One of the major differences is the geographical area they cover, i.e. LAN covers the
smallest area, MAN covers an area larger than LAN and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
PAN is a personal area network having an interconnection of personal technology devices to communicate over a short
distance. It covers only less than 10 meters or 33 feet of area. PAN has fewer users as compared to other networks such as
LAN, WAN, etc. PAN typically uses some form of wireless technology. PAN involves the transmission of data between
information devices such as smartphones, personal computers, tablet computers, etc.
Advantages:
• Uses wireless technology, which eliminates the need for wires and cables.
• PANs are designed to be energy efficient, which means that devices can communicate with each other without draining
their batteries quickly.
• PANs are typically secured using encryption and authentication protocols, which helps to prevent unauthorized access to
data and resources.
Disadvantages:
• May not be suitable for large-scale data transfer or communication.PANs typically have limited bandwidth, which means
that they may not be able to handle large amounts of data or high-speed communication.
LAN or Local Area Network connects network devices in such a way that personal computers and workstations can share
data, tools, and programs. The group of computers and devices are connected together by a switch, or stack of switches,
using a private addressing scheme as defined by the TCP/IP protocol. Private addresses are unique in relation to other
computers on the local network. Routers are found at the boundary of a LAN, connecting them to the larger WAN.
Early LANs had data rates in the 4 to 16 Mbps range. Today, speeds are normally 100 or 1000 Mbps. Propagation delay is
very short in a LAN. The smallest LAN may only use two computers, while larger LANs can accommodate thousands of
computers. LAN has a range up to 2km. A LAN typically relies mostly on wired connections for increased speed and
security, but wireless connections can also be part of a LAN. The fault tolerance of a LAN is more and there is less
congestion in this network. For example A bunch of students playing Counter-Strike in the same room (without internet).
Advantages:
• Limited scalability and may require significant infrastructure upgrades to accommodate growth.
• May experience congestion and network performance issues with increased usage.
MAN or Metropolitan area Network covers a larger area than that covered by a LAN and a smaller area as compared to
WAN. MAN has a range of 5-50km. It connects two or more computers that are apart but reside in the same or different
cities. It covers a large geographical area and may serve as an ISP (Internet Service Provider). MAN is designed for
customers who need high-speed connectivity. Speeds of MAN range in terms of Mbps. It’s hard to design and maintain a
Metropolitan Area Network.
Advantages:
• Provides high-speed connectivity over a larger geographical area than LAN.
• Can be used as an ISP for multiple customers.
• May experience congestion and network performance issues with increased usage.
WAN or Wide Area Network is a computer network that extends over a large geographical area, although it might be
confined within the bounds of a state or country. WAN has a range of above 50 km. A WAN could be a connection of
LAN connecting to other LANs via telephone lines and radio waves and may be limited to an enterprise (a corporation or
an organization) or accessible to the public. The technology is high-speed and relatively expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is difficult to design and maintain. Similar
to a MAN, the fault tolerance of a WAN is less and there is more congestion in the network. A Communication medium
used for WAN is PSTN(Public Switched Telephone Network) or Satellite Link. Due to long-distance transmission, the
noise and error tend to be more in WAN.
Advantages:
Disadvantages:
• May experience higher latency and longer propagation delays due to longer distances and multiple network hops.
3
B7.3.1.1.3 Discuss the entrepreneurial opportunities in networking computing devices
Computer networks empower businesses to streamline operations. They help reduce costs and enhance collaboration.
Strategic network implementation can truly transform an organisation’s capabilities
2. Security Issues -
When it comes to computer network there this security issue arises. It is one of top issue of computer network and a big
challenge to network security engineers which generally involve protecting network from different cyber attacks,
preventing unauthorized users to enter and access system, and maintaining network integrity. All these security issues
increases with increase in network size when network size is large there chance of security issues are more.
3. Host Identification -
Small networks can be easily configured with help of manual addressing, but this becomes a serious problem in large
networks when it comes to host identification. Because without any proper address of networking it becomes difficult
to establish communication in network. So proper host identification is necessary for a network communication.
4. Configuration Conflicts -
Mainly large networks have to deal with configuration conflicts and busy networks, since a lot more traffic is going
through it. But in small networks a couple of thousand IP addresses with unique host names are available so there is
less chance of conflict in between devices. But now a days this problem is less as network structures are designed in
such a way that deals with configuration conflicts.
5. Capacity Concern -
Now a days volume of data is so high which is produced from various sources. So network capacity also needs to grow
with respect it. Today we are dealing with trends like Internet of Things (IoT), Big Data, Data science etc and next year
something new will be also added so networks also need to improve capacity needs as well as facing cyber threats.
6. Slow Connectivity -
Slow connectivity over a network is more frustrating where a simple task takes a long time to be performed over
network. It’s often caused by large file transfers over a large area through network. It becomes an unwanted challenge
for users when they work over computer network.
1
INTERNET AND SOCIAL MEDIA
Social media can be defined as any platform that allows you to share media such as pages, videos, or text in
different formats. These platforms allow you to connect and communicate with people you know and even those you
don’t know. Social media sites are now being used by businesses and marketers to reach a wider audience and sell their
brands, products, and services. Marketers and business owners can now advertise products and services to many different
people online to maximize the full potential of social media. The main factor that distinguishes the different types of
social media is the type of content. So, with this, we will dive into the various types of social media.
These are sites mainly used for connecting with friends and family. They focus more on person-to-person conversations.
Aside from personal conversations, these platforms encourage knowledge sharing. These platforms accommodate the
different types of content formats from text to photos, videos, and other creative forms of content. They are considered the
center of communication and a jack of all trades.
Users are able to create unique interesting content, share their thoughts, and create groups based on similar interests.
These sites are user-centered and are built around the social needs of the users and everything that is important to them.
Businesses and marketers can fully maximize these platforms because they provide an immense amount of data. Also,
they are able to reach the right people through adverts with specific metrics and demographics. They also provide the
opportunity to engage with users which helps people connect with your brand on a more personal level. Some of such
platforms include Facebook, LinkedIn, and Twitter.
2. Image-based sites
Image-based types of content have gained more prominence in recent times. Content like infographics, illustrations, and
images capture the attention of users more. Social media apps like Pinterest, Instagram, and Snapchat are designed to
amplify the sharing of images. They say a picture is worth a thousand words, and using this can have lots of positive
effects.
As a business, you can encourage your audience to generate unique content as a way of engaging with your brand. You
can also use pictures to tell personal stories, inspire, and engage with your audience. Businesses can also use these
platforms to boost sales through shoppable posts and images. Platforms like Instagram and Pinterest allow business
accounts to post images that are linked to their shoppable items. Users are notified when they come across a post with a
shopping link and can proceed to the merchant store to complete their transaction.
Video content is one of the most captivating and engaging forms of content. Marketers and businesses have said that they
have seen tremendous benefits in using videos. This form of content aids assimilation and understanding, hence why it is
largely preferred by users. One major platform that reshaped how people interact with video content is YouTube. With
over one billion active users monthly, the platform sometimes serves as a search engine for most users.
4. Discussion forums
Discussion forums are very essential because they allow users to ask questions and get answers from different people.
These platforms are designed to spark conversations based on shared interests or out of curiosity. Some of such platforms
include Quora and Reddit.
Although people are not as identifiable on these platforms as others, the knowledge and value provided are what makes
such a platform relevant. Businesses can get a better understanding of how people feel about certain products, services, or
topics pertaining to their niche. It is a way to get unfiltered thoughts and be part of everyday conversations your customers
have around certain issues. These platforms can be used to conduct research or answer whatever questions people may
have about your industry.
Blogs are a great way for businesses and marketers to reach and provide credible information to their target audience.
Platforms like Tumblr and Medium allow users to create a community where people with similar interests can follow
them and read all they have to say about certain topics.
Businesses can create blogs on these platforms or on their website to provide more information about the brand. Curating
content that also answers questions and allows customers to freely express their views not only establishes you as an
expert but also shows your brand is relatable.
What is microblogging?
Microblogging is a short blog post designed for quick and typically direct audience interactions. These concise blogs are
shared using social media platforms like Twitter or Instagram, and can include different content formats such as audio,
text, images or video.
Microblogging enables users to weigh in on trending topics or reach friends or family, and organizations to reach their
prospective audiences. Shared content includes user-generated content, event highlights, news updates, memes and
quotes.
The appeal of microblogging is both its immediacy and portability. Posts are brief -- typically 140 to 280 characters -- and
can be written or received using a variety of devices, including smartphones.
Microblogging is a fast way to communicate with audiences. As opposed to writing pages of text like in a traditional blog,
a microblog enables quick conversational posts with others. For brands, it can be a way to make product announcements
or clarifications, link to longer content posts, seem more personable or engage in conversations with customers.
Benefits of microblogging
• More frequent posts. Microbloggers can share short messages more often when compared to writing longer, more in-
depth traditional blogs.
• Less time needed to create a post. Users can create shorter microblog posts faster than longer forms of content.
• Conducive for time-sensitive information. Posts or tweets can share breaking news, event information, trending topics
or other timely information.
Microblogging platforms typically include popular social media sites like the following:
• Twitter is a quick way to share short posts, links and other content up to a 280-character limit.
• Users can send messages and share numerous content types with families, friends and groups.
• Owned by Meta (Facebook), Instagram is a visual and video microblogging service.
• A popular platform for connecting with businesses and professionals, LinkedIn is known as a professional networking
site.
• This popular short-form video social media app enables users to share video-based microblogs.
• Users can link to photos of products, style inspiration, recipes and other useful information.
Using email
To send and receive email you must be connected to the internet.
Sending email
Receiving email
Email clients and webmail periodically check for new emails. A manual
check can be performed by clicking 'Send and Receive' in an email client or
by refreshing the page when using webmail.
Email clients download attachments automatically but webmail users must choose to download attachments.
Email on other devices
Today email is not limited to computers. It can be sent from many other devices too, such as:
1. Open your email client: Launch your email program (e.g., Outlook, Gmail, Yahoo Mail).
3. Find the attachment icon: Look for a paperclip icon, often labeled "Attach File" or "Attach".
4. Select the file: The email program will open a file browser, allowing you to navigate to and select the file you want to
attach.
Attach the file: Once you've selected the file, click "Attach" or "Open" (the exact wording may vary).
Compose and send: Fill in the recipient's email address, add a subject, write your message, and then send the email.
REPLYING AND FORWADING EMAIL
To reply to an email, you'll typically see a "Reply" or "Reply All" button below the message. Clicking "Reply" will send
your message back to the original sender, while "Reply All" will send it to everyone on the original "To" and "Cc" lines.
Locate and open the email you want to reply to or forward in your email client.
Reply: If you want to respond directly to the original sender, click the "Reply" button. Microsoft Support.
Reply All: If you want to include everyone who received the original email (including those on the "To" and "Cc" lines),
click "Reply All". Microsoft Support.
Forward: To send the email to someone else who wasn't originally included, click the "Forward" button.
3. Compose your Message:
After clicking "Reply," "Reply All," or "Forward," you'll be able to write your message. You can add your own text, and
the original email will usually be included in the reply or forward.
4. Send:
Once you've finished composing your message, click the "Send" or "Reply" button (depending on your email client) to
send i
1
INFORMATION SECUIRITY
B7.3.3.1. Recognise data threats and means of protection
B7.3.3.1.1 Discuss the key principles of information security (confidentiality, integrity and availability)
Patents
A patent is a property right for an investor that's typically granted by a government agency such as the U.S. Patent and
Trademark Office.2 The patent allows the inventor exclusive rights to the invention, which could be a design, process,
improvement, or physical invention such as a machine.
Technology and software companies often have patents for their designs. The patent for the personal computer was filed
in 1980 by Steve Jobs and three other colleagues at Apple (AAPL).3
Copyrights
Copyrights provide authors and creators of original material the exclusive right to use, copy, or duplicate their material.
Authors of books have their works copyrighted as do musical artists. A copyright also states that the original creators can
grant anyone authorization through a licensing agreement to use the work.4
Trademarks
A trademark is a symbol, phrase, or insignia that's recognizable and represents a product that legally separates it from
other products. A trademark is exclusively assigned to a company. It owns the trademark so no others may use or copy it.
A trademark is often associated with a company's brand. The logo and brand name of Coca-Cola is owned by the Coca-
Cola Company (KO).
Franchises
A franchise is a license purchased by a company, individual, or a party called the franchisee. It allows them to use the
franchisor's name, trademark, proprietary knowledge, and processes.
The franchisee is typically a small business owner or an entrepreneur who operates the store or franchise. The license
allows the franchisee to sell a product or provide a service under the company's name. The franchisor is paid a start-up fee
in return as well as ongoing licensing fees by the franchisee. Examples of companies that use the franchise business model
include United Parcel Service (UPS) and McDonald's (MCD).
Trade Secrets
A trade secret is a company's process or practice that isn't public information and provides an economic benefit or
advantage to the company or holder of the trade secret. Trade secrets must be actively protected by the company and are
typically the result of a company's research and development (R&D). This is why some employers require the signing of
non-disclosure agreements (NDAs).
Digital Assets
Digital assets are also increasingly recognized as intellectual property. These would include proprietary software code or
algorithms and online digital content.
• Infringement: Occurs when someone violates the exclusive rights granted to the IP owner.
• Trademark infringement: Using a trademark that is too similar to an existing one.
• Copyright violation: Unauthorised reproduction or distribution of copyrighted material.
• Patent disputes: Common in the technology and innovation-driven business world.
• Trade secrets misappropriation: Obtaining or using a trade secret without the owner's consent.
• Counterfeiting and piracy: Selling counterfeit products or illegally copying and distributing copyrighted works
Shareware:
• Software that is distributed freely for users to try before purchasing a full version.
Often includes a trial period or a limited number of uses before requiring payment to continue using the software.
Developers may offer a fully functional version for a limited time or a version with certain features disabled.
Freeware:
The developer retains copyright, but the software can be used without any payment or licensing fees.
Many freeware programs are also open-source, meaning their code is publicly available and can be modified.
Crippleware:
• A type of shareware where certain features are disabled or limited until the user purchases the full version.
• This can include things like limited print options, watermarks, or the inability to save files.
• The idea is to make users aware of the potential of the software and entice them to purchase the full version.
• Monetary Damages:
IP owners can sue for actual damages, which include lost profits, damages due to market dilution, and other losses.
Statutory Damages:
In some cases, IP owners can seek statutory damages, which are pre-determined amounts set by law.
Injunctions:
BS 7 135 MASTER’S APPROACH COMPUTING
Courts can issue injunctions to stop the infringing activity, such as preventing the sale of counterfeit goods or the use of
stolen trade secrets.
Legal Fees:
If the IP owner wins the case, the infringer may be required to pay the IP owner's legal fees.
Criminal Law Consequences:
• Fines:
Criminal penalties can include substantial fines, especially for commercial-scale counterfeiting, copyright piracy, and
trade secret theft.
Imprisonment:
In some cases, particularly for serious offenses like counterfeiting trademarks or criminal copyright infringement,
imprisonment may be a potential consequence.
Suspension of Licenses:
Criminal charges related to IP theft can also lead to the suspension of licenses for businesses or individuals involved.
Other Consequences:
• Reputational Damage: Violating IP laws can severely damage a company's reputation and brand image.
Loss of Competitive Advantage: IP theft can undermine a company's ability to compete effectively.
Loss of Customer Trust: Customers may lose trust in a company if they learn that the company is involved in IP t
Innocent Mistakes:
Employees accidentally emailing sensitive information to the wrong person or failing to recognize phishing attempts.
• Malware:
Malicious software, such as viruses, worms, and ransomware, can infect systems and steal data.
Phishing Attacks:
Cybercriminals using deceptive emails or websites to trick individuals into revealing sensitive information, like login
credentials.
Hackers:
Individuals or groups with malicious intent who actively target organizations or individuals to steal data.
Insider Threats:
Employees who deliberately or inadvertently compromise data for malicious or personal reasons, such as disgruntled
employees or those seeking financial gain.
3. System Vulnerabilities:
Flaws in software or applications that can be exploited by attackers to gain unauthorized access.
Improper Configuration:
DNS Attacks:
Exploiting Domain Name System vulnerabilities to redirect users to malicious websites or systems.
Software Vulnerabilities:
4. Other Factors:
Lack of Training:
Insufficient security awareness training for employees can lead to human errors and vulnerabilities.
Cybercrime
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most
cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime
aims to damage computers or networks for reasons other than profit. These could be political or personal.
Types of cybercrime include:
1. Email and internet fraud.
2. Identity fraud (where personal information is stolen and used).
3. Theft of financial or card payment data.
4. Theft and sale of corporate data.
5. Cyberextortion (demanding money to prevent a threatened attack).
6. Ransomware attacks (a type of cyberextortion).
7. Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
8. Cyberespionage (where hackers access government or company data).
9. Interfering with systems in a way that compromises a network.
10. Infringing copyright.
11. Illegal gambling.
12. Selling illegal items online.
13. Soliciting, producing, or possessing child pornography.
B7.3.4.1.1 Identify the importance of the web in learning [Virtual Learning Environments (VLEs)]
A VLE (virtual learning environment) is a platform used in education to give access to educational content online.
This can be via computers or mobile devices (tablets or phones or even games consoles)
• Video conferencing software: Teachers must have a platform to interact with their students. Communication is
key to educational success, so video platforms allow teachers to set up a quality learning environment.
• User-friendly experience: A virtual learning environment should fit each student's abilities. What works for
one might not work well for other students, so the learning process should be personalized.
• Participation control: Teachers should be able to mute and unmute their students to improve the quality of
interaction for the entire group.
• Instant messaging: Online learners should be able to interact with themselves and their teachers through
multiple platforms, and interactive tools that enable quick communication are highly recommended.
• Digital whiteboard: Teachers should have an online whiteboard for explanations and demonstrations and to
boost engagement throughout the online course.
• Assessment tools: Keeping track of students' progress is simplified by using different tools that show teachers
the unique learning experiences of each student.
• Video recording software: Recording virtual lessons enables teachers to use it for future reference and give
students access to the learning material if they haven't attended the lecture.
Best Virtual Learning Platforms
• Zoom
• Google Classroom
• Learn Cube
• ClassIn
• Adobe Connect
• BigBlueButton
• Canva
• ClassDojo
• Peer Deck
• Kahoot
EXERCISE
•
edX:
A platform offering courses from leading universities and institutions.
•
Coursera:
A large platform with a wide range of courses on various subjects.
•
Khan Academy:
A non-profit organization providing free, high-quality educational content.
•
Open Yale Courses:
A platform offering free courses from Yale University.
•
Codecademy:
An interactive platform for learning to code.
•
OER Commons:
A digital library of open educational resources.
•
Saylor Academy:
A platform offering free, openly licensed courses.
•
Udacity:
A platform specializing in courses related to software development and data science.
•
FutureLearn:
A platform offering courses in collaboration with universities.
•
LinkedIn Learning:
A platform for learning professional skills.
•
Lumen Learning:
A platform that provides digital course materials.
Memrise:
A platform for language learning and other memorization topic
• Who wrote the page? Can you contact The site author is accessible.
him/her? The page supports the truth of its information
• What is the purpose of the document and why (quoted sources, bibliography).
was it produced? There aren't any obvious grammar or spelling
• Is this person qualified to write this document? errors.
• Have you checked our library databases, You can verify the information from other googled the
author, or used a Who is search to sources (print, as well as online). determine who owns the domain
name?
2. Authority of Web Documents Authority
• Who published the document and is it separate • The author is well established in his or her field &
from the "Webmaster"? the author's credentials are listed on the site..
• Where is the document published (the domain) • The author's credentials can be verified and they
and who owns the domain? are current
• Does the publisher list his/her qualifications, or • The author provides an e-mail or a contact
can they be verified? address/phone number.
• Does the site reflect a particular bias or • You don't see any obvious advertising .
viewpoint? What opinions (if any) are expressed? You don’t sense "hidden" advertising.
• What goals/objectives does this page meet? • You are not asked to purchase something or
• How detailed is the information? donate money to a cause.
• Accuracy. If your page lists the author and institution that published the page and provides a way of
contacting him/her, then. . .
• Authority. If your page lists the author credentials and its domain is preferred (.edu, .gov, .org, or
.net), then . . .
• Objectivity. If your page provides accurate information with limited advertising and it is objective in
presenting the information, then. . .
• Currency. If your page is current and updated regularly (as stated on the page) and the links (if any)
are also up-to-date, then . . .
• Coverage. If you can view the information properly—not limited to fees, browser technology, or
software requirement, then . . . you may have a higher quality Web page that could be of value to
your research!
CONCEPT OF PROGRAMMING
B7.4.1.1. Show an understanding of the concept of programming
B7.4.1.1.1 Demonstrate the correct use of programming terminologies
These coding terms are arranged in alphabetical order to make it easier for you to browse them. So, let us start
exploring!
1. Abstraction
It is the process by which the users can only witness the relevant details or data and the other attributes are kept hidden.
It is similar to how a person driving a car only knows about the controls rather than the whole internal mechanism.
2. Agile Software Development
Agile is a software development methodology in which the development process is broken down into small parts or
stages called sprints. This ensures that the code written is simple and tested efficiently. It includes various activities that
help facilitate cross-functional collaboration.
3. Algorithm
An algorithm is a step-by-step process or instructions that tell us how to solve a specific problem. For example,
different algorithms can be used to sort or arrange data in a particular way.
4. API (Application programming interface)
An application Programming Interface (API) is a set of guidelines and protocols that allow us to interact between
multiple computer programs or software components. APIs help in data exchange and communication. These may be
paid or free. For example: You can build your weather app using the open weather API to retrieve data from external
sources.
5. Arithmetic Operators
Arithmetic operators are operators like +, -, *, etc that help us perform basic mathematical tasks like addition,
subtraction, multiplication, division, etc. They can be used in game development and performing or solving
mathematical operations.
DATA TYPES
Each programming language uses a different combination of data types. Some of these types include:
1. Integer
Integer data types often represent whole numbers in programming. An integer's value moves from one integer to
another without acknowledging fractional numbers in between. The number of digits can vary based on the device, and
some programming languages may allow negative values.
2. Character
In coding, alphabet letters denote characters. Programmers might represent these data types as (CHAR) or
(VARGCHAR), and they can be single characters or a string of letters. Characters are usually fixed-length figures that
default to 1 octet—an 8-bit unit of digital information—but can increase to 65,000 octets.
3. Date
This data type stores a calendar date with other programming information. Dates are typically a combination of integers
or numerical figures. Since these are typically integer values, some programs can store basic mathematical operations
like days elapsed since certain events or days away from an upcoming event.
4. Floating point (real)
Floating-point data types represent fractional numbers in programming. There are two main floating-point data types,
which vary depending on the number of allowable values in the string:
• Float: A data type that typically allows up to seven points after a decimal.
• Double: A data type that allows up to 15 points after a decimal.
5. Long
Long data types are often 32- or 64-bit integers in code. Sometimes, these can represent integers with 20 digits in either
direction, positive or negative. Programmers use an ampersand to indicate the data type is a long variable.
6. Short
Similar to the long data type, a short is a variable integer. Programmers represent these as whole numbers, and they can
be positive or negative. Sometimes a short data type is a single integer.
BS 7 152 MASTER’S APPROACH COMPUTING
7. String
A string data type is a combination of characters that can be either constant or variable. This often incorporates a
sequence of character data types that result in specific commands depending on the programming language. Strings can
include both upper and lowercase letters, numbers and punctuation.
8. Boolean
Boolean data is what programmers use to show logic in code. It's typically one of two values—true or false—intended
to clarify conditional statements. These can be responses to "if/when" scenarios, where code indicates if a user
performs a certain action. When this happens, the Boolean data directs the program's response, which determines the
next code in the sequence.
Understanding Constants
A constant is a data item whose value cannot change during the program’s execution. Thus, as its name implies – the
value is constant.
A variable is a data item whose value can change during the program’s execution. Thus, as its name implies – the value
can vary.
Constants are used in two ways. They are:
1. literal constant
2. defined constant
A literal constant is a value you type into your program wherever it is needed. Examples include the constants used for
initializing a variable and constants used in lines of code:
21
12.34
'A'
"Hello world!"
false
null
In addition to literal constants, most textbooks refer to symbolic constants or named constants as a constant represented
by a name. Many programming languages use ALL CAPS to define named constants.
Language Example
#define PI 3.14159
C++ or
const double PI = 3.14159;
C# const double PI = 3.14159;
Java const double PI = 3.14159;
JavaScript const PI = 3.14159;
Python PI = 3.14159
Swift let pi = 3.14159
What is An Algorithm?
An algorithm is a set of step-by-step instructions for solving a problem or completing a task. It tells us exactly what to
do and how to get the final result. Computers use algorithms to help them make decisions, process data, or perform
actions automatically. They can be very simple, like sorting a list of numbers, or very complex, like recommending
videos on YouTube.
An algorithm needs to be clear, precise, and finish after a certain number of steps. It should not go on forever without
reaching an answer.
Selection: Algorithms can use selection to determine a different set of steps to execute based on a Boolean
expression.
Here's an improved algorithm for Pig Latin that handles words that starts with vowels, so that "eggs" becomes
"eggs-yay" instead of the unpronounceable "ggs-eay":
1. Append "-"
2. Store first letter
3. If first letter is vowel:
a. Append "yay"
4. Otherwise:
a. Append first letter
b. Append "ay"
c. Remove first letter
Iteration: Algorithms often use repetition to execute steps a certain number of times or until a certain
condition is met.
We can add iteration to the previous algorithm to translate a complete phrase, so that "peanut butter and jelly"
becomes "eanut-pay utter-bay and-yay elly-jay":
1. Store list of words
2. For each word in words:
a. Append hyphen
b. If first letter is vowel:
BS 7 157 MASTER’S APPROACH COMPUTING
i. Append "yay"
c. Otherwise:
i. Append first letter
ii. Append "ay"
iii. Remove first letter
How to Write an Algorithm?
Here’s a simple and step-by-step guide on how to write an algorithm:
1. Understand the Problem
Before writing anything, ensure you fully understand what must be solved. Clearly define the input, the
desired output, and any special conditions.
2. Plan the Approach
Think about how you can solve the problem. Break it down into small, manageable steps in your mind first.
You can also sketch a rough flow or diagram.
3. Identify Inputs and Outputs
Write down what inputs the algorithm will need and what outputs it should produce. Be very clear about this.
4. Break Down into Steps
List all the steps needed to go from the input to the output. Each step should be simple, logical, and clearly
defined.
5. Use Simple Language
Write the steps in plain and easy-to-understand language. Focus on clarity over technical jargon at this stage.
6. Include Decisions and Loops
If your algorithm needs to make choices (like “if-else” conditions) or repeat actions (like loops), clearly
mention where and how that will happen.
7. Make It Finite
Ensure that your algorithm has a clear ending. It shouldn't run forever unless it’s designed for continuous
tasks.
8. Review and Improve
Go through your steps carefully. Check if they are logical, if there are missing steps, or if any part can be
made more efficient.
9. Test with Examples
Pick a few sample inputs and run them through your algorithm manually to ensure it works correctly.
10. Finalize the Algorithm
Once you’re confident it works as expected, write the final version neatly — either in pseudocode or as a
flowchart if needed.
A robot is a programmable machine that can complete a task, while the term robotics describes the field of study
focused on developing robots and automation. Each robot has a different level of autonomy. These levels range from
human-controlled bots that carry out tasks to fully-autonomous bots that perform tasks without any external influences.
In terms of etymology, the word ‘robot’ is derived from the Czech word robota, which means “forced labor.” The word
first appeared in the 1920 play R.U.R., in reference to the play’s characters who were mass-produced workers incapable
of creative thinking.
a) Fear of Displacement: One of the major challenges of educational robots is that students may have the feeling that
their teachers have been displaced and replaced with robots.
b) Emotional Attachment: Humanoid robots that looks exactly like humans and are used as teachers or tutors can
create emotional attachment between children and robots. This usually creates a form of deception in the minds of the
children. Thus, a loss or an irreparable damage of the robot can affect the learning process of the child.
c) Training: Adequate training is required by the tutors who want to deploy educational robots as teaching aids. Hence,
learners who have not been adequately trained on the use of educational robots for learning may find it difficult to use
the technology for learning. The Educational Psychologist Vol. 14, No1 75
d) Technology Reliability: Robots are mechanical devices that can fail at any time. Hence, the reliability and integrity
of educational robots is a challenge.
e) Cost: The cost of maintaining robots in education is high. Hence, educational robots are not widely deployed.
f) The Appearance of the robot: An educational robot that has the same appearance with a human might create fear in
the minds of the learners. This concept is referred to as uncanny valley (Iroju et al., 2017b). This may in turn impede
learning.
5. Gamification
The use of game-design features and gaming principles in situations that are not game-related. It can also be described
as a collection of methods and procedures for resolving issues by utilizing or putting to use game mechanics. To better
understand gamification, let us take a look at the history of gamification. For thousands of years, games and game-like
components have been used to educate, entertain, and engage people. Points, badges, and leaderboards are a few
traditional game components
BS 7 162 MASTER’S APPROACH COMPUTING