Generic - End User Computing
Generic - End User Computing
Module Guide
Copyright © 2022
MANCOSA
All rights reserved; no part of this book may be reproduced in any form or by any means, including photocopying machines,
without the written permission of the publisher. Please report all errors and omissions to the following email address:
modulefeedback@mancosa.co.za
This Module Guide
End User Computing (NQF level 5)
module guide will be used across the following programmes:
Preface .................................................................................................................................................... 1
i
End User Computing
Preface
A. Welcome
Dear Student
It is a great pleasure to welcome you to End User Computing (EUC5). To make sure that you share our passion
about this area of study, we encourage you to read this overview thoroughly. Refer to it as often as you need to
since it will certainly make studying this module a lot easier. The intention of this module is to develop both your
confidence and proficiency in this module.
The field of End User Computing is extremely dynamic and challenging. The learning content, activities and self-
study questions contained in this guide will therefore provide you with opportunities to explore the latest
developments in this field and help you to discover the field of End User Computing as it is practiced today.
This is a distance-learning module. Since you do not have a tutor standing next to you while you study, you need
to apply self-discipline. You will have the opportunity to collaborate with each other via social media tools. Your
study skills will include self-direction and responsibility. However, you will gain a lot from the experience! These
study skills will contribute to your life skills, which will help you to succeed in all areas of life.
MANCOSA does not own or purport to own, unless explicitly stated otherwise, any intellectual property rights in or
to multimedia used or provided in this module guide. Such multimedia is copyrighted by the respective creators
thereto and used by MANCOSA for educational purposes only. Should you wish to use copyrighted material from
this guide for purposes of your own that extend beyond fair dealing/use, you must obtain permission from the
copyright owner.
1 MANCOSA
End User Computing
B. Module Overview
End User Computing is an essential skill in any business today and is required in order for businesses to meet
local and global economic challenges and requirements of a digital world.
Additionally, End User Computing is foundational and generic, which allows for maximum mobility between
qualifications. Apart from the workplace needs End User Computing will address, it is also designed as an entry-
level qualification into most further education and training fields.
This module guide will be used for the following module namely: -
End User Computing (NQF level 5) – covers the basic understanding of ICT and progresses to the
foundational knowledge of using the following applications: MS Word, MS Excel, MS PowerPoint, MS
Outlook and MS Access
Demonstrate the understanding of ICT ICT is explored to discover all the concepts that are
concepts associated with end-user associated with it
computing
Apply word processing skills in a GUI- Microsoft Office suite of applications is explored to equip
based application students with word processing skills
Apply presentation skills in a GUI-based Microsoft Office suite of applications is explored to equip
application students with presentation skills
Apply spreadsheet skills in a GUI-based Microsoft Office suite of applications is explored to equip
application students with spreadsheet skills
Ability to apply electronic mail (email) Microsoft Office suite of applications is explored to equip
skills in a GUI-based application students with skills for e-mail communication
Apply Web Browser skills in a GUI-based Web browsers are explored to equip the student with the
application necessary navigation skills
Understanding of impact of ICT and its ICT is further explored to understand its impact in different
use in an organisation sectors and in the student’s daily life
MANCOSA 2
End User Computing
You will find the Unit Learning Outcomes and the Associated Assessment Criteria on the introductory pages of
each Unit in the Module Guide. The Unit Learning Outcomes and Associated Assessment Criteria lists an overview
of the areas you must demonstrate knowledge in and the practical skills you must be able to achieve at the end of
each Unit lesson in the Module Guide.
This Module Guide was compiled to help you work through your units and textbook for this module, by breaking
your studies into manageable parts. The Module Guide gives you extra theory and explanations where necessary,
and so enables you to get the most from your module.
The purpose of the Module Guide is to allow you the opportunity to integrate the theoretical concepts from the
prescribed textbook and recommended readings. We suggest that you briefly skim read through the entire guide
to get an overview of its contents.
At the beginning of each Unit, you will find a list of Learning Outcomes and Assessment Standards. This outlines
the main points that you should understand when you have completed the Unit/s. Do not attempt to read and study
everything at once. Each study session should be 90 minutes without a break
This module should be studied using the recommended textbook/s and the relevant sections of this Module Guide.
You must read about the topic that you intend to study in the appropriate section before you start reading the
textbook in detail. Ensure that you make your own notes as you work through both the textbook and this module.
In the event that you do not have the prescribed textbook, you must make use of any other source that deals with
the sections in this module. If you want to do further reading, and want to obtain publications that were used as
source documents when we wrote this guide, you should look at the reference list and the bibliography at the end
of the Module Guide. In addition, at the end of each Unit there is a link to the PowerPoint presentation and other
useful reading.
F. Study Material
The study material for this module includes tutorial letters, programme handbook, this Module Guide, prescribed
textbook which is supplemented by recommended readings. The Module Guide is written based on a prescribed
textbook which is supplemented by recommended readings.
3 MANCOSA
End User Computing
There is at least one prescribed and recommended textbooks/readings allocated for the module.
The prescribed and recommended readings/textbooks presents a tremendous amount of material in a simple,
easy-to-learn format. You should read ahead during your course. Make a point of it to re-read the learning content
in your module textbook. This will increase your retention of important concepts and skills. You may wish to read
more widely than just the Module Guide and the prescribed and recommended textbooks/readings, the
Bibliography and Reference list provides you with additional reading.
Laudon C.K, Laudon J.P, 2017, Management Information Systems, Managing the Digital Firm Vol. 1. no.
5, Pearson
Microsoft Office 365, Office 2016 Introductory, 2016
Recommended Readings
In addition to the prescribed textbook, the following should be considered for recommended books/readings:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh approach to numerical computing,
SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing, Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing: Focusing on mobile users at the edge, Proceedings of the 2015
workshop on mobile big data, vol.1, no. 4
H. Special Features
In the Module Guide, you will find the following icons together with a description. These are designed to help you
study. It is imperative that you work through them as they also provide guidelines for examination purposes.
LEARNING The Learning Outcomes indicate aspects of the particular Unit you have
OUTCOMES to master.
MANCOSA 4
End User Computing
A Think Point asks you to stop and think about an issue. Sometimes
THINK POINT you are asked to apply a concept to your own experience or to think of
an example.
You may come across Activities that ask you to carry out specific tasks.
In most cases, there are no right or wrong answers to these activities.
ACTIVITY
The purpose of the activities is to give you an opportunity to apply what
you have learned.
At this point, you should read the references supplied. If you are unable
READINGS to acquire the suggested readings, then you are welcome to consult
any current source that deals with the subject.
PRACTICAL
Practical Application or Examples will be discussed to enhance
APPLICATION
understanding of this module.
OR EXAMPLES
You may come across Knowledge Check Questions at the end of each
KNOWLEDGE
Unit in the form of Knowledge Check Questions (KCQ’s) that will test
CHECK
your knowledge. You should refer to the Module Guide or your
QUESTIONS
textbook(s) for the answers.
You may come across Revision Questions that test your understanding
REVISION
of what you have learned so far. These may be attempted with the aid
QUESTIONS
of your textbooks, journal articles and Module Guide.
5 MANCOSA
End User Computing
Unit
1: Concepts of Information and
Communication Technology
MANCOSA 6
End User Computing
1.8. System Unit Devices and Examine system unit devices and peripherals
Peripherals
7 MANCOSA
End User Computing
Prescribed Textbook:
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
MANCOSA 8
End User Computing
1.2 Computer
A computer is an electronic device, operating under the control of instructions stored in its own memory that can
accept data (input), process the data according to specified rules, produce information (output), and store the
information for future use.
9 MANCOSA
End User Computing
2. Minicomputers: - A minicomputer is a type of computer that possesses most of the features and capabilities
of a large computer but is smaller in physical size. Example mobile devices, PDAs.
A minicomputer fills the space between the mainframe and microcomputer, and is smaller than the former but
larger than the latter. Minicomputers are mainly used as small or mid-range servers operating business and
scientific applications. However, the use of the term minicomputer has diminished and has merged with
servers. A minicomputer may also be called a mid-range computer.
3. Super computers: - These are used for large scale numerical calculations required in the applications like
weather forecasting etc.”
Input device accepts the coded information as source program i.e. high level language. This is either stored in the
memory or immediately used by the processor to perform the desired operations. The program stored in the
memory determines the processing steps. Basically the computer converts one source program to an object
program. i.e3. into machine language.
Finally, the results are sent to the outside world through output device. All of these actions are coordinated by the
control unit.”
MANCOSA 10
End User Computing
Input unit: - The source program/high level language program/coded information or data is fed to a computer
through input devices of which the keyboard is a most common type. Whenever a key is pressed, one
corresponding word or number is translated into its equivalent binary code over a cable and fed either to memory
or processor. Joysticks, trackballs, mouse, scanners etc. are other input devices.
Memory unit: - Its function is to store programs and data. It is basically divided into two types:
Primary memory
Secondary memory
1.Primary memory: - Is the one exclusively associated with the processor and programs must be stored in this
memory while they are being executed. The memory contains a large number of semiconductor storage cells.
Each is capable of storing one bit of information. These are processed in a group of fixed size called word.
To provide easy access to a word in memory, a distinct address is associated with each word location. Addresses
are numbers that identify memory location. Number of bits in each word is called word length of the computer.
Programs must reside in the memory during execution. Instructions and data can be written into the memory or
read out under the control of processor.
Memory in which any location can be reached in a short and fixed amount of time after specifying its address is
called random-access memory (RAM). The time required to access one word is called memory access time.
Memory which is only readable by the user and contents of which can’t be altered is called read only memory
(ROM) and it is part of the operating system.
Caches are the small fast RAM units, which are coupled with the processor and are often contained on the same
integrated circuit (IC) chip to achieve high performance. Although primary storage is essential, it tends to be
expensive.
2. Secondary memory: - Is used where large amounts of data and programs have to be stored,
particularly information that is accessed infrequently. Examples of secondary memory include,
magnetic disks and tapes, optical disks (i.e. CD-ROM’s), floppies etc.
Arithmetic logic unit (ALU): - Most of the computer operations are executed in the ALU of the processor like
addition, subtraction, division, multiplication, etc. the operands are brought into the ALU from memory and stored
in high speed storage elements called registers. Then according to the instructions the operation is performed in
the required sequence.
11 MANCOSA
End User Computing
The control unit and the ALU are many times faster than other devices connected to a computer system. This
enables a single processor to control a number of external devices such as keyboards, displays, magnetic and
optical disks, sensors and other mechanical controllers.””
Output unit: - These actually are the counterparts of the input unit. Its basic function is to send the processed
results to the outside world. Examples: - Printer, speakers, monitor etc.
Control unit: - It effectively is the nerve centre that sends signals to other units and senses their states. The actual
timing signals that govern the transfer of data between input unit, processor, memory and output unit are generated
by the control unit.
Hardware
Hard disk
RAM
Power supply
MANCOSA 12
End User Computing
Processor
Case
Monitor
Keyboard
Mouse
“
Software:
The term software is used to describe computer programs that perform a task or tasks on a computer system.
Software can be grouped as follows:
System software:
These are the programs that control the operation of the computer system. Operating systems (OS) and utility
programs are the most common. The Operating System starts the computer, provides a user interface, manages
the computer memory, manages storage, manages security and provides networking and internet facilities to
mention a few of its capabilities. There are many OS’s on the market including Microsoft Windows XP, Microsoft
Windows Vista, Apple OS X, UNIX and Linux. Windows is by far the most commonly used OS in the world, but
Linux in particular, is making inroads into this dominance.”
Utility programs perform maintenance tasks on the computer system. This includes file management programs,
uninstall programs, disk scanners and defragmenters, backup utilities, antivirus etc. These can be included in the
OS or purchased separately”
13 MANCOSA
End User Computing
Device drivers are programs that control particular hardware devices. They are supplied with new hardware and
must be run so the hardware can communicate with the OS. They are supplied with printers, graphics cards,
scanners etc.
Application Software: “
This software is used to do non-system based tasks. Categories include business software, engineering software,
medical software, games etc.”
Input devices These devices are used to get data into the computer system
Processing devices These manipulate the data using a set of instructions called a program
Output devices These are used to get data out of a computer system
Storage devices Utilised to store the data for use at a later stage
Communications devices These can send the data to another computer system
MANCOSA 14
End User Computing
1 System Unit The container for the motherboard, disk drives etc.
4 Mouse An input device allowing interaction with the system using pointing and clicking
15 MANCOSA
End User Computing
Peripherals are devices that connect to the system unit using cables or wireless technologies. Typical peripherals
include:
Monitor
Keyboard
Mouse
Speakers
Printer
Plotter
Scanner
MANCOSA 16
End User Computing
The processor’s function is to control the activities of the computer system. A computer program is made up of
instructions and when the program is run, the processor is responsible for carrying out these instructions in an
orderly fashion. The type of instructions the processor can execute includes:
Arithmetic instructions - It carries out all the addition, subtraction, multiplication and division requested by
computer programs
Logical instructions - It can make decisions by comparing data and acting in a particular way depending on
the result
Move operations - It can move data from place to place within the computer system. This could be from
memory to the processor for addition or from memory to a printer or disk drive etc
The speed of a processor is measured in megahertz (MHz) or Gigahertz (GHz). This is the speed of the system
clock (clock speed) within the processor and it controls how fast instructions can be executed:
1 MHz - One million clock ticks every second
1 GHz - One billion clock ticks every second
This means that if one instruction was executed every clock tick, a 3GHz processor could execute three billion
instructions every second.
The two main computer processor manufacturers are Intel and Advanced Micro Devices (AMD). These two
companies produce almost all of the processors used in desktop and notebook computers.
Intel produces the Pentium and Centrino ranges of processors
AMD produces the Athlon and Turion ranges of processors
The performance of these chips relative to each other is forever changing and it would be difficult to claim one is
better than the other in the long term.”
“
Source: Krilic, (2018)
The latest trend in processor manufacture is to essentially put more than one processor on a silicon chip. These
multi-core processors can have two, three or four processor cores on a single chip. This obviously vastly increases
the performance of the computer system as long as the programs run on the systems can take advantage of the
multi-cores.””
17 MANCOSA
End User Computing
RAM is made in the form of integrated circuits (IC’s) in the same manner as a processor. These IC’s are placed
on a circuit board to produce a memory module. The most common RAM technology is dynamic random access
memory (DRAM).”
In this technology, a transistor and a capacitor are paired to store one Bit (binary digit) of data. In essence, if the
capacitor is charged, a binary 1 is stored and if it is discharged, a binary 0 is stored. The transistor acts as a switch
to allow the capacitor’s state to be changed as required.”
”
Ports
Computer ports are interfaces between peripheral devices and the computer system. They are hardware devices
built into the motherboard or on expansion cards. They are often built into the front of the computer chassis for
easy access but will be cabled back to the motherboard.”
MANCOSA 18
End User Computing
Serial port
Although more or less obsolete, they are still included in new systems. The serial port is a 9-pin port. Windows
call them Com ports - Com1, Com2 etc. Mice and external modems were connected to these ports. They are
turquoise in colour.”
19 MANCOSA
End User Computing
USB port “
The universal serial bus was intended to replace Serial, Parallel and PS/2 ports with a single standard. 127 devices
can be connected to a single USB port and computers are often supplied with six to ten ports. USB is hot
swappable which means that devices can be connected and disconnected without turning off the computer system,
something that should never be attempted with parallel or serial devices.”
SECTION 2: HARDWARE “
Computer hardware is the collection of physical parts of a computer system. This includes the computer case,
monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive,
motherboard, video card, and many others. Computer hardware is what you can physically touch.”
MANCOSA 20
End User Computing
CPU - The CPU is the central electronic chip that determines the processing power of the computer.
Memory - Memory is a part of the computer that temporarily stores applications, documents, and some operating
information.
Bus - A bus is an electronic line that allows 1s and 0s to move from one place to another.
Expansion Slots - Expansion slots appear on the motherboard. They are sockets into which adapters are
connected.
Ports and Connectors - A port is a connector located on the motherboard or on a separate adapter.
Bays - A bay is a space inside the computer case where a hard drive, floppy drive or CD-ROM drive sits
Power Supply - A power supply changes normal household electricity into electricity that a computer can use.
Sound Components - A sound card lets a computer play and record high quality sound.
Control Unit
The control unit (often called a control system or central controller) directs the various components of a computer.
It reads and interprets (decodes) instructions in the program one by one. The control system decodes each
instruction and turns it into a series of control signals that operate the other parts of the computer.
Logic operations involve Boolean logic: AND, OR, XOR and NOT. These can be useful both for creating
complicated conditional statements and processing Boolean logic.
Memory:
A computer's memory can be viewed as a list of cells into which numbers can be placed or read. Each cell has a
numbered "address" and can store a single number. The computer can be instructed to "put the number 123 into
the cell numbered 1357" or to "add the number that is in cell 1357 to the number that is in cell 2468 and put the
answer into cell 1595". The information stored in memory may represent practically anything. Letters, numbers,
even computer instructions can be placed into memory with equal ease. Since the CPU does not differentiate
21 MANCOSA
End User Computing
between different types of information, it is up to the software to give significance to what the memory sees as a
series of numbers.
Computer main memory comes in two principal varieties: random access memory or RAM and read-only memory
or ROM. RAM can be read and written anytime the CPU commands it. But ROM is pre-loaded with data and
software that never changes, so the CPU can only read from it. ROM is typically used to store the computer's initial
start-up instructions.”
Keyboard - The keyboard looks like the typewriter. A numeric keypad is located to the right of the keyboard.
Numeric keys have the same placement as a 10-key calculator, which allow the operator to enter data rapidly.”
MANCOSA 22
End User Computing
Mouse - The mouse is a device that helps control the movement of the insertion point on the screen.
Central Processing Unit (C PU)
The central processing unit or (CPU) is the "brain" of the computer. It contains the electronic circuits that cause
the computer to follow instructions from ROM (read only memory) or from a program in RAM (random access
memory).”
23 MANCOSA
End User Computing
“
Source: Monmonier, (2018)
A DVD – R Disc (Digital Video Disc - Recordable) – These discs hold the space of about 4.7 GB and are used to
record movies.
A DVD + RW Disc (Digital Video Disc Rewriteable) - The primary advantage of DVD-RW over DVD-R is the ability
to erase and rewrite to a DVD-RW disc. According to Pioneer, DVD-RW discs may be written to about 1,000 times
before needing replacement. DVD-RW discs are commonly used for volatile data, such as backups or collections
of files. They are also increasingly used for home DVD video recorders. One benefit of using a rewritable disc is,
if there are writing errors when recording data, the disc is not ruined and can still store data by erasing the faulty
data.”
MANCOSA 24
End User Computing
Flash Drive - This a storage device that comes in many colours and has a stick shape to it. They are very small in
size, but they can hold anywhere between 256 MB and 8 GB of material on them.”
This is a disk drive in which a plastic or metal case surrounds the hard drive. It can be inserted and removed just
like a floppy disk.
PC Card - This is a thin credit card size device that fits into a PC card slot, usually on a notebook computer. This
card simply adds storage to most notebooks.”
25 MANCOSA
End User Computing
Smart Cards - These are the size of an ATM card. When inserted into a smart card reader, they can read and
update data.
SECTION 3 SOFTWARE “
Software is a set of programs, which is designed to perform a well-defined function. A program is a sequence of
instructions written to solve a particular problem.
There are two types of software −
System Software
Application Software
MANCOSA 26
End User Computing
27 MANCOSA
End User Computing
LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired LAN’s.
Every LAN uses a protocol –a set of rules that governs how packets are configured and
transmitted
Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus –
Ring – Star
LANs are capable of very high transmission rates (100s Mb/s to G b/s)
Advantages of LAN
Speed
Cost
Security
E-mail
Resource Sharing
MANCOSA 28
End User Computing
Disadvantages of LAN
Expensive to Install
Requires Administrative Time
File Server May Fail
Cables May Break”
29 MANCOSA
End User Computing
MANCOSA 30
End User Computing
1.16 3D Printing
In 3D printing, it all starts with the creation of a 3D model in your computer. This digital design is for instance a
CAD (Computer Aided Design) file. A 3D model is either created from the ground up with 3D modelling software
or based on data generated with a 3D scanner.
3D Scanners
Currently, prices of 3D scanners range from expensive industrial grade 3D scanners to DIY scanners anyone can
make at home. With a 3D scanner you’re able to create a digital copy of an object.
3D Modelling Software
3D modelling software come in many forms. There’s industrial grade software that costs thousands a year per
license, but also free open source software, like Blender, for instance.
3D modelling software are often made to suit the functions of the user’s industry. This has resulted in the rise of
software suited to specific niches. As a result, there are software applications on the market that cater to
aerospace or transportation, furniture design or fabrics and fashion among many others.
For this reason, when you are starting out, the amount of choices can be a bit overwhelming, we recommend
starting with Tinkercad. Tinkercad is available for free and it works in browsers that support WebGL, for instance
Google Chrome. They offer beginner lessons and has a built in option to get your object printed via various 3D
print services.
Now that you have a 3D model, the next step is to prepare it in order to make it 3D printable.
Sometimes it’s possible to slice a 3D file within a 3D modelling software or in the 3D printer itself. It is also
possible that you are forced to use a certain slicing tool for a certain 3D printer.
When your 3D model is sliced, you are ready to feed it to your 3D printer. This can be done via USB, SD or Wi-
Fi. It really depends on what 3D printer brand you work with. When a file is uploaded in a 3D printer, the object is
ready to be 3D printed layer by layer.\
31 MANCOSA
End User Computing
When a manufacturer uses high quality parts (motors, frame, electronics), this will affect the price of the end
product. When the parts are of high quality it doesn’t automatically mean the prints will turn out great – there are
too many other factors that play a role as well.
When a manufacturer decides to go cheap on parts it can market the product for a good price. On the other hand,
it doesn’t automatically mean that a cheap 3D printer will give you bad print results. But you’ll probably have to put
in more time and effort to get to the same level.
Secondly there’s Research and Development. It can take years of groundwork and engineering before the final
product is a stable, high quality 3D printer. Manpower can become costly overtime which of course needs to be
earned back.
The next element that influences the price of a 3D printer is: assembly. In general it’s cheaper and more efficient
to ship just the parts compared to a fully assembled 3D printer. This can be in the form of a DIY kit or a semi-
assembled 3D printer. This doesn’t necessarily mean that all DIY kits or semi-assembled 3d printers are cheap.
Cause some DIY kits contain such high quality parts that even though you have to assemble it yourself it’s still
pretty expensive. Additionally, some brands that market do-it-yourself kits put a lot of time and effort in making
educational tutorials and focus on customer service – which also doesn’t come cheap.
And this brings us to the last point that determines the 3D printer price: customer service and warranty.
There’s a good chance you’ll run into problems when you buy a 3D printer. In case you’ve chosen a 3D printer
from an established brand you’ll pay more but you will have the reassurance that there’s always support to back
you up. Also, when for instance something breaks during shipping, you’ll be glad you chose a product with warranty
Revision Questions
MANCOSA 32
End User Computing
3. When compared with normal PCs, which of the following statements about
Personal Digital Assistants (PDA) is correct?
A. Only small files can be stored.
B. The operating system requires less system memory to operate.
C. The operating system should be re-installed when the system crashes.
D. Data must be stored in an external flash memory card.
4. Which of the following actions should not be carried out when constructing a web
page?
A. Insert more than one hyperlink.
B. Compile the HTML file.
C. Insert multimedia elements but not photos.
D. Use .htm as the filename extension.
33 MANCOSA
End User Computing
Unit
2: Using the Computer
and Managing files
MANCOSA 34
End User Computing
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
35 MANCOSA
End User Computing
Shortcuts are files that point to other programs, program files or folders found somewhere on the computer. A
double-click on the shortcut icon will start either the appropriate program, or the appropriate file and corresponding
program, or appropriate folder.
Activity 1:
Run Windows Explorer
position the cursor over the Start button, press the right mouse button and select the command Open
Windows Explorer, or
from the Start menu select All programs, in the folder Accessories, search and click Windows Explorer,
or
in the search box (within the Start menu) type "Windows Explorer" and click on it when it appears in the
results, or
click on in the Taskbar, or
click on the Windows Explorer shortcut on the desktop
MANCOSA 36
End User Computing
Activity 2:
Create a new folder in the Music library
37 MANCOSA
End User Computing
When the hard disk is not divided into partitions and the DVD-ROM is connected When the hard disk is not divided
into partitions and the DVD-ROM and CD-RW are connected When the hard disk is divided into two partitions and
the DVDROM and CD-RW are connected
2.2 Desktop
A desktop can be contained in a window that is part of the total display area or can be a full screen, taking up the
total display area. Users can have multiple desktops for different projects or work environments they have and can
switch between them.
MANCOSA 38
End User Computing
Tandy released a text-based desktop called DeskMate in 1984. Like modern desktops, users could work with
DeskMate to open applications and documents and to browse disk contents. Microsoft released Windows 1.0 near
the end of 1985.
Windows has included a graphical desktop ever since the release of Windows 1.0. Although Windows 10 still bears
some similarities to Microsoft's early desktops, the Windows desktop has evolved considerably over the years. As
Windows matured, for example, the desktop included higher video resolution and color depth.
One of the more significant changes Microsoft made to the Windows desktop was the introduction of Active
Desktop. The company introduced Active Desktop along with Internet Explorer 4.0 in 1997. It was first intended for
use on Windows 95, but was eventually supported by Windows 98 and Vista before the company eventually
discontinued it. The Active Desktop feature displayed HTML content directly on the Windows desktop.
In Windows 8, Microsoft broke away from using the traditional desktop layout. The release eliminated the Start
menu and introduced a new interface called Metro, which Microsoft designed to compete with mobile operating
systems, such as Apple iOS.
Although Windows 8 included a desktop layout, it forced users to toggle back and forth between the desktop
interface and the Metro interface depending on which application they were using. The hallmark of the Metro
interface was live tiles, which were tiles that could display application data, such as weather information or stock
market reports, as opposed to acting as static desktop icons.
39 MANCOSA
End User Computing
In Windows 10, Microsoft brought back the Start menu, and it merged Metro and the legacy Windows desktop into
a single, blended desktop interface.
Let's take a look at the System tab, which is where you will find most of your computer's general settings and setup
utilities.
MANCOSA 40
End User Computing
Generally, the first thing to look for in a System tab is the actual system info, which you can find by clicking About.
Here you will see your computer's basic specs, including processor, memory, and operating system info, as well
as what edition of Windows you're currently running.
From this screen, you can quickly rename your computer by clicking Rename PC and following the prompts to
rename your computer for network identification purposes. (For a more detailed guide on how to rename your
computer, check out How to change your computer's name in Windows 10.)
Under Related settings, you will see a list of settings you may have been looking for when you initially clicked on
About: Additional administrative tools, Bitlocker settings, Device manager, and System info. These links take you
to Control Panel windows -- Microsoft hasn't completely scrapped the Control Panel.
41 MANCOSA
End User Computing
To check how much hard-drive space your computer has, click Storage. This screen shows the different drives
(including partitions, external hard drives, and attached media) currently connected to your PC, and also lets you
choose default save locations for different file types (apps, documents, music, pictures and videos). To choose a
default save location for a file type, pick the location from the drop-down menu and click Apply.
In Related settings, you'll see a link to Change where you store offline maps. This takes you to the Offline maps
section (which is also located directly under the Storage link).
MANCOSA 42
End User Computing
Storage only shows you how much space apps and other files are taking up on your computer -- if you need to
free up space, click Apps & features to see a list of installed apps sorted by name (you can also sort them by size
and date). Click on a non-native app and you will see two options: Modify and Uninstall. Modify lets you modify
how the app is installed on your computer (including moving it to a different partition or drive), while uninstall lets
you uninstall it.
The Related settings features a link to the Control Panel window Programs and Features, where you can uninstall
and change any programs that don't appear in the Apps & features section.
43 MANCOSA
End User Computing
Activity 3 : Antivirus
Revision Questions
Question 1
Which of the following is the safest and most efficient way to react to a nonresponding
program?
A. Turn off the computer by flipping the CPU's on/off switch.
B. Unplug the CPU at the electrical source.
C. Press Ctrl+Alt+Del, and choose Restart from the Shut Down menu.
D. Click the Start button on the taskbar and choose Turn Off Computer.
Answer C is correct. This particular keystroke combination will restart your computer and clear
the internal error that's causing the problem. Answers A and B are incorrect and could result
in serious harm to your data and any open software applications. Answer D is incorrect
because you won't be able to access the Start button.
Question 2
Which of the following removable storage media must you prepare by formatting before you
can use them?
A. CD-ROM
B. Floppy diskette
C. Internal hard drive
D. Zip disk
MANCOSA 44
End User Computing
Answers B and D are correct. You must format a floppy or Zip disk before you can store data
on them. Answers A and C are wrong. A CD-ROM needs no preparation and you should
probably never format your internal hard drive yourself. Hard drives must be formatted initially
but after that, you don't need to format it again. Occasionally when things go wrong,
reformatting a hard drive is necessary, but it's best to leave that task to the experts.
Question 3
Which of the following are legitimate window operations?
A. Moving it
B. Opening it
C. Resizing it
D. Deleting it
E. Closing it
Answers A, B, C, and E are correct. You can manipulate a window by opening, closing,
resizing, or moving it. Answer D is incorrect because you can't actually delete a window
although you can close it when you're done.
Question 4
Which of the following are legitimate elements in a window?
A. Title bar
B. Status bar
C. Toolbar
D. Shortcut icon
E. File
Answers A, B, and C are all correct. Neither a shortcut icon nor a file is a window element.
Question 5
Match the following extensions to their corresponding file types:
A. .doc
B. .xls
C. .tmp
D. .bmp
E. .mdb
45 MANCOSA
End User Computing
1. A spreadsheet file
2. A special temporary file created by the system
3. A word processing file
4. A database file
5. An image file
The correct matches are A to 3, B to 1, C to 2, D to 5, and E to 4.
Question 6
Why might you want to create a copy, known as a backup, of your work?
A. In case the computer's hard drive is corrupted or the system is incapacitated by theft,
damage, or virus
B. In case the original file is accidentally deleted
C. To protect your system from a virus
D. For reverse-engineering purposes
E. To audit your work for the purposes of quality control
Answers A and B are correct. Backups are created to protect your work in case of equipment
or file failure. C is incorrect because creating a backup will not protect your system from a
virus, although having a non-infected backup would be helpful in the event of attack. Answers
D and E have nothing to do with creating a backup.
Question 7
Which sequence of events would you use to add a folder to your hard drive?
A. Open the Control Panel window and select Add New Folder.
B. Launch the Windows Explorer, choose New from the File menu, and then select the
location for the new subfolder.
C. Launch the Windows Explorer, locate the file to which you want to add the new
subfolder, and choose New from the File menu.
D. Launch the Windows Explorer, locate the drive and folder to which you're adding the
new subfolder, and then choose New from the File menu.
Answer D is correct. Answer A is incorrect because no such command exists in the Control
Panel window. Answer B is incorrect because you must select the folder to which you're adding
the subfolder before executing the New command. Answer C is incorrect because you can't
add a folder or subfolder to a file.
MANCOSA 46
End User Computing
Question 8
Where will you find the Windows Help and Support feature?
A. In the Control Panel window
B. On any menu
C. On the desktop
D. On the Start menu
Answers A and D are correct. Although many menus sport a Help menu, it is application-
specific and isn't connected with the Windows Help feature. Although you could add a
shortcut icon to the desktop that launches the Help and Support, there isn't one by default.
Question 9
Which sequence of events would successfully add a shortcut icon to the desktop?
A. In the Windows Explorer, choose File, Create New Shortcut.
B. Right-click the Explorer window and choose Create New Shortcut.
C. In the Windows Explorer, right-click the file to which you want to create a shortcut.
Then, right-click the new shortcut file in the same folder, select Send to, and then
choose Desktop (Create Shortcut).
D. In the Windows Explorer, select the file you want to create a shortcut to and then
click the Shortcut icon on the toolbar.
Answer C is correct. Answer A is incorrect because you must select the file you're creating
the shortcut for first. Answer B is incorrect for the same reason. Answer D is incorrect
because there is no Shortcut icon on the Explorer toolbar.
Question 10
Why might you compress a folder or file?
A. To save space on the storage medium
B. To improve overall performance
C. To repair the folder or file
D. To reduce the size of the file or folder
Answers A, B, and D are correct. Answer C is incorrect because the compression process
will not repair any corruption problems the file might have.
47 MANCOSA
End User Computing
Unit
3: MS Word 2016
MANCOSA 48
End User Computing
3.1 Using the application Demonstrate how documents are created and shared
3.2 Document creation Create and edit small sized word processing documents
Prescribed Textbook:
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
49 MANCOSA
End User Computing
The Ribbon
To use the Ribbon, first click a tab. Then locate the command you need by scanning the group names, and then
hunting down the button. Click the button to activate the command or to display a menu from which you can choose
a command.
Some items on the Ribbon let you input text or values, or make other settings.
Galleries on the Ribbon display a smattering of tiles. To see them all, click the Show Gallery button in the lower-
right corner of the gallery, as illustrated.
Use the dialog box launcher icon in the lower-right corner of a group to open a dialog box relevant to the group’s
function. Not every group features a dialog box launcher.
The amazingly frustrating thing about the Ribbon is that it can change. Some tabs may appear and disappear,
depending on what you’re doing in Word.
Clicking the File tab replaces the contents of the Word window with a screen full of commands and other
information. To return to the Word window, click the Back button or press the Esc key.
MANCOSA 50
End User Computing
Each time you start Word, you can choose a template from the gallery, click a category to see more templates, or
search for more templates online.
If you’re already in Word, click File > Open and then browse to the file’s location.
When you open a document that was created in earlier versions of Word, you see Compatibility Mode in the title
bar of the document window. You can work in compatibility more or you can upgrade the document to use Word
2016.
51 MANCOSA
End User Computing
Activity 1:
Saving a document
Note: To save the document on your computer, choose a folder under This PC or click Browse. To save your
document online, choose an online location under Save As or click Add a Place. When your files are online, you
can share, give feedback and work together on them in real time.
4. Click Save.
Think Point
Note: Word automatically saves files in the .docx file format. To save your
document in a format other than .docx, click the Save as type list, and then
select the file format that you want
To save your document as you continue to work on it, click Save in the Quick Access Toolbar.
3.2.3 Objects
A table is made up of rows and columns. The intersection of a row and column is called a cell. Tables are often
used to organise and present information, but they have a variety of uses as well. You can use tables to align
numbers and create interesting page layouts.
MANCOSA 52
End User Computing
Creating a Table
1) Click the Insert tab on the Ribbon
2) Click on Table
3) Highlight the number of columns and rows you’d like
OR
Table Formatting
After you create a table, you can format the entire table by using Table Styles. By resting your pointer over each
of the preformatted table styles, you can preview what the table will look like.
Click in the table that you want to format
Under Table Tools, click the Design tab
In the Table Styles group, rest the pointer over each table style until you find a style that you want to use.
53 MANCOSA
End User Computing
Select the cells that you want, including their end-of-cell marks.
Select the cells that you want, including their end-of-cell marks.
MANCOSA 54
End User Computing
Mail Merge
A mail merge in Word will combine a pre-prepared letter with a mailing list, so that bulk mail is personalised before
it is sent out. For example, you might be part of an organisation that has a list of members and you want to let them
know about an upcoming Annual General Meeting. Your mailing list would be the list of members’ names and
addresses, and the pre-prepared letter would be a letter informing them of the AGM. Each letter produced will be
identical, apart from the personalised portions.
55 MANCOSA
End User Computing
If you don’t have a mailing list when you begin the mail merge, you can get Word 2016 to create one during the
merge. We recommend that you create the mailing list before you commence the merge though, so for this example
we’ll assume you have an Excel spreadsheet that contains names and address that you want to mail the letter to.
In our example, we have an Excel Spreadsheet, so navigate to where that is and select it. Select the sheet that
contains your data and click OK. If the first row in your spreadsheet is a header row, make sure that you check the
box to say so.
Now that you have established the link between your document and mailing list, save the document.
We’re going to assume that you want to send your letter to everyone on your list, but if you want to, you can select
only certain entries from the list.
MANCOSA 56
End User Computing
First of all, position the cursor where you want the address to appear on your letter. Then, on the Mailings tab, in
the Write & Insert Fields group, choose Address Block.
In the window that opens, you get the chance to review and amend the format of the address that will be inserted
when the merge is actually run.
Make any changes you need and click OK. You will ten see the <<AddressBlock>> placeholder appear where you
inserted it.
Let’s add a greeting line: position the cursor where you want the greeting and in the Write & Insert Fields group,
click Greeting Line. Again, you get the chance to review and amend the greeting, so make your changes and click
OK. You will see the <<GreetingLine>> placeholder where you inserted it.
The address and greeting are standard items, that most people will want to use in their mail merges, so they get
their own special buttons in the ribbon. What if you want to insert data that is not in the Write & Insert Fields group?
You will need the Insert Merge Fields button for that.
In our example we have an email address column in the spreadsheet. We’ll add that now: click Insert Merge Fields
> email.
57 MANCOSA
End User Computing
Word gets all the column headings in the spreadsheet and lists them for you to select from. An <<email>>
placeholder is inserted.
All the <<>> placeholders inserted will get populated with real data from your spreadsheet when the merge is run.
MANCOSA 58
End User Computing
Make any changes you feel are necessary, and then, once happy, click Finish & Merge > Print Documents to run
the merge and print.
Preparing Outputs
Page orientation
Word offers two-page orientation options: landscape and portrait. Compare our example below to see how
orientation can affect the appearance and spacing of text and images.
Landscape means the page is oriented horizontally
59 MANCOSA
End User Computing
Activity 2:
Page orientation
3. A drop-down menu will appear. Click either Portrait or Landscape to change the page orientation.
MANCOSA 60
End User Computing
Page size
By default, the page size of a new document is 8.5 inches by 11 inches. Depending on your project, you may need
to adjust your document's page size. It's important to note that before modifying the default page size, you should
check to see which page sizes your printer can accommodate.
2. A drop-down menu will appear. The current page size is highlighted. Click the desired predefined page
size.
61 MANCOSA
End User Computing
3. Adjust the values for Width and Height, then click OK.
MANCOSA 62
End User Computing
Page Margin
A margin is the space between the text and the edge of your document. By default, a new document's margins are
set to Normal, which means it has a one-inch space between the text and each edge. Depending on your needs,
Word allows you to change your document's margin size.
To format page margins:
Activity 3:
To format page margins
63 MANCOSA
End User Computing
2. A drop-down menu will appear. Click the predefined margin size you want.
MANCOSA 64
End User Computing
Activity 4:
To use custom margins
Word also allows you to customise the size of your margins in the Page Setup dialog box.
1. From the Layout tab, click Margins. Select Custom Margins from the drop-down menu.
65 MANCOSA
End User Computing
3.3 Formatting
Open your document in Read Mode to hide most of the buttons and tools so you can get absorbed in your reading
without distractions.
MANCOSA 66
End User Computing
Activity 5:
Read Mode
Activity 6:
Tracking Changes
67 MANCOSA
End User Computing
Activity 7:
Printing
2. Do the following
Under Print, in the Copies box, enter the number of copies you want
Under Printer, make sure the printer you want is selected
Under Settings, the default print settings for your printer are selected for you. If you want to change
a setting, just click the setting you want to change and then select a new setting
3. When you’re satisfied with the settings, click Print.
Revision Questions
1. Which part of Word Window lets you access common commands?
A. Home Tab
B. Dialog Box Launcher
C. Quick Access Toolbar
D. Format Tab
2. Question 2
It has multiple tabs, each with several groups of commands.
A. Quick Access Toolbar
B. Ribbon
C. Tags:
MANCOSA 68
End User Computing
69 MANCOSA
End User Computing
Unit
4: MS Excel 2016
MANCOSA 70
End User Computing
Prescribed Textbook:
Laudon C.K, Laudon J.P, 2017, Management Information
Systems, Managing the Digital Firm Vol. 1. no. 5, Pearson
Microsoft Office 365, Office 2016 Introductory, 2016
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
71 MANCOSA
End User Computing
Activity 1:
Excel Interface
From the Excel Start Screen, locate and select Blank workbook to access the Excel interface
MANCOSA 72
End User Computing
The Ribbon
Excel 2016 uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains multiple tabs,
each with several groups of commands. You will use these tabs to perform the most common tasks in Excel.
Each tab will have one or more groups
Some groups will have an arrow you can click for more options
Activity 2:
Ribbon displays
73 MANCOSA
End User Computing
You can adjust how the Ribbon is displayed with the Ribbon Display Options
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides the
Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
MANCOSA 74
End User Computing
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain visible.
To show the Ribbon, simply click a tab
Show Tabs and Commands: This option maximises the Ribbon. All of the tabs and commands will be
visible. This option is selected by default when you open Excel for the first time
4.2 Cells
Whenever you work with Excel, you'll enter information—or content—into cells. Cells are the basic building
blocks of a worksheet. You'll need to learn the basics of cells and cell content to calculate, analyse, and
organise data in Excel.
Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the intersection of
a row and a column—in other words, where a row and column meet.
Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3). Each cell has its
own name—or cell address—based on its column and row. In the example below, the selected cell intersects
column C and row 5, so the cell address is C5, this is called cell referencing
75 MANCOSA
End User Computing
Note that the cell address also appears in the Name box in the top-left corner, and that a cell's column and row
headings are highlighted when the cell is selected.
You can also select multiple cells at the same time. A group of cells is known as a cell range. Rather than a
single cell address, you will refer to a cell range using the cell addresses of the first and last cells in the cell range,
separated by a colon. For example, a cell range that included cells A1, A2, A3, A4, and A5 would be written as
A1:A5. Take a look at the different cell ranges below:
Cell range A1:A8
MANCOSA 76
End User Computing
Activity 3:
Working with Cells
To select a cell:
To input or edit cell content, you'll first need to select the cell.
1. Click a cell to select it. In our example, we'll select cell D9.
2. A border will appear around the selected cell, and the column heading and row heading will be
highlighted. The cell will remain selected until you click another cell in the worksheet.
77 MANCOSA
End User Computing
Activity 4:
Cells
1. Click and drag the mouse until all of the adjoining cells you want to select are highlighted. In
our example, we'll select the cell range B5:C18.
2. Release the mouse to select the desired cell range. The cells will remain selected until you click
another cell in the worksheet.
MANCOSA 78
End User Computing
To copy a worksheet:
If you need to duplicate the content of one worksheet to another, Excel allows you to copy an existing worksheet.
1. Right-click the worksheet you want to copy, then select Move or Copy from the worksheet menu.
2. The Move or Copy dialog box will appear. Choose where the sheet will appear in the Before sheet: field. In
our example, we'll choose (move to end) to place the worksheet to the right of the existing worksheet.
79 MANCOSA
End User Computing
4. The worksheet will be copied. It will have the same title as the original worksheet, as well as a version
number. In our example, we copied the November worksheet, so our new worksheet is named November
(2). All content from the November worksheet has also been copied to the new worksheet.
To rename a worksheet:
1. Right-click the worksheet you want to rename, then select Rename from the worksheet menu.
MANCOSA 80
End User Computing
3. Click anywhere outside the worksheet tab, or press Enter on your keyboard. The worksheet will be
renamed.
To move a worksheet:
1. Click and drag the worksheet you want to move until a small black arrow appears above the desired
location.
To delete a worksheet:
1. Right-click the worksheet you want to delete, then select Delete from the worksheet menu.
81 MANCOSA
End User Computing
A dialog box will appear with a list of all of the sheets in your workbook. You can then double-click the sheet
you want to jump to.
MANCOSA 82
End User Computing
For example, cell A3 below contains the SUM function which calculates the sum of the range A1:A2.
83 MANCOSA
End User Computing
Enter a Formula
To enter a formula, execute the following steps.
Activity 5:
Enter a formula
1. Select a cell.
2. To let Excel know that you want to enter a formula, type an equal sign (=).
3. For example, type the formula A1+A2.
Tip: instead of typing A1 and A2, simply select cell A1 and cell A2.
4. Change the value of cell A1 to 3.
Excel automatically recalculates the value of cell A3. This is one of Excel's most powerful features!
Edit a Formula
When you select a cell, Excel shows the value or formula of the cell in the formula bar.
1. To edit a formula, click in the formula bar and change the formula.
MANCOSA 84
End User Computing
2. Press Enter
Operator Precedence
Excel uses a default order in which calculations occur. If a part of the formula is in parentheses, that
part will be calculated first. It then performs multiplication or division calculations. Once this is complete,
Excel will add and subtract the remainder of your formula. See the example below.
First, Excel performs multiplication (A1 * A2). Next, Excel adds the value of cell A3 to this result.
Another example,
First, Excel calculates the part in parentheses (A2+A3). Next, it multiplies this result by the value of cell A1.
85 MANCOSA
End User Computing
Copy/Paste a Formula
When you copy a formula, Excel automatically adjusts the cell references for each new cell the formula is copied
to. To understand this, execute the following steps.
1. Enter the formula shown below into cell A4.
2a. Select cell A4, right click, and then click Copy (or press CTRL + c),
next select cell B4, right click, and then click Paste under 'Paste Options:' (or press CTRL + v).
2b. You can also drag the formula to cell B4. Select cell A4, click on the lower right corner of cell A4 and drag it
across to cell B4. This is much easier and gives the exact same result!
MANCOSA 86
End User Computing
Insert a Function
Every function has the same structure. For example, SUM (A1:A4). The name of this function is SUM. The part
between the brackets (arguments) means we give Excel the range A1:A4 as input. This function adds the values
in cells A1, A2, A3 and A4. It's not easy to remember which function and which arguments to use for each task.
Fortunately, the Insert Function feature in Excel helps you with this.
87 MANCOSA
End User Computing
3. Search for a function or select a function from a category. For example, choose COUNTIF from the Statistical
category.
4. Click OK.
The 'Function Arguments' dialog box appears.
5. Click in the Range box and select the range A1:C2.
6. Click in the Criteria box and type >5.
7. Click OK.
MANCOSA 88
End User Computing
Result. The COUNTIF function counts the number of cells that are greater than 5.
Note: instead of using the Insert Function feature, simply type =COUNTIF (A1:C2,">5"). When you arrive at:
=COUNTIF (instead of typing A1:C2, simply select the range A1:C2.
Revision Questions
1) Study the highlighted cells in the image below and identify which of the following
represents the correct cell address for these cells:
a) The cell reference for the selected cells is B:21, C:28, D:22, E:26 and F:25.
b) The cell reference for the selected cells is row 15, column F
c) The cell reference for the selected cells is F4:F5
d) The cell reference for the selected cells is B15:F15
2) What is the purpose of the Quick Access Toolbar (circled in orange in the image
below)?
a) It provides shortcuts to functions you may use frequently as well as functions that
may not be on the Ribbon.
b) You can only use it to save, redo and undo, create new documents, open
documents and print.
c) It displays functions you have recently used as well as frequently used functions.
d) None of the above options are correct.
89 MANCOSA
End User Computing
3) Which of the following functions are you likely to find under the Insert tab on the
Ribbon?
a) Insert a page break.
b) Insert a formula.
c) Insert a table.
d) Insert track changes.
4) Study the orange circled area of the worksheet in the image below. Which of the
following best describes the function of this area?
a) The Name Box displays a name given to a cell or set of cells.
b) The Name Box reflects the contents of the first cell that is selected in a range.
c) The Name Box gives you options for duplicating the selected cells.
d) All of the above options are correct.
5) The Formula Bar is the block located above the grid in a worksheet and preceded
by the letters fx. Which of the following comments about the Formula Bar is NOT
correct:
a) The Formula Bar is only used to create formulas by pressing the fx located to the
left of the box.
b) The Formula Bar contains the contents of the cell you have selected.
MANCOSA 90
End User Computing
c) You can type numbers or text directly into the formula bar.
d) You can edit words or numbers contained in selected cells in the Formula Bar.
6) What happens when you press the icon circled in orange in the image below?
a) It moves the worksheet up and hides rows.
b) It minimises the Ribbon.
c) It opens another part of the Ribbon.
d) It detaches the Ribbon from the worksheet and allow you to move it around.
7) Study the image below this question. What is the purpose of the two words
circled in orange?
a) These represent the names of the individual workbooks you have saved. If you
click on the "Sales 2" tab it will open this workbook.
b) These reflect a selected range of cells in the worksheet. If you click on "Sales 2" it
will take you to the selected cell.
c) These represent worksheets that have been created in the workbook. If you click
on them they will take you to the different sheets.
d) This is the Name Box and represents named ranges in the worksheet. If you click
on "Sales 2", you can rename the range.
91 MANCOSA
End User Computing
8) Study the section of a worksheet in the image below. What is the cell address of
the cell containing the word "Qtr3"?
a) The cell address is D1
b) The cell address is D:E
c) The cell address is E:5
d) The cell address is D:5
9) Which of the following functions is NOT associated with the Review Tab on the
Ribbon?
a) The spelling checker.
b) The sort data function.
c) The comment function.
d) The track changes function.
MANCOSA 92
End User Computing
10) Study the image below this question. The Quick Access Toolbar is appearing
below the Ribbon (circled in orange). How would you go about moving it back to its
position above the Ribbon?
a) This is a default setting with some versions of Excel. You need to reinstall Excel
to fix this issue.
b) You can move the toolbar back up to its position by holding down the left mouse
button and dragging it into position.
c) If you close the workbook and reopen it again, the toolbar will move back to its
original position.
d) If you right click on it and select "Show Quick Access Toolbar above the Ribbon" it
will move back.
93 MANCOSA
End User Computing
Unit
5: MS Access 2016
MANCOSA 94
End User Computing
5.7 Table
5.8 Query
5.9 Form
5.10 Report
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
95 MANCOSA
End User Computing
Microsoft Access stores information which is called a database. To use MS Access, you will need to follow these
four steps −
Database Creation − Create your Microsoft Access database and specify what kind of data you will be
storing
Data Input − After your database is created, the data of every business day can be entered into the
Access database
Query − This is a fancy term to basically describe the process of retrieving information from the database.
Report (optional) − Information from the database is organised in a nice presentation that can be printed
in an Access Report
Architecture
Access calls anything that can have a name an object. Within an Access desktop database, the main
objects are tables, queries, forms, reports, macros, data macros, and modules
If you have worked with other database systems on desktop computers, you might have seen the term
database used to refer to only those files in which you store data
But, in Access, a desktop database (.accdb) also includes all the major objects related to the stored data,
including objects you define to automate the use of your data
MANCOSA 96
End User Computing
97 MANCOSA
End User Computing
Access uses the powerful SQL database language to process data in your tables. Using SQL, you can define the
set of information that you need to solve a particular problem, including data from perhaps many tables.
MANCOSA 98
End User Computing
5.7 Table
Table is an object that is used to define and store data. When you create a new table, Access asks you to define
fields which is also known as column headings.
Each field must have a unique name, and data type
Tables contain fields or columns that store different kinds of data, such as a name or an address, and
records or rows that collect all the information about a particular instance of the subject, such as all the
information about a customer or employee etc
You can define a primary key, one or more fields that have a unique value for each record, and one or
more indexes on each table to help retrieve your data more quickly
5.8 Query
An object that provides a custom view of data from one or more tables. Queries are a way of searching for and
compiling data from one or more tables.
Running a query is like asking a detailed question of your database
When you build a query in Access, you are defining specific search conditions to find exactly the data
you want
In Access, you can use the graphical query by example facility or you can write Structured Query
Language (SQL) statements to create your queries
You can define queries to Select, Update, Insert, or Delete data
You can also define queries that create new tables from data in one or more existing tables
5.9 Form
Form is an object in a desktop database designed primarily for data input or display or for control of application
execution. You use forms to customise the presentation of data that your application extracts from queries or
tables.
99 MANCOSA
End User Computing
5.10 Report
Report is an object in desktop databases designed for formatting, calculating, printing, and summarising selected
data.
You can view a report on your screen before you print it
If forms are for input purposes, then reports are for output
Anything you plan to print deserves a report, whether it is a list of names and addresses, a financial
summary for a period, or a set of mailing labels
Reports are useful because they allow you to present components of your database in an easy-to-read
format
You can even customise a report's appearance to make it visually appealing
Access offers you the ability to create a report from any table or query
Module
Module is an object in desktop databases containing custom procedures that you code using Visual Basic.
Modules provide a more discrete flow of actions and allow you to trap errors.
MANCOSA 100
End User Computing
Everything that can be done in a macro can also be done in a module, but you don't get the macro
interface that prompts you what is needed for each action
Modules are far more powerful, and are essential if you plan to write code for a multi-user environment,
because macros cannot include error handling
Modules can be standalone objects containing functions that can be called from anywhere in your
application, or they can be directly associated with a form or a report to respond to events on the
associated form or report
Revision Questions
1. Which field type will you select if you need to enter long text in that field?
A. Text
B. Memo
C. Currency
D. Hyperlink
4. In which method we don't need to specify the field type and size while creating a
new Table?
A. Design View
B. While using Wizard
C. Create Table by Entering Data
D. All of Above
101 MANCOSA
End User Computing
MANCOSA 102
End User Computing
Unit
6: MS PowerPoint
103 MANCOSA
End User Computing
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
MANCOSA 104
End User Computing
The Ribbon and Quick Access Toolbar are where you will find the commands to perform common tasks in
PowerPoint. Backstage view gives you various options for saving, opening a file, printing, and sharing your
document.
The Ribbon
PowerPoint uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains multiple tabs,
each with several groups of commands. For example, the Font group on the Home tab contains commands for
formatting text in your document.
105 MANCOSA
End User Computing
Some groups also have a small arrow in the bottom-right corner that you can click for even more options.
Auto-hide Ribbon: Auto-hide displays your workbook in full-screen mode and completely hides
the Ribbon. To show the Ribbon, click the Expand Ribbon command at the top of screen
Show Tabs: This option hides all command groups when they're not in use, but tabs will remain
visible. To show the Ribbon, simply click a tab
Show Tabs and Commands: This option maximises the Ribbon. All of the tabs and commands
will be visible. This option is selected by default when you open PowerPoint for the first time
MANCOSA 106
End User Computing
107 MANCOSA
End User Computing
Activity 1:
Opening an existing presentation
2. Select New on the left side of the window, then click Blank Presentation.
MANCOSA 108
End User Computing
Activity 2:
Creating a new presentation
1. Click the File tab to access Backstage view, then select New.
2. You can click a suggested search to find templates or use the search bar to find something
more specific. In our example, we'll search for the keyword chalkboard.
109 MANCOSA
End User Computing
4. A preview of the template will appear, along with additional information on how the
template can be used.
5. Click Create to use the selected template.
MANCOSA 110
End User Computing
Activity 3:
Copying and moving text
2. Place the insertion point where you want the text to appear.
3. Click the Paste command on the Home tab.
Activity 4:
To cut and paste text
111 MANCOSA
End User Computing
2. Place the insertion point where you want the text to appear, then click the Paste command.
Revision Questions
2. In Microsoft PowerPoint two kind of sound effects files that can be added to the
presentation are
a. .wav files and .mid files
b. .wav files and .gif files
c. .wav files and .jpg files
d. .jpg files and .gif files
Correct Answer: a
MANCOSA 112
End User Computing
6. Which of the following should you use if you want all the slide in the presentation to
have the same “look”?
a. the slide layout option
b. add a slide option
c. outline view
d. a presentation design template
Correct Answer: d
113 MANCOSA
End User Computing
8. If you have a PowerPoint show you created and want to send using email to another
teacher you can add the show to your email message as a (an)
a. Inclusion
b. Attachment
c. Reply
d. Forward
Correct Answer: b
MANCOSA 114
End User Computing
Unit
7: Internet and Email
115 MANCOSA
End User Computing
7.2 Starting Microsoft Internet Understand what the internet is and common terms associated with it
Explorer
Understand the concept email
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
MANCOSA 116
End User Computing
Before we begin learning how to use the Internet and email, we must get familiar with some of the fundamental
concepts. Internet is a huge network of computers. People connect their computers to local networks, which in
turn are connected to regional networks and these regional networks are connected to a central structure called
backbone.
7.1.1 TCP/IP
Just like two people can communicate easily if they talk in the same language and its rules. Similarly, all computers
connected to Internet follow same rules and procedures, also called protocols, to communicate with each other.
These protocols, or the common language, of the Internet are known as Transmission Control Protocol/Internet
Protocol or TCP/IP.
Every computer on the Internet has a unique address. This is a four-part numeric address called Internet Protocol
Address or IP address, and it contains information that identifies the location of this computer. Some examples of
IP addresses are 255.230.54.1, or 10.11.0.220. Therefore, we can see that each part of IP address is a number
ranging between 0 and 255.
7.1.2 DNS
Most computers also have an address called a Domain Name System address or DNS address. A DNS address
has two parts: a host name which stands for the name the computer; a domain name that identifies the type of
organisation from which the computer is connected. Some of the most used domain names today are .com which
is used by commercial organisations; .edu used by educational institutions; .net used by network service providers;
.org used by non-profit organisations; and .gov used by government departments and organisations.
117 MANCOSA
End User Computing
about these links. A collection of related web pages is called a website. The first page of a website is called its
home page. On the home page, links to various webpages of the website are listed.
7.1.5 URL
The World Wide Web is built on a set of rules called the Hypertext transfer protocol (HTTP). This protocol requires
the Internet addresses in a special format, called URL or Uniform Resource Locator. A typical example of a URL
is as follows:
http://www.enablingdimensions.com/home/home.html
Sometimes the name of the web page is not displayed in the URL. However, each web page on the web has a
unique URL. To access a website, you must know its URL and that URL should be typed in the Address bar of
the web browser used by you.
7.1.6. Emails
To send and receive mails in electronic format, an email account and an Internet connection are required. There
are email programs available to help you manage your emails on your computer. Some of the most commonly
used email programs are Microsoft Outlook Express and Netscape Messenger. However, it is not essential to have
an email program to be able to send and receive emails. There are several free email service providers on the
web, including Hotmail, Yahoo!, Rediffmail and Indiatimes. You need to register with them and open an account
with them to start sending and receiving emails.
MANCOSA 118
End User Computing
After you drop your letter in the post box, the post-man collects and takes it to the central post office. From here,
it is dispatched to the recipient's city. Similarly, after an email is sent from a computer, it is sent to the nearest mail
server. Here, depending on the recipient's domain and top-level domain name, the mail is forwarded to the mail
servers closest to the recipient.
To deliver a letter, a postman collects the recipient's mail from the central post office and delivers it to the recipient's
home. Similarly, whenever the recipient connects to his mail server, the email program retrieves the mail from there
and presents it to the recipient.
Irrespective of what time of the day you send a mail, and no matter how far your recipient is, the whole process of
sending and receiving mails takes a few seconds.
sam@internet.com
To be able to use Internet and email, you need to set up a connection with an Internet Service Provider (ISP).
Internet connections are available over the telephone line through dial-up modems or DSL; over cable through
Cable T. V. wires; and through wireless. The most common way of connecting to the Internet is over telephone
line using a dial-up modem. However, lately Internet over cable is also becoming quite popular. There are also a
large number of cyber cafes in the country offering Internet Access facility on hourly rental basis.
119 MANCOSA
End User Computing
Before you begin, ensure that you have an Internet connection on your PC. If you are accessing from home, you
need to connect to the net using the software provided by your service provider. This software can be launched
from the Program sub-menu in Start Menu or from Desktop, if there is a shortcut on the desktop.
Activity 1:
To cut and paste text
1. Press the start button to open the start menu. Go to Programs and open the programs sub-menu.
2. Now use the down arrow direction key to reach the option labelled Internet Explorer, and press Enter.
3. Alternatively, you can use the shortcut icon for Internet Explorer on the desktop.
2. Menu Bar - This consists of a horizontal row of command options. These are File, Edit, View, Favourites,
Tools, and Help.
3. Standard Tool Bar - It displays shortcut icons of some of the most frequently used commands on the browser.
4. Short cut links bar - This may or may not be present. It displays shortcuts to a few most preferred links by the
user.
MANCOSA 120
End User Computing
5. Address Bar - It displays the URL of the website being accessed by the user.
6. Contents Pane - The contents of the web page will be displayed here.
7. Status Bar - It displays the status of download, connectivity and the URL of the link being downloaded.
1. Ensure that you are connected to the Internet. Launch the Internet Explorer from the start menu, programs
sub-menu.
2. Go to file menu option of the Internet Explorer by pressing the Alt key. Open the file menu drop down by using
the down arrow direction key. In this drop down, use the down arrow direction key to go to the option labelled
'open'. This will open the 'Open' dialog box. Alternatively, you can press Control key and O key. The cursor will be
in an edit text box. Here type the URL of the website you want to visit. We will take the example of Enabling
Dimensions website. So, type www.enablingdimensions.com in the open edit text box, and press Enter.
3. The browser will then look for the Enabling Dimensions website on the web. The status bar will display "searching
www.enablingdimensions.com". When it finds the website, the status bar will display 'website found'. After this a
process of displaying the website on your computer will begin, this process is called downloading. The page that
appears after downloading is complete is called the home page of the website.
121 MANCOSA
End User Computing
Activity 2:
To cut and paste text
We will learn to conduct search on Google.
2. Press control key + O key to open the 'Open' dialog box, type www.google.com
and press enter key.
3. In a few moments the home page of the Google website will be opened. The
cursor will be placed in the search text box; press enter key to put on the forms
mode. Now, type the text you want to search on the web in this box and press enter
key.
5. Use Tab to browse the links. Or if you already know the link, press Insert key + F7
key to open the links listing dialog box. Now, use the arrow direction keys to reach
the link you want to access, and press enter key.
Revision Questions
1. Which company designed a network that apparently became Internet?
o A. US Department of Defence
o B. Microsoft Corporation
o C. Macintosh Corporation
o D. Internet Technologies Limited
2. What is a server?
o A. A computer that is very big
o B. A computer that provides/manages shared services
o C. A system of connecting computers
o D. A computer that is connected in a LAN
3. The acronym GUI means Graphical User _______________
MANCOSA 122
End User Computing
4. A system for transferring web documents, defines how messages are formatted
and transmitted over internet is
o A. Hypertext Transfer Protocol
o B. World Wide Web
o C. Uniform Resource Locator
o D. Hyper Transformed Text Publisher
5. Say True or False: A modem is a device that converts outgoing data only, from
computers to a format that can be transferred via telephone lines.
o A. True
o B. False
6. From a web page, you cannot save pictures to your hard disk.
o A. True
o B. False
7. A small file put in your hard disk that contains information like user id by your web
browser is called a ____________________
o A. Certificate
o B. Personal Data File
o C. Secured Sockets Layer
o D. Cookie
8. Say true or false: Firewalls can't protect against viruses.
o A. True
o B. False
9. Mozilla Firefox, Google Chrome, Netscape Navigator and Opera are examples of
___________________
o A. Operating Systems
o B. Web Sites
o C. Web Browsers
o D. Search Engines
10. Wikipedia is a _____________________
o A. Knowledge Repository Site
o B. Search Engine
o C. Web Browser
o D. Personal Web Page
123 MANCOSA
End User Computing
Unit
8: ICT in Everyday Life
MANCOSA 124
End User Computing
8.2 Health Determine the role ICT play in improving health care for individuals and
communities
8.4 Copyright and Law Describe the copyright process and its laws
Recommended Reading:
Bezanson J., Edelman A., Karpinski S., Shah V.B., 2017, Julia: A fresh
approach to numerical computing, SIAM Review Vol. 1, no.1
Satyanarayanan M, 2017, The emergence of edge computing,
Computer, vol.1, no.4
Yi S., Li C., Li Q., 2015, Fog Computing : Focusing on mobile users at
the edge, Proceedings of the 2015 workshop on mobile big data, vol.1,
no. 4
125 MANCOSA
End User Computing
Teachers:
~ use computers to search for teaching materials, participate in online forums and online conferences as well as
to aid their teaching.
Students:
~ use the computers as a reference tool. They use computers to browse the internet to look for information.
Researchers:
~ use computers to collect and process data.
School Administrators:
~ use computers for administrative purposes to make sure that the entire operation runs smoothly. BANKING
In the banking, customers, businessman & bank administrator benefits from the usage of ICT. Customers:
~ can make any transactions at the 24-hour service centres or via online. These services allow them to do
transaction at anytime they want.
Businessman:
~ can save their time by using the online services offered by banks. They can access company accounts for loan
applications, business transactions and update on their cash flow at any time.
Bank Administrator:
~ can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic
transfer and others by referring to the banking system.
Industry
Computers are used to facilitate production planning and control systems, to support chain management and to
help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator
benefits from the usage of ICT.
Workers:
~ use machines that are connected to computers to operate. In some productions, robots are used to take over
jobs that are dangerous to the workers.
Researchers:
~ use computers to analyse and collect research data for future reference.
MANCOSA 126
End User Computing
Administrators:
~ use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that
occurred in the process.
E-Commerce
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster.
For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers,
suppliers and employees benefits from the usage of ICT. Customers:
~ use computers to be connected online with suppliers to purchase products. This method can save time and cost
as they do not have to go to any outlets.
Suppliers:
~ use computers to keep track of their transactions. All products are bar coded and can be read by the computer
scanner to help in determining prices and managing inventory.
Employees:
~ use computers and telephones to communicate with their customers for any enquiries. The system helps
employees to get the latest updates on inventory to be informed to the customers.
Other Sectors:
Among other sectors that benefit from the usage of ICT are architecture, arts, career, government, healthcare,
home, law enforcement, transportation and travel
8.2 Health
Information and communications technologies (ICTs) can play a critical role in improving health care for individuals
and communities. By providing new and more efficient ways of accessing, communicating, and storing information,
ICTs can help bridge the information divides that have emerged in the health sector in developing countries—
between health professionals and the communities they serve and between the producers of health research and
the practitioners who need it. Through the development of databases and other applications, ICTs also provide the
capacity to improve health system efficiencies and prevent medical errors.
A physician in a remote rural hospital is initially unable to diagnose a patient with a complex array of
symptoms. However, using his MEDLINE search training and the hospital’s Internet connection, he is
able to diagnose and successfully treat the patient for a tropical disease the patient picked up while
traveling abroad
Another physician looks at her hospital’s prescription trends using the newly created electronic health
record system and finds that other physicians are not using the post-surgical antibiotic that is shown to
be most effective according to the current international guidelines. She speaks to the administration about
advocating a switch in antibiotics that will improve patient recovery outcomes and thereby save the
hospital money
127 MANCOSA
End User Computing
A neonatologist, who transmits CT-scans and other medical images by e-mail to his network of personal
contacts around the world to help in diagnosing and treating premature new-borns, estimates that
teleconsultations have helped him to save numerous lives during the past year
A young woman, too embarrassed to ask her physician about reproductive health issues and the risks of
sexually transmitted infections, anonymously contacts physicians at a woman’s health clinic, where
they’ve set up e-mail accounts for staff in order to support these types of physician-patient interactions
Each of these examples demonstrates how information and communications technologies (ICTs) can play a critical
role in improving health care for individuals and communities. By providing new and more efficient ways of
accessing, communicating, and storing information, ICTs can help bridge the information divides that have
emerged in the health sector in developing countries—between health professionals and the communities they
serve and between the producers of health research and the practitioners who need it. Through the development
of databases and other applications, ICTs also provide the capacity to improve health system efficiencies and
prevent medical errors.
ICT for health (or e-health) programs are often considered to be expensive, time-consuming, risky, and otherwise
distracting from the primary focus and intent of health sector programs. In some cases, these criticisms may be
valid. There are, however, a wide range of low-cost and sustainable ICT for health program components that can
augment capacity and improve the overall effectiveness of health development programs. These are the types of
programs that HealthConnect International is specialised to help deliver.
8.3 Security
The meaning of the term computer security has evolved in recent years. Before the problem of data security
became widely publicised in the media, most people’s idea of computer security focused on the physical machine.
Traditionally, computer facilities have been physically protected for three reasons:
To prevent theft of or damage to the hardware
To prevent theft of or damage to the information
To prevent disruption of service
Computer security is security applied to computing devices such as computers and smartphones, as well as
computer networks such as private and public networks, including the whole Internet. The field covers all the
processes and mechanisms by which digital equipment, information and services are protected from unintended
or unauthorised access, change or destruction, and are of growing importance in line with the increasing reliance
on computer systems of most societies worldwide. It includes physical security to prevent theft of equipment, and
information security to protect the data on that equipment. It is sometimes referred to as "cyber security" or "IT
security", though these terms generally do not refer to physical security (locks and such). Some important terms
used in computer security are:
MANCOSA 128
End User Computing
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is
the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker
capability to exploit the flaw. To exploit vulnerability, an attacker must have at least one applicable tool or technique
that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. Vulnerability
management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This
practice generally refers to software vulnerabilities in computing systems. Backdoors A backdoor in a computer
system, is a method of bypassing normal authentication, securing remote access to a computer, obtaining access
to plaintext, and so on, while attempting to remain undetected.
The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an
existing program or hardware device. It may also fake information about disk and memory usage. Denial-of-service
attack Unlike other exploits, denials of service attacks are not used to gain unauthorised access or control of a
system. They are instead designed to render it unusable. Attackers can deny service to individual victims, such as
by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or
they may overload the capabilities of a machine or network and block all users at once. These types of attack are,
in practice, very hard to prevent, because the behaviour of whole networks needs to be analysed, not only the
behaviour of small pieces of code. Distributed denial of service (DDoS) attacks are common, where a large number
of compromised hosts (commonly referred to as "zombie computers", used as part of a botnet with, for example;
a worm, Trojan horse, or backdoor exploit to control them) are used to flood a target system with network requests,
thus attempting to render it unusable through resource exhaustion. Direct-access attacks an unauthorised user
gaining physical access to a computer (or part thereof) can perform many functions, install different types of devices
to compromise security, including operating system modifications, software worms, key loggers, and covert
listening devices. The attacker can also easily download large quantities of data onto backup media, for instance
CD-R/DVD-R, tape; or portable devices such as key drives, digital cameras or digital audio players. Another
common technique is to boot an operating system contained on a CD-ROM or other bootable media and read the
data from the hard drive(s) this way. The only way to defeat this is to encrypt the storage media and store the key
separate from the system. Direct-access attacks are the only type of threat to Standalone computers (never
connect to internet), in most cases. Eavesdropping Eaves dropping is the act of surreptitiously listening to a private
conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight
have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Spoofing of user
identity describes a situation in which one person or program successfully masquerades as another by falsifying
data and thereby gaining an illegitimate advantage. Tampering describes an intentional modification of products in
a way that would make them harmful to the consumer. Repudiation describes a situation where the authenticity of
a signature is being challenged.
129 MANCOSA
End User Computing
Information disclosure Information Disclosure (Privacy breach or Data leak) describes a situation where
information, thought as secure, is released in an untrusted environment. Elevation of privilege Elevation of Privilege
describes a situation where a person or a program want to gain elevated privileges or access to resources that are
normally restricted to him/it. An exploit is a piece of software, a chunk of data, or sequence of commands that takes
advantage of a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually computerised). This frequently includes such things
as gaining control of a computer system or allowing privilege escalation or a denial of service attack. The term
"exploit" generally refers to small programs designed to take advantage of a software flaw that has been
discovered, either remote or local. The code from the exploit program is frequently reused in Trojan horses and
computer viruses.
Indirect attacks
An indirect attack is an attack launched by a third-party computer. By using someone else's computer to launch an
attack, it becomes far more difficult to track down the actual attacker. There have also been cases where attackers
took advantage of public anonymising systems, such as the tor onion router system. Computer crime: Computer
crime refers to any crime that involves a computer and a network.
Security
1. Use Strong Passwords Use different user ID / password combinations for different accounts and avoid writing
them down. Make the passwords more complicated by combining letters, numbers, special characters
(minimum 10 characters in total) and change them on a regular basis.
2. Secure your computer o Activate your firewall Firewalls are the first line of cyber defence; they block
connections to unknown or bogus sites and will keep out some types of viruses and hackers. o Use anti-
virus/malware software Prevent viruses from infecting your computer by installing and regularly updating anti-
virus software. o Block spyware attacks Prevent spyware from infiltrating your computer by installing and
updating anti-spyware software.
3. Be Social-Media Savvy Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN,
etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is
on the Internet, it is there forever!
4. Secure your Mobile Devices Be aware that your mobile device is vulnerable to viruses and hackers.
Download applications from trusted sources.
5. Install the latest operating system updates Keep your applications and operating system (e.g. Windows, Mac,
Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older
software.
6. Protect your data Use encryption for your most sensitive files such as tax returns or financial records, make
regular back-ups of all your important data, and store it in another location.
MANCOSA 130
End User Computing
7. Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not
properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable.
Avoid conducting financial or corporate transactions on these networks.
8. Protect your e-identity Be cautious when giving out personal information such as your name, address, phone
number or financial information on the Internet. Make sure that websites are secure (e.g. when making online
purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
9. Avoid being scammed Always think before you click on a link or file of unknown origin. Don’t feel pressured
by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails
that ask you to verify your information or confirm your user ID or password.
10. Call the right person for help Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g.
child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your
local police. If you need help with maintenance or software installation on your computer, consult with your
service provider or a certified computer technician.
"the sole right to produce or reproduce the work or any substantial part thereof in any material form whatever".
Generally speaking, the copyright in a work protects its specific form, rather than the ideas suggested by or
underlying the work. Originally intended to protect creative works of art and literature, copyright is one of the easiest
and best ways to protect computer software.
Copyright protects the form or selection of information, but not the information itself. The ideas expressed in a
copyrighted work can be taken and re-used, so long as the form or selection of information is not substantially
duplicated.
Copyright also includes the sole right to record a literary, dramatic or musical work where the record may be
mechanically performed or delivered, and to communicate a work to the public by telecommunication.
131 MANCOSA
End User Computing
But what kind of "work" is required: creative effort, or slim effort? Some cases say that there must be creativity. In
the United States, some degree of creativity must be present; the arrangement of names, addresses and phone
numbers in a telephone directory was a non-original form which did not protect the phone book by copyright.
"Original" does not mean "novel". Different programmers can write similar programs and have copyright in each,
so long as they do not copy from one another.
Combinations of old things in an original way can be protected as artistic works (e.g. a collage of photographs).
Dramatic works need not have a high degree of originality. The variation of an existing work causing significant
changes can result in an original work.
Authorship
The Copyright Act does not define the term "author", and there have been no amendments to the Act to cover
problems related to authorship which are peculiar to computer programs. Thus questions of authorship which arise
when the specifications for a computer program are created by one person, or persons, and the code is created
by another person or persons, are left for the Courts to decide. Similarly, questions relating to authorship of
computer-generated programs will have to be considered by the Courts without reference to specific provisions of
the Act.
Revision Questions
a) A desktop computer.
b) A tablet PC.
c) A server.
d) A laptop.
2 Which one of the following is a term for systems used to store, retrieve,
process and transmit data?
MANCOSA 132
End User Computing
a) Gigahertz (GHz).
c) Gigabytes (GB).
d) Megabytes (MB).
4 Which one of the following is a term for an audio or video recording
posted on a web site that can be downloaded and played later?
a) Podcast.
b) Blog.
c) VoIP.
d) RSS Feed.
133 MANCOSA
End User Computing
Bibliography
Andrew Manches and Lydia Plowman, Computing education in children's early years: A call for debate,
British Journal of Educational Technology, 48, 1, (191-201), (2015).
Beth A. Rogowsky, Caryn C. Terwilliger, Craig A. Young and Elizabeth E. Kribbs, Playful learning with
technology: the effect of computer-assisted instruction on literacy and numeracy skills of pre-schoolers,
International Journal of Play, (1), (2017).
Chou Mei-Ju, How are Our Prince and Princess Satisfying with IPad Learning, Procedia - Social and
Behavioral Sciences, 116, (2857), (2014).
Elizabeth Foss and Allison Druin, Children’s Internet Search: Using Roles to Understand Children’s Search
Behavior, Synthesis Lectures on Information Concepts, Retrieval, and Services,
10.2200/S00591ED1V01Y201408ICR034, 6, 2, (1-106), (2014).
Emilija Stojmenova Duh, Natasa Koceska and Saso Koceski, Game-based learning: educational game
Azbuka to help young children learn writing Cyrillic letters, Multimedia Tools and Applications, 76, 12,
(14091), (2017).
Ewan Ingleby, Selected student and tutor perceptions of ICTs in further and higher education in England,
Journal of Further and Higher Education, 38, 3, (287), (2014).
Ewan Ingleby, The house that Jack built: neoliberalism, teaching in higher education and the moral
objections, Teaching in Higher Education, 20, 5, (518), (2015).
Fathi Ihmeideh and Fatima Al-Maadadi, Towards Improving Kindergarten Teachers’ Practices Regarding
the Integration of ICT into Early Years Settings, The Asia-Pacific Education Researcher, 27, 1, (65), (2018).
Guy Roberts-Holmes, Playful and creative ICT pedagogical framing: a nursery school case study, Early
Child Development and Care, 184, 1, (1), (2014).
Heather C. Janisse, Xiaoming Li, Navaz P. Bhavnagri, Cassandra Esposito and Bonita Stanton, A
Longitudinal Study of the Effect of Computers on the Cognitive Development of Low-Income African
American Preschool Children, Early Education and Development, 29, 2, (229), (2018).
Hui-Yun Sung, Adult mediation of preschool children’s use of mobile technologies in public libraries in
Taiwan: A socio-cultural perspective, Journal of Librarianship and Information Science,
(096100061770905), (2017).
Hui-Yun Sung, Incorporating technology in children's story time: Cultural-historical activity theory as a
means of reconciling contradictions, Library & Information Science Research, 39, 1, (46), (2017).
Joke Voogt and Susan McKenney, TPACK in teacher education: are we preparing teachers to use
technology for early literacy? Technology, Pedagogy and Education, 26, 1, (69), (2017).
Kleopatra Nikolopoulou and Vasilis Gialamas, ICT and play in preschool: early childhood teachers’ beliefs
and confidence, International Journal of Early Years Education, 23, 4, (409), (2015).
MANCOSA 134
End User Computing
Kleopatra Nikolopoulou, ICT Integration in Preschool Classes: Examples of Practices in Greece, Creative
Education, 05, 06, (402), (2014).
Marie L. Bassford, Annette Crisp, Angela O'Sullivan, Joanne Bacon and Mark Fowler, CrashEd – A live
immersive, learning experience embedding STEM subjects in a realistic, interactive crime scene, Research
in Learning Technology, 24, 1, (30089), (2016).
Maryanne Theobald, Susan Danby, Christina Davidson, Sandy Houen, Brooke Scriven and Karen Thorpe,
How Talk and Interaction Unfold in a Digitally Enabled Preschool Classroom, Australian Journal of
Linguistics, 36, 2, (189), (2016).
Mona Sakr, Multimodal participation frameworks during young children’s collaborative drawing on paper
and on the iPad, Thinking Skills and Creativity, 10.1016/j.tsc.2018.05.004, 29, (1-11), (2018).
Monika Tavernier and Xiao Hu, Developing young children's technology‐based communication skills using
iPads and creation apps: An action study, Proceedings of the Association for Information Science and
Technology, 54, 1, (415-425), (2017).
Nollaig McEvilly, Matthew Atencio and Martine Verheul, Developing children: developmental discourses
underpinning physical education at three Scottish preschool settings, Sport, Education and Society, 22, 8,
(943), (2017).
Pekka Mertala, Wag the dog – The nature and foundations of preschool educators' positive ICT
pedagogical beliefs, Computers in Human Behavior, 69, (197), (2017).
Pirita Ihamäki and Katriina Heljakka, The Internet of Toys, Connectedness and Character-Based Play in
Early Education, Proceedings of the Future Technologies Conference (FTC) 2018, 10.1007/978-3-030-
02686-8_80, (1079-1096), (2018).
Rabia M. Yilmaz, Educational magic toys developed with augmented reality technology for early childhood
education, Computers in Human Behavior, 10.1016/j.chb.2015.07.040, 54, (240-248), (2016).
Rabia M. Yilmaz, Sevda Kucuk and Yuksel Goktas, are augmented reality picture books magic or real for
preschool children aged five to six? British Journal of Educational Technology, 48, 3, (824-841), (2016).
Sanja Tatalović Vorkapić and Sandra Milovanović, Computer use in pre-school education: The attitudes of
the future pre-school teachers in Croatia, Education 3-13, 42, 2, (217), (2014).
Stephanie Kerckaert, Ruben Vanderlinde and Johan van Braak, The role of ICT in early childhood
education: Scale development and research on ICT use and influencing factors, European Early Childhood
Education Research Journal, 23, 2, (183), (2015).
Xia Liu, Eugenia I. Toki and Jenny Pange, The Use of ICT in Preschool Education in Greece and China: A
Comparative Study, Procedia - Social and Behavioral Sciences, 112, (1167), (2014).
Yvonne Anders, Hans-Günther Roßbach and Susanne Kuger, Early Childhood Learning Experiences,
Assessing Contexts of Learning, 10.1007/978-3-319-45357-6_7, (179-208), (2016).
135 MANCOSA
End User Computing
MANCOSA 136