Information Communication Technology: Grade 10
Information Communication Technology: Grade 10
Information Communication Technology: Grade 10
COMMUNICATION
TECHNOLOGY
STUDENT TEXTBOOK
Grade 10
Authors
Dixit J.B.
Saurabh Gupta
Evaluators
Gelan Tulu
Genene Tadesse
Zekarias Kebede
The development, printing and distribution of this student textbook has been funded through the General Education
Quality Improvement Project (GEQIP), which aims to improve the quality of education for Grades 1-12 students in
government schools throughout Ethiopia.
The Federal Democratic Republic of Ethiopia received funding for GEQIP through credit/financing from the
International Development Associations (IDA), the Fast Track Initiative Catalytic Fund (FTICF) and other development
partners—Finland, Italian Development Cooperation, the Netherlands and UK aid from the Department for
International Development (DFID).
The Ministry of Education wishes to thank the many individuals, groups and other bodies involved—directly and
indirectly—in publishing the textbook and accompanying teacher guide.
Developed, printed and distributed for the Federal Democratic Republic of Ethiopia, Ministry of Education by Laxmi
Publications Pvt. Ltd., India under GEQIP Contract No. ET-MoE/GEQIP/IDA/ICB/G-02/09-D
All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written
permission of the copyright owner or a licence permitting restricted copying in Ethiopia by the Federal Democratic
Republic of Ethiopia, Federal Negarit Gazeta, Proclamation No. 410/2004 Copyright and Neighboring Rights Protection
Proclamation, 10th year, No. 55, Addis Ababa, 19 July 2004.
Disclaimer
Every effort has been made to trace the copyright owners of material used in this document. We apologise in advance
for any unintentional omissions. We would be pleased to insert the appropriate acknowledgement in any future
edition.
Printed in India.
Content s
Unit 1: Introduction to ICT________________________________________________________________ 1
1.1 Basics of ICT.................................................................................................................................. 1
1.2 Computer System.......................................................................................................................... 9
Review Questions............................................................................................................................ 16
Unit 2: Application Software_______________________________________________________________ 18
2.1 Key Features of Word Processing.............................................................................................. 18
2.2 Key Features of Presentation Software and Techniques........................................................ 36
2.3 Desktop Publishing....................................................................................................................... 44
Review Questions............................................................................................................................ 63
Unit 3: Information and Computer Security_________________________________________________ 65
3.1 Information and Computer Security......................................................................................... 65
Review Questions............................................................................................................................ 73
Unit 4: Application Software_______________________________________________________________ 75
4.1 Key Features of Spreadsheets..................................................................................................... 75
4.2 Database Application.................................................................................................................... 89
Review Questions............................................................................................................................ 114
Unit 5: Using Internet_____________________________________________________________________ 116
5.1 Overview of the Internet.............................................................................................................. 116
5.2 Definition of WWW...................................................................................................................... 123
5.3 Planning and Developing Web Pages........................................................................................ 127
Review Questions............................................................................................................................ 134
Unit 6: Control and Learning with Logo__________________________________________________ 136
6.1 Control and Learning with Logo........................................................................................... 136
Review Questions............................................................................................................................ 143
Glossary__________________________________________________________________________ 145
PREFACE
Information and Communication Technology (ICT) is so important in the world today that it makes
it imperative for every person to be competent in the use of ICT for the many tasks that one will have
to accomplish. This book is written to provide the basic skills in ICT for Grade 10 students of Federal
Democratic Republic of Ethiopia. It is expected that the knowledge and skills gained through this book
will help the students to use ICT in almost all their courses at school. The book covers selected basic
topics in ICT which offer hands-on activities to help students in acquiring the required ICT skills.
The key features of this book will help the students to:
l develop the basic ICT skills.
l understand the components of ICT and computer system.
l understand the application of word processing, presentation software and desktop publishing.
l understand the application of ICT & its elements for different purposes.
l understand information and computer security and be aware with the copyright issues.
l understand the use of spreadsheet in creating charts, graphs and for different applications.
l learn database and use of Query, Form and Report in it.
l learn the uses of internet, download, upload files using the Internet and list some uses of the
WWW.
l plan and develop a simple webpage.
l use variables in writing procedures and create a recursive procedure using LOGO language.
l follow basic ethics in the use of ICT.
l have excellent ICT skills which will serve them well in their future studies.
The text has been designed in a simple and user friendly way. This text focuses on the fundamentals
of ICT, which change slowly. This not only makes the information remain useful to a student when
one graduates, but also makes the student focus on the foundation concepts of ICT. This book also
illustrates the latest developments in the rapidly changing world of ICT. Review questions have also
been given at the end of each unit.
Suggestions for the improvement of this book will be gratefully acknowledged.
Authors
Unit 1 – Introduction to ICT
Unit 1 Introduction
to ICT
Unit Outcome
Students will be able to:
understand the components of ICT;
recognize the major system unit components;
recognize the major motherboard components.
l Revision
When computer and communications technologies are combined, the result is Information and
Communications Technology.
l Components of ICT
ICT refers to technologies that provide access to information through telecommunications. It is similar
to Information Technology (IT), but focuses primarily on communication technologies. This includes
the Internet, wireless networks, cell phones, and other communication media.
Modern Information and Communication Technologies have created a “global village”, in which people
can communicate with others across the world, as if they were living next door. For this reason, ICT is
often studied in the context of how modern communication technologies affect society.
What is an IC T System?
An ICT system is a set-up consisting of hardware, software, data and the people who use them. It commonly
includes communications technology, such as the Internet.
ICT and computers are not the same thing. Computers are the hardware that is often part of an ICT
system.
Input, Output and System Diagrams
What comes out of an ICT system is largely dependent on what you put into the system to begin with.
ICT systems work by taking inputs (instructions and data), processing them and producing outputs that
are stored or communicated in some way. The better the quality of inputs, the more useful the outputs.
Garbage In, Garbage Out (GIGO)
ICT systems cannot function properly if the inputs are inaccurate or faulty; they will either not be able to
process the data at all, or will output data which is erroneous or useless.
GIGO is a useful term to remember in the examination—it can help explain many issues such as
why validation is needed and why accurate data is valuable.
Feedback
It is sometimes good to have feedback in an ICT system. This is when the output from a system feeds
back to influence the input and the process repeats itself.
Media Integration
Methods used for input to and output from ICT systems vary a lot. So, you should be familiar with examples
of input and output formats.
Input and output formats are the different kinds of media that are used to either gather and collect data and
instructions or to display, present or issue the outputs of processing.
Up until recently, most media formats required dedicated devices—for example, digital cameras to
take digital photographs, scanners to digitise images for use on a computer, or DVD players for video
playback—so the correct devices are needed in order to work with each media format.
There is now a growing tendency for multi-purpose ICT devices or
convergence. The driving force is the communication power of the Internet,
and the increasing availability of small high-powered electronic technology.
This means that you can now get an all-in-one box that can do the same thing
as several different ones did before it. Some examples are:
(i) Combined printers, scanners and photocopiers
(ii) Televisions with built-in Internet connections and web browsers
(iii) Mobile phones (see Fig. 1.3) that can take photos, record video, access
Fig. 1.3: Mobile phones—
the Internet and playback music. Multipurpose ICT devices
The Internet
The Internet is a worldwide system of interconnected computer networks. When you connect your computer
to the Internet via your Internet Service Provider (ISP), you become part of the ISPs network, which is
connected to other networks that make up the Internet.
Network
A computer network (see Fig. 1.5) consists of a number of computers linked together to allow them to share
resources. Networked computers can share hardware, software and data.
Activity 1.1
The Characteristics of Valuable Information
Students will discuss in small groups the characteristics of valuable information.
Key Concepts
ICT refers to technologies that provide access to information through telecommunications. It focuses
primarily on communication technologies. This includes the Internet, wireless networks, cell phones, and other
communication media.
An ICT system is a set-up consisting of hardware, software, data and the people who use them. It commonly
includes communications technology, such as the Internet.
The Internet is a worldwide system of interconnected computer networks.
A computer network is a number of computers linked together to allow them to share resources. The two main
types of network are Local Area Network (LAN) and Wide Area Network (WAN).
The main components of ICT are computer and communication networks.
The characteristics of valuable information are: relevant, up-to-date, accurate, meet the needs of the user, easy
to use and understand, worth the cost, reliable.
Assessment 1.1
Fill in the Blanks
1. When computer and communications technologies are combined, the result is ............................... .
2. ICT refers to technologies that provide access to information through ........................... .
3. An ICT system is a set-up consisting of ..........................., ..........................., ........................... and people who
use them.
4. ........................... is a worldwide system of interconnected computer networks.
Suggested Activity
Identify the components of Information and Communications Technology such as computer, communication
networks, etc.
Field Trip
Organize a field trip to various places like Cyber Cafe’s, Universities, Private Colleges, or Ethiopian
Telecommunication Corporation (ETC) stations to find out and report on: Components of ICT.
Computer is perhaps the most powerful and versatile tool ever created by human being. In today’s world,
the use of computers has increased so rapidly that we can no longer ignore them. Computers influence our
lives in one way or the other. These days we see computers being used to perform several functions that
have made our life easy. The list of services for which computers are used is a long one.
What is a Computer?
Computer is an electronic device that can accept, store and process data under the control of a set of
instructions. The instructions, called a program, are stored in the computer when in use, so they can be
executed automatically.
A computer appears to be far more intelligent and informed than human beings but the fact is, it cannot
perform any task on its own. We need to give the computer instructions on exactly what it has to do.
If an unanticipated situation arises, computers will either produce wrong results or abandon the task
altogether. They do not have the potential to work out alternative solutions.
Figure 1.9 shows some of the main components of a computer system:
Let us discuss the major system unit components and their functions:
Motherboard
The motherboard, or system board, is the main circuit board in system
unit. The motherboard (see Fig. 1.12) consists of a flat board that fills
one side of the case. It takes care of the entire system task in one way
or the other. The primary function of the motherboard is to serve as
the base upon which a computer’s components are built. It contains
both soldered, non-removable components and sockets or slots for
components that can be removed—microprocessor chip, RAM chips,
and various expansion cards. Fig. 1.12: Motherboard
Power Supply
The electricity available from a standard wall outlet is Alternating Current (AC), but a computer runs on
Direct Current (DC). The power supply is a device that converts AC to DC to run the computer. The on/off
switch in your computer turns on or shuts off the electricity to the power supply. Because electricity can
generate a lot of heat, a fan inside the computer keeps the power supply and the other components from
becoming too hot.
Electrical power drawn from a standard AC outlet can be quite uneven. For example, a sudden surge, or
“spike,” in AC voltage can burn out the low-voltage DC circuitry in your computer (“fry the motherboard”).
Instead of plugging your computer directly into the wall electrical outlet, it is a good idea to plug it into a
power protection device. One of the principal types is UPS.
A UPS (Uninterruptible Power Supply) is a battery-operated device that provides a computer with
electricity if there is a power failure. The UPS will keep a computer going for 5 to 30 minutes or
more. It goes into operation as soon as the power to your computer fails. It also stabilizes any sudden
fluctuation in the power supply.
10 Information Communication Technology — Grade 10 Student Textbook
Unit 1 – Introduction to ICT
Hard Disk
Hard disks are thin but rigid metal, glass, or ceramic platters covered with a substance that allows data to
be held in the form of magnetised spots. Most hard disk drives have at least two platters; the greater the
number of platters, the larger the capacity of the drive. The platters in the drive are separated by spaces and
are clamped to a rotating spindle that turns all the platters in unison. Hard disks are tightly sealed within
an enclosed hard disk drive unit to prevent any foreign matter from getting inside. Data may be recorded
on both sides of the disk platters (see Fig. 1.13). In a microcomputer, the hard disk is enclosed within the
system unit. Unlike a floppy disk, it is not accessible.
CD-ROM Drive
A CD (Compact Disk) drive, or its more recent variant, a DVD
(Digital Video Disk) drive, is a storage device that uses laser
technology to read data from optical disks (see Fig. 1.14). (Some
companies call a DVD a “Digital Versatile Disk.”) These days
new software is generally supplied on CDs rather than on floppy
disks. Fig. 1.14: CD/DVD drive and a CD
Floppy Drive
A floppy disk drive is a storage device that stores data on removable 3.5-inch-diameter disks (see
Fig. 1.15). These diskettes do not seem to be “floppy,” because
they are encased in hard plastic, but the mylar disk inside is
indeed flexible or floppy. Each can store 1.44 MB or more data.
Using the floppy disk drive you can insert a diskette through a
Fig. 1.15: Floppy drive and floppy
slot in the front and remove it by pushing the eject button.
You must not remove the diskette from floppy disk drive until its light goes off, or else you risk
damage to both the disk and the drive.
CPU
The most fundamental part of a motherboard is the microprocessor chip or the Central Processing Unit (CPU)
(see Fig. 1.16). A microprocessor is the miniaturised circuitry of a computer processor. It consists of mainly an
RAM allows the stored data to be accessed in any order, that is, at random.
RAM is a volatile form of storage. It is the working memory of the computer. Having enough RAM is
critical for the user to run many software programs.
ROM chips—to store fixed start-up instructions: Unlike RAM, to which data is constantly being added
and removed, ROM (Read Only Memory) cannot be written upon or erased by the computer user. ROM
chips contain fixed start-up instructions.
ROM chips are loaded, at the factory, with programs containing special instructions for basic computer
operations, such as those that start the computer (BIOS) or put characters on the screen. These chips are
non-volatile; their contents are not lost when power to the computer is turned off.
In computer terminology, read means to transfer data from an input source into the computer’s memory
or CPU. The opposite is write—to transfer data from the computer’s CPU or memory to an output device.
Thus, with a ROM chip, read-only means that the CPU can retrieve programs from the ROM chip but
cannot modify or add to those programs. A variation is PROM (Programmable Read Only Memory), which
is a ROM chip that allows you, the user, to load read-only programs and data. However, this can be done
only once.
Slots
The motherboard has expansion slots—for expanding the PC’s capabilities—which give you places to plug
in additional circuit boards, such as those for video, sound and communications (modem).
CMOS Battery
This is a battery that maintains the time, date, hard disk and other configuration settings in the CMOS
(Complementary Metal Oxide Semiconductor) memory. CMOS batteries are small and attached directly to
the motherboard.
Memory Capacity
Memory capacity is the maximum or minimum amount of memory a computer or hardware device is
capable of having or it is the required amount of memory for a program to run or execute.
The storage capacity of a computer is measured in bytes. The hierarchy of byte memory capacity is as
follows:
(i) Bit. It is the smallest unit of memory. A bit has the value 0 or 1. This is determined by no voltage
or high voltage.
(ii) Byte. One byte means 8-bits.
(iii) Kilobyte. Kilo means one thousand, so a kilobyte (KB) is approximately one thousand bytes. Actually,
a kilobyte is 1,024 bytes.
(iv) Megabyte. Mega means one million, so a megabyte (MB) is approximately one million bytes (1,048,576
bytes, or 1,024 kb or 1,024 × 1,024 bytes, to be exact). Most personal computers have hundreds of
megabytes of RAM.
(v) Gigabyte. Giga means one billion. A gigabyte (GB) is actually 1,073,741,824 bytes or 1,024 MB
(i.e., 1,024 × 1,024 × 1,024 bytes). The storage capacity of a hard drive in modern personal computers
is often many gigabytes.
(vi) Terabyte. One trillion bytes (actually, 1,099,511,627,776 bytes) is a terabyte (TB).
Table 1.2 summarizes the units of memory capacity.
Table 1.2: Units of Memory Capacity
Unit Abbreviation Size Symbol Equivalent
Bit – – – An atom or speck, the smallest
unit of memory.
Byte – 8 bits A single letter, a number, or a
symbol.
Table 1.3 summarizes the characteristics of the various kinds of data storage.
Table 1.3: Characteristics of Various Kinds of Data Storage
Storage Speed Capacity Relative Cost (Birr) Permanent?
Computer Speed
When we refer to the speed of a computer, we are talking about the speed of CPU. The microprocessor
(CPU) is the “brain” of a computer. One of the most important things about CPUs is speed. The speed of
CPU is measured in Hertz or Hz, i.e., number of operations that can be done per second. Nowadays, we
usually use Giga-Hertz or GHz (e.g., 2.8 GHz, 3.06 GHz) because the CPUs are too fast to be measured
in Hz.
Because of the extremely high speed of CPU, computers can do millions of operations in a very short
time.
Heat is released when a CPU is run. High temperature, however, decreases the performance of CPU.
You, therefore, need a fan to cool down the CPU.
Activity 1.2
Identification of Various Components of a Computer System
Students to form groups in their class and identify the following components.
Key Concepts
Computer is an electronic device that can accept, store and process data under the control of a set of
instructions.
The System Unit is also called a case. It is a box that houses the motherboard (into which processor and RAM
chips are plugged), power supply, as well as secondary storage devices —floppy disk drive, hard disk drive, and
CD or DVD drive.
The motherboard, or system board, is the main circuit board in the system unit.
The most fundamental part of a motherboard is the microprocessor chip or the Central Processing Unit
(CPU). It is often referred to as the “brain” of the computer.
Memory capacity means the amount of program instructions and data that can be stored on it.
Computer speed means the speed of the CPU.
Review Questions
Fill in the Blanks
1. ........................... is perhaps the most powerful and versatile tool ever created by human being.
2. The ........................... is also called a case.
3. A CD (Compact Disk) drive, is a storage device that uses ........................... technology to read data from
optical disks.
4. The contents of ........................... are lost when the power goes off or is turned off.
5. Memory is the part of the computer that holds ........................... and ........................... for processing.
Suggested Activities
1. Cut out an advertisement from a newspaper or a magazine that features a new microcomputer system.
Circle all the terms that are familiar to you. Define these terms on a separate sheet of paper. Is this
computer expandable? How much does it cost? Is the monitor included in the price? Is a printer included
in the price?
2. Consider the secondary storage components for a new system you are planning to buy. Using the
advertisements in a computer magazine or a newspaper, pick out particular examples of each of the
following devices and write a brief description of why you would want them and how much they would
cost. Keep in mind that many of these components are already part of many systems, so you will concern
yourself with adding them only after the system has been purchased.
(i) Hard disk drive (ii) Floppy disk drive
(iii) Floppy disks (iv) Removable disks
(v) CD-ROM drive (vi) DVD drive
Unit 2 Application
Software
Unit Outcome
Students will be able to:
understand the application of word processing, and presentation software;
apply word processing, and presentation software packages for different purposes;
recognize the major features of desktop publishing;
know how to organize, format and publish various types of publication.
Software, or programs, consists of all the electronic instructions that tell the computer how to perform a
task. The term software was coined by John Tukey. Application software is a set of programs designed for
specific uses or applications such as word processing, graphics or spreadsheet analysis. These software
are designed to satisfy a particular need of a particular environment. An application software, designed
to satisfy one purpose may not be able to solve other purpose of the same user. For example, software for
financial management cannot be used for designing two-dimensional graphics. Similarly, we have word
processors for letter writing and presentation software for presentations. We cannot interchange the use of
two application software with each other.
Application software can be custom-made but are usually purchased from a software store. Some of the
popular application packages are Word processors, Spreadsheets, Database system, Accounting packages,
DTP packages, Graphic packages and Antivirus software. In this unit, we will study application software.
Word processing software allows you to create, edit, format, print, and store text material, among other things.
Word processor is the most common application software. The well known word processing programs are
Microsoft Word, Writer, Wordpad, Text Editor and Star Word.
The advantages of using a word processor to create documents over typed documents are given in
Table 2.1.
Table 2.1: Advantages of Word Processor
Typed Documents Documents Created Using a Word Processor
Slow creating process Can be created quickly and easily
Difficulty in inserting pictures and images Pictures and images can be inserted easily
Look messy after making corrections Error correction is simple and neat.
l Revision
Let us revise some key features of Word Processing, which we have studied in Grade 9, i.e., Opening a
Word processing software, Creating new document, Saving a document, Closing a document, Editing a
document and Formatting a document, etc.
Creating Documents
It means entering text using the keyboard. Word processing software has three features that affect this
process—the cursor, scrolling and word wrap.
1. Cursor: The cursor is a movable symbol on the display screen (monitor) that shows us where we
may next enter data or commands. It is often a blinking rectangle or an I-beam. We can move the
cursor by using the keyboard’s directional arrow keys or a mouse. The point where the cursor lies
at a particular instant is known as the insertion point.
2. Scrolling: Scrolling means moving quickly upward,
downward or sideways through the text or other
screen display. A standard computer monitor displays
only 20–22 lines of standard-size text at a time.
Generally, the documents are longer than that. Using
the directional arrow keys, or the mouse and scroll
bars located at the side and bottom of the screen, we
can move or “scroll” through the display screen and
into the text above and below, and even sideways.
3. Word Wrap: Word wrap automatically continues text
on to the next line when we reach the right margin, Fig. 2.1: Scrolling
i.e., the text “wraps around” to the next line. We do
not need to hit a “Carriage return key” or (Enter) key, like in a typewriter.
Editing Documents
When editing a document to correct mistakes, we can move the insertion point where we wish to enter new
text and then just type it in. To delete characters, we press (Backspace) or (Delete) key.
Pressing Backspace key deletes characters to the left of the insertion point and pressing Delete key deletes
those to the right. We can also drag the mouse to highlight any section of the text and then copy/cut and
paste it to another file, or to some other place in the document being used or cut (delete) it all at once.
The Undo command allows us to change our mind and restore text that we have just deleted. Inserting
is the act of adding to the document. The (Insert) key plays an important role in the replacement of
Saving Documents
It means storing, or preserving, a document as an electronic file permanently—on floppy disk or hard disk
(say). This feature is available in nearly all application softwares. The saved document can be retrieved and
used when needed.
2. Choose the All Programs option in the Start menu (see Fig. 2.2).
3. Click the Microsoft Office option from the All Programs menu.
4. Click the Microsoft Office Word 2007 option.
This opens a blank new document (see Fig. 2.3 on next page).
Office Button displays Microsoft Office logo and, when clicked, displays a list of options and most
recently opened documents.
Quick Access Toolbar contains buttons for commonly used commands.
Creating a Document
When you start MS-Word, a blank document window appears. MS-Word, by convention, names newly
created documents as DOCUMENT1, DOCUMENT2, DOCUMENT3, ... and so on. Thus, each new
document, when created, is given a name DOCUMENT <serial number>. The various parts of that window
are shown in Fig. 2.3.
The important features of MS-Word are:
1. Outline features: It enables you to view headings in your document.
2. Cut-and-paste feature: It enables you to move blocks of text.
3. Formatting feature: It enables you to change type font and size.
Microsoft Word 2007 is a word processing application software used to create documents such as
memos, letters, reports, research papers, brochures, announcements, newsletters, envelops, labels and
much more.
Case Study
Producing a Descriptive Article on Photosynthesis
Let us revise and demonstrate the various tasks performed in MS-Word by producing a descriptive article on
photosynthesis.
Useful Tips
When Several Word Documents are Open
You can write with several Word documents open simultaneously. To go (“toggle”) back and forth, held
down Ctrl and press F6. To go backward, press Ctrl, Shift and press F6. To display several documents at
once, go to the Window group in the View tab and select Arrange All button. You can copy/cut and paste text
from one document to another.
Caution: When you are using the ‘Save As’ option, make sure that you do not overwrite the existing
copy of the file.
Closing a Document
After your work is complete you need to close the document without exiting from the MS-Word.
To close a document without exiting the MS-Word,
1. Click the Office Button.
2. Click the Close option.
If you have not saved the document before closing, MS-Word gives you warning asking to save the
document (see Fig. 2.10).
Useful Tip
You can close the document using Close button available in the Title bar.
5. After clicking on the last cell of the selected table size, a table is inserted into the document at the
insertion point below the text (see Fig. 2.12).
Now fill the table as per your requirement.
Table Manipulation
It includes selection, insertion, deletion, adjustment etc. of the basic elements of a table.
Selecting
To select cell, row, column or table, click the Select button in the Table Tools Layout tab (see Fig. 2.13).
Now select the desired option.
Alternatively, you can select the item (cell, row or column) as:
To select Do this
To select all cells in the table, click the table move handle that displays in the upper left corner of the
table (square with a four-headed arrow inside).
Besides using the mouse, you can select cells using keyboard shortcuts as given in
Table 2.2.
Table 2.2: Selecting Cells Using the Keyboard
Key(s) To Select
Tab The next cell’s contents
Shift + Tab The preceding cell’s contents
Hold Shift key and then press the arrow key repeatedly Adjacent cells
Position insertion point in top cell of column, hold down A column
the Shift key, and then press Down Arrow key until column
is selected
Alt + 5 (on the numeric keypad with Num Lock off) The entire table
Adding a cell
To add a cell in a table, perform the following steps:
1. Click in a cell that is to the right of or above where you want to insert a cell.
2. Under Table Tools, on the Layout tab, click the Rows & Columns Dialog Box Launcher.
3. Click one of the following options.
Click To
Shift cells right Insert a cell and move the selected cell and all other cells to the right of the
selected cell in that row to the right.
Shift cells down Insert a cell and move the selected cell and the existing cells below the
selected cell down one row. A new row is added at the bottom of the
table.
Insert entire row Insert a row above the cell that you clicked in.
Insert entire column Insert a column to the left of the cell that you clicked in.
Word does not insert a new column. Using the Shift cells right option may result in a row that has more
cells than the other rows.
Adding a row
To add a row in a table, perform the following steps:
1. Click in a cell above or below where you want to add a row.
2. Under Table Tools, on the Layout tab, do one of the following:
(i) To add a row above the cell, click Insert Above in the Rows & Columns group.
(ii) To add a row below the cell, click Insert Below in the Rows & Columns group.
Adding a column
To add a column in a table, perform the following steps:
1. Click in a cell to the left or right of where you want to add a column.
2. Under Table Tools, on the Layout tab, do one of the following:
(i) To add a column to the left of the cell, click Insert Left in the Rows & Columns group.
(ii) To add a column to the right of the cell, click Insert Right in the Rows & Columns group.
Deleting a cell
To delete a cell from a table, perform the following steps:
1. Select the cell that you want to delete by clicking its left edge.
2. Under Table Tools, click the Layout tab.
3. In the Rows & Columns group, click Delete, and then click Delete Cells.
4. Click one of the following options:
Click To do this
Shift cells left Delete a cell and shift all other cells to the right of the deleted cell in that row
to the left.
Shift cells up Delete a cell and move the remaining existing cells below the deleted cell in
that column up one row each. A new, blank cell is added at the bottom of the
column.
Delete entire row Delete the entire row that contains the cell that you clicked in.
Delete entire column Delete the entire column that contains the cell that you clicked in.
Word does not insert a new column. Using the Shift cells left option may result in a row that has fewer
cells than the other rows.
Deleting a row
To delete a row from a table, perform the following steps:
1. Select the row that you want to delete by clicking its left edge.
2. Under Table Tools, click the Layout tab.
3. In the Rows & Columns group, click Delete, and then click Delete Rows.
Deleting a column
To delete a column from a table, perform the following steps:
1. Select the column that you want to delete by clicking its top gridline or top border.
2. Under Table Tools, click the Layout tab.
3. In the Rows & Columns group, click Delete, and then click Delete Columns.
Deleting a table
To delete a table, perform the following steps:
1. Click in the table.
2. Under Table Tools, click the Layout tab.
3. In the Rows & Columns group, click Delete, and then click Delete Table.
Merging cells
You can combine two or more table cells located in the same row or column into a single cell. For example,
you can merge several cells horizontally to create a table heading that has several columns.
To merge cells in a table, perform the following steps:
1. Select the cells that you want to merge by clicking the left edge of a cell and then dragging across
the other cells that you want.
2. Under Table Tools, on the Layout tab, in the Merge group, click Merge Cells.
Splitting cells
To split cell(s) in a table, perform the following steps:
1. Click in a cell, or select multiple cells that you want to split.
2. Under Table Tools, on the Layout tab, in the Merge group, click Split Cells.
3. Enter the number of columns or rows that you want to split the selected cells into.
Pictures
Pictures are bitmaps, scanned photographs or clipart images. In MS-Word documents, pictures are used to
visually represent things, emotions, and objects.
Inserting Pictures
Clipart or pictures are inserted to create effective documents. MS-Word supports many popular picture
formats, for example .wmf (Window Meta Files). You can insert pictures from the disk as well as cliparts
from the clipart gallery of MS OFFICE. You can also insert downloaded pictures or pictures taken by your
web cam or digital camera, into your documents.
The pictures can be inserted in a word document in the following way:
1. Open the document.
2. Identify the pictures to be inserted in the document.
3. Insert pictures in the document.
4. Determine the appearance of the pictures.
5. Change the appearance of the graphics.
6. Save the document.
Let us implement this in MS-Word 2007.
The steps for inserting pictures are given below:
1. Open a document. Here, we are working in an already open document (refer to Fig. 2.12).
2. Click the Insert tab.
3. Select the Picture option from Illustrations panel (see Fig. 2.15).
Activity 2.1
Writing a Piece about Irrigation and Water Distribution in Ethiopia
Students will perform the following steps for doing the activity:
1. Click the Start button on the Task bar.
34 Information Communication Technology — Grade 10 Student Textbook
Unit 2 – Application Software
Key Concepts
Word processing is the most widely used computer application.
When you are using the ‘Save As’ option, make sure that you do not overwrite the existing copy of the file.
When you edit text, you change the text by either inserting text, deleting text or replacing text by using mouse
or keyboard.
Formatting text means changing the text appearance by changing the alignment, style, font and font colour.
To format text, you need to use the Home tab.
Tables provide you an easier and effective method of arranging the data in rows and columns.
Pictures are inserted to create effective documents.
Assessment 2.1
Fill in the Blanks
1. ........................... is the most commonly used application software that creates text documents.
2. MS-Word’s ........................... feature is useful for displaying data in columns and rows.
3. In Word, ........................... means changing the text appearance by modifying the alignment, style, font
and font color.
4. Insert Panel has Illustrations option in Word 2007 which allows you to insert ..................... into the text.
Information Communication Technology — Grade 10 Student Textbook 35
Unit 2 – Application Software
Suggested Activities
1. Creating a personal C.V.
2. Keeping a logo of personal performance in physical education.
3. Writing a report on a chemical experiment.
4. Writing a report on a Physics experiment.
6. Good font specifications allows you to change and use different font faces, styles, and effects.
7. Additional features for slide allows footnotes, cross references, advanced navigation system, headers,
and footers.
8. Good layout management system presets or Customized layout designing.
9. Spell checkers and dictionary support.
10. Allows the slide show of the presentations.
In this sub-unit, we will revise the concepts of Presentation Software that we have learnt in Grade 9.
l Revision
As discussed in Grade 9, PowerPoint is a presentation graphics program you can use to organize and
present information. With PowerPoint, you can create visual aids for a presentation and then print copies
of the aids as well as run the presentation.
A presentation in PowerPoint generally follows a presentation cycle. The general steps of this cycle
include opening PowerPoint, creating and editing slides; saving, printing, running and closing the
presentation; and then closing PowerPoint.
Suppose you are having MS-PowerPoint 2007 installed on your computer.
To start using PowerPoint:
Click Start → All Programs → Microsoft Office → Microsoft Office PowerPoint 2007 (see Fig. 2.19).
Depending on your system configuration, the steps you perform to start PowerPoint may vary.
Information Communication Technology — Grade 10 Student Textbook 37
Unit 2 – Application Software
Adding Text
In order to add text, the text needs a “container” — a Text Box. Make a text box by clicking on the “Text Box”
icon in the “Insert” tab (see Fig. 2.21). Choose horizontal or vertical as you wish.
Click or click-and-drag where you want the text to be. You should see the rectangular shape of the Text
Box. Type your text. The box will grow automatically as you type. To copy text from another program first
make the text box then do copy and paste into the text box.
Adding Images
The two ways to add images are with Insert Picture and with Copy and Paste. The Insert/Picture is the
most common way of adding graphics to a PowerPoint document. If you have a file that is in one of several
standard graphic formats (like JPEG or GIF), use the “Insert” tab and click the “Picture” icon to select and
insert your picture (see Fig. 2.22).
Fig. 2.22: Selecting Picture icon in Insert tab for adding image
The image will appear on your document with handles. Use one of the corner handles to re-size it.
(The corner handles will keep the same aspect ratio; the side handles will not.) Click and drag in the
middle of the graphic to move it. A Picture Tools tab automatically shows up when you insert the picture
(see Fig. 2.23). You can edit the picture by clicking the icons for the numerous options in this tab.
Text Format
As in many programs, you can change the font and size by highlighting the text to be changed and then making the
changes within the “Home” tab (see Fig. 2.24). A 100-point font is about an inch high.
Backgrounds
You can select a background by clicking the “Background Styles” icon in the “Design” tab (see Fig. 2.25).
On the Slides tab of the Slides/Outline task pane on the left of your screen, click on the thumbnail
(a thumbnail describes a miniature version of a slide or picture) of the slide you wish to delete. Press the
Delete key on your keyboard.
Professionally designed slide shows contain all these properties to grasp the attention of the audience.
Applying Animation
To animate an individual object in a slide, use the options from the Animate button located in the Animations
group in the Animations tab. You can also apply custom animation to selected objects in a slide by clicking
the Custom Animation button in the Animations group in the Animations tab. This displays the Custom
Animation task pane at the right side of the screen. Use options in this task pane to control the order in
which objects appear on a slide, specify entrance and exit effects, choose animation direction and speed,
and specify how objects will appear in the slide.
Adding Sound
To add sound to a presentation, perform the following steps:
1. Select the slide.
2. Click Insert tab.
3. Click Sound button arrow.
4. Click Sound from File at the drop down list.
5. Navigate to desired folder.
6. Double-click desired sound clip file.
Activity 2.2
Presentating a Slide Show on Global Warming
Students in groups will perform the following steps:
1. Click Start → All Programs → Microsoft Office → Microsoft Office PowerPoint 2007.
2. Click on Office Button and select New.
3. Prepare a presentation on Global Warming and save it in a file.
4. Click the Slide Show tab.
5. Click the From Beginning icon in the Start Slide Show command group. PowerPoint displays the first slide
of your presentation.
6. Click the left mouse button or press the spacebar/Enter key to view the next slide.
The slides in the presentation are shown in Fig. 2.28.
Slide 1 Slide 2
Slide 3 Slide 4
Slide 5 Slide 6
Slide 7 Slide 8
Fig. 2.28: Slide Show of presentation on Global Warming
Key Concepts
Presentation software uses graphics, animation, sound and data or information to make visual presentations.
PowerPoint is a full-featured presentation software that provides a variety of editing and formatting features
as well as sophisticated visual elements such as clipart, pictures, SmartArt, WordArt, and drawn objects.
The PowerPoint Help feature is used to display information on PowerPoint.
We can apply interesting transitions and sounds to a presentation. A transition is how one slide is removed
from the screen during a presentation and the next slide is displayed.
Presenting a slide show is the most useful view of PowerPoint. It is used to display the slides in a desired
sequence.
Assessment 2.2
Fill in the Blanks
1. ........................... is used to create colourful and powerful presentations.
2. ........................... can include such functions as rearranging and deleting slides; cutting, copying and
pasting text etc.
3. To display a blank PowerPoint presentation, we click the Office button, click ..........................., and then
double-click the Blank Presentation option at the New Presentation dialog box.
4. A ........................... is a location on a slide marked with a border that holds text or an object.
Information Communication Technology — Grade 10 Student Textbook 43
Unit 2 – Application Software
Suggested Activities
1. Produce a time-line for important events in the History of Ethiopia. Prepare and present a slide show.
2. Prepare a presentation on land erosion in Ethiopia and present a slide show.
Field Trip
Organize a field trip to various restaurants to get useful information about foods and present the slide show
to the class.
2. Book Publishers: They create book jackets by using images drawn by artists and then incorporate
these with text using DTP software.
3. Businesses or Charities: They use DTP software to create leaflets, posters or flyers to advertise
their business or to publicise an event. They also use DTP to create business cards, calendars and
letterheads.
4. Teachers: They often use DTP software to produce worksheets or exercises for students.
Templates
DTP packages have a wide range of templates to help the users make anything from brochures, business
cards, flyers, calendars to party invitations.
Wizard
Most of the DTP packages provide ‘wizards’ which make it easy for the user to customize the template
he/she has chosen, that is, change the colour scheme, change the layout of the template and include personal
or business details such as address and contact details.
Text Frames
These are used to hold the text on the publication. Users must identify the features about the text frames
in the DTP which make them useful and different. The text frames can be resized, rotated, easily placed
on top of images, borders, and other text. Text can be ‘flowed’ from one frame to another.
Be careful about Text Frames, that is, do not call these ‘text boxes’ because text boxes are available in
Word Processing packages, Spreadsheet packages and Presentation packages.
Borders
DTP packages allow the users to make custom borders using an image of their own choice. They can
choose the size of the border and the spacing of the image.
Like the Text Frames, do not just say borders. Look for the borders which are available in your DTP
software which makes them particularly suitable.
Page Tabs
If the user creates a document which has multiple pages, for example, a brochure or catalogue which
needs to be folded, the DTP package allows him/her to access each individual page via a numbered tab.
The page appears the ‘right way up’ whilst working on it. However, when he/she has finished, it will be
printed in the correct order or orientation for that publication.
Fig. 2.30: Getting Started with Microsoft Office Publisher 2007 view
From this window you can start a new publication or open an existing one.
Selects lines, shapes, graphics, text boxes, and other objects for resizing,
Select Objects
deleting, and other actions.
Picture Frame Adds a picture frame or pictures from clip art, scanners, cameras, files.
Bookmark Adds a bookmark to the location you desire. Bookmarks allow you to
link or refer to a specific location in a publication.
Design Gallery Object Inserts a wide array of customizable objects from the Microsoft Publisher
Design Gallery. For example, coupons, advertisements, logos, etc.
Item from Content Inserts an item from the Content Library. The Content Library is a storage
Library area for items that you use frequently in your publications (for example,
a logo, location information, contact information).
For adding items to your Content Library, right click the item and then select Add to Content Library.
On the dialog box that appears, click OK.
l editing a page
After adding text or other objects to MS-Publisher 2007 document, we can edit these. We can add, remove
or change the text or objects. The font, size and style of the text can also be edited. In this section, you will
learn how to edit in Publisher.
2. On the page, drag your cursor to create the custom text box (see Fig. 2.33).
Fig. 2.33: Creating the custom text box Fig. 2.34: Clip Art search interface
3. Now type in the text box you have created. If you need to zoom in, press F9 key.
1. To format the text, use the Format menu. You can change the font, the font size, the font color,
and the font style. You can also change paragraph alignment, indentation, line spacing, and line/
paragraph breaks, as well as bullets and numbering. To format any text box, simply click the text
box and use the icons on the Format menu.
2. To copy a text box, hold down the Ctrl key while you drag it.
We can insert word art and edit style, insert picture, insert auto shapes and format objects on a page.
l Brochure Building
A brochure is an effective means to provide information about your company’s products and services.
MS-Publisher’s brochure feature allows you to design a customized brochure with text and graphics.
To create a brochure from a template, perform the following steps:
Select Design
1. Start Publisher and click Brochures under Popular Publication Types (see Fig. 2.35).
Select Format
1. Under Page size, click the 4-panel option (see Fig. 2.37).
Fig. 2.37: Clicking the 4-panel option from Fig. 2.38: Checking the Include customer
Page size address checkbox
52 Information Communication Technology — Grade 10 Student Textbook
Unit 2 – Application Software
4. Now make sure that Brochure Options is selected in the Format Publication pane (see Fig. 2.41).
7. Click the button. This adds a mail-back form on the back of the brochure
(see Fig. 2.43)
l Business Cards
Business cards are most commonly used for business advertising purpose. Business cards are used to
identify a person related to a specific business. In addition to serving as a convenient reminder of your
contact information, a business card introduces your company and reinforces your company’s image. A
business card is also invaluable in building and sustaining word-of-mouth marketing. The information on
a business card needs to be clear and precise. The fonts should be clear and large enough to read.
Microsoft Office Publisher makes it easy to produce effective business cards, whether you create your
own design or use one of the Publisher designs. You can use color schemes and font schemes to select
the colors and fonts that reflect the company’s image. You can further customize your business cards for
specific market segments or locales, and you can add names and job titles for new employees as your
business grows.
Fig. 2.46: Customize dialog box
5. Now look for the Business information drop down box. If this is the first time you have created a
business card, your only option will be Create new….
Select Create new… and a dialog box will appear for you to enter your business card information
(see Fig. 2.47).
7. If you are satisfied with all your decisions, click in the bottom
right hand corner of the screen.
6. After you create a predesigned invitation with your layout and fold style, you are ready to customize
the invitation, i.e., make global design changes, work with the pictures, and work with the text,
etc.
7. When the invitation card looks the way that you want, save the file.
8. If you wish to print the card, then select File → Print and click the Publication and Paper Settings tab.
Now, fill the various options as per your need. Click Print Preview to see how your publication will
look on the printed page. Then you can make any necessary adjustments before you print it. Click
the button.
Activity 2.3
Explain and Demonstrate Designing a Greeting Card
Students will perform the following steps for doing the activity:
1. Open MS-Publisher 2007. Click on the Greeting Cards button in the middle of the Available Templates
screen (see Fig. 2.51). Scroll through the available card templates, such as Holidays, Birthday, Occasions
and Events and Thank You, or double-click a folder with more template options. Every card may be
changed and customized to an occasion. Here, we select Birthday.
results and double-click an image, which will add it to the card (see Fig. 2.52). Repeat for the other
pages on the card if desired.
Key Concepts
Desktop Publishing (DTP) is an application software and hardware system that involves mixing text and graphics
to produce high-quality output for commercial printing. Some professional DTP programs are QuarkXPress,
Adobe InDesign, Adobe PageMaker and Microsoft Publisher.
The major features of desktop publishing are: Templates, Wizard, Text Frames, Borders and Page Tabs.
The various screen elements of MS-Publisher are: Formatting toolbar, Objects toolbar, Page boundary, Page
icons, Page margin, Format Publication task pane, Rulers and Standard toolbar etc.
A brochure is an effective means to provide information about your company’s products and services.
MS-Publisher’s brochure feature allows you to design a customized brochure with text and graphics.
A business card contains essential information. The information on a business card needs to be clear and
precise. The fonts should be clear and large enough to read.
Review Questions
Fill in the Blanks
1. ........................... has reduced the number of steps, the time, and the money required to produce
professional-looking printed projects.
2. From the ................................. window, you can create a publication based on one of the many
purpose-specific templates that come with Publisher.
3. DTP packages have a wide range of ........................... to help the users make anything from brochures,
business cards, flyers, calendars to party invitations.
4. In Publisher, the ........................... toolbar allows you to insert text boxes, tables, and shapes to your
workspace.
Suggested Activities
1. Create textbox and edit content, insert word art and edit style, insert picture, insert auto shapes, and
auto format objects in Publisher.
2. Explain the purpose of brochure and demonstrate the steps in designing an A5 size brochure with 4 sides
of text/images.
3. Create or open brochure, add text, format text, insert picture and choose text flow around the picture.
Copy, move, rotate, resize, fill with color, or delete an object. Insert and delete pages, create page border
and print preview and print.
4. Explain and demonstrate how to create or open business card, add a Logo, and design a business
card.
5. Explain and demonstrate designing Greetings and Invitation Cards.
6. Create or open the greeting card or invitation.
Field Trip
Organize a field trip to various business houses around you to get useful information about Desktop
Publishing packages being used currently and present it to the class.
Unit Outcome
Students will be able to:
understand and aware of copyright issues;
recognize national and international laws on copyright.
All of us must make sure that we are aware of the security risks and develop the ability to know what to
do in different situations. Figure 3.2 shows the impact of information and computer security on society.
l Software Copyright
What is copyright?
Copyright is the exclusive legal right that prohibits the copying of intellectual
property without the permission of the copyright holder. Figure 3.3 shows
the copyright symbol.
Copyright relates to ownership of an original work. An original work
can be in various forms: text, image, audio recording, video recording,
Fig. 3.3: Copyright symbol
computer software, website, etc. Copyright automatically belongs to the
author(s) or creator(s)— but it may also be assigned to a third party, for
example, a publishing house. The copyright owner(s) has/have the exclusive rights to prevent any third
party from doing any of the following without permission:
1. Copy the work: It includes photocopying (e.g., copying a book),
scanning of texts or images and reproducing them in electronic
format, and duplicating audio and video recordings.
2. Communicate copies of the work to the public: It includes
making a copy available on a public website and the intranet.
3. Perform a drama or play, a piece of music or a song before
the public: It includes making recordings of such performances Fig. 3.4: Copying a book is violation
and uploading them to a public website and the intranet. of copyright
66 Information Communication Technology — Grade 10 Student Textbook
Unit 3 – Information and Computer Security
4. Make derivative works: It includes making modifications, adaptations or other new uses of a work,
or translating the work to another media.
Remember that unless a work is clearly stated to be copyright-free or out of copyright by virtue of its
age, it is illegal to download, scan or otherwise copy it for onward dissemination, even if no financial gain
is there.
Software Copyright
Computer software is considered a literary work, i.e., books, computer
programs, e-mails, and databases etc. It is protected by copyright laws.
Unauthorized copying of computer software is not allowed. This applies
regardless of whether the original copies of the software have been purchased
on a medium such as a CD-ROM or DVD (see Fig. 3.5), or downloaded from
the Web.
Neither the networking of software without the proper permission from Fig. 3.5: Computer software
is available on DVDs
the copyright holder is allowed, nor is the copying of software onto several
stand-alone computers. If the software is to be networked for simultaneous access by a number of users,
proper permission has to be taken from the publisher. The software user must check the terms and conditions
on the packaging of the software or in accompanying documentation—which may be in printed or electronic
format.
Software can easily be copied, so it is very important that an educational institution possesses only
legitimate copies of all the software it uses.
To summarize, it is illegal for the software users to do the following:
1. Lend software so that a copy can be made or to copy software while it is on loan.
2. Run a software program on two or more computers simultaneously unless the agreement permits
it.
3. Copy or distribute the software or accompanying documentation without a licence or permission
from the copyright owner.
4. Compel, allow, encourage or request that students/employees make, use or distribute illegal copies
of software.
The written agreement protects them with the copyright issues. Some important issues are:
1. An adequate description of the software and associated documentation.
2. Usage terms and conditions.
3. The right for the user to copy the software and/or associated documentation.
4. Permission to modify or alter the software.
5. The requirement that the user reports to the developer any infringement of copyright.
6. Sub-licences.
7. Maintenance/Warranty.
Dangers of Copying Others’ Work
Plagiarism is copying others’ work and presenting it as your own. Some dangers of copying others’ work
are:
1. It does not show that you understand the topic you have presented.
2. It just shows you can cut and paste.
3. It makes the software ineligible for free maintenance updates in some cases.
4. There is always the risk of installing malicious code on your computer.
5. It affects the rights of others.
6. It affects the social and economical development of all countries.
You must recognize that the use of others’ property is not proper.
The Copyright and Related Rights Proclamation considers software as a literary work and as such a
fifty years protection is provided. The author has the right to commercially utilize his/her work within the
bounds prescribed by law. Again, he/she has the right to maintain his/her copyrighted works by means of
infringement actions to stop others from encroachment in his/her rights. He/she may take a criminal action
or a civil action in case of any infringement.
In Ethiopia the revised criminal code prescribes five-year prison terms to those who violate the copyright
law with negligence. A more severe penalty, a prison term of up to 10 years is prescribed against a violator
if the act is intentional. In addition to this, a fine of 100,000 Birr as moral damage may also be levied on
the guilty party.
There have been efforts made recently to try and tackle the problem of copyright violations. One such
effort is the establishment of the Ethiopian Copyright and Related Rights Collective Management Society
(ECRRCMS), which was officially established in November 2009, with Ekubay as its Chief Executive Officer
(CEO).
International Laws
While there is no single international copyright law, many countries have agreed to international rules for
protecting intellectual property from copyright infringement, piracy and counterfeiting.
Some international laws are given below:
1. Berne Convention for the Protection of Literary and Artistic Works: The Berne Convention requires
its signatories to recognize the copyright of works of authors from other signatory countries (known
as members of the Berne Union) in the same way as it recognizes the copyright of its own nationals.
For example, French copyright law applies to anything published or performed in France, regardless
of where it was originally created.
2. EU Copyright and Neighbouring Rights: Copyright and related rights provide an incentive for
the creation and investment in new works and other protected matter (music, films, print media,
software, performances, broadcasts, etc.) and their exploitation. This is contributing to improved
competitiveness, employment and innovation. The field of copyright is associated with important
cultural, social and technological aspects, all of which have to be taken into account in making a
policy in this field.
3. International Copyright Law: Creators and users of copyrighted works should be aware of the
differences in intellectual property law between nations. Many works are now distributed
internationally or use components from authors in other nations. No international copyright law
exists that will protect a work in every country of the world. However, several key international
treaties that the US has signed protect works from and within member nations.
4. WIPO Copyright Treaty: The World Intellectual Property Organization (WIPO) Copyright Treaty is
an international treaty on copyright law adopted by the member states of WIPO in 1996. It provides
additional protections for copyright which are necessary due to advances in ICT since the formation
of previous copyright treaties before it. There have been a variety of criticisms of this treaty, including
that it is overbroad and that it applies a ‘one size fits all’ standard to all signatory countries despite
widely differing stages of economic development and knowledge industry.
Ethiopia has yet to sign the Berne Convention for Literary and Artistic Works and the World Intellectual
Property Organization (WIPO) Copyright Treaty.
l Protection
In Grade 9, you have studied that virus scanners are one of the most important tools to help protect your
computer, for example Norton or McAfee. A firewall helps to block unwanted incoming connections to
your computer from the Internet. Windows already has a built-in firewall. However, if you feel the need to
increase your security, you can download a firewall program such as Zone Alarm, or Online Armor Free.
It is also important to install new Windows updates as they appear on your computer. Often, Windows
updates will address security issues found in the operating system.
Let us first discuss some important concepts, such as misuse of e-mail and unauthorized intrusion:
Misuse of E-mail
Every person or business that uses e-mail as the main communication tool
should put together an e-mail etiquette guide. Many of us often forget that
there is another person on the other end of an e-mail and this leads to misuse.
Some people may not even be aware of the fact that they are misusing e-mail.
For example, some people do not sign their name at the end of a message in
the e-mail.
Fig. 3.7: Misuse of E-mail
Some of the common mistakes people often make when using e-mail are: is growing
1. Asking for receipts of all messages.
2. Not adding additional information to the messages you forward.
3. Typing a message in bold, capital letters. This is like shouting when talking to someone in person.
4. Sending lengthy e-mails. Remember that some things are better discussed over the phone or in
person.
5. Overuse of the Carbon Copy feature.
6. This leads to the Blind Carbon Copy feature. It is rude to send an e-mail to one person and bcc
another without their knowledge.
7. No inclusion of the appropriate greetings, etc.
These are just a few of the common e-mail misuses and there are many more. So, next time when you
communicate via an e-mail, think before you send and make sure you are not guilty of these common
e-mail misuses.
Unauthorized Intrusion
One type of information and computer security risk is unauthorized access and use. Unauthorized intrusion
is the use of a computer or network without permission. Hackers typically break into a computer by
connecting to it and then logging in as a legitimate user. Some intruders do no damage but they merely
access data, valuable information or programs on the computer.
Unauthorized intrusion is the use of a computer or its data for unapproved or illegal activities. It
includes a variety of activities such as gaining access to a bank computer and performing an unauthorized
money transfer for financial gains, etc.
Sixth Annual IT Security Survey Report says that incidences of unauthorized intrusions of large
companies increased significantly in 2010.
Some examples of unauthorized intrusion are:
1. Illegally accessing another person’s data or private system files.
2. Corrupting, destroying, manipulating or deleting others’ data with malicious intent.
70 Information Communication Technology — Grade 10 Student Textbook
Unit 3 – Information and Computer Security
Useful Tip
Protecting Your Material
The copsycape.com Website has both a free and paid service for protecting your material. You can paste your
material in a URL and the site will check other websites for it or you can use the Copysentry service, which
will automatically alert you if there are any other websites copying your content.
Use of Password
Your online accounts, computer files, and personal information are more secure when you use strong
passwords to help protect them. Short, easy-to-remember passwords can be easily cracked using simple
techniques, and may compromise the security of your website or client data.
Windows XP has password options for its folders and files, and using them is an easy process. Password
protected files are prevented from unauthorized viewing.
Useful Tip
Evaluate the Strength of Your Password
For evaluating the strength of your password, use the tool developed by Microsoft at www.microsoft.com/
protect/fraud/passwords/.
Activity 3.1
Why Should Software be Protected by a Copyright Law?
In small groups, students will discuss “Why should software be protected by a copyright law?” The group leader
from each group will give a presentation to the class based on their discussions.
Software
Software, or programs, are all the electronic instructions that are used to operate computers and related
devices. They are divided into two categories: system software and application software. Without software,
hardware are useless.
Copyright
A copyright is the exclusive legal right that prohibits copying of intellectual property without
the prior permission of the copyright holder. Ethiopian Intellectual Property Office
(EIPO)-PO Box 25322, Ras Mekonnen Street, Addis Ababa is the competent
administration for copyright in Ethiopia. The e-mail address of EIPO is eipo@
ethionet.et. Violation of copyright is punishable in Ethiopia (see Fig. 3.8). Fig. 3.8: Copyright violation
is punishable in Ethiopia
Software Copyright Law
Pirated software is software obtained illegally, for example, an illicit copy of a commercial video game. If you
get such software from a friend or buy it, then the original copyright owners are not paid for their work. Also
there is a risk of getting inferior goods and, worse, picking up a virus.
Software copyright law affects anyone who uses a computer and particularly businesses. It is a complex area
of law that is not widely understood. For example, application software (e.g., commercial software, shareware,
freeware, rentalware) and system software are copyrighted. In Ethiopia, the law does not permit illegal copying
of computer software.
Software manufacturers do not sell you their software; rather they sell you a license to become an authorized
user of it. In paying for a software license, you sign a contract in which you agree not to make copies of the
software to give away or resell.
72 Information Communication Technology — Grade 10 Student Textbook
Unit 3 – Information and Computer Security
Each software company has a different license; there is no industry standard. Various types of licenses exist.
A software license usually consists of:
1. Permissions granted by the creator to the user,
2. Rights granted by the creator to the user,
3. Restrictions placed by the creator,
4. Limitations on the creator’s liability,
5. Warranties and warranty disclaimers,
6. Indemnity (security against damage or compensation), and
7. Term/duration of the license.
Violation the terms of the license infringes the legal rights of the creator of the software and can lead to legal
action.
The license usually prohibits the following acts:
1. Modification of the software
2. Adaptation of the software
3. Translation of the software
4. Preparing derivative works from the software
5. Decompiling the software
6. Reverse engineering the software
7. Disassembling the software
The Ethiopian Government is expanding ICT infrastructure, which will make people aware of the software
copyright issues. So, you must understand why should software be protected by a copyright law.
Key Concepts
Information and computer security risks arise from the intentional or unintentional misuse of computers,
network resources as well as the Internet.
Copyright is the exclusive legal right that prohibits the copying of intellectual property without the permission
of the copyright holder.
Copying others is called plagiarism. It involves using the work of others and presenting it as one’s own.
Unauthorized intrusion is the use of a computer or network without permission.
Your online accounts, computer files, and personal information are more secure when you use strong passwords
to help protect them.
Review Questions
Fill in the Blanks
1. Violation of information and computer security is ........................... .
2. ........................... relates to ownership of an original work.
3. Computer software is considered a literary work and is protected by ........................... .
4. Never use the same ........................... for your e-mail, your computer, or your accounts.
Suggested Activities
1. Why software needs to have a copyright law? Discuss.
2. Discuss how copying affects the right of others and the development of countries in terms of different
aspects—social and economical.
3. Work collectively with others and use password appropriately.
4. Discuss rights and wrongs of indiscriminate copying and software piracy.
5. Identify the impact of unauthorized intrusion, manipulating or deleting others’ data and prevent misuse
of e-mail and its social impact.
Field Trip
Organize a field trip to various educational institutions or business houses in your city to interact with ICT
users. Prepare a report on “Information and Computer security” and discuss it in the class.
74 Information Communication Technology — Grade 10 Student Textbook
Unit 4 – Application Software
Unit 4 Application
Software
Unit Outcome
Students will be able to:
know how to create charts and graphs in spreadsheet;
apply spreadsheet for different applications;
understand some common uses of database;
recognize query, form and report in a database application.
l Revision of Spreadsheet
The spreadsheet is an application software which provides the users powerful tools and features to analyze,
share, and manage the data with ease, for example, Microsoft Excel.
Starting Spreadsheets
MS-Excel 2007 is a GUI based spreadsheet package that is part of Microsoft Office 2007 suite of
software.
To start MS-Excel 2007, perform the following:
Double-click on the MS-Excel 2007 icon on the desktop.
OR
Click Start → All Programs → Microsoft Office → Microsoft Office Excel 2007
Using a Spreadsheet
After creating a worksheet, you can enter data (for example, words, a number, or a formula) in the active
cell. The spreadsheet can be used as per your need.
Editing Data
For editing data (in case we have made mistakes or some changes are required), perform the following
steps:
1. Double-click the cell, which has to be edited.
2. Use the Backspace or Delete key to edit the content of the cell.
3. Press the Enter key.
Change Data in a Cell
After entering data into a cell, you can edit the data by pressing F2 while you are in the cell you wish to
edit. For example, we wish to change “Shibra” shown in cell A1 (see Fig. 4.2) to “Shibru”.
In MS-Excel, you can find the sum by dragging method and copy by using the fill handle.
Now, you have revised the Grade 9 main concepts about spreadsheet. Let us focus on some new
concepts of spreadsheet.
Definition of a Chart
A chart is a graphical representation of the figures in a spreadsheet.
Charts help in easy understanding of complex or detailed data. These reflect information in such a way
that it can be easily understood just by having a look at the chart.
MS-Excel 2007 supports various types of charts to display data in meaningful ways. When you want to
create a chart or change an existing chart, you can choose from a wide range of chart subtypes available
for the different chart types. Figure 4.4 shows a pie chart.
Creating Charts
A picture is worth thousands of words. Popular feature of spreadsheet software is the ability to generate
charts based on numeric data. In MS-Excel 2007, it is easy to create professional looking charts simply by
choosing a chart type, a chart layout, and a chart style—all of which are available on the Ribbon. You can
also take advantage of the powerful Excel charting functionality in other MS-Office 2007 programs, such
as PowerPoint 2007 and Word 2007.
Column Chart
Data that is arranged in columns or rows on a worksheet can be plotted in a column chart. Column charts
are useful for showing data changes over a period of time or for illustrating comparisons among items. In
column charts, categories are typically organized along the horizontal axis and values along the vertical
axis.
The subtypes of column charts are: Clustered column and clustered column in 3-D, Stacked column
and stacked column in 3-D, 100% stacked column and 100% stacked column in 3-D, 3-D column, Cylinder,
cone, and pyramid.
Bar Chart
Data that is arranged in columns or rows on a worksheet can be plotted in a bar chart. Bar charts illustrate
comparisons among individual items. The bar charts are generally used when:
1. The axis labels are long.
2. The values that are shown are durations.
The subtypes of bar charts are: Clustered bar and clustered bar in 3-D, Stacked bar and stacked bar in
3-D, 100% stacked bar and 100% stacked bar in 3-D, Horizontal cylinder, cone, and pyramid.
Pie Chart
Data that is arranged in one column or row only on a worksheet can be plotted in a pie chart. Pie charts
show the size of items in one data series, proportional to the sum of the items. The data points in a pie chart
are displayed as a percentage of the whole pie (see Fig. 4.4). The pie charts are generally used when:
1. You only have one data series that you want to plot.
2. None of the values that you want to plot are negative.
3. Almost none of the values that you want to plot are zero values.
4. You do not have more than seven categories.
5. The categories represent parts of the whole pie.
The subtypes of pie charts are: Pie and pie in 3-D, Pie of pie and bar of pie, Exploded pie and exploded
pie in 3-D.
to a cell in a specific location. If the position of the cell that contains the
formula changes, the absolute reference remains the same. As mentioned
earlier, by default, new formulae use relative references, and you may need
to switch them to absolute references. For example, if you copy or fill an
absolute reference in cell B2 to cell B3, it stays the same in both cells =$A$1
(see Fig. 4.10).
Fig. 4.10: Copied formula with
absolute reference
Using Custom Formula
Using a custom formula is as simple as the other commands of Excel. To
write the formula, click on the cell in which you want to have result of the calculation. Type = sign and
write the formula using cell addresses and arithmetic and logical operators supported by Excel.
A formula in Excel contains cell addresses, operators and built-in functions. Working with formulae is
very easy in Excel and it does not require a high programming knowledge. For example, in Fig. 4.11, the total
of marks scored by students has been calculated in cell B8 by using the custom formula =B2+B3+B4+B5+B6.
The cell B8 contains the sum of B2, B3, B4, B5, and B6 cells.
Using if condition
If function of Excel is a conditional construct that displays one or the other value in a cell based on the
condition applied. If the condition is true, one value is displayed otherwise the other value is displayed.
The syntax of IF function is:
IF (Condition, Value if True, Value if False)
The three items between the parentheses are the arguments of IF function. Here,
Condition is what you want to test for.
Value if True is what you want to do if the answer to the first argument is TRUE.
Value if False is what you want to do if the answer to the first argument is FALSE.
82 Information Communication Technology — Grade 10 Student Textbook
Unit 4 – Application Software
For example, open a new spreadsheet, and perform the following steps:
1. Widen the B column, as we will be putting a message in cell B1.
2. Now click in cell A1 and type the number 7.
3. Type the following in cell B1.
=IF(A1>=6, “Greater than or Equal to Six”, “Less than Six”)
Press the Enter key and the spreadsheet should look as shown in Fig. 4.12.
1. AutoSum : It calculates the sum of the selected contiguous cells directly after the selected cells.
For example,
Start Excel and open a worksheet to enter some numbers for addition in a column or a row.
Click a cell below the column of numbers or to the right of the row of numbers.
On the Home tab, in the Editing group, click AutoSum button (see Fig. 4.13).
For example,
=MAX(A2:A6) will return the largest value in the specified range (see Fig. 4.15).
5. MIN( ): It returns the smallest number in a set of values.
The syntax of MIN function is:
MIN(number1, number2, ...)
Here, number1, number2, ... are 1 to 255 numbers for which you want to find the minimum
value.
For example,
=MIN(A2:A6) will return the smallest value in the specified range (see Fig. 4.15).
To change the order of calculation, use parentheses. MS-Excel calculates the expression in parentheses
first.
1. Double-click in cell A1.
2. Edit the cell to read =(6–3+12)/3*4.
3. Press Enter.
MS-Excel adds 6 minus 3 plus 12, divides the answer by 3, and then multiplies the result by 4. The
answer, 20, is displayed in cell A1 (see Fig. 4.17).
l Formatting Worksheet
Formatting refers to the act of changing the appearance of data in cells. In MS-Excel, you can format text,
format cells, adjust columns and rows and print worksheets. Let us apply formatting on a worksheet.
1. Start Excel. Open an existing worksheet (here we have opened Students Marks in ICT) and click
cell A1.
2. In the Ribbon, click the Bold button and the Italic button .
3. Click the drop-down arrow beside the Font Size box.
4. When the menu appears, click 20 (see Fig. 4.18).
5. In the Font list, click Arial Black.
6. Highlight the text in range A3:A7.
Activity 4.1
Compute the Rank using the Rank Function taking a given Numerical
Item as an Example
In small groups students will explain and demonstrate how to compute rank.
What is Rank?
The rank of a number is its position in a list of numbers.
RANK( ): This statistical function returns the rank of a number in a list of numbers.
The syntax of RANK function is:
RANK(Number, Ref, Order)
The three items between the parentheses are the arguments of RANK function. Here,
Number is the number whose rank you want to find.
Ref is a reference to, or a list of numbers. Nonnumeric values in ref are ignored.
Order is a number specifying how to rank number.
If order is 0 (zero) or omitted, Excel ranks number in descending order. If order is any nonzero value, Excel
ranks number in ascending order.
RANK gives duplicate numbers the same rank. However, the presence of duplicate numbers affects the ranks
of subsequent numbers. For example, in a list of integers sorted in ascending order, if the number 20 appears
twice and has a rank of 5, then 21 would have a rank of 7 (no number would have a rank of 6).
Example of Computing Rank
To compute rank, perform the following steps:
1. Open an existing worksheet (see Fig. 4.19) or create a new one.
2. Click on cell D5—the location where the result will be displayed.
3. Click on the Formulas tab.
4. Select More Functions → Statistical from the ribbon to open the function drop down list
(see Fig. 4.20).
Key Concepts
Spreadsheet is an application software, which allows us to perform quick and easy calculations on our stored
data.
Fill handle can be used for copying cells, copying formulae using relative references, generating series and
generating auto lists.
A chart is a graphical representation of the figures in a spreadsheet.
If function of Excel, is a conditional construct that displays one or the other value in a cell based on the
condition applied.
Excel has several built-in functions to make your work easy and fast. For example, Sum( ), Max( ), Rank( ),
etc.
Assessment 4.1
Fill in the Blanks
1. The ........................... allows users to create tables and financial schedules by entering data and formulae
into rows and columns arranged as a grid on a display screen.
2. There are ........................... rows and ........................... columns in Excel 2007 worksheet.
3. ........................... charts are useful for showing data changes over a period of time or for illustrating
comparisons among items.
4. ........................... refers to the act of changing the appearance of data in cells.
Suggested Activities
1. Master introductory parts of spreadsheet by revising the Grade 9 main contents.
2. Explain the use of charts.
3. Demonstrate how to create the listed charts in Excel.
4. In mathematics compare the growth of an arithmetic progression with a geometric progression.
Field Trip
Using the Internet or computer magazines, look up information on Microsoft Excel 2010. List any features
you find. List which of these features appeal to you and describe why they do.
Introduction
l to Database
What is Database?
A database is a collection of related data that is organized, so that it can easily be accessed, managed and
updated.
For example, a database can contain data about all the students in a school, data about telephone
numbers in a directory, data about all products in a manufacturing company, or data about weather
conditions in an area or a city (say Addis Ababa).
Microsoft Office Access 2007 is one of the database creation and management programs.
It is a Database Management System (DBMS) included with Microsoft Office suite. Interacting with a
DBMS occurs when one performs daily routine activities, for example, withdrawing cash from the ATM,
or purchasing tickets using a credit card.
l Uses of Database
A database stores information in an organized way, and makes it easy to get information in and out. In
today’s world databases are used by websites such as Google.com and Yahoo.com, and in places such as
banks, libraries and hospitals.
The common areas where data bases are used are:
1. Government: The government uses a database to store records of people’s data for different purposes,
for example, census, income tax payments, etc.
2. Business: Today the business world depends on databases round the clock. Inventory, order
processing, payroll, accounting, shipping and transportation routing are often tracked within a main
database that keeps the organization/company functioning.
3. Educational Institutions: From elementary schools/colleges to universities, educational institutions
use the database to keep track of students’ data. Specialized database packages for schools/colleges
and universities are also available.
4. Non-Profit Organizations: Most of the charities and other non-profit groups use a database for
keeping track of donations, volunteers, hours served in the community, clients helped and other
information related to the organization.
5. Household and Family Management: The database is very useful in household and family
management for many individuals and families. Many individuals/families use a database to keep
track of family birthdays, bills and expenses within a home; addresses of friends and relatives;
movie/DVD collections; and other lists.
6. Everyday Life: Some departmental stores keep your information stored in a customer database.
When you make a purchase, the sales clerk asks for your address or customer account number.
These collections of data are used to send mailings of special offers, discounts and other deals.
Any application that involves storing and maintaining a large amount of data in an organized manner
can be set up as an Access database. For example, customers and invoices, suppliers and purchases,
inventory and orders, etc.
l Database terminology
Let us discuss some of the useful terms related to database:
Table: A table in a database is a predefined format of rows and columns that define an entity. It is also
called a relation. For example, the STUDENT table shown in Table 4.1.
Table 4.1: STUDENT Table
ID Stud Name Father Name Sex Age Phone Number
1 Abraham Nigatu Male 13 222222
2 Beza Yasin Female 12 111111
3 Hana Fuad Female 13 555555
4 Shibru Engda Male 14 444444
5 Maru Tariku Male 13 333333
Record: A database record consists of one set of tuples in a table. In other words, a row of information
in a table is called a record. For example, Table 4.1 has five records.
Field: A field is a single unit of data stored as part of a database record. Each record is made up of one
or more fields, which correspond to the columns in a database table. Fields are often called attributes. For
example, Table 4.1 has six fields.
Data Type: A data type specifies the type of data that a column in a table represents in a database.
For example, numeric, character or text, date, logical, etc. For example, in Table 4.1 Stud Name is of text
type.
Primary Key: Every table should contain a field that uniquely identifies each record stored in it. This
field is called the primary key of the table. Primary keys may consist of a single field or multiple fields
in combination. For example, in Table 4.1, the student’s unique ID number would be a good choice for a
primary key. The Stud Name would not be a good choice, as there is always the chance that more than
one student might have the same name.
l Overview of a Table
A database table contains data about a particular subject (see Table 4.1). In a table the data is arranged in
rows and columns. To get the most flexibility out of a database; the data needs to be organized into tables
so that redundancies do not occur. For example, if you are storing information about students, each student
should only need to be entered once in a table that is set-up just to hold student data.
Each row in a table is referred to as a record. Records are where the individual pieces of information
are stored. Each record consists of one or more fields. Fields correspond to the columns in the table. Fields
must have a certain data type, whether it is text, date or time, number, or some other type.
l Creating a Table
One must plan and design a table properly for a new database before creating it. You can use Design view
to create an Access table. Using Design view is the preferred method for creating a table because it provides
you with the most options and enables you to precisely define your table. In addition to selecting a data
92 Information Communication Technology — Grade 10 Student Textbook
Unit 4 – Application Software
type, you can set the other available options in Design view. Suppose we have to create Table 4.1 in Access.
Perform the following steps:
1. Start Ms-Access and activate the Create tab. Click Table Design in the Tables group (see Fig. 4.23).
12. After finishing the task, click the Save button on the Quick Access
Toolbar. Access saves the table unless you are saving for the first time.
If you are saving for the first time, the Save As dialog box appears.
Type the name you want to give your table. Here, we have saved the
table as STUDENT (see Fig. 4.25).
13. Click OK. Access saves the table. Fig. 4.25: Save As dialog box
You can use field names that include spaces, but this can affect how queries have to be written, so it is
best not to do so.
Adding Records
Adding a new record to an existing Access 2007 database is quite simple. In fact, being able to modify the
database in this way is one of the reasons why Access is so accessible and easy to use. To add record(s) in
a table, perform the following steps:
1. Open the table. Here, we have opened the STUDENT table. Notice that the table contains an empty
record at the bottom of the table’s data with the word (NEW) in the first column.
2. Click on that cell in the table and then press the TAB key on your keyboard.
3. Type the new information you want in that field and then press TAB again. Now type the
information you want in that cell and continue in this way until you wish to add records to the table
(see Fig. 4.26).
Editing Records
Data stored as records in tables can be modified at any point in time.
To make changes to a record in a table, perform the following steps:
1. Open the table having the record(s) you want to edit.
2. Place the cursor in the required cell.
3. Remove the existing value.
4. Enter the new data.
The value in the field will be changed. Make other changes (if any) and save the table.
Deleting Records
You can delete record(s) from tables if it/they is/are not required.
To delete a record from a table, perform the following steps:
1. Open the table and select the record you want to delete.
2. Activate the Home tab.
3. Click Delete in the Records group. A prompt appears.
4. Click the Yes button.
The selected record will be deleted. Similarly delete the other records (if you wish) and save the
table.
Sorting Records
Sorting is arranging records in a table, so that the records can be retrieved quickly and easily. By sorting,
you can put a column of information in alphabetical, numerical, or date order. You can sort in ascending
order (alphabetical from A to Z, lowest number to highest number, earliest date to latest date) or descending
order (alphabetical from Z to A, highest number to lowest number, latest date to earliest date). You can
also sort within a sort.
To sort records in a table, perform the following steps:
1. Open the table. Here, we have opened the STUDENT table (see Fig 4.26).
2. Click the column label for the column (here, Phone Number) you want to sort.
3. Activate the Home tab.
4. Click the Ascending or Descending button in the Sort & Filter group. Here, we have selected
the Ascending button.
5. Access sorts the column in ascending (see Fig. 4.27).
l Overview of Query
Queries are one of the most important features of database management system. The process of accessing
the database and retrieving data selectively is known as querying. Queries often serve as the record source
for forms and reports. Query is a database object, which is used for extracting data from one or more tables
based on specific conditions. The set of records returned by a query is known as Dynaset.
Query Types
MS-Access supports many types of queries. The major categories are:
1. Select Queries: Retrieve records or summaries (totals) across records. Also includes cross-
tabulations.
2. Make Table Queries: Similar to Select Queries but results are placed in a new table.
3. Append Queries: Similar to Select Queries but results are added to an existing table.
4. Update Queries: Modify data in a table.
5. Delete Queries: Records are deleted from a table.
Select queries are the most common queries and can be used for viewing as well as a data source
for forms, reports, controls, and other queries. The other queries create or change data and are known
collectively as Action queries.
l Creating a Query
When you want to build a query for your database, there are two ways to create it.
1. Either use the Query Wizard, or
2. Use the Design View.
5. Click the button. This should add the Father Name field to the Selected Fields list
(see Fig. 4.31).
9. Click the button. The query is automatically saved and executed. It should look as shown
in Fig. 4.34.
The Simple Query Wizard does not allow you to include criteria to choose which records you want to
include in the query datasheet. If you want to include criteria in your query, open it in the Design View
and add the criteria.
5. Click the View button in Views group on Home tab to see the datasheet having the data selected with
your query (see Fig. 4.38).
6. Click Save button on the Quick Access Toolbar or press Ctrl + S. Type a name for the query in
the Save As box (see Fig. 4.39).
Fig. 4.38: Datasheet showing the data Fig. 4.39: Saving a query
7. Click OK.
Select queries display selected fields from table(s). Action queries make changes to a group of records.
l Overview of a Form
A form is a database object that you can use to enter, edit, or display data from a table or a query. Forms
are sometimes called “data entry screens”. You can create a database without using forms by simply editing
your data in the table datasheets. However, most database users prefer to use forms for viewing, entering,
and editing data in the tables.
Forms provide an easy-to-use format for working with the data, and you can also add functional
elements, such as command buttons, to them. You can program the buttons to determine which data
appears on the form, open other forms or reports, or perform a variety of other tasks. For example, you
might have a form named “Student Form” in which you work with student data. The Student Form might
have a button which opens a help form where you can enter various types of help for that student (say
financial help).
Forms also allow you to control how other users interact with the data in the database. For example,
you can create a form that shows only certain fields and allows only certain operations to be performed.
This helps protect data and to ensure that the data is entered properly.
l Creating a Form
MS-Access 2007 gives you new tools (available in the Forms group on the Create tab) to help you create
forms quickly, and provides new form types and features that improve the usability of your database
(see Fig. 4.40).
You can use the Navigation bar to move through the records on a form.
3. Click Save button in Quick Access Toolbar and enter a new name for the form (see Fig. 4.43).
l Section of a Form
Access forms have several basic sections (see Fig. 4.42). These are given in Table 4.2.
Form Header Appears at the top of the first page and displays the form
title.
Page Header Appears at the top of every page and displays the headings
(field labels) for each column.
Page Footer Appears at the bottom of every page and displays the page
number and total number of pages.
Detail Section Appears between the page header and page footer and
displays the records from the table or query.
Form Footer This section is optional. Appears on the last page of the form
and displays summary information such as grand totals.
You can switch the view on and off for an area. In Access 2007, locate the Arrange tab from the ribbon
bar in the Form’s design view and toward the right (end) look for Show/Hide section. You will see two
on/off buttons one for a Form and the other for a Page.
l Formatting a Form
After creating a form, you can apply formatting to it. You should still be in Layout View at this point in
the process. Click the Format tab on the ribbon (see Fig. 4.45).
Now use these icons to change the color and font of text, the style of gridlines around the fields, include
a logo and many other formatting tasks. For example, you can adjust the size of the text boxes to fit the
data, if necessary.
To use the form, switch to Form View. Click the drop-down arrow on the Views section of the Ribbon
and select Form View (see Fig. 4.46).
l Main/Subforms
Form is a graphical user interface for the database. Users can enter, edit and even delete data through
a form. A subform is a form that is inserted in another form. The primary form is called the main form,
and the form within the form is called the subform. A form/subform combination is sometimes called a
hierarchical form, a master/detail form, or a parent/child form.
Subforms are especially effective when you want to show data from tables or queries that have a one-
to-many relationship (an association between two tables in which the primary key value of each record in
the primary table corresponds to the value in the matching field or fields of many records in the related
table). Subforms can be created along with the form or separately.
Creating Subform
To create a subform from an existing form, perform the following steps:
1. Start Access and right click the form, to which you want to add a subform, in the Navigation
Pane.
l Overview of a Report
Reports are what you use to summarize and present the data in the tables. A report usually answers a
specific question, such as “What phone numbers are the students having?” Each report can be formatted
to present the information in the most readable way possible.
A report can be run at any time, and will always reflect the current data in the database. Reports are
generally formatted to be printed out, but they can also be viewed on the screen, exported to another
program, or sent as e-mail message.
Creating a Report
Access 2007 has several report generation tools (Report tool, Report Wizard, Blank Report tool) that you can
use to create both detail and summary reports quickly. The Report button creates a simple report that lists
the records in the selected table or query in a columnar format.
106 Information Communication Technology — Grade 10 Student Textbook
Unit 4 – Application Software
To create a report using the Report button, perform the following steps:
1. Start Access and open the Navigation pane.
2. Click the table or query on which you want to base your report. Here, we select STUDENT table.
3. Activate the Create tab. Click the Report button in the Reports group (see Fig. 4.49).
5. Click the Save button on the Quick Access toolbar. Access saves the report unless you are saving for
the first time. If you are saving for the first time, the Save As dialog box appears (see Fig. 4.51).
6. Type the name you want to give to your report.
l Sections of a Report
Access reports have several sections (see Fig. 4.50). These are given in Table 4.3.
Table 4.3: Report Sections
Report Section Description
Report Header Appears at the top of the first page and displays the report title.
Page Header Appears at the top of every page and displays the headings (field
labels) for each column.
Page Footer Appears at the bottom of every page and displays the page number
and total number of pages.
Detail Section Appears between the page header and page footer and displays the
records from the table or query.
Report Footer This section is optional. Appears on the last page of the report and
displays summary information such as grand totals.
Fig. 4.52: Controls group in Design View
To determine the name of a tool, place the mouse pointer over the tool. Access displays the name of
the tool.
108 Information Communication Technology — Grade 10 Student Textbook
Unit 4 – Application Software
To add a control by using the tools in the Controls group, perform the following steps:
1. Click the tool for the type of control that you want to add. For example, to create a check box, click
the Check Box tool.
2. Click in the report design grid where you want to position the upper-left corner of the control. Click
once to create a default-sized control, or click the tool and then drag in the report design grid to
create a control of the size that you want.
3. If you do not position the control perfectly on the first try, you can move it by using the following
procedure:
(i) Click the control to select it.
(ii) Position the mouse pointer over the edge of the control until the pointer turns into a four-headed
arrow .
(iii) Drag the control to the location that you want.
This procedure creates an “unbound” control. If the control is the type that can display data (a text box
or check box, for example), you need to enter a field name or expression in the Control Source property for
the control before it will display any data.
To display the property sheet in Design view: On the Design tab, in the Show/Hide group, click Property
Sheet Or Press F4.
l Formatting a Report
The easiest and quickest way to apply formatting is by using the Format tab.
To format a report, perform the following steps:
1. Start Access. Open the report you want to format. Here, we open Student Report.
2. Click Format → AutoFormat (see Fig. 4.53).
Each AutoFormat applies a combination of fonts, colors, and border settings. AutoFormat lets you
change the entire look of your report in one step, but these do not provide you the fine-grained
control to apply exactly the details you want. Format the report as you want.
3. Save the report.
To format a report, open it in Layout View. If you double-click a report in the navigation pane, it opens
in Report View. Right-click the tab title, and then choose Layout View to switch over.
Activity 4.2
Explain about the Database Object Form, its Primary Use, and Demonstrate
the Steps Required in Creating Form in Design View
In small groups students will explain about the database object form, its primary use, and demonstrate the
steps required in creating form in design view.
Form and its Primary Use
A form is a database object that you can use to enter, edit, or display data from a table or a query. You can
use forms to control access to data. A form makes easy to use the database. You can also add buttons and
other functionality to a form to automate frequently performed actions.
Forms are like windows through which people see and reach your database. An effective form speeds the use
of your database. A visually attractive form makes working with the database more pleasant and more efficient,
and it can also help prevent incorrect data from being entered.
Creating Form in Design View
To create a form in Design View, perform the following steps:
1. Start MS-Access 2007 and open the database to which you would like to add a new form. Select Form
Design in Forms group from the Create tab on the Access ribbon (see Fig. 4.54).
2. Make sure that the Design tab under Form Design Tools is open on the Access ribbon. Click on Property Sheet.
This will open the Property Sheet panel as shown in Fig. 4.56.
5. Click on a field in the Field List panel that you wish to add to the form. Hold down the mouse key and
drag the field to the position on the form where you want it to be located. After placing the field, you
can resize both the field label and content boxes by clicking and dragging the boundary boxes around the
field name. Repeat this process for each field you want to add to the form (see Fig. 4.59).
Key Concepts
A table contains data about a particular topic. In a table, data is arranged in row and column format.
A database is a collection of related data that is organized, so that it can easily be accessed, managed and
updated.
Databases are used in many applications, covering almost the entire range of computer software. For example,
computerized library systems, ATMs, flight reservation systems and computerized inventory systems etc.
Query is a database object, which is used for extracting data from one or more tables based on specific
conditions.
A form is a database object that you can use to enter, edit, or display data from a table or a query.
MS-Access 2007 has several report generation tools (Report tool, Report Wizard, Blank Report tool) that you
can use to create both detail and summary reports quickly.
Review Questions
Fill in the Blanks
1. A ........................... in a database is a predefined format of rows and columns that define an entity.
2. ........................... is a database object, which is used for extracting data from one or more tables based on
specific conditions.
3. In Access, a ........................... is a form that is inserted in another form.
4. The ........................... button creates a simple report that lists the records in the selected table or query in
a columnar format.
Suggested Activities
1. Decide three own database structures.
2. Add, edit, delete, and sort records in a table.
3. Explain about query in general and the different types of query and demonstrate methods of creating a
query.
4. Identify the options for creating a form such as Form tool, Split Form tool, Multiple Items tool, Form
Wizard and Blank Form tool.
5. Explain and demonstrate the sections of a form in a database.
6. Perform calculations in a form and create a subform.
7. Perform report by formatting.
Field Trip
Using the Internet or computer magazines, look up information on Microsoft Access 2010. List any features
you find. List which of these features appeal to you and describe why they do.
Unit 5
Using internet
Unit Outcome
Students will be able to:
understand the history and advantages of the Internet;
recognize the use of browsers and search engines;
know downloading and uploading files;
understand how to design a simple webpage.
paths between any two computers in the network. In case one or two paths got damaged, communication
could proceed through the other paths. The users of this network were able to share data and communicate
by using short text messages. Soon developments started in this project and several rules of communication
were developed and adopted by all users of ARPANET.
To use ARPANET, a university was required to have a research contract with the Department of Defense.
Due to this problem, in 1970’s the NSF (U.S. National Science Foundation) created a common network
called CSNET which allowed dial-up connections to ARPANET. The idea of CSNET was simple but it was
a grand success. By 1980’s around 200 computers were connected to this network.
Research and development in the field of network resulted into the formation of a new, high-capacity
and more speedy network called NSFNET. This network got an instantaneous success and forced NSF to
think for a better and fast version of it. The research led to the creation of a new network called ANSNET
(Advanced Network Services) in 1992. In 1995, a more advanced version of the network called VBNS (Very
high speed Backbone Network System) was developed and it replaced ANSNET from the market. In 1995,
a new name was given to the collection of these networks and is now called THE INTERNET. The number
of computers being connected to the Internet doubles in less than a year.
Connectors: These are symbols and words you can use in conjunction with your keywords to qualify
their relationships and meaning. For example AND, OR, NOT.
Searching Information
Portals are the websites that provide search engines, plus content and services such as e-mail, shopping
etc. For example, Google, Lycos, AltaVista, Yahoo! etc. Figure 5.2 shows the Yahoo! portal.
Useful Tip
When searching information, it is important to know about different types of searches. You can use
keywords and connectors in a search on the Internet. Let us discuss about using keywords and Boolean
operators or connectors in a search for information:
Keyword Search: At the top of each portal’s home page is a blank space into which you can type
a keyword to locate the websites that offer the information you need. For example, if you want to
search information about “famous Ethiopian Restaurants”, then Ethiopian Restaurants is the keyword.
This way you do not have to plow through menu after menu of subject categories. The results of your
keyword search will be displayed in a short summary of documents containing the keyword you typed
(see Fig. 5.3).
NOT is a Boolean connector. When inserted before a word, it excludes that word from the results. For
example,
Ethiopian culture NOT History
Search will contain ‘Ethiopian culture’ but not ‘History’.
Before you begin searching for information on the Internet, you should identify keywords related to
your topic. Keywords differ from topic to topic in a search. Searching the Internet is a skill that comes
with experience.
3. The downloading process starts and after some time the Download complete dialog box is displayed
(see Fig. 5.6).
5. Click Next button and then follow the steps given in Setup Wizard. Now click Install button for
installation. Click Finish button to exit setup.
1. For using a downloaded graphic file, you can open the file in a graphics package, or paste it in a
word document. The picture files on web pages are usually stored in either .jpg or .gif format since
these are compressed, giving small files which are quick to load.
2. If the downloaded file is a ZIP file (extension .zip to make quick download), you will need an
unzipping program to read these ZIP files. Common unzipping programs are WinZip and PKZIP
etc.
Uploading Files
Uploading is the transmission of data from a local computer to a remote computer, as from your PC to a
website you are constructing. It allows users to easily exchange files over networks.
Internet offers you to access data from anywhere. You can save your files in some central location on
the Internet that will allow you to access the files from anywhere.
Figure 5.8 shows the website www.easy-share.com which can be used for file uploading.
The World Wide Web (WWW) or the Web is an interconnected system of Internet computers (called
servers) that support specifically formatted documents in multimedia form—sounds, photos, and video as
well as text.
Information Communication Technology — Grade 10 Student Textbook 123
Unit 5 – Using Internet
A broader definition of WWW comes from the organization that Web inventor Tim Berners-Lee helped
found, the World Wide Web Consortium (W3C):
“The World Wide Web is the universe of network-accessible information, an embodiment of human
knowledge.”
l Webpage
A webpage is a document on the World Wide Web that can include text, pictures, sound and video.
Figure 5.9 shows a webpage.
l Website
A computer with a domain name is called a website (site). The website of your school is probably on the
campus. Figure 5.10 shows the website www.ethiopianairlines.com.
The first page you see at a website is like the title page of a book. This is the home page, or welcome
page, which identifies the website and contains links to other pages at the site. Large websites have a large
number of pages.
Types of Websites
Websites are of two types: Static and dynamic website.
Static Website
A static website is one that has web pages stored on the server in the format that is sent to a client web
browser. It is primarily coded in Hypertext Markup Language (HTML).
Visitors are not able to control what information they receive via a static website, and must instead
settle for whatever content the website owner has decided to offer at that time.
Dynamic Website
A dynamic website is one that changes or customizes itself frequently and automatically, based on certain
criteria. Dynamic websites can have two types of dynamic activity: Code and Content. Dynamic code is
invisible or behind the scenes and dynamic content is visible or fully displayed.
The main purpose of a dynamic website is automation. A dynamic website can operate more effectively,
be built more efficiently and is easier to maintain, update and expand. It is much simpler to build a
template and a database than to build hundreds or thousands of individual, static HTML web pages.
Differences between Webpage and Website
The main differences between a webpage and a website are given in Table 5.1.
Table 5.1: Differences between Webpage and Website
Webpage Website
1. It is a document on the World Wide Web that 1. It is a computer with a domain name.
can include text, pictures, sound and video.
2. It is a single page. 2. It is composed of a single/multiple pages.
l Web Server
Web server is a particular computer on the Internet that hosts websites, serving pages to viewers upon
request. This service is referred to as web hosting. Every web server has a unique address so that other
computers connected to the Internet know where to find it on the vast network.
Web hosts rent out space on their web servers to people or businesses to set-up their own websites. The
web server allocates a unique website address to each website it hosts.
l Web Technology
Web technology is the technology related to World Wide Web. The format used on the web is called
Hypertext Markup Language (HTML). It is not, however, a programming language.
Let us discuss some of the web technologies that relate to the interface between web servers and their
clients.
URL
A URL (Uniform Resource Locator) is the unique address for a file that is accessible on the Internet. A
common way to get to a Website is to enter the URL of its home page file in your Web browser’s address
line. The URL contains the name of the protocol to be used to access the file resource, a domain name that
identifies a specific computer on the Internet, and a pathname, a hierarchical description that specifies the
location of a file in that computer. For example, consider the following URL of a website about Gambella
National Park in Ethiopia.
Protocol Domain name Directory name File (document) name
(Web server name) or path and extension
http://realethiopia.com/nature/national-parks/gambella-national-park.html
Here, http:// is Hypertext Transfer Protocol
realethiopia.com/ is the domain name
nature/national-parks/ is the path
gambella-national-park.html is the particular page or document
126 Information Communication Technology — Grade 10 Student Textbook
Unit 5 – Using Internet
Planning is most important for creating a Website, whether your site will have one page or many.
Collect the information you want to include on your web pages, such as text, images etc. Divide the
information you gathered into sections. Each section should be a separate web page.
If you want to start a business online or just have your own personal website, you will need to design
a web page, determine any hyperlinks, and hire the space on a web server or buy one of your own.
Professional web page designers can produce a website for you, or you can do it yourself using a menu-
driven program included with your web browser or a web-design software package such as:
(i) Microsoft FrontPage (www.microsoft.com/frontpage)
(ii) Macromedia Dreamweaver (www.macromedia.com)
(iii) Macromedia Flash (www.brothersoft.com)
After you have designed your web page, you can put it on your ISP’s server. Figure 5.12 shows a web
designing website.
Color
Select your colors very carefully, as colors affect people’s mood. Bright colors, such as yellow and orange,
cause you to become more cheerful or happy. Colors such as blue and purple have a calming effect. Dark
colors, such as brown and black, have a depressing effect.
A good rule of thumb is to use colors based on the type of effect you are trying to achieve. However,
it is always best for your text areas to have a white background with black text.
Text
Text is one of the most important parts of a web page. The way in which you display the text on your
web page will have a great impact on its success. It can make your page look very professional or very
unprofessional.
When placing text within your web page, always be consistent with your fonts i.e., do not use different
fonts throughout your pages. The standard fonts used on the Internet are Arial and Verdana as they are
128 Information Communication Technology — Grade 10 Student Textbook
Unit 5 – Using Internet
the easiest to read on a computer screen. The standard text size is 2. Headlines, which require a larger font
size, are a bit different. A popular headline font used is Georgia, as it displays nicely in a slightly larger
font size.
Busy backgrounds make the text difficult to read and draw the attention away from the text. In addition,
always be consistent with your background theme on each page of your site.
Image
An image might be the focal point of a web page. Your eye is drawn to an image because it is an image, not
because of the position it has in the layout. So, look at the other elements on the page to make small changes
(e.g., position and spacing etc.) to the elements and margins around the image to create an interesting
design. Also the captions should go with each image separately.
Align your images. Balance the graphics and text on a page. When you are considering your layout,
remember that images are a major part of the design, not just afterthoughts.
• Purpose of a Website
A website can be designed for business, sharing information or personal interest. The designer should
consider a number of things before actually building a website. The first step should be to decide about the
purpose of the website. i.e., “Why am I building this website?” Clearly defining the purpose of a website
before its creation will ensure that the website is optimized to achieve the required purpose.
The purpose of a website influences its style, the website technologies required, the hosting costs and
the budget required for it. So, the purpose of a website must be clearly identified. Some of the purposes
of designing websites are:
1. Making money: A website built to make money will require things like a customer’s payment for
the purchased items and security features to protect his/her information. For a good impression of
business the website must give a professional appearance.
2. Sharing information: A website may not require as many features for sharing information as is
meant for business. The designer has to consider if he/she is going to allow visitors to add comments
or additional resources to the website. This would require additional features from his/her website
hosting.
3. For family and friends: Websites for family and friends would have a less formal feel. For this
type of website the designer has to consider if his/her family and friends will be permitted to
automatically add to its contents. Again, this would require additional features from his/her website
hosting.
Whether the purpose is to reach local customers or the entire world, a properly designed website will
serve any organization well. By determining the purpose, the content and layout of the website can be
properly developed.
Activity 5.1
Designing and Implementing a Simple Web Page
Students in groups will design and implement a simple Web page and present it in the class.
Perform the following steps to plan the Web page:
1. Open a text editor (preferably NotePad).
2. Write the basic format, or skeleton, of a HTML page.
Information Communication Technology — Grade 10 Student Textbook 131
Unit 5 – Using Internet
Key Concepts
Some advantages of the Internet are: Sharing and collecting Information, E-commerce, News, Advertisement,
Communication, Formation of communities, Entertainment, Online Learning, Services etc.
Downloading is transmitting data from a remote computer to a local computer.
The World Wide Web (WWW) or the Web is an interconnected system of Internet computers (called servers)
that support specifically formatted documents in multimedia form—sounds, photos, and video as well as
text.
A computer with a domain name is called a website (site). Websites are of two types: Static and dynamic
website.
The purpose of a website influences the style, the website technologies required, the hosting costs and the
budget required for it.
Review Questions
Fill in the Blanks
1. Computers linked to the ........................... have high probability of virus attacks and as a result of this
their hard disks can crash, giving the users a lot of trouble.
2. ........................... is the subject word or words of the topic you wish to find in a web search.
3. ........................... is the transmission of data from a local computer to a remote computer, as from your
PC to a website you are constructing.
4. A ........................... is a document on the World Wide Web that can include text, pictures, sound and
video.
Suggested Activities
1. Explain the brief history of the Internet.
2. Describe with examples, how to select a keyword.
3. Explain how pages belong to a person, organization or government. One day they might have their own
web page!
4. Demonstrate locating information contents.
5. Explain and demonstrate how to incorporate the features of a design into a webpage.
6. Describe how the Internet can be searched to find information and comment on how this information
could be used by people.
Field Trip
Visit some reputed educational institutions and business houses to prepare a list on the following topic and
present it in your ICT class.
How has the Internet affected our lives?
Unit Outcome
Students will be able to:
understand the logo language;
recognize techniques in programming using the logo language.
Starting LOGO
To start Logo, perform the following steps:
Click Start → All Programs → Microsoft Windows Logo → Microsoft Windows Logo
OR
Double click on the MSW Logo icon on the desktop of your computer.
The MSWLogo Screen will appear. Now, you can use the primitives, perform calculations and write
procedures as per your requirement.
Exiting LOGO
To exit LOGO, type BYE in Command Input Box.
l Using Variables
A variable is the name of a memory location that contains a value.
In the RAM (Random Access Memory) of a computer each memory location has an integer address
associated with it. The memory locations store data used by programs and these are given symbolic names.
Once a variable has a name, we can use and manipulate it.
In LOGO, variables are given names which are strings of letters. For example, NUM, LEN, SIZE, X
etc.
Defining Variables: The variables in LOGO are defined with the MAKE statement. For example,
MAKE “NUM 50 ; variable NUM is assigned a value of 50
MAKE “LEN 20 ; variable LEN is assigned a value of 20
MAKE “X :X + 1 ; variable X is incremented by 1
Using Variables in Writing Procedures
In Grade 9, you have written LOGO procedures using:
1. the Input Box.
2. the Editor window.
In LOGO, variables can be “attached” to the procedure names. Variables are used for making a procedure
more flexible. You must remember that a : (colon) is used before a variable in Logo procedures. You must
not use Logo keywords as variables. Consider the following examples:
Example 1: Write a procedure to draw a square which lets the user enter a length for the side.
TO SQUARE :LEN ; LEN is the length of the side
; Procedure SQUARE has a variable :LEN
CS ; Clear Screen
REPEAT 4 [FD :LEN RT 90]
HT ; Hide Turtle
END
Type the following in the Command Input Box (there must be atleast one blank space between Square
and value of Len to be given) and press the Enter key to run the procedure:
SQUARE 50
This draws a square of side length 50 on the graphics screen as shown below:
Example 3: Write a general procedure for drawing regular polygons having two variables, N the number
of sides and LEN the length of its side.
TO POLY :N :LEN ; N is the number of polygon sides and LEN is length of the sides
; Procedure POLY has two variables :N and :LEN
CS ; Clear Screen
REPEAT :N [FD :LEN RT : 360/N]
HT ; Hide Turtle
END
Type the following in the Command Input Box and press the Enter key to run the procedure:
POLY 5 40
This draws a pentagon of side length 40 on the graphics screen as shown below:
CS ; Clear Screen
REPEAT 2 [FD : L RT 90 FD :B]
HT ; Hide Turtle
END
Type the following in the Command Input Box and press the Enter key to run the procedure:
RECTANGLE 100 50
This draws a rectangle of length 100 and breadth 50 on the graphics screen as shown below:
SQUARE1
This draws a square of side length 100 on the graphics screen as shown below:
SQUARE2 1
This draws squares of varying lengths on the graphics screen as shown below:
But before the program ends, LOGO meets the word SQUARE2 again, this time with ten units added
to the side. The word ‘SQUARE2’ starts it all over again, so we get an endless loop with the square getting
bigger and bigger.
EDIT “SQUARE2
TO SQUARE2 :LEN
; Procedure SQUARE2 uses recursion and stops conditionally
REPEAT 4[FD :LEN RT 90]
IF :LEN > 300 [STOP]
SQUARE2 :LEN+10 ; Call to procedure Square2 itself
END
Type the following in the Command Input Box and press the Enter key to run the procedure:
SQUARE2 1
This draws squares of varying lengths as shown below:
What do you observe? LOGO checks how big the length of side LEN is every time the program loops.
If the answer is greater than 300, the program is stopped.
Example 3: The following procedure countdowns from a given number.
TO COUNTDOWN :NUM
; Procedure COUNTDOWN uses recursion
IF :NUM = 0 [STOP] ; Condition test
LABEL :NUM FD 20 RT 5 ; LABEL command prints value of : NUM and moves turtle
COUNTDOWN 10
This will give the following output:
The process where a LOGO statement calls or runs itself is called RECURSION. A recursive procedure
is one which ‘turns back on itself’.
Activity 6.1
Produce a Simple Snow Flake Outline
Students in groups will produce a simple snow flake outline and present it in the class.
To produce a simple snowflake outline, perform the following steps:
1. Start LOGO and open the Editor window.
2. Type the following procedures:
TO TRIANGLE ; Procedure TRIANGLE to create a triangle
ST ; Show Turtle
REPEAT 3 [FD 20 RT 120]
HT ; Hide Turtle
END
TO HEX ; Procedure HEX to create hexagon using the TRIANGLE procedure
REPEAT 6 [TRIANGLE RT 60] ; Call to procedure TRIANGLE
END
TO SNOWFLAKE ; Procedure to create snowflake using the HEX procedure
REPEAT 6 [HEX FD 40 HEX BK 40 RT 60 HEX] ; Call to procedure HEX
END
142 Information Communication Technology — Grade 10 Student Textbook
Unit 6 – Control and Learning with Logo
3. To run the procedure SNOWFLAKE, type the following in the Command Input Box and press the Enter
key:
Snowflake
The following output will be displayed on the Graphics screen:
Key Concepts
LOGO is one of the simplest and easiest computer languages.
A LOGO procedure is a set of Logo commands which are given to perform a particular task.
Variables are used for making a procedure more flexible.
Recursion is the process where a procedure repeats itself.
Review Questions
Fill in the Blanks
1. The LOGO commands are also known as ...........................
2. A ........................... is the name of memory location that contains a value.
3. A LOGO procedure is called ........................... if it calls itself as a sub procedure.
4. To exit LOGO, type ........................... in Command Input Box.
2. Which of the following LOGO primitive clears the screen and returns the mouse to its home position?
(a) FD (b) LT
(c) CS (d) PU
3. In LOGO, when accessing a variable’s value you must put a ........................... in front of the variable
name.
(a) = (b) :
(c) ? (d) *
4. All LOGO procedures begin with “To” and end with ........................... .
(a) ; (b) Stop
(c) Exit (d) End
Suggested Activities
1. Create rectangles with varying lengths of sides.
2. Produce a simple snowflake outline.
3. Have full version of the LOGO language.
glossary
A DBMS (Database Management System):
Application software which enables the storage,
Absolute Reference: Commonly used in modification, retrieval, and querying of data in a
spreadsheet applications, it is a formulated cell database.
reference that will not adjust when used to calculate Distribution List: Also called a mailing list, is a
the sum of specific cells. collection of e-mail addresses that allows you to e-mail
Access: A database program which is a part of the multiple people at one time.
Microsoft Office suite of programs. Domain Name System: An addressing system
Application Software: A program that is designed in which abbreviations are used to indicate the type
to perform specific tasks. of organization or entity instead of whole name, for
example, .edu for educational institution.
B DVD: Digital Versatile Disc or Digital Video Disc.
D G
Database: A structured collection of data that can Gigabyte (GB): 2 to the 30th power (1,073,741,824)
be used for a variety of purposes. bytes. One gigabyte is equal to 1,024 megabytes.
Data Communications: The moving or sharing GIGO: It is an acronym that stands for Garbage In,
of encoded information between two or more data Garbage Out.
sources using an electronic medium. Google: A popular search engine.
GUI (Graphical User Interface): A program based on TCP/IP but is accessible only to authorized
interface that takes advantage of the computer’s users within an organization. An organization’s
graphics capabilities to make the program easier to intranet is usually protected from external access by a
use. Well-designed graphical user interfaces can free firewall.
the user from learning complex command languages. ISP (Internet Service Provider): A company that
provides access to the Internet.
H
Hacker: A person who spends his/her time trying J
to gain access to information stored on other people’s
computers all around the world. JAVA: A high-level programming language
developed by Sun Microsystems.
Hardware: The physical equipment used in a
computer system, such as the CPU, peripheral devices Joystick: A device that looks a bit like a gear lever
and memory. in a car. This is connected to a computer and is used
Home Page: The initial page of a site on the World mainly for controlling the cursor in fast action games.
Wide Web.
HTML (Hypertext Markup Language): It is a K
collection of structuring and formatting tags used to Kilobyte (KB): This is about a thousand bytes of
create Web pages.
space. In reality, it is two to the 10th power or 1,024
HTTP (Hypertext Transport Protocol): The bytes.
standard protocol for transferring hypertext documents
on the World Wide Web.
Hyperlinks: A word or graphic display on one
L
web page that allows a computer to shift to another LAN (Local Area Network): A network that
related web page. links together computers and peripheral equipment
Hypertext: A method of storing data through a within a limited area, such as a building or a group of
computer program that allows a user to create and buildings.
link fields of information at will and to retrieve the Language Processor: Software that converts a
data non-sequentially. high level language or assembly language code into
machine understandable form.
I Login: To attach to a computer using the user’s
ID.
Icon: A picture or symbol to represent a command LOGO (Logic Oriented, Graphics Oriented):
on a computer screen. A high level programming language specifically
IDE (Integrated Development Environment): designed for its ease of use and graphics capabilities.
A programming environment integrated into an
application. M
Internet Explorer: A browser produced by the
Microsoft Corporation and supplied together with the Megabyte (MB): About a million bytes of space.
Windows operating system. Actually it is 2 raised to the 20th power or 1,048,576
IT (Information Technology): The development, bytes of space.
implementation, and maintenance of computer Memory: Internal storage areas in the computer.
hardware and software systems to organize and MODEM: Stands for MOdulator and DEModulator.
communicate information electronically. It is a device that changes data from digital (computer
Integrated Circuit (IC): A circuit of transistors, language) to analog (phone line language) and then
resistors, and capacitors constructed on a single back again.
semiconductor wafer or chip, in which the components
are interconnected to perform a given function. Motherboard: The main circuit board of a
Internet: The Internet is a network of networks microcomputer.
all of which use the same set of communications MS-Access: Database application software,
protocols. provided by Microsoft.
Intranet: A private network for communications MS-Excel: Spreadsheet application software,
and sharing of information that, like the Internet, is provided by Microsoft.
146 Information Communication Technology — Grade 10 Student Textbook
Glossary
MS-PowerPoint: Presentation software, provided purchased. It can be written by the user by using a
by Microsoft. special hardware program. Once the data is written to
MS-Word: Word processing application software, it, it cannot be erased or changed.
provided by Microsoft. Protocol: A set of rules governing the format of
messages that are exchanged between computers.
N
Q
Navigation: It is the process of finding the way,
i.e., navigating, around a series of menus within a Query: Used to retrieve information on a certain
computer program or finding the way around the condition from a database.
World Wide Web by means of a browser.
Netiquette: The rules of etiquette that apply when R
communicating over computer networks, especially RAM (Random Access Memory): A volatile
the Internet. computer memory available to the user for the
temporary storage and manipulation of data.
O Relative Reference: The default reference in a
Offline: Not connected to a computer or network spreadsheet package.
of computers. Reports: Used to present data in a printed format.
Online: Connected to a computer or network of ROM (Read-Only Memory): A memory in which
computers, especially the World Wide Web. program instructions, operating procedures, or other
Outlook: A popular e-mail program, part of the data are permanently stored, generally on electronic
Microsoft Office suite of programs. chips during manufacture, and that ordinarily cannot
Output: Anything that comes out of a computer be changed by the user or when power is switched
after being processed. off.
Output Device: A device that translates information
processed by the computer into a form that humans S
can understand. Scroll Bar: A widget found in graphical user
interface and used to show and control which portion
P of a document is currently visible in a window. A
window may have a horizontal or, vertical scroll bar,
PDF (Portable Document Format): A technology or both.
developed by Adobe and was designed to capture all Scanner: A device used to convert hard copy, e.g.,
of the elements of a printed document and place it in a a printed page, photograph or photographic negative,
single image file. into a form that can be stored on a computer.
Pen Drive: A secondary storage device that can be Server: This is a mainframe computer that serves
used to easily transfer files between USB-compatible the other computers attached to it.
systems. Sheet Tab: In spreadsheet applications, this refers
Portal: A Webpage, website or service that acts as to a tab at the bottom of a worksheet that acts as a
link or entrance to other websites on the Internet. means to identify or access different sheets within a
Printout: Anything produced on a printer after workbook.
being processed by a computer program. Slide Show: Used to display the slides in a desired
Primary Key: A set of one or more values in a sequence.
database that uniquely identifies a record in a table. Source Code: Program code written in a high level
Primitives: The LOGO commands are known as language.
‘Primitives’. Social Networking: A term applied to a type of
Procedure: The sequence of actions or instructions website where people can seek other people who share
to be followed in solving a problem or accomplishing their interests, find out what’s going on in their areas
a task. It may be used at one or more points in a of interest, and share information with others.
computer program. Source data: Data for which the chart is prepared.
Programmable Read-Only Memory (PROM): Software: The set of instructions used to direct
A special memory chip that is blank when first the operation of a computer, as well a documentation
giving instructions on how to use them.
Information Communication Technology — Grade 10 Student Textbook 147
Glossary
Spreadsheet: A document which helps to organize Virus: A program or piece of code that is loaded
data in rows and columns that intersect to form cells. onto your computer without your knowledge and
System: A combination of the hardware, runs against your wishes.
software, and firmware. A system typically consists
of components (or elements) which are connected
together in order to accomplish a specific function or
W
set of functions. W3C (World Wide Web Consortium): An
System Software: It is a set of master programs international non-profit organization which acts as a
that keeps the computer system working. resource centre for the World Wide Web, and is active
in setting technical standards.
T WAN (Wide Area Network): A network in
which computers are connected to each other over
Task bar: The bar that contains the start button a long distance, using telephone lines and satellite
and appears by default at the bottom of the desktop. communications.
TCP/IP: Acronym for Transmission Control Webcam: A camera connected to a computer and
Protocol/Internet Protocol, the suite of communications linking it to the Internet.
protocols used to connect hosts on the Internet. Web page or Webpage: A single, usually hypertext
Terabyte (TB): 2 to the 40th power document on the World Wide Web that can incorporate
(1,099,511,627,776) bytes. text, graphics, sounds, etc.
Trojan: A type of computer virus that is loaded Web server: A computer that runs specific software
into an unsuspecting users system via a host program to serve web pages to the Internet.
such as a free game. Web site: A connected group of pages on the
Turtle: A triangular shape pointer used in LOGO World Wide Web regarded as a single entity, usually
that helps in drawing figures. maintained by one person or organization and
Twitter: A microblogging facility that allows users developed to a single topic or several closely related
to post very short texts (maximum 140 characters) topics.
containing snippets of information about what they are Wizard: A utility that provides guided sequence to
doing at a given moment, news items, links to websites perform complex task easily and quickly.
or comments on events. Word Processor: Software that processes textual
matter and creates organized documents.
U Workstation: The computer attached to the
Uploading: It means transmitting data from a local Internet.
computer to a remote computer, as from your PC to a WWW (World Wide Web): Series of servers or
website you are constructing. computers that are interconnected through hypertext.
UPS (Uninterruptible Power Supply): It is a WYSIWYG: What You Say Is What You Get.
backup power unit that provides continuous power
when the normal power supply is interrupted.
X
URL (Uniform Resource Locator): A protocol for
specifying addresses on the Internet. It is an address XML (eXtensible Markup Language): It is a markup
that identifies a particular file on the Internet, usually language, not limited to Web documents.
consisting of the protocol as http, followed by the domain
name. Y
YouTube: A website to which we can upload our
V own video clips and view video clips uploaded by
others: http://www.youtube.com.
Videoconferencing or Video Conferencing: A
computer-based communications system that allows
a group of computer users at different locations to Z
conduct a “virtual conference” in which the participants Zip Disks: The disks with a special high-quality
can see and hear one another as if they were in the magnetic coating that have a capacity of 100, 250 or
same room participating in a real conference. 750 megabytes.