Introduction To Computers Module PDF
Introduction To Computers Module PDF
2.0 Objectives
2.1Identify and describe the operation of major hardware units of a computer
system.
2.2Describe the operation, characteristics and application of typical bulk
storage devices.
2.3Identify and describe the duties and responsibilities of computer
personnel.
2.4Describe the arithmetic and logic operations performed by the computer.
2.5Describe the architecture of different types of computers.
2.6State the requirements of a computer room environment and describe the
security measures required for the computer room information.
3.3.3 Types of situations in which they are useful, e.g. graphic devices.
3.4.1 The operating system and its functions. Describe the main features
of an operating system.
3.4.2 Windows 95, 98, 2000----create directory, move around the move
3.6.1 Nature of ALU and flow of data between the functional units in it.
3.9.3 Advantages/disadvantages of
integrated software
off the shelf
in-house
contracted
tailor made
3.10 Communication system basics Pages 88 - 97
information circulation
software controls
processing controls
computer crime
health issues
3.12 Applications (word processing) Pages 105 - 124
load program
set up files containing alphabetic and numeric fields within the record
enter data/add records/delete records/edit records
sort records by a key field
print selected fields
search on more than one criteria, produce printouts
5.0 Objectives
5.1Identify and describe the operation of major hardware units of a computer
system.
5.2Describe the operation, characteristics and application of typical bulk
storage devices.
5.3Identify and describe the duties and responsibilities of computer
personnel.
5.4Describe the arithmetic and logic operations performed by the computer.
5.5Describe the architecture of different types of computers.
5.6State the requirements of a computer room environment and describe the
security measures required for the computer room information.
This IT department function depends on the scale and business purposes of the
company. The department is responsible for installations and maintenance of
hardware and software requirements for the company. It’s also tasked with training
of users to ensure effective use of IT resources. This department should also
develop the IT policy for the company to guide users.
Depending on the company and the department, this role can either be highly
specialized or incredibly diverse. The primary role of the Database Administrator to
administer, develop, maintain and implement the policies and procedures necessary
to ensure the security and integrity of the corporate database. Sub roles within the
Database Administrator classification may include security, architecture,
warehousing and/or business analysis. Other primary roles will include:
Database Administrators are often on-call and required to work as needed. This
position carries an enormous amount of responsibility
Develop MS SQL server applications like views, triggers and stored procedures.
Design and develop web user interfaces with back-end databases and other tools.
7. Systems Analyst: Works out what tasks can be done by computer systems,
designs the software and decides what hardware is required. When the system has
been created, the systems analyst checks to see if the system can be improved.
The responsibilities of a systems analyst are many and varied. More importantly a
systems analyst is a key work at a company and thus what they do is critical for the
overall welfare of a company. The systems analyst is charged with looking after the
operating system and associated subsystems. In today's ever-increasing reliant
computer age, this description makes them more critical than ever. The systems
analyst must order provide support to the operating systems and hardware tools
and generally has to make sure that things run and work as they should. If they
can find out how to make things run more cheaply that is also good. The systems
analyst needs to be on top of the industry. They have to be aware of all the
available technology and the pros and cons of each. Keeping tabs of new
technology is also critical as new technology is arriving all the time. They must
know what technology provides the best cost effective performance. The systems
analyst must provide and maintain a working environment which functions like it
should. The systems analyst is doing his job if there are no fires to be put out. If no
one wants him to solve a problem or troubleshoot something then everything is
working as it should.
Data processing may or may not be distinguished from data conversion, when the
process is merely to convert data to another format, and does not involve any data
manipulation.
With the onset of the Second World War, governments sought to develop
computers to exploit their potential strategic importance. This increased funding for
computer development projects hastened technical progress. By 1941 German
engineer Konrad Zuse had developed a computer, the Z3, to design airplanes and
missiles. The Allied forces, however, made greater strides in developing powerful
computers. In 1943, the British completed a secret code-breaking computer called
Colossus to decode German messages. The Colossus's impact on the development
of the computer industry was rather limited for two important reasons. First,
Colossus was not a general-purpose computer; it was only designed to decode
secret messages. Second, the existence of the machine was kept secret until
decades after the war.
Another computer development spurred by the war was the Electronic Numerical
Integrator and Computer (ENIAC), produced by a partnership between the U.S.
government and the University of Pennsylvania. Consisting of 18,000 vacuum
tubes, 70,000 resistors and 5 million soldered joints, the computer was such a
massive piece of machinery that it consumed 160 kilowatts of electrical power,
enough energy to dim the lights in an entire section of Philadelphia. Developed by
John Presper Eckert (1919-1995) and John W. Mauchly (1907-1980), ENIAC, unlike
the Colossus and Mark I, was a general-purpose computer that computed at speeds
1,000 times faster than Mark I.
It was the stored program and programming language that gave computers the
flexibility to finally be cost effective and productive for business use. The stored
program concept meant that instructions to run a computer for a specific function
(known as a program) were held inside the computer's memory, and could quickly
be replaced by a different set of instructions for a different function. A computer
could print customer invoices and minutes later design products or calculate
paychecks. More sophisticated high-level languages such as COBOL (Common
Business-Oriented Language) and FORTRAN (Formula Translator) came into
common use during this time, and have expanded to the current day. These
languages replaced cryptic binary machine code with words, sentences, and
mathematical formulas, making it much easier to program a computer. New types
of careers (programmer, analyst, and computer systems expert) and the entire
software industry began with second generation computers.
Though transistors were clearly an improvement over the vacuum tube, they still
generated a great deal of heat, which damaged the computer's sensitive internal
parts. The quartz rock eliminated this problem. Jack Kilby, an engineer with Texas
Instruments, developed the integrated circuit (IC) in 1958. The IC combined three
After the integrated circuits, the only place to go was down - in size, that is. Large
scale integration (LSI) could fit hundreds of components onto one chip. By the
1980's, very large scale integration (VLSI) squeezed hundreds of thousands of
components onto a chip. Ultra-large scale integration (ULSI) increased that number
into the millions. The ability to fit so much onto an area about half the size of a U.S.
dime helped diminish the size and price of computers. It also increased their power,
efficiency and reliability. The Intel 4004 chip, developed in 1971, took the
integrated circuit one step further by locating all the components of a computer
(central processing unit, memory, and input and output controls) on a minuscule
chip. Whereas previously the integrated circuit had had to be manufactured to fit a
special purpose, now one microprocessor could be manufactured and then
programmed to meet any number of demands. Soon everyday household items
such as microwave ovens, television sets and automobiles with electronic fuel
injection incorporated microprocessors.
In 1981, IBM introduced its personal computer (PC) for use in the home, office and
schools. The 1980's saw an expansion in computer use in all three arenas as clones
of the IBM PC made the personal computer even more affordable. The number of
personal computers in use more than doubled from 2 million in 1981 to 5.5 million
in 1982. Ten years later, 65 million PCs were being used. Computers continued
their trend toward a smaller size, working their way down from desktop to laptop
computers (which could fit inside a briefcase) to palmtop (able to fit inside a breast
pocket). In direct competition with IBM's PC was Apple's Macintosh line, introduced
in 1984. Notable for its user-friendly design, the Macintosh offered an operating
system that allowed users to move screen icons instead of typing instructions.
Defining the fifth generation of computers is somewhat difficult because the field is
in its infancy. The most famous example of a fifth generation computer is the
fictional HAL9000 from Arthur C. Clarke's novel, 2001: A Space Odyssey. HAL
performed all of the functions currently envisioned for real-life fifth generation
computers. With artificial intelligence, HAL could reason well enough to hold
conversations with its human operators, use visual input, and learn from its own
experiences. (Unfortunately, HAL was a little too human and had a psychotic
breakdown, commandeering a spaceship and killing most humans on board.)
Though the wayward HAL9000 may be far from the reach of real-life computer
designers, many of its functions are not. Using recent engineering advances,
computers may be able to accept spoken word instructions and imitate human
reasoning. The ability to translate a foreign language is also a major goal of fifth
generation computers. This feat seemed a simple objective at first, but appeared
much more difficult when programmers realized that human understanding relies as
much on context and meaning as it does on the simple translation of words.
Many advances in the science of computer design and technology are coming
together to enable the creation of fifth-generation computers. Two such engineering
advances are parallel processing, which replaces von Neumann's single central
processing unit design with a system harnessing the power of many CPUs to work
as one. Another advance is superconductor technology, which allows the flow of
electricity with little or no resistance, greatly improving the speed of information
Types of Computers
Classification by Purpose
Classification by Use
d) Lap top: this a very small computer which can be used comfortably on the
lap. It is like a brief case in shape and has a flat screen.
b) Mini computer: refers to medium sized computers used for general purposes
at a smaller scale but usually designed for special purposes. It can
accommodate two to two hundred users and is usually off hand tasks of the
main frame as front end processor. They can also control Local Area
Networks (LANS) in branches of an organisation.
c) Micro computer: these are the smallest computers used for small scale
commercial applications. They are very cheap with limited storage capacity
and processing capability in these computers several integrated circuits are
replaced by a single circuit.
NB: these boundary lines dividing the categories are not static due
technological changes. Present computers are able to process faster than
older main frames, this applies also to micro and mini computers.
Exercise Questions
1. Define the following terms
i) Data
ii) Information
iii) Computer
iv) Electronic Data processing
v) Manual Data Processing [2marks each]
2. Identify duties of the following Data Processing personnel.
i) Data processing Manager
ii) Systems analyst
iii) Computer Operator
iv) Database administrator [5marks each]
A computer system is an electronic device that is used for data processing and
made up of hardware and software components that work together to achieve this
goal.
Computer Hardware is the tangible or physical components of a computer system.
Arithmetic Logic
Central Processing Unit CPU
Unit (ALU)
Control Unit
(CU)
Input Output
Cache Memory
Input Devices Output Devices
Main/Primary
Memory
Secondary Memory
In 1964 IBM introduced its System/360 computer architecture which was used in a
series of computers that could run the same programs with different speed and
performance. This was significant at a time when most electronic computers were
incompatible with one another, even those made by the same manufacturer. To
facilitate this improvement, IBM utilized the concept of a microprogram (often
called "microcode"), which still sees widespread usage in modern CPUs.[3] The
System/360 architecture was so popular that it dominated the mainframe computer
market for decades and left a legacy that is still continued by similar modern
computers like the IBM zSeries. In the same year (1964), Digital Equipment
Corporation (DEC) introduced another influential computer aimed at the scientific
and research markets, the PDP-8. DEC would later introduce the extremely popular
PDP-11 line that originally was built with SSI ICs but was eventually implemented
with LSI components once these became practical. In stark contrast with its SSI
and MSI predecessors, the first LSI implementation of the PDP-11 contained a CPU
composed of only four LSI integrated circuits.[4]
The introduction of the microprocessor in the 1970s significantly affected the design
and implementation of CPUs. Since the introduction of the first commercially
available microprocessor (the Intel 4004) in 1970 and the first widely used
microprocessor (the Intel 8080) in 1974, this class of CPUs has almost completely
overtaken all other central processing unit implementation methods. Mainframe and
minicomputer manufacturers of the time launched proprietary IC development
programs to upgrade their older computer architectures, and eventually produced
instruction set compatible microprocessors that were backward-compatible with
their older hardware and software. Combined with the advent and eventual vast
success of the now ubiquitous personal computer, the term CPU is now applied
almost exclusively to microprocessors. Several CPUs can be combined in a single
processing chip.
While the complexity, size, construction, and general form of CPUs have changed
drastically over the past sixty years, it is notable that the basic design and function
has not changed much at all. Almost all common CPUs today can be very accurately
described as von Neumann stored-program machines. As the aforementioned
20 Compiled by ICT Department©2011 KWEKWE POLYTECHNIC
Moore's law continues to hold true, concerns have arisen about the limits of
integrated circuit transistor technology. Extreme miniaturization of electronic gates
is causing the effects of phenomena like electromigration and subthreshold leakage
to become much more significant. These newer concerns are among the many
factors causing researchers to investigate new methods of computing such as the
quantum computer, as well as to expand the usage of parallelism and other
methods that extend the usefulness of the classical von Neumann model.
The informations flows within a computer from the hard disk to the Southbridge
chip(drive controller) on the motherboard then it goes to the Northbridge Chip
(system memory controller) then it goes to the DRAM Chips (on the memory stick)
then it goes to the CPU Chip Level 2 Cache Buffer SRAM then it goes to the CPU
Chip Level 1 Primary Execution Cache Buffer SRAM Memory then it goes to the CPU
Chip Execution Units for Processing and gets sent back to the Northbridge which
either sends it back to the RAM to be stored for later use or through the AGP Slot
(Accelerated Graphics Port) into the VRAM, then on to the GPU (graphics
controller), then on to the RAMDAC which converts it to a signal which can be
interpreted by your display.
Exercise
A peripheral is a device attached to a host computer but not part of it, and is more
or less dependent on the host. It expands the host's capabilities, but does not form
part of the core computer architecture. Whether something is a peripheral or part of
a computer is not always clearly demarcated. A video capture card inside a
computer case is not part of the core computer but is contained in the case.
However, whether something can be considered a peripheral or not is a trivial
matter of nomenclature, and is not a significant issue.
Examples are computer printers, image scanners, tape drives, microphones,
loudspeakers, webcams, and digital cameras.
Input Devices
Computer peripherals are devices that are used to introduce data into the computer
system are known as input devices. is any peripheral (piece of computer hardware
equipment) used to provide data and control signals to an information processing
system (such as a computer).As data is introduced to the computer system it is
converted from analog to digital form, the form in the computer operates.
Examples of Input Devices:
1. Keyboard:- One of the main input devices used on a computer, a PC's
keyboard looks very similar to the keyboards of electric typewriters, with some
additional keys. Below is a graphic of the Saitek Gamers' keyboard with indicators
pointing to each of the major portions of the keyboard.
Finally, today most users use the QWERTY style keyboards. Below is a graphic
illustration of where each of the keys are on a U.S. QWERTY style keyboard.
3. Barcode reader:- Lines of different widths and sizes representing data that,
when read, will determine what the scanned object is. Bar codes are often used to
help organize and be able to index information or prices about an object. Another
example of how barcodes are used are the barcodes used by the US postal service
that helps speed the delivery of mail. Below is an example of what a barcode for an
address may look like.
4. Joystick:- An input device that looks similar to a control device you would find
on an arcade game at your local arcades. A joystick allows an individual to easily
move an object in a game such as navigating a plane in a flight simulator. The
picture to the right is of the Logitech Freedom 2.4 joystick and an example of what
a Joystick may look like.
6. Digital camera:- A type of camera that stores the pictures or video it takes in
electronic format instead of to film. There are several features that make digital
cameras a popular choice when compared to film cameras. First, the feature often
enjoyed the most is the LCD display on the digital camera. This display allows users
to view photos or video after the picture or video has been taken, which means if
you take a picture and don't like the results, you can delete it; or if you do like the
picture, you can easily show it to other people. Another nice feature with digital
cameras is the ability to take dozens, sometimes hundreds of different pictures. To
Output Devices
An output device is any piece of computer hardware equipment used to
communicate the results of data processing carried out by an information
processing system (such as a computer) to the outside world.
In computing, input/output, or I/O, refers to the communication between an
information processing system (such as a computer), and the outside world. Inputs
are the signals or data sent to the system, and outputs are the signals or data sent
by the system to the outside.
Examples of output devices:
Speaker: - Computers produce audio data that require output devices such as
speakers and headphones to deliver the sound to the user. Audio data is created by
the computer and then sent to the audio card, which is located in an expansion slot.
The card translates the data into audio signals, which are sent to the audio output
device.
Headphones: - are a pair of small loudspeakers, or less commonly a single
speaker, with a way of holding them close to a user's ears and a means of
connecting them to a signal source such as an audio amplifier, radio or CD player.
They are also known as stereophones, headsets or, colloquially cans. The in-ear
versions are known as earphones or earbuds. In the context of
telecommunication, the term headset is used to describe a combination of
headphone and microphone used for two-way communication, for example with a
telephone.
Screen (Monitor):- or display (sometimes called a visual display unit) is an
electronic visual display for computers. The monitor comprises the display device,
circuitry, and an enclosure. The display device in modern monitors is typically a thin
film transistor liquid crystal display (TFT-LCD), while older monitors use a cathode
ray tube (CRT).
Printer: -
Types of Printer
A printer is an output device that produces text and graphics on paper.
Major types of printer
Printers can be divided into two main groups, impact printer and non-impact
printer. Impact printer produces text and images when tiny wire pins on print
head strike the ink ribbon by physically contacting the paper. Non-impact printer
produces text and graphics on paper without actually striking the paper.
Printers can also be categorized based on the print method or print technology.
The most popular ones are inkjet printer, laser printer, dot-matrix printer and
thermal printer. Among these, only dot-matrix printer is impact printer and the
others are non-impact printers.
Printer Technologies:
Inkjet Printers
Inkjet printers are non-impact printers which print text and images by spraying tiny
droplets of liquid ink onto paper. They are the most popular printers for home use.
Currently, most inkjet printers use either thermal inkjet or piezoelectric inkjet
technology. Thermal inkjet printer uses heating element to heat liquid ink to form
vapor bubble, which forces the ink droplets onto the paper through the nozzle.
Most inkjet manufacturers use this technology in consumer inkjet printers.
Piezoelectric inkjet technology is used on all Epson printers and industrial inkjet
printers. Instead of using heating element, these printers use a piezoelectric
crystal in each nozzle. The piezoelectric crystal changes shape and size based on
the electric current received, and forces tiny droplets of ink onto the paper from the
nozzle.
Thermal inkjet printers use aqueous ink which is a mixture of water, glycol and
dyes. These inks are inexpensive but they can only be used on paper or specially
coated materials. Piezoelectric inkjet printers allow the use of a wider range of
inks, such as solvent inks, UV-curable inks, dye sublimation inks, and can print text
and graphics on different uncoated materials.
The inkjet head design is also divided into two main groups: fixed-head and
disposable head. Fixed-head is built into the printer and should last for the whole
life of the printer. It produces more accurate output than cheap disposable head.
The ink cartridges for fixed head printers are also cheaper as the print head does
not need to be replaced. However, if the head is damaged, the entire printer has to
be replaced.
Some printer manufacturers use disposable ink and disposable print head
separately. The print head can last much longer than cheap disposable head and is
suitable for high volume printing. However, it can also be replaced easily if the
head is clogged or damaged.
Although inkjet printers are generally used in home and small businesses, some
manufacturers, such as Hewlett Packard, have produced high end inkjet printers for
industrial use. These professional inkjet printers are usually used to print
advertising graphics or technical drawings.
1) Low cost
4) Easy to use
5) Reasonably fast
7) No warm up time
5) Ink bleeding, ink carried sideways causing blurred effects on some papers
6) Aqueous ink is sensitive to water, even a small drop of water can cause
blurring
30 Compiled by ICT Department©2011 KWEKWE POLYTECHNIC
7) Cannot use highlighter marker on inkjet printouts
Many consumer inkjet printers are selling at very low price (under $100) these
days. It is the printer manufacturer’s marketing strategy to reduce the price of the
printers but dramatically mark up the price of replacement cartridges. However,
consumers still have the options to buy cheap compatible and remanufactured
inkjet cartridges or ink refill kits to cut down printing cost.
Laser printers
Laser Printers
Laser printers are non-impact printers which can print text and images in high
speed and high quality resolution, ranging from 600 to 1200 dpi.
Unlike inkjet printers, laser printer use toner (black or colored powder) instead of
liquid inks. A laser printer consists of these major components: drum cartridge,
rotating mirror, toner cartridge and roller. The drum cartridge rotates as the paper
is fed through. The mirror deflects laser beam across the surface of the drum.
Laser beam creates charge that causes the toner to stick to the drum. As the drum
rotates and presses on paper, toner is transferred from the drum to paper, creating
images. Rollers then use heat and pressure to fuse toner to paper. Colored laser
printers add colored toner in three additional passes.
1) High resolution
3) No smearing
Dot-matrix printer
Dot-matrix printer is an impact printer that produces text and graphics when tiny
wire pins on the print head strike the ink ribbon. The print head runs back and
forth on the paper like a typewriter. When the ink ribbon presses on the paper, it
creates dots that form text and images. Higher number of pins means that the
printer prints more dots per character, thus resulting in higher print quality.
Dot-matrix printers were very popular and the most common type of printer for
personal computer in 70’s to 80’s. However, their use was gradually replaced by
inkjet printers in 90’s. As of today, dot matrix printers are only used in some point-
of-sales terminals, or businesses where printing of carbon copy multi-part forms or
data logging are needed.
4) Reliable, durable
1) Noisy
Thermal printers
Thermal printers are often used in cash registers, ATM and point-of-sales
terminals. Direct thermal printing was used in some older fax machines before the
21st century. However, these old models are now replaced by new machines which
use laser and inkjet printing. Thermal printing is still considered as the best
technology for bar code printing because it produces accurate, high quality images
with exact bar widths. Some portable printers and most label printers still use
thermal printing method.
Thermal printer is not the same as thermal inkjet printer. The latter uses inkjet
print technology by heating liquid ink to form vapor bubble, which forces the ink
droplet onto the paper from the nozzle.
Specialty Printers
Photo printer
Photo printers are color printers that produce photo lab quality pictures on photo
paper. They can also be used to print documents. These printers have a very high
number of nozzles and can print very fine droplets for improved image quality.
Some photo printers also have media card readers. They can print 4‖ x 6‖ photos
directly from the media card of digital cameras without a computer in between.
Theoretically, most inkjet printers and high end laser printers are capable of
printing high quality pictures. Sometimes, these printers are marketed as ―photo
printers‖. However, a dedicated photo printer is designed to print photos effectively
and economically. Apart from a higher number of nozzles and very fine droplets,
these printers also use additional cartridges, such as photo cyan, light magenta and
Multifunction printer is very popular in SoHo (small office / home office) offices. It
can use either inkjet or laser print method. Some multifunction printers also have
media card readers, allowing printing of pictures directly from digital cameras
without using a computer.
3) The print quality and speed may be lower than some stand alone
components
Exercise
i) Mouse
The operating system makes these interfacing functions along with its other
functions operate smoothly and these functions are mostly transparent to the
user.
System crashes and instabilities - These can happen due to a software bug
typically in the operating system, although computer programs being run
on the operating system can make the system more unstable or may even
crash the system by themselves. This varies depending on the type of
operating system. A system crash is the act of a system freezing and
becoming unresponsive which would cause the user to need to reboot.
Security flaws - Some software errors leave a door open for the system to
be broken into by unauthorized intruders. As these flaws are discovered,
unauthorized intruders may try to use these to gain illegal access to your
system. Patching these flaws often will help keep your computer system
secure. How this is done will be explained later.
Sometimes errors in the operating system will cause the computer not to
work correctly with some peripheral devices such as printers.
There are many types of operating systems. The most common is the Microsoft
suite of operating systems. They include from most recent to the oldest:
There are other worthwhile types of operating systems not made by Microsoft. The
greatest problem with these operating systems lies in the fact that not as many
application programs are written for them. However if you can get the type of
application programs you are looking for, one of the systems listed below may be a
good choice.
Unix - A system that has been around for many years and it is very stable. It
is primary used to be a server rather than a workstation and should not be
used by anyone who does not understand the system. It can be difficult to
learn. Unix must normally run an a computer made by the same company
that produces the software.
Linux - Linux is similar to Unix in operation but it is free. It also should not be
used by anyone who does not understand the system and can be difficult to
learn.
Apple MacIntosh - Most recent versions are based on Unix but it has a good
graphical interface so it is both stable (does not crash often or have as many
software problems as other systems may have) and easy to learn. One
drawback to this system is that it can only be run on Apple produced
hardware.
Understanding file names and organization will make using your computer less
stressful and more efficient. This knowledge will help in managing
Files are organized by using folders (directories) on a physical location — just like
paper documents within folders in file cabinet drawers.
File
Each letter, slide show, spreadsheet, or database you create is stored as a file.
Every file saved has a filename. You can use multiple words for the filename; for
example, Letter to Sam. Do NOT use special characters, \ / : * ? " < > | .
Every file also has a three-letter extension, assigned by the Windows system, that
associates it with a specific program. For example, a WordPerfect complete file
name would be "Letter to Sam.wpd" and a Word file name would be "Letter to
Sam.doc".
Folder
You can store or organize similar types of files within a folder. You create as many
folders and subfolders as you need. Folders organize the files in a logical manner,
like using manila folders inside hanging folders to organize paper documents in a
file cabinet drawer. A good place to put your folders and files is in the "My
Documents" folder on your local hard drive — to provide easy backup.
Disk drive
The physical location where folders and files can be found. A disk drive name
consists of a single letter and a colon.
Drive A: = First floppy disk drive
Drive C: = First hard disk drive
Drive D - Z: = optional drives (2nd hard drive, CD-ROM or DVD drive, ZIP drive,
and network drives)
Path name
The complete name of your file on a computer actually includes the path name. A
path simply describes where a file is located on your computer or the network. The
path name lists the drive (such as the hard disk, floppy disk, or CD-ROM) and folder
that contains your data file. When you use the Recycle Bin or Find/Search feature,
you will see the path name listed for each file.
To start Windows Explorer, click on the Start button and select Programs. In
Windows 98, next click on Windows Explorer to start the program. In Windows
2000 & XP, click on Accessories, then Windows Explorer. Or, you can use a shortcut
to open the Windows Explorer program — right-click on the My Computer icon on
your Desktop and choose Explore from the Shortcut menu.
NOTE for Windows XP users: To see the My Computer icon on the desktop, you may
need to change the Start menu to the "Classic" view. Right-click on the Start button
and select Properties from the Shortcut menu. Select "Classic Start Menu" and click
the OK button.
The Explorer window has two panes: the " Folders" pane, on the left, showing you
all connected drives (under My Computer) and folders on one drive and the
"Contents" pane, on the right, showing the contents of the selected drive or folder.
To expand the view of a drive or folder in the "Folders" pane, click on the + symbol
next to it and you will see more detail in the hierarchical view. To see the contents
of a folder, click once on the name or folder icon.
Depending on your version of Windows and changes you have made to the View
option, you will see your files and folders shown in different ways. Figure 1 above
shows the Windows Classic look with the "Details" View option. To get the Classic
look,
in Windows 98, uncheck the as Web Page option on the View menu.
in Windows 2000, select Tools > Folder Options from the menu. Then select
the Use Windows classic folders option in the "Web View" section (second set
of options) in the General tab area. Next select the View tab and check (turn-
on) the option to Display the full path in the address bar.
Windows XP requires no changes.
The preferred Contents pane view is the Details option because you see the Name,
Size, Type (program association), and Modified (date and time) properties for each
file and folder. To see the Details View: Choose View > Details from the menu bar.
To make Windows use this view option as your default, you need to make one more
change. Go to Tools > Folder Options and select the View tab in the dialog box.
Then uncheck (turn off) the option to Remember each folder's view settings.
TIP: In the Details view, Explorer can automatically adjust all the columns to fit to
the width of the text. Click anywhere in the Contents pane, then hold down the
<Ctrl> key and press the <+> Plus key on the numeric keypad.
NOTE: The default setting of Windows Explorer is to NOT display the three-letter
extension of the file name. You don't need to see the extension because in the
Details view, the file "Type" column tells you the program associated with the file. If
you want to see the the file extension name, go to Tools > Folder options. In the
dialog box, select the View tab and select Hide file extensions for known file types
to turn it off (uncheck).
1. Select the location for the folder. For example, select the "My Documents"
folder to create a subfolder within My Documents. Putting all your files in
folders under My Documents will make it easier and quicker to make
backups. Choose File > New > Folder from the menu bar. Or, right-click on a
blank area of the Contents pane and choose New > Folder from the Shortcut
menu.
2. Type in a folder name and press the <Enter> key.
You can move or copy files by using the Cut/Copy/Paste procedure you are used to
using in your word processor. There are also other ways to move or copy files and
you can find information on those options in the Help index.
To select consecutive files or folders, click the first item, press and hold down
the <Shift> key, and then click the last item.
To select files or folders that are not consecutive, click the first item, press
and hold down the <Ctrl> key, and then click each additional item.
TIP: If you are copying files or folders to a disk or CD to make a backup, you may
want to check the total size of the files to make sure they will fit on the disk. After
selecting the files or folders, right-click on any selected item and choose Properties
from the Shortcut menu. In the Properties dialog box you will see the information
on the number of files, number of folders, and total size of all selected items. Click
OK. Copy your files if there is enough room on the disk.
To find a file:
If you don't remember where a file is located, you can use the Find feature in
Windows 98 and the Search feature in Windows 2000/XP.
Windows 98
1. Choose Tools > Find > Files or Folders from the menu bar. This will open a
separate window.
2. Enter part of the file name in the "Named" text box.
3. If you want to search the entire hard drive, make sure the "Look in" box is
showing (C:).
4. Click the Find Now button. for a partial listing of files and folders found using
"doc" as the search criteria. The files/folders will be listed in alphabetical
order within folders.)
Windows 2000/XP
The search results list can be sorted by any column. Click on the column heading
once to list in ascending order and again to list in descending order. To move a file
from the old folder to a new folder, follow the instructions under "To move files or
folders." To open a file to look at its contents, double-click on the file name.
NOTE for Windows 2000/XP users: Use the Back button on the Toolbar to go to the
previous list of files. You will need to click on the Folders button on the Toolbar to
see your list of drives and folders again in the left pane.
TIP: You can also find or search for a file by its content or search by a date range
without a file name. See the Help information for details.
If you deleted the wrong file, select Edit > Undo from the menu bar. The Undo
menu item will show the last function performed and if it isn't the "Delete" option,
you need to select multiple Undo's to get to the Delete choice. This retrieves the file
and places it in the original folder it was deleted from.
NOTE: The Undo option only works for the current session in the Windows Explorer
program. After you exit Windows Explorer, you will need to use the Recycle Bin to
restore deleted files or folders. Please see the next section.
Deleting a file or folder to the Recycle Bin does not permanently delete the file from
your local hard drive. The Recycle Bin allows you to restore deleted files. To
permanently delete the file and regain some hard drive space, you need to delete
the file(s) from the Recycle Bin.
1. Select the Recycle Bin icon inside Windows Explorer or open the Recycle Bin
on your desktop.
2. Select the file(s) to be deleted. NOTE: The column headings in the Recycle
Bin are active buttons, so you can sort the files to list the way it is easiest for
you to work with them.
3. Press <Delete> key (or right-click on the file or folder to be deleted and
choose Delete from the Shortcut menu).
4. Click Yes in the Confirm File Delete dialog box.
To delete all files at one time from the Recycle Bin, use the Empty Recycle Bin
option:
You can quickly create a desktop shortcut or QuickLaunch shortcut to this program
or other programs. The default QuickLaunch toolbar is a section of 3 or 4 icons on
the Taskbar next to the Start button. You only need to click once on these icons to
open the program.
NOTE for Windows XP users: If you don't see the QuickLaunch icons on the
Taskbar, right-click on the Taskbar and select Toolbars > QuickLaunch from the
Shortcut menu.
When you double-click on the shortcut icon you will open the program and the file
at the same time.
Keyboard shortcuts
These keyboard shortcuts simplify various operations and give your hand a rest
from using the mouse. Here's a list of selected shortcuts and their effects.
Application Software
Is the general designation of computer programs for performing user tasks.
Application software may be general purpose (word processing, web browsers, ...)
or have a specific purpose (accounting, truck scheduling, ...). Application software
contrasts with (2} system software, a generic term referring to the computer
programs used to start and run computer systems and networks; and (3)
programming tools, such as compilers and linkers, used to translate and combine
computer program source code and libraries into executable programs (programs
that will belong to one of the three said categories). Application software is a
subclass of computer software that employs the capabilities of a computer directly
and thoroughly to a task that the user wishes to perform. This should be contrasted
with system software which is involved in integrating a computer's various
capabilities, but typically does not directly apply them in the performance of tasks
that benefit the user.
In this context the term application refers to both the application software and its
implementation. A simple, if imperfect analogy in the world of hardware would be
the relationship of an electric light bulb (an application) to an electric power
generation plant (a system).
The power plant merely generates electricity, not itself of any real use until
harnessed to an application like the electric light that performs a service that
benefits the user. Typical examples of software applications are word processors,
spreadsheets, and media players. Multiple applications bundled together as a
package are sometimes referred to as an application suite.
Some might bundle together a word processor, a spreadsheet, and several other
discrete applications.
The separate applications in a suite usually have a user interface that has some
commonality making it easier for the user to learn and use each application.
And often they may have some capability to interact with each other in ways
beneficial to the user.
For example, a spreadsheet might be able to be embedded in a word processor
document even though it had been created in the separate spreadsheet application.
User-written software tailors systems to meet the user's specific needs.
User-written software include spreadsheet templates, word processor macros,
scientific simulations, graphics and animation scripts.
Even email filters are a kind of user software.
Users create this software themselves and often overlook how important it is. In
some types of embedded systems, the application software and the operating
system software may be indistinguishable to the user, as in the case of software
used to control a VCR, DVD player or Microwave Oven.
Among the least understood aspects of a computer’s operating system and function
has to do with memory. Many people assume that their computer only has one sort
and that it has limitless space available. When their computer begins to run
Fast, powerful CPUs need quick and easy access to enormous quantities of data in
order to maximize their performance. If the CPU can't get to the data it requires, it
literally halts and waits for it. Modern CPUs running at speeds of about 1 gigahertz
can run through massive quantities of data -- potentially billions of bytes per
second. The problem that computer designers confront is that memory that can
keep up with a 1-gigahertz CPU is exceedingly expensive -- much more expensive
than anyone can afford in large quantities. Computer designers have solved the
cost problem by "tiering" memory -- using expensive memory in small quantities
and then backing it up with larger quantities of less costly memory.
There are different types of computer memory designated to store different types of
data. They also have varied capabilities and specialties when it comes to storing
essential information inside the computer. The best known computer memory is the
RAM, also known as Random Access Memory. It's called random access because
any stored data can be accessed directly if you know the precise row and column
that intersect a certain memory cell. In this type of computer memory, data can be
accessed in any order. RAM’s exact opposite is called SAM or Serial Access Memory,
which stores data in a series of memory cells that can only be accessed in order. It
works very much like a cassette tape where you have to go through other memory
cells before accessing the data that you're seeking.
Secondary/Auxiliary storage
The storage devices are used to record the data over any storage surface. The
memories may also be of different types depending upon the architecture and the
design like the optical data storage memory, magnetic media storage and the
mechanical storage media etc and also the flash memory devices etc.
The data in the storage devices can be in the form of the files, databases, digital
video and the audio etc. The storage devices that are called as the non-volatile can
store the data permanently until otherwise erased purposely. This is in the case of
the hard disk drives or the floppy disk drives.
The other kinds of the storage media like for example the CD and the DVD can even
have again two types of the storage; the first one is that in which the data once
written cannot be erased. It is stored permanently over it. While the second type of
the CD’s or the DVD’s are called as the rewritable; where in the data that is once
written can be erased completely and the same storage device can be used again
for storing the different data.
1. Hard Drive
A hard disk drive (hard disk, hard drive, HDD) is a non-volatile storage device for
digital data. It features one or more rotating rigid platters on a motor-driven
spindle within a metal case. Data is encoded magnetically by read/write heads that
float on a cushion of air above the platters.
Hard disk manufacturers quote disk capacity in SI-standard powers of 1000,
wherein a terabyte is 1000 gigabytes and a gigabyte is 1000 megabytes. With file
systems that measure capacity in powers of 1024, available space appears
somewhat less than advertised capacity.
The first HDD was invented by IBM in 1956. They have fallen in cost and physical
size over the years while dramatically increasing capacity. Hard disk drives have
been the dominant device for secondary storage of data in general purpose
computers since the early 1960s. They have maintained this position because
advances in their areal recording density have kept pace with the requirements for
secondary storage. Form factors have also evolved over time from large standalone
boxes to today's desktop systems mainly with standardized 3.5-inch form factor
drives, and mobile systems mainly using 2.5-inch drives. Today's HDDs operate on
high-speed serial interfaces, i.e., Serial ATA (SATA) or Serial attached SCSI (SAS).
4. Floppy disks
A floppy disk is a data storage medium that is composed of a disk of thin, flexible
("floppy") magnetic storage medium encased in a square or rectangular plastic
shell.
Floppy disks are read and written by a floppy disk drive or FDD, [2] Invented by
the American information technology company IBM, floppy disks in 8 inch, 5¼ inch
and 3½ inch forms enjoyed nearly three decades as a popular and ubiquitous form
of data storage and exchange, from the mid-1970s to the late 1990s. While floppy
disk drives still have some limited uses, especially with legacy industrial computer
equipment, they have now been superseded by USB flash drives, external hard disk
drives, CDs, DVDs, Blu-Ray disc, memory cards and computer networks.
CD-ROMs are popularly used to distribute computer software, including games and
multimedia applications, though any data can be stored (up to the capacity limit of
a disc). Some CDs hold both computer data and audio with the latter capable of
being played on a CD player, while data (such as software or digital video) is only
usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called
enhanced CDs.
Although many people use lowercase letters in this acronym, proper presentation is
in all capital letters with a hyphen between CD and ROM. At the time of the
technology's introduction it had more capacity than computer hard drives common
at the time. The reverse is now true, with hard drives far exceeding CDs, DVDs and
Blu-ray, though some experimental descendants of it such as HVDs may have more
space and faster data rates than today's biggest hard drive.
CD-ROM discs are identical in appearance to audio CDs, and data are stored and
retrieved in a very similar manner (only differing from audio CDs in the standards
used to store the data). Discs are made from a 1.2 mm thick disc of polycarbonate
plastic, with a thin layer of aluminium to make a reflective surface. The most
common size of CD-ROM disc is 120 mm in diameter, though the smaller Mini CD
standard with an 80 mm diameter, as well as numerous non-standard sizes and
shapes (e.g., business card-sized media) are also available. Data is stored on the
disc as a series of microscopic indentations. A laser is shone onto the reflective
surface of the disc to read the pattern of pits and lands ("pits", with the gaps
between them referred to as "lands"). Because the depth of the pits is
approximately one-quarter to one-sixth of the wavelength of the laser light used to
read the disc, the reflected beam's phase is shifted in relation to the incoming
beam, causing destructive interference and reducing the reflected beam's intensity.
This pattern of changing intensity of the reflected beam is converted into binary
data.
CPU stands for central processing unit. Overall a personal computer can be divided
into the following major parts from point of view of functions performed:
Many times in common language the CPU term is used for the computer box unit
which contains motherboard, processor, hard disk, CD/DVD and floppy drives. This
is the box to which we connect monitor, keyboard, mouse and printer through
cables. In technical terms the term CPU is used only for the processor, which fits on
the motherboard.
Central Processing Unit (CPU), in computer science, microscopic circuitry that
serves as the main information processor in a computer. A CPU is generally a single
microprocessor made from a wafer of semiconducting material, usually silicon, with
millions of electrical components on its surface. On a higher level, the CPU is
actually a number of interconnected processing units that are each responsible for
one aspect of the CPU's function. Standard CPUs contain processing units that
interpret and implement software instructions, perform calculations and
comparisons, make logical decisions (determining if a statement is true or false
based on the rules of Boolean algebra), temporarily store information for use by
another of the CPU's processing units, keep track of the current step in the
execution of the program, and allow the CPU to communicate with the rest of the
computer.
A CPU is similar to a calculator, only much more powerful. The main function of the
CPU is to perform arithmetic and logical operations on data taken from memory or
on information entered through some device, such as a keyboard, scanner, or
joystick. The CPU is controlled by a list of software instructions, called a computer
program. Software instructions entering the CPU originate in some form of memory
storage device such as a hard disk, floppy disk, CD-ROM, or magnetic tape. These
instructions then pass into the computer's main random access memory (RAM),
where each instruction is given a unique address, or memory location. The CPU can
access specific pieces of data in RAM by specifying the address of the data that it
wants.
As a program is executed, data flow from RAM through an interface unit of wires
called the bus, which connects the CPU to RAM. The data are then decoded by a
processing unit called the instruction decoder that interprets and implements
software instructions. From the instruction decoder the data pass to the
arithmetic/logic unit (ALU), which performs calculations and comparisons. Data may
be stored by the ALU in temporary memory locations called registers where it may
be retrieved quickly. The ALU performs specific operations such as addition,
multiplication, and conditional tests on the data in its registers, sending the
resulting data back to RAM or storing it in another register for further use. During
this process, a unit called the program counter keeps track of each successive
instruction to make sure that the program instructions are followed by the CPU in
the correct order.
Arithmetic Logic
Mathematician John von Neumann proposed the ALU concept in 1945, when he
wrote a report on the foundations for a new computer called the EDVAC. Research
into ALUs remains an important part of computer science, falling under Arithmetic
and logic structures in the ACM Computing Classification System.
File systems are used on data storage devices such as hard disks or CD-ROMs to
maintain the physical location of the files. Beyond this, they might provide access to
data on a file server by acting as clients for a network protocol (e.g., NFS, SMB, or
9P clients), or they may be virtual and exist only as an access method for virtual
data (e.g., procfs). It is distinguished from a directory service and registry.
Most file systems make use of an underlying data storage device that offers access
to an array of fixed-size physical sectors, generally a power of 2 in size (512 bytes
or 1, 2, or 4 KiB are most common). The file system is responsible for organizing
these sectors into files and directories, and keeping track of which sectors belong to
which file and which are not being used. Most file systems address data in fixed-
sized units called "clusters" or "blocks" which contain a certain number of disk
sectors (usually 1-64). This is the smallest amount of disk space that can be
allocated to hold a file. However, file systems need not make use of a storage
File names
A file name (or filename) is a name assigned to a file in order to secure storage
location in the computer memory. Whether the file system has an underlying
storage device or not, file systems typically have directories which associate file
names with files, usually by connecting the file name to an index in a file allocation
table of some sort, such as the FAT in a DOS file system, or an inode in a Unix-like
file system. Directory structures may be flat, or allow hierarchies where directories
may contain subdirectories. In some file systems, file names are structured, with
special syntax for filename extensions and version numbers. In others, file names
are simple strings, and per-file metadata is stored elsewhere.
Metadata
Other bookkeeping information is typically associated with each file within a file
system. The length of the data contained in a file may be stored as the number of
blocks allocated for the file or as an exact byte count. The time that the file was last
modified may be stored as the file's timestamp. Some file systems also store the
file creation time, the time it was last accessed, and the time the file's meta-data
was changed. (Note that many early PC operating systems did not keep track of file
times.) Other information can include the file's device type (e.g., block, character,
socket, subdirectory, etc.), its owner user-ID and group-ID, and its access
permission settings (e.g., whether the file is read-only, executable, etc.).
Arbitrary attributes can be associated on advanced file systems, such as NTFS, XFS,
ext2/ext3, some versions of UFS, and HFS+, using extended file attributes. This
feature is implemented in the kernels of Linux, FreeBSD and Mac OS X operating
systems, and allows metadata to be associated with the file at the file system level.
This, for example, could be the author of a document, the character encoding of a
plain-text document, or a checksum.
The hierarchical file system (not to be confused with Apple's HFS) was an early
research interest of Dennis Ritchie of Unix fame; previous implementations were
restricted to only a few levels, notably the IBM implementations, even of their early
databases like IMS. After the success of Unix, Ritchie extended the file system
concept to every object in his later operating system developments, such as Plan 9
and Inferno.
A disk file system is a file system designed for the storage of files on a data storage
device, most commonly a disk drive, which might be directly or indirectly connected
to the computer. Examples of disk file systems include FAT (FAT12, FAT16, FAT32,
exFAT), NTFS, HFS and HFS+, HPFS, UFS, ext2, ext3, ext4, btrfs, ISO 9660, ODS-
5, Veritas File System, VMFS, ZFS, ReiserFS, Linux SWAP and UDF. Some disk file
systems are journaling file systems or versioning file systems.
ISO 9660 and Universal Disk Format are the two most common formats that target
Compact Discs and DVDs. Mount Rainier is a newer extension to UDF supported by
Linux 2.6 series and Windows Vista that facilitates rewriting to DVDs in the same
fashion as has been possible with floppy disks.
A flash file system is a file system designed for storing files on flash memory
devices. These are becoming more prevalent as the number of mobile devices is
increasing, and the capacity of flash memories increase.
While a disk file system can be used on a flash device, this is suboptimal for several
reasons:
Erasing blocks: Flash memory blocks have to be explicitly erased before they
can be rewritten. The time taken to erase blocks can be significant, thus it is
beneficial to erase unused blocks while the device is idle.
Random access: Disk file systems are optimized to avoid disk seeks
whenever possible, due to the high cost of seeking. Flash memory devices
impose no seek latency.
Wear levelling: Flash memory devices tend to wear out when a single block is
repeatedly overwritten; flash file systems are designed to spread out writes
evenly.
Log-structured file systems have many of the desirable properties for a flash file
system. Such file systems include JFFS2 and YAFFS.
A tape file system is a file system and tape format designed to store files on tape in
a self-describing form. Magnetic tapes are sequential storage media, posing
challenges to the creation and efficient management of a general-purpose file
system. IBM has recently announced a new file system for tape called the Linear
A recent concept for file management is the idea of a database-based file system.
Instead of, or in addition to, hierarchical structured management, files are identified
by their characteristics, like type of file, topic, author, or similar metadata.
Some programs need to update multiple files "all at once." For example, a software
installation may write program binaries, libraries, and configuration files. If the
software installation fails, the program may be unusable. If the installation is
upgrading a key system utility, such as the command shell, the entire system may
be left in an unusable state.
[12marks]
There are different types of computer memory designated to store different types of
data. They also have varied capabilities and specialties when it comes to storing
essential information inside the computer. The best known computer memory is the
RAM, also known as Random Access Memory. It's called random access because
any stored data can be accessed directly if you know the precise row and column
that intersect a certain memory cell. In this type of computer memory, data can be
The primary storage section (also called internal storage, main storage, main
memory, or just memory) serves four purposes: .
To hold data transferred from an I/O device to the input storage area, where it
remains until the computer is ready to process it.
To hold both the data being processed and the intermediate results of the
arithmetic-logic operations. This is a working storage area within the
storage section. It is sometimes referred to as a scratch pad memory. .
To hold the program statements transferred from an I/O device. This area is called
the program storage area.
Other types of computer memory include the ROM or Read Only Memory. ROM is an
integrated circuit already programmed with precise data that can't be altered or
changed, hence the name ―Read Only‖. There is also another type of computer
memory called Virtual Memory. This type of memory is a common element in most
operating systems and desktops. It helps the computers RAM to be freed up with
inactive applications to make way for loading current applications being used. It
works merely by checking for data stored in RAMnot being used recently and have
it stored in the computer’s hard disk, thereby freeing useful space in RAM for
Another type of computer memory that has made computers process tasks faster is
what is known as cache memory. Caches are configured to relieve this bottleneck
by making the data used most often by the CPU instantly available. This is achieved
by establishing a small amount of memory, known as primary or level 1 cache,
right into the CPU. Level 1 cache is very small, normally ranging between 2
kilobytes (KB) and 64 KB. The secondary or level 2 cache usually resides on a
memory card situated near the CPU. The level 2 cache has a direct connection to
the CPU. A dedicated integrated circuit on the motherboard, the L2 controller,
governs the use of the level 2 cache by the CPU. Depending on the CPU, the size of
the level 2 cache ranges from 256 KB to 2 megabytes (MB). In most systems, data
required by the CPU is accessed from the cache roughly 95 percent of the time,
greatly reducing the overhead required when the CPU has to wait for data from the
main memory.
Beyond operating system needs, the amount of RAM necessary depends on the
applications to be run. For instance, heavy graphics, real time video, and such need
more RAM to keep matters from slowing to a crawl or halt. Typically, off-the-rack
machines come with 4 to 8MB, more than adequate for a general purpose
computer.
Random Access
Sequential Access
The average time lag between a request for information stored on a particular
component, such as the hard drive or RAM, and its delivery.
Exercise
1. Highlight any three difference between the main memory and the
backing storage [6marks]
i) Sequential access
ii) Random access [10marks]
3. Describe the following types of computer memory
i) RAM
ii) ROM
iii) Cache [12marks]
Arithmetic logic unit is that part of the computer which performs the different
logic operations and arithmetic calculations like addition, subtraction, multiplication
and division. It is the high speed digital circuit that solves calculations and does
comparisons.
• Almost all the actions of the computer are done by it. It gets its data from a
certain computer memory called processor register . After the data gets
processed, its results get stored in output registers of the arithmetic logic unit .
• The arithmetic logic unit can perform integer arithmetic operations like
addition, subtraction, etc.
• It can also perform bitwise logic operations like AND, OR, XOR, etc.
• The arithmetic logic unit performs bit-shifting operations like rotating or shifting
a certain word to either the left or the right by a given number of bits. These can
also be represented as divisions by 2 and also multiplications by 2. These are the
simple operations carried out by the arithmetic logic unit .
Most of a processor's operations are performed by one or more ALUs. An ALU loads
data from input registers, an external Control Unit then tells the ALU what
operation to perform on that data, and then the ALU stores its result into an output
register. Other mechanisms move data between these registers and memory.
Modern data centers try to use economizer cooling, where they use outside air to
keep the data center cool. Washington state now has a few data centers that cool
all of the servers using outside air 11 months out of the year. They do not use
chillers/air conditioners, which creates potential energy savings in the millions.
There are many types of commercially available floors that offer a wide range of
structural strength and loading capabilities, depending on component construction
and the materials used. The general types of raised floors include stringerless,
stringered, and structural platforms, all of which are discussed in detail in GR-2930
and summarized below.
Computer Security
Computer Crime
Computer Virus
A computer virus is created when a programmer creates computer code that has
the capability to replicate itself, hide, watch for a certain event to occur, and/or
deliver a destructive or prankish payload on a disk or in a computer program.
Viruses can attach themselves to just about any type of file and are spread as
infected files are used by other computers. Some viruses are relatively harmless,
while others are very devastating. They can destroy files, software, program
applications, and cause the loss of data.
Worms and Trojans are closely related to viruses. A worm makes copies of itself on
a computer, rather than infecting other files like viruses. A Trojan is a program that
secretly installs itself on a computer and opens a back door to the computer so that
malicious attacks can be remotely controlled. The actual Trojan is usually not
damaging at first, but it is usually accompanied by other damaging programs.
To protect your home computer against computer viruses, worms, and trojans, you
should invest in anti-virus software, such as the software offered by Norton or
McAfee. You should also make sure it stays up-to-date. Virus protection software on
school computers is regularly updated by the school system network technicians.
Viruses can enter computers in many ways. Once a virus has entered a system, it
will generally hide until it is unknowingly run by the user. A virus will not act until it
has been run or some pre-established condition has been met, such as a specific
date. The effects of a virus may not be noticed for some time after it has infected a
computer.
Viruses can infect several components of a computer's operating and file system
including:
Viruses are categorized by how they infect computers. Some viruses fall into more
than one of these categories.
The following are some possible indications that a computer has been infected by a
virus. These problems can also be caused by non-virus problems, but they are the
most reported symptoms of a computer virus infection.
There are several things you can do the help protect your computer against
viruses:
Exercise
1. The use of computers have health effects on the users. Outline any five (5)
health effects. [10marks]
b) Identify any four (4) indicators that show the presence of a virus on a
computers. [8marks]
[10marks]
Data processing is any process that uses a computer program to enter data and
summarise, analyse or otherwise convert data into usable information. The process
may be automated and run on a computer. It involves recording, analysing, sorting,
summarising, calculating, disseminating and storing data. Because data is most
useful when well-presented and actually informative, data-processing systems are
often referred to as information systems. Nevertheless, the terms are roughly
synonymous, performing similar conversions; data-processing systems typically
manipulate raw data into information, and likewise information systems typically
take raw data as input to produce information as output.
Data processing may or may not be distinguished from data conversion, when the
process is merely to convert data to another format, and does not involve any data
manipulation.
Data Processing (DP) makes use of powerful computer systems to collect and
process large volumes of data at high speed.
Banks and other organisations deal with millions of pieces of data each day.
DP is used for:
(iv) Information can be accessed very quickly and by many people at the same
time.
(v) Computer systems do repetitive tasks without getting bored, slowing down or
making error
Output Preparation of
CONTROL Data
If a decision has been made to provide a set input file specification for loading data
onto the target system, this allows a pre-load 'data validation' step to be put in
place
Preparation of Data
Data Verification is a process wherein the data is checked for accuracy and
inconsistencies after data origination is done.
For business applications, data validation can be defined through declarative data
integrity rules, or procedure-based business rules. Data that does not conform to
these rules must negatively affect business process execution. Therefore, data
validation should start with business process definition and set of business rules
within this process. Rules can be collected through the requirements capture
exercise.
Data Processing
In this step the input data are changed, and usually combined with other
information, to produce data is more useful form. Thus, paychecks may be
calculated from the time cards, or a summary of sales for the month maybe
calculated from the sales orders. The processing step usually involves a sequence of
certain basic processing operations.
Output
Here the results of the preceding processing steps are collected. The particular form
of the output data depends on the use of data.
Storage
Data is stored in some secondary memory storage awaiting future use or to be
communicated to other areas were it is suppose to be used as feedback or as input.
Validation methods
Checks that ascertain that only expected characters are present in a field.
For example a numeric field may only allow the digits 0-9, the decimal point
and perhaps a minus sign or commas. A text field such as a personal name
might disallow characters such as < and >, as they could be evidence of a
markup-based security attack. An e-mail address might require exactly one
@ sign and various other structural details. Regular expressions are effective
ways of implementing such checks. (See also data type checks below)
Batch totals
Checks for missing records. Numerical fields may be added together for all
records in a batch. The batch total is entered and the computer checks that
the total is correct, e.g., add the 'Total Cost' field of a number of transactions
together.
Checks that record has a valid number of related records. For example if
Contact record classified as a Customer it must have at least one associated
Order (Cardinality > 0). If order does not exist for a "customer" record then
it must be either changed to "seed" or the order must be created. This type
of rule can be complicated by additional conditions. For example if contact
record in Payroll database is marked as "former employee", then this record
must not have any associated salary payments after the date on which
employee left organisation (Cardinality = 0).
Check digits
Consistency checks
Checks fields to ensure data in these fields corresponds, e.g., If Title = "Mr.",
then Gender = "M".
Control totals
This is a total done on one or more numeric fields which appears in every
record. This is a meaningful total, e.g., add the total payment for a number
of Customers.
Exercise
1. State and explain the five(5) stages of the data processing cycle.
[10marks]
2. Give four advantages of electronic data processing [5marks]
Choosing software
How long has the company been around? Has it delivered its promises?
How steep is the learning curve? How easily can the software be integrated
with existing systems?
Is my data safe?
Features: What does the software do? Can it do the things you need it to do?;
Fit: How will the software fit in with other products that you use, and with your
organisation's IT strategy?;
Futures: Where is the market going? Is this product going to leave you in a
proprietary niche
or without support?;
Flexibility: What changes can you foresee for your organization? Do you need to
plan for
different needs or working practices?
Funds: What's your budget? Can you afford the product, the licenses, the training,
the
upgrades?
- Technical Factors
- Ease of Use
- Familiarity
- Security
Types of software
System software
System software provides the basic functions for computer usage and helps run the
computer hardware and system. It includes a combination of the following:
device drivers
operating systems
servers
utilities
window systems
Programming software
compilers
debuggers
interpreters
linkers
text editors
Application software
industrial automation
business software
video games
quantum chemistry and solid state physics software
telecommunications (i.e., the Internet and everything that flows on it)
databases
educational software
Mathematical software
medical software
molecular modeling software
image editing
spreadsheet
simulation software
Word processing
Integrated software
Integrated software is software for personal computers that combines the most
commonly used functions of many productivity software programs into one
application.The integrated software genre has been largely overshadowed by fully
functional office suites, most notably Microsoft Office. The integrated software
market of today is exemplified by entry-level programs such as Microsoft Works
which are often bundled with personal computers as "starter" productivity suites.
Advantages
1. When you purchase the product, you get everything you need all at the
same time.
2. They will work together quite efficiently to help you create quality
documents (for example you can embed Excel charts in Word or Powerpoint
documents. Or you can import Excel tables into Access (for databases).)
3. Standard GUI - learn one and you've got a great head start on the others.
4. The programs are smaller and all applications are together making it
easier to use.
6. By selling the software in packages, it will save the users the hassle of
installing the software one by one.
Disadvantages
1. You can't upgrade (or fix) just one part, as all the software is
intergrated into one application.
2. Another problem with intergrated software is that they usually have
have weak areas, meaning that they may have a brilliant word
processing application, but a below average spreedsheet program.
3. it also tend to lean towards the idea that because there are multiple
programs and utility software all complied together, they don't tend to
specialise in one section. When you have one company trying to
improve lots of different programs at once, the individual programs
tend advance at different rates. Though this shouldn't be the case with
multiple companies supporting the intergrated software set.
4. And to add it is also memory hungry, it takes up more space than an
average package
Advantages
Disadvantages
The software can be highly complex and will usually include large sections
that you will never use (the average Word user is reputed to only use about
10% of the available facilities).
It tends to be a compromise. By it's nature it is designed for many different
types of users, each of whom will have different requirements
As the software tends to be large and complicated it may take a long time to
learn properly (some of the most asked for additions to later versions of
Word were ones that already existed in the previous version!)
You may have to alter the way that you work in order to fit in with the way
that the software has been designed
There will probably be operations that you require that you simply cannot do
with the software
As one small voice amongst many others your requests will not carry much
weight
If you have problems you are usually at the mercy of a large and faceless
organisation who may not be quite as concerned as you are if you have a
major problem that absolutely MUST be fixed before tomorrow morning!
In-house software
In-House development means that a company has programmers on its staff and
develops software internally. When a company needs a piece of software written
they sometimes choose to use programmers within their own company to write it.
Advantages
It has been specifically designed for your particular requirements and can be
tailored to fit in exactly with the way that your business or organisation
wishes to operate.
It can be customised to interface with other software that you operate with
the potential to provide you with a fully integrated IT infrastructure across
your whole organisation
Users will usually find it easier and more intuitive to use as it should not
contain unnecessary or superfluous facilities and should operate in the way
that they are used to working
It is much more flexible than packaged software and can be modified and
changed over time as your requirements and business practices change
You will receive much better support and can in many cases talk directly to
the developers concerned
If you are lucky and find a good developer then they can significantly add
value to your company by suggesting alternatives, improvements and by
acting as a source of IT advice and information
The use of professionally developed bespoke software applications can give
you a significant business advantage over your competition
As an alternative to the point above, you have the option, assuming you own
the rights to the application to sell the application to others and recoup some
or all of your investment.
Disadvantages
If you pick the wrong developer you could end up with an application that is
unstable, unreliable and full of bugs (but then again so is some packaged
software!). Selecting a developer who works to Best Practice and industry
standards should counteract this.
The investment required will usually be much higher than with packaged
software. This is usually the biggest reason for not going down the custom
route - you need to undertake a business justification exercise and compare
the costs against the expected benefits and commercial advantages.
A large investment in your time is required during the development process
and a bespoke application will take longer to implement.
Contracted software
Contracted software operates on the basis of mutual obligations and benefits. The
metaphor comes from business life, where a "client" and a "supplier" agree on a
"contract" which defines for example that:
Advantages
It has been specifically designed for your particular requirements and can be
tailored to fit in exactly with the way that your business or organisation
wishes to operate.
It can be customised to interface with other software that you operate with
the potential to provide you with a fully integrated IT infrastructure across
your whole organisation
Users will usually find it easier and more intuitive to use as it should not
contain unnecessary or superfluous facilities and should operate in the way
that they are used to working
It is much more flexible than packaged software and can be modified and
changed over time as your requirements and business practices change
You will receive much better support and can in many cases talk directly to
the developers concerned
85 Compiled by ICT Department©2011 KWEKWE POLYTECHNIC
If you are lucky and find a good developer then they can significantly add
value to your company by suggesting alternatives, improvements and by
acting as a source of IT advice and information
The use of professionally developed bespoke software applications can give
you a significant business advantage over your competition
As an alternative to the point above, you have the option, assuming you own
the rights to the application to sell the application to others and recoup some
or all of your investment.
Disadvantages
If you do not have the source code you are dangerously exposed and are
wholly dependent upon the developer's continuing existence and good will.
To avoid this problem make sure you choose a developer who provides you
with the source code.
If you pick the wrong developer you could end up with an application that is
unstable, unreliable and full of bugs (but then again so is some packaged
software!). Selecting a developer who works to Best Practice and industry
standards should counteract this.
The investment required will usually be much higher than with packaged
software. This is usually the biggest reason for not going down the custom
route - you need to undertake a business justification exercise and compare
the costs against the expected benefits and commercial advantages.
A large investment in your time is required during the development process
and a bespoke application will take longer to implement.
It can be difficult to get support for bespoke software, unless the developers
themselves offer support services.
An unacceptable proportion of developers are either incompetent,
unprofessional or are 'cowboys' and it can be difficult to sort out the good
guys from the bad.
Exercise
What is a Network?
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
A Local Area Network (LAN) is a network that is confined to a relatively small area.
It is generally limited to a geographic area such as a writing lab, school, or building.
Rarely are LAN computers more than a mile apart.
Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may
be used to connect this type of network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter
of minutes, without paying enormous phone bills. A WAN is complicated. It uses
multiplexers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
Speed. Networks provide a very rapid method for sharing and transferring
files. Without a network, files are shared by copying them to memory cards
or discs, then carrying or sending the discs from one computer to another.
This method of transferring files (referred to as sneaker-net) can be very
time-consuming.
Cost. Networkable versions of many popular software programs are available
at considerable savings when compared to buying individually licensed
copies.
Security. Files and programs on a network can be designated as "copy
inhibit," so that you do not have to worry about illegal copying of programs.
Also, passwords can be established for specific directories to restrict access
to authorized users.
Centralized Software Management. One of the greatest benefits of
installing a network is the fact that all of the software can be loaded on one
computer (the file server). This eliminates that need to spend time and
energy installing updates and tracking files on independent computers
throughout the building.
Resource Sharing. Sharing resources is another advantage of networks.
Most schools cannot afford enough laser printers, fax machines, modems,
scanners, and CD players for each computer. However, if these or similar
peripherals are added to a network, they can be shared by many users.
Electronic Mail. The presence of a network provides the hardware
necessary to install an e-mail system. E-mail aids in personal and
professional communication for all personnel, and it facilitates the
dissemination of general information to the entire school staff. Electronic mail
on a LAN can enable students to communicate with teachers and peers at
their own school. If the LAN is connected to the Internet, students can
communicate with others throughout the world.
Flexible Access. College networks allow students to access their files from
computers throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, then go to
the media center after school to finish their work. Students can also work
cooperatively through the network.
Workgroup Computing. Collaborative software allows many users to work
on a document or project concurrently. For example, educators located at
various schools within a county could simultaneously contribute their ideas
about new curriculum standards to the same document, spreadsheets, or
website.
Network Hardware
The network interface card (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, and they are
included in the purchase of most computers. Network interface cards are a major
factor in determining the speed and performance of a network. It is a good idea to
use the fastest network card available for the type of workstation you are using.
The most common network interface connections are Ethernet cards (LocalTalk
connectors and Token Ring cards are seldom used in current networks).
Ethernet Cards
Ethernet cards are usually purchased separately from a computer, although many
computers (such as the Macintosh) now include an option for a pre-installed
Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair
cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will
be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some
Ethernet cards also contain an AUI connector. This can be used to attach coaxial,
twisted pair, or fiber optics cable to an Ethernet card. When this method is used
there is always an external transceiver attached to the workstation. (See the
Cabling section for more information on connectors.)
Token Ring network cards look similar to Ethernet cards and were popular in IBM
computers. They are seldom used with current networks.
Switches
A concentrator is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run
from each workstation to a central switch/hub. Most switches are active, that is
they electrically amplify the signal as it moves from one device to another. Switches
no longer broadcast network packets as hubs did in the past, they memorize
addressing of computers and send the information to the correct location directly.
Switches are:
Repeaters
A good example of the use of repeaters would be in a local area network using a
star topology with unshielded twisted-pair cabling. The length limit for unshielded
twisted-pair cable is 100 meters. The most common configuration is for each
workstation to be connected by twisted-pair cable to a multi-port active
concentrator. The concentrator amplifies all the signals that pass through it allowing
for the total length of cable on the network to exceed the 100 meter limit.
A bridge is a device that allows you to segment a large network into two smaller,
more efficient networks. If you are adding to an older wiring scheme and want the
new network to be up-to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location. Most bridges can "listen" to the
network and automatically figure out the address of each computer on both sides of
the bridge. The bridge can inspect each message and, if necessary, broadcast it on
the other side of the network.
The bridge manages the traffic to maintain optimum performance on both sides of
the network. You might say that the bridge is like a traffic cop at a busy
intersection during rush hour. It keeps information flowing on both sides of the
network, but it does not allow unnecessary traffic through. Bridges can be used to
connect different types of cabling, or physical topologies. They must, however, be
used between networks with the same protocol.
Routers
While bridges know the addresses of all computers on each side of the network,
routers know the addresses of computers, bridges, and other routers on the
network. Routers can even "listen" to the entire network to determine which
sections are busiest -- they can then redirect data around those sections until they
clear up.
If you have a school LAN that you want to connect to the Internet, you will need to
purchase a router. In this case, the router serves as the translator between the
information on your LAN and the Internet. It also determines the best route to send
the data over the Internet. Routers can:
Bus
Star
Ring
The Bus Topology
The bus topology is the simplest and most commonly used topology for networking
computers. It is also known as a linear bus because computers are attached of
connected to a single linear cable called a trunk or backbone. Computers on the bus
network communicate by sending packets of data to each other. A computer will
send a packet of data to all computers on the network (broadcast). Each computer
listens and examines every packet on the wire to determine if the packet is
intended for it, and accepts only packets addressed to it. The bus topology is a
passive topology because computers on the network are not actively involved in the
movement of data. On an active topology computers regenerate the data signals
and pass the signal to the next computer on the network. The number of computers
on the network affects network performance. Performance degrades as more
computers are added to the bus network.
Backbone/trunk
Terminator Terminator
Star Topology
Advantages
Ring Topology
On a ring topology, computers are connected one node to other by a single cable
forming a circle. Computers on the ring network use a signal called a token to carry
the data from one computer to the other. The access method used by the
computers to put data on the communication medium is called token passing.
Unlike the bus topology, the ring is an active topology. Each computer on the ring
acts as a repeater to boost the signal and pass it to the next computer until it
reaches the destination computer. The receiving computer strips the data from the
token and returns the token to the sending computer with an acknowledgement.
After verification, the token is regenerated and release for use by any other
computer requiring data transfer. While the token is in use by one computer, other
computers on the ring cannot transmit, because only the computer with the token
can transmit data. This ensures that there are nom collisions and hence no times
spend waiting for computers to resend data after a collision.
Advantages
All computers have equal access to data. During peak usage performance is
even for all users. Ring networks perform well with heavy network traffic.
Mesh Topology
Apart from the three primary topologies, we also have the mesh topology. The
mesh topology connects each computer to every other computer on the network
(each computer has a point-to-point connection to every other computer on the
network). Meshes use a significantly larger amount of network cabling than the
other network topologies, which makes it more expensive. Every computer has
multiple possible connection paths to the other computers on the network for
redundancy. As a result, a single cable break will not stop network communications
between any two computers.
The total number of connections required can be calculated using the following
formula:
Ethics, in the classical sense, refers to the rules and standards governing the
conduct of an individual with others. As technology and computers became more
and more a part of our everyday lives, we must understand that the problems that
have always plagued business and conduct will continue to be a problem. In fact, a
new medium can provide even more difficult questions of judgment. In other
words, since the introduction of the World Wide Web, the definition of ethics has
evolved, too. A new type of ethics known as computer ethics has emerged.
Computer ethics is concerned with standards of conduct as they pertain to
computers. Overall, this seems rather a lightweight introduction to a subject
crawling with deep complexities, but since I was recently asked by a student for
just such a publication, it may be one whose time has come.
(1) Unauthorized and illegal database entry, surveillance and monitoring, and
privacy issues;
(5) Social consequences of robotics and the automated office, human skill
obsolescence, and job displacement;
You must Use only the computers, computer accounts and computer files
for which you have authorization.
Do not use another individual's ID or account, or attempt to capture or guess
other users' passwords.
Users are individually responsible for all use of resources assigned to them;
therefore, sharing of accounts is prohibited.
Respect the privacy and personal rights of others. Do not access or copy
another user's e-mail, data, programs, or other files without permission.
Always ensure that your connected computer has most up-to-date OS and
software patches.
Data protection
Data security is the means of ensuring that data is kept safe from corruption and
that access to it is suitably controlled. Thus data security helps to ensure privacy. It
also helps in protecting personal data.
Disk Encryption
Disk encryption refers to encryption technology that encrypts data on a hard disk
drive. Disk encryption typically takes form in either software (see disk encryption
software] or hardware (see disk encryption hardware). Disk encryption is often
referred to as on-the-fly encryption ("OTFE") or transparent encryption
Software based security solutions encrypt the data to prevent data from being
stolen. However, a malicious program or a hacker may corrupt the data in order to
make it unrecoverable or unusable. Similarly, encrypted operating systems can be
corrupted by a malicious program or a hacker, making the system unusable.
Hardware-based security solutions can prevent read and write access to data and
hence offers very strong protection against tampering and unauthorized access.
Backups
Data Masking
Data Masking of structured data is the process of obscuring (masking) specific data
within a database table or cell to ensure that data security is maintained and
sensitive customer information is not leaked outside of the authorized environment.
Data Erasure
International Laws
In the UK, the Data Protection Act is used to ensure that personal data is accessible
to those whom it concerns, and provides redress to individuals if there are
inaccuracies. This is particularly important to ensure individuals are treated fairly,
International Standards
The International Standard ISO/IEC 17799 covers data security under the topic of
information security, and one of its cardinal principles is that all stored information,
i.e. data, should be owned so that it is clear whose responsibility it is to protect and
control access to that data.
Software license
A software license is a legal instrument (by way of contract law) governing the
usage or redistribution of software. All software is copyright protected, irrespective
of whether it is in the public domain. Contractual confidentiality is another way of
protecting software. A typical software license grants an end-user permission to use
one or more copies of software in ways where such a use would otherwise
constitute copyright infringement of the software owner's exclusive rights under
copyright law.
Some software comes with the license when purchased off the shelf or an OEM
license when bundled with hardware. Software can also be in the form of freeware
or shareware. Software licenses can generally be fit into the following categories:
proprietary licenses and free and open source licenses, which include free software
licenses and other open source licenses. The features that distinguishes them are
significant in terms of the effect they have on the end-user's rights.
A free or open source license makes software free for inspection of its code,
modification of its code, and distribution. While the software released such a
license, like the GNU General Public License can be sold for money, the distribution
cannot be restricted in the same ways as software with copyright and patent
restrictions used by firms to require licensing fees.
Proprietary software
The hallmark of proprietary software licenses is that the software publisher grants a
license to use one or more copies of software, but that ownership of those copies
remains with the software publisher (hence use of the term "proprietary"). One
consequence of this feature of proprietary software licenses is that virtually all
rights regarding the software are reserved by the software publisher. Only a very
101 Compiled by ICT Department©2011 KWEKWE POLYTECHNIC
limited set of well-defined rights are conceded to the end-user. Therefore, it is
typical of proprietary software license agreements to include many terms which
specifically prohibit certain uses of the software, often including uses which would
otherwise be allowed under copyright law.
The most significant effect of this form of licensing is that, if ownership of the
software remains with the software publisher, then the end-user must accept the
software license. In other words, without acceptance of the license, the end-user
may not use the software at all.
One example of such a proprietary software license is the license for Microsoft
Windows. As is usually the case with proprietary software licenses, this license
contains an extensive list of activities which are restricted, such as: reverse
engineering, simultaneous use of the software by multiple users, and publication of
benchmarks or performance tests.
Open source licenses generally fall under two categories: Those that aim to
preserve the freedom and openness of the software itself ('copyleft' licenses), and
those that aim to give freedom to the users of that software (permissive licenses).
An example of a copyleft Free Software license is the GNU General Public License
(GPL). This license is aimed at giving the end-user significant permission, such as
permission to redistribute, reverse engineer, or otherwise modify the software.
These permissions are not entirely free of obligations for the end-user, however.
The end-user must comply with certain terms if the end-user wishes to exercise
these extra permissions granted by the GPL. For instance, any modifications made
and redistributed by the end-user must include the source code for these, and the
Examples of permissive free software licenses are the BSD license and the MIT
license, which essentially grant the end-user permission to do anything they wish
with the source code in question, including the right to take the code and use it as
part of closed-source software or software released under a proprietary software
license.
Other characteristics
In the United States, Section 117 of the Copyright Act gives the owner of a
particular copy of software the explicit right to use the software with a computer,
even if use of the software with a computer requires the making of incidental copies
or adaptations (acts which could otherwise potentially constitute copyright
infringement). Therefore, the owner of a copy of computer software is legally
entitled to use that copy of software. Hence, if the end-user of software is the
owner of the respective copy, then the end-user may legally use the software
without a license from the software publisher.
As many proprietary "licenses" only enumerate the rights that the user already has
under U.S.C 17, S 117, and yet proclaim to take rights away from the user, these
contracts may lack consideration. Proprietary software licenses often to proclaim to
give software publishers more control over the way their software is used by
keeping ownership of each copy of software with the software publisher. By doing
so, Section 117 does not apply to the end-user and the software publisher may
then compel the end-user to accept all of the terms of the license agreement, many
of which may be more restrictive than copyright law alone. It should be noticed that
the form of the relationship determines if it is a lease or a purchase,
This tutorial teaches Microsoft Word basics. Although knowledge of how to navigate
in a Windows environment is helpful, this tutorial was created for the computer
novice. To begin, open Microsoft Word. Your screen will look like the one shown
here.
Click the X in the upper right corner of the New Document pane to close the New
Document pane. Your screen will then look like the one shown here.
This lesson will familiarize you with the Microsoft Word screen. We will start with
the Title bar, which is located at the very top of the screen. On the Title bar,
Microsoft Word displays the name of the document on which you are currently
working. At the top of your screen, you should see "Microsoft Word - Document1"
or a similar name.
The Menu bar is generally found directly below the Title bar. The Menu bar displays
the menu. The Menu bar begins with the word File and continues with Edit, View,
Insert, Format, Tools, Table, Window, and Help. You use the menus to give
instructions to the software. Point with your mouse to a menu option and click the
left mouse button to open a drop-down menu. You can now use the left and right
arrow keys on your keyboard to move left and right across the Menu bar options.
You can use the up and down arrow keys to move up and down the drop-down
menu.
To select an option, click the option or use the arrow keys to move to the option on
the drop-down menu and press Enter. An ellipse or a right arrow after a menu item
signifies additional options; if you select that menu item, a dialog box appears.
Items in gray are not available.
You can customize your screen so that all of the menu options display when you
click a menu item. This tutorial assumes that your menu is set to display all menu
options. To customize your menu to display all of the menu options:
Toolbars
Toolbars provide shortcuts to menu commands. Toolbars are generally located just
below the Menu bar. Before proceeding with this lesson, make sure the toolbars you
will use -- Standard and Formatting -- are available. Follow these steps:
The Ruler
The ruler is generally found below the main toolbars. The ruler is used to change
the format of your document quickly. To display the ruler:
Document View
In Word, you can display your document in one of five views: Normal, Web Layout,
Print Layout, Reading Layout, or Online Layout.
Normal View
Normal view is the most often used and shows formatting such as line
spacing, font, point size, and italics. Word displays multiple-column text in
one continuous column.
Web Layout
Web layout view enables you to view your document as it would appear in a
browser such as Internet Explorer.
Print Layout
The Print Layout view shows the document as it will look when it is printed.
Reading Layout
Reading Layout view formats your screen to make reading your document
more comfortable.
Outline view
Tables
Now that we've covered how to insert tables and how to navigate within them, let's
cover some of the other issues that arise while working with tables.
The last issue covered the options of evenly distributing rows or columns.
You bet!
Adjusting the width of a column can be done by running your mouse pointer
over the vertical lines dividing the columns. When the pointer switches to a double-
sided arrow click and hold. Now you can drag the side of the column left or right,
creating whatever width you need.
Row height can also be adjusted in the same manner, using the divider line below
the row.
It is also important to mention that row height will automatically be increased when
text wraps within a cell. (Provided that you have not set the height using an exact
measurement under the Table menu, Cell Height and Width choice.)
Something that automatically expands to fit … hmm… ever wish your clothes would
do that?
Another way to set row height and column width is to click the Table menu, Cell
Height and Width choice. In the resulting window you will have a row or column
tab at the top to choose from. Keep in mind, changes set there will affect only the
row or column your cursor is currently in.
If only that worked in real life, highlight all rooms, vacuum one and they're all
vacuumed…in my dreams!
Within the cell of a table, the normal font formatting (font size, type, bold, italic,
underline, etc…) and alignments (left, center, right and justify) can be completed
using the ususal methods. In addition, you can choose where to place the text
within a cell of the table - known as Alignment. You can align text to the top of the
cell, the bottom or to the center. This option is extremely helpful with column
headings.
Other ways to access alignment options would include the Table menu, Cell
Height and Width (look at the bottom of the row tab) or right clicking on
selected cells and choosing Alignment from the pop up menu.
Once again, these changes will affect only the cell you are currently in or the cells
highlighted at the time the changes are set.
You can access this option in several ways. One of them is the Change Text
Direction button on the Tables and Borders toolbar.
Each click of the button will cycle through the possible changes for the text, finally
returning you to the original left to right text.
Another way would be to right click in the cell to be changed and use the Change
Text Direction option on the resulting pop up menu.
The fastest way would be to click in a cell and then choose one of the sorting
buttons on the Tables and Borders toolbar.
I would like to note that this method works best when you have only one
sort criteria. If you have multiple criteria, located in separate columns,
(such as by date and then by name) then you should use the next method.
The other option for sorting is in the Table menu, Sort choice.
A screen will open allowing you to choose your sorting options including the option
to set sorting criteria using multiple columns. You can tell Word to sort first on one
column and then for matching entries use a secondary column to determine order.
OK, so for today that was changing column width, row height, alignment, text
direction and data sorting. Whew! I'm tired after all that, how about you?
Importing objects
Step 1: Open the Excel spreadsheet that contains your data, or create a new
spreadsheet and enter your information. In this example, we’ll use the same
monthly budget information that we worked with in Part 4 of this series.
Step 2: Select all of the cells in your Excel spreadsheet that you want to insert into
your Word document, and press Ctrl + C to copy the entire selection.
Step 4: In the Paste Special dialog box, choose the paste as Microsoft Office
Excel Worksheet Object option.
If you later decide that you want to make any changes to this information, you
don’t have to go through these steps again. You can edit the Excel spreadsheet
directly within Microsoft Word simply by double-clicking on the object. You’re not
restricted to just formatting edits either – you can make any changes to the table,
including adding formulas and calculations, that you normally would make in Excel.
In this series, we’ll take a look at how charts and tables can be used in Microsoft
Word 2007 documents to help illustrate important concepts and keep the reader’s
attention.
Mail Merge
You use mail merge when you want to create a set of documents, such as a form
letter that is sent to many customers. Each letter has the same kind of information,
yet the content is unique. For example, in letters to your customers, each letter can
be personalized to address each customer by name. The unique information in each
letter comes from entries in a data source.
1. Set up the main document. The main document contains the text and
graphics that are the same for each version of the merged document — for
example, the return address or salutation in a form letter.
4. Add placeholders, called mail merge fields, to the document. When you
perform the mail merge, the mail merge fields are filled with information from
your data file.
5. Preview and complete the merge. You can preview each copy of the
document before you print the whole set.
IMPORTANT If you plan to use custom contact fields with the Contacts list in
Microsoft Office Outlook, you must begin the mail merge process in Outlook.
TIP You can also perform a mail merge by using the Mail Merge task pane,
which leads you step by step through the process. To use the task pane, in the
Start Mail Merge group on the Mailings tab, click Start Mail Merge, and then
click Step by Step Mail Merge Wizard.
1. Start Word.
A blank document opens by default. Leave it open. If you close it, the
commands in the next step are not available.
2. On the Mailings tab, in the Start Mail Merge group, click Start Mail
Merge.
3. Click Letters.
A set of envelopes The return address is the same on all the envelopes,
but the destination address is unique on each one. For more information, see
Create and print envelopes for a mass mailing.
A set of mailing labels Each label shows a person's name and address,
but the name and address on each label is unique. For more information, see
Create and print labels for a mass mailing.
A set of e-mail messages The basic content is the same in all the
messages, but each message goes to the individual recipient and each message
contains information that is specific to that recipient, such as the recipient's
If you need to stop working on a mail merge, you can save the main document and
resume the merge later. Microsoft Office Word retains the data source and field
information. If you were using the Mail Merge task pane, Word returns to your
place in the task pane when you resume the merge.
Word displays a message that asks you to confirm whether you want to open
the document, which will run a SQL command.
The text of the document, along with any fields that you inserted, appears.
To merge information into your main document, you must connect the document to
a data source, or a data file. If you don't already have a data file, you can create
one during the mail merge process.
If you use an existing list, make sure that it contains the information that you want
to use, including all the columns and the rows. You can make some changes during
1. On the Mailings tab, in the Start Mail Merge group, click Select
Recipients.
For more information about using the Contacts list, see Tips for working
with Microsoft Office Outlook Contacts list.
For Excel, you can select data from any worksheet or named range within
a workbook. For Access, you can select data from any table or
query (query: A means of finding all the records stored in a data source
that fit a set of criteria you name. Queries can contain operators, quotation
marks, wildcard characters, and parentheses to help focus your search.)
that is defined in the database.
For another type of data file, select the file in the Select Data Source
dialog box. If the file is not listed, select the appropriate file type or select
All Files in the Files of type box. In a mail merge, you can use the
following types of data files:
An HTML file that has a single table. The first row of the
table must contain column names, and the other rows must contain
data.
Any text file that has data fields (data field: A category of information
that corresponds to one column of information in a data source. The
name of each data field is listed in the first row (header row) of the
data source. "PostalCode" and "LastName" are examples of data field
names.) separated (or delimited) by tab characters or commas and
data records (data record: A complete set of related information that
corresponds to one row of information in the data source. All
information about one client in a client mailing list is an example of a
data record.) separated by paragraph marks.
Create a new data file in Word If you don't have a data file
yet, click Type New List, and then use the form that opens to create your
list. The list is saved as a database (.mdb) file that you can reuse. For
more information, see Type a new list.
Advanced image editing
Step 1. Open Microsoft Word. Remember to leave your browser window open
until this lesson is finished.
IBM - Use Ctrl+N (Hold down the Ctrl key and tap the N key one time)
Macintosh - Use Command+N (Hold down the Command key and tap the N
key one time)
Step 3. Turn the document to landscape orientation, that makes the longest
dimension the width of the page, not the depth. Go to the File menu, select Page
Options, choose Orientation and select Landscape.
Step 5. Copy the following rules and paste them into your document two lines
below the headline using toolbar buttons, menu items or keyboard combinations:
Step 6. Highlight the title (Classroom Computer Rules) and perform the following
actions using toolbar buttons, menu items or keyboard combinations:
Step 6. Highlight the five rules and perform the following actions using toolbar
buttons, menu items or keyboard combinations:
Note: all of these actions can be performed using the Formatting toolbar.
Step 7. Place your cursor under the title, but above the five rules. You may have to
hit Enter/Return to do this.
In Word go to the Insert menu, select Picture then Clip Art. Insert the image
named computer training. It can be found in any of the following clip art libraries on
Office: Academic, Office, People At Work, Computers, PCs, Computer Hardware,
Students, Schools, Education, or Personal Computers.
Step 9. Resize the image by clicking and dragging. Click once on the image
and it will be surrounded by eight boxes; one at each corner, and one in the middle
of each line.
If you click on a corner box, hold the shift key down, and drag outward from the
picture you will change width and height proportionally. If the aspect ratio is locked,
Word automatically does this without your having to hold down the shift key.
Step 10. Move the image by clicking and dragging. Click once on the image
and it will be surrounded by eight boxes; one at each corner, and one in the middle
of each line.
Move your cursor over the image and it becomes a pointer with a four headed
arrow attached to it. Click anywhere in the picture and drag it to the desired
location.
Assignment
Leave your browser window open. Open Microsoft Word, if it is not already
open.
In the following exercises you will learn some of the necessary steps to create a
spreadsheet using Microsoft Excel 2003 for Windows 2000, Me, and XP. You will
learn not only how to type various items into the spreadsheet, but also how to copy
columns, widen columns, fill columns, add, subtract, multiply, divide, do graphics
and a variety of other ―things.‖
Notice that the ―main‖ part of the spreadsheet is composed of Rows (Labeled 1,
2, 3, 4, etc.) and Columns (Labeled A, B, C, D, etc.). There are a lot of rows
and columns in a spreadsheet. The ―intersection‖ of each row and column is
You can move around the spreadsheet/cells by clicking your mouse on various
cells, or by using the up, down, right and left arrow movement keys on the
keyboard. Or, you can move up and down by using the ―elevator‖ bars on the
right and bottom of the spreadsheet. Go ahead and move around the
spreadsheet. Hold down the down arrow key on the keyboard for a few
seconds – then click-on a cell. Notice how the Name Box always tells you
―where you are.‖ Now hold down the right arrow key on the keyboard for a few
seconds. Notice how the alphabet changes from single letters (A, B, C,. …. Z)
to several letter combinations (AA, AB, AC). There are hundreds of columns
and thousands of rows in a spreadsheet. Anytime you desire to return to the
Home Cell (A1) simply click-in the Name Box and type-in A1. Then tap the
Enter key and you will go to cell A1. You can go to any cell by this method.
Simply type-in a row and column, tap the Enter key, and you’ll go to that cell.
Now that you have the ―feel‖ of how to move around Excel spreadsheet, go to the
cells as indicated below and type-in the following:
Notice how Bonzo now COVERS the right part of your original entry!! Now
move back to cell C1 and click-on it. Look at the upper part of the spreadsheet,
just above the cells where you typed Bonzo. Your name and the word budget are
still there! Bonzo only COVERED the portion in cell D1. See the image and
arrow below.
There are several ways to take care of this. For the moment move back to cell
D1 and click-on cell D1. Tap the Delete key (above the arrow movement keys on
the keyboard). Notice that Bonzo disappears and your entire entry
Cell Type-in
A3 Income
B4 Parents
B5 Job
B6 Investments
B7 Total
A10 Expenses
B11 Food
B12 Beverages
B13 Parties
B14
Miscellaneou
s
B15 Total
At this point you probably have noticed, the words "Investments" and
"Miscellaneous" run over the spaces given in the cells. Do not be concerned at this
point. We’ll soon fix this.
C4 300
C5 50
C6 150
When the Format Cells menu screen below appears, select Border.
When you return to the spreadsheet, click somewhere other than cell C7.
This is called ―clicking away.‖ You should now see a line at the top of cell C7.
Sometimes the box highlighting a cell hides the lines. If you ―messed-up‖, try
again.
C11 30
C12 50
C13 150
Now, underline the top of cell C15 like you did cell C7.
Widening Columns
You probably noticed, as you typed in the numbers, some of the words were just
too wide for the default cell width (Investments and Miscellaneous). Let's widen
column B to take care of this.
Slowly move the mouse arrow to the right edge of the B cell (between the B
and the C). The cursor will turn into an arrow pointing right and left with a
small vertical line in the middle (see arrow below). Hold down the left
mouse button and move (drag) the line to the right.
Inserting Rows
Aligning Cells
click-on the –
Alignment Tab and then
click-on -- Horizontal -
Center --Vertical -
Center -- then click OK.
Try it.
D3 OCT
E3 NOV
F3 DEC
G3 MONTHLY TOTALS (tap the Enter key and then correct the
width of
this column)
Next we‟ll highlight cells C3 through G3. To do this, point to C3 and click the
Left
mouse button. Then, holding down the left mouse button, drag the mouse to
the right through G3 – when the cells are highlighted – take your finger off
of the left mouse button. Then point to the group of cells and click the right
mouse button to bring up the Format Cells menu. Click on Alignment and choose
Center (vertical & horizontal). Then point to OK and click the left mouse
button. All of the cells will then be as centered.
You could also click the Center button as you did before.
MONTHLY TOTALS will not fit its space when you do this. But, you know what
to do. Move the cursor over the line between cells G and H and drag the line to
the right to widen the G cell just like you did a few minutes ago.
To the right of File name:, delete the information (which is in the box) and type-
in MYBUDGET (see lower left arrow). This is the name under which you are
saving your file. (In the future you will choose logical names for your spreadsheets
as you save them.) Now point to Save and click the left mouse button (see lower
right arrow).
Exiting Spreadsheets
Retrieving Spreadsheets
Click on the down arrow to the right of the Look in: box (Similar to the arrow in
the Save in: box – see top arrow). Click-on the 3 ½ Floppy (A:), or the drive or
Also, if you have not done so already, move your cursor slowly over the
"buttons" located below the menu bar. You will notice a little box appears that
tells you what these buttons do. These little boxes are called Text Help boxes.
Many of them will save you extra ―clicks‖ by using them. Notice, that under File
and Edit in the Menu bar, there are a small folder (Open) and a diskette
(Save). Clicking-on them will take you directly to Open and Save.
Adding Numbers
Next we want to learn how to add numbers. There are several ways to do this.
Each method has its advantages and disadvantages.
To do this, begin by moving your cursor to cell C9, and clicking-on cell C9.
TYPE-IN METHOD
We want to add the three numbers in cells C6, C7 and C8. To use this method
type-in (using the keys on the keyboard) the following in cell C9:
= C6 + C7 + C8
Change the number in cell C6 to 500 (and tap Enter). See how the total
AUTOMATICALLY recalculates!!!
Try this if you want. Any time you ―create‖ an error in Excel, you can simply re-
type or edit the formula to correct the error.
The Type in Method is really easy if you have a few numbers and can see their
cell locations on the screen. If you have a lot of cells in the formula, which are
on several screens, this is not such a great method. The next method will work a
lot better for numbers ―all over the place.‖
Point Method
Move to cell C9 again and click-on it. We'll now add the numbers a second way.
Tap the Delete key on the keyboard to delete the current formula.
First, tap the = and then POINT (move) the cursor over cell C6 using the
mouse, tap the left mouse button on cell C6
(you will see a marquee box go around the cell).
Now tap a + and move cursor to C7, tap the
left mouse button, and tap another + and
move the cursor to C8 and tap the left mouse
button (notice how as you " + and point " the
addition formula is being built in cell C9), now
tap Enter. The same formula can be built
using the arrow movement keys on the keyboard (except that you don’t have
to click-on each cell as the cell is marked - as you move the arrows). Notice, as
you are entering the cell addresses, that as you place another + in the formula,
that the cursor ―returns” to cell C9. Also notice, as you point to each cell that
it is highlighted by a ―marquee box.‖ This ―tells‖ you what cell you’ve pointed
to. Pretty neat!
This method is good when you need to move to numbers that are spread out
all over the place. Some people like it best and use it all the time -- it's your
choice.
Function Method
Move again to cell C9. Delete the formula by tapping the Delete key again.
[This tells Excel that we are going to sum some numbers in a RANGE which will
follow the =SUM(.]
Mouse Method: Move again to cell C9. Delete the formula in cell C9 by
tapping the Delete key. Type in =SUM( as you did before. Point to Cell C6 –
with your mouse cursor. Click and hold down the left mouse button and
move/drag the cursor down to cell C8. (Cells C6, C7 and C8 should be
highlighted.) Now tap Enter.
Point to cell C9 again. Tap the Delete key to remove the formula currently in cell
C9. This is a really important DELETE, since what we’ll explain below won’t
work correctly if you do not delete the formula in cell C9.
Functions
Two menu screens will now appear at the same time. An ―Office Assistant‖
will appear (see image on left of next page) and you can ask it questions (the
little assistant may be a paper clip or just about anything). The Insert Function
This is a really great, timesaving feature. We’ll now show you how to use the Help
features of Excel 2003 to work with and understand these functions.
The Select a function menu will look like the image below.
Look at all the functions (formulas)! We’ll just go through how to use the addition
formula (SUM) in this tutorial. If you need these formulas in the future, you’ll know
they’re here.
Use the elevator bar on the right side of the Select a function menu screen to
move down the list until you see SUM. Click-on SUM.
Remember, you clicked-on Cell C9 – which was ―empty‖ because you deleted the
formula in that cell.
But it’s a little unclear how Excel did this. The Help in Excel Functions is excellent.
So, to see how this SUM equation works, we’ll go to Help. To do this, click-on
Help on this function in the lower left corner of the screen (see lower left
arrow above).
On the right side of your screen you will see a Microsoft Office Excel Help
window appear (similar to the one above) that will show you how to use this
SUM function (or any function).
The bottom of
the SUM help
screen looks
like the image
on the left.
Notice that it
gives you
examples from
a small
spreadsheet that
has data in cells
A1 through A6.
It uses these
numbers in the
examples at the
bottom of the
help screen.
When you have reviewed all of the help you care to see, carefully click-on the X
at the upper right corner of the Microsoft Office Excel Help blue bar to close
the Microsoft Excel Help window. If you accidentally close the spreadsheet,
simply reply yes to Save, and then re-open the spreadsheet as you did on
pages 10 &
11.
147
The Function Arguments menu screen will still be on the screen.
If the Office Assistant is still on the screen simply point to it and click the
RIGHT mouse button. A pop-up menu will appear. Click-on Hide. This will put
the Assistant away until we need it again
As you can see, in the area to the right of Number 1, the ―Wizard‖ has “guessed”
that you want to add the numbers in the range C6 to C8. Now that you are
becoming proficient with Excel, we’ll try something special. Carefully, point to
some “plain part,” in the gray area above. Click and hold down the left
mouse button, and drag the above SUM box “away” so that you can see your
numbers in C column cells. When you have done this, release the mouse button.
Now click-on the ―small box‖ on the right edge of the Number 1 area (see
arrow above). It has a little red arrow in it.
148
Highlight cells C6 to C8 in the spreadsheet (click-on C6, hold down the left
mouse button, and drag until the three cells are highlighted). A “marquee”
will begin to flash around the cells, indicating they are highlighted (left arrow
above). The Function Arguments area will appear as above. Now click-on
the small button on the right of the cell (see right arrow above). The
numbers will show in the area to the right of Number 1. Now, click-on OK at
the bottom of the Function Arguments menu screen. You’ll see that the SUM
formula [=SUM(C6:C8)] shows in the formula area at the top of the screen.
This is a really handy method to highlight a ―group‖ of numbers you want to add.
AutoSum METHOD - ∑
Since we add numbers more than any other operation in
spreadsheets, Excel spreadsheet has an additional feature - Auto
Sum. Move to cell C9 again and tap the delete key to erase your
last formula. Now look at the upper area of the screen, just below
the menu bar, for a ∑ (summation) symbol button.
Point to it and click with the left mouse button.
WOW !! Automatic addition!! Notice that the
cells, you’d logically desire to add, have a marquee
around them and that the SUM function is
displayed in cell C9. You’ll need to confirm that this
is the correct formula. So, tap the Enter key and
the SUM function will now be set in cell C9. Any time you want to add using this
method just click-on the cell where you desire the total to be and click-on the ∑.
Now move to cell C17 and add the total Expenses in cells C13 to C16 -
using each of the four methods.
While you are in cell C17, go ahead and place a line at the top of cell C17 using
the format cells – border method that you learned on Page 5.
Subtraction
149
In cell A19 type-in Net Income. Next, adjust the width of column A (Page 6).
In cell C19 we want to subtract ( - )the amount in for Expenses in cell C17 from
the amount for Income in cell C9. This can be accomplished by using either the
Type-In Method or Point Method. Go ahead and do this. Don’t forget to tap the
Enter key to confirm your formula.
150
Notice several
things. The right
side shows the
number of decimal places. The 2 is the default for cents. We'll use 2. Notice
above the Decimal Places that there is a sample of what our number will look
like. At the lower right it shows how negative numbers can appear,
depending on your choice. When a negative number is calculated, it will appear
with your choice. Now click-on OK. All the numbers now have $. If you have
large numbers that are "too wide" for the current column width you will see
some ######## in the cells where these numbers are located. If this occurs in
your spreadsheet, go ahead and widen the columns as you did previously (Page
6).
151
Your spreadsheet numbers should now look like the one on the left.
Now move to cell A21 and type in the word Percent. We're going to calculate a fun
percentage to show you how division works and give you some more practice with
numbers.
Now move to cell C21. Using either the Type-In Method or the Point Method,
divide ( / ) the amount for Income in cell C9 by the amount for Expenses in cell
C17.
This will give you a horrid number so why not put a percent symbol with it. Now
we’ll repeat what we did above to format our $$$$.
Point to cell C21 and click the RIGHT mouse button. Point to Format Cells, then
click the Number tab, then click-on Percentage. Select zero ( O ) Decimal
Places. Click OK. Ta Da !!! a %.
Copying
152
Move your cursor to cell C6. First, we'll highlight what we want to copy; next
we'll tell the spreadsheet where we want to place what we've copied. So,
point to C6, hold down the left mouse button and drag down the column
until cells C6 through C21 are high-lighted. Your highlighted area should look
like the one on the left.
Now, point to Edit in the Menu bar. Click the left button. Point
to Copy in the menu that appears. Click the left button. The
menu disappears.
You will notice that once again, when you highlight an area, a
marquee of running lights moves around the copy area. So,
you’ll know you highlighted the correct area (image on right).
Now we'll tell the program where to copy the information. Point to cell D6, click
and hold down the left mouse button and drag down and to the right to cell
F21 (This will highlight three columns -- OCT, NOV, DEC -- to copy to.). When
you have finished your highlighting, your screen should look like the one at the
top of the next page.
153
Now point to Edit in the Menu Bar again and click the left button. Point to
Paste. Click left button. Wow !' All those numbers and dollar signs and
formulas - EVERYTHING - was copied in a flash!! That sure saved us a lot of
time.
154
Note: You can also utilize the copy and paste buttons in the button bar to do
this if you desire.
Change a few numbers in each of the months in both the income and
expense areas to see how the spreadsheet works. (This will make the
graphs we’ll create more realistic when we create them later in the tutorial.)
155
After you have completed your formula copy it to cells G7 through G19. You will
see some "stuff (zeroes)" in cells G10, 11, 12, and 18. This is because there
was "nothing there" to add. So, go in and clean-up these cells by deleting the
zeros in these cells.
Next, go to cells G9 and G17 and underline like you did before (Page 5).
Go to cell A23 and type-in Number. Go to cell A25 and type-in Result.
156
We'll now create a formula to multiply our number times Net Income. You may
use either the Type-in or Point method. Go to cell C25, and type-in a formula to
multiply cell C23 times cell C19.
The result in C25 should be two times the net income in cell C19.
Now copy the formula in cell C25 to cells D25, E25, F25 and G25. Your row 25
should look similar to the one below.
Point to each of the cells D25, E25, F25 and G25. Notice, as you click on
each cell and look at the screen, how C23 (the cell with the 2) "rolled" and
became D23, E23, F23 and G23 (which are blank - this caused the "0's"). A
blank times a number is a ―0.‖We want the 2 to be in each formula and not
to "roll".
Go back to cell C25. Now we'll enter the formula again, but a little
differently (to anchor the 2).
Type-in a =C23 (or you could type = and point to C23). NOW, tap the F4 key.
Notice, in the Edit bar at the top of the screen, that the =C23 changes to:
$C$23. (This tells you that cell C23 is absoluted or anchored. The "$'s"
indicate the absoluting.) Now finish the formula by typing in or pointing *C17
as before. Tap Enter.
Now copy the formula in cell C25 to cells D25, E25, F25 and G25 again. Your
row 25 should look similar to the image below.
The numbers should now be correct. Point to cells D25, E25, F25 and G25 (like
you did before). You will notice the "$'s" have copied the =$C$23 to each cell
157
(absoluting) and the Net Income figures have rolled as they should. Absoluting is
something you should know and understand.
Pause and reflect -- Look at all you have accomplished. If you want go in
and change some more numbers or change the income and expense titles to
something you feel is more fun or appropriate, please do so.
The next important lesson is to learn how to print. This done with a few easy
steps.
Printing
All of the Windows spreadsheets try to figure out what you want to print. Sometimes
they're right,
The most important thing with printing is to tell the printer what to print.
Unlike a word processor, you may need to highlight what you want to print. For
the moment, we’ll assume that Excel 2003 will ―guess‖ correctly, and that you have
not ―clicked‖ somewhere that will cause a problem. If you do have problem, which
we’ll know in a second, we’ll show you how to take care of the problem a bit later.
It's usually a good idea to see what our printout will look like –
before you print it. First, we’ll use a Print Preview to ―see‖
what our spreadsheet looks like. To do this we’ll click-on the
Print Preview Button in the Button Bar. Point to the Print
Preview button and click on it.
A picture, of what our printout will look like, appears on the next page.
At the top of the Print Preview screen you will see the button bar above. We’ll
use a number of the buttons on this bar to assist us with our printing.
158
Notice that the Next and Previous buttons at the left end of the bar are not
highlighted with text – they are just gray. This means that the buttons are not
“active.” This indicates that we are OK with our spreadsheet – it is all on one
page. If we saw that the Next button was active, this would mean that there are
other pages to our spreadsheet. If you’ll look at the lower left corner of the
Print Preview screen you’ll see: Preview: Page 1 of 1. This confirms that our
spreadsheet is on one page. If you do not see this “combination,” we‟ll
show you how to take care of it later.
If you do see this combination, click-on the Print button. Click-on OK in the
Print menu screen that appears. Label this printout as: Default Spreadsheet
Printout.
Next, notice that an ―image‖ of your spreadsheet appears below the button
bar (above).
159
If you move your cursor over the spreadsheet, you’ll notice that the cursor
changes from an arrow to a tiny magnifying glass. If you click the left mouse
button, your magnifying glass will “zoom-in” on the exact spot where the
magnifying glass is located. If you click-again, it will zoom-out. Try this a
couple of time. It is a really handy feature.
The Page Setup menu screen at the top of the next page will appear.
Notice that the Page Setup menu screen indicates that you are in Portrait view.
Now we’ll enhance the spreadsheet to make it a bit more presentable. In the
Orientation area click-in the small circle in front of Landscape (see arrow
above). The spreadsheet will now print on the page as indicated. Next, in the
Scaling area, click-in the box to the left of % normal size. Using either the
160
―up/down” arrows, or by typing in the information, change the size to 125.
Then click-on OK.
Your spreadsheet will now be larger and fill the paper more appropriately. Click-on
Print and when this spreadsheet comes out of the printer label it: landscape –
enlarged to 125 %.
Go ahead and adjust the ―size‖ of your spreadsheet so that it becomes too large
to fit on a single page. Set the Scaling to 200 and click-on OK. When you return
to the Preview screen, the Next and Previous buttons at the top will now be
active, and you’ll see 1 of 3 or 4 pages in the lower left corner of the screen.
Go ahead and click-on the Next and Previous buttons to get a ―feel‖ of the ―size‖ of
your spreadsheet. If you click-on Print (please don’t do it), you’ll get these 3 or 4
pages. If you made a mistake when you created the spreadsheet, you might see
that you have 58 pages in your spreadsheet!
Now, click-in the small circle to the left of Fit 1 page(s) wide by 1 tall in the
Scaling area and make sure that 1 page is set. Excel 2003 will now return your
spreadsheet to one page. Try other things here. Work with the Margins,
Header/ Footer, and Sheet tabs at the top of the Page Setup menu screen. Any
time you desire to print, go ahead and do so. This will give you a feel for how the
spreadsheets will print. When you are finished, simply click-on Close and you will
return to your spreadsheet.
Many folks ask how to center a spreadsheet on the page. This feature is
located in Margins at the bottom of the Margins screen. Simply click-on Margins at
the top of the Preview screen or on the Margins tab when you are in the Page Setup
screen.
Many folks also ask about how to place gridlines and show the row and column
headings (A, B, C and 1, 2, 3) in their spreadsheet printouts. This feature is
located on the Sheet tab in the Setup screen menu.
Cure for the problem – if you have too many spreadsheet pages.
161
that you only want to print the area you’ve highlighted. Click OK. Only the
section that you’ve highlighted will print. You can still modify your spreadsheet
if you desire. Once you’ve clicked by Selection, you may click-on the Preview
button in the Print menu screen and you will see a preview of your highlighted area.
Follow the instructions above to modify as you desire.
Now we'll call it a day and close Excel 2003 for Windows. First, let's save our work
one more time. If you forget, Excel will remind you to do it. What a nice
program!!
Point to the Edit menu and click the left button. Point to Exit. Click the left
button. That's it for now.
When you return, we'll retrieve our work and do some really neat graphics. To
open your spreadsheet again, follow the instructions on Pages 10 and 11.
Graphics
This will be a lot of fun. We are now going to turn your spreadsheet numbers into
graphics -- bar charts, pie charts, etc. This will greatly assist you when you display
and explain your work.
Before we do this there are a couple of essential steps. First we have to tell an
Excel 2003 "Wizard" what we want to chart and then were we want the chart to
go.
First: in cell B9 type-in Income (to replace the word Total). Next, type-in
Expenses in cell B17 for the same reason.
Something new.... Hold down the left mouse button and highlight cells B3 to
F3. Next HOLD DOWN the Ctrl key at the bottom of the keyboard, and while
you are holding it down, highlight cells B9 through F9. You will now see two
"ranges" highlighted. Hold down the Ctrl again, and highlight cells B17
through F17. These three ranges will make up your chart. The x-axis will be
made up of B4 - F4. And, the two sets of bars (series) will make-up Income and
Expense. When you complete the above instructions, your screen should look like
the one below.
162
If your spreadsheet does not look exactly like the one above, please try again.
This is a bit tricky and it often takes even experienced spreadsheet folks a couple of
―tries‖ to get the highlighting just right.
We’ll use the easiest method for our first chart (graph).
163
The Chart Wizard shows
the various types of
charts in Chart type: (on
the left side of the menu
screen).
Examples of the
selected chart type show
on the right under Chart
sub-type. We’ll stay
with Column and the
chart selected for now.
Click Next.
164
The Wizard (on the last page) shows you what your chart will look like. The
―ranges‖ you selected originally are shown in the Data range: area. If you did
not highlight as indicated, your chart won‟t "look right." Your chart should
look like the example above. If you click-on the Series tab at the top of the
Wizard screen, you’ll see a new Wizard screen that shows you where the Income
and Expenses series came from. Click-back on the Data range tab at the top.
Now click-in the little circle in front of Columns. The Wizard will indicate that
the chart has been ―rotated” 90 degrees and thus the axis has changed. This is
often called a ―pivot.‖ Click-back in the small circle in front of Rows. Click Next
again.
The Chart Wizard Step 3 of 4 menu will appear: Titles (similar to the image
above). Click-in the blank area under Chart Title. A flashing cursor will appear.
Type-in your name with an apostrophe („) s and the word Budget (ex.
Janie's Budget). Now, click-in the area under Category (X) axis: and type in
Months. Next, click-in the area under Value (Y) axis: and type in Dollars. You
probably noticed that as you entered these titles, the chart in the area on the right
of the Wizard changed to give you an ―instant‖ preview of your final chart. You will
also notice that there are several tabs at the top of the Wizard. Click-on each of
the tabs and see what ―they do‖. Notice how some change axis and put in grid
lines. The legend is the small box on the right, which indicates what the colors
165
of the ―bars‖ represent (Income and Expenses). Click Next one last time. The
Step 4 page of the Wizard will now appear (image at the top of the next page)
This is the final Wizard page. You’ll notice that it asks you where you want to put
your chart. Since this is your first chart, it is best if you select As a new sheet:
(see arrow above). This will put your chart on a new tab called Chart 1. Now
click-on Finish, You’ll see that you chart has a tab of its own at the bottom of the
screen, and ―fills‖ an entire screen.
There's your chart. Again, notice that Excel created a new tab at the bottom of
the spreadsheet that says Chart 1. Any time the numbers change on Sheet 1,
the bars in Chart 1 will reflect the change automatically! Click on the Sheet
1 and Chart 1 tabs to get the feel of going back and forth between the data and
the chart. After you make your changes, click on the Chart 1 tab and you’ll see
how the chart has changed.
In Excel 2003, when you save your spreadsheet, you also save your graph.
Your graph is saved wherever you are working in the graph.
If you would like to have logical names for your Excel 2003 spreadsheet tabs –
rather than Sheet 1 and Chart 1, we’ll now show you how to do this.
166
of the tabs, place your cursor over a tab and click the RIGHT mouse button.
When you click the Right mouse button the drop down menu screen to the right will
appear. Choose Rename.
Note: We are about to do some things which could mess-up your graph. If you
do get "messed-up" in the graph - don't save again. Simply Close the
worksheet and DON'T SAVE. Open the worksheet again and you will be in a nice
neat graph where you can experiment some more.
Click on the Budget Chart (or whatever you named it) tab.
Click-once on your title at the top. A ―box‖ with little squares on the corners
will appear. These are ―sizing grabbers‖. When you move the cursor over them
you will notice that the
cursor changes to small,
directional arrows. If you
click, hold down the left
mouse button, and drag
when you see these
arrows, you will notice
that the Title Box gets
larger or smaller as you
drag. Next, click-on the
name of your budget
167
until you get a flashing cursor somewhere in the title. With the arrow
movement keys, or mouse, move to the end of the title, to the right of the "t"
in Budget, and tap Enter. Type in Fall 2003. Now click at the beginning of your
name, hold down the left mouse button, and drag to highlight the first line of
the budget title with your name in it. Keeping the cursor on the dark area,
click the right mouse button. Click-on Format Chart Title.
Change the Font to Times New Roman (by moving up and down with the
arrows) or any font that you like. As you change things you will see the results in
Preview on the lower right. Change the size to 20. Change the color if you want.
Click OK.
Click-on the upper right hand corner of your gray graph area. You will see
little squares now appear at the four corners and sides of the graph area. Point to
the upper right corner square and move the cursor until you see an arrow with
two heads . Hold down the left mouse button and drag down and to the left
then let go. Your graph will get smaller. Now point somewhere in an open gray
area of the graph (not on one of the bars) and click again. Hold down the left
mouse button and drag the graph area so it looks more "appropriate".
Click-on the Legend on the right (box with Income and Expenses). When you see
the corner ―grabbers,‖ make the Legend box a bit larger. Then click right in the
Legend area. Click Format Legend. Click the Font tab. Make the font bold
and size 14. Click OK.
If you desire to change the colors of the Income and E2003ense bars in the
graph, simply move the mouse over one of the bars and click the right mouse
button. Notice all the bars with the same color now have a little square in the
middle of each bar. The right click ―marked‖ the bars. Click Format Data
Series. Choose a color you like and then click OK.
Now let's look at your graph and then print it. Go to File - Print Preview. If you
like what you see go ahead and print the graph. If not, close Preview and make
some more graph changes.
Whenever your graph is visible, you can point to any area of the graph, and
click the right mouse button on the area, and edit that particular area. You can
also click-right in the chart itself. In the menu that appears, click-on chart type
and then select a different type of chart.
168
3.14 Database – Ms Access
169
The New File menu screen at the on the right will appear when you click the left
mouse button on Create a new file.
One of the unique things about Access database is that it requires you to save
your database as soon as you enter the program.
You can save your work on a floppy diskette in the A: Drive, or on your C: Hard
Disk, or in some other drive, please save to these areas and substitute your Drive
in the instructions.
A File New Database menu screen, similar to the one below, will be on your
screen. We’ll have to do several ―things‖ to set-up this screen to save your
database.
170
In the upper left corner of the File New Database menu screen that appears,
you will see a Save in: area (see upper left arrow above). Click-on the small
down arrow on the right and it will show you the various disk drives available
on which you can save (see right upper arrow above). Point to the drive on
which you want to save your database, and click-on it. If you choose the 3½
Floppy (A:), make sure you have a formatted disk in the A drive. If you choose
the C: drive, choose the folder in which you want to save by double clicking on the
folder. Your selection should now appear in the Save in: area
Next click-in the area to the right of File Name:. Delete any text that is entered
in the area and then type-in the word PERSON as shown at the bottom of the
above image (see lower left arrow).
Now click-on the Create button or tap the Enter key as shown on last page
(see lower right arrow on last page).
Creating a Table
You will notice, in the person:Database menu screen, in the left border:
Tables, Queries, Forms, Reports, Pages, Macros, and Modules. You will
notice at the top of the screen: Open, Design and New. You may create
171
multiple Tables (Databases), as well as multiple other items associated with the
items in the left border. As you create them, they will be shown in the "white"
area. In other words, the PERSON database can be made-up of, or contain, many
other databases (tables), reports, queries, etc.
For now, we'll do a basic database (table) creation. Later, you can try Table
Wizards when you have the "feel" for creating a table.
Notice, under the Blue Bar at the top of the design screen that there are (3)
things: Field name, Data Type, and Description, and, in the lower half of the
window; Field Properties (see arrows in image below).
172
Next you will be creating the fields that make up a database. This is similar to
creating a blank personnel form (on paper) that will be "filled-in" for each employee
(Name, Address, Phone Number, etc – are called fields in a database). These
"forms" are called records in a database. There will be a record, or form, for each
employee. All the forms, together, make up a Table (database). So let’s create a
personnel database.
173
Significant Note: When creating a database it is always best to ―break down‖
a field into its ―smallest parts.‖ For example – Name would break down into First
Name, and Last Name (you could also have Middle Initial, Title, etc.) Address
would break down into Street Address, City, State, and Zip (you could also have
Apartment Number, etc). Because we are working in Access 2003 it will be very
simple to ―put the fields back together‖ with a few mouse clicks when we need to
do this. Trust us. This will save you a lot of time later on.
Data Type
Text You may type in any alphabetical/numerical data that you desire - up
to a maximum of 255 characters. As indicated, this is a text field, so
you can't do mathematical calculations. Examples of Text data are:
names, addresses, stock numbers, room numbers, zip codes, etc.
Memo This field is for lots of text. You can have up to 32,000
characters.
Number This field is for numbers where you want to add, subtract, multiply,
divide, average, and do numerical calculations. This field can be a
very large size, so when we get to Field Properties, we'll talk about
"sizing" this field so it doesn't take up to much "space" in storage.
Date/Time Dates and Times. You may format these later, as you may desire.
174
Currency Dollars ($). You may format these later, as you may desire.
OLE Object This means "Object Link Embedding" which indicates you can insert a
graphic, picture, sound, etc. Pretty neat to put a photograph in a
personnel record or a picture of an inventory item in the stock record
(advanced stuff).
We'll leave Last Name as a Text Data Type. To the right under Description you
may make any remarks you feel are appropriate to someone who may want to
know how/why you designed the field as you did.
Now notice in the lower part of the screen, under Field Properties, that a box
appeared when you selected the Text Data Type. This box is "tailored" to the
Text Data Type that you selected above. Your Field Properties should look like
the one below when you finish doing the steps indicated below.
Field Properties
Field Size Is currently set to 50 characters. That's pretty large for a name.
So, click-
in this area and change the number to 25 (you can make this larger
175
or smaller later if you have to).
Format Now click-in the Format Area. Next tap the F1 function key to
activate Help.
Since you are in the Format area, Help will be "tailored to" this
area. When the Help Window appears, click-on Text and Memo
Data Types (Notice that you click-on different Data Types, depending
on the Data Type you select). This gives you an idea of some formats.
We'll use one later. Now click-on the ―X‖ in the upper right corner
of the Microsoft Access Help – Format Property Window to close
it.
Caption Look at the Gray Help area to the right. It explains about
Caption.
Allow Zero Length Look at the Gray Help area to the right.
Indexed Look at the Gray Help area to the right and tap F1 (Help)
IME Mode Look at the Gray Help area to the right and tap F1 (Help)
IME Sentence Mode Look at the Gray Help area to the right and tap F1 (Help)
Smart Tags Look at the Gray Help area to the right and tap F1 (Help)
Now we’ll repeat this process and create different Field Names and Data
Types (as necessary). Type-in the Field Names as indicated below and set
them to the Data Types and Sizes indicated.
176
Social Security # Text 15
We'll use an Input Mask for our Social Security Number. Click-in the
Input Mask area in the Field Properties area at the bottom of the screen
(see left arrow below).
Notice there are three "dots" (...) in a box on the right. Click-on the
three dots (see right arrow above). An Input Mask Wizard will appear:
"Must Save Table First. Save
Now?".
Click-on Yes.
Next, a Microsoft Access menu box will appear indicating There is No Primary
177
Key defined.
Click NO. (Keying, or indexing, is somewhat advanced. You can get a good
description by searching in Help for Keying.)
The Input Mask Wizard will show you some Sample Masks (you may scroll
up/down to view them). We'll use Social Security Number, so click-on it. Your
screen should look like the one below.
Now click-on
Next at the bottom of the Input Mask Wizard screen.
You will now see a default number of 000-00-0000 using dashes (-) between
the numbers. You can use anything you want.
178
We'll leave it as is, so click-on Next> again (at the bottom of the Input Mask
Wizard screen).
On this Input Mask Wizard screen you’ll see two choices. Click-in the little
circle to the left of With symbols in the mask, like this:. Sometimes, when we
use Access data as a part of mail merges or in labels, if we don’t save the dashes,
they won’t appear in our document. So, it always a good idea to save dashes.
Now click-on Finish. You will see some ―special‖ numbers written in the Input
Mask area for Social Security #. When you begin to enter data in this field,
you’ll see how this works. Your Field Properties area should look like the one
below.
Now continue entering the following information in the Field Name and Data
Type areas as we did above.
City Text 20
State Text 2
179
Here we'll use a Format. First make the Field Size 2 then click-in the area
to the right of Format.
A down pointing arrow, like the one above (see arrow), will appear on
the right side of the Format area. If you click-on the arrow, the area will
appear blank (that's because we haven't entered a Format). Tap the F1 key
in the row of Function Keys at the top of the keyboard. A Help menu
screen ―tailored‖ to Format will appear )like the one below).
180
Since we are working with a Text Data Type, click-on Text and Memo Data
Types (see arrow above).
Notice that a > will change any alphabetic character you type into all upper
case letters. Now point and click the ―X‖ in the upper right hand corner of
the Format Help Screen (notice that the Help Window closes "automatically").
Now type a > in the Format area. Your Field Properties area should look like
the one below.
Continue entering the following information in the Field Name and Data Type
areas as we did above.
Zip Text 5
Gender Text 1
Insert a > in the Format area to make all gender entries become
capitals (like you just did for State).
181
Here we'll learn about Numbers, the Validation Rule and Validation Text.
We'll limit the person's favorite number to a number between 1 and 999.
Leave the Field Size set to Long Integer (Tap the F1 Function Key [Help]
to view the different Number Field Size descriptions). After you have
viewed the Number Help screens, click the small ―X‖ in the upper right
hand corner of the Help screen to close the Help screen.
Now click-in the area to the right of Decimal Places. It currently indicates
Auto. When you click there you will see a little down arrow on the right side of
the area. Click-on the little arrow. Select ―0.‖ This indicates that decimal places
are not allowed in the Favorite Number.
This tells Access that the number entered must be between 1 and 999.
You’ll notice that when you click-in the Validation Rule area that three periods
(…) appear just like they did in Input Mask. If you want to click-on the three
periods they will bring up an Expression Builder which you can use to create the
mathematical formula above. Please note that frequently, if you are really not
great at math, the Expression Builder can cause problems. Sometimes, the
Expression Builder will ―insert‖ an <<expr>> in the formula. If it does this, delete
182
the <<expr>>. This will confuse Access, and will frequently cause the program to
―stop‖ until you remove <<expr>>. So, if you want to look at Expression Builder,
please do so. But – be careful.
If someone does not enter a number correctly, an error message will appear.
Now we'll create an appropriate error message. Click-in the Validation Text
area and type-in:
When you finish all of the above, your Field Properties should look like the
one below.
Continue entering the following information in the Field Name and Data Type
areas as we did above.
Date hired Date/Time
183
Your Field Properties should look like the image below.
Salary Currency
In the Decimal Places Field Properties area click-on the small down
arrow on the right side and select 0 (zero) – this indicates ―no cents.‖
Notice the Default Value of 0 income will be inserted if no Salary figure is
entered. We'll leave it at zero. Your Field Properties screen should look like
the one below.
We‟ll make this a “Yes/No” or “check box” field. When we begin entering
data in the database, you‟ll see how this “box” works.
Point to and click on File in the Menu Bar then click on Save As. The Save As
Window will appear and Personnel should appear under Table Name: Click-on OK.
You could also click-on the small diskette Save Button if you desire.
184
because you have been designing your table and now want to view the data that
you have placed in the database (table). If you are familiar with spreadsheets it
looks like a tiny version spreadsheet. You can click-on the View Button and go
right into entering data in your table. However, it might be good to see how to
enter data when we first open Access.
So, point and click-on File in the Menu Bar, then click-on Close. You will return
to the main database window where we started (PERSON: Database).
You should
see the
Tables
choice highlighted and
Personnel Table highlighted.
Notice that there are three
Buttons at the top portion of
the window which indicate:
Open, Design, New. If you
click-on New you can add
another table to the Person database. If you click-on the Personnel Table (make
sure that it is ―blue‖) and then click-on Open you will open the table you created.
You can now enter data. If you click-on Design, you will be back in the design
window and can alter your design. Note: if you find, as you’re entering data, that
if you made a field too small, you can go to Design View and make the field a larger
width at any time you desire. let's click-on Open. The Personnel Table will
appear on the screen. If the window does not fill the screen, point to the
Expansion “square” in the upper-right corner directly to the right of
Personnel: Table in the blue bar. This will expand your Table to fill the desktop.
Move the cursor arrow over the buttons below menu bar. As you do, notice
that the "Tool Tips" will tell you what each button does.
185
Notice, below the Button Bar, that the fields you created in your
Personnel Table are displayed in what is called Datasheet View
(see above). Notice the small ―button‖ under File in the menu
bar. It shows a small blue triangle, pencil, and a ruler (like the
one on the right). This is a ―toggle‖ which will take you back to Design View - if
you need to make design changes while you are in Datasheet view. If you go
back to Design View, you can then ―toggle‖ back to Datasheet view when you have
made your corrections. Under Last Name you will see a flashing cursor; this
means that you are ready to begin entering data. You may type the data and
tap Enter, or click with the mouse in each field. If you make a mistake you
may retype the data. If you see a mistake later you can come back at any time
and correct it.Under each field, type the following in the area below the Field
Name:
5. City Lynchburg
6. State va
7. Zip 24501
As you are entering this data you will notice several things.
Social Security Number and Date Hired – You’ll ―see‖ your Input Mask
work.
State and Gender – you typed in small letters – notice how the Format ( > )
forced the letter(s) to be capitals.
Favorite Number – since the Favorite Number is ―too big‖ you will see
your error message appear. Click-on OK in the message
186
screen and then create a Favorite number that will work.
Salary - notice how your Currency formatting created a $, commas and
periods.
When you have completed typing the information, tap Enter so the cursor will
move down to the next record. You are now ready to insert your second entry.
Note: When you tapped Enter, Access automatically saved your first record.
This can be confirmed by the display of the hourglass.
Also note: As you began typing your first record a small pencil appeared in the
left margin. This indicates that you are "writing to" this record (editing). Below the
pencil an * (asterisk) also appeared. This indicates that your next record will go
below the first.
There are (2) methods for entering data into the database:
or
2. You can use the Form View method (we’ll create a Form in a bit later in
the tutorial).
Note: Anytime you want to take a break and exit Access, simply point to
File in the Menu Bar, and click-on Exit. If it asks Do you want to save?, click-
on Yes. If it gives you a save file screen, give it a name of your choice and click
on OK. You should then exit to the Windows Screen with no problems. Since you
have already named everything for this exercise, you should not have to name any
files as you exit.
If you decide to Exit Access 2003, and then return to continue the tutorial, refer to
the instructions at the beginning of this tutorial (Page 1).
187
(see arrow and image to the right). You can simply click-on the file, in this
tutorial Person, and it will open.
Now follow the instructions at the bottom of Page 14 to open your personnel
table and to continue entering data.
In the Button Bar (just below the Menu Bar, to the right of Help, is a button with
a lightening bolt and a small form. This is the New Object: AutoForm
Button. Point to it - make sure you have the correct button - then click-on it
(see image below). A New Data Entry Form will automatically be created and
appear.
188
The Personnel Form should
look something like the one on
the left.
189
The data entry form is now saved as Personnel, just like the Table. Notice, at the
bottom of the Form screen, that there is a status area (see below) that tells
you what record you are on. You can use the arrows to ―move‖ from one record to
another, or select a new record in which to enter data. Click-on each of the arrows
to see how they work. Some will take you forward are back to the next or previous
record, and some will take you to the beginning or end of your records. The arrow
with an asterisk will take you to a new blank record. Enter a few records to see
how the Form View works.
At the lower left corner of the menu screen, you will see some text that
indicates that you are either using Form or Datasheet View to enter your
data.
This text indicates that you are currently in Form View (or
Datasheet View) using the Personnel database. You can
190
“shift” back and forth between Datasheet View and form View by using the
View button in the upper left corner of the Access screen.
The View button on the right indicates what ―view‖ you are using: Design
View, Form View, or Datasheet View. You can move back-and-forth
between views by clicking-on the down triangle to the right of the button (see
arrow and image to the right) and then choosing either Form or Datasheet to
enter your data.
Note: When you are finished entering data and preparing to exit Microsoft Access,
or Close the form, if you did not save before exiting, the program will ask if
you want to Save the Form. This is up to you. You may save it with your
choice of names and it will then show-up as a form when the Person
Database Main Window appears. Or, you can indicate No, and re-create the
form again with the Wizard.
Important
To record enough information so that you can see what a database does
enter 24 or more records now. You may use either Form View or Datasheet
View.
191
Querying the Database
If you are not in the Database: PERSON screen which shows the Tables,
Queries, etc., go there by clicking-on Window in the Menu Bar and then on
PERSON: Database. Also, if you have the Personnel Datasheet or Personnel
Form open (to add data), close them before you begin your queries. The Access
program sometimes becomes logically confused when you try to do queries when
it ―thinks‖ you also want to add data. You may see ―error‖ messages if you leave
the Form or Datasheet open.
Two new windows will now appear: Query 1: Select Query and Show Table.
You will first have to select the table(s) you desire to query. The Show Table
screen should look like the
one below.
192
Make sure the blue highlights are on Show Table and Personnel. Click-on Add
(we'll talk about Wizards later).
The Show Table window will disappear, and the Query 1: Select Query window,
behind the Show Table window, will appear by itself.
These areas
are
magnified
below
Notice, in the upper half of the window, a small box on the left indicates:
Personnel. At the top is an asterisk (* ) and below, in an elevator box, are the
fields from the Personnel Table (you can move up-and-down the list as you
desire).
What we need to do next is place the Fields we want to query in the lower area
of the screen. Notice the lower area on the left
border. The first row indicates Field:, followed by
Table, Sort:, Show:, Criteria:, and or:.
193
Last Name, State, Favorite Number and Salary. Now click-on the down
arrow and then click-on Last Name. Notice how Last Name now appears to
the right of Field: and a (check) is seen in the Show: cell (The
means that you will see Last Names in your query.). Notice also that, to the
right of Table:, that Personnel (the Table from which we queried) is showing.
Now move to the next Field cell on the right and, using the down arrow click-
on State. In the next two fields to the right, insert Favorite Number and
Salary. Your Query1: Select Query screen should look like this:
Now, look in the Button Bar at the top of the screen. In the
middle of the bar you will see an exclamation mark ( ! ) like the
one on the right. If you move the cursor over it, the help text box
will indicate "Run." Click-on the ( ! ). This click executes
your query.
194
Your query screen should
look similar to the one on
the left.
195
To see how your query would look, if you print it, click
on the button that has a piece of paper and
magnifying glass (Print Preview - like the one to the
left). While you’re in the Print Preview you’ll see a little
magnifying glass that you can move over your query. If you click the
left mouse button once the magnifying glass will ―zoom‖ in and enlarge
the view. If you click the left mouse button again it will zoom out. To
return to your query, click-on the Close button just above the
print preview piece of paper. This will take you back to the Normal View of
your query.
You may also sort various fields in your database whenever you are in the
Datasheet View, whether you are viewing the entire Table, or a Query from the
Table. Notice that the Field Names are shown at the top of each column in
gray cells.
196
If you click-on one of the gray area field names (like State), the entire
column (Field) turns ―black‖ (like the image above). This indicates that you
have ―marked‖ the entire column (Field).
In the button bar that appears, when you are editing the
Datasheet View, you will see two buttons with “down”
arrows (like the image on the right). When you move the
cursor over these two buttons a text help box will indicate:
Sort Ascending or Sort Descending. If you click-on one of
the buttons, the Field which you selected (highlighted) will be sorted in the
order selected. Give this a try and see how it works.
So, there are several ―ways‖ you can sort your Tables and Queries.
Specific Queries
So far we have listed everything under each Field Name that we selected.
However, many times you will probably want to find something specific in your
Table (database - e.g. people from a certain state or city, people whose
favorite number is 7 or salaries between $ 20,000 and $ 50,000). This is
fairly common sense, but it can get tricky.
197
Office Access Help.
A Microsoft Office Access Help Menu Screen will appear similar to the one at
the top of the next page.
198
the right side of the
screen to move to the
bottom of the screen.
A number of bulleted
choices will appear.
Click-on Examples of
expressions
199
One of the new choices will
be Examples of criteria to
retrieve records. Click-on
this selection. Your screen
will expand some more, like
the image on the left.
Ranges of values
Text, partial , and matching values
Dates
A blank field‟s value.
When you are finished, click-on the ―X‖ in the upper right
corner of the Microsoft Access Help Topics menu screen to close the screen.
You may return and explore more of these help screens as you become more
accomplished with Access 2003 database. These help screens are like having a
200
complete Access 2003 manual on your computer.
Now we'll try a few specific queries. First let's find a specific state.
You should now be back in the Query1: Select Query menu Design
window. It should look like the one at the top of the next page.
If you‟re not then click the Design button in the upper left
corner of the screen (like the one on the right).
Click-in the cell to the right of Criteria: in the State column. You will see a
flashing cursor (Make sure you are in the State column.). Type-in the
abbreviation for one of the states you entered in your Personnel Table. Your
Query should look like the image below.
Now click-on ( ! ). A
new query window will
appear. Only persons
from the state you
selected should
show.
Now we'll look for Favorite Numbers larger than 600. Type-in >600 in the
Criteria cell under the Favorite Number Column. Click-on ( ! ). Everyone with
a favorite number larger than 600 should show. If no one is indicated you don't
201
have a person with a number larger than 600, or you might have typed the
>600 incorrectly. Return to the Design View. Delete the >600 and run the
query with no criteria. You should ―see‖ all the fields again. Return to the
Design View again.
Next we'll look for persons with salaries equal to or larger than $ 20,000 and
equal to or less than $ 50,000. In the Salary field column, in the Criteria: cell
type-in:
Click-on the ( ! ). You should now see a specific query that indicates those
persons in the range we chose. Go back to Design View. Delete the criteria
you entered under Salary. Now, on your own, if you desire, add or delete some
fields to your query and experiment. Don't get frustrated if no specific items
appear. Frequently you might query for something that can't exist (e.g. states of
VA and CA – a person can't be from both states at the same time) or there just
isn't anything that matches. For fun, notice the or: just below Criteria to the left of
the Design View. Try one state in the Criteria: cell under State and another
in the or: cell. When you have a good feel for queries you’re ready to end your
query session. First, click-on File in the Menu Bar, and then click-on Close. A
Microsoft Office Access Window will appear and ask: "Do you want to save
changes to the design of query 'Query1'?‖
Click-on Yes and a Save As window will appear. Name the Query anything you
like, we’re going to name our query ―Test Query 2003.‖ Click-on OK. When the
Query1: Select Query view closes you will return to the person: Database
screen. Notice that the Query Selection is active and your new query is available
to use again, as you desire. You can activate this query and change things just like
you did in the tutorial. If you want a printout of your query (at anytime), simply
click-on the Printer Button in the button bar or on File in the Menu Bar and
Print.
Reports
202
Reports can be very complex. In this tutorial we'll learn the basics. A good
manual or will be essential to mastering reports.
There are several types of reports. We'll use the Wizards to design some.
203
comes from:, click-on the down arrow and select Personnel. Then click-on
OK.
The following
Report Wizard
Menu screen
should appear:
So let's begin. Click-on First Name, then click-on > (notice how the First Name
field went from the Available Fields: to Selected Fields:). Now do the same
with the Last Name, State, Gender and Salary fields. These are the fields that
will appear in our first report.
204
Your Report Wizard screen should look like the one below.
Grouping in Reports
This Report Wizard menu screen asks if you want to add Grouping. Grouping
simply ―groups‖ records by an item in the report you are designing. We’ll group by
state. This means that ―records‖ from a state will be in a ―group‖ (e.g. people
from Virginia will be in one group, the folks from Washington in another, and so
on). This will be easy to see when we look at the report. So, click-on State, then
click-on >. If you make a mistake, no problem, just use the <. Your screen should
now look like the one below.
205
Click-on Next> again. Another Report Wizard menu screen will follow.
206
First, the above screen requests that you indicate a Sort Order. This simply
means that within each ―group, the alphabetic order in which you want the fields
sorted. We’ll sort by Last Name and then First Name. This way you’ll have the
names, grouped by state, in Last Name order and, where you have several people
with the same Last Name, they’ll be sub-sorted in First Name order. Notice the
Ascending button to the right of the Sort box. This indicates that the Field that
you select is in A to Z or ascending order. If you click-on this button, it will reverse
the order from Z to A, or descending order. So, click-on the small down arrow
to the right of the first box and select Last Name. Leave the order as
Ascending. Now, select First Name in the second box. When you are finished,
your Report Wizard menu screen should look like the one above.
Notice a Summary Options button below the sort fields you have selected.
Access 2003 is ―really smart.‖ Whenever you see the Summary Options box it is
because Access 2003 knows that you selected a number field for your report. The
Summary Options box ONLY appears when a number field is selected! Click-on the
Summary Options… button.
The Summary Options menu box allows you to enter calculations for
numerical and currency fields if you have selected any. It will summarize
these calculations by each group, and in total. So, since Salary is a currency
field, we can obtain calculations. Click-in the boxes under Sum and Avg; this will
furnish these calculations, as you will see in the report. If you want percentages as
well, click-in the box next to Calculate percent of total for sums.
Click-on OK. This will return you to the previous Wizard screen. Click-on Next>
again.
207
This Report Wizard screen allows you to select a layout for your report. Click-in
the small circles to the left of each choice in the layout area and observe the
results. For the moment, we‟ll stay with the default: Stepped. So click-again
it that circle. Leave the report in Portrait Orientation.
Note: At the bottom of the last Report Wizard menu screen there is a check in
the small box to the left of Adjust the field width so all fields fit on a page. This
is a very important check. This means that no matter how many fields you
place in your report, they will all fit on one page. With a few fields in the
report, this is no big deal. However, if you have a lot of fields, they will be
all “scrunched” up and you‟ll notice that sometimes the Field Names and
data for these fields are “cut-off” a bit. As mentioned at the beginning of
the Reports section of the tutorial, this is where an advanced course or manual
are almost essential.
208
This menu screen allows you to select the Style that you would like for your report.
Click-on the choices (Bold, Casual, etc.) and see what each ―looks like‖. Choose
whichever style you desire and click-on Next> again.
209
The next Report Wizard screen is the last screen in the sequence. It allows you
to select a title different from the name of your database - if you so choose.
Note that the small circle in front of Preview the Report is ―dotted‖. When
we click-on the Finish button Access 2003 will go to a preview copy of your
report. We’ll title this report State Report. Use this name, or any name you
desire, and click-on Finish.
Notice the ―triangle arrow” buttons to the left and right of Page 1. These
take you to the first page of the report, the previous page, the next page, and
the last page. Try clicking-on them.
Notice that your cursor – in this Preview Report screen is a magnifying glass.
This shows you how a page of your report will appear when you print it. Each
time you click the magnifying glass you will ―zoom in‖ or ―zoom out‖ making
your report appear larger or smaller. You will zoom to the ―place‖ where you
place your magnifying glass – just like if you were using a real magnifying glass
and a real piece of paper. You’ll magnify the place where you are ―holding‖ the
magnifying glass. So, give this a try.
button function. Just like queries, we'll be going back and forth
between Design
Second: Notice, to the left, in the gray part of the screen, it indicates:
Report Header, Page Header, State Header, Detail, State
Footer, Page Footer and Report Footer (see arrows on the last
page).
Report Header: If something shows here, it will only be shown on the first
page of the report.
These are the database fields themselves. The fields print each time
there is a person in the database. This field information is drawn from the
database. As you enter more people in the database and run the report
again, more people will be shown. The "size" of the box you see on the
screen was created when we created the field sizes.
Report Footer: This is what shows only on the last page of the report.
You can either click-on File (in the Menu Bar) and then Save, or Save As, or
click-on the small diskette button in the button bar. A menu window will
open which says Save As.
In the area under Save Report „State Report‟ To: type-in State Report
then click-on OK. Now click-on the File in the Menu Bar and then click-on
Close. You could also click-on the ―lower X‖ in the upper right corner of the
screen. Be careful here. The lower ―X‖ closes whatever you are working on
(report, query table, etc.). The upper ―X‖ closes the Access 2003 database.
You should now return to the main Access 2003 Person: Database screen.
The Person: Database window should appear on the screen. If it does not,
then click-on File, then Open Database. When the Open Database Window
appears, click-on Person.mdb in the File Name area, then click-on OK. In
the person: Database window click-on the Report area. A report named
State Report will be there. Click-on it, then click on the Design button. You
are now in your report design screen. Close this report again as you did
previously.
Now we'll create some other reports. This is similar, in process, to the report
you just completed. In the person: Database window – make sure you have
clicked-in the Reports area - click-on the New button. When the New
Report Window appears, click on ―down triangle‖ in the area to the right of
Choose the table or query where the object‟s data comes from:, then
click-on Personnel.
Now click-on some of the different Wizard‟s choices. Try Auto Report:
Columnar and Tabular, or go back to the Design Wizard again. Experiment
with the different types.
As you create reports you may save or not save, as you desire.
Reports can become very complex, very quickly. This is only an introductory
tutorial, which furnishes a simple guide to report design. You might want to
purchase a book on Access or try a separate tutorial on reports. Our favorite
book is Microsoft Access 2003 – Inside Out from Microsoft Press
Now that you have the basics, you might want to try some things on your own.
Try using the Wizards in Table, Query and Reports.