Generic - End User Computing (15 Credits)
Generic - End User Computing (15 Credits)
Module Guide
Copyright © 2024
MANCOSA
All rights reserved, no part of this book may be reproduced in any form or by any means, including photocopying machines,
without the written permission of the publisher.Please report all errors and omissions to the following email address:
[email protected]
This module guide,
End User Computing (15 Credits)(NQF Level 5)
will be used across the following programmes:
Table of Contents
Preface 2
Unit 1: Concepts of Information and Communication Technology 9
Unit 2 : Using the Computer and Managing Files 48
Unit 3: MS Word 2016 65
Unit 4: MS Excel 2016 95
Unit 5: MS Access 2016 128
Unit 6: MS PowerPoint 141
Unit 7: Internet and Email 162
Unit 8: ICT in Everyday Life 175
Bibliography 211
1
End User Computing (15 Credits)
Preface
A. Welcome
Dear Student
Welcome to the End User Computing (15 Credits) (EUC515) module. You are encouraged to read
this overview and module guide carefully, as it will aid you through your study journey. This module
guide intends to develop your knowledge and proficiency.
The field of Computing is dynamic and innovative. The learning content and special features
contained in this module guide will provide you with opportunities to explore current industry
developments and theories.
As this is a distance-learning module, self-discipline and time management would need to be applied
effectively. You will have the opportunity to engage with interactive digital tools via
MANCOSAConnect to enhance your learning journey.
Through the inclusion of relevant content and industry aligned practices within the learning content,
you will develop critical thinking and problem-solving skills, empowering you as change agents for a
more sustainable world.
Please note that some special features may not have answers available, where answers are
not available this can be further discussed with your lecturer during the webinar session.
-------
MANCOSA does not own or purport to own, unless explicitly stated otherwise, any
intellectual property rights in or to multimedia used or provided in the End User
Computing (15 Credits) guide. Such multimedia is copyrighted by the respective creators
thereto and used by MANCOSA for educational purposes only.
Should you wish to use copyrighted material from this guide for purposes of your own that
extend beyond fair dealing/use, you must obtain permission from the copyright owner.
2
End User Computing (15 Credits)
B. Module Overview
3
End User Computing (15 Credits)
4
End User Computing (15 Credits)
5
End User Computing (15 Credits)
This Module Guide should be studied in conjunction with the prescribed, recommended textbook(s)/
reading(s) and other relevant study material. It is important that you make your own notes as you
work through the prescribed, recommended textbook(s)/ reading(s), other relevant study material,
and the module guide. You may obtain additional reading material by utilising publications
referenced at the end module guide under the reference list and bibliography.
6
End User Computing (15 Credits)
E. Study Material
The study material for this module includes, programme handbook, this Module Guide, and a list of
prescribed and recommended textbooks/readings which may be supplemented by additional
readings.
F. Prescribed Textbook
The prescribed and recommended reading(s)/textbook(s) presents a tremendous amount of material
in a simple, easy-to-learn format. You should read ahead during your course. Make a point of it to re-
read the learning content in your module textbook. This will increase your retention of important
concepts and skills. You may wish to read more widely than just the Module Guide and the
prescribed and recommended textbooks/readings, the Bibliography and Reference list provides you
with additional reading.
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide. Windows 11 Edition, Tenth
Edition. United States of America: Pearsons
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information Systems, Managing the Digital
Firm. Seventeenth Edition. New Jersey: Pearsons
Freund, S.M., Hoisington, C., Schmieder, E. and Last, M.Z. (2019). Microsoft Office 365 and
Office 2016: Introductory. Boston, Massachusetts: Cengage
G. Special Features
In the Module Guide, you will find the following icons together with a description. These are designed to
help you study. It is imperative that you work through them as they also provide guidelines for
examination purposes.
~~~~~~~~~~~~~~
7
End User Computing (15 Credits)
VIDEO A Video Activity with links are included in your Module Guide
ACTIVITY along with instructions to attempt after watching the video.
8
End User Computing (15 Credits)
Unit
1: Concepts of Information and
Communication Technology
9
End User Computing (15 Credits)
10
End User Computing (15 Credits)
Describe 3D printing
1.16. 3D Printing
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
11
End User Computing (15 Credits)
Information is data processed for some purpose. Information can only be considered:
To be 'real Info’ if it meets certain criteria i.e. it must be communicated to the recipient
To be in a language that is understood
To be in a suitable form
To be relevant for achieving some purpose
1.2 Computer
A computer is an electronic device, operating under the control of instructions stored in its own
memory that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use.
Activity 1.1
12
End User Computing (15 Credits)
1. Personal computers: - This is the most common type found in homes, schools, business offices
etc., It is the most common type of desk top computers with processing and storage units along with
various input and output devices.
ii. Work stations: - These have high resolution input/output (I/O) graphics capability, but with same
dimensions as that of desktop computer. These are used in engineering applications of interactive
design work.
2. Minicomputers: - A minicomputer is a type of computer that possesses most of the features and
capabilities of a large computer but is smaller in physical size. Example mobile devices, PDAs.
A minicomputer fills the space between the mainframe and microcomputer, and is smaller than the
former but larger than the latter. Minicomputers are mainly used as small or mid-range servers
operating business and scientific applications. However, the use of the term minicomputer has
diminished and has merged with servers. A minicomputer may also be called a mid-range computer.
3. Super computers: - These are used for large scale numerical calculations required in the
applications like weather forecasting etc.
13
End User Computing (15 Credits)
Input device accepts the coded information as source program i.e. high level language. This is either
stored in the memory or immediately used by the processor to perform the desired operations. The
program stored in the memory determines the processing steps. Basically the computer converts
one source program to an object program. i.e. into machine language.
Finally, the results are sent to the outside world through output device. All of these actions are
coordinated by the control unit.
Input Unit: - The source program/high level language program/coded information or data is fed to a
computer through input devices of which the keyboard is a most common type. Whenever a key is
pressed, one corresponding word or number is translated into its equivalent binary code over a cable
and fed either to memory or processor. Joysticks, trackballs, mouse, scanners etc. are other input
devices.
Memory Unit: - Its function is to store programs and data. It is basically divided into two types:
Primary Memory
Secondary Memory
1. Primary Memory: - Is the one exclusively associated with the processor and programs must be
stored in this memory while they are being executed. The memory contains many semiconductor
storage cells. Each is capable of storing one bit of information. These are processed in a group of
fixed size called word.
To provide easy access to a word in memory, a distinct address is associated with each word
location. Addresses are numbers that identify memory location. Number of bits in each word is
called word length of the computer. Programs must reside in the memory during execution.
14
End User Computing (15 Credits)
Instructions and data can be written into the memory or read out under the control of processor.
Memory in which any location can be reached in a short and fixed amount of time after specifying its
address is called random-access memory (RAM). The time required to access one word is called
memory access time. Memory which is only readable by the user and contents of which can’t be
altered is called read only memory (ROM) and it is part of the operating system.
Caches are the small fast RAM units, which are coupled with the processor and are often contained
on the same integrated circuit (IC) chip to achieve high performance. Although primary storage is
essential, it tends to be expensive.
2. Secondary Memory: - Is used where large amounts of data and programs have to be stored,
particularly information that is accessed infrequently. Examples of secondary memory include,
magnetic disks and tapes, optical disks (i.e. CD-ROM’s), floppies etc.
A Central Processing Unit (CPU) is the electronic circuitry within a computer that carries out the
instructions of a computer program by performing the basic arithmetic, logic, controlling and
input/output (I/O) operations specified by the instructions.
Arithmetic Logic Unit (ALU): - Most of the computer operations are executed in the ALU of the
processor like addition, subtraction, division, multiplication, etc. the operands are brought into the
ALU from memory and stored in high speed storage elements called registers. Then according to the
instructions the operation is performed in the required sequence.
The control unit and the ALU are many times faster than other devices connected to a computer
system. This enables a single processor to control a number of external devices such as keyboards,
displays, magnetic and optical disks, sensors and other mechanical controllers.””
Output Unit: - These actually are the counterparts of the input unit. Its basic function is to send the
processed results to the outside world. Examples: - Printer, speakers, monitor etc.
Control Unit: - It effectively is the nerve centre that sends signals to other units and senses their
states. The actual timing signals that govern the transfer of data between input unit, processor,
memory and output unit are generated by the control unit.
15
End User Computing (15 Credits)
Activity 1.2
Describe the functions of the two main units found in the central processing
unit.
Hardware
All the electronic and mechanical equipment in a computer is called the hardware.
Examples include:
”
Source: Urbach (2018)
Hardware
Hard Disk
RAM
Power Supply
Processor
Case
Monitor
Keyboard
16
End User Computing (15 Credits)
Mouse
Software
The term software is used to describe computer programs that perform a task or tasks on a computer
system. Software can be grouped as follows:
System Software
These are the programs that control the operation of the computer system. Operating systems (OS)
and utility programs are the most common. The Operating System starts the computer, provides a
user interface, manages the computer memory, manages storage, manages security and provides
networking and internet facilities to mention a few of its capabilities. There are many OS’s on the
market including Microsoft Windows XP, Microsoft Windows Vista, Apple OS X, Unix and
Linux. Windows is by far the most commonly used OS in the world, but Linux in particular, is making
inroads into this dominance.”
Utility programs perform maintenance tasks on the computer system. This includes file management
programs, uninstall programs, disk scanners and defragmenters, backup utilities, antivirus etc. These
can be included in the OS or purchased separately”.
Device drivers are programs that control particular hardware devices. They are supplied with new
hardware and must be run, so the hardware can communicate with the OS. They are supplied with
printers, graphics cards, scanners etc.
Application Software
This software is used to do non-system based tasks. Categories include business software,
engineering software, medical software, games etc.
1.7 PC Components
A computer system is a collection of electronic and mechanical devices operating as a unit. These
devices can be sorted according to the role they play in the computer system. The main device
categories are:
18
End User Computing (15 Credits)
19
End User Computing (15 Credits)
Motherboard
CPU (Processor)
Memory
Disk Drives
Expansion Cards - sound card, graphics card, network card etc.
Ports - USB etc.
Power Supply
Peripherals are devices that connect to the system unit using cables or wireless technologies.
Typical peripherals include:
Monitor
Keyboard
Mouse
Speakers
Printer
Plotter
Scanner
20
End User Computing (15 Credits)
Arithmetic Instructions - It carries out all the addition, subtraction, multiplication and division
requested by computer programs
Logical Instructions - It can make decisions by comparing data and acting in a particular way
depending on the result
Move Operations - It can move data from place to place within the computer system. This could
be from memory to the processor for addition or from memory to a printer or disk drive etc.
The speed of a processor is measured in megahertz (MHz) or Gigahertz (GHz). This is the speed of
the system clock (clock speed) within the processor, and it controls how fast instructions can be
executed:
This means that if one instruction was executed every clock tick, a 3GHz processor could execute
three billion instructions every second.
The two main computer processor manufacturers are Intel and Advanced Micro Devices (AMD).
These two companies produce almost all the processors used in desktop and notebook computers.
21
End User Computing (15 Credits)
The performance of these chips relative to each other is forever changing, and it would be difficult to
claim one is better than the other in the long term.”
The latest trend in processor manufacture is to essentially put more than one processor on a silicon
chip. These multicore processors can have two, three or four processor cores on a single chip. This
obviously vastly increases the performance of the computer system as long as the programs run on
the systems can take advantage of the multi-cores.
RAM is made in the form of integrated circuits (IC’s) in the same manner as a processor. These IC’s
are placed on a circuit board to produce a memory module. The most common RAM technology is
dynamic random access memory (DRAM).”
In this technology, a transistor and a capacitor are paired to store one Bit (binary digit) of data. In
essence, if the capacitor is charged, a binary 1 is stored and if it is discharged, a binary 0 is
stored. The transistor acts as a switch to allow the capacitor’s state to be changed as required.”
Ports
Computer ports are interfaces between peripheral devices and the computer system. They are
22
End User Computing (15 Credits)
hardware devices built into the motherboard or on expansion cards. They are often built into the front
of the computer chassis for easy access but will be cabled back to the motherboard.”
Serial Port
Although more or less obsolete, they are still included in new systems. The serial port is a 9-pin port.
Windows call them Com ports - Com1, Com2 etc. Mice and external modems were connected to
these ports. They are turquoise in colour.”
23
End User Computing (15 Credits)
24
End User Computing (15 Credits)
USB 1: This is the original standard and can transfer data at 1.5MBps. This is too slow for
external hard disks with capacities of 500GB or more
USB 2: This is forty times faster than USB1 and has a data transfer rate of 60MBps. This is the
current standard
USB 3: this is ten times faster than USB2 and 400 times faster than the original USB1. It has a
data transfer rate of 600MBps and will be common on new computer systems in 2009
Section 2: Hardware
Computer hardware is the collection of physical parts of a computer system. This includes the
computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer
case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is
what you can physically touch.”
Motherboard - The motherboard is the main circuit board of a microcomputer. It is also known as
the motherboard or system board
CPU - The CPU is the central electronic chip that determines the processing power of the
computer
Memory - Memory is a part of the computer that temporarily stores applications, documents, and
some operating information
Bus - A bus is an electronic line that allows 1s and 0s to move from one place to another
Expansion Slots - Expansion slots appear on the motherboard. They are sockets into which
adapters are connected
Ports and Connectors - A port is a connector located on the motherboard or on a separate
25
End User Computing (15 Credits)
adapter
Bays - A bay is a space inside the computer case where a hard drive, floppy drive or CD-ROM
drive sits
Power Supply - A power supply changes normal household electricity into electricity that a
computer can use
Sound Components - A sound card lets a computer play and record high quality sound
Control Unit
The control unit (often called a control system or central controller) directs the various components of
a computer. It reads and interprets (decodes) instructions in the program one by one. The control
system decodes each instruction and turns it into a series of control signals that operate the other
parts of the computer.
Logic operations involve Boolean logic: AND, OR, XOR and NOT. These can be useful both for
creating complicated conditional statements and processing Boolean logic.
Memory
A computer's memory can be viewed as a list of cells into which numbers can be placed or read.
Each cell has a numbered "address" and can store a single number. The computer can be instructed
to "put the number 123 into the cell numbered 1357" or to "add the number that is in cell 1357 to the
number that is in cell 2468 and put the answer into cell 1595". The information stored in memory may
represent practically anything. Letters, numbers, even computer instructions can be placed into
memory with equal ease. Since the CPU does not differentiate between different types of
information, it is up to the software to give significance to what the memory sees as a series of
numbers.
26
End User Computing (15 Credits)
Computer main memory comes in two principal varieties: random access memory or RAM and read-
only memory or ROM. RAM can be read and written anytime the CPU commands it. But ROM is
preloaded with data and software that never changes, so the CPU can only read from it. ROM is
typically used to store the computer's initial start-up instructions.”
Input
The input hardware allows the entry of data into the computer. The primary devices used are the
keyboard and mouse.
Keyboard
The keyboard looks like the typewriter. A numeric keypad is located to the right of the keyboard.
Numeric keys have the same placement as a 10-key calculator, which allow the operator to enter
data rapidly.
27
End User Computing (15 Credits)
Mouse - The mouse is a device that helps control the movement of the insertion point on the screen.
28
End User Computing (15 Credits)
Output
Output devices such as a monitor or printer make information given as input available for use or to
view.”
Floppy Disks
Zip Disks
Compact Discs (CD) + RW
CD + R
Digital Video Disc (DVD) + RW
DVD + R
29
End User Computing (15 Credits)
CD + RW Disc (Compact Disc Rewriteable) - This disc looks like a regular CD. The only difference is
that we can write data on this disc and erase it as many times as we want. It works just like a floppy
disk or a zip disk. A CD + RW disc holds about 650 MB.”CD + R Disc (Compact Disc Recordable) -
This one is a CD that can be used to record data. It’s mostly used to record audio. Once it's been
written on, it is not possible to rewrite or erase anything off it. This compact disc comes in different
sizes, but they are usually silver in colour. (Some CDs are black in colour and they actually don't get
as many scratches on them as the silver ones do. They are also a lot less fragile).”
30
End User Computing (15 Credits)
A DVD – R Disc (Digital Video Disc - Recordable) – These discs hold the space of about 4.7 GB and
are used to record movies.
A DVD + RW Disc (Digital Video Disc Rewriteable) - The primary advantage of DVD-RW over DVD-R
is the ability to erase and rewrite to a DVD-RW disc. According to Pioneer, DVD-RW discs may be
written to about 1,000 times before needing replacement. DVD-RW discs are commonly used for
volatile data, such as backups or collections of files. They are also increasingly used for home DVD
video recorders. One benefit of using a rewritable disc is, if there are writing errors when recording
data, the disc is not ruined and can still store data by erasing the faulty data.”
31
End User Computing (15 Credits)
Flash Drive - This a storage device that comes in many colours and has a stick shape to it. They are
very small, but they can hold anywhere between 256 MB and 8 GB of material on them.”
32
End User Computing (15 Credits)
This is a disk drive in which a plastic or metal case surrounds the hard drive. It can be inserted and
removed just like a floppy disk.
PC Card - This is a thin credit card size device that fits into a PC card slot, usually on a notebook
computer. This card simply adds storage to most notebooks.”
33
End User Computing (15 Credits)
Smart Cards - These are the size of an ATM card. When inserted into a smart card reader, they can
read and update data.
Section 3: Software“
Software is a set of programs, which is designed to perform a well-defined function. A program is a
sequence of instructions written to solve a particular problem.
System Software
Application Software
Some examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
34
End User Computing (15 Credits)
Application software may consist of a single program, such as Microsoft's notepad for writing and
editing a simple text. It may also consist of a collection of programs, often called a software package,
which work together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following:
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
35
End User Computing (15 Credits)
Source:Sengers (2018)
Features of application software are as follows
Close to the user
Easy to design
More interactive
Slow in speed
Generally written in high-level language
Easy to understand
Easy to manipulate and use
Bigger in size and requires large storage space
36
End User Computing (15 Credits)
LAN’s enable the sharing of resources such as files or hardware devices that may be needed by
multiple users
Is limited in size, typically spanning a few hundred meters, and no more than a mile
Is fast, with speeds from 10 Mbps to 10 Gbps
Requires little wiring, typically a single cable connecting to each device
Has lower cost compared to MAN’s or WAN’s
LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired
LAN’s.
Every LAN uses a protocol –a set of rules that governs how packets are configured and
transmitted.
Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus –
Ring – Star
LANs are capable of very high transmission rates (100s Mb/s to G b/s).
Advantages of LAN
Speed
Cost
Security
E-mail
Resource Sharing
Disadvantages of LAN
Expensive to Install
Requires administrative time
File Server may fail
Cables may break
37
End User Computing (15 Credits)
A metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus
A MAN is optimised for a larger geographical area than a LAN, ranging from several blocks of
buildings to entire cities
MAN might be owned and operated by a single organisation, but it will usually be used by many
individuals and organisations
A MAN often acts as a high speed network to allow sharing of regional resources
A MAN typically covers an area of between 5 and 50 km diameter
Examples of MAN: Telephone company network that provides a high speed Digital Subscriber
Line (DSL) to customers and cable TV network
38
End User Computing (15 Credits)
A WAN is two or more LANs connected together. The LANs can be many miles apart
WAN covers a large geographic area such as country, continent or even whole of the world
To cover great distances, WANs may transmit data over leased high-speed phone lines or
wireless links such as satellites
Multiple LANs can be connected together using devices such as bridges, routers, or gateways,
which enable them to share data
The world's most popular WAN is the Internet
39
End User Computing (15 Credits)
1.16 3D Printing
In 3D printing, it all starts with the creation of a 3D model in your computer. This digital design is for
instance a CAD (Computer Aided Design) file. A 3D model is either created from the ground up with
3D modelling software or based on data generated with a 3D scanner.
3D Scanners
Currently, prices of 3D scanners range from expensive industrial grade 3D scanners to DIY scanners
anyone can make at home. With a 3D scanner you’re able to create a digital copy of an object.
3D Modelling Software
3D modelling software come in many forms. There’s industrial grade software that costs thousands a
year per license, but also free open source software, like Blender, for instance.
3D modelling software are often made to suit the functions of the user’s industry. This has resulted in
the rise of software suited to specific niches. As a result, there are software applications on the
market that cater to aerospace or transportation, furniture design or fabrics and fashion amongst
many others.
40
End User Computing (15 Credits)
For this reason, when you are starting out, the amount of choices can be a bit overwhelming, we
recommend starting with Tinkercad. Tinkercad is available for free, and it works in browsers that
support WebGL, for instance Google Chrome. They offer beginner lessons and has a built-in option
to get your object printed via various 3D print services.
Now that you have a 3D model, the next step is to prepare it in order to make it 3D printable.
You will have to slice a 3D model in order to make it 3D printable. Slicing is dividing a 3D model into
hundreds or thousands of horizontal layers and is done with slicing software.
Sometimes it’s possible to slice a 3D file within a 3D modelling software or in the 3D printer itself. It is
also possible that you are forced to use a certain slicing tool for a certain 3D printer.
When your 3D model is sliced, you are ready to feed it to your 3D printer. This can be done via USB,
SD or Wi-Fi. It really depends on what 3D printer brand you work with. When a file is uploaded in a
3D printer, the object is ready to be 3D printed layer by layer.
Getting started with 3D printing means asking yourself what you would like to learn first. Are you
interested in the hardware, or do you want to focus on the end result – creating objects? Answering
this question could lead you to the decision if whether you should buy a pre-assembled 3D Printer or
a DIY 3D Printer kit.
When a manufacturer uses high quality parts (motors, frame, electronics), this will affect the price of
the end product. When the parts are of high quality it doesn’t automatically mean the prints will turn
out great – there are too many other factors that play a role as well.
When a manufacturer decides to go cheap on parts it can market the product for a good price. On
the other hand, it doesn’t automatically mean that a cheap 3D printer will give you bad print results.
But you’ll probably have to put in more time and effort to get to the same level.
41
End User Computing (15 Credits)
Secondly there’s Research and Development. It can take years of groundwork and engineering
before the final product is a stable, high quality 3D printer. Manpower can become costly overtime
which of course needs to be earned back.
The next element that influences the price of a 3D printer is: assembly. In general, it’s cheaper and
more efficient to ship just the parts compared to a fully assembled 3D printer. This can be in the form
of a DIY kit or a semi-assembled 3D printer. This doesn’t necessarily mean that all DIY kits or semi-
assembled 3d printers are cheap. Cause some DIY kits contain such high quality parts that even
though you have to assemble it yourself it’s still pretty expensive. Additionally, some brands that
market do-it-yourself kits put a lot of time and effort in making educational tutorials and focus on
customer service – which also doesn’t come cheap.
And this brings us to the last point that determines the 3D printer price: customer service and
warranty.
There’s a good chance you’ll run into problems when you buy a 3D printer. In case you’ve chosen a
3D printer from an established brand you’ll pay more, but you will have the reassurance that there’s
always support to back you up. Also, when for instance something breaks during shipping, you’ll be
glad you chose a product with warranty.
42
End User Computing (15 Credits)
43
End User Computing (15 Credits)
Revision Questions
44
End User Computing (15 Credits)
Answers
Activity 1.1
Activity 1.2
Describe the functions of the two main units found in the central processing unit.
Answer: The control unit (CU) directs and coordinates all the activities within the CPU. It determines
the sequence in which instructions are executed. It sends the data and instructions to the arithmetic
and logic unit (ALU) for processing. The arithmetic and logic unit (ALU) performs all the arithmetic
and logic functions in a computer. Arithmetic functions involve the use of mathematical operators
such as + – / and ×. Logic functions involve comparisons between two values to determine if they
are: equal to, greater than, less than, greater than or equal to, less than or equal to, not equal to.
45
End User Computing (15 Credits)
46
End User Computing (15 Credits)
47
End User Computing (15 Credits)
Unit
2: Using the Computer and Managing
Files
48
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
49
End User Computing (15 Credits)
Shortcuts are files that point to other programs, program files or folders found somewhere on the
computer. A double click on the shortcut icon will start either the appropriate program, or the
appropriate file and corresponding program, or appropriate folder.
Activity 2.1
50
End User Computing (15 Credits)
Position the cursor over the Start button, press the right mouse button and select the command
Open Windows Explorer, or
From the Start menu select All programs, in the folder Accessories, search and click Windows
Explorer, or
In the search box (within the Start menu) type "Windows Explorer" and click on it when it appears
in the results, or
Click on in the Taskbar, or
Click on the Windows Explorer shortcut on the desktop
The Document's library – this library is used for organising and saving documents (text files,
workbooks, presentations etc.)
The Picture's library – it is used for organising and saving pictures
The Music library – it is used for organising and saving music
The Video's library – it is used for organising and saving video materials
Each file and folder has its path – an address of its location
51
End User Computing (15 Credits)
Activity 2.2
When the hard disk is not divided into partitions and the DVD-ROM is connected When the hard disk
is not divided into partitions and the DVD-ROM and CD-RW are connected When the hard disk is
divided into two partitions and the DVDROM and CD-RW are connected.
Hard Disk Drive (first partition): D DVD-ROM D DVD-ROM D
Hard Disk Drive (second partition): E CD-RW E DVD-ROM F CD-RW
2.2 Desktop
A desktop can be contained in a window that is part of the total display area or can be a full screen,
taking up the total display area. Users can have multiple desktops for different projects or work
environments they have and can switch between them.
52
End User Computing (15 Credits)
53
End User Computing (15 Credits)
Although Windows 8 included a desktop layout, it forced users to toggle back and forth between the
desktop interface and the Metro interface depending on which application they were using. The
hallmark of the Metro interface was live tiles, which were tiles that could display application data,
such as weather information or stock market reports, as opposed to acting as static desktop icons.
In Windows 10, Microsoft brought back the Start menu, and it merged Metro and the legacy Windows
desktop into a single, blended desktop interface.
From a functional standpoint, there is no difference between a consumer desktop and an enterprise
desktop. Even so, enterprise desktops tend to be more tightly controlled. Enterprise desktops are
commonly branded with a wallpaper containing the organisation's' logo, and they typically include a
set of icons that the IT department has approved.
Access, Privacy, and Update & security. At the top of the main window, you can search the Settings
menu for a specific setting; anything you type here will prompt a drop-down menu of suggestions.
Let's take a look at the System tab, which is where you will find most of your computer's general
settings and setup utilities.
Generally, the first thing to look for in a System tab is the actual system info, which you can find by
clicking About. Here you will see your computer's basic specs, including processor, memory, and
operating system info, as well as what edition of Windows you're currently running.
From this screen, you can quickly rename your computer by clicking Rename PC and following the
prompts to rename your computer for network identification purposes. (For a more detailed guide on
how to rename your computer, check out How to change your computer's name in Windows 10.)
Under Related settings, you will see a list of settings you may have been looking for when you
initially clicked on About: Additional administrative tools, Bitlocker settings, Device manager, and
System info. These links take you to Control Panel windows -- Microsoft hasn't completely scrapped
the Control Panel.
55
End User Computing (15 Credits)
To check how much hard-drive space your computer has, click Storage. This screen shows the
different drives (including partitions, external hard drives, and attached media) currently connected to
your PC, and also lets you choose default save locations for different file types (apps, documents,
music, pictures and videos). To choose a default save location for a file type, pick the location from
the drop-down menu and click Apply.
In Related settings, you'll see a link to Change where you store offline maps. This takes you to the
Offline maps section (which is also located directly under the Storage link).
56
End User Computing (15 Credits)
Storage only shows you how many space apps and other files are taking up on your computer -- if
you need to free up space, click Apps & features to see a list of installed apps sorted by name (you
can also sort them by size and date). Click on a non-native app, and you will see two options: Modify
and Uninstall. Modify lets you modify how the app is installed on your computer (including moving it
to a different partition or drive), while uninstall lets you uninstall it.
The Related settings feature a link to the Control Panel window Programs and Features, where you
can uninstall and change any programs that don't appear in the Apps & features section.
57
End User Computing (15 Credits)
1. Which of the following is the safest and most efficient way to react to
a nonresponding program?
A. Turn off the computer by flipping the CPU's on/off switch
58
End User Computing (15 Credits)
B. Floppy diskette
C. Internal hard drive
D. Zip disk
B. Opening it
C. Resizing it
D. Deleting it
E. Closing it
B. Status bar
C. Toolbar
D. Shortcut icon
E. File
59
End User Computing (15 Credits)
B. Launch the Windows Explorer, choose New from the File menu, and
then select the location for the new subfolder.
C. Launch the Windows Explorer, locate the file to which you want to
add the new subfolder, and choose New from the File menu.
D. Launch the Windows Explorer, locate the drive and folder to which
you're adding the new subfolder, and then choose New from the File
menu.
8. Where will you find the Windows Help and Support feature?
A. In the Control Panel window
B. On any menu
C. On the desktop
D. On the Start menu
60
End User Computing (15 Credits)
Revision Questions
61
End User Computing (15 Credits)
Answers
Activity 2.1
Demonstrate how to open Windows Explorer
Answer: To be discussed during the webinar(s) with lecturer
Activity 2.2
Demonstrate how to create a new folder in the Music Library
Answer: To be discussed during the webinar(s) with lecturer
62
End User Computing (15 Credits)
2. Which of the following removable storage media must you prepare by formatting before you
can use them?
Answer: B. Floppy diskette, D. Zip disk
6. Why might you want to create a copy, known as a backup, of your work?
Answer: A. In case the computer's hard drive is corrupted or the system is
incapacitated by theft, damage, or virus and B. In case the original file is accidentally deleted
7. Which sequence of events would you use to add a folder to your hard drive?
Answer: D. Launch the Windows Explorer, locate the drive and folder to which you're adding the
new subfolder, and then choose New from the File menu.
8. Where will you find the Windows Help and Support feature?
Answer: C. On the desktop
9. Which sequence of events would successfully add a shortcut icon to the desktop?
Answer: A. In the Windows Explorer, choose File, Create New Shortcut., B. Right-click the Explorer
window and choose Create New Shortcut. and D. In the Windows Explorer, select the file you want to
create a shortcut
to and then click the Shortcut icon on the toolbar
63
End User Computing (15 Credits)
64
End User Computing (15 Credits)
Unit
3:
MS Word 2016
U n i t 3 : M S W o r d 2 0 1 6
65
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
66
End User Computing (15 Credits)
To use the Ribbon, first click a tab. Then locate the command you need by scanning the group
names, and then hunting down the button. Click the button to activate the command or to display a
menu from which you can choose a command.
Some items on the Ribbon let you input text or values, or make other settings.
Galleries on the Ribbon display a smattering of tiles. To see them all, click the Show Gallery button in
the lower-right corner of the gallery, as illustrated.
Use the dialog box launcher icon in the lower-right corner of a group to open a dialog box relevant to
the group’s function. Not every group features a dialog box launcher.
The amazingly frustrating thing about the Ribbon is that it can change. Some tabs may appear and
disappear, depending on what you’re doing in Word.
Clicking the File tab replaces the contents of the Word window with a screen full of commands and
other information. To return to the Word window, click the Back button or press the Esc key.
67
End User Computing (15 Credits)
Each time you start Word, you can choose a template from the gallery, click a category to see more
templates, or search for more templates online.
For a closer look at any template, click it to open a large preview.
If you’d rather not use a template, click Blank document.
68
End User Computing (15 Credits)
If you’re already in Word, click File > Open and then browse to the file’s location.
When you open a document that was created in earlier versions of Word, you see Compatibility
Mode in the title bar of the document window. You can work in compatibility more, or you can
upgrade the document to use Word 2016.
Activity 3.1
Note: To save the document on your computer, choose a folder under This PC or click Browse.
3. To save your document online, choose an online location under Save As or click Add a Place.
When your files are online, you can share, give feedback and work together on them in real time.
4. Click Save
Note: Word automatically saves files in the .docx file format. To save your document in a format other
than .docx, click the Save as type list, and then select the file format that you want.
To save your document as you continue to work on it, click Save in the Quick Access Toolbar.
69
End User Computing (15 Credits)
3.2.3 Objects
A table is made up of rows and columns. The intersection of a row and column is called a cell. Tables
are often used to organise and present information, but they have a variety of uses as well. You can
use tables to align numbers and create interesting page layouts.
Creating a Table
1) Click the Insert tab on the Ribbon
2) Click on Table
3) Highlight the number of columns and rows you would like
OR
4) Click Insert Table
70
End User Computing (15 Credits)
Table Formatting
After you create a table, you can format the entire table by using Table Styles. By resting your pointer
over each of the preformatted table styles, you can preview what the table will look like.
.
Click the style to apply it to the table
In the Table Style Options group, select or clear the checkbox next to each the table element to
apply or remove the selected style
71
End User Computing (15 Credits)
Select the cells that you want, including their end-of-cell marks.
Mail Merge
A mail merge in Word will combine a pre-prepared letter with a mailing list, so that bulk mail is
personalised before it is sent out. For example, you might be part of an organisation that has a list of
members, and you want to let them know about an upcoming Annual General Meeting. Your mailing
list would be the list of members’ names and addresses, and the pre-prepared letter would be a letter
informing them of the AGM. Each letter produced will be identical, apart from the personalised
portions.
The three files involved in the mail merge process are:
72
End User Computing (15 Credits)
In our example, we have an Excel Spreadsheet, so navigate to where that is and select it. Select the
sheet that contains your data and click OK. If the first row in your spreadsheet is a header row, make
sure that you check the box to say so.
73
End User Computing (15 Credits)
Now that you have established the link between your document and mailing list, save the document.
We’re going to assume that you want to send your letter to everyone on your list, but if you want to,
you can select only certain entries from the list.
Insert Merge Fields
We now need to tell Word what personal details to add to the letter and where. To do this, we will
insert merge fields in the main document. We’re going to keep things very simple, and we’re just
going to insert the most basic information. In our example we will insert member names and
addresses.
Firstly, position the cursor where you want the address to appear on your letter. Then, on the
Mailings tab, in the Write & Insert Fields group, choose Address Block.
In the window that opens, you get the chance to review and amend the format of the address that will
be inserted when the merge is actually run.
Make any changes you need and click OK. You will ten see the <<AddressBlock>> placeholder
appear where you inserted it.
Let us add a greeting line: position the cursor where you want the greeting and in the Write & Insert
Fields group, click Greeting Line. Again, you get the chance to review and amend the greeting, so
make your changes and click OK. You will see the <<GreetingLine>> placeholder where you inserted
it.
74
End User Computing (15 Credits)
The address and greeting are standard items, that most people will want to use in their mail merges,
so they get their own special buttons in the ribbon. What if you want to insert data that is not in the
Write & Insert Fields group? You will need the Insert Merge Fields button for that.
In our example we have an email address column in the spreadsheet. We’ll add that now: click Insert
Merge Fields > email.
Word gets all the column headings in the spreadsheet and lists them for you to select from. An
<<email>> placeholder is inserted.
All the <<>> placeholders inserted will get populated with real data from your spreadsheet when the
merge is run.
Run the Mail Merge
The preparation is complete! All that is left to do is preview what the merged letter will look like, and
then run it. Click Preview Results, and then choose the Next record button or Previous record button
to make sure the names and addresses in the body of your letter look right.
75
End User Computing (15 Credits)
Make any changes you feel are necessary, and then, once happy, click Finish & Merge > Print
Documents to run the merge and print.
76
End User Computing (15 Credits)
Activity 3.2
77
End User Computing (15 Credits)
3. A drop-down menu will appear. Click either Portrait or Landscape to change the page orientation.
2. A drop-down menu will appear. The current page size is highlighted. Click the desired predefined
page size.
78
End User Computing (15 Credits)
79
End User Computing (15 Credits)
Activity 3.3
80
End User Computing (15 Credits)
2. A drop-down menu will appear. Click the predefined margin size you want.
81
End User Computing (15 Credits)
Activity 3.4
Word also allows you to customise the size of your margins in the Page Setup dialog box.
1. From the Layout tab, click Margins. Select Custom Margins from the drop-down menu.
82
End User Computing (15 Credits)
3.3 Formatting
Open your document in Read Mode to hide most of the buttons and tools so you can get absorbed in
your reading without distractions.
83
End User Computing (15 Credits)
Activity 3.5
Click the arrows on the left and right sides of the pages
Press page down and page up or the spacebar and backspace on the keyboard. You can also
use the arrow keys or the scroll wheel on your mouse
If you’re on a touch device, swipe left or right with your finger
Tip: Click View > Edit Document to edit the document again.
3.3.1 Track Changes
When you’re working on a document with other people or editing a document yourself, turn on Track
Changes to see every change. Word marks all additions, deletions, moves, and formatting changes.
Activity 3.6
84
End User Computing (15 Credits)
Activity 3.7
2. Do the following
Under Print, in the Copies box, enter the number of copies you want
Under Printer, make sure the printer you want is selected
Under Settings, the default print settings for your printer are selected for you. If you want to
change a setting, just click the setting you want to change and then select a new setting
85
End User Computing (15 Credits)
1) Open the Word Processing Application and type the text between the
words START and END below, exactly as it appears and perform the tasks set
below. Save the document as WordAssign.
2) Select all text in the word document and change the font type to Courier
New, and font size 12.
3) Change the page orientation to “Landscape”
4) Select all text in the word document and change the line spacing to 1.5’
5) Insert a Header entitled “E-Learning Explored” and a footer showing the
page number.
6) Replace the word “END” at the end with your Student number followed by
your First Name and
7) Surname.
8) Insert appropriate picture
How can you insert an online picture in your word document in word 2013?
86
End User Computing (15 Credits)
B. File
C. Design
D. Format
4. The keyboard key used to move the insertion point to the beginning
of the current line is ...
A. Start
B. Home
5. The Keyboard Key to move the insertion point down one screen is ...
A. End
B. Page Down
87
End User Computing (15 Credits)
8. When you are editing an existing document, and you want to save
the changes, click on ...
A. Save
B. Save As
9. A template is a ...
A. Pre-designed Document
B. Saved Document
10. To quickly move right from word to word in a document use, click on
...
A. CTRL + Right Arrow
B. CTRL + R
Revision Questions
88
End User Computing (15 Credits)
Answers
Activity 3.1
Activity 3.2
3. A drop-down menu will appear. Click either Portrait or Landscape to change the page orientation.
Activity 3.3
2. A drop-down menu will appear. Click the predefined margin size you want.
89
End User Computing (15 Credits)
Activity 3.4
1. From the Layout tab, click Margins. Select Custom Margins from the drop-down menu.
Activity 3.5
Click the arrows on the left and right sides of the pages
Press page down and page up or the spacebar and backspace on the keyboard. You can also
use the arrow keys or the scroll wheel on your mouse
If you’re on a touch device, swipe left or right with your finger
Tip: Click View > Edit Document to edit the document again.
90
End User Computing (15 Credits)
Activity 3.6
2. Click Review and then on the Track Changes button, select Track Changes.
Activity 3.7
2. Do the following
Under Print, in the Copies box, enter the number of copies you want
Under Printer, make sure the printer you want is selected
Under Settings, the default print settings for your printer are selected for you. If you want to
change a setting, just click the setting you want to change and then select a new setting
91
End User Computing (15 Credits)
4. The keyboard key used to move the insertion point to the beginning of the current line is ...
Answer: B. Home
5. The Keyboard Key to move the insertion point down one screen is ...
Answer: B. Page Down
8. When you are editing an existing document, and you want to save the changes, click on ...
Answer: A. Save
9. A template is a ...
Answer: A. Pre-designed Document
10. To quickly move right from word to word in a document use, click on ...
Answer: B. CTRL + R
a) Open the Word Processing Application and type the text between the words START and
END below, exactly as it appears and perform the tasks set below. Save the document as
WordAssign.
b) Select all text in the word document and change the font type to Courier New, and font size
12.
c) Change the page orientation to “Landscape”
d) Select all text in the word document and change the line spacing to 1.5’
e) Insert a Header entitled “E-Learning Explored” and a footer showing the page number.
f) Replace the word “END” at the end with your Student number followed by your First Name
and
g) Surname.
92
End User Computing (15 Credits)
eLearning is the talk of the day for the great benefits it shows forth in the process of education. With
universities in all major parts of the world conducting various online degrees, certification courses
and distance education programs in different branches of education, learning has become easier,
faster and more connected.
People may wonder how eLearning improves one’s learning process. It is due to the following
reasons:
eLearning has turned to be one of the best modes of education for students who show interest in
continuing education despite various other commitments. It provides extra edge for those who wish
to improve their subject skills. It is also a known fact that when students are interested in what they
are learning, they gain better retention capabilities and work wonders in their courses. Same way, if a
student gains an opportunity to use technology to the best of his advantage, he also stands out well
with his interface with instructors and plentiful availability of resources with more productivity in the
learning process. (147032 Lita Tsoanyana)
How can you insert an online picture in your word document in word 2013?
Answer: To insert picture that is online, like you have picture on Facebook or Instagram and you
want to insert it in word document you can use this feature
93
End User Computing (15 Credits)
2. Under INSERT tab, click the online picture button in the illustrations section.
3. Insert dialog box opens
4. Type a phrase that describes the image you want in the office.com or Skydrive
5. Click on the image you want to use to select it
6. Click the Insert button to insert the image
94
End User Computing (15 Credits)
Unit
4:
MS Excel 2016
95
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
96
End User Computing (15 Credits)
Activity 4.1
From the Excel Start Screen, locate and select Blank workbook to access the Excel interface
97
End User Computing (15 Credits)
The Ribbon
Excel 2016 uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains
multiple tabs, each with several groups of commands. You will use these tabs to perform the most
common tasks in Excel.
Each tab will have one or more groups
Some groups will have an arrow you can click for more options
98
End User Computing (15 Credits)
Activity 4.2
You can adjust how the Ribbon is displayed with the Ribbon Display Options
The Ribbon is designed to respond to your current task, but you can choose to minimise it if you find
that it takes up too much screen space. Click the Ribbon Display Options arrow in the upper-right
corner of the Ribbon to display the drop-down menu.
99
End User Computing (15 Credits)
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides
the Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain
visible. To show the Ribbon, simply click a tab.
Show Tabs and Commands: This option maximises the Ribbon. All the tabs and commands will
be visible. This option is selected by default when you open Excel for the first time.
100
End User Computing (15 Credits)
4.2 Cells
Whenever you work with Excel, you will enter information—or content—into cells. Cells are the
basic building blocks of a worksheet. You' will need to learn the basics of cells and cell content to
calculate, analyse, and organise data in Excel.
Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the
intersection of a row and a column—in other words, where a row and column meet.
Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3).Each cell
has its own name—or cell address—based on its column and row. In the example below, the
selected cell intersects column C and row 5, so the cell address is C5, this is called cell referencing
Note that the cell address also appears in the Name box in the top-left corner, and that a cell's
column and row headings are highlighted when the cell is selected.
You can also select multiple cells at the same time. A group of cells is known as a cell range.
Rather than a single cell address, you will refer to a cell range using the cell addresses of the first
and last cells in the cell range, separated by a colon. For example, a cell range that included cells
A1, A2, A3, A4, and A5 would be written as A1:A5. Take a look at the different cell ranges below:
Cell range A1:A8
101
End User Computing (15 Credits)
Activity 4.3
To select a cell:
To input or edit cell content, you'll first need to select the cell.
1. Click a cell to select it. In our example, we'll select cell D9.
2. A border will appear around the selected cell, and the column heading and row heading will be
highlighted. The cell will remain selected until you click another cell in the worksheet.
102
End User Computing (15 Credits)
Activity 4.4
1. Click and drag the mouse until all the adjoining cells you want to select are highlighted. In our
example, we'll select the cell range B5:C18.
2. Release the mouse to select the desired cell range. The cells will remain selected until you click
another cell in the worksheet.
103
End User Computing (15 Credits)
104
End User Computing (15 Credits)
To copy a worksheet:
If you need to duplicate the content of one worksheet to another, Excel allows you to copy an
existing worksheet.
1. Right-click the worksheet you want to copy, then select Move or Copy from the worksheet menu.
105
End User Computing (15 Credits)
2. The Move or Copy dialog box will appear. Choose where the sheet will appear in the Before
sheet: field. In our example, we'll choose (move to end) to place the worksheet to the right of the
existing worksheet.
4. The worksheet will be copied. It will have the same title as the original worksheet, as well as a
version number. In our example, we copied the November worksheet, so our new worksheet is
named November (2). All content from the November worksheet has also been copied to the new
worksheet.
To rename a worksheet:
1. Right-click the worksheet you want to rename, then select Rename from the worksheet menu.
106
End User Computing (15 Credits)
3. Click anywhere outside the worksheet tab, or press Enter on your keyboard. The worksheet will
be renamed.
To move a worksheet.
1. Click and drag the worksheet you want to move until a small black arrow appears above the
desired location.
107
End User Computing (15 Credits)
To delete a worksheet:
1. Right-click the worksheet you want to delete, then select Delete from the worksheet menu.
108
End User Computing (15 Credits)
A dialog box will appear with a list of all the sheets in your workbook. You can then double-click the
sheet you want to jump to.
For example, cell A3 below contains a formula which adds the value of cell A2 to the value of cell A1.
109
End User Computing (15 Credits)
For example, cell A3 below contains the SUM function which calculates the sum of the range A1:A2.
Enter a Formula
To enter a formula, execute the following steps.
Activity 4.5
1. Select a cell.
2. To let Excel know that you want to enter a formula, type an equal sign (=).
3. For example, type the formula A1+A2.
Tip: instead of typing A1 and A2, simply select cell A1 and cell A2.
4.Change the value of cell A1 to 3.
110
End User Computing (15 Credits)
Excel automatically recalculates the value of cell A3. This is one of Excel's most powerful features!
Edit a Formula
When you select a cell, Excel shows the value or formula of the cell in the formula bar.
1. To edit a formula, click in the formula bar and change the formula.
2. Press Enter
Operator Precedence
Excel uses a default order in which calculations occur. If a part of the formula is in parentheses, that
part will be calculated first. It then performs multiplication or division calculations. Once this is
complete, Excel will add and subtract the remainder of your formula. See the example below.
111
End User Computing (15 Credits)
First, Excel performs multiplication (A1 * A2). Next, Excel adds the value of cell A3 to this result.
Another example,
First, Excel calculates the part in parentheses (A2+A3). Next, it multiplies this result by the value of
cell A1.
Copy/Paste a Formula
When you copy a formula, Excel automatically adjusts the cell references for each new cell the
formula is copied to. To understand this, execute the following steps.
1. Enter the formula shown below into cell A4.
2a. Select cell A4, right click, and then click Copy (or press CTRL + c),
112
End User Computing (15 Credits)
Next select cell B4, right click, and then click Paste under 'Paste Options:' (or press CTRL + v).
2b. You can also drag the formula to cell B4. Select cell A4, click in the lower right corner of cell A4
and drag it across to cell B4. This is much easier and gives the exact same result!
Insert a Function
Every function has the same structure. For example, SUM (A1:A4). The name of this function is
SUM. The part between the brackets (arguments) means we give Excel the range A1:A4 as input.
This function adds the values in cells A1, A2, A3 and A4. It's not easy to remember which function
and which arguments to use for each task. Fortunately, the Insert Function feature in Excel helps you
with this.
113
End User Computing (15 Credits)
1. Select a cell.
2. Click the Insert Function button.
4. Click OK.
The 'Function Arguments' dialog box appears.
5. Click in the Range box and select the range A1:C2.
6. Click in the Criteria box and type >5.
7. Click OK.
114
End User Computing (15 Credits)
Result. The COUNTIF function counts the number of cells that are greater than 5.
Note: instead of using the Insert Function feature, simply type =COUNTIF (A1:C2,">5"). When you
arrive at:
=COUNTIF (instead of typing A1:C2, simply select the range A1:C2.
1. Type in the following spreadsheet, and format it to look like the sample
below. Save as ExcelAssign.
2. Using an appropriate formula, calculate the Student Average for each
student.
3. Using an appropriate formula, calculate the Exam Average for each exam
per column
115
End User Computing (15 Credits)
Is it possible to prevent someone from copying the cell from your worksheet?
1) Study the highlighted cells in the image below and identify which of
the following represents the correct cell address for these cells:
a) The cell reference for the selected cells is B:21, C:28, D:22, E:26 and
F:25.
b) The cell reference for the selected cells is row 15, column F
c) The cell reference for the selected cells is F4:F5
d) The cell reference for the selected cells is B15:F15
116
End User Computing (15 Credits)
b) You can only use it to save, redo and undo, create new documents,
open documents and print.
c) It displays functions you have recently used as well as frequently
used functions.
d) None of the above options are correct.
3) Which of the following functions are you likely to find under the Insert
tab on the Ribbon?
a) Insert a page break
b) Insert a formula
c) Insert a table
d) Insert track changes
4) Study the orange circled area of the worksheet in the image below.
Select from the following those that best describethe function of this
area.
a) The Name Box displays a name given to a cell or set of cells.
b) The Name Box reflects the contents of the first cell that is selected in
a range.
c) The Name Box gives you options for duplicating the selected cells.
d) All of the above options are correct.
117
End User Computing (15 Credits)
5) The Formula Bar is the block located above the grid in a worksheet
and preceded by the letters fx. Select the incorrect statements about
the Formula Bar.
a) The Formula Bar is only used to create formulas by pressing the fx
located to the left of the box.
b) The Formula Bar contains the contents of the cell you have selected.
c) You can type numbers or text directly into the formula bar.
d) You can edit words or numbers contained in selected cells in the
Formula Bar.
118
End User Computing (15 Credits)
6) What happens when you press the icon circled in orange in the
image below?
a) It moves the worksheet up and hides rows.
7) Study the image below this question and select what is the purpose
of the two words circled in orange.
a) These represent the names of the individual workbooks you have
saved. If you click on the "Sales 2" tab it will open this workbook.
119
End User Computing (15 Credits)
8) Study the section of a worksheet in the image below. Select the cell
address of the cell containing the word "Qtr3".
a) The cell address is D:1
120
End User Computing (15 Credits)
10) Study the image below this question. The Quick Access Toolbar is
appearing below the Ribbon (circled in orange). You need to moveit
back to its position above the Ribbon. Select the correct statement from
those below:
a) This is a default setting with some versions of Excel. You need to
reinstall Excel to fix this issue.
b) You can move the toolbar back up to its position by holding down the
left mouse button and dragging it into position.
c) If you close the workbook and reopen it again, the toolbar will move
back to its original position.
d) If you right-click on it and select "Show Quick Access Toolbar above
the Ribbon" it will move back.
121
End User Computing (15 Credits)
Revision Questions
1. Using A1:A12 as your cell range, write down functions to calculate the
following:
a). Sum
b). Average
c). Minimum value
d). Maximum value
e). Number of blank entries
2. How many data formats are available in Excel? Name some of them.
3. Specify the order of operations used for evaluating formulas in Excel.
The order of operations in Microsoft Excel is same as in standard
mathematics. It’s defined by the term “PEMDAS” or “BEDMAS”.
122
End User Computing (15 Credits)
Answers
Activity 4.1
Show how to access a Excel Interface.
Answer: From the Excel Start Screen, locate and select Blank workbook to access the Excel
interface
Activity 4.2
Show how to display a Ribbon.
Answer:
Activity 4.3
Explain how to work with Cells.
Answer:
To select a cell:
To input or edit cell content, you'll first need to select the cell.
1. Click a cell to select it. In our example, we'll select cell D9.
2. A border will appear around the selected cell, and the column heading and row heading will be
highlighted. The cell will remain selected until you click another cell in the worksheet.
Sometimes you may want to select a larger group of cells, or a cell range.
Activity 4.4
Show how to display Range on Excel.
Answer:
123
End User Computing (15 Credits)
1. Click and drag the mouse until all the adjoining cells you want to select are highlighted. In our
example, we'll select the cell range B5:C18.
2. Release the mouse to select the desired cell range. The cells will remain selected until you click
another cell in the worksheet.
Activity 4.5
Explain how you would enter a formula on Excel.
Answer:
1. Select a cell.
2. To let Excel know that you want to enter a formula, type an equal sign (=).
Tip: instead of typing A1 and A2, simply select cell A1 and cell A2.
Excel automatically recalculates the value of cell A3. This is one of Excel's most powerful features!
2) What is the purpose of the Quick Access Toolbar (circled in orange in the image below)?
Answer: a) It provides shortcuts to functions you may use frequently as well as functions that may
not be on the Ribbon.
3) Which of the following functions are you likely to find under the Insert tab on the Ribbon?
Answer: a) Insert a page break
4) Study the orange circled area of the worksheet in the image below. Select from the following
those that best describethe function of this area.
124
End User Computing (15 Credits)
Answer: a) The Name Box displays a name given to a cell or set of cells.
5) The Formula Bar is the block located above the grid in a worksheet and preceded by the
letters fx. Select the incorrect statements about the Formula Bar.
Answer: b) The Formula Bar contains the contents of the cell you have selected.
6) What happens when you press the icon circled in orange in the image below?
Answer: b) It minimises the Ribbon.
7) Study the image below this question and select what is the purpose of the two words
circled in orange.
Answer: c) These represent worksheets that have been created in the workbook. If you click on
them they will take you to the different sheets.
8) Study the section of a worksheet in the image below. Select the cell address of the cell
containing the word "Qtr3".
Answer: d) The cell address is D:5
9) Select which of the following functions is NOT associated with the Review Tab on the
Ribbon.
Answer: b) The sort data function
10) Study the image below this question. The Quick Access Toolbar is appearing below the
Ribbon (circled in orange). You need to moveit back to its position above the Ribbon. Select
the correct statement from those below:
Answer: d) If you right-click on it and select "Show Quick Access Toolbar above the Ribbon" it will
move back.
125
End User Computing (15 Credits)
1. Type in the following spreadsheet, and format it to look like the sample below. Save as
ExcelAssign.
2. Using an appropriate formula, calculate the Student Average for each student.
3. Using an appropriate formula, calculate the Exam Average for each exam per column
Answer:
Anne Gables 78 55 50 61
126
End User Computing (15 Credits)
127
End User Computing (15 Credits)
Unit
5:
MS Access 2016
128
End User Computing (15 Credits)
Create a table
5.6. MS Access-Objects
Sort and filter a table or form
5.7. Table
5.8. Query
5.9. Form
5.10. Report
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
129
End User Computing (15 Credits)
Microsoft Access is just one part of Microsoft’s overall data management product strategy
It stores data in its own format based on the Access Jet Database Engine
Like relational databases, Microsoft Access also allows you to link related information easily. For
example, customer and order data. However, Access 2013 also complements other database
products because it has several powerful connectivity features
It can also import or link directly to data stored in other applications and databases
As its name implies, Access can work directly with data from other sources, including many
popular PC database programs, with many SQL (Structured Query Language) databases on the
desktop, on servers, on minicomputers, or on mainframes, and with data stored on Internet or
Intranet web servers
Access can also understand and use a wide variety of other data formats, including many other
database file structures
You can export data to and import data from word processing files, spreadsheets, or database
files directly
Access can work with most popular databases that support the Open Database Connectivity
(ODBC) standard, including SQL Server, Oracle, and DB2
Software developers can use Microsoft Access to develop application software
Microsoft Access stores information which is called a database. To use MS Access, you will need to
follow these four steps −
Database Creation − Create your Microsoft Access database and specify what kind of data you
will be storing
Data Input − After your database is created, the data of every business day can be entered into
the Access database
Query − This is a fancy term to basically describe the process of retrieving information from the
database
Report (optional) − Information from the database is organized in a nice presentation that can be
printed in an Access Report
130
End User Computing (15 Credits)
Architecture
Access calls anything that can have a name an object. Within an Access desktop database, the
main objects are tables, queries, forms, reports, macros, data macros, and modules
If you have worked with other database systems on desktop computers, you might have seen the
term database used to refer to only those files in which you store data
But, in Access, a desktop database (.accdb) also includes all the major objects related to the
stored data, including objects you define to automate the use of your data
Before MS Access 2007, the file extension was *.mdb, but in MS Access 2007 the extension has
been changed to *.accdb extension
Early versions of Access cannot read accdb extensions but MS Access 2007 and later versions
can read and change earlier versions of Access
An Access desktop database (.accdb or .mdb) is a fully functional Relational Database
Management System (RDBMS)
It provides all the data definition, data manipulation, and data control features that you need to
manage large volumes of data
You can use an Access desktop database (.accdb or .mdb) either as a standalone RDBMS on a
single workstation or in a shared client/server mode across a network
A desktop database can also act as the data source for data displayed on webpages on your
company intranet
When you build an application with an Access desktop database, Access is the RDBMS
131
End User Computing (15 Credits)
In a document or a spreadsheet, you generally have complete freedom to define the contents of
the document or each cell in the spreadsheet
In a document, you can include paragraphs of text, a table, a chart, or multiple columns of data
displayed with multiple fonts
In spreadsheet, you can have text data at the top to define a column header for printing or
display, and you might have various numeric formats within the same column, depending on the
function of the row
A RDBMS allows you to define the kind of data you have and how the data should be stored
You can also usually define rules that the RDBMS can use to ensure the integrity of your data
For example, a validation rule might ensure that the user can’t accidentally store alphabetic
characters in a field that should contain a number
In a word processing document, you can include tabular data and perform a limited set of
functions on the data in the document
You can also search for text strings in the original document and, with ActiveX controls, include
tables, charts, or pictures from other applications
In a spreadsheet, some cells contain functions that determine the result you want, and in other
cells, you enter the data that provides the source information for the functions
An RDBMS provides you many ways to work with your data. For example,
You can search a single table for information or request a complex search across several related
tables
You can update a single field or many records with a single command
You can write programs that use RDBMS commands to fetch data that you want to display and
allow the user to update the data
Access uses the powerful SQL database language to process data in your tables. Using SQL, you
can define the set of information that you need to solve a particular problem, including data from
perhaps many tables.
132
End User Computing (15 Credits)
When you need to share your information with others, RDBMS gives you the flexibility to allow
multiple users to read or update your data
An RDBMS that is designed to allow data sharing also provides features to ensure that no two
people can change the same data at the same time
The best systems also allow you to group changes (which is also known as transaction) so that
either all the changes or none of the changes appear in your data
You might also want to be sure that no one else can view any part of the order until you have
entered all of it
Because you can share your Access data with other users, you might need to set some
restrictions on what various users are allowed to see or update
Tables
Queries
Forms
Reports
Together, these objects allow you to enter, store, analyse, and compile your data. Here is a summary
of the major objects in an Access database;
5.7 Table
Table is an object that is used to define and store data. When you create a new table, Access asks
you to define fields which is also known as column headings.
133
End User Computing (15 Credits)
You can define a primary key, one or more fields that have a unique value for each record, and
one or more indexes on each table to help retrieve your data more quickly
5.8 Query
An object that provides a custom view of data from one or more tables. Queries are a way of
searching for and compiling data from one or more tables.
5.9 Form
Form is an object in a desktop database designed primarily for data input or display or for control of
application execution. You use forms to customize the presentation of data that your application
extracts from queries or tables.
5.10 Report
Report is an object in desktop databases designed for formatting, calculating, printing, and
summarising selected data.
134
End User Computing (15 Credits)
You can include simple conditions in macros to specify when one or more actions in the macro
should be performed or skipped
You can use macros to open and execute queries, to open tables, or to print or view reports
You can also run other macros or Visual Basic procedures from within a macro
Data macros can be attached directly to table events such as inserting new records, editing
existing records, or deleting records
Data macros in web apps can also be stand-alone objects that can be called from other data
macros or macro objects
Module
Module is an object in desktop databases containing custom procedures that you code using Visual
Basic. Modules provide a more discrete flow of actions and allow you to trap errors.
Everything that can be done in a macro can also be done in a module, but you don't get the
macro interface that prompts you what is needed for each action
Modules are far more powerful, and are essential if you plan to write code for a multi-user
environment, because macros cannot include error handling
135
End User Computing (15 Credits)
Modules can be standalone objects containing functions that can be called from anywhere in your
application, or they can be directly associated with a form or a report to respond to events on the
associated form or report
136
End User Computing (15 Credits)
1. Which field type will you select if you need to enter long text in that
field?
A. Text
B. Memo
C. Currency
D. Hyperlink
B. Box
C. Cell
D. Palett
B. Form
C. Worksheets
D. Modules
137
End User Computing (15 Credits)
4. In which method we don't need to specify the field type and size
while creating a new Table?
A. Design Vie
B. 1 Byte
C. 1 Character
D. 1 KB
Revision Questions
138
End User Computing (15 Credits)
Answers
1. Which field type will you select if you need to enter long text in that field?
Answer: A. Text
2.The expression builder is an access tool that controls an expression___ for entering an
expression.
Answer: B. Box
4. In which method we don't need to specify the field type and size while creating a new Table?
Answer: C. Create Table by Entering Data
140
End User Computing (15 Credits)
Unit
6:
MS PowerPoint
Unit 6: MS PowerPoint
141
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
142
End User Computing (15 Credits)
The Ribbon and Quick Access Toolbar are where you will find the commands to perform common
tasks in PowerPoint. Backstage view gives you various options for saving, opening a file, printing,
and sharing your document.
The Ribbon
PowerPoint uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains
multiple tabs, each with several groups of commands. For example, the Font group on the Home
tab contains commands for formatting text in your document.
143
End User Computing (15 Credits)
Some groups also have a small arrow in the bottom-right corner that you can click for even more
options.
144
End User Computing (15 Credits)
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides
the Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain
visible. To show the Ribbon, simply click a tab
Show Tabs and Commands: This option maximises the Ribbon. All the tabs and commands will
be visible. This option is selected by default when you open PowerPoint for the first time
145
End User Computing (15 Credits)
Activity 6.1
146
End User Computing (15 Credits)
2. Select New on the left side of the window, then click Blank Presentation.
Activity 6.2
1. Click the File tab to access Backstage view, then select New.
2. You can click a suggested search to find templates or use the search bar to find something more
specific. In our example, we'll search for the keyword chalkboard.
147
End User Computing (15 Credits)
4. A preview of the template will appear, along with additional information on how the template can
be used.
5.Click Create to use the selected template.
148
End User Computing (15 Credits)
Click next to the text you want to select, drag the mouse over the text, then release your mouse.
The text will be selected.
PowerPoint allows you to copy text that is already on a slide and paste it elsewhere, which can save
you time. If you want to move text, you can cut and paste or drag and drop the text.
Activity 6.3
149
End User Computing (15 Credits)
2. Place the insertion point where you want the text to appear.
Activity 6.4
To Cut-and-Paste Text
1. Select the text you want to move, then click the Cut command.
150
End User Computing (15 Credits)
2. Place the insertion point where you want the text to appear, then click the Paste command
Which steps would you use to set up password protection for a presentation?
151
End User Computing (15 Credits)
B. .giv
C. .wav
D. . All of the above
B. A bullet slide
C. A title slide
D. All of above
152
End User Computing (15 Credits)
6. Which of the following should you use if you want all the slide in the
presentation to have the same “look”?
A. The slid layout option
8. If you have a PowerPoint show you created and want to send using
email to another teacher you can add the show to your email message
as a (an) ________________
A. Inclusion
B. Attachment
C. Reply
D. Forward
153
End User Computing (15 Credits)
Revision Questions
154
End User Computing (15 Credits)
Answers
Activity 6.1
Answer:
2. Select New on the left side of the window, then click Blank Presentation.
Activity 6.2
Answer:
1. Click the File tab to access Backstage view, then select New
2. You can click a suggested search to find templates or use the search bar to find something more
specific. In our example, we'll search for the keyword chalkboard.
4. A preview of the template will appear, along with additional information on how the template can
be used.
155
End User Computing (15 Credits)
Activity 6.3
Answer:
1. Select the text you want to copy, then click the Copy command on the Home tab.
2. Place the insertion point where you want the text to appear.
Activity 6.4
Show how to copy and paste text.
Answer:
To Cut-and-Paste Text
1. Select the text you want to move, then click the Cut command.
2. Place the insertion point where you want the text to appear, then click the Paste command
156
End User Computing (15 Credits)
2. In Microsoft PowerPoint two kind of sound effects files that can be added to the
presentation are
Answer: A. .wav files and .gif files
6. Which of the following should you use if you want all the slide in the presentation to have
the same “look”?
Answer: D. A presentation design template
8. If you have a PowerPoint show you created and want to send using email to another teacher
you can add the show to your email message as a (an) ________________
Answer: B. Attachment
158
End User Computing (15 Credits)
159
End User Computing (15 Credits)
Which steps would you use to set up password protection for a presentation?
Answer: Your applicants should be able to explain the steps required to set up password protection
for a presentation. To protect a PowerPoint file with a password, you need to:
1. Navigate to File
2. Select the Passwords option
3. Select “Encrypt this presentation and require a password to open.”
4. Enter the chosen password
5. Enter the password again to verify it
6. Press Set Password.
160
End User Computing (15 Credits)
161
End User Computing (15 Credits)
Unit
7:
Internet and Email
162
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
163
End User Computing (15 Credits)
The way Internet has evolved over the years, makes it difficult for us to believe that it was created to
allow data transfer and communications in case of a nuclear attack on US or a big disaster. Internet
has come a long way from a restricted-use network created for such a special purpose. People today
communicate with friends, family and business contacts, participate in community activities
developed around their interest areas, shop, bank, study, entertain themselves, and research using
the Internet. It is therefore becoming essential for people to learn how to use Internet and email.
Before we begin learning how to use the Internet and email, we must get familiar with some of the
fundamental concepts. Internet is a huge network of computers. People connect their computers to
local networks, which in turn are connected to regional networks and these regional networks are
connected to a central structure called backbone.
7.1.1 TCP/IP
Just like two people can communicate easily if they talk in the same language and its rules. Similarly,
all computers connected to Internet follow same rules and procedures, also called protocols, to
communicate with each other. These protocols, or the common language, of the Internet are known
as Transmission Control Protocol/Internet Protocol or TCP/IP.
Every computer on the Internet has a unique address. This is a four-part numeric address called
Internet Protocol Address or IP address, and it contains information that identifies the location of this
computer. Some examples of IP addresses are 255.230.54.1, or 10.11.0.220. Therefore, we can see
that each part of IP address is a number ranging between 0 and 255.
7.1.2 DNS
Most computers also have an address called a Domain Name System address or DNS address. A
DNS address has two parts: a host name which stands for the name the computer; a domain name
that identifies the type of organisation from which the computer is connected. Some of the most used
domain names today are .com which is used by commercial organisations; .edu used by educational
institutions; .net used by network service providers; .org used by non-profit organisations; and .gov
used by government departments and organisations.
164
End User Computing (15 Credits)
web users can click any link on a web page to access more information about these links. A
collection of related web pages is called a website. The first page of a website is called its home
page. On the home page, links to various webpages of the website are listed.
7.1.4 Web Browsers
You need a web browser to access web pages on the web. A web browser is a software application
specially designed to look up and open web pages on the user's computer. The two most popular
web browsers are Microsoft Internet Explorer, and Netscape Navigator. For the purpose of this
tutorial we will refer to the Microsoft Internet Explorer 5.0 which is used by a vast majority of web
users.
7.1.5 URL
The World Wide Web is built on a set of rules called the Hypertext transfer protocol (HTTP). This
protocol requires the Internet addresses in a special format, called URL or Uniform Resource
Locator. A typical example of a URL is as follows:
http://www.enablingdimensions.com/home/home.html
Let us see what the various parts of a URL stand for:
a. http:// : stands for a server that uses the hypertext transfer protocol
b. www : means the website is on the World Wide Web
c. enablingdimensions : part of the Internet stands for the name of the service/company/organisation
d. home: whose website you are accessing refers to a web folder belonging to the website of
enabling dimensions
e. home.html: refers to the specific web page in the web folder named home.
Sometimes the name of the web page is not displayed in the URL. However, each web page on the
web has a unique URL. To access a website, you must know its URL and that URL should be typed
in the Address bar of the web browser used by you.
7.1.6. Emails
To send and receive mails in electronic format, an email account and an Internet connection are
required. There are email programs available to help you manage your emails on your computer.
Some of the most commonly used email programs are Microsoft Outlook Express and Netscape
Messenger. However, it is not essential to have an email program to be able to send and receive
emails. There are several free email service providers on the web, including Hotmail, Yahoo!,
Rediffmail and Indiatimes. You need to register with them and open an account with them to start
sending and receiving emails.
After you drop your letter in the post box, the post-man collects and takes it to the central post office.
From here it is dispatched to the recipient's city. Similarly, after an email is sent from a computer, it is
165
End User Computing (15 Credits)
sent to the nearest mail server. Here, depending on the recipient's domain and top-level domain
name, the mail is forwarded to the mail servers closest to the recipient.
To deliver a letter, a postman collects the recipient's mail from the central post office and delivers it to
the recipient's home. Similarly, whenever the recipient connects to his mail server, the email program
retrieves the mail from there and presents it to the recipient.
Irrespective of what time of the day you send a mail, and no matter how far your recipient is, the
whole process of sending and receiving mails takes a few seconds.
166
End User Computing (15 Credits)
To be able to use Internet and email, you need to set up a connection with an Internet Service
Provider (ISP). Internet connections are available over the telephone line through dial-up modems or
DSL; over cable through Cable T. V. wires; and through wireless. The most common way of
connecting to the Internet is over telephone line using a dial-up modem. However, lately Internet over
cable is also becoming quite popular. There are also many cybercafes in the country offering Internet
Access facility on hourly rental basis.
Before you begin, ensure that you have an Internet connection on your PC. If you are accessing from
home, you need to connect to the net using the software provided by your service provider. This
software can be launched from the Program sub-menu in Start Menu or from Desktop, if there is a
shortcut on the desktop.
Activity 7.1
1. Press the start button to open the start menu. Go to Programs and open the programs sub-menu.
2. Now use the down arrow direction key to reach the option labelled Internet Explorer, and press
Enter.
3. Alternatively, you can use the shortcut icon for Internet Explorer on the desktop.
1. Title Bar - It is the topmost part of the web browser, and is a thin rectangular strip. The left-hand
corner of Title bar displays, the icon of Internet Explorer, name of the website, and name of the
program i.e. Internet Explorer. On the right-hand corner the three buttons - Minimise, Maximise
167
End User Computing (15 Credits)
1. Ensure that you are connected to the Internet. Launch the Internet Explorer from the start menu,
programs sub-menu.
2. Go to file menu option of the Internet Explorer by pressing the Alt key. Open the file menu drop by
using the down arrow direction key. In this drop down, use the down arrow direction key to go to
the option labelled 'open'. This will open the 'Open' dialog box. Alternatively, you can press
Control key and O key. The cursor will be in an edit text box. Here type the URL of the website
you want to visit. We will take the example of Enabling Dimensions website. So, type
www.enablingdimensions.com in the open edit text box, and press Enter.
3. The browser will then look for the Enabling Dimensions website on the web. The status bar will
display "searching www.enablingdimensions.com". When it finds the website, the status bar will
display 'website found'. After this a process of displaying the website on your computer will begin,
this process is called downloading. The page that appears after downloading is complete is
called the home page of the website.
168
End User Computing (15 Credits)
Activity 7.2
Show how to conduct a search on Google.
B. Microsoft Corporation
C. Macintosh Corporation
D. Internet Technologies Limited
169
End User Computing (15 Credits)
2. What is a server?
A. A computer that is very big
6.From a web page, you cannot save pictures to your hard disk.
A. True
B. False
7. A small file put in your hard disk that contains information like user ID
by your web browser is called a ____________________
A. Certificate
170
End User Computing (15 Credits)
B. Websites
C. Web Browsers
D. Search Engines
B. Search Engine
C. Web Browser
D. Personal Web Page
Revision Questions
171
End User Computing (15 Credits)
Answers
Activity 7.1
Show how to cut and paste text.
Answer: To be discussed during the webinar(s) with lecturer
Activity 7.2
Show how to conduct a search on Google.
Answer:
2. Press control key + O key to open the 'Open' dialog box, type www.google.com and press enter
key.
3. In a few moments the home page of the Google website will be opened. The cursor will be placed
in the search text box; press enter key to put on the forms mode. Now, type the text you want to
search on the web in this box and press enter key.
5. Use Tab to browse the links. Or if you already know the link, press Insert key + F7 key to open the
links listing dialog box. Now, use the arrow direction keys to reach the link you want to access, and
press enter key.
2. What is a server?
Answer: B. A computer that provides/manages shared services
172
End User Computing (15 Credits)
4. A system for transferring web documents, defines how messages are formatted and
transmitted over internet is _______________
Answer: A. Hypertext Transfer Protocol
5.Select True or False. A modem is a device that converts outgoing data only, from computers
to a format that can be transferred via telephone lines.
Answer: A. True
6.From a web page, you cannot save pictures to your hard disk.
Answer: B. False
7. A small file put in your hard disk that contains information like user ID by your web browser
is called a ____________________
Answer: D. Cookie
9. Mozilla Firefox, Google Chrome, Netscape Navigator and Opera are examples of
___________________
Answer: C. Web Browsers
173
End User Computing (15 Credits)
174
End User Computing (15 Credits)
Unit
8:
ICT in Everyday Life
175
End User Computing (15 Credits)
Prescribed Reading(s)/Textbook(s)
Miller, M. (2023). Computer Basics: Absolute Beginner's Guide.
Windows 11 Edition, Tenth Edition. United States of America: Pearsons.
Recommended Reading(s)/Textbook(s)
Laudon, C.K. and Laudon, J.P. (2022). Management Information
Systems, Managing the Digital Firm. Seventeenth Edition. New Jersey:
Pearsons.
176
End User Computing (15 Credits)
Teachers
Use computers to search for teaching materials, participate in online forums and online
conferences as well as to aid their teaching
Students
Use the computers as a reference tool. They use computers to browse the internet to look for
information
Researchers
School Administrators
Use computers for administrative purposes to make sure that the entire operation runs smoothly.
Banking
In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
Customers
Can make any transactions at the 24-hour service centres or via online. These services allow
them to do transaction at anytime they want
Businessman
Can save their time by using the online services offered by banks. They can access company
accounts for loan applications, business transactions and update on their cash flow at any time
Bank Administrator
Can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT),
telegraphic transfer and others by referring to the banking system
177
End User Computing (15 Credits)
Industry
Computers are used to facilitate production planning and control systems, to support chain
management and to help in product design in the industrial sector. In the industrial sector, workers,
researchers and administrator benefits from the usage of ICT.
Workers
Use machines that are connected to computers to operate. In some productions, robots are used
to take over jobs that are dangerous to the workers
Researchers
Use computers to analyse and collect research data for future reference
Administrators
Use computers to oversee the entire operations in the plant or factory to detect specific errors or
defects that occurred in the process
The COVID-19 epidemic has expedited the shift to online labour for many areas of society. It would
be naive to dismiss multinational firms' growing interest in spending billions of dollars in established
and start-up enterprises delivering online education throughout the epidemic. The vast experiment of
millions of people shifting online by default has been embraced by corporations that see potential not
merely for profit but also for entrenching themselves in public life.
Activity 8.1
178
End User Computing (15 Credits)
Read the following case study and answer the questions that follow.
Naneetha, R., and Srihari. (2021) A Case Study of Information and
Communication Technology in Empowering the Visually Challenged Women
in Inclusive Education
Available at https://doi.org/10.34293/ education.v9i4.4208case_study_1.pdf
[Accessed 27 September 2023].
Brigham Young posits that ‘If you educate a man, you educate an individual,
but you educate a woman, you educate a nation. Even now, educating a
woman is challenging in cultural practices dominated by values and beliefs in
the social system. Women in developing countries face significant barriers in
accessing education, whereas gender inequality in communities, society, and
the workplace hinders economic and social development. Education as a
means of empowerment of women can bring changes socially, economically,
and politically. An American author, Helen Keller, says that ‘Education cannot
be created with ease, only through the experience of trial and sufferings it can
be strengthened, inspired and achieved. Women with visual impairment are
still receiving less schooling, denied social acceptance, and lack of access to
information also became an impediment added to their woes. Perhaps, ICT
has changed visually impaired women’s lives by giving them access to
mainstream and trying to be independent financially and socially.
Furthermore, ICT has allowed visually impaired women in accessing braille
materials, operating assistive devices and applications that build confidence,
recognition, self-expression, and acquire knowledge. This study explores how
inclusive education creates an opportunity for visually impaired women in
overcoming societal stigma by achieving personal, social, emotional, and
academic goals. ICT in education plays an essential role in developing
women and facilitates empowerment, calibrated to a new order of society’s
structure and functions
Question:
What is the role of ICT in Higher Education Institutions?
E-Commerce
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more
efficient and faster. For this application, computers, Internet and shared software are needed. In the
e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
179
End User Computing (15 Credits)
Customers
Use computers to be connected online with suppliers to purchase products. This method can
save time and cost as they do not have to go to any outlets
Suppliers
Use computers to keep track of their transactions. All products are bar-coded and can be read by
the computer scanner to help in determining prices and managing inventory
Employees
Use computers and telephones to communicate with their customers for any enquiries. The
system helps employees to get the latest updates on inventory to be informed to the customers
Activity 8.2
Other Sectors
Amongst other sectors that benefit from the usage of ICT are architecture, arts, career, government,
healthcare, home, law enforcement, transportation and travel.
8.2 Health
Information and communications technologies (ICTs) can play a critical role in improving health care
for individuals and communities. By providing new and more efficient ways of accessing,
communicating, and storing information, ICTs can help bridge the information divides that have
emerged in the health sector in developing countries—between health professionals and the
communities they serve and between the producers of health research and the practitioners who
180
End User Computing (15 Credits)
need it.
Through the development of databases and other applications, ICTs also provide the capacity to
improve health system efficiencies and prevent medical errors.
A physician in a remote rural hospital is initially unable to diagnose a patient with a complex array
of symptoms. However, using his MEDLINE search training and the hospital’s Internet
connection, he is able to diagnose and successfully treat the patient for a tropical disease the
patient picked up while travelling abroad
Another physician looks at her hospital’s prescription trends using the newly created electronic
health record system and finds that other physicians are not using the post-surgical antibiotic that
is shown to be most effective according to the current international guidelines. She speaks to the
administration about advocating a switch in antibiotics that will improve patient recovery
outcomes and thereby save the hospital money
A neonatologist, who transmits CT-scans and other medical images by e-mail to his network of
personal contacts around the world to help in diagnosing and treating premature newborns,
estimates that tele-consultations have helped him to save numerous lives during the past year
A young woman, too embarrassed to ask her physician about reproductive health issues and the
risks of sexually transmitted infections, anonymously contacts physicians at a woman’s health
clinic, where they’ve set up e-mail accounts for staff in order to support these types of physician-
patient interactions
Each of these examples demonstrates how information and communications technologies (ICTs) can
play a critical role in improving health care for individuals and communities. By providing new and
more efficient ways of accessing, communicating, and storing information, ICTs can help bridge the
information divides that have emerged in the health sector in developing countries—between health
professionals and the communities they serve and between the producers of health research and the
practitioners who need it. Through the development of databases and other applications, ICTs also
provide the capacity to improve health system efficiencies and prevent medical errors.
ICT for health (or e-health) programs are often considered to be expensive, time-consuming, risky,
and otherwise distracting from the primary focus and intent of health sector programs. In some
cases, these criticisms may be valid. There are, however, a wide range of low-cost and sustainable
ICT for health program components that can augment capacity and improve the overall effectiveness
of health development programs. These are the types of programs that HealthConnect International
is specialised to help deliver.
181
End User Computing (15 Credits)
8.3 Security
The meaning of the term computer security has evolved in recent years. Before the problem of data
security became widely publicised in the media, most people’s idea of computer security focused on
the physical machine. Traditionally, computer facilities have been physically protected for three
reasons:
Computer security is security applied to computing devices such as computers and smartphones, as
well as computer networks such as private and public networks, including the whole Internet.
The field covers all the processes and mechanisms by which digital equipment, information and
services are protected from unintended or unauthorised access, change or destruction, and are of
growing importance in line with the increasing reliance on computer systems of most societies
worldwide It includes physical security to prevent theft of equipment, and information security to
protect the data on that equipment. It is sometimes referred to as "cybersecurity" or "IT se.curity",
though these terms generally do not refer to physical security (locks and such). Some important
terms used in computer security are:
In this frame, vulnerability is also known as the attack surface. Vulnerability management is the
cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems. Backdoors A backdoor in a
computer system, is a method of bypassing normal authentication, securing remote access to a
computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a
modification to an existing program or hardware device. It may also fake information about disk and
182
End User Computing (15 Credits)
memory usage. Denial-of-service attack Unlike other exploits, denials of service attacks are not used
to gain unauthorised access or control of a system. They are instead designed to render it unusable.
Attackers can deny service to individual victims, such as by deliberately entering a wrong password
enough consecutive times to cause the victim account to be locked, or they may overload the
capabilities of a machine or network and block all users at once. These types of attack are, in
practice, very hard to prevent, because the behaviour of whole networks needs to be analysed, not
only the behaviour of small pieces of code.
Distributed denial of service (DDoS) attacks are common, where many compromised hosts
(commonly referred to as "zombie computers", used as part of a botnet with, for example; a worm,
Trojan horse, or backdoor exploit to control them) are used to flood a target system with network
requests, thus attempting to render it unusable through resource exhaustion.
Direct-access attacks an unauthorised user gaining physical access to a computer (or part thereof)
can perform many functions, install different types of devices to compromise security, including
operating system modifications, software worms, keyloggers, and covert listening devices. The
attacker can also easily download large quantities of data onto backup media, for instance CD-
R/DVD-R, tape; or portable devices such as key drives, digital cameras or digital audio players.
For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to
eavesdrop on the systems of internet service providers. Spoofing of user identity describes a
situation in which one person or program successfully masquerades as another by falsifying data
and thereby gaining an illegitimate advantage. Tampering describes an intentional modification of
products in a way that would make them harmful to the consumer. Repudiation describes a situation
where the authenticity of a signature is being challenged.
Information Disclosure (Privacy Breach or Data Leak) describes a situation where information,
thought as secure, is released in an untrusted environment. Elevation of privilege Elevation of
Privilege describes a situation where a person or a program want to gain elevated privileges or
access to resources that are normally restricted to him/it.
An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of
a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually computerised). This frequently
183
End User Computing (15 Credits)
includes such things as gaining control of a computer system or allowing privilege escalation or a
denial of service attack.
The term "exploit" generally refers to small programs designed to take advantage of a software flaw
that has been discovered, either remote or local. The code from the exploit program is frequently
reused in Trojan horses and computer viruses.
Indirect Attacks
An indirect attack is an attack launched by a third-party computer. By using someone else's computer
to launch an attack, it becomes far more difficult to track down the actual attacker. There have also
been cases where attackers took advantage of public anonymising systems, such as the tor onion
router system. Computer crime: Computer crime refers to any crime that involves a computer and a
network.
Security
1. Use Strong Passwords Use different user ID / password combinations for different accounts and
avoid writing them down. Make the passwords more complicated by combining letters, numbers,
special characters (minimum 10 characters in total) and change them on a regular basis.
2. Secure your computer o Activate your firewall Firewalls are the first line of cyber defence; they
block connections to unknown or bogus sites and will keep out some types of viruses and
hackers. o Use antivirus/malware software Prevent viruses from infecting your computer by
installing and regularly updating antivirus software. o Block spyware attacks Prevent spyware
from infiltrating your computer by installing and updating anti-spyware software.
3. Be Social-Media Savvy Make sure your social networking profiles (e.g. Facebook, Twitter,
YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information
you post online. Once it is on the Internet, it is there forever!
4. Secure your Mobile Devices - Be aware that your mobile device is vulnerable to viruses and
hackers. Download applications from trusted sources.
5. Install the latest operating system updates Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to
prevent potential attacks on older software.
6. Protect your data Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in another location.
7. Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to intrusion if they
are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are
also vulnerable. Avoid conducting financial or corporate transactions on these networks.
8. Protect your e-identity Be cautious when giving out personal information such as your name,
address, phone number or financial information on the Internet. Make sure that websites are
secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when
accessing/using social networking sites).
184
End User Computing (15 Credits)
9. Avoid being scammed Always think before you click on a link or file of unknown origin. Don’t feel
pressured by any emails. Check the source of the message. When in doubt, verify the source.
Never reply to emails that ask you to verify your information or confirm your user ID or password.
10. Call the right person for help Don’t panic! If you are a victim, if you encounter illegal Internet
content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial
scam, report this to your local police. If you need help with maintenance or software installation
on your computer, consult with your service provider or a certified computer technician.
185
End User Computing (15 Credits)
186
End User Computing (15 Credits)
b) A tablet PC
c) A server
d) A laptop
b) Blog
c) VoIP
d) RSS Feed
187
End User Computing (15 Credits)
Revision Questions
188
End User Computing (15 Credits)
Answers
Activity 8.1
How did COVID-19 Accelerated Digital Transformation in the Retail Sector?
Answer: Retail technology has transformed the purchasing experience by:
1. Affording customers the convenience to make orders from the comfort of their home
2. Enabling them to purchase products that are unavailable in nearby stores giving access to a
broader range of products
3. Giving customers the ability to research products, match prices among retailers, and have overall
better bargaining power
4. Providing more detailed product information to the customer than most in-store staff can offer
5. Offering a more personalized shopping experience
Activity 8.2
1. Efficiency
Modernsupply chain and inventory managementsimply would not be possible without the use of
barcodes. Rather than manually entering inventory and shipment data for every item into a system,
employees can simply scan entire pallets, crates, and even shipping containers to instantly know
what contents they contain inside.
2. Error Reduction
Manual data entry is notorious for its high levels of human error. That’s a lot of opportunities for
things to go wrong, whether it takes the form of inverted characters, skipped lines, misreadings,
illegible markings, or faulty keystrokes. Even worse, once an error occurs, it will often be reproduced
across a system, making it very difficult to locate and remediate the original mistake.
189
End User Computing (15 Credits)
3. Tracking
Each time a barcode is scanned, it creates another step in a data trail that can be easily referenced
to locate items and events. This allows businesses togreatly improve real-time visibilityinto their
operations. From identifying a shipment’s most recent location or determining whether or not a
patient picked up their prescription from a pharmacy, barcodes help organizations and customers
alike to track down information quickly and accurately.
4. Data Collection
Todays organizations rely heavily upon data analytics to formulate their business strategy and make
key decisions. The more data they have available to them, the more nuanced and accurate their
analysis will be. Barcodes play a critical role in data collection strategies. Not only are they used to
gather information about inventory, supply chain, and sales activity,
ICT provides tools for unified communication and collaboration. These tools help to facilitate a more
active and engaged learning experience.
For example, students can use video conferencing to connect with classmates and instructors.
Online discussion forums also allow students to share ideas and receive feedback in real-time.
ICT can further help to create more engaging and immersive learning experiences through the use of
virtual reality. Many more simulation technologies also exist to help achieve this.
ICT provides tools and resources tailored to the needs of each student. In doing so, ICT helps
instructors deliver more targeted and personalised instruction.
190
End User Computing (15 Credits)
For example, an instructor can use an online education platform to create a customised course for a
student struggling with a particular concept.
They can also use ICT to provide students with targeted feedback on their performance, allowing
learners to see exactly where they need to improve.
ICT makes it easy to track student activity and performance data. Thus, educators can identify areas
where students have difficulties and tailor their instruction accordingly.
Moreover, ICT-based appraisals are graded automatically, thus allowing educators to focus on other
tasks. Furthermore, online assessments can be administered quickly and reviewed anywhere,
making them convenient for students and teachers alike.
Students can use the internet to access all the educational resources they need. They can:
The cost of higher education can be steep. Fortunately, there are many ways that ICT can help
reduce the costs associated with higher education.
For example, many colleges and universities now offer remote education in online courses. Students
may take classes from anywhere globally, enabling them to save money on travel and
accommodation costs.
191
End User Computing (15 Credits)
Also, ICT can help improve the efficiency of university administration, resulting in savings on staff
costs. Instructors can also use ICT to develop new teaching methods that may be more cost-effective
than the traditional ones.
Higher education institutions are increasingly incorporating ICTs into their operations to improve
efficiency and effectiveness. The accreditation process is a primary area wherein ICTs are used
increasingly with time.
ICTs can help institutions collect and track data related to accreditation standards and also facilitate
communication with accreditors.
Today's students seek more than just a degree from any higher education institution. They select
cutting-edge and up-to-date institutions with the latest technology and facilities.
Hence the importance of ICT. Higher education institutions can make themselves more attractive to
students by investing in their ICT. Learners enjoy having access to a range of benefits that students
value, from online learning opportunities to 24/7 library access.
Investment in ICT shows that an institution is committed to providing a high-quality education that
meets the needs of today's students.
Security is more critical than ever before in today's world, and higher education institutions are no
exception. ICT plays a vital role in helping to boost security on campus by providing surveillance
cameras and access control systems. ICT also helps to deter crime and keep students safe.
192
End User Computing (15 Credits)
In addition, ICT helps to protect data security by encrypting sensitive information and storing it off-
site. By storing data electronically, ICT helps to prevent data loss and ensure that data is only
accessible to authorised users.
2. Which one of the following is a term for systems used to store, retrieve, process and
transmit data?
Answer: c) Information & Communication Technology
4. Which one of the following is a term for an audio or video recording posted on a web site
that can be downloaded and played later?
Answer: a) Podcast
Nonetheless, some purchases are still best made in-store, and just because the shopping
preference of most customers is online does not mean offline stores will disappear. Moving forward it
is expected that most retailers will have to balance the e-commerce experience with in-store
offerings to create a consistent and holistic approach across all channels.
193
End User Computing (15 Credits)
194
End User Computing (15 Credits)
5. Protect your data Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in another location.
6. Secure your wireless network Wi-Fi (wireless) networks at home.
195
End User Computing (15 Credits)
UNIT 1
1.2 WLAN
Answer:
1.2 Wireless Local Area Network (WLAN) as a network that is similar to LAN but computer are not
linked with cables. In wireless network, computer are connected using radio waves that send signals
to each other through air.
1.3 WAN
Answer:
1.3 Wide Area Network (WAN) refers to computers that are linked together over large distance using
fibre optic cables.
1.4 Client/Server
Answer:
1.4 A server computer is responsible for storing data which it send to and receives from the client
computer, while a client computer is the one that users sit at and interact with. It communicates with
the server computer.
1.5 Peer-to-Peer
Answer:
1.5 Peer to peer networks (P2P) is a network arranged in which there is no independent server, thus
each computer is a server on its self.
196
End User Computing (15 Credits)
2. Elaborate on the five types of computers and the environment in which they are used.
Answer:
a) Mainframe Computer -It is high capacity and costly computer. It is largely used by big
organizations where many people can use it simultaneously.
b) Supercomputer -This category of computer is the fastest and also very expensive. A typical
supercomputer can solve up to ten trillion individual calculations per second.
c) Workstation Computer - The computer of this category is a high-end and expensive one. It is
exclusively made for complex work purpose.
d) Personal Computer (PC) - It is a low capacity computer developed for single users.
e) Apple Macintosh (Mac)- It is a sort of personal computer manufactured by Apple company.
f) Laptop computer (notebook)- It is a handy computer that can be easily carried anywhere.
197
End User Computing (15 Credits)
UNIT 2
a. File path
Answer: A file path describes the location of a file in a web site's folder structure. File paths are used
when linking to external files, like: Web pages. Images. Style sheets.
b. Disk drive
Answer: A disk drive is a device that allows a computer to read from and write data to a disk. The
most common type of disk drive is a hard disk drive (HDD), and the term disk drive and hard disk
drive are typically used interchangeably. Other types include optical drives, storage devices, and
floppy drives. A disk drive is commonly found in PCs, servers, laptops, and storage arrays.
c. Folders
Answer: A folder is a storage space, or container, where many files can be placed into groups and
organize the computer. A folder can also contain other folders. For many computer software
applications, there is a current working directory. This is the folder that the application runs in.
198
End User Computing (15 Credits)
UNIT 3
b. Title bar
Answer: A title bar is a small strip that extends across the top of a window. It displays the title of the
window and typically includes the close, minimize, and maximize buttons. In macOS, these buttons
are on the left side of the title bar, while in Windows, they are on the right
c. Ribbon
Answer: A ribbon or riband is a thin band of material, typically cloth but also plastic or sometimes
metal, used primarily as decorative binding and tying. Cloth ribbons are made of natural materials
such as silk, cotton, and jute and of synthetic materials, such as polyester, nylon, and polypropylene
199
End User Computing (15 Credits)
f. Zoom Control
Answer: The zoom control is a slider that helps you to zoom in and out on the timeline so that you
can focus on areas of particular interest. Because this control zooms in on the center of the timeline
view, center the area of interest before you zoom in.
g. View Shortcut
Answer: You can click the “Task View” button on the taskbar to open it, or you can use these
keyboard shortcuts: Windows+Tab: This opens the new Task View interface, and it stays open—you
can release the keys.
h. Status Bar
Answer: A status bar is a graphical control element which poses an information area typically found
at the window's bottom. It can be divided into sections to group information. Its job is primarily to
display information about the current state of its window, although some status bars have extra
functionality
i. Insertion Point
Answer: An insertion point is the location on the screen where the next character typed will be
inserted. This location may be in a text document, a form field, a Web browser address bar, or
anywhere else on the screen that allows text input. The insertion point is often identified by a flashing
cursor
j. Document Window
Answer: A document window is a section of the screen used to display the contents of a document
200
End User Computing (15 Credits)
file on a GUI (graphical user interface) operating system. Below is an example of a document
window in the Microsoft Word software word processor program. Document, Operating system,
Window, Word processor terms.
UNIT 4
1. Using A1:A12 as your cell range, write down functions to calculate the following:
a) Sum
Answer: Sum =SUM (A1:A12)
b) Average
Answer: Average =AVERAGE (A4:A12)
c) Minimum value
Answer: Minimum value =MIN (A4:A12)
d) Maximum value
Answer: Maximum value = MAX (A1:A12)
2. How many data formats are available in Excel? Name some of them.
Answer:
Parentheses or Brackets
Exponent
Multiplication
Division
Addition
Subtraction
UNIT 5
1. Discuss five ways in which a relational database management system allows you to work
with your data.
Answer: A relational database management system (RDBMS) is a database that stores information
in the form of tables called relations. These tables include numerous rows and columns, often called
records and fields. Each record typically contains its own unique ID called a key. An RDBMS may
include millions of rows. The columns often consist of one type of data, such as names and numbers,
that contain attributes of the records. Most modern businesses, IT systems and other programs often
use RDBMSs because they can use the data in relation to other stored datasets.
2. Between different data’s what are the types of relationship can be formed?
Answer: The table contains your data can build three types of relationship
One-to-one relationships: A single data in one table is linked with a single data in another table
One-to-many relationship: A single data in a table is linked to several data’s in another table
Many-to-many relationship: Where several data’s in one table is related to several other data’s in
another table
3. Explain how you can build a relationship between the different databases in Access?
Answer: When you establish a relationship between two data, the first table for your data is referred
202
End User Computing (15 Credits)
as the primary key while the new field in another data is called a foreign key.
Access database.accdb
Access project.adp
Access project.mdw
Access blank project template.adn
Access workgroup.mdw
Protected access database.accde
UNIT 6
1. What is a slide show in a PowerPoint presentation?
Answer: When all the slides of a PowerPoint presentation are set in series and then presented to a
group of people, where each slide appears one after the other, is a set pattern, this is known as a
PowerPoint slide show.
203
End User Computing (15 Credits)
4. Which steps would you use to set up password protection for a presentation?
Answer: Your applicants should be able to explain the steps required to set up password protection
for a presentation. To protect a PowerPoint file with a password, you need to:
a) Navigate to File
b) Select the Passwords option
c) Select “Encrypt this presentation and require a password to open.”
d) Enter the chosen password
e) Enter the password again to verify it
f) Press Set Password
UNIT 7
1. Email is a method of sending and receiving mail messages over the Internet. Discuss the
advantages of email.
Answer: The advantages of using emails
It's free - once you are online, there is no further expense.
Easy to reference - dent and received messages and attachments can be stored safely, logically and
reliably. It is a lot easier to organize emails than paper.
Easy to use - once you are set up, sending and receiving messages is simple. That goes for a host of
other email functions. Data storage and contacts can be accessed quickly and easily.
Easy to prioritize - incoming messages have subject lines that mean you can delete without opening
Speed - messages can be send under a second. Email is as fastest a form of written communication.
Global - web based email means you can access your messages anywhere online. You can even
mail yourself a copy of your passport number, travel insurance details or your accommodation
details. Lastly, if emails are used well, it is a superb communication and productivity tool.
204
End User Computing (15 Credits)
205
End User Computing (15 Credits)
UNIT 8
1. It is difficult to think of a profession that has not benefitted from the invention of the
computer. Discuss how computers help people perform jobs and manage organisations.
Answer: Computers allow the application of different types of software that can help businesses
keep track of their files, documents, schedules and deadlines. Computers also allow businesses to
organize all of their information in a very accessible manner. The ability to store large amounts of
data on a computer is convenient and inexpensive, and saves space. A computer's ability to allow a
company to organize its files efficiently leads to better time management and productivity. The
usefulness of computers include the following:
Communications: Companies use computers for both internal and external communications via
email, messenger systems, conferencing and word processing.
Research: Businesses can use computers to research industry trends, patents, trademarks, potential
clients and competitors via search engines and proprietary databases.
Media Production: Computers are now used to produce different types of media, including graphics,
video and audio productions.
Data Tracking and Storage: Although paper files containing hard copy documents are still in use,
organizations also store and manage their data using software and the cloud.
Product Development: Developers use computers to create new products and services.
Human resources: Internal HR processes and payroll systems are managed using software and
online services.
206
End User Computing (15 Credits)
Consumer-to-consumer (C2C): C2C ecommerce is when consumers sell to other consumers. Sites
like eBay and Craigslist are examples of this kind of ecommerce.
Consumer-to-business (C2B): C2B ecommerce is when consumers sell their products or services to
businesses.
Business-to-administration (B2A): B2A ecommerce refers to transactions between businesses and
public administration, which includes areas such as Social Security, employment and legal.
Consumer-to-administration (C2A): C2A ecommerce refers to transactions between consumers and
public administration, where consumers pay for services like taxes and legal document preparation.
3. Based on your expert knowledge of impact is that IT has had a different sector over the
years, discus the positive and negative impact of ICT in education and business.
Answer: In today’s interconnected world, information and communication technology (ICT) is widely
used by our nation and it affects our lives everyday. It gives great impact in education for the learners
and teachers. ICT has become a key driver in education way as well as it has been identified by a
range of important wider benefits of ICT on learning. The positive impact of ICT on students’ skills
and teamwork are included.
ICT also help student and teacher with activities that are provided in the websites. That kind of
activities gives ideas to the teachers in their teaching, so that students enjoy the class. Students
learn more independently at the same time. They will take more responsibility for learning process.
As seen from the information above, ICT can benefit both strong and weak students with their special
needs. By the way, they especially improved the performance in students’ English and on writing
skills.
ICT is a part of a social system integrating meaningful communication within an education system.
We can use it for analyzing the processes, meanings and functions of ICT in education. ICT also
provided the research for us when we have to do the assignments. ICT is also one of the tools that
have easy communication with others in foreign countries. It saves cost and time.
Schools use ICT to make it easy for both students and teachers of their work. Different information
and opinion can be found from the web-sites. In addition, ICT provides wide array of information and
effective lessons. That is also easy for students to do their work by using word processing. It makes
our projects or assignments more neat and tidy. From the education system point of view, “e-” could
mean “enhanced” education rather than “electronic” education. Consequently, ICT has a great impact
on society especially on education.
On the other hand, ICT also has a bad impact on education system. Teacher who always show the
example of the work from the internet and copy the information, will not show a good example for the
students. That may cause the students follow the action of the teacher and start to copy and paste. At
the same time, the information and knowledge which come from the internet are not necessary
207
End User Computing (15 Credits)
correct. We have to more careful when doing research from the web.
Moreover, it will cause the effect on the students. Students may not be interested in the way teachers
teach. They will more focus on the web such as Facebook, MSN, and Twitter. It unknowingly
influences their result in the class. It also changes their behavior to the teachers in school.
Students who generally communicate with friends by the ICT will cause a problem when
communicating face to face. It not only has an impact on character but also their attitude. Somehow,
they will become more rebellious when influenced by the negative material. Today, we can see that
have many teenagers use two or three phones. It will cause them not to pay attention in the lesson
time.
In conclusion, ICT can give both advantages and disadvantages to education. We have to be careful
when using it. Internet, TV, radio and others are the ICT that provide the news and information to us.
We can increase our vision when we have it. But, when we are too focused on these things, we may
suffer health problems by using them. We have to be wise in using the tools of ICT.
4. Elaborate on how ICT has positively impacted the commerce and Healthcare.
Answer: Positive Impact of ICT on the Business Sector
Information and Communication Technology (ICT) has revolutionized the way businesses operate
and has had a significant positive impact on various aspects of the business sector. Here are some
key ways in which ICT has benefited businesses:
1. Improved Communication: ICT tools such as email, instant messaging, and video conferencing
have made communication faster, more efficient, and cost-effective. This has facilitated better
collaboration among employees, teams, and business partners, regardless of their geographical
locations.
2. Enhanced Efficiency and Productivity: ICT has automated many business processes, reducing
manual work and improving efficiency. Tasks such as data entry, inventory management, and
customer relationship management can now be automated, saving time and resources. This allows
businesses to focus on core activities and increase productivity.
3. Access to Global Markets: ICT has enabled businesses to expand their reach beyond local
markets. E-commerce platforms and online marketplaces have made it easier for businesses to sell
their products and services globally, reaching a wider customer base. This has opened up new
opportunities for growth and increased revenue.
4. Data Management and Analysis: ICT tools provide businesses with the ability to collect, store, and
analyze large amounts of data. This data can be used to gain valuable insights into customer
behavior, market trends, and business performance. Data analytics helps businesses make informed
decisions, improve strategies, and identify new opportunities.
208
End User Computing (15 Credits)
5. Improved Customer Service: ICT has transformed customer service by providing various channels
for customers to interact with businesses. Websites, social media, and chatbots enable businesses to
provide 24/7 support and respond to customer queries and complaints promptly. This enhances
customer satisfaction and loyalty.
209
End User Computing (15 Credits)
In conclusion, ICT has had a profound positive impact on both the business and healthcare sectors.
It has improved communication, efficiency, and productivity in businesses, while also transforming
healthcare delivery, enhancing patient care, and advancing medical research. The continued
development and adoption of ICT will likely bring further advancements and benefits to these sectors
in the future.
210
End User Computing (15 Credits)
Bibliography
Andrew Manches and Lydia Plowman, Computing education in children's early years: A call for
debate, British Journal of Educational Technology, 48, 1, (191-201), (2015)
Beth A. Rogowsky, Caryn C. Terwilliger, Craig A. Young and Elizabeth E. Kribbs, Playful learning
with technology: the effect of computer-assisted instruction on literacy and numeracy skills of
pre-schoolers, International Journal of Play, (1), (2017)
Bezanson, J., Edelman A., Karpinski, S. and Shah V.B. (2017) Julia: A fresh approach to
numerical computing. SIAM Review. 1(1)
Chou Mei-Ju, How are Our Prince and Princess Satisfying with IPad Learning, Procedia - Social
and Behavioral Sciences, 116, (2857), (2014)
Elizabeth Foss and Allison Druin, Children’s Internet Search: Using Roles to Understand
Children’s Search Behavior, Synthesis Lectures on Information Concepts, Retrieval, and
Services, 10.2200/S00591ED1V01Y201408ICR034, 6, 2, (1-106), (2014)
Emilija Stojmenova Duh, Natasa Koceska and Saso Koceski, Game-based learning: educational
game Azbuka to help young children learn writing Cyrillic letters, Multimedia Tools and
Applications, 76, 12, (14091), (2017)
Ewan Ingleby, Selected student and tutor perceptions of ICTs in further and higher education in
England, Journal of Further and Higher Education, 38, 3, (287), (2014)
Ewan Ingleby, The house that Jack built: neoliberalism, teaching in higher education and the
moral objections, Teaching in Higher Education, 20, 5, (518), (2015)
Fathi Ihmeideh and Fatima Al-Maadadi, Towards Improving Kindergarten Teachers’ Practices
Regarding the Integration of ICT into Early Years Settings, The Asia-Pacific Education
Researcher, 27, 1, (65), (2018)
Guy Roberts-Holmes, Playful and creative ICT pedagogical framing: a nursery school case study,
Early Child Development and Care, 184, 1, (1), (2014)
Heather C. Janisse, Xiaoming Li, Navaz P. Bhavnagri, Cassandra Esposito and Bonita Stanton,
A Longitudinal Study of the Effect of Computers on the Cognitive Development of Low-Income
African American Preschool Children, Early Education and Development, 29, 2, (229), (2018)
Hui-Yun Sung, Adult mediation of preschool children’s use of mobile technologies in public
libraries in Taiwan: A socio-cultural perspective, Journal of Librarianship and Information
Science, (096100061770905), (2017)
Hui-Yun Sung, Incorporating technology in children's story time: Cultural-historical activity theory
as a means of reconciling contradictions, Library & Information Science Research, 39, 1, (46),
(2017)
Joke Voogt and Susan McKenney, TPACK in teacher education: are we preparing teachers to
use technology for early literacy? Technology, Pedagogy and Education, 26, 1, (69), (2017)
211
End User Computing (15 Credits)
Kleopatra Nikolopoulou and Vasilis Gialamas, ICT and play in preschool: early childhood
teachers’ beliefs and confidence, International Journal of Early Years Education, 23, 4, (409),
(2015)
Kleopatra Nikolopoulou, ICT Integration in Preschool Classes: Examples of Practices in Greece,
Creative Education, 05, 06, (402), (2014)
Laudon, C.K. and Laudon, J.P. (2017) Management Information Systems, Managing the Digital
Firm. Twelfth Edition. New Jersey: Pearsons Education Ltd. This is the latest edition of the
textbook that is available
Marie L. Bassford, Annette Crisp, Angela O'Sullivan, Joanne Bacon and Mark Fowler, CrashEd –
A live immersive, learning experience embedding STEM subjects in a realistic, interactive crime
scene, Research in Learning Technology, 24, 1, (30089), (2016)
Maryanne Theobald, Susan Danby, Christina Davidson, Sandy Houen, Brooke Scriven and
Karen Thorpe, How Talk and Interaction Unfold in a Digitally Enabled Preschool Classroom,
Australian Journal of Linguistics, 36, 2, (189), (2016)
Mona Sakr, Multimodal participation frameworks during young children’s collaborative drawing
on paper and on the iPad, Thinking Skills and Creativity, 10.1016/j.tsc.2018.05.004, 29, (1-11),
(2018)
Monika Tavernier and Xiao Hu, Developing young children's technology-based communication
skills using iPads and creation apps: An action study, Proceedings of the Association for
Information Science and Technology, 54, 1, (415-425), (2017)
Nollaig McEvilly, Matthew Atencio and Martine Verheul, Developing children: developmental
discourses underpinning physical education at three Scottish preschool settings, Sport,
Education and Society, 22, 8, (943), (2017)
Pekka Mertala, Wag the dog – The nature and foundations of preschool educators' positive ICT
pedagogical beliefs, Computers in Human Behavior, 69, (197), (2017)
Pirita Ihamäki and Katriina Heljakka, The Internet of Toys, Connectedness and Character-Based
Play in Early Education, Proceedings of the Future Technologies Conference (FTC) 2018,
10.1007/978-3-030-02686-8_80, (1079-1096), (2018)
Rabia M. Yilmaz, Educational magic toys developed with augmented reality technology for early
childhood education, Computers in Human Behavior, 10.1016/j.chb.2015.07.040, 54, (240-248),
(2016)
Rabia M. Yilmaz, Sevda Kucuk and Yuksel Goktas, are augmented reality picture books magic or
real for preschool children aged five to six? British Journal of Educational Technology, 48, 3,
(824-841), (2016)
Sanja Tatalovic Vorkapic and Sandra Milovanovic, Computer use in pre-school education: The
attitudes of the future pre-school teachers in Croatia, Education 3-13, 42, 2, (217), (2014)
Satyanarayanan, M. (2017) The emergence of edge computing. Computer. (1)4
Stephanie Kerckaert, Ruben Vanderlinde and Johan van Braak, The role of ICT in early
212
End User Computing (15 Credits)
childhood education: Scale development and research on ICT use and influencing factors,
European Early Childhood Education Research Journal, 23, 2, (183), (2015)
Steven M. Freund, S.M., Hoisington, C., Schmieder, E. and Last, M.Z. (2016) Microsoft Office
365 and Office 2016: Introductory [PDF]. Boston, Massachusetts: Cengage Learning
Xia Liu, Eugenia I. Toki and Jenny Pange, The Use of ICT in Preschool Education in Greece and
China: A Comparative Study, Procedia - Social and Behavioral Sciences, 112, (1167), (2014)
Yi, S., Li, C. and Li, Q. (2015) Fog Computing: Focusing on mobile users at the edge.
Proceedings of the 2015 workshop on mobile big data. 1(4)
Yvonne Anders, Hans-Günther Roßbach and Susanne Kuger, Early Childhood Learning
Experiences, Assessing Contexts of Learning, 10.1007/978-3-319-45357-6_7, (179-208), (2016)
213
End User Computing (15 Credits)
214